Authentication method based on private space of the usb flash memory media
First Claim
1. An authentication method based on private bytes of USB flash memory media, comprising:
- step 10, reading authentication information from the private bytes of the USB flash memory media by an authentication unit;
step 20, authenticating, by the authentication unit, the authentication information input by a user by using the authentication information read from the private bytes of the USB flash memory media;
step 30, determining whether the authentication is successful or not, if it is successful, opening an operation authorization based on the authentication information, otherwise, executing a process for failed authentication.
1 Assignment
0 Petitions
Accused Products
Abstract
The present invention discloses an authentication method based on private bytes of USB flash memory media, and implements a unit for executing authentication by using private bytes of USB flash memory media which is often used. A control chip of the USB flash memory disk receives a read/write instruction sent from the authentication unit, determines whether a read/write operation is executed to the private bytes. If it is, the read/write operation to the private bytes is executed. Otherwise, the read/write operation to normal bytes is executed. Thus, a variety of authentication information can be stored in the private bytes of the USB flash memory disk, which are invisible to users and can not be copied and deleted. The normal data can be stored in the normal bytes of the USB flash memory disk so that an encryption and authentication mechanism can be achieved with security and convenience.
36 Citations
11 Claims
-
1. An authentication method based on private bytes of USB flash memory media, comprising:
-
step 10, reading authentication information from the private bytes of the USB flash memory media by an authentication unit;
step 20, authenticating, by the authentication unit, the authentication information input by a user by using the authentication information read from the private bytes of the USB flash memory media;
step 30, determining whether the authentication is successful or not, if it is successful, opening an operation authorization based on the authentication information, otherwise, executing a process for failed authentication. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
Specification