I want my ZIA

Matthew X profrv at nex.net.au
Tue May 11 05:04:09 PDT 1999


http://www.scientificamerican.com/article.cfm?articleID=000D5C44-6723-1D59-90FB809EC5880000
The technique, developed by Mark D. Corner and Brian D. Noble of the 
University of Michigan College of Engineering, is dubbed Zero-Interaction 
Authentication, or ZIA. It requires two pieces of hardware: the laptop and 
a so-called authentication token that communicates with the computer via a 
wireless link. As long as the token, which can be built into a wearable 
accessory such as a watch, is within range of the computer, the computer's 
systems function normally. But once the computer is separated from the 
token, its files automatically become encrypted. "When a user walks away 
from his laptop to get a cup of coffee, it will sense that he is leaving 
and begin securing the computer," 





More information about the cypherpunks-legacy mailing list