Mechanisms for Placing Physical Boundaries on Information Access/Storage and Computation of Mobile Devices (Ghost Box)
This research provides the algorithms, mechanisms, and architectures for placing physical boundaries on where commodity mobile devices can access/store information. The research includes algorithms/mechanisms for proximity authentication to prove that a device is in a specific location. Moreover, the work includes secure information jailing mechanisms on commodity mobile devices for ensuring that information does not flow outside of specific physical boundaries. By providing physical boundaries on where information can be accessed, organizations can rely more heavily on their significant existing physical security expertise. Hospitals can limit patient record access to specific rooms. Educational institutions can give electronic tests on tablets that can only be accessed from the testing location. National leadership can access information using smartphones within secure areas and be ensured that remnants of the information are not leaked if a smartphone is lost or stolen. By placing physical bounds on information access, mobile cyber-physical security techniques will enable both users and organizations to control their information through mechanisms, such as locked doors, that they already understand.
Bookmark this page
Download as PDF
For Information, Contact:
Senior Licensing Associate
Virginia Tech Intellectual Properties, Inc.
© 2017. All Rights Reserved. Powered by