BlueKey - A Bluetooth Secure Solution for Accessing Personal Computers

Aziz Barbar, Anis Ismail

2015

Abstract

A major realm of security breach for today’s users is unprivileged access, modification or sometimes forgery of critical business, or user information. Existing computer locking/unoking methods serve as an intermediate barrier against unethical deeds. The proposed solution BlueKey is a software-based solution installed on Personal Computers (PC) that safely unlocks the PC by securing the Bluetooth communication channel between the user’s mobile device and his/her PC. BlueKey helps end-users in not typing their passwords every time they need to access their PCs. At the same level, this solution includes a mobile application that allows the owner to fully control his/her PC via Bluetooth, and runs a breach detector module with safety measures to protect the PC when it is locked. At the technical level, BlueKey is a platform free application written using Java programming language, fulfilling the Write Once Run Anywhere (WORA) concept. This system is built using Java Development Kit (JDK) and compiled using Java Virtual Machine (JVM), and runs with Java Runtime Environment (JRE). Alongside, the mobile application is developed using Java 2 Micro Edition (J2ME), which is compatible with Android, Symbian, and BlackBerry operating systems.

References

  1. Harris S., 2011. textbook, 200075, Available: www.cccure.org/Documents/Cryptography/cisspallino ne.pdf
  2. Bishop M., 2004. Introduction to Computer Security, Addison-Wesley.
  3. Whitte J. L., 1986. Bentley-Whitten. Systems Analysis and Design for Global Enterprise 7th, McGraw-Hill International Edition, pp 31-32.
  4. Choubey M. K., 2012. IT Infrastructure and Management (For the GBTU and MMTU). p. 53.
  5. Microsoft, 2015. Locking and Unlocking a User Desktop, http://technet.microsoft.com/en-us/library/ dd277426.aspx.
  6. Spidle J., 2015. How to Lock Down the Desktop in Linux, http://www.ehow.com/how_5887726_lock-downdesktop-linux.html.
  7. Desktop Lock, 2014, http://www.toplang.com/ desktoplock.htm.
  8. PC Lockup, 2014, http://www.softheap.com/wlock.html.
Download


Paper Citation


in Harvard Style

Barbar A. and Ismail A. (2015). BlueKey - A Bluetooth Secure Solution for Accessing Personal Computers . In Proceedings of the 17th International Conference on Enterprise Information Systems - Volume 2: ICEIS, ISBN 978-989-758-097-0, pages 509-515. DOI: 10.5220/0005470905090515


in Bibtex Style

@conference{iceis15,
author={Aziz Barbar and Anis Ismail},
title={BlueKey - A Bluetooth Secure Solution for Accessing Personal Computers},
booktitle={Proceedings of the 17th International Conference on Enterprise Information Systems - Volume 2: ICEIS,},
year={2015},
pages={509-515},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0005470905090515},
isbn={978-989-758-097-0},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 17th International Conference on Enterprise Information Systems - Volume 2: ICEIS,
TI - BlueKey - A Bluetooth Secure Solution for Accessing Personal Computers
SN - 978-989-758-097-0
AU - Barbar A.
AU - Ismail A.
PY - 2015
SP - 509
EP - 515
DO - 10.5220/0005470905090515