abstract |
Techniques for causing a wireless device in some prescribed operational area to respond on demand to a suitably designed interrogator and thereby expose its presence and identifying information while minimizing the required power and collateral interference outside of the predefined operational area. Having established the presence of the wireless device, the interrogator can subsequently establish it as friend or foe and proceed to either quarantine, disable, filter for access or elicit continuous transmission from the device for purposes of location while allowing friendly devices to continue to function normally in the same operational area or similarly prevent said friendly devices from becoming the source of constant false alarms. The methods described herein can be extended to interrogating a wireless device to discover its location, the encryption keys it is using, or interrogating the network to discover the actual dialing number of the wireless device. |