期刊文献+

基于RFID技术的计算机身份认证系统设计 被引量:5

Research of Computer Identification System Based on RFID Technology
下载PDF
导出
摘要 随着信息时代的发展,计算机得到了广泛应用,计算机中的信息安全成为一个极为重要的问题;针对计算机的性息泄漏问题,设计了基于RFID技术的计算机身份认证系统;系统由USB-Lock和无线Key两个硬件设备和软件组成,当无线Key处在USB-Lock的感应区域时,双方保持通信,计算机处于可用状态;当无线Key超出USB-Lock的感应区域时,双方通信中断,计算机进入不可用状态,当用户回到计算机附近时,双方通信得到恢复实现计算机信息保护。 As the information age develops, the computer has come into widespread use and the safety of information in the computers has become an extre important problem. Focusing on the problem of information disclosure, the computer identification system based on the RFID technology is designed. The system is composed of two hardware devices which named USB--Lock and wireless Key. When the wire- less Key locates in the USB--Lock' s effective range, the two sides can be able to maintain wireless link, the computer is in the operating status at this time. When the wireless Key is outside the USB--Lock' s effective range, the communication fails and the computer is out of the operating status. When the user returns into the effective range with the wireless Key, the communication between them will be estab- lished again so that the system can protect the information in the computers.
作者 胡景
出处 《计算机测量与控制》 北大核心 2014年第10期3415-3418,共4页 Computer Measurement &Control
关键词 射频识别 计算机身份认证 无线通信 RFID computer identification wireless communication
  • 相关文献

参考文献5

二级参考文献25

共引文献28

同被引文献52

  • 1米锐,Roy(图).电子标签技术在机务维修工具管理中的应用[J].技术与管理论坛,2007(2):43-46. 被引量:1
  • 2李雄.多种环境下身份认证协议的研究与设计[D].北京:北京邮电大学,2012.
  • 3杜丰.韩博.杨洁,等.基于SQLServerMobile与RFID的身份认证设计与实现[J].实验技术与管理,2011,28(5):260-261.
  • 4Panda A K, Rajput P, Shukla B. Design of Multi Bit LFSR PNRG and Performance comparison on FPGAusing VHDL[J]. International Journal of Advances in Engineering & Technology (IJAET), 2012, 3(1): 566-57 I.
  • 5Liao Y P, Hsiao C M. A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol [J]. Ad Hoc Networks, 2014, 18: 133-146.
  • 6Piramuthu S. RFID mutual authentication protocols I-!]. Decision Support Systems, 2011, 50(2): 387-393.
  • 7Yu Y C, Hou T W, Chiang T C. Low cost RI:ID real lightweight binding proof protocol for medication errors and patient safety[J]. Journal of medical systems, 2012, 36(2): 823-828.
  • 8Tian Y, Chen G, Li J. A new ultralightweight RFID authentication protocol with permutation [J]. Communications Letters, IEEE, 2012, 16(5): 702-705.
  • 9项巧莲,李超锋,郑双怡.基于RFID技术的固定资产管理系统设计[J].微计算机信息,2008,24(14):207-209. 被引量:35
  • 10郎军成,翁兴伟,肖树臣,李相伟.基于RFID技术的工具设备管理系统研究[J].航空维修与工程,2010(3):57-59. 被引量:11

引证文献5

二级引证文献22

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部