Software Keeps Sensitive Data Confined in Physical Space (With Video)

In a breakthrough that could aid spies, keepers of medical records and parents who want to prevent their kids from "sexting," a team of Virginia Tech researchers has created software to remotely put smart phones under lockdown. The phones are given permission to access sensitive data while in a particular room, but when the devices leave the room, the data is completely wiped.

“This level of complexity and security, nobody else has,” said Jules White, assistant professor in the Department of Electrical and Computer Engineering. “There are commercial products that do limited versions of these things, but nothing that allows for automating wiping and complete control of settings and apps on smart phones and tablets.”
 
A general, for example, could access secret intelligence while visiting a secure government facility without fear that his or her smart phone or tablet computer might later be lost or stolen, White said. “This system provides something that has never been available before. It puts physical boundaries around information in cyberspace.”
 
Medical caregivers could review patient information during a doctor visit, but – safeguarding patient privacy – doctors or nurses couldn’t walk out of the examination room with the patient’s records.
 
The software also enables central control of phone features such as preventing a smart phone’s camera or email from working.
 
“For instance, you could keep certain apps from working in the operating room so surgeons wouldn’t get distracted, or you could prevent nurses from taking patient photos and putting them on the Internet,” White said. "In that same way, parents could restrict when and where children could send text messages to prevent distraction at school. Parents could also limit to whom messages with images could be sent in order to prevent 'sexting.'"
 
White and his team, in research underwritten by Virginia Tech Applied Research Corporation, modified Google’s Android operating system to create the security features.
 
The team recently demonstrated the software for an inside-the-beltway group, Virginia Tech Intelligence and Defense Executive Alumni, or VT IDEA, composed of Virginia Tech alums who are interested in research that may benefit intelligence and military agencies.
 
“It was exciting to connect the VT IDEA group with Jules White and his team,” said John Provo, director of the Virginia Tech Office of Economic Development. “Technology like this may be ripe not only for commercialization, but it could also improve our nation’s defense and security.”

 

Featured

  • Cloud Adoption Gives Way to Hybrid Deployments

    Cloud adoption is growing at an astonishing rate, with Gartner forecasting that worldwide public cloud end-user spending will approach $600 billion by the end of this year—an increase of more than 21% over 2022. McKinsey believes that number could eclipse $1 trillion by the end of the decade, further underscoring the industry’s exponential growth. Read Now

  • AI on the Edge

    Discussions about the merits (or misgivings) around AI (artificial intelligence) are everywhere. In fact, you’d be hard-pressed to find an article or product literature without mention of it in our industry. If you’re not using AI by now in some capacity, congratulations may be in order since most people are using it in some form daily even without realizing it. Read Now

  • Securing the Future

    In an increasingly turbulent world, chief security officers (CSOs) are facing a multitude of challenges that threaten the stability of businesses worldwide. Read Now

    • Guard Services
  • Security Entrances Move to Center Stage

    Most organizations want to show a friendly face to the public. In today’s world, however, the need to keep people safe and secure has become a prime directive when designing and building facilities of all kinds. Fortunately, there is no need to construct a fortress-like entry that provides that high level of security. Today’s secured entry solutions make it possible to create a welcoming, attractive look and feel at the entry without compromising security. It is for this reason that security entrances have moved to the mainstream. Read Now

Featured Cybersecurity

Webinars

New Products

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation. 3

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles. 3

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions. 3