Method and system for disabling a wireless communication device

ABSTRACT

A method and system for disabling a wireless communication device, including: capturing a signal stream from the wireless communication device by satisfying a signal control protocol using a mobile broadcast antenna; and routing signals to and from the wireless communication device according to a non-standard protocol, thereby disabling normal operation of the wireless communication device. The mobile broadcast antenna includes a signal capturing module configured to receive information relevant to satisfaction of the signal control protocol and to alter a signal of the mobile broadcast antenna. The signal capturing module detects signal strengths from other broadcast antenna and alters a broadcast strength of the mobile broadcast antenna to be higher than the detected signal strengths. The signal capturing module calculates a desired signal strength difference according to a desired protection characteristic and alters the broadcast strength of the mobile broadcast antenna to satisfy the desired signal strength difference.

FIELD OF THE INVENTION

The present invention relates to wireless communication devices.Specifically, methods and systems for disabling wireless communicationdevices.

DESCRIPTION OF THE RELATED ART

Almost anything can be turned into an improvised explosive device (IED),from grenades to plastic explosives to leftover mines. Remotelydetonating these items using relatively simple, readily available,low-technology devices is a common method for setting off an IED. Atrigger device can be put together out of the most everyday ofelectronics—a cellular phone, a garage door opener, a child'sremote-control toy.

Cellular phones are fairly common triggers for IEDs. They allow for aneasy way to set IEDs off on command and potentially from thousands ofmiles away. Consequently, the adaptation of using cellular phones hasgiven bombers the standoff ability to watch from a distance and not becompromised. Furthermore, the hiding places for handmade bombs areeverywhere: in the ground, in a building, even aboard a car or truck.Accordingly, IEDs are very effective because they can be difficult todetect and to counter.

The traditional method of countering wireless communication devices hasbeen the use of jamming devices. However, traditional jamming devicesrely on the use of high power signals and complicated circuitry intendedto lock onto signals coming from cell phones, counter them, and try tokeep up with changing cell phone frequencies to compensate forinterference. In essence, jammers attempt to overpower signals and drownthem out with useless noise. Due to the level of complication involved,there is an increased chance of error, as well as legal concernsregarding the jamming of airways that have been purchased by commercialcompanies for specific use. Also, current and/or traditional jammers donot collect information from the devices they jam, and thereby miss acrucial opportunity to gain information useful in locating those capableof triggering IEDs.

Some improvements have been made in the field. Examples include, but arenot limited to, the references described below, which references areincorporated by reference herein:

U.S. Pat. No. 6,496,703, issued to da Silva, discloses an apparatus andmethod for disabling wireless communication devices establishes adisabling zone. Inside the disabling zone, one or more capabilities ofthe wireless communication devices are disabled. The wirelesscommunication devices may include cellular phones, beepers, pagers,portable computers, electronic personal attendants, and/or similarwireless devices. In a first embodiment, the zone is formed inconjunction with a power monitoring unit proximate the zone. In a secondembodiment, the zone is formed in conjunction with a position monitoringsystem determining the geographical position of the wirelesscommunication devices. In both the first and second embodiments, thezone may be either geographically fixed or movable.

U.S. Pat. No. 6,011,973, issued to Valentine et al., discloses a methodand apparatus for restriction operation of a cellular telephone to welldelineated geographical areas. The cellular telephone is equipped with alocation device for ascertaining the current geographical location ofthe cellular telephone. The ascertained geographical location iscompared with information pertaining to the allowability of operation ofcellular telephones in various geographical locations. A determinationis made as to whether the cellular telephone is allowed to operate inits current geographical location. The cellular telephone accordinglyenables or disables transmitting by the transceiver of the cellulartelephone.

U.S. Pat. No. 6,085,096, issued to Nakamura, discloses a mobilecommunication system includes a base station having a messagetransmission function and installed near a place where the use of amobile unit is restricted. When the mobile unit in a wait state entersan area under management of the base station, the base station transmitsa data signal for reproducing a message for instructing the mobile unitto turn off a power supply of the mobile unit.

U.S. Pat. No. 6,937,868, issued to Himmel et al., discloses an apparatusand method for managing a mobile phone answering mode and outgoingmessage or other indicator based on a location of the mobile phone areprovided. The apparatus and method make use of a location system toascertain the current location of a mobile telephone being carried by auser. Based on the current location, the apparatus and method determinewhether operation of the mobile telephone to receive and/or send callsshould be restricted. In addition, the apparatus and method determine anappropriate outgoing message to be provided to calling parties while themobile telephone is located in an area where use of the mobile telephoneto receive calls is prohibited. The particular outgoing message providedis customized to the current location of the mobile telephone andoptionally, the caller ID of the calling party.

U.S. Pat. No. 6,978,146, issued to Yardman, discloses a device forblocking cellular phone signals includes a housing having asubstantially rectangular shape and further includes a transceiverdisposed therein for detecting a cellular phone signal. The transceivergenerates a blocking signal to temporarily disable a cellular phone andthereby prevent a user from operating a cellular phone within apredetermined area. The housing further has a top surface and a bottomsurface including an antenna connected thereto and for directing theblocking signal outwardly and away therefrom. The device furtherincludes a power supply source including a rechargeable battery pack forproviding power to the device and a control lever connected to thehousing and operably connected to the transceiver for selectivelyadjusting the strength of the blocking signal as desired by a user.

U.S. Pat. No. 6,393,254, issued to Carballo et al., discloses a disablerfor mobile communications. The object of the call masking system formobile telephones is to prevent the operation of mobile telephones whichare present in a closed environment without interfering with the normaloperation of other telephones which are outside the closed environment.To this effect, the system generates interference signals which willprevent the mobile telephones from receiving the signaling channels sentby the base stations (for example, GSM cal signaling channel). Thesystem monitors the power with which the carriers of the neighboringbase stations are received inside the room and will adjust theinterference power radiating in the signaling channels so that thecarrier to interference signal ratio will make the operation of themobile telephones impossible. The system can be applied to closedenvironments wherein mobile telephones should not ring when receiving acall.

U.S. Pat. No. 6,456,822, issued to Gofman et al., discloses a method anddevice for achieving reliable prevention of cellular telephone calls,within a given area. In the preferred embodiment, the device and methodoperate to block the control frequencies of the cellular system within agiven area. The device broadcasts a blocking signal with a low poweroutput, which interferes with reception ability and decoding of signalsand commands broadcast at the control frequency. Thus the handshakeroutine of the telephone/cellular subscriber with the local cellularsystem is prevented. Operation of the device is achieved in severalways, manually, automatically, and/or by remote control. Its operationprevents cellular communication ability by subscribers within the areaor within the effective blocking range, which is derived from theeffective radiated power (ERP) of the blocking signal, its type and thetype of communications/or blocked system. Using the inventive device, agiven area normally accessible by cellular communications is blockedfrom such access, thus providing a security-related, cultural or othersafeguard. The given area is thereby isolated from cellularcommunications, and access can only be achieved by physically relocatingthe user of a blocked cellular telephone.

The inventions heretofore known suffer from a number of disadvantages,which include: being difficult to use, being expensive, not interferingwith limited frequency range, requiring compensation for interference,not anticipating frequency changes as a wireless communication deviceattempts to locate a stronger signal, not being able to obtain andrecord identification information of wireless communication devices,and/or not being able to authorize use of approved wirelesscommunication devices.

Accordingly, there exists a need for a method and system for disabling awireless communication device that solves one or more of the problemsherein described or that may come to the attention of one skilled in theart after becoming familiar with this specification.

SUMMARY OF THE INVENTION

The present invention has been developed in response to the presentstate of the art, and in particular, in response to the problems andneeds in the art that have not yet been fully solved by currentlyavailable wireless communication systems, methods and devices.Accordingly, the present invention has been developed to provide asystem, method, and device for mobile interference and/or spoofing ofwireless communication.

In one embodiment of the invention, there may be a method of disabling awireless communication device, which may include the following steps:capturing a signal stream from the wireless communication device whichmay satisfy a signal control protocol using a mobile broadcast antenna;and/or routing signals to and/or from the wireless communication devicewhich may be according to a non-standard protocol, which may therebydisable normal operation of the wireless communication device. Inanother embodiment of the invention, the mobile broadcast antenna mayinclude a signal capturing module, which may be configured to receiveinformation relevant to satisfaction of the signal control protocoland/or to alter a signal of the mobile broadcast antenna. In stillanother embodiment of the invention, the signal capturing module maydetect signal strengths from other broadcast antenna and/or alter abroadcast strength of the mobile broadcast antenna to be higher than thedetected signal strengths.

In yet another embodiment of the invention, the signal capturing modulemay calculate a desired signal strength difference which may beaccording to a desired protection characteristic and/or alter thebroadcast strength of the mobile broadcast antenna which may be tosatisfy the desired signal strength difference. In still yet anotherembodiment of the invention, the mobile broadcast antenna may be coupledto a powered vehicle. In even another embodiment of the invention thestep of routing signals may include not retransmitting any signals fromthe wireless communication device and/or not sending any externallygenerated signals to the wireless communication device. In even stillanother embodiment of the invention, the step of routing signals mayinclude not sending any externally generated signals to the wirelesscommunication device.

In even yet another embodiment of the invention, the method of disablinga wireless communication device may include the steps of: registeringthe wireless communication device; and/or recording signal informationwhich may be related to the registered wireless communication device. Inan additional embodiment of the invention, the method of disabling awireless communication device may include the step of registering thewireless communication device in a memory device which may be inassociation with selectable metadata. In still an additional embodimentof the invention, the non-standard protocol may route signals accordingto the selectable metadata.

In yet an additional embodiment of the invention, there may be a systemfor disabling a wireless communication device, which may include: amobile broadcast antenna, which may be configured to broadcast signals,which may include: a signal capturing module, which may be configured tocapture a signal stream from the wireless communication device; and/or asignal control protocol satisfaction module, in communication with thesignal capturing module, which may be configured to satisfy a signalcontrol protocol; and/or a signal routing module, in communication withthe mobile broadcast antenna, which may be configured to route signalsto and/or from the wireless communication device, which may include anon-standard protocol disabling module, which may be configured todisable the wireless communication device according to a non-standardprotocol. In still yet an additional embodiment of the invention, thesignal capturing module may include: an information receiving module,which may be configured to receive information relevant to satisfactionof the signal control protocol; and/or a signal altering module, incommunication with the information receiving module, which may beconfigured to alter a signal of the mobile broadcast antenna. In even anadditional embodiment of the invention, the signal capturing module mayinclude a signal strength detection module, in communication with thesignal altering module, which may be configured to detect signalstrengths from other broadcast antenna.

In even still an additional embodiment of the invention, the signalcapture module may include a signal strength difference calculatingmodule, in communication with the signal altering module, which may beconfigured to calculate a desired signal strength difference accordingto a desired protection characteristic. In even yet an additionalembodiment of the invention, the mobile broadcast antenna may be coupledto a powered vehicle. In a further embodiment of the invention, thenon-standard protocol disabling module may include a signal blockingmodule, which may be configured to prevent the transmission of signalsto and/or from the wireless communication device.

In still a further embodiment of the invention, the system for disablinga wireless communication device may include: a registration processingmodule, in communication with the signal routing module, which may beconfigured to register the wireless communication device in a memorydevice; and/or a signal information recording module, in communicationwith the registration processing module, which may be configured torecord signal information related to the registered wirelesscommunication device. In yet a further embodiment of the invention, thewireless communication device may be registered in a memory device whichmay be in association with selectable metadata. In still yet a furtherembodiment of the invention the non-standard protocol disabling modulemay route signals according to the selectable metadata.

Reference throughout this specification to features, advantages, orsimilar language does not imply that all of the features and advantagesthat may be realized with the present invention should be or are in anysingle embodiment of the invention. Rather, language referring to thefeatures and advantages is understood to mean that a specific feature,advantage, or characteristic described in connection with an embodimentis included in at least one embodiment of the present invention. Thus,discussion of the features and advantages, and similar language,throughout this specification may, but do not necessarily, refer to thesame embodiment.

Furthermore, the described features, advantages, and characteristics ofthe invention may be combined in any suitable manner in one or moreembodiments. One skilled in the relevant art will recognize that theinvention can be practiced without one or more of the specific featuresor advantages of a particular embodiment. In other instances, additionalfeatures and advantages may be recognized in certain embodiments thatmay not be present in all embodiments of the invention.

These features and advantages of the present invention will become morefully apparent from the following description and appended claims, ormay be learned by the practice of the invention as set forthhereinafter.

BRIEF DESCRIPTION OF THE DRAWINGS

In order for the advantages of the invention to be readily understood, amore particular description of the invention briefly described abovewill be rendered by reference to specific embodiments that areillustrated in the appended drawings. Understanding that these drawingsdepict only typical embodiments of the invention and are not, therefore,to be considered to be limiting of its scope, the invention will bedescribed and explained with additional specificity and detail throughthe use of the accompanying drawings, in which:

FIG. 1 is a perspective view of a system for disabling a wirelesscommunication device in operation, according to one embodiment of theinvention;

FIG. 2 illustrates a block diagram of a system for disabling a wirelesscommunication device, according to one embodiment of the invention;

FIG. 3 illustrates a block diagram of a system for disabling a wirelesscommunication device, according to one embodiment of the invention;

FIG. 4 illustrates a flowchart of a method of disabling a wirelesscommunication device, according to one embodiment of the invention; and

FIG. 5 illustrates a sequence diagram of a method and system fordisabling a wireless communication device, according to one embodimentof the invention.

DETAILED DESCRIPTION OF THE INVENTION

For the purposes of promoting an understanding of the principles of theinvention, reference will now be made to the exemplary embodimentsillustrated in the drawings, and specific language will be used todescribe the same. It will, nevertheless, be understood that nolimitation of the scope of the invention is thereby intended. Anyalterations and further modifications of the inventive featuresillustrated herein, and any additional applications of the principles ofthe invention as illustrated herein, which would occur to one skilled inthe relevant art and having possession of this disclosure, are to beconsidered within the scope of the invention.

Reference throughout this specification to an “embodiment,” an “example”or similar language means that a particular feature, structure,characteristic, or combinations thereof described in connection with theembodiment is included in at least one embodiment of the presentinvention. Thus, appearances of the phrases an “embodiment,” an“example,” and similar language throughout this specification may, butdo not necessarily, all refer to the same embodiment, to differentembodiments, or to one or more of the figures. Additionally, referenceto the wording “embodiment,” “example” or the like, for two or morefeatures, elements, etc. does not mean that the features are necessarilyrelated, dissimilar, the same, etc.

Each statement of an embodiment or example is to be consideredindependent of any other statement of an embodiment despite any use ofsimilar or identical language characterizing each embodiment. Therefore,where one embodiment is identified as “another embodiment,” theidentified embodiment is independent of any other embodimentscharacterized by the language “another embodiment.” The features,functions, and the like described herein are considered to be able to becombined in whole or in part one with another as the claims and/or artmay direct, either directly or indirectly, implicitly or explicitly.

Many of the functional units described in this specification have beenlabeled as modules, in order to more particularly emphasize theirimplementation independence. For example, a module may be implemented asa hardware circuit comprising custom VLSI circuits or gate arrays,off-the-shelf semiconductors such as logic chips, transistors, or otherdiscrete components. A module may also be implemented in programmablehardware devices such as field programmable gate arrays, programmablearray logic, programmable logic devices or the like.

Modules may also be implemented in software for execution by varioustypes of processors. An identified module of programmable or executablecode may, for instance, comprise one or more physical or logical blocksof computer instructions which may, for instance, be organized as anobject, procedure, or function. Nevertheless, the executables of anidentified module need not be physically located together, but maycomprise disparate instructions stored in different locations which,when joined logically together, comprise the module and achieve thestated purpose for the module.

Indeed, a module and/or a program of executable code may be a singleinstruction, or many instructions, and may even be distributed overseveral different code segments, among different programs, and acrossseveral memory devices. Similarly, operational data may be identifiedand illustrated herein within modules, and may be embodied in anysuitable form and organized within any suitable type of data structure.The operational data may be collected as a single data set, or may bedistributed over different locations including over different storagedevices, and may exist, at least partially, merely as electronic signalson a system or network.

The various system components and/or modules discussed herein mayinclude one or more of the following: a host server or other computingsystems including a processor for processing digital data; a memorycoupled to said processor for storing digital data; an input digitizercoupled to the processor for inputting digital data; an applicationprogram stored in said memory and accessible by said processor fordirecting processing of digital data by said processor; a display devicecoupled to the processor and memory for displaying information derivedfrom digital data processed by said processor; and a plurality ofdatabases. Various databases used herein may include: metadata, signaldata, user identification data, device registration data, wirelesscommunication data and/or like data useful in the operation of thepresent invention. As those skilled in the art will appreciate, anycomputers discussed herein may include an operating system (e.g.,Windows Vista, NT, 95/98/2000, OS2; UNIX; Linux; Solaris; MacOS; andetc.) as well as various conventional support software and driverstypically associated with computers. The computers may be in a home orbusiness environment with access to a network. In an exemplaryembodiment, access is through the Internet through acommercially-available web-browser software package.

The present invention may be described herein in terms of functionalblock components, screen shots, user interaction, optional selections,various processing steps, and the like. Each of such described hereinmay be one or more modules in exemplary embodiments of the invention. Itshould be appreciated that such functional blocks may be realized by anynumber of hardware and/or software components configured to perform thespecified functions. For example, the present invention may employvarious integrated circuit components, e.g., memory elements, processingelements, logic elements, look-up tables, and the like, which may carryout a variety of functions under the control of one or moremicroprocessors or other control devices. Similarly, the softwareelements of the present invention may be implemented with anyprogramming or scripting language such as C, C++, Java, COBOL,assembler, PERL, Visual Basic, SQL Stored Procedures, AJAX, extensiblemarkup language (XML), with the various algorithms being implementedwith any combination of data structures, objects, processes, routines orother programming elements. Further, it should be noted that the presentinvention may employ any number of conventional techniques for datatransmission, signaling, data processing, network control, and the like.Still further, the invention may detect or prevent security issues witha client-side scripting language, such as JavaScript, VBScript or thelike.

Additionally, many of the functional units and/or modules herein aredescribed as being “in communication” with other functional units and/ormodules. Being “in communication” refers to any manner and/or way inwhich functional units and/or modules, such as, but not limited to,computers, laptop computers, PDAs, modules, and other types of hardwareand/or software, may be in communication with each other. Somenon-limiting examples include communicating, sending, and/or receivingdata and metadata via: a network, a wireless network, software,instructions, circuitry, phone lines, internet lines, satellite signals,electric signals, electrical and magnetic fields and/or pulses, and/orso forth.

As used herein, the term “network” may include any electroniccommunication means which incorporates both hardware and softwarecomponents of such. Communication among the parties in accordance withthe present invention may be accomplished through any suitablecommunication channels, such as, for example, a telephone network, anextranet, an intranet, Internet, point of interaction device (point ofsale device, personal digital assistant, cellular phone, kiosk, etc.),online communications, off-line communications, wireless communications,transponder communications, local area network (LAN), wide area network(WAN), networked or linked devices and/or the like. Moreover, althoughthe invention may be implemented with TCP/IP communications protocols,the invention may also be implemented using IPX, Appletalk, IP-6,NetBIOS, OSI or any number of existing or future protocols. If thenetwork is in the nature of a public network, such as the Internet, itmay be advantageous to presume the network to be insecure and open toeavesdroppers. Specific information related to the protocols, standards,and application software utilized in connection with the Internet isgenerally known to those skilled in the art and, as such, need not bedetailed herein. See, for example, DILIP NAIK, INTERNET STANDARDS ANDPROTOCOLS (1998); JAVA 2 COMPLETE, various authors, (Sybex 1999);DEBORAH RAY AND ERIC RAY, MASTERING HTML 4.0 (1997); and LOSHIN, TCP/IPCLEARLY EXPLAINED (1997), the contents of which are hereby incorporatedby reference.

FIG. 1 illustrates a system for disabling a wireless communicationdevice, according to one embodiment of the invention. As shown, thesystem includes a mock cellular phone tower 100 with a mobile broadcastantenna 102. The mock cellular phone tower 100 and mobile broadcastantenna 102 are coupled to a powered vehicle 104. In addition, the mockcellular phone tower 100 is in communication with a wirelesscommunication device 106, or cellular phone, and a cellular phone tower108.

In operation, the mock cellular phone tower travels to the vicinity ofthe wireless communication device and the cellular phone tower. The mockcellular phone tower generates a signal sufficient to establish itselfas a preferred tower for the wireless communication device and tomaintain that as a substantially exclusive communication channel withthe wireless communication device. The mock cellular phone tower maythen interfere with communication to and from the wireless communicationdevice as desired. Accordingly, the mock cellular phone tower may beused to disable wireless communication devices intended to be used tocause harm during critical moments when damage from the device (such asbut not limited to by means of explosive devices coupled thereto) wouldbe high.

Advantageously, operation of the mock cellular phone tower operatesaccording to the protocol of the wireless device and/or over a controlfrequency known to the wireless device. Accordingly, the device iscomplicit in its own disabling and is not alerted to any problemsbecause it does not detect an undesired change or loss of signal. Thisis advantageous because such could trigger an IED.

FIG. 2 also illustrates a system for disabling a wireless communicationdevice, according to one embodiment of the invention. There isillustrated a cellular phone tower 200, a plurality of cellular phones204, and a mock cellular phone tower 206. As illustrated, the pluralityof cellular phones 204 provide signals to the mock cellular phone tower206, rather than the cellular phone tower 200. The mock cellular phonetower may or may not be aware of each device depending on thecommunication protocols used. For example, where a control protocol mayrely entirely on signal strength, a mock tower may consist of a signalgeneration module sufficient to produce a signal of sufficient strengthand character to cause all cell phones within an effective radius todirect all communication to such tower, even though the tower may haveno reception and/or signal processing capabilities.

In operation of one embodiment of the invention, a mock cellular phonetower 100, 206 is mounted on a powered vehicle 104, such as a bomb squadvehicle. The powered vehicle 104 then transports the mock cellular phonetower 100, 206 to an area threatened by an improvised explosive device(IED). Upon arrival to the area or as a continuous function duringtravel, the mock cellular phone tower 100, 206 mimics a cellular phonetower 108, 200 so that wireless communication devices 106 in the area,such as cellular phones 204, provide signals to the mock cellular phonetower 206, rather than the cellular phone tower 200 or IED, therebypreventing detonation of the IED since the cell phone will either notnotice a change or receive a detonation signal or will ignore it as notcoming from the appropriate tower.

FIG. 3 further illustrates a system for disabling a wirelesscommunication device, according to one embodiment of the invention. Asshown, the system includes a mobile broadcast antenna 300, including asignal capturing module 302. The mobile broadcast antenna 300 may be anyapparatus or system configured to broadcast signals, such as, but notlimited to the method and apparatus for reception of mobile broadcast ofU.S. Patent Application Publication No. 2007/0197174, by Yong-Deok Kim,which is incorporated by reference herein for its supporting teachings.Accordingly, the mobile broadcast antenna 300 may be part of a mockcellular phone tower, which is designed to mimic a cellular phone towersuch as the tree styled monopole tower of U.S. Pat. No. 6,286,266,issued to Popowych et al., which is incorporated by reference herein forits supporting teachings. Furthermore, the mobile broadcast antenna 300may be coupled to a powered vehicle, such as the truck of the method andapparatus for neutralizing improvised explosive devices of U.S. Pat. No.7,296,503, issued to McGrath, which is incorporated by reference hereinfor its supporting teachings.

The signal capturing module 302 is shown to include: an informationreceiving module 304, a signal altering module 306, a signal strengthdetection module 308, and a signal strength difference calculatingmodule 310. The information receiving module 304 may be any apparatus orsystem configured to receive information relevant to satisfaction of thesignal control protocol. For example, the information receiving module304 may receive information, such as, but not limited to, cellular phonetower signal output and/or signal strength. Thus, the informationreceiving module 304 may be such as the wireless communication deviceand signal detection circuit of U.S. Patent Application Publication No.2009/0061780, by Sekiya et al., which is incorporated by referenceherein for its supporting teachings.

The signal altering module 306 may be any apparatus or system configuredto alter a signal of the mobile broadcast antenna 300, such as byincreasing signal strength of the mobile broadcast antenna. As a result,the signal altering module may be such as the apparatus and method forfrequency shifting of a wireless signal and systems using frequencyshifting of U.S. Patent Application Publication No. 2008/0146146, byBinder et al., which is incorporated by reference herein for itssupporting teachings. The signal strength detection module 308 may byany apparatus or system configured to detect signal strengths from otherbroadcast antenna, or other cellular phone towers. Accordingly, thesignal strength detection module 308 may be such as the wirelesscommunication device and signal detection circuit of U.S. PatentApplication Publication No. 2009/0061780, by Sekiya et al., which isincorporated by reference herein for its supporting teachings.

The signal strength difference calculating module 310 is configured tocalculate a desired signal strength difference according to a desiredprotection characteristic. For example, the signal strength differencecalculating module 310 may calculate a difference in signal strengthsbetween the mobile broadcast antenna 300 and other broadcast antennasbased on a desired protection characteristic of the area to beprotected, such as, but not limited to: a protection distance, such asradius; a minimum protection buffer; protocol requirement; period oftime; and the like. For instance, the signal strength differencecalculating module 310 may calculate a difference in broadcast signalstrengths between the mobile broadcast antenna 300 and other broadcastantennas within a radius to be protected from an IED. Advantageously,the mobile broadcast antenna 300 does not have to anticipate frequencychanges as a cellular phone attempts to locate stronger signals and/orcompensate for interference.

In addition, the signal strength difference calculating module 310 maycalculate a minimum protection buffer for providing a buffer byincreasing the strength of a signal of the broadcast antenna 300 tocompensate for any error. For these reasons, the signal strengthdifference calculating module 310 may include features or functions ofU.S. Pat. No. 6,330,450, issued to Wallstedt and Ward, which isincorporated by reference herein for its supporting teachings.Accordingly, the signal capturing module 302 is configured to capture asignal stream from a wireless communication device by providing a signalfrom the mobile broadcast antenna 300 which is stronger and preferableover other broadcasting antenna in a network provision area. Therefore,the signal capturing module 302 captures a signal stream from thewireless communication device by satisfying a signal control protocol.

In addition, the mobile broadcast antenna 300 includes a signal controlprotocol satisfaction module 312. The signal control protocolsatisfaction module 312 is configured to satisfy a signal controlprotocol, such as, but not limited to: providing a signal, providing asignal having the greatest strength and/or repeating a signal to awireless communication device. Hence, the signal control protocolsatisfaction module 312 may be such as the apparatus and method forfrequency shifting of a wireless signal and systems using frequencyshifting of U.S. Patent Application Publication No. 2008/0146146, issuedto Binder et al., which is incorporated by reference herein for itssupporting teachings.

The system is illustrated to further include a signal routing module314. The signal routing module 314 is configured to route signals to andfrom the wireless communication device. For instance, the signal routingmodule 314 may route signals to and from the wireless device accordingto a non-standard protocol, which may override the wirelesscommunication device such as by disabling the device and blockingsignals transmitted to and from the wireless communication device.Accordingly, the signal routing module 314 is shown to include anon-standard protocol disabling module 316, including a signal blockingmodule 318.

Moreover, the non-standard protocol disabling module 316 is configuredto disable the wireless communication device according to a non-standardprotocol, and the signal blocking module 318 is configured to preventthe transmission of signals to and from the wireless communicationdevice. Additionally, the non-standard protocol disabling module 316 mayroute signals according to selectable metadata, such as, but not limitedto: a wireless communication device registration number and/or otheruser information. For these reasons, the signal routing module 314, thenon-standard protocol disabling module 316, and the signal blockingmodule 318, may each include features and functions of the following,which are incorporated by reference herein: U.S. Pat. No. 6,496,703,issued to da Silva; U.S. Pat. No. 6,011,973, issued to Valentine et al.;U.S. Pat. No. 6,085,096, issued to Nakamura; U.S. Pat. No. 6,961,579,issued to Hisamori; and U.S. Pat. No. 6,937,868, issued to Himmel et al.

Finally, the system is shown to include a registration processing module320, with a memory device 322; and a signal information recording module324. The registration processing module 320 is configured to registerthe wireless communication device in a memory device 322. For instance,the registration processing module 320 may be a central processing unit,or CPU, such as the Intel Pentium 4 3.0 GHz Socket 775 CPU, by IntelCorporation of Santa Clara, Calif. Accordingly, the memory device 322may be a USB flash drive, such as the Aluminum 8GB Flash Drive, by GNPSpecialties, Inc., of Nesconset, N.Y. Accordingly, the wirelesscommunication device may be registered in a memory device 322 accordingto selectable metadata, such as, but not limited to: a wirelesscommunication device registration number and/or other user information.

Further, the signal information recording module 324 is configured torecord signal information related to the registered wirelesscommunication device. Hence, the registration processing module 320 andthe signal information recording module 324 may be such as the methodsand systems to meter media content presented on a wireless communicationdevice of U.S. Patent Application Publication No. 2008/0126420, byWright et al., which is incorporated by reference herein for itssupporting teachings. Advantageously, identification, or registration,information of the wireless devices within a signal network may beobtained and recorded. Additionally, the signal routing module 314 mayauthorize certain cellular phones to use full service based inidentification information.

FIG. 4 illustrates a method of disabling a wireless communicationdevice, according to one embodiment of the invention. First, a mobilebroadcast antenna 300 captures 400 a signal stream from the wirelesscommunication device. For example, the mobile broadcast antenna 300 maycapture 400 the signal stream by a transmission of a signal to thewireless communication device which has greater strength and/oravailability than signals provided by other cellular phone towers.

As a result, the mobile broadcast antenna 300 may include a signalcapturing module 302 configured to receive information relevant tosatisfaction of the signal control protocol 402 and to alter a signal ofthe mobile broadcast antenna 408. For instance, the signal capturingmodule 302 may receive information 402, such as signal strength providedby other cellular phone towers, to overpower such signals and therebysatisfy signal control protocol 410. Therefore, the signal capturingmodule 302 also detects signal strengths 404 and calculates signalstrength differences 406 in order to alter a broadcast signal 408 to behigher than the detected signal strengths. In addition, the signalcapturing module calculates a desired signal strength difference 406according to a desired protection characteristic and alters thebroadcast strength of the mobile broadcast antenna 408 to satisfy thedesired signal strength difference 410. For example, the signalcapturing module may calculate 406 according to a protectioncharacteristic such as, but not limited to distance and/or time.Thereby, the mobile broadcast antenna 300 satisfies signal controlprotocol 410.

Then, a signal routing module 314 routes signals to and from thewireless communication device according to a non-standard protocol 412,thereby blocking signals to and from the wireless communication device414 and/or disabling normal operation of the wireless communicationdevice 416. For example, the step of routing signals to and from thewireless communication device according to a non-standard protocol 412may include not retransmitting any signals from the wirelesscommunication device and not sending any externally generated signals tothe wireless communication device, or blocking signals to and from thewireless communication device 414. Also, the method includes:registering the wireless communication device 418; and recording signalinformation related to the registered wireless communication device 420.For example, the wireless communication device may be registered in amemory device in association with selectable metadata 418. Accordingly,the non-standard protocol may route signals according to the selectablemetadata 412.

FIG. 5 illustrates the operation of one embodiment of the invention as asequence diagram. As illustrated, a wireless communication device 500transmits a signal 502, and a cellular phone tower 504 receives andtransmits signals 506. Then, a mobile broadcast antenna 508 satisfies asignal control protocol 510 of the cellular phone tower 504. Next, asignal capturing module 512 of the mobile broadcast antenna 508 capturesthe signal from the cellular phone 502, and satisfies a signal strengthdifference 516 between the cellular phone tower 504 and the mobilebroadcast antenna 508. A signal routing module 518 then disables 520 thesignal from the cellular phone 502. Finally, a signal blocking module522 blocks signals 524 to and from the cellular phone 502.

The following prophetic example illustrates a mode of operation of anembodiment of the invention:

EXAMPLE

In one prophetic example, a bomb squad would arrive on-scene of asuspected IED, and has reason to believe it can be triggered by a cellphone. They turn on the device which boots up, then listens and logsnearby cell phone towers, wireless transmitters, devices, and cellphones gathering information such as signal strength, network protocols,ESNs, and (if possible) location. This information would be displayed ona computer or similar readout. At this point, the MCPT would transmitvia control frequencies at a strong enough strength for the desireddevice/devices to link to it, and be captured within that network. Oncethat occurs the device or cell phone can no longer send or receivecalls, but doesn't register this fact, since to the device it appears tobe connected to a normal/standard network. Additional features couldallow for the user of the MCPT to authorize specific devices to berelayed and connected to a nearby tower and function normally (therebyallowing first responders or specific individuals to retain the abilityto communicate).

From a forensic standpoint, cell phones can be destroyed duringdisarming of IEDs, or if it goes off. Advantageously, by collecting theESN and other data from the phone, the MCPT allows investigators torequest more specific warrants increasing the chances of locating anyonewho had purchased the device or attempted to call or had received callsfrom that phone. It makes a successful apprehension more likely, andlimits the invasion of privacy and considerable man-hours that wouldcome from requesting all phone records from phone towers in an areaduring a specific timeframe. Also, the MCPT only disrupts communicationswithin a limited radius, and is less obtrusive that normal jammers. TheMCPT could also be useful in tactical situations (such as hostagesituations) where law enforcement may wish to control or lock downcommunications within a small area.

Advantageously, an embodiment of the invention may operate withoutalerting the wireless communication device to its function. The wirelessdevice may believe that the mobile tower is “real” or otherwiseauthorized and legitimate. Accordingly, the device may be disabled butunaware. This may prevent unwanted consequences from such devices.

It is understood that the above-described preferred embodiments are onlyillustrative of the application of the principles of the presentinvention. The present invention may be embodied in other specific formswithout departing from its spirit or essential characteristics. Thedescribed embodiment is to be considered in all respects only asillustrative and not restrictive. The scope of the invention is,therefore, indicated by the appended claim rather than by the foregoingdescription. All changes which come within the meaning and range ofequivalency of the claims are to be embraced within their scope.

For example, although the figures illustrate a cellular phone 106, it isunderstood that any wireless signaling device in the art may be used,such as, but not limited to: garage door openers, keyless entries,computers, and personal digital assistants. Similarly, although thefigures show a mock cellular phone tower 102 coupled to a poweredvehicle, it is envisioned that the mock cellular phone tower 102 mayalso be stationary, or at a fixed location. Moreover, it is expectedthat the system and method may capture wireless signals from anywireless signal transmitting device, such as, but not limited to:cellular phones, cellular phone towers, and satellites.

Finally, it is envisioned that the components of the system may beconstructed of a variety of materials. For example, the system mayinclude materials, such as, but not limited to: metal, glass, plastic,rubber, wood, and combinations thereof.

Thus, while the present invention has been fully described above withparticularity and detail in connection with what is presently deemed tobe the most practical and preferred embodiment of the invention, it willbe apparent to those of ordinary skill in the art that numerousmodifications, including, but not limited to, variations in size,materials, shape, form, function and manner of operation, assembly anduse may be made, without departing from the principles and concepts ofthe invention as set forth in the claims. Further, it is contemplatedthat an embodiment may be limited to consist of, or to consistessentially of, one or more of the functions, features, structures,and/or methods described herein.

1. A method of disabling a wireless communication device, comprising the following steps: capturing a signal stream from the wireless communication device by satisfying a signal control protocol using a mobile broadcast antenna; and routing signals to and from the wireless communication device according to a non-standard protocol, thereby disabling normal operation of the wireless communication device.
 2. The method of claim 1, wherein the mobile broadcast antenna includes a signal capturing module configured to receive information relevant to satisfaction of the signal control protocol and to alter a signal of the mobile broadcast antenna.
 3. The method of claim 2, wherein the signal capturing module detects signal strengths from other broadcast antenna and alters a broadcast strength of the mobile broadcast antenna to be higher than the detected signal strengths.
 4. The method of claim 3, wherein the signal capturing module calculates a desired signal strength difference according to a desired protection characteristic and alters the broadcast strength of the mobile broadcast antenna to satisfy the desired signal strength difference.
 5. The method of claim 1, wherein the mobile broadcast antenna is coupled to a powered vehicle.
 6. The method of claim 1, wherein the step of routing signals comprises not retransmitting any signals from the wireless communication device and not sending any externally generated signals to the wireless communication device.
 7. The method of claim 1, wherein the step of routing signals comprises not sending any externally generated signals to the wireless communication device.
 8. The method of claim 1, further comprising the steps of: registering the wireless communication device; and recording signal information related to the registered wireless communication device.
 9. The method of claim 1, further comprising the step of registering the wireless communication device in a memory device in association with selectable metadata.
 10. The method of claim 9, wherein the non-standard protocol routes signals according to the selectable metadata.
 11. A system for disabling a wireless communication device, comprising: a mobile broadcast antenna, configured to broadcast signals, including: a signal capturing module, configured to capture a signal stream from the wireless communication device; and a signal control protocol satisfaction module, in communication with the signal capturing module, configured to satisfy a signal control protocol; and a signal routing module, in communication with the mobile broadcast antenna, configured to route signals to and from the wireless communication device, and including: a non-standard protocol disabling module, configured to disable the wireless communication device according to a non-standard protocol.
 12. The system of claim 11, wherein the signal capturing module includes: an information receiving module, configured to receive information relevant to satisfaction of the signal control protocol; and a signal altering module, in communication with the information receiving module, configured to alter a signal of the mobile broadcast antenna.
 13. The system of claim 12, wherein the signal capturing module includes a signal strength detection module, in communication with the signal altering module, configured to detect signal strengths from other broadcast antenna.
 14. The system of claim 13, wherein the signal capture module includes a signal strength difference calculating module, in communication with the signal altering module, configured to calculate a desired signal strength difference according to a desired protection characteristic.
 15. The system of claim 11, wherein the mobile broadcast antenna is coupled to a powered vehicle.
 16. The system of claim 11, wherein the non-standard protocol disabling module includes a signal blocking module, configured to prevent the transmission of signals to and from the wireless communication device.
 17. The system of claim 11, further comprising: a registration processing module, in communication with the signal routing module, configured to register the wireless communication device in a memory device; and a signal information recording module, in communication with the registration processing module, configured to record signal information related to the registered wireless communication device.
 18. The system of claim 17, wherein the wireless communication device is registered in a memory device in association with selectable metadata.
 19. The system of claim 18, wherein the non-standard protocol disabling module routes signals according to the selectable metadata. 