CFP last date
20 June 2024
Reseach Article

USB based Dynamic Authentication Alert System for Computers

by Chandra J., Shreya Nag
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 107 - Number 6
Year of Publication: 2014
Authors: Chandra J., Shreya Nag

Chandra J., Shreya Nag . USB based Dynamic Authentication Alert System for Computers. International Journal of Computer Applications. 107, 6 ( December 2014), 17-20. DOI=10.5120/18755-0014

@article{ 10.5120/18755-0014,
author = { Chandra J., Shreya Nag },
title = { USB based Dynamic Authentication Alert System for Computers },
journal = { International Journal of Computer Applications },
issue_date = { December 2014 },
volume = { 107 },
number = { 6 },
month = { December },
year = { 2014 },
issn = { 0975-8887 },
pages = { 17-20 },
numpages = {9},
url = { },
doi = { 10.5120/18755-0014 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
%0 Journal Article
%1 2024-02-06T22:40:21.397543+05:30
%A Chandra J.
%A Shreya Nag
%T USB based Dynamic Authentication Alert System for Computers
%J International Journal of Computer Applications
%@ 0975-8887
%V 107
%N 6
%P 17-20
%D 2014
%I Foundation of Computer Science (FCS), NY, USA

In the present work, an innovative mechanism to convert a USB drive into a key has been introduced. A unique key file is written on to the drive which acts as the authentication mechanism to access the user's computer. This device can be used to lock or unlock the system by simply removing or attaching it. The current session is not hampered even though the system is secure and cannot be accessed without the specific USB drive. To further improve security, the key file contents are rewritten after a set time interval, to preserve the security even if the drive is lost. In absence of the USB drive, the user can gain access by entering the master password. A particular system might have more than one USB keys as well, and a key can be used to access multiple systems. This mechanism was then coded into a deliverable software which implemented all the security features including possible intrusion detections and alerts. The advantage of this mechanism is that it is a faster and efficient way to temporarily pause the current session of a system without having to log out. It is most suitable for workplace workstations as well as for desktops, personal computers and laptops. There is, however, scope to improve the current method add incorporate more features.

  1. Zhihui Liu, Gu, L. , Yixian Yang and Guoqiang Xing "An identity authentication scheme based on USB Key for Trusted Network Connect", Information Theory and Information Security (ICITIS), pp. 203 – 207, 2010
  2. Yu Jin-wei "The program design for the network security authentication based on the USB Key technology", Electronic and Mechanical Engineering and Information Technology (EMEIT), 2011 International Conference on, On Vol. 5, page(s): 2215 – 2218
  3. Tao Yizheng, Tang Dingyong, Gaoshan, Shenhao "Design and Implementation of USB Key-Based JavaEE Dual-Factor Authentication System", Information Management, Innovation Management and Industrial Engineering, 2009 International Conference on, On Vol. 4, page(s): 443 – 446
  4. Jiang Yu, Chuan-fu Zhang "Design and Analysis of a USB-Key Based Strong Password Authentication Scheme", Computational Intelligence and Software Engineering (CiSE), 2010 International Conference on, On page(s): 1 - 4
  5. Zhu Juan-hua, Wu Ang, Guo Kai "PC lock software design based on removable storage device and dynamic password", Computer Engineering and Technology (ICCET), 2010 2nd International Conference on, On Vol. 3, page(s): V3-326 - V3-329
  6. Leslie Lamport. Password Authentication with Insecure Communication [J]. Communications of the ACM, 1981, 24(11): 770-772
  7. A. Shimizu, "A dynamic password authentication method by one-way function," IEICE Transactions on Fundamentals 1990. On Vol. J73-D-I, No. 7, page(s): 630 – 636
  8. Shreya Nag, Dr. Meenakumari J, Sayantan Chakraborty "Design and Analysis of EyeSeeYou: Computer Surveillance Software", International Journal of Research in Information Technology, On Vol. 1, Issue 6, page(s): 52 - 59
  9. QIN Zhi-guang, "Cryptography algorithm-survey and trends", Journal of Computer Application, On Vol. 24, No. 2, page(s): 1 - 4
  10. Dino Esposito, Microsoft® . NET: Architecting Applications for the Enterprise (Pro-Developer), Microsoft Press, 2008.
  11. Alex Mackey. Introducing . NET 4. 0: with Visual Studio 2010, Apress, 2010.
Index Terms

Computer Science
Information Sciences


Windows Security USB Bases Authentication Lock MD5 Hash Intrusion Detection Personal Computer User Verification.