Method and apparatus for identifying a suspect through multiple correlated device identities
First Claim
Patent Images
1. A method for determining a potential suspect, the method comprising the steps of:
- receiving a first time and a first location;
determining a first access point near the first location;
determining a first group of devices associated with the first access point at the first time;
receiving a second time and a second location;
determining a second access point near the second location;
determining a second group of devices registered with the second access point at the second time; and
determining potential suspect(s) by determining a subset of devices common to the first group of devices and the second group of devices.
1 Assignment
0 Petitions
Accused Products
Abstract
A method and apparatus for identifying a suspect through location and time events is provided herein. During operation a central server continuously receives updates from multiple networks regarding device identifiers and associated access points. When an event (e.g., a crime) occurs at a certain location, an access point(s) near the event are identified and devices associated with the access point(s) at the time of the event are determined. The identified devices are then utilized to determine potential suspects.
-
Citations
17 Claims
-
1. A method for determining a potential suspect, the method comprising the steps of:
-
receiving a first time and a first location; determining a first access point near the first location; determining a first group of devices associated with the first access point at the first time; receiving a second time and a second location; determining a second access point near the second location; determining a second group of devices registered with the second access point at the second time; and determining potential suspect(s) by determining a subset of devices common to the first group of devices and the second group of devices. - View Dependent Claims (2, 3, 4, 5, 6, 9)
-
-
7. A method comprising the steps of:
-
receiving a first location, a first time and a first date; receiving a first time period; receiving a first distance; determining first access points within the distance of the location; determining a first group of device IDs associated with the determined first access points over the time period surrounding the time; receiving a second location, a second time and a second date; receiving a second time period; receiving a second distance; determining second access points within the distance of the location; determining a second group of device IDs associated with the determined second access points over the time period surrounding the time; determining device IDs that are common among the first and the second group of device IDs; and presenting the common device IDs to a user. - View Dependent Claims (8, 10, 11)
-
-
12. An apparatus comprising:
-
a database comprising device identifiers, access point identifiers, and times of association of the device identifiers with the access points associated with the access point identifiers a processor receiving a first time and a first location, determining a first access point near the first location, accessing the database, and determining a first group of devices associated with the first access point at the first time; wherein the processor further receives a second time and a second location, determines a second access point near the second location, determines a second croup of devices registered with the second access point at the second time, and determines a potential suspect(s) by determining a subset of devices common to the first group of devices and the second group of devices. - View Dependent Claims (13, 14, 15, 16, 17)
-
Specification