Featured Research

from universities, journals, and other organizations

Portable Security: Michigan Engineering Designs Laptop Security System

Date:
August 19, 2002
Source:
University Of Michigan College Of Engineering
Summary:
Engineers at the University of Michigan have developed a security framework for mobile computing devices that will automatically encrypt sensitive information when owners stray too far from their machines, or vice-versa. Called ZIA, or Zero-Interaction Authentication, the system could help protect sensitive documents from falling into the wrong hands.

ANN ARBOR, Mich. -- Thanks to laptop computers and other mobile devices, many of us now work extensively on the run -- crunching numbers while we wait for a flight, assembling last minute presentations from our hotel rooms, or firing off pool-side emails when we should be on vacation. But what happens to our confidential documents when our laptops take a trip without us?

Engineers at the University of Michigan have developed a security framework for mobile computing devices that will automatically encrypt sensitive information when owners stray too far from their machines, or vice-versa. Called ZIA, or Zero-Interaction Authentication, the system could help protect sensitive documents from falling into the wrong hands.

Missing laptops are a particular concern for government agencies that deal regularly with national security documents. Last week, two laptops disappeared from MacDill Air Force Base in Tampa, Fla., a key command post for U.S. operations in Afghanistan. Although the laptops were later recovered, it is still unknown what information might have been compromised. Also, in a separate story, five agencies under Justice Department jurisdiction, including the FBI and DEA, reported 400 laptops of unknown security classification as missing. In 2000, a laptop holding thousands of pages of classified documents was taken from a conference room in the State Department's headquarters.

Protections schemes like ZIA could help keep national security documents secret by automatically scrambling sensitive information found on these laptops as soon as they are separated from their owners.

While data encryption is a common method of protecting information, most current protection systems require users to actively take part in the encrypting and decrypting process. Usually, users must identify themselves to their computer at regular intervals and then actively tell it when to decrypt or encrypt documents. People who find this process overly burdensome often ignore or disable these security measures intended to protect their data. Other times, unexpected events pull users away from their laptops without securing them.

ZIA overcomes these problems by reducing the amount of participation needed from the user. ZIA automatically manages the identification and authentication process with the laptop via an "authentication token" worn by the user. The token, which could take the form of a wristwatch, continuously communicates with the laptop via a wireless link. As long as the token is present, the computer functions normally. But if the user and token wander away from the machine, the laptop automatically encrypts all of its data.

According to the system's creator, Brian Noble, the system will be virtually unnoticeable to the user.

"When a user walks away from his laptop to get a cup of coffee, it will sense that he is leaving and begin securing the computer," said Noble, an assistant professor of electrical engineering and computer science at the University of Michigan. "As he returns, as soon as the user comes within radio range, the computer will begin unlocking the computer so that it is ready to resume work when the user sits down."

The wearable nature of the authentication token also helps keep the system unobtrusive to the user and more secure. According to Noble, ZIA could use a Linux wristwatch already designed by IBM to act as the token. Such a wristwatch would be less vulnerable to loss or theft than a device that is carried and often set down.

Noble's research was funded in part by Intel Corp., Novell Inc., the NSF, DARPA and the U.S. Air Force. It will be presented at the Association of Computing Machinery MobiCom 2002 conference in Atlanta, September 23-26.

A PDF describing this research can be found at: http://www.acm.org/sigmobile/mobicom/2002/papers/p002-corner.pdf

About the University of Michigan College of Engineering

The University of Michigan College of Engineering is consistently ranked among the top engineering schools in the world. The College is composed of 11 academic departments: aerospace engineering; atmospheric, oceanic and space sciences; biomedical engineering; chemical engineering; civil and environmental engineering; electrical engineering and computer science; industrial and operations engineering; materials science and engineering; mechanical engineering; naval architecture and marine engineering; and nuclear engineering and radiological sciences. Each year the college enrolls over 6,000 undergraduate and graduate students and grants about 1,000 undergraduate degrees and 600 masters and doctoral degrees. To learn more, please visit our web site at http://www.engin.umich.edu.


Story Source:

The above story is based on materials provided by University Of Michigan College Of Engineering. Note: Materials may be edited for content and length.


Cite This Page:

University Of Michigan College Of Engineering. "Portable Security: Michigan Engineering Designs Laptop Security System." ScienceDaily. ScienceDaily, 19 August 2002. <www.sciencedaily.com/releases/2002/08/020819070155.htm>.
University Of Michigan College Of Engineering. (2002, August 19). Portable Security: Michigan Engineering Designs Laptop Security System. ScienceDaily. Retrieved September 22, 2014 from www.sciencedaily.com/releases/2002/08/020819070155.htm
University Of Michigan College Of Engineering. "Portable Security: Michigan Engineering Designs Laptop Security System." ScienceDaily. www.sciencedaily.com/releases/2002/08/020819070155.htm (accessed September 22, 2014).

Share This



More Computers & Math News

Monday, September 22, 2014

Featured Research

from universities, journals, and other organizations


Featured Videos

from AP, Reuters, AFP, and other news services

Company Copies Keys From Photos

Company Copies Keys From Photos

Newsy (Sep. 22, 2014) A new company allows customers to make copies of keys by simply uploading a couple of photos. But could it also be great for thieves? Video provided by Newsy
Powered by NewsLook.com
Cat Lovers Flock to Los Angeles

Cat Lovers Flock to Los Angeles

AFP (Sep. 22, 2014) The best funny internet cat videos are honoured at LA's Feline Film Festival. Duration: 00:56 Video provided by AFP
Powered by NewsLook.com
Raw: SpaceX Rocket Carries 3-D Printer to Space

Raw: SpaceX Rocket Carries 3-D Printer to Space

AP (Sep. 22, 2014) A SpaceX Rocket launched from Cape Canaveral, carrying a custom-built 3-D printer into space. NASA envisions astronauts one day using the printer to make their own spare parts. (Sept. 22) Video provided by AP
Powered by NewsLook.com
What This MIT Sensor Could Mean For The Future Of Robotics

What This MIT Sensor Could Mean For The Future Of Robotics

Newsy (Sep. 20, 2014) MIT researchers developed a light-based sensor that gives robots 100 times the sensitivity of a human finger, allowing for "unprecedented dexterity." Video provided by Newsy
Powered by NewsLook.com

Search ScienceDaily

Number of stories in archives: 140,361

Find with keyword(s):
Enter a keyword or phrase to search ScienceDaily for related topics and research stories.

Save/Print:
Share:

Breaking News:

Strange & Offbeat Stories


Space & Time

Matter & Energy

Computers & Math

In Other News

... from NewsDaily.com

Science News

Health News

Environment News

Technology News



Save/Print:
Share:

Free Subscriptions


Get the latest science news with ScienceDaily's free email newsletters, updated daily and weekly. Or view hourly updated newsfeeds in your RSS reader:

Get Social & Mobile


Keep up to date with the latest news from ScienceDaily via social networks and mobile apps:

Have Feedback?


Tell us what you think of ScienceDaily -- we welcome both positive and negative comments. Have any problems using the site? Questions?
Mobile: iPhone Android Web
Follow: Facebook Twitter Google+
Subscribe: RSS Feeds Email Newsletters
Latest Headlines Health & Medicine Mind & Brain Space & Time Matter & Energy Computers & Math Plants & Animals Earth & Climate Fossils & Ruins