US 12,177,673 B2
System and method for determining a physical location associated with an activity detected on a mobile device
Michael Avni, Ganot (IL)
Assigned to The Toronto-Dominion Bank, Toronto (CA)
Filed by The Toronto-Dominion Bank, Toronto (CA)
Filed on Aug. 27, 2021, as Appl. No. 17/459,064.
Prior Publication US 2023/0064926 A1, Mar. 2, 2023
Int. Cl. H04W 12/63 (2021.01); H04L 9/40 (2022.01); H04W 12/086 (2021.01); H04W 12/12 (2021.01); H04W 12/37 (2021.01); H04W 12/61 (2021.01); H04W 64/00 (2009.01)
CPC H04W 12/63 (2021.01) [H04L 63/107 (2013.01); H04W 12/086 (2021.01); H04W 12/12 (2013.01); H04W 12/37 (2021.01); H04W 12/61 (2021.01); H04W 64/003 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A system for determining physical locations associated with activities detected on mobile devices, the system comprising:
a processor;
a communications module coupled to the processor; and
a memory coupled to the processor, the memory storing computer executable instructions that when executed by the processor cause the processor to:
access at least one enterprise rule set, the at least one enterprise rule set based on a plurality of security vulnerability events, the at least one enterprise rule set for monitoring at least one application used on the mobile devices;
receive device data indicative of one or more actions performed on a mobile device and a time associated with each action;
compare the device data with the at least one enterprise rule set to detect whether any of the one or more actions performed on the mobile device breaches a rule of the at least one enterprise rule set;
transmit, to a geolocation service, a request for geolocation information associated with the mobile device at the time associated with the breach of the corresponding rule, the request including at least one of an identifier associated with the mobile device, an identifier associated with one or more wireless network access points which the mobile device is in range of, or both;
receive, from the geolocation service, geolocation information associated with the transmitted identifier, wherein the geolocation service is an external database for collecting information about wireless network access points; and
use the received geolocation information, the device data, and the at least one enterprise rule set to determine if a security vulnerability is associated with the mobile device, wherein the security vulnerability is detected in response to the one or more wireless network access points exhibiting on-and-off performance more than a threshold based on a frequency.