Method and system for authenticating use of item
2 Assignments
0 Petitions
Accused Products
Abstract
A method for facilitating the detection of misuse of an identity during an electronic transaction. The invention comprises at least five embodiments. In a first embodiment, the method comprises the step of: receiving a notification to authenticate the use of an identity at a first location, wherein the identity is associated with a first wireless terminal; determining an approximate location of the first wireless terminal based on cached position information, the approximate location of the first wireless terminal being a second location; determining whether the first and second locations match in geographical proximity; and generating an alert if the first and second locations do not match in geographical proximity. In a second embodiment, an approximate location of the first wireless terminal is determined based on cached position information stored on a GPS position database.
34 Citations
66 Claims
-
1-46. -46. (canceled)
-
47. A method to assess authorization for use of an item at a first location by an identity, comprising the steps of:
-
updating a position database to cache a pre-use position of a first wireless terminal; receiving a notification to authenticate the use of the item at the first location, wherein the identity is associated with the first wireless terminal; determining whether the position database is stale based on a predetermined time period; determining a second location of the first wireless terminal based on the cached pre-use position if the position database is not stale; determining a third location if the position database is stale; determining whether the first and second locations match in geographical proximity; authenticating use if the first location matches in geographical proximity with the second location; generating an alert if the first and second locations do not match in geographical proximity. determining whether the first and third locations match in geographical proximity; authenticating use if the first location matches in geographical proximity with the third location; and generating an alert if the first and third locations do not match in geographical proximity. - View Dependent Claims (48, 49, 50, 51, 52, 53, 54, 55)
-
-
56. A method to assess authorization for use of an item by an identity at a first location, comprising the steps of:
-
updating a position database to cache a pre-use position of a first wireless terminal; receiving a notification to authenticate the use of an item at the first location for an identity, wherein the identity is associated with a first wireless terminal; determining a second location by accessing the pre-use position database; determining whether the first and second locations match in geographical proximity; authenticating use if the first and second locations match in geographical proximity providing a known location associated with the identity if the first and second locations do not match in geographical proximity; authenticating use if the first and known locations match in geographical proximity; and generating an alert if the first and known locations do not match in geographical proximity. - View Dependent Claims (57, 58, 59, 60, 61, 62, 63, 64, 65, 66)
-
Specification