Systems and methods for identification of mobile phones in a restricted environment
First Claim
1. A method, comprising:
- monitoring mobile communication terminals, which are located in a vicinity of a restricted environment;
producing, using a processor of a computing device, respective activity profiles of the monitored communication terminals; and
based on the activity profiles, identifying a communication terminal that is operated illegitimately in the restricted environment,wherein identifying the communication terminal comprises applying an identification criterion to an activity profile of the communication terminal, and identifying the communication terminal as operating illegitimately responsively to meeting the criterion,wherein identifying the communication terminal comprises applying an identification criterion to an activity profile of the communication terminal, and identifying the communication terminal as operating illegitimately responsively to meeting the criterion, andwherein the identification criterion regards the communication terminal as illegitimate when the communication terminal communicates in a repetitive pattern.
4 Assignments
0 Petitions
Accused Products
Abstract
Methods and systems for identifying mobile communication terminals that are used in an unauthorized manner in a restricted environment. A monitoring system monitors mobile communication terminals that operate in the vicinity of a restricted environment, such as a prison. A profiling system analyzes the communication of the solicited terminals, and produces respective activity profiles of the terminals. Based on the activity profiles, the profiling system identifies communication terminals that are operated illegitimately. Various actions can be taken with respect to such illegitimate terminals. In a prison application, the profiling system identifies communication terminals that are operated illegitimately by prisoners.
-
Citations
17 Claims
-
1. A method, comprising:
-
monitoring mobile communication terminals, which are located in a vicinity of a restricted environment; producing, using a processor of a computing device, respective activity profiles of the monitored communication terminals; and based on the activity profiles, identifying a communication terminal that is operated illegitimately in the restricted environment, wherein identifying the communication terminal comprises applying an identification criterion to an activity profile of the communication terminal, and identifying the communication terminal as operating illegitimately responsively to meeting the criterion, wherein identifying the communication terminal comprises applying an identification criterion to an activity profile of the communication terminal, and identifying the communication terminal as operating illegitimately responsively to meeting the criterion, and wherein the identification criterion regards the communication terminal as illegitimate when the communication terminal communicates in a repetitive pattern. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. Apparatus, comprising:
-
an interface, which is configured to communicate with a communication network so as to monitor mobile communication terminals that communicate over the communication network and are located in a vicinity of a restricted environment; and a processor, which is configured to receive information regarding the monitored communication terminals from the communication network via the interface, to produce respective activity profiles of the monitored communication terminals using the information, and to identify, based on the activity profiles, a communication terminal that is operated illegitimately in the restricted environment, wherein to identify the communication terminal comprises applying an identification criterion to an activity profile of the communication terminal, and identifying the communication terminal as operating illegitimately responsively to meeting the criterion, and wherein the identification criterion regards the communication terminal as illegitimate when the communication terminal communicates in a repetitive pattern. - View Dependent Claims (15, 16, 17)
-
Specification