{"title":"Handheld data protection using handheld usage pattern identification","authors":"Wen-Chen Hu, Yanjun Zuo, T. Wiggen, Varun Krishna","doi":"10.1109/EIT.2008.4554302","DOIUrl":null,"url":null,"abstract":"Mobile handheld devices such as smart cellular phones and personal digital assistants (PDAs) are easily lost because of their small sizes and high mobility. Personal data like addresses and telephone numbers stored in the devices are revealed when the devices are lost. This research proposes a novel approach of applying handheld usage pattern identification to handheld data protection. Handheld usage data is collected before applying this method. Usage patterns are discovered and saved by using a finite automaton, which is then used to check device usage. When an unusual usage pattern such as an unlawful user trying to access the handheld data is detected, the device will automatically lock itself down until an action, like entering a password, is taken. Preliminary experimental results show this method is effective and convenient for handheld data protection.","PeriodicalId":215400,"journal":{"name":"2008 IEEE International Conference on Electro/Information Technology","volume":"69 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 IEEE International Conference on Electro/Information Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/EIT.2008.4554302","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Mobile handheld devices such as smart cellular phones and personal digital assistants (PDAs) are easily lost because of their small sizes and high mobility. Personal data like addresses and telephone numbers stored in the devices are revealed when the devices are lost. This research proposes a novel approach of applying handheld usage pattern identification to handheld data protection. Handheld usage data is collected before applying this method. Usage patterns are discovered and saved by using a finite automaton, which is then used to check device usage. When an unusual usage pattern such as an unlawful user trying to access the handheld data is detected, the device will automatically lock itself down until an action, like entering a password, is taken. Preliminary experimental results show this method is effective and convenient for handheld data protection.