USER PRIVACY PROTECTED LOCATION-BASED AUTHENTICATION ON MOBILE DEVICES
Techniques for implementing location-based authentication in a computing device are provided. An example method according to these techniques includes binding location authentication information to an authentication key for a relying party (RP) application, receiving a request from the RP applicatio...
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Patent |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | Techniques for implementing location-based authentication in a computing device are provided. An example method according to these techniques includes binding location authentication information to an authentication key for a relying party (RP) application, receiving a request from the RP application for a signed authentication response, obtaining current location information for the computing device, authenticating the current location information for the computing device based on the location authentication information bound to the authentication key, and providing, to the RP application by the computing device, the signed authentication response in response to the authenticating the current location information for the computing device, wherein the signed authentication response is signed using the authentication key bound to the location authentication information. |
---|