Method and system for authenticating internet user identity
DCFirst Claim
1. A computer-implemented method of authenticating an Internet user'"'"'s identity, the method comprising the computer-implemented steps of:
- a) identifying, while an Internet user is communicating with an Internet website of an Internet vendor, a computer signature of a computer being used by the Internet user, comprising one or more common identifiers, wherein;
i) each common identifier of the one or more common identifiers comprises a non-unique identifier identifiable on at least one other computer on the Internet;
ii) at least one of the one or more common identifiers comprises an identifier of a software installed on the Internet user'"'"'s computer; and
iii) the Internet user'"'"'s computer is not in the possession or control of the Internet vendor;
b) checking a data structure to see if the computer signature is stored in the data structure, andi) if the computer signature is not stored in the data structure, assigning, in the data structure, the Internet user'"'"'s computer signature to a first geographical location by using at least a geographical location of a mobile voice device, wherein the mobile voice device and the Internet user'"'"'s computer are in the possession and control of the Internet user;
orii) if the computer signature is stored in the data structure, determining a second geographical location of the mobile voice device of the Internet user; and
comparing the first geographical location assigned to the computer signature with the second geographical location andiii) if the result of the comparison is within a predetermined acceptable distance value, providing to the internet user the ability to conduct a transaction.
1 Assignment
Litigations
0 Petitions
Accused Products
Abstract
A method and system for authenticating an Internet user identity by cross-referencing and comparing at least two independent sources of information. A first geographical location of computer signature of an internet user is identified and the geographical location of a communication voice device of said internet user is identified to determine a second location. The first and second locations are compared for geographical proximity to confirm the identity of the internet user. Based upon geographical proximity of said locations, a score is assigned to the internet user, and access to a website is allowed or limited based upon said score. Alternatively, additional authentication information can be required or access can be terminated.
38 Citations
35 Claims
-
1. A computer-implemented method of authenticating an Internet user'"'"'s identity, the method comprising the computer-implemented steps of:
-
a) identifying, while an Internet user is communicating with an Internet website of an Internet vendor, a computer signature of a computer being used by the Internet user, comprising one or more common identifiers, wherein; i) each common identifier of the one or more common identifiers comprises a non-unique identifier identifiable on at least one other computer on the Internet; ii) at least one of the one or more common identifiers comprises an identifier of a software installed on the Internet user'"'"'s computer; and iii) the Internet user'"'"'s computer is not in the possession or control of the Internet vendor; b) checking a data structure to see if the computer signature is stored in the data structure, and i) if the computer signature is not stored in the data structure, assigning, in the data structure, the Internet user'"'"'s computer signature to a first geographical location by using at least a geographical location of a mobile voice device, wherein the mobile voice device and the Internet user'"'"'s computer are in the possession and control of the Internet user;
orii) if the computer signature is stored in the data structure, determining a second geographical location of the mobile voice device of the Internet user; and
comparing the first geographical location assigned to the computer signature with the second geographical location andiii) if the result of the comparison is within a predetermined acceptable distance value, providing to the internet user the ability to conduct a transaction. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A computer-implemented method of comparing a geographical location associated with an Internet user'"'"'s computer signature with a geographical location of a mobile voice device of the Internet user, the method comprising the computer-implemented steps of:
-
a) determining a first geographical location using at least a geographical location of at least one mobile voice device of the Internet user; b) identifying, while the Internet user is communicating with an Internet website of an Internet vendor, a computer signature of the Internet user'"'"'s computer, wherein the computer signature comprises at least one common identifier installed on the computer, wherein; i) each common identifier of the one or more common identifiers comprises a non-unique identifier identifiable on at least one other computer on the Internet; ii) at least one identifier of the common identifiers comprises an identifier of a software installed on the Internet user'"'"'s computer; and iii) the Internet user'"'"'s computer is not in the possession or control of the Internet vendor; c) assigning, in a data structure, a geographical location to the computer signature using at least the first geographical location, wherein the computer and the mobile voice device are in the possession and control of the Internet user; d) receiving a request that originated from the Internet user, wherein the request includes the computer signature; e) determining a second geographical location using at least one mobile voice device of the Internet user; f) comparing the geographical location assigned to the received computer signature to the second geographical location. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A computer-implemented method of making a geographical comparison between a location associated with a computer signature identified by identifying at least one common computer identifier and a geographical location associated with an Internet Protocol Address, the method comprising the computer-implemented steps of:
-
a) determining a first geographical location using at least a geographical location of at least one mobile voice device of the Internet user; b) identifying, while the Internet user is communicating with an Internet website of an Internet vendor, a computer signature of the Internet user'"'"'s computer by identifying a computer comprising at least one common identifier installed on the computer, wherein; i) each common identifier of the one or more common identifiers comprises a non-unique identifier identifiable on at least one other computer on the Internet; ii) at least one identifier of the common identifiers comprises an identifier of a software installed on the Internet user'"'"'s computer; and iii) the Internet user'"'"'s mobile voice device is not in the possession or control of the Internet vendor; c) assigning, in a data structure, a geographical location to the computer signature using at least the first geographical location, wherein the computer and the mobile voice device are in use by the Internet user; d) receiving a request that originated from the Internet user, wherein the request includes the computer signature and the Internet user'"'"'s IP address; e) identifying the IP address geographical location; f) comparing the geographical location assigned to the received computer signature to the IP address geographical location. - View Dependent Claims (19, 20, 21, 22, 23, 24, 25, 26)
-
-
27. A computer-implemented method of making a geographical comparison between a location associated with a computer signature and a geographical location of a router in path to an Internet user'"'"'s IP address, the method) comprising the computer-implemented steps of:
-
a) identifying, while the Internet user is communicating with an Internet website of an Internet vendor, the computer signature, wherein; i) the computer signature is identified by identifying a computer comprising at least one common identifier; ii) each common identifier of the at least one common identifier comprises a non-unique identifier identifiable on at least one other computer on the Internet; and iii) at least one identifier of the at least one common identifier comprises an identifier of at least one software installed on the computer; and iv) the Internet user'"'"'s computer is not in the possession or control of the Internet vendor; b) assigning, in a data structure, the location of at least a mobile voice device to the computer signature; c) receiving a request that originated from the Internet user, wherein the request includes the computer signature and an IP Address in use by the Internet user; d) determining an IP address of a router in a path to the IP address in use by the Internet user; e) determining the geographical location of the router in the path to the IP address in use by the Internet user; and f) comparing the geographical location of the router in the path to the IP address in use by the Internet user with the location associated with the computer signature. - View Dependent Claims (28, 29, 30, 31, 32, 33, 34, 35)
-
Specification