Digital fingerprint tracking
First Claim
1. A computer-implemented method comprising:
- detecting, using a sensor of a wireless monitoring network, an event at a property monitored by the wireless monitoring network;
determining, by a processor of the wireless monitoring network, a location associated with the event;
identifying, by the processor, a device detector that is located the shortest distance from the location associated with the event from among a plurality of sensors of the wireless monitoring network located at the property;
controlling the device detector to transmit one or more requests to one or more mobile electronic devices within the property;
receiving one or more response messages from the one or more mobile electronic devices, respectively;
extracting, by the processor and from the one or more response messages, device identifications associated with the one or more mobile electronic devices; and
determining, by the processor, that one of the extracted device identifications associated with the one or more mobile electronic devices is likely a device of an intruder by;
comparing the extracted device identifications associated with the one or more mobile electronic devices with device identifications of electronic devices associated with the property; and
determining that one of the extracted device identifications associated with the one or more mobile electronic devices is likely a device of an intruder in response to one of the extracted device identifications not matching one of the device identifications of the electronic devices associated with the property.
1 Assignment
0 Petitions
Accused Products
Abstract
Techniques are described for tracking intruders of a monitored property by the unique identifying characteristics or “digital fingerprints” of electronic devices carried by the intruders. A system detects an alarm event at a monitored property based on output from at least one sensor located at the monitored property. In response to detecting the alarm event at the monitored property, the system initiates a process to gather electronic identifiers for mobile electronic devices located within the monitored property at a time corresponding to the detected alarm event. The system determines electronic identifiers for the mobile electronic devices located within the monitored property at a time corresponding to the detected alarm event. The system stores in electronic storage, information indicating the determined electronic identifiers for the mobile electronic devices located within the monitored property at a time corresponding to the detected alarm event.
20 Citations
20 Claims
-
1. A computer-implemented method comprising:
-
detecting, using a sensor of a wireless monitoring network, an event at a property monitored by the wireless monitoring network; determining, by a processor of the wireless monitoring network, a location associated with the event; identifying, by the processor, a device detector that is located the shortest distance from the location associated with the event from among a plurality of sensors of the wireless monitoring network located at the property; controlling the device detector to transmit one or more requests to one or more mobile electronic devices within the property; receiving one or more response messages from the one or more mobile electronic devices, respectively; extracting, by the processor and from the one or more response messages, device identifications associated with the one or more mobile electronic devices; and determining, by the processor, that one of the extracted device identifications associated with the one or more mobile electronic devices is likely a device of an intruder by; comparing the extracted device identifications associated with the one or more mobile electronic devices with device identifications of electronic devices associated with the property; and determining that one of the extracted device identifications associated with the one or more mobile electronic devices is likely a device of an intruder in response to one of the extracted device identifications not matching one of the device identifications of the electronic devices associated with the property. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system comprising:
-
one or more computers; and one or more storage devices storing instructions that are operable, when executed by the one or more computers, to cause the one or more computers to perform operations comprising; detecting, using a sensor of a wireless monitoring network, an event at a property monitored by the wireless monitoring network; determining a location associated with the event; identifying a device detector that is located the shortest distance from the location associated with the event from among a plurality of sensors of the wireless monitoring network located at the property; controlling the device detector to transmit one or more requests to one or more mobile electronic devices within the property; receiving one or more response messages from the one or more mobile electronic devices, respectively; extracting, from the one or more response messages, device identifications associated with the one or more mobile electronic devices; and determining that one of the extracted device identifications associated with the one or more mobile electronic devices is likely a device of an intruder by; comparing the extracted device identifications associated with the one or more mobile electronic devices with device identifications of electronic devices associated with the property; and determining that one of the extracted device identifications associated with the one or more mobile electronic devices is likely a device of an intruder in response to one of the extracted device identifications not matching one of the device identifications of the electronic devices associated with the property. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A non-transitory computer-readable storage medium comprising instructions, which, when executed by one or more computers, cause the one or more computers to perform operations comprising:
-
detecting, using a sensor of a wireless monitoring network, an event at a property monitored by the wireless monitoring network; determining a location associated with the event; identifying a device detector that is located the shortest distance from the location associated with the event from among a plurality of sensors of the wireless monitoring network located at the property; controlling the device detector to transmit one or more requests to one or more mobile electronic devices within the property; receiving one or more response messages from the one or more mobile electronic devices, respectively; extracting, from the one or more response messages, device identifications associated with the one or more mobile electronic devices; and determining that one of the extracted device identifications associated with the one or more mobile electronic devices is likely a device of an intruder by; comparing the extracted device identifications associated with the one or more mobile electronic devices with device identifications of electronic devices associated with the property; and determining that one of the extracted device identifications associated with the one or more mobile electronic devices is likely a device of an intruder in response to one of the extracted device identifications not matching one of the device identifications of the electronic devices associated with the property. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification