(1) Field of the Invention
The present invention relates to mobile telecommunication and more specifically to wireless prepaid telephone systems including telephone instruments capable of being compact, inexpensive and simple as a result of integral system operation in combination with enhanced central station equipment.
(2) Background Description
In recent years, considerable progress has been made in the development of wireless telephone systems. In that regard, wireless telephone instruments, sometimes called “mobile stations” (MS) have come into widespread use, accommodated for example by geographically defined cells. Although the systems are quite effective, and have considerably enhanced telephone communication, there are areas for improvement.
Typically in wireless systems, individual telephone instruments communicate at an initial level with central equipment, sometimes called “base stations” (BS). Operating with other components as a composite system, the geographically-separate base stations enable mobile telephone instruments to roam through different geographic areas or cells. Thus, from various locations, mobile instruments can access virtually any telephone terminal throughout the entire dial-up telephone network, sometimes called the “public switched telephone network” (PSTN). Furthermore, the users of mobile telephone instruments can roam from one cell to another in the course of a connected call.
Conventionally, a composite mobile telecommunications system includes some form of a switching system, sometimes including a unit called a “mobile switching center” (MSC). The MSC may be provided, along with other structure between the a base station (BS) and the public switched telephone network (PSTN). Accordingly, mobile management is accomplished using well known techniques and structures.
In contemporary systems, individual wireless telephone instruments usually are purchased by users in a transaction that is relatively complex. As part of the purchase transaction, the instrument is activated and numbers are assigned, however, more significantly, a financial commitment must be established for the new owner. Of course, the owner is responsible for the telephone instrument itself, however, responsibility also extends to the telephone service provided for the instrument, e.g. calls charged to the instrument.
Although considerably enhancing telephonic communication and wireless operation, current systems also have considerably increased complications and the risk-of-loss to instrument owners. In that regard, it is noteworthy that conventional wireless telephone instruments have been relatively complex, and consequently quite expensive. Under various promotional schemes, telephone marketing organizations sometimes have offered wireless instruments at a very low cost. Still, alternative charges or commitments usually are imposed. In any event, costs resulting from lost or stolen instruments ultimately must be borne at some level, usually by the consumer.
As suggested above, the risk-of-loss to the owner of a wireless telephone instrument can far exceed the value of the instrument itself. In one aspect, the increased risk involves the threat of a stolen instrument being used to make extensive and costly calls. Adjustments may be made in the billing for such calls, however usually, not without the expense of time and aggravation to instrument owner. Thus, the risk of physical loss presents a nagging annoyance to wireless instrument owners.
The risk of loosing a wireless telephone instrument is compounded by the fact that wireless operation exposes critical information that can be obtained without physical access to a telephone instrument. Such information can be used to charge fraudulent calls to a wireless owner's account. Consequently, even when an instrument never leaves an owners control, the owner may be invoiced for calls fraudulently made from a clone instrument.
Essentially, with possession of certain critical broadcast information, wireless telephone instruments can be fraudulently cloned. That is, persons with sophisticated apparatus can intercept and use critical information that is broadcast during the routine use of a proper instrument to create a clone. The resulting clone may then be used extensively, to make long distance calls that are billed to the account of the cloned instrument. Thus, even with the exercise of great care, the owner of a wireless instrument may face substantial expense and/or inconvenience. Accordingly, a need exists for a system accommodating fewer complications, limited responsibility and restricted potential loss for the owner of a wireless telephone instrument.
In view of their significant value, and their manner of use, wireless telephone instruments ideally could be of a more convenient size. That is; although now very compact, further improvement is desirable, as for storage and carrying. Specifically, a need exists for wireless telephone instruments that can be simply sold and can be carried and stored with greater convenience, as in a pocket, a purse, a child's pack or an automotive compartment.
In view of the various considerations as set out above, it is apparent that a need exists for an improved, relatively less expensive wireless telephone system affording greater convenience and economy, fewer complications and restricted risk of loss for wireless telephone instrument owners.
In part, the present invention is based on the recognition that a very simple and convenient, yet effective, wireless telephone instrument can be accommodated, by supporting such instruments with a central system that performs certain functions that traditionally are executed by telephone instruments. Generally, in accordance with a disclosed embodiment, a convenient, inexpensive, voice-actuated, out-call only, prepaid, wireless telephone instrument is provided, that involves limited complications, along with limited risk and exposure, for owners.
Essentially, in accordance with the present invention, as illustrated, a wireless, keyless (no traditional telephone keypad) telephone instrument incorporates an earphone, a microphone, a radio transceiver, a battery pack and a control unit, all embodied in a small convenient housing incorporating switching and signaling structures.
As disclosed herein, wireless telephone instruments, e.g. cellular, operate as part of a composite system in cooperation with a central station having a multiple-port platform. The ports of the platform accommodate multiple wireless telephone instruments simultaneously. In a disclosed embodiment, the users of wireless telephone instruments are prompted vocally to speak control words as well as message words. Thus, communication by users at wireless telephone instruments, is in the form of voice signals generated from the user's voice.
At a central station, certain voice signals are recognized as numbers (e.g. digits “zero” through “nine”) by a voice recognition unit and consequently are converted to a digital form for control and dial-up functions. Words also may be assigned to the star or asterisk (*) and the pound sign (#) signals. Thus, the central station system includes a voice generator, e.g. an audio response unit (ARU), along with the voice recognition unit, e.g. minimally with “number” recognition capability, and a control unit incorporating a memory.
Essentially, in accordance with an embodiment of the present invention, the central station interfaces individual remote wireless telephone instruments. Voice cues or prompts are provided and vocalized numbers (audio) are received to indicate a desired terminal connection as well as to authenticate or verify that a remote instrument is being properly used. If so, the central station determines whether the instrument has adequate pre-paid value to cover a call. Again, if so, the indicated communication is completed through the mobile network and the public network, with the central station monitoring the call to reflect a service charge in the prepaid balance. With reference to current technology, the system elements of the central station may be variously embodied in a mobile network, as by modifying a base station and/or mobile switch center. Accordingly, the system hereof may be variously incorporated in a mobile telecommunications system to accommodate dial-up select communication through a public switched telephone network.
Wireless and keyless telephone instruments in accordance herewith may involve a limited and defined pre-paid value. The simplicity of the instruments enable very compact forms, as in the configuration of a fountain pen. Furthermore, in large production runs, individual instruments may be quite inexpensive, even to the extent of being discardable or disposable. Accordingly, convenient, inexpensive instruments may be produced with defined and relatively small risk of loss. Complications and obligations of ownership also may be relatively few. Various modifications are disclosed to accommodate various alternative structures and processes.
In the drawings, which constitute a part of this specification, exemplary embodiments of the invention are set forth as follows:
As indicated above, detailed embodiments of the present invention are disclosed herein. However, the embodiments are merely representative, recognizing that a wide variety of disclosed embodiments are possible utilizing a multitude of different techniques and components. Nevertheless, the disclosed embodiments are deemed to afford the best embodiments for purposes of disclosure and to provide a basis for the claims herein which define the scope of the present invention.
Referring initially to
Near the end 9 of the housing 10, a pocket clip 12 is affixed to the tubular surface extending parallel to the central axis of the housing 10. The clip may serve as a handle and accommodates convenient attachment of the instrument TI during storage.
Also apparent from the exterior of the housing 10 is an antenna 14 (
Near the antenna port 16, at the very tip of the end 9, is a receptacle 15 for a jack (not shown) to recharge the instrument. Somewhat adjacent the receptacle 15, an array of small openings 18 penetrate the housing 10 for passing sound from an earphone 20 (
Near the end 11 (
The elemental simplicity and convenience of the instrument TI are apparent, both for storage and use. To further consider the instrument TI, reference now will be made to
The earphone 20 and the microphone 28, mentioned above, are firmly fixed in relation to the housing 10. A switch device 30 (
When the antenna 14 is withdrawn to extend fully from the housing 10, a knob 34, located at the inner end of the antenna 14, engages a spring-biased plunger 36 extending from the switch device 30. The knob 34 forces the plunger 36 telescopically within the switch device 30 and thereby energizes the instrument TI to an “on” state. Plunger switch devices are well known and widely used in various electronic applications.
Retraction of the antenna 14 releases the spring-biased plunger 36 allowing it to return to the exposed position as illustrated (
As indicated above, except for the antenna 14, the internal components of the wireless telephone instrument TI are firmly fixed in the housing 10. In such fixed locations, the components are electrically interconnected to accomplish an operating electrical apparatus as described in detail below. Specifically, the switch device 30, along with the antenna 14 are coupled by a cable 37 to a power supply, e.g. battery pack 38 which also is connected to an electronics package 40 by a cable 42. Connections from the electronics package 40 also extend to the microphone 28 (wires 44) and to the earphone 20 (wires 46, partly obscured by the battery pack 38 and carried in the cable 42). The battery pack 38 also is connected to the charging receptacle 15 by wires 47.
The electronics package 40 may comprise an integrated circuit chip (not separately shown) constituting the component electronic parts as described below. These components function cooperatively to execute the process steps and operations of the instrument, also as described below.
Generally, to make a call with the instrument TI, a user simply withdraws the antenna 14 to energize the electrical components including the signal lamp 22 which is illuminated to indicate the instrument is ready for use. With the earphone 20 near the users ear, audible prompts soon are heard instructing the user to respond vocally.
Following preliminary communication with the central station (described below), a communication connection is completed from the instrument TI to a desired remote telephone terminal. A wireless system network and the public switched telephone network accommodate such operation for a multitude of individual wireless telephone instruments TI. Generally, it is noteworthy that various forms of wireless systems are well known in the art into which the developments hereof may be variously incorporated.
Referring now to
Essentially, the stations C1 through Cn function in cooperation with the instruments TI1 through TIn in accordance herewith. Individually, the stations C1–Cn may serve as base radio stations for different geographic areas and may be managed by the server S to accommodate roaming by the instruments TI1–TIn as well known in the art. Details of the wireless management and server functions are well known and consequently are not treated in detail. However, note that the server S may be replicated and that various wireless functions may be performed either in the central stations C1–Cn or in the server S, depending on specific system architecture and design criteria.
As indicated, the central stations C1-Cn are coupled through the server S to the public switched network N. Of course, the public switched telephone network N also is coupled to a multitude of telephone terminals as generally represented by terminals S1 through Sn. As known in the art, any of a wide variety of couplings may be utilized to selectively accomplish the connective functions from the disclosed system herein, through a wireless network and the public network N to the terminals S1–Sn.
In a preliminary manner, consider a routine operation of the system (
The user simply withdraws the antenna 14 (
After some preliminary processing, as described in detail below, the central station C1 transmits an audio cuing signal to the instrument TI1. As a result, the user hears the earphone 20 provide a vocal instruction or cue for authentication data, e.g. “Please speak the numbers of your instrument code”.
In response, the user vocalizes the digits of the code associated with the keyless instrument TI1 (usually treated as secret) e.g. “two, one, three, nine”.
Next the user is given pre-paid value information and cued for a called number, e.g. “You now have sixty eight dollars credit. Please speak the digits of the number you are calling”.
Responsively, the user speaks the called number digits, e.g. “one, two, one, three, five, five, five, six, six, six, six”, designating the terminal S1.
Typically, the user then hears a ringing signal, presumably a wireless connection is established and communication proceeds in the conventional manner. The communication is monitored to reflect time and charges.
The detailed operation and processes of the composite system are treated below; however, as certain aspects of mobile telecommunication are presently well known they are not explained in detail. For example, various identification methods, broadcast techniques and structures, authentication techniques, calling processes, cellular organizations and mobility managements are well known. Detailed descriptions of such aspects of mobile telecommunications are provided in a book entitled, Mobile Telecommunications Networking, by Michael D. Gallagher and Randal A. Snyder, McGraw Hill, 1997, ISBN 0-07-063314-2, incorporated by reference herein. Particularly, the book treats techniques for interfacing a plurality mobile stations or instruments through base stations with the public switched telephone network. Generally as disclosed in the present system, the central stations C1–Cn can be related as base stations to function with the server S which as stated above may embody various wireless network structures.
Regarding another facet of mobile telecommunication, specifically fraud prevention, some aspects of the problem are facilitated by the system hereof. However, various security techniques are well known which may well be applicable to systems in accordance herewith. For example, U.S. Pat. No. 5,541,977 issued Jul. 30, 1996 to Hodges et al treats a system for the avoidance of wireless fraud. As another example, U.S. Pat. No. 5,450,479 issued Sep. 12, 1995 treats improved security for prepaid systems using telephone calling cards.
To consider the system of
The control unit 56 includes a memory 56A (ROM) primarily for storing identification data for the instrument along with control data for the control unit 56. Generally, the functions of the control unit 56 (treated below) are simple, involving the transmission of identification signals and sequencing the transmission and receipt of voice (audio) signals.
As indicated above, the wireless telephone instruments TI1–TIn may utilize currently well-known wireless techniques for communication with the central units C1–Cn. Communication is represented in
The platform 62 may take the form of various structures as currently embodied in mobile base stations and is coupled to a control unit 64. Functionally, the control unit 64 sequences the operation of components in the central station C1, as disclosed below, basically to accomplish: screening wireless interfaces, informing and cuing callers, and to some extent, accomplishing the desired telephonic wireless connections and monitoring calls.
With approval, a call from the instrument TI1 is dialed up through the server S and the network N then bridged from the calling instrument TI1 to the terminal S1. As indicated, completed calls then are monitored to reflect service charges in the individual pre-paid balances of the wireless telephone instruments TI1–TIn which are kept at the central station C.
To accomplish the approval and routing functions of the central wireless station C, the control unit 64 is coupled to: a voice generator 66 (ARU), a voice recognition unit 68, a memory 70, operator terminal stations 72 (collectively represented) and finally, a network switching unit 74 connected through the server S to the public switched telephone network N. Some components of the central station C1 are well known. Specifically, voice generators are well known as in the form of Automatic Response Units (ARUs) which may include some additional capability and are widely used to cue callers in telephonic interface systems. The voice generator 66 is controlled by the control unit 64 as disclosed in detail below. Voice recognition units, as the unit 68, also are well known and have been developed to a attain a good level of reliably in identifying the spoken digits “zero” through “nine” in an audio form, even when communicated by telephone. For example, verbal recognition units providing an alternative to dual-tone multi-frequency (DTMF) signals are described in U.S. Pat. No. 5,509,060 issued Apr. 16, 1996 to Hall et al.
In the present system, callers essentially are cued by the voice generator 66 to speak numbers digit-by-digit as explained above. Such spoken numbers are individually recognized at the central station C by the voice recognition unit 68 and provided in a digital form for use as data or control signals.
The memory 70, in the central wireless station C, involves a substantial capacity and includes individual instrument cells 70A1–n (represented collectively) which are assigned respectively to the instruments TI1–TIn. For example, the cell 70A1 is allocated to the instrument TI1 and the cell 70An is allocated to the instrument TIn. Generally, an exemplary detailed format for the cells 70A1–70An is described below with reference to
The memory 70 also includes a section 70B, which serves to indicate current connections of the instruments TI1–TIn, as for tracing on-line calls. Specifically, calls currently in process are stored to identify the individual wireless telephone instruments that are “connected” to terminals S1–Sn. Addressing the memory section 70B is on the basis of the telephone numbers of called terminals S1–Sn. This feature is treated in further detail below.
At this point it is to be generally understood that the memory 70 functions with the control unit 64 to: cue callers, store and implement approval or test criteria, maintain records of use history and values, and store messages, all to implement dial-up communication.
In some instances, a need may arise for direct personal communication between an individual at the station C1 and the user of a wireless instrument TI. For example, it may be desired to accommodate a user who has entered unresponsive information or has an urgent need for personal assistance. Alternatively, it may be desirable to confront a questionable user of an instrument with person-to-person communication. In some situations, as an emergency, an instrument user may be willing to incur a meaningful charge to speak directly with a live operator. To accommodate such operation, under certain circumstances, a user may be transferred to a live operator at one of the terminals 72. As well known, the terminals include a display screen for advising the operator of an instant situation to the extent of stored data.
The network switching unit 74 is a dial-up apparatus for operation with the server S to interface the network N. Accordingly, calls are placed or routed through the network N to a select one of the terminals S1 through Sn. The unit 74 operates with the control unit 64 and forms thereof are well known.
In view of the above descriptions, to further an understanding of the developed composite wireless system and the related operating processes, an assumed operating sequence will now be explained with reference to the various figures including the flow diagram of
At the outset, the assumed user withdraws the antenna 14 (
Upon energization, the control unit 56 (
The broadcast identification data from the instrument TI1 is received by the wireless platform 62 (
Upon receiving the identification data for the instrument TI1, the control unit 64 (
As indicated above, details of the format for the exemplary cell 70A1 are treated below with reference to
Various authentications or verifications may be involved, as discussed in greater detail below. However, at present, assume that the identification data coincides to reference data to authenticate the instrument TI1 as an instrument that is properly available for present use. Accordingly, a “yes” results from the query step as illustrated in
Note that a failure to verify the identification data for the telephone instrument TI1 (indicated by a “no” path from the query block 98) routes the operation to an “abort” block 102. It is to be recognized that several situations may result in an “abort” instruction. Of course, such occurrences may be handled differently and by various techniques. For example, a user simply may be informed that the instrument is not currently usable. Alternatives include tone signals, detailed explanations by the voice generator 66, and transfer to one of the terminals 72 for an operator interface.
Returning to the operative sequence, with verification of the instrument TI1 for use, the “yes” path from the query block 98 (
The audio message is broadcast by the wireless platform 62 to the transceiver 54 to actuate the earphone 20 with the cue. Responding to the cue, the user speaks the instrument code, e.g. “one, two, three, nine.” See block 104,
The spoken numbers are converted to audio signals by the microphone 28 (
Receiving the instrument code “1239”, it is verified by the control unit 64, as by comparison with a reference code stored in the instrument cell 70A1. Generally, the operation is similar to that of verifying the instrument identification, (explained above) as well as the widespread operation of testing a users personal identification number (PIN) which is variously executed in many forms of processors. However, note that the instrument code is associated with the instrument TI1, rather than with any person as in the case of a conventional PIN. PIN verification also could be utilized.
As suggested, other verifications may be involved as considered in detail below. In any event, the verification operation, performed by the control unit 64 (
If the instrument code is not verified as proper, an abort operation results (block 110,
To perform the step, the control unit 64 again addresses the memory cell 70A1 for the instrument TI1 to obtain the current pre-paid credit or value held for the instrument. If the balance is critically low, the user may wish to add value, as by using a credit card.
The query block 114 (
In any event, the control unit 64 tests the current value against a critical minimum value to determine whether or not to inquire if the user wishes to increase the pre-paid value of the instrument. If so (yes) as illustrated by block 116, the user might be cued: “Your instrument now has a value balance of only four dollars and fifty cents, if you would like to increase the value by using a credit card, please say ‘one”.
The query is resolved by the user's command, a illustrated by a query block 118. If the user wishes to increase the prepaid balance, the process advances to a sub-process as indicated by an oval block 120 (detailed below with reference to
If the instrument has sufficient value i.e. an amount in excess of some minimum call value, the process moves to the step of block 126, which also indicates the step that follows a positive result from the test block 114 (balance over five dollars?). With the process advanced to the stage of proceeding with a call, the block 126 indicates cuing the user for the called number (“1 213 555 6666” for terminal S1). Additionally, the user is given the current pre-paid value for the instrument.
Specifically at this stage, the control unit 64 controls the voice generator 66 to cue the user. For example, the audio message transmitted to the user might take the form: “The present value of your instrument is sixty four dollars and fifty cents, please speak the number you are calling digit by digit.”
At the instrument TI1, the user speaks the desired number to be called, e.g. “one, two, one, three, five, five, five, six, six, six, six.” The spoken words impact the microphone 28 (
The transmitted audio signals representative of the called number are received (
Using the multitude of capabilities and structures of the public switched telephone network N, a connection is sought with the terminal S1, see block 132,
Alternatively, if a connection is established (block 136, yes), the bridge between the instrument TI1 (
In summary,
Some ancillary sub-processes or process steps that may be incorporated in the system will next be considered. For example, the sub-process of adding value was mentioned above. Also, the system may incorporate a message capability somewhat akin to contemporary pager operation. Emergency access to a live operator also was mentioned above and is treated at a later point below. Aspects of fraud control also are treated below.
In the above description relating to
The selected increment of value is reflected in the balance stored at the central station C1 (home station for the instrument TI1) and may be supported by a conventional credit card. In that regard, to support the credit card transaction, data in the form of the credit card number and expiration date may be sufficient. However, it is common practice additionally to require the card holders name or other data. As disclosed below, such additional data may be communicated in the form of audio signals representing words spoken by the user. Essentially, the control unit 64 accommodates recording such audio information.
Considering the subprocess in detail, reference now will be to
In a similar fashion, the user is cued by the voice generator 66 to speak the card expiration date (block 156). Again, as described above, the date is spoken and received as audio signals then converted and processed as illustrated by a block 158.
The next step involves a query, as indicated by the block 160, unless the process encompasses taking alphabetic data, e.g. the user's “name”, “address” and so on. In that event, a block 162, indicated as an alternative step by a dashed-line path 163, involves cuing, receiving and distinctly recording or processing such data, again in the form of audio signals. Such signals are treated differently. Rather than to be converted to digital representations, the audio signals representative of alphabetic words may be stored for processing which may involve subsequent consideration by a person.
In any event, the process next advances to the query block 160 mentioned above and indicating a test executed by the control unit 64 (
Proceeding along the “yes” path from the query block 160, the next step is to cue the user for the value increment, e.g. “$50” or “$100”? The step is indicated by a block 166 and involves the user either speaking the digit “one” for a “$50” increment, or the digit “two” for an increment of “$100”.
The spoken increment digit is received, as indicated by a block 168, converted to digital number signals and depending on the selected option is processed by recording the increment. As illustrated by a query block 170 and the alternative incrementing blocks 172 and 174 value is added to the prepaid balance. Thus, the final step is executed by the control unit 64 (
Reference has been made to the memory cells 70A1–n (
As indicated above, in the disclosed embodiment, each wireless telephone instrument TI1–TIn has identification data stored in the memory 70, including an identification number, for example, “2746832814” for the instrument TI1. A detailed treatment of identification numbers for mobile instruments or stations is provided in the above-referenced book, Mobile Telecommunications Networking, specifically in a section beginning on page 64.
Recognizing that instruments in accordance herewith may be constructed and treated somewhat differently, it is to be recognized that the indicated number is merely illustrative and conventions, regulations and so on may command identification numbers or data in totally different forms with considerations as set forth in the referenced book.
Returning to the operations herein, the identification number is transmitted (broadcast) from an instrument (e.g. TI or TN) on its activation as identification data. On receipt, the number is used by the control unit 64 to address the memory 70 (
The exemplary cell 70A1 includes a number of individual fields horizontally arranged and shown separately in
Next in order, a field 194 registers the instrument code, specifically a four digit number, e.g. 2139. The field 194 provides a reference for verification of the received instrument code that is tied to the instrument TI1 and provided by the user during each use to verify that the user is proper.
A pair of related fields 195 and 196 respectively store the current and last prior prepaid values of the instrument TI1. The current value, e.g. $68.50 is used for authorizing use and is reported to the user. The prior value is accessible to an operator, along with all fields of the cell for reference purposes, as at one of the operator terminals 72 (
A series of similar fields 198 (
Another series of similar fields 200 also are collectively represented and provide a record of refreshed value increments. Specifically, incremental values and dates for adding value to the prepaid balance are stored as shown. Again, the storage may be transient covering some predetermined number of occasions.
As previously suggested, the system can receive and report messages via the instrument TI1. In that regard, messages are delivered only at a time when a telephone instrument TI is activated. Messages, in the form a telephone calling number and a date, are stored in a group of memory fields collectively designated as fields 202.
If message operation is provided, the process of
Another ancillary aspect of the disclosed system involves limitations that may be imposed individually on the use of each instrument, e.g. the instrument TI. Some examples will explain the structure and operation.
One expected widespread use of instruments in accordance herewith is by young students as in elementary school. With the defined risk of loss and the convenient physical form of instruments hereof, parents may wish to provide instruments to their children both for security and communication. To further limit the risk of loss, in accordance herewith use limitations can be imposed on the instruments.
Pursuing the example of a young student as the user, it might be presumed that proper use of the instrument TI1 would be restricted to a single dialing area. Accordingly, the use of the instrument can be so limited by storing the area code or codes that are approved for calls. Such limitations are stored in a group of fields 204 (
To illustrate the accommodating sub-process step, the flow diagram of
Another limitation may be based on the time of day when calls can be made. For example, the day (twenty four hours) might be divided into four segments of six hours each called: “morning”, “day”, “evening” and “night”. The instruments TI may then be restricted for use to any one or more of the segments. For example, an employee given the instrument TI1 might be restricted to using it only during the segments designated “morning” and “day”. The approved six-hour segments are stored in the fields 204 and are imposed by verification processing in the control unit 64 (
Generally, attempted use of the telephone instrument TI1 that is outside the imposed limitations will be aborted in favor of a brief denial message. Thus, the risk of loss from clones is further reduced.
Returning to the memory cell 70A1 (
Another aspect of the present system involves emergency transfer to an operator at one of the terminals 72 (
As mentioned above, the problem of cloning may be variously combatted, however, another aspect hereof may be utilized in that regard. A counter, in the control unit 64 (
Upon receiving the burst signal, the wireless telephone instrument replies with an associated number, e.g. a four digit number. The same associated number is stored as a reference by the memory 70, for example, in each of the unit cells 70A1–n identified with the calling instrument TI1.
The received and reference numbers are compared by the control unit 64 to condition calls. In the case of coincidence, the call proceeds, the operation being completely transparent to the user. Alternatively, if the response number does not coincide to the reference number, the call is denied. Accordingly, identification of the individual wireless telephone instruments TI is confirmed dynamically.
The additional verification operation involves a relatively minor addition to the instruments TI1–n in the form of filters to identify the frequency of each received burst signal and the capability to fetch the specified number from the read-only memory 56A. In that regard, frequency decoding in telephonic systems is well known and described for example in a U.S. Pat. No. 4,320,256 to Freeman, and entitled Verbally Interactive Telephone Interrogation System With Selectible Variable Decision Tree.
In view of the detailed descriptions set out above, the structure and operation of the system to execute effective communication processes will be apparent. However, a few additional comments may be appropriate in relation to applications for the system. The case of a young student was considered above and is here emphasized in the interests of security and communication. Telephones are often unavailable when most needed and in the case of young people, the need may be extreme.
The same features that render an instrument in accordance here with suitable for a young person also are present for numerous other applications. Specifically, reduced risk of loss, minor complications of ownership and considerable convenience for storage render such instruments practical for travelers, automotive use, employee assignment, pager users, and a host of others.
To consider the procurement of the instrument, a purchaser might take delivery with only minimal formality. Essentially, the instrument would be given an identification number and an instrument code, (no effective call number) both being stored in the memory 56A and a related one of the cells 70A1–n. That is, essentially the instrument would not carry a usable call or directory number. Note that as stated in the above-referenced book (Mobile Telecommunications Networking): “From an IS-41 protocol perspective, the MIN is purely the unique identifier of a mobile subscriber and subscription. In most implementations today the MIN is usually the dialable directory number of the MS as well. However, this is not a requirement, and the MIN is not specified as the subscriber's directory number in IS-4-C.” Accordingly, as illustrated by
In view of the above explanations of exemplary systems and processes, it will be apparent the other embodiments and processes may be employed utilizing the developments hereof. Accordingly, the appropriate scope hereof is deemed appropriately determined on the basis of the claims as set forth below.
This application is a continuation of application Ser. No. 10/120,632 filed Apr. 11, 2002 now U.S. Pat. No. 6,647,255, entitled “Wireless Telephone System With Mobile Instruments for Outgoing Calls (As Amended)”, which is a continuation of Application Serial No. 09/685,169 filed Oct. 10, 2000, entitled “Wireless Prepaid Telephone System With Dispensable Instruments,” which is now U.S. Pat. No. 6,405,029, which is a continuation of application Ser. No. 09/465,127 filed Dec. 16, 1999, entitled “Wireless Prepaid Telephone System With Dispensable Instruments,” now U.S. Pat. No. 6,149,353, which is a continuation of application Ser. No. 08/878,864 filed Jun. 19, 1997, entitled “Wireless Prepaid Telephone System With Dispensable Instruments,” now U.S. Pat. No. 6,049,710, and also is a continuation-in-part of application Ser. No. 09/860,992 filed May 17, 2001, entitled “Mobile Keyless Telephone Instruments and Wireless Telecommunication System Having Voice Dialing and Voice Programming Capabilities,” which is now U.S. Pat. No. 6,917,802, all are hereby incorporated by reference as if set forth fully herein.
Number | Name | Date | Kind |
---|---|---|---|
3688126 | Klein | Aug 1972 | A |
4007364 | Ojima et al. | Feb 1977 | A |
4320256 | Freeman | Mar 1982 | A |
4475189 | Herr et al. | Oct 1984 | A |
4596900 | Jackson | Jun 1986 | A |
4611094 | Asmuth et al. | Sep 1986 | A |
4731811 | Dubus | Mar 1988 | A |
4829514 | Frimmel, Jr. et al. | May 1989 | A |
4856066 | Lemelson | Aug 1989 | A |
4870686 | Gerson et al. | Sep 1989 | A |
4879744 | Tasaki et al. | Nov 1989 | A |
4969180 | Watterson et al. | Nov 1990 | A |
5042063 | Sakanishi et al. | Aug 1991 | A |
5153902 | Buhl et al. | Oct 1992 | A |
5195090 | Bolliger et al. | Mar 1993 | A |
5203009 | Bogusz et al. | Apr 1993 | A |
5222121 | Shimada | Jun 1993 | A |
5274695 | Green | Dec 1993 | A |
5297183 | Bareis et al. | Mar 1994 | A |
5297194 | Hunt et al. | Mar 1994 | A |
5353335 | D'Urso et al. | Oct 1994 | A |
5353336 | Hou et al. | Oct 1994 | A |
5369685 | Kero | Nov 1994 | A |
5377256 | Franklin et al. | Dec 1994 | A |
5420912 | Kopp et al. | May 1995 | A |
5440620 | Slusky | Aug 1995 | A |
5450479 | Alesio et al. | Sep 1995 | A |
5461664 | Cappadona | Oct 1995 | A |
5485505 | Norman et al. | Jan 1996 | A |
5499288 | Hunt et al. | Mar 1996 | A |
5509049 | Peterson | Apr 1996 | A |
5509060 | Hall et al. | Apr 1996 | A |
5541977 | Hodges et al. | Jul 1996 | A |
5574771 | Driessen et al. | Nov 1996 | A |
5592535 | Klotz | Jan 1997 | A |
5599204 | Glassford | Feb 1997 | A |
5602900 | Hattori | Feb 1997 | A |
5640689 | Rossi | Jun 1997 | A |
5652789 | Miner et al. | Jul 1997 | A |
5659597 | Bareis et al. | Aug 1997 | A |
5710813 | Terui et al. | Jan 1998 | A |
5719926 | Hill | Feb 1998 | A |
5754645 | Metroka et al. | May 1998 | A |
5778313 | Fougnies | Jul 1998 | A |
5790636 | Marshall | Aug 1998 | A |
5797101 | Osmani et al. | Aug 1998 | A |
5802466 | Gallant et al. | Sep 1998 | A |
5812945 | Hansen et al. | Sep 1998 | A |
5815807 | Osmani et al. | Sep 1998 | A |
5818915 | Hayes, Jr. et al. | Oct 1998 | A |
5826185 | Wise et al. | Oct 1998 | A |
5828738 | Spaeth | Oct 1998 | A |
5832371 | Thornton | Nov 1998 | A |
5835570 | Wattenbarger | Nov 1998 | A |
5839058 | Phillips et al. | Nov 1998 | A |
5845218 | Altschul | Dec 1998 | A |
5850599 | Seiderman | Dec 1998 | A |
5854975 | Fougnies et al. | Dec 1998 | A |
5867796 | Inutsuka | Feb 1999 | A |
5870459 | Phillips et al. | Feb 1999 | A |
5884188 | Hayes, Jr. | Mar 1999 | A |
5946613 | Hayes, Jr. et al. | Aug 1999 | A |
5963859 | Keating | Oct 1999 | A |
5966654 | Croughwell et al. | Oct 1999 | A |
5995926 | Gupta et al. | Nov 1999 | A |
6049710 | Nilsson | Apr 2000 | A |
6085080 | Rahikainen et al. | Jul 2000 | A |
6138036 | O'Cinneide | Oct 2000 | A |
6149353 | Nilsson | Nov 2000 | A |
6154526 | Dahlke | Nov 2000 | A |
6157848 | Bareis et al. | Dec 2000 | A |
6167118 | Slivensky | Dec 2000 | A |
6167251 | Segal et al. | Dec 2000 | A |
6198947 | Barber | Mar 2001 | B1 |
6226532 | Kim et al. | May 2001 | B1 |
6243596 | Kikinis | Jun 2001 | B1 |
6292675 | Nilsson | Sep 2001 | B1 |
6298250 | Nilsson | Oct 2001 | B1 |
6308053 | Nilsson | Oct 2001 | B1 |
6393304 | Meche | May 2002 | B1 |
6400967 | Nilsson | Jun 2002 | B1 |
6400969 | Yamashita et al. | Jun 2002 | B1 |
6405029 | Nilsson | Jun 2002 | B1 |
6418328 | Shon | Jul 2002 | B1 |
6473610 | Nilsson | Oct 2002 | B1 |
Number | Date | Country |
---|---|---|
9603001 | Feb 1996 | WO |
9914928 | Mar 1999 | WO |
Number | Date | Country | |
---|---|---|---|
Parent | 10120632 | Apr 2002 | US |
Child | 10626409 | US | |
Parent | 09685169 | Oct 2000 | US |
Child | 10120632 | US | |
Parent | 09465127 | Dec 1999 | US |
Child | 09685169 | US | |
Parent | 08878864 | Jun 1997 | US |
Child | 09465127 | US |