Weitere Artikel dieser Ausgabe durch Wischen aufrufen
In certain environments, the use of mobile phones must be curtailed for the sake of security or out of respect for others. We present a novel method for selectively controlling mobile phone services in such areas using a base station controller and a sequence of detection steps to identify when the mobile device is within the coverage area. A prototype for the method has been developed using commercial off-the-shelf and custom designed hardware and software subsystems. Key components in the prototype system are two directional antennas located at the entry to the controlled area with one antenna facing outwards and the other inwards. By using the proposed detection method, the base station controller is able to detect when a mobile station enters or leaves the controlled area. Experiments using a variety of detection sequences by the two directional antennas and associated white- and blacklists of allowable and disallowed devices, respectively, confirm that the prototype system is able to effectively control the use of mobile devices within the coverage area.
Pinyapong, S., Shoji, H., & Kato, T. (2007). Mobile information service adapted to social, temporal and dynamic situational requirements of individuals. In: Proceedings of 2007 IEEE Asia-Pacific services computing conference, Dec. 2007, pp. 517–520.
Acampora, A., & Naghshineh, M. (1994). Control and quality-of-service provisioning in high-speed microcellular networks. IEEE Personal Communications, 1(2), 36–43. CrossRef
Behairy, H., Alhumaidi, S., Alrobian, W., Alghammas, A., Almansour, I., Dabil, A., et al. (2013). Controlled mobile communication in a socially sensitive environment. USPTO 8346241, Jan. 1, 2013.
Behairy, H., Alhumaidi, S., Alrobian, W., Alghammas, A., Almansour, I., Dabil, A., et al. (2013). Controlled mobile communication as a service. USPTO 8428574, April, 23, 2013.
Efstathiou, E. (2002). The mobile-phone silencers controversy. Athens: Athens University of Economics and Business, Department of Computer Science, Mobile Multimedia Library.
Antonini, G., Orlandi, A., & D’elia, S. (2003). Shielding effects of reinforced concrete structures to electromagnetic fields due to GSM and UMTS systems. IEEE Transactions Magnetics, 39(3), 1582–1585. CrossRef
Mishra, N. (2009). Development of GSM - 900 mobile jammer: An approach to overcome existing limitations of jammers. In Proceedings of 5th IEEE conference on wireless communication and sensor networks (WCSN), Dec. 2009, pp. 1–4.
Abu-Amara, M., & Mahmoud, M. (2008). Method of non-intrusive control of mobile device. USPTO Pub. No.: US 2008/0113657 A1, May 2008.
Hong, J., & Bilstad, A. (2010). Methods for ring tone suppression informing and for informing a cellular telephone with configuration data. USPTO 7668557, Feb. 23, 2010.
Hsu, J. & Regan, R. D. (2013). Controlling device functions of a mobile terminal in a restricted area. USPTO US20130225086 A1, Aug. 29 2013.
3rd Generation Partnership Project 3GPP TS 45.008, Radio subsystem link control, V11.2.0 (2012–08), (Release 11) pp. 20–21.
Behairy, H., Alrobian, W., Alghammas, A., Alsuwayyeh, Y., Alqunaieer, F. (2014). Controlled mobile communication as a service in a coverage area bounded by radiating cables. USPTO Application 20130217376, allowed Feb. 12, 2014.
Behairy, H., Alhumaidi, S., Alrobian, W., Alghammas, A., Almansour, I., Dabil, A., et al. (2013). Selective control of a wireless service associated with a mobile device. USPTO 8417237, Apr. 9, 2013.
- Selective Mobile Communication in Socially Sensitive Environments
Hatim M. Behairy
Waleed S. Alrobian
Adnan A. Alghammas
Brian R. Suter
- Springer US