Leveraging neighbors' wireless access points in wireless-signal-variation-based physical intruder detection systems
First Claim
1. A method for intruder detection, comprising:
- monitoring, at a wireless sniffer in a building, received signal strength relative to each of a plurality of wireless access points, wherein a first wireless access point of the plurality of wireless access points is located within the building and a second wireless access point of the plurality of wireless access points is located external to the building;
creating a profile of the received signal strength from each of the plurality of wireless access points, during a learn mode;
comparing activity of the received signal strength from each of the plurality of wireless access points to the profile, during an intruder detection mode; and
issuing a notification, based on the comparing, wherein at least one step of the method is performed by a processor.
6 Assignments
0 Petitions
Accused Products
Abstract
A method for intruder detection is provided. The method includes monitoring, at a wireless sniffer in a building, received signal strength relative to each of a plurality of wireless access points, wherein a first wireless access point of the plurality of wireless access points is located within the building and a second wireless access point of the plurality of wireless access points is located external to the building. The method includes creating a profile of the received signal strength from each of the plurality of wireless access points, during a learn mode and comparing activity of the received signal strength from each of the plurality of wireless access points to the profile, during an intruder detection mode. The method includes issuing a notification, based on the comparing. An intruder detection system is also provided.
-
Citations
20 Claims
-
1. A method for intruder detection, comprising:
-
monitoring, at a wireless sniffer in a building, received signal strength relative to each of a plurality of wireless access points, wherein a first wireless access point of the plurality of wireless access points is located within the building and a second wireless access point of the plurality of wireless access points is located external to the building; creating a profile of the received signal strength from each of the plurality of wireless access points, during a learn mode; comparing activity of the received signal strength from each of the plurality of wireless access points to the profile, during an intruder detection mode; and issuing a notification, based on the comparing, wherein at least one step of the method is performed by a processor. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A tangible, non-transitory, computer-readable media having instructions thereupon which, when executed by a processor, cause the processor to perform a method comprising:
-
forming an activity profile based on received signal strength relating to each of a plurality of wireless access points as determined, during a training mode, at a wireless sniffer in a building, wherein a first wireless access point of the plurality of wireless access points is internal to the building and a second wireless access point of the plurality of wireless access points is external to the building; monitoring the received signal strength in an intruder detection mode; detecting a physical intruder, based on the activity profile and the monitoring in the intruder detection mode; and producing an alert, responsive to the detecting. - View Dependent Claims (9, 10, 11, 12, 13)
-
-
14. An intruder detection system, comprising:
-
a wireless sniffer, configured to indicate a received signal strength; a memory, configured to store at least one profile; an alert module, configured to issue an alert responsive to being triggered; and an analytics module, configured to generate or update the at least one profile, based on the received signal strength of each of a plurality of wireless access points as monitored during a learn mode, and further configured to trigger the alert module responsive to detection of an intruder based on comparison of the at least one profile and the received signal strength of two or more of the plurality of wireless access points during an intruder detection mode. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification