Method and system for monitoring electronic purchases and cash-withdrawals
First Claim
1. A method for facilitating the detection of misuse of an identity during an electronic transaction at a first location, comprising the steps of:
- updating a cached position of a first wireless terminal;
receiving a notification to authenticate the use of an identity at the first location, wherein the identity is associated with the first wireless terminal;
determining whether a cached position is stale based on a predetermined time period;
determining a second location of the first wireless terminal based on the cached pre-transaction position if the cached pre-transaction position is not stale;
determining a third location of the first wireless terminal based on a requested position if the cached pre-transaction position is stale;
determining whether the first and second locations match in geographical proximity;
determining a third location of the first wireless terminal based on the requested position if the first location does not match in geographical proximity with the second location;
determining whether the first and third locations match in geographical proximity; and
generating an alert if the first and third locations do not match in geographical proximity.
5 Assignments
0 Petitions
Accused Products
Abstract
A method for facilitating the detection of misuse of an identity during an electronic transaction. The invention comprises at least five embodiments. In a first embodiment, the method comprises the step of: receiving a notification to authenticate the use of an identity at a first location, wherein the identity is associated with a first wireless terminal; determining an approximate location of the first wireless terminal based on cached position information, the approximate location of the first wireless terminal being a second location; determining whether the first and second locations match in geographical proximity; and generating an alert if the first and second locations do not match in geographical proximity. In a second embodiment, an approximate location of the first wireless terminal is determined based on cached position information stored on a GPS position database.
-
Citations
36 Claims
-
1. A method for facilitating the detection of misuse of an identity during an electronic transaction at a first location, comprising the steps of:
-
updating a cached position of a first wireless terminal; receiving a notification to authenticate the use of an identity at the first location, wherein the identity is associated with the first wireless terminal; determining whether a cached position is stale based on a predetermined time period; determining a second location of the first wireless terminal based on the cached pre-transaction position if the cached pre-transaction position is not stale; determining a third location of the first wireless terminal based on a requested position if the cached pre-transaction position is stale; determining whether the first and second locations match in geographical proximity; determining a third location of the first wireless terminal based on the requested position if the first location does not match in geographical proximity with the second location; determining whether the first and third locations match in geographical proximity; and generating an alert if the first and third locations do not match in geographical proximity. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23)
-
-
24. A method for facilitating the detection of misuse of an identity during an electronic transaction, comprising the steps of:
-
updating a position database to cache a location of a first wireless terminal; receiving a notification to authenticate the use of an identity at a first location, wherein the identity is associated with a first wireless terminal; determining a second location, wherein the second location is the location of the first wireless terminal, and wherein the second location is determined by accessing the position database; determining whether the first and second locations match in geographical proximity; determining a post-transaction location of the first wireless terminal if the first and second locations do not match in geographical proximity, the post-transaction location of the first wireless terminal being a third location; and generating an alert if;
(1) the first and second locations do not match in geographical proximity and (2) the first and third locations do not match in geographical proximity. - View Dependent Claims (25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36)
-
Specification