* 9. You know when the user's identity has been stolen, the hacker can simply login to the victim's account. Now, I am working on a system that prevents the hacker from logging even he has the right username and password. The geographic data of the user have been used in order to link his account with his location using GPS (the system will not determine the user's position by his IP because it might be stolen), so anyone else will not be able to login his account even the username and password are the same. The user can change his location when travel or moving, and this method can be supported in different systems of institutions to prevent the employees to login from outside the building. Do you think that this system will increase the security percentage of different electronic systems?
|