US 12,321,448 B2
Methods and techniques to identify suspicious activity based on ultrasonic signatures
Devu Manikantan Shila, Winter Garden, FL (US); and Adriaan Joris H. Larmuseau, Zwevegem (BE)
Assigned to Unknot.id Inc., Winter Garden, FL (US)
Filed by Unknot.id Inc., Winter Garden, FL (US)
Filed on Apr. 12, 2021, as Appl. No. 17/228,538.
Claims priority of provisional application 63/009,066, filed on Apr. 13, 2020.
Prior Publication US 2021/0319803 A1, Oct. 14, 2021
Int. Cl. G06F 21/55 (2013.01); G06F 18/214 (2023.01); G06F 21/32 (2013.01); G06N 20/00 (2019.01); G06V 20/52 (2022.01); G06V 40/20 (2022.01); G10L 17/04 (2013.01); G10L 17/22 (2013.01); G10L 25/03 (2013.01); G10L 25/51 (2013.01)
CPC G06F 21/554 (2013.01) [G06F 18/214 (2023.01); G06F 21/32 (2013.01); G06N 20/00 (2019.01); G06V 20/52 (2022.01); G06V 40/20 (2022.01); G10L 17/04 (2013.01); G10L 17/22 (2013.01); G10L 25/03 (2013.01); G10L 25/51 (2013.01)] 28 Claims
OG exemplary drawing
 
1. A computer-implemented method, comprising: receiving identity information from a user controlling a computing device; determining, using a detection engine, if the identity information corresponds to authorized user data; triggering playback of an audio signal at a defined frequency from a speaker module associated with a computing device; receiving a reflected signal captured by a microphone module associated with the computing device, the reflected signal corresponding to the triggered audio signal; determining if the reflected signal contains a sound signature resulting from one or more physical gestures performed by the user when controlling the computing device; determining whether the sound signature corresponds to the user controlling one or more internal components specific to a type of the computing device; determining there is suspicious activity occurring at the computing device based on (i) the identity information not corresponding to the authorized user data, (ii) the reflected signal not containing the sound signature resulting from one or more physical gestures performed by the user when controlling the computing device, and (iii) the sound signature not corresponding to the user controlling one or more internal components specific to a type of the computing device and upon determining the suspicious activity, preventing access to an end system computer system that is separate from the computing device.