Passive device monitoring using radio frequency signals
First Claim
Patent Images
1. A method of providing home security monitoring, comprising:
- passively monitoring to detect radio frequency (RF) signals using a wireless protocol;
detecting a first RF signal;
extracting information comprising a first unique identifier (UID) from the detected first RF signal, wherein the first UID uniquely identifies a first device emitting the first RF signal, the UID comprising information that is hardcoded into a chip on the first device and always used for communications as a condition of the wireless protocol associated with the RF signals;
estimating a first location of an origin of the first RF signal;
determining that the first UID is unknown;
identifying a first rule of a plurality of rules, the first rule including criteria that if an unknown UID is detected within a first range of time, the first location is within a second range of locations, and a home resident is absent, a first message is sent to the home resident that an unidentified individual is present; and
in accordance with the first rule, sending the first message after determining that the time of detection of the first UID is within the first range of time, the first location is within the second range of locations, and a second UID associated with a second device of the home resident is absent.
1 Assignment
0 Petitions
Accused Products
Abstract
A rule-based machine learning system monitors frequency bands to detect transmissions from nearby active transmitters, such as those associated with wireless mobile devices. The system logs unique identifiers (UID) embedded in detected transmissions, recognizes patterns of UID detection over time, and selectively takes action when UIDs are detected and when they are expected but absent.
38 Citations
18 Claims
-
1. A method of providing home security monitoring, comprising:
-
passively monitoring to detect radio frequency (RF) signals using a wireless protocol; detecting a first RF signal; extracting information comprising a first unique identifier (UID) from the detected first RF signal, wherein the first UID uniquely identifies a first device emitting the first RF signal, the UID comprising information that is hardcoded into a chip on the first device and always used for communications as a condition of the wireless protocol associated with the RF signals; estimating a first location of an origin of the first RF signal; determining that the first UID is unknown; identifying a first rule of a plurality of rules, the first rule including criteria that if an unknown UID is detected within a first range of time, the first location is within a second range of locations, and a home resident is absent, a first message is sent to the home resident that an unidentified individual is present; and in accordance with the first rule, sending the first message after determining that the time of detection of the first UID is within the first range of time, the first location is within the second range of locations, and a second UID associated with a second device of the home resident is absent. - View Dependent Claims (2, 3, 4)
-
-
5. A computing device comprising:
-
at least one antenna; a radio frequency (RF) receiver connected to the at least one antenna; at least one processor connected to the RF receiver; a memory including instructions operable to be executed by the at least one processor to perform a set of actions, configuring the at least one processor to; monitor the RF receiver to detect RF signals using a wireless protocol; extract information comprising a first identifier from a first detected RF signal, wherein the first identifier identifies a transmitting device emitting the first detected RF signal; determine whether the first identifier is associated with a known individual; identify a first rule including criteria to perform a first action based on whether the first identifier is associated with a known individual; and perform the first action in accordance with the first rule based at least in part on the first identifier being associated with an unknown individual. - View Dependent Claims (6, 7, 8, 9, 10, 11)
-
-
12. A non-transitory computer readable medium having stored thereon instructions to configure a computing device to:
-
monitor a radio frequency (RF) receiver to detect RF signals using a wireless protocol; extract information comprising a first identifier from a first detected RF signal, wherein the first identifier identifies a transmitting device emitting the first detected RF signal; determine whether the first identifier is associated with a known individual; identify a first rule including criteria to perform a first action based on whether the first identifier is associated with a known individual; and perform the first action in accordance with the first rule based at least in part on the first identifier being associated with an unknown individual. - View Dependent Claims (13, 14, 15, 16, 17, 18)
-
Specification