Methods of Remotely Identifying, Suppressing, Disabling and Access Filtering Wireless Devices of Interest Using Signal Timing and Intercept Receivers to Effect Power Reduction, Minimization of Detection, and Minimization of Collateral Interfernce.
First Claim
1. A method of suppressing a given beacon so that a wireless device cannot interact with the given beacon, the given beacon and the wireless device obeying a wireless communication standard andthe method comprising the steps of:
- determining a characteristic of the signal produced by the given beacon, the characteristic being required by the standard for interaction between the wireless device and the given beacon; and
generating an interference signal that is specifically adapted to the characteristic and that interferes with the characteristic at the wireless device such that the wireless device cannot interact with the given beacon.
3 Assignments
0 Petitions
Accused Products
Abstract
Techniques for interfering with communications made according to a wireless standard between a beacon and a wireless device. The techniques determine a characteristic that is required by the standard for a signal produced during the communication. Then an interference signal is generated that is specifically adapted to the characteristic and interferes with the characteristic such that the wireless device and the beacon cannot interact as provided for the communication by the wireless standard. The techniques may be used to suppress legitimate wireless beacons in an operational area, to establish a baiting beacon in the operational area, or to interfere with communications between a wireless device and a baiting beacon or other beacon. The interference signal is specifically adapted to the characteristic in a way that greatly reduces the amount of power required for the interference signal and the conspicuousness of the interference signal.
-
Citations
60 Claims
-
1. A method of suppressing a given beacon so that a wireless device cannot interact with the given beacon, the given beacon and the wireless device obeying a wireless communication standard and
the method comprising the steps of: -
determining a characteristic of the signal produced by the given beacon, the characteristic being required by the standard for interaction between the wireless device and the given beacon; and generating an interference signal that is specifically adapted to the characteristic and that interferes with the characteristic at the wireless device such that the wireless device cannot interact with the given beacon. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46)
-
-
47. Apparatus for suppressing a given beacon so that a wireless device cannot interact with the given beacon, the given beacon and the wireless device obeying a wireless communication standard and
the apparatus comprising: -
an analyzer that determines a characteristic of the signal produced by the given beacon that is required by the standard for interaction between the wireless device and the given beacon; and a signal generator that generates a signal that is specifically adapted to the characteristic and that interferes with the characteristic at the wireless device such that the wireless device cannot interact with the given beacon.
-
-
48. A method employed in a baiting beacon of performing a given interaction with a wireless device that is monitoring the baiting beacon,
the method comprising the steps of: -
during authentication of the wireless device to the baiting beacon, refusing to respond to temporary identification information that temporarily identifies the wireless device, thereby causing the wireless device to provide permanent identification information that permanently identifies the wireless device to the baiting beacon; querying a database associated with the baiting beacon with the provided permanent identification information; and performing the given interaction with the wireless device only if the result of the query indicates that given interaction may be performed. - View Dependent Claims (49)
-
-
50. A method employed in a baiting beacon being monitored by a wireless device of locating the wireless device
the method comprising the steps of: -
requesting a report from the wireless device of the signal strength of signals from a plurality of beacons at known locations in the wireless device; for each beacon of the plurality, using the beacon'"'"'s signal strength at the wireless device to determine the distance of the wireless device from the beacon; and using the determined distances to determine the location of the wireless device. - View Dependent Claims (51)
-
-
52. A method of employing a baiting beacon to obtain the telephone number of a wireless device which is monitoring the baiting beacon, the wireless device interacting with a network which has caller identification capability and
the method comprising the steps of: -
using the baiting beacon to obtain identification information for the wireless device from the wireless device; using the identification information in the baiting beacon to set up a call to a destination device that has access to the network'"'"'s caller identification capability; and obtaining the telephone number of the wireless device from the destination device.
-
-
53. A method of employing a GSM baiting beacon to interact with a UMTS wireless device comprising the steps of:
-
establishing a relationship between the power of the GSNI baiting beacon and the power perceived by the UMTS wireless device of any UMTS beacons such that the UMTS wireless device falls back to GSM and attempts to register with the GSM baiting beacon; and in the GSM beacon, responding to the registration attempt by interacting with the UMTS wireless device. - View Dependent Claims (54)
-
-
55. A method of employing a baiting beacon to obtain permanent identification information for a wireless device that is monitoring the baiting beacon,
the method comprising the steps of: -
requesting identification information from the wireless device; and when the wireless device returns temporary information, failing to respond further, the wireless device responding to the failure of the baiting beacon to respond further by returning permanent identification information.
-
-
56. A method of employing a baiting beacon to disable a wireless device that is monitoring the baiting beacon, the wireless communication standard under which the wireless device operates specifying that that a wireless device will not interact with a beacon unless the beacon has authenticated itself to the wireless device, the wireless device being potentially able to interact with one or more given beacons other than the baiting beacon, and
the method comprising the steps performed by the baiting beacon for each of the given beacons of: -
overriding the given beacon; and thereupon failing to authenticate itself to the wireless device, whereby the wireless device no longer interacts with any of the given beacons.
-
-
57. A method of moving a given wireless device that is monitoring a given beacon to a different channel,
the method comprising the steps of: -
using a first baiting beacon to override the given beacon such that the given wireless device monitors the first baiting beacon instead of the given beacon in an operational area that surrounds the given wireless device; establishing a second baiting beacon on the different channel, the second baiting beacon acting in the operational area to override any beacons operating on the different channel; and using the first baiting beacon to command the wireless device to operate on the different channel.
-
-
58. A method of disabling a wireless device comprising the steps of:
-
determining an area that potentially contains the wireless device; and irradiating the area with sufficient energy to trip the wireless device'"'"'s protection circuitry.
-
-
59. A method of employing a baiting beacon to disable a wireless device of a type wherein identification information and a cipher key must be in phase in order for the wireless device to initeract with the wireless network,
the method comprising the steps of: -
enticing the wireless device to register with the baiting beacon; and employing the baiting beacon to change either the identification information or the cipher key in the wireless device so that the identification information is out of phase with the wireless device'"'"'s cipher key. - View Dependent Claims (60)
-
Specification