Method for Authenticating Use of an Activity Tracking Device
First Claim
1. A data processor implemented method for authenticating use of an activity tracking device by a user, the method comprising:
- obtaining a plurality of first markers, each of the first markers including a location and time-stamp of the activity tracking device when the activity tracking device is tracking at least one parameter of the user;
obtaining a plurality of second markers from a transaction data storage, each of the second markers including a location and time-stamp of an electronic transaction made by the user using at least one payment device of the user;
comparing the locations of the plurality of first markers with the locations of the plurality of second markers; and
determining, based on the comparison, whether the activity tracking device is regularly in use by the user.
1 Assignment
0 Petitions
Accused Products
Abstract
A data processor implemented method for authenticating use of an activity tracking device by a user is provided. The method includes obtaining a plurality of first markers, wherein each of the first markers includes a location and time-stamp of the activity tracking device when the activity tracking device is tracking at least one parameter of the user. The method also includes obtaining a plurality of second markers from a transaction data storage, wherein each of the second markers includes a location and time-stamp of an electronic transaction made by the user using at least one payment device of the user. The method further includes comparing the locations of the plurality of first markers with the locations of the plurality of second markers, and determining, based on the comparison, whether the activity tracking device is regularly in use by the user.
5 Citations
36 Claims
-
1. A data processor implemented method for authenticating use of an activity tracking device by a user, the method comprising:
-
obtaining a plurality of first markers, each of the first markers including a location and time-stamp of the activity tracking device when the activity tracking device is tracking at least one parameter of the user; obtaining a plurality of second markers from a transaction data storage, each of the second markers including a location and time-stamp of an electronic transaction made by the user using at least one payment device of the user; comparing the locations of the plurality of first markers with the locations of the plurality of second markers; and determining, based on the comparison, whether the activity tracking device is regularly in use by the user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A non-transitory computer readable storage medium embodying thereon a program of computer readable instructions which, when executed by one or more processors of a first server in communication with at least one other server, cause the first server to perform a method for authenticating use of an activity tracking device by a user, the method including:
-
obtaining a plurality of first markers, each of the first markers including a location and time-stamp of the activity tracking device when the activity tracking device is tracking at least one parameter of the user; obtaining a plurality of second markers from a transaction data storage, each of the second markers including a location and time-stamp of an electronic transaction made by the user using at least one payment device of the user; comparing the locations of the plurality of first markers with the locations of the plurality of second markers; and determining, based on the comparison, whether the activity tracking device is regularly in use by the user.
-
-
11. (canceled)
-
12. (canceled)
-
13. (canceled)
-
14. (canceled)
-
15. (canceled)
-
16. (canceled)
-
17. (canceled)
-
18. (canceled)
-
19. A non-transitory computer readable storage medium embodying thereon a program of computer readable instructions which, when executed by one or more processors of a mobile device in communication with at least one other server, cause the mobile device to perform a method for authenticating use of an activity tracking device by a user, the method including:
-
obtaining a plurality of first markers, each of the first markers including a location and time-stamp of the activity tracking device when the activity tracking device is tracking at least one parameter of the user; obtaining a plurality of second markers from a transaction data storage, each of the second markers including a location and time-stamp of an electronic transaction made by the user using at least one payment device of the user; comparing the locations of the plurality of first markers with the locations of the plurality of second markers; and determining, based on the comparison, whether the activity tracking device is regularly in use by the user.
-
-
20. (canceled)
-
21. (canceled)
-
22. (canceled)
-
23. (canceled)
-
24. (canceled)
-
25. (canceled)
-
26. (canceled)
-
27. (canceled)
-
28. A system for authenticating use of an activity tracking device by a user, the system comprising:
-
at least one activity tracking device configured to track at least one parameter of the user; a first server configured to store a plurality of first markers, each of the first markers including a location and time-stamp of the activity tracking device when the activity tracking device is tracking at least one parameter of the user; a transaction data storage configured to store a plurality of second markers, each of the second markers including a location and time-stamp of an electronic transaction made by the user using at least one payment device of the user; and a second server configured to compare the locations of the plurality of first markers with the locations of the plurality of second markers, and based on the comparison, determining whether the activity tracking device is regularly in use by the user. - View Dependent Claims (29, 30, 31, 32, 33, 34, 35, 36)
-
Specification