Contact Project Developer Ashish D. Tiwari []
Download Synopsis Abstract
Mobile Apps Java Android Computer Graphics BE-Engineering(CO/IT) ME-Engineering(CO/IT) BCS MCS BCA MCA MCM BSC Computer/IT MSC Computer/IT Diploma (CO/IT) IEEE-2016

An Exploration of Geographic Authentication Schemes

Geographic authentication schemes can be explained by our project geo authentication

An Exploration of Geographic Authentication Schemes


We design and explore the usability and security of two geographic authentication schemes: GeoPass and GeoPass- Notes. GeoPass requires users to choose a place on a digital map to authenticate with (a location password). GeoPassNotes—an extension of GeoPass—requires users to annotate their location password with a sequence of words that they can associate with the location (an annotated location password). In GeoPassNotes, users are authenticated by correctly entering both a location and an annotation. We conducted user studies to test the usability and assess the security of location passwords and annotated location passwords. The results indicate that both variants are highly memorable, and that annotated location passwords may be more advantageous than location passwords alone due to their increased security and the minimal usability impact introduced by the annotation.

 Geographic authentication schemes can be explained by our project geo authentication. In which the remembrance of password and password hacking can be overcome by choosing a place on the google map and set it as a password for further authentication which also contains a Geo notes followed by geo pass which is nothing but the description about the place which the user wish about the place.

The project also includes location privacy saying how the location is shared without the interference of the third party which can be done by encryption and decryption techniques where the user encrypt his location and send that location to the user and separately send password in the password share module to the email service if only if the admin is having the password he can decrypt the users location. Thus made the whole process as secured and implemented location privacy. A demo for this can be given with the following scenario, .A Company which promotes green commuting and wellness may reward their employees who walk or bike to work. The company may encourage daily walking goals of some fixed number of miles. Employees need to prove their past commuting paths to the company along with time history. This helps the company in reducing the healthcare insurance rates and move towards sustainable lifestyle. Location can be shared secretly to others without the interference of third party.

The user module consists of four category .They are:

·       My Location

·       Route

·       Sharing location

·       Sharing Password

In the location the user can find his current location. And in the route the user can find his route to his destination place. The share it module is used to share user position to admin for further processing .Where the location is shared secretly with the admin by AES encryption and decryption method with a password.


In the registration the user has two registration modules they are geo registration and app registration. Without geo registration he can’t share his location to admin thus made it clear that anyone can’t share his location without the knowledge of the user if only if the geo authentication password is known the location can be shared made the system as perfectly protected.

The admin module again consists of three categories they are:

·       User details

·       Location details

·       Sending SMS

In the user details the admin can view the registered user details. And in the location details the location of the user will be displayed which will be revealed only when the admin is able to decrypt the encrypted data with the same password which the user has used to encrypt the data. When the admin decrypt the data he will be able to see the time, date, user name and the location of the user. For decryption he needs a password which is used by the user, the user sends he password to the user through email, from there admin can view the password and utilize it for decryption. Further the admin can verify the distance of the user from the office location. On determining the distance if it is of minimum distance the admin will encourage the user to come by walk or to take bicycle to reach office or the user can be provided with any gift voucher by doing this the company will get reduced of health insurance issues. Thus the user can share his location proof secretly with admin and the admin too use his distance for office sake.


Passwords have well-known problems relating to their memorability and vulnerability to being easily guessed by an adversary. The security problems with passwords appear to be even worse than previously believed. To ensure security requirements are met, unusable password policies are implemented that cause an increasing burden on users. When passwords are forgotten, many systems rely on secondary authentication such as challenge (or “personal knowledge”) questions for resetting his or her password. Unfortunately, such methods also appear to offer questionable security. These issues motivate new user authentication strategies that have improved memorability and security.

Location privacy is an extremely important factor that needs to be taken into consideration when designing any location based systems. Revealing both identity and location information to an untreated party poses threats to a mobile users. Today's location-based services solely rely on users' devices to determine their location, e.g., using GPS.

Comment is Only Available for registered users! Create Account or Login Now!