Print this Page
27 ISM
29 Personal Computing Device (PCD)
Close this Page

27.29. Personal Computing Device (PCD):
1. For people with a personal computing device like a smart phone, tablet, laptop or desktop, sign-in has been improved with the use of a PIN.   Traditional sign-in with a password continues for those who share many different computers.
2. The unique fingerprint of a personal computing device acts as physical evidence that identifies the person registered to use that device.   The PCD fingerprint and a PIN is adequate authentication to replace a password

2. Glossary:
PCR means "Personal Computing Device" such as a smart phone, tablet, laptop or desktop.
PIN means "Personal Identifier" such as a 4 digit number.
BAS means "Bespoke Application Service" providing private online business services.
PII means "Personally Identifiable Information" that is owned by a living person and with consent may be loaned to a company for a defined purpose.

3. How it works:
1. A person with a PCR will self-register their own information and be assigned a unique PIN and password.
2. A person will tap in their PIN to sign-in.
3. When the person signs in they will remain signed in until they close their browser - this could be months.   Sign-off has been eliminated - just close the browser.
4. When a person forgets their PIN, they may sign-in with their password.
5. When a person gets a different PCD, they may register the device with their password.
6. When a person forgets their password, they will self-register and be assigned a different unique PIN and password.   After adequate verification, the persons old account and new account will be merged with no loss of data.

4. Self-Registration:
1. A person will click to open the self-registration web page as a form.
2. A person will enter as much personal information that is required to identify them.
3. When the person saves the form, then they are show their unique welcome page with their assgined PIN and password.
4. From their welcome page, a person has the right to change their personal information, to download their personal information and to delete their personal information.
5. When a person has deleted their personal information, their account is de-activated and cannot be used again.
6. No other person can see a persons PIN and a persons PIN cannot be reused by any other person using any other PCD.

5. Sign In:
1. A person with a PIN will click on the "sign-in" page and be shown an access pad of 12 buttons.
2. A person will tap in their PIN number and click the hash symbol when they have finished.
3. If the wrong button is pressed, click the star symbol and restart.
4. When the PIN has been entered, the persons unique welcome page is shown - the person has the right to view their PIN and password.
AS AN ALTERNATIVE:
1. A person with a PIN will click on the "password" page and be shown a sign in form.
2. A person will enter their name, email, password and select that they accept the terms of use.
3. A person is permitted three attempts before any further data entry is simply ignored as criminal behaviour - no error messages are shown.
4. When the password has been entered, the persons unique welcome page is shown - the person has the right to view their PIN and password.

Example:

6. Benefits:
1. Where a person uses their smart phone to access their BAS, they can sign-in once and stay signed in until they close their browser.
2. Signed in sessions are no longer automatically terminated at midnight.
3. A person can view and change their Personally Identifiable Information (PII) at any time.
4. The assigned PIN can be used to sign-in using a PCD that has been registered.   When another person knows a persons PIN, it is not an issue because the PIN can only be used with the registered PCD.
5. The assigned password can be used to sign-in to register any number of new computing devices.
6. When a person forgets their PIN is is perfectly reasonable to send the PIN to them by phone or email because the PIN can only be used by the registered device.

7. Fingerprint:
1. Every personal computing device has a fingerprint that acts as an additional authentication factor.
2. The fingerprint includes:
  (1). Hardware identifier.
  (2). Software identifier.
  (3). Network identifier.
3. The network identifier applies to computers with a large screen width, but not to smart phones.
4. Behaviour evidence is used for authentication to include:
  (1). Normal business hours of the day, such as 07:00 to 19:00 or 06:00 to 22:00.
  (2). Normal business days of the week, such as Mon-to-Fri or Mon-to-Sat or Mon-to-Sun.
  (3). Night shift working.
  (4). Public holiday working.

8. Management Governance:
1. The traditional password is adequate where a person does not use a personal computing device.
2. The Bespoke Application Service has a button to popup a simple calculator that can be used for simple arithmetic.
3. A manager may be assigned a formula that is used with the calculator to sign in.   It has been shown that a secure formula such as "208+428*8366-495/13=" is easier to remember than a secure password.
4. The formula is also safe from being "remembered" by the browser and any keylogging malware.

Example:

Document Control
Document Title: ISM Personal Computing Device.
Document Key Words: ISM, policy, process, procedure, business rules.
Document Description: ISM PCD Personal Computing Device.
Document Privacy: Public shared for the benefit of humanity.
Document Reference: 162729.
Document Edition: 1.2.
Document Released: 22 Aug 2017.