Location-based authentication
Encyclopedia
Location based authentication is a special procedure to prove an individual's identity and authenticity on appearance simply by detecting its presence at a distinct location.

To enable location based authentication, a special combination of objects is required.
  • Firsthand, the individual that applies for being identified and authenticated has to present a sign of identity.
  • Secondly, the individual has to carry at least one human authentication factor that may be recognized on the distinct location.
  • Thirdly, the distinct location must be equipped with a resident means that is capable to determine the coincidence of individual at this distinct location.

Distinctiveness of locating

Basic requirement for safe location based authentication is a well defined separation of locations as well as an equally well defined proximity of the applying individual to this location.

Applications

  • Location based authentication is a standard procedure to grant access to an area by detecting a person at an entrance. Then of course a discrimination is recommended to recognise a person entering or leaving, just to prevent two persons gaining access on one ticket only.

  • Location based authentication is a standard procedure to get access to a machine, especially a working position with a computer and the functions of this computer .

  • Location based authentication is a novel procedure to provide additional information about the authenticity of a product .

Challenges

, no offered technical solution for simple location based authentication includes a method for limiting the granted access to the presence, hence terminating the granted authentication on leave. This defines a mandate either to include a new or an additional procedure for
  • detecting the leave and closing the granted access,
  • limiting the granted time for access
  • combining the method with another specially suited authentication factor

See also =
  • Authentication
    Authentication
    Authentication is the act of confirming the truth of an attribute of a datum or entity...

  • Two factor authentication
  • Time-based authentication
    Time-based authentication
    Time-based authentication is a special procedure to prove an individual's identity and authenticity on appearance simply by detecting its presence at a scheduled time of day or within a scheduled time interval and on a distinct location....

  • Real-time locating
  • Security token
    Security token
    A security token may be a physical device that an authorized user of computer services is given to ease authentication...

  • Wireless
    Wireless
    Wireless telecommunications is the transfer of information between two or more points that are not physically connected. Distances can be short, such as a few meters for television remote control, or as far as thousands or even millions of kilometers for deep-space radio communications...

The source of this article is wikipedia, the free encyclopedia.  The text of this article is licensed under the GFDL.
 
x
OK