Pervasive Authentication Domains for Automatic Pervasive Device Authorization

In a pervasive computing environment, users have many devices that are used to initiate or answer remote service requests, such as obtaining real-time stock quotes, handling corporate e-mail, or accepting telephone calls. We envision that in the future, many applications will be distributed, running across many of a user's specialized pervasive devices rather than on a single system. In this case, a user needs the ability to ``log into'' the personal pervasive domain which spans each of the pervasive devices representing this user. In addition, the pervasive devices belonging to the user's pervasive domain must be able to represent this user to external services. We solve the problem of managing the authorization for pervasive devices belonging to a user's personal pervasive domain by introducing a central personal authorization gateway that accompanies the user and allows pervasive devices in the user's pervasive domain to be automatically configured and authorized.

By: Reiner Sailer, James R. Giles

Published in: Proceedings of PerCom Workshops 2004: 2nd IEEE Annual Conference on Pervasive Computing and Communications Workshops. Los Alamitos, CA, , IEEE. , p.144-8 in 2004

Please obtain a copy of this paper from your local library. IBM cannot distribute this paper externally.

Questions about this service can be mailed to reports@us.ibm.com .