A Kaushik - US Patent 11,057,398, 2021 - Google Patents
Poisoning attacks by spoofing location beacons in a WLAN are detected using silence periods. A location beacon identifier is received from a mobile device allegedly within range …
G Johnson - US Patent 10,432,343, 2019 - Google Patents
The present subject matter is directed to an apparatus and methodology for monitoring for the occurrence of use of unauthorized telecommunications equipment within a designated …
SL Hodge - US Patent 10,681,495, 2020 - Google Patents
There is a growing problem in correctional facilities in which contraband devices may be smuggled into a correctional facility. These devices are not subject to the typical monitoring …
H Alipour, RP Marreel - US Patent 10,728,931, 2020 - Google Patents
Described herein are systems, apparatuses, and methods for performing proximity-based authentication operations using received signal strength indicator (RSSI) values. An …
Z Chao, Q Guan, L Li, CH Tian, F Wang… - US Patent …, 2017 - Google Patents
In an approach for determining an unauthorized device, a computer receives detection information from a computing device, wherein the detection information includes a broad …
G Johnson - US Patent 11,258,530, 2022 - Google Patents
The present subject matter is directed to an apparatus and methodology for monitoring for the occurrence of use of unauthorized telecommunications equipment within a des ignated …
SL Hodge - US Patent 11,178,273, 2021 - Google Patents
The present disclosure provides details of a system and method for detecting and monitoring a contraband device including communication devices by utilizing a combination of mobile …
SL Hodge - US Patent 11,405,750, 2022 - Google Patents
There is a growing problem in correctional facilities in which contraband devices may be smuggled into a correctional facility. These devices are not subject to the typical monitoring …
G Johnson - US Patent 11,757,560, 2023 - Google Patents
The present subject matter is directed to an apparatus and methodology for monitoring for the occurrence of use of unauthorized telecommunications equipment within a designated …