DIGITAL FINGERPRINT TRACKING
First Claim
1. A computer-implemented method comprising:
- detecting an alarm event at a monitored property based on output from at least one sensor located at the monitored property;
in response to detecting the alarm event at the monitored property, initiating a process to gather electronic identifiers for mobile electronic devices located within the monitored property at a time corresponding to the detected alarm event;
based on the process to gather electronic identifiers for mobile electronic devices located within the monitored property at a time of the detected alarm event, determining electronic identifiers for the mobile electronic devices located within the monitored property at a time corresponding to the detected alarm event; and
storing, in electronic storage, information indicating the determined electronic identifiers for the mobile electronic devices located within the monitored property at a time corresponding to the detected alarm event.
4 Assignments
0 Petitions
Accused Products
Abstract
Techniques are described for tracking intruders of a monitored property by the unique identifying characteristics or “digital fingerprints” of electronic devices carried by the intruders. A system detects an alarm event at a monitored property based on output from at least one sensor located at the monitored property. In response to detecting the alarm event at the monitored property, the system initiates a process to gather electronic identifiers for mobile electronic devices located within the monitored property at a time corresponding to the detected alarm event. The system determines electronic identifiers for the mobile electronic devices located within the monitored property at a time corresponding to the detected alarm event. The system stores in electronic storage, information indicating the determined electronic identifiers for the mobile electronic devices located within the monitored property at a time corresponding to the detected alarm event.
62 Citations
20 Claims
-
1. A computer-implemented method comprising:
-
detecting an alarm event at a monitored property based on output from at least one sensor located at the monitored property; in response to detecting the alarm event at the monitored property, initiating a process to gather electronic identifiers for mobile electronic devices located within the monitored property at a time corresponding to the detected alarm event; based on the process to gather electronic identifiers for mobile electronic devices located within the monitored property at a time of the detected alarm event, determining electronic identifiers for the mobile electronic devices located within the monitored property at a time corresponding to the detected alarm event; and storing, in electronic storage, information indicating the determined electronic identifiers for the mobile electronic devices located within the monitored property at a time corresponding to the detected alarm event. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A system comprising:
-
one or more computers; and one or more storage devices storing instructions that are operable, when executed by the one or more computers, to cause the one or more computers to perform operations comprising; detecting an alarm event at a monitored property based on output from at least one sensor located at the monitored property; in response to detecting the alarm event at the monitored property, initiating a process to gather electronic identifiers for mobile electronic devices located within the monitored property at a time corresponding to the detected alarm event; based on the process to gather electronic identifiers for mobile electronic devices located within the monitored property at a time of the detected alarm event, determining electronic identifiers for the mobile electronic devices located within the monitored property at a time corresponding to the detected alarm event; and storing, in electronic storage, information indicating the determined electronic identifiers for the mobile electronic devices located within the monitored property at a time corresponding to the detected alarm event. - View Dependent Claims (14, 15, 16, 17)
-
-
18. A computer-implemented method comprising:
-
monitoring, over time, mobile electronic device identifiers present within the monitored property; monitoring, over time, system data for the monitored property; determining a mobile electronic device profile for the monitored property based on the monitored mobile electronic device identifiers and the monitored system data; and taking action based on the determined mobile electronic device profile. - View Dependent Claims (19, 20)
-
Specification