摘要 |
<p>Technologies are generally described for a location-based authentication scheme. In some examples, a method performed under control of a server may include receiving a first notification of a first use of an application, determining a first location of a first device corresponding to the first use, receiving a second notification of a second use of the application, determining a second location of a second device corresponding to the second use, determining whether the second location is within a predetermined range from the first location, and enabling execution of the second use in response to determining that the second location is within the predetermined range from the first location.</p> |