Cell Phone Detection and Identification
First Claim
1. A security tag affixed to a mobile phone for monitoring, tracking, and securing the mobile phone within a protected region, the security tag comprising:
- a tag antenna operable at a low radio frequency not exceeding one megahertz;
a tag transceiver operatively connected to the device antenna, the transceiver operable to receive radio signals at the low radio frequency and generate data signals at the said low radio frequency, in response thereto; and
a microcontroller operatively coupled with the transceiver, the microcontroller being configured to cause the transceiver to emit a signal when the mobile phone is exiting the protected region.
1 Assignment
0 Petitions
Accused Products
Abstract
A security tag affixed to a mobile phone for monitoring, tracking, and securing the mobile phone within a protected region. The security tag includes: a tag antenna operable at a low radio frequency not exceeding one megahertz; a tag transceiver operatively connected to the device antenna, the transceiver operable to receive radio signals at the low radio frequency and generate data signals at the said low radio frequency, in response thereto; and a microcontroller operatively coupled with the transceiver, the microcontroller being configured to cause the transceiver to emit a signal when the mobile phone is exiting the protected region.
30 Citations
43 Claims
-
1. A security tag affixed to a mobile phone for monitoring, tracking, and securing the mobile phone within a protected region, the security tag comprising:
-
a tag antenna operable at a low radio frequency not exceeding one megahertz; a tag transceiver operatively connected to the device antenna, the transceiver operable to receive radio signals at the low radio frequency and generate data signals at the said low radio frequency, in response thereto; and a microcontroller operatively coupled with the transceiver, the microcontroller being configured to cause the transceiver to emit a signal when the mobile phone is exiting the protected region. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22)
-
-
23. A method for securing data in a mobile phone within a protected region, the method comprising steps of:
-
configuring a signal generating system within the protected region, the signal generating system comprising at least one field antenna and a base station operable to generate a low frequency radio signal not exceeding one megahertz; configuring the mobile phone with a security tag, the security tag comprising; a low frequency transceiver, a microcontroller, an antenna operable at said low frequency, and a security program for secure use within the protected region; monitoring the mobile phone within the protected region; enabling user access to the mobile phone when the mobile phone is within the protected region; and restricting user access to the mobile phone when the mobile phone is outside of the protected region. - View Dependent Claims (24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40)
-
-
41. A system for tracking, monitoring, and securing at least one mobile phone within a protected region, the system comprising:
-
a networked security tag affixed to each mobile phone, the security tag operable to receive and transmit low frequency radio signals not exceeding one megahertz; a base station operable to generate the low frequency radio signals throughout substantially an entirety of the protected region, the base station comprising logic circuitry, a radio modem circuit, and an antenna; and at least one field antenna for radiating the low frequency radio signals driven by the base station. - View Dependent Claims (42, 43)
-
Specification