`US005563931A
`[11] Patent Number:
`[45] Date of Patent:
`
`5,563,931
`Oct. 8, 1996
`
`Primary Examiner-Curtis Kuntz
`Assistant Examiner-Michael B. Chernoff
`Attorney, Agent, or Firm-Curtis L. Harrington
`
`[57]
`
`ABSTRACT
`
`The emergency wireless telephone and system describes
`improved control and service offered in the conventional
`public telephone system as pertains to cellular telephone
`service. The system contemplates an emergency wireless
`telephone, with options, including: (1) a method and system
`of alerting the user of a mobile emergency phone without the
`need for keeping the telephone's electronics under power,
`(2) a system which enables the control and responsibility for
`a call to be moved further downstream at a cellular telephone
`switch, by altering the character and use of the mobile
`identification number and by reprogramming the telephone
`switch, (3) establishing a hierarchy for and insuring that the
`identification of the calling party is transmitted, both before
`and after answer supervision is transferred, (4) an fraud
`protection, interactive identification system using a key and
`mathematical operator which both verifies the user's identity
`and eliminates the need for the look-up of the caller's
`telephone or account number, (5) an interactive in phone
`switch which can interactively select between the "A" side
`and "B" side carriers in a given locale, (6) a system which
`can implement a manual call back method of handling
`incoming calls, and (7) a system which enables automatic
`"meet me" handling of incoming calls.
`
`43 Claims, 7 Drawing Sheets
`
`United States Patent [19J
`Bishop et al.
`
`[54] EMERGENCY WIRELESS TELEPHONE AND
`CONTROL SYSTEM, AND METHOD
`
`[75]
`
`Inventors: Ronald D. Bishop, Mission Viejo;
`Vane P. Clayton, Long Beach; Michael
`H. Kreutzer, Santa Ana, all of Calif.;
`Elliott H. Drucker, Kirkland, Wash.
`
`[73] Assignee: SOS Wireless Communications &
`National Dispatch Center, Irvine,
`Calif.
`
`[21] Appl. No.: 291,172
`
`[22] Filed:
`
`Aug. 16, 1994
`
`Int. Cl.6
`
`[51]
`
`.............................. H04Q 7/22; H04Q 7/08;
`H04M 11/04
`[52] U.S. Cl. ................................. 379/59; 379/57; 379/37;
`455/33.1
`[58] Field of Search .................................. 379/58, 59, 57,
`379/61, 369, 370, 433, 38, 39, 37, 66; 455/89,
`90, 33.1; 340/825.44
`
`[56]
`
`References Cited
`
`U.S. PATENT DOCUMENTS
`
`4,658,096
`5,203,009
`5,365,570
`5,388,147
`5,388,148
`
`4/1987 West, Jr ..
`4/1993 Bogusz et al .......................... 455/33.1
`11/1994 Boube1ik ................................... 379/59
`2/1995 Grimes ...................................... 379/58
`2/1995 Seiderman ................................ 379/59
`
`ZONE OFFICE {=;:=====::j
`
`TRUNKS
`(TO PSTN)
`DEDICATED LINKS {--=-------l
`
`31
`33
`
`SWITCH
`MATRIX
`
`PROCESSOR
`
`SUBSCRIBER
`ACCOUNT 1----1
`DATA BASE
`
`PAGING COVERAGE ------------------(cid:173)
`CELLULAR COVERAGE------
`
`Apple Inc. 1027
`U.S. Patent No. 9,445,251
`
`
`
`47
`
`CENTRAL I.
`
`STATION
`
`45
`
`I PUBLIC
`TELEPHONE
`~ NETWORK
`
`(061)
`
`4J
`
`FIG. I
`
`49
`
`SUBSCRIBER
`ACCOUNT
`DATA BASE.
`
`\. __ j
`...._ _____
`
`___ ;- J J
`
`ZONE OFFICE {
`TRUNKS
`(TO PSTN)
`DEDICATED LINKS
`
`{
`
`.
`
`:
`
`:
`
`'
`
`I
`
`,......--
`
`MTSO J
`
`r-JJ
`
`SWITCH
`MATRIX
`
`:
`
`PROCESSOR
`
`SUBSCRIBER
`DATA BASE I
`
`J5
`
`I
`
`(. /1 I ~-_!:))
`
`I SITE \
`
`1,7
`\ \V"
`
`V\c-37~
`
`J9
`
`d •
`00. •
`~
`~
`"""'"
`
`('0 = """'"
`
`0
`~
`~
`JXJ
`
`....
`\C) =-.
`
`\C)
`
`('!)
`('!)
`
`00. =-
`......
`....
`0
`......,
`'I
`
`Ol
`....
`Ol
`~ w
`....
`\C w
`
`~
`
`
`
`U.S. Patent
`
`Oct. 8, 1996
`
`Sheet 2 of 7
`
`5,563,931
`
`FIG.2
`
`8
`0/E
`SPARE
`
`2
`3
`
`n
`
`7
`
`l 5
`
`l 4
`
`l 3
`
`l 2
`
`I 1
`
`I 6
`NATURE OF ADDRESS INDICATOR
`RESERVED
`NUMBERING PLAN
`1ST ADDRESS SIGNAL
`2nd ADDRESS SIGNAL
`
`. . .
`
`FILLER (IF NECESSARY)
`
`nth ADD.RESS SIGNAL
`
`FIG .3
`
`Q
`
`A1
`
`81
`
`~
`
`AS
`A4
`A3
`A2
`FIXED LOGIC ARRAY
`82
`84
`85
`83
`~
`
`~
`
`A6
`
`86
`
`~
`
`L.,
`
`~ SHIFT CLOCK
`
`-
`
`COUNTER
`
`
`
`U.S. Patent
`
`Oct. 8, 1996
`
`Sheet 3 of 7
`
`5,563,931
`
`FIG. 4
`
`FIG. 5
`
`~
`I 75
`1--1 /
`,..._
`
`.\
`
`~ -
`
`-
`
`- ~
`
`?=-
`
`v 61
`
`If:::
`-
`
`~ CALL~
`
`-
`
`HELP)
`
`6'5
`
`v
`
`/
`
`63
`
`DIRECTORY
`NUMBERS
`9.
`10.
`11 .
`
`12.
`13.
`
`14.
`
`15.
`
`16.
`
`1.
`2.
`
`3.
`
`4.
`5.
`
`6.
`
`7.
`8.
`
`0
`
`\.
`
`©
`
`6'3 ~----------~
`"'
`
`DIRECTORY
`NUMBERS
`9.
`
`10.
`11.
`
`i12.
`13.
`-·· 14.
`
`,15.
`
`j16.
`
`1.
`2.
`
`3.
`
`4.
`5.
`
`6.
`7.
`8.
`
`77---r--+-
`
`71
`
`
`
`U.S. Patent
`
`Oct. 8, 1996
`
`Sheet 4 of 7
`
`5,563,931
`
`FIG. 58
`
`FIG. 5C
`
`0
`
`0
`
`0
`
`.. .. .. ..
`
`
`
`U.S. Patent
`
`Oct. 8, 1996
`
`Sheet 5 of 7
`
`5,563,931
`
`FIG. 6
`
`FIG. 7
`
`63
`
`65
`
`81
`
`CD CD (I)
`CD CD CD
`CD CD CD
`CD CD CD
`
`81
`
`CD CD o:J
`CD CD CD
`CD CD CD
`CD CD OD
`
`
`
`U.S. Patent
`
`Oct. 8, 1996
`
`Sheet 6 of 7
`
`5,563,931
`
`FIG 8
`
`•
`
`r 81
`
`KEYPAD
`
`r8.J
`I INITIATE CALL
`I
`I
`liN IT. EMERG CALL ~
`'-....95
`
`~
`
`r87
`
`EWT CIRCUIT
`
`r7.
`
`: PAGER CKT l
`
`r89
`MANCHESTER MODEM
`
`FIG. 9
`.. -87
`_,...--------- - - - - - - - - - ----------- - - - - - -----··- --~- ___ _/ ___ .......
`91
`
`\
`
`I
`
`MOBILE I.D. + PROGRAM
`
`i
`\
`
`, _______________________________________________ /
`
`I
`
`
`
`FIG. 10
`
`ZONE OFFICE {
`TRUNKS
`(TO PSTN) - - - - - l
`DEDICATED LINKS{ ____ ---!
`
`31
`
`33
`
`SWITCH
`MATRIX
`
`PROCESSOR
`
`~--
`
`/~
`_,.~
`
`,/"/"
`
`//
`I '
`
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`
`'-,, ,,
`" \
`
`CENTRAL
`STATION 1
`
`49
`
`SUBSCRIBER!
`ACCOUNT
`-
`DATA BASE
`
`45
`r---.___......__,
`PUBLIC
`TELEPHONE
`.,I NETWORK 1-----------,
`
`{061)
`
`43
`
`51
`1.----! ~·II
`· CRT
`•
`
`97
`
`\
`
`NATIONWIDE
`PAGING SYSTEM
`
`' \
`\ ' ' " ' ', ______ _
`
`61
`
`71
`
`I
`
`/
`
`/
`
`.... ~""""~----"'
`
`PAGING COVERAGE ------------------(cid:173)
`CELLULAR COVERAGE-----------
`
`e •
`
`00
`•
`~
`~
`f""''(cid:173)
`
`~ = f""''-
`
`0
`~
`:-"
`... ~
`
`)oooo"
`\C
`\C
`=:!'\
`
`00.
`::r'
`!'!)
`.....
`!'!)
`.....:J
`~
`.....:J
`
`01
`\e 01
`Q\
`tH
`\C
`tH
`~
`
`\e
`
`\ ' I
`
`I
`\
`\
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`J
`I
`
`
`
`5,563,931
`
`1
`EMERGENCY WIRELESS TELEPHONE AND
`CONTROL SYSTEM, AND METHOD
`
`FIELD OF THE INVENTION
`
`5
`
`The present invention relates to the field of electronic
`communication systems devices and methods. More specifi(cid:173)
`cally, the present invention relates to a system which facili(cid:173)
`tates the introduction of an emergency wireless telephone,
`eliminating many of the disadvantages of standard wireless
`phones and their associated large capacity demands on a
`system. Even more specifically, the invention relates to (1)
`a method and system of alerting the user of a mobile
`emergency phone without the need for keeping the tele(cid:173)
`phone's electronics under power, (2) a system which enables
`the control and responsibility for a call to be moved further
`downstream at a cellular mobile telephone switch, by alter(cid:173)
`ing the character and use of the mobile identification number
`and by re-programming the cellular mobile telephone
`switch, (3) establishing a hierarchy for and insuring that the
`identification of the calling party is transmitted, both before
`and after answer supervision is transferred, (4) an fraud
`protection, interactive identification system using a key and
`mathematical operator which both verifies the user's identity
`and eliminates the need for the look-up of the caller's
`telephone or account number, (5) an interactive in phone
`switch which can interactively select between the "A" side
`and "B" side carriers in a given locale, (6) a system which
`can implement a manual call back method of handling 30
`incoming calls, and (7) a system which enables automatic
`"meet me" handling of incoming calls.
`
`25
`
`2
`Parameters which had to be settled on included spectrum
`allocation, digital signalling and control, the geographical
`subdivisions from which radio control is accomplished,
`commonly known as cell sites, and the allocation and use of
`frequency control channels for message carrying capability.
`The original cellular spectrum allocation was for a total of
`40 MHz, with 20 MHz providing service in each direction
`between the base station and the mobile station. A total of
`666 channels, each 30 KHz wide, were designated for each
`10 direction. The channels were divided equally into two com(cid:173)
`peting bands. These bands were the A band, also known as
`the "non-wireline" band, and the B band, also known as the
`"wireline" band. The original intent was that in each market,
`the local exchange carrier (which was publicly regulated)
`15 would be granted a license for the B band, while the A band
`would be granted to a private business on the basis of
`competitive application.
`As time progressed, and with the break-up of the smaller
`telephone carriers, the A band and the B band have devel-
`20 oped into competing systems. Each may have its own
`commercial carrier associated with a city served by a cel(cid:173)
`lular system. Further, the service level and rate structure
`offered by the A band and B band carriers will typically be
`quite different. Current cellular phone systems do not allow
`for the automatic selection of, or change in the selection of
`a particular carrier band.
`If such a selective change were possible, flexibility of
`operation would occur. Whole groups of users of a certain
`type could switch between the two types of cellular carriers,
`and thus the carriers would begin to behave more competi(cid:173)
`tively. Unfortunately, the lack of the ability to easily switch
`back and forth is a major shortcoming of conventional
`cellular technology.
`As will be shown, conventional cellular use involves not
`35 only a complex and secure communications scheme, but
`also a scheme of similar complexity to identify users of the
`system and apply charges for use of the system properly.
`When a user makes a call through the cellular system, the
`user's equipment identifies them by a mobile identification
`40 number, MIN. Although this number is not required to be a
`standard telephone number as defined by the North Ameri(cid:173)
`can Dialing Plan, it usually is such a standard number.
`The North American Dialing Plan, also known as the
`45 North American Numbering Plan is a method of identifying
`telephone trunks in the public network of North America,
`called World Numbering Zone 1 by the CCITT. The plan has
`three ways of identifying phone numbers in North America,
`a three digit area code, a three digit exchange or central
`50 office code and a four digit subscriber code. Other countries
`have more complex numbering schemes.
`One designation for area code is the designation NPA,
`while a corresponding designation for the seven digit local
`phone number is NXX. The combination is sometimes
`55 known as NPP/NXX. The number of NPA codes is nearing
`depletion. Bellcore, the Bell Communications Research
`group, was formed at divestitute to provide certain central(cid:173)
`ized se4rvices to the seven regional Bell Holding compa(cid:173)
`nies. It serves as a focal point for telephone communications
`60 matters of the federal government. This group was instru(cid:173)
`mental in the formation of the NPP/NXX plan. Thus the
`typical mobile identification number is typically complete
`with area code and accompanying seven digits, similar to a
`dedicated wired telephone number.
`The number alone is not much use without some reference
`to compare it to. A subscriber data base, either local or long
`. distance, must be addressed to verify the legitimacy of the
`
`BACKGROUNDOFTHEINVENTION
`
`Cellular telephones are becoming more commonplace,
`more inexpensive, and more standardized with each passing
`day. The system with which cellular phones operate must
`accommodate both the forward calling from the cellular
`telephone to another phone of any type, and the reverse
`calling of the cellular telephone from another phone of any
`type.
`The origins of modem cellular communication dates back
`to the 1920's with experimental equipment being first
`installed in police vehicles in some large cities. Commercial
`· applications of mobile radio were not significant until after
`World War II. The needs of the military greatly accelerated
`development of radio technology, and these early advances
`appeared in commercial products available in the early
`1950's.
`The early systems began with simplex operation, and
`progressed to duplex mobile telephone frequency pairs in
`the 150 MHz and 450 MHz bands. In the mid 1960's, Bell
`Laboratories began working on the details of a system which
`evolved into the cellular system of today. Today's cellular
`system can accommodate some variance with respect to the
`equipment and manner of accessing the system. For
`Example, U.S. Pat. No. 4,658,096 to West, Jr. et a!, and
`entitled "System for Interfacing a Standard Telephone Set
`with a Radio Transceiver" illustrates one such method for
`interfacing. U.S. Pat. No. 4,788,711 to Michael Nasca, Jr. et
`a!, and entitled "Apparatus and Method for a Cellular
`Freeway emergency Telephone Service" illustrates a method
`of using roadside cellular phones which is currently in use 65
`on the nation's highways. Both of these patent applications
`are incorporated by reference herein.
`
`
`
`5,563,931
`
`10
`
`15
`
`3
`user. In this manner, lost or stolen mobile or portable phones
`can be rendered unusable by removing the user's identifi(cid:173)
`cation number or access go-ahead from the home service
`cellular switch data base. By home service, is meant the area
`in which the cellular phone was based, usually related to an 5
`address where the bills are paid and especially related to the
`area code and trunk, NPP/NXX assigned to the conventional
`cellular phone.
`Where the user of the portable or mobile phone is "roam(cid:173)
`ing," or out of his usual home geographic area, there are
`what will be referred to as service cellular system cell sites
`and switch matrix where the user is located will probably not
`have the subscriber data base locally available, and will have
`to place a verifying inquiry to the roamer's home system, to
`access his local subscriber data base to determine his legiti(cid:173)
`macy.
`The communication of this information over long dis(cid:173)
`tances is usually accomplished by two methods. One method
`is signaling system seven, while the other is known as
`in-channel ANI spill. Both of these mechanisms use a
`modem type method of transferring information.
`Signaling system seven is a standard for general purpose
`common channel signaling, and is defined by an American
`National Standard for telecommunications promulgated by
`the American National Standards Institute, Inc. It is opti(cid:173)
`mized for operation in digital telecommunications networks,
`and for operation over 56 or 64 kbit/s digital channels. This
`system is similar to packet operation, and has layers includ(cid:173)
`ing physical, data link, network, transport, session, presen(cid:173)
`tation, and application. The signaling is assumed to be below 30
`the network layer.
`The signal messages have defined parts which include the
`routing label, circuit identification code, message type code,
`mandatory fixed part, mandatory available part and the
`optional part which may contain fixed length and variable 35
`length parameter fields.
`For Example, the call reference and called party reference
`fields are given in Figure X. With regard to the call reference
`identification format, a series of octets labeled 1, 2, 3, ... n
`are vertically given along side the reference field box. 40
`Horizontally, the numerals given are the eight bits which
`define the bit position for each octet. The first octet identifies
`the type of address indicator, the second the numbering plan,
`and the third through the nth octets identify the numerals
`which further identify either the called or calling party.
`Signaling system seven can perform the functions of
`supervising the status of a line or circuit, alerting the arrival
`of an incoming call, addressing and routing the signals over
`a network.
`In-channel ANI spill is a method which stands for auto(cid:173)
`matic number identification. This method may include a
`series of digits at the front of the phone call which inform
`you of the identification of the phone number calling. They
`may arrive as digital or analog, and may be touchtone dual 55
`tone multiple frequency (DTMF) digits generated by the
`phone call process or in a digital form on the same circuit or
`on a different circuit. Thus, in-channel ANI spill is truly an
`amorphus designation covering a wide range of multiple
`methods of routing automatic number identification. ANI is 60
`associated with caller ID, and is not made available by all
`cellular service providers, or maybe provided with some
`restrictions. These restrictions can similarly limit its useful(cid:173)
`ness with respect to the more preferred signaling system
`seven.
`Both of these methods are used to transmit information
`across the telephone system, including caller ID, the system
`
`4
`which makes the caller's identification known at the called
`party's telephone. In the standards, there are about 100
`different types of commands which can be acted upon by
`these systems, including inquiries and system modifications.
`Further, the use of the mobile or portable telephone's
`specific identification number which includes both an elec(cid:173)
`tronic serial number (ESN) as well as the mobile identifi(cid:173)
`cation number (MIN), will coincide with its accessibility
`when being called. Since a land-based or other user of the
`telephone system will access the mobile or portable user
`based upon a conventional telephone number, according to
`the Bellcore promulgated North American Dailing Plan, the
`use of a standard format telephone number as the mobile or
`portable telephone's identity number is efficient.
`However, with the proliferation of other types of equip-
`ment and the need for multiple lines and their associated
`telephone numbers, today's NPA/NXX numbers are becom(cid:173)
`ing an exhausted resource at a higher than ever rate. By sheer
`force of numbers, the numbers within each area code, and
`therefore the number of three digit area codes are a finite
`resource. The extremely infrequent use of a mobile phone
`still requires the assignment, and therefore the loss of, a
`standard NPA/NXX telephone number. Infrequent users
`may be persons who would only use the phone once or so per
`month, and individuals who keep a mobile phone for emer-
`gency use.
`Unfortunately, and according to the system described
`above, the verification of the caller's legitimacy occurs only
`at one point, the home cellular system subscriber data base.
`The system of data-base verification operates using standard
`telephone numbers within its area code. Once the subscriber
`data base has been successfully encountered, the user has
`access to the system. Consequently, under current opera(cid:173)
`tions, a user must have an identification which is configured
`as a standard telephone number conforming to the North
`American Dialing Plan, and is not required to further iden(cid:173)
`tify or legitimize his identity with respect to the system.
`Further, the use of the subscriber data base is subject to
`the procedures and requirements of the cellular telephone
`company. The cellular telephone company's system of
`allowing access, denying access, listing lost or stolen
`phones, improper fraud-type users, etc will always be a
`restrictive element. In most cases, information cannot be
`reported or entered at night, after most customer service
`centers are closed, and significant delays can occur between
`time of reporting and changes to the system. Further,
`because the cellular telephone system is monolithic with
`respect to its relationship with the public, the subscriber data
`base is configured to either allow or deny access rather than
`to selectively deliver differing services. In short, more
`specialized and selective services cannot be offered at the
`present time, so long as dependency is had upon conven(cid:173)
`tional cellular and land line telephone system access meth(cid:173)
`ods.
`Current access methods therefore do not allow differential
`access to the system, much less a higher degree of security.
`When a customer accesses the system to make a call, there
`is no guarantee that the customer, or his equipment is truly
`identified. Since the mobile identification number has a
`format matching regular North American Dialing Plan tele(cid:173)
`phone numbers, it is relatively easy for persons with fraudu-
`lent intent to obtain the mobile telephone number and match
`the electronic serial number of another user, program this
`number into another type of cellular telephone equipment,
`65 access the cellular telephone system, have that equipment
`identified as legitimate and begin to accrue charges to the
`appropriated mobile telephone number account.
`
`20
`
`25
`
`45
`
`50
`
`
`
`5,563,931
`
`5
`What is therefore needed is a non-standard, publicly
`non-available, non-conforming (with respect to the North
`American Dialing Plan) number for mobile and portable
`equipment, and perhaps coupled with an interactive modem(cid:173)
`type transmission of information which positively identifies 5
`the equipment and user as legitimate.
`Another disadvantage of keeping a conventional mobile
`phone for infrequent use is the power drain. For mobile
`phones, the electronics are typically powered during the
`times that the ignition switch is on. There is normally 10
`sufficient power to keep the associated electronics powered,
`although an infrequent user will expend an amount of power
`far more often than the telephone is used and much more
`often than is necessary for expected calls.
`With regard to portable units, there is a current drain of 15
`the battery resource based upon being in the receive mode.
`In some phones, the batteries have to be recharged daily,
`weekly or changed monthly. Although such a frequency of
`recharging or replacement does not seem burdensome, it
`must be compared with respect to the frequency of use. For 20
`uses which are limited to emergency uses, the user will very
`likely forget about charging the batteries completely. If a low
`battery state occurs before and during an emergency, or
`before and during an important need, the benefits of having
`a portable cellular telephone will be eliminated. Further, to 25
`have relied upon the cellular telephone service may actually
`place the user in a worse position than would otherwise be
`the case if the portable telephone were not present.
`Further, since conventional cellular useage is a mixture of
`monitoring for a call and transmitting and receiving a signal, 30
`the battery useage is difficult to predict. Even were it easy to
`predict, no provision has been made for insuring that the
`batteries are always fully charged.
`Another problem with conventional cellular telephones is
`the accessibility of the controls, and especially on an expe- 35
`dited basis, such as during an emergency. In some cases the
`controls are lighted, but usually the controls will still require
`high attention and concentration in order to complete the
`dialing process. This is true also for 911 service and operator
`service. A separate button is usually activated for the send 40
`function, in addition to the keys required for entering the
`destination call numeric address, or telephone number.
`Conventional cellular phones can pose a particular prob(cid:173)
`lem for sight impaired people. The sheer volume of the
`control buttons makes it easy for dialers to make mistakes.
`Further, in the event of an emergency, an excited person
`could have problems quickly dialing out, much less a sight
`impaired person. Even where the sight impaired may dial the
`operator to ask for dialing assistance, the operator will 50
`typically initially instruct the caller to dial the number
`causing the dialer to have to continually verbalize his or her
`handicap. This can be quite frustrating.
`Further complicating the procedure is the necessity to
`remember and dial the telephone numbers to obtain the
`required help in relation to the emergency situation. Further,
`there is no ability for a user to tailor the usage of his phone
`to the types of emergency or types of uses he or she might
`or will usually encounter.
`For example, if an infrequent user wanted to limit the use
`of his portable phone to 911 and calls to his home, he could
`not do so with a conventional mobile phone. An unautho(cid:173)
`rized user, and especially where the unauthorized use were
`to occur for a short time, could run up a large bill. For
`example, where a worker leaves his portable phone at work,
`or in his car, an unauthorized user could simply pick up and
`use the portable phone and return it to its place. Where no
`
`6
`actual material theft of the cellular telephone hardware
`occurs, there is no immediate motivation to report the loss
`to cause de-activation of the cellular account. Indeed the
`unauthorized use may never be discovered, especially where
`the phone is active on an institutional or business account.
`For an individual account, the unauthorized usage will
`probably not be discovered until the next bill arrives, which
`could be up to a month or more.
`Conventional landline telephone equipment has been
`implemented to block certain numerically defined numbers,
`such as numbers with the 900 area code, but equipment has
`not yet been formulated which would tailor a user's service
`to his particular needs, nor which would make system access
`decisions based upon his expected modes of use.
`Conventional cellular telephones are also limited in their
`ability to perform a return call-back to the land line origi(cid:173)
`nating callers who unsuccessfully made calls to those mobile
`or portable cellular phones. Absent the caller identification
`system, there is no current method which will enable a called
`party to determine the caller identity and on telephone
`numbers which originated the call, to perform a manually
`selectable call-back of certain numbers. Even where caller
`identification is available, any call back will be accompanied
`by manual dialing activity. What is therefore needed is a
`system which will enable numbers to be manually selected
`for automatic entry into a telephone for calling back the
`parties which wish to call the mobile or portable telephone
`user.
`Another system which is not currently available with
`conventional cellular telephones is the ability to have the
`cellular telephone initiate a call remotely. This feature is
`desired for several reasons. First, a call placed to a mobile
`or portable station would give an audible ring, which would
`have to be followed by some physical manipulation of the
`equipment, such as picking the receiver up, to complete the
`audible connection. There may be a myriad of reasons why
`both the calling and the called party might desire there to be
`no audible ringing upon the initiation of a call. There may be
`circumstances where a telephone is to be used for surveil(cid:173)
`lance, such as listening in on a child or baby sitter, and it
`must be turned on and off without noise or delay.
`One of the best ways to accomplish this is to alert the
`mobile phone to dial the call initiator. This is impossible
`with conventional cellular, because the conventional system
`can only accommodate a connection between a call initiator
`and completed by a call receiver's answering the call. The
`conventional cellular telephone system will not permit a call
`initiator to initiate a call to himself, from remotely located
`equipment. Such a feature is also useful where a sub-system
`owner wishes to monitor equipment.
`For example, a caller may leave an emergency telephone
`next to a radio which is tuned to a sporting event. The user
`may cause his emergency telephone to initiate a call to listen
`in on the game. Conventional cellular is limited in that, even
`with automatic answer, any and all callers would be able to
`access the line and begin to accrue charges to the cellular
`telephone.
`This feature, which is not available with conventional
`60 cellular technology, would be of great use and service in
`surveillance and remote monitoring. All of the features set
`forth above are not available in current cellular telephone
`technology. Further, the infrequent user segment of the
`market is not being served. With the disadvantages referred
`to above, there is a further need for an emergency wireless
`telephone which enables the very disadvantages of the
`current cellular system.
`
`45
`
`55
`
`65
`
`
`
`5,563,931
`
`7
`The needed emergency wireless telephone should be
`made in sufficient quantity and made sufficiently available
`that it can be stored for long periods of time with minimal
`battery dissipation, the ability to more readily predict current
`battery state and no need for battery replacement outside the 5
`batteries' shelf life. The needed phone would be configured
`and operated according to a system which supports virtually
`no battery dissipation, or at least a very low usage until
`needed. Ideally, the emergency wireless phone will be able
`to monitor the battery useage based upon time and call time, 10
`and provide the user with a continuing, and automatic source
`of replacement batteries. When needed, the emergency wire(cid:173)
`less phone should immediately switch on and automatically
`place the user in contact with help or assistance. The needed
`emergency wireless telephone should not facilitate to usage 15
`which is radically different than the usage to which the
`legitimate user of the telephone normally subjects to the
`instrument, but will always facilitate an emergency usage.
`The configuration of the needed emergency wireless tele(cid:173)
`phone should be such that large numbers of infrequent users 20
`will enable a new class of service fitted to the needs and
`demands of the class.
`
`SUMMARY OF THE INVENTION
`
`25
`
`The emergency wireless telephone and system of the
`present invention describes a way to improve upon the
`control and service offered in the conventional public tele(cid:173)
`phone system as pertains to cellular telephone service. The
`system of the present invention contemplates an emergency 30
`wireless telephone which is configured to switch on only
`when a request to initiate a call is made. Otherwise, this
`emergency wireless telephone has a zero battery drain from
`the cellular telephonic circuitry.
`The emergency wireless telephone is equipped with at 35
`least one singularly large call button which triggers a call to
`a central receiving station. This operation is accomplished
`by using an echeloned identification system which enables
`the central system to directly receive information relating to
`the identity of the equipment initiating the emergency wire- 40
`less call, and optionally to send out and receive a verification
`of the legitimacy of the equipment to avoid attempts to
`re-program the actual user/owner cellular telephone identity
`in another type of cellular hardware. The call and emergency
`buttons may have braille-type bumps or sharp rises to 45
`facilitate the use of the wireless emergency telephone of the
`present invention by the sight impaired.
`Further, the emergency wireless telephone of the present
`invention utilizes a non-standard mobile identification num(cid:173)
`ber to further thwart the ability of unauthorized users to 50
`access services from the telephone system. The standard
`North American Dialing Plan format contemplates a number
`which includes NPP area codes and NXX exchanges which
`have a specific geographic correspondence. The non-stan(cid:173)
`dard mobile identification number is communicated to a 55
`central system using a hierarchy consisting of signaling
`system seven, in-channel ANI spill, and/or a direct link
`using the cellular manchester modem, and if necessary the
`use of DTMF, once the call is established. The inventive
`emergency wireless telephone and system of the present 60
`invention provides a method and system of alerting the user
`of a mobile emergency phone without the need for keeping
`the cellular telephone's transceiver and microprocessor elec(cid:173)
`tronics under power, and which uses a one button power on
`and dial switch, as well as a system which enables the 65
`control and responsibility for a call to be moved further
`downstream within the cellular telephone system without
`
`8
`surrendering the ability to identify the caller's equipment,
`and optionally, the identity of the caller. The invention
`further establishes a hierarchy for and insuring that the
`identification of the calling party is transmitte