Kristine A. Wilson - Murphy TX, US Kelce S. Wilson - Murphy TX, US Edward A. Wilson - Prescott AZ, US
International Classification:
H04M 1/66 H04W 24/00 H04W 36/00
US Classification:
455411, 4554561, 4554564, 455441
Abstract:
A system for restricting operation of wireless devices, for example cell phones, comprises a controller and a plurality of sensors. The system restricts device usage, while permitting emergency phone calls, for example 911 calls. The sensors receive transmissions from devices, and use the transmissions for identification and determining whether a device is within a restricted zone. One disclosed method is triangulation, using time of arrival of transmissions at the sensors. If the device is within the zone, the controller sends device identification, and possibly a customized restriction request, to a remote node, for example a control node of a cell phone network operator. The operator then uses its network resources to implement the requested restrictions. Communication between the controller and the remote node is secure, possibly encrypted, to minimize malicious interference. A wireless control can define vertices of the zone and exempt certain devices from restrictions.
Cellular Device Identification And Location With Emergency Number Selectivity Enforcement (Cilense)
Kristine A. Wilson - Murphy TX, US Kelce S. Wilson - Murphy TX, US Edward A. Wilson - Prescott AZ, US
International Classification:
H04W 64/00
US Classification:
455411
Abstract:
A system for restricting operation of wireless devices, for example cell phones, comprises a controller and a plurality of sensors. The system restricts device usage, while permitting emergency phone calls, for example 911 calls. The sensors receive transmissions from devices, and use the transmissions for identification and determining whether a device is within a restricted zone. One disclosed method is triangulation, using time of arrival of transmissions at the sensors. If the device is within the zone, the controller sends device identification, and possibly a customized restriction request, to a remote node, for example a control node of a cell phone network operator. The operator then uses its network resources to implement the requested restrictions. Communication between the controller and the remote node is secure, possibly encrypted, to minimize malicious interference. A wireless control can define vertices of the zone and exempt certain devices from restrictions. Jamming is not required.
Hacker-Resistant Denial Of Wireless Device Operation In Restricted Areas
Kristine A. Wilson - Murphy TX, US Kelce S. Wilson - Murphy TX, US Edward A. Wilson - Prescott AZ, US
International Classification:
H04M 1/725 H04W 12/08
Abstract:
A system for restricting operation of wireless devices, for example cell phones, comprises a controller and a plurality of sensors. The system restricts device usage, while permitting emergency phone calls, for example 911 calls. The sensors receive transmissions from devices, and use the transmissions for identification and determining whether a device is within a restricted zone. One disclosed method is triangulation, using time of arrival of transmissions at the sensors. If the device is within the zone, the controller sends device identification, and possibly a customized restriction request, to a remote node, for example a control node of a cell phone network operator. The operator then uses its network resources to implement the requested restrictions. Communication between the controller and the remote node is secure, possibly encrypted, to minimize malicious interference. A wireless control can define vertices of the zone and exempt certain devices from restrictions. Jamming is not required.
Cellular Device Identification And Location With Emergency Number Selectivity Enforcement (Cilense) For Moving Vehicles
Kristine A. Wilson - Murphy TX, US Kelce S. Wilson - Murphy TX, US Edward A. Wilson - Prescott AZ, US
International Classification:
H04W 64/00 H04W 4/12 H04M 1/725
US Classification:
455418
Abstract:
A system for restricting operation of wireless devices, for example cell phones, comprises a controller and a plurality of sensors. The system restricts device usage, while permitting emergency phone calls, for example 911 calls. The sensors receive transmissions from devices, and use the transmissions for identification and determining whether a device is within a restricted zone. One disclosed method is triangulation, using time of arrival of transmissions at the sensors. If the device is within the zone, the controller sends device identification, and possibly a customized restriction request, to a remote node, for example a control node of a cell phone network operator. The operator then uses its network resources to implement the requested restrictions. Communication between the controller and the remote node is secure, possibly encrypted, to minimize malicious interference. A wireless control can define vertices of the zone and exempt certain devices from restrictions. Jamming is not required.