Security Measures Based on Signal Strengths of Radio Frequency Signals
First Claim
Patent Images
1. A system, comprising:
- a radio frequency (RF) sensor configured to detect RF signals;
at least one memory that stores computer-executable instructions; and
an RF controller operationally coupled to the transceiver and the at least one memory, wherein the RF controller is configured to access the at least one memory and execute the computer-executable instructions to;
receive an RF fingerprint of an RF signal detected by the RF sensor within an area under surveillance (AUS), the RF fingerprint comprising at least one of;
i) a hardware address of an electronic device that emitted the RF signal or ii) a radio type identifier of a radio of the electronic device;
identify a first receive signal strength indicator (RSSI) value of the RF signal at the RF sensor at a first time;
identify a second RSSI value of the RF signal at the RF sensor at a second time;
determine a velocity of the electronic device based at least in part on the first RSSI value, the second RSSI value, and a span of time between the first time and the second time;
determine that the velocity is greater than a threshold velocity value;
generate an alarm indicating that a velocity of movement of the electronic device has been detected greater than the threshold velocity value.
1 Assignment
0 Petitions
Accused Products
Abstract
Electromagnetic (EM)/radio frequency (RF) emissions may be detected and corresponding EM personas may be created. One or more EM personas may be associated with a super persona corresponding to a particular entity. EM personas, super personas, and/or supplemental identifying information can be used to enforce security protocols.
-
Citations
20 Claims
-
1. A system, comprising:
-
a radio frequency (RF) sensor configured to detect RF signals; at least one memory that stores computer-executable instructions; and an RF controller operationally coupled to the transceiver and the at least one memory, wherein the RF controller is configured to access the at least one memory and execute the computer-executable instructions to; receive an RF fingerprint of an RF signal detected by the RF sensor within an area under surveillance (AUS), the RF fingerprint comprising at least one of;
i) a hardware address of an electronic device that emitted the RF signal or ii) a radio type identifier of a radio of the electronic device;identify a first receive signal strength indicator (RSSI) value of the RF signal at the RF sensor at a first time; identify a second RSSI value of the RF signal at the RF sensor at a second time; determine a velocity of the electronic device based at least in part on the first RSSI value, the second RSSI value, and a span of time between the first time and the second time; determine that the velocity is greater than a threshold velocity value; generate an alarm indicating that a velocity of movement of the electronic device has been detected greater than the threshold velocity value. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method, comprising:
-
receiving, by a security system comprising one or more processors, a RF fingerprint of a RF signal detected by an RF sensor within an area under surveillance (AUS), the RF fingerprint comprising at least one of;
i) a hardware address of an electronic device that emitted the RF signal or ii) a radio type identifier of a radio of the electronic device;identifying, by the security system, a first receive signal strength indicator (RSSI) value of the RF signal at the RF sensor at a first time; identifying, by the security system, a second RSSI value of the RF signal at the RF sensor at a second time; determining, by the security system, a velocity of the electronic device based at least in part on the first RSSI value, the second RSSI value, and a span of time between the first time and the second time; determining, by the security system, that the velocity is greater than a threshold velocity value; and generating, by the security system, an alarm indicating that a velocity of movement of the electronic device has been detected greater than the threshold velocity value. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. One or more non-transitory computer-readable media storing computer-executable instructions that responsive to execution cause one or more computer processors to perform operations comprising:
-
receiving a RF fingerprint of a RF signal detected by an RF sensor within an area under surveillance (AUS), the RF fingerprint comprising at least one of;
i) a hardware address of an electronic device that emitted the RF signal or ii) a radio type identifier of a radio of the electronic device;identifying a first receive signal strength indicator (RSSI) value of the RF signal at the RF sensor at a first time; identifying a second RSSI value of the RF signal at the RF sensor at a second time; determining a velocity of the electronic device based at least in part on the first RSSI value, the second RSSI value, and a span of time between the first time and the second time; determining that the velocity is greater than a threshold velocity value; and generating an alarm indicating that a velocity of movement of the electronic device has been detected greater than the threshold velocity value. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification