Systems and methods for authenticating a user of a computer application, network, or device using a wireless device

作者: Patrick J. Boyle , Charles L. Dennis , Randall A. Snyder

DOI:

关键词:

摘要: A method and system for authenticating a user includes providing an invocation element capable of being activated by single action, receiving indication that the has been activated, obtaining location wireless device associated with user, determining whether is authorized approving to use application based on predetermined criterion, producing authenticated.

参考文章(63)
Bruce Alan Leak, Michael P Ruf, Konstantin Othmer, Joseph Poletto, Thomas Ziola, Timo Bruck, Presence-based communication between local wireless network access points and mobile devices ,(2007)
Brian Joseph Niedermeyer, Location based fraud reduction system and method ,(2003)
David Frattura, John J. Roese, David Harrington, Richard W. Graham, Verified device locations in a data network ,(2003)
Rory Stewart Turnbull, David Roger Wisely, Proximity Based Authentication Using Tokens ,(2006)
Mark Ian Carter, Wireless access systems ,(2006)
Garrett William Kohl, Steven Kenneth Tucker, Jay Edward Gehring, Anthony Robert Knoerzer, Variable tension gusseting system ,(2009)