h a l f b a k e r y
These statements have not been evaluated by the Food and Drug Administration.
add, search, annotate, link, view, overview, recent, by name, random
news, help, about, links, report a problem
or get an account
This has only been brewing in my head for about 30 seconds now but here goes. Imagine a little Bluetooth transceiver that you carried around in your wallet. An identity transceiver.
Now you're an individual with many computers. One at home, at work, maybe sometimes at your friend's house, etc. Each
one of these computers is equipped with a Bluetooth receiver and software to recognize your identity. When you got within proximity of the computer it would automatically recognize you and do various things: log in to IM, start up email, move your telephone to (VOIP of course).
Yeah, yeah. Security, etc. Fraught with issues. But if you run IM from multiple machines you know what a pain in the ass it is to try and remember to log in when you to work in the morning and when you come home at night. What, you don't work 20 hours a day (minus commuting)?
I've got my little Jabra Bluetooth headset. Very reliable and based on the size I would think the circuitry would be small enough to jam into a smartcard.
Another alternative approach would be to use some sort or USB identity key. The security guys would probably prefer that method, but it's just no "scifi" enough for me.
Control Your Mac With Bluetooth Phone
Feb 25, 2003 [krelnik, Oct 04 2004]
||There was an article on Slashdot about a user who had homebrewed precisely this using a Bluetooth enabled phone and his Macintosh. When the Mac senses the presence of his phone, it fires up email, starts playing music, and so on. See link.
||Bluetooth presents??!! Wow!When do I get mine?
||For better security with passive logon require at least two such transceivers or a mix of this and an RFID you carry as well. Logon would only happen if two or three items can be sensed at once. It'd be harder for someone to steal enough items to gain access to your network.
||Depending on the level of security, usually the "security" guys want three things: 1)Something you know (password); 2)Something you are (biometrics) and 3)Something you have (smartcard, etc).