LOCATION BASED FRAUD REDUCTION SYSTEM AND METHOD
1 Assignment
0 Petitions
Accused Products
Abstract
Embodiments of the present invention provide for reduction of the likelihood of fraud by having at least one of an identifier of a location from where a request is submitted or information that can lead to identification of the location, submitted with or in addition to a request. Then, determination is made whether to service the request, based at least in part on the location from where the request is submitted or processed. In various embodiments, the location may be compared against predetermined permissible location(s) or a current user location. The request may be a request to conduct a transaction, access data, access a physical or informational resource, or access a secured area.
35 Citations
44 Claims
-
1-20. -20. (canceled)
-
21. A method for detecting fraud in a transaction, the method comprising:
-
receiving by a request processor a request for a first entity to conduct a transaction with a second entity, wherein the first entity and the second entity are not present in the same location; detecting by the request processor a position of a payment device to be used by the first entity to conduct the transaction; determining by the request processor whether the position corresponds to a permissible or impermissible use area for the first entity to conduct the transaction; and permitting by the request processor the transaction to continue if it is determined that the position corresponds to a permissible use area. - View Dependent Claims (22, 23, 24, 25, 26, 27)
-
-
28. A request processing method with reduced likelihood of fraud, comprising a request processor:
-
receiving a request submitted via a device to conduct a transaction, access data, access a physical or informational resource, or access a secured area; receiving from the device a location identifier indicating a location where the request is submitted or information that can lead to identification of the location where the request is submitted; determining whether the location corresponds to a permissible or impermissible use area for the first entity to conduct the transaction, access the data, access the physical or informational resource, or access the secured area; and determining whether to service the request based at least in part on the received location identifier or information and if it is determined that the location corresponds to a permissible use area.
-
-
29. A request processing method with reduced likelihood of fraud, comprising a request processor:
-
receiving from a device a first location identifier indicating a first location of the device at a first time; receiving at a second time a request submitted via the device to conduct a transaction, access data, access a physical or informational resource, or access a secured area; receiving from the device at the second time a second location identifier indicating a second location of the device at the second time; and determining whether to service the request based at least in part on whether the second location is permissible based on the device being present at the first location at the first time and being present at the second location at the second time. - View Dependent Claims (30, 31, 32, 33, 34, 35, 36)
-
-
37. A request processing method with reduced likelihood of fraud, comprising a request processor:
-
receiving from a position sensing device a first location identifier indicating a first location of the position sensing device at a first time; receiving at a second time a request to conduct a transaction, access data, access a physical or informational resource, or access a secured area via another device associated with the position sensing device; receiving from the position sensing device at the second time a second location identifier indicating a second location of the position sensing device at the second time; and determining whether to service the request based at least in part on whether the second location is permissible based on the position sensing device being present at the first location at the first time and being present at the second location at the second time. - View Dependent Claims (38, 39, 40, 41, 42, 43, 44)
-
Specification