throbber
111111111111111111111111111111111111111111111111111111111111111111111111111
`US005563931A
`[11] Patent Number:
`[45] Date of Patent:
`
`5,563,931
`Oct. 8, 1996
`
`Primary Examiner-Curtis Kuntz
`Assistant Examiner-Michael B. Chernoff
`Attorney, Agent, or Firm-Curtis L. Harrington
`
`[57]
`
`ABSTRACT
`
`The emergency wireless telephone and system describes
`improved control and service offered in the conventional
`public telephone system as pertains to cellular telephone
`service. The system contemplates an emergency wireless
`telephone, with options, including: (1) a method and system
`of alerting the user of a mobile emergency phone without the
`need for keeping the telephone's electronics under power,
`(2) a system which enables the control and responsibility for
`a call to be moved further downstream at a cellular telephone
`switch, by altering the character and use of the mobile
`identification number and by reprogramming the telephone
`switch, (3) establishing a hierarchy for and insuring that the
`identification of the calling party is transmitted, both before
`and after answer supervision is transferred, (4) an fraud
`protection, interactive identification system using a key and
`mathematical operator which both verifies the user's identity
`and eliminates the need for the look-up of the caller's
`telephone or account number, (5) an interactive in phone
`switch which can interactively select between the "A" side
`and "B" side carriers in a given locale, (6) a system which
`can implement a manual call back method of handling
`incoming calls, and (7) a system which enables automatic
`"meet me" handling of incoming calls.
`
`43 Claims, 7 Drawing Sheets
`
`United States Patent [19J
`Bishop et al.
`
`[54] EMERGENCY WIRELESS TELEPHONE AND
`CONTROL SYSTEM, AND METHOD
`
`[75]
`
`Inventors: Ronald D. Bishop, Mission Viejo;
`Vane P. Clayton, Long Beach; Michael
`H. Kreutzer, Santa Ana, all of Calif.;
`Elliott H. Drucker, Kirkland, Wash.
`
`[73] Assignee: SOS Wireless Communications &
`National Dispatch Center, Irvine,
`Calif.
`
`[21] Appl. No.: 291,172
`
`[22] Filed:
`
`Aug. 16, 1994
`
`Int. Cl.6
`
`[51]
`
`.............................. H04Q 7/22; H04Q 7/08;
`H04M 11/04
`[52] U.S. Cl. ................................. 379/59; 379/57; 379/37;
`455/33.1
`[58] Field of Search .................................. 379/58, 59, 57,
`379/61, 369, 370, 433, 38, 39, 37, 66; 455/89,
`90, 33.1; 340/825.44
`
`[56]
`
`References Cited
`
`U.S. PATENT DOCUMENTS
`
`4,658,096
`5,203,009
`5,365,570
`5,388,147
`5,388,148
`
`4/1987 West, Jr ..
`4/1993 Bogusz et al .......................... 455/33.1
`11/1994 Boube1ik ................................... 379/59
`2/1995 Grimes ...................................... 379/58
`2/1995 Seiderman ................................ 379/59
`
`ZONE OFFICE {=;:=====::j
`
`TRUNKS
`(TO PSTN)
`DEDICATED LINKS {--=-------l
`
`31
`33
`
`SWITCH
`MATRIX
`
`PROCESSOR
`
`SUBSCRIBER
`ACCOUNT 1----1
`DATA BASE
`
`PAGING COVERAGE ------------------(cid:173)
`CELLULAR COVERAGE------
`
`Google 1027
`U.S. Patent No. 9,445,251
`
`

`

`47
`
`CENTRAL I.
`
`STATION
`
`45
`
`I PUBLIC
`TELEPHONE
`~ NETWORK
`
`(061)
`
`4J
`
`FIG. I
`
`49
`
`SUBSCRIBER
`ACCOUNT
`DATA BASE.
`
`\. __ j
`...._ _____
`
`___ ;- J J
`
`ZONE OFFICE {
`TRUNKS
`(TO PSTN)
`DEDICATED LINKS
`
`{
`
`.
`
`:
`
`:
`
`'
`
`I
`
`,......--
`
`MTSO J
`
`r-JJ
`
`SWITCH
`MATRIX
`
`:
`
`PROCESSOR
`
`SUBSCRIBER
`DATA BASE I
`
`J5
`
`I
`
`(. /1 I ~-_!:))
`
`I SITE \
`
`1,7
`\ \V"
`
`V\c-37~
`
`J9
`
`d •
`00. •
`~
`~
`"""'"
`
`('0 = """'"
`
`0
`~
`~
`JXJ
`
`....
`\C) =-.
`
`\C)
`
`('!)
`('!)
`
`00. =-
`......
`....
`0
`......,
`'I
`
`Ol
`....
`Ol
`~ w
`....
`\C w
`
`~
`
`

`

`U.S. Patent
`
`Oct. 8, 1996
`
`Sheet 2 of 7
`
`5,563,931
`
`FIG.2
`
`8
`0/E
`SPARE
`
`2
`3
`
`n
`
`7
`
`l 5
`
`l 4
`
`l 3
`
`l 2
`
`I 1
`
`I 6
`NATURE OF ADDRESS INDICATOR
`RESERVED
`NUMBERING PLAN
`1ST ADDRESS SIGNAL
`2nd ADDRESS SIGNAL
`
`. . .
`
`FILLER (IF NECESSARY)
`
`nth ADD.RESS SIGNAL
`
`FIG .3
`
`Q
`
`A1
`
`81
`
`~
`
`AS
`A4
`A3
`A2
`FIXED LOGIC ARRAY
`82
`84
`85
`83
`~
`
`~
`
`A6
`
`86
`
`~
`
`L.,
`
`~ SHIFT CLOCK
`
`-
`
`COUNTER
`
`

`

`U.S. Patent
`
`Oct. 8, 1996
`
`Sheet 3 of 7
`
`5,563,931
`
`FIG. 4
`
`FIG. 5
`
`~
`I 75
`1--1 /
`,..._
`
`.\
`
`~ -
`
`-
`
`- ~
`
`?=-
`
`v 61
`
`If:::
`-
`
`~ CALL~
`
`-
`
`HELP)
`
`6'5
`
`v
`
`/
`
`63
`
`DIRECTORY
`NUMBERS
`9.
`10.
`11 .
`
`12.
`13.
`
`14.
`
`15.
`
`16.
`
`1.
`2.
`
`3.
`
`4.
`5.
`
`6.
`
`7.
`8.
`
`0
`
`\.
`

`
`6'3 ~----------~
`"'
`
`DIRECTORY
`NUMBERS
`9.
`
`10.
`11.
`
`i12.
`13.
`-·· 14.
`
`,15.
`
`j16.
`
`1.
`2.
`
`3.
`
`4.
`5.
`
`6.
`7.
`8.
`
`77---r--+-
`
`71
`
`

`

`U.S. Patent
`
`Oct. 8, 1996
`
`Sheet 4 of 7
`
`5,563,931
`
`FIG. 58
`
`FIG. 5C
`
`0
`
`0
`
`0
`
`.. .. .. ..
`
`

`

`U.S. Patent
`
`Oct. 8, 1996
`
`Sheet 5 of 7
`
`5,563,931
`
`FIG. 6
`
`FIG. 7
`
`63
`
`65
`
`81
`
`CD CD (I)
`CD CD CD
`CD CD CD
`CD CD CD
`
`81
`
`CD CD o:J
`CD CD CD
`CD CD CD
`CD CD OD
`
`

`

`U.S. Patent
`
`Oct. 8, 1996
`
`Sheet 6 of 7
`
`5,563,931
`
`FIG 8
`
`•
`
`r 81
`
`KEYPAD
`
`r8.J
`I INITIATE CALL
`I
`I
`liN IT. EMERG CALL ~
`'-....95
`
`~
`
`r87
`
`EWT CIRCUIT
`
`r7.
`
`: PAGER CKT l
`
`r89
`MANCHESTER MODEM
`
`FIG. 9
`.. -87
`_,...--------- - - - - - - - - - ----------- - - - - - -----··- --~- ___ _/ ___ .......
`91
`
`\
`
`I
`
`MOBILE I.D. + PROGRAM
`
`i
`\
`
`, _______________________________________________ /
`
`I
`
`

`

`FIG. 10
`
`ZONE OFFICE {
`TRUNKS
`(TO PSTN) - - - - - l
`DEDICATED LINKS{ ____ ---!
`
`31
`
`33
`
`SWITCH
`MATRIX
`
`PROCESSOR
`
`~--­
`
`/~
`_,.~
`
`,/"/"
`
`//
`I '
`
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`
`'-,, ,,
`" \
`
`CENTRAL
`STATION 1
`
`49
`
`SUBSCRIBER!
`ACCOUNT
`-
`DATA BASE
`
`45
`r---.___......__,
`PUBLIC
`TELEPHONE
`.,I NETWORK 1-----------,
`
`{061)
`
`43
`
`51
`1.----! ~·II
`· CRT
`•
`
`97
`
`\
`
`NATIONWIDE
`PAGING SYSTEM
`
`' \
`\ ' ' " ' ', ______ _
`
`61
`
`71
`
`I
`
`/
`
`/
`
`.... ~""""~----"'
`
`PAGING COVERAGE ------------------(cid:173)
`CELLULAR COVERAGE-----------
`
`e •
`
`00
`•
`~
`~
`f""''(cid:173)
`
`~ = f""''-
`
`0
`~
`:-"
`... ~
`
`)oooo"
`\C
`\C
`=:!'\
`
`00.
`::r'
`!'!)
`.....
`!'!)
`.....:J
`~
`.....:J
`
`01
`\e 01
`Q\
`tH
`\C
`tH
`~
`
`\e
`
`\ ' I
`
`I
`\
`\
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`J
`I
`
`

`

`5,563,931
`
`1
`EMERGENCY WIRELESS TELEPHONE AND
`CONTROL SYSTEM, AND METHOD
`
`FIELD OF THE INVENTION
`
`5
`
`The present invention relates to the field of electronic
`communication systems devices and methods. More specifi(cid:173)
`cally, the present invention relates to a system which facili(cid:173)
`tates the introduction of an emergency wireless telephone,
`eliminating many of the disadvantages of standard wireless
`phones and their associated large capacity demands on a
`system. Even more specifically, the invention relates to (1)
`a method and system of alerting the user of a mobile
`emergency phone without the need for keeping the tele(cid:173)
`phone's electronics under power, (2) a system which enables
`the control and responsibility for a call to be moved further
`downstream at a cellular mobile telephone switch, by alter(cid:173)
`ing the character and use of the mobile identification number
`and by re-programming the cellular mobile telephone
`switch, (3) establishing a hierarchy for and insuring that the
`identification of the calling party is transmitted, both before
`and after answer supervision is transferred, (4) an fraud
`protection, interactive identification system using a key and
`mathematical operator which both verifies the user's identity
`and eliminates the need for the look-up of the caller's
`telephone or account number, (5) an interactive in phone
`switch which can interactively select between the "A" side
`and "B" side carriers in a given locale, (6) a system which
`can implement a manual call back method of handling 30
`incoming calls, and (7) a system which enables automatic
`"meet me" handling of incoming calls.
`
`25
`
`2
`Parameters which had to be settled on included spectrum
`allocation, digital signalling and control, the geographical
`subdivisions from which radio control is accomplished,
`commonly known as cell sites, and the allocation and use of
`frequency control channels for message carrying capability.
`The original cellular spectrum allocation was for a total of
`40 MHz, with 20 MHz providing service in each direction
`between the base station and the mobile station. A total of
`666 channels, each 30 KHz wide, were designated for each
`10 direction. The channels were divided equally into two com(cid:173)
`peting bands. These bands were the A band, also known as
`the "non-wireline" band, and the B band, also known as the
`"wireline" band. The original intent was that in each market,
`the local exchange carrier (which was publicly regulated)
`15 would be granted a license for the B band, while the A band
`would be granted to a private business on the basis of
`competitive application.
`As time progressed, and with the break-up of the smaller
`telephone carriers, the A band and the B band have devel-
`20 oped into competing systems. Each may have its own
`commercial carrier associated with a city served by a cel(cid:173)
`lular system. Further, the service level and rate structure
`offered by the A band and B band carriers will typically be
`quite different. Current cellular phone systems do not allow
`for the automatic selection of, or change in the selection of
`a particular carrier band.
`If such a selective change were possible, flexibility of
`operation would occur. Whole groups of users of a certain
`type could switch between the two types of cellular carriers,
`and thus the carriers would begin to behave more competi(cid:173)
`tively. Unfortunately, the lack of the ability to easily switch
`back and forth is a major shortcoming of conventional
`cellular technology.
`As will be shown, conventional cellular use involves not
`35 only a complex and secure communications scheme, but
`also a scheme of similar complexity to identify users of the
`system and apply charges for use of the system properly.
`When a user makes a call through the cellular system, the
`user's equipment identifies them by a mobile identification
`40 number, MIN. Although this number is not required to be a
`standard telephone number as defined by the North Ameri(cid:173)
`can Dialing Plan, it usually is such a standard number.
`The North American Dialing Plan, also known as the
`45 North American Numbering Plan is a method of identifying
`telephone trunks in the public network of North America,
`called World Numbering Zone 1 by the CCITT. The plan has
`three ways of identifying phone numbers in North America,
`a three digit area code, a three digit exchange or central
`50 office code and a four digit subscriber code. Other countries
`have more complex numbering schemes.
`One designation for area code is the designation NPA,
`while a corresponding designation for the seven digit local
`phone number is NXX. The combination is sometimes
`55 known as NPP/NXX. The number of NPA codes is nearing
`depletion. Bellcore, the Bell Communications Research
`group, was formed at divestitute to provide certain central(cid:173)
`ized se4rvices to the seven regional Bell Holding compa(cid:173)
`nies. It serves as a focal point for telephone communications
`60 matters of the federal government. This group was instru(cid:173)
`mental in the formation of the NPP/NXX plan. Thus the
`typical mobile identification number is typically complete
`with area code and accompanying seven digits, similar to a
`dedicated wired telephone number.
`The number alone is not much use without some reference
`to compare it to. A subscriber data base, either local or long
`. distance, must be addressed to verify the legitimacy of the
`
`BACKGROUNDOFTHEINVENTION
`
`Cellular telephones are becoming more commonplace,
`more inexpensive, and more standardized with each passing
`day. The system with which cellular phones operate must
`accommodate both the forward calling from the cellular
`telephone to another phone of any type, and the reverse
`calling of the cellular telephone from another phone of any
`type.
`The origins of modem cellular communication dates back
`to the 1920's with experimental equipment being first
`installed in police vehicles in some large cities. Commercial
`· applications of mobile radio were not significant until after
`World War II. The needs of the military greatly accelerated
`development of radio technology, and these early advances
`appeared in commercial products available in the early
`1950's.
`The early systems began with simplex operation, and
`progressed to duplex mobile telephone frequency pairs in
`the 150 MHz and 450 MHz bands. In the mid 1960's, Bell
`Laboratories began working on the details of a system which
`evolved into the cellular system of today. Today's cellular
`system can accommodate some variance with respect to the
`equipment and manner of accessing the system. For
`Example, U.S. Pat. No. 4,658,096 to West, Jr. et a!, and
`entitled "System for Interfacing a Standard Telephone Set
`with a Radio Transceiver" illustrates one such method for
`interfacing. U.S. Pat. No. 4,788,711 to Michael Nasca, Jr. et
`a!, and entitled "Apparatus and Method for a Cellular
`Freeway emergency Telephone Service" illustrates a method
`of using roadside cellular phones which is currently in use 65
`on the nation's highways. Both of these patent applications
`are incorporated by reference herein.
`
`

`

`5,563,931
`
`10
`
`15
`
`3
`user. In this manner, lost or stolen mobile or portable phones
`can be rendered unusable by removing the user's identifi(cid:173)
`cation number or access go-ahead from the home service
`cellular switch data base. By home service, is meant the area
`in which the cellular phone was based, usually related to an 5
`address where the bills are paid and especially related to the
`area code and trunk, NPP/NXX assigned to the conventional
`cellular phone.
`Where the user of the portable or mobile phone is "roam(cid:173)
`ing," or out of his usual home geographic area, there are
`what will be referred to as service cellular system cell sites
`and switch matrix where the user is located will probably not
`have the subscriber data base locally available, and will have
`to place a verifying inquiry to the roamer's home system, to
`access his local subscriber data base to determine his legiti(cid:173)
`macy.
`The communication of this information over long dis(cid:173)
`tances is usually accomplished by two methods. One method
`is signaling system seven, while the other is known as
`in-channel ANI spill. Both of these mechanisms use a
`modem type method of transferring information.
`Signaling system seven is a standard for general purpose
`common channel signaling, and is defined by an American
`National Standard for telecommunications promulgated by
`the American National Standards Institute, Inc. It is opti(cid:173)
`mized for operation in digital telecommunications networks,
`and for operation over 56 or 64 kbit/s digital channels. This
`system is similar to packet operation, and has layers includ(cid:173)
`ing physical, data link, network, transport, session, presen(cid:173)
`tation, and application. The signaling is assumed to be below 30
`the network layer.
`The signal messages have defined parts which include the
`routing label, circuit identification code, message type code,
`mandatory fixed part, mandatory available part and the
`optional part which may contain fixed length and variable 35
`length parameter fields.
`For Example, the call reference and called party reference
`fields are given in Figure X. With regard to the call reference
`identification format, a series of octets labeled 1, 2, 3, ... n
`are vertically given along side the reference field box. 40
`Horizontally, the numerals given are the eight bits which
`define the bit position for each octet. The first octet identifies
`the type of address indicator, the second the numbering plan,
`and the third through the nth octets identify the numerals
`which further identify either the called or calling party.
`Signaling system seven can perform the functions of
`supervising the status of a line or circuit, alerting the arrival
`of an incoming call, addressing and routing the signals over
`a network.
`In-channel ANI spill is a method which stands for auto(cid:173)
`matic number identification. This method may include a
`series of digits at the front of the phone call which inform
`you of the identification of the phone number calling. They
`may arrive as digital or analog, and may be touchtone dual 55
`tone multiple frequency (DTMF) digits generated by the
`phone call process or in a digital form on the same circuit or
`on a different circuit. Thus, in-channel ANI spill is truly an
`amorphus designation covering a wide range of multiple
`methods of routing automatic number identification. ANI is 60
`associated with caller ID, and is not made available by all
`cellular service providers, or maybe provided with some
`restrictions. These restrictions can similarly limit its useful(cid:173)
`ness with respect to the more preferred signaling system
`seven.
`Both of these methods are used to transmit information
`across the telephone system, including caller ID, the system
`
`4
`which makes the caller's identification known at the called
`party's telephone. In the standards, there are about 100
`different types of commands which can be acted upon by
`these systems, including inquiries and system modifications.
`Further, the use of the mobile or portable telephone's
`specific identification number which includes both an elec(cid:173)
`tronic serial number (ESN) as well as the mobile identifi(cid:173)
`cation number (MIN), will coincide with its accessibility
`when being called. Since a land-based or other user of the
`telephone system will access the mobile or portable user
`based upon a conventional telephone number, according to
`the Bellcore promulgated North American Dailing Plan, the
`use of a standard format telephone number as the mobile or
`portable telephone's identity number is efficient.
`However, with the proliferation of other types of equip-
`ment and the need for multiple lines and their associated
`telephone numbers, today's NPA/NXX numbers are becom(cid:173)
`ing an exhausted resource at a higher than ever rate. By sheer
`force of numbers, the numbers within each area code, and
`therefore the number of three digit area codes are a finite
`resource. The extremely infrequent use of a mobile phone
`still requires the assignment, and therefore the loss of, a
`standard NPA/NXX telephone number. Infrequent users
`may be persons who would only use the phone once or so per
`month, and individuals who keep a mobile phone for emer-
`gency use.
`Unfortunately, and according to the system described
`above, the verification of the caller's legitimacy occurs only
`at one point, the home cellular system subscriber data base.
`The system of data-base verification operates using standard
`telephone numbers within its area code. Once the subscriber
`data base has been successfully encountered, the user has
`access to the system. Consequently, under current opera(cid:173)
`tions, a user must have an identification which is configured
`as a standard telephone number conforming to the North
`American Dialing Plan, and is not required to further iden(cid:173)
`tify or legitimize his identity with respect to the system.
`Further, the use of the subscriber data base is subject to
`the procedures and requirements of the cellular telephone
`company. The cellular telephone company's system of
`allowing access, denying access, listing lost or stolen
`phones, improper fraud-type users, etc will always be a
`restrictive element. In most cases, information cannot be
`reported or entered at night, after most customer service
`centers are closed, and significant delays can occur between
`time of reporting and changes to the system. Further,
`because the cellular telephone system is monolithic with
`respect to its relationship with the public, the subscriber data
`base is configured to either allow or deny access rather than
`to selectively deliver differing services. In short, more
`specialized and selective services cannot be offered at the
`present time, so long as dependency is had upon conven(cid:173)
`tional cellular and land line telephone system access meth(cid:173)
`ods.
`Current access methods therefore do not allow differential
`access to the system, much less a higher degree of security.
`When a customer accesses the system to make a call, there
`is no guarantee that the customer, or his equipment is truly
`identified. Since the mobile identification number has a
`format matching regular North American Dialing Plan tele(cid:173)
`phone numbers, it is relatively easy for persons with fraudu-
`lent intent to obtain the mobile telephone number and match
`the electronic serial number of another user, program this
`number into another type of cellular telephone equipment,
`65 access the cellular telephone system, have that equipment
`identified as legitimate and begin to accrue charges to the
`appropriated mobile telephone number account.
`
`20
`
`25
`
`45
`
`50
`
`

`

`5,563,931
`
`5
`What is therefore needed is a non-standard, publicly
`non-available, non-conforming (with respect to the North
`American Dialing Plan) number for mobile and portable
`equipment, and perhaps coupled with an interactive modem(cid:173)
`type transmission of information which positively identifies 5
`the equipment and user as legitimate.
`Another disadvantage of keeping a conventional mobile
`phone for infrequent use is the power drain. For mobile
`phones, the electronics are typically powered during the
`times that the ignition switch is on. There is normally 10
`sufficient power to keep the associated electronics powered,
`although an infrequent user will expend an amount of power
`far more often than the telephone is used and much more
`often than is necessary for expected calls.
`With regard to portable units, there is a current drain of 15
`the battery resource based upon being in the receive mode.
`In some phones, the batteries have to be recharged daily,
`weekly or changed monthly. Although such a frequency of
`recharging or replacement does not seem burdensome, it
`must be compared with respect to the frequency of use. For 20
`uses which are limited to emergency uses, the user will very
`likely forget about charging the batteries completely. If a low
`battery state occurs before and during an emergency, or
`before and during an important need, the benefits of having
`a portable cellular telephone will be eliminated. Further, to 25
`have relied upon the cellular telephone service may actually
`place the user in a worse position than would otherwise be
`the case if the portable telephone were not present.
`Further, since conventional cellular useage is a mixture of
`monitoring for a call and transmitting and receiving a signal, 30
`the battery useage is difficult to predict. Even were it easy to
`predict, no provision has been made for insuring that the
`batteries are always fully charged.
`Another problem with conventional cellular telephones is
`the accessibility of the controls, and especially on an expe- 35
`dited basis, such as during an emergency. In some cases the
`controls are lighted, but usually the controls will still require
`high attention and concentration in order to complete the
`dialing process. This is true also for 911 service and operator
`service. A separate button is usually activated for the send 40
`function, in addition to the keys required for entering the
`destination call numeric address, or telephone number.
`Conventional cellular phones can pose a particular prob(cid:173)
`lem for sight impaired people. The sheer volume of the
`control buttons makes it easy for dialers to make mistakes.
`Further, in the event of an emergency, an excited person
`could have problems quickly dialing out, much less a sight
`impaired person. Even where the sight impaired may dial the
`operator to ask for dialing assistance, the operator will 50
`typically initially instruct the caller to dial the number
`causing the dialer to have to continually verbalize his or her
`handicap. This can be quite frustrating.
`Further complicating the procedure is the necessity to
`remember and dial the telephone numbers to obtain the
`required help in relation to the emergency situation. Further,
`there is no ability for a user to tailor the usage of his phone
`to the types of emergency or types of uses he or she might
`or will usually encounter.
`For example, if an infrequent user wanted to limit the use
`of his portable phone to 911 and calls to his home, he could
`not do so with a conventional mobile phone. An unautho(cid:173)
`rized user, and especially where the unauthorized use were
`to occur for a short time, could run up a large bill. For
`example, where a worker leaves his portable phone at work,
`or in his car, an unauthorized user could simply pick up and
`use the portable phone and return it to its place. Where no
`
`6
`actual material theft of the cellular telephone hardware
`occurs, there is no immediate motivation to report the loss
`to cause de-activation of the cellular account. Indeed the
`unauthorized use may never be discovered, especially where
`the phone is active on an institutional or business account.
`For an individual account, the unauthorized usage will
`probably not be discovered until the next bill arrives, which
`could be up to a month or more.
`Conventional landline telephone equipment has been
`implemented to block certain numerically defined numbers,
`such as numbers with the 900 area code, but equipment has
`not yet been formulated which would tailor a user's service
`to his particular needs, nor which would make system access
`decisions based upon his expected modes of use.
`Conventional cellular telephones are also limited in their
`ability to perform a return call-back to the land line origi(cid:173)
`nating callers who unsuccessfully made calls to those mobile
`or portable cellular phones. Absent the caller identification
`system, there is no current method which will enable a called
`party to determine the caller identity and on telephone
`numbers which originated the call, to perform a manually
`selectable call-back of certain numbers. Even where caller
`identification is available, any call back will be accompanied
`by manual dialing activity. What is therefore needed is a
`system which will enable numbers to be manually selected
`for automatic entry into a telephone for calling back the
`parties which wish to call the mobile or portable telephone
`user.
`Another system which is not currently available with
`conventional cellular telephones is the ability to have the
`cellular telephone initiate a call remotely. This feature is
`desired for several reasons. First, a call placed to a mobile
`or portable station would give an audible ring, which would
`have to be followed by some physical manipulation of the
`equipment, such as picking the receiver up, to complete the
`audible connection. There may be a myriad of reasons why
`both the calling and the called party might desire there to be
`no audible ringing upon the initiation of a call. There may be
`circumstances where a telephone is to be used for surveil(cid:173)
`lance, such as listening in on a child or baby sitter, and it
`must be turned on and off without noise or delay.
`One of the best ways to accomplish this is to alert the
`mobile phone to dial the call initiator. This is impossible
`with conventional cellular, because the conventional system
`can only accommodate a connection between a call initiator
`and completed by a call receiver's answering the call. The
`conventional cellular telephone system will not permit a call
`initiator to initiate a call to himself, from remotely located
`equipment. Such a feature is also useful where a sub-system
`owner wishes to monitor equipment.
`For example, a caller may leave an emergency telephone
`next to a radio which is tuned to a sporting event. The user
`may cause his emergency telephone to initiate a call to listen
`in on the game. Conventional cellular is limited in that, even
`with automatic answer, any and all callers would be able to
`access the line and begin to accrue charges to the cellular
`telephone.
`This feature, which is not available with conventional
`60 cellular technology, would be of great use and service in
`surveillance and remote monitoring. All of the features set
`forth above are not available in current cellular telephone
`technology. Further, the infrequent user segment of the
`market is not being served. With the disadvantages referred
`to above, there is a further need for an emergency wireless
`telephone which enables the very disadvantages of the
`current cellular system.
`
`45
`
`55
`
`65
`
`

`

`5,563,931
`
`7
`The needed emergency wireless telephone should be
`made in sufficient quantity and made sufficiently available
`that it can be stored for long periods of time with minimal
`battery dissipation, the ability to more readily predict current
`battery state and no need for battery replacement outside the 5
`batteries' shelf life. The needed phone would be configured
`and operated according to a system which supports virtually
`no battery dissipation, or at least a very low usage until
`needed. Ideally, the emergency wireless phone will be able
`to monitor the battery useage based upon time and call time, 10
`and provide the user with a continuing, and automatic source
`of replacement batteries. When needed, the emergency wire(cid:173)
`less phone should immediately switch on and automatically
`place the user in contact with help or assistance. The needed
`emergency wireless telephone should not facilitate to usage 15
`which is radically different than the usage to which the
`legitimate user of the telephone normally subjects to the
`instrument, but will always facilitate an emergency usage.
`The configuration of the needed emergency wireless tele(cid:173)
`phone should be such that large numbers of infrequent users 20
`will enable a new class of service fitted to the needs and
`demands of the class.
`
`SUMMARY OF THE INVENTION
`
`25
`
`The emergency wireless telephone and system of the
`present invention describes a way to improve upon the
`control and service offered in the conventional public tele(cid:173)
`phone system as pertains to cellular telephone service. The
`system of the present invention contemplates an emergency 30
`wireless telephone which is configured to switch on only
`when a request to initiate a call is made. Otherwise, this
`emergency wireless telephone has a zero battery drain from
`the cellular telephonic circuitry.
`The emergency wireless telephone is equipped with at 35
`least one singularly large call button which triggers a call to
`a central receiving station. This operation is accomplished
`by using an echeloned identification system which enables
`the central system to directly receive information relating to
`the identity of the equipment initiating the emergency wire- 40
`less call, and optionally to send out and receive a verification
`of the legitimacy of the equipment to avoid attempts to
`re-program the actual user/owner cellular telephone identity
`in another type of cellular hardware. The call and emergency
`buttons may have braille-type bumps or sharp rises to 45
`facilitate the use of the wireless emergency telephone of the
`present invention by the sight impaired.
`Further, the emergency wireless telephone of the present
`invention utilizes a non-standard mobile identification num(cid:173)
`ber to further thwart the ability of unauthorized users to 50
`access services from the telephone system. The standard
`North American Dialing Plan format contemplates a number
`which includes NPP area codes and NXX exchanges which
`have a specific geographic correspondence. The non-stan(cid:173)
`dard mobile identification number is communicated to a 55
`central system using a hierarchy consisting of signaling
`system seven, in-channel ANI spill, and/or a direct link
`using the cellular manchester modem, and if necessary the
`use of DTMF, once the call is established. The inventive
`emergency wireless telephone and system of the present 60
`invention provides a method and system of alerting the user
`of a mobile emergency phone without the need for keeping
`the cellular telephone's transceiver and microprocessor elec(cid:173)
`tronics under power, and which uses a one button power on
`and dial switch, as well as a system which enables the 65
`control and responsibility for a call to be moved further
`downstream within the cellular telephone system without
`
`8
`surrendering the ability to identify the caller's equipment,
`and optionally, the identity of the caller. The invention
`further establishes a hierarchy for and insuring that the
`identification of the calling party is transmitted, b

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket