Authentication System Using Location Information on iPad or Smartphone

Free registration required

Executive Summary

In the mobile computing industry, Smartphones and iPads have emerged as realistic substitutes for notebook computers. For example, the iPad is designed to support a variety of media, including video, sound, and websites. It is different from a cell phone in that it has the ability to use rich e-learning content. However, the iPad does not include special structures for user authentication. For example, it does not have a camera or a device for fingerprint authentication. The purpose of this paper is to explain how to perform effective personal authentication using the built-in capabilities of the iPad or Smartphone.

  • Format: PDF
  • Size: 889.6 KB