US 12,339,945 B2
Active locking mechanism using machine learning
Galen Rafferty, Mahomet, IL (US); Mark Watson, Urbana, IL (US); Jeremy Goodsitt, Champaign, IL (US); Anh Truong, Champaign, IL (US); Austin Walters, Savoy, IL (US); and Vincent Pham, Seattle, WA (US)
Assigned to Capital One Services, LLC, McLean, VA (US)
Filed by Capital One Services, LLC, McLean, VA (US)
Filed on Dec. 12, 2023, as Appl. No. 18/536,364.
Application 18/536,364 is a continuation of application No. 18/086,864, filed on Dec. 22, 2022, granted, now 11,886,568.
Application 18/086,864 is a continuation of application No. 17/010,917, filed on Sep. 3, 2020, granted, now 11,580,212, issued on Feb. 14, 2023.
Application 17/010,917 is a continuation of application No. 16/671,290, filed on Nov. 1, 2019, granted, now 10,795,984, issued on Oct. 6, 2020.
Prior Publication US 2024/0169048 A1, May 23, 2024
Int. Cl. G06F 21/32 (2013.01); G06F 21/31 (2013.01); G06F 21/36 (2013.01); G06F 21/40 (2013.01); G06F 21/60 (2013.01); G06N 5/01 (2023.01); G06N 5/04 (2023.01); G06N 20/00 (2019.01)
CPC G06F 21/40 (2013.01) [G06F 21/316 (2013.01); G06F 21/32 (2013.01); G06F 21/36 (2013.01); G06F 21/602 (2013.01); G06N 5/04 (2013.01); G06N 20/00 (2019.01); G06F 2221/2111 (2013.01); G06F 2221/2137 (2013.01)] 24 Claims
OG exemplary drawing
 
1. A method comprising:
receiving a request to unlock a portion of capabilities of a computing device;
receiving, via one or more inputs of the computing device, a first authentication parameter, wherein the first authentication parameter comprises a first background image captured as part of a request for biometric authentication;
determining, using one or more transceivers, a location of the computing device;
determining that the first background image matches a second background image associated with the location of the computing device;
determining, based on the first background image matching the second background image, that an unlock condition has been satisfied;
deriving, based on a determination that the unlock condition has been satisfied, an encryption key; and
unlocking, based on a determination that the unlock condition has been satisfied, the portion of capabilities of the computing device, wherein the unlocking the portion of capabilities of the computing device comprises decrypting a storage device associated with the computing device using the encryption key.