Location-based authentication
The topic of this article may not meet Wikipedia's general notability guideline. (October 2010) |
Location-based authentication is a special procedure to prove an individual's identity on appearance simply by detecting its presence at a distinct location.
To enable location-based authentication, a special combination of objects is required.
- Firsthand, the individual that applies for being identified and authenticated has to present a sign of identity.
- Secondly, the individual has to carry at least one human authentication factor that may be recognized on the distinct location.
- Thirdly, the distinct location must be equipped with a resident means that is capable to determine the coincidence of individual at this distinct location.
Distinctiveness of locating[]
Basic requirement for safe location-based authentication is a well defined separation of locations as well as an equally well defined proximity of the applying individual to this location.
Applications[]
- Location-based authentication is a standard procedure to grant access to an area by detecting a person at an entrance. Then of course a discrimination is recommended to recognise a person entering or leaving, just to prevent two persons gaining access on one ticket only.
- Location-based authentication is a standard procedure to get access to a machine, especially a working position with a computer and the functions of this computer.[1]
- Location-based authentication is a novel procedure to provide additional information about the authenticity of a product.[2]
Challenges[]
As of 2008, no offered technical solution for simple location-based authentication includes a method for limiting the granted access to the presence, hence terminating the granted authentication on leave. This defines a mandate either to include a new or an additional procedure for
- detecting the leave and closing the granted access,
- limiting the granted time for access
- combining the method with another specially suited authentication factor
See also[]
- Authentication
- Two factor authentication
- Time-based authentication
- Real-time locating
- Security token
- Wireless
References[]
- ^ LOCATION BASED AUTHENTICATION
- ^ "Probabilistic Approach for Location-Based Authentication". Archived from the original on 2009-01-07. Retrieved 2009-02-01.
Research work[]
Categories:
- Authentication methods
- Wireless locating
- Computer access control
- Computer security stubs