Electromagnetic persona generation based on radio frequency fingerprints
First Claim
Patent Images
1. A system, comprising:
- a transceiver;
at least one memory that stores computer-executable instructions; and
at least one processor operationally coupled to the transceiver and the at least one memory, wherein the at least one processor is configured to access the at least one memory and execute the computer-executable instructions to;
receive a radio frequency (RF) fingerprint of an RF signal detected by the transceiver within an area under surveillance (AUS), the RF fingerprint comprising at least one of;
i) a hardware address of an electronic device that emitted the RF signal or ii) a radio type identifier of a radio of the electronic device;
determine a stored persona that includes a stored RF fingerprint that matches the received RF fingerprint;
determine that the electronic device that emitted the RF signal is associated with the stored persona;
determine, based at least in part on the determination that the electronic device is associated with the stored persona, that a user associated with the stored persona is authorized to be present in the AUS;
receive, from an access control system, access control information including access credentials received at an access control device associated with an ingress point of the AUS; and
determine that the stored persona includes stored access credentials that match the received access credentials, wherein the determination that the user associated with the stored persona is authorized to be present in the AUS is further based at least in part on the determination that the stored persona includes access credentials that match the received access credentials.
1 Assignment
0 Petitions
Accused Products
Abstract
Electromagnetic (EM)/radio frequency (RF) emissions may be detected and corresponding EM personas may be created. One or more EM personas may be associated with a super persona corresponding to a particular entity. EM personas, super personas, and/or supplemental identifying information can be used to enforce security protocols.
12 Citations
17 Claims
-
1. A system, comprising:
-
a transceiver; at least one memory that stores computer-executable instructions; and at least one processor operationally coupled to the transceiver and the at least one memory, wherein the at least one processor is configured to access the at least one memory and execute the computer-executable instructions to; receive a radio frequency (RF) fingerprint of an RF signal detected by the transceiver within an area under surveillance (AUS), the RF fingerprint comprising at least one of;
i) a hardware address of an electronic device that emitted the RF signal or ii) a radio type identifier of a radio of the electronic device;determine a stored persona that includes a stored RF fingerprint that matches the received RF fingerprint; determine that the electronic device that emitted the RF signal is associated with the stored persona; determine, based at least in part on the determination that the electronic device is associated with the stored persona, that a user associated with the stored persona is authorized to be present in the AUS; receive, from an access control system, access control information including access credentials received at an access control device associated with an ingress point of the AUS; and determine that the stored persona includes stored access credentials that match the received access credentials, wherein the determination that the user associated with the stored persona is authorized to be present in the AUS is further based at least in part on the determination that the stored persona includes access credentials that match the received access credentials. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method, comprising:
-
receiving, by a security system comprising one or more computer processors and a transceiver, a radio frequency (RF) fingerprint of an RF signal emitted within an area under surveillance (AUS), the RF fingerprint comprising at least one of;
i) a hardware address of an electronic device that emitted the RF signal or ii) a radio type identifier of a radio of the electronic device;determining, by the security system, a stored persona that includes a stored RF fingerprint that matches the received RF fingerprint; determining, by the security system, that the electronic device that emitted the RF signal is associated with the stored persona; determining, by the security system and based at least in part on determining that the electronic device is associated with the stored persona, that a user of the electronic device is authorized to be present in the AUS; receiving, by the security system, from an access control system, access control information including access credentials received at an access control device associated with an ingress point of the AUS; and determining, by the security system, that the stored persona includes stored access credentials that match the received access credentials, wherein determining that the user of the electronic device is authorized to be present in the AUS is further based at least in part on determining that the stored persona includes access credentials that match the received access credentials. - View Dependent Claims (7, 8, 9, 10, 11, 12)
-
-
13. One or more non-transitory computer-readable media storing computer-executable instructions that responsive to execution cause one or more computer processors to perform operations comprising:
-
receiving a radio frequency (RF) fingerprint of an RF signal detected at a transceiver within an area under surveillance (AUS), the RF fingerprint comprising at least one of;
i) a hardware address of an electronic device that emitted the RF signal or ii) a radio type identifier of a radio of the electronic device;determining a stored persona that includes a stored RF fingerprint that matches the received RF fingerprint; determining that the electronic device that emitted the RF signal is associated with the stored persona; determining, based at least in part on determining that the electronic device is associated with the stored persona, that a user of the electronic device is authorized to be present in the AUS; receiving from an access control system, access control information including access credentials received at an access control device associated with an ingress point of the AUS; and determining that the stored persona includes stored access credentials that match the received access credentials, wherein determining that the user of the electronic device is authorized to be present in the AUS is further based at least in part on determining that the stored persona includes access credentials that match the received access credentials. - View Dependent Claims (14, 15, 16, 17)
-
Specification