Equifax Inc.
LOCATION-BASED DETECTION OF UNAUTHORIZED USE OF INTERACTIVE COMPUTING ENVIRONMENT FUNCTIONS
Last updated:
Abstract:
In some aspects, a computing system can obtain, via a first communication channel with a host server, a data network identifier that identifies a mobile device accessing an interactive computing environment provide by a host server. The computing system can generate, from communications with a telecommunication provider server via a second communication channel, a dynamic identity-verification element that includes the data network identifier and a location identifier that identifies a geographic location of the mobile device. The computing system can match the dynamic identity-verification element to a device-and-location combination indicating unauthorized use of the host server by the mobile device. The computing system can prevent the mobile device from accessing a function for advancing an electronic transaction within the interactive computing environment.
Utility
13 Apr 2018
9 Sep 2021