Identity protection method for use with wireless telephone systems
First Claim
1. In a wireless communication system requiring a unique valid identity for each valid mobile unit operating in said wireless communication system, a mobile unit identity security system comprised of:
- a jamming transmitter for making a plurality of jamming transmissions on the same frequency or frequencies on which valid mobile units transmit;
each of said jamming transmissions containing at least a controlled mobile unit identity specifically selected or created for allowing monitoring of the activities of unauthorized mobile units which utilize or attempt to utilize said controlled mobile unit identities;
a modulating circuit with an output in communication with an input of said jamming transmitter for modulating said jamming transmitter with at least said controlled mobile unit identities;
said jamming transmissions being made in a manner which insures successful decoding of said controlled mobile identities by unauthorized listening devices.
4 Assignments
0 Petitions
Accused Products
Abstract
A cellular phone identity protection system that protects the identities of cellular telephones as they initiate calls through a cellular telephone system. The identity protection is provided through the use of jamming techniques and intentional false and tagged identity transmissions designed to prevent criminals from receiving valid subscribers'"'"' mobile identities over the airwaves. Jamming transmissions are made on the same frequency as the mobile transmissions, overpowering the valid mobile signals at the criminals'"'"' receivers, thereby preventing the criminals'"'"' equipment from properly decoding the MIN, ESN, SCM and other valid data transmitted by the valid mobile unit. These same jamming transmissions are fed, 180 degrees out of phase and level adjusted, into the receive antenna lines of the cell site control channel, canceling the effects of the jamming at the cell site receivers thereby allowing valid mobile call attempts to be processed normally. False and tagged identities are transmitted in the form of call attempts and registrations on the reverse control channel served by the local cell site. These fill up the collection equipment of the criminals with useless or trackable data. Valid mobile call attempt data is made available pre-call to external systems though a data port.
-
Citations
20 Claims
-
1. In a wireless communication system requiring a unique valid identity for each valid mobile unit operating in said wireless communication system, a mobile unit identity security system comprised of:
a jamming transmitter for making a plurality of jamming transmissions on the same frequency or frequencies on which valid mobile units transmit;
each of said jamming transmissions containing at least a controlled mobile unit identity specifically selected or created for allowing monitoring of the activities of unauthorized mobile units which utilize or attempt to utilize said controlled mobile unit identities;
a modulating circuit with an output in communication with an input of said jamming transmitter for modulating said jamming transmitter with at least said controlled mobile unit identities;
said jamming transmissions being made in a manner which insures successful decoding of said controlled mobile identities by unauthorized listening devices.- View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
15. In a wireless communication system requiring a unique valid identity for each valid mobile unit operating in said wireless communication system, a mobile unit identity security system comprised of:
a jamming transmitter for making a plurality of jamming transmissions on the same frequency or frequencies on which said valid mobile units transmit;
each of said jamming transmissions containing at least a controlled mobile unit identity specifically selected or created for allowing monitoring of unauthorized mobile units which utilize or attempt to utilize said controlled mobile unit identities, at least a portion of each of said jamming transmissions being concurrent with at least a portion of normal mobile transmissions made by said valid mobile units;
transmitted signals of said jamming transmissions being substantially canceled out prior to the input of decoding circuits of system receivers of said wireless communication system, causing said decoding circuits of said system receivers of said wireless communication system to ignore said jamming transmissions, processing instead said normal mobile transmissions made by said valid mobile units;
said substantial canceling of said transmitted signals comprising the introduction of an out of phase and level adjusted replica of said transmitted signals at a point prior to said input of said decoding circuits of said system receivers.
-
16. In a wireless communication system requiring a unique valid identity for each valid mobile unit operating in said wireless communication system, a method for protecting said unique valid identities, comprising the steps of:
-
a) creating or selecting a plurality of controlled mobile unit identities specifically for allowing monitoring of the activities of unauthorized mobile units which utilize or attempt to utilize said controlled mobile unit identity, b) making transmissions containing information representing said plurality of said controlled mobile unit identities. - View Dependent Claims (17, 18, 19, 20)
-
Specification