Detection of an unauthorized wireless communication device
First Claim
1. An apparatus for the detection of an unauthorized wireless communication device comprising:
- a communications monitor operable to monitor wireless communications activity;
a processor communicatively coupled with the communication monitor and operable to analyze monitored wireless communications activity against parameters that are predefined to detect suspected illegal activity by a skimming device; and
a user interface communicatively coupled with the processor and operable to generate an alert for a system administrator when illegal activity by the skimming device is suspected by the processor, wherein one of the predefined parameters associates illegal activity with detecting a Bluetooth®
non-discoverable communication device by cycling through a set of Media Access Control addresses to find any non-discoverable devices.
3 Assignments
0 Petitions
Accused Products
Abstract
A technique for the detection of an unauthorized wireless communication device includes monitoring of Bluetooth® communications activity by a Bluetooth® capable communication device. Any monitored communication activity is analyzed against parameters that are predefined to detect suspected illegal activity. If illegal activity is suspected by the analysis, an alert is generated for a system administrator. The predefined parameters associate illegal activity with; data that includes credit card numbers and expiration dates, credit card transaction logging information, non-discoverable devices, activity after store hours, exceedingly long activity, etc.
44 Citations
13 Claims
-
1. An apparatus for the detection of an unauthorized wireless communication device comprising:
-
a communications monitor operable to monitor wireless communications activity; a processor communicatively coupled with the communication monitor and operable to analyze monitored wireless communications activity against parameters that are predefined to detect suspected illegal activity by a skimming device; and a user interface communicatively coupled with the processor and operable to generate an alert for a system administrator when illegal activity by the skimming device is suspected by the processor, wherein one of the predefined parameters associates illegal activity with detecting a Bluetooth®
non-discoverable communication device by cycling through a set of Media Access Control addresses to find any non-discoverable devices. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A network access point comprising:
-
a communications monitor operable to monitor wireless communications activity; a processor communicatively coupled with the communications monitor and operable to analyze monitored wireless communications activity against parameters that are predefined to indicate suspected illegal activity by a skimming device; wherein the processor is operable to generate an alert when illegal activity by the skimming device is suspected based at least in part on one of the predefined parameters associating illegal activity with detecting a Bluetooth®
non-discoverable communication device by cycling through a set of Media Access Control addresses to find any non-discoverable devices. - View Dependent Claims (9, 10, 11)
-
-
12. A method for the detection of an unauthorized wireless communication device, comprising:
-
monitoring wireless communications activity; analyzing monitored wireless communications activity against parameters that are predefined to indicate suspected illegal activity by the unauthorized wireless communication device; and generating an alert when illegal activity by the unauthorized wireless communication device is suspected based at least in part on associating illegal activity with detecting a Bluetooth®
non-discoverable communication device by cycling through a set of Media Access Control addresses to find any non-discoverable devices. - View Dependent Claims (13)
-
Specification