Hacker-resistant denial of wireless device operation in restricted areas
First Claim
1. A system for restricting operation of a cellular device in restricted areas without requiring cooperation from the cellular device, the system comprising:
- a plurality of at least three sensors, each sensor remotely located from all serving cellular base station sites and remotely located from the cellular device, each sensor configured to receive a radio transmission from the cellular device; and
a controller, communicatively coupled to each sensor of the plurality of sensors, the controller remotely located from all serving cellular base station sites and remotely located from the cellular device, the controller comprising a memory;
the memory containing a definition of a first usage restriction zone;
the controller configured to;
receive, from the plurality of sensors, information about a radio transmission from the cellular device;
determine, using the received information, an identity of the cellular device, without requiring reception and processing of any wireless signals by the device;
determine, using the received information, whether the cellular device is within the first usage restriction zone, without requiring reception and processing of any wireless signals by the device; and
responsive to determining that the cellular device is within the first usage restriction zone, securely communicate the identity of the cellular device to a remote node across a public computer network and request that all serving cellular networks restrict service to the cellular device;
such that restriction of the operation of the cellular device occurs without requiring cooperation from the cellular device.
0 Assignments
0 Petitions
Accused Products
Abstract
A system for restricting operation of wireless devices, for example cell phones, comprises a controller and a plurality of sensors. The system restricts device usage, while permitting emergency phone calls, for example 911 calls. The sensors receive transmissions from devices, and use the transmissions for identification and determining whether a device is within a restricted zone. One disclosed method is triangulation, using time of arrival of transmissions at the sensors. If the device is within the zone, the controller sends device identification, and possibly a customized restriction request, to a remote node, for example a control node of a cell phone network operator. The operator then uses its network resources to implement the requested restrictions. Communication between the controller and the remote node is secure, possibly encrypted, to minimize malicious interference. A wireless control can define vertices of the zone and exempt certain devices from restrictions. Jamming is not required.
26 Citations
9 Claims
-
1. A system for restricting operation of a cellular device in restricted areas without requiring cooperation from the cellular device, the system comprising:
-
a plurality of at least three sensors, each sensor remotely located from all serving cellular base station sites and remotely located from the cellular device, each sensor configured to receive a radio transmission from the cellular device; and a controller, communicatively coupled to each sensor of the plurality of sensors, the controller remotely located from all serving cellular base station sites and remotely located from the cellular device, the controller comprising a memory; the memory containing a definition of a first usage restriction zone; the controller configured to; receive, from the plurality of sensors, information about a radio transmission from the cellular device; determine, using the received information, an identity of the cellular device, without requiring reception and processing of any wireless signals by the device; determine, using the received information, whether the cellular device is within the first usage restriction zone, without requiring reception and processing of any wireless signals by the device; and responsive to determining that the cellular device is within the first usage restriction zone, securely communicate the identity of the cellular device to a remote node across a public computer network and request that all serving cellular networks restrict service to the cellular device; such that restriction of the operation of the cellular device occurs without requiring cooperation from the cellular device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
Specification