Malfeasance detection based on identification of device signature
First Claim
Patent Images
1. A system for notifying a malfeasance specialist of a malfeasance detection based on identification of a device signature, said system comprising:
- one or more memory devices having computer readable program code stored thereon;
a communication device; and
one or more processing devices operatively coupled to the one or more memory devices, wherein the one or more processing devices are configured to execute the computer readable program code to;
identify device signatures of a plurality of devices associated with malfeasance;
store the device signatures associated with malfeasance in a database;
monitor a geographical location for the device signatures associated with malfeasance;
detect a presence of a first device signature in the geographical location, wherein the first device signature is associated with a first device;
compare the first device signature with the stored device signatures associated with malfeasance;
determine, based on the comparison, that the first device signature matches at least one of the stored device signatures associated with malfeasance; and
in response to determining that the first device signature matches at least one of the stored device signatures associated with malfeasance, provide a notification to a malfeasance specialist of a presence of the first device at the geographical location.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems, methods, and computer program products are described herein that provide for notifying a malfeasance specialist of a malfeasance detection based on identification of a device signature. Monitoring devices may monitor devices in a location for device signatures that are known to be associated with malfeasance. Upon detecting the presence of a device signature associated with malfeasance, a specialist may be notified of the detection so that the specialist may take appropriate actions in response to the detection.
-
Citations
17 Claims
-
1. A system for notifying a malfeasance specialist of a malfeasance detection based on identification of a device signature, said system comprising:
-
one or more memory devices having computer readable program code stored thereon; a communication device; and one or more processing devices operatively coupled to the one or more memory devices, wherein the one or more processing devices are configured to execute the computer readable program code to; identify device signatures of a plurality of devices associated with malfeasance; store the device signatures associated with malfeasance in a database; monitor a geographical location for the device signatures associated with malfeasance; detect a presence of a first device signature in the geographical location, wherein the first device signature is associated with a first device; compare the first device signature with the stored device signatures associated with malfeasance; determine, based on the comparison, that the first device signature matches at least one of the stored device signatures associated with malfeasance; and in response to determining that the first device signature matches at least one of the stored device signatures associated with malfeasance, provide a notification to a malfeasance specialist of a presence of the first device at the geographical location. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A computer program product for notifying a malfeasance specialist of a malfeasance detection based on identification of a device signature, the computer program product comprising at least one non-transitory computer readable medium comprising computer readable instructions, the instructions comprising instructions for:
-
identifying device signatures of a plurality of devices associated with malfeasance; storing the device signatures associated with malfeasance in a database; monitoring a geographical location for the device signatures associated with malfeasance; detecting a presence of a first device signature in the geographical location, wherein the first device signature is associated with a first device; comparing the first device signature with the stored device signatures associated with malfeasance; determining, based on the comparison, that the first device signature matches at least one of the stored device signatures associated with malfeasance; and in response to determining that the first device signature matches at least one of the stored device signatures associated with malfeasance, providing a notification to a malfeasance specialist of a presence of the first device at the geographical location. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A computer implemented method for notifying a malfeasance specialist of a malfeasance detection based on identification of a device signature, said computer implemented method comprising:
providing a computing system comprising a computer processing device and a non-transitory computer readable medium, where the computer readable medium comprises configured computer program instruction code, such that when said instruction code is operated by said computer processing device, said computer processing device performs the following operations; identifying device signatures of a plurality of devices associated with malfeasance; storing the device signatures associated with malfeasance in a database; monitoring a geographical location for the device signatures associated with malfeasance; detecting a presence of a first device signature in the geographical location associated with a first device; comparing the first device signature with the stored plurality of device signatures associated with malfeasance; determining, based on the comparison, that the first device signature matches at least one of the stored device signatures associated with malfeasance; and in response to determining that the first device signature matches at least one of the stored device signatures associated with malfeasance, providing a notification to a malfeasance specialist of a presence of the first device at the geographical location. - View Dependent Claims (14, 15, 16, 17)
Specification