In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-03-26 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >
Share
Shulou(Shulou.com)06/01 Report--
Introduction to excellent works of Information Security Competition 1
Special statement: all the information in this article comes from the Internet, this article is only for college students to learn information security knowledge, can not be used for other purposes. Reprint of this article must declare the source and quote this statement in order to respect the rights and interests of the authors of the competition.
The award-winning works of the Seventh Information Security Competition held at the Naval University of Engineering in 2014 involved 10 basic categories: system security, monitoring and management, cloud security, integrated applications, pattern recognition, biometrics, content security, mobile applications, network security and data security. There are introductions of these excellent works on www.ciscn.cn.
In order to help you understand the situation, master knowledge, explore innovation and win honor, in the next month, we will select some representative excellent works from previous information security competitions to explain, hoping to be helpful to you. At the same time, everyone is encouraged to draw on collective wisdom and actively explore, so as to form the topic selection direction of their own team. What needs to be noted is that many works contain a large number of professional terms, which are often not encountered for the first time until the undergraduate graduation project or graduate stage, so many students will feel nervous and afraid of difficulties. In fact, there is no need to be nervous and afraid, many terms are unfamiliar to everyone, but the meaning or things behind them are not strange to everyone, or even see them every day. For example, in 2014, there was a first prize-winning work "disk encryption system based on RFID", in which RFID is a term. Students who don't know may be fooled by it, but in fact? RFID means "radio frequency identification". The meal cards and bath cards we use every day are based on RFID products. Now that we have said this, let's take a brief look at the basic situation of the next first prize work, "disk encryption system based on RFID".
Work 1: disk encryption system based on RFID
Creation: Wu Yu (single entry)
The following is a description of the work on the website:
This system is a disk encryption system combined with RFID radio frequency identification technology. The disk adopts a self-defined data format, and the storage mode is encrypted by AES. RFID is used to detect the distance between the legitimate operator and the computer, and the ID number stored on the radio frequency card is used as the relevant key for writing disk data. When the distance between the legitimate user and the computer is greater than the allowable value, the encrypted disk is automatically closed, and the use of the disk by the legitimate user is the same as that of the ordinary disk. However, the encrypted data can be copied from the encrypted disk to other disks through password authentication, so as to ensure the security of the data.
The whole system implements the following encryption links:
1. When the disk is mounted separately to other systems, its contents cannot be seen to ensure that the data will not be leaked.
2. The office in normal use is kept secret. Only when the user carries the corresponding radio frequency identification card, the distance from the computer meets the requirements, and knows the password of the encryption system, can the encryption disk be used normally.
3. When the data is encrypted, the data written to the disk is written to the disk through the encryption algorithm, and the key is generated by the combination of the ID stored in the RF card and the system password.
4. The key management system can manage the key for the radio frequency identification card to ensure the recovery of the forgotten password and avoid the catastrophic consequences caused by forgetting the password.
[basic knowledge]
According to the instructions on the website, let's take a look at some of the basics involved in this work:
1. RFID
Radio FrequencyIdentification (Radio Frequency Identification) is a non-contact automatic identification technology, which automatically identifies the target object through radio frequency signals, and can quickly track items and exchange data. The identification work does not need human intervention and can work in a variety of harsh environments. RFID technology can identify high-speed moving objects and multiple tags at the same time, so the operation is fast and convenient. RFID technology was born during the second World War, it is the successor of traditional bar code technology, also known as "electronic label". The most basic RFID system consists of three parts:
The Tag consists of coupling elements and chips. Each tag has a unique electronic code and is attached to the object to identify the target object.
Reader: a device that reads (and sometimes writes) tag information, which can be designed as handheld or fixed
Antenna (Antenna): transmits radio frequency signals between the tag and the reader.
The working process of RFID: the reader sends a certain frequency radio frequency signal through the transmitting antenna, and the induced current is generated when the radio frequency card enters the working area of the transmitting antenna, and the energy obtained by the radio frequency card is activated; the radio frequency card sends information such as its own coding through the card's built-in transmitting antenna. The system receiving antenna receives the carrier signal sent from the radio frequency card and transmits it to the reader through the antenna regulator, which demodulates and decodes the received signal and then sends it to the background main system for correlation processing; the main system judges the legitimacy of the card according to the logic operation, makes corresponding processing and control according to different settings, and sends out instruction signals to control the action of the executive agency.
Application of RFID: the main working frequency and effective recognition distance of RFID system are: low frequency 125134kHz, recognition distance
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.