LOCATION DETERMINATION FOR USER AUTHENTICATION
First Claim
1. A method for user authentication, the method comprising:
- receiving, by a processor, an authentication request from a client device;
acquiring, by the processor, a first geo-identifier and a past timestamp associated with a past geographical location where the client device has been successfully authenticated;
acquiring, by the processor, a second geo-identifier and a current timestamp associated with a current geographical location of the client device;
determining, by the processor, an estimated trip time between the past geographical location and current geographical location of the client device based at least in part on the past timestamp and current timestamp;
determining, by the processor, that the estimated trip time is less than a difference between the past timestamp when the client device was successfully authenticated and the current timestamp; and
in response to the authentication request, authenticating the client device, by the processor, based at least in part on the estimated trip time being less than a difference between the past timestamp when the client device was successfully authenticated and the current timestamp.
1 Assignment
0 Petitions
Accused Products
Abstract
User authentication techniques based on geographical locations associated with a client device is provided. A network connection can be established between two or more host machines and a client device. Upon a request received from the client device by one of these host machines, round trip times of test messages may be measured between the client device and each of the host machines. The round trip times can be utilized to determine the current geographical location of the client device. If the location is within a tolerance geographical area, the client device may be authenticated. Otherwise, the authentication may fail or additional security procedures may be implemented. In some examples, a travel time from a historical geographical location to current geographical location can be determined. This data may be also utilized in the user authentication process.
9 Citations
20 Claims
-
1. A method for user authentication, the method comprising:
-
receiving, by a processor, an authentication request from a client device; acquiring, by the processor, a first geo-identifier and a past timestamp associated with a past geographical location where the client device has been successfully authenticated; acquiring, by the processor, a second geo-identifier and a current timestamp associated with a current geographical location of the client device; determining, by the processor, an estimated trip time between the past geographical location and current geographical location of the client device based at least in part on the past timestamp and current timestamp; determining, by the processor, that the estimated trip time is less than a difference between the past timestamp when the client device was successfully authenticated and the current timestamp; and in response to the authentication request, authenticating the client device, by the processor, based at least in part on the estimated trip time being less than a difference between the past timestamp when the client device was successfully authenticated and the current timestamp. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A method for user authentication, the method comprising:
-
establishing a network connection between a client device and a first host machine and between the client device and a second host machine; receiving, by one or more processors, an authentication request from the client device; measuring, by the one or more processors, a first round trip time (RTT) between the first host machine and the client device; measuring, by the one or more processors, a second RTT between the second host machine and the client device; determining, by the one or more processors, a geographical location of the client device based at least in part on the first RTT and the second RTT; determining, by the one or more processors, whether the geographical location of the client device is within a trusted tolerance geographical area; and in response to the authentication request, authenticating the client device, by the processor, based at least in part on the determination that the geographical location of the client device is within the trusted tolerance geographical area. - View Dependent Claims (20)
-
Specification