Monitoring system and method with signal tampering detection
First Claim
1. A method for detecting potential tampering with a data stream from a monitoring device, comprising:
- deploying a plurality of monitoring devices to a monitored population, each of the monitoring devices configured to transmit at least location data representing its approximate location;
receiving the location data for a particular monitoring device and information about a particular cell receiver that relayed the location data from the particular monitoring device;
identifying, based on an approximate location of the particular monitoring device from the location data received during the receiving, an expected cell receiver for the approximate location;
comparing the particular cell receiver with the expected cell receiver;
wherein the particular cell receiver is considered to be unexpected in response to at least a negative result of the comparing.
13 Assignments
0 Petitions
Accused Products
Abstract
A system and method for detecting potential tampering with a data stream from a monitoring device is provided. The method includes storing a list of cellular receivers and at least one corresponding geographic characteristic; receiving, from a remote monitoring device through a cellular network, a location of the monitoring device and the identity of a particular cellular receiver that relayed the location; identifying, from the received location and the stored at least one corresponding geographic characteristic, an expected cellular receiver from the list of cellular receivers; comparing the particular cellular receiver with the expect cellular receiver; and issuing an alert based on at least a negative result of the comparing.
-
Citations
20 Claims
-
1. A method for detecting potential tampering with a data stream from a monitoring device, comprising:
-
deploying a plurality of monitoring devices to a monitored population, each of the monitoring devices configured to transmit at least location data representing its approximate location; receiving the location data for a particular monitoring device and information about a particular cell receiver that relayed the location data from the particular monitoring device; identifying, based on an approximate location of the particular monitoring device from the location data received during the receiving, an expected cell receiver for the approximate location; comparing the particular cell receiver with the expected cell receiver; wherein the particular cell receiver is considered to be unexpected in response to at least a negative result of the comparing. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A system for detecting potential tampering with a data stream from a monitoring device, comprising:
-
a plurality of monitoring devices deployed to a monitored population, each of the monitoring devices configured to transmit at least location data representing its approximate location; a central location having a memory storing instructions and a process for executing the instructions to perform operations comprising; receiving the location data for a particular monitoring device and information about a particular cell receiver that relayed the location data from the particular monitoring device; identifying, based on an approximate location of the particular monitoring device from the location data received during the receiving, an expected cell receiver for the approximate location; comparing the particular cell receiver with the expected cell receiver; wherein the particular cell receiver is considered to be unexpected in response to at least a negative result of the comparing. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification