Could our Mobile Device be the Key to our Privacy?

I was contemplating the possibilities for how our mobile computing devices could serve as forms of identity. It is an electronic device that we control, that could offer personal validation; it could provide proximity authorization via various transmission modes; it is a repository that can be used to provide any type of information about us, etc, etc. So what are some possibilities for managing our identity information on our mobile device? There are some personal health record apps for the iPhone and of course numerous personal financial apps. What about our ultimate personal identity?

What if our personal mobile computing device served as an access control key to our genetic map, our personal genome? I bring this up because back in 2003 when I was finishing up my MS in Bioinformatics I designed the schema for a National Health Database. The concept worked from a National ID as a starting point for accessing or referencing all data that would be important for a personal health record. The ultimate challenge that I did not have a real answer for was the access control needed for the highest security, our personal genetic map, our DNA code. The design was based on this data being encrypted from inception with access based on a personal digital key that could be used to activate de-encryption when used in conjunction with an authorized medical professional’s digital key. At the time I could only imagine some sort of smartcard or embedded chip, but I was hung up on communication. I kind of saw it as 2 people with keys needed to launch a nuclear missile. But now I think it may be possible to design a scheme that works from a mobile computing device that might allow us to build this National Health Database. The mobile device is key for its ability to allow the patient to authorize access to their medical information with remote flexibility. Biometrics will probably be involved, but could a mobile device provide a privacy solution?

By the way, my thesis was titled “Security of Our Personal Genome”.

About ghsmith76

Greg Smith is currently the Interim CIO at Western Washington University. Prior to WWU Greg was the CIO at Missouri S&T, and before that the CIO for George Fox University in Newberg, OR. Greg went to the Northwest from the Purdue School of Engineering and Technology in Indianapolis, IN. where he served as the Director of IT for 8 years. Prior to the IT career in Academia, Greg was a Systems Consultant with Hewlett-Packard primarily with the Analytical Group working out of San Francisco,Cincinnati and Indianapolis. Greg's passion as a CIO in Higher Education comes from his belief that Technology can benefit Teaching & Learning.

Posted on April 13, 2009, in genome, Identity Management, Mobile Computing, security and tagged , , . Bookmark the permalink. Leave a comment.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s