GEOACL

  Control Over Where And How much Access Allowed

  HOME » SOLUTIONS » ARCHITECTURE

ARCHITECTURE

How GEOACL Process Works

GEOACL Solution is Simple and very easy to use. Carefully engineered And deployed Services provide robust security solution for vast spectrum of industries and applications.

Online/Network based Access

1. User Begins Authentication Session
The user begins the authentication session via his or her Internet session or corporate network. A server handling that authentication request sends an encrypted request to a GEOACL server. The message contains the user's location details, his account id with GEOACL, access level requested and other application specific instructions.


2. Optional Out-of-Band Authentication in Process
GEOACL's Server sends email to user's designated secure email account. Email contains instruction for user to verify the authenticity of access request and acknowledge it.

3. Out-of-Band Authentication is Completed
The user acknowledges the transaction. The location from which user acknowledged the transaction is recorded. The session is recorded, creating a solid audit trail and serving as a powerful deterrent to unauthorized users.

4. User is Verified
A match between request location, valid locations for requested access level and optional acknowledgement location confirms that a specified user is a valid user trying to access account/resource from valid location for requested access level. GEOACL sends the results of the authentication session back to the requesting server and optional alerts to users.

The user has been authenticated.

Retail Merchant Authorizations

1. User Begins Authentication Session
User does some purchases at retail location and presents his credit card for payment. Merchant POS Terminal captures payment details and sends it to payment processing network for authorization. With it also goes the identification information of the merchant POS Terminal. This POS Terminal identification information which will give location from where user is trying to use his credit card. Authentication Server will forward user account id, payment amount and location details to GEOACL Server for authorization.

2. User is Verified
A match between request location, valid locations for credit card usage and payment amount charged being less than allowed payment limit for given request location confirms that a specified user is a valid user trying to use credit card from valid location for requested charge amount. GEOACL sends the results of the authentication session back to the requesting server and optional alerts to users.

The user has been authenticated.