Method and apparatus of determining location of an unauthorized communication unit
First Claim
1. In a wireless communication system, a method for determining location of an unauthorized communication unit, the method comprises the steps of:
- a) receiving, by a first RF receiver of a plurality of RF receivers, an inbound signaling word from a communication unit, the inbound signaling word including an identification of the communication unit and a service request;
b) determining whether the identification code of the communication unit is unauthorized;
when the identification code of the communication unit is unauthorized;
c) determining a site location of the communication unit;
d) transmitting a communication resource assignment to the communication unit and at least a second RF receiver of the plurality of RF receivers in response to the service request, the at least a second RF receiver being proximate to the site location of the communication unit;
e) receiving, by the at least a second RF receiver, a subsequent RF transmission from the communication unit via a communication resource identified in the communication resource assignment; and
f) determining a geographic location of the communication unit based on the subsequent RF transmission.
1 Assignment
0 Petitions
Accused Products
Abstract
Location of an unauthorized communication unit 102 may be detected in a wireless communication system 100 by determining that an identification code being used by the communication unit has been validated in an unauthorized manner. Having determined this, the site from which the communication unit is transmitting is determined. With the transmitting site determined, RF receivers 110, 111 in the proximity of the transmitting site are enabled to receive a subsequent RF transmission from the communication unit. The RF transmissions received by the RF receivers are then used to calculate the location of the communication unit.
48 Citations
8 Claims
-
1. In a wireless communication system, a method for determining location of an unauthorized communication unit, the method comprises the steps of:
-
a) receiving, by a first RF receiver of a plurality of RF receivers, an inbound signaling word from a communication unit, the inbound signaling word including an identification of the communication unit and a service request; b) determining whether the identification code of the communication unit is unauthorized; when the identification code of the communication unit is unauthorized; c) determining a site location of the communication unit; d) transmitting a communication resource assignment to the communication unit and at least a second RF receiver of the plurality of RF receivers in response to the service request, the at least a second RF receiver being proximate to the site location of the communication unit; e) receiving, by the at least a second RF receiver, a subsequent RF transmission from the communication unit via a communication resource identified in the communication resource assignment; and f) determining a geographic location of the communication unit based on the subsequent RF transmission. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A wireless communication system comprising:
-
a first RF receiver that receives an inbound signaling word from a communication unit, the inbound signaling word including an identification of the communication unit and a service request; a communication resource controller, coupled to the first RF receiver, that tranmits a communication resource assignment to the communication unit in response to the service request; at least a second RF receiver that receives the communication resource assignment, tunes to a communication resource identified in the communication resource assignment, and receives a subsequent RF transmission from the communication unit via the communication resource; and a monitoring computer, coupled to the first RF receiver and the at least a second RF receiver, that is programmed to detect whether the communication unit is unauthorized, and, when the communication unit is unauthorized, is programmed to determine a geographic location of the communication unit based on the subsequent RF transmission received by the at least a second RF receiver.
-
Specification