Secure access to a network resource running on a computer or server, is
provided by a method that compares the current physical location of a
network access terminal through which a user is attempting to access the
network resource, and the current physical location of a mobile terminal
on the person of the user who is authorized to access the network
resource. If the locations different, then access is denied.