Research Article
A Study on a Secure USB Mechanism That Prevents the Exposure of Authentication Information for Smart Human Care Services
Table 3
Classification of software type.
| Classification | Method | Description |
| Disk utilization method | Whole disk | Data protection by encrypting/decrypting whole disk | Image file | Data protection by encrypting/decrypting the image file to be used as a disk | Container | Data protection using container file | Reserved domain | Use of reserved area as the secured domain |
| Access control method | User authentication | Access control through user authentication | Device authentication | Access control through device authentication |
|
|