NortonLifeLock Inc.
Systems and methods for protecting users

Last updated:

Abstract:

The disclosed computer-implemented method for protecting users may include (i) identifying a first light-and-radio frequency signature that was captured by a security device based on signals emanating from a mobile computing device at a first time and location, (ii) identifying a second light-and-radio frequency signature that was captured by a same or different security device based on signals emanating from the same mobile computing device at a second time and location, (iii) determining that the first light-and-radio frequency signature and the second light-and-radio frequency signature match such that an inference is made that an individual possessing the mobile computing device was present at both the first time and location and the second time and location, and (iv) performing, based on the inference, a security action to protect a user. Various other methods, systems, and computer-readable media are also disclosed.

Status:
Grant
Type:

Utility

Filling date:

18 Mar 2021

Issue date:

25 Jan 2022