Liquid Transfer of User Identity

  • Sivamani ThangavelEmail author
  • Kari Systä
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 10544)


Most consumers own more than one device for accessing content from the Web. In this world Liquid Software allows users to switch the device and effortlessly continue tasks in the new device. This paper addresses on the needs and methods for transferring a user session and user information from one device to another. The identity should follow the moving application seamlessly instead of requiring repeated entering of credentials in each device. Such solution would make services that require authentication to work in a liquid fashion. The paper describes our on-going work on investigating how liquid transfer of user identity can be added to various ways of handing the user authentication.


User identification Liquid software User sessions Web session migration 


  1. 1.
    Alapetite, A.: Dynamic 2D-barcodes for multi-device web session migration including mobile phones. Pers. Ubiquit. Comput. 14(1), 4–52 (2010). CrossRefGoogle Scholar
  2. 2.
    Facebook Login for the Web with the JavaScript SDK. Accessed 30 Mar 2017
  3. 3.
    Marier, F., Nyman, R.: Using secure client-side sessions to build simple and scalable Node.JS applications. Accessed 5 Apr 2017
  4. 4.
    Canfora, G., Di Santo, G. Venturi, G., Zimeo, E., Zito, M.V.: Proxy-based hand-off of web sessions for user mobility. In: Proceedings of the Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services (MobiQuitous -05) (2005).
  5. 5.
    Google chrome support. Accessed 31 Mar 2017
  6. 6.
  7. 7.
    Song, H., Chu, H.-H., Kurakake, S.: Browser session preservation and migration. In: International World Wide Web Conference (2002).
  8. 8.
    Song, H., Chu, H., Islam, N., Kurakake, S., Katagiri, M.: Browser state repository service. In: Mattern, F., Naghshineh, M. (eds.) Pervasive 2002. LNCS, vol. 2414, pp. 253–266. Springer, Heidelberg (2002). CrossRefGoogle Scholar
  9. 9.
    Jones, M., Bradley J., Sakimura, N.: Internet Engineering Task Force (IETF), May 2015.
  10. 10.
    Liu, A.X., Kovacs, J.M., Huang, C., Gouda, M.: A Secure cookie protocol. In: Proceedings of 14th International Conference on Computer Communications and Networks (2005).
  11. 11.
    Hsieha, M.-D., Wangb, T.-P., Tsaia, C.-S., Tsenga, C.-C.: Stateful session handoff for mobile WWW. Inf. Sci. 176(9), 1241–1265 (2006). CrossRefGoogle Scholar
  12. 12.
    Mozilla official website. Accessed 31 Mar 2017
  13. 13.
    Taivalsaari, A., Mikkonen, T., Systä, K.: Liquid software manifesto: the era of multiple device ownership and its implications for software architecture. In: IEEE 38th Annual Computer Software and Applications Conference, COMPSAC, Västerås, pp. 338–343. IEEE, Sweden (2014)Google Scholar
  14. 14.
    Todorov, D.: Mechanics of User Identification and Authentication: Fundamentals of Identity Management, pp. 1–45. Auerbach Publications, London (2007)CrossRefGoogle Scholar
  15. 15.
    Weiser, M.: The computer for the 21st century. Sci. Am. 265(3), 94–104 (1991)CrossRefGoogle Scholar
  16. 16.
    Gallidabino, A., Pautasso, C., Ilvonen, V., Mikkonen, T., Systä, K., Voutilainen, J.-P., Taivalsaari, A.: On the architecture of liquid software: technology alternatives and design space. In: The Proceedings of WICSA (2016)Google Scholar
  17. 17.
    Gallidabino, A., Pautasso, C., Mikkonen, T., Systä, K., Voutilainen, J.-P., Taivalsaari, A.: Architecting Liquid Software. J. Web Eng. (2017, to appear)Google Scholar
  18. 18.
    Voutilainen, J.-P., Mikkonen, T., Systä, K.: Synchronizing application state using virtual DOM trees. In: Casteleyn, S., Dolog, P., Pautasso, C. (eds.) ICWE 2016. LNCS, vol. 9881, pp. 142–154. Springer, Cham (2016). CrossRefGoogle Scholar
  19. 19.
    Casario, M., Elst, P., Brown, C., Wormser, N., Hanquez, C.: HTML5 geolocation API. In: Book HTML5 Solutions, Essential Techniques for HTML5 Developers, pp. 263–280. Apress publishers (2011)Google Scholar
  20. 20.
    Eriksson, B., Barford, P., Maggs, B., Nowak, R.: Posit: a lightweight approach for IP geolocation. In: Journal ACM SIGMETRICS Performance Evaluation Review, pp. 2–11 (2012)Google Scholar
  21. 21.
    Hardt, D. (ed.): The OAuth 2.0 Authorization Framework, Internet Engineering Task Force (IETF), pp. 10–12, October 2012.

Copyright information

© Springer International Publishing AG 2018

Authors and Affiliations

  1. 1.Tampere University of TechnologyTampereFinland

Personalised recommendations