1. The cell phone you can't live with, and can't live without!

advertisement
Project Overview
Nader Mehdizadeh
Ognjen Petrovic
A Biometrics Security Research and Proposal
Bio Security
Nader Mehdizadeh
Ognjen Petrovic
1. The cell phone you can’t live with, and can’t live
without!
To store a phone number, one is forced to use the 10-button numeric keypad to simulate a 36
or more button alphanumeric keyboard. Calendaring, To Do lists, and even reminder features
available on most cell phones, out of necessity have given birth to $25 micro keyboard
gadgets to facilitate data entry.
Furthermore, despite availability of a number of incompatible technologies such as SIM
CARDS, information stored on cell phones remains volatile and in most cases impossible to
recover in case of serious damage or loss.
PDAs partially solved the data entry and data safety problems through a companion desktop
application. Although these data management desktop application (e.g. Palm desktop)
accelerated the popularity of PDAs to become highly used PIMs, they came at a price: they
require proximity to the PC where the desktop application and the actual information reside.
Worse yet, even smart phones with PALM OS, ironically require a cradle to the PC where the
desktop application runs! Microsoft Pocket PC based devices are similarly designed.
General trend among users shows that they highly value cell phones and PDAs as long as the
user interface is not too cumbersome. Having your phone book, calendar, and notes on your
cell phone or PDA is useful for business and every day life. The information is secure as long
as you do not lose the device. To secure the information the user protects the device from
theft and other such occurrences.
This personal information is stored in a digital form on the cell phone or PDA. The information
stored often exceeds the value of the device. For example, is the value of your personal data
on your credit card more valuable than the card itself? Or is your PDA more valuable then the
passwords and files you store on it? Even cell phones have phone book information that you
want to keep but you do not want to share with others.
In all the examples above the valuable information is embedded in the device it self. Losing
the device means the information is at least temporarily unavailable. Generally, it is hard to
transact information between devices. These restrictions limit your ability to have the most
use of your valuable information.
Imagine now that you can transact information from your phone or handheld PDA painlessly,
and securely from one device to another. You can keep your settings, calendars, phone books,
and also more sophisticated items like private medical records, and credit card information.
In other words, you are becoming the master of your information.
Two options are available for depositing your information. In the first scenario, data is
located on a remote server accessible via Internet or dial in line. Whenever the user needs
the data, the date comes from the remote server. The second possibility is to have the data
COEN 150
Page 2
Bio Security
Nader Mehdizadeh
Ognjen Petrovic
stored on the device. Whenever the user needs the data, the data will come from the device.
A combination of the two approaches is possible as well.
Technical solutions for both scenarios exist today. Remote servers are available through the
Internet while short-range wireless telecommunication (Bluetooth for example) is getting
cheaper and cheaper. The main problem is how to make transactions and access to cell phone
or PDA (turned now more into a digital wallet) secure since the user is not the only one who
touches the information available through his handheld.
A device that retrieves sensitive information from a remote server causes security problems
non-existent on stand-alone devices. Users are often uncomfortable with the fact that their
information is stored ‘out there’ – somewhere outside of their private storage area. Users
notoriously have a hard time authenticating themselves in the field, outside of their homes
and offices. In both cases the problem is the cumbersome way data is inputted into the
handheld devices .The good news is: authentication problems can be solved using biometrics
[1].
With third generation of wireless services and devices already here, wireless appliances will
be even in greater use, however, the techniques for getting information into them remain as
crude or as distant.
In a survey, of 10000-cell phone users were asked a number of realistic questions in realistic
situations such as:



















Do you ever surf the web on your 1sq/inch cell phone screen except for WAP portals?
How quickly and how easily do you save someone’s phone, first and last names, and a
descriptive comment about that person, on your cell phone today?
Do you use the calendar feature of your cell phone? Why not?
Do you use the Alarm feature of your cell phone? Why not?
If you lost the phone can you prevent people from using it?
Do you use the Reminder feature of your cell phone? Why not?
What if you lost your cell phone today?
What if you broke it, and there was no SIM card in that phone?
How did you save your numbers on your cell phone in the first place?
What’s preventing you to upgrade your cell phone today?
Can you synchronize anything (e.g. cell, PDA, etc.) with your online PC, wirelessly?
Does your PDA have same information as your cell phone?
Is your PDA password protected?
Do your PDA and cell phone have the same information as your home phone?
Do you have the same phone-list, everywhere?
Do you play games on your cell phone? For how long? Why not longer?
How easy is it to send SMS from your cell phone? How about sending Email?
Other than calendar, To Do list, notes, and Phone List, what other features of your
loaded PDA do you use? Image viewing? Mp3? Voice recording? How did you get the
information into your PDA?
How often do you load new applications on your handheld, if at all?
COEN 150
Page 3
Bio Security





















Nader Mehdizadeh
Ognjen Petrovic
Do you know of any publicly traded company that develops software for PDA’s?
How similar is your PDA (e.g. Pocket pc/windows CE) to your laptop?
Is your PDA already out of date, out of style?
Did your PDA cost as much as a PC?
Did you have enough battery life to use your PDA like you use your PC/Laptop?
Do you still use a cradle to synchronize your wireless PDA?
How many cradles do you own? One at home, one office, more?
What makes apple’s iPOD such a success?
Do you surf the web on your PDA?
Does your PDA contain sensitive personal or business information?
Do you want to make all information from the PDA sharable?
How often do you play games on your PDA? How long?
Do you know of a publicly traded PDA game developer?
Will you buy a mobile PDA appliance?
Do you own one of these collapse-able keyboards?
Do you have a disk attachment for your PDA?
Do you use yahoo! Calendar? MSN Calendar? ATTBI Calendar? Why not?
How easy was it to add your schedule to yahoo? MSN?
Do you feel overwhelmed when you go to one of these Internet service sites?
Do you trust your data with any portal?
Do you think that someone is recording your phone calls?
An overwhelming number of users admitted that they used their highly sophisticated cell
phones primarily for calling, with younger crowd also favoring SMS, and with all the
technology packed in their cell phones, they mostly used only the address book.
Despite a number of concept phones and handhelds from Nokia and Siemens that are a lot
more slick, more compact, and more powerful information and communication appliances than
any of their predecessors, they remain as crude input devices, if not worse, as their current
and former generations.
It is apparent that these appliances are a great diversion from the powerful and PC-like
handhelds or cell-phones of today. As these images point out, the future is in readily
available, easy to use, limited functionality, simple to synchronize, inexpensive and even
disposable appliances!
By inspecting these devices it is also apparent that it is practically impossible to store a new
number, using most of these devices: With the glove, for instance, your hand is already tied
up. Crudeness in data input also hinders security. Typing a password each time you use a cell
phone is not a good idea. Normal users find password typing an overkill and too long.
The future is in a desktop that makes information management for the current and future
generation of these appliances possible. We see the birth of a new generation of even
simpler, easier to use, and substantially less expensive appliances such as a simple Calendar
Appliance, or a Notes Appliance that is primarily used to look up information, and, is loaded
using a powerful desktop, accessible anywhere.
COEN 150
Page 4
Bio Security
COEN 150
Nader Mehdizadeh
Ognjen Petrovic
Page 5
Bio Security
COEN 150
Nader Mehdizadeh
Ognjen Petrovic
Page 6
Bio Security
Nader Mehdizadeh
Ognjen Petrovic
We have seen the trends for web top productivity services that will enable information
consistency and synchronization at Home, office, on wireless telephones, handheld, and
beyond. Such services are for simple, ubiquitous, and secure management of
personal/professional information:

At the airport, as soon as your boarding pass is scanned through the card reader, your
cell phone is automatically sent a turn-off signal. Your seat-phone is then automatically
instructed to receive all your calls, as you configured your wireless options from your
desktop. The seat-phone now has your phonebook, already loaded, and even remembers
your call history from your personal cell phone, including the last number dialed.
When you land and proceed to exit the plane, the seat phone is
completely reset, erasing the local copy of your phone list, including the
dialed numbers, etc. A copy of your phonebook was never saved.

The moment you insert the key to get into your rental car, the seat, the mirror, the
temperature, and the internet radio onboard the car, are automatically set to your
favorite settings, all downloaded from your personal profile, privately and securely
maintained online, only accessible by you. The car cell phone is set similarly.
The personal information arrived on none of the devices will persist
when the ignition is turned off.

As soon as you acquire a new cell phone to replace your outdated, broken, or lost cell
phone, you’ll be able to download your phone book, calendar, to do list, phone history, even
the clock and alarm setting to your new phone – No information will be lost.
There are several different secure connections/logins to PANera
servers. From the web, a login and a password will be entered and
checked against the database over SSL.
From a cell phone, identification is established by calling a number, and
entering the appropriate pin# and password.
From micro appliances with limited input, the identification is
established on the server side. In other words the owner will be
required to access the server using either a phone or via Internet to
identify the new appliance as the legitimate recipient of soon to be
downloaded Personal Information … in case of the airline seat, it will be
the ticket number and the seat phone serial number for instance.
COEN 150
Page 7
Bio Security
Nader Mehdizadeh
Ognjen Petrovic

You always have access to your personal information, as long as you are online, or have
access to another cell phone, or a wireless PDA. Identify your information appliance, and
after authentication and proper identification, your required information will be securely
downloaded to that appliance, effortlessly. You may lose a phone, never lose or even
compromise information!

Retrieve, play, and store your cell phone voice mail in your favorite mail client application
(e.g. Outlook, Outlook Express, Eudora, etc.) and on your own computer.

Send SMS from your computer, using a full keyboard.

Start using the calendar feature of your cell phone!

When your appointment changes, and the correct information enter your online calendar,
you are notified, immediately: The information is downloaded to your cell phone and you
get a warning.

If you lose your phone Mr. Phelps, we can immediately destroy all the information on it,
remotely by removing it from the online list of legitimate devices. If found, we add it
back on the list. PANera is the cache-N-Go service. A stolen cell phone, other than a
physical loss, will be no compromise on security, confidentiality, or even information.
When your wireless appliance is turned on, it communicates with the
PANera server, and requests for information download. A calendar
micro-appliance, asks for calendar information. A cell phone, will ask for
phonebook and other information that is supported on the specific
phone. As soon as the phone is turned off, all the information except
for the access login and password will be lost. Once De-listed from the
server, the appliance will be unable to inquire information from the
server any more. We offer a self-destruct command, to purge
information on the target appliance, sent to a device if that device is
de-listed from the server – A device may be removed from the list of
legitimate devices as simply as it was added.
The alternative approach does not use a remote storage server. Why don’t we
often see remote data and information storage for cell phones and PDAs?
Wide Area Networks are readily available, at home, work, even coffee shops,
and airports. Users do not like to have their information stored in unknown
places. There are three concerns for the users. First, the most important
problem is information availability. For instance, it is hard to guarantee access
to all the data all the time. The Internet is unstable due to network
congestions, hardware maintenance, and network attacks reasons. The second
COEN 150
Page 8
Bio Security
Nader Mehdizadeh
Ognjen Petrovic
problem is network confidentiality. The users need high degree of assurance
that somebody will not peek into their cell phone book. Even worse somebody
might succeed changing personal data. This is third, integrity problem.
The solution to users’ desire to keep their private value close by is to store
information in the handheld device itself. The device can self replicate or
transfer portion of valid data to another device. To protect themselves, users
will authenticate and sign all transactions via biometrics [2]. Later we go into
detail about airlines supporting cell phone use during flights. Frequent cell
phone use during flight is dangerous for airplanes. As you will see the user can
transfer the handheld device features to a device more appropriate in the
plane environment.

Your cell phone is your Credit Card, literally. AT&T and Sprint offer credit cards today.
Let’s take it to the next level! Carriers will offer such services not to lose customers to
the competitors.
With cell phones being such an everyday used tool, providers and
manufactures need to offer a service that enables your phone (number)
be transferred over in times when you cannot use your phone, like on an
airplane. With complex navigation and communication devices on
airplanes, cell phones are banned are required to be shut off once you
get on the plane. However, most of us, especially those on business
travel, cannot last minutes let alone hours on end on a plane without our
phones. A service must be developed so that once you slide through
your boarding pass through the machine, and walk towards your
departing aircraft, your cell phone is deactivated but your phone book,
last call log are awaiting you on the phone of your assigned seat. Your
phone number will be forwarded to your seat’s phone and so you are
connected during your flight! Once you deplane the process reverses
itself, your seat’s phone is deactivated, your cell phone is reactivated
with the call log from your flight on it, and an updated phone book (if
you added any new numbers during the flight). This service is simple
and quite useful, however, security is needed, biometric security.
COEN 150
Page 9
Bio Security
Nader Mehdizadeh
Ognjen Petrovic
2. The bottom line
From the introduction above, if some of the technology and services are not already here and
available, they are around the corner and will be here, and widespread soon!
Aside from facilitating communication and improving availability, they promote bandwidth
consumption, which carriers seek.
None of the scenarios described above are far-fetched science fiction fantasies that we
hope to accomplish – They are here, but similar to tap water transformation from private
wells, the information needs to be trusted at information reserves, like water reserves, and
made available as needed.
The information will be stored at one or many central information repositories, which then
gets downloaded, in the proper format, to the appropriate and authorized appliance when
needed.
For instance, in the Airplane example above, the card reader at the airport that scans the
boarding passes sends the “Disable” signal to the passenger cell phone. The cell phone in
return, transmits call records and the address book, if more current than what is at the
center, to this central “Trusted” repository, which then is downloaded to the seat phone as
soon as the plane takes off or as soon as the right “Appliance”, authorized to have that
information, submits a security code or a finger print pattern, etc.
In order for the information to be transferred from the appliances, or transferred to an
appliance, a great deal of security and authorization needs to take place, not to mention the
transmission itself which will have to be encrypted.
Further more, such security also requires a great deal of cooperation between the appliance
(e.g. cell phone), the central information repository (data store), and service providers such
as the airplane, the bank, the credit company, and others involved.
The necessary security and process to protecting yourself from intruders accessing your cell
phone…
Having your cell phone be transferred to your airplane requires the
cooperation between the cell phone manufactures, cellular
providers/carriers, and storage companies. To make your phone secure
and thus guarantee only you are using it, phone manufactures, for both
on the plane and your personal cell phone need to integrate a thermal
fingerprint biometric security feature [3]. Locally using the phone’s
camera (which now-a-days many phones have), the picture it takes of
your finger will also be a thermal scan to make sure it is a live human
finger and not a mold, the picture will then be compared to the one on
COEN 150
Page 10
Bio Security
Nader Mehdizadeh
Ognjen Petrovic
file to verify it is an authentic user [4]. Finally, once the biometric
security phase is complete, a numeric 4-10 digit password will also be
required, allowing users to quickly lock/unlock their phone when they
need to move around the plane or are away from their cell phone for a
short time. The process having these features on cell phones and the
phones on airplanes will roughly take 6 man months for hardware
development, which equals $1/phone sold, the new camera will cost
manufactures $1.50/phone sold, and the manufacturing process with
testing will cost $1/phone sold. This totals an extra $3.50-$5 extra
that the manufactures of cell phones will have to charge for the new
phone. Cellular carriers need to incorporate this feature in users
cellular plans/airtime and this would use GPS satellite communication
when on the aircraft, which is $2/min + the one time charge of having
your phone book and call logs transferred of $5-$7. A storage
company in needed, they are responsible of transferring your phone
book, call logs, and verifies your fingerprint with password [5]. They
get $2-$3 that users are paying their cell provider for the transfer.
Finally, airport gates need to be equipped with necessary device to
enable the deactivation/reactivation of your cell phone to your plane’s
phone. This will cost airports anywhere from $1million-$100 million,
depending on its size. Airports can make up for this cost by having the
users be charged a 2% tax on only their calls while on the aircraft. If
a person uses their aircraft phone for 30 minutes, it would cost them:
30*$2/min cost + $5 transfer fee, which equals $65. Airports would
get 2% of $65, which is $1.30, and if say 100 people on just one flight
used their phone for 30mins, airports would get $130 from just one
plane! The cost of installing the equipment will quickly make up for
itself.
We live in a world now where we must stay connected at all times, but
we must connected securely. Our approach with using a thermal finger
snap shot, a 4-10 digit password will make our approach to having your
phone number, phone book, and call logs be transferred to your
airplane’s seat and back to your cell phone secure from unwanted users.
COEN 150
Page 11
Bio Security
Nader Mehdizadeh
Ognjen Petrovic
REFERENCES
[1] Simon Liu and Mark Silverman, “A Practical Guide to Biometric Security
Technology”, Institute of Electrical and Electronics Engineers, Inc, 2000.
Available:
http://www.computer.org/itpro/homepage/Jan_Feb/security3.htm?SMSESS
ION=NO
[2] Diane Frank,”Feds aim to make biometrics useful”, FCW Media Group,
March 2004, Available:
http://www.fcw.com/fcw/articles/2004/0308/tec-bio-03-08-04.asp
[3] “Why Biometrics Security? – The Fingerprint Reader”, Eyenetwatch.com.
Available:
http://www.eyenetwatch.com/biometric-security.htm
[4] Steven M. Walker ,“Biometric Selection: Body Online”, SANS, 2002.
Available:
http://www.sans.org/rr/papers/index.php?id=139
[5] Andrew Patrick, “Biometric Security Template Storage”, National
Research Council of Canada, January 2004. Available:
http://www.andrewpatrick.ca/biometrics/templates/template.shtml
COEN 150
Page 12
Download