This disclosure is generally directed to protecting and controlling the RF environment in and around selected physical infrastructure. The RF environment in and around infrastructure is becoming more and more useful for different purposes as wireless devices proliferate and become more capable. Examples of how the RF environment is being used include: detonating improvised explosive devices (IEDs), providing voice and data communications between individuals and groups, controlling utilities such as lighting and HVAC systems, product advertising, threat warning, etc. As mobile wireless devices continue to proliferate and become more capable, protection, monitoring and control of the RF environment in and around selected physical infrastructure (such as a building, shopping mall or oil field) will become as important as the current emphasis on physical and wired cyber protection, monitoring and control.
No current technologies or products/services exist to enable RF environment control and protection. There is prior art that forms part of the basis for the capability. Since mobile wireless services have been in use, first by the government and then later as a commercial service (i.e. cell phones), the issue of providing ubiquitous coverage has been a challenge. An area routinely plagued by poor coverage is indoors. To combat this problem, in-building coverage systems (a.k.a. repeaters) have been used. These repeaters have as their sole purpose to improve the performance of the mobile devices in the structure in question (building, sports complex, airport, etc.) Several manufacturers make these devices including Andrew Corporation, LGC Wireless, PowerWave, and Mobile Access. These repeaters can cover multiple RF bands (cellular, PCS, WiFi, 2-way radio), but do not broadly cover the RF spectrum, and only cover the portions of the spectrum where coverage enhancements are desired.
Mobile wireless devices, sometimes called portable devices, exchange signals with access points to first establish and maintain a communication link, sometimes referred to as control messages, and exchange signals to transfer communications between users of the mobile devices in the form of voice, data, short message service (SMS), a multimedia message service (MMS), etc., sometime referred to as traffic or user messages. In order to improve the propagation of the signals transmitted between a mobile device and an access point, sometimes a repeater system may be used which repeats the signals between the mobile device and the access point. For example, in the context of a mobile telephone system, a mobile telephone communicates with a base station as the access point. A common problem with mobile telephones is that when used indoors, e.g. in an office building, the mobile telephones sometimes have difficulty in receiving the signals transmitted by a base station, and vice versa. One solution to this problem is the deployment of a distributed antenna system throughout the office building. The distributed antenna may repeat the signals transmitted by the mobile telephone and the base station to improve the propagation of the communication signals.
Another existing capability is geolocation systems for wireless mobile devices. Much of this work was catalyzed by the US government FCC mandates for locating wireless 911 calls. Companies that provide these systems include Qualcomm, Andrew Corporation, Ericsson and TruePosition. These systems provide location for mobile devices both outdoors and indoors through a variety of means (handset based and network based), but are not oriented towards working across broad spectrum and have no specific purposes towards RF environment control and protection.
Another existing technology related to this invention is RF signal jamming. Devices that perform this function are generally not sophisticated and have as their purpose the denial of service in a particular RF band, and in a particular geographic area. Companies that make these devices include General Dynamic and Homeland Security Strategies. An example of this technology is the jamming devices being used by the military in Iraq to mitigate the use of RF devices to set off roadside bombs.
None of these technologies individually or as unimproved combinations can supply the functionality envisioned by the present disclosure.
The present disclosure has an analogous purpose to physical security and surveillance. Physical barriers (like concrete or steel plates or walls, and manned egress points) are used to keep unwanted individuals or materials away from or outside of buildings or zones. Surveillance cameras are used to monitor egress points or critical areas in buildings or zones to detect suspect activity. The present disclosure also had an analogous purpose to cyber security and surveillance. Firewalls are used to detect and deny communications with unknown, suspicious or nefarious network elements (i.e. internet). Virus and spyware protection software attempts to detect and defeat malicious programs. Likewise, the present disclosure provides boundaries for use, control and monitoring in the RF environment.
The present disclosure has utility in both government and commercial applications. Some typical applications illustrate the utility. Security applications include: RF IED detonation prevention, RF device detection within the space, detecting signals directed at devices in the space, deny service to non-authorized users, finding suspects in/around the space, and detecting/blocking communications out of protected space (pictures/video). Infrastructure/space where these features may be useful include: government buildings, freight trains, warehouses, refineries, chemical plants, factories, power plants, bridges, oil and gas fields, reservoirs, and agricultural areas.
In a commercial environment, an alternate set of applications may be enabled with this disclosure. They include: paid subscription-only access, restrict access to some class of users, mobile advertising, control for cell phone access on cruise ships, service only for teachers in high schools or for students only between classes/after school, accessible areas in hospitals (unrestricted area denial), no service during performances in theaters, child tracking in malls or for the child care service in mall, and service denial during religious services. Infrastructure/space where these features may be useful include: sports arenas, airports, airplanes, busses, passenger trains, tunnels, gas stations, ferries, theaters, and shopping malls.
RF environment control is not limited to cell phones. Services such as 2 way radio, WiFi, and wireless remote control (toys, garage doors) are all candidates for monitoring and control. Of course, an aspect of the present disclosure is to enable emergency calls in all of these scenarios.
One concept of RF environment control is illustrated in
Ability to monitor forward and reverse link control and user data
At a high level, these functions allow the following capabilities with respect to radio transceivers in and around the space:
A starting point to creating this capability is to install a set of distributed antennas in the space in an analogous way to how an in-building/repeater coverage system is installed.
With reference to
Many options and features with respect to commercial and government applications are made possible. Returning to the mobile coupon in the mall example, coupon delivery can be conditioned on many variables. Geo-fences (polygon regions defined in and around the mall) can be devised whereby entry into a geo-fenced area can trigger a coupon delivery. Different types of coupons can be delivered depending on how long the phone has been in the mall, or the current time (food coupons near meal times). Coupons/notices could also be delivered upon exit from a geo-fenced area. Post facto combining of geolocation data with other consumer information such as merchandise purchase records could also be useful to merchants in understanding buying habits and coupon delivery/content effectiveness.
With respect to government/security applications, geo-fenced areas can be defined around mall HVAC equipment, and authorities could be notified if phone users strayed or stayed near these areas. Notices could be sent to these phones informing the owners to vacate the area. Security measures could also be triggered based on phone calling patterns. For example, if a phone dials 911 or some other emergency number (detectable in the monitoring function), mall/building security personnel could be immediately dispatched to the location of the dialing phone.
In general, coupons/notifications/actions can be triggered on current location, location over time, current time, incoming/outgoing calls/messages, calling/message patterns and combinations.
Additionally, locations generated via the control and monitor system could be inserted into messages used by the standard commercial wireless network to improve location performance indoors. Indoor location performance has been a challenge using standard methods, especially AGPS-based location.
For certain classes of mobile communication services such as cell phones, alternative means can be used to achieve some of the described functionality. For example, an alternative means to deliver an advertisement based on a mobile device moving into a geo-fenced area would be to send the advertisement via a short message (SMS or short message service) using standards based methods supported by the commercial network. In the case of GSM service, messages could be sent from the head unit addressed to the desired mobile through the SMSC (short message service center).
The features described so far address RF spectrum users that can be characterized as having forward and reverse links communicating through an external network with generally external to the space users. Another variety of RF spectrum users of interest are ones that transmit in one direction from a control device to controlled device (control services). Examples of these users are keyless entry transmitters/receivers, radio control toy transmitters/receivers and garage door opener transmitters/receivers. These control services devices can be used for nefarious purposes, and are therefore important to monitor and control.
It may be emphasized that the above-described embodiments, particularly any “preferred” embodiments, are merely possible examples of implementations, merely set forth for a clear understanding of the principles of the disclosure. Many variations and modifications may be made to the above-described embodiments of the disclosure without departing substantially from the spirit and principles of the disclosure. All such modifications and variations are intended to be included herein within the scope of this disclosure and the present disclosure and protected by the following claims.
The present application claims the priority of U.S. Provisional Application Ser. No. 60/937,084 filed Jun. 26, 2007, the disclosure of which is incorporated herein.
Number | Date | Country | |
---|---|---|---|
60937084 | Jun 2007 | US |