Detection of an unauthorized wireless communication device
First Claim
1. An apparatus for the detection of an unauthorized wireless communication device comprising:
- a communications monitor operable to monitor communications activity;
a processor communicatively coupled with the communication monitor and operable to analyze any monitored communications activity against parameters that are predefined to detect suspected illegal activity; and
a user interface communicatively coupled with the processor and operable to generate an alert for a system administrator if illegal activity is suspected by the processor, wherein one of the predefined parameters associates illegal activity with monitoring of any communications activity after a store has closed.
4 Assignments
0 Petitions
Accused Products
Abstract
A technique for the detection of an unauthorized wireless communication device includes monitoring of Bluetooth® communications activity by a Bluetooth® capable communication device. Any monitored communication activity is analyzed against parameters that are predefined to detect suspected illegal activity. If illegal activity is suspected by the analysis, an alert is generated for a system administrator. The predefined parameters associate illegal activity with; data that includes credit card numbers and expiration dates, credit card transaction logging information, non-discoverable devices, activity after store hours, exceedingly long activity, etc.
39 Citations
19 Claims
-
1. An apparatus for the detection of an unauthorized wireless communication device comprising:
-
a communications monitor operable to monitor communications activity; a processor communicatively coupled with the communication monitor and operable to analyze any monitored communications activity against parameters that are predefined to detect suspected illegal activity; and a user interface communicatively coupled with the processor and operable to generate an alert for a system administrator if illegal activity is suspected by the processor, wherein one of the predefined parameters associates illegal activity with monitoring of any communications activity after a store has closed. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A method for the detection of an unauthorized wireless communication device, comprising:
-
monitoring of communications activity by a communication device; analyzing any monitored communication activity against parameters that are predefined to detect suspected illegal activity; and if illegal activity is suspected by the analysis, generating an alert for a system administrator wherein one of the predefined parameters associates illegal activity with monitoring of any communications activity after a store has closed. - View Dependent Claims (14)
-
-
15. A method for the detection of an unauthorized wireless communication device, comprising:
-
monitoring of communications activity by a communication device; analyzing any monitored communication activity against parameters that are predefined to detect suspected illegal activity; and if illegal activity is suspected by the analysis, generating an alert for a system administrator, wherein one of the predefined parameters associates illegal activity with a starting of communications activity after a store has closed. - View Dependent Claims (16, 17, 18, 19)
-
Specification