Method and system for authenticating use of item
First Claim
1. A method to assess authorization for use of an item at a first location by an identity, comprising the steps of:
- updating a position database to cache a pre-use position of a first wireless terminal;
receiving a notification to authenticate the use of the item at the first location, wherein the identity is associated with the first wireless terminal;
determining whether the position database is stale based on a predetermined time period;
determining a second location of the first wireless terminal based on the cached pre-use position if the position database is not stale;
determining a third location if the position database is stale;
determining whether the first and second locations match in geographical proximity;
authenticating use if the first location matches in geographical proximity with the second location;
generating an alert if the first and second locations do not match in geographical proximity;
determining whether the first and third locations match in geographical proximity;
authenticating use if the first location matches in geographical proximity with the third location; and
generating an alert if the first and third locations do not match in geographical proximity.
2 Assignments
0 Petitions
Accused Products
Abstract
A method for facilitating the detection of misuse of an identity during an electronic transaction. The invention comprises at least five embodiments. In a first embodiment, the method comprises the step of: receiving a notification to authenticate the use of an identity at a first location, wherein the identity is associated with a first wireless terminal; determining an approximate location of the first wireless terminal based on cached position information, the approximate location of the first wireless terminal being a second location; determining whether the first and second locations match in geographical proximity; and generating an alert if the first and second locations do not match in geographical proximity. In a second embodiment, an approximate location of the first wireless terminal is determined based on cached position information stored on a GPS position database.
-
Citations
25 Claims
-
1. A method to assess authorization for use of an item at a first location by an identity, comprising the steps of:
-
updating a position database to cache a pre-use position of a first wireless terminal; receiving a notification to authenticate the use of the item at the first location, wherein the identity is associated with the first wireless terminal; determining whether the position database is stale based on a predetermined time period; determining a second location of the first wireless terminal based on the cached pre-use position if the position database is not stale; determining a third location if the position database is stale; determining whether the first and second locations match in geographical proximity; authenticating use if the first location matches in geographical proximity with the second location; generating an alert if the first and second locations do not match in geographical proximity; determining whether the first and third locations match in geographical proximity; authenticating use if the first location matches in geographical proximity with the third location; and generating an alert if the first and third locations do not match in geographical proximity. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method to assess authorization for use of an item by an identity at a first location, comprising the steps of:
-
updating a position database to cache a pre-use position of a first wireless terminal; receiving a notification to authenticate the use of an item at the first location for an identity, wherein the identity is associated with a first wireless terminal; determining a second location by accessing the pre-use position database; determining whether the first and second locations match in geographical proximity; authenticating use if the first and second locations match in geographical proximity providing a known location associated with the identity if the first and second locations do not match in geographical proximity; authenticating use if the first and known locations match in geographical proximity; and generating an alert if the first and known locations do not match in geographical proximity. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A method to assess authorization for use of an item by an identity at a first location, comprising the steps of:
-
updating a position database to cache a pre-use position of a first wireless terminal; receiving a notification to use an identity at the first location, wherein the identity is associated with a first wireless terminal; determining a second location by accessing the pre-use position database; determining whether the first and second locations match in geographical proximity; allowing use if the first and second locations match in geographical proximity and communicating with the first wireless terminal if the first and second locations do not match in geographical proximity.
-
-
22. A method to assess authorization for use of an item by an identity at a first location, comprising the steps of:
-
updating a position database to cache a pre-use position of a first wireless terminal; receiving a notification to authenticate the use of an item at the first location for an identity, wherein the identity is associated with a first wireless terminal; determining a second location by accessing the pre-use position database; determining whether the first and second locations match in geographical proximity; authenticating use if the first and second locations match in geographical proximity requesting a present location for the first wireless terminal based on global position signals if the first and second locations do not match in geographical proximity; authenticating use if the first and present locations match in geographical proximity; and communicating with the first wireless terminal if the first and present locations do not match in geographical proximity.
-
-
23. A method to assess authorization for use of an item by an identity at a first location, comprising the steps of:
-
updating a position database to cache a pre-use position of a first wireless terminal; receiving a notification to authenticate the use of an item at the first location for an identity, wherein the identity is associated with a first wireless terminal; determining whether the position database is stale based on a predetermined time period; determining a second location of the first wireless terminal based on the cached pre-use position if the position database is not stale; determining a third location if the position database is stale; determining whether the first and second locations match in geographical proximity; authenticating use if the first location matches in geographical proximity with the second location; communicating with the first wireless terminal if the first and second locations do not match in geographical proximity; determining whether the first and third locations match in geographical proximity; authenticating use if the first location matches in geographical proximity with the third location; and communicating with the first wireless terminal if the first and third locations do not match in geographical proximity.
-
-
24. A method to assess authorization for use of an item by an identity at a first location, comprising the steps of:
-
updating a position database to cache a pre-use position of a first wireless terminal; receiving a notification to authenticate the use of an item at the first location for an identity, wherein the identity is associated with a first wireless terminal; determining a second location by accessing the pre-use position database and requesting a present location for the first wireless terminal based on global position signals if the pre-use position is stale; determining whether the first and second locations match in geographical proximity; authenticating use if the first and second locations match in geographical proximity; and communicating with the first wireless terminal if the first and second locations do not match in geographical proximity. - View Dependent Claims (25)
-
Specification