SYSTEMS AND METHODS FOR IDENTIFICATION OF MOBILE PHONES IN A RESTRICTED ENVIRONMENT
First Claim
1. A method, comprising:
- monitoring mobile communication terminals, which are located in a vicinity of a restricted environment;
producing respective activity profiles of the monitored communication terminals; and
based on the activity profiles, identifying a communication terminal that is operated illegitimately in the restricted environment.
4 Assignments
0 Petitions
Accused Products
Abstract
Methods and systems for identifying mobile communication terminals that are used in an unauthorized manner in a restricted environment. A monitoring system monitors mobile communication terminals that operate in the vicinity of a restricted environment, such as a prison. A profiling system analyzes the communication of the solicited terminals, and produces respective activity profiles of the terminals. Based on the activity profiles, the profiling system identifies communication terminals that are operated illegitimately. Various actions can be taken with respect to such illegitimate terminals. In a prison application, the profiling system identifies communication terminals that are operated illegitimately by prisoners.
-
Citations
19 Claims
-
1. A method, comprising:
-
monitoring mobile communication terminals, which are located in a vicinity of a restricted environment; producing respective activity profiles of the monitored communication terminals; and based on the activity profiles, identifying a communication terminal that is operated illegitimately in the restricted environment. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. Apparatus, comprising:
-
an interface, which is configured to communicate with a communication network so as to monitor mobile communication terminals that communicate over the communication network and are located in a vicinity of a restricted environment; and a processor, which is configured to receive information regarding the monitored communication terminals from the communication network via the interface, to produce respective activity profiles of the monitored communication terminals using the information, and to identify, based on the activity profiles, a communication terminal that is operated illegitimately in the restricted environment. - View Dependent Claims (17, 18, 19)
-
Specification