期刊文献+

基于蓝牙的密码资源注入方案设计与实现

Design and implementation of cipher resource injection scheme based on bluetooth
下载PDF
导出
摘要 为满足密码设备的密码资源批量注入需求,提高注入过程的方便性,在研究现用密码资源注入模型及目前蓝牙安全增强方案的基础上,提出了基于蓝牙的密码资源注入模型。针对敏感数据传递过程中可能存在安全威胁的关键环节,结合密码资源注入的应用特点,分别设计了资源存储方案和蓝牙安全传输方案。通过在嵌入式实验平台上运行原型系统实例,验证了该方案的有效性。实验结果表明,该方案能够在较短时间内完成资源注入操作,为实现密码资源注入提供了一种崭新的方式。 To meet the needs of batch injection and make the injection procedure more convenient,a model of cipher resource injection based on bluetooth is proposed based on research the cipher resource injection model and the bluetooth security enhancements.Aiming at the possible data security problems during the sensitive data transmission,a resource storage scheme and a Bluetooth security transmission scheme are designed with the characteristic of cipher resource injection taken into account.An application case of prototype system validate the effectiveness of the scheme.The experimental results indicate that the scheme make the cipher resource injected successfully and provide a new method for the cipher resource injection.
出处 《计算机工程与设计》 CSCD 北大核心 2010年第23期4963-4967,共5页 Computer Engineering and Design
关键词 密码资源注入 关键安全参数 蓝牙 安全存储 安全传输 cipher resource injection critical security parameters bluetooth security storage security transmission
  • 相关文献

参考文献3

二级参考文献15

  • 1[1]SECURITY REQUIREMENTS FOR CRYPTOGRAPHIC MODULES.COMPUTER SECURITY.2002.12
  • 2[2]SL811HS Embedded USB Host/Slave Controller Revised March 14.2002.
  • 3金纯.蓝牙技术[M].北京:电子工业出版社,2003.65-90.
  • 4GARETH BARLOW. Bluetooth security [ A ]. Network and Internetwork Security[C]. London,2000.
  • 5MASSEY J L. SAFER + cylink corporation' s submission for the advanced encryption standard[A]. Proc. First Advanced Encryption Standard Candidate Conference [ C ]. London, 2000.
  • 6马健仓,罗亚军,赵玉亭.蓝牙核心技术及应用[M].北京:科学出版社,2002.
  • 7Bluetooth SIG.Specification of the Bluetooth system:Core package version 2.0+EDR[S].2004.
  • 8Bluetooth SIG.Bluetooth security architecture[S]. 1999.
  • 9Nikhil Anand.An overview ofbluetooth security[R].SANS Institute,2001.
  • 10Sil Janssens. Preliminary study: Bluetooth security [R]. VUB, 2004.

共引文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部