Francis et al., 2010 - Google Patents
A location based security framework for authenticating mobile phonesFrancis et al., 2010
View PDF- Document ID
- 13246542111380776147
- Author
- Francis L
- Mayes K
- Hancke G
- Markantonakis K
- Publication year
- Publication venue
- Proceedings of the 2nd International Workshop on Middleware for Pervasive Mobile and Embedded Computing
External Links
Snippet
Although the utilisation of location information in mobile network access systems has given rise to a variety of applications and services, it is thought that the underlying service authentication model and the related security can be further enhanced. We propose a …
- 239000003795 chemical substances by application 0 description 40
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP5340173B2 (en) | Location information and method and apparatus for ensuring access control using location information | |
Francis et al. | Practical NFC peer-to-peer relay attack using mobile phones | |
Zhang et al. | Location-based authentication and authorization using smart phones | |
US9060273B2 (en) | Authentication server and methods for granting tokens comprising location data | |
US20200177393A1 (en) | Positioning Information Verification | |
JP5844471B2 (en) | How to control access to Internet-based applications | |
US8613109B2 (en) | Method and apparatus for providing mobile social networking privacy | |
US11070980B1 (en) | Secondary device authentication proxied from authenticated primary device | |
JP2010519788A5 (en) | ||
CN103516713A (en) | Facilitating and authenticating transactions | |
CN102415119A (en) | Managing undesired service requests in a network | |
JP7404907B2 (en) | Systems and methods, computer-implemented methods, programs, and systems for location-aware two-factor authentication | |
CN104767740A (en) | User platform credible authentication and access method | |
Francis et al. | A location based security framework for authenticating mobile phones | |
Zugenmaier et al. | Enhancing applications with approved location stamps | |
Ni et al. | A mobile phone‐based physical‐social location proof system for mobile social network service | |
CN101909052A (en) | Home gateway authentication method and system | |
Konidala et al. | A secure and privacy enhanced protocol for location-based services in ubiquitous society | |
EP2749097B1 (en) | Authenticating a user's location in a femtocell-based network | |
Zhang | Secure mobile service-oriented architecture | |
Tiejun et al. | New mobile commerce security solution based on WPKI | |
Maia et al. | CROSS: loCation pROof techniqueS for consumer mobile applicationS | |
TWI231681B (en) | Certification and data encryption method of PUSH technology | |
Nisar | Location based authentication service using 4G/5G Devices | |
Manolopoulos | Security and privacy in smartphone based intelligent transportation systems |