A Practical Data Security Protection Technology

Article Preview

Abstract:

While the flash becomes main data storage medium, user authentication is normally used as the most important method to safeguard the securities of the data. But ii could do nothing to prevent illegal copies of legitimate users and illegal hard copies. This paper introduces a new type of data security protection technology. A method of generating special character code was first proposed. The code is regarded as the flash identity. The authentication of that identity can be applied to effectively recognize the illegal data copies and protect the data security.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 846-847)

Pages:

1620-1623

Citation:

Online since:

November 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Lin Weiguo, Xie Jinhui, An Interoperable Digital Rights Management System Architecture based on ChineDRM Metadata Schema, 2010 International Coverage and Transmission Conference.

Google Scholar

[2] Fang Zenan, The mobile storage device with encryption function, utility model patent, 200820212055. 9, (2009).

Google Scholar

[3] Fang Zenan, A method that produces the flash memory identification code, invention patent, 200810216343, (2012).

Google Scholar

[4] Fang Zenan, Li Yuzhi, Zhao Cong. "Improve the security of mobile banking service by TKey authentication, ready-to-be published.

Google Scholar

[5] Fang Zenan, Design of the encripted mobile storage device, unpublished.

Google Scholar