Methods of Remotely Identifying, Suppressing, Disabling and Access Filtering Wireless Devices of Interest Using Signal Timing and Intercept Receivers to Effect Power Reduction, Minimization of Detection, and Minimization of Collateral Interfernce.
    1.
    发明申请
    Methods of Remotely Identifying, Suppressing, Disabling and Access Filtering Wireless Devices of Interest Using Signal Timing and Intercept Receivers to Effect Power Reduction, Minimization of Detection, and Minimization of Collateral Interfernce. 审中-公开
    使用信号定时和截取接收机远程识别,抑制,禁用和访问过滤无线设备的方法来实现功率降低,检测的最小化和最小化抵抗干扰。

    公开(公告)号:US20090311963A1

    公开(公告)日:2009-12-17

    申请号:US12065225

    申请日:2006-08-29

    Inventor: James D Haverty

    Abstract: Techniques for interfering with communications made according to a wireless standard between a beacon and a wireless device. The techniques determine a characteristic that is required by the standard for a signal produced during the communication. Then an interference signal is generated that is specifically adapted to the characteristic and interferes with the characteristic such that the wireless device and the beacon cannot interact as provided for the communication by the wireless standard. The techniques may be used to suppress legitimate wireless beacons in an operational area, to establish a baiting beacon in the operational area, or to interfere with communications between a wireless device and a baiting beacon or other beacon. The interference signal is specifically adapted to the characteristic in a way that greatly reduces the amount of power required for the interference signal and the conspicuousness of the interference signal.

    Abstract translation: 用于干扰根据信标和无线设备之间的无线标准进行通信的技术。 这些技术确定了在通信期间产生的信号的标准所需的特性。 然后产生特别适合于特性并干扰特性的干扰信号,使得无线设备和信标不能通过无线标准为通信提供交互。 这些技术可以用于抑制操作区域中的合法无线信标,在操作区域中建立诱饵信标,或者干扰无线设备和诱饵信标或其他信标之间的通信。 干扰信号特别适用于特性,大大减少了干扰信号所需的功率量和干扰信号的显着性。

    Methods for identifying wireless devices connected to potentially threatening devices
    2.
    发明授权
    Methods for identifying wireless devices connected to potentially threatening devices 失效
    识别连接到潜在威胁设备的无线设备的方法

    公开(公告)号:US08755770B2

    公开(公告)日:2014-06-17

    申请号:US12538662

    申请日:2009-08-10

    Inventor: James D Haverty

    Abstract: Techniques for determining whether a cellular device is suspect, i.e., perhaps serving as an activator for a device such as a bomb. One way of doing this with cellular telephones that are in the idle state is to use a baiting beacon to bait and automatically call all the cellular telephones in an area that are in the idle state. If the call to a given cellular telephone is not answered by a human voice, the cellular telephone is suspect. Another way of doing this with cellular telephones that are in the traffic state is to use surgical analysis to examine the DTX pattern for the telephone. If it indicates persistent silence, the cellular telephone is suspect. The surgical analysis may also be used to trace the DTX pattern back to another telephone that is controlling the suspect cellular device.

    Abstract translation: 用于确定蜂窝设备是否可疑的技术,即可能用作诸如炸弹的设备的激活器。 使用处于空闲状态的蜂窝电话的一种方法是使用诱饵信标来诱饵并自动呼叫处于空闲状态的区域中的所有蜂窝电话。 如果对给定蜂窝电话的呼叫没有被人的语音应答,那么蜂窝电话是可疑的。 处于交通状态的蜂窝电话的另一种方式是使用手术分析来检查电话的DTX模式。 如果它表示持续的沉默,那么蜂窝电话是可疑的。 手术分析也可以用于将DTX模式跟踪到另一个正在控制可疑蜂窝设备的电话。

    Methods for surreptitious manipulation of CDMA 2000 wireless devices
    3.
    发明授权
    Methods for surreptitious manipulation of CDMA 2000 wireless devices 失效
    CDMA 2000无线设备的隐蔽操纵方法

    公开(公告)号:US08477727B2

    公开(公告)日:2013-07-02

    申请号:US12846633

    申请日:2010-07-29

    Inventor: James D Haverty

    CPC classification number: H04W60/04 H04L63/30 H04W12/02 H04W48/12

    Abstract: Techniques for generating an interloping beacon which can control the behavior of a target wireless device on a CDMA frequency channel without noticeably altering the behavior of non-target wireless devices which share the frequency channel of the target wireless device's live beacon. The interloping beacon is an override beacon which overrides the live beacon's pilot channel and a control message on a code channel on which control messages may be addressed to the target wireless device. The override beacon provides the overriding pilot and the overriding control message only as long as is required for the target wireless device to respond to the overriding control message. The period of time during which the overriding pilot and the overriding control message are generated for the override beacon is so short that only the target wireless device responds without noticeable effect on collateral wireless devices.

    Abstract translation: 用于生成可以控制CDMA频道上的目标无线设备的行为的同步信标的技术,而不会明显地改变共享目标无线设备的实时信标的频道的非目标无线设备的行为。 互屏信标是覆盖实况信标的导频信道的超控信标,以及控制消息可以在其上寻址到目标无线设备的代码信道上的控制消息。 覆盖信标仅在目标无线设备响应于重写控制消息所需的时间内提供重写导频和重写控制消息。 为覆盖信标产生覆盖导频和覆盖控制消息的时间段很短,只有目标无线设备才能对辅助无线设备产生不明显的影响。

    Enhanced methods of cellular environment detection when interoperating with timed interfers
    4.
    发明授权
    Enhanced methods of cellular environment detection when interoperating with timed interfers 有权
    与定时接口进行互操作时,增强蜂窝环境检测的方法

    公开(公告)号:US08767595B2

    公开(公告)日:2014-07-01

    申请号:US12538604

    申请日:2009-08-10

    Inventor: James D Haverty

    CPC classification number: H04K3/65 H04K3/22 H04K3/28 H04K3/45 H04K2203/16

    Abstract: Techniques for performing analysis of a cellular telephone signaling environment in the presence of interferers. The techniques do the analysis by employing a receiver to listen to the cellular environment during holes in the interference. The holes have a timing which differs from that used by the cellular telephone signaling environment and will thus over time overlap with structures of interest in the cellular telephone environment. The holes may be smaller than the structure of interest. The signals which the receiver hears in the holes are analyzed and combined to reproduce the structure. The combination may involve statistical methods and weighted decoding. The analysis obtains information which permits surgical attacks on individual wireless devices which are in the traffic state. Example applications of the techniques are given for the GSM and CDMA cellular telephone standards.

    Abstract translation: 在存在干扰源的情况下执行蜂窝电话信令环境的分析的技术。 这些技术通过在干扰的孔中采用接收机来监听蜂窝环境来进行分析。 这些孔具有与蜂窝电话信令环境使用的时间不同的定时,并且因此将随着时间与蜂窝电话环境中感兴趣的结构重叠。 孔可以小于感兴趣的结构。 接收器在孔中听到的信号被分析并组合以再现结构。 组合可能涉及统计方法和加权解码。 分析获得允许对处于交通状态的各个无线设备进行手术攻击的信息。 给出了GSM和CDMA蜂窝电话标准的技术应用示例。

    Using code channel overrides to suppress CDMA wireless devices
    5.
    发明授权
    Using code channel overrides to suppress CDMA wireless devices 失效
    使用代码通道覆盖来抑制CDMA无线设备

    公开(公告)号:US08526395B2

    公开(公告)日:2013-09-03

    申请号:US12877064

    申请日:2010-09-07

    Inventor: James D Haverty

    Abstract: Techniques for generating an interloping beacon which can control the behavior of a target wireless device on a CDMA frequency channel without noticeably altering the behavior of non-target wireless devices which share the frequency channel of the target wireless device's live beacon. The interloping beacon is an override beacon which overrides the live beacon's pilot channel and a control message on a code channel on which control messages may be addressed to the target wireless device. The override beacon provides the overriding pilot and the overriding control message only as long as is required for the target wireless device to respond to the overriding control message. The period of time during which the overriding pilot and the overriding control message are generated for the override beacon is so short that only the target wireless device responds without noticeable effect on collateral wireless devices.

    Abstract translation: 用于生成可以控制CDMA频道上的目标无线设备的行为的同步信标的技术,而不会明显地改变共享目标无线设备的实时信标的频道的非目标无线设备的行为。 互屏信标是覆盖实况信标的导频信道的超控信标,以及控制消息可以在其上寻址到目标无线设备的代码信道上的控制消息。 覆盖信标仅在目标无线设备响应于重写控制消息所需的时间内提供重写导频和重写控制消息。 为覆盖信标产生覆盖导频和覆盖控制消息的时间段很短,只有目标无线设备才能对辅助无线设备产生不明显的影响。

Patent Agency Ranking