Published: March 31, 2009
Author(s)
Wayne Jansen, Vlad Korolev
Conference
Name: 2009 WRI World Congress on Computer Science and Information Engineering
Dates: March 31 - April 2, 2009
Location: Los Angeles, California, United States
Citation: Proceedings of the 2009 WRI World Congress on Computer Science and Information Engineering, vol. 1, pp. 99-104
Announcement
While mobile handheld devices, such as cell phones and PDAs, provide productivity benefits, they also pose new risks. A vital safeguard against unauthorized access to a device s contents is authentication. This paper describes a location-based authentication mechanism that employs trusted servers called policy beacons, which are used to provide location data and control device behavior. Mobile devices determine their proximity to available policy beacons and upon validation assume the designated organizational policy. The mechanism is designed to take advantage of Bluetooth functionality built into many current handheld devices used in organizational settings.
While mobile handheld devices, such as cell phones and PDAs, provide productivity benefits, they also pose new risks. A vital safeguard against unauthorized access to a device s contents is authentication. This paper describes a location-based authentication mechanism that employs trusted servers...
See full abstract
While mobile handheld devices, such as cell phones and PDAs, provide productivity benefits, they also pose new risks. A vital safeguard against unauthorized access to a device s contents is authentication. This paper describes a location-based authentication mechanism that employs trusted servers called policy beacons, which are used to provide location data and control device behavior. Mobile devices determine their proximity to available policy beacons and upon validation assume the designated organizational policy. The mechanism is designed to take advantage of Bluetooth functionality built into many current handheld devices used in organizational settings.
Hide full abstract
Keywords
authentication; mobile devices; proximity beacons
Control Families
None selected