Authentication techniques in a monitoring system
First Claim
1. A monitoring system for monitoring location of a person or thing to be monitored, comprising:
- a transmitter, associated with the person or thing to be monitored, for transmitting authentic signals at time intervals that vary according to a pattern and which include information representative of respective current positions where such authentic signals occur in said pattern of various time intervals in order to predict when a subsequent authentic signal from the transmitter is expected; and
a receiver for receiving signals, said receiver being operative to use said current position information in a received authentic signal to identify a subsequent time interval from said pattern of various time intervals in order to predict when a subsequent authentic signal from the transmitter is expected, and, further, to determine whether an actual subsequently received signal is an authentic signal that is actually transmitted by said transmitter based on whether such subsequent signal is received when expected in the pattern of various time intervals.
11 Assignments
0 Petitions
Accused Products
Abstract
An Electronic House Arrest Monitoring (EHAM) system of the present invention includes a transmitter attached to a monitored offender and a receiver positioned in the vicinity of the desired monitoring location. The transmitter and the receiver each have a pattern stored or generated therein for determining the interval of time between signal transmissions and receptions. The pattern is pseudo-random to offer improved protection against imposter transmitters, in other words the time intervals are selected to be unequal and randomly varying but the pattern is repeated or cycled to allow continuing signal transmission by the transmitter. The transmitter transmits signals at varying time intervals according to this pattern, and the receiver authenticates signals it receives as coming from the monitored transmitter based on the expected time intervals from the pattern. The pattern may include any number of time intervals and, in one embodiment, includes more than one subpattern to extend the length of the repeat cycle to increase the difficulty of defeating the monitoring system. As further protection against imposter devices, the receiver may verify the signals based on information unique to the transmitter included in each signal. The receiver may further use the received signals and unique time interval patterns to determine a number of operating states, including New Transmitter ID Received, Transmitter In Range and Locked to Transmitter, Transmitter In Range and Not Locked, Transmitter Out of Range, and Imposter Likely. The monitoring system may also include a remote host computer linked to the receiver or receivers to enable these operating states to be monitored remotely by enforcement personnel.
96 Citations
46 Claims
-
1. A monitoring system for monitoring location of a person or thing to be monitored, comprising:
-
a transmitter, associated with the person or thing to be monitored, for transmitting authentic signals at time intervals that vary according to a pattern and which include information representative of respective current positions where such authentic signals occur in said pattern of various time intervals in order to predict when a subsequent authentic signal from the transmitter is expected; and
a receiver for receiving signals, said receiver being operative to use said current position information in a received authentic signal to identify a subsequent time interval from said pattern of various time intervals in order to predict when a subsequent authentic signal from the transmitter is expected, and, further, to determine whether an actual subsequently received signal is an authentic signal that is actually transmitted by said transmitter based on whether such subsequent signal is received when expected in the pattern of various time intervals. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method of authenticating transmission signals from a particular transmitter being used to monitor location of a person or a thing to be monitored, said method comprising:
-
placing a transmitter, for transmitting signals at time intervals that vary according to a pattern, at the location of the person or thing to be monitored;
providing a receiver for receiving signals;
generating said pattern by operating at least two subpattern generators at said transmitter and at least two subpattern generators at said receiver so that said pattern includes at least two subpatterns in selectable order;
transmitting signals from said transmitter at said time intervals according to said pattern;
operating said receiver to receive signals; and
authenticating with said receiver whether said received signals are said transmitted signals from said transmitter by measuring time intervals between consecutive ones of said received signals and comparing said measured time intervals with said pattern. - View Dependent Claims (13, 14, 15, 16)
-
-
17. A method of authenticating transmissions received by a receiver as having originated from a particular transmitter, comprising:
-
developing a pattern of sequential time intervals in which each time interval has a different duration;
actuating the transmitter to transmit a plurality of authentic signals in a sequence that has time intervals between successive transmitted authentic signals that match in duration and in sequence with the durations of the time intervals of said pattern;
measuring intervals between successive signals received by the receiver and testing such measured time intervals between successive received signals for compliance with at least one of the time intervals in the pattern;
upon finding a match between a measured time interval between received signals and a time interval in said pattern, predicting, based on said pattern, a time when another authentic transmission is expected to be received; and
upon receiving another signal, determining whether said another signal has actually been received at the time when said another authentic transmission was expected to be received. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29)
-
-
30. A monitoring system for monitoring location of a person or thing to be monitored, comprising:
-
a transmitter, associated with the person or thing to be monitored, for transmitting signals at time intervals that vary according to a pattern which has a predetermined number of time intervals and includes at least two subpatterns in a selectable order, wherein said transmitter is operable to generate said pattern and includes at least two subpattern generators to generate said at least two subpatterns; and
a receiver for receiving signals, said receiver being operative to determine if received signals are transmitted by said transmitter based on said signals from said transmitter being received at time intervals according to said pattern, wherein said receiver is also operable to generate said pattern and includes at least two subpattern generators to generate said at least two subpatterns. - View Dependent Claims (31, 32)
-
-
33. A method of authenticating transmission signals from a particular transmitter being used to monitor location of a person or a thing to be monitored, said method comprising:
-
placing a transmitter at the location of the person or thing to be monitored for transmitting authentic signals at time intervals according to a pattern in which individual time intervals are unique;
providing a receiver for receiving signals from said transmitter at said time intervals according to said pattern;
operating said receiver to receive signals transmitted by the transmitter;
measuring a time interval between a pair of received signals;
comparing such measured time interval with the unique time intervals in the pattern to identify where such measured time interval is located within the pattern;
determining when to expect at least one subsequent signal transmission from said transmitter based on where said measured time interval is located in the pattern and on time durations of successive next time intervals to come in the pattern;
receiving a subsequent signal, determining if such subsequent signal is received when expected, and, if received when expected, treating such subsequent signal as an authentic transmission by said transmitter as opposed to a possible unauthentic transmission by an imposter transmitter. - View Dependent Claims (34, 35, 36, 37, 38, 39, 40)
-
-
41. In a monitoring system for monitoring location of a particular person or thing, wherein the monitoring system includes a particular transmitter positioned at the location of the particular person or thing and being capable of transmitting authentic signals that include identification information which identifies said particular transmitter, and wherein the monitoring system includes a receiver capable of receiving authentic signals transmitted by said particular transmitter and of recognizing the identification information in such signals to determine that such authentic signals are valid as having come from said particular transmitter, the improvement comprising:
authentication means for determining if apparently valid signals, which are received by the receiver and contain the information that identifies said particular transmitter, are actually authentic signals transmitted by said authentic transmitter as opposed to imposter signals transmitted by an imposter transmitter that is enabled to transmit imposter signals which include said identification information, the authentication means including;
pattern means for providing a pattern of a plurality of time intervals in which the time intervals have different lengths, and wherein the particular transmitter is programmed to transmit a plurality of authentic signals at time intervals which match the time intervals of said pattern;
actual time interval detection means for determining actual time intervals between sequentially received signals which contain said identification information; and
pattern detection means for comparing an actual time interval detected by the actual time interval detection means with the time intervals in the pattern and, if a matching time interval in the pattern is found, predicting based on said pattern, when a subsequent authentic signal is expected to be received. - View Dependent Claims (42, 43, 44, 45, 46)
Specification