US 12,141,184 B1
Virtual secure rooms
Thomas Bret Buckingham, Fair Oaks Ranch, TX (US); Bryan Osterkamp, New Braunfels, TX (US); Orlando Coleman, San Antonio, TX (US); Brady Justice, San Antonio, TX (US); Jonathan Neuse, Helotes, TX (US); Sean Thomas, Schertz, TX (US); Michael Slaugh, San Antonio, TX (US); Christopher Thomas Wilkinson, Boerne, TX (US); Peter Babcock, Helotes, TX (US); Justin Ray White, Fair Oaks Ranch, TX (US); Peter Bradley Sheeran, San Antonio, TX (US); and Angel Ninette Cade, Helotes, TX (US)
Assigned to United Services Automobile Association (USAA), San Antonio, TX (US)
Filed by United Services Automobile Association (USAA), San Antonio, TX (US)
Filed on Dec. 21, 2023, as Appl. No. 18/392,985.
Application 18/392,985 is a continuation of application No. 18/170,288, filed on Feb. 16, 2023, granted, now 11,860,918.
Application 18/170,288 is a continuation of application No. 17/014,772, filed on Sep. 8, 2020, granted, now 11,586,657, issued on Feb. 21, 2023.
Application 17/014,772 is a continuation of application No. 15/803,500, filed on Nov. 3, 2017, granted, now 10,831,805, issued on Nov. 10, 2020.
Claims priority of provisional application 62/548,494, filed on Aug. 22, 2017.
Claims priority of provisional application 62/417,148, filed on Nov. 3, 2016.
This patent is subject to a terminal disclaimer.
Int. Cl. G06F 16/34 (2019.01); G06F 11/34 (2006.01); G06F 16/93 (2019.01); G06F 21/31 (2013.01); G06F 21/53 (2013.01)
CPC G06F 16/34 (2019.01) [G06F 11/3438 (2013.01); G06F 16/93 (2019.01); G06F 21/31 (2013.01); G06F 21/53 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A computer-implemented method comprising:
monitoring, by one or more processors and from at least one of a microphone of a computing device or a camera of the computing device, a user or the computing device while content is transmitted for presentation on the computing device through a connection between the computing device and a server system;
detecting, by one or more processors and based on the monitoring, one or more disallowed activities comprising one or more of: using a device other than the computing device or using a writing instrument; and
closing, by one or more processors, the connection in response to the detecting.