Security measures based on signal strengths of radio frequency signals
First Claim
Patent Images
1. A system, comprising:
- a radio frequency (RF) sensor configured to detect RF signals;
at least one memory that stores computer-executable instructions; and
an RF controller operationally coupled to a transceiver and the at least one memory, wherein the RF controller is configured to access the at least one memory and execute the computer-executable instructions to;
receive an RF fingerprint of an RF signal detected by the RF sensor within an area under surveillance (AUS), the RF fingerprint comprising at least one of;
i) a hardware address of an electronic device that emitted the RF signal or ii) a radio type identifier of a radio of the electronic device;
identify a first receive signal strength indicator (RSSI) value of the RF signal at the RF sensor at a first time;
identify a second RSSI value of the RF signal at the RF sensor at a second time;
determine a velocity of the electronic device based at least in part on the first RSSI value, the second RSSI value, and a span of time between the first time and the second time;
determine that the velocity is greater than a threshold velocity value;
determine, based at least in part on the first RSSI value and the second RSSI value, a direction of movement of the first electronic device toward an egress point of the AUS; and
generate an alarm indicating that the velocity of the electronic device toward the egress point has been detected greater than the threshold velocity value.
1 Assignment
0 Petitions
Accused Products
Abstract
Electromagnetic (EM)/radio frequency (RF) emissions may be detected and corresponding EM personas may be created. One or more EM personas may be associated with a super persona corresponding to a particular entity. EM personas, super personas, and/or supplemental identifying information can be used to enforce security protocols.
106 Citations
20 Claims
-
1. A system, comprising:
-
a radio frequency (RF) sensor configured to detect RF signals; at least one memory that stores computer-executable instructions; and an RF controller operationally coupled to a transceiver and the at least one memory, wherein the RF controller is configured to access the at least one memory and execute the computer-executable instructions to; receive an RF fingerprint of an RF signal detected by the RF sensor within an area under surveillance (AUS), the RF fingerprint comprising at least one of;
i) a hardware address of an electronic device that emitted the RF signal or ii) a radio type identifier of a radio of the electronic device;identify a first receive signal strength indicator (RSSI) value of the RF signal at the RF sensor at a first time; identify a second RSSI value of the RF signal at the RF sensor at a second time; determine a velocity of the electronic device based at least in part on the first RSSI value, the second RSSI value, and a span of time between the first time and the second time; determine that the velocity is greater than a threshold velocity value; determine, based at least in part on the first RSSI value and the second RSSI value, a direction of movement of the first electronic device toward an egress point of the AUS; and generate an alarm indicating that the velocity of the electronic device toward the egress point has been detected greater than the threshold velocity value. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method, comprising:
-
receiving, by a security system comprising one or more processors, a RF fingerprint of a RF signal detected by an RF sensor within an area under surveillance (AUS), the RF fingerprint comprising at least one of;
i) a hardware address of an electronic device that emitted the RF signal or ii) a radio type identifier of a radio of the electronic device;identifying, by the security system, a first receive signal strength indicator (RSSI) value of the RF signal at the RF sensor at a first time; identifying, by the security system, a second RSSI value of the RF signal at the RF sensor at a second time; determining, by the security system, a velocity of the electronic device based at least in part on the first RSSI value, the second RSSI value, and a span of time between the first time and the second time; determining, by the security system, that the velocity is greater than a threshold velocity value; determining, by the security system and based at least in part on the first RSSI value and the second RSSI value, a direction of movement of the first electronic device toward an egress point of the AUS; and generating, by the security system, an alarm indicating that the velocity of the electronic device toward the egress point has been detected greater than the threshold velocity value. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. One or more non-transitory computer-readable media storing computer-executable instructions that responsive to execution cause one or more computer processors to perform operations comprising:
-
receiving a RF fingerprint of a RF signal detected by an RF sensor within an area under surveillance (AUS), the RF fingerprint comprising at least one of;
i) a hardware address of an electronic device that emitted the RF signal or ii) a radio type identifier of a radio of the electronic device;identifying a first receive signal strength indicator (RSSI) value of the RF signal at the RF sensor at a first time; identifying a second RSSI value of the RF signal at the RF sensor at a second time; determining a velocity of the electronic device based at least in part on the first RSSI value, the second RSSI value, and a span of time between the first time and the second time; determining that the velocity is greater than a threshold velocity value; determining, based at least in part on the first RSSI value and the second RSSI value, a direction of movement of the first electronic device toward an egress point of the AUS; and generating an alarm indicating that the velocity of the electronic device toward the egress point has been detected greater than the threshold velocity value. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification