The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Jan. 25, 2022

Filed:

Mar. 18, 2021
Applicant:

Nortonlifelock Inc., Tempe, AZ (US);

Inventors:

Qing Li, Cupertino, CA (US);

Brian Varner, Polk City, FL (US);

Stanley Kiefer, Navarre, FL (US);

Daniel Kats, Culver City, CA (US);

Yun Shen, Bristol, GB;

David Silva, Dublin, IE;

Assignee:

NortonLifeLock Inc., Tempe, AZ (US);

Attorney:
Primary Examiner:
Int. Cl.
CPC ...
G06Q 30/00 (2012.01); G06F 16/23 (2019.01); H04W 12/61 (2021.01); G06Q 50/26 (2012.01); H04W 4/029 (2018.01); H04W 12/63 (2021.01);
U.S. Cl.
CPC ...
G06Q 30/018 (2013.01); G06Q 50/26 (2013.01); H04W 4/029 (2018.02); H04W 12/61 (2021.01); H04W 12/63 (2021.01); G06F 16/2379 (2019.01);
Abstract

The disclosed computer-implemented method for protecting users may include (i) identifying a first light-and-radio frequency signature that was captured by a security device based on signals emanating from a mobile computing device at a first time and location, (ii) identifying a second light-and-radio frequency signature that was captured by a same or different security device based on signals emanating from the same mobile computing device at a second time and location, (iii) determining that the first light-and-radio frequency signature and the second light-and-radio frequency signature match such that an inference is made that an individual possessing the mobile computing device was present at both the first time and location and the second time and location, and (iv) performing, based on the inference, a security action to protect a user. Various other methods, systems, and computer-readable media are also disclosed.


Find Patent Forward Citations

Loading…