Browse Prior Art Database

Geo Payment Validation

IP.com Disclosure Number: IPCOM000211473D
Publication Date: 2011-Oct-06
Document File: 2 page(s) / 99K

Publishing Venue

The IP.com Prior Art Database

Abstract

Users may have their credit card stolen and later used at teller machines or in stores. The problem is to avoid such situations. In this idea the POS or teller machine is configured with its GPS position (GPS device needed only once to get the coordinates). POS or teller machine initiates the usual transaction with the credit card organization and adds its GPS position to the data transmitted while waiting for the approval.

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 100% of the total text.

Page 01 of 2

Geo Payment Validation

This proposal is to improve security with credit cards payments: a mobile phone is used to approve credit card usage. With this idea a credit card user authorizes transactions with his credit card only if his mobile phone is located at the proximity of the machine performing the transaction.

The user provides his credit card at a teller machine or at a cashier:


If the user's phone is inside a given distance to the debit machine then the
transaction is validated as usual.


Otherwise the transaction is rejected.

     In this disclosure the POS or teller machine is configured with its GPS position (the GPS device needed only once to get the coordinates).

     The POS or teller machine initiates the usual transaction with the credit card organization and adds its GPS position to the data transmitted while waiting for the approval.

    The credit card organization based on the owner phone number requests to the mobile phone operator its current GPS localization and performs a checking with the POS or teller machine position. If they match then the transaction is validated otherwise it is rejected.

     The advantage of this idea is to prevent stolen cards being used in POS or teller machines, and another advantage is that the process is transparent to users.

The next figure gives the transaction flow:


Page 02 of 2

2