System and method for automated analysis comparing a wireless device location with another geographic location
First Claim
1. A method of determining fraudulent activity, the method comprising the steps of:
- receiving, over a first network and in response to a transaction initiated by a user of an electronic device, information identifying the location of the electronic device, the transaction requiring authentication of an identity of the user;
sending a request over a second network accessible to a wireless device associated with the user to obtain information identifying the location of the wireless device;
receiving, over the second network, the information identifying the location of the wireless device;
caching the information identifying the location of the wireless device for comparison with the information identifying the location of the electronic device;
associating a date and time of the cached information identifying the location of the wireless device with the information identifying the location of the wireless device;
generating a comparison of the cached information identifying the location of the wireless device with the information identifying the location of the electronic device;
evaluating results of the comparison based on proximity of the compared locations;
applying an algorithmic value to the results indicating a relative degree of proximity of the location of the wireless device with the location of the electronic device; and
sending the algorithmic value to a processing system configured to determine, based on the algorithmic value, the authenticity of the identity of the user.
4 Assignments
0 Petitions
Accused Products
Abstract
A system and method for automatically comparing obtained wireless device location information from a wireless network and comparing that location with another independent source geographic location is provided. Location information is derived from two or more sources in a multiplicity of ways and a comparison is made within a Location Comparison Engine. The Location Comparison Engine makes use of databases that assist in resolving obtained raw positioning information and converting that positioning information into one or more formats for adequate location comparison. Results of the location comparison are deduced to determine if the wireless device is in some proximity to some other activity source location. Other location information used for comparison may be obtained from a multiplicity of sources, such as another network based on some activity of the wireless device user, another wireless device via a wireless network, or any system capable of providing location information to the Location Comparison Engine.
93 Citations
8 Claims
-
1. A method of determining fraudulent activity, the method comprising the steps of:
-
receiving, over a first network and in response to a transaction initiated by a user of an electronic device, information identifying the location of the electronic device, the transaction requiring authentication of an identity of the user; sending a request over a second network accessible to a wireless device associated with the user to obtain information identifying the location of the wireless device; receiving, over the second network, the information identifying the location of the wireless device; caching the information identifying the location of the wireless device for comparison with the information identifying the location of the electronic device; associating a date and time of the cached information identifying the location of the wireless device with the information identifying the location of the wireless device; generating a comparison of the cached information identifying the location of the wireless device with the information identifying the location of the electronic device; evaluating results of the comparison based on proximity of the compared locations; applying an algorithmic value to the results indicating a relative degree of proximity of the location of the wireless device with the location of the electronic device; and sending the algorithmic value to a processing system configured to determine, based on the algorithmic value, the authenticity of the identity of the user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
Specification