Wireless device monitoring systems and monitoring devices, and associated methods
First Claim
Patent Images
1. A monitoring device, comprising:
- a communications module configured to detect the presence of a wireless device within a monitored area upon the wireless device being within wireless communications proximity to the monitoring device, transmit a first wireless communication to the wireless device in response to detecting the presence of the wireless device in the monitored area, the first wireless communication including an authentication identifier used by the wireless device to authenticate the monitoring device, receive a second wireless communication from the wireless device in response to the wireless device receiving the first wireless communication, the second wireless communication including an encrypted device identifier used by the monitoring device to authenticate the wireless device, forward the encrypted device identifier to at least one of a telecommunications provider and a management device, and receive the device identifier from the telecommunications provider in an unencrypted format;
processing circuitry coupled with the communications module and configured to process the device identifier received from the at least one telecommunications provider and management device in an unencrypted format to determine whether the wireless device is authorized or unauthorized to be present at the monitored area; and
an indication module configured to generate an indication regarding the presence of the wireless device when the wireless device is unauthorized to be present at the monitored area and provide the indication to a user of the monitoring device other than a user of the wireless device, the indication being at least one of a silent alarm, a visual alarm, and an audible alarm.
3 Assignments
0 Petitions
Accused Products
Abstract
Wireless device monitoring systems and monitoring devices include a communications module for receiving wireless communications of a wireless device. Processing circuitry is coupled with the communications module and configured to process the wireless communications to determine whether the wireless device is authorized or unauthorized to be present at the monitored area based on identification information of the wireless device. Methods of monitoring for the presence and identity of wireless devices are also provided.
50 Citations
30 Claims
-
1. A monitoring device, comprising:
-
a communications module configured to detect the presence of a wireless device within a monitored area upon the wireless device being within wireless communications proximity to the monitoring device, transmit a first wireless communication to the wireless device in response to detecting the presence of the wireless device in the monitored area, the first wireless communication including an authentication identifier used by the wireless device to authenticate the monitoring device, receive a second wireless communication from the wireless device in response to the wireless device receiving the first wireless communication, the second wireless communication including an encrypted device identifier used by the monitoring device to authenticate the wireless device, forward the encrypted device identifier to at least one of a telecommunications provider and a management device, and receive the device identifier from the telecommunications provider in an unencrypted format; processing circuitry coupled with the communications module and configured to process the device identifier received from the at least one telecommunications provider and management device in an unencrypted format to determine whether the wireless device is authorized or unauthorized to be present at the monitored area; and an indication module configured to generate an indication regarding the presence of the wireless device when the wireless device is unauthorized to be present at the monitored area and provide the indication to a user of the monitoring device other than a user of the wireless device, the indication being at least one of a silent alarm, a visual alarm, and an audible alarm. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A wireless device monitoring system, comprising:
-
at least one monitoring device comprising; a communications module configured to detect the presence of wireless communications of a wireless device within a monitored area upon the wireless device being within wireless communications proximity to the at least one monitoring device, transmit a first wireless communication from the at least one monitoring device to the wireless device in response to detecting the presence of the wireless device in the monitored area, and receive a second wireless communication from the wireless device located within the monitored area in response to the wireless device receiving the first wireless communication, the second wireless communication including an encrypted device identifier used by the monitoring device to authenticate the wireless device, forward the encrypted device identifier to at least one of a telecommunications provider and a management device, and receive the device identifier from the telecommunications provider in an unencrypted format; processing circuitry coupled with the communications module and configured to process the device identifier received from the at least one telecommunications provider and management device in an unencrypted format to determine whether the wireless device is authorized or unauthorized to be present at the monitored area; and an indication module configured to generate an indication regarding the presence of the wireless device when the wireless device is unauthorized to be present at the monitored area and provide the indication to a user of the monitoring device other than a user of the wireless device, the indication being at least one of a silent alarm, a visual alarm, and an audible alarm. - View Dependent Claims (10, 11, 12, 13, 14, 15)
-
-
16. A method comprising:
-
detecting, by a monitoring device, a wireless device within a monitored area upon the wireless device being within wireless communications proximity to the monitoring device; transmitting from the monitoring device a first wireless communication to the wireless device in response to detecting the presence of the wireless device in the monitored area, the first wireless communication including an authentication identifier used by the wireless device to authenticate the monitoring device; receiving, at the monitoring device, a second wireless communication from the wireless device in response to the wireless device receiving the first wireless communication, the second wireless communication including an encrypted device identifier; forwarding, by the monitoring device, the encrypted device identifier to at least one of a telecommunications provider and a management device; receiving, by the monitoring device, the device identifier in an unencrypted format from the at least one telecommunications provider and management device; determining, by the monitoring device, whether the wireless device is authorized or unauthorized to be present at the monitored area using the device identifier received from the at least one telecommunications provider and management device in an unencrypted format in response to the obtained identification information; and generating, by the monitoring device, an indication regarding the presence of the device when the wireless device is unauthorized to be present at the monitored area, the indication being at least one of a silent alarm, a visual alarm, and an audible alarm; and providing, by the monitoring device, the indication to a user of the monitoring device other than a user of the wireless device. - View Dependent Claims (17, 18, 19, 20, 21, 22, 23, 24)
-
-
25. A method comprising:
-
interrogating, by a monitoring device, a wireless device located in a monitored area; receiving, by the monitoring device, at least one reply from the wireless device responsive to the interrogating the wireless device, wherein the at least one reply from the wireless device includes an encrypted device identifier; forwarding, by the monitoring device, the encrypted device identifier to at least one of a telecommunications provider and a management device; receiving, by the monitoring device, the device identifier in an unencrypted format from the at least one telecommunications provider and management device; determining, by the monitoring device, whether the wireless device is authorized or unauthorized to be present at the monitored area using the device identifier received from the at least one telecommunications provider and management device in an unencrypted format, the determining being in compliance with the security protocol; generating, by the monitoring device, an indication regarding the presence of the wireless device when the wireless device is unauthorized to be present at the monitored area, the indication being at least one of a silent alarm, a visual alarm, and an audible alarm; and providing, by the monitoring device, the indication to a user of the monitoring device other than a user of the wireless device. - View Dependent Claims (26, 27, 28, 29, 30)
-
Specification