File Encryption System Design Based on USB Identity Authentication

被引:0
|
作者
Li, Ping [1 ]
Li, Li [1 ]
Liang, YunJuan [1 ]
Zhang, LiJun [1 ]
机构
[1] Zhengzhou Univ Light Ind, Sch Comp & Commun Engn, Zhengzhou, Peoples R China
关键词
Terms Identity authentication; filter driver; file encryption; eKey;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
To enhance the security of encryption systems, the original file system filter driver technique is improved by USB-based identity authentication, eKey module file encryption system. Firstly, user identity is certificated by mark from flash memory serial number and user password. Then, the file is encrypted by AES technology. Meanwhile, data protection system is introduced. The system is easier to expand and more flexible in encryption granularity, further enhance the security of the file system.
引用
收藏
页码:60 / 62
页数:3
相关论文
共 50 条
  • [31] Identity Based Secure RSA Encryption System
    Jain, Meenal
    Singh, Manoj
    [J]. PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMMUNICATION AND NETWORKS, 2017, 508 : 429 - 437
  • [32] Design and Implementation of USB Key-based Java']JavaEE Dual-factor Authentication System
    Tao Yizheng
    Tang Dingyong
    Gaoshan
    Shenhao
    [J]. 2009 INTERNATIONAL CONFERENCE ON INFORMATION MANAGEMENT, INNOVATION MANAGEMENT AND INDUSTRIAL ENGINEERING, VOL 4, PROCEEDINGS, 2009, : 443 - 446
  • [33] A Newer User Authentication, File encryption and Distributed Server Based Cloud Computing security architecture
    Nafi, Kawser Wazed
    Kar, Tonny Shekha
    Hoque, Sayed Anisul
    Hashem, M. M. A.
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2012, 3 (10) : 181 - 186
  • [34] Framework on Fingerprint Based Identity Authentication System
    Liu Wei
    Zhou Cong
    Wang YaTao
    [J]. 2ND INTERNATIONAL SYMPOSIUM ON COMPUTER NETWORK AND MULTIMEDIA TECHNOLOGY (CNMT 2010), VOLS 1 AND 2, 2010, : 625 - 628
  • [35] SVD-based image compression, encryption, and identity authentication algorithm on cloud
    Yu, Changzhi
    Li, Hengjian
    Wang, Xiyu
    [J]. IET IMAGE PROCESSING, 2019, 13 (12) : 2224 - 2232
  • [36] A study on the integrity and authentication of weather observation data using Identity Based Encryption
    Seo, Jung Woo
    Lee, Sang Jin
    [J]. SPRINGERPLUS, 2016, 5
  • [37] Design and Implementation of Secure Internet Based Voting System with User Anonymity using Identity Based Encryption System
    Purushothama, B. R.
    Pais, Alwyn R.
    [J]. 2009 IEEE INTERNATIONAL CONFERENCE ON SERVICES COMPUTING, 2009, : 474 - 481
  • [38] AUTHENTICATION ENCRYPTION BASED ON AUTHENTICATION CODE WITH SECRECY
    Zubov, A. Yu.
    [J]. PRIKLADNAYA DISKRETNAYA MATEMATIKA, 2019, (43): : 60 - 69
  • [39] The Research and Design of Identity Authentication Based on Speech Feature
    Ma, Hongbin
    Yan, Shuang
    Bai, Xue
    Zhu, Yong
    [J]. 2013 INTERNATIONAL CONFERENCE ON SENSOR NETWORK SECURITY TECHNOLOGY AND PRIVACY COMMUNICATION SYSTEM (SNS & PCS), 2013, : 166 - 169
  • [40] An optical authentication system based on encryption technique and multimodal biometrics
    Yuan, Sheng
    Zhang, Tong
    Zhou, Xin
    Liu, Xuemei
    Liu, Mingtang
    [J]. OPTICS AND LASER TECHNOLOGY, 2013, 54 : 120 - 127