Patents by Inventor James D. Haverty

James D. Haverty has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20150017946
    Abstract: A system includes an interrogating transceiver that is calibrated using range transceivers. After calibration, the interrogating transceiver may bait cellular devices within a use-prohibited area, identify responding devices, and initiate corrective actions regarding the identified cellular devices.
    Type: Application
    Filed: July 3, 2014
    Publication date: January 15, 2015
    Inventor: James D. Haverty
  • Publication number: 20150004960
    Abstract: A system monitors cellular device usage within a use-prohibited area, and either passively detects or actively elicits identity events related to a cellular device within the use-prohibited area and provides the identifying events and any identifying information therein, along with temporal and locational information, to a service provider to determine the identity of the cellular device. Such information can then be used by the service provider to disable service to the cellular device.
    Type: Application
    Filed: June 30, 2014
    Publication date: January 1, 2015
    Inventor: James D. Haverty
  • Patent number: 8767595
    Abstract: Techniques for performing analysis of a cellular telephone signaling environment in the presence of interferers. The techniques do the analysis by employing a receiver to listen to the cellular environment during holes in the interference. The holes have a timing which differs from that used by the cellular telephone signaling environment and will thus over time overlap with structures of interest in the cellular telephone environment. The holes may be smaller than the structure of interest. The signals which the receiver hears in the holes are analyzed and combined to reproduce the structure. The combination may involve statistical methods and weighted decoding. The analysis obtains information which permits surgical attacks on individual wireless devices which are in the traffic state. Example applications of the techniques are given for the GSM and CDMA cellular telephone standards.
    Type: Grant
    Filed: August 10, 2009
    Date of Patent: July 1, 2014
    Assignee: L-3 Communications Corporation
    Inventor: James D Haverty
  • Patent number: 8755770
    Abstract: Techniques for determining whether a cellular device is suspect, i.e., perhaps serving as an activator for a device such as a bomb. One way of doing this with cellular telephones that are in the idle state is to use a baiting beacon to bait and automatically call all the cellular telephones in an area that are in the idle state. If the call to a given cellular telephone is not answered by a human voice, the cellular telephone is suspect. Another way of doing this with cellular telephones that are in the traffic state is to use surgical analysis to examine the DTX pattern for the telephone. If it indicates persistent silence, the cellular telephone is suspect. The surgical analysis may also be used to trace the DTX pattern back to another telephone that is controlling the suspect cellular device.
    Type: Grant
    Filed: August 10, 2009
    Date of Patent: June 17, 2014
    Assignee: L-3 Communications Corporation
    Inventor: James D Haverty
  • Patent number: 8606171
    Abstract: Techniques for detecting wireless devices that are signaling in high proximity to a convoy or other operation and preventing messages from reaching the wireless devices. One class of the techniques uses surgical jamming methodologies that minimize power consumption and collateral interference, while being maximally inconspicuous; another class uses baiting beacons to prevent the messages from reaching the wireless devices. Still another class of techniques denies wireless devices access to a wireless network. An exemplary embodiment applies the techniques to wireless devices and beacons in a GSM network.
    Type: Grant
    Filed: March 19, 2012
    Date of Patent: December 10, 2013
    Assignee: L-3 Communications Corporation
    Inventor: James D. Haverty
  • Patent number: 8526395
    Abstract: Techniques for generating an interloping beacon which can control the behavior of a target wireless device on a CDMA frequency channel without noticeably altering the behavior of non-target wireless devices which share the frequency channel of the target wireless device's live beacon. The interloping beacon is an override beacon which overrides the live beacon's pilot channel and a control message on a code channel on which control messages may be addressed to the target wireless device. The override beacon provides the overriding pilot and the overriding control message only as long as is required for the target wireless device to respond to the overriding control message. The period of time during which the overriding pilot and the overriding control message are generated for the override beacon is so short that only the target wireless device responds without noticeable effect on collateral wireless devices.
    Type: Grant
    Filed: September 7, 2010
    Date of Patent: September 3, 2013
    Assignee: L-3 Communications Corporation
    Inventor: James D Haverty
  • Patent number: 8477727
    Abstract: Techniques for generating an interloping beacon which can control the behavior of a target wireless device on a CDMA frequency channel without noticeably altering the behavior of non-target wireless devices which share the frequency channel of the target wireless device's live beacon. The interloping beacon is an override beacon which overrides the live beacon's pilot channel and a control message on a code channel on which control messages may be addressed to the target wireless device. The override beacon provides the overriding pilot and the overriding control message only as long as is required for the target wireless device to respond to the overriding control message. The period of time during which the overriding pilot and the overriding control message are generated for the override beacon is so short that only the target wireless device responds without noticeable effect on collateral wireless devices.
    Type: Grant
    Filed: July 29, 2010
    Date of Patent: July 2, 2013
    Assignee: L-3 Communications Corporation
    Inventor: James D Haverty
  • Publication number: 20120178358
    Abstract: Techniques for detecting wireless devices that are signaling in high proximity to a convoy or other operation and preventing messages from reaching the wireless devices. One class of the techniques uses surgical jamming methodologies that minimize power consumption and collateral interference, while being maximally inconspicuous; another class uses baiting beacons to prevent the messages from reaching the wireless devices. Still another class of techniques denies wireless devices access to a wireless network. An exemplary embodiment applies the techniques to wireless devices and beacons in a GSM network.
    Type: Application
    Filed: March 19, 2012
    Publication date: July 12, 2012
    Applicant: L-3 COMMUNICATIONS - ASIT
    Inventor: James D. Haverty
  • Patent number: 8140001
    Abstract: Techniques for detecting wireless devices that are signaling in high proximity to a convoy or other operation and preventing messages from reaching the wireless devices. One class of the techniques uses surgical jamming methodologies that minimize power consumption and collateral interference, while being maximally inconspicuous; another class uses baiting beacons to prevent the messages from reaching the wireless devices. Still another class of techniques denies wireless devices access to a wireless network. An exemplary embodiment applies the techniques to wireless devices and beacons in a GSM network.
    Type: Grant
    Filed: March 7, 2007
    Date of Patent: March 20, 2012
    Assignee: L-3 Communications Corporation
    Inventor: James D. Haverty
  • Publication number: 20110059689
    Abstract: Techniques for generating an interloping beacon which can control the behavior of a target wireless device on a CDMA frequency channel without noticeably altering the behavior of non-target wireless devices which share the frequency channel of the target wireless device's live beacon. The interloping beacon is an override beacon which overrides the live beacon's pilot channel and a control message on a code channel on which control messages may be addressed to the target wireless device. The override beacon provides the overriding pilot and the overriding control message only as long as is required for the target wireless device to respond to the overriding control message. The period of time during which the overriding pilot and the overriding control message are generated for the override beacon is so short that only the target wireless device responds without noticeable effect on collateral wireless devices.
    Type: Application
    Filed: September 7, 2010
    Publication date: March 10, 2011
    Applicant: ComHouse Wireless, LP
    Inventor: James D. Haverty
  • Publication number: 20100309884
    Abstract: Techniques for generating an interloping beacon which can control the behavior of a target wireless device on a CDMA frequency channel without noticeably altering the behavior of non-target wireless devices which share the frequency channel of the target wireless device's live beacon. The interloping beacon is an override beacon which overrides the live beacon's pilot channel and a control message on a code channel on which control messages may be addressed to the target wireless device. The override beacon provides the overriding pilot and the overriding control message only as long as is required for the target wireless device to respond to the overriding control message. The period of time during which the overriding pilot and the overriding control message are generated for the override beacon is so short that only the target wireless device responds without noticeable effect on collateral wireless devices.
    Type: Application
    Filed: July 29, 2010
    Publication date: December 9, 2010
    Applicant: ComHouse Wireless. LP
    Inventor: James D. Haverty
  • Publication number: 20100304706
    Abstract: Techniques for determining whether a cellular device is suspect, i.e., perhaps serving as an activator for a device such as a bomb. One way of doing this with cellular telephones that are in the idle state is to use a baiting beacon to bait and automatically call all the cellular telephones in an area that are in the idle state. If the call to a given cellular telephone is not answered by a human voice, the cellular telephone is suspect. Another way of doing this with cellular telephones that are in the traffic state is to use surgical analysis to examine the DTX pattern for the telephone. If it indicates persistent silence, the cellular telephone is suspect. The surgical analysis may also be used to trace the DTX pattern back to another telephone that is controlling the suspect cellular device.
    Type: Application
    Filed: August 10, 2009
    Publication date: December 2, 2010
    Applicant: ComHouse Wireless, LP
    Inventor: James D. Haverty
  • Publication number: 20100302956
    Abstract: Techniques for performing analysis of a cellular telephone signaling environment in the presence of interferers. The techniques do the analysis by employing a receiver to listen to the cellular environment during holes in the interference. The holes have a timing which differs from that used by the cellular telephone signaling environment and will thus over time overlap with structures of interest in the cellular telephone environment. The holes may be smaller than the structure of interest. The signals which the receiver hears in the holes are analyzed and combined to reproduce the structure. The combination may involve statistical methods and weighted decoding. The analysis obtains information which permits surgical attacks on individual wireless devices which are in the traffic state. Example applications of the techniques are given for the GSM and CDMA cellular telephone standards.
    Type: Application
    Filed: August 10, 2009
    Publication date: December 2, 2010
    Applicant: ComHouse Wireless LP
    Inventor: James D. Haverty
  • Publication number: 20100226308
    Abstract: Techniques for organizing nodes of an ad hoc broadcast network into sets and employing the sets to arbitrate access by the nodes to a shared communications medium. Each node has a copy of a signal library and the node indicates its membership in the set by associating itself with a signal in the library. In one application, the signals are ranked, the set is a queue, and the node's position in the queue is indicated by the rank of the signal associated with the node. Each node has rules for selecting the next signal. The hidden terminal problem is solved by having each node broadcast its tone and all of the other tones it has heard. The techniques are particularly useful for the broadcast of ephemeral information by the nodes.
    Type: Application
    Filed: August 15, 2007
    Publication date: September 9, 2010
    Applicant: Comhouse Wireless LP
    Inventor: James D. Haverty
  • Publication number: 20090311963
    Abstract: Techniques for interfering with communications made according to a wireless standard between a beacon and a wireless device. The techniques determine a characteristic that is required by the standard for a signal produced during the communication. Then an interference signal is generated that is specifically adapted to the characteristic and interferes with the characteristic such that the wireless device and the beacon cannot interact as provided for the communication by the wireless standard. The techniques may be used to suppress legitimate wireless beacons in an operational area, to establish a baiting beacon in the operational area, or to interfere with communications between a wireless device and a baiting beacon or other beacon. The interference signal is specifically adapted to the characteristic in a way that greatly reduces the amount of power required for the interference signal and the conspicuousness of the interference signal.
    Type: Application
    Filed: August 29, 2006
    Publication date: December 17, 2009
    Inventor: James D Haverty
  • Publication number: 20090209196
    Abstract: Techniques for detecting wireless devices that are signaling in high proximity to a convoy or other operation and preventing messages from reaching the wireless devices. One class of the techniques uses surgical jamming methodologies that minimize power consumption and collateral interference, while being maximally inconspicuous; another class uses baiting beacons to prevent the messages from reaching the wireless devices. Still another class of techniques denies wireless devices access to a wireless network. An exemplary embodiment applies the techniques to wireless devices and beacons in a GSM network.
    Type: Application
    Filed: March 7, 2007
    Publication date: August 20, 2009
    Inventor: James D. Haverty
  • Patent number: 6088586
    Abstract: A cellular signaling system and method uses modified RCC signals or spread spectrum signals in an existing cellular telephone system for signaling a situation, such as an emergency or other cellular telephone communication, or for tracking, e.g. shipments or packages. The signaling system includes one or more modified signal transmitting devices, such as beacons, that transmit modified RCC signals that comply with the frequency spectrum requirements of standard RCC signals used in cellular telephone systems, but cannot be recognized by the existing cellular telephone system, or transmit a spread spectrum signal spread across a number of existing cellular channels. The signaling system further includes a modified signal receiver located at one or more cell sites in the existing cellular telephone system. When the existing cellular receiving device at a cell site does not recognize or understand the modified RCC signal, the modified signal receiver will decode the modified RCC signal.
    Type: Grant
    Filed: January 24, 1996
    Date of Patent: July 11, 2000
    Assignee: Codem Systems, Inc.
    Inventor: James D. Haverty