WO2018128625A1 - Système de commande de dispositif informatique mobile - Google Patents
Système de commande de dispositif informatique mobile Download PDFInfo
- Publication number
- WO2018128625A1 WO2018128625A1 PCT/US2017/012669 US2017012669W WO2018128625A1 WO 2018128625 A1 WO2018128625 A1 WO 2018128625A1 US 2017012669 W US2017012669 W US 2017012669W WO 2018128625 A1 WO2018128625 A1 WO 2018128625A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- control
- span
- access security
- mobile
- enterprise
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/30—Security of mobile devices; Security of mobile applications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/38—Graded-service arrangements, i.e. some subscribers prevented from establishing certain connections
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/30—Security of mobile devices; Security of mobile applications
- H04W12/37—Managing security policies for mobile devices or for controlling mobile applications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/30—Services specially adapted for particular environments, situations or purposes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2207/00—Type of exchange or network, i.e. telephonic medium, in which the telephonic communication takes place
- H04M2207/18—Type of exchange or network, i.e. telephonic medium, in which the telephonic communication takes place wireless networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2242/00—Special services or facilities
- H04M2242/30—Determination of the location of a subscriber
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/60—Context-dependent security
- H04W12/63—Location-dependent; Proximity-dependent
Definitions
- This invention relates to the field of managing the use of cell phones and other mobile devices. More
- the invention comprises a system to restrict, enable or otherwise securely manage cell phones and other mobile device use is span of control areas .
- the system enables creation of building span of control areas where cell phone or other mobile device use is managed. Federal buildings and schools are two places where an enterprise can establish a span of control to manage cell phone or other mobile device use.
- This invention also defines a default parameter to disable cell phone and other mobile device functions when the devices movement exceeds a specified speed regardless of the mode of transportation.
- a first responder override of the movement disable is provided to permit their full use of the device.
- Find my phone is one example of an existing method of identifying the location and movement of a cell phone.
- the present invention comprises a mobile computing device control system for enabling, disabling or otherwise managing cell phone or other mobile computing device use.
- the invention includes access security managers in all cell phones and other mobile computing devices to control device use in a span of control areas based on parameters installed on the device.
- the invention includes stationary beacons installed in buildings and portable beacons positioned in open land areas that establishes a span of control used to
- the invention includes access security controllers used to modify use parameters in cell phone or other mobile devices.
- the invention includes databases that contain user and device
- the invention includes stationary beacons installed in moving vehicles to identify the exact location of the driver and passengers.
- Computers can very efficiently manage device use.
- This invention enables a school administrator to manage student phone use within the school builds.
- This invention provides restriction of mobile computers in various controlled situations .
- the present invention mobile computing device control system enables government, business and individuals to securely manage cell phone or other mobile computing device use.
- the management system is comprised of:
- the smallest span of control is in an automobile such as a car. Trains are larger span of control areas. Buildings are larger span of control areas. Open land areas may be the largest span of control areas . a. Access Security manager
- Use parameters are contained in the access security manager. Default parameters are installed by the manufacturers . Override parameters are installed by licensed technicians using access security controllers and conversational mode authorization with remote databases . h. Access security controller
- the access security controller is an extension of the access security manager.
- Mobile computers such as cell phones and tablets are enabled to be enterprise
- controllers through a direct hardwired connection or a bidirectional pair access.
- the use parameters in a users access security manager can only be changed through an access security controller.
- the controller must be in session with an enterprise database to get the authorization to modify user device parameters c .
- Mobile device control beacons receive and transmit signals used by the access security manager to
- beacons determine the exact location of the device in a span of control.
- the placement of beacons defines a span of control .
- the primary beacon is a fixed location computer such as a desktop or a tablet enclosed in a locked container that is fixed to the building
- Secondary beacons may be any computer such as a cell phone or a simple signal device beacon that io in a lucked fixed container. Licensed technicians install the beacons and establish the span of control . Enterprise employees may be licensed to establish the span of control.
- Primary beacons are smart beacons that send out control parameters. Secondary beacons may just send out timing signals. If the vehicle has a computer installed, the manufacturer may enable the vehicle computer as the primary beacon. d. Enterprise span of control
- An enterprise span of control is used to manage mobile computer use in buildings or open areas.
- Stationary beacons are installed in buildings.
- Stationary or mobile beacons many be installed or positioned in open areas to establish an enterprise span of control.
- a licensed enterprise technician uses an access
- security controller to enter control parameters in primary beacons access security manager.
- the access security manager in their device receives the parameters and responds appropriately .
- An enterprise span of control license is entered in the enterprise and national remote databases .
- a licensed enterprise manager initiates a span of
- the administrators access security controller records the request in the enterprise remote database which compares the request and the license parameters. When the request and licensed parameters match, the enterprise remote database sends an activation code to the enterprise managers electronic address specified in the remote database. The activation code is entered in the enterprise administrator device access security controller which sends acknowledgment to the remote data base. Then the remote database send an unlock to the controller which then sends the approval to the master beacon access security manager.
- conversational mode exchange of request and approval between users and devices is to inhibit unauthorized entry into the enterprise span of control .
- enterprise databases have a public viewable portion that permits users to view the controls being applied to their devices when in the enterprise span of
- An enterprise span of control must be requested, approved and registered in the national database prior to initiation of the enterprise span of control.
- the enterprise database cannot activate a span of control without the prior electronic approval from the national database.
- Enterprise managers may enable a process to guide visitors to specific points or locations in their enterprise facilities .
- a grocery store may use the tool to guide people to specific items in their store. Such as: a consumer may walk into the store and ask their device to guide them to the pickles.
- the Guide Me function shows a list of pickle items and their location. The consumer picks the appropriate item then the location is displayed and an arrow shows the direction of travel to get to the selected item,
- a concert hall may guide people to their seat.
- a hospital may guide people to a room.
- An airport may guide people to passenger pickup or to the closest open parking space nearest to the passenger pickup area.
- To guide to open parking space requires monitoring of parking spaces. e. Modes of transportation span of control
- the default parameter is to disable keyboard and display, except for navigation display, when device movement exceeds some speed greater than average walking speed of 3.5 MFH.
- the exact disable speed and use parameters should be defined by federal law or regulation. If the primary disable default parameters are established as a legal requirement by federal law, there should be no charge to any mobile device owner for installation and activation of those default movement disable
- the access security manager in all cell phones use a combination of cell phone location and motion detection methods .
- the decades old method of triangulation is incorporated to uses cell tower signal to determine the movement speed of the device.
- Passenger override of the motion disable function is through use of the access security manager and beacons installed in vehicles. The exact location of passenger device position in the vehicle is determined which permits the access security manager override of the motion disable. g. First responders enabled to use moving cell phones
- a licensed technician using a direct connected or paired access security controller may perform the override activity.
- the first responders or other approved users devices must have the access security manager
- the technician and the first responder use a secure logon to access their device. Once they are securely known to the devices, they either physically
- the technician enters the override specifications and initiates the request.
- the controller connects through the network to the enterprise database.
- the enterprise database verifies that the first responder has been
- Law Enforcement enterprise span of control Law enforcement enterprise span of control of open areas is similar to enterprise span of control. A span of control area is established with a complex of mobile beacons with access security manager installed. Beacons may be in a law enforcement vehicle or a law
- enforcement officer cell phone or body camera.
- One or more law enforcement officer makes a verbal request for approval to establish a mobile device control area. The request goes through an authorized administrator who has the request entered into a federal law enforcement approved enterprise span of control database.
- the access security manager sends a request through the network to the federal database.
- the database verifies the request matches the prior entered registration and
- authorization then sends an enable command back to the requesting officer device access security manager.
- the law enforcement span of control typically has the beacon vehicles parked. If the beacons are moving, the calculations are more complex.
- the span of control permits tagging all cell phones or other mobile devices in the span of control area.
- Tagged phone are tracked until the authorized
- the tagged device may have all court approved communication monitored and recorded.
- the span of control may enable law enforcement to take driver control of a vehicle with a primary beacon in the vehicle onboard computer and onboard wireless communication.
- a requesting officer may establish communication with a remote control center with
- the law enforcement officer or other appropriate individual is within the enterprise span of control of the target vehicle and has a conversational mode exchanges of vehicle
- the remote driver may operate the vehicle just as the actual person in the driver seat. Once the remote driver is established, the remote driver control remains even if the vehicle moves outside the span of control . All law enforcement remote driver takeover incidents are recorded in the federal database.
- a non-law enforcement enterprise manager may have a limited range takeover of specific vehicles they have legal control over.
- a car dealer or manufacturers may use the remote driver capability to park or retrieve vehicles .
- a parking lot owner may use the remote driver capability within their legal span of control.
- To takeover driver control of a vehicle requires verification of authorization through access security conversational approval with the enterprise and
- the enterprise database contains all enterprise mobile device computing control system management data
- Government and private company databases operate basically the same but they have different levels of authority to change different levels of use parameters .
- a government database may be able to approve disabling all device use in a specific area while a private company database may not be able to turn off voice command to dial 911 or other country emergency number.
- j National and international directory security
- the data in the international database is shadowed and fed from the national databases.
- the information in the national databases is shadowed and fed from the enterprise and Internet services providers databases .
- the national and international databases have a public viewable portion that permits users to view the
- the pubic can access the public portion of the databases to find general information about uses.
- the public information includes but is not limited to Name, phone number, electronic address bit address, physical address and the unique table entry identification number . k. Conversational mode authorization
- Conversational mode authorization among components and users requires separated human input into separated components . Then it requires the conversation between the separate computer components with additional human interaction and the remote database. This separation of users and authorization control components prevents a lone user from attacking a computer. It makes a coordinated attack difficult to complete.
- ⁇ network is essentially an extended system.
- a Local device to other local or remote system/network device A Local device to other local or remote system/network device .
- agreements between system/network components may enable the user to access all approved system/network components without additional legacy Ids and password.
- Bidirectional registration between a local user device and the remote target site or application is through the access security managers .
- a bidirectional access code is recorded at both ends for future access or logical private network connection.
- control systems features could take many forms that do not materially alter the nature of the invention.
- the scope of the invention should be fixed by the following claims rather than any specific examples .
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Telephonic Communication Services (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
L'invention concerne un système de commande de dispositif informatique mobile permettant d'activer, de désactiver ou de gérer autrement un téléphone cellulaire ou un autre dispositif informatique mobile. L'invention comprend des gestionnaires de sécurité d'accès dans tous les téléphones cellulaires et autres dispositifs informatiques mobiles afin de commander l'utilisation du dispositif dans une plage de zones de commande sur la base de paramètres installés sur le dispositif. L'invention comprend des balises fixes installées dans des bâtiments et des balises portables positionnées dans des zones terrestres ouvertes qui établissent une portée de commande utilisée pour identifier l'emplacement exact de dispositifs mobiles dans la portée de la commande. L'invention comprend des dispositifs de commande de sécurité d'accès utilisés pour modifier des paramètres d'utilisation dans un téléphone cellulaire ou autres dispositifs mobiles. L'invention comprend des bases de données qui contiennent des informations d'utilisateur et de dispositif utilisées pour gérer de manière sécurisée des paramètres d'utilisation et autres commandes de dispositif. L'invention comprend des balises fixes installées dans des véhicules en mouvement pour identifier l'emplacement exact du conducteur et des passagers.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/US2017/012669 WO2018128625A1 (fr) | 2017-01-09 | 2017-01-09 | Système de commande de dispositif informatique mobile |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/US2017/012669 WO2018128625A1 (fr) | 2017-01-09 | 2017-01-09 | Système de commande de dispositif informatique mobile |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2018128625A1 true WO2018128625A1 (fr) | 2018-07-12 |
Family
ID=62789569
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2017/012669 WO2018128625A1 (fr) | 2017-01-09 | 2017-01-09 | Système de commande de dispositif informatique mobile |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO2018128625A1 (fr) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060099969A1 (en) * | 2004-11-05 | 2006-05-11 | Houston Staton | Method and system to monitor persons utilizing wireless media |
US20080057942A1 (en) * | 2006-09-05 | 2008-03-06 | Richard Woods | Remote control of wireless communication |
US20090163243A1 (en) * | 2005-09-26 | 2009-06-25 | Barbera Melvin A | Safety Features for Portable Electonic Device |
US20120021717A1 (en) * | 2010-07-24 | 2012-01-26 | Schmidt David A | Speed-Disabled Mobile Phone And Method |
US20120289217A1 (en) * | 2005-09-26 | 2012-11-15 | Zoomsafer Inc. | Safety features for portable electronic device |
-
2017
- 2017-01-09 WO PCT/US2017/012669 patent/WO2018128625A1/fr active Application Filing
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060099969A1 (en) * | 2004-11-05 | 2006-05-11 | Houston Staton | Method and system to monitor persons utilizing wireless media |
US20090163243A1 (en) * | 2005-09-26 | 2009-06-25 | Barbera Melvin A | Safety Features for Portable Electonic Device |
US20120289217A1 (en) * | 2005-09-26 | 2012-11-15 | Zoomsafer Inc. | Safety features for portable electronic device |
US20080057942A1 (en) * | 2006-09-05 | 2008-03-06 | Richard Woods | Remote control of wireless communication |
US20120021717A1 (en) * | 2010-07-24 | 2012-01-26 | Schmidt David A | Speed-Disabled Mobile Phone And Method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11444933B2 (en) | Onboard vehicle digital identification transmission | |
US9424699B2 (en) | Electronic access control and location tracking system | |
US10121370B2 (en) | Comprehensive traffic control system | |
US9100794B2 (en) | Apparatus for and system for enabling a mobile communicator | |
US7590405B2 (en) | Apparatus for enabling a mobile communicator and methods of using the same | |
US9111453B1 (en) | Traffic management server and a traffic recording apparatus | |
US20120130937A1 (en) | Security at a facility | |
US20140371950A1 (en) | Systems and methods for monitoring and managing transportation infrastructure and locations of vehicles therein | |
US10431080B2 (en) | System for locations surveillance by remotely logging surveillance data transmitted by vehicles | |
US20120188054A1 (en) | Remote security entrance application | |
CN101934779A (zh) | 一种智能车辆防盗方法以及系统 | |
US9191880B2 (en) | Wireless communication device management | |
US20240242604A1 (en) | Virtual gate system of connected traffic signals, dynamic message signs and indicator lights for managing traffic | |
CODE | Now Available | |
Gentry | Apple picking: The rise of electronic device thefts in Boston subways | |
WO2018128625A1 (fr) | Système de commande de dispositif informatique mobile | |
US20210133406A1 (en) | Control, monitoring, and/or security, apparatus and method for premises, vehicles, and/or articles | |
US20180020344A1 (en) | Distributed management system for security of remote assets | |
US11312395B2 (en) | Determination of authorizations when approaching locations with an autonomous vehicle | |
US20200250961A1 (en) | Safety assistance on vehicle test ride | |
Geuens et al. | Mandatory implementation for in-vehicle eCall: Privacy compatible? | |
TW201909092A (zh) | 跨社區動態停車管理平台 | |
US20240194009A1 (en) | Method for allowing access to a vehicle and a fleet of vehicles | |
CN117841744A (zh) | 电动车辆充电布置 | |
Hodges | Tracking Bad Guys: Legal Considerations in Using GPS |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 17890154 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 17890154 Country of ref document: EP Kind code of ref document: A1 |