作者: Seungil Kim , Youngil Ko
DOI:
关键词:
摘要: Technologies are generally described for a location-based authentication scheme. In some examples, method performed under control of server may include receiving first notification use an application, determining location device corresponding to the use, second whether is within predetermined range from location, and enabling execution in response that location.