System and method for mobile identity protection of a user of multiple computer applications, networks or devices
First Claim
1. A method for detecting identity theft of an entity based on an entity'"'"'s wireless device location obtained from a wireless network, comprising:
- obtaining data regarding an automated transaction or activity from a data network;
obtaining a unique identifier representing an entity;
obtaining the location of an automated transaction or activity;
obtaining the entity'"'"'s home location;
obtaining the entity'"'"'s wireless device location from a wireless network;
generating a personal identity value based on the transaction or activity event data, the location of the transaction or activity event, the entity'"'"'s home location, the location of the entity'"'"'s wireless device and the time the location of the entity'"'"'s wireless device was obtained.
2 Assignments
0 Petitions
Accused Products
Abstract
An automated system and method for authenticating entities or individuals engaging in automated or electronic transactions or activities such as financial transactions, accessing computer applications, computer software, data networks or other automated or electronic devices requiring identity verification is provided. A unique Personal Identity Value is computed and stored in an Identity Register for the entity or individual and may be used for a variety of applications including recognizing incidents of identity theft. This Personal Identity Value is based on one or more computer logic resources that incorporate the relationship among a variety of identification information elements and parameters associated with the entity or individual, such as the entity'"'"'s or individual'"'"'s wireless device location, the entity'"'"'s or individual'"'"'s home location, other associated locations, automated activities engaged in and applications accessed.
111 Citations
26 Claims
-
1. A method for detecting identity theft of an entity based on an entity'"'"'s wireless device location obtained from a wireless network, comprising:
-
obtaining data regarding an automated transaction or activity from a data network; obtaining a unique identifier representing an entity; obtaining the location of an automated transaction or activity; obtaining the entity'"'"'s home location; obtaining the entity'"'"'s wireless device location from a wireless network; generating a personal identity value based on the transaction or activity event data, the location of the transaction or activity event, the entity'"'"'s home location, the location of the entity'"'"'s wireless device and the time the location of the entity'"'"'s wireless device was obtained. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. An apparatus for detecting identity theft of an entity based on an entity'"'"'s wireless device'"'"'s location obtained from a wireless network, comprising:
-
a module to obtain data regarding a transaction or activity from a data network; a module to obtain a unique identifier representing an entity; a module to obtain the location of the transaction or activity; a module to obtain the entity'"'"'s home location; a module to obtain the entity'"'"'s wireless device location from a wireless network; and a module to generate a personal identity value based on the transaction or activity event data, the location of the transaction or activity, the entity'"'"'s home location, the location of the entity'"'"'s wireless device and the time the location of the entity'"'"'s wireless device was obtained. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26)
-
Specification