Method for detecting misuse of identity in electronic transactions
DCFirst Claim
Patent Images
1. A method of detecting possible fraudulent use of an identity associated with a user in a transaction, comprising:
- (a) associating a user identity with a wireless terminal;
(b) caching on the wireless terminal a pre-transaction second location of the wireless terminal;
(c) receiving a notification to authenticate the use of the identity at a first location;
(d) obtaining from the wireless terminal the cached pre-transaction second location of the wireless terminal;
(e) obtaining a first time stamp for the first location and a second time stamp for the second location, and calculating a speed required to move from the first location to the second location in the time elapsed between the first time stamp and the second time stamp;
(f) generating an alert if the speed is above a predetermined value; and
(g) communicating the alert to a predetermined device.
1 Assignment
Litigations
0 Petitions
Accused Products
Abstract
The invention provides methods for determining whether a transaction has taken place in geographic proximity to a wireless device. Upon receiving a notification to authenticate the use of an identity at a transaction location, where the identity is associated with a wireless terminal, the method determines an approximate location of the wireless terminal based on cached position information, GPS location, cellular geo-location, and/or Wi-Fi geolocation, and determines whether one or more of these is in geographic proximity to the location of the transaction.
32 Citations
20 Claims
-
1. A method of detecting possible fraudulent use of an identity associated with a user in a transaction, comprising:
-
(a) associating a user identity with a wireless terminal; (b) caching on the wireless terminal a pre-transaction second location of the wireless terminal; (c) receiving a notification to authenticate the use of the identity at a first location; (d) obtaining from the wireless terminal the cached pre-transaction second location of the wireless terminal; (e) obtaining a first time stamp for the first location and a second time stamp for the second location, and calculating a speed required to move from the first location to the second location in the time elapsed between the first time stamp and the second time stamp; (f) generating an alert if the speed is above a predetermined value; and (g) communicating the alert to a predetermined device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method of detecting possible fraudulent use of an identity associated with a user in a transaction, comprising:
-
(a) associating the user identity with a wireless terminal; (b) receiving a notification to authenticate the use of the identity at a first location; (c) obtaining a pre-transaction second location of the wireless terminal based on cached position information stored on the wireless terminal, if the cached position information is stored on the wireless terminal;
otherwise(d) obtaining from the wireless terminal a post-transaction second location of the wireless terminal; (e) obtaining a first time stamp for the first location and a second time stamp for the second location, and calculating a speed required to move from the first location to the second location in the time elapsed between the first time stamp and the second time stamp; (f) generating an alert if the speed is above a predetermined value; and (g) communicating the alert to a predetermined device. - View Dependent Claims (12, 13)
-
-
14. A method of detecting possible fraudulent use of an identity associated with a user in a transaction, comprising:
-
(a) associating a user identity with a wireless terminal; (b) caching on a remote database a pre-transaction second location of the wireless terminal; (c) receiving a notification to authenticate the use of the identity at a first location; (d) obtaining from the remote database the cached pre-transaction second location of the wireless terminal; (e) obtaining a first time stamp for the first location and a second time stamp for the second location, and calculating a speed required to move from the first location to the second location in the time elapsed between the first time stamp and the second time stamp; (f) generating an alert if the speed is above a predetermined value; and (g) communicating the alert to a predetermined device. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification