Improving Security of Handheld IT Devices

Aug 29, 2005

Handheld devices such as personal digital assistants are becoming indispensable tools for today’s highly mobile workforce. Small and relatively inexpensive, these devices can be used for many functions, including sending and receiving e-mail, storing documents, delivering presentations and remotely accessing data.

While their small size can be an advantage, it also can be a disadvantage since handheld devices can be easier to misplace or to steal than a desktop or notebook computer. If they do fall into the wrong hands, gaining access to the information they store can be relatively easy. The National Institute of Standards and Technology (NIST) has recently issued two reports aimed at making it harder for unauthorized users to access information from these devices.

Proximity Beacons and Mobile Device Authentication (NISTIR 7200) describes how two different kinds of location-based authentication mechanisms that use signals from wireless beacons can be used to authenticate handheld device users. If the user is in an unauthorized location or a location outside a defined boundary, access will be denied or an additional authentication mechanism must be satisfied before gaining access.

While many organizations use smart cards for security, they require a card reader that can be nearly as large as the handheld device. Smart Cards and Mobile Device Authentication (NISTIR 7206) describes two types of smart cards that use standard interfaces supported by handheld devices, avoiding the use of more cumbersome, standard-size smart card readers.

Both reports describe these innovative authentication mechanisms and provide details on their design and implementation. The reports are available at csrc.nist.gov/publications/nistir/index.html.

Source: NIST

Explore further: Review: Moto 360 smartwatch is no perfect circle

add to favorites email to friend print save as pdf

Related Stories

Wake-up call: Draft security pub looks at cell phones, PDAs

Jul 10, 2008

In recent years cell phones and PDAs—"Personal Digital Assistants"—have exploded in power, performance and features. They now often boast expanded memory, cameras, Global Positioning System receivers and the ability to ...

Recommended for you

New ZEBRA bracelet strengthens computer security

1 hour ago

In a big step for securing critical information systems, such as medical records in clinical settings, Dartmouth College researchers have created a new approach to computer security that authenticates users ...

New RFID technology helps robots find household objects

1 hour ago

Mobile robots could be much more useful in homes, if they could locate people, places and objects. Today's robots usually see the world with cameras and lasers, which have difficulty reliably recognizing ...

User comments : 0