METHOD FOR DETECTING MISUSE OF IDENTITY IN ELECTRONIC TRANSACTIONS
First Claim
1. A method of monitoring the use of an identity associated with a user, independently of the ability of the user'"'"'s wireless terminal to pick up GPS signals at the time of a transaction, comprising:
- (a) associating a user identity with a wireless terminal;
(b) receiving a notification to authenticate the use of the identity at a first location;
(c) obtaining from the wireless terminal a post-transaction second location of the wireless terminal, where the GPS signals are not strong enough to determine the wireless terminal location and wherein the post-transaction second location is identified via detection of a Wi-Fi unique ID corresponding with a known location;
(d) determining whether the first and second locations match in geographical proximity;
(e) generating an alert if the first and second locations do not match in geographical proximity; and
(f) communicating the alert to a predetermined device.
1 Assignment
0 Petitions
Accused Products
Abstract
The invention provides methods for determining whether a transaction has taken place in geographic proximity to a wireless device. Upon receiving a notification to authenticate the use of an identity at a transaction location, where the identity is associated with a wireless terminal, the method determines an approximate location of the wireless terminal based on cached position information, GPS location, cellular geo-location, and/or Wi-Fi geolocation, and determines whether one or more of these is in geographic proximity to the location of the transaction.
-
Citations
20 Claims
-
1. A method of monitoring the use of an identity associated with a user, independently of the ability of the user'"'"'s wireless terminal to pick up GPS signals at the time of a transaction, comprising:
-
(a) associating a user identity with a wireless terminal; (b) receiving a notification to authenticate the use of the identity at a first location; (c) obtaining from the wireless terminal a post-transaction second location of the wireless terminal, where the GPS signals are not strong enough to determine the wireless terminal location and wherein the post-transaction second location is identified via detection of a Wi-Fi unique ID corresponding with a known location; (d) determining whether the first and second locations match in geographical proximity; (e) generating an alert if the first and second locations do not match in geographical proximity; and (f) communicating the alert to a predetermined device. - View Dependent Claims (4, 5, 6, 9, 10, 11, 19)
-
-
2. A method of monitoring the use of an identity associated with a user, independently of the ability of the user'"'"'s wireless terminal to pick up GPS signals at the time of a transaction, comprising:
-
(a) associating the user identity with a wireless terminal; (b) receiving a notification to authenticate the use of the identity at a first location; (c) obtaining a pre-transaction second location of the wireless terminal based on cached position information stored on the wireless terminal, if the cached position information is available;
otherwise(d) obtaining from the wireless terminal a post-transaction second location of the wireless terminal, where the GPS signals are not strong enough to determine the wireless terminal location and wherein the post-transaction location is identified via detection of a Wi-Fi unique ID corresponding with a known location; (e) determining whether the first location and the second location match in geographical proximity; (f) generating an alert if the first location and the second location do not match in geographical proximity; and (g) communicating the alert to a predetermined device. - View Dependent Claims (7, 8, 12, 13, 14, 15, 16, 17, 18, 20)
-
-
3. A method of monitoring the use of an identity associated with a user, independently of the ability of the user'"'"'s wireless terminal to pick up GPS signals at the time of a transaction, comprising:
-
(a) associating a user identity with a wireless terminal; (b) receiving a notification to authenticate the use of the identity at a first location; (c) obtaining from the wireless terminal a post-transaction second location of the wireless terminal, where the GPS signals are not strong enough to determine the wireless terminal location and wherein the post-transaction second location is identified via detection of a Wi-Fi unique ID corresponding with a known location; (d) determining whether the first and second locations match in geographical proximity; (e) if the first and second locations do not match in geographical proximity, obtaining a post-transaction third location of the wireless terminal; and (f) generating an alert if the first and third locations do not match in geographical proximity; and (g) communicating the alert to a predetermined device.
-
Specification