The Community for Technology Leaders
Green Image
Mobile devices are vulnerable to theft and loss due to their small size and the characteristics of their common usage environment. Since they allow users to work while away from their desk, they are most useful in public locations and while traveling. Unfortunately, this is also where they are most at risk. Existing schemes for securing data either do not protect the device after it is stolen or require bothersome reauthentication. Transient Authentication lifts the burden of authentication from the user by use of a wearable token that constantly attests to the user's presence. When the user departs, the token and device lose contact and the device secures itself. We show how to leverage this authentication framework to secure all the memory and storage locations on a device into which secrets may creep. Our evaluation shows this is done without inconveniencing the user, while imposing a minimal performance overhead.
Transient authentication, human factors, cryptographic controls, security, mobile computing, privacy.

A. J. Nicholson, M. D. Corner and B. D. Noble, "Mobile Device Security Using Transient Authentication," in IEEE Transactions on Mobile Computing, vol. 5, no. , pp. 1489-1502, 2006.
81 ms
(Ver 3.3 (11022016))