A secure flash card solution for remote access for mobile workforce

被引:2
|
作者
Kato, T [1 ]
Tsunehiro, T
Tsunoda, M
Miyake, J
机构
[1] Hitachi Ltd, Syst Dev Lab, Yokohama, Kanagawa 2440817, Japan
[2] Hitachi Ltd, Res & Dev Grp, Yokohama, Kanagawa 2440817, Japan
[3] Renesas Technol Corp, Memory Business Unit, Tokyo 1000004, Japan
关键词
flash memory; personal authentication; public key infrastructure; remote access;
D O I
10.1109/TCE.2003.1233772
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
We developed a secure remote access system using a secure flash card for mobile workforce. The developed flash card has a tamper resistant module, which contains user authentication information and security keys. An authentication server and a client exchange their authentication information by using a key that is stored in the tamper resistant module of the flash card. Transactions between the flash card and the client are encrypted, and a processor encrypts and calculates the signature inside the tamper resistant module; thus, the system is highly secure. This remote access system also provides improved usability and increased information traceability.
引用
收藏
页码:561 / 566
页数:6
相关论文
共 50 条
  • [31] An end-to-end secure patient information access card system
    Alkhateeb, A
    Singer, H
    Yakami, M
    Takahashi, T
    METHODS OF INFORMATION IN MEDICINE, 2000, 39 (01) : 70 - 72
  • [32] Secure Shell Remote Access for Virtualized Computing Environment
    Li, He
    Cao, Rongqiang
    Xiu, Hanwen
    Wan, Meng
    Li, Kai
    Wang, Xiaoguang
    Wang, Yangang
    Wang, Jue
    SMART COMPUTING AND COMMUNICATION, 2022, 13202 : 123 - 132
  • [33] Secure remote user access over insecure networks
    Peyravian, M
    Jeffries, C
    COMPUTER COMMUNICATIONS, 2006, 29 (05) : 660 - 667
  • [34] Secure safety: Secure remote access to critical safety systems in offshore installations
    Jaatun, Martin Gilie
    Grotan, Tor Olav
    Line, Maria B.
    AUTONOMIC AND TRUSTED COMPUTING, PROCEEDINGS, 2008, 5060 : 121 - 133
  • [35] Providing secure remote access to legacy healthcare applications
    Young, A
    Chadwick, D
    New, J
    COMPUTING & CONTROL ENGINEERING JOURNAL, 2001, 12 (04): : 148 - 156
  • [36] Remote Wiping and Secure Deletion on Mobile Devices: A Review
    Di Leom, Ming
    Choo, Kim-Kwang Raymond
    Hunt, Ray
    JOURNAL OF FORENSIC SCIENCES, 2016, 61 (06) : 1473 - 1492
  • [37] Remote secure decentralized control strategy for mobile robots
    Fraisse, P
    Zapata, R
    Zarrad, W
    Andreu, D
    ADVANCED ROBOTICS, 2005, 19 (09) : 1027 - 1040
  • [38] Remote secure decentralized control strategy for mobile robots
    Fraisse, P.
    Zapata, R.
    Zarrad, W.
    Andreu, D.
    Adv Rob, 9 (1027-1040):
  • [39] Secure Remote Health Monitoring with Unreliable Mobile Devices
    Shin, Minho
    JOURNAL OF BIOMEDICINE AND BIOTECHNOLOGY, 2012,
  • [40] On the evaluation of a secure solution to access 802.11 networks
    da Costa, Fernando, Jr.
    Gaspary, Luciano
    Barbosa, Jorge
    Cavalheiro, Gerson
    Pfitscher, Luciano
    Ramos, Jose Dirceu G.
    E-BUSINESS AND TELECOMMUNICATION NETWORKS, 2007, 3 : 226 - +