SYSTEM AND METHOD FOR LOCATING A MOBILE SUBSCRIBER TERMINAL WHEN ROAMING
First Claim
1. A method of authorizing a transaction, said method comprising the steps of:
- receiving a request to authorize a transaction being conducted at a point-of-sale (POS);
acquiring purchaser data from the request;
transmitting a request to locate the purchaser and receiving location data indicating a location of the purchaser in response thereto;
storing the purchaser location;
comparing a POS location with the purchaser location; and
authorizing or denying the transaction based on the step of comparing.
1 Assignment
0 Petitions
Accused Products
Abstract
The location of a mobile subscriber roaming outside a home network may be used to authorize a transaction initiated by the mobile subscriber or to authenticate the mobile subscriber when signing into secure accounts. The location of the mobile subscriber is determined by providing a unique mobile subscriber identifier, such as the MSISDN, to an application that communicates with the home network and the roaming network. By communicating with the roaming network, the application can determine the current location of the roaming mobile subscriber terminal with location resolution down to the specific cell in which the mobile subscriber terminal is located. The location of the mobile subscriber terminal may be saved locally in a database associated with an authorization entity, thereby advantageously reducing the number of location look-ups requested by the authorization entity.
65 Citations
20 Claims
-
1. A method of authorizing a transaction, said method comprising the steps of:
-
receiving a request to authorize a transaction being conducted at a point-of-sale (POS); acquiring purchaser data from the request; transmitting a request to locate the purchaser and receiving location data indicating a location of the purchaser in response thereto; storing the purchaser location; comparing a POS location with the purchaser location; and authorizing or denying the transaction based on the step of comparing. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method of authenticating a user for access to a secure account, comprising the steps of:
-
receiving a request to access the secure account from an IP address associated with the user; transmitting a request to locate the user and receiving location data indicating a location of the user in response thereto; storing the user location; comparing a location associated with the IP address with the location of the user; and authorizing or denying the access based on the step of comparing. - View Dependent Claims (7, 8, 9)
-
-
10. A method of locating a user of a wireless communication device who has roamed out of network, comprising the steps of:
-
receiving an identifier of a mobile switching center (MSC ID) that is serving the user out of network; transmitting a request for user location data to the mobile switching center, the request including an identifier of the wireless communication device; and determining a location of the user based on the user location data received from the mobile switching center. - View Dependent Claims (11, 12, 13, 14, 15)
-
-
16. A non-transitory computer readable storage medium comprising instructions to be executed in a computing device to carry out a method of locating a user of a wireless communication device who has roamed out of network, said method comprising the steps of:
-
receiving an identifier of a mobile switching center (MSC ID) that is serving the user out of network; transmitting a request for user location data to the mobile switching center, the request including an identifier of the wireless communication device; and determining a location of the user based on the user location data received from the mobile switching center. - View Dependent Claims (17, 18, 19, 20)
-
Specification