System and Method for Detecting and Controlling Contraband Devices in a Controlled Environment

ABSTRACT

The present disclosure provides details of a system and method for detecting and monitoring a contraband device including communication devices by utilizing a combination of mobile devices, fixed monitoring devices, and a contraband monitoring center. The mobile devices include smart phones or tablets that are borrowed, rented, or purchased by an inmate from a correctional facility. These mobile devices are configured to detect, monitor, and intervene in the communications of target devices. Further, the mobile devices are configured to communicate with fixed monitoring devices located throughout the correctional facility in performing intervention operations. The contraband monitoring center may also be utilized in the coordination, monitoring, and intervention of target devices.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation of U.S. patent application Ser. No.15/718,646 filed on Sep. 28, 2017, which is a continuation of U.S.patent application Ser. No. 15/286,294 filed on Oct. 5, 2016, which areincorporated by reference herein in their entirety.

BACKGROUND Field

The disclosure relates to a system and method for detecting andcontrolling contraband devices in a controlled environment.

Background

It is common practice in a corrections environment to record and/ormonitor inmates' conversations. Such recording and monitoring takesplace in the very controlled atmosphere of permitted inmatecommunications with individuals outside of the facilities housingprisoners or inmates. Normally prisoners are limited to a small numberof individuals that they are permitted to call. These may include familymembers, their lawyers, and friends and may specifically exclude others,for example judges, jury members, witnesses, former co-conspirators andother like individuals to whom calls from a particular inmate may be ofa harassing or other undesired nature. There may be a time of day, alength of call, three-way call or other restrictions on calls, all ofwhich must be controlled by way of various instrumentalities that mayinclude computer controlled equipment at the facility and/or at remotelocations in addition to human monitoring and/or control. In almost allinstances, such communications must be recorded; yet even in thoseinstances, there are conditions that may impact on the desire, ability,or legal right to record such conversations. For example, it isinappropriate to record or monitor conversations between an inmate andhis/her attorney, and thus, measures must be taken to insure that, wherecalls are made from an inmate to his/her attorney, no recording is madeor monitoring is allowed.

While it is considered well-known that the recording of inmatecommunications is advantageous to governmental agencies and appropriateauthorities in that information regarding the security of facilities andgeneral continuing or past criminal activity may be found in suchrecordings, advances in the communications technology have openedavenues for inmates to circumvent such monitoring and/or recordingadvantages. Maintaining the ability to ensure control and/or monitoringof communications from or to a controlled facility is, therefore, animportant aspect to previously implemented telecommunications systems.With the advances in cellular communications technology, maintainingsecurity is hindered by such issues as the clandestine delivery ofprohibited equipment into a monitored facility. Due to the small size ofcertain of the more recently-developed devices, such may avoid detectionby more conventional search techniques including, but not limited to,walk through and manual metal detectors and even physical “pat-down”searches.

Conventionally, some correctional facilities have prevented the use ofcontraband cellular devices through the use of jamming devices ormanaged access devices (e.g., Stingray surveillance device manufacturedby Harris Corporation) which emit a blanketing signal(s) around acorrectional facility to prevent the use of any unauthorized cellulardevices. However, these technologies are highly discouraged in mostjurisdictions as they can interfere with public use of cellular phoneswhen visiting or merely passing by the correctional facility. Despitethe disadvantages of these jamming and monitoring technologies, they areoccasionally used for a limited amount of time during emergencysituations such as a riot.

While various aspects and alternative features are known in the field ofcommunication monitoring, no one design has emerged that generallyaddresses the concerns of the prison industry, as discussed herein.

BRIEF DESCRIPTION OF THE DRAWINGS/FIGURES

The accompanying drawings, which are incorporated herein and form a partof the specification, illustrate embodiments of the present disclosureand, together with the description, further serve to explain theprinciples of the disclosure and to enable a person skilled in thepertinent art to make and use the embodiments.

FIG. 1 illustrates a block diagram of a detection and monitoring system,according to embodiments of the present disclosure.

FIG. 2 illustrates a block diagram of a mobile device, according toembodiments of the present disclosure.

FIG. 3 illustrates a block diagram of a contraband monitoring center,according to embodiments of the present disclosure.

FIG. 4 illustrates a block diagram of an application server, accordingto embodiments of the present disclosure.

FIGS. 5-6 illustrate flowchart diagrams of methods of detecting andmonitoring a contraband device, according to embodiments of the presentdisclosure.

FIG. 7 illustrates a computer system, according to exemplary embodimentsof the present disclosure.

The present disclosure will be described with reference to theaccompanying drawings. In the drawings, like reference numbers indicateidentical or functionally similar elements. Additionally, the left mostdigit(s) of a reference number identifies the drawing in which thereference number first appears.

DETAILED DESCRIPTION

The following Detailed Description refers to accompanying drawings toillustrate exemplary embodiments consistent with the disclosure.References in the Detailed Description to “one exemplary embodiment,”“an exemplary embodiment,” “an example exemplary embodiment,” etc.,indicate that the exemplary embodiment described may include aparticular feature, structure, or characteristic, but every exemplaryembodiment may not necessarily include the particular feature,structure, or characteristic. Moreover, such phrases are not necessarilyreferring to the same exemplary embodiment. Further, when a particularfeature, structure, or characteristic is described in connection with anexemplary embodiment, it is within the knowledge of those skilled in therelevant art(s) to affect such feature, structure, or characteristic inconnection with other exemplary embodiments whether or not explicitlydescribed.

The exemplary embodiments described herein are provided for illustrativepurposes, and are not limiting. Other exemplary embodiments arepossible, and modifications may be made to the exemplary embodimentswithin the spirit and scope of the disclosure. Therefore, the DetailedDescription is not meant to limit the invention. Rather, the scope ofthe invention is defined only in accordance with the following claimsand their equivalents.

Embodiments may be implemented in hardware (e.g., circuits), firmware,software, or any combination thereof. Embodiments may also beimplemented as instructions stored on a machine-readable medium, whichmay be read and executed by one or more processors. A machine-readablemedium may include any mechanism for storing or transmitting informationin a form readable by a machine (e.g., a computing device). For example,a machine-readable medium may include read only memory (ROM); randomaccess memory (RAM); magnetic disk storage media; optical storage media;flash memory devices; electrical, optical, acoustical or other forms ofpropagated signals (e.g., carrier waves, infrared signals, digitalsignals, etc.), and others. Further, firmware, software, routines,instructions may be described herein as performing certain actions.However, it should be appreciated that such descriptions are merely forconvenience and that such actions in fact result from computing devices,processors, controllers, or other devices executing the firmware,software, routines, instructions, etc. Further, any of theimplementation variations may be carried out by a general purposecomputer, as described below.

For purposes of this discussion, any reference to the term “module”shall be understood to include at least one of software, firmware, andhardware (such as one or more circuit, microchip, or device, or anycombination thereof), and any combination thereof. In addition, it willbe understood that each module may include one, or more than one,component within an actual device, and each component that forms a partof the described module may function either cooperatively orindependently of any other component forming a part of the module.Conversely, multiple modules described herein may represent a singlecomponent within an actual device. Further, components within a modulemay be in a single device or distributed among multiple devices in awired or wireless manner.

The following Detailed Description of the exemplary embodiments will sofully reveal the general nature of the invention that others can, byapplying knowledge of those skilled in relevant art(s), readily modifyand/or adapt for various applications such exemplary embodiments,without undue experimentation, without departing from the spirit andscope of the disclosure. Therefore, such adaptations and modificationsare intended to be within the meaning and plurality of equivalents ofthe exemplary embodiments based upon the teaching and guidance presentedherein. It is to be understood that the phraseology or terminologyherein is for the purpose of description and not of limitation, suchthat the terminology or phraseology of the present specification is tobe interpreted by those skilled in relevant art(s) in light of theteachings herein.

Overview

As discussed above, with the advances in communications technologies,correctional facilities have had difficulty in preventing the entranceand use of prohibited equipment. Due to the small size of certain of themore recently developed devices, such may avoid detection by moreconventional search techniques. Further, once within, a correctionalfacility's ability to stop cellular device use is limited to insidertips and room searches, due to the limited if any use of jammingdevices. Further, even when jamming devices are used inmates are able tocircumvent conventional jamming technologies by using cellular devicesin “dead” spots, or areas of the prison that are outside of zones wherejamming and monitoring devices are effective in locating the cellulardevice.

In light of the above, the present disclosure provides details of asystem and method for detecting and monitoring a contraband deviceincluding communication devices such as cellular phones by utilizing acombination of mobile devices, fixed monitoring devices, and acontraband monitoring center. The mobile devices include smart phones,tablets, or e-readers that are borrowed, rented, or purchased by aninmate from a correctional facility. In addition to performingtraditional functions such as communications, these mobile devices areconfigured to detect, monitor, and intervene in the communications oftarget devices. Further, the mobile devices are configured tocommunicate with fixed monitoring devices located throughout thecorrectional facility in performing intervention operations. Thecontraband monitoring center may also be utilized in the coordination,monitoring, and intervention of target devices.

Detection and Monitoring System

FIG. 1 illustrates a block diagram of detection and monitoring system100, according to embodiments of the present disclosure. As shown byFIG. 1, a number of mobile devices 1-3 are illustrated in a correctionalfacility 110. Mobile devices 1-3 are communication devices such as smartphones, tablets, e-readers, or other portable devices that are borrowed,rented, and/or purchased by inmates or workers, such as guards, fromcorrectional facility 110 for communications with individuals outside ofcorrectional facility 110 such as families, friends, counselors, orothers with whom the inmates are permitted to communicate with. Mobiledevices 1-3 are configured to transmit and receive authorizedcommunications to/from outsiders including text, audio, or videocommunications. All communications between mobile devices 1-3 and anoutside communication device (not shown) are routed by communicationcenter 120. Services for monitoring and recording authorizedcommunications via mobile devices 1-3 are also performed by, or onbehalf of, correctional facility 110 at communication center 120.

Mobile devices 1-3 and communication center 120 connect via network 101which includes a Local-Area Network (LAN), a Wide-Area Network (WAN), orthe Internet, depending on the relative locations of communicationcenter 120 and mobile devices 1-3. For example, communication center 120may be located at a correctional facility where mobile devices 1-3 islocated and therefore a LAN is used. In another example, communicationcenter 120 is located at a different location than the correctionalfacility and therefore network 101 is a WAN or the Internet. In anembodiment, mobile devices 1-3 connects to the network 101 by way of aninterface (not shown) such as a router or access point that is locatedat the correctional facility 110.

In an embodiment, interface 140 a is configured to couple signalsbetween mobile devices 1-3 and communication center 120. Interface 140 aconnects to mobile devices 1-3 via wireless technologies such as, butnot limited to, Bluetooth®, WiFI, or radio frequency (RF) transmissions.Interface 140 a connects to communication center 120 via wiredtechnologies including, but not limited to, optical cables or RF cablesand/or wireless technologies including, but not limited to, a LAN, aWAN, or the Internet. In an embodiment, interface 140 a is an accesspoint, a gateway, a router, a hotspot, or a hub. However, in anembodiment, one or more of the mobile devices 1-3 is configured todirectly connect to the communication center 120 without the use ofinterface 140.

Mobile devices 1-3 are configured to detect and monitor communicationsby target device 150. Examples of target device 150 include a cellularphone, a network router, a hotspot, or any communication device. To dothis, mobile devices 1-3 are configured to monitor different radioaccess technologies including, but not limited to, GSM, 2G-5G, WCDMA,CDMA, TDMA, UMTS, WIMAX, WIFI, IBEACON, Bluetooth, LTE, 700 mhz to 2200mhz or other frequency bands, and/or other modes and frequencies. Whilemonitoring a radio access technology, mobile devices 1-3 are configuredto detect a transmission of a signal on the radio access technology fromtarget device 150. For example, mobile device 1 may detect a carrierfrequency of a transmitted signal from target device 150.

Mobile devices 1-3 are also configured to gather information from targetdevice 150. Mobile devices 1-3 can gather information related to thetarget device 150 from content of the transmitted communication fromtarget device 150 or if needed mobile devices 1-3 can perform additionalsteps to gather additional information. For example, mobile devices 1-3are configured to utilize an RF transmission to gather information fromtarget device 150. As an example, mobile devices 1-3 are configured tosimulate a cellular tower, such as cellular tower 160, and therebygather information from target device 150. Cellular tower 160 may be amacrocell, femtocell, a node, an access point or any other type ofcommunication base station. To simulate a cellular tower, To simulate acellular tower, mobile devices 1-3 are configured to transmit RF signalshaving a signal strength that exceeds a signal strength of the cellulartower. The signal strength of the cellular tower may be known by themobile devices 1-3 or known based on results of a survey, as describedin more detail below. When a mobile device (either mobile devices 1-3)transmits the RF signal, due to the strength of the RF signal, targetdevice 150 is forced to disconnect from the cellular tower 160 andestablish a connection with the mobile device. In this situation, themobile device receives and transmits data between the target device 150and the cellular tower 160. Once connection is established betweentarget device 150 and the mobile device, the mobile device can gatherinformation from target device 150 including identification informationof the target device 150, such as the international mobile subscriberidentity number (IMSI) or the electronic serial number (ESN), andinformation on the communication, such as a phone number of the outsidecommunication device.

Mobile devices 1-3 are configured to compare the gathered informationwith stored data, as will be described below. Based on the results ofthe comparison, mobile devices 1-3 can determine whether target deviceis authorized to be used within the correctional facility or iscontacting an authorized outsider.

Mobile devices 1-3 are configured to transmit information, as will bedescribed in further detail below, to contraband monitoring center 130.Mobile devices 1-3 connect to contraband monitoring center 130, whichprovides additional monitoring and detection services in relation tounauthorized communications by target device 150. These additionalservices include the comparison of gathered data with stored data, thecoordination of target device intervention measures, alerts, and/ornotifications to one or more mobile devices 1-3, one or more fixeddevices 4-5, and/or workers (not shown) at correctional facility 110.These services are likewise performed at the contraband monitoringcenter 130 by, or on behalf of, the correctional facility 110.

In an embodiment, interface 140 b is configured to couple signalsbetween mobile devices 1-3 and contraband monitoring center 130.Interface 140 b connects to mobile devices 1-3 via wireless technologiessuch as, but not limited to, Bluetooth WiFI, or radio frequency (RF)transmissions. Interface 140 b connects to contraband monitoring center130 via wired technologies including, but not limited to, optical cablesor RF cables and/or wireless technologies including, but not limited to,a LAN, a WAN, or the Internet. However, in an embodiment, one or more ofthe mobile devices 1-3 is configured to directly connect to thecontraband monitoring center 130 without the use of interface 140 b. Inan embodiment, interface 140 a is an access point, a gateway, a router,a hotspot, or a hub. In an embodiment, interface 140 a and interface 140b are the same interface and configured to direct signals between mobiledevices 1-3 and communication center 120 or contraband detection center130 based on the information within the signals.

Mobile devices 1-3 are also configured to intervene between unauthorizedcommunications and target device 150. In an embodiment, interventionoperations by mobile devices 1-3 include transmitting a jamming signalof low RF strength that radiates within predetermined areas 10, 20, 30about a location of the mobile devices 1-3. For example, thepredetermined areas 10, 20, 30 may be jamming signals that radiate 10-15meters in all directions around the mobile devices 1-3. Jamming signalsinclude a signal that interferes or blocks a detected frequency or asignal that associates with the detected frequency. For example, thejamming signal may interfere with a downlink signal that is associatedwith a detected uplink signal of a cellular phone. Jamming signalsinclude signals that have an increased power or signals that include apredetermined number of transmissions that overpower unauthorizedcommunications. Jamming signals may also include signals that corruptunauthorized communications. For example, mobile devices 1-3 can analyzepacket headers transmitted by the target device 150 and transmit asignal that overwrites portions of the unauthorized communication suchthat packets of the unauthorized communication become corrupted.

In an embodiment, jamming signals are configured to not interfere withcommunications between mobile devices 1-3 and an outside communicationdevice. To do this, mobile devices 1-3 emit jamming signals having afrequency band and/or radio access technology that is different from thefrequency band and/or radio access technology used for communicationbetween the mobile devices 1-3 and communication center 120.

Jamming signals are activated based on the detection of target device150 and/or instructions received from contraband monitoring center 130.In doing so, mobile devices 1-3 preserve battery power. While thejamming signal is described as being dependent on the detection oftarget device 150, the present application is not limited as so, and mayinclude an always on mode where such detection of the target device andthe subsequent activation of the jamming signal is always transmitted bythe mobile devices 1-3. In this mode, at least one of mobile devices 1-3are configured to transmit a jamming signal when a main operating system(OS) of the mobile device is powered on, in sleep mode, and/or poweredoff. In other words, in this mode, jamming features are operatedindependently of the main processor power of the mobile device.

In an embodiment, intervention operations by mobile devices 1-3 alsoinclude a recording operation where audio and/or video is recorded by amobile device at the time of detection. In this operation, mobiledevices 1-3 are configured to activate their own microphone or camera torecord communications and/or images of the area when target device 150is detected. This allows a mobile device the ability to record actualconversations or capture visual confirmation of the unauthorized use oftarget device 150. Once recorded, the recorded audio/video data istransmitted from the mobile devices 1-3 to contraband monitoring center130 to analyze the recorded audio/video data.

In an embodiment, intervention operations by mobile devices 1-3 furtherinclude a managed access point operation. For this, mobile devices 1-3are configured to utilize an RF transmission to simulate a cellulartransmission tower, as previously described. Once connection isestablished between target device 150 and one of the mobile devices 1-3,the mobile device can capture the content of the communication itselfand record communications.

In an embodiment, intervention operations by mobile devices 1-3 alsoincludes blocking or sending instructions to have communications from/tothe target device 150. For example, during a managed access pointoperation, the mobile device is configured to act as an intermediarybetween the target device 150 and the cellular tower 160. In thisexample, the mobile device can capture communication information fromintercepted communications between the target device 150 and thecellular tower 160 to gather information and then can completely blockthe target device 150 from receiving or transmitting communicationsto/from the cellular tower 160. In another example, the mobile devices1-3 are configured to transmit identifying information (e.g., IMSI, ESN,and/or phone numbers) of the target device 150 to the contrabanddetection center 130 which, in turn, passes this information to acontroller of the cellular tower 160 with a request for the targetdevice 150 to be added on an exclusion list which blocks communicationsfrom/to the target device 150. In this embodiment, signals of the targetdevice 150 are not jammed using radio frequencies. Rather, the signalsare received by the respective access point, but dropped or otherwiseprevented from being forwarded based on the device identificationinformation associated with the signals.

In an embodiment, one or more of the mobile devices 1-3 is configured toperform a survey of transmitted frequencies from communication sourcesnearby correctional facility 110, for example cellular tower 160.Information gathered by the survey is then used to focus the detectingof transmissions from target device 150 based on the results of thesearch. For example, mobile device 1 can perform a survey to determinethe uplink and downlink frequencies of cellular tower 160 and, based onresults of the survey, can focus monitoring, detection, and jammingoperations on the frequencies used by cellular tower 160.

As described above, mobile devices 1-3 operate individually by detectingtarget device 150, transmitting information to contraband monitoringcenter 130, and performing intervening operations. However, in anembodiment, mobile devices 1-3 are also configured to operate in a meshinfrastructure where mobile devices 1-3 communicate with each otherand/or with fixed monitoring devices 4-5 to detect target device 150 andperform intervening operations. In this embodiment, each of the mobiledevices 1-3 acts as a node in a mesh infrastructure where each of thenodes can communicate and even instruct the other node to performoperations such as performing a jamming operation, a recordingoperation, or a managed access operation. For example, as shown by FIG.1, if mobile device 1 detects target device 150, mobile device 1communicates this information to one or more of the mobile devices 2-3and instructs one or more of these devices to output a jamming signal.In a mesh infrastructure, mobile devices 1-3 are able to performintervention operations without the use of contraband detection center130 or before receiving instructions from contraband detection center130.

In an embodiment, mobile devices 1-3 use a change in location (motiondata) to determine what intervention operations to perform and/orinformation to transmit between each other, fixed monitoring devices4-5, and/or the contraband monitoring center 130. Mobile devices 1-3 cantransmit motion data to other devices when target device 150 is detectedand/or after a request to share motion data by another device. Forexample, after mobile device 1 detects target device 150, mobile device1 shares motion data with mobile devices 2-3 and/or fixed monitoringdevices 4-5 to indicate that it is moving away from target device 150such that mobile devices 2-3 or fixed monitoring devices 4-5 can performintervention operations. In another example, after mobile device 1detects target device 150, mobile device 1 can poll other devices (e.g.,mobile devices 2-3 or fixed monitoring devices 4-5) and receive locationand motion data from these devices, if available, to determine whetherany of these devices are or will be in close proximity to perform anintervention operation.

In an embodiment, fixed monitoring devices 4-5 are placed in locations,indoor or outdoor, throughout correctional facility 110. Fixedmonitoring devices 4-5 may be a standalone device or combined withcommon electronics within correctional facility 110 such as a kiosk or awireless access point. Fixed monitoring devices 4-5 are configured toperform all or some of the functions as the mobile devise 1-3, asdescribed above, in detecting target device 150 and performing anintervening operation, as described above.

In an embodiment, one or more fixed monitoring devices 4-5 include adirectional antenna to focus an RF signal at a particular area.Directional antennas of fixed monitoring devices 4-5 may be used tosupplement areas of correctional facility 110 where mobile devices 1-4are not typically allowed or difficult to access such as the yard orsparsely populated areas. These types of fixed monitoring devices 4-5may be placed in areas such as fences around correctional facility 110and directed towards the inside of the correctional facility 110 toavoid jamming issues with the public.

As shown by FIG. 1, fixed monitoring devices 4-5 connect to contrabandmonitoring center 130 by way of interface 140 b. Connection to interface140 b is by wired technologies including, but not limited to, opticalcables or RF cables and/or wireless technologies including, but notlimited to, a LAN, a WAN, or the Internet. In an embodiment, one or moreof the fixed monitoring devices 4-5 connects directly to contrabandmonitoring center 130 by way of the wired or wireless technologies, aspreviously discussed.

Similar to mobile devices 1-3, fixed monitoring devices 4-5 areconfigured to perform operations individually, or in a meshinfrastructure, where one of the fixed monitoring devices 4-5 providesor receives instructions from at least one of mobile devices 1-3,another one of fixed monitoring devices 4-5, and/or contrabandmonitoring center 130.

Mobile Device

FIG. 2 illustrates a block diagram of mobile device 200, according toembodiments of the present disclosure. Mobile device 200 may be anexemplary embodiment of one or more of mobile devices 1-3. Mobile device200 includes processor circuitry 210 that is communicatively coupled toplurality of communication interfaces 220, input/output circuitry 230,and positional and motion circuitry 240. Processor circuitry 210includes one or more processors 212, circuitry, and/or logic configuredto control the overall operation of mobile device 200, including theoperation of communication interfaces 220, input/output circuitry 230,and positional and motion circuitry 240. Processor circuitry 210 furtherincludes memory 214 to store data and instructions. Memory 214 may beany well-known volatile and/or non-volatile memory that is removableand/or non-removable.

Communication interfaces 220 include one or more transceivers,transmitters, and/or receivers that communicate via one or more antennas222. Communication interfaces 220 are configured to transmit and receivecommunications between an inmate and an outsider via network 101.Communication interfaces 220 are also configured to detect transmissionsby target device 150. Detection of target device 150 transmissionsinclude reception of a communication of an unauthorized communicationvia one or more antennas 222. For example, to detect an unauthorizedcommunication, a receiver of the communication interface 220 may cyclethrough different frequencies bands and/or radio access technologies.Communication interfaces 220 are further configured to output an RFsignal during intervention operations. For example, a transmitter of thecommunication interfaces 220 may be configured to transmit aninterference signal based on the received unauthorized communication.Lastly, communication interfaces 220 is configured to communicate withother mobile devices 1-3, fixed monitoring devices 4-5, and/orcontraband monitoring center 130 to provide or receive informationand/or instructions.

Input/output circuitry 230 includes circuitry such as a keypad, a touchinterface, a microphone, a camera, and a video screen for displayinginformation. Input/output circuitry 230 may be used by a user fortraditional mobile device communications such as audio, video, ortexting communications. Input/output circuitry 230 such as themicrophone and camera are used during intervention operation to captureaudio and/or video of surrounding areas when a unauthorizedcommunication is detected.

Positional and motion sensors 240 include circuitry for determining acurrent location and a change in location of mobile device 200.Positional and motion circuitry 240 may include such circuitry as GlobalPositioning System (GPS) technology, indoor positioning systems (IPS)technology, accelerometers, and/or gyroscopes to determine position andmotion. Positional and motion sensors 240 are configured to triangulatea first current location of mobile device 200 based on signals receivedfrom, for example, positioning systems. Positional and motion sensors240 are configured to determine whether mobile device 200 is in motionbased on second location of the mobile device 200 and determiningwhether a change of location occurred between the first current locationand the second current location.

Contraband Detection Center

FIG. 3 illustrates a block diagram of contraband monitoring center 130,according to embodiments of the present disclosure. Contrabandmonitoring center 130 includes communication server 302, location server304, database server 306, biometric server 308, application server 310,and data storage 320, that are all connected to each other via a networkbus 301.

Each of the servers 302-310 can be constructed as individual physicalhardware devices, or as virtual servers. The number of physical hardwaremachines can be scaled to match the number of simultaneous userconnections desired to be supported detection and monitoring system 100.

Communication server 302 consists of any number of servers, and isconfigured to receive and transmit information to/from mobile devices1-3, fixed monitoring devices 4-5, and/or interface 140. Communicationserver 302 receives information such as alerts, recorded audio/videodata, and locations of devices at time of detection of target device andis configured to record and log the information. Because communicationserver 302 receives and transmits information by way of a network, in anexemplary embodiment, communication server 302 can encrypt and decryptthe information for security purposes.

Location server 304 consists of any number of servers, and is configuredto receive location and motion data from one or more of mobile devices1-3 and/or fixed monitoring devices 4-5. The location and motion data isused by location server 304 to determine a location and/or motion oftarget device 150, location and motion of devices 1-5 that are near alocation of the detection of target device 150, and location and motionof devices 1-5 that are moving towards or away from the location of thedetection of the target device 150. If location information is receivedfrom multiple devices, location server 304 can use the information totriangulate an accurate location of target device 150. Locationinformation is received by location server 304 based any one or more ofa request to one or more of the devices 1-5, a predetermined time fordevices 1-5 to communicate respective location and motion data, or basedon an event performed by one of the devices 1-5, for example detectionof target device 150. Location server 304 is further configured toprovide instructions to devices (e.g., mobile devices 1-3 and/or fixedmonitoring devices 4-5) to perform intervention operations based on thereceived location information.

Database server 306 consists of any number of servers, and is configuredto store and organize data in a relational database. Database server 306is configured to run a database management system, such as MYSQL′, toprovide an example. Database server 306 stores data related tocorrectional facility 110 such as locations of fixed monitoring devices4-5, and/or interfaces 140 a, 140 b, past locations of detected targetdevice 150, and whitelist and blacklist information, such as information(e.g., IMSI, ESN, and/or phone numbers) on devices authorized and/orunauthorized to be used within correctional facility 110 anddevices/people authorized an/or unauthorized for communications withthose from correctional facility 110. Examples of these lists mayinclude a list of IMSI numbers of mobile devices of guards orcorrectional facility workers that are authorized to be used in thecorrectional facility, or an unauthorized called phone numbers listincluding phone numbers of witnesses, judges, or victims of crimes. Thedatabase server 306 is configured to share stored data with mobiledevices 1-3 and fixed monitoring devices 4-5 for monitoring operations,as described below.

Biometric server 308 consists of any number of servers, and isconfigured to store biometric data of inmates. Biometric data includesat least one of voice data, facial recognition data (2D or 3D), devicedata. Biometric server 308 is configured to assist analyzing audio/videodata received from mobile devices 1-3. Biometric server 308 assists bycomparing received audio/video data against stored biometric data todetermine identities of those near a device at the time of detection.

Data storage 320 provides access to a wide variety of data such as pastlocation information, logs for alerts, notifications etc., audio/videoinformation received from mobile devices 1-3, fixed monitoring devices4-5, and/or interface 140, and/or database data. In general, datastorage 320 stores any data stored by communication server 302, locationserver 304, database server 306, biometric server 308, and applicationserver 310. Because the data stored on data storage 320 may consume asignificant amounts of storage space, data storage 320 may include aNetwork Attached Storage (NAS) device, which is configured as a massstorage device. In order to reduce the required size, data storage 320preferably includes a backup routine to transfer data to permanentstorage devices, such as archival permanent storage or optical disks,after a predetermined time has elapsed since the initial recording ofthat data. Data storage 320 is connected to the servers 302-310 by wayof the network bus 301.

FIG. 4 illustrates application server 400, according to exemplaryembodiments of the present disclosure. Application server 400 mayrepresent an exemplary embodiment of the application server 310 depictedin FIG. 3. Application server 400 consists of any number of servers, andfunctions as the primary logic processing center in detection andmonitoring system 100 such as coordinating a response to detection oftarget device 150. Application server 400 is configured to manage andfacilitate communication between communication server 302, locationserver 304, database server 306, biometric server 308, and data storage320.

Application server 400 includes one or more central processing units(CPU) 410 connected via a bus 401 to several other peripherals. Suchperipherals include an input device, such as keyboard and/or mouse 420,monitor 422 for displaying information, network interface card 424and/or modem 426 that provide network connectivity and communication.

Application server 400 also includes internal data storage 430. Thisdata storage 430 is non-volatile storage, such as one or more magnetichard disk drives (HDDs) and/or one or more solid state drives (SSDs).Data storage 430 is used to store a variety of important files,documents, or other digital information, such as operating system files,application files, user data, and/or temporary recording space.

Application server 400 also includes system memory 440. System memory440 is preferably faster and more efficient than Data storage 430, andis configured as random access memory (RAM) in an embodiment. Systemmemory 440 contains the runtime environment of application server 400,storing temporary data for any of operating system 442, java virtualmachine 444, java application server 446, and detection and monitoringcontrol logic 448.

System Operations

Operations of detecting, monitoring, and intervening in detection andmonitoring system 100 will be described with respect to FIGS. 5-6.Although the physical devices and components that form the system havelargely already been described, additional details regarding their morenuanced operation will be described below with respect to FIGS. 1-4.While FIGS. 5-6 contain methods of operation of detection and monitoringsystem 100, the operations are not limited to the order described below,and various operations can be performed in a different order. Further,two or more operations of each method can be performed simultaneouslywith each other.

FIG. 5 illustrates a flowchart diagram of a method of detecting andmonitoring a contraband device, according to embodiments of the presentdisclosure. In step 502, a detecting device such as one of mobiledevices 1-3 or fixed monitoring devices 4-5 search for a contrabanddevice. When searching for a cellular device or hotspot, for example,the detecting device enables a receiver to receive transmissions. Thedetecting device may focus the receiver on specific types oftransmissions such as GSM, CDMA, LTE, or other cellular transmissionsand/or may rotate through a variety of frequencies and transmissiontypes including, for example, cellular transmissions and WIFI signals ofa specific type. In an embodiment, the detecting device performs asurvey of frequencies from communication sources nearby correctionalfacility 110, for example cellular tower 160, as previously described.Based on the results of the survey, detecting device can determine whatfrequencies the search should focus on.

The detecting device next determines if a contraband device, such astarget device 150, is detected in step 504. Detection is based onwhether target device transmits a communication. However, it will beapparent to persons skilled in the relevant art that other methods fordetecting target device 150 may be used. If target device 150 is notdetected, the detecting device continues to search for a contrabanddevice in step 502. Otherwise, when target device 150 is detected, thedetecting device gathers information from target device 150 in step 506.Gathered information is retrieved by the detecting device simulating acellular transmission tower, such as cellular tower 160, which has beenpreviously described. Gathered information includes information such asan IMSI, an ESN, and/or a phone number of target device 150. In anexemplary embodiment, the gathered information also includes a phonenumber of a called device.

In step 508, the gathered information is used by the detecting device todetermine whether target device 150 is authorized for use incorrectional facility 110. Determination of whether target device 150 isauthorized for use is based on the comparison of gathered informationwith stored data on the database server 306, such as IMSIs, ESNs, and/orphone numbers of devices authorized for use or blocked from use withincorrectional facility 110. As an example, the detecting device isconfigured to perform the comparison of the gathered information withstored data. The detecting device may obtain the stored data, such as alist of devices allowed for use in correctional facility 110, fromdatabase 306 by way of a request for the list or a pre-scheduled orautomatic transmission of the list by the contraband detection center130. As another example, the detecting device is configured to transmitthe gathered information to the contraband detection center 130, where acomparison of the gathered information and stored data is performed, theresults of which are transmitted to the detection device.

In an embodiment, the gathered information is used by the detectingdevice to determine whether target device 150 has contacted anauthorized or blocked number from within correctional facility 110. Forexample, the detecting device is configured to compare the gatheredinformation with a list of blocked telephone numbers. As another examplethe detecting device can transmit the gathered information to thecontraband detection center 130 to perform the comparison. If theresults of the comparison indicate that target device 150 is authorizedand/or the called party are authorized, the detecting device searchesfor another contraband device, in step 502.

Otherwise, the detecting device performs an intervention operation, instep 510. Intervention operations include transmitting a jamming signal,performing a recording operation, performing a managed access pointoperation, and/or alerting, coordinating, or instructing other devices,such as mobile devices 1-3, fixed monitoring devices 4-5, and/orcontraband detection device 130, regarding the target device 150 and/orintervention operations to perform.

In an embodiment, the detecting device transmits an alert to contrabandmonitoring center 130 to allow contraband monitoring center 130 tocoordinate an intervention plan. The alert includes one or more of anindication that target device 150 has been detected, a time and alocation of the detecting device when the detection occurred, or amotion of the detecting device since detection. If instructions arereceived from contraband monitoring center 130, the detecting devicereceives the instructions and performs the intervention operations.

Intervention operations continue until completed, in step 512.Completion of an intervention operation may be determined based on oneor more of a predetermined time since an intervention operation began ormotion information indicating that the device has moved. Thepredetermined time is determined based on the intervention operationperformed. For example, the predetermined time may be an arbitrary timefor transmitting a jamming signal. As another example the predeterminedtime may be a sufficient amount of time to sample an audio or videorecording, or receive data from the contraband device when performingmanaged access operation.

If determined that the intervention operation is complete, the detectingdevice searches for another contraband device in step 502. Otherwise,the detecting device continues to perform the intervention operation, instep 510.

FIG. 6 illustrates a flowchart diagram of a method of detecting andmonitoring a contraband device, according to embodiments of the presentdisclosure. In step 602, contraband monitoring center 130 receives analert from one or more of mobile devices 1-3 or fixed monitoring devices4-5. The alert includes a time and a location of the one or more ofmobile devices 1-3 or fixed monitoring devices 4-5 when detection oftarget device 150 occurred. Once received, contraband monitoring center130 gathers additional data to generate an intervention plan. Gatheringadditional information may include polling one or more of mobile devices1-3 or fixed monitoring devices 4-5 near the location informationreceived and requesting location information, motion information, and/ordetection information. Additional information may also include gatheringinformation on locations or availability of prison workers and/orcapabilities of mobile devices 1-3 or fixed monitoring devices 4-5.Next, contraband monitoring center 130 generates an intervention planwhich coordinates one or more intervention operations to be performed tointercept, locate, and/or gather information from target device 150.After the contraband monitoring center 130 generates the interventionplan, instructions are transmitted to those mobile devices 1-3, fixedmonitoring devices, or workers designated to perform interventionoperations.

Exemplary Computer Implementation

It will be apparent to persons skilled in the relevant art(s) thatvarious elements and features of the present disclosure, as describedherein, can be implemented in hardware using analog and/or digitalcircuits, in software, through the execution of computer instructions byone or more general purpose or special-purpose processors, or as acombination of hardware and software.

The following description of a general purpose computer system isprovided for the sake of completeness. Embodiments of the presentdisclosure can be implemented in hardware, or as a combination ofsoftware and hardware. Consequently, embodiments of the disclosure maybe implemented in the environment of a computer system or otherprocessing system. For example, the method of FIGS. 5-6 can beimplemented in the environment of one or more computer systems or otherprocessing systems. An example of such a computer system 700 is shown inFIG. 7. One or more of the modules depicted in the previous figures canbe at least partially implemented on one or more distinct computersystems 700.

Computer system 700 includes one or more processors, such as processor704. Processor 704 can be a special purpose or a general purpose digitalsignal processor. Processor 704 is connected to a communicationinfrastructure 702 (for example, a bus or network). Various softwareimplementations are described in terms of this exemplary computersystem. After reading this description, it will become apparent to aperson skilled in the relevant art(s) how to implement the disclosureusing other computer systems and/or computer architectures.

Computer system 700 also includes a main memory 706, preferably randomaccess memory (RAM), and may also include a secondary memory 708.Secondary memory 708 may include, for example, a hard disk drive 710and/or a removable storage drive 712, representing a floppy disk drive,a magnetic tape drive, an optical disk drive, or the like. Removablestorage drive 712 reads from and/or writes to a removable storage unit716 in a well-known manner. Removable storage unit 716 represents afloppy disk, magnetic tape, optical disk, or the like, which is read byand written to by removable storage drive 712. As will be appreciated bypersons skilled in the relevant art(s), removable storage unit 716includes a computer usable storage medium having stored therein computersoftware and/or data.

In alternative implementations, secondary memory 708 may include othersimilar means for allowing computer programs or other instructions to beloaded into computer system 700. Such means may include, for example, aremovable storage unit 718 and an interface 714. Examples of such meansmay include a program cartridge and cartridge interface (such as thatfound in video game devices), a removable memory chip (such as an EPROM,or PROM) and associated socket, a thumb drive and USB port, and otherremovable storage units 718 and interfaces 714 which allow software anddata to be transferred from removable storage unit 718 to computersystem 700.

Computer system 700 may also include a communications interface 720.Communications interface 720 allows software and data to be transferredbetween computer system 700 and external devices. Examples ofcommunications interface 720 may include a modem, a network interface(such as an Ethernet card), a communications port, a PCMCIA slot andcard, etc. Software and data transferred via communications interface720 are in the form of signals which may be electronic, electromagnetic,optical, or other signals capable of being received by communicationsinterface 720. These signals are provided to communications interface720 via a communications path 722. Communications path 722 carriessignals and may be implemented using wire or cable, fiber optics, aphone line, a cellular phone link, an RF link and other communicationschannels.

As used herein, the terms “computer program medium” and “computerreadable medium” are used to generally refer to tangible storage mediasuch as removable storage units 716 and 718 or a hard disk installed inhard disk drive 710. These computer program products are means forproviding software to computer system 700.

Computer programs (also called computer control logic) are stored inmain memory 706 and/or secondary memory 708. Computer programs may alsobe received via communications interface 720. Such computer programs,when executed, enable the computer system 700 to implement the presentdisclosure as discussed herein. In particular, the computer programs,when executed, enable processor 704 to implement the processes of thepresent disclosure, such as any of the methods described herein.Accordingly, such computer programs represent controllers of thecomputer system 700. Where the disclosure is implemented using software,the software may be stored in a computer program product and loaded intocomputer system 700 using removable storage drive 712, interface 714, orcommunications interface 720.

In another embodiment, features of the disclosure are implementedprimarily in hardware using, for example, hardware components such asapplication-specific integrated circuits (ASICs) and gate arrays.Implementation of a hardware state machine so as to perform thefunctions described herein will also be apparent to persons skilled inthe relevant art(s).

CONCLUSION

It is to be appreciated that the Detailed Description section, and notthe Abstract section, is intended to be used to interpret the claims.The Abstract section may set forth one or more, but not all exemplaryembodiments, and thus, is not intended to limit the disclosure and theappended claims in any way.

The disclosure has been described above with the aid of functionalbuilding blocks illustrating the implementation of specified functionsand relationships thereof. The boundaries of these functional buildingblocks have been arbitrarily defined herein for the convenience of thedescription. Alternate boundaries may be defined so long as thespecified functions and relationships thereof are appropriatelyperformed.

It will be apparent to those skilled in the relevant art(s) that variouschanges in form and detail can be made therein without departing fromthe spirit and scope of the disclosure. Thus, the disclosure should notbe limited by any of the above-described exemplary embodiments, butshould be defined only in accordance with the following claims and theirequivalents.

What is claimed is:
 1. A mobile device for detecting and monitoring atarget device used in a facility, the mobile device comprising: atransceiver configured to communicate with a first communication networkand a second communication network; and one or more processorsconfigured to: detect transmissions from the target device communicatingon the second communication network; gather information regarding thetarget device based on the detected transmissions; transmit the gatheredinformation on the first communication network to a contraband detectioncenter; and determine whether the target device is authorized tocommunicate within the facility on the second communication networkbased on received information from the contraband detection center.