LOCATION DETERMINATION FOR USER AUTHENTICATION
First Claim
1. A method for user authentication, the method comprising:
- establishing network connections between a client device and a first host machine and between the client device and a second host machine;
receiving, by one or more processors, an authentication request from the client device;
measuring, by the one or more processors, a first round trip time (RTT) between the first host machine and the client device;
measuring, by the one or more processors, a second RTT between the second host machine and the client device;
determining, by the one or more processors, a geographical location of the client device based at least in part on the first RTT and the second RTT;
determining, by the one or more processors, whether the geographical location of the client device is within a tolerance geographical area; and
in response to the authentication request, authenticating the client device, by the processor, based at least in part on the determination that the geographical location of the client device is within the tolerance geographical area.
3 Assignments
0 Petitions
Accused Products
Abstract
User authentication techniques based on geographical locations associated with a client device is provided. A network connection can be established between two or more host machines and a client device. Upon a request received from the client device by one of these host machines, round trip times of test messages may be measured between the client device and each of the host machines. The round trip times can be utilized to determine the current geographical location of the client device. If the location is within a tolerance geographical area, the client device may be authenticated. Otherwise, the authentication may fail or additional security procedures may be implemented. In some examples, a travel time from a historical geographical location to current geographical location can be determined. This data may be also utilized in the user authentication process.
-
Citations
20 Claims
-
1. A method for user authentication, the method comprising:
-
establishing network connections between a client device and a first host machine and between the client device and a second host machine; receiving, by one or more processors, an authentication request from the client device; measuring, by the one or more processors, a first round trip time (RTT) between the first host machine and the client device; measuring, by the one or more processors, a second RTT between the second host machine and the client device; determining, by the one or more processors, a geographical location of the client device based at least in part on the first RTT and the second RTT; determining, by the one or more processors, whether the geographical location of the client device is within a tolerance geographical area; and in response to the authentication request, authenticating the client device, by the processor, based at least in part on the determination that the geographical location of the client device is within the tolerance geographical area. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A method for user authentication, the method comprising:
-
receiving, by a processor, an authentication request from the client device; acquiring, by the processor, a first distance between a first networked device and the client device; acquiring, by the processor, a second distance between a second networked device and the client device; determining, by the processor, a geographical location of the client device based at least in part on the first distance and the second distance; determining, by the processor, that the geographical location of the client device corresponds to trusted historical data; and in response to the authentication request, authenticating the client device, by the processor, based at least in part on the determination that the geographical location of the client device corresponds to the trusted historical data. - View Dependent Claims (16, 17, 18)
-
-
19. A method for user authentication, the method comprising:
-
receiving, by a processor, an authentication request from a client device; acquiring, by the processor, a first geo-identifier of the client device, wherein the first geo-identifier is associated with a past geographical location and a past timestamp, where the client device has been successfully authenticated; acquiring, by the processor, a second geo-identifier of the client device, wherein the second geo-identifier is associated with a current geographical location of the client device and a current timestamp; estimating, by the processor, a trip time between the past geographical location and the current geographical location based at least in part on the past timestamp and the current timestamp; and in response to the authentication request, authenticating the client device, by the host machine, based at least in part on the estimation. - View Dependent Claims (20)
-
Specification