System and method for preventing unauthorized wireless communications which attempt to provide input to or elicit output from a mobile device
First Claim
1. A method of controlling performance of a wireless request by a mobile device within an authorized zone having a communications network, wherein said method is autonomously performed by a controller, the method comprising the steps of:
- (a) detecting the request within the zone;
(b) determining within a period of manipulation whether the request emanated from the network; and
(c) communicating with the mobile device within the period of manipulation, so as to cause the request to be disobeyed by the device, when the request did not emanate from the networkwherein steps (b), and (c) further including the steps of communicatively coupling the controller and network, such that the controller is operable to determine a period of potential promulgation for the request, detect network activity within the period of potential promulgation, and cause the request to be disobeyed, when network activity is not detected within the period of promulgation.
12 Assignments
0 Petitions
Accused Products
Abstract
A monitoring system and method for controlling access to, and especially protecting against unauthorized requests to provide input to, e.g., program, or elicit output from, a vehicular or other mobile device, such as an electronic control unit (ECU), adapted for use with the system, wherein said system, in a preferred embodiment, is configured to receive the request within a safe-zone, block its execution by the vehicle, send an objection message back to the source, and send a report to a law enforcement agency, based on the location of the source of the request.
11 Citations
13 Claims
-
1. A method of controlling performance of a wireless request by a mobile device within an authorized zone having a communications network, wherein said method is autonomously performed by a controller, the method comprising the steps of:
-
(a) detecting the request within the zone; (b) determining within a period of manipulation whether the request emanated from the network; and (c) communicating with the mobile device within the period of manipulation, so as to cause the request to be disobeyed by the device, when the request did not emanate from the network wherein steps (b), and (c) further including the steps of communicatively coupling the controller and network, such that the controller is operable to determine a period of potential promulgation for the request, detect network activity within the period of potential promulgation, and cause the request to be disobeyed, when network activity is not detected within the period of promulgation. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method of controlling performance of a wireless request by a mobile device within an authorized zone, the method comprising the steps of:
-
(a) determining the presence of the mobile device within the zone; (b) determining and storing at least one communication channel of the mobile device; (c) detecting the request within the zone, and determining the transmission channel of the request; (d) comparing the transmission channel to the communication channel of the mobile device; (e) determining the location of the originating source of the request, when the transmission channel is congruent to the communication channel; and (f) causing the request to be disobeyed by the mobile device when the originating source is located outside of the zone by sending a blocking message to the mobile device, wherein said blocking message instructs the mobile device not to perform or accept the request. - View Dependent Claims (7, 8, 9)
-
-
10. A method of controlling performance of specified wireless requests by a mobile device within an authorized zone, the method comprising the steps of:
-
(a) determining the presence of the mobile device within the zone; (b) determining and storing at least one communication channel of the mobile device; (c) detecting only a wireless request having a transmission channel congruent with the communication channel; (d) determining the location of the originating source of the request; and (e) denying acceptance of the request by the mobile device when the originating source is located outside of the zone, by sending a blocking message to the mobile device, wherein said blocking message instructs the mobile device not to receive, accept, or perform the request. - View Dependent Claims (11, 12, 13)
-
Specification