Cellular Device Identification and Location with Emergency Number Selectivity Enforcement (CILENSE)
First Claim
1. A system for restricting the operation of a radio communication device, the system comprising:
- a controller comprisinga communication module;
a security module; and
a memory;
at least three sensors, configured to be communicatively coupled to the controller and to operate within a moving vehicle, remotely from a cellular base station site; and
a wireless user control, configured to be communicatively coupled to the controller;
wherein the controller is configured todetermine an identity of a device, using a radio transmission from the device that is received by at least one of the sensors;
determine whether the identified device is within a predefined usage restriction zone, using zone boundary data stored within the controller memory and a radio transmission from the device that is received by at least two of the sensors;
receive a security code from a serving cellular base station; and
communicate the identity of the identified device to a remote node, across a public computer network, using the received security code as an authentication credential.
0 Assignments
0 Petitions
Accused Products
Abstract
A system for restricting operation of wireless devices, for example cell phones, comprises a controller and a plurality of sensors. The system restricts device usage, while permitting emergency phone calls, for example 911 calls. The sensors receive transmissions from devices, and use the transmissions for identification and determining whether a device is within a restricted zone. One disclosed method is triangulation, using time of arrival of transmissions at the sensors. If the device is within the zone, the controller sends device identification, and possibly a customized restriction request, to a remote node, for example a control node of a cell phone network operator. The operator then uses its network resources to implement the requested restrictions. Communication between the controller and the remote node is secure, possibly encrypted, to minimize malicious interference. A wireless control can define vertices of the zone and exempt certain devices from restrictions. Jamming is not required.
-
Citations
20 Claims
-
1. A system for restricting the operation of a radio communication device, the system comprising:
-
a controller comprising a communication module; a security module; and a memory; at least three sensors, configured to be communicatively coupled to the controller and to operate within a moving vehicle, remotely from a cellular base station site; and a wireless user control, configured to be communicatively coupled to the controller; wherein the controller is configured to determine an identity of a device, using a radio transmission from the device that is received by at least one of the sensors; determine whether the identified device is within a predefined usage restriction zone, using zone boundary data stored within the controller memory and a radio transmission from the device that is received by at least two of the sensors; receive a security code from a serving cellular base station; and communicate the identity of the identified device to a remote node, across a public computer network, using the received security code as an authentication credential. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A method of restricting the operation of a radio communication device, the method comprising:
-
determining an identity of a device, using a radio transmission from the device; determining whether the identified device is within a predefined usage restriction zone, using time of arrival information from a plurality of sensors, for a radio transmission from the device; and securely communicating the identity of the identified device to a remote node, across a public computer network. - View Dependent Claims (20)
-
Specification