We have designed a tiered security system for mobile devices where each security tier holds user-defined security triggers and actions. It has a friendly interface that allows users to easily define and configure the different circumstances and actions they need according to context. The system can be set up and activated from any browser or directly on the mobile device itself. When the security system is operated from a Web site or server, its configuration can be readily shared across multiple devices. When operated directly from the mobile device, no server is needed for activation. Many different types of security circumstances and actions can be set up and employed from its tiers. Security circumstances can range from temporary misplacement of a mobile device at home to malicious theft in a hostile region. Security actions can range from ringing a simple alarm to automatically erasing, overwriting, and re-erasing drives.
[1]
Hal Berghel.
Faith-based security
,
2008,
CACM.
[2]
Kang G. Shin,et al.
Proactive security for mobile messaging networks
,
2006,
WiSe '06.
[3]
Benjamin Halpert.
Mobile device security
,
2004,
InfoSecCD '04.
[4]
A. Tversky,et al.
The framing of decisions and the psychology of choice.
,
1981,
Science.
[5]
Benjamin J. Halpert.
Authentication interface evaluation and design for mobile devices
,
2005,
InfoSecCD '05.
[6]
Shihong Lao,et al.
Security Management for Mobile Devices by Face Recognition
,
2006,
7th International Conference on Mobile Data Management (MDM'06).