Location-based authentication scheme

作者: Seungil Kim , Youngil Ko

DOI:

关键词:

摘要: Technologies are generally described for a location-based authentication scheme. In some examples, method performed under control of server may include receiving first notification use an application, determining location device corresponding to the use, second whether is within predetermined range from location, and enabling execution in response that location.

参考文章(13)
Niko Tapani Kiukkonen, Kari Juhani Leppänen, Eero Jari Juhani Sillasto, Markku Tapio Turunen, Method and apparatus for local distribution of targeted commercial messaging over an ad-hoc mesh network ,(2011)
Philip F. Kearney, Christopher B. Zimmermann, Robert Bradley, Methods and apparatus for solicited activation for protected wireless networking ,(2010)
Dennis J. Dupray, Sheldon F. Goldberg, Services and applications for a communications network ,(2011)
Jukka-Pekka Salmenkaita, Heikki Mannila, Eero Rasanen, Kari Oinonen, Antti Sorvari, Hannu T. Toivonen, Juhani Murto, Roman Kikta, Yka Huhtala, Location-based novelty index value and recommendation system and method ,(2002)
Sam Gharabally, Jack R. Matthew, Craig M. Federighi, Ellis Marshall Verosub, Gregory T. Quirk, Daniel I. Feldman, Monika E. Gromek, Pedraum R. Pardehpoosh, Jackie Lee-Kang, Yoon Sub Hwang, Jean-Pierre Ciudad, Thomas K. Burkholder, Daniel Emil Pu, System and method for linking pre-installed software to a user account on an online store ,(2011)
Danilo Dolfini, Marco Marengo, Nicoletta Salis, Method and system for determining the context of an entity ,(2008)
Lee Amaitis, Paul Williams, Sunny Tara, Multi-process communication regarding gaming information ,(2011)