Method for verifying access based on a determined geographic location of a subscriber of a service provided via a computer network
First Claim
1. A method of limiting presentation of rules based events, the method comprising:
- receiving, over a network, a request to view a rules based event at a computer;
obtaining a first estimate of a first geographic location of the computer, wherein the first estimate of the first geographic location includes a first confidence determination;
if the first confidence determination is less than a first established confidence level, obtaining a second estimate of the first geographic location of the computer, wherein the second estimate of the first geographic location includes a second confidence determination for comparison to a second established confidence level, and further wherein the first estimate and the second estimate of the first geographic location define a composite estimated geographic location of the computer;
retrieving information on a second geographic location of the rules based event;
comparing the retrieved information on the second geographic location of the rules based event with the composite estimated geographic location of the computer; and
providing access to the rules based event based on access rules, the comparison of the retrieved information on the second geographic location of the rules based event, and the composite estimated geographic location of the computer.
1 Assignment
0 Petitions
Reexamination
Accused Products
Abstract
A method of limiting presentation of rules based events includes receiving a request to view a rules based event at a computer. A first estimate of a first geographic location of the computer is obtained. The first estimate includes a first confidence determination. If the first confidence determination is less than a first established confidence level, a second estimate of the first geographic location of the computer is obtained. The second estimate includes a second confidence determination for comparison to a second established confidence level. The first estimate and the second estimate define a composite estimated geographic location of the computer. Information on a second geographic location of the rules based event is retrieved. The retrieved information is compared with the composite estimated geographic location of the computer. Access to the rules based event is provided based on access rules, the comparison, and the composite estimated geographic location.
31 Citations
18 Claims
-
1. A method of limiting presentation of rules based events, the method comprising:
-
receiving, over a network, a request to view a rules based event at a computer; obtaining a first estimate of a first geographic location of the computer, wherein the first estimate of the first geographic location includes a first confidence determination; if the first confidence determination is less than a first established confidence level, obtaining a second estimate of the first geographic location of the computer, wherein the second estimate of the first geographic location includes a second confidence determination for comparison to a second established confidence level, and further wherein the first estimate and the second estimate of the first geographic location define a composite estimated geographic location of the computer; retrieving information on a second geographic location of the rules based event; comparing the retrieved information on the second geographic location of the rules based event with the composite estimated geographic location of the computer; and providing access to the rules based event based on access rules, the comparison of the retrieved information on the second geographic location of the rules based event, and the composite estimated geographic location of the computer. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method comprising:
-
obtaining a first estimate of a geographic location of a subscriber computer, wherein the first estimate of the geographic location includes a first confidence factor; performing an address verification operation if the first confidence factor does not exceed a first threshold, wherein the address verification operation results in a second estimate of the geographic location of the subscriber computer, wherein the second estimate of the geographic location includes a second confidence factor for comparison to a second threshold; and applying blackout rules to the subscriber computer based at least in part on a rules based event selected at the subscriber computer and at least in part on one or more of the first estimate of the geographic location and the second estimate of the geographic. - View Dependent Claims (9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
Specification