[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Francis et al., 2010 - Google Patents

A location based security framework for authenticating mobile phones

Francis et al., 2010

View PDF
Document ID
13246542111380776147
Author
Francis L
Mayes K
Hancke G
Markantonakis K
Publication year
Publication venue
Proceedings of the 2nd International Workshop on Middleware for Pervasive Mobile and Embedded Computing

External Links

Snippet

Although the utilisation of location information in mobile network access systems has given rise to a variety of applications and services, it is thought that the underlying service authentication model and the related security can be further enhanced. We propose a …
Continue reading at scholar.archive.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network

Similar Documents

Publication Publication Date Title
JP5340173B2 (en) Location information and method and apparatus for ensuring access control using location information
Francis et al. Practical NFC peer-to-peer relay attack using mobile phones
Zhang et al. Location-based authentication and authorization using smart phones
US9060273B2 (en) Authentication server and methods for granting tokens comprising location data
US20200177393A1 (en) Positioning Information Verification
JP5844471B2 (en) How to control access to Internet-based applications
US8613109B2 (en) Method and apparatus for providing mobile social networking privacy
US11070980B1 (en) Secondary device authentication proxied from authenticated primary device
JP2010519788A5 (en)
CN103516713A (en) Facilitating and authenticating transactions
CN102415119A (en) Managing undesired service requests in a network
JP7404907B2 (en) Systems and methods, computer-implemented methods, programs, and systems for location-aware two-factor authentication
CN104767740A (en) User platform credible authentication and access method
Francis et al. A location based security framework for authenticating mobile phones
Zugenmaier et al. Enhancing applications with approved location stamps
Ni et al. A mobile phone‐based physical‐social location proof system for mobile social network service
CN101909052A (en) Home gateway authentication method and system
Konidala et al. A secure and privacy enhanced protocol for location-based services in ubiquitous society
EP2749097B1 (en) Authenticating a user's location in a femtocell-based network
Zhang Secure mobile service-oriented architecture
Tiejun et al. New mobile commerce security solution based on WPKI
Maia et al. CROSS: loCation pROof techniqueS for consumer mobile applicationS
TWI231681B (en) Certification and data encryption method of PUSH technology
Nisar Location based authentication service using 4G/5G Devices
Manolopoulos Security and privacy in smartphone based intelligent transportation systems