System and method for preventing unauthorized wireless communications
First Claim
1. A method of controlling access to a mobile device within an authorized zone having a communications network, wherein said method is autonomously performed by an electro-mechanical system, the method comprising the steps of:
- (a) detecting a wireless request within the zone;
(b) determining within a period of manipulation whether the request emanated from the network; and
(c) communicating with the mobile device within the period of manipulation, so as to cause the request to be disobeyed by the device, when the request did not emanate from the network.
12 Assignments
0 Petitions
Accused Products
Abstract
A monitoring system and method for controlling access to, and especially protecting against unauthorized requests to provide input to, e.g., program, or elicit output from, a vehicular or other mobile device, such as an electronic control unit (ECU), adapted for use with the system, wherein said system, in a preferred embodiment, is configured to receive the request within a safe-zone, block its execution by the vehicle, send an objection message back to the source, and send a report to a law enforcement agency, based on the location of the source of the request.
-
Citations
20 Claims
-
1. A method of controlling access to a mobile device within an authorized zone having a communications network, wherein said method is autonomously performed by an electro-mechanical system, the method comprising the steps of:
-
(a) detecting a wireless request within the zone;
(b) determining within a period of manipulation whether the request emanated from the network; and
(c) communicating with the mobile device within the period of manipulation, so as to cause the request to be disobeyed by the device, when the request did not emanate from the network. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 10, 11, 12, 13, 14)
-
-
9. A method of controlling access to a mobile device within an authorized zone, the method comprising the steps of:
-
(a) determining the presence of the mobile device within the zone;
(b) determining and storing at least one communication channel of the mobile device;
(c) detecting a wireless request within the zone, and determining the transmission channel of the request;
(d) comparing the transmission channel to the communication channel of the mobile device;
(e) determining the location of the originating source of the request, when the transmission channel is congruent to the communication channel; and
(f) causing the request to be disobeyed by the mobile device, when the originating source is located outside of the zone.
-
-
15. A method of controlling access to a mobile device within an authorized zone, the method comprising the steps of:
-
(a) determining the presence of the mobile device within the zone;
(b) determining and storing at least one communication channel of the mobile device;
(c) detecting only a wireless request having a transmission channel congruent with the communication channel;
(d) determining the location of the originating source of the request; and
(e) denying acceptance of the request by the mobile device, when the originating source is located outside of the zone. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification