US20100145868A1 - Location based fraud reduction system and method - Google Patents

Location based fraud reduction system and method Download PDF

Info

Publication number
US20100145868A1
US20100145868A1 US12/707,228 US70722810A US2010145868A1 US 20100145868 A1 US20100145868 A1 US 20100145868A1 US 70722810 A US70722810 A US 70722810A US 2010145868 A1 US2010145868 A1 US 2010145868A1
Authority
US
United States
Prior art keywords
device
request
location
method
position
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US12/707,228
Inventor
Brian Joseph Niedermeyer
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Square Inc
Original Assignee
Brian Joseph Niedermeyer
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority to US35566702P priority Critical
Priority to US35686102P priority
Priority to US36164602P priority
Priority to US10/355,557 priority patent/US7376431B2/en
Priority to US12/050,752 priority patent/US7684809B2/en
Application filed by Brian Joseph Niedermeyer filed Critical Brian Joseph Niedermeyer
Priority to US12/707,228 priority patent/US20100145868A1/en
Publication of US20100145868A1 publication Critical patent/US20100145868A1/en
Assigned to SQUARE, INC. reassignment SQUARE, INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: NIEDERMEYER, BRIAN J.
Priority claimed from US13/179,836 external-priority patent/US20120005039A1/en
Priority claimed from US13/179,832 external-priority patent/US20120005096A1/en
Priority claimed from US13/298,484 external-priority patent/US20120126010A1/en
Priority claimed from US13/298,540 external-priority patent/US9324100B2/en
Priority claimed from US13/298,511 external-priority patent/US20120118960A1/en
Priority claimed from US13/298,545 external-priority patent/US20120126014A1/en
Priority claimed from US13/298,510 external-priority patent/US9262757B2/en
Priority claimed from US13/298,491 external-priority patent/US9224142B2/en
Priority claimed from US13/298,534 external-priority patent/US9286635B2/en
Priority claimed from US13/298,525 external-priority patent/US9582795B2/en
Priority claimed from US13/298,560 external-priority patent/US20120126007A1/en
Priority claimed from US13/298,501 external-priority patent/US9305314B2/en
Priority claimed from US13/298,557 external-priority patent/US20120126006A1/en
Priority claimed from US13/298,506 external-priority patent/US9495676B2/en
Priority claimed from US13/298,496 external-priority patent/US9495675B2/en
Priority claimed from US13/298,520 external-priority patent/US20120126013A1/en
Priority claimed from US13/298,487 external-priority patent/US9262777B2/en
Priority claimed from US13/298,514 external-priority patent/US20120138683A1/en
Priority claimed from US13/298,564 external-priority patent/US9916581B2/en
Application status is Abandoned legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/04Payment circuits
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
    • G06Q20/322Aspects of commerce using mobile devices [M-devices]
    • G06Q20/3224Transactions dependent on location of M-devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/403Solvency checks
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce, e.g. shopping or e-commerce
    • G06Q30/01Customer relationship, e.g. warranty
    • G06Q30/018Business or product certification or verification
    • G06Q30/0185Product, service or business identity fraud
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/26Government or public services
    • G06Q50/265Personal security, identity or safety
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual entry or exit registers
    • G07C9/00007Access-control involving the use of a pass
    • G07C9/00031Access-control involving the use of a pass in combination with an identity-check of the pass-holder

Abstract

Embodiments of the present invention provide for reduction of the likelihood of fraud by having at least one of an identifier of a location from where a request is submitted or information that can lead to identification of the location, submitted with or in addition to a request. Then, determination is made whether to service the request, based at least in part on the location from where the request is submitted or processed. In various embodiments, the location may be compared against predetermined permissible location(s) or a current user location. The request may be a request to conduct a transaction, access data, access a physical or informational resource, or access a secured area.

Description

    CROSS REFERENCE TO RELATED APPLICATIONS
  • The present application is a continuation of and claims priority to U.S. patent application Ser. No. 12/050,752, filed Mar. 18, 2008, entitled “Location Based Fraud Reduction System and Method,” which claims priority to U.S. patent application Ser. No. 10/355,557, filed Jan. 31, 2003, entitled “Location Based Fraud Reduction System and Method,” which claims priority to U.S. Provisional Patent Application No. 60/355,667, filed on Feb. 5, 2002, U.S. Provisional Patent Application No. 60/356,861, filed on Feb. 12, 2002, and U.S. Provisional Patent Application No. 60/361,646, filed on Mar. 4, 2002, the entire disclosures of which are hereby incorporated by reference in their entirety.
  • TECHNICAL FIELD
  • Embodiments of the present invention relate to the field of fraud reduction, and in particular, to a request processing system and method for request to enter a financial transaction, access of physical/informational resources, and access of secured area.
  • BACKGROUND
  • Credit account fraud costs companies millions of dollars per year. Additionally, companies spend large amounts of time and money trying to reduce credit account fraud. Many transactions involving credit accounts and credit cards occur via the Internet every day. Establishing the identity of the person using a credit card or credit account via the Internet is nearly impossible.
  • Currently, in the credit card industry there are several ways to help merchants verify that credit card information is actually coming from the cardholder and not a person trying to commit fraud. Unfortunately, none has proven to be effective all of the time.
  • One method is ZIP code verification. This process occurs when either a website prompts a cardholder to enter their billing ZIP code when completing a purchase form or when an operator verbally requests this information during a telephone transaction. When an order is placed, a match or no match is given based on whether or not the accurate ZIP code information was given.
  • Another fraud prevention method is additional number verification. Credit card issuers are now including extra digits on cards that are only visible to someone physically holding a card. These numbers usually appear on the front or back of a card. The idea behind this security measure is that only the person holding the card would have access to these numbers. For example, if a thief stole a credit card receipt it could contain the account number and the expiration date, but would not have these extra digits.
  • The problem with these verification methods is they are not fool proof in preventing fraud in the case where someone has physically stolen the card, piece of mail, or a company's internal database.
  • Similar problems exist for controlling access to usage of physical/informational resources, and access of secured areas.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • Embodiments of the present invention will be readily understood by the following detailed description in conjunction with the accompanying drawings. Embodiments of the invention are illustrated by way of example and not by way of limitation in the figures of the accompanying drawings.
  • FIG. 1 is a schematic view illustrating a payment device present transaction according to one embodiment of the present invention;
  • FIG. 2 is a schematic view, according to another embodiment of the present invention, showing a payment device-not-present transaction;
  • FIG. 3 is a schematic view illustrating an access device-present transaction according to one embodiment of the present invention; and
  • FIG. 4 is a schematic view illustrating a security device-present transaction according to one embodiment of the present invention.
  • DETAILED DESCRIPTION OF EMBODIMENTS OF THE INVENTION
  • In the following detailed description, reference is made to the accompanying drawings which form a part hereof, and in which are shown by way of illustration embodiments in which the invention may be practiced. It is to be understood that other embodiments may be utilized and structural or logical changes may be made without departing from the scope of the present invention. Therefore, the following detailed description is not to be taken in a limiting sense, and the scope of embodiments in accordance with the present invention is defined by the appended claims and their equivalents.
  • Embodiments of the present invention include transaction and access control devices and systems equipped to reduce the likelihood of fraud.
  • Parts of the description will be presented in terms, such as payment device, payment device reader, payment processing system, location, transaction, access request, and so forth, consistent with the manner commonly employed by those skilled in the art to convey the substance of their work to others skilled in the art.
  • In the following description, various aspects of embodiments of the present invention will be described. However, it will be apparent to those skilled in the art that the embodiments may be practiced with only some or all aspects. For purposes of explanation, specific numbers, materials and configurations are set forth in order to provide a thorough understanding of the embodiments of the present invention. However, it will be apparent to one skilled in the art that the embodiments of the present invention may be practiced without the specific details. In other instances, well-known features are omitted or simplified in order not to obscure the embodiments of the present invention.
  • Various operations will be described as multiple discrete steps in turn, in a manner that is most helpful in understanding the embodiments of the present invention, however, the order of description should not be construed as to imply that these operations are necessarily order dependent. In particular, these operations need not be performed in the order of presentation.
  • The phrase “in one embodiment” is used repeatedly. The phrase generally does not refer to the same embodiment, however, it may.
  • The terms “comprising”, “having” and “including” are synonymous, unless the context dictates otherwise.
  • As shown in FIG. 1, a payment device-present transaction system 10 is provided according to one embodiment of the present invention. Payment device-present transaction system 10 typically includes a payment device 11 configured to be read by a payment device reader 12. An example of a payment device 11 is a credit or debit card, but may alternatively be a mobile commerce device (such as an mobile commerce enabled mobile telephone) configured to transmit payment information to credit device reader via an infrared or other communication link. In one embodiment, payment device 11 may include a position sensor 11 a, as well as payment information 11 b.
  • The term “mobile telephone” as used herein (in the specification and in the claims) refers to the class of telephone devices equipped to enable a user to make and receive calls wirelessly, notwithstanding the user's movement, as long as the user is within the communication reach of a service or base station of a wireless network service provider. Unless specifically excluded, the term “mobile telephone” is to include the analog subclass as well as the digital subclass (of all signaling protocols).
  • The payment device reader 12 typically includes a position sensor 12 a and merchant related information, such as a merchant identifier, 12 b. Typically, payment device reader 12 is configured to send payer and payment information, merchant information (such as merchant identifier), and/or position information to a payment processing system 14, to request an amount to be charged against the account of payer for the transaction.
  • Alternatively, payment device 11 may be a mobile commerce device configured to directly transmit payer, payment, payee, and/or position information to payment processing system 14, to request an amount to be charged against the account of payer for the transaction.
  • Further, in alternate embodiment, in lieu of an identifier of the location of the transaction, i.e. the location from where the request is submitted, information leading to the identifying of the location, e.g. name and branch of the merchant, may be sent instead. The payer information etc. may be sent as part of the request or after an initial request for the transaction.
  • Payment processing system 14 is configured to determine the location or position of the payment device and/or payment device reader by the position information received from position sensor 11 a or 12 a. In one embodiment, payment processing system 14 is implemented with a conventional computing system having storage medium having stored therein programming instructions implementing the teachings of the present invention, and one or more processor to execute the programming instructions.
  • Alternatively, the payment processing system 14 is configured to detect the position of the payment device reader (and therefore, the position of the payment device in a payment device-present transaction), by resolving merchant information (such as the merchant identifier) using a database of known merchant locations. For example, a merchant having the merchant identifier 1234567 may correspond to a convenience mart on the corner of 5th and Vine streets in a particular town.
  • For the illustrated embodiment, system 10 further includes a position-sensing device 16 having a position sensor 16 b. Position-sensing device 16 may be a mobile telephone, watch, jewelry, computing device, global positioning unit, or other device including a position sensor 16 b. Typically, except for its novel employment to prevent fraud under the present invention, position-sensing device 16 is otherwise not involved in payment related to the transaction entered into by payment device 11.
  • The position-sensing device 16 is configured to send position information to a position tracking system 18. The communication link between position tracking system 18 and position-sensing device 16 may be a satellite link such as used in a global positioning satellite system, radio frequency link, optical link such as infrared, or virtually any other communication link suitable for use in position detection.
  • Position tracking system 18 is configured to communicate the position information for the position-sensing device 16 to payment processing system 14. To detect a fraudulent use of payment device 11, payment processing system 14 is configured to compare the position of position-sensing device 16 to the location or position of a current transaction involving payment device 11 (i.e., the location or position of payment device 11 and/or payment device reader 12).
  • If the locations of the position-sensing device 16 and the payment device 11 are different, or alternatively, if the locations of the position-sensing device 16 and the payment device reader 12 are different, then the payment processing system is configured to determine that there is a possibility of fraud in the current transaction. Upon determining the possibility of fraud, the payment processing system is configured to take a designated action, such as preventing the completion of the transaction.
  • In embodiments, the requirement of the possession of the payment device and the position sensing device may be referred to as “double custody” fraud prevention or reduction.
  • The above embodiment is especially useful for face to face transactions. A cardholder may carry a device that has a built-in position locator within it. The device may be a cell phone, watch, jewelry, wallet, or any other item that a locator could be placed in and that a person would normally carry. The device may even change from day to day. For example, some people currently have three cell phones from various companies and each has a unique feature. One may be extremely compact, one may be large, but can send and receive emails, and the third may have a long battery life. In an embodiment, depending on the needs for a particular day, a person may choose to use one of the three phones and may place a location device in or on that phone. In an embodiment, there may be three phones, but maybe only one location device.
  • The location device may e.g. be a watch. The location device may be integrated with or removably associated with the watch. The cardholder would inform the credit card company ahead of time, as to the identification number/model of the location device. Once this information is given, the information may be entered into the database, and the system is primed to prevent fraudulent use of a credit card.
  • The cardholder may turn the watch's tracking device on or off at their leisure, as you can with a cell phone. When the watch's tracking device is on, the database would contain the current location, such as, the coordinates, of the watch (during a transaction).
  • When the cardholder decides to make a purchase e.g. at the Portland airport (PDX), the cardholder may turn the tracking device on and the database would be provided with the location information of the watch and its owner.
  • The merchant's machine may send out information about the transaction to the processing company, including the merchant's location. In this case, the location is PDX. The processing system may access the database to verify the merchant's location against the watch's location and registers that the watch is also at PDX and gives a match to permit the transaction to be completed.
  • Similarly, the above embodiment may be applied to wireless portable Point-Of-Sale (POS) terminals. Individuals may be provided with their own personal portable terminals equipped to provide location information. The merchant's POS terminal may also be portable, and therefore may be relocated and used in a weekly or monthly specialty, fruit or produce market. In like manner, transactions conducted under this “transient” market environment may also be accorded the added fraud prevention as earlier described.
  • The location information obtained may be used for other purposes besides fraud prevention. Cardholders may access online statements that create a picture of their transaction history. When a cardholder clicks on a particular transaction on their bill, they may have the option to look at a map or satellite overlay of the city and view where the transaction took place. A customer may create a trip diary based off purchases in a set period of time.
  • It is also believed this system, in some parts, may be used for tracking corporate card user movements.
  • FIG. 2 shows a payment-device-not-present transaction system 20 according to another embodiment of the present invention. Payment-device-not-present transaction system 20 typically includes a device 21 that is capable of transmitting position information to a payment processing system 24. Typically, device 21 is a mobile telephone or a computing device configured to detect its position as well as to enter into payment transactions using on-board payment information. Payment-device-not-present transaction system 20 typically is configured to enable a user to enter into transaction, such as making a purchase by mobile telephone, or by a computing device (PDA, laptop, desktop, web-enabled mobile telephone, etc.) over a computer network, or in another manner in which the user is not required to present a payment device, such as a credit card at the point of sale.
  • Device 21 may include an interface configured to be used to input transaction data for a transaction, such as a purchase, to be entered into by the user. This transaction data may include payer information, items to be purchased, payment information etc. Device 21 may also include a position sensor 22 configured to detect a position of the device and send this position information to payment processing system 24 via a wireless or a wireline communication link. Thus, device 21 is typically configured to send substantially simultaneously the transaction data and position information to payment processing system 24. Payment processing system 24 includes an associated database of permissible and/or impermissible use areas for a particular user's device 21.
  • Payment processing system 24 is configured to check position information of the device 21 against the permissible and/or impermissible use areas for each user, and thereby determine if the device is being used in an impermissible use area for the user. If so, the system 24 is configured to indicate that a possibility of fraud exists in the pending transaction. If the possibility of fraud is detected, the system may be configured to take an action, such as preventing fulfillment of the transaction due to the possibility of fraud.
  • The payment processing system may be implemented with conventional computing system with storage medium having programming instructions designed to implement the present invention, and one or more processors to execute the programming instructions.
  • The above embodiment is particularly useful in preventing fraud in e-commerce transactions over a public network, such as the Internet. Typically, when a cardholder orders a product or service via the Internet or telephone, there is no good way to know, in real-time, where that person and credit card are. A thief in Baltimore could be using an Oregonian's card information.
  • Under the present invention, when a cardholder is issued a card, the cardholder may be asked to give the geographic location of their home and office, as well as any other locations that the cardholder frequently place on-line orders and use the credit card. This information may be obtained during the application process or on an ongoing basis. The information may be entered into a database.
  • Thus, when an on-line order is placed through a device equipped to also sense and provide current location information to the order processing system, the order processing system may check the database for whether the transaction is being conducted from a permissible location. If the transaction is not being conducted from a permissible location, the transaction may be rejected. Additionally, a warning in the form of a message and/or a call may be provided to the cardholder.
  • GPS, cell phones, and other wireless devices may not work in all places, all of the time. Communication errors may often occur inside basements or underneath a canopy, etc. The FCC also must allow for interference. Black outs are becoming less of an issue over time as more towers are built and satellites are deployed, however, in some form or another, this will always be an issue.
  • The solution may be a smart database that tracks the velocity of the double custody device. For example, if the device is heading south at a velocity of 40 miles per hour and there is no coverage for an hour, the database could set up a grid displaying a 40 mile radius in which the transaction could possible occur. A red flag would be raised if the credit card were used outside this radius. The database may also factor in qualitative data, such as whether or not the last coverage occurred at an airport. In this scenario, the database might allow the velocity to be 400 miles an hour. The database may know that a certain coordinate has consistent coverage difficulties and may allow transactions based off previous history of the area. The parameters may be configured in a variety of ways, including time limits and authorization limits.
  • The embodiment may also potentially assist in the capturing of a credit card thief attempting to perpetrate the fraudulent transaction. If the credit card thief is making the fraudulent transaction from a device equipped to provide location information as described above, the location information could pin point where the transaction was initiated, making apprehension easier.
  • As shown in FIG. 3, an access device-present transaction system 100 is provided according to one embodiment of the present invention. System 100 is typically configured to use location indicators, alone or in combination with other parameters, to determine whether or not a user may operate on a particular virtual private computer network. Access device-present transaction system 100 typically includes an access device 110 configured to access network 120. The access device 110 may be a laptop, PDA, cell phone, or any other type of computing device configured to access a computer network, such as network 120, which may be the Internet.
  • Device 110 typically includes position sensor 110 a, and may be connected to network 120 via a communication link 130. Communication link 130 may be a wireless, radio, optical, USB, or virtually any other link that allows device 110 to communicate with network 120.
  • Upon establishment of link 130, device 110 is further configured to communicate with and/or operate on a variety of sub-networks, websites, etc. on network 120.
  • The network 120 typically includes a virtual private network (VPN) 120 a and is configured to allow access device 110, and similar devices to communicate with, and/or operate on VPN 120 a.
  • Upon being accessed by device 110, VPN 120 a is configured to send access and/or position information of device 110 to a VPN access control system 140. In alternate embodiments, the access and/or position information of device 110 may be provided to VPN access control system 140 directly.
  • System 140 is configured to use the access and/or position information received from VPN 120 a and/or information directly from device 110, along with position information received from position tracking system 180, discussed below, to determine if device 110 may operate on network 120 a.
  • System 100 further includes a position-sensing device 160 having a position sensor 160 b. Position-sensing device 160 may be a mobile telephone, watch, jewelry, computing device, global positioning unit, or other device including a position sensor 160 b. Typically, except to facilitate access device 110 in gaining access to VPN 120 a, position-sensing device 160 is otherwise not involved in the access of VPN 120 a by access device 110.
  • The position-sensing device 160 is configured to send position information to a position tracking system 180. The communication link between position tracking system 180 and position-sensing device 160 may be a satellite link such as used in a global positioning satellite system, radio frequency link, optical link such as infrared, or virtually any other communication link suitable for use in position detection. Position tracking system 180 is configured to communicate the position information for the position-sensing device 160 to VPN access control system 140.
  • To allow a user of access device 110 to operate on VPN 120 a, VPN access control system 140 is configured to compare the position of position-sensing device 160 to the location or position of access device 110. If the locations of the position-sensing device 160 and the access device 110 are different, or alternatively, if the location of the access device 110 is outside of some predetermined acceptable location, then the VPN access system is configured to determine that there is a possibility of an improper use of device 110, with respect to VPN 120 a.
  • Upon determining the possibility of improper use, the VPN access control system is configured to take a designated action, such as preventing access device 110 from operating on VPN 120 a. In instances where position information is obtained directly from access device 110, control system 140 may be further configured to compare this information with that obtained from tracking system 180 and use it to either admit or deny access to access device 110 on VPN 120 a, prior to the establishment of a communication link between the two.
  • The access control system may be implemented with conventional computing system with storage medium having programming instructions designed to implement the present invention, and one or more processors to execute the programming instructions.
  • As shown in FIG. 4, a security device-present transaction system 200 is provided according to one embodiment of the present invention. System 200 is typically configured to use location indicators, alone or in combination with other parameters, to determine the security clearance for access to a particular secured location. Security device-present transaction system 200 typically includes a security device 210 configured to be read by a security device reader 220. Security device 210 may be a card or badge encoded with security information, such as an access code.
  • Alternatively, the security device may be a mobile device (such as a mobile telephone) configured to transmit security information to security device reader 220 via an infrared or other communication link. Further, the security device may be any other device capable of providing the appropriate security and position information to security device reader 220. In particular, security device 210 may include a position sensor 210 a, configured to transmit information about its relative geographical location.
  • The security device reader 220 is typically configured to read security device 210, and to transmit security information received there from, to a security access control system 240. Typically, security access control system 240 knows the location of security device reader 220. Alternatively, security reader 220 may include a position sensor 220 a and may be configured to send position information, along with security information, to security access system 240. Alternatively, security device 210 may be a mobile device configured to directly transmit security and/or position information to security access control system 240 via a wireless link.
  • Security access control system 240 is further configured to detect the location or position of security device 210 and/or security reader 220 by the position information received from position sensors 210 a, and/or 220 a. Alternatively, the security access control system 240 is configured to detect the position of the security device reader (and therefore the position of the security device in a device-present transaction), by resolving a security identifier 220 b using a database of known security identifier locations. For example, the security identifier 1234567 may correspond to a gated entrance to a secured building.
  • System 200 further includes a position-sensing device 260 having a position sensor 260 b. Position-sensing device 260 may be a mobile telephone, watch, jewelry, computing device, global positioning unit, or other device including a position sensor 260 b. Typically, except for facilitating validation of the usage security device 210, position-sensing device 260 is otherwise not involved in the transaction entered into between security device 210 and security access control system 240 (via security reader 220), or similar transactions.
  • The position-sensing device 260 is configured to send position information to a position tracking system 280. The communication link between position tracking system 280 and position-sensing device 260 may be a satellite link such as used in a global positioning satellite system, radio frequency link, optical link such as infrared, or virtually any other communication link suitable for use in position detection. Position tracking system 280 is configured to communicate the position information for the position-sensing device 260 to payment processing system 240.
  • In order to detect an improper use of security device 210, security access control system 240 is configured to compare the position of position-sensing device 260 to the location or position of a current transaction involving security device 210 (i.e., the location or position of security device 210 and/or security device reader 220). If the locations of the position-sensing device 260 and the security device 210 are different, or alternatively, if the locations of position-sensing device 260 and security reader 220 are different, then the security access control system is configured to determine that there is a possibility of improper use of the security device in the current transaction.
  • Upon determining the possibility of improper use, the system 240 is configured to take a designated action, such as warning a security attendant and/or by automatically locking an entrance to a secured area.
  • The security control system may be implemented with conventional computing system with storage medium having programming instructions designed to implement the present invention, and one or more processors to execute the programming instructions.
  • Thus, it can be seen from the above descriptions, various novel location based method and apparatus for fraud prevention or reduction, including “double custody” methods, have been described.
  • While the present invention has been described in terms of the foregoing embodiments, those skilled in the art will recognize that the invention is not limited to the embodiments described. The present invention can be practiced with modification and alteration within the spirit and scope of the appended claims.
  • In particular, the present invention may be practiced to control access to physical resources or spaces without the employment of separate location sensor device, similar to the embodiment of FIG. 2 as an alternative to the embodiment of FIG. 1.
  • Further, the present invention may be employed selectively for only certain high value transactions, usages or accesses. Rules may be pre-established to facilitate identification of the higher value transactions, usages or accesses, and trigger the application of the present invention.
  • Yet further, the present invention may be used to accumulate the locations where the transactions are occurred, and a user may access the accumulated information to create a geographic picture or diary of the transactions conducted over a selected period.
  • Thus, the description is to be regarded as illustrative instead of restrictive on the present invention.

Claims (25)

1-20. (canceled)
21. A method for detecting fraud in a transaction, the method comprising:
receiving by a request processor a request for a first entity to conduct a transaction with a second entity, wherein the first entity and the second entity are not present in the same location;
detecting by the request processor a position of a payment device to be used by the first entity to conduct the transaction;
determining by the request processor whether the position corresponds to a permissible or impermissible use area for the first entity to conduct the transaction; and
permitting by the request processor the transaction to continue if it is determined that the position corresponds to a permissible use area.
22. The method of claim 21, further comprising flagging the request as potentially fraudulent if it is determined that the position does not correspond to a permissible use area.
23. The method of claim 21, further comprising denying the request if it is determined that the position corresponds to an impermissible use area.
24. The method of claim 21, wherein detecting by the request processor a position of a payment device to be used by the first entity to conduct the transaction comprises receiving position information wirelessly from the payment device.
25. The method of claim 24, further comprising receiving by the request processor transaction information from the payment device.
26. The method of claim 21, wherein determining by the request processor whether the position corresponds to a permissible or impermissible use area to conduct the transaction comprises comparing by the request processor the detected position of the payment device to a permissible and/or impermissible use area stored in a database accessible by the request processor.
27. The method of claim 21, wherein the payment device is a computing device, a mobile commerce device, a mobile telephone, or a point of sale terminal.
28. A request processing method with reduced likelihood of fraud, comprising a request processor:
receiving a request submitted via a device to conduct a transaction, access data, access a physical or informational resource, or access a secured area;
receiving from the device a location identifier indicating a location where the request is submitted or information that can lead to identification of the location where the request is submitted;
determining whether the location corresponds to a permissible or impermissible use area for the first entity to conduct the transaction, access the data, access the physical or informational resource, or access the secured area; and
determining whether to service the request based at least in part on the received location identifier or information and if it is determined that the location corresponds to a permissible use area.
29. A request processing method with reduced likelihood of fraud, comprising a request processor:
receiving from a device a first location identifier indicating a first location of the device at a first time;
receiving at a second time a request submitted via the device to conduct a transaction, access data, access a physical or informational resource, or access a secured area;
receiving from the device at the second time a second location identifier indicating a second location of the device at the second time; and
determining whether to service the request based at least in part on whether the second location is permissible based on the device being present at the first location at the first time and being present at the second location at the second time.
30. The method of claim 29, wherein the payment device is a computing device, a mobile commerce device, or a mobile telephone.
31. The method of claim 29, further comprising receiving from the device velocity information indicating a velocity of the device at the first time.
32. The method of claim 31, wherein determining whether to service the request is further based on the indicated velocity.
33. The method of claim 29, wherein determining whether to service the request is further based on a determined velocity of the device.
34. The method of claim 29, wherein determining whether to service the request is further based on one or more qualitative data.
35. The method of claim 29, wherein determining whether to service the request is further based on one or more established time limits.
36. The method of claim 29, wherein determining whether to service the request is further based on one or more established authorization limits.
37. A request processing method with reduced likelihood of fraud, comprising a request processor:
receiving from a position sensing device a first location identifier indicating a first location of the position sensing device at a first time;
receiving at a second time a request to conduct a transaction, access data, access a physical or informational resource, or access a secured area via another device associated with the position sensing device;
receiving from the position sensing device at the second time a second location identifier indicating a second location of the position sensing device at the second time; and
determining whether to service the request based at least in part on whether the second location is permissible based on the position sensing device being present at the first location at the first time and being present at the second location at the second time.
38. The method of claim 37, wherein the another device is a credit card, a computing device, a mobile commerce device, or a mobile telephone.
39. The method of claim 37, further comprising receiving from the position sensing device velocity information indicating a velocity of the position sensing device at the first time.
40. The method of claim 39, wherein determining whether to service the request is further based on the indicated velocity.
41. The method of claim 37, wherein determining whether to service the request is further based on a determined velocity of the position sensing device.
42. The method of claim 37, wherein determining whether to service the request is further based on one or more qualitative data.
43. The method of claim 37, wherein determining whether to service the request is further based on one or more established time limits.
44. The method of claim 37, wherein determining whether to service the request is further based on one or more established authorization limits.
US12/707,228 2002-02-05 2010-02-17 Location based fraud reduction system and method Abandoned US20100145868A1 (en)

Priority Applications (6)

Application Number Priority Date Filing Date Title
US35566702P true 2002-02-05 2002-02-05
US35686102P true 2002-02-12 2002-02-12
US36164602P true 2002-03-04 2002-03-04
US10/355,557 US7376431B2 (en) 2002-02-05 2003-01-31 Location based fraud reduction system and method
US12/050,752 US7684809B2 (en) 2002-02-05 2008-03-18 Location based fraud reduction system and method
US12/707,228 US20100145868A1 (en) 2002-02-05 2010-02-17 Location based fraud reduction system and method

Applications Claiming Priority (25)

Application Number Priority Date Filing Date Title
US12/707,228 US20100145868A1 (en) 2002-02-05 2010-02-17 Location based fraud reduction system and method
US13/179,836 US20120005039A1 (en) 2002-02-05 2011-07-11 Method of conducting financial transactions
US13/179,832 US20120005096A1 (en) 2002-02-05 2011-07-11 Method of conducting financial transactions
US13/192,147 US8615445B2 (en) 2002-02-05 2011-07-27 Method for conducting financial transactions
US13/298,564 US9916581B2 (en) 2002-02-05 2011-11-17 Back end of payment system associated with financial transactions using card readers coupled to mobile devices
US13/298,545 US20120126014A1 (en) 2002-02-05 2011-11-17 Card reader with offset read head
US13/298,540 US9324100B2 (en) 2002-02-05 2011-11-17 Card reader with asymmetric spring
US13/298,511 US20120118960A1 (en) 2002-02-05 2011-11-17 Method of transmitting information from a small card reader to a mobile device
US13/298,484 US20120126010A1 (en) 2002-02-05 2011-11-17 Cost effective card reader configured to be coupled to a mobile device
US13/298,510 US9262757B2 (en) 2002-02-05 2011-11-17 Method of transmitting information from a card reader with a power supply and wake-up circuit to a mobile device
US13/298,491 US9224142B2 (en) 2002-02-05 2011-11-17 Card reader with power efficient architecture that includes a power supply and a wake up circuit
US13/298,534 US9286635B2 (en) 2002-02-05 2011-11-17 Method of transmitting information from efficient communication protocol card readers to mobile devices
US13/298,525 US9582795B2 (en) 2002-02-05 2011-11-17 Methods of transmitting information from efficient encryption card readers to mobile devices
US13/298,560 US20120126007A1 (en) 2002-02-05 2011-11-17 Card reader with communication protocol
US13/298,501 US9305314B2 (en) 2002-02-05 2011-11-17 Methods of transmitting information to mobile devices using cost effective card readers
US13/298,557 US20120126006A1 (en) 2002-02-05 2011-11-17 Card reader with efficient encryption
US13/298,506 US9495676B2 (en) 2002-02-05 2011-11-17 Method of transmitting information from a power efficient card to a mobile device
US13/298,496 US9495675B2 (en) 2002-02-05 2011-11-17 Small card reader configured to be coupled to a mobile device
US13/298,520 US20120126013A1 (en) 2002-02-05 2011-11-17 Method for transmitting information from a card reader to a mobile device with the card reader having read head offset from a center of an associated housing
US13/298,487 US9262777B2 (en) 2002-02-05 2011-11-17 Card reader with power efficient architecture that includes a wake-up circuit
US13/298,514 US20120138683A1 (en) 2002-02-05 2011-11-17 Method of transmitting information from a card reader with an asymmetric spring to a mobile device
US14/942,515 US9449203B2 (en) 2002-02-05 2015-11-16 Card reader with power efficient architecture that includes a power supply and a wake-up circuit
US15/013,964 US9858603B2 (en) 2002-02-05 2016-02-02 Card reader with power efficient architecture that includes a wake-up circuit
US15/066,496 US10007813B2 (en) 2002-02-05 2016-03-10 Card reader with passive ID circuit
US15/252,033 US10140481B2 (en) 2002-02-05 2016-08-30 Card reader with power efficient architecture that includes a power supply and a wake-up circuit

Related Parent Applications (2)

Application Number Title Priority Date Filing Date
US12/050,752 Continuation US7684809B2 (en) 2002-02-05 2008-03-18 Location based fraud reduction system and method
US12/903,753 Continuation-In-Part US20110084139A1 (en) 2009-10-13 2010-10-13 Systems and methods for financial transaction through miniaturized card reader

Related Child Applications (2)

Application Number Title Priority Date Filing Date
US13/043,270 Continuation-In-Part US8235287B2 (en) 2009-10-13 2011-03-08 Read head device with slot configured to reduce torque
US13/179,836 Continuation-In-Part US20120005039A1 (en) 2002-02-05 2011-07-11 Method of conducting financial transactions

Publications (1)

Publication Number Publication Date
US20100145868A1 true US20100145868A1 (en) 2010-06-10

Family

ID=27792292

Family Applications (3)

Application Number Title Priority Date Filing Date
US10/355,557 Active 2025-07-15 US7376431B2 (en) 2002-02-05 2003-01-31 Location based fraud reduction system and method
US12/050,752 Active 2023-04-22 US7684809B2 (en) 2002-02-05 2008-03-18 Location based fraud reduction system and method
US12/707,228 Abandoned US20100145868A1 (en) 2002-02-05 2010-02-17 Location based fraud reduction system and method

Family Applications Before (2)

Application Number Title Priority Date Filing Date
US10/355,557 Active 2025-07-15 US7376431B2 (en) 2002-02-05 2003-01-31 Location based fraud reduction system and method
US12/050,752 Active 2023-04-22 US7684809B2 (en) 2002-02-05 2008-03-18 Location based fraud reduction system and method

Country Status (1)

Country Link
US (3) US7376431B2 (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110258117A1 (en) * 2010-04-14 2011-10-20 Dfs Services Llc Modification of payment transactions in real-time based upon external data source
CN102521936A (en) * 2011-12-20 2012-06-27 福建联迪商用设备有限公司 Method for avoiding non-local cashing through point of sale (POS)
WO2014149804A1 (en) * 2013-03-15 2014-09-25 Mcafee, Inc. System and method to reduce misuse of a financial instrument at a point-of-sale location
US9436955B2 (en) 2009-06-10 2016-09-06 Square, Inc. Methods for transferring funds using a payment service where financial account information is only entered once with a payment service and need not be re-entered for future transfers
US9454866B2 (en) 2010-10-13 2016-09-27 Square, Inc. Method of conducting financial transactions where a payer's financial account information is entered only once with a payment system
US9619797B2 (en) 2010-10-13 2017-04-11 Square, Inc. Payment methods with a payment service and tabs selected by a first party and opened by a second party at an geographic location of the first party's mobile device
CN106898069A (en) * 2017-02-24 2017-06-27 广东林盟科技有限公司 Access control system

Families Citing this family (152)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
USRE46528E1 (en) 1997-11-14 2017-08-29 Genesys Telecommunications Laboratories, Inc. Implementation of call-center outbound dialing capability at a telephony network level
US6480600B1 (en) 1997-02-10 2002-11-12 Genesys Telecommunications Laboratories, Inc. Call and data correspondence in a call-in center employing virtual restructuring for computer telephony integrated functionality
US7031442B1 (en) 1997-02-10 2006-04-18 Genesys Telecommunications Laboratories, Inc. Methods and apparatus for personal routing in computer-simulated telephony
USRE46243E1 (en) 1997-02-10 2016-12-20 Genesys Telecommunications Laboratories, Inc. In-band signaling for routing
US6104802A (en) 1997-02-10 2000-08-15 Genesys Telecommunications Laboratories, Inc. In-band signaling for routing
US7907598B2 (en) 1998-02-17 2011-03-15 Genesys Telecommunication Laboratories, Inc. Method for implementing and executing communication center routing strategies represented in extensible markup language
US9008075B2 (en) 2005-12-22 2015-04-14 Genesys Telecommunications Laboratories, Inc. System and methods for improving interaction routing performance
USRE46153E1 (en) 1998-09-11 2016-09-20 Genesys Telecommunications Laboratories, Inc. Method and apparatus enabling voice-based management of state and interaction of a remote knowledge worker in a contact center environment
USRE46387E1 (en) 1998-09-11 2017-05-02 Genesys Telecommunications Laboratories, Inc. Method and apparatus for extended management of state and interaction of a remote knowledge worker from a contact center
US6332154B2 (en) 1998-09-11 2001-12-18 Genesys Telecommunications Laboratories, Inc. Method and apparatus for providing media-independent self-help modules within a multimedia communication-center customer interface
US6711611B2 (en) 1998-09-11 2004-03-23 Genesis Telecommunications Laboratories, Inc. Method and apparatus for data-linking a mobile knowledge worker to home communication-center infrastructure
US6985943B2 (en) * 1998-09-11 2006-01-10 Genesys Telecommunications Laboratories, Inc. Method and apparatus for extended management of state and interaction of a remote knowledge worker from a contact center
US7929978B2 (en) * 1999-12-01 2011-04-19 Genesys Telecommunications Laboratories, Inc. Method and apparatus for providing enhanced communication capability for mobile devices on a virtual private network
US8706630B2 (en) 1999-08-19 2014-04-22 E2Interactive, Inc. System and method for securely authorizing and distributing stored-value card data
US7110773B1 (en) 2000-04-11 2006-09-19 Telecommunication Systems, Inc. Mobile activity status tracker
ES2450923T3 (en) 2001-09-24 2014-03-25 E2Interactive, Inc. D/B/A E2Interactive, Inc. System and method for providing communication services
US20030119528A1 (en) * 2001-12-26 2003-06-26 Boathouse Communication Partners, Llc System and method for an automated intermediary to broker remote transaction between parties based on actively managed private profile information
US7376431B2 (en) * 2002-02-05 2008-05-20 Niedermeyer Brian J Location based fraud reduction system and method
US9811836B2 (en) 2002-10-23 2017-11-07 Modiv Media, Inc System and method of a media delivery services platform for targeting consumers in real time
US7740168B2 (en) 2003-08-18 2010-06-22 Visa U.S.A. Inc. Method and system for generating a dynamic verification value
CA2480531C (en) * 2003-09-22 2012-06-12 Tekran Inc. Conditioning system and method for use in the measurement of mercury in gaseous emissions
US20050071417A1 (en) * 2003-09-29 2005-03-31 Jeffrey Taylor Method and apparatus for geolocation of a network user
US8655309B2 (en) 2003-11-14 2014-02-18 E2Interactive, Inc. Systems and methods for electronic device point-of-sale activation
US6948656B2 (en) * 2003-12-23 2005-09-27 First Data Corporation System with GPS to manage risk of financial transactions
US20050149443A1 (en) * 2004-01-05 2005-07-07 Marko Torvinen Method and system for conditional acceptance to a group
US8272032B2 (en) 2004-11-10 2012-09-18 Mlb Advanced Media, L.P. Multiple user login detection and response system
US7258268B2 (en) 2005-02-28 2007-08-21 Moneygram International, Inc. Method and apparatus for money transfer
US7221949B2 (en) * 2005-02-28 2007-05-22 Research In Motion Limited Method and system for enhanced security using location-based wireless authentication
US20060217880A1 (en) * 2005-03-22 2006-09-28 Jung Edward K Map-based guide system and method
US7472822B2 (en) 2005-03-23 2009-01-06 E2Interactive, Inc. Delivery of value identifiers using short message service (SMS)
US8640197B2 (en) * 2005-04-26 2014-01-28 Guy Heffez Methods for acquiring an internet user's consent to be located and for authenticating the identity of the user using location information
US9727867B2 (en) 2005-04-26 2017-08-08 Guy Hefetz Method for detecting misuse of identity in electronic transactions
DE102005021129A1 (en) * 2005-05-06 2006-11-09 Robert Bosch Gmbh Data e.g. bank transaction data, transmitting method, involves connecting data source to locating unit, and assigning useful data in supplementary data, where supplementary data is transmitted to sink together with useful data
US8285639B2 (en) * 2005-07-05 2012-10-09 mConfirm, Ltd. Location based authentication system
US8626130B2 (en) * 2005-08-23 2014-01-07 Modiv Media, Inc. System and method for user controlled log-in; interacting and log-out
US8656458B2 (en) * 2005-08-25 2014-02-18 Guy Heffez Method and system for authenticating internet user identity
US9065643B2 (en) 2006-04-05 2015-06-23 Visa U.S.A. Inc. System and method for account identifier obfuscation
FR2895122B1 (en) * 2005-12-16 2008-02-01 Sagem Defense Securite Process for securisation of physical access and access dispositf implementing the method
US7818264B2 (en) 2006-06-19 2010-10-19 Visa U.S.A. Inc. Track data encryption
US8463284B2 (en) 2006-07-17 2013-06-11 Telecommunication Systems, Inc. Short messaging system (SMS) proxy communications to enable location based services in wireless devices
US20080035725A1 (en) * 2006-08-11 2008-02-14 International Business Machines Corporation Method to use cell phone location to authenticate or enable/disable authorization of credit cards
FR2905022B1 (en) * 2006-08-17 2009-12-25 Ingenico Sa Electronic payment terminal and setting method for disposal of electronic payment terminals
US8099105B2 (en) 2006-09-19 2012-01-17 Telecommunication Systems, Inc. Device based trigger for location push event
US20080147546A1 (en) * 2006-09-19 2008-06-19 Walter Weichselbaumer Wireless device electronic wallet transaction validation
US9408046B2 (en) 2006-10-03 2016-08-02 Telecommunication Systems, Inc. 911 data messaging
US7657497B2 (en) * 2006-11-07 2010-02-02 Ebay Inc. Online fraud prevention using genetic algorithm solution
US7878393B2 (en) 2006-12-07 2011-02-01 Moneygram International, Inc. Method and apparatus for distribution of money transfers
US9876749B2 (en) * 2006-12-18 2018-01-23 Cisco Technology, Inc. Dynamic location-specific distribution lists
US20150310564A1 (en) * 2007-01-29 2015-10-29 Capital One Financial Corporation Systems and methods for geo-coded financial account statement visualization
US9432845B2 (en) 2007-03-16 2016-08-30 Visa International Service Association System and method for automated analysis comparing a wireless device location with another geographic location
US9154952B2 (en) * 2007-03-16 2015-10-06 Finsphere Corporation Systems and methods for authenticating a user of a computer application, network, or device using a wireless device
US9420448B2 (en) 2007-03-16 2016-08-16 Visa International Service Association System and method for automated analysis comparing a wireless device location with another geographic location
US8116731B2 (en) * 2007-11-01 2012-02-14 Finsphere, Inc. System and method for mobile identity protection of a user of multiple computer applications, networks or devices
US9922323B2 (en) 2007-03-16 2018-03-20 Visa International Service Association System and method for automated analysis comparing a wireless device location with another geographic location
US8374634B2 (en) 2007-03-16 2013-02-12 Finsphere Corporation System and method for automated analysis comparing a wireless device location with another geographic location
US8280348B2 (en) 2007-03-16 2012-10-02 Finsphere Corporation System and method for identity protection using mobile device signaling network derived location pattern recognition
US9456348B2 (en) 2007-03-16 2016-09-27 Visa International Service Association Systems and methods for authenticating a user of a computer application, network, or device using a wireless device
US20080288405A1 (en) * 2007-05-20 2008-11-20 Michael Sasha John Systems and Methods for Automatic and Transparent Client Authentication and Online Transaction Verification
US8533821B2 (en) 2007-05-25 2013-09-10 International Business Machines Corporation Detecting and defending against man-in-the-middle attacks
WO2008147353A1 (en) * 2007-05-29 2008-12-04 Heffez Guy S Method and system for authenticating internet user indentity
US8676672B2 (en) 2007-08-23 2014-03-18 E2Interactive, Inc. Systems and methods for electronic delivery of stored value
US20090119170A1 (en) 2007-10-25 2009-05-07 Ayman Hammad Portable consumer device including data bearing medium including risk based benefits
US9369294B2 (en) 2007-12-14 2016-06-14 Telecommunication Systems, Inc. Reverse 911 using multicast session internet protocol (SIP) conferencing of voice over internet protocol (VoIP) users
EP2223551A4 (en) * 2007-12-14 2015-08-05 Telecomm Systems Inc Wireless application protocol (wap) application location based services (lbs)
US8220034B2 (en) * 2007-12-17 2012-07-10 International Business Machines Corporation User authentication based on authentication credentials and location information
EP2225743A4 (en) * 2007-12-21 2012-01-04 Telecomm Systems Inc Wireless device electronic wallet transaction validation
US20090171797A1 (en) * 2007-12-28 2009-07-02 Mastercard International, Inc. Positionally Trackable Payment Device
US8725578B2 (en) * 2008-01-30 2014-05-13 Intuit Inc. Method and apparatus for authorizing a financial transaction
US9185123B2 (en) 2008-02-12 2015-11-10 Finsphere Corporation System and method for mobile identity protection for online user authentication
EP2281386A4 (en) * 2008-05-14 2013-05-08 Finsphere Corp Systems and methods for authenticating a user of a computer application, network, or device using a wireless device
US8346662B2 (en) * 2008-05-16 2013-01-01 Visa U.S.A. Inc. Desktop alert with interactive bona fide dispute initiation through chat session facilitated by desktop application
US8707319B2 (en) * 2008-06-26 2014-04-22 Visa International Service Association Resource location verification by comparing and updating resource location with a location of a consumer device after a threshold of location mismatches is exceeded
US8478692B2 (en) 2008-06-26 2013-07-02 Visa International Service Association Systems and methods for geographic location notifications of payment transactions
US20090327135A1 (en) * 2008-06-26 2009-12-31 Loc Duc Nguyen Credit card paired with location identifiable device for point of service fraud detection
US9542687B2 (en) 2008-06-26 2017-01-10 Visa International Service Association Systems and methods for visual representation of offers
US9596359B2 (en) * 2008-06-26 2017-03-14 Visa International Service Association Mobile communication device configured for transit application
US8744959B2 (en) * 2008-08-13 2014-06-03 Moneygram International, Inc. Electronic bill payment with variable payment options
US20100138338A1 (en) * 2008-09-24 2010-06-03 Ayman Hammad Intelligent alert system and method
MX2011003199A (en) 2008-09-25 2011-05-25 Visa Int Service Ass Systems and methods for sorting alert and offer messages on a mobile device.
US20100078471A1 (en) * 2008-09-30 2010-04-01 Apple Inc. System and method for processing peer-to-peer financial transactions
US20100082481A1 (en) * 2008-09-30 2010-04-01 Apple Inc. Peer-to-peer financial transaction devices and methods
US20100078472A1 (en) 2008-09-30 2010-04-01 Apple Inc. Group peer-to-peer financial transactions
US20100114617A1 (en) * 2008-10-30 2010-05-06 International Business Machines Corporation Detecting potentially fraudulent transactions
US9031866B1 (en) 2008-11-17 2015-05-12 Jpmorgan Chase Bank, N.A. Systems and methods for use of transaction data for customers
FR2940567B1 (en) * 2008-12-22 2013-07-05 Ingenico Sa Process for securisation transaction, transaction device, bank server, mobile terminal and computer program products corresponding
US8869243B2 (en) * 2008-12-26 2014-10-21 Facebook, Inc. Authenticating user sessions based on reputation of user locations
US8145561B1 (en) 2009-01-05 2012-03-27 Sprint Communications Company L.P. Phone usage pattern as credit card fraud detection trigger
GB0901407D0 (en) * 2009-01-28 2009-03-11 Validsoft Uk Ltd Card false-positive prevention
GB0904874D0 (en) * 2009-03-20 2009-05-06 Validsoft Uk Ltd Smartcard security system
US9230259B1 (en) 2009-03-20 2016-01-05 Jpmorgan Chase Bank, N.A. Systems and methods for mobile ordering and payment
US20100269162A1 (en) 2009-04-15 2010-10-21 Jose Bravo Website authentication
US20100274567A1 (en) * 2009-04-22 2010-10-28 Mark Carlson Announcing information about payment transactions of any member of a consumer group
US20100274626A1 (en) * 2009-04-22 2010-10-28 Mark Carlson Receipt of communications from announcement recipients of consumer data
US20100274625A1 (en) * 2009-04-22 2010-10-28 Mark Carlson Targeting merchant announcements triggered by consumer activity relative to a surrogate merchant
US7937291B2 (en) * 2009-04-22 2011-05-03 Visa U.S.A. Inc. Providing an announcement about transactions of a target merchant to a consumer
US8160934B2 (en) * 2009-04-22 2012-04-17 Visa U.S.A. Inc. Notification of resources of interest to members of a consumer group
US8032413B2 (en) 2009-04-22 2011-10-04 Visa U.S.A. Inc. Auctioning of announcements
US8543468B2 (en) 2009-04-22 2013-09-24 Visa U.S.A. Inc. Bidding to receive data after a consumer is in a zone
US20100274627A1 (en) * 2009-04-22 2010-10-28 Mark Carlson Receiving an announcement triggered by location data
US20100274566A1 (en) * 2009-04-22 2010-10-28 Mark Carlson Location based processing of announcements for delivery to an announcement recipient
US9449327B2 (en) * 2009-04-28 2016-09-20 Visa International Service Association Merchant alert based system and method including customer presence notification
US20100274653A1 (en) * 2009-04-28 2010-10-28 Ayman Hammad Notification social networking
US20100299249A1 (en) * 2009-04-28 2010-11-25 Mark Carlson Sku level control and alerts
US9710802B2 (en) 2009-04-28 2017-07-18 Visa International Service Association Merchant competition alert
US9734495B2 (en) * 2009-06-02 2017-08-15 Qualcomm Incorporated Mobile commerce authentication and authorization systems
US20110022517A1 (en) * 2009-07-22 2011-01-27 Ayman Hammad Apparatus including data bearing medium for authorizing a payment transaction using seasoned data
US9396465B2 (en) * 2009-07-22 2016-07-19 Visa International Service Association Apparatus including data bearing medium for reducing fraud in payment transactions using a black list
US20110022518A1 (en) * 2009-07-22 2011-01-27 Ayman Hammad Apparatus including data bearing medium for seasoning a device using data obtained from multiple transaction environments
CA2805177A1 (en) 2009-07-31 2011-02-03 Finsphere Corporation Mobile communications message verification of financial transactions
US20110055013A1 (en) * 2009-08-28 2011-03-03 Ayman Hammad Secure alert system and method
US20110137740A1 (en) 2009-12-04 2011-06-09 Ashmit Bhattacharya Processing value-ascertainable items
US8683609B2 (en) * 2009-12-04 2014-03-25 International Business Machines Corporation Mobile phone and IP address correlation service
US20110148633A1 (en) * 2009-12-21 2011-06-23 Kohlenberg Tobias M Using trajectory for authentication
US9092763B2 (en) 2009-12-30 2015-07-28 Moneygram International, Inc. Retail sale money transfer system
WO2011088970A1 (en) * 2010-01-20 2011-07-28 Giesecke & Devrient Gmbh Method for carrying out a transaction between a portable data carrier and a terminal
US20110270744A1 (en) * 2010-04-30 2011-11-03 Ginger Baker Mobile tangible value banking system
US20130218771A1 (en) * 2010-05-24 2013-08-22 Secure Electrans Limited Electronic payment unit, electronic payment origin authentication system and method
US8336664B2 (en) 2010-07-09 2012-12-25 Telecommunication Systems, Inc. Telematics basic mobile device safety interlock
US20120084162A1 (en) * 2010-10-05 2012-04-05 Merrill Brooks Smith Systems and methods for conducting a composite bill payment transaction
US8942743B2 (en) 2010-12-17 2015-01-27 Telecommunication Systems, Inc. iALERT enhanced alert manager
US8688087B2 (en) 2010-12-17 2014-04-01 Telecommunication Systems, Inc. N-dimensional affinity confluencer
US20130030934A1 (en) * 2011-01-28 2013-01-31 Zumigo, Inc. System and method for credit card transaction approval based on mobile subscriber terminal location
KR101361821B1 (en) * 2011-02-10 2014-02-13 주식회사 케이티 Method and system for collecting information of access point interworking with mobile card payment system, mobile communication terminal for use therein
US20120317027A1 (en) * 2011-06-13 2012-12-13 Ho Ming Luk Computer-Implemented Systems And Methods For Real-Time Scoring Of Enterprise Data
US20120317008A1 (en) * 2011-06-13 2012-12-13 Revathi Subramanian Computer-Implemented Systems And Methods For Handling And Scoring Enterprise Data
US8732042B2 (en) * 2011-07-28 2014-05-20 Visa International Service Association Mobile data mapping system and method
EP2551814A1 (en) * 2011-07-29 2013-01-30 Pacifica Beteiligungsgesellschaft mbH Method for authenticating a person authorised to access a transaction terminal
US20130046692A1 (en) * 2011-08-19 2013-02-21 Bank Of America Corporation Fraud protection with user location verification
US8863258B2 (en) * 2011-08-24 2014-10-14 International Business Machines Corporation Security for future log-on location
GB2492614B (en) * 2012-02-28 2014-01-29 Barclays Bank Plc System and method for authenticating a payment transaction
EP2836971B1 (en) * 2012-04-13 2017-12-13 Mastercard International, Inc. Systems, methods, and computer readable media for conducting a transaction using cloud based credentials
GB2501478A (en) * 2012-04-23 2013-10-30 Icheque Network Ltd Verification of electronic payment
WO2013181151A2 (en) * 2012-05-26 2013-12-05 Finsphere Corporation System and method for automated analysis comparing a wireless device location with another geographic location
US8768847B2 (en) 2012-06-21 2014-07-01 Microsoft Corporation Privacy enhancing personal data brokerage service
SG11201500272XA (en) * 2012-07-16 2015-02-27 Mashinery Pty Ltd Authorization of transactions
US8917826B2 (en) 2012-07-31 2014-12-23 International Business Machines Corporation Detecting man-in-the-middle attacks in electronic transactions using prompts
US9578499B2 (en) 2012-08-21 2017-02-21 Facebook, Inc. Authenticating user sessions based on information obtained from mobile devices
US20140058805A1 (en) * 2012-08-24 2014-02-27 Sap Ag Remotely authorizing a purchase from a head unit of a vehicle
US9208346B2 (en) 2012-09-05 2015-12-08 Telecommunication Systems, Inc. Persona-notitia intellection codifier
CN103236118B (en) * 2013-02-28 2015-12-23 上海富友支付服务有限公司 A mobile financial terminal monitoring system and method based on a mobile station location technology
JP2016518735A (en) * 2013-03-14 2016-06-23 テルコム・ベンチャーズ・エルエルシー Location was used, authentication of the user identification
US9594907B2 (en) 2013-03-14 2017-03-14 Sas Institute Inc. Unauthorized activity detection and classification
US20140330721A1 (en) * 2013-05-02 2014-11-06 Quan Wang Systems and methods for verifying and processing transactions using virtual currency
US20140358741A1 (en) * 2013-05-29 2014-12-04 Mastercard International Incorporated Method and system for showrooming detection
US10102575B1 (en) * 2013-06-24 2018-10-16 Dividex Analytics, LLC Securities claims identification, optimization and recovery system and methods
US9646342B2 (en) 2013-07-19 2017-05-09 Bank Of America Corporation Remote control for online banking
US9519934B2 (en) 2013-07-19 2016-12-13 Bank Of America Corporation Restricted access to online banking
US9344419B2 (en) 2014-02-27 2016-05-17 K.Y. Trix Ltd. Methods of authenticating users to a site
US9510204B2 (en) 2014-02-28 2016-11-29 Life360, Inc. Apparatus and method of determining fraudulent use of a mobile device based on behavioral abnormality
US20150309962A1 (en) * 2014-04-25 2015-10-29 Xerox Corporation Method and apparatus for modeling a population to predict individual behavior using location data from social network messages
EP3271885A4 (en) 2015-03-17 2018-02-21 Visa International Service Association Multi-device transaction verification
CA3042534A1 (en) * 2016-11-07 2018-05-11 Walmart Apollo, Llc Reducing cybersecurity risks when purchasing products over a network

Citations (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5878337A (en) * 1996-08-08 1999-03-02 Joao; Raymond Anthony Transaction security apparatus and method
US20010001856A1 (en) * 1999-10-28 2001-05-24 Gould David B. Prepaid cash equivalent card and system
US20020049644A1 (en) * 2000-09-28 2002-04-25 Kargman James B. Method for simplified one-touch ordering of goods and services from a wired or wireless phone or terminal
US20020099648A1 (en) * 2000-09-19 2002-07-25 Devoe Dana L. Method of reducing fraud in credit card and other E-business
US20020108062A1 (en) * 2000-05-15 2002-08-08 Takayuki Nakajima Authentication system and method
US20020169541A1 (en) * 1995-01-11 2002-11-14 Bouve W. Lincoln System and methods for remotely accessing a selected group of items of interest from a database
US20020188535A1 (en) * 2001-03-15 2002-12-12 David Chao Method and apparatus for processing sales transaction data
US20030135463A1 (en) * 2002-01-16 2003-07-17 International Business Machines Corporation Credit authorization system and method
US6612488B2 (en) * 2001-03-14 2003-09-02 Hitachi, Ltd. Method and system to prevent fraudulent payment in credit/debit card transactions, and terminals therefor
US6813608B1 (en) * 1999-10-11 2004-11-02 Park Tours, Inc. System and method for enhancing user experience in a wide-area facility having a distributed, bounded environment
US6832721B2 (en) * 2000-10-04 2004-12-21 Nec Corporation Authentication system using information on position
US6850147B2 (en) * 2001-04-02 2005-02-01 Mikos, Ltd. Personal biometric key
US6868391B1 (en) * 1997-04-15 2005-03-15 Telefonaktiebolaget Lm Ericsson (Publ) Tele/datacommunications payment method and apparatus
US6896182B2 (en) * 2000-08-10 2005-05-24 Nec Corporation Card verification system and card verification method
US7013149B2 (en) * 2002-04-11 2006-03-14 Mitsubishi Electric Research Laboratories, Inc. Environment aware services for mobile devices
US7149296B2 (en) * 2001-12-17 2006-12-12 International Business Machines Corporation Providing account usage fraud protection
US7167711B1 (en) * 1997-12-23 2007-01-23 Openwave Systems Inc. System and method for controlling financial transactions over a wireless network
US20070124211A1 (en) * 2000-03-27 2007-05-31 Smith Steven B Methods and apparatus for wireless point-of-sale transactions
US7376431B2 (en) * 2002-02-05 2008-05-20 Niedermeyer Brian J Location based fraud reduction system and method
US20080147564A1 (en) * 2001-06-26 2008-06-19 Tara Chand Singhal Security in use of bankcards that protects bankcard data from merchant systems in a payment card system
US20090100168A1 (en) * 2000-05-24 2009-04-16 Harris Scott C Automatic location detection in a computing environment

Patent Citations (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020169541A1 (en) * 1995-01-11 2002-11-14 Bouve W. Lincoln System and methods for remotely accessing a selected group of items of interest from a database
US5878337A (en) * 1996-08-08 1999-03-02 Joao; Raymond Anthony Transaction security apparatus and method
US6868391B1 (en) * 1997-04-15 2005-03-15 Telefonaktiebolaget Lm Ericsson (Publ) Tele/datacommunications payment method and apparatus
US7167711B1 (en) * 1997-12-23 2007-01-23 Openwave Systems Inc. System and method for controlling financial transactions over a wireless network
US6813608B1 (en) * 1999-10-11 2004-11-02 Park Tours, Inc. System and method for enhancing user experience in a wide-area facility having a distributed, bounded environment
US20010001856A1 (en) * 1999-10-28 2001-05-24 Gould David B. Prepaid cash equivalent card and system
US20070124211A1 (en) * 2000-03-27 2007-05-31 Smith Steven B Methods and apparatus for wireless point-of-sale transactions
US20020108062A1 (en) * 2000-05-15 2002-08-08 Takayuki Nakajima Authentication system and method
US20090100168A1 (en) * 2000-05-24 2009-04-16 Harris Scott C Automatic location detection in a computing environment
US6896182B2 (en) * 2000-08-10 2005-05-24 Nec Corporation Card verification system and card verification method
US20020099648A1 (en) * 2000-09-19 2002-07-25 Devoe Dana L. Method of reducing fraud in credit card and other E-business
US20020049644A1 (en) * 2000-09-28 2002-04-25 Kargman James B. Method for simplified one-touch ordering of goods and services from a wired or wireless phone or terminal
US6832721B2 (en) * 2000-10-04 2004-12-21 Nec Corporation Authentication system using information on position
US6612488B2 (en) * 2001-03-14 2003-09-02 Hitachi, Ltd. Method and system to prevent fraudulent payment in credit/debit card transactions, and terminals therefor
US20020188535A1 (en) * 2001-03-15 2002-12-12 David Chao Method and apparatus for processing sales transaction data
US6850147B2 (en) * 2001-04-02 2005-02-01 Mikos, Ltd. Personal biometric key
US20080147564A1 (en) * 2001-06-26 2008-06-19 Tara Chand Singhal Security in use of bankcards that protects bankcard data from merchant systems in a payment card system
US7149296B2 (en) * 2001-12-17 2006-12-12 International Business Machines Corporation Providing account usage fraud protection
US20030135463A1 (en) * 2002-01-16 2003-07-17 International Business Machines Corporation Credit authorization system and method
US7376431B2 (en) * 2002-02-05 2008-05-20 Niedermeyer Brian J Location based fraud reduction system and method
US20080156870A1 (en) * 2002-02-05 2008-07-03 Brian Joseph Niedermeyer Location based fraud reduction system and method
US7013149B2 (en) * 2002-04-11 2006-03-14 Mitsubishi Electric Research Laboratories, Inc. Environment aware services for mobile devices

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9436955B2 (en) 2009-06-10 2016-09-06 Square, Inc. Methods for transferring funds using a payment service where financial account information is only entered once with a payment service and need not be re-entered for future transfers
US20110258117A1 (en) * 2010-04-14 2011-10-20 Dfs Services Llc Modification of payment transactions in real-time based upon external data source
US9454866B2 (en) 2010-10-13 2016-09-27 Square, Inc. Method of conducting financial transactions where a payer's financial account information is entered only once with a payment system
US9619797B2 (en) 2010-10-13 2017-04-11 Square, Inc. Payment methods with a payment service and tabs selected by a first party and opened by a second party at an geographic location of the first party's mobile device
CN102521936A (en) * 2011-12-20 2012-06-27 福建联迪商用设备有限公司 Method for avoiding non-local cashing through point of sale (POS)
WO2014149804A1 (en) * 2013-03-15 2014-09-25 Mcafee, Inc. System and method to reduce misuse of a financial instrument at a point-of-sale location
CN106898069A (en) * 2017-02-24 2017-06-27 广东林盟科技有限公司 Access control system

Also Published As

Publication number Publication date
US7376431B2 (en) 2008-05-20
US20080156870A1 (en) 2008-07-03
US7684809B2 (en) 2010-03-23
US20030169881A1 (en) 2003-09-11

Similar Documents

Publication Publication Date Title
US8244631B2 (en) Data transfer system using mobile terminal and two-dimensional barcode
US10062076B1 (en) System and method for a mobile wallet
US7600676B1 (en) Two factor authentications for financial transactions
US7527195B2 (en) Method and system for risk management in a transaction
US7890433B2 (en) Private and secure payment system
JP5946441B2 (en) Operation method, the mobile device and pos system
KR101502460B1 (en) Consumer Authentication System and Method
US7752084B2 (en) Method and system for detecting fraud in a credit card transaction over the internet
RU2530696C2 (en) Mobile device, method and system for performing payment transactions
CA2604348C (en) Mobile phone charge card notification and authorization method
US8234172B2 (en) System for securing card payment transactions using a mobile communication device
US20140108172A1 (en) Dynamic point of sale system integrated with reader device
US8719106B2 (en) Identity theft and fraud protection system and method
US20040004117A1 (en) Method and system to prevent fraudulent payment in credit/debit card transactions, and terminals therefor
US20090152343A1 (en) Authentication methods for use in financial transactions and information banking
JP6266638B2 (en) The electronic wallet device, method, and computer program product
US20020178063A1 (en) Community concept for payment using RF ID transponders
RU2419872C2 (en) System and method of using protected account numbers in non-contact devices
US10163100B2 (en) Location based authentication
US8914302B2 (en) Mobile commerce authentication and authorization system
US9183555B2 (en) Transaction processing using a global unique identifier
US7082416B2 (en) Method of using prepaid cash card for making purchases on the world wide web
US8639629B1 (en) System and method for accessing an online user account registry via a thin-client unique user code
US20110238553A1 (en) Electronic account-to-account funds transfer
US20120203700A1 (en) Tokenized contactless payments for mobile devices

Legal Events

Date Code Title Description
AS Assignment

Owner name: SQUARE, INC., CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:NIEDERMEYER, BRIAN J.;REEL/FRAME:025580/0721

Effective date: 20101216

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION