METHOD AND SYSTEM FOR AUTHENTICATING INTERNET USER IDENTITY
First Claim
1. A method of authenticating an internet user identity, comprising the steps of:
- a. identifying an Internet Protocol address of such internet user;
b. tracing a first geographical location corresponding to said Internet Protocol address of such internet user;
c. updating a cached pre-transaction position of a communication voice device of such internet user;
d. determining whether said cached position is stale based upon a predetermined criteria;
e. determining a second location of said communication voice device based on said cached pre-transaction position if said cached pre-transaction position is not stale;
f. determining a third location of said communication voice device based on a requested position if said cached pre-transaction position is stale;
g. determining whether said first and second locations match in geographical proximity if said cached pre-transaction position is not stale;
h. determining a third location of said communication voice device based on the requested position if said first location does not match in geographical proximity with said second location;
i. determining whether said first and third locations match in geographical proximity if said first location does not match in geographical proximity with said second location; and
j. generating an alert if said first and third locations do not match in geographical proximity.
0 Assignments
0 Petitions
Accused Products
Abstract
A method and system for authenticating an internet user identity by cross-referencing and comparing at least two independent sources of information. A first IP address of an internet user is identified and the geographical location of the first IP address is traced to determine a first location. The geographical-location of a communication voice device of said internet user is identified to determine a second location. The first and second locations are compared for geographical proximity to confirm the identity of the internet user. Based upon geographical proximity of said locations, a score is assigned to the internet user, and access to a website is allowed or limited based upon said score. Alternatively, additional authentication information can be required or access can be terminated. Geographical information is maintained in an updatable cache.
-
Citations
3 Claims
-
1. A method of authenticating an internet user identity, comprising the steps of:
-
a. identifying an Internet Protocol address of such internet user; b. tracing a first geographical location corresponding to said Internet Protocol address of such internet user; c. updating a cached pre-transaction position of a communication voice device of such internet user; d. determining whether said cached position is stale based upon a predetermined criteria; e. determining a second location of said communication voice device based on said cached pre-transaction position if said cached pre-transaction position is not stale; f. determining a third location of said communication voice device based on a requested position if said cached pre-transaction position is stale; g. determining whether said first and second locations match in geographical proximity if said cached pre-transaction position is not stale; h. determining a third location of said communication voice device based on the requested position if said first location does not match in geographical proximity with said second location; i. determining whether said first and third locations match in geographical proximity if said first location does not match in geographical proximity with said second location; and j. generating an alert if said first and third locations do not match in geographical proximity.
-
-
2. A method of authenticating an internet user identity, the method comprising cross-referencing and comparing at least two independent sources of information, the independent sources of information comprising at least two of:
-
a. a geographical location associated with an Internet Protocol address of the internet user'"'"'s computer; b. a geographical location of the internet user; c. a geographical location of a router associated with such internet user'"'"'s computer; d. a geographical location of a communication voice device associated with said internet user; e. a geographical location of a WiFi unique ID associated with such internet user'"'"'s computer; f. a geographical location of a WiMax unique ID associated with such internet user'"'"'s computer; and g. a geographical location of a wireless terminal associated with such internet user; h. wherein at least one of said independent sources of information further comprises; i. updating a cached position of one said independent source of information of said independent sources of information; ii. determining whether said cached position is stale based upon a predetermined time period; iii. determining a second location of said one independent source of information based on said cached pre-transaction position if said cached pre-transaction position is not stale; iv. determining a third location of said one independent source of information based on a requested position if said cached pre-transaction position is stale; v. determining whether said first and second locations match in geographical proximity if said cached pre-transaction position is not stale; vi. determining a third location of said one independent source of information based on the requested position if said first location does not match in geographical proximity with said second location; vii. determining whether said first and third locations match in geographical proximity if said first location does not match in geographical proximity with said second location; and viii. generating an alert if said first and third locations do not match in geographical proximity.
-
-
3. An internet user authentication method comprising comparing a geographic location of an internet user IP Address and a geographical location of a communication voice device of such user wherein said communication voice device utilizes wireless technology, said user authentication method further comprising the steps of:
-
a. identifying said Internet Protocol address of such internet user; b. tracing a first geographical location corresponding to said Internet Protocol address of such internet user; c. updating a cached pre-transaction position of said communication voice device of such internet user; d. determining whether said cached position is stale based upon a predetermined time period; e. determining a second location of said communication voice device based on said cached pre-transaction position if said cached pre-transaction position is not stale; f. determining a third location of said communication voice device based on a requested position if said cached pre-transaction position is stale; g. determining whether said first and second locations match in geographical proximity if said cached pre-transaction position is not stale; h. determining a third location of said communication voice device based on the requested position if said first location does not match in geographical proximity with said second location; i. determining whether said first and third locations match in geographical proximity if said first location does not match in geographical proximity with said second location; and j. generating an alert if said first and third locations do not match in geographical proximity.
-
Specification