System and method for automated analysis comparing a wireless device location with another geographic location
First Claim
1. A method of determining fraudulent activity, the method comprising the steps of:
- receiving, over a first network, information identifying the location of an electronic device;
receiving, over a second network, information identifying the location of a wireless device associated with a user;
caching the information identifying the location of the wireless device for comparison with the information identifying the location of the electronic device;
associating a date and time of the cached information identifying the location of the wireless device with the information identifying the location of the electronic device;
generating a comparison of the cached information identifying the location of the wireless device with the information identifying the location of the electronic device;
evaluating results of the comparison based on proximity of the compared locations;
applying an algorithmic value to the results indicating a relative degree of proximity of the location of the wireless device with the location of the electronic device; and
sending the algorithmic value to a processing system configured to determine, based on the algorithmic value, the authenticity of the identity of the user.
2 Assignments
0 Petitions
Accused Products
Abstract
A system and method for automatically comparing obtained wireless device location information from a wireless network and comparing that location with another independent source geographic location is provided. Location information is derived from two or more sources in a multiplicity of ways and a comparison is made within a Location Comparison Engine. The Location Comparison Engine makes use of databases that assist in resolving obtained raw positioning information and converting that positioning information into one or more formats for adequate location comparison. Results of the location comparison are deduced to determine if the wireless device is in some proximity to some other activity source location, Other location information used for comparison may be obtained from a multiplicity of sources, such as another network based on some activity of the wireless device user, another wireless device via a wireless network, or any system capable of providing location information to the Location Comparison Engine.
-
Citations
16 Claims
-
1. A method of determining fraudulent activity, the method comprising the steps of:
-
receiving, over a first network, information identifying the location of an electronic device; receiving, over a second network, information identifying the location of a wireless device associated with a user; caching the information identifying the location of the wireless device for comparison with the information identifying the location of the electronic device; associating a date and time of the cached information identifying the location of the wireless device with the information identifying the location of the electronic device; generating a comparison of the cached information identifying the location of the wireless device with the information identifying the location of the electronic device; evaluating results of the comparison based on proximity of the compared locations; applying an algorithmic value to the results indicating a relative degree of proximity of the location of the wireless device with the location of the electronic device; and sending the algorithmic value to a processing system configured to determine, based on the algorithmic value, the authenticity of the identity of the user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
Specification