Mobile phone and IP address correlation service
First Claim
1. A method for controlling access to a restricted item, the method comprising:
- receiving a request from a requester for access to a restricted item at a computer system associated with a provider, said request originating at a client system;
determining an IP address of the client system using the computer system associated with the provider;
receiving a telephonic communication from a mobile phone associated with the requester using the computer system associated with the provider,wherein the requester initiates the telephonic communication using the mobile phone;
determining a geographical location of the mobile phone based on the requester-initiated telephonic communication using the mobile phone;
determining a mobile phone number of the mobile phone associated with the requester using the computer system associated with the provider;
transmitting to a third party service provider, distinct from the computer system associated with the provider, the IP address, the mobile phone number, the geographical location of the mobile phone and an acceptable range,wherein the acceptable range includes a predetermined distance between the mobile phone and the client system; and
receiving back from the third party service provider a confirmation message indicating whether the IP address and the mobile phone are located within the acceptable range of each other, wherein the third party service provider determines whether the IP address and the mobile phone are located within the acceptable range of each other based on the transmitted IP address, the geographical location of the mobile phone and the mobile phone number.
1 Assignment
0 Petitions
Accused Products
Abstract
A system, method and program product for controlling access to a restricted item. A method is provided that includes: receiving a request for access to a restricted item at a computer system associated with a provider, said request originating from a client system; determining an IP address of the client system; determining a mobile phone number of a mobile phone associated with the requester; transmitting to a third party service provider the IP address and mobile phone number; and receiving back from the third party service provider a confirmation message indicating whether or not the IP address and mobile phone are located within an acceptable range of each other.
180 Citations
19 Claims
-
1. A method for controlling access to a restricted item, the method comprising:
-
receiving a request from a requester for access to a restricted item at a computer system associated with a provider, said request originating at a client system; determining an IP address of the client system using the computer system associated with the provider; receiving a telephonic communication from a mobile phone associated with the requester using the computer system associated with the provider, wherein the requester initiates the telephonic communication using the mobile phone; determining a geographical location of the mobile phone based on the requester-initiated telephonic communication using the mobile phone; determining a mobile phone number of the mobile phone associated with the requester using the computer system associated with the provider; transmitting to a third party service provider, distinct from the computer system associated with the provider, the IP address, the mobile phone number, the geographical location of the mobile phone and an acceptable range, wherein the acceptable range includes a predetermined distance between the mobile phone and the client system; and receiving back from the third party service provider a confirmation message indicating whether the IP address and the mobile phone are located within the acceptable range of each other, wherein the third party service provider determines whether the IP address and the mobile phone are located within the acceptable range of each other based on the transmitted IP address, the geographical location of the mobile phone and the mobile phone number. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A computer system comprising:
at least one computing device configured to control access to a restricted item, by performing actions including; receiving a request from a requester to a restricted item, said request originating from a client system; determining an IP address of the client system; receiving a telephonic communication from a mobile phone associated with the requester using the computer system associated with the provider, wherein the requester initiates the telephonic communication using the mobile phone; determining a geographical location of the mobile phone based on the requester-initiated telephonic communication using the mobile phone; determining a mobile phone number of the mobile phone associated with the requester; transmitting to a third party service provider, distinct from the at least one computing device, the IP address, the mobile phone number, the geographical location of the mobile phone and an acceptable range, wherein the acceptable range includes a predetermined distance between the mobile phone and the client system; and receiving, from the third party service provider, a confirmation message indicating whether the IP address and the mobile phone are located within the acceptable range of each other, wherein the third party service provider determines whether the IP address and the mobile phone are located within the acceptable range of each other based on the transmitted IP address, the geographical location of the mobile phone and the mobile phone number. - View Dependent Claims (8, 9, 10, 11, 12)
-
13. A non-transitory computer readable medium having a program product for controlling access to a restricted item, which when executed by at least one computing device, causes the at least one computing device to perform actions including:
-
receiving a request from a requester to a restricted item, said request originating from a client system; determining an IP address of the client system; receiving a telephonic communication from a mobile phone associated with the requester using the computer system associated with the provider, wherein the requester initiates the telephonic communication using the mobile phone; determining a geographical location of the mobile phone based on the requester-initiated telephonic communication using the mobile phone; determining a mobile phone number of the mobile phone associated with the requester; transmitting to a third party service provider the IP address, the mobile phone number, the geographical location of the mobile phone and an acceptable range, wherein the acceptable range includes a predetermined distance between the mobile phone and the client system; and receiving from the third party service provider a confirmation message indicating whether the IP address and the mobile phone are located within the acceptable range of each other, wherein the third party service provider determines whether the IP address and the mobile phone are located within the acceptable range of each other based on the transmitted IP address, the geographical location of the mobile phone and the mobile phone number. - View Dependent Claims (14, 15, 16, 17, 18)
-
-
19. A method for deploying a system for controlling access to a restricted item, comprising:
providing a computer infrastructure being operable to; receive a request from a requester for access to a restricted item at a computer system associated with a provider, said request originating from a client system; determine an IP address of the client system; receive a telephonic communication from a mobile phone associated with the requester using the computer system associated with the provider, wherein the requester initiates the telephonic communication using the mobile phone; determine a geographical location of the mobile phone based on the requester- initiated telephonic communication using the mobile phone; determine a mobile phone number of the mobile phone associated with the requester; transmit to a third party service provider, distinct from the computer infrastructure, the IP address, the mobile phone number, the geographical location of the mobile phone, and an acceptable range, wherein the acceptable range includes a predetermined distance between the mobile phone and the client system; and receive back from the third party service provider a confirmation message indicating whether the IP address and the mobile phone are located within the acceptable range of each other, wherein the third party service provider determines whether the IP address and the mobile phone are located within the acceptable range of each other based on the transmitted IP address, the geographical location of the mobile phone and the mobile phone number.
Specification