Research Article
A Study on a Secure USB Mechanism That Prevents the Exposure of Authentication Information for Smart Human Care Services
| Term | Description |
| Status information | U | User | ID | ID (identifier) | ID’ | ID rereceived by a user for disk decryption | PW | Password | PW’ | PW rereceived by a user for disk decryption | DIF | Disk image file | ENDIF | Encrypted disk image file | DEDIF | Decrypted DIF |
| Operating status | F | Format | RUR | Request user registration | RAI | Request authentication information | TAI | Transfer authentication information | IU | Identify user | RGDIF | Request generation of DIF | TDI | Transfer disk information | GDIF | Generate DIF | IID | Insert ID in an empty space in the file system header | AU | Authenticate user | FR | Finish registration | MD | Mount disk | SDIF | Select DIF |
| Encryption/decryption | h() | Hash operation | H | h(PW), result of hash operation based on PW | H’ | h(PW’), result of hash operation based on PW’ | C = EK(P) | Result C of encryption of the plain text P based on the key K | P = DK(C) | Result P of decryption of the cyphered data C based on the key K | EDIF | Encrypt DIF | RDDIF | Request decryption of DIF | RDFSH | Request decryption of file system header | DFSH | Decrypt file system header | DDIF | Decrypt DIF |
| Entity | User | User authentication | Management program | Management program | USB flash drive | USB flash drive |
|
|