期刊文献+

基于Android手机软件认证的U盘锁系统 被引量:2

A U-disk Locking System Using the Android Software Certifi cation based on a Mobile Phone
在线阅读 下载PDF
导出
摘要 为提高U盘使用的安全性,文章设计了一种基于Android手机软件认证的U盘锁系统。介绍了U盘使用过程中存在的安全隐患,讨论了该系统的构成及其工作过程,分析了该系统实现方案。文章还开发了手机控制软件(AC)及加锁U盘控制程序(UK),给出了AC及UK的工作流程图。最后,以一部Android手机作为U盘开锁控制器,以另一部Android手机模拟加锁U盘,进行了系统功能测试。测试结果表明,该系统达到了预期的设计目标,且其保密性好、操作简便、实用性强,为U盘锁系统的实用化打下了良好的基础。 To improve the security of USB memory stick, this paper designs a U-disk locking system using the Android software certification based on a mobile phone. This paper introduces the security breaches existing in the process of using U-disk, discusses the composition and the working process of the system , and analyzes the system implementation. This paper develops a mobile control software (AC) and a control program of the locked U-disk (UK), gives flowcharts of AC and UK. Finally, by using an Android-based mobile phone as a unlock controller and using another Android-based mobile phone as a simulator of the locked U-disk, the system function is tested. The test results show that the design of the system achieves the desired objective with the good security. simplicity and practicability, laying a good foundation for the practical use of the U-disk locking system.
机构地区 重庆通信学院
出处 《信息网络安全》 2014年第3期68-73,共6页 Netinfo Security
基金 国家自然科学基金[61272043]
关键词 U盘 ANDROID手机 蓝牙 RSA算法 U-disk Android mobile phone bluetooth RSA algorithm
  • 相关文献

参考文献15

二级参考文献69

  • 1白小梅,石燕萍.微型机—单片机两级温度控制系统[J].现代电子技术,2006,29(13):115-117. 被引量:6
  • 2WAP Forum Ltd 侯春萍等(译).WAP无线应用协议[M].北京:机械工业出版社,2000..
  • 3Android. A New Android Market for Phones[EB/OL]. http://www. android.com,2010-11-03/2011-07-01.
  • 4Enck W, OngTang M, and McDaniel P. Understanding Android Security[J]. IEEE Security and Privacy, 2009,7(01):50-57.
  • 5Burns J. Developing Secure Mobile Applications for Android[R]. Technical Report, iSEC,2008.
  • 6Davi, L., Dmitrienko, A., Sadeghi, A.R. and Winandy, M.Privilege escalation attacks on android[J]. Information Security. 346-360.
  • 7Shabtai, A., Fledel, Y., Kanonov, U., Elovici, Y. and Dolev, S. Google Android: A state-of-the-art review of security mechanisms[J]. Arxiv preprmt arXiv:0912.5101.
  • 8ENCK, W., ONGTANG, M., AND MCDANIEL, P. 2009b. Understanding Android Security[J]. IEEE Security and Privacy, 7(01):50-57.
  • 9Shabtai, A., Fledel, Y., Kanonov, U., Elovici, Y., Dolev, S. and Glezer, C.Google Android: A comprehensive security assessment[J]. Security & Privacy, IEEE, 8 (02). 35-44.
  • 10Chandhuri, A. Language-based security on Android[C]. Proceedings of the ACM SIGPLAN Fourth Workshop on Progrmnming Languages and Analysis for Security, 2009, 1-7.

共引文献199

同被引文献70

  • 1王锦生.喷墨打印机打印文件检验[J].刑事技术,1998,23(4):21-23. 被引量:10
  • 2马继刚.当前文件检验的热点问题[J].中国司法鉴定,2007(1):47-50. 被引量:4
  • 3吴清海,韩毅,夏鸣.文检技术在行政执法中的应用[M].南京:江苏科学技术出版社,2007.
  • 4Gebhardt J, Goldstein M, Shafait F, et al. Document Authenticationusing Printing Technique Features and Unsupervised AnomalyDetection[C] //12th International Conference on Document Analysis andRecognition, Piscataway, 2013:479-483.
  • 5Lampert C H, Mei L, Breuel T M. Printing Technique Classificationfor Document Counterfeit Detection[C]//International Conference onComputational Intelligence and Security, Guangzhou, 2006: 639 - 644.
  • 6Umadevi M, Agarwal A, Rao R. Printed Text Characterizationfor Identifying Print Technology using Expectation MaximizationAlgorithm[C]//Multi-disciplinary Trends in Artificial Intelligence,Hyderabad, 2011, (7080): 201-212.
  • 7Tchan J. Classifying Digital Prints According to Their ProductionProcess using Image Analysis and Artificial Neural networks[C]//TheInternational Society for Optical Engineering, San Jose, 2000:105-116.
  • 8Tchan J. The Development of an Image Analysis System ThatCan Detect Fraudulent Alterations Made to Printed Images[C]//TheInternational Society for Optical Engineering, San Jose, 2004:151-159.
  • 9Schulze C, Schreyer M,Stahl A, et al. Using DCT Features forPrinting Technique and Copy Detection[J]. Advances in Digital Forensics,2009, (306): 95-106.
  • 10Shang S,Memon N, Kong X. Detecting documents forged byprinting and copying[J]. EUR.ASIP Journal on Advances in SignalProcessing, 2014, 140.

引证文献2

二级引证文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部