DIGITAL FINGERPRINT TRACKING
1 Assignment
0 Petitions
Accused Products
Abstract
Techniques are described for tracking intruders of a monitored property by the unique identifying characteristics or “digital fingerprints” of electronic devices carried by the intruders. A system detects an alarm event at a monitored property based on output from at least one sensor located at the monitored property. In response to detecting the alarm event at the monitored property, the system initiates a process to gather electronic identifiers for mobile electronic devices located within the monitored property at a time corresponding to the detected alarm event. The system determines electronic identifiers for the mobile electronic devices located within the monitored property at a time corresponding to the detected alarm event. The system stores in electronic storage, information indicating the determined electronic identifiers for the mobile electronic devices located within the monitored property at a time corresponding to the detected alarm event.
1 Citation
21 Claims
-
1. (canceled)
-
2. A computer-implemented method comprising:
-
detecting, using a sensor of a wireless monitoring network, an event at a property monitored by the wireless monitoring network; determining, by a processor of the wireless monitoring network, a location associated with the event; identifying, by the processor, a device detector that has a location corresponding to the location associated with the event; controlling the device detector to transmit one or more requests to one or more mobile electronic devices within the property; receiving one or more response messages from the one or more mobile electronic devices, respectively; extracting, by the processor and from the one or more response messages, device identifications associated with the one or more mobile electronic devices; and determining, by the processor, that one of the extracted device identifications associated with the one or more mobile electronic devices is likely a device of an intruder. - View Dependent Claims (3, 4, 5, 6, 7, 8)
-
-
9. A system comprising:
-
one or more computers; and one or more storage devices storing instructions that are operable, when executed by the one or more computers, to cause the one or more computers to perform operations comprising; detecting, using a sensor of a wireless monitoring network, an event at a property monitored by the wireless monitoring network; determining a location associated with the event; identifying a device detector that has a location corresponding to the location associated with the event; controlling the device detector to transmit one or more requests to one or more mobile electronic devices within the property; receiving one or more response messages from the one or more mobile electronic devices, respectively; extracting, from the one or more response messages, device identifications associated with the one or more mobile electronic devices; and determining that one of the extracted device identifications associated with the one or more mobile electronic devices is likely a device of an intruder. - View Dependent Claims (10, 11, 12, 13, 14, 15)
-
-
16. A non-transitory computer-readable storage medium comprising instructions, which, when executed by one or more computers, cause the one or more computers to perform operations comprising:
-
detecting, using a sensor of a wireless monitoring network, an event at a property monitored by the wireless monitoring network; determining a location associated with the event; identifying a device detector that has a location corresponding to the location associated with the event; controlling the device detector to transmit one or more requests to one or more mobile electronic devices within the property; receiving one or more response messages from the one or more mobile electronic devices, respectively; extracting, from the one or more response messages, device identifications associated with the one or more mobile electronic devices; and determining that one of the extracted device identifications associated with the one or more mobile electronic devices is likely a device of an intruder. - View Dependent Claims (17, 18, 19, 20, 21)
-
Specification