Authentication System Using Location Information on iPad or Smartphone

In the mobile computing industry, Smartphones and iPads have emerged as realistic substitutes for notebook computers. For example, the iPad is designed to support a variety of media, including video, sound, and websites. It is different from a cell phone in that it has the ability to use rich e-learning content. However, the iPad does not include special structures for user authentication. For example, it does not have a camera or a device for fingerprint authentication. The purpose of this paper is to explain how to perform effective personal authentication using the built-in capabilities of the iPad or Smartphone.

Provided by: International Journal of Computer Theory and Engineering (IJCTE) Topic: Mobility Date Added: Apr 2012 Format: PDF

Find By Topic