Research Article

A Study on a Secure USB Mechanism That Prevents the Exposure of Authentication Information for Smart Human Care Services

Table 6

Terms.

TermDescription

Status informationUUser
IDID (identifier)
ID’ID rereceived by a user for disk decryption
PWPassword
PW’PW rereceived by a user for disk decryption
DIFDisk image file
ENDIFEncrypted disk image file
DEDIFDecrypted DIF

Operating statusFFormat
RURRequest user registration
RAIRequest authentication information
TAITransfer authentication information
IUIdentify user
RGDIFRequest generation of DIF
TDITransfer disk information
GDIFGenerate DIF
IIDInsert ID in an empty space in the file system header
AUAuthenticate user
FRFinish registration
MDMount disk
SDIFSelect DIF

Encryption/decryptionh()Hash operation
Hh(PW), result of hash operation based on PW
H’h(PW’), result of hash operation based on PW’
C = EK(P)Result C of encryption of the plain text P based on the key K
P = DK(C)Result P of decryption of the cyphered data C based on the key K
EDIFEncrypt DIF
RDDIFRequest decryption of DIF
RDFSHRequest decryption of file system header
DFSHDecrypt file system header
DDIFDecrypt DIF

EntityUserUser authentication
Management programManagement program
USB flash driveUSB flash drive