Software Keeps Sensitive Data Confined in Physical Space (With Video)

In a breakthrough that could aid spies, keepers of medical records and parents who want to prevent their kids from "sexting," a team of Virginia Tech researchers has created software to remotely put smart phones under lockdown. The phones are given permission to access sensitive data while in a particular room, but when the devices leave the room, the data is completely wiped.

“This level of complexity and security, nobody else has,” said Jules White, assistant professor in the Department of Electrical and Computer Engineering. “There are commercial products that do limited versions of these things, but nothing that allows for automating wiping and complete control of settings and apps on smart phones and tablets.”
 
A general, for example, could access secret intelligence while visiting a secure government facility without fear that his or her smart phone or tablet computer might later be lost or stolen, White said. “This system provides something that has never been available before. It puts physical boundaries around information in cyberspace.”
 
Medical caregivers could review patient information during a doctor visit, but – safeguarding patient privacy – doctors or nurses couldn’t walk out of the examination room with the patient’s records.
 
The software also enables central control of phone features such as preventing a smart phone’s camera or email from working.
 
“For instance, you could keep certain apps from working in the operating room so surgeons wouldn’t get distracted, or you could prevent nurses from taking patient photos and putting them on the Internet,” White said. "In that same way, parents could restrict when and where children could send text messages to prevent distraction at school. Parents could also limit to whom messages with images could be sent in order to prevent 'sexting.'"
 
White and his team, in research underwritten by Virginia Tech Applied Research Corporation, modified Google’s Android operating system to create the security features.
 
The team recently demonstrated the software for an inside-the-beltway group, Virginia Tech Intelligence and Defense Executive Alumni, or VT IDEA, composed of Virginia Tech alums who are interested in research that may benefit intelligence and military agencies.
 
“It was exciting to connect the VT IDEA group with Jules White and his team,” said John Provo, director of the Virginia Tech Office of Economic Development. “Technology like this may be ripe not only for commercialization, but it could also improve our nation’s defense and security.”

 

Featured

  • Maximizing Your Security Budget This Year

    The Importance of Proactive Security Measures: 4 Stories of Regret

    We all want to believe that crime won’t happen to us. So, some business owners hope for the best and put proactive security measures on the back burner, because other things like growth, attracting new customers, and meeting deadlines all seem more pressing. Read Now

  • Securing the Flow of Operations

    The transportation industry is a complex and dynamic environment where efficient management of physical keys, vehicles and shared devices is critical to ensuring smooth operations, reducing costs and maintaining security. Every day, more transportation facilities are using modern electronic key and asset management systems to better secure, audit and manage the important assets that keep operations running smoothly. Read Now

  • Today's Enterprise

    Protecting servers and data has evolved rapidly over the past 15-plus years. Early on, concerns centered around the environmental conditions of where servers were housed within a building and the effects of humidity, temperature and air quality on their performance. This led to a better understanding of the need for a controlled environment to maximize equipment lifespan and capacity. It was also a driving force behind consolidating servers in a common space, i.e., the data center. Read Now

  • Study Proves It: Security Awareness Training Reduces Phishing Attacks

    Attackers are increasingly targeting human-based vulnerabilities to infiltrate organizations. Humans have direct access to insider systems and data – any threat actor can easily phish users, steal their credentials and secure keys to the kingdom without having to fight advanced cybersecurity defenses. Studies show social engineering attacks and human errors are behind 68% of all breaches.  Read Now

Featured Cybersecurity

Webinars

New Products

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge. 3

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation. 3

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file. 3