The present disclosure relates generally to controlling wireless communications.
Improvised explosive devices (IEDs) have caused many deaths in certain regions of the world. IEDs may be made using commercially available supplies. For example, some IEDs may use a mobile communications device, such as a cellular telephone or pager, as a triggering device. The mobile communications device may be connected to a detonator of the IED. Upon receiving a particular signal, such as an incoming call signal, the mobile communications device may cause the detonation of the IED.
Jamming mobile communications of mobile communication devices used in IEDs may be difficult and expensive for multi-channel commercial wireless systems, such as Global System for Mobile Communication (GSM) and Code Division Multiple Access (CDMA) systems. Accordingly, there exists a need for an improved method and system of controlling wireless communications.
The present invention is pointed out with particularity in the appended claims. However, other features are described in the following detailed description in conjunction with the accompanying drawings in which:
A system to control wireless communications is disclosed. The system includes a mobile base station mimicking system adapted to create a movable communication control region by inducing at least one communication device within the movable communication control region to communicate via the mobile base station mimicking system. The at least one communication device is adapted to communicate via a base station before being induced to communicate via the mobile base station mimicking system. The system also includes a directional antenna coupled to the mobile base station mimicking system.
In another embodiment, a method of controlling wireless communications is disclosed. The method includes acquiring first base station data at a mobile base station mimicking system. The first base station data is associated with a first base station of a wireless communication system. The method also includes mimicking signals of the first base station based on the acquired first base station data. In addition, the method includes controlling communications associated with at least one communication device via the mobile base station mimicking system.
In another embodiment, a method of controlling wireless communications is disclosed that includes inducing a mobile communication device to register with a communication control system. The mobile communication device functions as a triggering mechanism of a particular remotely controlled explosive device. The method also includes blocking a first detonation triggering signal directed to the mobile communication device.
Referring to
As indicated in
As shown in
In a particular embodiment, the length 110 of the base 102 is 31.0 centimeters. Further, in a particular embodiment, the width 112 of the base 102 is 25.5 centimeters. Additionally, in a particular embodiment, the height 114 of the base 102 with the lid 104 in the closed position is 7.0 centimeters. Accordingly, the DMA server 100 has a total volume of 5,533.5 centimeters cubed and a footprint area of 790.5 centimeters squared. Further, in a particular embodiment, the DMA server 100 weighs approximately 5.8 kilograms (kg). As such, in a particular embodiment, the DMA server 100 has a total volume that is less than 6,000 centimeters cubed, a footprint area that is less than 800 centimeters squared, and a weight that is less than 6.0 kilograms.
In a particular embodiment, the DMA server 100 is relatively rugged. Particularly, the DMA server 100 is operable in a temperature range from negative twenty degrees Celsius to positive fifty-five degrees Celsius (−20° C. to 55° C.). Also, the DMA server 100 is substantially shock resistant and can withstand a one meter drop. Further, the DMA server 100 is substantially weather resistant, substantially dust resistant, and substantially sand resistant. The DMA server 100 is portable and it can be mounted in a vehicle or carried like a brief case. Further, multiple DMA servers 100 can be deployed as described herein.
In a particular embodiment, the length 208 of the base 202 is 92.0 centimeters. Further, in a particular embodiment, the width 210 of the base 202 is 45.0 centimeters. Additionally, in a particular embodiment, the height 212 of the base 202 is 34.0 centimeters. Accordingly, the DMA server 200 has a total volume of approximately 140,760 centimeters cubed and a footprint area of approximately 4,140 centimeters squared. Further, in a particular embodiment, the DMA server 200 weighs approximately 48 kilograms (kg). As such, in a particular embodiment, the DMA server 100 has a total volume that is less than 150,000 centimeters cubed, a footprint area that is less than 5,000 centimeters squared, and a weight that is less than 50.0 kilograms.
As shown in
In a particular embodiment, the length 304 of the housing 302 is approximately 76.2 centimeters. Further, in a particular embodiment, the width 306 of the housing 302 is approximately 48.2 centimeters. Additionally, in a particular embodiment, the height 308 of the housing 302 is approximately 4.3 centimeters. Accordingly, the DMA server 300 has a total volume of approximately 15,756.5 centimeters cubed and a footprint area of approximately 3,672.9 centimeters squared. Further, in a particular embodiment, the DMA server 300 weighs approximately 17.7 kilograms (kg). Also, in a particular embodiment, the DMA server 300 is stackable in order to support various capacity requirements. As such, in a particular embodiment, the DMA server 100 has a total volume that is less than 16,000 centimeters cubed, a footprint area that is less than 4,000 centimeters squared, and a weight that is less than 20.0 kilograms
Referring to
As illustrated in
Within the distributed and associative telecommunications system 400 the controlling logic can be distributed and de-centralized. Moreover, the wireless coverage provided by the disclosed system 400 is self-healing and redundant. In other words, due to the interconnectivity via the IP network 410, if one or more of the DMA servers 406 loses powers, fails, or is otherwise inoperable, telephony traffic handled by the inoperable DMA server 406 can be re-routed to one of the remaining operable DMA servers 406. Additionally, user data stored in a database, e.g., a home locator resource (HLR) or a visitor locator resource (VLR), can be distributed equally and fully among all of the DMA servers 406. It can also be appreciated that new cellular coverage sites can be easily added to the system 400 as the demand for users increases. Specifically, a DMA server can be deployed as described below, connected to an antenna, connected to the IP network, and activated to provide cellular coverage in a new area.
In a particular embodiment, the DMA server 406 is implemented using a processor, or computer, having a housing and a computer readable medium 500 that is disposed therein. A power supply 502 can also be disposed within the housing of the DMA server 406 in order to provide power to the DMA server 406. The power supply 502 can be a rechargeable battery disposed within the DMA server 406 or it can be external to the DMA server 406, e.g., a standard power outlet. Moreover, a cooling system 504, e.g., a fan with a thermostat, can be provided within the DMA server 406 in order to keep the DMA server 406 from overheating. In an alternative embodiment, the DMA server 406 can be a single board processor that does not require a fan.
As depicted in
As further illustrated in
As depicted in
In an exemplary, non-limiting embodiment, the GK 510 can act as an AAA server and a feather server to support advanced supplementary service, short message service, etc. Moreover, the GK 510 can act as a call manager and can support ISUP and PSTN function calls. Additionally, the GK 510 can act as a signal gateway, e.g., IP to SS7 inter-working, ISUP, GSM MAP or ANSI-41 to PSTN and ANSI-42/GSM. The GK 510 can also function as a data call server.
As illustrated in
In an exemplary, non-limiting embodiment, the BTS interface 538 can be an IS-95A OR IS-2000 interface over E1 or ATM, or the BTS interface 538 can be a GSM BTS interface using MAP or customized application for mobile network enhanced logic (CAMEL). In an illustrative embodiment, the CPC 534 can be connected to one or more BTSs 536.
Referring to
After the call is connected, either at block 608 or block 612, the logic continues to block 614 where the call is monitored. For example, the location of the first mobile communication device that initiated the call can be monitored, the location of the second mobile communication device that received the call can be monitored, the DMA server that is handling the call can be monitored, other DMA servers through which the call is connected can be monitored, and the connections (such as the peer-to-peer IP network connection) through which the call is transmitted can be monitored. Proceeding to decision step 616, it is determined if the first mobile communication device or the second mobile communication device involved in the call is roaming, i.e., moving between cellular coverage sites provided by individual antennas. If so, the logic moves to block 618 where the call at the roaming mobile communication device is automatically handed off to a new DMA server and an associated antenna at a new cellular coverage site. If none of the mobile communication devices involved in the call are roaming, the logic moves to decision step 620.
At decision step 620, it is determined whether any DMA server has failed. If so, the call is re-routed around the failed DMA server by establishing one or more different peer-to-peer connections between one or more different DMA servers that are still operable. Thereafter, the logic moves to decision step 624. Decision step 624 can also be reached if it is determined that no DMA servers have failed at decision step 620. At decision step 624, it is determined whether the call has ended. If not, the logic moves to block 626 and the connection or connections through which the call has been established are maintained. Otherwise, if the call has ended, the logic moves to block 628 and the peer-to-peer connection, or connections, through which the call was established are terminated, and the logic ends, at state 630.
Returning to decision step 704, if the user is about to move from a first cellular coverage site provided by a first BTS to a second cellular coverage site by a second BTS, the logic proceeds to decision step 710. At decision step 710, it is determined whether the second BTS is connected locally, i.e., to the same DMA server as the first BTS. If so, the logic moves to block 712 and the DMA server hands off the call, e.g., as a soft hand off, or the user service connection, from a first BTS connected to the DMA server to a second BTS connected to the same DMA server. Conversely, if the second BTS is not local the logic continues to block 714 where the DMA server hands off the call from a first BTS connected to the DMA server to a second BTS connected to a second DMA server. From block 712 or block 714, the logic proceeds to decision step 706 and continues as described above.
At decision step 802, if greater than three (3) callers are participating in a telephone call that is handled via one or more DMA servers 406 (
At decision step 816, if a new participant enters the group call, the new participant is allowed to connect to the group call and may communicate with any one or more of the other participants with full duplex capability. The logic then moves to decision step 820. Decision step 820 is also reached from decision step 816 if no new participants have entered the group call. At decision step 820, it is determined whether all participants have disconnected from the group call. If not, the logic returns to block 808 and continues as described above. On the other hand, if all participants have disconnected from the group call, the logic moves to block 822 where the group call is terminated and then ends at state 806.
Referring to
As further depicted in
Referring to
Referring to
As illustrated in
Referring now to
Using a single back-haul connection greatly minimizes costs associated with the wireless communication network. Further, the system 1400 shown in
Referring to
The mobile cellular coverage sites 1602 can be deployed to provide a temporary web of cellular coverage for a plurality of mobile communication devices, e.g., devices carried by soldiers during a battle. The mobile in-field communications system 1600 can be recalled, moved, and re-deployed as necessary. Further, the system can include a wireless connection, e.g., 802.11a, 802.11b, microwaves, to the PSTN 1614.
Referring to
Referring to
In a particular embodiment, the first satellite transceiver 2008 can communicate with a second satellite transceiver 2012 via a satellite 2014. As shown, the second satellite transceiver 2012 can be connected to a terrestrial server gateway 2016, e.g. a DMA server gateway, that can provide connectivity to an operations and management platform (OMP) 2018, a call detail record (CDR) 2020, and a visitor location register gateway (VLR-GW) 2022. The OMP 2018, the CDR 202, and the VRL-GW 2022 can be separate from or incorporated within the server gateway 2016.
Accordingly, the system 2000 shown in
In a particular embodiment, the first satellite transceiver 2108 can communicate with a second satellite transceiver 2112 via a satellite 2114. As shown, the second satellite transceiver 2112 can be connected to a terrestrial server gateway 2116, e.g. a DMA server gateway, that can provide connectivity to an operations and management platform (OMP) 2118, a call detail record (CDR) 2120, and a visitor location register gateway (VLR-GW) 2122. The OMP 2118, the CDR 212, and the VRL-GW 2122 can be separate from or incorporated within the server gateway 2116.
Accordingly, the system shown in
Referring to
Continuing to block 2208, the DMA server is activated, e.g., powered on. At block 2210, a network connection is established with another remote DMA server. In a particular embodiment, the network connection is a peer-to-peer connection between the DMA servers. Moving to block 2212, DMA server software within the DMA server is activated. Thereafter, at decision step 2214, it is determined whether the system is operational. That decision can be a performed by the DMA server, e.g., by a self-diagnostic routine or module within the DMA server. Alternatively, that decision can be determined manually by a technician. If the system is not operational, a system check is performed at block 2216. In a particular embodiment, the system check performed at block 2216 is performed by a self-diagnostic routine or module within the DMA server. On the other hand, a technician can perform the system check. After the system check, the logic then returns to decision step 2214 and continues as described herein. At decision step 2214, if the system is operational, the method proceeds to block 2218 and call transmission is allowed. The method then ends at state 2220.
Referring to
Continuing to block 2310, the second DMA server is activated. At block 2312, a network connection is established between the second DMA server and another remote DMA server. In a particular embodiment, the network connection is a peer-to-peer IP connection between the DMA servers. Further, in a particular embodiment, the peer-to-peer connection is established via a private IP network. At block 2314, DMA server software within the second DMA server is activated.
Proceeding to decision step 2316, it is determined whether the system is operational. That decision can be a performed by the second DMA server, e.g., by a self-diagnostic routine or module within the second DMA server. Alternatively, the decision can be determined manually by a technician. If the system is not operational, a system check is performed at block 2318. In a particular embodiment, the system check performed at block 2318 is performed by a self-diagnostic routine or module within the second DMA server. On the other hand, a technician can perform the system check. After the system check, the logic then returns to decision step 2316 and continues as described herein. At decision step 2316, if the system is operational, the method proceeds to block 2320 and call transmission is allowed via the second DMA server. The method then ends at state 2322.
The system 2400 also includes a plurality of base stations 2404-2418. The plurality of base stations 2404-2418 may be associated with one or more respective commercial wireless networks. Additionally, each base station 2404-2418 may provide communications services to communication devices, such as personal computers, laptop computers, mobile phones, pagers, or hand-held computing devices, located within a designated coverage region serviced by a respective base station 2404-2418. For example, the base station 2404 may provide communication services to a communication device 2420 located within a coverage region 2440, while the base station 2406 may provide communication services to a communication device 2422 located within a coverage region 2442 and the base station 2408 may provide communication services to a communication device 2424 located within a coverage region 2446. In an illustrative embodiment, each base station 2404-2418 may communicate with communication devices located within the designated coverage region of the respective base station via a different channel. For example, the base station 2404 may communicate with the communication device 2420 within the coverage region 2440 via channel 30. In addition, the base station 2406 may communicate with the communication device 2422 within the coverage region 2442 via channel 31 and the base station 2408 may communicate with the communication device 2424 within the coverage region 2446 via channel 32. The ODC system 2402 may also include a directional antenna and may transmit communication signals to communication devices via the directional antenna.
In an illustrative, non-limiting embodiment, the ODC system 2402 is operational to transmit communication signals with a peak signal strength approximately along a direction of travel 2434 of the ODC system 2402. The communication signals may mimic a base station, such as the base station 2408, which is a neighboring base station of the targeted base stations 2404 and 2406 along the direction of travel 2434 of the ODC system 2402. Further, the communication signals may include ban information related to the targeted base stations 2404 and 2406. The ban information may cause a communication device, such as the communication device 2420, to stop communicating with the base station 2404. In one embodiment, the ban information may include a noise signal. After the communication device 2420 stops communicating with the base station 2404, the communication device 2420 may be induced to communicate via the ODC system 2402 in response to the communication signals transmitted by the ODC system 2402 mimicking the neighboring base station 2408.
In a particular embodiment, the ODC system 2402 is configured for data mining or information gathering. In such an embodiment, the ODC system 2402 may capture data regarding communication devices in a coverage area. For example, the ODC system 2402 may capture mobile communication device identification parameters, subscriber identity module (SIM) identification parameters, time stamps, ODC location stamps, location of a communication device relative to the ODC, mobile communication device activity (e.g., call attempts, numbers called, short messaging service (SMS) attempts, numbers messaged, device status), and so forth. Additionally, the ODC system 2402 may determine a location of a particular communication device.
The ODC system 2402 may also allow monitoring of calls while avoiding the complexity of certain wiretapping systems. For example, communications to and from a target communication device may be passed through the ODC system 2402 and routed to a third party to monitor for intelligence gathering and/or eavesdropping purposes or the ODC system 2402 may monitor communications associated with a particular communication device. Such routing may be transparent to the user of the communication device. The communication activity may be monitored to identify movement or gatherings of communication devices. In addition, communication activity along routes of interest may be monitored and analyzed to identify unusual or suspicious activity that may indicate a threat to an armed services unit or civilians. For example, the communication activity may indicate an increase in cellular traffic before or during a mission of an armed services unit, an increase in cellular traffic at an unusual time of day, or the presence of cell phones may appear to be shadowing an armed services unit. Communication activity may also be monitored to identify communication devices with specific area/country codes, such as out-of-area cell phones, and to track communication device presence in suspicious areas. In an illustrative, non-limiting embodiment, the ODC system 2402 may be configured to search for a particular communication device. For example, the ODC system 2402 may search for a communication device having a particular SIM identification (ID).
In a particular embodiment, the system 2400 may include a roaming feature that controls handoff of a mobile communication device between base stations as the mobile communication device moves further from one base station and closer to another. As the ODC system 2402 moves along the direction of travel 2434, mobile communication devices within a movable region of control 2436 near the ODC system 2402, such as the mobile communication devices 2420 and 2424, may be induced to register with the ODC system 2402 for communication services. The direction of travel 2434 may be predetermined based on a planned course of the ODC system 2402, or it may be dynamically determined based on, for example, global positioning information, trilateralization using base station signals, other position determining methods, or any combination thereof.
In an illustrative embodiment, a roaming feature or a handoff feature may be set up such that a mobile communication device transitions from a first base station to a second base station based on a signal to noise ratio (SNR) associated with each base station. For example, if the SNR of the first base station is at least 7 dB less than the SNR of the second base station, the mobile communication device may roam or handoff to the second base station. The ODC system 2402 may take advantage of this roaming feature or handoff feature to induce a communication device to register with the ODC system 2402 for communications. To illustrate, the system 2400 may include targeted base stations 2404 and 2406 and the ODC system 2402 may acquire data associated with the targeted base stations 2404 and 2406 and data associated with a neighboring base station of the targeted base stations 2404 and 2406, such as the base station 2408. The neighboring base station 2408 is a neighboring base station of the targeted base stations 2404 and 2406 in an expected direction of travel of the ODC system 2402. The acquired base station data may include a broadcast channel of the respective base station and a list of neighboring base stations related to each respective base station. Further, the ODC system 2402 may generate a ban signal, such as a noise signal, in the channel used by the targeted base station(s) 2404 and 2406 and a communication signal mimicking the neighboring base station 2408. Thus, communication devices in the coverage region 2444 around the ODC system 2402 may perceive an increase in the SNR of the mimicked base station 2408 and a decrease in the SNR of the targeted base station(s) 2404 and 2406. As the difference in the SNRs grows larger, the communication devices may be induced to register with the ODC system 2402 according to their roaming feature and handoff properties.
In an illustrative, non-limiting embodiment, the ODC system 2402 may include multiple ODC units. For example, a first ODC unit may mimic a neighboring base station and a second ODC unit may broadcast duplicate information of the targeted base station. Thus, in the example depicted, a first ODC unit of the ODC system 2402 may be transmitting communication signals on channel 32, which is associated with the base station 2408, to mimic the base station 2408, and a second ODC unit of the ODC system 2402 may transmit communication signals, noise signals, or any combination thereof, on channel 30 and channel 31 to duplicate the targeted base stations 2404 and 2406.
Once a communication device is registered to communicate with the ODC system 2402, the ODC system 2402 may control communication signals sent to the captured communication device. For example, communications coming from the captured communication device may be routed to the ODC system 2402, which may forward the communications to the targeted or mimicked base station. Similarly, the ODC system 2402 may mimic signals of the captured communication device and communicate with a targeted base station as the captured communication device. To illustrate, communications directed to the captured communication device from the targeted or mimicked base station may be received by the ODC system 2402 and selectively forwarded to the captured communication device. In some embodiments, the ODC system 2402 may choose not to forward communications to the captured communication device and may cause a ring back to be sent to the communication device making the call.
In an illustrative embodiment, the ODC unit 2506 is configured for an improvised explosive device (IED) protection mission. For example, the ODC unit 2506 may include a passive mode and an active mode. In the passive mode, the ODC unit 2506 may induce mobile communication devices in the coverage area 2514, such as the mobile communication devices 2520 and 2522, to roam into coverage of the ODC unit 2506 by taking advantage of the roaming functionality of the mobile communication devices 2520, 2522. The mobile communication devices 2520 and 2522 may then be blocked from communicating with the commercial cellular network via the base stations 2502 and 2504. Thus, if the mobile communication device 2520 or 2522 is coupled to an IED as a triggering device, the ODC unit 2506 may block IED triggering signals from reaching the mobile communication device 2520 or the mobile communication device 2522.
In the active mode, the ODC unit 2506 induces mobile communication devices, such as the mobile communication devices 2520, 2522, to roam within control of the ODC unit 2506. The ODC unit 2506 then calls one or more of the mobile communication devices 2520, 2522 well in advance of a protected armed forces unit, such as a military vehicle or convoy, coming in proximity to the mobile communication device 2520, 2522. If one of the mobile communication devices 2520, 2522 is set up to trigger an IED, such as the mobile communications device 2522, the IED is thus detonated well before the protected unit is in danger. For example, the coverage area 2514 provided by the ODC unit 2506 may be from about 2 to 10 kilometers. In an illustrative, non-limiting embodiment, the ODC unit 2506 may call a mobile communication device that is set up to trigger an IED at a selected time based on a location of a protected unit, based on a direction of travel of the protected unit, based on the rate of travel of the protected unit, or any combination thereof.
In an illustrative embodiment, the first ODC system 2602 may serve as a working system that acquires information from targeted base stations and mimics communication signals of targeted base stations. The first ODC system 2602 may also identify one or more neighboring base stations based on the location of the first ODC system 2602, the direction of travel 2626 of the first ODC system 2602 and the second ODC system 2604, or any combination thereof. For example, the first ODC system 2602 may determine that the targeted base station 2606 communicates via the channel 30 and the targeted base station 2612 communicates via the channel 33. The first ODC system 2602 may also determine that the base stations 2608 and 2614 are neighboring base stations of the targeted base stations 2606 and 2612 and that the base station 2608 communicates via the channel 31 and that the base station 2614 communicates via the channel 34. Further, the first ODC system 2602 may determine that the base station 2610 is a neighboring base station of the base stations 2608 and 2614 and that the base station 2610 communicates via the channel 32.
The working system, such as the first ODC system 2602, may utilize the ODC Unit A 2628 to duplicate the broadcast channel of the targeted base station 2606 using the channel 30 and utilize the ODC Unit B 2630 to duplicate the broadcast channel of the targeted base station 2612 using the channel 33. The ODC Unit A 2628 may also send a noise signal using the channel 30 to decrease the signal to noise ratio with respect to the base station 2606 and communication devices in the coverage area 2650. Further, the ODC Unit B 2630 may send a noise signal using the channel 33 to decrease the signal to noise ratio with respect to the base station 2612 and communication devices in the coverage area 2650. Additionally, the first ODC system 2602 may utilize the ODC Unit C 2632 to mimic the communication signals of the neighboring base station 2608 using channel 31. Thus, communication devices in the coverage area 2650 may be induced to roam onto the first ODC system 2602, which is mimicking the neighboring base station 2608.
The second ODC system 2604 may serve as a prepare system that prepares for mimicking subsequent base stations. The prepare system, such as the second ODC system 2604, may acquire the channel broadcast information and neighboring base station information from the base stations 2608, 2610, and 2614 and may prepare to transition to the first neighboring unit, that is the base station 2608, as a first targeted unit and prepare to transition to the second neighboring unit, that is the base station 2614, as a second targeted unit. For example, the ODC Unit D 2634 of the second ODC system 2604 may duplicate the broadcast channel of the base station 2608 using the channel 31 and the ODC Unit E 2636 of the second ODC system 2604 may duplicate the broadcast channel of the base station 2614 using the channel 34. Further, the ODC Unit F 2638 of the second ODC system 2604 may mimic the communication signals of the base station 2610, which is a neighboring base station of the base stations 2608 and 2614, using channel 32.
In an illustrative embodiment, the first ODC system 2702 may serve as a working system that acquires information from targeted base stations and mimics communication signals of the targeted base stations. The first ODC system 2702 may also identify one or more neighboring base stations based on the location of the first ODC system 2702, the direction of travel 2720 of the first ODC system 2702 and the second ODC system 2704, or any combination thereof. Additionally, the first ODC system 2702 may determine that the targeted base station 2714 communicates via the channel 30 and that the base station 2716 is a neighboring base station of the base station 2714. Further, the first ODC system 2702 may determine that the base station 2718 is a neighboring base station of the base station 2716 and that the base station 2718 communicates via the channel 32.
The second ODC system 2704 may serve as a prepare system that prepares for mimicking subsequent base stations. The second ODC system 2704 may acquire the channel broadcast information and neighboring base station information from the base stations 2716 and 2718. The third ODC system 2706 may predict subsequent base stations related to the base stations 2714-2718. For example, the third ODC system 2712 may identify neighboring base stations with respect to the base stations 2716 and 2718. In an illustrative, non-limiting embodiment, the third ODC system 2706 may be included in a vehicle, such as a helicopter, tank, or airplane.
The working system, that is the first ODC system 2702, may utilize the ODC unit A 2726 to duplicate the broadcast channel of the targeted base station 2714 using the channel 30 and may utilize the ODC unit B 2728 to mimic the communication signals of the neighboring base station 2716 using the channel 31. The ODC unit A 2726 may also send a noise signal using the channel 30 to decrease the signal to noise ratio with respect to the base station 2714 and communication devices in the coverage area 2708. Thus, communication devices in the coverage area 2708 may be induced to roam onto the first ODC system 2702, which is mimicking the neighboring base station 2716.
The prepare system, the second ODC system 2704, may prepare to transition to the first neighboring unit, the base station 2716, as a first targeted unit. For example, the ODC unit C 2730 of the second ODC system 2704 may duplicate the broadcast channel of the base station 2716 using the channel 31. Further, the ODC unit D 2732 of the second ODC system 2704 may mimic the communication signals of the base station 2718, which is a neighboring base station of the base station 2716. The ODC Unit E 2734 and the ODC Unit F 2736 of the third ODC system 2706 may be used to duplicate and/or mimic signals of neighboring base stations of the base station 2718.
Proceeding to 2806, the mobile base station mimicking system mimics signals of the first base station based on the acquired first base station data. For example, the mobile base station mimicking system may mimic identification signals related to the first base station that are transmitted by the first base station to communication devices within a coverage area served by the first base station. At 2808, the mobile base station mimicking system induces a mobile communication device to switch from being registered with the second base station to register with the mobile base station mimicking system. For example, the mobile base station mimicking system may transmit a noise signal on a channel used by the second base station to decrease a signal to noise ratio with respect to the second base station and the mobile communication device. When the signal to noise ratio reaches a specified threshold, the mobile communication device may attempt to register with another base station. Since, the mobile base station mimicking system is transmitting duplicate signals of neighboring base stations of the second base station, such as the first base station, the mobile base station mimicking system can capture a registration request from the mobile communication device and register the mobile communication device with the mobile base station mimicking system. The handoff to the mobile base station mimicking system is transparent to the mobile communication device user. For example, the call bars, the logo of the wireless carrier associated with the mobile communication device, identification information of the wireless carrier, or any combination thereof may still be presented via the mobile communication device. Further, the mobile communication device may be in an active call mode, such as during a phone call, when the mobile communication device registers with the mobile base station mimicking system or the mobile communication device may be turned on, but not in use.
Moving to 2810, the mobile base station mimicking system controls communications associated with the mobile communication device. For example, the mobile base station mimicking system may switch calls to and from the mobile communication device and operate in a similar manner to a commercial wireless network base station. The mobile base station mimicking system may also block signals from being sent to the mobile communication device. To illustrate, the mobile communication device may serve as a triggering device for an improvised explosive device (IED), and the mobile base station mimicking system may block a triggering signal from being sent to the mobile communication device. The mobile base station mimicking system may also send a triggering signal to the mobile communication device to set off the IED associated with the mobile communication device when an armed forces unit or civilians are not in danger of being affected by the detonation. Further, the mobile base station mimicking system may mimic the mobile communication device and receive communication data that is directed to the mobile communication device from base stations of a commercial wireless network. The communication data received from the wireless network base stations may or may not be forwarded to the mobile communication device. The mobile base station mimicking system may also send a communication notification to the mobile communication device. The method terminates at 2812.
With the configuration of structure described above, the present disclosure provides a system and method of controlling communications through use of a flexible telecommunications device, i.e., the DMA server 406 (
With one or more of the deployment configurations described above, the present system provides mobile to landline calls from mobile handsets within a DMA server cellular coverage area. Also, mobile to landline calls can be made from mobile handsets roaming into DMA coverage areas. Mobile to mobile calls can be made from home/roaming handsets to DMA handsets and vice versa. Further, mobile to IP calls and IP to mobile calls can be made from within a DMA server coverage area. IP to IP calls can be made from any DMA handset to any IP phone. Additionally, IP to landline calls and landline to IP calls can be made from a DMA handset to any phone. Further, land-line to mobile calls to DMA handsets can be made.
The systems described above can support call forwarding, call waiting, 3-way calling caller ID, voice mail, and mobile to mobile SMS service, i.e., text messaging. Further, the systems described above can provide broadcast SMS service, mobile to land high-speed IP data (1× or GPRS) service and mobile-to-mobile high speed IP data (1× or GPRS) service. Also, the systems described above can provide IP-PBX capability.
Further, one or more of the illustrated systems can provide IP transport between distributed elements, e.g., DMA servers 406 (
One or more of the systems described above can also provide soft and softer call handoffs on the same frequency interfaces. Also, soft handoffs can be provided on different systems. Further, a DMA based system can operate stand-alone with a billing system provided by a DMA server and CDR generation. Or, a system can use the SS7 network to pass CDRs to a central switch for integrated billing and operation with an existing network.
The above-disclosed subject matter is to be considered illustrative, and not restrictive, and the appended claims are intended to cover all such modifications, enhancements, and other embodiments, which fall within the true spirit and scope of the present invention. Thus, to the maximum extent allowed by law, the scope of the present invention is to be determined by the broadest permissible interpretation of the following claims and their equivalents, and shall not be restricted or limited by the foregoing detailed description.
This application claims priority from U.S. Provisional Patent Application No. 60/869,890, filed on Dec. 13, 2006, which is incorporated herein by reference in its entirety.
Number | Name | Date | Kind |
---|---|---|---|
4284848 | Frost | Aug 1981 | A |
5590175 | Gallant et al. | Dec 1996 | A |
5623495 | Eng et al. | Apr 1997 | A |
5734979 | Lu et al. | Mar 1998 | A |
5933784 | Gallagher et al. | Aug 1999 | A |
5991639 | Rautiola et al. | Nov 1999 | A |
6122499 | Magnusson | Sep 2000 | A |
6131038 | Sekine et al. | Oct 2000 | A |
6141564 | Bruner et al. | Oct 2000 | A |
6160804 | Ahmed et al. | Dec 2000 | A |
6411825 | Csapo et al. | Jun 2002 | B1 |
6418308 | Heinonen et al. | Jul 2002 | B1 |
6421325 | Kikinis | Jul 2002 | B1 |
6515985 | Shmulevich et al. | Feb 2003 | B2 |
6539237 | Sayers et al. | Mar 2003 | B1 |
6542497 | Curry et al. | Apr 2003 | B1 |
6584098 | Dutnall | Jun 2003 | B1 |
6611533 | Liao et al. | Aug 2003 | B1 |
6614784 | Glitho et al. | Sep 2003 | B1 |
6647426 | Mohammed | Nov 2003 | B2 |
6678155 | Bresniker | Jan 2004 | B1 |
6694134 | Lu et al. | Feb 2004 | B1 |
6697355 | Lim | Feb 2004 | B1 |
6704409 | Dilip et al. | Mar 2004 | B1 |
6731932 | Rune et al. | May 2004 | B1 |
6735184 | Davidson et al. | May 2004 | B1 |
6751207 | Lee | Jun 2004 | B1 |
6760325 | Hameleers | Jul 2004 | B1 |
6763226 | McZeal, Jr. | Jul 2004 | B1 |
6763233 | Bharatia | Jul 2004 | B2 |
6791988 | Hameleers et al. | Sep 2004 | B1 |
6795444 | Vo et al. | Sep 2004 | B1 |
6807431 | Sayers et al. | Oct 2004 | B2 |
6807432 | Hwang | Oct 2004 | B2 |
6816706 | Hohnstein et al. | Nov 2004 | B1 |
6819652 | Ahktar et al. | Nov 2004 | B1 |
6829473 | Raman et al. | Dec 2004 | B2 |
6831903 | Kang | Dec 2004 | B2 |
6839356 | Barany et al. | Jan 2005 | B2 |
6859652 | Karabinis et al. | Feb 2005 | B2 |
6871072 | Meche | Mar 2005 | B1 |
6879582 | Dhara et al. | Apr 2005 | B1 |
6879677 | Trandal et al. | Apr 2005 | B2 |
6917813 | Elizondo | Jul 2005 | B2 |
6937708 | Hirose | Aug 2005 | B2 |
6958983 | Musikka et al. | Oct 2005 | B2 |
6985454 | Wiedeman et al. | Jan 2006 | B1 |
7003286 | Brown et al. | Feb 2006 | B2 |
7050414 | Lin | May 2006 | B2 |
7054307 | Papadimitriou et al. | May 2006 | B2 |
7054322 | D'Annunzio et al. | May 2006 | B2 |
7072650 | Stanforth | Jul 2006 | B2 |
7117015 | Scheinert et al. | Oct 2006 | B2 |
7120435 | Usher et al. | Oct 2006 | B2 |
7120436 | Kim | Oct 2006 | B2 |
7133670 | Moll et al. | Nov 2006 | B1 |
7133923 | MeLampy et al. | Nov 2006 | B2 |
7136651 | Kalavade | Nov 2006 | B2 |
7154901 | Chava et al. | Dec 2006 | B2 |
7158621 | Bayne | Jan 2007 | B2 |
7171216 | Choksi | Jan 2007 | B1 |
7299039 | Lee et al. | Nov 2007 | B2 |
7313399 | Rhee et al. | Dec 2007 | B2 |
7324478 | Park et al. | Jan 2008 | B2 |
7328268 | Foltak et al. | Feb 2008 | B1 |
7346334 | Gaeta et al. | Mar 2008 | B2 |
7349412 | Jones et al. | Mar 2008 | B1 |
7359700 | Swensen et al. | Apr 2008 | B2 |
7383042 | Lamb et al. | Jun 2008 | B2 |
7385947 | Wu et al. | Jun 2008 | B2 |
7406069 | Yashar et al. | Jul 2008 | B2 |
7424313 | Ham et al. | Sep 2008 | B2 |
7486967 | Pan et al. | Feb 2009 | B2 |
7536170 | Goldman et al. | May 2009 | B2 |
7539158 | Pan | May 2009 | B2 |
7548763 | Pan | Jun 2009 | B2 |
7552670 | Goldman et al. | Jun 2009 | B2 |
7606594 | Jesse et al. | Oct 2009 | B2 |
7653414 | Pan | Jan 2010 | B2 |
7738488 | Marisco et al. | Jun 2010 | B2 |
7760695 | Gopalakrishnan et al. | Jul 2010 | B2 |
7787879 | Philips et al. | Aug 2010 | B1 |
7840230 | Pan | Nov 2010 | B2 |
7855988 | Pan | Dec 2010 | B2 |
7856233 | Pan | Dec 2010 | B2 |
7979066 | Pan | Jul 2011 | B2 |
8036158 | Pan et al. | Oct 2011 | B2 |
8046420 | Pan | Oct 2011 | B2 |
8089920 | Pan | Jan 2012 | B2 |
8107409 | Pan | Jan 2012 | B2 |
8224322 | Pan | Jul 2012 | B2 |
8310990 | Pan | Nov 2012 | B2 |
8359029 | Pan | Jan 2013 | B2 |
20010036173 | Shmulevich et al. | Nov 2001 | A1 |
20010046859 | Kil | Nov 2001 | A1 |
20010055298 | Baker et al. | Dec 2001 | A1 |
20020009060 | Gross | Jan 2002 | A1 |
20020015392 | Musikka et al. | Feb 2002 | A1 |
20020016180 | Derosier et al. | Feb 2002 | A1 |
20020045444 | Usher et al. | Apr 2002 | A1 |
20020051518 | Bondy et al. | May 2002 | A1 |
20020058502 | Stanforth | May 2002 | A1 |
20020061746 | Jo et al. | May 2002 | A1 |
20020160772 | Gailey et al. | Oct 2002 | A1 |
20020169887 | MeLampy et al. | Nov 2002 | A1 |
20030048766 | D'Annunzio et al. | Mar 2003 | A1 |
20030063721 | Hirose | Apr 2003 | A1 |
20030088698 | Singh et al. | May 2003 | A1 |
20030092441 | Taha et al. | May 2003 | A1 |
20030096628 | Bar-On et al. | May 2003 | A1 |
20030100302 | Armbruster et al. | May 2003 | A1 |
20030100342 | Ham et al. | May 2003 | A1 |
20030112748 | Puppa et al. | Jun 2003 | A1 |
20030153343 | Crockett et al. | Aug 2003 | A1 |
20030186694 | Sayers et al. | Oct 2003 | A1 |
20030198325 | Bayne | Oct 2003 | A1 |
20040014466 | Jesse et al. | Jan 2004 | A1 |
20040018829 | Raman et al. | Jan 2004 | A1 |
20040019539 | Raman et al. | Jan 2004 | A1 |
20040156495 | Chava et al. | Aug 2004 | A1 |
20040203621 | Brown et al. | Oct 2004 | A1 |
20040203677 | Brown et al. | Oct 2004 | A1 |
20040204097 | Scheinert et al. | Oct 2004 | A1 |
20040253949 | Swensen et al. | Dec 2004 | A1 |
20040253984 | Csapo et al. | Dec 2004 | A1 |
20040259556 | Czys | Dec 2004 | A1 |
20050064922 | Owens et al. | Mar 2005 | A1 |
20050070278 | Jiang | Mar 2005 | A1 |
20050075106 | Jiang | Apr 2005 | A1 |
20050091392 | Gesswein et al. | Apr 2005 | A1 |
20050176413 | Lee et al. | Aug 2005 | A1 |
20050250491 | Roy et al. | Nov 2005 | A1 |
20060046714 | Kalavade | Mar 2006 | A1 |
20060046760 | Bertino et al. | Mar 2006 | A1 |
20060047836 | Rao et al. | Mar 2006 | A1 |
20060052113 | Ophir et al. | Mar 2006 | A1 |
20060063544 | Zhao et al. | Mar 2006 | A1 |
20060098661 | Pan | May 2006 | A1 |
20060114934 | Shin et al. | Jun 2006 | A1 |
20060141984 | Taglienti et al. | Jun 2006 | A1 |
20060142011 | Kallio | Jun 2006 | A1 |
20060148465 | Perdomo et al. | Jul 2006 | A1 |
20060159039 | Jung et al. | Jul 2006 | A1 |
20060203746 | Maggenti et al. | Sep 2006 | A1 |
20060217121 | Soliman et al. | Sep 2006 | A1 |
20060221912 | Olivier et al. | Oct 2006 | A1 |
20060234747 | Pan | Oct 2006 | A1 |
20060234774 | Pan et al. | Oct 2006 | A1 |
20060258358 | Kallio | Nov 2006 | A1 |
20070008968 | Baker et al. | Jan 2007 | A1 |
20070010245 | Levitan | Jan 2007 | A1 |
20070021097 | Gaeta et al. | Jan 2007 | A1 |
20070021118 | Ophir | Jan 2007 | A1 |
20070060124 | Kalavade | Mar 2007 | A1 |
20070076697 | Huotari et al. | Apr 2007 | A1 |
20070087738 | Melkesetian | Apr 2007 | A1 |
20070147598 | Somes et al. | Jun 2007 | A1 |
20070202847 | Pan | Aug 2007 | A1 |
20070213075 | Jiang | Sep 2007 | A1 |
20070230352 | Kokku et al. | Oct 2007 | A1 |
20070232267 | Pan | Oct 2007 | A1 |
20070232304 | Goldman et al. | Oct 2007 | A1 |
20070234892 | Goldman et al. | Oct 2007 | A1 |
20070243891 | Civanlar et al. | Oct 2007 | A1 |
20070271606 | Amann et al. | Nov 2007 | A1 |
20070287452 | Pan | Dec 2007 | A1 |
20070291910 | Bucchieri et al. | Dec 2007 | A1 |
20080039144 | Pan et al. | Feb 2008 | A1 |
20080080438 | Gopalakrishnan et al. | Apr 2008 | A1 |
20080101314 | Bachmutsky | May 2008 | A1 |
20080101410 | Barkley et al. | May 2008 | A1 |
20080146158 | Pan et al. | Jun 2008 | A1 |
20080168523 | Ansari et al. | Jul 2008 | A1 |
20090003269 | Kumazawa et al. | Jan 2009 | A1 |
20090022155 | Rosenberg et al. | Jan 2009 | A1 |
20090067441 | Ansari et al. | Mar 2009 | A1 |
20090186626 | Raghothaman | Jul 2009 | A1 |
20090215449 | Avner | Aug 2009 | A1 |
20090227230 | Camilleri et al. | Sep 2009 | A1 |
20090227235 | Pan | Sep 2009 | A1 |
20090271491 | Pan | Oct 2009 | A1 |
20090325584 | Pan | Dec 2009 | A1 |
20090327819 | Pan | Dec 2009 | A1 |
20100008306 | Pan | Jan 2010 | A1 |
20100008369 | Pan | Jan 2010 | A1 |
20100048197 | Jiang | Feb 2010 | A1 |
20100048208 | Gunaratnam et al. | Feb 2010 | A9 |
20100057485 | Luft | Mar 2010 | A1 |
20100075668 | Pan | Mar 2010 | A1 |
20100080214 | Li et al. | Apr 2010 | A1 |
20100094878 | Soroca et al. | Apr 2010 | A1 |
20100217837 | Ansari et al. | Aug 2010 | A1 |
20110059740 | Pan | Mar 2011 | A1 |
20110060853 | Pan | Mar 2011 | A1 |
20110223921 | Pan et al. | Sep 2011 | A1 |
20120002607 | Pan | Jan 2012 | A1 |
20120094659 | Pan | Apr 2012 | A1 |
20120106454 | Pan | May 2012 | A1 |
20130039279 | Pan | Feb 2013 | A1 |
20130065583 | Pan | Mar 2013 | A1 |
20130130677 | Pan | May 2013 | A1 |
20130148578 | Pan | Jun 2013 | A1 |
Number | Date | Country |
---|---|---|
1538781 | Oct 2004 | CN |
101044769 | Sep 2007 | CN |
0365885 | May 1990 | EP |
2435751 | Feb 2009 | GB |
2006052342 | May 2006 | WO |
2007102003 | Sep 2007 | WO |
2008150281 | Dec 2008 | WO |
2009158154 | Dec 2009 | WO |
2009158155 | Dec 2009 | WO |
2010005648 | Jan 2010 | WO |
2010008695 | Jan 2010 | WO |
2010036439 | Apr 2010 | WO |
Entry |
---|
International Search Report and Written Opinion received for corresponding International Application No. PCT/US07/25538 from the International Searching Authority (ISA/US) mailed Sep. 22, 2008, 8 pages. |
Hoffpauir et al., United States Statutory Invention Registration No. H1,918; Entitled “Integrated Authentication Center and Method for Authentication in a Wireless Telecommunications Network”; Filed Feb. 19, 1998; Published Nov. 7, 2000; 19 Pages. |
Pan, U.S. Appl. No. 13/309,003; “Providing Communications Using a Distributed Mobile Architecture”; Filed Dec. 20, 2011. |
B.G. Evans and K. Baughan; “Visions of 4G”; Electronics & Communication Engineering Journal; Dec. 2000; pp. 293-303. |
Shirshanka Das, Alok Nandan & Giovanni Pau (University of CA, Los Angeles, CA, USA); “SPAWN: A Swarming Protocol for Vehicular Ad-Hoc Wireless Networks”; VANET'04, Oct. 1, 2004, Philadelphia, PA, USA; ACM 1-58113-922-5/04/0010; 2 pgs. |
Yu-Chee Tseng, Chia-Ching Shen (National Chiao Tung University) & Wen-Tsuen Chen (National Tsing Hua University); “Integrating Mobile IP with AD Hoc Networks”; IEEE Computer Society; 0018-9162/03; 2003 IEEE; May 2003; pp. 48-55. |
Halim Yanikomeroglu, David D. Falconer & Van M. Sreng; “Coverage Enhancement Through Two-Hop Peer-to-Peer Relaying in Cellular Radio Networks”; Broadband Communications and Wireless Systems (BCWS) Centre Department of Systems & Computer Engineering, Carleton University, Ottawa, Canada; WWRF Meeting #7, Eindhoven, the Netherlands, Dec. 3-4, 2002, WG4: Spectrum, New Air Interfaces and Ad-Hoc Networking Multi-Hop Wireless Systems; 10 pages. |
Bur Goode; “Voice Over Internet Protocol (VoIP)”; 0018-9219/02 2002 IEEE; Proceedings of the IEEE; vol. 90, No. 9, Sep. 2002; pp. 1495-1517. |
Kyung-Hyu Lee, Kyu-Ok Lee & Kwon-Chul Park (Network Research Laboratory ETRI Korea) Jong-Ok Lee and Yoon-Hak Bang (Network Planning Team KT Korea); “Architecture to be Deployed on Strategies of Next-Generation Networks”; 0-7803-7802-4/03 2003 IEEE; pp. 819-822. |
Wolfgang Kellerer, Christian Bettstetter, Christian Schwingenschlögl & Peter Sties (Technische Universität München) Karl-Ernst Steinberg (BMW) & Hans-Jörg Vögel (the Fantastic Corp); “(Auto) Mobile Communication in a Heterogeneous and Converged World”; IEEE Personal Communications; Dec. 2001; 1070-9916/01; 2001 IEEE pp. 41-47. |
Nilanjan Banerjee & Sajal K. Das (University of Texas, Arlington) & Arup Acharya (IBM T.J. Watson Research Center) “Peer-to-peer SIP-based Services over Wireless Ad Hoc Networks”; BROADWIM: Broadband Wireless Multimedia Workshop; Oct. 29, 2004—broadnets.org; *This work was supported by NSF under the ORBIT testbed project, grant # NSF NRT Project #ANI-0335244 and by NSF ITR grant IIS-0326505; 8 pages. |
Hung-Yu Wei (Columbia University) & Richard D. Gitlin (NEC Laboratories America); “Two-Hop-Relay Architecture for Next-Generation WWAN/WLAN Integration”; 4G Mobile Communications: Toward Open Wireless Architecture; 1536-1284/04 2004 IEEE; IEEE Wireless Communications; Apr. 2004; pp. 2-9. |
Wolfgang Kellerer (LKN, Munich University of Technology), Hans-Jörg Vögel (the Fantastic Corp.) & Karl-Ernst Steinberg (BMW); “A Communication Gateway for Infrastructure Independent Wireless Access”; IEEE Communications Magazine; Mar. 2002; vol. 9; No. 3; 6 pages. |
Willie W. Lu & Jenny Hu (U.S. Center for Wireless Communications, Stanford University, CA); “Open Wireless Architecture—The Core to 4G Mobile Communications”; China Communications; Apr. 2006; pp. 32-39. |
Ralf Pabst, Bernard H. Walke & Daniel C. Schultz (RWTH Aachen University) Patrick Herhold & Gerhard P. Fettweis (Technical University of Dresden) Halim Yanikomeroglu & David D. Falconer (Carleton University) Sayandev Mukherjee & Harish Viswanathan (Lucent Technologies) Matthias Lott & Wolfgang Zirwas (Siemens ICM) Mischa Dohler & Hamid Aghvami (Kings College); “Relay-Based Deployment Concepts for Wireless and Mobile Broadband Radio”; 0163-6804/04; 2004 IEEE; IEEE Communications Magazine; Sep. 2004; pp. 80-89. |
Simone Frattasi, Hanane Fathi, Frank H.P. Fitzek & Ramjee Prasad (Aalborg University) Marcos D. Katz (Samsung Electronics); “Defining 4G Technology from the User's Perspective”; IEEE Network; Jan./Feb. 2006; 0890-8044/06; 2006 IEEE; pp. 35-41. |
Ian F. Akyildiz (Broadband and Wireless Networking BWN Lab, Georgia Institute of Technology) Xudong Wang & Weilin Wang (Kiyon, Inc. La Jolla, CA); “Wireless Mesh Networks: A Survey”; Computer Networks 47; Jan. 1, 2005; pp. 445-487; 1389-1286 2004 Elsevier B.V. |
Brian Woerner (Virginia Tech, Blacksburg, VA) & Mostofa Howlader (University of Tennessee, Knoxville, TN); “Research Directions for Fourth Generation Wireless”; Proceedings of the 10th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2001); Jun. 20-22, 2001; Cambridge, MA, USA; IEEE Computer Society 2001; ISBN 0-7695-1269-0; 2 pages. |
“Framework and Overall Objectives of the Future Development of IMT-2000 and Systems Beyond IMT-2000”; International Telecommunication Union; ITU-R Radiocommunication Sector of ITU; Recommendation ITU-R M.1645 (Jun. 2003); M Series; Mobile, Radiodetermination, Amateur and Related Satellite Services; 26 pages. |
Yu, W. et al., “Reverse Link Capacity Analysis on Distributed Wireless Communication System”, Journal of Beijing University of Posts and Telecommunications, Jun. 30, 2004, 4 pages. |
Number | Date | Country | |
---|---|---|---|
20080146158 A1 | Jun 2008 | US |
Number | Date | Country | |
---|---|---|---|
60869890 | Dec 2006 | US |