Anomalous Behavior Detection Based on Behavioral Signatures
First Claim
Patent Images
1. A system, comprising:
- a transceiver;
at least one memory that stores computer-executable instructions; and
at least one processor operationally coupled to the transceiver and the at least one memory, wherein the at least one processor is configured to access the at least one memory and execute the computer-executable instructions to;
receive a radio frequency (RF) fingerprint of an RF signal detected by the transceiver within an area under surveillance (AUS), the RF fingerprint comprising at least one of;
i) a hardware address of an electronic device that emitted the RF signal or ii) a radio type identifier of a radio of the electronic device;
determine, based at least in part on the RF fingerprint, that a security protocol has been violated; and
generate an alert message indicating that the security protocol has been violated.
1 Assignment
0 Petitions
Accused Products
Abstract
Electromagnetic (EM)/radio frequency (RF) emissions may be detected and corresponding EM personas may be created. One or more EM personas may be associated with a super persona corresponding to a particular entity. EM personas, super personas, and/or supplemental identifying information can be used to enforce security protocols.
25 Citations
20 Claims
-
1. A system, comprising:
-
a transceiver; at least one memory that stores computer-executable instructions; and at least one processor operationally coupled to the transceiver and the at least one memory, wherein the at least one processor is configured to access the at least one memory and execute the computer-executable instructions to; receive a radio frequency (RF) fingerprint of an RF signal detected by the transceiver within an area under surveillance (AUS), the RF fingerprint comprising at least one of;
i) a hardware address of an electronic device that emitted the RF signal or ii) a radio type identifier of a radio of the electronic device;determine, based at least in part on the RF fingerprint, that a security protocol has been violated; and generate an alert message indicating that the security protocol has been violated. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method, comprising:
-
receiving, by a security system comprising one or more computer processors, a radio frequency (RF) fingerprint of an RF signal detected by a transceiver within an area under surveillance (AUS), the RF fingerprint comprising at least one of;
i) a hardware address of an electronic device that emitted the RF signal or ii) a radio type identifier of a radio of the electronic device;determining, by the security system and based at least in part on the RF fingerprint, that a security protocol has been violated; and generating, by the security system, an alert message indicating that the security protocol has been violated. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. One or more non-transitory computer-readable media storing computer-executable instructions that responsive to execution by at least one computer processor cause operations to be performed comprising:
-
receiving a radio frequency (RF) fingerprint of an RF signal detected by a transceiver within an area under surveillance (AUS), the RF fingerprint comprising at least one of;
i) a hardware address of an electronic device that emitted the RF signal or ii) a radio type identifier of a radio of the electronic device;determining, based at least in part on the RF fingerprint, that a security protocol has been violated; and generating an alert message indicating that the security protocol has been violated. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification