TWI685770B - A storage system with chaotic system authentication - Google Patents

A storage system with chaotic system authentication Download PDF

Info

Publication number
TWI685770B
TWI685770B TW107134373A TW107134373A TWI685770B TW I685770 B TWI685770 B TW I685770B TW 107134373 A TW107134373 A TW 107134373A TW 107134373 A TW107134373 A TW 107134373A TW I685770 B TWI685770 B TW I685770B
Authority
TW
Taiwan
Prior art keywords
module
authentication
storage device
number generator
random number
Prior art date
Application number
TW107134373A
Other languages
Chinese (zh)
Other versions
TW202013236A (en
Inventor
顏錦柱
曹彥傑
曾士哲
周昱宏
萬培彥
詹哲瑜
Original Assignee
樹德科技大學
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 樹德科技大學 filed Critical 樹德科技大學
Priority to TW107134373A priority Critical patent/TWI685770B/en
Application granted granted Critical
Publication of TWI685770B publication Critical patent/TWI685770B/en
Publication of TW202013236A publication Critical patent/TW202013236A/en

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

A storage system with chaotic system certification, including smart mobile devices with Bluetooth and mobile applications, Bluetooth storage devices, and cloud authentication platforms. The storage device has a servant generator module and a synchronization controller; the mobile application has a main random number generator module. Logging in to the cloud authentication platform and locating the data of storage device to the mobile application; When the storage device is connected to the computer, the application verification is performed after the Bluetooth pairing is successful, so that the main random number generator module and the servant number generator module are synchronized by the synchronization controller for authentication, verification and authentication. After that, the two-way data reading of the storage device and the computer is performed.

Description

具有混沌系統認證之儲存系統Storage system with authentication of chaotic system

本創作有關於一種具有安全保護機制的儲存系統,尤指一種在執行混沌系統認證後,進行與電腦雙向資料存取的儲存系統。This book is about a storage system with a security protection mechanism, especially a storage system that performs two-way data access with a computer after performing chaos system authentication.

隨著儲存技術的發展,用以存放數位資訊之儲存裝置容量越來越大,體積卻越來越小,成本也越來越低,其讀寫的速度也越來越快,傳統磁碟之儲存技術逐漸被記憶體淘汰,甚至取代了光碟儲存的技術,成為當前最主要數位儲存技術,配合儲存裝置所使用的存取介面的高速化以及隨插即用的特性,使人們得以快速且方便的攜帶以及複製各式資料。With the development of storage technology, the capacity of storage devices used to store digital information is getting larger and larger, but the volume is getting smaller and smaller, the cost is also getting lower, and the speed of reading and writing is getting faster and faster. Storage technology has gradually been eliminated by memory, and even replaced the technology of optical disk storage. It has become the most important digital storage technology at present. With the high speed of the access interface used by the storage device and the characteristics of plug-and-play, people can quickly and conveniently Carry and copy all kinds of information.

時至今日,儲存裝置的使用讓使用者享有較高行動力,但所產生資安風險也隨之提升,在有心人士的眼中是竊取重要機密最好下手的目標,尤其當記憶體之產品越做越小,成為隨身碟並應用在商業用途時,資料保密的問題更顯得重要,如隨身碟遺失或遭竊,將直接導致大量個資、機密文件外洩。Today, the use of storage devices allows users to enjoy high mobility, but the resulting security risks also increase. In the eyes of those who are interested, it is the best target to steal important secrets, especially when the memory products are more The smaller the size, the more important the issue of data confidentiality becomes when the pen drive is used in commercial applications. If the pen drive is lost or stolen, it will directly lead to the leakage of a large amount of personal information and confidential documents.

根據資安研究機構 Ponemon 的調查,近半數企業都曾因為隨身碟遭竊而洩露團隊的機密或敏感資料,因此市面上如較常見的金士頓、創見、全景軟體、伊諾瓦科技、和澤電子、 SanDisk 、Super Talent、泰騰恩科技等大廠,推出一些具有加密功能的隨身碟商品,其加密的方式都並不相同,有的是透過AES硬體加密,也有高階的款式是將指紋辨識的功能附加在隨身碟上,其中考慮到成本問題時,大多數的加密碟都是需搭配相對應的軟體安裝在電腦中,在軟體上設定好密碼後即可把檔案透過該軟體存放至隨身碟中,這樣的方式看似安全,操作也簡單,卻有許多漏洞和使用不方便的地方,而且容易遭有心人士破解。According to a survey by the security research institute Ponemon, nearly half of the companies have leaked the confidential or sensitive data of the team because of the stolen pen drive. , SanDisk, Super Talent, Taiteng Technology and other major manufacturers have launched some products with encryption function, the encryption method is not the same, some are encrypted by AES hardware, and there are high-end styles that are fingerprint recognition functions Attached to the flash drive, when considering the cost issue, most of the encrypted discs need to be installed on the computer with the corresponding software. After the password is set on the software, the file can be stored on the flash drive through the software This method seems to be safe and easy to operate, but there are many loopholes and inconveniences, and it is easy to be cracked by people who are interested.

而另一種硬式加密會比軟體式加密的保護性強,且可以有較簡易的操作介面和較快加解密速度。如在 2016 年全球第一大獨立記憶體模組製造商—金士頓推出的 USB 加密隨身碟 DataTraveler ® 2000,採用 256 位元 AES 硬體加密技術,不須額外安裝軟即可保護所儲存資料,以實字母數鍵組成的密碼鎖及硬體加密碼技術,協助使用者保存敏感和重要資料,但實際上也會因為多次更換密碼後的記憶不便及高單價的銷售,去影響到普及化與購買意願的問題。The other type of hard encryption is more protective than software encryption, and can have a simpler interface and faster encryption and decryption speed. For example, in 2016, the world's largest independent memory module manufacturer-Kingston launched the USB encrypted flash drive DataTraveler ® 2000, using 256-bit AES hardware encryption technology, without the need to install additional software to protect the stored data, to The combination lock composed of real alphanumeric keys and hardware encryption technology help users to save sensitive and important data, but in fact, it will affect the popularization and sales due to the inconvenience of memory after multiple password changes and high unit price sales. The question of willingness to buy.

有鑑於上述問題,本創作之目的係利用一款有別於一般市上面的加密機制並使得在價格上有足夠的競爭力,研發出混沌系統加密且配合行動裝置進行配對及認證後,進行儲存裝置與該電腦的雙向資料讀取。In view of the above problems, the purpose of this creation is to use an encryption mechanism that is different from the general market and makes it sufficiently competitive in price. The chaotic system encryption was developed and paired and authenticated with mobile devices for storage. Two-way data reading between the device and the computer.

為了達成上述目的,本創作一種具有混沌系統認證之儲存系統,所述儲存系統包括一儲存裝置,該儲存裝置透過一智慧型行動裝置進行認證後,進行與一電腦的雙向資料存取,該具有混沌系統認證之儲存系統包括:一智慧型行動裝置、一儲存裝置以及一雲端認證平台。In order to achieve the above purpose, the present invention creates a storage system with authentication of a chaotic system. The storage system includes a storage device that is authenticated by a smart mobile device and performs bidirectional data access with a computer. The storage system certified by the chaotic system includes: a smart mobile device, a storage device, and a cloud authentication platform.

所述之該智慧型行動裝置包括:一行動裝置藍芽模組,設置於該智慧型行動裝置;以及一行動應用程式,安裝於該智慧型行動裝置,該行動應用程式包括有一主亂數產生器模組以及一驗證模組。The smart mobile device includes: a mobile device Bluetooth module, which is installed on the smart mobile device; and a mobile application, which is installed on the smart mobile device, and the mobile application includes a main random number generation Module and a verification module.

所述之該儲存裝置,該儲存裝置透過該智慧型行動裝置進行認證後,進行與該電腦的雙向資料存取,包括:一殼體,具有一開口及一容置空間,該開口設於該殼體之一端且與該容置空間相連;一連接模組,設置於該開口位置處,該連接模組之一端可連接於該電腦;一處理器模組,設置於該容置空間;一雙向類比轉換模組,設置於該容置空間,連接於該連接模組;一快閃記憶體模組,設置於該容置空間,連接於該雙向類比轉換模組與該處理器模組;一儲存裝置藍芽模組,設置於該容置空間,連接於該處理器模組;以及一僕亂數產生器模組以及一同步控制器,設置於該容置空間,連接於該處理器模組。The storage device described above, after being authenticated by the smart mobile device, performs bidirectional data access with the computer, and includes: a housing with an opening and a receiving space, the opening being provided in the One end of the housing is connected to the accommodating space; a connecting module is provided at the opening, one end of the connecting module can be connected to the computer; a processor module is provided at the accommodating space; one A bidirectional analog conversion module is installed in the accommodation space and connected to the connection module; a flash memory module is installed in the accommodation space and connected to the bidirectional analog conversion module and the processor module; A storage device Bluetooth module is installed in the accommodating space and connected to the processor module; and a servo generator module and a synchronization controller are installed in the accommodating space and connected to the processor Module.

所述之該雲端認證平台,包括:一管理網頁平台,用以供至少一使用者進行登錄;以及一使用者資料庫,連接於該管理網頁平台,具有一儲存裝置資料庫。The cloud authentication platform mentioned above includes: a management webpage platform for at least one user to log in; and a user database connected to the management webpage platform and having a storage device database.

其中,首次使用該儲存裝置時,先進入該雲端認證平台執行一歸戶作業,使得該使用者可指定該驗證模組進行驗證;當該連接模組連接於該電腦,該儲存裝置藍芽模組與該行動裝置藍芽模組配對成功後,該主亂數產生器模組以及該僕亂數產生器模組藉由該同步控制器同步取得相同的隨機訊號,進行一加密傳輸比對認證,通過該驗證模組與該加密傳輸比對認證後,將該雙向類比轉換模組開啟,進行該快閃記憶體模組與該電腦的雙向資料讀取。Among them, when using the storage device for the first time, first enter the cloud authentication platform to perform a home operation, so that the user can specify the verification module for verification; when the connection module is connected to the computer, the storage device Bluetooth module After the pairing with the mobile device Bluetooth module is successful, the master random number generator module and the slave random number generator module obtain the same random signal synchronously through the synchronization controller, and perform an encrypted transmission comparison authentication After passing the verification of the verification module and the encrypted transmission comparison, the bidirectional analog conversion module is turned on to perform bidirectional data reading between the flash memory module and the computer.

上述的具有混沌系統認證之儲存系統,其中,該歸戶作業為該使用者自該管理網頁平台登錄該使用者帳號、密碼至該使用者資料庫,以及輸入一產品金鑰查詢該儲存裝置資料庫後執行媒合。The above storage system with chaos system authentication, wherein the home operation is that the user logs in the user account and password from the management web platform to the user database, and enters a product key to query the storage device data Perform matchmaking after the library.

上述的具有混沌系統認證之儲存系統,其中,該驗證模組可進行一聯網驗證或一無聯網驗證。The above storage system with chaos system certification, wherein the verification module can perform a network verification or a networkless verification.

上述的具有混沌系統認證之儲存系統,其中,該無聯網驗證將預先下載該使用者資訊至該驗證模組。The above storage system with the authentication of the chaotic system, wherein the networkless authentication will download the user information to the authentication module in advance.

上述的具有混沌系統認證之儲存系統,其中,該聯網認證為該驗證模組至該使用者資料庫取得用戶資訊進行驗證,驗證完成,下載該產品金鑰;當該行動應用程式與該儲存裝置達到同步,將該產品金鑰傳送給該儲存裝置執行該加密傳輸比對認證,執行成功該電腦開始對該儲存裝置做存取。The above storage system with chaos system authentication, wherein the network authentication is that the authentication module obtains user information from the user database for authentication, the authentication is completed, and the product key is downloaded; when the mobile application and the storage device When synchronization is achieved, the product key is sent to the storage device to perform the encrypted transmission comparison authentication. After successful execution, the computer starts to access the storage device.

上述的具有混沌系統認證之儲存系統,其中,該無聯網認證為該行動應用程式自動下載該產品金鑰並加密保存在該驗證模組中,當該使用者選擇解鎖該儲存裝置時,該行動應用程式便會與該儲存裝置進行同步運算,透過預先下載的該產品金鑰,執行該加密傳輸比對認證,執行成功該電腦開始對該儲存裝置做存取。The aforementioned storage system with chaos system authentication, wherein the non-networked authentication is that the mobile application automatically downloads the product key and encrypts and saves it in the verification module. When the user chooses to unlock the storage device, the action The application program will perform synchronous calculations with the storage device, execute the encrypted transmission comparison authentication through the product key downloaded in advance, and after successful execution, the computer begins to access the storage device.

上述的具有混沌系統認證之儲存系統,其中,該同步控制器將該主亂數產生器模組所產生的數值以及該僕亂數產生器模組所產生的數值,所述兩數值之誤差收斂到零。The above storage system with authentication of a chaotic system, wherein the synchronization controller converges the value generated by the main random number generator module and the value generated by the servant random number generator module, and the error of the two values converges To zero.

上述的具有混沌系統認證之儲存系統,其中,該加密傳輸比對認證包括有一非線性加解密函數;將該產品金鑰自該主亂數產生器模組經由該非線性加解密函數進行加密,傳送到該僕亂數產生器模組後以該非線性加解密函數進行解密並得一解密密碼,比對該解密密碼與該產品金鑰相同即完成該加密傳輸比對認證。The above storage system with chaotic system authentication, wherein the encrypted transmission comparison authentication includes a nonlinear encryption and decryption function; the product key is encrypted from the main random number generator module via the nonlinear encryption and decryption function and transmitted After going to the random number generator module, the non-linear encryption and decryption function is used to decrypt and obtain a decryption password. If the decryption password is the same as the product key, the encrypted transmission comparison authentication is completed.

上述的具有混沌系統認證之儲存系統,其中,該非線性加解密函數之方程式如下:

Figure 02_image001
Figure 02_image003
其中,
Figure 02_image005
為一非線性加密函數、
Figure 02_image007
為一非線性解密函數、p為固定密碼、
Figure 02_image009
為解密密碼、
Figure 02_image011
為該主亂數產生器模組產生之數值以及
Figure 02_image013
為該僕亂數產生器模組產生之數值。 The above storage system with authentication of the chaotic system, wherein the equation of the nonlinear encryption and decryption function is as follows:
Figure 02_image001
Figure 02_image003
among them,
Figure 02_image005
Is a nonlinear encryption function,
Figure 02_image007
Is a nonlinear decryption function, p is a fixed password,
Figure 02_image009
To decrypt the password,
Figure 02_image011
The value generated by the main random number generator module and
Figure 02_image013
It is the value generated by the servant number generator module.

上述的具有混沌系統認證之儲存系統,其中,該雲端認證平台可登錄複數個該儲存裝置,且以該行動應用程式進行管理。The above storage system with chaos system authentication, wherein the cloud authentication platform can log in multiple storage devices and manage them with the mobile application.

針對于現有技術,本創作的功效在於:For the existing technology, the effect of this creation is:

1. 以該處理器模組為主要架構,省去以往複雜的安裝軟體程序;1. Using the processor module as the main structure, eliminating the previous complicated software installation procedures;

2. 具有該雲端認證平台,當忘記密碼時可更改密碼,或遺失所述儲存裝置時可鎖定隨身碟,降低需要記住密碼的不便;2. With the cloud authentication platform, the password can be changed when the password is forgotten, or the pen drive can be locked when the storage device is lost, reducing the inconvenience of needing to remember the password;

3. 該具有混沌系統認證之儲存系統能以較低價的硬體晶片實現,可降低成本。3. The storage system with chaos system certification can be realized with lower-priced hardware chips, which can reduce costs.

4. 使用混沌理論及同步技術結合雲端資料認證,具有高技術門檻,也使得其安全性相對提昇。4. The use of chaos theory and synchronization technology combined with cloud data authentication has a high technical threshold and makes its security relatively improved.

5. 可依該使用者選擇具聯網驗證或在網路條件限制下選擇無聯網驗證,可提高安全性。5. Depending on the user, you can choose to have network authentication or under network conditions to choose no network authentication, which can improve security.

6. 透過該雲端認證平台的註冊,該使用者可使用同一行動應用程式,開鎖複數個該儲存裝置,使用方便度高。6. Through the registration of the cloud authentication platform, the user can use the same mobile application to unlock a plurality of storage devices, and the convenience of use is high.

本創作將由圖式配合以下說明而得到充分瞭解,使得熟習本技藝之人士可據以完成,然本案之實施並非可由下列實施例而被限制其實施型態。This creation will be fully understood by the drawings in conjunction with the following description, so that those skilled in the art can complete it, but the implementation of this case is not limited by the following examples.

請參閱圖 1,是本創作具有混沌系統認證之儲存系統之系統方塊圖,如圖 1 所示,本創作一種具有混沌系統認證之儲存系統 1 ,所述儲存系統包括一儲存裝置 2 ,透過一智慧型行動裝置 3 進行認證後,進行與一電腦 5 的雙向資料存取,該具有混沌系統認證之儲存系統 1 包括:一智慧型行動裝置 3 、一儲存裝置 2 以及一雲端認證平台 4  。Please refer to FIG. 1, which is a system block diagram of a storage system with authentication of a chaotic system. As shown in FIG. 1, a storage system 1 with authentication of a chaotic system is created. The storage system includes a storage device 2 through a After the authentication of the smart mobile device 3, bidirectional data access with a computer 5 is performed. The storage system 1 with authentication of the chaotic system includes: a smart mobile device 3, a storage device 2, and a cloud authentication platform 4.

該智慧型行動裝置 3  包括:一行動裝置藍芽模組 31 以及一行動應用程式 32;該行動應用程式 32 包括有一主亂數產生器模組 321 以及一驗證模組 322。The smart mobile device 3 includes: a mobile device Bluetooth module 31 and a mobile application 32; the mobile application 32 includes a main random number generator module 321 and a verification module 322.

該儲存裝置 2,透過該智慧型行動 3 裝置進行認證後,進行與該電腦 5 的雙向資料存取,包括:一殼體 21,具有一開口 211 及一容置空間 212,該開口 211 設於該殼體 21 之一端且與該容置空間 212 相連;一連接模組 22,設置於該開口 211 位置處,該連接模組 22 之一端可連接於該電腦 5 ;一處理器模組 23,設置於該容置空間 212;一雙向類比轉換模組 24 ,設置於該容置空間 212 ,連接於該連接模組 22 ;一快閃記憶體模組 25 ,設置於該容置空間 212,連接於該雙向類比轉換模組 24 與該處理器模組 23;一儲存裝置藍芽模組 26 ,設置於該容置空間 212 ,連接於該處理器模組 22 ;以及一僕亂數產生器模組 27 以及一同步控制器 28,設置於該容置空間 212 ,連接於該處理器模組 23。The storage device 2 performs two-way data access with the computer 5 after being authenticated by the smart mobile 3 device, and includes: a housing 21 with an opening 211 and a receiving space 212, the opening 211 is provided in One end of the housing 21 is connected to the accommodating space 212; a connection module 22 is provided at the position of the opening 211, one end of the connection module 22 can be connected to the computer 5; a processor module 23, Set in the accommodating space 212; a bidirectional analog conversion module 24, set in the accommodating space 212, connected to the connection module 22; a flash memory module 25, set in the accommodating space 212, connected In the two-way analog conversion module 24 and the processor module 23; a storage device Bluetooth module 26, disposed in the accommodating space 212, connected to the processor module 22; and a random number generator module The group 27 and a synchronous controller 28 are disposed in the accommodating space 212 and connected to the processor module 23.

該雲端認證平台 4 ,包括:一管理網頁平台 41,用以供至少一使用者 6 進行登錄;以及一使用者資料庫 42,連接於該管理網頁平台 41,具有一儲存裝置資料庫 421,該管理網頁平台 41 可登錄複數個該儲存裝置 2,且以該行動應用程式 32 進行管理。The cloud authentication platform 4 includes: a management web platform 41 for at least one user 6 to log in; and a user database 42 connected to the management web platform 41, with a storage device database 421, the The management web platform 41 can register a plurality of the storage devices 2 and manage with the mobile application 32.

其中,首次使用該儲存裝置 2 時,先進入該雲端認證平台 4 執行一歸戶作業 7 ,使得該使用者 6 可指定該驗證模組 322 進行驗證;當該連接模組 22 連接於該電腦 5 ,該儲存裝置藍芽模組 26 與該行動裝置藍芽模組 31 配對成功後,該主亂數產生器模組 321 以及該僕亂數產生器模組 27 藉由該同步控制器 28,同步取得相同的隨機訊號以進行一加密傳輸比對認證 9,通過該加密傳輸比對認證 9 與該驗證模組 322 後,將該雙向類比轉換模組 24 開啟,進行該快閃記憶體模組 25 與該電腦 5 的雙向資料讀取。Among them, when using the storage device 2 for the first time, first enter the cloud authentication platform 4 to perform a home operation 7 so that the user 6 can designate the verification module 322 for verification; when the connection module 22 is connected to the computer 5 After the storage device Bluetooth module 26 and the mobile device Bluetooth module 31 are paired successfully, the main random number generator module 321 and the slave random number generator module 27 are synchronized by the synchronization controller 28 Obtain the same random signal to perform an encrypted transmission comparison authentication 9, after passing the encrypted transmission comparison authentication 9 and the verification module 322, the bidirectional analog conversion module 24 is turned on to perform the flash memory module 25 Two-way data reading with the computer 5.

請參閱圖2,該使用者 6 首次使用該儲存裝置 2 時需要先進行該歸戶作業 7 ,首先,該使用者 6 進入該管理網頁平台 41 登錄使用者帳號、密碼以完成註冊;其次,登入該管理網頁平台 41 輸入一產品金鑰 92 查詢該儲存裝置資料庫 421,該使用者資料庫 42 將所對應之該儲存裝置 2 與該使用者 6 註冊資料進行媒合;最後,該使用者 6 便能藉由該行動應用程式 32 登入,並藉由網路至伺服器中的該使用者資料庫 42 驗證帳戶,驗證完成後將該產品金鑰 92加密回傳至該驗證模組 322 中儲存,即完成登入,且該使用者可選擇該驗證模組 322 進行一聯網驗證 81 或在無網路環境下之一無聯網驗證 82 。Please refer to FIG. 2, the user 6 needs to perform the home operation 7 when using the storage device 2 for the first time. First, the user 6 enters the management web platform 41 to log in the user account and password to complete the registration; second, log in The management web platform 41 enters a product key 92 to query the storage device database 421, and the user database 42 matches the corresponding registration data of the storage device 2 and the user 6; finally, the user 6 You can log in through the mobile application 32 and verify the account through the network to the user database 42 in the server. After the verification is completed, the product key 92 is encrypted and returned to the verification module 322 for storage , The login is completed, and the user can select the verification module 322 to perform a network verification 81 or a networkless verification 82 in a networkless environment.

前述之該加密傳輸比對認證 9 包括有一非線性加解密函數 91;將該產品金鑰 92 自該主亂數產生器模組 321 經由該非線性加解密函數 91 進行加密,傳送到該僕亂數產生器模組 27 後以該非線性加解密函數 91 進行解密並得一解密密碼 93,比對該解密密碼 93 與該產品金鑰 92 相同即完成該加密傳輸比對認證 9。該非線性加解密函數 91 之方程式如下:The aforementioned encrypted transmission comparison authentication 9 includes a non-linear encryption and decryption function 91; the product key 92 is encrypted from the main random number generator module 321 via the non-linear encryption and decryption function 91 and transmitted to the servant number The generator module 27 then decrypts with the nonlinear encryption/decryption function 91 and obtains a decryption password 93, and the decryption password 93 is the same as the product key 92 to complete the encrypted transmission comparison authentication 9. The equation of the nonlinear encryption and decryption function 91 is as follows:

Figure 02_image001
Figure 02_image003
其中,
Figure 02_image005
為一非線性加密函數、
Figure 02_image007
為一非線性解密函數、p為產品金鑰、
Figure 02_image009
為解密密碼、
Figure 02_image011
為該主亂數產生器模組 321 產生之數值以及
Figure 02_image013
為該僕亂數產生器模組 27 產生之數值。
Figure 02_image001
Figure 02_image003
among them,
Figure 02_image005
Is a nonlinear encryption function,
Figure 02_image007
Is a nonlinear decryption function, p is the product key,
Figure 02_image009
To decrypt the password,
Figure 02_image011
The value generated by the main random number generator module 321 and
Figure 02_image013
It is the value generated by the servant number generator module 27.

請參閱圖3,為該驗證模組 322選擇該聯網驗證 81之流程圖 ,該使用者 6 成功登入該行動應用程式 32 後,該驗證模組 322 將會自動載入該使用者 6 現有之該儲存裝置 2 資訊,只要透過該行動應用程式 32 選擇想要開啟的該儲存裝置 2 並按下開鎖,該驗證模組 322 將會在背景連接至該使用者資料庫 42 取得用戶資訊進行本地端與網路端驗證,如驗證成功便會下載該儲存裝置 2 之該產品金鑰 92,該主亂數產生器模組 321與僕亂數產生器模組 27  同步後將該產品金鑰 92 以混沌方式編碼傳送給該儲存裝置 2執行該加密傳輸比對認證 9,執行成功便會開啟該儲存裝置 2 與該電腦 5 之雙向資料傳輸,倘若失敗便不進行任何動作,以保護資料安全。Please refer to FIG. 3, a flowchart of selecting the network authentication 81 for the authentication module 322. After the user 6 successfully logs in to the mobile application 32, the authentication module 322 will automatically load the existing user 6 For storage device 2 information, just select the storage device 2 you want to open through the mobile application 32 and press unlock, the authentication module 322 will be connected to the user database 42 in the background to obtain user information for local and Network verification. If the verification is successful, the product key 92 of the storage device 2 will be downloaded. After the main random number generator module 321 and the servant random number generator module 27 are synchronized, the product key 92 will be chaotic. The method code is sent to the storage device 2 to perform the encrypted transmission comparison authentication 9. If the execution is successful, the two-way data transmission between the storage device 2 and the computer 5 will be opened. If it fails, no action will be taken to protect the data security.

請參閱圖4,為該驗證模組 322 選擇該無聯網驗證 82 之流程圖,在完成該歸戶作業 7 時,該行動應用程式 32 便會自動下載該儲存裝置 2 之該產品金鑰 92 加密保存在該驗證模組 322中,當該使用者 6 選擇欲開鎖的該儲存裝置 2 時,該主亂數產生器模組 321與僕亂數產生器模組 27  同步後,透過混沌加密傳送預先下載的該產品金鑰 92,執行該加密傳輸比對認證 9,執行成功便會開啟該儲存裝置 2 與該電腦 5 之雙向資料傳輸,倘若失敗便不進行任何動作。Please refer to FIG. 4, a flow chart of selecting the non-networked authentication 82 for the authentication module 322. When the home operation 7 is completed, the mobile application 32 will automatically download the product key 92 of the storage device 2 for encryption Stored in the verification module 322, when the user 6 selects the storage device 2 to be unlocked, the main random number generator module 321 and the servant random number generator module 27 are synchronized and transmitted in advance through chaotic encryption After downloading the product key 92, the encrypted transmission comparison authentication 9 is executed. If successful, the two-way data transmission between the storage device 2 and the computer 5 will be opened, and no action will be performed if it fails.

該使用者 6 雖然可自行選擇是否進行該聯網認證 81,但若是關閉此項功能,該使用者 6 便無法在手機或該儲存裝置 2 遺失時,以透過網頁更改密碼方式去預防資料被盜竊。因此,在關閉該聯網認證 81 時,該行動應用程式 32 會發出提示告知使用者。如無特殊需求、無網路訊號等等,切勿關閉該功能。但使用者 6 也可透過該無聯網驗證 82 前往無網路等收訊較差的工作基地使用本產品,也為本作品提供更廣的使用方式。Although the user 6 can choose whether or not to perform the network authentication 81, if this function is turned off, the user 6 cannot prevent the data from being stolen by changing the password through the webpage when the mobile phone or the storage device 2 is lost. Therefore, when the network authentication 81 is turned off, the mobile application 32 will issue a prompt to inform the user. If there is no special demand, no network signal, etc., do not turn off this function. However, user 6 can also use this product to use this product at work sites with poor reception, such as no network, through this non-network authentication 82, which also provides a wider use of this work.

請參閱圖5,為此混沌系統之狀態響應呈現類隨機亂數圖,為了建立該儲存裝置 2 ,首先必須先設計出亂數產生器,以混沌系統Tinkerbell,來做為亂數產生器,混沌系統原式如下:Please refer to FIG. 5, for which the state response of the chaotic system presents a random random number diagram. In order to establish the storage device 2, the random number generator must first be designed, using the chaotic system Tinkerbell as the random number generator, chaos The original system is as follows:

Figure 02_image015
Figure 02_image015

Figure 02_image017
Figure 02_image017

設定

Figure 02_image019
在模擬運算呈現之模型,其響應呈獻豐富變化的隨機特性,可以提供更多豐富的隨機亂數,在使用上,本專利使用之系統不限於此型式之混沌系統。 set up
Figure 02_image019
In the model presented by the simulation operation, its response presents rich and varied random characteristics, which can provide more abundant random random numbers. In use, the system used by this patent is not limited to this type of chaotic system.

該同步控制器 28 將該主亂數產生器模組 321 所產生的數值以及該僕亂數產生器模組 27 所產生的數值,將所述兩數值之誤差收斂到零,其方式如下: 該主亂數產生器:

Figure 02_image021
該僕亂數產生器:
Figure 02_image023
其中 u(k) 是待設計之該同步控制器 28 。 首先設同步誤差:
Figure 02_image025
此時可以得到
Figure 02_image027
Figure 02_image029
Figure 02_image031
令同步控制器 28 如下:
Figure 02_image033
Figure 02_image035
代入可得
Figure 02_image037
, 若選擇
Figure 02_image039
使
Figure 02_image041
,則可知
Figure 02_image043
The synchronization controller 28 converges the value generated by the main random number generator module 321 and the value generated by the servant random number generator module 27 to zero, in the following manner: Main random number generator:
Figure 02_image021
The random number generator:
Figure 02_image023
Where u(k) is the synchronous controller 28 to be designed. First set the synchronization error:
Figure 02_image025
You can get
Figure 02_image027
Figure 02_image029
Figure 02_image031
Let the synchronous controller 28 be as follows:
Figure 02_image033
Figure 02_image035
Substitution available
Figure 02_image037
, If you choose
Figure 02_image039
Make
Figure 02_image041
, You know
Figure 02_image043

Figure 02_image045
,則
Figure 02_image047
,因為
Figure 02_image049
, 所以
Figure 02_image051
而當同步誤差均收斂到 0 時,即表示該主亂數產生器模組 321 與僕亂數產生器模組 27 可以同步,其結果如圖 6。 when
Figure 02_image045
,then
Figure 02_image047
,because
Figure 02_image049
, and so
Figure 02_image051
When the synchronization errors all converge to 0, it means that the main random number generator module 321 and the servant random number generator module 27 can be synchronized. The result is shown in FIG. 6.

上述中,該同步控制器 28 是依照誤差動態式運算,其結果如圖 7。In the above, the synchronous controller 28 is dynamically calculated according to the error, and the result is shown in FIG. 7.

此外,更進行對於該主亂數產生器模組 321 以及該僕亂數產生器模組 27 同步後進行模擬運算奇異吸子圖,該主亂數產生器模組 321 之奇異吸子圖如圖8A;該僕亂數產生器模組 27 之奇異吸子圖如圖8B。In addition, the singular attractor graph of the main random number generator module 321 and the servant random number generator module 27 are synchronized after synchronization, and the singular attractor graph of the main random number generator module 321 is shown in the figure 8A; the strange attractor diagram of the servant number generator module 27 is shown in FIG. 8B.

由上述可知,當該僕亂數產生器模組 27 加入該同步控制器 28 後,經過一段時間後,該主亂數產生器模組 321 以及該僕亂數產生器模組 27 ,兩端漸漸達到同步。As can be seen from the above, after the servant random number generator module 27 is added to the synchronization controller 28, after a period of time, the main random number generator module 321 and the servant random number generator module 27 gradually Synchronized.

綜上所述,本創作具有混沌系統認證之儲存系統 1,使用混沌理論及同步技術結合雲端資料認證,具有高技術門檻,也使得其安全性相對提昇;可依該使用者 6 選擇具聯網驗證 81 或在網路條件限制下選擇無聯網驗證 82,可提高安全性;透過該雲端認證平台 4 的註冊,該使用者 6 可使用同一行動應用程式 32,開鎖複數個該儲存裝置 2,使用方便度高。In summary, the creation of a storage system 1 with chaos system authentication, using chaos theory and synchronization technology combined with cloud data authentication, has a high technical threshold, and also makes its security relatively improved; you can choose to have network authentication according to the user 6 81 or select no network verification 82 under network conditions to improve security; through the registration of the cloud authentication platform 4, the user 6 can use the same mobile application 32 to unlock multiple storage devices 2, easy to use Degree is high.

上述僅為本發明的較佳實施例而已,並非用來限定本發明實施的範圍,在不背離本發明精神及其實質的情況下,熟悉本領域的技術人員當可根據本發明作出各種相應的改變和變形,但這些相應的改變和變形都應屬於本發明所附的權利要求的保護範圍。The above are only preferred embodiments of the present invention and are not intended to limit the scope of implementation of the present invention. Without departing from the spirit and essence of the present invention, those skilled in the art can make various corresponding ones according to the present invention Changes and modifications, but these corresponding changes and modifications shall fall within the scope of protection of the claims appended to the present invention.

1‧‧‧具有混沌系統認證之儲存系統 2‧‧‧儲存裝置 21‧‧‧殼體 211‧‧‧開口 212‧‧‧容置空間 22‧‧‧連接模組 23‧‧‧處理器模組 24‧‧‧雙向類比轉換模組 25‧‧‧快閃記憶體模組 26‧‧‧儲存裝置藍芽模組 27‧‧‧僕亂數產生器模組 28‧‧‧同步控制器 3‧‧‧智慧型行動裝置 31‧‧‧行動裝置藍芽模組 32‧‧‧行動應用程式 321‧‧‧主亂數產生器模組 322‧‧‧驗證模組 4‧‧‧雲端認證平台 41‧‧‧管理網頁平台 42‧‧‧使用者資料庫 421‧‧‧儲存裝置資料庫 5‧‧‧電腦 6‧‧‧使用者 7‧‧‧歸戶作業 81‧‧‧聯網驗證 82‧‧‧無聯網驗證 9‧‧‧加密傳輸比對認證 91‧‧‧非線性加解密函數 92‧‧‧產品金鑰 93‧‧‧解密密碼1‧‧‧ Storage system with Chaos system certification 2‧‧‧Storage device 21‧‧‧Housing 211‧‧‧ opening 212‧‧‧accommodation space 22‧‧‧Connect module 23‧‧‧ processor module 24‧‧‧Two-way analog conversion module 25‧‧‧Flash memory module 26‧‧‧storage Bluetooth module 27‧‧‧ Servant number generator module 28‧‧‧ Synchronous controller 3‧‧‧smart mobile device 31‧‧‧Mobile Bluetooth Module 32‧‧‧Mobile application 321‧‧‧ Main random number generator module 322‧‧‧Verification module 4‧‧‧ Cloud certification platform 41‧‧‧Manage web platform 42‧‧‧User database 421‧‧‧Storage device database 5‧‧‧ Computer 6‧‧‧User 7‧‧‧ Home operation 81‧‧‧Network verification 82‧‧‧No network verification 9‧‧‧Encrypted transmission comparison authentication 91‧‧‧Non-linear encryption and decryption function 92‧‧‧Product key 93‧‧‧ Decrypt password

圖1 為本創作具有混沌系統認證之儲存系統之系統方塊圖; 圖2 為本創作具有混沌系統認證之儲存系統之使用歸戶流程圖; 圖3 為本創作具有混沌系統認證之儲存系統之具連網驗證流程圖; 圖4 為本創作具有混沌系統認證之儲存系統之無聯網驗證流程圖; 圖5 為本創作具有混沌系統認證之儲存系統之混沌系統狀態響應類隨機亂數圖; 圖6 為本創作具有混沌系統認證之儲存系統之具同步控制器之混沌系統動態響應圖; 圖7 為本創作具有混沌系統認證之儲存系統之同步誤差動態響應圖; 圖8A 為本創作具有混沌系統認證之儲存系統之同步後主亂數產生器模組奇異吸子圖; 圖8B 為本創作具有混沌系統認證之儲存系統之同步後僕亂數產生器模組奇異吸子圖。Figure 1 is a system block diagram of the creation of a storage system with chaos system certification; Figure 2 is a flow chart of the use of creating a storage system with chaos system certification; Figure 3 is a tool for creating a storage system with chaos system certification Flowchart of network verification; Figure 4 is a flow chart of non-network verification for creating a storage system with chaotic system certification; Figure 5 is a random random number diagram of the state response class of a chaotic system for creating a storage system with chaotic system certification; Figure 6 The dynamic response diagram of the chaotic system with synchronization controller for the creation of the storage system with the certification of the chaotic system; Figure 7 is the dynamic response diagram of the synchronization error of the storage system with the certification of the certification for the chaotic system; The singular attractor graph of the main random number generator module after synchronization of the storage system; FIG. 8B is the singular attractor graph of the synchronized servant random number generator module after creating the storage system with chaos system authentication.

1‧‧‧具有混沌系統認證之儲存系統 1‧‧‧ Storage system with Chaos system certification

2‧‧‧儲存裝置 2‧‧‧Storage device

21‧‧‧殼體 21‧‧‧Housing

211‧‧‧開口 211‧‧‧ opening

212‧‧‧容置空間 212‧‧‧accommodation space

22‧‧‧連接模組 22‧‧‧Connect module

23‧‧‧處理器模組 23‧‧‧ processor module

24‧‧‧雙向類比轉換模組 24‧‧‧Two-way analog conversion module

25‧‧‧快閃記憶體模組 25‧‧‧Flash memory module

26‧‧‧儲存裝置藍芽模組 26‧‧‧storage Bluetooth module

27‧‧‧僕亂數產生器模組 27‧‧‧ Servant number generator module

28‧‧‧同步控制器 28‧‧‧ Synchronous controller

3‧‧‧智慧型行動裝置 3‧‧‧smart mobile device

31‧‧‧行動裝置藍芽模組 31‧‧‧Mobile Bluetooth Module

32‧‧‧行動應用程式 32‧‧‧Mobile application

321‧‧‧主亂數產生器模組 321‧‧‧ Main random number generator module

322‧‧‧驗證模組 322‧‧‧Verification module

4‧‧‧雲端認證平台 4‧‧‧ Cloud certification platform

41‧‧‧管理網頁平台 41‧‧‧Manage web platform

42‧‧‧使用者資料庫 42‧‧‧User database

421‧‧‧儲存裝置資料庫 421‧‧‧Storage device database

5‧‧‧電腦 5‧‧‧ Computer

9‧‧‧加密傳輸比對認證 9‧‧‧Encrypted transmission comparison authentication

91‧‧‧非線性加解密函數 91‧‧‧Non-linear encryption and decryption function

92‧‧‧產品金鑰 92‧‧‧Product key

93‧‧‧解密密碼 93‧‧‧ Decrypt password

Claims (8)

一種具有混沌系統認證之儲存系統,所述儲存系統包括一儲存裝置,該儲存裝置透過一智慧型行動裝置進行認證後,進行與一電腦的雙向資料存取,該具有混沌系統認證之儲存系統包括:一智慧型行動裝置,包括:一行動裝置藍芽模組,設置於該智慧型行動裝置;以及一行動應用程式,安裝於該智慧型行動裝置,該行動應用程式包括有一主亂數產生器模組以及一驗證模組;一儲存裝置,該儲存裝置透過該智慧型行動裝置進行認證後,進行與該電腦的雙向資料存取,包括:一殼體,具有一開口及一容置空間,該開口設於該殼體之一端且與該容置空間相連;一連接模組,設置於該開口位置處,該連接模組之一端可連接於該電腦;一處理器模組,設置於該容置空間;一雙向類比轉換模組,設置於該容置空間,連接於該連接模組;一快閃記憶體模組,設置於該容置空間,連接於該雙向類比轉換模組與該處理器模組;一儲存裝置藍芽模組,設置於該容置空間,連接於該處理器模組;以及一僕亂數產生器模組以及一同步控制器,設置於該容置空間,連接於該處理器模組;以及一雲端認證平台,包括:一管理網頁平台,用以供至少一使用者進行登錄;以及一使用者資料庫,連接於該管理網頁平台,且具有一儲存裝置資料庫; 其中,首次使用該儲存裝置時,先進入該雲端認證平台執行一為該使用者自該管理網頁平台登錄該使用者帳號、密碼至該使用者資料庫,以及輸入一產品金鑰查詢該儲存裝置資料庫後執行媒合之歸戶作業,使得該使用者可指定該驗證模組進行驗證;當該連接模組連接於該電腦,該儲存裝置藍芽模組與該行動裝置藍芽模組配對成功後,該主亂數產生器模組以及該僕亂數產生器模組藉由該同步控制器同步取得相同的隨機訊號,進行一加密傳輸比對認證,通過該驗證模組與該加密傳輸比對認證後,將該雙向類比轉換模組開啟,進行該快閃記憶體模組與該電腦的雙向資料讀取。 A storage system with authentication of a chaotic system. The storage system includes a storage device that is authenticated by a smart mobile device to perform bidirectional data access with a computer. The storage system with authentication of a chaotic system includes : A smart mobile device, including: a mobile device Bluetooth module, installed on the smart mobile device; and a mobile application, installed on the smart mobile device, the mobile application includes a main random number generator A module and a verification module; a storage device, which is authenticated by the smart mobile device and performs bidirectional data access with the computer, including: a housing with an opening and a receiving space, The opening is provided at one end of the housing and connected to the accommodating space; a connection module is provided at the position of the opening, one end of the connection module can be connected to the computer; and a processor module is provided at the Accommodating space; a bidirectional analog conversion module, installed in the accommodating space, connected to the connection module; a flash memory module, installed in the accommodating space, connected to the bidirectional analog conversion module and the A processor module; a storage device Bluetooth module, which is installed in the accommodating space and connected to the processor module; and a random number generator module and a synchronization controller, which are installed in the accommodating space, Connected to the processor module; and a cloud authentication platform, including: a management web platform for at least one user to log in; and a user database connected to the management web platform and having a storage device database; Among them, when using the storage device for the first time, first enter the cloud authentication platform to perform one for the user to log in the user account and password from the management web platform to the user database, and enter a product key to query the storage device After the database, the home operation of matchmaking is performed, so that the user can designate the verification module for verification; when the connection module is connected to the computer, the storage device Bluetooth module is paired with the mobile device Bluetooth module After success, the main random number generator module and the servant random number generator module obtain the same random signal synchronously by the synchronization controller, perform an encrypted transmission comparison authentication, and pass the verification module and the encrypted transmission After the comparison and authentication, the bidirectional analog conversion module is turned on to perform bidirectional data reading between the flash memory module and the computer. 如申請專利範圍第1項所述的具有混沌系統認證之儲存系統,其中,該驗證模組可進行一聯網驗證或一無聯網驗證。 The storage system with chaos system certification as described in item 1 of the patent application scope, wherein the verification module can perform a network verification or a networkless verification. 如申請專利範圍第2項所述的具有混沌系統認證之儲存系統,其中,該聯網認證為該驗證模組至該使用者資料庫取得用戶資訊進行驗證,驗證完成,下載該產品金鑰;當該行動應用程式與該儲存裝置達到同步,將該產品金鑰傳送給該儲存裝置執行該加密傳輸比對認證,執行成功該電腦開始對該儲存裝置做存取。 The storage system with chaos system authentication as described in item 2 of the patent application scope, wherein the network authentication is that the authentication module obtains user information from the user database for authentication, the authentication is completed, and the product key is downloaded; The mobile application and the storage device are synchronized, the product key is sent to the storage device to perform the encrypted transmission comparison authentication, and the computer starts to access the storage device after successful execution. 如申請專利範圍第2項所述的具有混沌系統認證之儲存系統,其中,該無聯網認證為該行動應用程式自動下載該產品金鑰並加密保存在該驗證模組中,當該使用者選擇解鎖該儲存裝置時,該行動應用程式便會與該儲存裝置進行同步運算,透過預先下載的該產品金鑰,執行該加密傳輸比對認證,執行成功該電腦開始對該儲存裝置做存取。 The storage system with chaos system certification as described in item 2 of the patent application scope, wherein the non-networked certification is that the mobile application automatically downloads the product key and encrypts and saves it in the verification module when the user selects When the storage device is unlocked, the mobile application will perform synchronous calculations with the storage device, execute the encrypted transmission comparison authentication through the product key downloaded in advance, and after successful execution, the computer begins to access the storage device. 如申請專利範圍第1項所述的具有混沌系統認證之儲存系統,其中,該同步控制器將該主亂數產生器模組所產生的數值以及該僕亂數產生器模組所產生的數值,所述兩數值之誤差收斂到零。 The storage system with chaos system authentication as described in item 1 of the patent scope, wherein the synchronization controller generates the value generated by the main random number generator module and the value generated by the servant random number generator module , The error between the two values converges to zero. 如申請專利範圍第1項所述的具有混沌系統認證之儲存系統,其中,該加密傳輸比對認證包括有一非線性加解密函數;將該產品金鑰自該主亂數產生器模組經由該非線性加解密函數進行加密,傳送到該僕亂數產生器模組後以該非線性加解密函數進行解密並得一解密密碼,比對該解密密碼與該產品金鑰相同即完成該加密傳輸比對認證。 The storage system with chaotic system authentication as described in item 1 of the patent scope, wherein the encrypted transmission comparison authentication includes a nonlinear encryption and decryption function; the product key is passed from the main random number generator module through the The linear encryption and decryption function is encrypted, and after being transmitted to the servant generator module, the nonlinear encryption and decryption function is used to decrypt and obtain a decryption password. Comparing the decryption password with the product key is the encrypted transmission comparison. Certification. 如申請專利範圍第6項所述的具有混沌系統認證之儲存系統,其中,該非線性加解密函數之方程式如下:
Figure 107134373-A0305-02-0017-6
其中,E(x,p,t)為一非線性加密函數、D(
Figure 107134373-A0305-02-0017-5
,p,t)為一非線性解密函數、p為產品金鑰、
Figure 107134373-A0305-02-0017-3
為解密密碼、xi,i=1,2為該主亂數產生器模組產生之數值以及
Figure 107134373-A0305-02-0017-4
,i=1,2為該僕亂數產生器模組產生之數值。
The storage system with authentication of chaotic system as described in item 6 of the patent application scope, wherein the equation of the nonlinear encryption and decryption function is as follows:
Figure 107134373-A0305-02-0017-6
Among them, E(x,p,t) is a nonlinear encryption function, D(
Figure 107134373-A0305-02-0017-5
, p, t) is a nonlinear decryption function, p is the product key,
Figure 107134373-A0305-02-0017-3
To decrypt the password, x i , i=1,2 is the value generated by the main random number generator module and
Figure 107134373-A0305-02-0017-4
, I=1,2 is the value generated by the servant number generator module.
如申請專利範圍第1項所述的具有混沌系統認證之儲存系統,其中,該雲端認證平台可登錄複數個該儲存裝置,且以該行動應用程式進行管理。 The storage system with chaos system authentication as described in item 1 of the patent application scope, wherein the cloud authentication platform can register a plurality of the storage devices and manage them with the mobile application.
TW107134373A 2018-09-28 2018-09-28 A storage system with chaotic system authentication TWI685770B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW107134373A TWI685770B (en) 2018-09-28 2018-09-28 A storage system with chaotic system authentication

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW107134373A TWI685770B (en) 2018-09-28 2018-09-28 A storage system with chaotic system authentication

Publications (2)

Publication Number Publication Date
TWI685770B true TWI685770B (en) 2020-02-21
TW202013236A TW202013236A (en) 2020-04-01

Family

ID=70413363

Family Applications (1)

Application Number Title Priority Date Filing Date
TW107134373A TWI685770B (en) 2018-09-28 2018-09-28 A storage system with chaotic system authentication

Country Status (1)

Country Link
TW (1) TWI685770B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101398764A (en) * 2007-09-25 2009-04-01 智多星电子科技有限公司 Portable usb device that boots a computer as a server with security measure
TW201101084A (en) * 2009-06-19 2011-01-01 Inventec Corp Authentication system and a method of computer therefore
TW201218726A (en) * 2010-10-25 2012-05-01 Hon Hai Prec Ind Co Ltd Data transmission security system and method

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101398764A (en) * 2007-09-25 2009-04-01 智多星电子科技有限公司 Portable usb device that boots a computer as a server with security measure
TW201101084A (en) * 2009-06-19 2011-01-01 Inventec Corp Authentication system and a method of computer therefore
TW201218726A (en) * 2010-10-25 2012-05-01 Hon Hai Prec Ind Co Ltd Data transmission security system and method

Also Published As

Publication number Publication date
TW202013236A (en) 2020-04-01

Similar Documents

Publication Publication Date Title
TWI462558B (en) System and method for storing a password recovery secret
US8683232B2 (en) Secure user/host authentication
US20080082813A1 (en) Portable usb device that boots a computer as a server with security measure
US20080010453A1 (en) Method and apparatus for one time password access to portable credential entry and memory storage devices
KR20100133953A (en) System and method for securing data
KR20080071529A (en) System and method of storage device data encryption and data access via a hardware key
JP2002163152A (en) Safe computer resource access system using fingerprint and method therefor
US20120179915A1 (en) System and method for full disk encryption authentication
US8667281B1 (en) Systems and methods for transferring authentication credentials
EP3516575B1 (en) Technologies for user-mode persistence of certificates and keys in resource-constrained devices
TWI685770B (en) A storage system with chaotic system authentication
Loftus et al. Android 7 file based encryption and the attacks against it
TWM574275U (en) Storage system with chaotic system certification
Shinde et al. Authentication in Mobile Cloud Computing
US20210374227A1 (en) Trusted execution environment (tee)-based password management method and system
US11936645B2 (en) Smart security storage system
Lopes et al. Application H-Secure for mobile security
Pilania et al. ENCRYPTO: A Reliable and Efficient Mobile App for Password Management
KR20230124434A (en) User authenticiation method of electronic device and electronic device performing the same
Narmadha et al. Smart Fingerprint Authentication Using Amazon Web Services
Marchang et al. Multidimensional: User with File Content and Server’s Status Based Authentication for Secure File Operations in Cloud
GB2610160A (en) Smart security storage system
CN112948891A (en) Data uploading and data decrypting method, device, equipment and medium
Arunachalam et al. AUTHENTICATION USING LIGHTWEIGHT CYPTOGRAPHIC TECHNIQUES
JP2002281015A (en) Information rental safe and method for controlling the same, and ciphering/deciphering device and its control program

Legal Events

Date Code Title Description
MM4A Annulment or lapse of patent due to non-payment of fees