Smart Technology:A Mobile Device using Context Management System
Keywords:
data encryption, GPS, mobile computing, location-based serviceAbstract
We investigate the sensible practicability of exploitation context data for dominant access to services. Based
entirely on situational context, we show that users will be transparently provided anonymous access to services which
service suppliers will still impose numerous security levels. Thereto, we propose context-sensitive verification strategies
that permit checking the user’s claimed legitimacy in numerous ways that and to numerous degrees. Additional exactly,
standard data management approaches are wont to compare historic discourse (service usage) information of a personal
user or cluster. The result's a comparatively robust, less intrusive and additional versatile access management method
that mimics our natural means of authentication and authorization within the physical world.