期刊文献+

USB身份锁的强化识别 被引量:1

Enhanced Recognition of USB Token
下载PDF
导出
摘要 USB设备通过主机的识别之后,与主机之间建立起一条USB传输信道,这是设备实现功能的基础。USB身份锁是网络身份认证系统中常用的信息载体,相比较常规USB设备,身份锁具有更高的安全性要求。文章给出一个基于厂商认证协议的身份锁强化识别方案,在实现USB设备标准配置的基础上,通过增加设备和驱动之间的可信身份认证,加强设备的识别处理。 USB device functions only when a communication channel is set up between the USB device and its host after the completion of host-device recognition. A USB device can be used as a USB identity token. When it is used as an identity token in an network identity authentication system, a USB token requires more security than normal USB device. An improved USB token recognition scheme is proposed using a manufacturer authentication protocol. It upgrades the security level of the token identification by adding authentication procedures to the normal USB device recognition.
作者 钱敏 陈相宁
出处 《计算机工程》 CAS CSCD 北大核心 2007年第5期138-139,142,共3页 Computer Engineering
基金 南京市软件发展基金资助项目(2004软资116号) 南京房产局基金资助项目
关键词 USB身份锁 识别 厂商认证协议 USB token Recognition Manufacturer's authentication protocol
  • 相关文献

参考文献7

二级参考文献12

  • 1Simpson W. The Point-to-Point Protocol (PPP) [S]. STD 51, RFC1661, July 1994.
  • 2Lloyd B, Simpson W. PPP Authentication Protocols[S]. RFC 1334,October 1992.
  • 3Simpson W . PPP Challenge Handshake Authentication Protocol(CHAP) [S]. RFC 1994, October 1992.
  • 4Rivest R, Dusse S. The MD5 Message-Digest Algorithm[S]. MIT laboratory for Computer Science, RSA Data Security, Inc., RFC1321, April 1992.
  • 5Morris R, Thompson K. Password security : A case history [ J ] .Communication of the ACM, 1979, 22( 11 ) : 594 - 597.
  • 6Jain A, Hong L, Pankanti S, et al. An identity authentication system using fingerprints[ J]. Proceedings of the IEEE, 1997, 85(9) :1365 - 1388.
  • 7Simpson W. PPP Challenge Handshake Authentication Protocol (CHAP)[S]. RFC1994, 1992-10.
  • 8Hwang J J, Yeh T C. Improvement on Peyravian-Zunic's Password Authentication Schemes[J]. IEICE Transactions on Communications,2002, E85-B(4):823-825.
  • 9Lin Chunli,Hwang T. A Password Authentication Scheme with Secure Password Updating[J]. Computers & Security, 2003, 22(1): 68.
  • 10Diffie W, Hellman M E. New Directions in Cryptography [J]. IEEE Transactions on Information Theory, 1976, IT22(6): 644-654.

共引文献23

同被引文献9

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部