Skip to main content

The Design and Implementation of an Encrypted U-Disk Based on NFC

  • Conference paper
Intelligent Computation in Big Data Era (ICYCSEE 2015)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 503))

  • 1981 Accesses

Abstract

With the popularity of USB3.0, consumers favor a mobile storage which is convenient and efficient. But in the same time, people often pay less attention to the Safety of traditional mobile storage, especially the U-disk, the security of which is almost ineffective. Challenged by severe test of current information security situation, designing a safe and reliable way to protect the user’s privacy encryption has gradually attracted both the equipment manufacturers and the user’s attention. As we can see among them, as a quick and secure identification technology, NFC gains a great application in mobile payment and authentication field. It also means a great momentum to popularize. Its unique convenience and safety guarantee in the applications has a wonderful prospect in replacing traditional security solutions. This paper discusses a actualization of a new encrypt U disk which is applied with the NFC technology, to understand the principles of NFC technology and its practical application of encryption, this paper can play a guiding significance.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Wang, Z.: The design of Security U disk management tool’s software based on particular security chip. Dalian University of Technology (2013)

    Google Scholar 

  2. Zeng, K.: The design and realisation of the security U disk based on EZ-USB. University of Electronic Science and Technology of China (2011)

    Google Scholar 

  3. Zhao, Y.: The applied research of smart posters based on NFC technology. Zhengzhou University (2012)

    Google Scholar 

  4. Chen, T.B.: The New Driving Force of NFC Technology. China Center for Information Industry Development, The Asia-Pacific RFID Technology Association (2009), Chinese International RFID and Smart card Technology and Application Summit Forum Proceedings. Chinese Electronic Information Industry Development Research Institute, vol. 31. The Asia-Pacific RFID Technology Association (2009)

    Google Scholar 

  5. Tang, T.: The design and realisation of the Ironkey USB Flash Drive. Journal of Chengdu Electromechanical College 02, 14–16 (2006)

    Google Scholar 

  6. Wang, A.: The key integration technology research of the cryptographic chip system. Shandong University (2011)

    Google Scholar 

  7. Parno, B.: Bootstrapping trust in a”trusted” platform. In: Proceedings of the 3rd Conference on Hot Topics in Security, pp. 1–6. USENIX Association, San Jose (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Zhang, Y., Hou, C., Chen, Y., Huang, Q., Ren, H., Qiu, Z. (2015). The Design and Implementation of an Encrypted U-Disk Based on NFC. In: Wang, H., et al. Intelligent Computation in Big Data Era. ICYCSEE 2015. Communications in Computer and Information Science, vol 503. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-46248-5_52

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-46248-5_52

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-46247-8

  • Online ISBN: 978-3-662-46248-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics