Disabling a mobile phone suspected of being a trigger for a bomb
First Claim
1. A method for disabling a mobile phone suspected of being a trigger for a bomb, the mobile phone connected for data communications to a mobile phone network, the method comprising:
- tracking, by one or more data communications servers of the mobile phone network, location, motion, and usage of the mobile phone;
determining, by the one or more data communications servers, whether the location, the motion, and the usage of the mobile phone matches a suspect pattern record, wherein the suspect pattern record includes location criteria, motion criteria, and usage criteria, including;
determining whether the location of the mobile phone matches the location criteria in the suspect pattern record;
determining whether the motion of the mobile phone matches the motion criteria in the suspect pattern record; and
determining whether the usage of the mobile phone matches the usage criteria in the suspect pattern record;
disabling, by the one or more data communications servers, the mobile phone only from receiving messages if the location, the motion, and the usage of the mobile phone matches a suspect pattern record of location, motion, and usage; and
enabling, by the one or more data communications servers, the mobile phone to receive messages after expiration of a predetermined period of time.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods, systems, and computer program products for disabling a mobile phone suspected of being a trigger for a bomb are provided. Embodiments include tracking, by one or more data communications servers of the data communications network, location, motion, and usage of a mobile phone; determining, by the one or more data communications servers, whether the location, the motion, and the usage of the mobile phone matches a suspect pattern of location, motion, and usage; and disabling, by the one or more data communications servers, the mobile phone only from receiving messages if the location, the motion, and the usage of the mobile phone matches a suspect pattern of location, motion, and usage.
16 Citations
18 Claims
-
1. A method for disabling a mobile phone suspected of being a trigger for a bomb, the mobile phone connected for data communications to a mobile phone network, the method comprising:
-
tracking, by one or more data communications servers of the mobile phone network, location, motion, and usage of the mobile phone; determining, by the one or more data communications servers, whether the location, the motion, and the usage of the mobile phone matches a suspect pattern record, wherein the suspect pattern record includes location criteria, motion criteria, and usage criteria, including; determining whether the location of the mobile phone matches the location criteria in the suspect pattern record; determining whether the motion of the mobile phone matches the motion criteria in the suspect pattern record; and determining whether the usage of the mobile phone matches the usage criteria in the suspect pattern record; disabling, by the one or more data communications servers, the mobile phone only from receiving messages if the location, the motion, and the usage of the mobile phone matches a suspect pattern record of location, motion, and usage; and enabling, by the one or more data communications servers, the mobile phone to receive messages after expiration of a predetermined period of time. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A system for disabling a mobile phone suspected of being a trigger for a bomb, the mobile phone connected for data communications to a mobile phone network, the system comprising a computer processor, a computer memory operatively coupled to the computer processor, the computer memory having disposed within it computer program instructions capable of:
-
tracking, by one or more data communications servers of the mobile phone network, location, motion, and usage of the mobile phone; determining, by the one or more data communications servers, whether the location, the motion, and the usage of the mobile phone matches a suspect pattern record, wherein the suspect pattern record includes location criteria, motion criteria, and usage criteria, including; determining whether the location of the mobile phone matches the location criteria in the suspect pattern record; determining whether the motion of the mobile phone matches the motion criteria in the suspect pattern record; and determining whether the usage of the mobile phone matches the usage criteria in the suspect pattern record; disabling, by the one or more data communications servers, the mobile phone only from receiving messages if the location, the motion, and the usage of the mobile phone matches a suspect pattern record of location, motion, and usage; and enabling, by the one or more data communications servers, the mobile phone to receive messages after expiration of a predetermined period of time. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A computer program product for disabling a mobile phone suspected of being a trigger for a bomb, the mobile phone connected for data communications to a mobile phone network, the computer program product disposed in a computer readable recordable storage medium, the computer program product comprising computer program instructions capable of:
-
tracking, by one or more data communications servers of the mobile phone network, location, motion, and usage of the mobile phone; determining, by the one or more data communications servers, whether the location, the motion, and the usage of the mobile phone matches a suspect pattern record, wherein the suspect pattern record includes location criteria, motion criteria, and usage criteria, including; determining whether the location of the mobile phone matches the location criteria in the suspect pattern record; determining whether the motion of the mobile phone matches the motion criteria in the suspect pattern record; and determining whether the usage of the mobile phone matches the usage criteria in the suspect pattern record; disabling, by the one or more data communications servers, the mobile phone only from receiving messages if the location, the motion, and the usage of the mobile phone matches a suspect pattern record of location, motion, and usage; and enabling, by the one or more data communications servers, the mobile phone to receive messages after expiration of a predetermined period of time. - View Dependent Claims (14, 15, 16, 17, 18)
-
Specification