Disabling A Mobile Phone Suspected Of Being A Trigger For A Bomb
First Claim
1. A method for disabling a mobile phone suspected of being a trigger for a bomb, the mobile phone connected for data communications to a mobile phone network, the method comprising:
- tracking, by one or more data communications servers of the mobile phone network, location, motion, and usage of the mobile phone;
determining, by the one or more data communications servers, whether the location, the motion, and the usage of the mobile phone matches a suspect pattern of location, motion, and usage; and
disabling, by the one or more data communications servers, the mobile phone only from receiving messages if the location, the motion, and the usage of the mobile phone matches a suspect pattern of location, motion, and usage.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods, systems, and computer program products for disabling a mobile phone suspected of being a trigger for a bomb are provided. Embodiments include tracking, by one or more data communications servers of the data communications network, location, motion, and usage of a mobile phone; determining, by the one or more data communications servers, whether the location, the motion, and the usage of the mobile phone matches a suspect pattern of location, motion, and usage; and disabling, by the one or more data communications servers, the mobile phone only from receiving messages if the location, the motion, and the usage of the mobile phone matches a suspect pattern of location, motion, and usage.
22 Citations
20 Claims
-
1. A method for disabling a mobile phone suspected of being a trigger for a bomb, the mobile phone connected for data communications to a mobile phone network, the method comprising:
-
tracking, by one or more data communications servers of the mobile phone network, location, motion, and usage of the mobile phone; determining, by the one or more data communications servers, whether the location, the motion, and the usage of the mobile phone matches a suspect pattern of location, motion, and usage; and disabling, by the one or more data communications servers, the mobile phone only from receiving messages if the location, the motion, and the usage of the mobile phone matches a suspect pattern of location, motion, and usage. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A system for disabling a mobile phone suspected of being a trigger for a bomb, the mobile phone connected for data communications to a mobile phone network, the apparatus comprising a computer processor, a computer memory operatively coupled to the computer processor, the computer memory having disposed within it computer program instructions capable of:
-
tracking, by one or more data communications servers of the mobile phone network, location, motion, and usage of the mobile phone; determining, by the one or more data communications servers, whether the location, the motion, and the usage of the mobile phone matches a suspect pattern of location, motion, and usage; and disabling, by the one or more data communications servers, the mobile phone only from receiving messages if the location, the motion, and the usage of the mobile phone matches a suspect pattern of location, motion, and usage. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A computer program product for disabling a mobile phone suspected of being a trigger for a bomb, the mobile phone connected for data communications to a mobile phone network, the computer program product disposed in a computer readable medium, the computer program product comprising computer program instructions capable of:
-
tracking, by one or more data communications servers of the mobile phone network, location, motion, and usage of the mobile phone; determining, by the one or more data communications servers, whether the location, the motion, and the usage of the mobile phone matches a suspect pattern of location, motion, and usage; and disabling, by the one or more data communications servers, the mobile phone only from receiving messages if the location, the motion, and the usage of the mobile phone matches a suspect pattern of location, motion, and usage. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20)
-
Specification