×

System and method for early detection and prevention of identity theft

  • US 7,548,886 B2
  • Filed: 06/12/2003
  • Issued: 06/16/2009
  • Est. Priority Date: 06/12/2003
  • Status: Active Grant
First Claim
Patent Images

1. A computer implemented method of authenticating use of an identity, the computer implemented method comprising:

  • receiving a request to authenticate the use of the identity from an electronic device in a first location;

    determining a current location of a mobile device associated with the identity, the current location of the mobile device being a second location;

    comparing the first location to the second location; and

    determining whether to authorize the use of the identity based on results of comparing the first location to the second location;

    wherein determining whether to authorize the use of the identity based on results of comparing the first location to the second location comprises includes;

    determining whether the first location is within a predetermined distance from the second location wherein the electronic device is a source and wherein determining whether the first location is within a predetermined distance from the second location further comprises;

    responsive to a determination that the electronic device in the first location is not within a predetermined proximity to at least one other source, establishing a range as a radial distance from the electronic device in the first location to form a circular area around the electronic device, wherein the first location is within the predetermined distance from the second location if the mobile device is present within the circular area; and

    responsive to a determination that the electronic device in the first location is within a predetermined proximity to at least one other source, establishing a non-circular area around the electronic device in the first location to form a bounding polygon shaped area around the electronic device, wherein the first location is within the predetermined distance from the second location if the mobile device is present within the non-circular area;

    responsive to a determination that the first location is within the predetermined distance from the second location, automatically authorizing the use of the identity without a notification being sent to a notification device;

    responsive to a determination that the first location is more than the predetermined distance away from the second location, automatically determining whether to send a notification message to notification device, wherein automatically determining whether to send the notification message further comprises;

    retrieving a notification profile associated with the identity, wherein the notification profile includes one or more notification criteria, wherein the notification criteria are used to determine whether to send a notification message to the notification device associated with the identity, wherein the one or more notification criteria limit a number of notifications that are sent to the notification device wherein the notification device is a different device than the mobile device;

    comparing the one or more notification criteria to circumstances of the use of the identity;

    responsive to a determination that the circumstances of the use of the identity meet at least one of the one or more notification criteria, automatically sending the notification message to the notification device;

    responsive to receiving a response from the notification device indicating that authorized user approves the use of the identity, transmitting an approval completion message to the electronic device at the first location, wherein the approval completion message indicates authorization for the use of the identity;

    responsive to receiving a response from the notification device indicating that authorized user rejects the use of the identity, transmitting a rejection message to the electronic device at the first location, wherein the rejection message indicates denial of the use of the identity; and

    responsive to a failure to receive a response from the notification device indication that the authorized user approves or rejects the user of the identity within a predetermined time-out period of time, transmitting a rejection message indicting that the transaction is rejected.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×