System and method for automated analysis comparing a wireless device location with another geographic location
First Claim
1. A method of securing an online transaction, the method comprising:
- obtaining, via a computing device, account data including a wireless device identifier stored on a secure element of a user'"'"'s wireless device to execute the online transaction, wherein the wireless device identifier was previously provided to a payment card issuer and is stored on the secure element of the wireless device via a secure update process that includes verification of the user'"'"'s identity;
obtaining a one-time password that is generated by the computing device and embedded with information identifying a location of the computing device, the one-time password being generated in response to verifying that the wireless device is approved for use with the computing device by comparing the wireless device identifier from the wireless device to a wireless device identifier previously stored on the computing device;
receiving, from a wireless network, information identifying a location of the wireless device;
converting the information identifying the location of the computing device embedded in the one-time password and the information identifying the location of the wireless device into a common format;
comparing the information identifying the location of the wireless device with the information identifying the location of the computing device to determine a distance between the wireless device and the computing device; and
determining whether the online transaction is valid or invalid based on the distance between the wireless device and the computing device.
0 Assignments
0 Petitions
Accused Products
Abstract
A system and method for automatically comparing obtained wireless device location information from a wireless network and comparing that location with another independent source geographic location is provided. Location information is derived from two or more sources in a multiplicity of ways and a comparison is made within a Location Comparison Engine. The Location Comparison Engine makes use of databases that assist in resolving obtained raw positioning information and converting that positioning information into one or more formats for adequate location comparison. Results of location comparison are deduced to determine if the wireless device is in some proximity to some other activity source location. Other location information used for comparison may be obtained from a multiplicity of sources, such as another network based on some activity of wireless device user, another wireless device via a wireless network, or any system capable of providing location information to the Location Comparison Engine.
116 Citations
20 Claims
-
1. A method of securing an online transaction, the method comprising:
-
obtaining, via a computing device, account data including a wireless device identifier stored on a secure element of a user'"'"'s wireless device to execute the online transaction, wherein the wireless device identifier was previously provided to a payment card issuer and is stored on the secure element of the wireless device via a secure update process that includes verification of the user'"'"'s identity; obtaining a one-time password that is generated by the computing device and embedded with information identifying a location of the computing device, the one-time password being generated in response to verifying that the wireless device is approved for use with the computing device by comparing the wireless device identifier from the wireless device to a wireless device identifier previously stored on the computing device; receiving, from a wireless network, information identifying a location of the wireless device; converting the information identifying the location of the computing device embedded in the one-time password and the information identifying the location of the wireless device into a common format; comparing the information identifying the location of the wireless device with the information identifying the location of the computing device to determine a distance between the wireless device and the computing device; and determining whether the online transaction is valid or invalid based on the distance between the wireless device and the computing device. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method of securing an online transaction, the method comprising:
-
obtaining, via a computing device, account data including a wireless device identifier stored on a secure element of a user'"'"'s wireless device to execute an online transaction, wherein the wireless device identifier was previously provided to a payment card issuer and is stored on the secure element of the wireless device via a secure update process that includes verification of the user'"'"'s identity; obtaining a one-time password that is generated by the wireless device and embedded with information identifying a location of the wireless device, the one-time password being generated in response to verifying that the wireless device is approved for use with the computing device by comparing the wireless device identifier from the wireless device to a wireless device identifier previously stored on the computing device; receiving, from a wireless network, information identifying a network-provided location of the wireless device; converting the information identifying the location of the wireless device embedded in the one-time password and the information identifying the network-provided location of the wireless device into a common format; comparing the information identifying the location of the wireless device embedded in the one-time password with the information identifying the network-provided location of the wireless device to determine a distance between the location of the wireless device embedded in the one-time password and the network-provided location; and determining whether the online transaction is valid or invalid based on the distance between the location of the wireless device embedded in the one-time password and the network-provided location. - View Dependent Claims (9, 10, 11, 12, 13)
-
-
14. A location comparison device comprising:
-
a processor; and a non-transitory computer storage medium coupled to the processor and storing a set of instructions, which when executed by the processor, causes the location comparison device to perform operations including; obtaining, via a computing device, account data including a wireless device identifier stored on a secure element of a user'"'"'s wireless device to execute an online transaction, wherein the wireless device identifier was previously provided to a payment card issuer and is stored on the secure element of the wireless device via a secure update process that includes verification of the user'"'"'s identity; obtaining a one-time password that is generated by the computing device and including embedded location information identifying a location of the computing device or the wireless device, the one-time password being generated in response to verifying that the wireless device is approved for use with the computing device by comparing the wireless device identifier from the wireless device to a wireless device identifier previously stored on the computing device; receiving, from a wireless network, network-provided information identifying a location of the wireless device; converting the embedded location information in the one-time password and the network-provided information identifying the location of the wireless device into a common format; comparing the embedded location information with the network-provided information to determine a distance between the location embedded in the one-time password and the network-provided location; and determining whether the online transaction is valid or invalid based on the distance between the location embedded in the one-time password and the location of the network-provided information. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification