The anatomy of a context-aware application
MobiCom '99 Proceedings of the 5th annual ACM/IEEE international conference on Mobile computing and networking
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Zero-interaction authentication
Proceedings of the 8th annual international conference on Mobile computing and networking
A Flexible, Privacy-Preserving Authentication Framework for Ubiquitous Computing Environments
ICDCSW '02 Proceedings of the 22nd International Conference on Distributed Computing Systems
Hi-index | 0.00 |
This paper proposes "Zero-stop Authentication" model and system, which realizes automatic, real-time authentication in the physical world. Applications in the physical environment such as those at library gates and supermarket counters could benefit from automatic authentication of users. These applications need to detect users using embedded sensors, and authenticate them, and bind objects to them, in real-time. To accomplish such real-time user authentication, model of user mobility, and methods to bind objects to users are required. This paper models and formulates the user mobility and time constraints, and proposes three techniques to correctly bind objects to users. A Zero-stop Authentication System built based on this model is also proposed, which automatically detects and authenticates users, and relates objects to them. The feasibility of real-time authentication is estimated using the model, and error is issued if the check fails. We also describe prototype implementation of the system, and two applications. Secure Library System uses ZSAS to authenticate users at library exits, and bind books to users. Secure Printing uses ZSAS to detect users approaching a printer, and to authenticates them, in order to print documents only when their owner approaches the printer. It protects private documents from being overlooked or removed.