Patents by Inventor James D. Haverty
James D. Haverty has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20150017946Abstract: A system includes an interrogating transceiver that is calibrated using range transceivers. After calibration, the interrogating transceiver may bait cellular devices within a use-prohibited area, identify responding devices, and initiate corrective actions regarding the identified cellular devices.Type: ApplicationFiled: July 3, 2014Publication date: January 15, 2015Inventor: James D. Haverty
-
Publication number: 20150004960Abstract: A system monitors cellular device usage within a use-prohibited area, and either passively detects or actively elicits identity events related to a cellular device within the use-prohibited area and provides the identifying events and any identifying information therein, along with temporal and locational information, to a service provider to determine the identity of the cellular device. Such information can then be used by the service provider to disable service to the cellular device.Type: ApplicationFiled: June 30, 2014Publication date: January 1, 2015Inventor: James D. Haverty
-
Patent number: 8767595Abstract: Techniques for performing analysis of a cellular telephone signaling environment in the presence of interferers. The techniques do the analysis by employing a receiver to listen to the cellular environment during holes in the interference. The holes have a timing which differs from that used by the cellular telephone signaling environment and will thus over time overlap with structures of interest in the cellular telephone environment. The holes may be smaller than the structure of interest. The signals which the receiver hears in the holes are analyzed and combined to reproduce the structure. The combination may involve statistical methods and weighted decoding. The analysis obtains information which permits surgical attacks on individual wireless devices which are in the traffic state. Example applications of the techniques are given for the GSM and CDMA cellular telephone standards.Type: GrantFiled: August 10, 2009Date of Patent: July 1, 2014Assignee: L-3 Communications CorporationInventor: James D Haverty
-
Patent number: 8755770Abstract: Techniques for determining whether a cellular device is suspect, i.e., perhaps serving as an activator for a device such as a bomb. One way of doing this with cellular telephones that are in the idle state is to use a baiting beacon to bait and automatically call all the cellular telephones in an area that are in the idle state. If the call to a given cellular telephone is not answered by a human voice, the cellular telephone is suspect. Another way of doing this with cellular telephones that are in the traffic state is to use surgical analysis to examine the DTX pattern for the telephone. If it indicates persistent silence, the cellular telephone is suspect. The surgical analysis may also be used to trace the DTX pattern back to another telephone that is controlling the suspect cellular device.Type: GrantFiled: August 10, 2009Date of Patent: June 17, 2014Assignee: L-3 Communications CorporationInventor: James D Haverty
-
Patent number: 8606171Abstract: Techniques for detecting wireless devices that are signaling in high proximity to a convoy or other operation and preventing messages from reaching the wireless devices. One class of the techniques uses surgical jamming methodologies that minimize power consumption and collateral interference, while being maximally inconspicuous; another class uses baiting beacons to prevent the messages from reaching the wireless devices. Still another class of techniques denies wireless devices access to a wireless network. An exemplary embodiment applies the techniques to wireless devices and beacons in a GSM network.Type: GrantFiled: March 19, 2012Date of Patent: December 10, 2013Assignee: L-3 Communications CorporationInventor: James D. Haverty
-
Patent number: 8526395Abstract: Techniques for generating an interloping beacon which can control the behavior of a target wireless device on a CDMA frequency channel without noticeably altering the behavior of non-target wireless devices which share the frequency channel of the target wireless device's live beacon. The interloping beacon is an override beacon which overrides the live beacon's pilot channel and a control message on a code channel on which control messages may be addressed to the target wireless device. The override beacon provides the overriding pilot and the overriding control message only as long as is required for the target wireless device to respond to the overriding control message. The period of time during which the overriding pilot and the overriding control message are generated for the override beacon is so short that only the target wireless device responds without noticeable effect on collateral wireless devices.Type: GrantFiled: September 7, 2010Date of Patent: September 3, 2013Assignee: L-3 Communications CorporationInventor: James D Haverty
-
Patent number: 8477727Abstract: Techniques for generating an interloping beacon which can control the behavior of a target wireless device on a CDMA frequency channel without noticeably altering the behavior of non-target wireless devices which share the frequency channel of the target wireless device's live beacon. The interloping beacon is an override beacon which overrides the live beacon's pilot channel and a control message on a code channel on which control messages may be addressed to the target wireless device. The override beacon provides the overriding pilot and the overriding control message only as long as is required for the target wireless device to respond to the overriding control message. The period of time during which the overriding pilot and the overriding control message are generated for the override beacon is so short that only the target wireless device responds without noticeable effect on collateral wireless devices.Type: GrantFiled: July 29, 2010Date of Patent: July 2, 2013Assignee: L-3 Communications CorporationInventor: James D Haverty
-
Publication number: 20120178358Abstract: Techniques for detecting wireless devices that are signaling in high proximity to a convoy or other operation and preventing messages from reaching the wireless devices. One class of the techniques uses surgical jamming methodologies that minimize power consumption and collateral interference, while being maximally inconspicuous; another class uses baiting beacons to prevent the messages from reaching the wireless devices. Still another class of techniques denies wireless devices access to a wireless network. An exemplary embodiment applies the techniques to wireless devices and beacons in a GSM network.Type: ApplicationFiled: March 19, 2012Publication date: July 12, 2012Applicant: L-3 COMMUNICATIONS - ASITInventor: James D. Haverty
-
Patent number: 8140001Abstract: Techniques for detecting wireless devices that are signaling in high proximity to a convoy or other operation and preventing messages from reaching the wireless devices. One class of the techniques uses surgical jamming methodologies that minimize power consumption and collateral interference, while being maximally inconspicuous; another class uses baiting beacons to prevent the messages from reaching the wireless devices. Still another class of techniques denies wireless devices access to a wireless network. An exemplary embodiment applies the techniques to wireless devices and beacons in a GSM network.Type: GrantFiled: March 7, 2007Date of Patent: March 20, 2012Assignee: L-3 Communications CorporationInventor: James D. Haverty
-
Publication number: 20110059689Abstract: Techniques for generating an interloping beacon which can control the behavior of a target wireless device on a CDMA frequency channel without noticeably altering the behavior of non-target wireless devices which share the frequency channel of the target wireless device's live beacon. The interloping beacon is an override beacon which overrides the live beacon's pilot channel and a control message on a code channel on which control messages may be addressed to the target wireless device. The override beacon provides the overriding pilot and the overriding control message only as long as is required for the target wireless device to respond to the overriding control message. The period of time during which the overriding pilot and the overriding control message are generated for the override beacon is so short that only the target wireless device responds without noticeable effect on collateral wireless devices.Type: ApplicationFiled: September 7, 2010Publication date: March 10, 2011Applicant: ComHouse Wireless, LPInventor: James D. Haverty
-
Publication number: 20100309884Abstract: Techniques for generating an interloping beacon which can control the behavior of a target wireless device on a CDMA frequency channel without noticeably altering the behavior of non-target wireless devices which share the frequency channel of the target wireless device's live beacon. The interloping beacon is an override beacon which overrides the live beacon's pilot channel and a control message on a code channel on which control messages may be addressed to the target wireless device. The override beacon provides the overriding pilot and the overriding control message only as long as is required for the target wireless device to respond to the overriding control message. The period of time during which the overriding pilot and the overriding control message are generated for the override beacon is so short that only the target wireless device responds without noticeable effect on collateral wireless devices.Type: ApplicationFiled: July 29, 2010Publication date: December 9, 2010Applicant: ComHouse Wireless. LPInventor: James D. Haverty
-
Publication number: 20100302956Abstract: Techniques for performing analysis of a cellular telephone signaling environment in the presence of interferers. The techniques do the analysis by employing a receiver to listen to the cellular environment during holes in the interference. The holes have a timing which differs from that used by the cellular telephone signaling environment and will thus over time overlap with structures of interest in the cellular telephone environment. The holes may be smaller than the structure of interest. The signals which the receiver hears in the holes are analyzed and combined to reproduce the structure. The combination may involve statistical methods and weighted decoding. The analysis obtains information which permits surgical attacks on individual wireless devices which are in the traffic state. Example applications of the techniques are given for the GSM and CDMA cellular telephone standards.Type: ApplicationFiled: August 10, 2009Publication date: December 2, 2010Applicant: ComHouse Wireless LPInventor: James D. Haverty
-
Publication number: 20100304706Abstract: Techniques for determining whether a cellular device is suspect, i.e., perhaps serving as an activator for a device such as a bomb. One way of doing this with cellular telephones that are in the idle state is to use a baiting beacon to bait and automatically call all the cellular telephones in an area that are in the idle state. If the call to a given cellular telephone is not answered by a human voice, the cellular telephone is suspect. Another way of doing this with cellular telephones that are in the traffic state is to use surgical analysis to examine the DTX pattern for the telephone. If it indicates persistent silence, the cellular telephone is suspect. The surgical analysis may also be used to trace the DTX pattern back to another telephone that is controlling the suspect cellular device.Type: ApplicationFiled: August 10, 2009Publication date: December 2, 2010Applicant: ComHouse Wireless, LPInventor: James D. Haverty
-
Publication number: 20100226308Abstract: Techniques for organizing nodes of an ad hoc broadcast network into sets and employing the sets to arbitrate access by the nodes to a shared communications medium. Each node has a copy of a signal library and the node indicates its membership in the set by associating itself with a signal in the library. In one application, the signals are ranked, the set is a queue, and the node's position in the queue is indicated by the rank of the signal associated with the node. Each node has rules for selecting the next signal. The hidden terminal problem is solved by having each node broadcast its tone and all of the other tones it has heard. The techniques are particularly useful for the broadcast of ephemeral information by the nodes.Type: ApplicationFiled: August 15, 2007Publication date: September 9, 2010Applicant: Comhouse Wireless LPInventor: James D. Haverty
-
Publication number: 20090311963Abstract: Techniques for interfering with communications made according to a wireless standard between a beacon and a wireless device. The techniques determine a characteristic that is required by the standard for a signal produced during the communication. Then an interference signal is generated that is specifically adapted to the characteristic and interferes with the characteristic such that the wireless device and the beacon cannot interact as provided for the communication by the wireless standard. The techniques may be used to suppress legitimate wireless beacons in an operational area, to establish a baiting beacon in the operational area, or to interfere with communications between a wireless device and a baiting beacon or other beacon. The interference signal is specifically adapted to the characteristic in a way that greatly reduces the amount of power required for the interference signal and the conspicuousness of the interference signal.Type: ApplicationFiled: August 29, 2006Publication date: December 17, 2009Inventor: James D Haverty
-
Publication number: 20090209196Abstract: Techniques for detecting wireless devices that are signaling in high proximity to a convoy or other operation and preventing messages from reaching the wireless devices. One class of the techniques uses surgical jamming methodologies that minimize power consumption and collateral interference, while being maximally inconspicuous; another class uses baiting beacons to prevent the messages from reaching the wireless devices. Still another class of techniques denies wireless devices access to a wireless network. An exemplary embodiment applies the techniques to wireless devices and beacons in a GSM network.Type: ApplicationFiled: March 7, 2007Publication date: August 20, 2009Inventor: James D. Haverty
-
Patent number: 6088586Abstract: A cellular signaling system and method uses modified RCC signals or spread spectrum signals in an existing cellular telephone system for signaling a situation, such as an emergency or other cellular telephone communication, or for tracking, e.g. shipments or packages. The signaling system includes one or more modified signal transmitting devices, such as beacons, that transmit modified RCC signals that comply with the frequency spectrum requirements of standard RCC signals used in cellular telephone systems, but cannot be recognized by the existing cellular telephone system, or transmit a spread spectrum signal spread across a number of existing cellular channels. The signaling system further includes a modified signal receiver located at one or more cell sites in the existing cellular telephone system. When the existing cellular receiving device at a cell site does not recognize or understand the modified RCC signal, the modified signal receiver will decode the modified RCC signal.Type: GrantFiled: January 24, 1996Date of Patent: July 11, 2000Assignee: Codem Systems, Inc.Inventor: James D. Haverty