Predicate |
Object |
assignee |
http://rdf.ncbi.nlm.nih.gov/pubchem/patentassignee/MD5_d3055f17226671e50112881744c95dce http://rdf.ncbi.nlm.nih.gov/pubchem/patentassignee/MD5_d54dd7c8b870e61f1d9d87d99e31a64b http://rdf.ncbi.nlm.nih.gov/pubchem/patentassignee/MD5_f4592cccb82ca5f60f9a25d83f14e464 |
classificationCPCAdditional |
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04K3-28 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04K2203-16 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04K3-44 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04K3-42 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04K2203-24 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/Y02D30-70 |
classificationCPCInventive |
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04W48-02 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04K3-45 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04K3-41 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04K3-65 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04K3-92 |
classificationIPCInventive |
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04W48-02 http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04K3-00 |
filingDate |
2007-03-07-04:00^^<http://www.w3.org/2001/XMLSchema#date> |
inventor |
http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_20bbf67b70942c3b174ac4186ead4b84 http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_0333275ef83afde6bd62abbd1b145a8b |
publicationDate |
2007-11-08-04:00^^<http://www.w3.org/2001/XMLSchema#date> |
publicationNumber |
WO-2007106694-A9 |
titleOfInvention |
Methods of suppressing gsm wireless device threats in dynamic or wide area static environments using minimal power consumption and collateral interference |
abstract |
Techniques for detecting wireless devices that are signaling in high proximity to a convoy or other operation and preventing messages from reaching the wireless devices. One class of the techniques uses surgical jamming methodologies (509) that minimize power consumption and collateral interference, while being maximally inconspicuous; another class uses baiting beacons (510) to prevent the messages from reaching the wireless devices. Still another class of techniques (511) denies wireless devices access to a wireless network. An exemplary embodiment applies the techniques to wireless devices and beacons in a GSM network. |
priorityDate |
2006-03-07-04:00^^<http://www.w3.org/2001/XMLSchema#date> |
type |
http://data.epo.org/linked-data/def/patent/Publication |