Paper Title:
Two-Way ID Authentication and Hardware Encryption-Based Security Design of Mobile Hard Disk
  Abstract

The design of the "two-way ID authentication and hardware encryption-based secure mobile hard disk" adopts the smart card-based technology of two way ID authentication, thus enables higher authentication strength than ordinary password authentication and USB-KEY one way certification; adoption of dedicated hardware encryption chip on encrypting the hard disk data enhances the encryption speed; since this encryption is a hardware level encryption, it is completely transparent to users, and do not rely on the operating system or other applications, with almost no impact on system performance; that the key of the encryption system will be loaded before the system initialization (system boot) prevents malicious code attacks from hard drive, and even when the mobile hard disk was stolen, the thief cannot read out any encrypted data from it on any other computer as long as the thief has no access to the encryption key. Therefore, this "encrypted mobile hard disk" is more secure with better reading and writing performance, and thus can effectively protect sensitive data on the mobile hard disk.

  Info
Periodical
Edited by
Qi Luo
Pages
573-578
DOI
10.4028/www.scientific.net/AMM.58-60.573
Citation
X. L. Huang, H. C. Yang, "Two-Way ID Authentication and Hardware Encryption-Based Security Design of Mobile Hard Disk", Applied Mechanics and Materials, Vols. 58-60, pp. 573-578, 2011
Online since
June 2011
Export
Price
$32.00
Share

In order to see related information, you need to Login.

In order to see related information, you need to Login.

Authors: Cai Hong Wang, Guang Feng Jin
Chapter 15: Embedded System and Integrated Circuit
Abstract:This paper puts forward the design of communication system based on FPGA. USB controller CY7C68013 is widely used for its faster data...
2032
Authors: Peng Zhao, Zeng Sheng Li
Chapter 7: Communication, Signal and Image Processing, Data Acquisition, Identification and Recognation Technologies
Abstract:Data acquisition is the basic means of access to information; it is an important pillar of the information science, a comprehensive...
3667
Authors: Qing Lin Zhang, Shi Lei Sun, Tao Qu, De Xiang Deng
Chapter 12: Electronics Technology and Embedded Systems
Abstract:Some problems existed in IEEE 1394a camera of the Trouble of Moving Freight Car Detection System (TFDS), such as easy disconnection with...
1427
Authors: Hong Liang Li, Li Fu Li, Yu Wang
Chapter 6: Computer Science, Networks, Communication, Software, Information Security and Technologies
Abstract:PoC is an instant communication service based on cellular network, which can transmit information of voice by VoIP. In order to increase the...
935