Radio frequency fingerprint detection
First Claim
Patent Images
1. A system, comprising:
- a radio frequency (RF) sensor configured to detect RF signals in a first frequency band and a second frequency band;
at least one memory that stores computer-executable instructions; and
an RF controller operationally coupled to the transceiver and the at least one memory, wherein the RF controller is configured to access the at least one memory and execute the computer-executable instructions to;
direct the RF sensor to detect RF signals in the first frequency band;
determine that no RF signals are detected by the RF sensor in the first frequency band;
direct the RF sensor to detect RF signals in the second frequency band;
receive, from the RF sensor, a first RF signal corresponding to an RF signal transmission in the second frequency band;
identify a protocol by which the RF signal transmission was transmitted based at least in part on an identification of the range of the second frequency band;
determine an RF fingerprint associated with the RF signal transmission based at least in part on the RF signal and identification of the protocol, wherein the RF fingerprint comprises at least one of;
a hardware address of an electronic device that emitted the RF signal, or a radio type identifier of a radio of the electronic device; and
transmit an indication of the RF fingerprint to a security server.
1 Assignment
0 Petitions
Accused Products
Abstract
Electromagnetic (EM)/radio frequency (RF) emissions may be detected and corresponding EM personas may be created. One or more EM personas may be associated with a super persona corresponding to a particular entity. EM personas, super personas, and/or supplemental identifying information can be used to enforce security protocols.
10 Citations
20 Claims
-
1. A system, comprising:
-
a radio frequency (RF) sensor configured to detect RF signals in a first frequency band and a second frequency band; at least one memory that stores computer-executable instructions; and an RF controller operationally coupled to the transceiver and the at least one memory, wherein the RF controller is configured to access the at least one memory and execute the computer-executable instructions to; direct the RF sensor to detect RF signals in the first frequency band; determine that no RF signals are detected by the RF sensor in the first frequency band; direct the RF sensor to detect RF signals in the second frequency band; receive, from the RF sensor, a first RF signal corresponding to an RF signal transmission in the second frequency band; identify a protocol by which the RF signal transmission was transmitted based at least in part on an identification of the range of the second frequency band; determine an RF fingerprint associated with the RF signal transmission based at least in part on the RF signal and identification of the protocol, wherein the RF fingerprint comprises at least one of; a hardware address of an electronic device that emitted the RF signal, or a radio type identifier of a radio of the electronic device; and transmit an indication of the RF fingerprint to a security server. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method, comprising:
-
directing, by an RF controller comprising one or more processors, an RF sensor to detect RF signals in the first communications band; determining, by the RF controller, that there are no RF signals detected by the RF sensor in the first frequency band; directing, by the RF controller, the RF sensor to detect RF signals in the second communications band; receiving, by the RF controller and from the RF sensor, a signal corresponding to an RF signal transmission in the second frequency band; identifying, by the RF controller, a protocol by which the RF signal transmission was transmitted based at least in part on an identification of the range of the second frequency band; determining, by the RF controller, an RF fingerprint associated with the RF signal transmission based at least in part on the signal and identification of the protocol, wherein the RF fingerprint comprising at least one of;
i) a hardware address of an electronic device that emitted the RF signal or ii) a radio type identifier of a radio of the electronic device; andtransmitting, by the RF controller, an indication of the RF fingerprint to a security server. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A non-transitory computer-readable media storing computer-executable instructions that responsive to execution cause one or more computer processors to perform operations comprising:
-
directing an RF sensor to detect RF signals in the first communications band; determining that there are no RF signals detected by the RF sensor in the first frequency band; directing the RF sensor to detect RF signals in the second communications band; receiving, from the RF sensor, a signal corresponding to an RF signal transmission in the second frequency band; identifying a protocol by which the RF signal transmission was transmitted based at least in part on an identification of the range of the second frequency band; determining an RF fingerprint associated with the RF signal transmission based at least in part on the signal and identification of the protocol, wherein the RF fingerprint comprising at least one of;
i) a hardware address of an electronic device that emitted the RF signal or ii) a radio type identifier of a radio of the electronic device; andtransmitting an indication of the RF fingerprint to a security server. - View Dependent Claims (18, 19, 20)
-
Specification