Method and system for monitoring electronic purchases and cash-withdrawals
First Claim
1. A method for facilitating the detection of misuse of an identity during an electronic transaction at a first location, comprising the steps of:
- receiving a notification to authenticate the use of an identity at the first location, wherein the identity is associated with a first wireless terminal;
determining an approximate location of the first wireless terminal based on a cached pre-transaction position, the approximate location of the first wireless terminal being a second location;
determining whether the first and second locations match in geographical proximity; and
generating an alert if the first and second locations do not match in geographical proximity.
5 Assignments
0 Petitions
Accused Products
Abstract
A method for facilitating the detection of misuse of an identity during an electronic transaction. The invention comprises at least five embodiments. In a first embodiment, the method comprises the step of: receiving a notification to authenticate the use of an identity at a first location, wherein the identity is associated with a first wireless terminal; determining an approximate location of the first wireless terminal based on cached position information, the approximate location of the first wireless terminal being a second location; determining whether the first and second locations match in geographical proximity; and generating an alert if the first and second locations do not match in geographical proximity. In a second embodiment, an approximate location of the first wireless terminal is determined based on cached position information stored on a GPS position database.
178 Citations
46 Claims
-
1. A method for facilitating the detection of misuse of an identity during an electronic transaction at a first location, comprising the steps of:
-
receiving a notification to authenticate the use of an identity at the first location, wherein the identity is associated with a first wireless terminal;
determining an approximate location of the first wireless terminal based on a cached pre-transaction position, the approximate location of the first wireless terminal being a second location;
determining whether the first and second locations match in geographical proximity; and
generating an alert if the first and second locations do not match in geographical proximity. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30)
-
-
31. A method for facilitating the detection of misuse of an identity during an electronic transaction, comprising the steps of:
-
receiving a notification to authenticate the use of an identity at a first location, wherein the identity is associated with a first wireless terminal;
determining an approximate location of the first wireless terminal based on cached position information stored on a GPS position database, the approximate location of the first wireless terminal being a second location;
determining whether the first and second locations match in geographical proximity; and
generating an alert if the first and second locations do not match in geographical proximity. - View Dependent Claims (32, 33, 34, 35, 36, 37)
-
-
38. A method for facilitating the detection of misuse of an identity during an electronic transaction, comprising the steps of:
-
receiving a notification to authenticate the use of an identity at a first location, wherein the identity is associated with a first wireless terminal;
determining a second location, wherein the second location is the location of the first wireless terminal, and wherein the second location is determined by accessing a position database, wherein the position database is used for caching the most recent location of the first wireless terminal;
determining whether the first and second locations match in geographical proximity;
determining a post-transaction location of the first wireless terminal if the first and second locations do not match in geographical proximity, the post-transaction location of the first wireless terminal being a third location; and
generating an alert if;
(1) the first and second locations do not match in geographical proximity and (2) the first and third locations do not match in geographical proximity. - View Dependent Claims (39, 40, 41, 42, 43, 44, 45, 46)
-
Specification