TWI685770B - A storage system with chaotic system authentication - Google Patents
A storage system with chaotic system authentication Download PDFInfo
- Publication number
- TWI685770B TWI685770B TW107134373A TW107134373A TWI685770B TW I685770 B TWI685770 B TW I685770B TW 107134373 A TW107134373 A TW 107134373A TW 107134373 A TW107134373 A TW 107134373A TW I685770 B TWI685770 B TW I685770B
- Authority
- TW
- Taiwan
- Prior art keywords
- module
- authentication
- storage device
- number generator
- random number
- Prior art date
Links
- 230000000739 chaotic effect Effects 0.000 title claims abstract description 27
- 238000012795 verification Methods 0.000 claims abstract description 38
- 230000001360 synchronised effect Effects 0.000 claims abstract description 17
- 230000006870 function Effects 0.000 claims description 24
- 230000005540 biological transmission Effects 0.000 claims description 22
- 230000002457 bidirectional effect Effects 0.000 claims description 15
- 238000006243 chemical reaction Methods 0.000 claims description 11
- 238000004364 calculation method Methods 0.000 claims description 2
- 238000010586 diagram Methods 0.000 description 7
- 230000004044 response Effects 0.000 description 5
- 230000004308 accommodation Effects 0.000 description 4
- 230000009471 action Effects 0.000 description 3
- 238000000034 method Methods 0.000 description 3
- 238000005291 chaos (dynamical) Methods 0.000 description 2
- 230000007246 mechanism Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 230000002860 competitive effect Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000001681 protective effect Effects 0.000 description 1
- 238000011160 research Methods 0.000 description 1
- 238000004088 simulation Methods 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Images
Landscapes
- Storage Device Security (AREA)
Abstract
Description
本創作有關於一種具有安全保護機制的儲存系統,尤指一種在執行混沌系統認證後,進行與電腦雙向資料存取的儲存系統。This book is about a storage system with a security protection mechanism, especially a storage system that performs two-way data access with a computer after performing chaos system authentication.
隨著儲存技術的發展,用以存放數位資訊之儲存裝置容量越來越大,體積卻越來越小,成本也越來越低,其讀寫的速度也越來越快,傳統磁碟之儲存技術逐漸被記憶體淘汰,甚至取代了光碟儲存的技術,成為當前最主要數位儲存技術,配合儲存裝置所使用的存取介面的高速化以及隨插即用的特性,使人們得以快速且方便的攜帶以及複製各式資料。With the development of storage technology, the capacity of storage devices used to store digital information is getting larger and larger, but the volume is getting smaller and smaller, the cost is also getting lower, and the speed of reading and writing is getting faster and faster. Storage technology has gradually been eliminated by memory, and even replaced the technology of optical disk storage. It has become the most important digital storage technology at present. With the high speed of the access interface used by the storage device and the characteristics of plug-and-play, people can quickly and conveniently Carry and copy all kinds of information.
時至今日,儲存裝置的使用讓使用者享有較高行動力,但所產生資安風險也隨之提升,在有心人士的眼中是竊取重要機密最好下手的目標,尤其當記憶體之產品越做越小,成為隨身碟並應用在商業用途時,資料保密的問題更顯得重要,如隨身碟遺失或遭竊,將直接導致大量個資、機密文件外洩。Today, the use of storage devices allows users to enjoy high mobility, but the resulting security risks also increase. In the eyes of those who are interested, it is the best target to steal important secrets, especially when the memory products are more The smaller the size, the more important the issue of data confidentiality becomes when the pen drive is used in commercial applications. If the pen drive is lost or stolen, it will directly lead to the leakage of a large amount of personal information and confidential documents.
根據資安研究機構 Ponemon 的調查,近半數企業都曾因為隨身碟遭竊而洩露團隊的機密或敏感資料,因此市面上如較常見的金士頓、創見、全景軟體、伊諾瓦科技、和澤電子、 SanDisk 、Super Talent、泰騰恩科技等大廠,推出一些具有加密功能的隨身碟商品,其加密的方式都並不相同,有的是透過AES硬體加密,也有高階的款式是將指紋辨識的功能附加在隨身碟上,其中考慮到成本問題時,大多數的加密碟都是需搭配相對應的軟體安裝在電腦中,在軟體上設定好密碼後即可把檔案透過該軟體存放至隨身碟中,這樣的方式看似安全,操作也簡單,卻有許多漏洞和使用不方便的地方,而且容易遭有心人士破解。According to a survey by the security research institute Ponemon, nearly half of the companies have leaked the confidential or sensitive data of the team because of the stolen pen drive. , SanDisk, Super Talent, Taiteng Technology and other major manufacturers have launched some products with encryption function, the encryption method is not the same, some are encrypted by AES hardware, and there are high-end styles that are fingerprint recognition functions Attached to the flash drive, when considering the cost issue, most of the encrypted discs need to be installed on the computer with the corresponding software. After the password is set on the software, the file can be stored on the flash drive through the software This method seems to be safe and easy to operate, but there are many loopholes and inconveniences, and it is easy to be cracked by people who are interested.
而另一種硬式加密會比軟體式加密的保護性強,且可以有較簡易的操作介面和較快加解密速度。如在 2016 年全球第一大獨立記憶體模組製造商—金士頓推出的 USB 加密隨身碟 DataTraveler ® 2000,採用 256 位元 AES 硬體加密技術,不須額外安裝軟即可保護所儲存資料,以實字母數鍵組成的密碼鎖及硬體加密碼技術,協助使用者保存敏感和重要資料,但實際上也會因為多次更換密碼後的記憶不便及高單價的銷售,去影響到普及化與購買意願的問題。The other type of hard encryption is more protective than software encryption, and can have a simpler interface and faster encryption and decryption speed. For example, in 2016, the world's largest independent memory module manufacturer-Kingston launched the USB encrypted flash drive DataTraveler ® 2000, using 256-bit AES hardware encryption technology, without the need to install additional software to protect the stored data, to The combination lock composed of real alphanumeric keys and hardware encryption technology help users to save sensitive and important data, but in fact, it will affect the popularization and sales due to the inconvenience of memory after multiple password changes and high unit price sales. The question of willingness to buy.
有鑑於上述問題,本創作之目的係利用一款有別於一般市上面的加密機制並使得在價格上有足夠的競爭力,研發出混沌系統加密且配合行動裝置進行配對及認證後,進行儲存裝置與該電腦的雙向資料讀取。In view of the above problems, the purpose of this creation is to use an encryption mechanism that is different from the general market and makes it sufficiently competitive in price. The chaotic system encryption was developed and paired and authenticated with mobile devices for storage. Two-way data reading between the device and the computer.
為了達成上述目的,本創作一種具有混沌系統認證之儲存系統,所述儲存系統包括一儲存裝置,該儲存裝置透過一智慧型行動裝置進行認證後,進行與一電腦的雙向資料存取,該具有混沌系統認證之儲存系統包括:一智慧型行動裝置、一儲存裝置以及一雲端認證平台。In order to achieve the above purpose, the present invention creates a storage system with authentication of a chaotic system. The storage system includes a storage device that is authenticated by a smart mobile device and performs bidirectional data access with a computer. The storage system certified by the chaotic system includes: a smart mobile device, a storage device, and a cloud authentication platform.
所述之該智慧型行動裝置包括:一行動裝置藍芽模組,設置於該智慧型行動裝置;以及一行動應用程式,安裝於該智慧型行動裝置,該行動應用程式包括有一主亂數產生器模組以及一驗證模組。The smart mobile device includes: a mobile device Bluetooth module, which is installed on the smart mobile device; and a mobile application, which is installed on the smart mobile device, and the mobile application includes a main random number generation Module and a verification module.
所述之該儲存裝置,該儲存裝置透過該智慧型行動裝置進行認證後,進行與該電腦的雙向資料存取,包括:一殼體,具有一開口及一容置空間,該開口設於該殼體之一端且與該容置空間相連;一連接模組,設置於該開口位置處,該連接模組之一端可連接於該電腦;一處理器模組,設置於該容置空間;一雙向類比轉換模組,設置於該容置空間,連接於該連接模組;一快閃記憶體模組,設置於該容置空間,連接於該雙向類比轉換模組與該處理器模組;一儲存裝置藍芽模組,設置於該容置空間,連接於該處理器模組;以及一僕亂數產生器模組以及一同步控制器,設置於該容置空間,連接於該處理器模組。The storage device described above, after being authenticated by the smart mobile device, performs bidirectional data access with the computer, and includes: a housing with an opening and a receiving space, the opening being provided in the One end of the housing is connected to the accommodating space; a connecting module is provided at the opening, one end of the connecting module can be connected to the computer; a processor module is provided at the accommodating space; one A bidirectional analog conversion module is installed in the accommodation space and connected to the connection module; a flash memory module is installed in the accommodation space and connected to the bidirectional analog conversion module and the processor module; A storage device Bluetooth module is installed in the accommodating space and connected to the processor module; and a servo generator module and a synchronization controller are installed in the accommodating space and connected to the processor Module.
所述之該雲端認證平台,包括:一管理網頁平台,用以供至少一使用者進行登錄;以及一使用者資料庫,連接於該管理網頁平台,具有一儲存裝置資料庫。The cloud authentication platform mentioned above includes: a management webpage platform for at least one user to log in; and a user database connected to the management webpage platform and having a storage device database.
其中,首次使用該儲存裝置時,先進入該雲端認證平台執行一歸戶作業,使得該使用者可指定該驗證模組進行驗證;當該連接模組連接於該電腦,該儲存裝置藍芽模組與該行動裝置藍芽模組配對成功後,該主亂數產生器模組以及該僕亂數產生器模組藉由該同步控制器同步取得相同的隨機訊號,進行一加密傳輸比對認證,通過該驗證模組與該加密傳輸比對認證後,將該雙向類比轉換模組開啟,進行該快閃記憶體模組與該電腦的雙向資料讀取。Among them, when using the storage device for the first time, first enter the cloud authentication platform to perform a home operation, so that the user can specify the verification module for verification; when the connection module is connected to the computer, the storage device Bluetooth module After the pairing with the mobile device Bluetooth module is successful, the master random number generator module and the slave random number generator module obtain the same random signal synchronously through the synchronization controller, and perform an encrypted transmission comparison authentication After passing the verification of the verification module and the encrypted transmission comparison, the bidirectional analog conversion module is turned on to perform bidirectional data reading between the flash memory module and the computer.
上述的具有混沌系統認證之儲存系統,其中,該歸戶作業為該使用者自該管理網頁平台登錄該使用者帳號、密碼至該使用者資料庫,以及輸入一產品金鑰查詢該儲存裝置資料庫後執行媒合。The above storage system with chaos system authentication, wherein the home operation is that the user logs in the user account and password from the management web platform to the user database, and enters a product key to query the storage device data Perform matchmaking after the library.
上述的具有混沌系統認證之儲存系統,其中,該驗證模組可進行一聯網驗證或一無聯網驗證。The above storage system with chaos system certification, wherein the verification module can perform a network verification or a networkless verification.
上述的具有混沌系統認證之儲存系統,其中,該無聯網驗證將預先下載該使用者資訊至該驗證模組。The above storage system with the authentication of the chaotic system, wherein the networkless authentication will download the user information to the authentication module in advance.
上述的具有混沌系統認證之儲存系統,其中,該聯網認證為該驗證模組至該使用者資料庫取得用戶資訊進行驗證,驗證完成,下載該產品金鑰;當該行動應用程式與該儲存裝置達到同步,將該產品金鑰傳送給該儲存裝置執行該加密傳輸比對認證,執行成功該電腦開始對該儲存裝置做存取。The above storage system with chaos system authentication, wherein the network authentication is that the authentication module obtains user information from the user database for authentication, the authentication is completed, and the product key is downloaded; when the mobile application and the storage device When synchronization is achieved, the product key is sent to the storage device to perform the encrypted transmission comparison authentication. After successful execution, the computer starts to access the storage device.
上述的具有混沌系統認證之儲存系統,其中,該無聯網認證為該行動應用程式自動下載該產品金鑰並加密保存在該驗證模組中,當該使用者選擇解鎖該儲存裝置時,該行動應用程式便會與該儲存裝置進行同步運算,透過預先下載的該產品金鑰,執行該加密傳輸比對認證,執行成功該電腦開始對該儲存裝置做存取。The aforementioned storage system with chaos system authentication, wherein the non-networked authentication is that the mobile application automatically downloads the product key and encrypts and saves it in the verification module. When the user chooses to unlock the storage device, the action The application program will perform synchronous calculations with the storage device, execute the encrypted transmission comparison authentication through the product key downloaded in advance, and after successful execution, the computer begins to access the storage device.
上述的具有混沌系統認證之儲存系統,其中,該同步控制器將該主亂數產生器模組所產生的數值以及該僕亂數產生器模組所產生的數值,所述兩數值之誤差收斂到零。The above storage system with authentication of a chaotic system, wherein the synchronization controller converges the value generated by the main random number generator module and the value generated by the servant random number generator module, and the error of the two values converges To zero.
上述的具有混沌系統認證之儲存系統,其中,該加密傳輸比對認證包括有一非線性加解密函數;將該產品金鑰自該主亂數產生器模組經由該非線性加解密函數進行加密,傳送到該僕亂數產生器模組後以該非線性加解密函數進行解密並得一解密密碼,比對該解密密碼與該產品金鑰相同即完成該加密傳輸比對認證。The above storage system with chaotic system authentication, wherein the encrypted transmission comparison authentication includes a nonlinear encryption and decryption function; the product key is encrypted from the main random number generator module via the nonlinear encryption and decryption function and transmitted After going to the random number generator module, the non-linear encryption and decryption function is used to decrypt and obtain a decryption password. If the decryption password is the same as the product key, the encrypted transmission comparison authentication is completed.
上述的具有混沌系統認證之儲存系統,其中,該非線性加解密函數之方程式如下: 其中, 為一非線性加密函數、 為一非線性解密函數、p為固定密碼、 為解密密碼、 為該主亂數產生器模組產生之數值以及 為該僕亂數產生器模組產生之數值。 The above storage system with authentication of the chaotic system, wherein the equation of the nonlinear encryption and decryption function is as follows: among them, Is a nonlinear encryption function, Is a nonlinear decryption function, p is a fixed password, To decrypt the password, The value generated by the main random number generator module and It is the value generated by the servant number generator module.
上述的具有混沌系統認證之儲存系統,其中,該雲端認證平台可登錄複數個該儲存裝置,且以該行動應用程式進行管理。The above storage system with chaos system authentication, wherein the cloud authentication platform can log in multiple storage devices and manage them with the mobile application.
針對于現有技術,本創作的功效在於:For the existing technology, the effect of this creation is:
1. 以該處理器模組為主要架構,省去以往複雜的安裝軟體程序;1. Using the processor module as the main structure, eliminating the previous complicated software installation procedures;
2. 具有該雲端認證平台,當忘記密碼時可更改密碼,或遺失所述儲存裝置時可鎖定隨身碟,降低需要記住密碼的不便;2. With the cloud authentication platform, the password can be changed when the password is forgotten, or the pen drive can be locked when the storage device is lost, reducing the inconvenience of needing to remember the password;
3. 該具有混沌系統認證之儲存系統能以較低價的硬體晶片實現,可降低成本。3. The storage system with chaos system certification can be realized with lower-priced hardware chips, which can reduce costs.
4. 使用混沌理論及同步技術結合雲端資料認證,具有高技術門檻,也使得其安全性相對提昇。4. The use of chaos theory and synchronization technology combined with cloud data authentication has a high technical threshold and makes its security relatively improved.
5. 可依該使用者選擇具聯網驗證或在網路條件限制下選擇無聯網驗證,可提高安全性。5. Depending on the user, you can choose to have network authentication or under network conditions to choose no network authentication, which can improve security.
6. 透過該雲端認證平台的註冊,該使用者可使用同一行動應用程式,開鎖複數個該儲存裝置,使用方便度高。6. Through the registration of the cloud authentication platform, the user can use the same mobile application to unlock a plurality of storage devices, and the convenience of use is high.
本創作將由圖式配合以下說明而得到充分瞭解,使得熟習本技藝之人士可據以完成,然本案之實施並非可由下列實施例而被限制其實施型態。This creation will be fully understood by the drawings in conjunction with the following description, so that those skilled in the art can complete it, but the implementation of this case is not limited by the following examples.
請參閱圖 1,是本創作具有混沌系統認證之儲存系統之系統方塊圖,如圖 1 所示,本創作一種具有混沌系統認證之儲存系統 1 ,所述儲存系統包括一儲存裝置 2 ,透過一智慧型行動裝置 3 進行認證後,進行與一電腦 5 的雙向資料存取,該具有混沌系統認證之儲存系統 1 包括:一智慧型行動裝置 3 、一儲存裝置 2 以及一雲端認證平台 4 。Please refer to FIG. 1, which is a system block diagram of a storage system with authentication of a chaotic system. As shown in FIG. 1, a
該智慧型行動裝置 3 包括:一行動裝置藍芽模組 31 以及一行動應用程式 32;該行動應用程式 32 包括有一主亂數產生器模組 321 以及一驗證模組 322。The smart
該儲存裝置 2,透過該智慧型行動 3 裝置進行認證後,進行與該電腦 5 的雙向資料存取,包括:一殼體 21,具有一開口 211 及一容置空間 212,該開口 211 設於該殼體 21 之一端且與該容置空間 212 相連;一連接模組 22,設置於該開口 211 位置處,該連接模組 22 之一端可連接於該電腦 5 ;一處理器模組 23,設置於該容置空間 212;一雙向類比轉換模組 24 ,設置於該容置空間 212 ,連接於該連接模組 22 ;一快閃記憶體模組 25 ,設置於該容置空間 212,連接於該雙向類比轉換模組 24 與該處理器模組 23;一儲存裝置藍芽模組 26 ,設置於該容置空間 212 ,連接於該處理器模組 22 ;以及一僕亂數產生器模組 27 以及一同步控制器 28,設置於該容置空間 212 ,連接於該處理器模組 23。The
該雲端認證平台 4 ,包括:一管理網頁平台 41,用以供至少一使用者 6 進行登錄;以及一使用者資料庫 42,連接於該管理網頁平台 41,具有一儲存裝置資料庫 421,該管理網頁平台 41 可登錄複數個該儲存裝置 2,且以該行動應用程式 32 進行管理。The
其中,首次使用該儲存裝置 2 時,先進入該雲端認證平台 4 執行一歸戶作業 7 ,使得該使用者 6 可指定該驗證模組 322 進行驗證;當該連接模組 22 連接於該電腦 5 ,該儲存裝置藍芽模組 26 與該行動裝置藍芽模組 31 配對成功後,該主亂數產生器模組 321 以及該僕亂數產生器模組 27 藉由該同步控制器 28,同步取得相同的隨機訊號以進行一加密傳輸比對認證 9,通過該加密傳輸比對認證 9 與該驗證模組 322 後,將該雙向類比轉換模組 24 開啟,進行該快閃記憶體模組 25 與該電腦 5 的雙向資料讀取。Among them, when using the
請參閱圖2,該使用者 6 首次使用該儲存裝置 2 時需要先進行該歸戶作業 7 ,首先,該使用者 6 進入該管理網頁平台 41 登錄使用者帳號、密碼以完成註冊;其次,登入該管理網頁平台 41 輸入一產品金鑰 92 查詢該儲存裝置資料庫 421,該使用者資料庫 42 將所對應之該儲存裝置 2 與該使用者 6 註冊資料進行媒合;最後,該使用者 6 便能藉由該行動應用程式 32 登入,並藉由網路至伺服器中的該使用者資料庫 42 驗證帳戶,驗證完成後將該產品金鑰 92加密回傳至該驗證模組 322 中儲存,即完成登入,且該使用者可選擇該驗證模組 322 進行一聯網驗證 81 或在無網路環境下之一無聯網驗證 82 。Please refer to FIG. 2, the
前述之該加密傳輸比對認證 9 包括有一非線性加解密函數 91;將該產品金鑰 92 自該主亂數產生器模組 321 經由該非線性加解密函數 91 進行加密,傳送到該僕亂數產生器模組 27 後以該非線性加解密函數 91 進行解密並得一解密密碼 93,比對該解密密碼 93 與該產品金鑰 92 相同即完成該加密傳輸比對認證 9。該非線性加解密函數 91 之方程式如下:The aforementioned encrypted
其中,
為一非線性加密函數、
為一非線性解密函數、p為產品金鑰、
為解密密碼、
為該主亂數產生器模組 321 產生之數值以及
為該僕亂數產生器模組 27 產生之數值。
among them, Is a nonlinear encryption function, Is a nonlinear decryption function, p is the product key, To decrypt the password, The value generated by the main random
請參閱圖3,為該驗證模組 322選擇該聯網驗證 81之流程圖 ,該使用者 6 成功登入該行動應用程式 32 後,該驗證模組 322 將會自動載入該使用者 6 現有之該儲存裝置 2 資訊,只要透過該行動應用程式 32 選擇想要開啟的該儲存裝置 2 並按下開鎖,該驗證模組 322 將會在背景連接至該使用者資料庫 42 取得用戶資訊進行本地端與網路端驗證,如驗證成功便會下載該儲存裝置 2 之該產品金鑰 92,該主亂數產生器模組 321與僕亂數產生器模組 27 同步後將該產品金鑰 92 以混沌方式編碼傳送給該儲存裝置 2執行該加密傳輸比對認證 9,執行成功便會開啟該儲存裝置 2 與該電腦 5 之雙向資料傳輸,倘若失敗便不進行任何動作,以保護資料安全。Please refer to FIG. 3, a flowchart of selecting the
請參閱圖4,為該驗證模組 322 選擇該無聯網驗證 82 之流程圖,在完成該歸戶作業 7 時,該行動應用程式 32 便會自動下載該儲存裝置 2 之該產品金鑰 92 加密保存在該驗證模組 322中,當該使用者 6 選擇欲開鎖的該儲存裝置 2 時,該主亂數產生器模組 321與僕亂數產生器模組 27 同步後,透過混沌加密傳送預先下載的該產品金鑰 92,執行該加密傳輸比對認證 9,執行成功便會開啟該儲存裝置 2 與該電腦 5 之雙向資料傳輸,倘若失敗便不進行任何動作。Please refer to FIG. 4, a flow chart of selecting the
該使用者 6 雖然可自行選擇是否進行該聯網認證 81,但若是關閉此項功能,該使用者 6 便無法在手機或該儲存裝置 2 遺失時,以透過網頁更改密碼方式去預防資料被盜竊。因此,在關閉該聯網認證 81 時,該行動應用程式 32 會發出提示告知使用者。如無特殊需求、無網路訊號等等,切勿關閉該功能。但使用者 6 也可透過該無聯網驗證 82 前往無網路等收訊較差的工作基地使用本產品,也為本作品提供更廣的使用方式。Although the
請參閱圖5,為此混沌系統之狀態響應呈現類隨機亂數圖,為了建立該儲存裝置 2 ,首先必須先設計出亂數產生器,以混沌系統Tinkerbell,來做為亂數產生器,混沌系統原式如下:Please refer to FIG. 5, for which the state response of the chaotic system presents a random random number diagram. In order to establish the
設定 在模擬運算呈現之模型,其響應呈獻豐富變化的隨機特性,可以提供更多豐富的隨機亂數,在使用上,本專利使用之系統不限於此型式之混沌系統。 set up In the model presented by the simulation operation, its response presents rich and varied random characteristics, which can provide more abundant random random numbers. In use, the system used by this patent is not limited to this type of chaotic system.
該同步控制器 28 將該主亂數產生器模組 321 所產生的數值以及該僕亂數產生器模組 27 所產生的數值,將所述兩數值之誤差收斂到零,其方式如下: 該主亂數產生器:
該僕亂數產生器:
其中 u(k) 是待設計之該同步控制器 28 。 首先設同步誤差:
此時可以得到
令同步控制器 28 如下:
代入可得
, 若選擇
使
,則可知
The
當
,則
,因為
, 所以
而當同步誤差均收斂到 0 時,即表示該主亂數產生器模組 321 與僕亂數產生器模組 27 可以同步,其結果如圖 6。
when ,then ,because , and so When the synchronization errors all converge to 0, it means that the main random
上述中,該同步控制器 28 是依照誤差動態式運算,其結果如圖 7。In the above, the
此外,更進行對於該主亂數產生器模組 321 以及該僕亂數產生器模組 27 同步後進行模擬運算奇異吸子圖,該主亂數產生器模組 321 之奇異吸子圖如圖8A;該僕亂數產生器模組 27 之奇異吸子圖如圖8B。In addition, the singular attractor graph of the main random
由上述可知,當該僕亂數產生器模組 27 加入該同步控制器 28 後,經過一段時間後,該主亂數產生器模組 321 以及該僕亂數產生器模組 27 ,兩端漸漸達到同步。As can be seen from the above, after the servant random
綜上所述,本創作具有混沌系統認證之儲存系統 1,使用混沌理論及同步技術結合雲端資料認證,具有高技術門檻,也使得其安全性相對提昇;可依該使用者 6 選擇具聯網驗證 81 或在網路條件限制下選擇無聯網驗證 82,可提高安全性;透過該雲端認證平台 4 的註冊,該使用者 6 可使用同一行動應用程式 32,開鎖複數個該儲存裝置 2,使用方便度高。In summary, the creation of a
上述僅為本發明的較佳實施例而已,並非用來限定本發明實施的範圍,在不背離本發明精神及其實質的情況下,熟悉本領域的技術人員當可根據本發明作出各種相應的改變和變形,但這些相應的改變和變形都應屬於本發明所附的權利要求的保護範圍。The above are only preferred embodiments of the present invention and are not intended to limit the scope of implementation of the present invention. Without departing from the spirit and essence of the present invention, those skilled in the art can make various corresponding ones according to the present invention Changes and modifications, but these corresponding changes and modifications shall fall within the scope of protection of the claims appended to the present invention.
1‧‧‧具有混沌系統認證之儲存系統
2‧‧‧儲存裝置
21‧‧‧殼體
211‧‧‧開口
212‧‧‧容置空間
22‧‧‧連接模組
23‧‧‧處理器模組
24‧‧‧雙向類比轉換模組
25‧‧‧快閃記憶體模組
26‧‧‧儲存裝置藍芽模組
27‧‧‧僕亂數產生器模組
28‧‧‧同步控制器
3‧‧‧智慧型行動裝置
31‧‧‧行動裝置藍芽模組
32‧‧‧行動應用程式
321‧‧‧主亂數產生器模組
322‧‧‧驗證模組
4‧‧‧雲端認證平台
41‧‧‧管理網頁平台
42‧‧‧使用者資料庫
421‧‧‧儲存裝置資料庫
5‧‧‧電腦
6‧‧‧使用者
7‧‧‧歸戶作業
81‧‧‧聯網驗證
82‧‧‧無聯網驗證
9‧‧‧加密傳輸比對認證
91‧‧‧非線性加解密函數
92‧‧‧產品金鑰
93‧‧‧解密密碼1‧‧‧ Storage system with
圖1 為本創作具有混沌系統認證之儲存系統之系統方塊圖; 圖2 為本創作具有混沌系統認證之儲存系統之使用歸戶流程圖; 圖3 為本創作具有混沌系統認證之儲存系統之具連網驗證流程圖; 圖4 為本創作具有混沌系統認證之儲存系統之無聯網驗證流程圖; 圖5 為本創作具有混沌系統認證之儲存系統之混沌系統狀態響應類隨機亂數圖; 圖6 為本創作具有混沌系統認證之儲存系統之具同步控制器之混沌系統動態響應圖; 圖7 為本創作具有混沌系統認證之儲存系統之同步誤差動態響應圖; 圖8A 為本創作具有混沌系統認證之儲存系統之同步後主亂數產生器模組奇異吸子圖; 圖8B 為本創作具有混沌系統認證之儲存系統之同步後僕亂數產生器模組奇異吸子圖。Figure 1 is a system block diagram of the creation of a storage system with chaos system certification; Figure 2 is a flow chart of the use of creating a storage system with chaos system certification; Figure 3 is a tool for creating a storage system with chaos system certification Flowchart of network verification; Figure 4 is a flow chart of non-network verification for creating a storage system with chaotic system certification; Figure 5 is a random random number diagram of the state response class of a chaotic system for creating a storage system with chaotic system certification; Figure 6 The dynamic response diagram of the chaotic system with synchronization controller for the creation of the storage system with the certification of the chaotic system; Figure 7 is the dynamic response diagram of the synchronization error of the storage system with the certification of the certification for the chaotic system; The singular attractor graph of the main random number generator module after synchronization of the storage system; FIG. 8B is the singular attractor graph of the synchronized servant random number generator module after creating the storage system with chaos system authentication.
1‧‧‧具有混沌系統認證之儲存系統 1‧‧‧ Storage system with Chaos system certification
2‧‧‧儲存裝置 2‧‧‧Storage device
21‧‧‧殼體 21‧‧‧Housing
211‧‧‧開口 211‧‧‧ opening
212‧‧‧容置空間 212‧‧‧accommodation space
22‧‧‧連接模組 22‧‧‧Connect module
23‧‧‧處理器模組 23‧‧‧ processor module
24‧‧‧雙向類比轉換模組 24‧‧‧Two-way analog conversion module
25‧‧‧快閃記憶體模組 25‧‧‧Flash memory module
26‧‧‧儲存裝置藍芽模組 26‧‧‧storage Bluetooth module
27‧‧‧僕亂數產生器模組 27‧‧‧ Servant number generator module
28‧‧‧同步控制器 28‧‧‧ Synchronous controller
3‧‧‧智慧型行動裝置 3‧‧‧smart mobile device
31‧‧‧行動裝置藍芽模組 31‧‧‧Mobile Bluetooth Module
32‧‧‧行動應用程式 32‧‧‧Mobile application
321‧‧‧主亂數產生器模組 321‧‧‧ Main random number generator module
322‧‧‧驗證模組 322‧‧‧Verification module
4‧‧‧雲端認證平台 4‧‧‧ Cloud certification platform
41‧‧‧管理網頁平台 41‧‧‧Manage web platform
42‧‧‧使用者資料庫 42‧‧‧User database
421‧‧‧儲存裝置資料庫 421‧‧‧Storage device database
5‧‧‧電腦 5‧‧‧ Computer
9‧‧‧加密傳輸比對認證 9‧‧‧Encrypted transmission comparison authentication
91‧‧‧非線性加解密函數 91‧‧‧Non-linear encryption and decryption function
92‧‧‧產品金鑰 92‧‧‧Product key
93‧‧‧解密密碼 93‧‧‧ Decrypt password
Claims (8)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
TW107134373A TWI685770B (en) | 2018-09-28 | 2018-09-28 | A storage system with chaotic system authentication |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
TW107134373A TWI685770B (en) | 2018-09-28 | 2018-09-28 | A storage system with chaotic system authentication |
Publications (2)
Publication Number | Publication Date |
---|---|
TWI685770B true TWI685770B (en) | 2020-02-21 |
TW202013236A TW202013236A (en) | 2020-04-01 |
Family
ID=70413363
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
TW107134373A TWI685770B (en) | 2018-09-28 | 2018-09-28 | A storage system with chaotic system authentication |
Country Status (1)
Country | Link |
---|---|
TW (1) | TWI685770B (en) |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101398764A (en) * | 2007-09-25 | 2009-04-01 | 智多星电子科技有限公司 | Portable usb device that boots a computer as a server with security measure |
TW201101084A (en) * | 2009-06-19 | 2011-01-01 | Inventec Corp | Authentication system and a method of computer therefore |
TW201218726A (en) * | 2010-10-25 | 2012-05-01 | Hon Hai Prec Ind Co Ltd | Data transmission security system and method |
-
2018
- 2018-09-28 TW TW107134373A patent/TWI685770B/en not_active IP Right Cessation
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101398764A (en) * | 2007-09-25 | 2009-04-01 | 智多星电子科技有限公司 | Portable usb device that boots a computer as a server with security measure |
TW201101084A (en) * | 2009-06-19 | 2011-01-01 | Inventec Corp | Authentication system and a method of computer therefore |
TW201218726A (en) * | 2010-10-25 | 2012-05-01 | Hon Hai Prec Ind Co Ltd | Data transmission security system and method |
Also Published As
Publication number | Publication date |
---|---|
TW202013236A (en) | 2020-04-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
TWI462558B (en) | System and method for storing a password recovery secret | |
US8683232B2 (en) | Secure user/host authentication | |
US20080082813A1 (en) | Portable usb device that boots a computer as a server with security measure | |
US20080010453A1 (en) | Method and apparatus for one time password access to portable credential entry and memory storage devices | |
KR20100133953A (en) | System and method for securing data | |
KR20080071529A (en) | System and method of storage device data encryption and data access via a hardware key | |
JP2002163152A (en) | Safe computer resource access system using fingerprint and method therefor | |
US20120179915A1 (en) | System and method for full disk encryption authentication | |
US8667281B1 (en) | Systems and methods for transferring authentication credentials | |
EP3516575B1 (en) | Technologies for user-mode persistence of certificates and keys in resource-constrained devices | |
TWI685770B (en) | A storage system with chaotic system authentication | |
Loftus et al. | Android 7 file based encryption and the attacks against it | |
TWM574275U (en) | Storage system with chaotic system certification | |
Shinde et al. | Authentication in Mobile Cloud Computing | |
US20210374227A1 (en) | Trusted execution environment (tee)-based password management method and system | |
US11936645B2 (en) | Smart security storage system | |
Lopes et al. | Application H-Secure for mobile security | |
Pilania et al. | ENCRYPTO: A Reliable and Efficient Mobile App for Password Management | |
KR20230124434A (en) | User authenticiation method of electronic device and electronic device performing the same | |
Narmadha et al. | Smart Fingerprint Authentication Using Amazon Web Services | |
Marchang et al. | Multidimensional: User with File Content and Server’s Status Based Authentication for Secure File Operations in Cloud | |
GB2610160A (en) | Smart security storage system | |
CN112948891A (en) | Data uploading and data decrypting method, device, equipment and medium | |
Arunachalam et al. | AUTHENTICATION USING LIGHTWEIGHT CYPTOGRAPHIC TECHNIQUES | |
JP2002281015A (en) | Information rental safe and method for controlling the same, and ciphering/deciphering device and its control program |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
MM4A | Annulment or lapse of patent due to non-payment of fees |