Scheduled System Maintenance:
On Monday, April 27th, IEEE Xplore will undergo scheduled maintenance from 1:00 PM - 3:00 PM ET (17:00 - 19:00 UTC). No interruption in service is anticipated.
By Topic

A new high-level security portable system based on USB Key with fingerprint

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Guodong Li ; Sch. of Comput. Sci. & Eng., South China Univ. of Technol., Guangzhou, China ; Hu Chen

Nowadays, information security is always the most important topic. With the help of the USB Key and fingerprint, people have developed kinds of authentication solutions to protect the confidential information against unauthorized access. After some research, we found that the above solutions have two serious problems. One is that the sensitive information is not encrypted; the other one is that the environment is insecure. In this paper, we developed a new high-level security portable system to solve these problems. The system is a combination of hardware and software. On the one hand, based on the USB Key and fingerprint scanner, we integrated a plug-and-play USB2.0 device without driver installation. On the other hand, by rebuilding the syslinux boot loader and customizing the Puppy Linux and doing some special works on the USB flash partition, we have developed and integrated a fingerprint-based authentication security portable custom-built software environment inside the USB device. With the help of the system, the users can work at a movable security environment freely, as well as the high-level protection of confidential information.

Published in:

Computer Design and Applications (ICCDA), 2010 International Conference on  (Volume:1 )

Date of Conference:

25-27 June 2010