Browse Prior Art Database

Method and System for improved content security using near field devices

IP.com Disclosure Number: IPCOM000240415D
Publication Date: 2015-Jan-29
Document File: 3 page(s) / 68K

Publishing Venue

The IP.com Prior Art Database

Abstract

To enable next level of security architecture based on near field devices and their communication mechanism.

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 51% of the total text.

Page 01 of 3

Method and System for improved content security using near field devices

There are multiple ways of security identifications that happens as of today in IT (computers) and mobile devices. These authentication mechanisms basically depend on data that is available near us, like - what we have, what we know and what we see. These mechanisms resolve most of the authentications that are required in information technologies as of today. However, there are certain areas in mobile and other device that are still unaddressed.

Precisely, the existing security mechanism available does solve most of the basic identification related problems. However, the current disclosure is about a mechanism that can provide next level of security for devices based on near area device discovery.


 One of the core problems the disclosure solves is providing very high level security for data that are residing on a device that is lost / stolen.


 Currently there is no security policy that can be established for the device ( or a group of devices ) that an individual owns and uses it on a daily basis.

There are multiple ways to perform security identifications as of today. However, the process still have some alternatives that result in security / identification is compromised.

Here are some examples:

1. Normally most of the mobile phones have applications / software that have mechanisms to store the password.

2. Most of the computer browsers ( and other local applications ) have an option to save a mechanism to save password. Hence, if a user goes to the site, his userid and password is fed into the required fields automatically

3. Many of the applications ( in mobile or computers ) allows end-user to be online continuously. In other words the sessions once started never time's out.

The above mentioned examples prove to be more dangerous if the mobile - systems are stolen or the control is taken by un-authorized users.

This will enable next level of security architecture based on near field devices and their communication mechanism.

This is about being able to use the near field devices to provide additional level of security during critical data or application access. The details process is explained below.

1. A standard / provision is built in any application / device (computer, mobile or any device that is reachable through a protocol) that provides additional level of security based on near field devices.

2. The user opts to use a high level security option that is supported by a system ( or an application ) for a particular device ( for ex:...