Location-based authentication

Location-based authentication is a special procedure to prove an individual's identity and authenticity on appearance simply by detecting its presence at a distinct location.

To enable location-based authentication, a special combination of objects is required.

  • Firsthand, the individual that applies for being identified and authenticated has to present a sign of identity.
  • Secondly, the individual has to carry at least one human authentication factor that may be recognized on the distinct location.
  • Thirdly, the distinct location must be equipped with a resident means that is capable to determine the coincidence of individual at this distinct location.

Distinctiveness of locating

Basic requirement for safe location-based authentication is a well defined separation of locations as well as an equally well defined proximity of the applying individual to this location.

Applications

  • Location-based authentication is a standard procedure to grant access to an area by detecting a person at an entrance. Then of course a discrimination is recommended to recognise a person entering or leaving, just to prevent two persons gaining access on one ticket only.
  • Location-based authentication is a standard procedure to get access to a machine, especially a working position with a computer and the functions of this computer.[1]
  • Location-based authentication is a novel procedure to provide additional information about the authenticity of a product.[2]

Challenges

As of 2008, no offered technical solution for simple location-based authentication includes a method for limiting the granted access to the presence, hence terminating the granted authentication on leave. This defines a mandate either to include a new or an additional procedure for

  • detecting the leave and closing the granted access,
  • limiting the granted time for access
  • combining the method with another specially suited authentication factor
gollark: I think there has been some work on neurally controlled prosthetic arms and such. I can't be bothered to check stuff because I'm on my phone right now, however.
gollark: I mean, it's already approximately happening to all general purpose computers.
gollark: But assuming the horrible problems can somehow be avoided, BCIs and/or mind uploading could be highly cool.
gollark: I'd also worry that governments would insist on them having some overrides to stop people if they try murder or something (because murder is bad and if you disagree with this policy you're clearly pro-murder) which would then inevitably be expanded to other crimes and "crimes".
gollark: Unless they design the software ground-up with strong security and formal verification or something. But that doesn't seem to be what's happening.

See also

References

Research work

This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.