[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN105407210B - Standard mobile communication device distraction prevention and security protocol - Google Patents

Standard mobile communication device distraction prevention and security protocol Download PDF

Info

Publication number
CN105407210B
CN105407210B CN201510605356.2A CN201510605356A CN105407210B CN 105407210 B CN105407210 B CN 105407210B CN 201510605356 A CN201510605356 A CN 201510605356A CN 105407210 B CN105407210 B CN 105407210B
Authority
CN
China
Prior art keywords
protocol
mobile device
specified
trigger signal
specified environment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201510605356.2A
Other languages
Chinese (zh)
Other versions
CN105407210A (en
Inventor
约翰·J·费希尔
海普·阮亚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US12/585,503 external-priority patent/US20100087137A1/en
Application filed by Individual filed Critical Individual
Priority claimed from CN201080040674.4A external-priority patent/CN102483878B/en
Publication of CN105407210A publication Critical patent/CN105407210A/en
Application granted granted Critical
Publication of CN105407210B publication Critical patent/CN105407210B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • H04M1/72409User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories
    • H04M1/72412User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories using two-way short-range wireless interfaces
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72457User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions according to geographic location
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72463User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/021Services related to particular areas, e.g. point of interest [POI] services, venue services or geofences
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • H04M1/72418User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality for supporting emergency services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M2250/00Details of telephonic subscriber devices
    • H04M2250/02Details of telephonic subscriber devices including a Bluetooth interface
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M2250/00Details of telephonic subscriber devices
    • H04M2250/04Details of telephonic subscriber devices including near field communication means, e.g. RFID

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Human Computer Interaction (AREA)
  • Environmental & Geological Engineering (AREA)
  • Telephone Function (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention relates to a standard mobile communication device distraction prevention and security protocol. Methods and systems for providing standardized mobile device distraction prevention and security protocols are disclosed. In particular, embodiments of a method for activating distraction prevention or security protocol behavior in a mobile device when the mobile device satisfies a particular condition are disclosed. The method includes discovering one or more protocol activators configured to transmit discovery information associated with a particular condition. The method also includes activating distraction prevention security protocol behavior in the mobile device based at least in part on the discovery information. In one implementation, the specific condition may be the specified environment itself and/or include an event, i.e., when the mobile device enters the specified environment or when a specified sequence of digits is dialed from the mobile device.

Description

standard mobile communication device distraction prevention and security protocol
The application is a divisional application with the application date of 16.09.2010 and the application number of 201080040674.4, and the invention name of the divisional application is 'standard mobile communication equipment distraction prevention and safety protocol'.
Technical Field
The present invention relates generally to standard mobile phone/mobile device distraction prevention and security protocols. In particular, the present invention relates to the development and standardization of mobile device protocols and protocol sensors for controlling the functionality of mobile communication devices (also known as mobile devices, handsets, smart phones, mobile phones, skype phones, satellite phones, laptops, netbooks, nettablets, etc.). Protocol-enabled sensors are included when a mobile device meets a particular condition, such as entering a specified environment or location or area, and so forth.
Background
The mobile phone/wireless industry has exploded in the past few decades. Mobile devices have become a ubiquitous part of everyday life throughout the world. Rapid development of mobile devices is simply incredible. However, it brings with it a number of major problems that are very socially unfavorable. Each technological advancement and development has certain associated challenges, and cell phones are no exception. Many inherent life threatening problems are rapidly emerging. Such problems include increased accidents from driver distraction caused by mobile devices, increased disruption and cheating in classrooms, increased smuggling, black wall activity and death threats from within the prison system, and the like. These problems have a great expense. For example, the World Health Organization (WHO) estimates that driving with distraction alone costs one to three percentage points of GDP in developed countries.
However, such solutions face impenetrable barriers, such as active laws in various countries, uninstallation of applications, bluetooth shutdown, bluetooth pairing needs, GPS latency and signal failure, a variety of different mobile platforms, continuous updates, closed platforms, battery drain, and inability to affect Skype TM and satellite phones that are readily available to prisoners.
The most important obstacle faced by all solution providers is the lack of standards common within the mobile device industry. Currently, mobile device manufacturers do not have a common platform for developing standard security technologies. Since there is no standard, even simple security features cannot be universally applied among all mobile devices. And since security is a general concern, a solution that can only be applied to a selected mobile device is not preferred. To combat these social problems, there is a profound need to design and implement a universal distraction prevention and security technique for all mobile communication devices.
Because of the hundreds of different handset accessories and models that are combined in open, closed, and partially closed configurations, it is considered impossible to develop a single, simple, comprehensive solution for all mobile phone architectures. Despite such obstacles, the task of effectively implementing security standards and methods for preventing mobile phone distraction to benefit society must be performed in a timely and uninterrupted manner.
In addition, other current obstacles include, but are not limited to, rapid sniffing and connectionless unpaired communications with bluetooth devices, degradation of mobile phone battery life, rapid and easy application disablement.
Furthermore, existing systems and methods provide only partial solutions for a single environment. For example, frequency interference in prisons is illegal in many countries, which prohibits emergency calls and is therefore undesirable for schools and hospitals and the like. Techniques for providing solutions to distracted driving require some form of pairing, which makes automatic widespread application impossible. The pairing dilemma inherently makes each mobile device car ad hoc. For example, even if such a system is installed in a teenager's car, if the teenager drives the parent's car or a sibling car or a friend's car, the mobile application will not work unless an entirely new pairing is used by the particular car. It also raises the problem that new software needs to be uploaded to correspond to the changed system for each system change or system upgrade. Such systems can be confusing to parents and employers when the system is no longer operating properly. Furthermore, parents and employers will not have any working systems available if they happen to purchase a phone with a closed architecture thereby preventing system functionality from being hindered.
there is therefore a need for a simple, cost-effective improvement to mobile communication technology to employ and implement a standard set of security protocols, such that new security enhancement systems and methods for preventing mobile distraction can be readily adopted for all new and existing mobile phones. There is also a need for a simple, cost-effective improvement to bluetooth technology devices to apply a universal set of address codes to work in cooperation with mobile devices that have built-in distraction prevention protocols.
Disclosure of Invention
it is therefore an object of the present invention to provide a set of standard mobile communication device distraction prevention and security protocols to be built into the mobile device firmware (system memory or system image) and to provide various suitable sensors to be universally employed throughout the mobile communication industry for providing security enhancement systems and methods to prevent mobile device distraction.
It is a further object of the present invention to provide a new and useful set of standard bluetooth address codes to work in conjunction with protocol enabled mobile devices and to facilitate communication using the proposed mobile distraction prevention protocol.
It is yet another object of the present invention to provide a security enforcement system that generates a signal visible outside of a vehicle when a driver is operating the vehicle in an unsafe or unlawful manner.
it is another object of the present invention to provide a set of mobile device security protocols to be built into the mobile device firmware for the purpose of simple unified adoption of future security enhancements.
Methods and systems for providing standard mobile communication device security and distraction prevention protocols are disclosed. In one embodiment, a method for activating distraction prevention security protocol behavior in a mobile device when the mobile device satisfies a particular condition is disclosed. The method includes discovering at least one protocol activator configured to transmit discovery information associated with a particular condition. The method also includes activating a security protocol behavior in the mobile device based at least in part on the discovery information. In one implementation, the specific condition corresponds to at least one of two events, namely when the mobile device enters a specified environment and when the mobile device enters or is dialed from the mobile device.
A method of controlling the functionality of a mobile device within a specified environment is disclosed. In one implementation, a method includes broadcasting a trigger signal within a specified environment and determining discovery information associated with the trigger signal and the specified environment. The method also includes implementing a set of protocol instructional behaviors (protocol instructional behavors) in the mobile device based at least in part on the discovery information and the specified environment. Such implementation of a set of protocol mandatory behaviors results in a bound functionality of the mobile device.
A system for implementing security protocols in a mobile device is disclosed. According to an embodiment, a system includes a call authorization module configured to perform a protocol behavior in a mobile device based at least in part on discovery information. One or more sensors in the environment specified by the discovery information transmit and correspond to the specified environment in which the mobile device operates.
A method for controlling the behavior of a mobile device inside a transport vehicle is disclosed. According to one implementation, a method includes activating a sensor configured to broadcast a trigger signal within a predetermined limited range inside a vehicle. The method also includes enforcing protocol behavior in the mobile device based at least in part on the trigger signal. The activation of the sensor is based on the state or position of one or more vehicle components and/or a tilt switch mechanism configured to determine vehicle motion.
a vehicle occupant safety system is disclosed. In one implementation, a system includes: a smart phone including a first computing system for signal processing and a trigger signal transmitter for use by a passenger of the vehicle. The trigger signal transmitter communicates with the second computing system when the passenger is inside the vehicle. The second computing system is configured to control an operational function of the vehicle. The system also includes processing logic associated with the second computing system and for determining when the vehicle is terminating operation and for detecting a signal from the trigger signal transmitter. The detection occurs in such a way that the second computing system is activated to send a distress signal when the passenger has stayed inside the vehicle for a predetermined time after the terminating operation of the vehicle.
a system for enforcement of security protocols is disclosed. In one implementation, a system includes a mobile device configured to communicate with at least one vehicle component inside a transport vehicle to determine unsafe driving based on a safety protocol configured in the mobile device. The system also includes an external vehicle alert signal indicator (WSI) configured to issue a visible alert signal based on the determination made by the mobile device.
A system for implementing a mobile security protocol is disclosed. In one embodiment, a system includes a self-powered bluetooth sensor assembly configured to transmit discovery information without an external power source. The system also includes a mobile device configured to determine and enforce security protocol behavior based on the discovery information. The discovery information corresponds to a name of the self-powered bluetooth sensor and a category of a designated environment in which the self-powered bluetooth sensor operates.
The invention discloses a method for activating a distraction prevention security protocol behavior in a mobile device when the mobile device meets a specific condition, the method comprising:
Discovering at least one protocol activator configured to transmit discovery information associated with the particular condition; and
Activating the distraction prevention security protocol behavior in the mobile device based at least in part on the discovery information.
The specific condition may correspond to at least one of two events, which may be when the mobile device enters a specified environment and when a specified sequence of digits is dialed, respectively.
The discovering may include searching for at least one protocol activator in the specified environment.
The discovery may also include transmitting at least one request to obtain the discovery information.
The discovery information may correspond to a device name and a device class associated with the at least one protocol activator, the device class may inform of the specific condition.
The discovering may further include accessing a look-up table and determining an entry corresponding to the discovery information associated with the particular condition.
The activating may include determining the security protocol behavior corresponding to the discovery information from a look-up table.
The protocol activator may correspond to a pre-standardized bluetooth sensor characterized by a predetermined device name and device class associated with the specified environment.
The designated environment may correspond to at least one of a transport vehicle, a classroom, a correctional facility, an airport, an airplane, a court, a hospital, a church, a movie theater, a flight area, a hazard area, a bedroom, and an auditorium.
the activating can include at least partially disabling at least one functionality associated with the mobile device.
The activation may include collecting additional information associated with a designated workgroup in the designated environment.
The activation may include determining a protocol behavior corresponding to the designated workgroup.
The activating may include issuing an alarm signal when the discovery information corresponds to an illegal or unsafe operation in the designated environment.
The security protocol behavior may correspond to at least partially disabling the functionality of the mobile device.
The at least one protocol activator may correspond to at least one of a bluetooth sensor, a Radio Frequency Identification (RFID) tag reader, an EdOcean sensor, a TransferJet sensor, an ultra-wideband sensor, a UWB sensor, a wireless USB, a DSRC sensor, an IrDAa sensor, a wireless fidelity (WiFi) sensor, a Zigbee sensor, a Near Field Communication (NFC) sensor, and a Wireless Personal Area Network (WPAN) sensor.
The invention also discloses a method of controlling the functionality of a mobile device within a specified environment, comprising:
Broadcasting a trigger signal within the specified environment;
Determining discovery information associated with the trigger signal and the specified environment;
Implementing a set of protocol mandatory behaviors in the mobile device based at least in part on the discovery information and the specified environment, the implementation resulting in a tethered functionality of the mobile device.
The specified environment may correspond to at least one of the following environments: transport vehicles, classrooms, correctional institutions (prisons), airports, airplanes, courtrooms, hospitals, churches, cinemas, flight areas, danger areas, bedrooms and auditoriums.
Broadcasting the trigger signal may include activating at least one sensor based on the actuation mechanism detecting the occurrence of a particular condition.
Determining discovery information may include intercepting the trigger signal being broadcast and identifying at least one of a workgroup and the specified environment.
The implementation may be based on the trigger signal from at least one of the identified workgroup and the specified environment.
The implementation may include determining a set of protocol mandatory behaviors corresponding to at least one trigger associated with a category, a name, an address, and a workgroup.
The implementing may include at least partially disabling the functionality of the mobile device.
The at least one sensor may correspond to at least one of: bluetooth sensors, Radio Frequency Identification (RFID) tag readers, EdOcean sensors, TransferJet sensors, ultra-wideband sensors, UWB sensors, wireless USB, DSRC sensors, IrDAa sensors, wireless fidelity (WiFi) sensors, Zigbee sensors, Near Field Communication (NFC) sensors, and Wireless Personal Area Network (WPAN) sensors.
The protocol instructional behavior may allow for emergency calls to at least one predetermined programmable number.
The functionality may correspond to at least one of: a call function, a short message function, an email function, a social network function associated with the mobile device.
The discovery information may include at least one of: a category, name, address associated with at least one sensor in the specified environment.
The invention also discloses a system for implementing a security protocol in a mobile device, the system comprising:
a call authorization module configured to perform a protocol behavior in the mobile device based at least in part on discovery information associated with a specified environment in which the mobile device operates, the discovery information being transmitted by at least one sensor in the specified environment.
The system may also include a communication module configured to receive discovery information from at least one sensor.
The discovery information may include a device name of the at least one sensor, which may have category information of the specified environment.
The specified environment may correspond to at least one of: transport vehicles, classrooms, correctional institutions, airports, airplanes, courts, hospitals, churches, cinemas, flight areas, danger areas, bedrooms and auditoriums.
the system may also include a security protocol module configured to determine the protocol behavior based at least in part on the discovery information.
The discovery information may correspond to a set of alphanumeric characters.
The at least one sensor may correspond to at least one of: bluetooth sensors, Radio Frequency Identification (RFID) tag readers, EdOcean sensors, TransferJet sensors, ultra-wideband sensors, UWB sensors, wireless USB, DSRC sensors, IrDAa sensors, wireless fidelity (WiFi) sensors, Zigbee sensors, Near Field Communication (NFC) sensors, and Wireless Personal Area Network (WPAN) sensors.
The one or more sensors may correspond to a self-powered bluetooth sensor.
The invention also discloses a method for controlling the functionality of a mobile device inside a transport vehicle, the method comprising:
Activating a sensor configured to broadcast a trigger signal within a predetermined limited range inside the vehicle; and
Implementing a protocol behavior in the mobile device based at least in part on the trigger signal, wherein activation of a sensor is based on a state of a tilt switch mechanism configured to determine vehicle motion.
Implementing the protocol behavior in the mobile device may be performed within a predetermined limited range of the sensor.
The mobile device may correspond only to the mobile device of the driver.
The at least one vehicle component may include a park/emergency brake, a transmission gear assembly, an accelerator, a brake, an odometer, a tachometer, a wheel, a seat belt assembly, an engine component, a steering wheel.
implementing a protocol behavior may include disabling at least one functionality associated with the mobile device.
The disabling of the at least one function may include disabling at least one of call, answer, mailing, browsing, reading, and short messaging functions.
The invention also discloses a vehicle occupant safety system, the system comprising:
A smartphone comprising a first computing system for signal processing;
A trigger signal transmitter for use by a passenger of a vehicle, the trigger signal transmitter in communication with a second computing system when the passenger is in the vehicle, the second computing system configured to control an operational function of the vehicle; and
Processing logic associated with the second computing system and for determining when the vehicle has terminated operation and for detecting a signal from the trigger signal transmitter such that the second computing system can be activated to send a distress signal when the passenger has stayed in the vehicle for a predetermined time after a stopping operation of the vehicle.
The second computer may be configured to detect movement of the vehicle by means of a tilt sensor mounted on the vehicle.
the second computer may be configured to detect motion of the vehicle by determining a state of one or more vehicle components.
At least one of the vehicle components may include a parking brake, a transmission gear, an accelerator, a odometer, a tachometer, a wheel, an engine component, a steering wheel.
The trigger signal transmitter may correspond to a bluetooth sensor.
the invention additionally discloses a system for enforcement of security protocols, the system comprising:
A mobile device configured to communicate with at least one vehicle component inside a transport vehicle to determine unsafe driving based on a safety protocol configured in the mobile device; and
an external vehicle alert signal indicator (WSI) configured to issue a visible alert signal based on the determination made by the mobile device.
The system may also include an Engine Control Unit (ECU) configured to communicate with and control at least one of the vehicle components.
the mobile device may be configured to determine the unsafe driving based on a trigger signal transmitted by a vehicle component.
The vehicle components may include at least a Driver Seat Sensor (DSS) having an RFID transponder tag, a transmission gear detection assembly, a circuit-belt-seatbelt (CSB) assembly, an RFID tag reader.
At least one vehicle component transmits a trigger signal representative of a state that may correspond to a driving mode of the transport vehicle.
The mobile device may be configured to command a Warning Signal Indicator (WSI) to issue at least one visual warning signal external to the vehicle.
The invention also discloses a system for implementing mobile security protocol, comprising:
A self-powered Bluetooth sensor assembly configured to transmit discovery information without an external power source; and
A mobile device configured to determine and implement a security protocol behavior based on the discovery information, wherein the discovery information corresponds to a name of the self-powered Bluetooth sensor and a category of a specified environment in which the self-powered Bluetooth sensor operates.
The self-powered bluetooth sensor assembly may include:
a coil assembly configurable to generate an alternating current signal based on the lateral motion;
A rectifier module electrically connectable with the coil assembly and configurable to rectify the alternating current signal and store power; and
A Bluetooth sensor that may be in electrical communication with the rectifier module and may be configured to obtain power from the rectifier module to transmit the discovery information.
The coil assembly may include a copper wire winding wound in a cylindrical shape and a magnet coaxially placed inside the copper wire winding such that coaxial movement of the magnet inside the copper winding generates an alternating current signal.
the rectifier module may include a supercapacitor configured to store voltage and a battery configured to be charged by an overvoltage on the supercapacitor.
The coaxial movement of the magnet may correspond to a lateral movement of the coil assembly.
To the accomplishment of the foregoing and related ends, the invention may be embodied in the form illustrated in the drawings, attention being called to the fact, however, that the drawings are illustrative only and that changes may be made in the specific construction illustrated.
Drawings
To further clarify the above and other advantages and features of the present invention, a more particular description of the invention will be rendered by reference to specific embodiments thereof which are illustrated in the appended drawings. It is appreciated that these drawings depict only typical embodiments of the invention and are therefore not to be considered limiting of its scope. The invention will be described and explained with additional specificity and detail through the use of the accompanying drawings in which:
FIG. 1 illustrates a system for providing standard mobile device security protocols, according to one embodiment;
FIG. 2 illustrates a block diagram of a mobile device, according to one embodiment;
FIG. 3 illustrates a Bluetooth address code implemented in a Bluetooth sensor in one embodiment;
FIG. 4 illustrates a self-powered Bluetooth sensor assembly in accordance with one implementation;
FIG. 5 illustrates a system for enforcing a security protocol, according to one embodiment;
FIG. 6 illustrates locations of vehicle components, an engine control unit, and a mobile device in a vehicle according to one embodiment;
FIG. 7 illustrates a system for securing a child or vehicle occupant in one embodiment;
FIG. 8 illustrates a method for activating security protocol behavior in a mobile device, according to one embodiment;
Figure 9 illustrates a method of controlling the functionality of a mobile device within a specified environment, according to one embodiment.
fig. 10 illustrates a method for controlling behavior of a mobile device inside a transport vehicle, according to one embodiment.
Detailed Description
As described above, the multiple benefits provided by mobile devices coexist with certain life threatening issues, such as accidents caused by driver distraction, guard breaches in prisons, cheating in classrooms, and so forth. Conventional solutions have proven unsatisfactory due to lack of versatility, simplicity and cost effectiveness. The biggest challenge currently facing in the mobile communications industry is the lack of a standard platform for the development of security protocols that can be implemented in mobile devices from different manufacturers.
to this end, standard security methods and systems are proposed for activating security protocol behavior in a mobile device when the mobile device meets specific conditions. In one embodiment, a method includes discovering at least one protocol activator configured to transmit discovery information associated with a particular condition. The method also includes activating a security protocol behavior in the mobile device based at least in part on the discovery information. In one implementation, the specific condition corresponds to at least one of two events, namely, when the mobile device enters a specified environment and when the mobile device enters a specified number sequence or the specified number sequence is dialed from the mobile device.
The disclosed security protocol behavior allows emergency calls to one or more predetermined or programmable numbers. For example, in any case of a given environment, the security protocols allow for calling a special number during an emergency event, such as "911" in the united states, 112 "in india, and so forth. Such special numbers may be programmed and included as exceptions to the instructional behavior of any protocol.
Fig. 1 illustrates a system 100 for providing standard mobile phone security protocols, according to one embodiment. As shown, the system 100 includes a mobile device 102 that implements a security protocol when the mobile device satisfies a particular condition. Throughout this document, the term "mobile device" may refer to a mobile phone, smart phone, handset, wireless phone, or other similar device that uses the wireless medium to provide calls, short messaging, and the like, over a communication network. Further, for purposes of the ongoing description, the mobile device 102 corresponds to a communication device having a built-in capability to send and receive signals in common with the device's talk/short message frequency band. Possible methods include, but are not limited to, NFC, Bluetooth, WiFi, satellite, Skype, RFID, ZigBee, EdOcean, TransferJet, ultra wideband, UWB, wireless USB, DSRC, IrDAa, and Wireless Personal Area Network (WPAN), among others. For example, the mobile device 102 may be bluetooth enabled, capable of bluetooth transmission and reception.
In one embodiment, the specific condition includes an event such as the mobile device 102 entering a specified environment or dialing a specific sequence of digits from the mobile device.
The particular condition may also correspond to an event such as, but not limited to, an illegal or unsafe operation of the vehicle, an accident, a conflict, use of an airbag in the vehicle, or other condition requiring immediate or timely attention. The proposed standard mobile device security protocol may be implemented such that any set of specific conditions may be included by the standard approval body. While only a few instances of specific conditions have been disclosed, it can be appreciated that the proposed system and method for implementing mobile device security protocols allows for future modifications and/or updates to the specific set of conditions to accommodate future needs of society and law enforcement.
The specified environment includes a transport vehicle, a classroom, a correctional facility, an airport, an airplane, a court, a hospital, a church, a movie theater, a flight area, a danger area, an auditorium, a room in a house, or any other environment for which disabling operational functionality on a mobile device may be desirable.
In an exemplary scenario for a security protocol implementation, a user 104 carries a mobile device 102 and enters a designated environment, such as a prison or hospital (thereby meeting specific conditions). The system 100 includes one or more protocol activators (or "sensors") 106 (e.g., 106a, 106b, and 106c) installed at various locations in a specified environment. In one embodiment, the one or more protocol activators 106 correspond to one or more sensors capable of transmitting and receiving signals, techniques related to, for example, but not limited to, bluetooth sensors, Radio Frequency Identification (RFID) tag readers, EdOcean sensors, TransferJet sensors, ultra-wideband sensors, UWB sensors, wireless USB, DSRC sensors, IrDAa sensors, wireless fidelity (WiFi) sensors, Zigbee sensors, Near Field Communication (NFC) sensors, Wireless Personal Area Network (WPAN) sensors, and the like. It can be appreciated that the mobile device 102 is pre-equipped with such a security and distraction prevention protocol and, in various embodiments, supports communication between the mobile device 102 and the protocol activator 106 within a predetermined communication range. Further, the protocol activator 106 features a predetermined device name or class or address associated with the specified environment.
The mobile device 102 includes a Call Authorization Module (CAM) (also referred to as software instructions, mobile applications, etc.) 108 that coordinates activation of security protocols in the mobile device 102. In an exemplary implementation, the protocol activator 106 transmits discovery information (sends a trigger signal) associated with a specified environment. The discovery information may include a device name or class or address associated with the protocol activator 106. The category of protocol activator 106 provides information about the specified environment. The call authorization module 108 discovers the protocol activator 106 immediately or receives discovery information or a trigger signal from the protocol activator 106 when the mobile device 102 enters the communication range of the protocol activator 106. In an alternative embodiment, in the case where the protocol activator 106 corresponds to a passive sensor, the call authorization module 108 may instruct the mobile device 102 to transmit one or more request signals to obtain additional discovery information.
The CAM108 determines a distraction prevention security protocol behavior corresponding to the discovery information and activates the security protocol behavior in the mobile device 102. The security protocol behavior may correspond to partially or fully enabling or disabling one or more functionalities associated with the mobile device 102. Such functionality may include existing call functionality, short messaging functionality, switching "on" or "off" functionality, silent modes of operation, and so forth. The security protocol behavior may also correspond to a special mode of operation of the mobile device 102, where the mobile device 102 is configured to perform certain functions automatically or not. The specialized mode of operation may correspond to code for predetermined behaviors associated with a specified environment or other specialized actions that the mobile device 102 automatically performs upon the occurrence of a particular condition.
It may be desirable to implement a security protocol in a manner that distinguishes each user based on some identification process or tag. For example, the user may wear an RFID tag 110 that enables the system 100 to identify the user as belonging to a particular workgroup. It is to be appreciated that the user 104 of the mobile device 102 can correspond to different groups of people, such as, but not limited to, intruders, guards, drivers, thieves, or the like. In one implementation, the CAM108 collects additional information associated with a specified workgroup in a specified environment. The workgroup may correspond to a group of persons who are designated to carry mobile devices that may be treated as exceptions to the security protocol behavior. The system 100 allows for the creation of such workgroups that will have privileges even when they carry mobile devices into a specified environment. For example, a guard or officer in a designated environment, such as a prison, may need to use the mobile device 102 in the event of an emergency (in the event of a prison crash, etc.). In such a case, the CAM108, upon identifying the workgroup, may implement the security protocol behavior corresponding to the class of the specified environment and the identified workgroup.
In one implementation, the protocol mandatory behavior implemented in the mobile device 102 allows emergency calls to one or more predetermined or programmable numbers. For example, in any case of a given environment, the security protocols allow for calling a special number during an emergency event, such as "911" in the united states, 112 "in india, and so forth. Such special numbers may be programmed and included as exceptions to the instructional behavior of any protocol. In another embodiment, the security protocol may allow calls to a special number (a parent's number) if the mobile device is carried by a child. The programming of such a special number may be a feature provided by the mobile phone manufacturer or service provider. The security protocol may be configured to accommodate such features.
Fig. 2 illustrates a block diagram of the mobile device 102, according to one embodiment. The mobile device 102 may correspond to any communication device, mobile phone, smart phone, Personal Digital Assistant (PDA), mobile paging device, mobile gaming device, netbook, web tablet, laptop, or computer that provides one or more capabilities for making/receiving calls, sending/receiving short messages or emails, playing video games, and so forth. In a very basic configuration, mobile device 102 typically includes at least one processing unit 202 and system memory 204. Depending on the exact configuration and type of mobile device, system memory 204 may be volatile (such as RAM), non-volatile (such as ROM, flash memory, etc.) or some combination of the two. System memory 204 typically includes an operating system or system image; one or more program modules 206, and may include program data 208. Processor 202 accesses memory 204 to execute instructions or applications stored as program modules 206 to perform one or more predetermined functions. Memory 204 stores the associated data in program data 208.
Program modules 206 include call authorization module 108, query module 210, security protocol module 212, communication module 214, and other modules 216. The program data 208 includes discovery information 218, a look-up table (LUT)220, bluetooth address codes 222, and other data (characteristic values, variables) 224. In addition, mobile device 102 includes a built-in antenna 226. It will be appreciated that the mobile device 102 may have a variety of features available in all modern mobile phones or smart phones. Only a few selected features, functionalities and modules are disclosed in connection with the description. For example, mobile device 102 may also have input device(s) such as a numeric keypad, a stylus or pen, voice input device, touch input device, etc. Output devices such as a display 228, speakers, and the like may also be included. The display 228 may be a liquid crystal display, or any other type of display commonly used in mobile devices. The display 228 may be touch-sensitive and will then act as an input device. Mobile device 102 also includes RFID reader 230 configured to detect and read RFID tags on employee badges worn by a user of mobile device 102. Such devices are well defined in the art and need not be discussed at length here.
The communication module 214 allows the mobile device 102 to communicate with other devices over a network. The communication module 214 is an embodiment of a communication medium. Communication media may typically be embodied by computer readable instructions, data structures, program modules, or other data in a modulated data signal, such as a carrier wave or other transport mechanism, and includes any information delivery media. The term "modulated data signal" means a signal that has one or more of its characteristics set or changed in such a manner as to encode information in the signal. By way of example, and not limitation, communication media includes wired media such as a wired network or direct-wired connection, and wireless media such as acoustic, RF, Bluetooth, Zigbee, Wi-Fi, Skype, satellite, and other wireless media. The term computer readable media as used herein includes both storage media and communication media.
One or more application programs may be loaded into memory 204 and run on an operating system stored in other modules 216. Examples of application programs include telephone dialer programs, mail programs, scheduling programs, PIM (personal information management) programs, word processing programs, spreadsheet programs, Internet browser programs, and so forth. Mobile device 102 also includes non-volatile storage (not shown) within memory 204. Non-volatile storage may be used to store persistent information that should not be lost when the mobile device 102 is powered off/turned off. Applications may use and store information in a storage such as email messages or other messages used by an email application, contact information used by a PIM, appointment information used by a scheduler, documents used by a word processor, and the like. Mobile device 102 includes a power source (not shown), which may be implemented as one or more batteries. The power supply may also include an external power source, such as an ac adapter or powered base that supplements or recharges the batteries.
the mobile device 102 may also include external notification mechanisms, such as LEDs and audio interfaces. Such devices may be directly coupled to a power source such that when activated, they remain on for a duration indicated by the notification mechanism, even though processor 202 and other components may be shut down to conserve battery power. The LED may be programmed to remain activated indefinitely until the user takes action to indicate the powered-on status of the device. The audio interface may be used to provide audible signals to and receive audible signals from a user. For example, the audio interface may be coupled to a speaker for providing audible output and to a microphone for receiving audible input, e.g., to facilitate a telephone conversation.
The communication module 214 performs the functions of transmitting and receiving radio frequency communications. The communication module 214 facilitates wireless connectivity between the mobile device 102 and the outside world through a communications carrier or service provider. Transmissions to and from the communication module 214 may be under the control of an operating system in the other module 216. In other words, communications received by the communication module 214 may be propagated through the operating system to the application programs, and vice versa.
In operation, the Call Authorization Module (CAM)108 manages the enforcement of security protocol behavior when the mobile device 102 meets specific conditions. For example, when the mobile device 102 enters a specified environment, such as a prison, the call authorization module 108 commands the communication module 214 to discover one or more sensors (or protocol activators) 106 disposed at various locations in the specified environment. Depending on the type of sensor employed, the communication module 214 provides the mobile device 102 with the ability to communicate with one or more sensors 106 through bluetooth transmissions or RPID, WiFi, Zigbee, and near field transmissions. It may be noted that each of the one or more sensors 106 may be characterized by a Universally Unique Identifier (UUID), such as a media access control address in the case of a bluetooth sensor. Alternatively, one or more sensors 106 may be standardized to implement a security protocol by assigning specific codes for the device name, device class, and device type that are specified.
As described above, the one or more sensors 106 are configured to transmit a trigger signal in a specified environment. The communication module 214 receives such trigger signals as well as discovery information transmitted by one or more sensors 106. In an alternative embodiment, the query module 210 queries one or more sensors 106 for discovery information. Such a query is convenient in the case of a passive sensor 106. The discovery information corresponds to the device name of the sensor and category information associated with the specified environment. The one or more sensors 106 broadcast discovery information in the form of a set of alphanumeric characters. Each such set will correspond to a specified environment and protocol behavior. Another situation where such queries would be possible is when there are different workgroups with different desired behaviors associated with their mobile devices. In such a case, query module 210 instructs RFID reader 230 to detect and read the RFID tags on the personnel's badge to determine the workgroup. The discovery information is stored in discovery information 218 of program data 208.
Upon receiving the discovery information, the call authorization module 108 is configured to determine protocol behavior in the mobile device 102 based on the discovery information. In one embodiment, the discovery information may include workgroup information in addition to the category of the specified environment. In operation, the CAM108 instructs the security protocol module 212 to determine the protocol behavior corresponding to the received discovery information.
Standard mobile communication device security protocol
Table 1 illustrates an exemplary representation of a set of standard mobile device security and distraction prevention protocols. The workgroup may be standardized and included in the firmware of all mobile devices 102 from different manufacturers. The first column corresponds to code, the second column corresponds to a workgroup, the third column refers to content corresponding to the given code, and the fourth column refers to protocol behavior for the mobile device 102. Consider an example of a typical MAC address: UUID-11: A2:23: FE: 40.
As shown in the table, "11: A2" represents a workgroup, and depending on the content, the corresponding protocol behavior may be selected.
Table 1:
It is desirable that the proposed protocol be applied across all mobile devices in general, and that unregistered and incompatible phones be removed from the system by making them inoperable or non-functional in the network. Accordingly, it is also desirable that all mobile device manufacturers implement software based on the proposed protocol. A state agency or law enforcement agency can select which protocol to activate for all mobile devices entering their particular state. For example, if the device is activated in California and the CAM108 detects the code "11111111," the CAM108 automatically searches to find the code "22222222. If both codes are found by the CAM108, the short messaging and mailing functions of the mobile device may be disabled according to the security protocol specified in Table 1.
It is also desirable that the designated environment in which the security protocol needs to be activated have one or more sensors or protocol activators 106 installed at a significant site. Each such sensor also needs to be standardized as described above to be compatible with the security protocols implemented in the mobile device 102. For example, an automobile manufacturer, school, court, prison, public transportation infrastructure, hospital, etc. may have one or more protocol activators 106 configured to transmit signals according to their suggested protocols and desired behaviors in the mobile device. The designated environment, such as churches and movie theaters, may have one or more sensors 106 configured to transmit according to a clock for periodic services and movies, respectively. A parent may have the child room sensor configured according to a clock for scheduled bedtime that may be different on the night before the school day and on the night before the non-school day.
A typical scenario may be a prohibited function of the mobile device 102 in a prison or classroom where it is desirable not to allow the mobile device to be active. Bluetooth sensors or other transmitters may be strategically placed within the environment to prevent colleagues and students from using their mobile devices. RFID tags built into the employee badge of guards and teachers may allow their phones to be used in separate designated environments.
In another embodiment, the system 100 can be used to ensure the safety of passengers or vehicle occupants other than the driver in a transport vehicle. It may be the case that the vehicle occupant is a child or physically handicapped or disabled person who may need constant attention and attention. In the case where the driver or parent will be sleeping the child forgotten in the vehicle and is an allowed distance from the vehicle, the safety protocol enables the system to notify the parent or driver that the child is still inside the vehicle. As shown in table 1, when the CAM108 interprets the content as "33333333," the child's parent is notified by placing a phone call to the mobile device 102 carried by the parent. The cell phone rings and displays "child left in car" and prevents accidents with sleeping children. A sensor (e.g., a bluetooth transmitter) is attached to the child and communicates with the system.
Bluetooth address code
Since all of the specified environments included in the protocol definition will have one or more protocol activators or sensors, the systems and methods of controlling the functionality of the mobile device 102 may require standardization of a specific set of sensors with respect to their identification. Standardization may involve providing a new and useful set of standard address codes. In the case of an embodiment in which the bluetooth device is employed as a sensor in a specified environment, the MAC address of the bluetooth device serves as a Universally Unique Identifier (UUID). An exemplary address code system is illustrated in fig. 3. As shown, the address code 300 contains 6 bytes (a typical MAC address), with the 1 st byte being the least significant byte and the 6 th byte being the most significant byte. Bytes 1 through 4 represent random binary values that are transmitted to avoid collisions with other bluetooth devices. Bytes 1-4 are not used by the security protocol. Byte 5 represents the type of device (or class of environment specified), depending on the definition in the security protocol. For example, the 5 th byte of bits may correspond to the following device types or specified circumstances as shown below in table 2:
Table 2:
Byte 5 [ b ]8 b7 b6 b5 b4 b3 b2 b1] Protocol device type or specified environment
00000001 Automobile
00000011 Classroom
00000101 Court of law
00001000 Church
00001011 Retention
00000010 Automobile for teenagers
00000100 prison
00000111 Hospital ICU
00001001 Cinema for carrying out the method
00001111 Parents
For example, the Least Significant Bit (LSB) b 1 of the 6 th byte may represent a "unicast" transmission, if the bit value corresponds to a binary 1, and a "multicast" transmission, if the bit value corresponds to a binary 0, as shown in bit value block 302. similarly, the second bit b 2 of the 6 th byte may represent a "globally unique identifier (OUI execute)," if the bit value corresponds to a binary 0, and a "local application" identifier, if the bit value corresponds to a binary 1, as shown in bit value block 304. bits b 3 through b 8 represent mobile phone distraction prevention IDs (binary 0 or 1).
In an alternative embodiment, a six byte long address code (or MAC address) may include a 3 byte long portion dedicated to a Network Interface Controller (NIC) and a 3 byte long Organizationally Unique Identifier (OUI) portion.
In yet another embodiment, there may be instances where the active bluetooth sensor broadcasts the MAC address and/or device name as a trigger signal within defined parameters of the specified environment. In such a case, the protocol-enabled mobile device automatically responds to such a trigger signal based only on the device name, thereby implementing the specified protocol instructions. Appropriate mobile device protocol instructions are performed without requiring pairing.
In yet another embodiment, there may be instances where one or more sensors 106 within the range do not have an identifiable MAC address. In such a case, the query module 210 may issue an additional request to obtain the device name and/or bluetooth class. One or more sensors 106 or other devices within range respond with their corresponding information.
The call authorization module 108 then identifies the received discovery information and implements the corresponding security protocol behavior in such a case, the selectable address code may comprise 6 bytes, as shown in fig. 3. in this selectable address code, bytes 1 through 4 correspond to random binary values issued to avoid collisions with other devices.bits [ b 1 -b 8 ] of the fifth byte represent a security protocol device type name (or designated environment) that will be unique for each device type.
TABLE 3
Device type name Type of equipment (specified Environment) unique number
tsf.car Automobile 9011
tsf.prison Prison 9014
tsf.church Church 9017
tsf.reserved Retention 9023
tsf.teencar Automobile for teenagers 9012
tsf.court court of law 9015
tsf.theatre cinema for carrying out the method 9018
tsf.airbag Accident scene 9019
tsf.school school room 9013
tsf.icu hospital ICU 9016
tsf.parent Children bedroom 9020
tsf.child Children monitor 9021
for example, the Least Significant Bit (LSB) of the 6 th byte may represent a "unicast" transmission, if the bit value corresponds to a binary 1, and a "multicast" transmission, if the bit value corresponds to a binary 0, as shown in bit value block 302. similarly, the second bit of the 6 th byte may represent a "globally unique identifier (OUI execute)," if the bit value corresponds to a binary 0, and a "locally applied" identifier, if the bit value corresponds to a binary 1, as shown in bit value block 304. bits b 3 through b 8 represent mobile phone distraction prevention IDs (binary 0 or 1.) the Bluetooth address codes as exemplified in tables 2 and 3 may be pre-stored in the Bluetooth address code 222 in the program data 208.
Look-up table (LUT)
It may be noted that standard mobile phone security protocols may be implemented using suitable hardware and software modules, application software, an Operating System (OS) and data structures. The exemplary mobile device 102 will have all such functional blocks that will enable the general implementation of a security protocol. Therefore, the proposed protocol is preferably implemented universally; the protocol is preferably adopted as a device manufacturing standard. As a result, all mobile devices from all different manufacturers preferably comply with the standard.
on the other hand, a given environment, such as a prison, school, hospital, transport vehicle, etc., should have the protocol activator 106 at a strategic location for efficient execution of the security protocol. Further, the protocol activator 106 should be standardized according to the proposed address code to work in cooperation with the mobile device 102.
In one embodiment, the set of security protocol behaviors defined by the security protocol is represented by means of a look-up table (LUT) in program data 208 stored in LUT 220. An exemplary LUT is shown in table 4 below.
table 4:
As shown in the LUT, the hexadecimal device name is transmitted by one or more sensors 106 as discovery information. The call authorization module 108 may also instruct the query module 210 to request device names for one or more sensors 106 in the specified environment. Upon receiving the device name, the security protocol module 212 accesses the LUT 220 (e.g., Table 4) and determines a device assignment (device assignment) or a specified context corresponding to the device name. For example, a hexadecimal device name of "07" would correspond to "vehicle 7". The protocol action or action to be taken by the call authorization module 108 would accordingly be to disable the mobile device 102 entirely. Similarly, a hexadecimal device name of "28" would correspond to the device assignment "Hospital 1" and the corresponding protocol behavior would be to mute the mobile device 102. It may be noted that different device assignments correspond to different devices in the same or different designated environments. For example, the hexadecimal device names "14" through "1D" correspond to different sensors employed at various locations in a prison. The hexadecimal device names "46" through "FF" are reserved for future use. Other data 224 includes characteristic values and variables that are initialized during the course of standard mobile device distraction prevention and implementation of security protocols.
self-powered Bluetooth sensor
Figure 4 illustrates components to be used to create a self-powered bluetooth sensor 400 according to one implementation. One of the major challenges faced in the implementation of the security protocol and system 100 is the need to supply power to the bluetooth sensors working in cooperation with the mobile device 102. In existing systems, bluetooth sensors are powered by direct wiring to a power source or simply an alternative battery, which can be time consuming and costly given the versatility of the proposed safety protocol. In conventional systems, there is no simple and cost-effective way to power one or more sensors 106 without having to be hardwired or having to replace batteries. Thus, there is a profound need to develop a self-powered bluetooth sensor that does not require hard wiring or battery replacement.
To this end, the exemplary self-powered bluetooth sensor assembly 400 includes a coil assembly 402. The coil assembly 402 includes a magnet 404 and copper wire windings 406. The magnets 404 are placed coaxially and a winding 406 of copper wire is wound in a tube-shaped stencil and becomes impregnated in a plastic cylindrical tube. The self-powered bluetooth sensor assembly 400 also includes a rectifier module 408 electrically connected to the coil assembly 402. The rectifier module 408 is mounted laterally to harness all of the kinetic energy of the motion through the core. The rectifier module 408 includes an ultra capacitor (ultracapacitor) and a backup battery. The rectifier module 408 is connected to a bluetooth sensor 410 configured to transmit or receive signals. Such bluetooth sensors are able to power themselves for long periods of time without the need for hard wire hooking or battery replacement.
When the bluetooth sensor assembly 400 experiences motion (e.g., from motion caused by acceleration or deceleration of the interior of an automobile, or from motion caused by opening or closing of a door or rotation of a ceiling fan, etc.), the magnet 404 slides inside the coil assembly 402, creating a magnetic field. The expanding and contracting magnetic field creates an alternating voltage that is fed into the rectifier module 408 to be rectified and stored in the supercapacitor. The excess voltage in the supercapacitor is used to charge the backup battery. The output of the rectifier module 408 is a dc voltage that is used to power the bluetooth sensor 410.
security protocol enforcement
In one embodiment, the designated environment may correspond to a transportation vehicle, such as an automobile. Research and statistics have shown that the occurrence of a variety of accidents is a distraction due to the use of mobile devices while driving. The proposed security protocol may be configured to prevent use of the mobile device 102 when the call authorization module 108 senses a driving mode. The manner in which such vehicle security systems function is disclosed in co-pending U.S. patent application No. 12/585,503 and incorporated herein by reference.
Over the years, studies have shown that safety belts save lives and prevent the destruction of lives. In addition, many laws have been enacted requiring the use of safety belts in driving automobiles. In recent years, many studies have disclosed in detail the feared dangers that exist when a driver uses a short messaging and mail function on a mobile phone during driving. Many states are passing laws that prohibit such dangerous cell phone use while operating a vehicle. A major problem of both seat belt law and cell phone law is the inherent difficulty of proper enforcement.
there is no readily ascertainable means of detection or notification of safety officers and other drivers to be warned when the driver is operating the transport vehicle or car in an unsafe or unlawful manner by not having their seat belt or by using the short messaging and email functions on the cell phone while operating the vehicle.
there is therefore a need for a simple cost-effective solution for easily alerting security officers and their drivers of passing drivers of vehicles operating the vehicle in an unsafe or unlawful manner.
To this end, fig. 5 illustrates an apparatus for giving the vehicle owner the ability to force mobile device constraints while allowing others to operate their vehicle. A driver of a vehicle carries a mobile device 502 (one embodiment of the mobile device 102) that implements a safety protocol. The mobile device 502 includes the call authorization module 108 and security protocols that are built in as part of the firmware.
A typical vehicle will have one or more vehicle components that indicate the status of the transport vehicle. Vehicle components may include parking brakes, speed gears, accelerators, brakes, odometers, tachometers, wheels, engine components, and steering wheels or other such components capable of undergoing a change in state or position associated with movement of the vehicle. As will be appreciated by those skilled in the art, such vehicle components will have an associated change in state or position as the vehicle begins to move or reaches a complete stop. Changes in the state or position of vehicle components are sensed and utilized by the CAM108 to control the behavior of the mobile device 502 within the interior of the vehicle. The vehicle component has associated one or more sensors 106 that transmit discovery information, such as status and/or location information or trigger signals.
Turning now to fig. 5, during driving operations of the vehicle, the system 500 prevents a driver of the vehicle from using the mobile device 102, thereby providing greater safety. Accordingly, the system 500 includes a mobile device 502 having the CAM108 and bluetooth communication technologies. The system 500 also includes a Driver Seat Sensor (DSS)504, the Driver Seat Sensor (DSS)504 having an RFID transponder tag built into the driver seat and an RFID tag reader 506 on one side of the driver seat. The system 500 also includes a Circuitized Seat Belt (CSB) assembly 508, a transmission gear position detection assembly (TA)510, and a Warning Signal Indicator (WSI) 512. The transmission gear position detection assembly 510 transmits the shift position or status via the shift transmitter 514. The system 500 may include additional vehicle components, such as an Owner's Compliance Key (OCK), ignition, horn, lights, radio, etc., that are not shown but may be configured to indicate a status or location that enables the system to determine unsafe and illegal driving.
The CAM108 sends and receives signals to and from one or more vehicle components, such as the DSS 504, the derailleur gear position detection assembly 510, the CSB assembly 508, and the WSI 512, to implement safety protocols internal to the vehicle. For example, DSS 504 with an RFID transponder tag invisibly built into the driver's seat area notifies CAM108 that mobile device 502 is in the driver's seat area. The transmission range detection assembly 510 includes a series of magnetic switches strategically placed within the confines of the transmission range device and designed to turn the magnetic field on or off depending on the range in which the vehicle is operating. In the event that the vehicle is brought out of the park position, the circuit will immediately close, sending a notification to the CAM 108.
The CSB assembly 508 includes a belt buckle with circuitry, a belt locking tongue, an anti-cheating harness having an RFID tag and a static RFID tag reader 506 built into it. The anti-cheating CSB circuit becomes complete (or secure) when the locking catch and reed are engaged in the proper locked position and the anti-cheating RFID field is open. The anti-cheating RFID tags built into the harness may extend beyond the static RFID tag reader 506 creating an open field.
WSI 512 corresponds to a visible light, visible antenna, or notification device to be effectively seen by security enforcement officers and passing vehicles.
In operation, when a vehicle driver enters a car, the mobile device 102 with the CAM108 detects the DSS driver's seat sensor 504. Once the driver brings the vehicle transport out of the "parking lot," the transmission gear position detection component 510 sends a notification to the CAM 108. The CAM108 then sends a signal seeking confirmation that the CSB component 508 is properly engaged. In the event that the CSB component 508 is not properly engaged, the WSI 512 is notified, which emits a visible signal to alert security officers and passing vehicles: a driver without a seat belt.
The warning signal continues until the vehicle is placed back into the "parking lot" or the anti-cheating CSB508 becomes fully engaged, as described above. In the event that the CSB component 508 is fully engaged in a pre-specified manner, the CAM108 continues to poll to determine if the driver is short messaging or sending and receiving mail. If the driver is short messaging or sending and receiving mail, the CAM108 notifies the WSI 512, and the WSI 512 sends another overt visible signal to alert security officers and passing vehicles: unsecured or unlawful mobile device usage. After unsafe or illegal handset activity ceases, WSI 512 continues its alarm state for a determined period of time.
The CAM108 determines a violation of a security procedure by reference to a security protocol built into the firmware of the mobile device 502. For example, the safety protocol module 212 includes logic to determine a safety protocol corresponding to the position of the CSB component 508 or the transmission gear position detection component 510. The security protocol module 212 determines the corresponding alert code that the CAM108 sends to the WSI 512. An Engine Control Unit (ECU) in the vehicle may be configured to monitor and communicate with vehicle components and with the CAM108 to enforce the safety protocol.
FIG. 6 illustrates the location of vehicle components, an engine control unit, and a mobile device 502 in a vehicle according to one embodiment. As shown, the WSI 512 may be at a location 602 external to the vehicle such that security officers and other passing vehicles may readily see the alarm signals issued by the WSI 512. WSI 512 may also be employed at multiple locations so that unsafe and unlawful driving of the vehicle may be easily noticed. The mobile device 502 will be at a location 604 near the driver's seat. The ECU may be at a location 606 on the front side of the vehicle chassis. The transmission gear position detection assembly 510 may be at a location 608 proximate to the driver's seat.
In one embodiment, the behavior of the mobile device 102 may be controlled based on the location of the transport vehicle's emergency/parking brake. For example, an automotive safety device system may be installed in a transport vehicle. The vehicle safety device system may be installed in line with the emergency braking system. When the emergency brake of the vehicle is activated, the mobile device in the driver's seat area can be used without any obstruction. When the emergency/parking brake is released, the installed electronic sensor (e.g., emergency brake sensor) will immediately send a trigger signal to the CAM108 to disable the driver's mobile device 102, either fully or partially.
Vehicle occupant safety system
Fig. 7 illustrates a system 700 for securing a child or vehicle occupant in one embodiment. Accordingly, system 700 includes a mobile device 702 (one embodiment of mobile device 102) that is carried by a user 704. The mobile device 702 includes a first computing system for signal processing. The user 704 may be a driver of a car or a parent of a child traveling in a transport vehicle. As shown in the figure, the system 700 also includes a sensor 706 that may be worn by the child or attached to a pressure activated sensor that is activated by the child's weight. In an exemplary embodiment, the sensor 706 may be a bluetooth sensor that transmits discovery information "tsf. The system 700 also includes a second computing system (ECU)708 in communication with the sensors 706 and one or more vehicle components 710. As described above, the vehicle component 710 may correspond to a transmission assembly, a parking brake, and the like. The vehicle component 710 is configured to give an indication of whether the vehicle is parking or being driven. When the vehicle is in driving mode and the child is in the car, the phone receives discovery information including a "tsf. CAM108 marks and activates the child monitoring option as shown in table 3. At the destination, the driver walks away from the vehicle when the vehicle engine is shut down. Car "if the CAM108 does not detect the child sensor 706" tsf. car "at a predetermined time interval, it activates the mobile device 102 to alert the driver that the child is still in the car. When the child is removed from the car, the CAM108 will time out (time out) and reset the child monitoring options.
Exemplary method
A description of the following methods will be provided with specific reference to fig. 1, 2, 3, 4, 5, 6 and 7 and the corresponding description. Fig. 8 illustrates a method 800 for activating security protocol behavior in a mobile device 102, according to one embodiment. The distraction prevention and security protocol actionable behavior of the mobile device will work when specific conditions are met. In one embodiment, the specific condition may correspond to entry into a specified environment. The specified environment may correspond to a classroom, a correctional facility, an airport, an airplane, a court, a hospital, a church, a movie theater, a flight area, a danger area, an auditorium, a bedroom, or any other venue or environment where controlling the behavior of mobile device 102 is desired.
further, the satisfaction of a particular condition may correspond to an event inside the transport vehicle. Such events may include the movement of one or more vehicle components that may indicate the status of the transport vehicle. Vehicle components may include, but are not limited to, parking brakes, transmission gears, accelerators, brakes, odometers, tachometers, wheels, engine components, and steering wheels or other such components capable of undergoing a change in state or position associated with movement of the vehicle. As will be appreciated by those skilled in the art, such vehicle components will have an associated change in state or position as the vehicle begins to move or reaches a complete stop.
The satisfaction of a particular condition may also correspond to the dialing of a designated number sequence or the pressing of a particular speed dial. The particular sequence of numbers may be a predetermined set of numbers indicating the condition of a particular criminal emergency. For example, if the mobile phone receives a threatening call, short message, or email, then immediate action may be automatically taken. The immediate action may correspond to sending contact details (sender's number, email, etc.) to a database for possible criminal action handling. Such automatic action may be configured as a security protocol behavior in the mobile phone 102.
Turning to fig. 8, at block 805, at least one or more protocol activators are discovered. One or more protocol activators 106 are configured to transmit discovery information associated with a particular condition. In one embodiment, the protocol activator may correspond to a pre-standardized bluetooth sensor characterized by a predetermined device name and/or device class associated with the specified environment.
in one embodiment, discovery includes searching for one or more protocol activators in a specified environment. The CAM108 instructs the communication module 214 to search for a protocol activator or sensor 106 in a specified environment. In such implementations, the communication module 214 transmits one or more requests to obtain discovery information from one or more protocol activators 106. The discovery information corresponds to a device name and/or device class of the protocol activator 106 that informs of the specified context. The discovery process also includes accessing a look-up table (LUT), such as table 4, and determining an entry corresponding to discovery information associated with the specified environment.
at block 810, based at least in part on the discovery information, a distraction prevention security protocol behavior is activated in the mobile device. Upon receiving the discovery information, the CAM108 instructs the security protocol module 212 to determine the security protocol behavior corresponding to the discovery information from the LUT. In a sequential process, the CAM108 activates the determined security protocol behavior in the mobile device 102. In one implementation, activating the security protocol behavior includes partially or fully disabling one or more functionalities associated with the mobile device 102. The security protocol behavior corresponds to one or more of: partial or complete disabling of the mobile device, disabling of the short message sending functionality, disabling of the mail sending functionality, disabling of the call functionality, enabling of the security protocol enforcement mode and the child security mode in the mobile device, respectively.
In some cases, it may be desirable to distinguish between different workgroups and implement different sets of protocol behavior for different workgroups. The discovery information may include such information, or CAM108 may instruct RFID reader 230 to gather additional information associated with the designated workgroup in the designated environment. The security protocol module 212 then determines the protocol behavior corresponding to the assigned workgroup, device name, and device class, respectively.
In yet another embodiment, activating includes issuing an alarm signal when the discovery information corresponds to an illegal or unsafe operation in the designated environment. For example, in the case of a transport vehicle, one or more sensors or protocol activators may correspond to various vehicle components that provide status or location information indicating an illegal or unsafe pattern of driving. The driver may ignore the seat belt while driving or may be sending a short message or email. In such an arrangement, the CAM108 issues an alarm to an alarm indicator (WSI)512 upon detection of an unsafe or unlawful pattern. WSI 512 then sends an alarm signal to be seen by security enforcement officers and by passing vehicles.
Fig. 9 illustrates a method 900 of controlling the functionality of a mobile device within a specified environment. Accordingly, at block 905, a trigger signal is broadcast within the specified environment. One or more sensors 106 may be activated by an actuation mechanism that detects the occurrence of a particular condition to send a trigger signal. In one implementation, such an actuation mechanism may be a tilt switch in the case of a transport vehicle.
At block 910, a category associated with the trigger signal and the specified environment is determined. The CAM108 determines the class and workgroup associated with the specified environment from the trigger signal.
At block 915, the set of protocol instructional behaviors are implemented in the mobile device based at least in part on the determined category and/or the specified environment. The CAM implements a set of protocol mandatory behaviors corresponding to the trigger signal, the determined class, and the workgroup. In one embodiment, the implementation includes partially or fully disabling functionality associated with the mobile device 102.
The protocol mandatory behavior allows emergency calls to one or more predetermined or programmable numbers. For example, in any case of a given environment, the security protocols allow for calling a special number during an emergency event, such as "911" in the united states, 112 "in india, and so forth. Such special numbers may be programmed and included as exceptions to the instructional behavior of any protocol.
In another embodiment, the security protocol may allow calls to a special number (a parent's number) if the mobile device is carried by a child. The programming of such a special number may be a feature provided by the mobile phone manufacturer or service provider. The security protocol may be configured to accommodate such features.
Fig. 10 illustrates a method 1000 for controlling behavior of a mobile device inside a transport vehicle in one embodiment. At block 1005, a sensor configured to broadcast a trigger signal within a predetermined limited range inside the vehicle is activated. In one embodiment, the activation is based at least on a state or position of one or more vehicle components and/or tilt switch mechanisms configured to determine vehicle motion. The one or more vehicle components include a parking brake, a transmission gear assembly, an accelerator, a brake, a odometer, a tachometer, a wheel, a seat belt assembly, an engine component, and a steering wheel.
At block 1010, protocol behavior based at least in part on the trigger signal is implemented in the mobile device 102. In one embodiment, the CAM108 implements protocol behavior in the mobile device 102 only within a predetermined limited range of the sensor 106. The protocol behavior enforcement includes disabling one or more functionalities associated with the mobile device. Such functionality includes calling, answering a call, mailing, browsing, reading, messaging, or any other functionality associated with the mobile device 102.
It will be appreciated that the teachings of the present invention may be implemented as a combination of hardware and software. The software is preferably implemented as an application program comprising a set of program instructions tangibly embodied in a computer-readable medium. The application program can be read and executed by hardware having a suitable architecture, such as a computer or processor. Similarly, those skilled in the art will appreciate that any embodiments, functional block diagrams, and the like represent various exemplary functions which may be substantially implemented in a computer-readable medium that may be executed by a computer or processor, whether or not such computer or processor is explicitly shown. The processor may be a Digital Signal Processor (DSP) or any other conventionally used processor capable of executing applications or data stored on a computer readable medium.
An exemplary computer-readable medium may be, but is not limited to, a (random access memory) RAM, a (read only memory) ROM, a (compact disc) CD, or any magnetic or optical storage disk capable of carrying an application program for execution by a machine having a suitable architecture. It will be appreciated that computer-readable media also includes any form of wired transmission. Furthermore, in another implementation, the method according to the invention can be incorporated on a hardware medium using ASIC or FPGA technology.
it will also be appreciated that the claimed subject matter is not limited to various embodiments and/or language employed to discuss the principles of the invention, and that changes may be made to the practice of the claims without departing from the scope. Rather, embodiments of the invention include both structural and functional equivalents thereof.
while certain presently preferred embodiments of the invention and certain presently preferred methods of practicing the invention have been illustrated and described herein, it will be variously understood that the invention is not limited thereto, but may be otherwise variously embodied and practiced within the scope of the following claims.

Claims (16)

1. A method of activating distraction prevention security protocol behavior in a mobile device within a specified environment, the method comprising:
Broadcasting a trigger signal through a protocol activator; and
Including, by the protocol activator, discovery information associated with the specified environment in a broadcast trigger signal, wherein the discovery information related to the trigger signal corresponds to a modifiable universally unique identifying UUID code of the protocol activator, and wherein at least a portion of the modifiable universally unique identifying UUID code identifies at least specified workgroup information in the specified environment in which the protocol activator operates;
Wherein the trigger signal is discovered by the mobile device, the discovery information in the trigger signal from the protocol activator causing activation of the distraction prevention security protocol behavior in the mobile device within the specified environment without establishing a connection pairing between the mobile device and the protocol activator, the protocol behavior based on state laws or promulgation procedures set up by a state or protocol enforcement authority.
2. The method of claim 1, wherein the broadcasting by the protocol activator comprises broadcasting the trigger signal within a predetermined limited range inside the specified environment.
3. The method of claim 1, wherein the modifiable universally unique identifying UUID code associated with the protocol activator provides information of a specific condition, the specific condition comprising the mobile device entering a specified environment.
4. The method of claim 1, wherein the discovery information corresponds to at least one of a device name and a device class associated with the protocol activator, the at least one of the device name and the device class informing of the specified context.
5. The method of claim 1, wherein the protocol activator corresponds to at least one transmitter characterized by a predetermined device name and device class associated with the specified environment.
6. The method of claim 1, wherein the specified environment corresponds to at least one of: transport vehicles, classrooms, correctional institutions, airports, airplanes, courts, hospitals, churches, theaters, flight areas, danger areas, bedrooms and auditoriums.
7. The method of claim 1, wherein broadcasting the trigger signal through the protocol activator comprises activating at least one transmitter based on an actuation mechanism detecting the occurrence of a particular condition, the particular condition comprising the mobile device entering a specified environment.
8. The method of claim 7, wherein the specified environment is within a transport vehicle, and wherein activating the at least one transmitter is based on a status or location of at least one of the transport vehicle components, the activating based on state laws or promulgation procedures set forth by a state or protocol enforcement authority.
9. the method of claim 1, further comprising responding to at least one request to obtain the discovery information.
10. A protocol activator configured to perform the method of claim 1.
11. A method for activating or exempting a decentralized security protocol behavior, which is simultaneously within proximity of at least one protocol transmitter in a mobile device, the method comprising:
Discovering, by the mobile device, a discovery information trigger signal associated with a specified environment transmitted by the at least one protocol transmitter, the discovery information trigger signal corresponding to a modifiable Universally Unique Identification (UUID) code, wherein the modifiable Universally Unique Identification (UUID) code includes a distraction prevention code, wherein at least a portion of the distraction prevention code identifies at least one of:
a specified environment corresponding to a particular distraction prevention security protocol behavior, and
Specified workgroup information in the specified environment, the specified workgroup information corresponding to distracted security protocol behavior operated by the protocol transmitter; and
Activating, by the mobile device, the distraction prevention safety protocol behavior in the mobile device for a workgroup other than a predetermined exception workgroup based on the distraction prevention code in the modifiable universally unique identification UUID code and corresponding to state laws or promulgated procedures set up by state or protocol enforcement authorities; and
Exempting, by the mobile device, the distraction prevention safety protocol behavior in the mobile device for the predetermined workgroup-by-exception at the same time.
12. The method of claim 11, further comprising the at least one protocol transmitter becoming active in response to the mobile device entering a proximity of the at least one protocol transmitter.
13. A mobile device, comprising:
a memory configured to store software instructions in at least one program module;
A processor configured to execute software instructions from the at least one program module in the memory;
Wherein the processor is configured to execute the software instructions in the at least one program module to:
Discovering a discovery information trigger signal associated with a specified environment transmitted by at least one protocol transmitter, the discovery information trigger signal corresponding to a modifiable universally unique identifying UUID code, the modifiable universally unique identifying UUID code including a distraction prevention code, wherein at least a portion of the distraction prevention code identifies at least one of:
A specified environment corresponding to a particular distraction prevention security protocol behavior, and
Specified workgroup information in the specified environment, the specified workgroup information corresponding to distracted security protocol behavior operated by the protocol transmitter; and
activating the distraction prevention security protocol behavior in the mobile device based on the distraction prevention code in the modifiable universally unique identification UUID code and corresponding to state laws or promulgated procedures set up by a state or protocol enforcement authority.
14. The mobile device of claim 13, wherein the processor is configured to execute the software instructions in at least one program module comprising a communications module that discovers the discovery information trigger signal corresponding to the modifiable Universally Unique Identification (UUID) code transmitted by the at least one protocol transmitter.
15. the mobile device of claim 13, wherein the processor is configured to execute the software instructions in at least one program module comprising a call authorization module that activates the distraction prevention security protocol behavior in the mobile device based on the distraction prevention code in the modifiable Universally Unique Identification (UUID) code and corresponding to the state law or the promulgation procedure established by the state or the protocol enforcement agency.
16. A protocol activator for activating protocol behavior in a mobile device within a specified environment, the protocol activator comprising:
A memory configured to store software instructions; and
A processor configured to access the software instructions from the memory;
The processor is configured to access the software instructions from the memory to:
Broadcasting a trigger signal within the designated environment, the trigger signal including discovery information corresponding to a modifiable universally unique identifying UUID code of the protocol activator, wherein at least a portion of the modifiable universally unique identifying UUID code identifies at least one of:
a specified environment in which the protocol activator operates, and
Specified workgroup information in a specified environment in which the protocol activator operates; and
Wherein the discovery information in the trigger signal from the protocol activator causes activation of the protocol behavior in the mobile device within the specified environment.
CN201510605356.2A 2009-09-16 2010-09-16 Standard mobile communication device distraction prevention and security protocol Expired - Fee Related CN105407210B (en)

Applications Claiming Priority (13)

Application Number Priority Date Filing Date Title
US12/585,503 2009-09-16
US12/585,503 US20100087137A1 (en) 2008-10-03 2009-09-16 Vehicle safety system
US27715609P 2009-09-21 2009-09-21
US61/277,156 2009-09-21
US27766409P 2009-09-28 2009-09-28
US61/277,664 2009-09-28
US28328609P 2009-12-02 2009-12-02
US61/283,286 2009-12-02
US28463509P 2009-12-21 2009-12-21
US61/284,635 2009-12-21
US34349010P 2010-04-29 2010-04-29
US61/343,490 2010-04-29
CN201080040674.4A CN102483878B (en) 2009-09-16 2010-09-16 Standard mobile communication device distraction prevention and security protocol

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
CN201080040674.4A Division CN102483878B (en) 2009-09-16 2010-09-16 Standard mobile communication device distraction prevention and security protocol

Publications (2)

Publication Number Publication Date
CN105407210A CN105407210A (en) 2016-03-16
CN105407210B true CN105407210B (en) 2019-12-10

Family

ID=55472451

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510605356.2A Expired - Fee Related CN105407210B (en) 2009-09-16 2010-09-16 Standard mobile communication device distraction prevention and security protocol

Country Status (1)

Country Link
CN (1) CN105407210B (en)

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100426362B1 (en) * 2001-05-22 2004-04-08 엘지전자 주식회사 Method of bell mode automatic restoration of mobile phone using bluetooth technique
CN1458802A (en) * 2003-05-03 2003-11-26 朱广杰 Radio communication terminal and communication network service suitable for juveniles
US20040228460A1 (en) * 2003-05-15 2004-11-18 Cherif Keramane Portable communications devices providing selective inhibition of functionalities and related control devices and methods
KR100719118B1 (en) * 2005-10-27 2007-05-17 삼성전자주식회사 Method and system for limitting a function of device in specific perimeters
US7729689B2 (en) * 2006-07-13 2010-06-01 International Business Machines Corporation Mobile wireless device adaptation based on abstracted contectual situation of user using near-field communications and information collectors

Also Published As

Publication number Publication date
CN105407210A (en) 2016-03-16

Similar Documents

Publication Publication Date Title
US11756419B2 (en) Standard mobile communication device distraction prevention and safety protocols
JP6088005B2 (en) Standard mobile communication device distraction prevention and safety protocol
US7734315B2 (en) Wireless communication device management
US9100813B2 (en) Apparatus and methods for enforcement of policies upon a wireless device
CA2836128A1 (en) Consumer alarm with quiet button
WO2011047304A1 (en) Disabling of services on a communication device
CN105407210B (en) Standard mobile communication device distraction prevention and security protocol
US11023988B2 (en) Method, device, and system for triggering and propagating of a covert mode status change
CN206569043U (en) A kind of vehicle positioning burglary-resisting system
TW201005691A (en) Parking space identification system having self-detection function

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20191210