Skip to main content

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 236))

  • 1501 Accesses

Abstract

On account of the closed products and other defective products in the current market, this paper puts forward and carries out the Dynamic USBKEY System. This system is based on Multiple Verification Algorithm and is able to verify the validity of users’ identity in a high-strength dynamic channel. Firstly, the security of the entire system is based on the strength of the random key. The overall design and the adopted algorithm are open. Secondly, it can solve the problems within the channel, the verification method and the program’s self-preservation. Thirdly, the system provides a more secure solution under the rapid programming mode. The developers can apply the system on their own programs through the opened cross-language interface. As a result, the development cycle can be shortened and the security strength of their program can be improved.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Li, M., Shen, T.: Design of a USB software dog. Chin. J. Electron Devices 29(1), 205–208 (2006)

    Google Scholar 

  2. Xu, M., Zhuge, Z.: Reliability analysis and design of a USB softdog. Chin. Mech. Electr. Eng. Mag. 24(7), 47–49 (2007)

    Google Scholar 

  3. Schneier, B.: Applied cryptography-protocols, algorithms, and source code in C, 2nd edn. China Machine Press, Beijing (2004)

    Google Scholar 

  4. Duan, G.: Encryption and decryption, 3rd edn. Chinese Publishing House of Electronic Industry, Beijing (2008)

    Google Scholar 

  5. Richter, J.: Programming application for Microsoft Windows, 4th edn. Microsoft Press, Washington (2000)

    Google Scholar 

Download references

Acknowledgments

This work is supported by National Training Programs of Innovation and Entrepreneurship for Students No. 201210059060. We wish to thank Prof. Guo Li for his valuable instructions on earlier drafts of this paper.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yixiang Yao .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer Science+Business Media New York

About this paper

Cite this paper

Yao, Y., Gao, J., Gong, Y. (2013). Dynamic USBKEY System on Multiple Verification Algorithm. In: Wong, W.E., Ma, T. (eds) Emerging Technologies for Information Systems, Computing, and Management. Lecture Notes in Electrical Engineering, vol 236. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-7010-6_34

Download citation

  • DOI: https://doi.org/10.1007/978-1-4614-7010-6_34

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-1-4614-7009-0

  • Online ISBN: 978-1-4614-7010-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics