IJSRP, Volume 4, Issue 2, February 2014 Edition [ISSN 2250-3153]
Samuel Ojode Oluoch
Information technology users are increasingly dependent on mobile devices while computers are stationed in offices and cyber cafes. Most of these mobile devices like smartphones use location applications such as Google maps for reporting their locations. With computers in offices and cyber cafes, and people able to log in to other accounts in their mobile devices, it is likely that a trusted workmate who gets access to your authentication credentials i.e. user name and password to use them to access, interfere, or copy your work in your absence.
With the mobile device able to report your location, security can be improved by integrating location based intelligence with password authentication. This technique works by comparing the location of a person’s mobile device and where the log in attempt is being made. If the two match then log in succeeds but if the two locations are different, log in does not succeed.