Bank of America Corporation
MONITORING FOR SECURITY THREATS ASSOCIATED WITH MOBILE DEVICES THAT HAVE BEEN IDENTIFIED AND LOGGED

Last updated:

Abstract:

A system includes a database, a sensor, and a hardware processor communicatively coupled to the sensor. The database stores an identifier assigned to a mobile device. The presence of the identifier in the database indicates that a user of the mobile device is associated with a security breach. The mobile device is configured to transmit the identifier over a wireless network. The sensor has a range and is configured to obtain the identifier transmitted by the mobile device when the mobile device is located within the range. The hardware processor receives the identifier from the sensor. The processor also determines that the identifier is stored in the database. In response to determining that the identifier is stored in the database, the processor initiates a security protocol.

Status:
Application
Type:

Utility

Filling date:

20 Nov 2020

Issue date:

26 May 2022