System and method for verifying access based on a determined geographic location of a subscriber of a service provided via a computer network
First Claim
1. A system for verifying access to a network based on geographic location of a subscriber of a service provided over a computer network, the system comprising:
- a subscriber computer physically located in a geographic location;
a service computer providing a subscription service to the subscriber computer via a network, wherein the subscription service is limited based on the geographic location of the subscriber computer; and
an event interface coupled to the service computer, wherein the event interface receives event information for a rules based event either as the rules based event is occurring or as the rules based event is requested, as applicable, wherein the subscription service includes communicating event information to the subscriber computer, wherein the service computer verifies access by the subscriber computer to the subscription service based on the geographic location of the subscriber computer, wherein the geographic location of the subscriber computer is estimated using a first estimation process and, if the first estimation process produces an estimate having a confidence level below a determined threshold, a second estimation process.
2 Assignments
0 Petitions
Accused Products
Abstract
A system and method relates to limiting the presentation of rules based events based on the geographic location of computer users attempting to view the rules based event via a network. The method includes receiving over a network a request to view a rules based event at a computer, obtaining a first estimate of geographic location of the computer where the first estimate of geographic location includes a first confidence determination, and obtaining a second estimate of geographic location of the computer if the first confidence determination is less than an established confidence level. The first and second estimates of geographic location define a composite estimated geographic location of the computer. The method further includes retrieving information on a geographic location of the rules based event, comparing the retrieved information on the geographic location of the rules based event, with the composite estimated geographic location of the computer, and providing access to the rules based event based on access rules and the comparison of the retrieved information on the geographic location of the rules based event and the estimated geographic location of the computer. The system and method can also apply to promotions, sweepstakes, contests, fantasy games, sale of goods and/or services, and targeted advertising.
-
Citations
28 Claims
-
1. A system for verifying access to a network based on geographic location of a subscriber of a service provided over a computer network, the system comprising:
-
a subscriber computer physically located in a geographic location;
a service computer providing a subscription service to the subscriber computer via a network, wherein the subscription service is limited based on the geographic location of the subscriber computer; and
an event interface coupled to the service computer, wherein the event interface receives event information for a rules based event either as the rules based event is occurring or as the rules based event is requested, as applicable, wherein the subscription service includes communicating event information to the subscriber computer, wherein the service computer verifies access by the subscriber computer to the subscription service based on the geographic location of the subscriber computer, wherein the geographic location of the subscriber computer is estimated using a first estimation process and, if the first estimation process produces an estimate having a confidence level below a determined threshold, a second estimation process. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method of limiting the presentation of rules based events based on the geographic location of computer users attempting to view the rules based events via a network, the method comprising:
-
receiving over a network a request to view a rules based event at a computer;
obtaining a first estimate of geographic location of the computer, wherein the first estimate of geographic location includes a first confidence determination;
obtaining a second estimate of geographic location of the computer if the first confidence determination is less than an established confidence level, the first and second estimates of geographic location defining a composite estimated geographic location of the computer;
retrieving information on a geographic location of the rules based event;
comparing the retrieved information on the geographic location of the rules based event with the composite estimated geographic location of the computer; and
providing access to the rules based event based on access rules and the comparison of the retrieved information on the geographic location of the rules based event and the estimated geographic location of the computer. - View Dependent Claims (12, 13, 14, 15, 16, 17)
-
-
18. A method of determining the geographic location of a subscriber of a service provided over a computer network, the method comprising:
-
obtaining a first estimate of geographic location of a subscriber computer, wherein the first estimate of geographic location includes a first confidence factor;
performing an address verification operation if the first confidence factor does not exceed a first threshold, wherein the address verification operation results in a second estimate of geographic location of the subscriber computer, wherein the second estimate of geographic location includes a second confidence factor; and
applying blackout rules to the subscriber computer based on a rules based event selected at the subscriber computer and the first estimate of geographic location, if the first confidence factor exceeds the first threshold, or the second estimate of geographic location, if the second confidence factor exceeds a second threshold and the first confidence factor does not exceed the first threshold. - View Dependent Claims (19, 20, 21, 22, 23, 24, 25, 26, 27, 28)
-
Specification