Methods of suppressing GSM wireless device threats in dynamic or wide area static environments using minimal power consumption and collateral interference
First Claim
1. A method of reducing power consumption and collateral interference by preventing one or more wireless devices in an operational area from receiving environmental information on downlink channels, the environmental information being capable of activating a hostile device, the method comprising:
- using a receiver to detect uplink signaling of associated one or more wireless devices operating on a set of frequency channels or equivalent carrier frequencies; and
using a transmitter to create an attack signal that limits an attack to an associated plurality of downlink channels upon which the threat is receiving; and
at least one of the following;
a) limiting a bandwidth of the attack signal to be matched to the plurality of downlink channels upon which the detected one or more wireless devices are receiving;
b) adjusting a power of the attack signal either collectively on the plurality of channels or on a per downlink channel basis to match a power detected on the downlink channels; and
c) time-multiplexing the attack between downlink channels to minimize the average power.
1 Assignment
0 Petitions
Accused Products
Abstract
Techniques for detecting wireless devices that are signaling in high proximity to a convoy or other operation and preventing messages from reaching the wireless devices. One class of the techniques uses surgical jamming methodologies that minimize power consumption and collateral interference, while being maximally inconspicuous; another class uses baiting beacons to prevent the messages from reaching the wireless devices. Still another class of techniques denies wireless devices access to a wireless network. An exemplary embodiment applies the techniques to wireless devices and beacons in a GSM network.
-
Citations
5 Claims
-
1. A method of reducing power consumption and collateral interference by preventing one or more wireless devices in an operational area from receiving environmental information on downlink channels, the environmental information being capable of activating a hostile device, the method comprising:
-
using a receiver to detect uplink signaling of associated one or more wireless devices operating on a set of frequency channels or equivalent carrier frequencies; and using a transmitter to create an attack signal that limits an attack to an associated plurality of downlink channels upon which the threat is receiving; and at least one of the following; a) limiting a bandwidth of the attack signal to be matched to the plurality of downlink channels upon which the detected one or more wireless devices are receiving; b) adjusting a power of the attack signal either collectively on the plurality of channels or on a per downlink channel basis to match a power detected on the downlink channels; and c) time-multiplexing the attack between downlink channels to minimize the average power. - View Dependent Claims (2, 3, 4, 5)
-
Specification