A method for controlling access to a target application in accordance with
an exemplary embodiment is provided. The method includes determining
whether a user is within a predetermined distance from at least one
predetermined base device. The method further includes determining
whether the predetermined base device is within a predetermined
geographical region. The method further includes receiving user access
information associated with the user and authenticating the user access
information. The method further includes authorizing a user computer only
when the user is within the predetermined distance from the predetermined
base device, and the predetermined base device is within the
predetermined geographical region, and the user access information
corresponds to predetermined user access information associated with the
user. The method further includes allowing the user computer to access
the target application when the user computer has been authorized.