Systems and Methods for Detecting and Controlling Transmission Devices

ABSTRACT

A method of detecting, controlling and managing transmission of a transmitting device within a facility is disclosed. The method involves transmitting information to the transmission device at a power greater than a power of an available base station covering the facility, detecting a response transmission from the transmission device by a least one transmission detection facility, extracting identification information associated with the transmission device in response to the transmitted information; and determining a location of the transmission device based on the response transmission received by the at least one received transmission detection facility, wherein the response transmissions are sorted by the identification information, determining an allowability of the located transmission device with the set area and interacting and manipulating transmission of the detected transmitting device.

CLAIM OF PRIORITY

This application claims the benefit of the earlier filing date, pursuantto 35 USC 119,

to U.S. Provisional App. No. 61/751,910, entitled Systems and Methodsfor Detecting and Controlling Transmission Devices, filed on Jan. 13,2013 (BINJ-0100CIP-7Provisional-3) and further claims the benefit of theearlier filing date, pursuant to 35 USC §120, as a continuation-in-partto that

patent application entitled “System and Method of Detection ofTransmission Facilities,” filed in the United States Patent andTrademark Office on Nov. 18, 2013 and afforded Ser. No. 14/083,427(BINJ-0100CIP-5CON-1), which claimed the benefit of the earlier filingdate, as a continuation in part to that

patent application entitled “System and Method of Detection ofTransmission Facilities,” filed in the United States Patent andTrademark Office on Jul. 27, 2009 and afforded Ser. No. 12/870,808(BINJ-0100CIP-5), now U.S. Pat. No. 8,626,195, issued Jan. 7, 2014,

which claimed the benefit of the earlier filing date, pursuant to 35 USC119, to

-   -   U.S. Provisional App. No. 61/237, 682, entitled “Method and        System for Determining a Location and Tracking of a Wireless        Device,” filed on Aug. 28, 2009 (BINJ-P-0106), to    -   U.S. Provisional App. No. 61/264,838, entitled “System and        Method of Detection and Allowing Access of Transmission        Facilities, filed on Nov. 30, 2009 (BINJ-P-0108) and to    -   U.S. Provisional App. No. 61/307,838, entitled “System and        Method for Capturing and Controlling Transmission Devices,”        filed on Feb. 24, 2010 (BINJ-P-109). and

further claimed the benefit of the earlier filing date, pursuant to 35USC §120, as a continuation-in-part to that

patent application entitled “System and Method of Detection and AllowingAccess of Transmission Facilities,” filed in the United States Patentand Trademark Office on Jul. 27, 2009 and afforded Ser. No. 12/510,036(BINJ-0100CIP-2), which claimed the benefit of the earlier filing date,pursuant to 35 USC 120, as a continuation-in-part to that

patent application entitled “Tracking and Determining a Location of aWireless Transmission”,” filed in the United States Patent and TrademarkOffice on Jun. 11, 2008 and afforded Ser. No. 12/157,530(BINJ-0100CIP-1) now U.S. Pat. No. 8,238,936, issued on Aug. 7, 2012,which claimed the benefit of the earlier filing date, pursuant to 35 USC120, as a continuation-in-part; to that

patent application entitled “Systems and Methods of DetectionTransmission Facilities,” filed in the United States Patent andTrademark Office on Jul. 14, 2006 and afforded Ser. No. 11/457,786(BINJ-0100) issued as U.S. Pat. No. 8,078,190 on Dec. 13, 2011,

-   -   which claimed the benefit of the earlier filing date, pursuant        to 35 USC §119, of    -   U.S. Provisional App. No. 60/699,281 filed on Jul. 14, 2005 and    -   U.S. Provisional App. No. 60/739,877 filed on Nov. 23, 2005. The        entire contents of all of which are incorporated by reference,        herein.

The application further claims the benefit of the earlier filing date,pursuant to 35 USC §120, as a continuation-in-part to that

patent application entitled “Wrist Band Transmitter,” filed in theUnited States Patent and Trademark Office on Sep. 2, 2008 and affordedSer. No. 12/231,437, (BINJ-0100CIP-1CIP-1) which claimed the benefit ofthe earlier filing date, pursuant to 35 USC §120, as acontinuation-in-part to that

patent application entitled “Tracking and Determining a Location of aWireless Transmission,” filed in the United States Patent and TrademarkOffice on Jun. 11, 2008 and afforded Ser. No. 12/157,530(BINJ-0100CIP-1), now U.S. Pat. No. 8,238,936, issued Aug. 7, 2012,

which claimed the benefit of the earlier filing date, pursuant to 35 USC§120, as a continuation-in-part to that

patent application entitled “Systems and Methods of DetectionTransmission Facilities,” filed in the United States Patent andTrademark Office on Jul. 14, 2006 and afforded Ser. No. 11/457,786(BINJ-0100), now U.S. Pat. No. 8,078,190, issued on Dec. 13, 2011. Theentire contents of all of which are incorporated by reference, herein.

RELATED APPLICATION

This application is related to co-pending patent application entitled“Systems and Methods of Detection of Transmission Facilities,” filed onJul. 27, 2009 and afforded Ser. No. 12/510,006 (BINJ-010000N-1), whichclaimed the benefit, pursuant to 35 USC 120, as a continuation of thatpatent application entitled “Systems and Methods of DetectionTransmission Facilities,” filed in the United States Patent andTrademark Office on Jul. 14, 2006 and afforded Ser. No. 11/457,786, nowU.S. Pat. No. 8,078,190, the contents of all of which are incorporatedby reference, herein.

BACKGROUND

This invention relates to the field of wireless transmission and moreparticularly to controlling its use.

BACKGROUND

There are many facilities, such as government buildings, and inparticular correctional facilities, such as prisons, that do not permitcellular phone usage or wireless transmission devices on the premises oreven possession of cellular phones within the premises. Finding andpreventing usage of cell phones and other transmission facilities isdifficult, and a need exists for improved methods of detecting,locating, and managing the transmission of such devices.

SUMMARY OF THE INVENTION

Provided herein are methods and systems for locating transmissiondevices (or transmission facilities) such as cellular phones, cellphones, mobile phones, satellite phones, radios, transmitters, PDAs,beepers, pagers, walkie-talkies, email devices, instant messengerdevices, voice over IP devices, and other types of wirelesscommunication or transmission facilities whose possession is prohibited.In addition, control of the devices is important as such wirelessdevices are known to be used to detonate bombs, as in the case ofimprovised explosive devices. The methods herein are also to positivelyidentify, locate and track individuals with such transmissionfacilities. For example, the system provides the location and trackingof one or more individuals who utilize a wireless device to communicateand further determines whether the individual is authorized to transmitwithin the general area local to the individual. In one aspect, lawenforcement may be interested in tracking the individual'sidentification and movements.

Methods relate to locating and managing the use and presence of wirelesscommunication facilities are further disclosed. Embodiments relate todetecting wireless devices when they transmit a signal are furtherdisclosed. Other embodiments relate to detecting of transmission deviceswhen the transmission devices (i.e., facilities) are in a non-activetransmission active state.

In embodiments the methods and systems disclosed herein include methodsand systems for detecting a transmitting device within an obstructionrich environment. The methods and systems may include detecting thetransmitting device within a wireless detection transmission facility;communicating signal information relating to the detected transmittingdevice from the wireless transmission detection facility to a centralunit; determining the location of the transmitting device; displayinginformation of the detection and location of the transmitting devicethrough a user interface; and providing the information to an actionfacility for causing actions related to the detected transmittingdevice. In embodiments, the wireless transmission detection facility isan antenna. In embodiments, the antenna is a dual dipole embeddedantenna. In embodiments, the dual dipole embedded antenna is tuned toreceive cell phone transmissions. In embodiments the dual dipoleembedded antenna is tuned to receive a frequency band of approximately700 to 950 MHz. In embodiments the dual dipole embedded antenna is tunedto receive a frequency band of approximately 1.7 to 2.0 GHz. Inembodiments the dual dipole antenna is tuned to receive signals infrequency bands of approximately 700 to 950 MHz and 1.7 to 2.0 GHz. Inembodiments the obstruction rich environment is a correctional facility.In embodiments the obstruction rich environment is a mall. Inembodiments, communicating the information relating to the detectedtransmitting device from the wireless transmission detection facility toa central unit involves wireless communications. In embodiments, thewireless communications are 802.11 communications. In embodiments,determining the location of the transmitting device is accomplishedthrough transmission triangulation. In embodiments location of thetransmitting device is accomplished through a known location of a singleantenna. In embodiments the location of the transmitting device isdetermined based on extrapolation of the receipt of a plurality ofreceived signals through a series of non-iterative linear equations.

BRIEF DESCRIPTION OF FIGURES

The systems and methods described herein may be understood by referenceto the following figures:

FIG. 1 shows a transmission detection, identification, and reportingsystem.

FIG. 2 illustrates a system for detecting a transmission facility

FIG. 3 illustrates exemplary antenna configurations.

FIG. 4 illustrates a first system configuration for detecting atransmission facility in a cell environment.

FIG. 5 shows a second system configuration for detecting a transmissionfacility in a cell environment.

FIG. 6 illustrates a block diagram relating to actions taken whendetecting transmission facilities.

FIG. 7 shows a transmission facility detection system wherein an antennaarray is used to determine location.

FIG. 8 shows a transmission facility detection system wherein a signalsource is differentiated between two adjacent rooms.

FIG. 9 illustrates a transmission facility detection systemconfiguration employing multiple antennas used to identify a location ofa signal source after an omni-directional antenna has detected itspresence.

FIG. 10 shows a schematic diagram of a system for detecting signals of atransmission facility.

FIG. 11 shows a schematic diagram of an alternate embodiment of a systemfor detecting a signal of a transmission facility.

FIG. 12 shows a schematic diagram of a main circuit board within asystem for detecting transmission facilities.

FIG. 13 shows a schematic diagram of a sub-station in a system fordetecting transmission facilities.

FIG. 14 illustrates a null detection facility.

FIG. 15 Illustrates a system for detecting and controlling atransmission facility.

FIG. 16 Illustrates a system for tracking and locating transmissionfacilities.

FIG. 17 Illustrates an exemplary corrections facility designed forautomation.

FIG. 18 illustrates a system for implementing the processing describedherein.

FIG. 19A illustrates an exemplary process for capturing a wirelesstransmission in accordance with the principles of the invention.

FIG. 19B illustrates an exemplary geographical representation to explainthe processing shown in FIG. 19A.

FIGS. 20A and 20 b illustrates exemplary distance and power graphsassociated with the network configuration shown in FIG. 19A.

FIG. 21 illustrates a second example of an exemplary cellular networkconfiguration.

FIGS. 22, 23, 24 illustrate exemplary power graphs associated with thenetwork configuration shown in FIG. 21.

FIG. 25 illustrates a superposition of the graphs shown in FIGS. 22. 23.24.

FIG. 26 illustrates an exemplary power transmission in accordance withthe principles of the invention.

FIG. 27 illustrates a flow chart of an exemplary process for determiningpower transmission in accordance with the principles of the invention.

FIG. 28 illustrates an exemplary process and options for controllingwireless transmission within an area in accordance with the principlesof the invention

FIG. 28A illustrates an alternative exemplary process and options forcontrolling wireless transmission within an area in accordance with theprinciples of the invention.

FIG. 29 illustrates an exemplary methodology of allowing communicationsvia a wireless communication device with in a controlled area andoptions for controlling wireless transmission within an area inaccordance with the principles of the invention.

FIG. 30 illustrates an alternative exemplary methodology forcommunicating when controlling wireless transmission within an area inaccordance with the principles of the invention.

FIG. 31 illustrates an exemplary process for controlling a wirelesstransmission in accordance with the principles of the invention.

DETAILED DESCRIPTION OF THE INVENTION

Detection of a transmission facility, such as a mobile phone orhand-held radio transmitter, or other transmission facility as describedherein, within an obstruction rich environment, such as a facility withmany physical barriers to electronic transmission, is difficult toachieve. Referring to FIG. 1, the transmission detection,identification, and reporting system 100 described herein provides amethod of detecting a transmission facility 202, such as depicted inFIG. 2, within an environment rich in obstructions 102. One embodimentof the transmission detection, identification, and reporting system 100may involve the detection of a mobile phone within a heavily walled andmetal-barred government facility, such as a correctional facility. Inthis embodiment, the system may utilize an array of antennas 104selectively placed within the facility, collection substations 108 forlocalized collection of detected signals, a central unit 110 for theprocessing of incoming signals from the facility, a display 112 forshowing the location of the detected transmission facility 202, and anaction facility 114 for implementing standard procedures in the event ofa detection. In this embodiment, the communications between the antennas104 and the substations 108, and between the substations 108 and thecentral unit 110, may be wireless to make installation and maintenanceof the system within the facility, cost and time effective. Selectiveplacement of the antennas 104, combined with algorithms and methods fordetermining location of the transmission facility 202, may allow asubstantially improved means for locating transmission facilities 202,such as mobile phones, in an otherwise heavily shielded environment.

In embodiments the antenna 104 may be a multi-dipole embedded antenna.Two examples of dual dipole embedded antennas are provided in FIG. 3 asa first dual-dipole embedded antenna 302 and a second dual dipoleembedded antenna 304. In embodiments the antenna may be adapted toreceive one, two, three, four, or more bandwidths. In embodiments theantenna 104 may be selected as one or more of a dipole antenna 104, aYagi-Uda antenna 104, a loop antenna 104, a quad antenna 104, amicro-strip antenna 104, a quad antenna 104, a helical antenna 104, anda phase array antenna 104, a patch antenna or a combination thereof.

In embodiments, the transmission facility 202 may be a mobile phone,such as a flip phone, a slide phone, a cellular phone, a handset, asatellite phone, a 3G phone, a wireless phone, a cordless phone or thelike. In embodiments, the transmission facility 202 may be a radio, suchas a Walkie-Talkie, a mobile radio, a short-wave radio, or the like.

In embodiments, the transmission band from the transmission may bewithin the radio or other electromagnetic frequency spectrum, such asextremely low frequency (ELF), super low frequency (SLF), ultra lowfrequency (ULF), very low frequency (VLF), low frequency (LF), mediumfrequency (MF), high frequency (HF), very high frequency (VHF), ultrahigh frequency (UHF), super high frequency (SHF), extremely highfrequency (EHF), microwave, a frequency suitable for 802.11x wirelesscommunications, ultra wide band (UWB), Bluetooth, or the like.

In embodiments, the obstruction rich environment 102 may be a building,such as a corrections facility, a school, a government facility, astore, a mall, a residence, a hotel, a motel, or the like. Inembodiments, the obstruction rich environments 102 may be a largeconfined space, such as a courtyard, a food court, a recess area, ahallway, greenhouse, recreation room, gymnasium, auditorium, kitchen,cafeteria, craft area, work area, library, prison yard, or the like. Inembodiments, the transmission obstruction 102 materials such ascinderblock, cement, rebar, wire cage, metal, metal coated surface, orthe like. In embodiments, the obstructions in the obstruction richenvironments 102 may be other construction materials, such as wood,glass, rug, flooring materials, roofing materials, and the like.

In embodiments, the transmitting signal information from the antenna 104module to the central unit 110 may be through a communicationsconnection, such as an IEEE 802.15.4 wireless network, IEEE 802.11Wi-Fi, Bluetooth, Ethernet, and/or other similar type wirelesscommunication protocols. In embodiments, the communications connectionmay utilize CAT-5, RJ-45, RS-232 connections, and/or other similar typewired communication protocols and hardware. In embodiments thecommunications connection may utilize an optical connection, such as awireless infrared link, wireless visible light, an optical fiber, andthe like.

In embodiments, the transmitting signal information from the antenna 104module to the central unit 110 may contain data, such as CDMA, CDPD,GSM, TDMA, and the like, and may be used to discriminate which servicesignal is being used, such as Verizon, Cingular, T-Mobile, Sprint, andthe like. The detection of the cell phones may be further resolved downto cell phone manufacturer and cell phone provider.

In embodiments, the transmitting signal information to the central unit110 may be made through an intermediate connection, such as a substation108, router, switch, hub, bridge, multiplexer, modem, network card,network interface, processing unit, preprocessor, computer, repeater,antenna 104, and the like. (see FIG. 2).

In embodiments, the central unit 110 may have in part a computer, acomputer system, a network of computers, a state machine, a sequencer, amicroprocessor, a digital signal processor, an audio processor, apreprocessor, a microprocessor, and the like.

In embodiments, the central unit 110 may process information, such aslocation information, such as the location of people, inmates,corrections personnel, visitors, all personnel within the facility,equipment, resources, weapons, products, incoming goods, outgoing goods,and the like. In embodiments, the information may be a type of signal,such as mobile phone standard protocols such as CDMA, CDPA, GSM, TDMA,and the like. In embodiments, the information may be an eventnotification, such as personnel under duress, an emergency medicalcondition, a call for assistance, a fire, a call for police, a theft,and the like. In embodiments, the processed information may allow forthe tracking of the person or object in possession of the transmissionfacility 202, such as a mobile phone, a radio, a weapon, a product, aresource, and the like. In embodiments, the processed information mayallow for the discrimination and/or association between people orobjects, such as determining the ownership of the transmission facility202, the assignment of the source of transmission, current location of atransmission facility 202 compared to its predicted location, and thelike. In embodiments, the processed information may also have time codesand unique identifiers assigned.

In embodiments, the central unit 110 may have a display 112, such as acathode ray tube (CRT), liquid crystal display (LCD), electronic paper,3D display, head-mounted display, projector, segmented display, computerdisplay, graphic output display, and the like. In embodiments, thecentral unit 110 may have an action facility 114, comprising a userinterface for causing actions relating to the detected transmissionfacility 202. Actions may for example represent operations such asclosing a door, sealing a room, deploying and action signal, initiatingan alarm, and the like.

In embodiments the functions of a central unit 110 as described hereinmay be replaced by an alternate configuration, such as a configurationof multiple computers, such as a group of servers, processors, or thelike, operating in parallel. In embodiments the methods and systemsdescribed herein may involve locating computing capabilities inalternative network configurations, such as in a mesh network or apeer-to-peer network.

In embodiments of the invention, the location of a transmission facility202 may be determined by various radiolocation or signal measurementtechniques, including measuring phase, amplitude, time, or a combinationof these; or by identifying and locating an area associated with anantenna 104 with the highest signal strength. In embodiments of theinvention, the location of a transmission facility 202 may be determinedwhen the transmission facility 202 is powered off though detection of anull in the band pass of a transmitted frequency sweep due to thepresence of a mobile phone antenna.

In embodiments, a method of detecting a transmission facility 202 (e.g.cell phone) when the transmission facility 202 is not powered mayrequire a transmitting device and a receiving device that can recognizethe signature of an antenna 104 associated with the transmissionfacility 202. By transmitting a known frequency and receiving thedisturbance pattern produced by having a particular antenna 104 designin the transmission path, the pattern or ‘signature’ of that antenna 104can be characterized. In embodiments, this characterization may beevaluated by central unit 110 with results output to a display 112. Adatabase of these signatures can be placed into the unit, and as thetransmitter sweeps across the various cell frequencies, a patternreceived can be matched against the database patterns to determine thepresence of transmission facilities 202. In embodiments, any class ofantenna (e.g. WI-FI, Blackberry, Walkie-Talkie, etc.) can be classifiedand identified.

In embodiments, the range of a hand held device that can detect aninactive transmission facility is approximately 10 feet. In embodiments,greater distances could be attained for stationary units by increasingthe power.

Radiolocation, also referred to as radio-determination, as used herein,encompasses any process of finding the location of a transmitter bymeans of the propagation properties of waves. The angle, at which asignal is received, as well as the time it takes to propagate, may bothcontribute to the determination of the location of the transmissionfacility 202. There are a variety of methods that may be employed in thedetermination of the location of a transmission facility 202. Methodsinclude (i) a cell-sector system that collects information pertaining tocell and sector ID's, (ii) the assisted-global positioning satellite(GPS) technology utilizing a GPS chipset in a mobile communicationfacility, (iii) standard GPS technology, (iv) enhanced-observed timedifference technology utilizing software residing on a server that usessignal transmission of time differences received by geographicallydispersed radio receivers to pinpoint a user's location, (v) timedifference of arrival, (vi) time of arrival, (vii) angle of arrival,(viii) triangulation of cellular signals, (iix) location based onproximity to known locations (including locations of otherradio-transmitters), (ix) map-based location, or any combination of anyof the foregoing, as well as other location facilities known to those ofskill in the art.

Obstructions to radio wave propagation in the obstruction richenvironments 102 may greatly reduce the effectiveness of many of theconventional radiolocation methods due to obstruction of theline-of-sight between the transmission facilities 202 and the receivingantennas 104. However, by employing a large array of antennas 104,positioned so as to maintain line-of-sight between possible transmissionfacility 202 locations and the receiving antennas 104, several of thesemethods may be effectively used in the location of the transmissionfacility 202. These methods include time difference of arrival, time ofarrival, and angle of arrival, amplitude comparison, and the like. Thetime difference of arrival method determines the difference in the time,or the difference in phase, of the same radio-transmitting signalarriving at different receiving antennas 104. Together with the knownpropagation speed of the radio wave, allows the determination of thelocation of the transmission facility 202. The time of arrival methoddetermines the absolute time of reception of the signal at differentreceiving antennas 104, and again, along with the known propagationspeed of the radio wave, allows the determination of the location of thetransmission facility 202. The angle of arrival method utilizesdirection of transmission to different antennas 104 to determine thelocation of the transmission facility. Amplitude comparison methodcompares the strength of the signal detected at each antenna todetermine the location of a transmission facility 202. For example, twoantennas 104 located in the same room would detect different signalamplitudes for the same transmission facility 202 output, therebyproviding a means of determining which antenna 104 the transmissionfacility 202 is closer to. Increasing the number of antennas 104therefore increases the resolution with which the location of thetransmission facility 202 may be determined. All of these methods, andcombinations of these methods, may employ mathematical processes such astriangulation, trilateration, multilateration, or like, in determiningthe location of the transmission facility.

Triangulation is the process of finding coordinates and distance to apoint by calculating the length of one side of a triangle, givenmeasurements of angles and/or sides of the triangle formed by thatpoint, such as the target transmission facility 202, and two other knownreference points, such as the receiving antennas 104. The calculation ofthe location of the transmission facility 202 may then be performedutilizing the law of sines from trigonometry. Tri-lateration is a methodsimilar to triangulation, but unlike triangulation, which uses anglemeasurements, together with at least one known distance, to calculatethe subject's location, tri-lateration uses the known locations of twoor more reference points and the measured distance to the subject, suchas the transmission facility 202, and each reference point, such as thereceiving antennas 104. Multi-lateration, or hyperbolic positioning, issimilar to tri-lateration, but multi-lateration uses measurements oftime difference of arrival, rather than time of arrival, to estimatelocation using the intersection of hyperboloids.

While several radiolocation and triangulation techniques have beendescribed in connection with locating the transmitting device, it shouldbe understood that one skilled in the art would appreciate that thereare other location methodologies and such location methodologies areencompassed by the present invention. For example, in embodiments, thelocation of a single antenna may be known and the single antenna maydetect a transmitting device. The location of the transmitting devicemay be estimated through its known proximity to the single antennalocation. This may provide adequate location resolution for certainapplications of the technology. Similarly, two or more antennas may beused and each of the antenna locations may be known. When each of theantennas receives a transmission, the corresponding signal strengths maybe compared. The one with the highest signal strength may be determinedas the one closest to the transmitting device so the correspondingantenna location may provide enough location resolution for certainapplications.

In an embodiment of the transmission detection, identification, andreporting system 100, a corrections facility, with its substantial andinherent obstruction rich environment 102, presents a significantchallenge to authorities of the correction facilities. In the embodimentif the invention shown and described herein, the system may be placedthroughout the corrections facility for the purpose of alerting thecorrections staff that cell phone activity is taking place, the locationof the activity and the type, i.e., Nextel, T-Mobile, Verizon, and thelike. The following technology may also allow for a standalone detectionunit 408 or set of detection units 408 (see FIG. 4) to detect cellphones in schools, buildings and other environments in which thefacility's or area's provider does not wish the use of cell phones andis interested in the detection of cell phone use.

In an embodiment, the system may include an integrated antenna 104 andRF detector (together referred to as a detector unit 408) (FIG. 4), asubstation 108, (FIG. 1) whose purpose may be to communicate with eachdetector unit 408 within its sector, and report activity to the centralunit 110 which reports confirmed activity, type of cell phone, andlocation to the display 112 of the central unit 110. These detectionunits 408 may be used individually or in conjunction with each other andmay triangulate detection within a specific area. The outside yard areasmay be monitored by detection units 408, which may cover large areas,such as 25×25 foot sectors or smaller areas, e.g., 5×5 foot sectors, tolocalize the detection of a cell phone (i.e., wireless transmissionfacility) and track its position from one sector to an adjoining sector.That is, as the person moves with a phone, the changing position of thatphone may be reported. If the phone moves inside the facility, trackingmay continue as interior detection units 408 detect the phone.

In an embodiment, within these basic groups of detection units 408 maybe various detection unit 408 types. Some detection units 408 may bedesigned to be hard wired via RJ-45 connectors and/or CAT 5e cable,other detection units 408 may use 802.11b (WI-FI) wirelesscommunications between detection units 408, and there may also be anInfra Red (IR) set of detection units 408 which utilize opticalcommunications techniques. Each communications type may have a specificpurpose within the corrections facility or other type of building and/orareas. Hard-wired units may be used when it is not possible to useeither an optical unit or a WI-FI unit. These hard-wired units may beused when there are walls embedded with metal or where the distance andthe obstructions 102 may preclude a wireless technique. WI-FI detectionunits 408 may be used when it is effective to communicate in an areawhere there are obstructions 102, such as cement walls or cement withembedded rebar walls, facades, and the like. Optical detection units 408may be used in areas where clear, line-of-site communications may bepossible. Optical detection units 408 may operate over relatively longdistances, (e.g., 3,000 feet), while WI-FI detection units 408 may belimited to shorter distances, such as 250 feet.

In an embodiment, there may also be a hand-held detection units 408 tobe used once a cell phone has been detected, and the correctionsofficer(s) or monitor are attempting to pinpoint the location. Thishand-held detection unit 408 may be similar to the integratedantenna/detector unit of the main system. This embodiment may alsoinclude a detector, discriminator and decoder module. The hand-helddetection units 408 may detect and identify each cell phone and comparethe cell phone identity to the allowed cell phone user list or in thiscase to a list of unauthorized cell phones. This detector unit 408 mayoutput an audible alarm whose pitch changes as the signal becomesstronger or weaker.

In an embodiment, a second type of hand-held detector unit 408 may beused to detect a cell phone when it is either off or in a standbycondition, also referred to as null detecting. Null detection may beused at an ingress or egress of a building or an area as a way ofdetecting a communication device or device with an antenna. Thistechnique may be used in areas where it is unpractical, unwanted orunwarranted to have x-ray machines or more intrusive detection systems.A null detection system may also be deployed in a handheld device so aninspector can move through an area attempting to detect a communicationdevice. In embodiments, the null detection system may detect thepresence of a transmission facility even when the transmission facilityis not transmitting a signal. In embodiments, a hand held or mountednull detection device may be used in a correctional institution or othergovernment facility.

In embodiments, null detection may utilize a transmission-detectionsource, independent of the transmission source being detected, which iscapable of sweeping across the frequency spectrum of interest andreceiving it's returning signal. The transmission source sweeps thespectrum of interest, searching for distortions in the returned field.Distortions in the spectrum may be due to the presence of an antenna ofa transmission facility 202. Matching the distortion, also referred toas a null in the band pass, to characteristics of known antennas usedwith mobile phones may allow the detection and/or identification of thetransmission facility 202. The unit may output an audible “beep” if itdetects a null, allowing the officers to focus in on the location of thecell phone. The range of the hand-held detection units 408 may be, forexample, 15 to 20 feet. This will allow cell phones that are in theimmediate vicinity to be quickly detected. The null detection may beapplicable for ingress and/or egress detection.

In an embodiment, a survey may be performed to determine optimalplacement and the type and number of detection units 408 required. Thiswill insure the minimum number of required detection units 408 toperform optimal detection. The team may provide a report detailing thelayout determined to be optimized for the facility and may review thisreport with the facilities staff so that any required modifications tothe plan may be incorporated before installation is begun.

In an embodiment, the initial coverage of a facility may be in the cellblocks 402 (FIG. 4) and/or pod areas. The same may be true for linearfacilities. The survey may cover the entire facility, including openareas, such as courtyards, where required. Inmate also work in largeyard and plantations such as Angola State Prison, it is anticipated thistechnology may be deployed over a large outside area.

In an embodiment, the cell block detection units 408 may be mountedinside each chase 404 (a column positioned between cells in a cell blockthat includes various utility facilities, such as for plumbing andelectricity), as shown in FIG. 4, and may communicate to a substation108 (not shown in FIG. 4) located at one end of the block. Thisdetection unit 408 may communicate its information to the central unit110 so that tracking, confirmation, and display may be accomplished. Forlinear facilities 500, as shown in FIG. 5, detector units 408 may bemounted along the walls in the obstruction rich environment 102 oppositethe cells 402 and perform their function similar to the detection units408 mounted within a chase 404.

In an embodiment, detector units 408 may be installed in open areas suchas gymnasiums, kitchens, cafeterias, craft and work areas and other openareas where a cell phone may be used. The difference in these locationsfrom the cell blocks 402 may include the method of detection andtracking. Since most facilities may only require the identification of acell phones presence within a room, and there could be many inmateswithin that room, the process may be to lock-down the room, or rooms, inthat area and use a hand held device and a physical search to pinpointthe phone location. A generalized block diagram of a detector unit 408is shown in FIG. 6. For those facilities that require resolving thelocation within a large interior room or area, the use of triangulationto resolve to a 10×10 foot area may be used.

In an embodiment, facilities with the requirement to detect cell phones202 in outside yard areas, the use of triangulation to a 25×25 footspace or smaller foot space (e.g., 5×5 foot) may be constructed. As aphone 202 is moved from area coverage 702 to area coverage 702, thesystem may track its movement. Each square foot sector may overlap anadjoining sector. In this way, as shown in FIG. 7, tracking may becontinuous, without any gaps.

In an embodiment, it may also be important to know whether a phone islocated on one side of an obstruction or the other, such as doors,walls, and the like. If the wrong room is identified, it may make itmore difficult to locate a phone and its user. As shown in FIG. 8,detection of the correct room may depend upon the level of the signalreceived. Proper placement of the detector units 408 may insure that thephone may be identified in the correct location.

In an embodiment, when sectoring a large room such as a gymnasium, thenumber and placement of antennas 104 may be critical. In order to sectorlarge regions, such as a 10×10 foot section, within the room, theantenna 104 may need to be capable of narrowing their window to an areasmall enough to meet the requirement. In FIG. 9, there is shown anomni-directional antenna 104, which detects signal presence generally ina 360 degree direction. Once a signal crosses a threshold, the directionfinding antennas 104 may be turned on to determine the position of thesignal. This may be reported to the display 112 and tracked until it iseither turned off or moves to another room or hallway. Then, normalpositional tracking may take place.

In an embodiment, the transmission detection, identification, andreporting system 100 may work in conjunction with a personal alarmsystem, or an inmate tracking system, or a combination of all three andthe like. This dual/tri role system(s) may allow for more cost effectiveuse of the detection units 408 and provide for greater protection forthe correctional officer and inmate alike. This detection system mayutilize an individualized frequency, with known frequency separationbetween detection units 408 and between corrections officer'sfrequencies and Inmate frequencies. The detection configuration of thedetection units 408 may provide complete coverage of the facility. Eachtransmission facility unit may be continually tracked throughout thefacility. At all ingress or egress points the focus of the detection mayensure accurate location of all correctional and inmate personnel. Withthe combined systems more detection units 408 may be needed to ensurefull coverage. In an embodiment, the known Identify of the transmissionfacility, in this case a cell phone being carried and/or used by anofficer or inmate, can be accurately associated with another knownidentify of another transmission facility, in this case a correctionsofficer and/or inmate wearing a transmission facility. In thisembodiment, the use of an authorized cell phone or an authorizedtransmission facility by an unauthorized person can be accuratelydetected and reported. This embodiment can be utilized inside thefacility or outside the facility.

In an embodiment, the transmission detection, identification, andreporting system 100 may allow for cell phone owner discrimination. Thesystem may provide for the allowance of authorized cell phones withinthe prohibited area. The system may detect and identify each cell phoneand compare the cell phone identity to the allowed cell phone user list.The system may record all phone use and may automatically alert thefacility of all prohibited cell phone use. In addition, each cell phonedetection event may be identified with a unique identifier and timecode, to ensure proper identification. The CCTV system may also beintegrated to ensure greater accuracy identifying illegal use ofwireless transmission devices.

The cell scan-1 detection system 1000, shown in FIG. 10, is anembodiment of a system for detecting signals of a transmission facility.Antenna 104 receives transmission signals from a wireless transmissiondevice (not shown). Antenna 104 may operate, for example in the range of2.4 GHz with a bandwidth of 465 MHz. The received signals are thenprovided to a low pass filter and a log amplifier, wherein the level ofamplification is based on the input level of the input signal. Theamplified signal is next provided to a shaping filter and an operationalamplifier. The amplified signals are provided to an analog-to-digital(ADC) converter and provided to a Field Programmable Gate Array (FPGA).Information from the FPGA may be provided to a microprocessor tosupplement the processing and control imposed by the FPGA. The FPGA mayreceive information from dedicated frequency bands (e.g., 900 MHz) orfrom known wireless protocols (e.g., 802.15.4). The microprocessor maythen determine whether a detected transmission facility for example is aperson with a transmission facility (e.g., a wristband, a cell phone)and may allow or prevent that person from accessing an area. Themicroprocessor may also alert the central unit of the persons enteringor desire to enter a restricted area. In another embodiment, if thetransmission facility for example is a cell phone and the cell phone wasin use within a restricted area, the cell phone would be identified bythe central unit as being in a restricted area, then the system willdetermine whether the cell phone is authorized or not authorized, thenthe system would make a determination, based upon a set rules whether toallow or disallow the transmission unit within the restricted area.

The cell scan-1 detection system 1000, shown in FIG. 10, is anembodiment of a system for detecting signals of a transmission facility.An antenna 104 receives wireless transmission facilities in a 2.4 GHzband, with a 465 MHz bandpass antenna. In other aspects, the detectionsystem may detect signals in other frequency bands; for example, 933MHz, 433Mhz, 2.4 GHz and other known frequencies. The detected signalsare provided to High and Low band RF filter. The RF filters (band passfilter) isolate sets of frequencies for greater sensitivity. Forexample, the received signals may be provided to a low band RF filter toisolate low band RF signals and high band RF filters to isolate highband RF signals. The isolated RF signals are provided to Log Amplifiersthat amplify or boost the signals using known amplification methods. Theswitch between two Wi-Fi frequencies switches all three wireless signalinputs into a log amp circuit and then to a smoothing filter to clean upthe signal to be analyzed. The signals are then provided to anOperational Amplifier (Op Amp) which amplifies the received analogsignal. The amplified RF signal is then processed through an A/Dconverter (ADC), which changes the signal into a digital signal. Thesignal is then processed in a processing unit (in this case a dedicatedField Programmable Gate Array (FPGA)) and the results are thentransmitted via a dedicated 2.4 GHz transceiver unit. The 2.4 GHztransceiver unit has several other applications, and is used to transmitand receive communication information and to connect to external Wi-Ficommunication devices. An example of this is an education system forinmates, medical monitoring equipment in a hospital application, aninteractive ID for safe school applications. The 900 MHz transceiverunit is for synchronizing the sensors. The 465 MHz transceiver unit isfor communication with inmates bracelets and Staff (personal alarmsystem) as is further discussed in the aforementioned related patentapplications. The lower frequency of the 465 MHz unit also providesbetter wall penetration and alternative wireless communication devicewith better wall penetration. In another embodiment, the front end ofthe signal detection circuit comprises an amplifier (e.g., 0-40 db gain)is added before the RF filter (for example a 824-849 MHz RF filter) toprovide for greater sensitivity. In additional a mixer and VoltageControlled Oscillator (VCO) (not shown) is added after the RF filter.The output of the mixer is an intermediate frequency (IF) that isamplified and then provided to a band pass filter (e.g., a 200 MHzfilter with a bandwidth of 4 MHZ). The signal is then amplified and thenprovided to the Log Amp then to an Op Amp and then to the ADC. Dependingon the noise floor (which is determined by proper grounding), one withan understanding of RF circuitry would know to have proper impedancematching between components, and will utilize transformers whereappropriate. The IF section's general parameters are 70 MHz to 350 MHzand sensitivity is related to frequency and the width of the band passfilter. As would be appreciated, the tighter the width of the band pass,the greater the sensitivity. In another embodiment, the VCO/mixer may befixed and the IF band pass filter may be the bandwidth of a desiredfrequency providing for faster detection without the need to scan.Additionally the greater the dynamic range of the sensor system thegreater accuracy and resolution in determining the exact location of thetransmission facility.

In an embodiment as shown in FIG. 10, the processing section may beplaced on a separate board, this provides for multiple sensors frontends utilizing one back end processing unit. This provide for more costeffective sensors and versatility of assets. This also allows forspecific functionality such as antenna array directional location andangle tri-angularizaton being synchronized to at least one processingunit. It is also anticipated the more expensive processing component beshared such a transmission signal decoding, data analysis,communications and the like.

The cell scan-2 detection system 1100, shown in FIG. 11, shows analternate embodiment of a system for detecting a signal of atransmission facility. The RF filters (i.e., band pass filter) isolatesets of frequencies for greater sensitivity. In this example a low bandcell phone signals and high band cell phone signals. The operation ofthe elements in FIG. 11 is similar to that of FIG. 10 and need not bediscussed in detail herein.

The main board system 1200, shown in FIG. 12, is an embodiment of a maincircuit board within a system for detecting transmission facilities. Thesystem may be used to determine each signal received is an actual cellphone signal and not a spurious output. Thus, a test may need to beperformed that checks for the ‘persistence’ of the received signal. Apersistence test may run a timer 1202 for a minimum required time thatmay be nearly as long as the time of the shortest signal type expected.If the signal is present at the end of the timeout period, it is lesslikely to be a spurious response and more likely that it is a cell phoneoutput. For example, if a GSM signal of 500 microseconds long is theshortest duration signal of all the cell phone protocols received, thepersistence test may run for 450 microseconds to further ensure that thereceived signal is not merely a spurious response.

The sub-station system 1300, shown in FIG. 13, is an embodiment of asub-station in a system for detecting transmission facilities

FIG. 14 illustrates an embodiment of a null detector (1400), wherein theVCO in FIG. 14 tunes to known antenna frequencies and the system detectsa null in the known antenna frequencies in which the antenna isdetected. In embodiments, the null detection system may detect thepresence of a transmission facility even when the transmission facilityis not transmitting a signal. In embodiments, a hand held or mountednull detection device may be used in a correctional institution or othergovernment facility. In embodiments, null detection may utilize atransmission-detection source, independent of the transmission sourcebeing detected, which is capable of sweeping across the frequencyspectrum of interest and receiving its returning signal. Thetransmission source sweeps the spectrum of interest, searching fordistortions in the returned field. Distortions in the spectrum may bedue to the presence of an antenna of a transmission facility 202.

In embodiments of the system described herein, detection levels may bedetermined by which output levels are possible with the various cellphone technologies that are in use today. Since the system described isan amplitude system, the strongest and weakest possible signals must bedetermined in order to identify the system's required dynamic range.Cell phone signals vary from −22dBW to 6 DBW and this range defines thedetection requirements of the system. This translates to a maximumsignal of 4.0 Watts at the antenna. The minimum value is equal to 0.006Watts or 6 milliwatts. Therefore, the dynamic range required is −52 dBmto +36 dBm. In order to achieve such a dynamic range, an amplifier thatis gain adjustable is required such that for an input value of +36 dBm,the amplifier is not saturated.

In the embodiment, the system determines the characteristics required toinsure that each cell phone is correctly identified. The amplitude ofeach signal is determined which allows the system to determine whichsensor has received the largest signal. The system time stamps each datasample so that other sensors receiving the same signal will berecognized as such when the data is presented for analysis. Each sensoranalyzes the wave shape of the signal detected. Each transmission type(i.e., CDMA2000, PCS, TDMA, GSM, IS-95, etc.) has a unique wave shape.These wave shapes allow the analysis software to recognize that signalsseen in different parts of a facility can be associated with each other(using time and wave shape) and the signal that consistently containsthe largest amplitude will be identified as closest to the cell phonetransmission

In embodiments of the invention, signals directed toward an IED(improvised explosive device) may be intercepted, identified and deniedservice. Such interception may be up to a known range in forward andside quadrants. The identification and determination of the position ofthe person or persons using a satellite phone and/or land-based cellphone may be determined. Cell phones, as well as other RF devices, e.g.,garage door openers, walkie-talkie, etc., may be captured, identifiedand/or jammed that are attempting to activate or contact the IED.

In embodiments of the invention, when a cell phone, for example, is on,but not in an active communication, the cell phone is essentiallyinvisible to anyone attempting to monitor cell phone activity. In orderto be aware of the existence of such “on but not transmitting devices”the system described herein operates as a cell tower. That is, thesystem actively addresses the problem of cell phone detection byoperating (becoming) the tower. A vehicle with similar (but modifiedequipment to that of a cell tower) may actively poll the area of phonesthat are “on but not in a communication of any sort.” The vehicle (i.e.,Pseudo Tower) collects the current database of active phones and thosephones in standby from the tower(s) in the area and uses this data baseto poll these phones in order to locate them. Once potential phones thatcould be possible detonation cell phones are identified and located, thePseudo Tower would affect a handoff and make itself the active tower.Thus, the captured cell phones are not allowed to rotate back to (i.e.,,connect to) the local cell phone tower, insuring that any callsattempting to communicate with the detonation cell phone will not besent. As one of the goals is to identify the person who is attempting tocontact the detonation cell phone, a call history of each suspect cellphone may be analyzed.

When a caller attempts to activate an IED, the caller's presence can beidentified. Furthermore, the call being made is not forwarded to thedetonation cell phone and the IED will not be activated. By determininga peak angle (triangulation) the caller's cell phone/satellite phonesignal, the direction of the caller is then known. Directionidentification is performed by using a technique such an interferometry.In this case, multiple antennas employing interferometry may be used toscan through the current cell phone traffic identifying first, candidatethreats and then, pinpointing high probability locations which can beviewed through a high powered binoculars to determine whether thecandidate is in need of investigation. Criteria for determining whichcell locations may be threats is a pole or road sign, etc. The PsuedoTower may continue controlling all of the phones in the area, preventingany forwarding of calls until all possible threats have been cleared. Atthis point, the personnel have the option of going after the caller ordeactivating the IED, or both. It would be possible to clear the areaand detonate the device later if that is a desired plan of action.

Given the varying parameters by which detonation can take place, thePseudo Tower may also be designed to deny service to any active andinactive phone within a given geographical area and pinpoint thelocation of said phones.

Satellite cell phone transmission presents a somewhat different problem.Since the transmission from phone to satellite to phone is communicatedto a number of satellites, becoming a replacement for the satellite willrequire cooperation from the provider. Via one or more specific codes,the satellites may be told that the vehicle mounted satellite simulator(i.e., Pseudo Tower) will be taking over the control of phones within acertain radius. Since this is a moving or ever changing circle, thereplacement “satellite” will have to continuously update the actualsatellite of its position and which phones are being released and whichphones are being controlled. Once this function has been implemented,the control of the suspect phones is similar to that of the cell phone.In determining the caller's position and the location of the detonationphone is as above.

FIG. 15 illustrates an embodiment of a Cell Phone Detection, Control andPosition Identification system (1500) in accordance with the principlesof the invention which comprises cell phone jammer (1501) system thatcovers at least one of the known frequency ranges assigned to cell phoneor mobile communication devices, a Power Unit (1502) that provides thenecessary power to run all the units within the Cell Phone Detection,Control and Position Identification system 1500, Satellite Cell PhoneInterface 1503 that operates as an interface and communications unitbetween the Cell Phone Detection, Control and Position Identificationsystem 1500 and a satellite cell phone provider (not shown), a CellPhone Ground Interface unit 1504, which includes base station technologyfor all communication devices operating within an area of interest. Alsoshown is an optional 300-350 MHz Jammer unit (1505) that operates to jamcommunication devices that communicate through an intermediary device,such as door openers, Walkie-Talkies and the like. It is anticipatedthat the system described herein to be modular and expandable to coverthe entire frequency spectrum in which transmission facilities (cellphones, mobile communications devices) operate. The Computer CommandI/O, User Display and Interface 1506, comprises a communication, commandand control system (C³) that manages communication, command and controlof the detection system 1500. Unit 1506 may further comprise one or moredatabases, and/or processors to execute the processing described,herein. Although not shown it would be appreciated that Command I/O unit1506 may be in communication, via a public or private network, to one ormore devices to provide information to or obtain information from remotesites (not shown).

FIG. 16 Illustrates a block diagram of an embodiment of a Cell Phone andWireless Transmission Detection Facility in accordance with theprinciples of the invention. In the illustrated embodiment 1600, antenna1602 is a multi-band directional array that operates to detect signalsin a low band and in a high band (835 and 1.85 GHz range, respectively),a two way radio band (465 MHz), a Wi-Fi, a Bluetooth band (2.5 GHz) andPAL (Personal Alarm Locator) band (950 MHz). In the illustratedembodiment, the antenna connects to two components, first to a detector(1603) and also to a decoder (1604). The detector 1603 and decoder 1604decodes the PAL Identification signal and may further decode biometricinformation, emergency information. In other embodiments, detector 1603and decoder 1604 are configured to decode cell phone identifications.Antenna 1602 provides detected signals to a 6 way input switch (1605).The output of switch 1605 is connected to a wideband RF amplifier(1606). Wideband RF amplifier 1606 represents a variable gain amplifierthat adjusts the detected signal amplitude based on the band in which adetected signal is detected by antenna 1602. In another aspect of theinvention switch 1606 may be connected to a block gain amplifier (notshown) to provide amplification of the detected signal and the amplifieddetected signal may then be provided to a corresponding RF filter basedon the frequency band of the detected frequency.

The wideband RF amplifier 1606 is connected to a Logarithmic amplifier1607 (i.e., log amp) that amplifies the received or detected signalusing an logarithmic function. Log amplifiers are well-known in the artto provide a larger amplification of a weak signal and a smalleramplification of a strong signal. The output of Log amplifier 1607 isprovided to an Operational amplifier (OpAmp) 1608. The OpAmp 1608amplifies the input signal and provides the amplified input signal to anA/D converter 1609 for conversion of the input analog signal to adigital signal. The converted (i.e., digital) signal is then provided toa FPGA (Field Programmable Gate Array) 1610 for subsequent processing.FPGA 1610 controls the operation of the illustrated Cell Phone andWireless Transmission Detection Facility 1600 through feedback signalsto switch 1605, for example. FPGA 1610 controls which signal frequencyband and signal frequency is evaluated in what sequence. In theillustrated embodiment, FPGA 1610 communicates with the other sensorsand/or access points via a communication interface 1612. In one aspectof the invention, communication interface 1612 may communicate with oneor more wireless communication devices that operate using well-knownIEEE wireless standard communication protocols (e.g., 802.15 and 802.11). In another embodiment, the communication interface may operate as atransceiver (transmitter/receiver) that may interface with two-waywireless transmission devices such as Walkie-Talkie or cellulartelephone phones. The FPGA 1610 also interfaces with a microprocessor1613, e.g., a Zilog Z86, an Intel x86 series, Motorola Power PC.Processor 1613 may assist in the decoding, and operation of the CellPhone and Wireless Transmission Detection Facility 1600. FPGA 1610 andthe microprocessor 1613 may be synchronized by a crystal clock 1614. Inother embodiments of the invention, the communications may be via acategory 5 network interface connection in conjunction to thecommunication Interface 1612. Although an FPGA is referred to andillustrated in the embodiment of the invention, it would be recognizedby those skilled in the art that the processing described by the FPGAmay also be performed in other special purposes processors (e.g., ASIC)or in general purpose processor which when loaded with and executing anapplicable software module converts the general purpose processor into aspecial purpose processor. As would be recognized, the system shown inFIG. 16 is similar to those shown in FIGS. 10 and 11.

Returning to the embodiment of the Cell Phone Detection, Control, andPosition Identification system shown in FIG. 15, control of a wirelesscommunication device (i.e., transmission facility 202) may utilizejammers, base station technology, Wi-Fi, and 3rd party base stationtechnology, to acquire, control, obtain location and/or to stimulate awireless communication device, which may be, in an active,non-transmitting, state or in a standby state.

The embodiment shown in FIG. 15 utilizes a high level of signaldetection sensitivity to detect the presence of a wireless communicationdevice (transmission facility) within a known distance from thetransmission detection facility. As power is a critical component whendealing with wireless transmission devices, the communication protocoltypically, by design, causes communication with the largest availablesignal source. Typically, this is the closest source (i.e., basestation).

In accordance with one embodiment of the invention, the jammer units1501 may jam or interfere with one or more frequencies or frequencybands to force wireless communication device within a local area to losecontact with an available base station and/or access point and toreacquire a connection to a local base station cell tower and/or accesspoint. When the transmission facility (wireless communication device)initiates a process (referred to as hand-shake) to re-acquire acommunication link with the available local base station cell tower, thecommunication link is diverted to a, and re-acquired by, the detectionsystem 1500 (which is referred to as a pseudo-base station) due to thegreater signal power of the pseudo-base station. In another aspect ofthe invention, the pseudo-base station power is raised so as to begreater than an actual cell tower signal strength. Thus, the cell phone,for example, will transition to the larger signal strength of thepseudo-base station and establish a communication with the pseudo basestation. In a further aspect of the invention, the pseudo-base stationmay actively poll the area for cell phone (transmission facilities), andtrigger the cell phones within an area of interest to cause the cellphones within the area to attach to the pseudo-base station.

In one aspect of the invention, where the application is to control thetransmission facility within a local area, and to prevent communicationsfrom reaching the transmission facility of interest, the pseudo-basestation may deny transmission of signals from the transmission facilityto an actual base station or deny transmission of signals from the basestation to the transmission facility.

In an embodiment of the invention where it is important to identify andnot control the transmission facility within an area of interestproviding greater power, polling, control line request, interleavingexisting towers and/or jamming to force the transmission facility tocommunicate its identification parameters. In this embodiment of theinvention, gaining control of the cell phone (or wireless communicationdevice or transmission facility) within the area of interest allows thesystem to prevent incoming and/or outgoing communications. Thus, as thewireless communication device is re-acquiring a communication link withthe access point or base station, the wireless communication deviceprovides its identification information that positively identifies eachtransmission facility within the area of interest. This identificationinformation may be provided to the actual cell tower provider, whichuses this information to individually disable the cell phone(transmission facility) from receiving or transmitting data, voiceand/or communicating in any manner.

In an embodiment, the detection system 1000 (see FIG. 10) issynchronized with an access point, and/or base station technology. Thissynchronization allows the tracking and positive identification of eachtransmission facility within an area of interest. In this example, thetransmission facility of interest (a triggering device) may be connectedto or trying to communicate with another transmission facility, such asa cell phone or a land line phone.

In an embodiment, of the Cell Phone Detection, Control, and PositionIdentification System shown in FIG. 15, determines the identification ofan incoming caller based on information contained in the transmissionsignal and does not allow connection to the wireless network whiledetermining the location of the caller by triangulating the caller froma plurality of detected signals and tracks the caller thereafter. Inthis embodiment of the invention, the system shown in FIG. 15 disablesthe wireless device from receiving or transmitting signals from/to thewireless network and tracks the caller using the wireless device. TheCell Phone Detection, Control, and Position Identification Systemdescribed in FIG. 15 also has the capacity to track wirelesstransmission facilities from great distances, and in this application,the system is mobile, therefore, tracking the caller. In one aspect ofthe invention, where the cell phone or transmission facility informationis known, as determined through its communication with a pseudo-basestation, for example, additional information can be gathered, requestedand/or, extracted from the cell phone or transmission facility.Information such other transmission devices, cell phones, etc, that havebeen contacted or which have data transferred may be gathered, requestedand/or extracted.

In an embodiment where information redundancy and positive authorizationis important and positive identification is critical, the tools used inthe school bus safety application egress point and school trackingsystem have direct applicability to positive identification of personneland prison system automation, cost effectively tracking and monitoringlower threat classified inmates and staff and inmate safety. Safetyapplication and tracking systems are more fully disclosed in theaforementioned related patent applications, whose contents areincorporated by reference herein. The tools and application describedmay include facial recognition, retina scan technology, card swipe,fingerprint analysis, in preventing escapes and misidentification withina prison environment.

In an embodiment where positive identification of the transmissionfacility 202 and positive identification of the user of the transmissionfacility 202 is important, as discussed earlier hand-held detectionunits 408 detector decoding module (and or chipset) or a hand-helddetection units 408 in sync with the pseudo-base station/wireless accesspoint module provides the location and the Identification of thetransmission facility 202 or in this case, for example a cell phone or a802.xx (e.g., 802.11a/b/g/n, 802.15) communication device. Incorrections facilities, outside areas of the facility, for example alarge area like Angola state prison, a close-circuit television (CCTV)in synchronization with, or in communication, with the hand-helddetection units 408 allows the CCTV to focus on the user of the cellphone. The CCTV system feeds images to the facial recognition softwareand a database of all known personal and/or inmates, to find a matchand/or create an entry of new found cell phone and their owner's and oruser's identity. In the case of a prison application, building adatabase of know criminals their associate and biometric information,including facial recognition, for data mining purposes is critical. Anexample, where inmates are passing contraband and using cell phones tocoordinate their efforts, positive identification of the transmissionfacility 202 and positive identification of the user of the transmissionfacility 202 is important; hence, utilizing cell phone identification,location tracking and positive identify of the criminals involved iscrucial to preventing and stopping their criminal enterprise.

In another embodiment and application where positive identification ofthe transmission facility 202 and positive identification of the user ofthe transmission facility 202 is important, as discussed earlier thehand-held detection units 408 detector decoding module (and or chipset)or a hand-held detection units 408 in sync with the Pseudo-basestation/wireless access point module provides the location. As anexample, in school safety where a student's location and a perpetratorwho preys on school students, the tagging of visitors, student andemployees is critical. In this application, CCTV and facial recognition,for data mining purposes of student, facility visitors (wanted orunwanted) is critical. The embodiment includes an allowance unit whichdetermines who is allowed within the facility and/or area and who issuspect and who is a known danger. Tracking all transmission facilitiesand making positive identification of all communications, utilizing CORIand SORI databases of known perpetrator of students to detect when athreat is near around or in a school facility is critical to schoolsafety.

In embodiments, a method of detecting, identifying and tracking themovements of a specific transmission facility 202 in standby moderequires provoking and/or requiring the transmission facility totransmit a signal and to detect their unique identification. Asdiscussed and explained earlier, a hand-held detection units 408 with aintegrated identification detector/decoding module (and oridentification chipset module) and/or a hand-held detection units 408which functions in conjunction with base station and/or wireless accesspoint technology, blocking and/or jamming technique in concert of theidentification function provides the tools to detect the transmissionfacility, track its location, and to detect its unique identification.

In the embodiment of FIG. 15, an interface with existing communicationdevices, such as a wireless cell phone provider or Wi-Fi accessprovider, may be provided. The interface which will allow and/or denycontrol is executed by the wireless provider. According, the embodimentsshown may also include an interface to a third party controlling unit.For example, the system shown in FIG. 15 may include a system interfacewith the commercial satellite cell phone provider and control of thecell phones passed between the carrier and the transmission detection,identification, control and reporting system.

In the embodiment of FIG. 15 the detector units (not shown) may includean antenna and a controlling unit, where matching the transmissionfacilities 202 with its unique identifier is critical for properidentification, tracking and control in this configuration, the detectorunits may individually control or may direct control over thetransmission facilities 202.

FIG. 17 illustrates an application of an embodiment of the invention,where it is the intention to run an automated prison to lower thenecessary number of personnel and still the run a safe and securefacility. This automated facility is controlled by a centralized commandand control center and/or a decentralize compartmental command andcontrol center for all functions of the facility including movement ofthe persons within the facility. In this type of a facility, wherecomplete and accurate identification and location of all personnel iscritical, the tracking of individuals, their wireless transmissiondevices, cell phones, identification units, Walkie-Talkies, andverifying their access to authorized areas, integrating their movementwith CCTV and positive facial identification, biometric identification,preventing movement into unauthorized area, developing inclusion zones,creating exclusion zones, ensuring proper count, providing an ability torestrict and/or authorized movement a specific design of the facilityand convergence of technology is essential. The technologies discussedherein integrated to the central control provide the backbone andframework to operate such an automated facility, wherein each staffmember and inmate transmission facility will allow specific movementthroughout the facility. All movement throughout the facility may bemonitored through CCTV and facial recognition. At each egress point,movement will be restricted to individual movement through one area toanother area of the facility. For example, daily functions include,meals, medical, programs, court visits, and recreation, may be functionsthat may be monitored and controlled. As an example of the facility ofthe needs within the automation and the parameters and rules,Example—Inmate Movement: need a creation of a Movement list and movementschedule, scheduling recourses, allocation seats in particular Programsarea classrooms, Access to computers, access to the Law library, timeallocation in program and use facility assets, Enemy exclusion,(predator sheep wolf exclusion) conflicts in scheduling GED, adulteducation, culinary arts, anger management, developing Waiting list,ability for inmates to signup, Morning schedule and movement, afternoonschedule and movement, Pre-trial and religious services scheduling. Datamining database techniques and methodologies may be executed to providefor inmate scheduling movement and allocation of assets for the inmaterelying on transmission facility authorization. The transmissionfacility will control access to all movement, asset recourses, doors andegress, facility recourses and the time allocation on facility assetsand in which movement takes place. Because of minimum human interaction,display kiosks displays schedule and informs the inmate where it isscheduled.

In this embodiment, where there is limited, corrections personnel, allcells will be designed to allow outdoor access and unit access. Thefacility structure, may need to be modified to allow inmate access tothe outdoor area. This design modification eliminates the need foroutside monitoring and still provides greater freedom for the inmateswith less need for direct supervision.

In this embodiment, for medical reasons all inmates will wear twotransmission detection sensors. Each sensor will monitor biometric signsincluding heart rate, temperature, and the like. With two wristbandsecho cardiogram can be generated to provide for health monitoring andfor positive identification. The Cell Phone Detection, Control andPosition Identification system 1500 (FIG. 15) will include a detectorand decoder for all transmission facilities, which will provide positiveidentification for all transmission facilities, including cell phone andother hand held communication devices, and the specific individual inposition of the transmission facility. All CCTV units will integratewith facial recognition software, all egress points will requirebiometric checks, such as fingerprint and renal eye scan devices, andthis combined with the transmission facility positive identification.The design of the facility is important to provide adequate exercisemovement and limited interaction with staff and other inmates. Thereforea redesign of the facility, to provide services such as decentralizededucation is important.

In this embodiment, the wireless communication of the sensors will alsocarry education information and data to each of the inmate cells. Asearlier described, the ideal location of sensors may be the water chasesto prevent tampering. This also provides the opportunity to havewireless communication with education units within the cells. Thiswireless communication also provides the ability to include wirelesssurveillance devices, such as cell monitoring, into the mix.

In this embodiment where inmate programs, services, commissary, inmatephones, medicine distribution, vending machines, GED education, needs tobe inmate specific, positive identification is a critical must. Toensure this outcome, the positive identification of each transmissionfacility is paramount. An example of this embodiment, when an inmateapproaches an education display system, the unique identifier of theinmate's transmission facility provides information to the transmissionfacility detector of the unique identifier of the transmission facility.A database controls and provides all the applicable information toprovide the correct information for each transmission facility. In thiscase, the transmission facility is a wristband ID bracelet.

In other embodiment, the transmission facility is a cell phone, PDA or aWi-Fi appliance, the education display system is a interactive displayscreen in a school telling the school supervisors that one or morestudents or personnel needs to turn off his cell phone, or a hospitaladvising a specific visitor by name, that their cell phone, even instandby mode, may cause harm to the medical devices being used to treatpatients. Or the transmission facility provides information to thetransmission facility detector of a unique identifier of thetransmission facility via an interactive screen on the road side to tella user to slow down as he is speeding. These are just examples of usesof the system illustrated. In addition, the system illustrated may beconnected to any data mining database (not shown) to provide customizedinformation to any transmission facility and specific information to auniquely identified transmission facility.

In an embodiment where the classification of inmates is such where manyinmates can co-exist in an inside and outside (minimum security,non-violent, criminals and the like) the use of CCTV, facial recognitionand laser microphone, and inmate tracking and a database driven set ofrules an parameters, coupled with the combine technologies mentionedthis application. This provides the solutions to reduce the number ofemployees while maintaining a high level of safety and security.

In an embodiment of FIG. 15 the detector units (not shown) may includeantennas 104 and a controlling unit, that are externally integrated withthe transmission detection, controlling, identification, and reportingsystem 1500, where matching the transmission facilities 202 with itsunique identifier is critical for proper identification. Tracking andlocation matching of the transmission facility 202 unique identifierwith the proper transmission facility 202 maybe accomplished through thetime of signal arrival, phone type, transmission frequency, timedivision separation, time sync, channel frequency, cell toweridentifier, (cell phone) transmission facility identifier or acombination of one or more methodologies depending on a complexity ofthe transmission facility 202 environment and the like.

In the embodiment, of FIG. 15 in a situation where there is a largenumber of transmission facilities 202 (in this example, cell phones) ona congested highway being able to find all the transmission facility(s)and their accurate location is critical. In addition being able tocontinuously track and positively identify each transmission is alsocritical wherein controlling a significant number of transmissionfacilities (cell phones) may be necessary. Therefore specific techniquesneed to be developed to regulate the frequency band the wireless devicesoccupy, when and in what order they are processed, the rate and thedensity and rate in which they are monitored. Techniques discussedearlier describe how to have a cell phone provide their identification.Here we will discuss some of the techniques to regulate the detection,frequency, volume and period of those transmissions.

Knowing the frequency and time of the transmission facility 202transmissions provides the ability to tighten the bandwidth of thedetection sensors, which increases sensitivity, and thus providesgreater distance of detection. It also provides an intercept, in timeand frequency, providing for faster processing of signals. One techniqueis for the transmission detection sensor to tell the base station and/orenabling technology when to transmit and also indicate the desiredresponse frequency and/or channel. Another methodology is to regulateand/or schedule the transmission time of the base station(s) and/orenabling technologies within geographical areas and set parameter on thedirection, radiation pattern, zone, and strength of the signal beingtransmitted to enable a regulate number of transmission facility(s)contacted and/or regulating the number of responding transmissionfacilities.

In an embodiment, in a corrections complex, such as Angola State Prison,or a arbitrarily defined area where transmission facilities 202 areprohibited except for authorized transmission devices, the transmissiondetection, controlling, identification, and reporting system 100 whetherinternal or external to the facility may control, identify and prohibittransmissions from transmission facility 202 depending on the locationor approximate location of the transmission facility 202. There are avariety of methods that may be employed in the determination of thelocation of a transmission facility 202. Methods include (i) acell-sector system that collects information pertaining to cell andsector ID's, (ii) the assisted-global positioning satellite (GPS)technology utilizing a GPS chipset in a mobile communication facility,(iii) standard GPS technology, (iv) enhanced-observed time differencetechnology utilizing software residing on a server that uses signaltransmission of time differences received by geographically dispersedradio receivers to pinpoint a user's location, (v) time difference ofarrival, (vi) time of arrival, (vii) angle of arrival, (viii)triangulation of cellular signals, (ix) location based on proximity toknown locations (including locations of other radio-transmitters), (x)map-based location, or any combination of any of the foregoing, as wellas other location facilities known to those of skill in the art. In oneaspect of the invention, the location may be determined using a methodof non-iterative linear equations.

In an embodiment of the transmission detection, controlling,identification, and reporting system 1500 whether to control thetransmission facility 202, may be determined by location of thetransmission facility 202, type of transmission facility 202,identification of transmission facility 202, time of transmission of thetransmission facility 202 frequency of the transmission facility 202,based on type of base station technology and/or location of base stationtechnology and the like.

In an embodiment of the transmission detection, controlling,identification, and reporting system 1500 where the system is insynchronization with base station technology and techniques correlatethe wireless signals, wherein the unique identifier is supplied by thebase station when the transmission facility is stimulated by the jammerand/or base stations unit. Then the transmission facility is tracked andits interest is related to its location to the road, other variablesinclude whether it is alone or it is in the hands of an individual andthe like. The unique identifier is provided by the signal detectionsensor or the base station unit and is used with sync the base stationidentification and the location of the transmission facility.

In an embodiment of FIG. 15, the transmission detection, controlling,identification, and reporting system 1500 may also transmit the type,time, frequency of the wireless transmission facility of interest to abase station. The base station may then provide the system with theunique identifier of the detected transmission facility or the basestation may detect a transmission facility at a specific frequency andthe transmission detection, controlling, identification, and reportingsystem 100 tunes to that frequency to determine the location and uniqueidentifying information of the transmission device. The system 100 maythen compare the unique identifying information to a data base (notshown), the information and the parameters obtained from the data basemay then be used to decide how to treat the transmission facility; whatto do with the transmission facility depending on whether thetransmission facility is considered friend or foe (i.e., allowed ordisallowed).

In an embodiment of the transmission detection, controlling,identification, and reporting system 1500 where the transmissiondetection units includes a transmission decoding unit the systemdetermines the location and the allowability of the transmission unit bycomparing the transmission found with allowable or non-allowabletransmission facility lists.

In an embodiment shown in FIG. 15 of the transmission detection,controlling, identification, and reporting system 1500, the base stationindicates there is a transmission facility within the area covered bythe transmission detection, controlling, identification, and reportingsystem 1500. The base station provides at least one unique identifier tothe transmission detection, controlling, identification, and reportingsystem 1500. For example, the base station may provide at least one of:a frequency; a type of transmission facility; a time of arrival (TOA),an IMEI and other similar identifiers (e.g., encoded IMEI). Thetransmission detection, controlling, identification, and reportingsystem 1500 determines the location of the transmission facility,depending on the provided parameters, directs the base station and/orrecorder, jammer, CCTV . . . ) to perform a set of actions. Some of theactions to be performed are jam the signal specific to the cell phone,deny service (Denial of Service (DoS)) to the cell phone, allow thecontinued receiving and allow transmission of the detected transmission,record the content of the transmission, provide an indication that thetransmission is allowable. In addition, the provided parameters maychange depending on location, and other variables depending onapplication parameter and the like.

In an embodiment shown in FIG. 15 of the transmission detection,controlling, identification, and reporting system 1500 where detectionsystem is separate from the discriminator unit, the discriminator unitmay also include the controlling unit (base station technology and thelike,). In this case, when a unique set characteristics (parameters) arereceived by the detecting unit, and or system 1500, which then providesinformation to the discriminator unit and/or controlling unit, whichthen passes back the correlated transmission facilities (the controllingunit, software radio, and the like) this information is processed. Forexample, a cell phone on the side of the road, with a person talking onit may not need to be disabled, in contrast to a cell phone in standbylocated within a zone of danger (60 meters of the road) may need to becontrolled and disabled.

In an embodiment, the system 1500 will allow an authorized transmissionfacility to continue and/or provide the ability for the wirelesstransmission, (i.e., to talk and/or to receive calls) depending on theconfiguration and application. In an embodiment of the transmissiondetection, controlling, identification, and reporting system 100 wheredetection system is separate from the discriminator unit, in this casethe discriminator unit may also the controlling unit (base stationtechnology and the like,) the system 1500 may further provideinstruction to the controlling unit to allow or disallow transmissionfacilities, determined by their location.

In an embodiment of the transmission detection, controlling,identification, and reporting system 1500 the system compares theobtained information and depending on whether the detected transmissionfacility is determined to be a potential danger, the system may take theincoming transmission facility and determine its position prior todisallowing further transmission. This process is accomplished byknowing an identification of the transmission facility and using theinformation obtained by the controlling facility (frequency, time, type,channel, etc.) and searching for the incoming call signal. For example,in an improvised explosive detection (IED) situation, finding thetrigger man may require the detection, identification and locationdetermination in real-time. The array antennas will utilize large frontend gain for the greatest distance. As discussed previously, jamming thearea, to gain control of the transmission facility is one method ofcapturing the transmission facility. The ability exists to then trackthe trigger man from his current location and where he goes forinvestigative reasons.

In an embodiment shown in FIG. 15 of the transmission detection,controlling, identification, and reporting system 1500 wheretransmission facility retrieved data may be used to locate threats topersonnel, and or prevent an escape. Recovered transmission facilitydata may be used to track co-conspirators location and/or identify of anunauthorized transmission facility.

FIG. 18 illustrates a system 1800 for implementing the principles of theinvention shown herein. In this exemplary system embodiment 1800, inputdata is received from sources 1801 over network 1850 and is processed inaccordance with one or more programs, either software or firmware,executed by processing system 1810. The results of processing system1810 may then be transmitted over network 1880 for viewing on display1892, reporting device 1890 and/or a second processing system 1895.

Processing system 1810 includes one or more input/output devices 1802that receive data from the illustrated sources or devices 1801 overnetwork 1850. The received data is then applied to processor 1803, whichis in communication with input/output device 1802 and memory 1804.Input/output devices 1802, processor 1803 and memory 1804 maycommunicate over a communication medium 1825. Communication medium 1825may represent a communication network, e.g., ISA, PCI, PCMCIA bus, oneor more internal connections of a circuit, circuit card or other device,as well as portions and combinations of these and other communicationmedia.

Processing system 1810 and/or processor 1803 may be representative of ahandheld calculator, special purpose or general purpose processingsystem, desktop computer, laptop computer, palm computer, or personaldigital assistant (PDA) device, etc., as well as portions orcombinations of these and other devices that can perform the operationsillustrated.

Processor 1803 may be a central processing unit (CPU) or a specialpurposed processing unit or dedicated hardware/software, such as a PAL,ASIC, FGPA, operable to execute computer instruction code or acombination of code and logical operations. In one embodiment, processor1803 may include, or access, code which, when executed by the processor,performs the operations illustrated herein. As would be understood bythose skilled in the art when a general purpose computer (e.g., a CPU)loaded with or accesses code to implement the processing shown herein,the execution of the code transforms the general purpose computer into aspecial purpose computer. The code may be contained in memory 1804, maybe read or downloaded from a memory medium such as a CD-ROM or floppydisk, represented as 1883, may be provided by a manual input device1885, such as a keyboard or a keypad entry, or may be read from amagnetic or optical medium (not shown) or via a second I/O device 1887when needed. Information items provided by devices 1883, 1885, 1887 maybe accessible to processor 1803 through input/output device 1802, asshown. Further, the data received by input/output device 1802 may beimmediately accessible by processor 1803 or may be stored in memory1804. Processor 1803 may further provide the results of the processingto display 1892, recording device 1890 or a second processing unit 1895.

As one skilled in the art would recognize, the terms processor,processing system, computer or computer system may represent one or moreprocessing units in communication with one or more memory units andother devices, e.g., peripherals, connected electronically to andcommunicating with the at least one processing unit. Furthermore, thedevices illustrated may be electronically connected to the one or moreprocessing units via internal busses, e.g., serial, parallel, ISA bus,Micro Channel bus, PCI bus, PCMCIA bus, USB, etc., or one or moreinternal connections of a circuit, circuit card or other device, as wellas portions and combinations of these and other communication media, oran external network, e.g., the Internet and Intranet. In otherembodiments, hardware circuitry may be used in place of, or incombination with, software instructions to implement the invention. Forexample, the elements illustrated herein may also be implemented asdiscrete hardware elements or may be integrated into a single unit.

As would be understood, the operations illustrated may be performedsequentially or in parallel using different processors to determinespecific values. Processing system 1810 may also be in two-waycommunication with each of the sources 1805. Processing system 1810 mayfurther receive or transmit data over one or more network connectionsfrom a server or servers over, e.g., a global computer communicationsnetwork such as the Internet, Intranet, a wide area network (WAN), ametropolitan area network (MAN), a local area network (LAN), aterrestrial broadcast system, a cable network, a satellite network, awireless network, or a telephone network (POTS), as well as portions orcombinations of these and other types of networks. As will beappreciated, networks 1850 and 1880 may also be internal networks or oneor more internal connections of a circuit, circuit card or other device,as well as portions and combinations of these and other communicationmedia or an external network, e.g., the Internet and Intranet.

FIG. 19A illustrates an exemplary process 1900 for capturing a wirelesstransmission in accordance with the principles of the invention and FIG.19B illustrates an exemplary geographic configuration for explaining theprocessing shown in FIG. 19A. Referring now to FIG. 19A, at block 1910,a reference signal transmitted by a transmitter (1972, FIG. 19B) isreceived at a transceiving system (1975). The transmitter 1972 has atransmitting range represented by a distance R₁. An estimated distance(D₀) between the transceiving system 1975 and a transmitter 1972 of thereference signal is determined based on a received power at thetransceiving system. At block 1920, a determination is made regarding anexpected power of the reference signal to be received at wirelesstransmission facilities a known distance (R₂) from the transceivingsystem 1975. In one aspect of the invention, an expected received powermay be determined without regard to the positions of the referencesignal transmitter 1972 and the transceiving system 1975. That is, anexpected received power may be determined a known distance (R₂) aboutthe transceiving system 1975 based solely on the received power at thetransceiving system 1975 and, thus, the expected received power at pointA is the same as that received at point B. In another aspect of theinvention, a position of the reference signal transmitter 1972 may bedetermined or provided to the transceiving system 1975. For example, adirection of the reference signal transmitter 1972 may be determined,using directional receiving antennas (or multiple receiving antennasseparated by a known angular measure, such as four antenna spatiallyoriented 90 degrees to each other, such that the 3 dB antenna gainpoints intersect at 45 degrees from the antenna maximum gain) at thetransceiving system 1975, and a position relative to the transceivingsystem 1975 may be determined based on the determined direction andestimated distance (D₀). In another aspect, a direction of the referencesignal transmitter 1972 may be determined using a received signalstrength of the reference signal on at least one receiving antenna. Inanother aspect, the position or location of the reference signaltransmitter 1972 may be known and, thus, available to the transceivingsystem 1975. For example, the position of the transmitter 1972 may beknown through a mapping of such transmitters and/or the location isknown based on conventional surveying methods or from a globalpositioning satellite system (GPS). With the position of the referencesignal transmitter 1972 known, the expected power of the referencesignal may then be determined more accurately. For example, the expectedreceived power of the reference signal a known distance from thetransceiving system 1975 in line with, and between, the transmitter 1972and the transceiving system 1975 is greater than the expected receivedpower of the reference signal a known distance from the transceivingsystem in line with but on an opposite side of the transceiving system1975.

With reference to FIG. 19B, the received signal strength at wirelesstransmission facility 1980 is greater than that of wireless transmissionfacility 1990. The expected received power may be determinedcontinuously along the known distance (R2) about the transceiving system1975 or may determined at designated angles about the transceivingsystem 1975 (e.g., every 10 degrees). Interpolation between twodesignated angles may be used to determine an expected received power atan intermediate point. At block 1930, a signal is transmitted from thetransceiving system within a general area, as represented by R₂. Thearea may include wireless transmission facilities 1980, 1985, 1990,capable of receiving the reference signal and wireless transmissionfacilities 1995 that may not be capable of receiving the referencesignal. In one aspect, the signal from the transceiving system may betransmitted in an omni-directional manner wherein the general arearepresents an area circling the transceiving system 1975; assuming thesystem and corresponding antenna(s) are co-located. In another aspect ofthe invention, the signal may be transmitted in a directional mannerwherein the general area represents a pie-shape area, 1997, 1998, havingan apex at the transceiving system 1975 (a sector); assuming theantenna(s) and the system 1975 are co-located. The angular spread of thepie-shared area α₁, α₂ may be determined based on the directivity of thetransmitting antenna. The signal transmitted by the transceiving system1975 is transmitted with sufficient power to interfere withcommunications between the reference signal and wireless transmissionfacilities within an area in which wireless transmission facilities mayreceive the reference signal. The transmitted signal may be a continuouswave type signal (i.e., a jamming signal) or may be a discrete signalthat commands the wireless transmission facilities to reestablishcommunication with the reference signal transmitter. At block 1940, asimulated reference signal is transmitted by the transceiving system1975. The simulated reference signal is transmitted at a power levelsuch that the received power of the simulated reference signal at theknown distance (R₂) from the transceiving system 1975 is greater thanthe received power of the reference signal. At block 1950, signal(s)received by the transceiving system 1975 from wireless transmissionfacilities 1980, 1985, 1990, 1995 in response to the interfering signalare analyzed and processed.

In one aspect of the invention, a distance D₁′, D₂′, D₃′, to each of thewireless transmission facilities 1980, 1985, 1990, respectively may beestimated based on a received power, at block 1960. In another aspect ofthe invention, a direction of the wireless transmission facilities maybe determined using, for example, directional antennas and/or anamplitude-based angle of arrival method. In one aspect of the invention,the signals received by the transceiving system 1975 may be analyzed todetermine if they are allowed to send and/or receive communication aspreviously disclosed at block 1970. As discussed previously,allowability may be determined based on a known set of wirelesstransmission facilities that are allowed within an area. All others arenot allowed and, thus, communication is prohibited. If the signals aredetermined to be allowable, then control of the signal is “handed-off”to the reference signal transmitter 1972. Otherwise, the receivedsignals may be further processed.

In one aspect of the invention, allowability of a wireless transmissionfacility may be determined based on a position of the wirelesstransmission facility with respect to the transceiving system 1972. Forexample, if the wireless transmission facility is determined to bewithin a predetermined distance, R₃, from the transceiving system 1975,then communication to and from the wireless transmission facility maynot be allowed, even though the transmission would normally be allowed.In one aspect, the area defined by R₃ may be limited using directionalinformation of the received signal associated with the wireless facilityand the transceiving system 1975. Thus, if the transceiving system 1975is moving towards the wireless transmission facility, then communicationmay not be allowed, while communication may be allowed if thetransceiving system 1975 is moving away from the wireless transmissionfacility, even though the wireless transmission facility is within thearea defined by R₃. In another aspect of the invention, transceivingsystem 1975 may attempt to determine other wireless transmissionfacilities within a region, R₄, attempting to communicate with thenot-allowed transmission facility.

FIG. 20A illustrates a graph of exemplary distances between theoperating ranges of base stations 112 and device 152 as a function ofangle, wherein the angle is normalized with respect to a line betweenbase station 112 and device 152. Thus, a minimum distance between basestation 112 and device 152 is represented as R1, at an angle of zerodegrees between base station 112 and device 152 and extends to a maximumdistance of R1+2R2, at an angle of 180 degrees (see curve a).

However, as the operating range of device 152 exceeds the operatingrange of base station 112 at 180 degrees, the distance may thus berepresented as R3 (see curve b).

Thus, as the angle between base station 112 and device 152 increases,the distance between base station 112 and device 152, at distance R2from device 152, increases and becomes limited to a distance of R3 foran angular period around 180 degrees. The distance then decreases to R1as the angle increases.

FIG. 20B illustrates an exemplary power received at the operating rangeR2 of device 152. In this case, the power received by a wireless deviceis a maximum at distance R1 and is a minimum at distance R1+2R2. (seecurve a). However, as the distance R1+2R2 exceeds the operating range ofbase station 112, the power at distance R3 is limited to the power atthe edge of the operating range of base station 112. (see curve b).Thus, to capture any devices within the local area of device 152, device152 must transmit at a power between that received at R1 and thatreceived at R3. Further the power transmitted varies as a function ofthe angle between base station 115 and device 152.

FIG. 21 illustrates a second exemplary network configuration inaccordance with the principles of the invention. In this exemplaryconfiguration overlapping regions 210, 220, 230, 240 provide continuouscoverage of one or more devices within their respective regions. In thiscase, each of the regions 210, 220, 230, 240 are represented as having acoverage area defined as R3 with respect to corresponding base stations212, 222, 232, and 242. Hexagon representations of each of the coverageareas 214, 224, 234 and 244 a are illustrated. The hexagonrepresentations are provided solely to illustrate the interlockingcoverage of the overlapping coverage regions 210, 220, 230, 240.

Also illustrates is a transceiving station (device) 252, (which isequivalent to device 152 of FIG. 19B). Also illustrated are wirelessdevices 262, 264, 266, and 268. Devices 262 and 268 are well within thecoverage region of base station 212, while device 264 is within anoverlapping zone between areas 210 and 230. Device 266 is outside thecoverage area of base station 212 and within coverage of base station224. However, each of the wireless devices is within a local arearepresented by distance R2 centered on transceiving device 252.

In addition, R1 represents the closest distance between base station 212and transceiving system 252. R4 represents the closest distance betweenbase station 222 and transceiving system 252 and R5 represents theclosest distance between base station 232 and transceiving system 252.FIGS. 22-24 represent graphs of power at R2 for each of base stations212, 222 and 234, respectively, in a manner similar to that shown inFIG. 20B. In this illustrated example, the power of each base station isassumed to be substantially equal so that the coverage areas,represented by R3, are substantially the same. However, it would berecognized that the power of each base station may be altered to providegreater or lesser coverage areas. In this case, the power received at R2may be greater or lesser and is a function of the output transmissionpower and the distance (e.g., R1, R4 and R5, respectively).

In one aspect of the invention, the transceiving system 252 may selectone of the base stations as a primary cell. The primary cell may beselected based on the base station being determined to be closest, indistance, to the transceiving device 252. The transceiving system 252may normalize the received power based on distance and transmissionpower of each of the base stations. In addition, the transceiving system252 may normalize the location of each of the base stations with respectto the location of the base station of the primary cell. That is, in theillustrated network configuration shown in FIG. 21, base station 212 maybe selected as the primary cell and base stations 222 and 232 may bedetermined as angularly separated with respect to the line between theprimary cell base station and the transceiving station 252. Thus, basestation 232 is slightly greater than 90 degrees offset from the linebetween base station 212 and transceiving station 252. Similarly, basestation 222 is slightly greater than 180 degrees offset from the linebetween base station 212 and transceiving station 252.

Referring to FIG. 25, the received power at R2 may then be offset basedon the angular difference between the primary cell base station and theother base stations.

FIG. 26, which represents a superposition of the powers of the threepower curves, and further illustrates the power to be transmitted bytransceiving station 252, as a function of an angle around thetransceiver to maintain control of each of the wireless devices within alocal area 250. As would be understood, the illustrated power is takenwith respect to a known angle about the transceiving system (device)252.

FIG. 27 illustrates a flow chart of an exemplary process in accordancewith the principles of the invention. In this illustrated process,transceiving system 252 receives the reference signal of each of aplurality of base stations. Although transceiving system 252 is outsidethe coverage area of base station 222, transceiving system 252 is stillable to receive the reference signal from base station 222 but does notcommunicate with this base station.

At block 620 a determination is made regarding the primary cell based onthe received power of the reference signals. At block 630, a position ofeach of the sources (base stations) of each of the reference signals maybe obtained or determined. For example, a base station position may bedetermined based on a received power and an angle of arrival of thereceived signal. Or the base station position may be provided usingGlobal Positioning Satellite system information. Or the base stationposition may be preloaded within general area.

At block 640 a distance is determined to each reference signal based onthe position of the source of the reference signal. At block 650, anexpected received power from each of the base stations is determinedalong a radius defining the local area with respect to transceivingsystem 252. A graph of received power from each of the base stationsalong the local area is determined. At block 660, positions of the basestations are normalized, angularly, with respect to a line between theprimary cell base station and the transceiving system 252 and thereceiving power graphs are oriented with respect to the primary cellbase station. A resultant power graph is determined based on thesuperposition of received power graphs and at block 670, thetransceiving system outputs a signal at a power level greater than theresultant power at a corresponding angle.

In one embodiment of the invention a repeat Jamming Module, providesrepeat jamming capability and specifically jams cell phones and orwireless communication device. The repeat jamming techniques utilize theoutgoing signal of the cell phone and repeats the transmission 100 nsafter the initial signal with matching power, the effect of theoverlapping communication on the receiving transceiver provides aconfusion in the receiving mobile device and makes communicationimpossible; the call and or wireless communication is dropped. In oneembodiment of the invention the jamming module included a duel repeatingcircuit with a programmable delay line built in to allow the samecommunication to be delay by the programmed delay amount. In anotherembodiment of the invention the Repeat Jammers are placed in eachsection of the facility. When the signal detection array detects anunauthorized Cell Phone the Repeat Jammer takes that cell phone and onlythat cell phone off line. When the phone tries to acquire the tower thecell phone Identification is re-verified.

In one embodiment of the invention, a Base Station Controlling Module,which identifies and controls cell phones, interfaces with Cell PhoneDetection system to determine authorized/or unauthorized phones,provides phone type, the time of arrival and the cell phones frequencyand seamlessly provides backhaul and Denial of Service (DoS)capabilities. The Base Station Controlling Module, which identifiesand/or controls cell phones, interfaces with the Cell phone detectionsystem to determine whether a cell phone is an authorized/orunauthorized cell phone, wherein the cell phone detection systemprovides a phone type, the time of arrival and the cell phones frequencyto the base station unit, where the base station unit matches the cellphone detected signal with the base station controlled and or requiredcell phones and verifies the cell phone of interest is within theunauthorized areas. It also verifies in one embodiment of the inventionwhether the cell phone is an authorized cell phone for use within thefacility, the data matrix determines authorized vs. unauthorized cellphone and authorized area vs. unauthorized areas and, =then seamlesslyprovides backhaul and/or DoS capabilities.

In one aspect of the invention, a cell phone identification module whichidentifies cell phone ID's, determines whether an authorized/orunauthorized phone exists, and provides the phone type, the time ofarrival and the cell phones frequency and seamlessly interfaces with therepeater jammer module, which disables the unauthorized phone in eitherthe unauthorized area and/or an unauthorized phone in an area ofinterest. The repeat jamming unit jams all unauthorized cell phonewithin the facility.

In one embodiment of the invention, the Signal Detection Sensors areplaced throughout the facility to provide full coverage of the facility.Any cell phone within the facility will be detected and displayed on thecentralized console interface. This information will be sent to thesoftware radio Identification module to verify whether this cell phoneis an authorized or unauthorized cell phone. If the cell phone isunauthorized the repeat Jammer module will disable the cell phone or theSoftware Radio Identification Module will deny service. The SoftwareRadio Identification Module is designed to receive a signal beingtransmitted from a cell phone and decode the IMEI number; this IMEInumber is compared against a database of authorized IMEI authorized cellphones. In one aspect of the invention, to prevent cell phone fromentering a facility undetected, Low Noise Jammers will be installed atall egress (Entrance) points within the facility, so that all cellphones coming into the facility are verified by the Software RadioIdentification Module. An ancillary benefit is anyone mistakenly orunknowingly bringing a cell phone into the facility will be picked-up atthe entrance point. In another embodiment, the Software RadioIdentification Module (SRIM) identifies all cell phone within thecoverage area. Any cell phone that is in an “on” state within thecoverage area (area in light blue) will be Identified. The InternationalMobile Equipment Identity number or IMEI (Cell phone ID) will becompared with the Facilities' “authorized cell phone list”. Anauthorized Cell Phone is allowed to make and receive calls. AllUnauthorized cell phones are prevented from making or receiving incomingand outgoing calls. The software radio Identification module can beexpanded to provide cell phone call monitoring.

In one aspect of the invention, Base station acquires a new cell phone,the Base Station provides time code, band, type to cell phone DetectionSensor Array; the Cell phone Detection Sensor Array determines whetherthe cell phone is within an exclusion zone. If the cell phone detectedis outside a “cell phone control area” or exclusion zone, then cellphone is released back to the network cell tower and/or the calls areallowed where the cell phone is backhauled to the network. If the cellphone is found within the “control area”, the Base Station determineswhether Cell Phone is an “Authorized Cell Phone” (VIA HLR Databaseinterface) and the Console displays the location of cell phone, the(IMEI), and the “Authorized cell phone status”. Alternatively, If thecell phone is determined to be an “Unauthorized Cell Phone” (VIA HLRDatabase interface), the Base station prevents incoming and outgoingcalls and the console displays the IMEI, the cell phone and“Unauthorized phone status.” Alternatively, the Repeat Jammer ModuleJams the cell phone signal and the Console displays the IMEI, the cellphone location and “Unauthorized phone status”, depending on the systemconfiguration. In another embodiment, the Base Station identifies allcell phones within the coverage area. Any cell phone in an “on” statewithin the coverage area will be identified. The International MobileEquipment Identity number or IMEI (Cell phone ID) will be compared withthe facilities' “authorized cell phone list”. An authorized Cell Phoneis allowed to make and receive calls. All Unauthorized cell phones areprevented from making or receiving incoming and outgoing calls. The Basestation module can also be expanded to provide cell phone callmonitoring.

In another embodiment the signal detection sensor array, is used toprovide Real-time tracking of inmates utilizing the BINJ Signal SensorArray with wristband tracking technology on each inmate. (See patentapplication Ser. No. 12/231,437). The system is expanded to include aStaff Safety Alert & Tracking System (SSAT) utilizing the Signal Sensorarray with built-in real-time wristband and/or security tags for thetracking of correction officers. In this embodiment of the system, thesystem, reports real-time time and position of every inmate and officerin the facility. The database collects every movement of a wristband upto 1000 times per second and provides this data into a Data mining andhistorical playback capability. In another embodiment of the system thewristband has a signal detection module which detects cell phone withina specific area. The wrist band determines the user of the cell phoneand reports the information back to the console. Some of the advantagesin tracking officer and inmates include: Increased Staff Safety; Inmateescape prevention tool; Inmate and staff out of position tool;Continuous and accurate count of inmates; Group/gangs interactionmonitoring; Accurate work scheduling and monitoring tool; On post/offpost position of all security personnel; Escape alarm; with last knownposition; with immediate alarm and the like. The data miningcapabilities enable the data base and data mining to; accuratelylocation of inmates in relationship to other inmate/staff at all timesand ability to accurately investigate assault/rape and assist as aprosecution tool; and the ability to physically contact detection systemfor incident/rape investigation and prevention tool; Inmatetracking/Data Mining which provides for the identification of predatorsand predatory behaviors, create exclusion zones and alerting system tonotify security of a boundary violation; inmate tracking and DataMining: for assessing staff and inmates' vulnerabilities; provides fordecreased agency liability by providing accurate forensic informationfor court; the system also provides for audio and alarm capability(incident/rape prevention tool)

In another embodiment of the invention, the Cell Phone Detection systemis integrated with a Base Station(s) Module. This base station(s) modulemay also have back haul capability. The system utilizes a pico/nano basestation technology where the base station registers the cell phone(s)and the cell phone detection system verifies the location of cell phone.The allowability module determines whether the cell phone is authorizedand/or unauthorized. The system verifies who the cell phone belongs toif known IMEI is found in a database. The base stations may then directthe system to back haul all authorized phones and display the authorizedphones within the interested area, and not display phones in anynon-interested areas. The base station(s) may be directed to denyservices to all non-registered and/or unauthorized within the restrictedarea, display these restricted phones and notify staff of location andpresence of the non-registered and/or unauthorized cell phones.

In another embodiment of the invention, the Cell Phone Detection systemworks in conjunction with an integrated Base Station Module without backhaul capability. In this case, the base station(s) registers the phoneand uses the Cell Phone Detection system to verify the location of cellphone. The allowability module determines whether the phone is inside arestricted area. The system may further verify who the phone belongs to,if known IMEI is present in a database. The base station is directed torelease an authorized cell phone and those cell phones that are not inthe restricted areas back to the local tower, display the authorizedphones within the interested area, and not display phone innon-interested areas. The base station is directed to “hold-on-to”unauthorized cell phones and display the unauthorized phones. Allnon-registered cell phones will have Denial of Service (Do's), by virtueof being held-onto by the base station unit and the like.

In another embodiment of the invention, the Cell Phone Detection andIdentification Module in which the Cell Phone Detection system is thecontrolling unit; the system utilizes a sniffer and/or embedded IMEIdecoders within each sensors and cell phone detection sensors todetermine the location and identification of all cell phones within aspecific area. The signal detection sensors find and positively locatethe phone. In a configuration in which each sensor does not possess adecoder IMEI module, the sensor provides the information to the sniffer(e.g., TOA, frequency, type, channel, etc.). The sniffer may scan forthe phone, then report back the identification information. The systemmay verify who the phone belongs to and whether the cell phone isauthorized or not authorized. In a configuration in which each sensorhas a decoder module, the system displays green, for example, forauthorized phone and red for unauthorized phones and the like. Inanother embodiment, the sniffer module finds and positively identifiesthe cell phones; the sniffer provides information to the cell phonedetection and location system (TOA, ID, frequency, type, channel . . .). The Cell phone detection and location system then scans for the cellphone; the system verifies who the phone belongs to and whether the cellphone is authorized or not authorized in that location.

In one aspect of the invention, the Cell Phone Detection andIdentification Module works in conjunction with a 3rd party TelcoSupport. In this aspect the sniffer module (IMEI decoder and identified)positively identify the phones; the sniffer gives information to thecell phone detection and location system (TOA, ID, frequency, type,channel . . . ). The Cell phone detection system scans and identifieslocation of interested cell phone and may verify who the phone belongsand whether the cell phone is authorized and/or not authorized. Thesystem displays, for example, green for authorized phone and red forunauthorized phones. The system may then provide an alert to theappropriate cell phone provider of unauthorized call phone to have thecell phone provider deny service on said cell phone. The facility staffmay then be notified to confiscate the unauthorized cell phone and thelike.

In another aspect of the invention, the Cell Phone Detection systemworks in conjunction with a repeat Jamming system and an IdentificationModule and/or embedded decoding module. The sensors detect andpositively locate the phones. In the case, in which there is externalidentification of the IMEI, the system provides information to thesniffer (TOA, frequency, type, channel, etc. . . . ). The sniffer scansfor the phone and reports back the identification of the detected cellphone. The system compares the identification with the database ofauthorized phones. The system may further verify who the phone belongsto and whether the cell phone is authorized or not authorized. Thesystem displays, for example, green for authorized phones and red forunauthorized phones. The unauthorized phone may then be picked up by thefacility staff. A repeat jammer may disrupt a specific phoned using arotating signal with a set repeat delay to take the cell phone off line.Pinpoint jamming disrupts all phone within a frequency channel and areaand/or a Broadband jammer disrupts all phones within area and frequencycoverage and the like.

Although not shown, it would be recognized that the receiving and/or thetransmitting antennas and/or the processing systems may be co-located ormay be geographically distributed. When a plurality of receivingantennas are employed and geographically distributed, it would berecognized that correlation of the information obtained from eachantenna is necessary. In one aspect of the invention, a plurality ofantennas having a known angular receiving pattern may be co-located, seeFIG. 7, and remotely located from the processing system, to receivesignals at substantially the same time. It would be recognized that whenthe antenna system is remotely located from the processing system, theareas shown in FIG. 19B are oriented with respect to the antenna system.

In another embodiment of the invention, the wristband as described inpatent application Ser. No. 12/231,437, includes a signal detectionmodule as described in FIG. 6 and/or alternatively in anotherembodiment, FIG. 11, the signal detection module detects cell phonesignals, its use, and unique identifier information of the cell phonebeing used by the inmate. The wristband module may also include a voicerecognition module. A Cell Phone Use, and Authorization Database module(CPU-ADM), interfaces with the cell phone detection system and the basestation control system and controls when an inmate may make a phone calland/or receive a call. This module holds the allowed or dis-allowed cellphone information for each inmate, what cell phone(s) he is allowed touse, the areas and times in which an inmate may use his cell phone, theauthorized places and phone numbers which the inmate may call and/orreceive phone call from. The CPU-ADM system in cooperation with the basestation unit and cell phone detection units inputs, controls and monitorhow long an inmate may stay on the phone, the cost incurred for eachphone call, records the inmates conversations, correlated voice patternwith each inmate to insure each is inmate is who the prescribe to be,and that one inmate is not talking on another inmates cell phone;Correlates voice pattern of all calls may by the inmate and theirrecipient(s). The CPU-ADM system analysis all calls received and allcall made in conjunction with all person(s) contacted and analysis forthreat group, and security concerns and trends. The system in monitorsthreat alerts analysis and on keys words. The CPU-ADM system interfaceswith the canteen/inmate trust fund to debit inmate's account for eachcall made. The CPU-ADM system interface allows for inmates to inputtheir desired call numbers, system allows for security personnelmonitoring.

FIG. 28 illustrates an embodiment of the invention, where a restrictedcell phone (2801) is being controlled by a communication control unit(2802) when a wireless communications device (2801) is detected within arestricted area (2800), and this phone tries to make a 911 call, thereis several ways to make this possible and to insure security andrestriction on the use of that cell phone. In a first aspect of theinvention backhauling (2806) the call to a 911 to emergency responsestaff (2807) specifically designed to handle this restricted coveragearea (2800). This methodology will provide for quicker response and thepersonnel (2807) handling the call center will be specially trained torespond to the emergency and this will eliminate wasting personneloutside the restricted area to respond to someone trying to defeat the“no cell phone security system.” Additionally, the law enforcementpersonnel within the jurisdiction of the secure facility responding tothe 911 call may monitor the situation and record the call and provide aquicker response. To assist in the response, integrating thecommunication control unit with the CCTV system (2811), officer alarmsystem (2814) and inmate tracking system (2812) will provide theresponding personnel the ability to see who is making the call, whichinmate(s) (2809) (2815) and/or staff (2810) are around the caller. Toaccomplish the connection to the 911 call center (2805), the backhaulcan be accomplished through a wire line connection (2806) to theemergency call center. However, there are other methods of backhaulingdiscussed in the patent are also applicable. This same methodology canbe used when transmitting authorized calls.

FIG. 28 a illustrates the second methodology is to allow the 911 call tobe released to the commercial carrier, this can happen through severalmethodologies. Several processes however need to be in place, to insurethe inmate does not use the 911 call to get around the “no call phonerestriction system”. In this embodiment of the invention, the callconnection needs to be seamlessly released to the carrier, to provide aquick response to 911 authorities, However where the initial goal is toprevent unauthorized calls, it is important the commercial control unit(2802) has control of the “911 released” wireless communication device(2816), after the caller ends their 911 call, as there is an opportunityfor the caller to the place another call through the commercial carrier.One methodology is to monitor the call and to verify it is stillconnected to the 911 system. Once the call is disconnected from the 911system, the communication control unit sweeps channel of the commercialprovider to which the phone was transferred to.

In this embodiment, a communication control unit (2802), is atransceiver communications system which communicates with a wirelesscommunication device, such as a base station system, an access point,including such devices such as a wireless access point, femtocell,picocell, Microcell and the like.

In this embodiment, illustrated on FIG. 28A, the communication controlunit (2802) connects to all wireless communication devices (2801) withinthe restricted zone (2800). The communication control unit (2802)connects the cell phone (2801) through a common switch (2819) and/orTelco Switch with the commercial carrier (2803) and does a hand off withthe Commercial carrier (2803) as a commercial carrier would “hand-off” acall from one tower to another tower, as when a caller is driving andpasses between cell tower coverage areas. FIG. 28A also illustratesanother embodiment in which the communication control unit (2802) firstswitches the channel of the phone from a blocked channel (for example,channel 8) to an open carrier channel (for example channel 1), then thecommunication control unit (2802) transfers the phone (2801) off thecommunication control unit's channel 8. This can be accomplished bydisconnecting the cell phone from the communication control unit. The911 calling cell phone (2816) will then try to reconnect thecommunication control unit (2802) first because it is at a higher powerlevel, (the communication control unit (2802) has the option to lowerits power to eliminate connection to it from occurring), thecommunication control unit (2802) will not accept the reacquiring phone(2816) and the cell phone will go to a next closest accepting tower; inthis case a commercial carrier (2803).

In another embodiment the communication control unit (2802), controlschannels 2-8 (2821) and does not control channel 1, for example, allcell phones that come up on channel 1 will attach to the closestcommercial carrier (2803). The communication control unit (2802)switches the channel of the cell phone (2820) from a blocked channel tothe open carrier channel (2817), the cell phone will only find thecarrier channel (2817).

FIG. 28 a further illustrates the embodiment in which the communicationcontrol unit (2802) software program (2822) initiates a protocol tocapture and/or re-capture all the phones (2816) on the open commercialchannel (2817). This program can run periodically, and/or is initiatedby a signal detection unit and/or the communication control unit and thelike, which monitors the open channel (2817) specifically looking torecapture the 911 callers cell phone. This methodology prevents the 911transferred cell phone (2816) and/or an unauthorized cell phone frommaking additional calls, send texts and the like. This methology alsopicks up cell phones within the restricted area (2800) that areoperating on an open commercial channel (2817).

FIG. 28 a furthers illustrates an embodiment including a set ofprotocols (2823) between the communication control system (2802) and thecommercial carrier (2803) and the like. In this case, when a 911 call isfinished, the commercial carrier (2803) will change the channel (2817)of the 911 caller (2816) from the open channel (2817) to a held channel(2824). The commercial carrier (2803) will terminate the connection(2817) to the 911 caller (2816) and the caller will then re-attach tothe communication control unit (2802) on a held channel (2824).

In another embodiment the protocol (2823) setup between the commercialcarrier and the communication control unit will have a timed programrunning and the commercial carrier (2803) will terminate theconnection(s) to all cell phones in the commercial carrier cell sector(2826) of the restricted area. A variation of this embodiment,commercial carrier (2803) will change all phones in standby to acommunication control system's (2802) held channel (2824).

In another embodiment the communication control unit system (2802)analyzes the current configuration of the commercial carrier and choosesa new “to be opened” channel that is used by the commercial carrier(2803). If the new channel is currently being used by the communicationcontrol unit (2802) as a “captured and hold channel” (2824) thecommunication control unit (2802) will move all “captured and held” cellphone(s) on that channel to another “captured and hold channel.” Oncethe new channel is established, the communication control unit systemwill close the open channel (2817) used by the 911 caller, and all otherphones, will be acquired and held by the communication control unit(2802. The communication control unit will then determine which of thesephones are “authorized” and which phone are “unauthorized”. Allauthorized phone will be switched to the new “open “authorized” Channel,and all unauthorized phone(s) including the 911 called will be switchedto a “captured and hold channel” (2824).

This embodiment of the invention can also be used to find “unauthorized”phones which to “turn-on” in the current open “authorized” Channel. Forexample: the communication control unit releases an authorized phone toan open specific channel to allow authorized cell phones to make andreceive calls, (this is in a configuration in which the facility allowsspecific authorized cell phone(s) in a restricted area). The authorizedphone is in standby on a commercial channel, an inmate “turns on” anunauthorized phone, the channel that the phone turns on to is the Open“authorized” Channel, therefore the inmate gets the ability to make acall on the open channel. The control system is interested in capturingthe “new unauthorized cell phone” on the open “authorized” Channel. Themethod described previously can be implemented on a set schedule, orwhen a phone is detected in the restricted area, and/or when thecommunication control system fails to capture.

In this embodiment the communication control system (2802) and/or asignal detection unit passively listens to the open “authorized” Channellooking for a connection by a cell phone originating from therestricted/controlled area.

In an alternative embodiment, the commercial carrier (2803) can changethe channel of the 911 caller to one of the communication control unit'scapture channel (2824) and then terminate the connection to the 911caller. The cell phone will try to reacquire the commercial carrier(2803), however the communication control unit's (2802) signal powerlevel is set to attract the 911 caller and the communication controlunit (2802) will take control and then move the “911 cell phone to a“captured and hold channel”.

In an embodiment of the invention, where the user wants to continuouslycontrol and monitor all authorized call actions including a 911 calls,either by an authorized and/or unauthorized caller, the system maychoose not to allow an Open “authorized” Channel,” and the communicationcontrol unit (2802) may connect a 911 call and/or an authorized call viaa wireless communication protocol (802.xx,), an IP backhaul, a VOIPbackhaul, and/or utilizing a Femtocell and/or pico base stationcommunications portal backhaul, (IP protocol connection), internet andthe like (2826) to the commercial provider (2803) and/or the Telcoswitch (2819), or in situations in which the secure facility has atelecommunication system designed to handle land lines, the call can berouted to the landline system such as an inmate phone system and/or aPBX system. In this embodiment, the communication control unit (2802)still maintains control of the cell phone and its functionality.

FIG. 29 illustrates an embodiment of the invention where it is importantto allow an inmate(s) to communicate with their family and friends in asecure, safe and monitored manner, all of the inmate(s) can use any ofthe above communication portals and utilize cell phone (2802) and/orutilize 802 protocol communication devices (2901) and be routed to anyof the above mentioned communication systems. The 802.xx communicationdevices can be mounted on a wall (2904) or in the inmate's cell area(2901). For inmates in segregation units, where calling is restricted,the calling can be done through a two way intercom system (2903), cellphone (2820) or hand set (2902) to a switch (2905) then to the landlinesystem and/or any of the above, and or through an inmate phone systemand/or a PBX system and the like. In an embodiment of the invention, thecommunication control unit (2802) can be used as a monitoring,scheduling, routing and control for inmate communications with familyand friends.

FIG. 30 illustrates an exemplary embodiment of the invention to maintaincomplete control of the restricted and authorized phones is a directcommunication bridge (3002), between the communication control unit(2802) (i.e., pseudo base station) and the commercial Telco (3001) isestablished. The objective is to hold on to the functionality andfeatures of the cell phone(s) (2801) (2820) while it is being allowed tomake and/or receive a call and/or restricting the cell phone by notallowing calls or limiting the ability of the call allowed to be made.

FIG. 30 illustrates a further exemplary embodiment of the inventionwhere the communication control unit (2802) restricts the capabilitiesof a restricted area cell phone(s) (2801, 2820) by changing and/ormodifying the feature and capabilities of the cell phone, and/oruploading software modifications (3003) to the cell phone(s) (2801,2820) to change their feature and capabilities. Another methodology isto disable the features of the controlled wireless communication device(2801), by reprogramming the capabilities and functionality of the cellphones and limit their ability to communicate (3003). The communicationcontrol unit provides limited conductivity and prevents any alternativecommunication's methodology, these functions will be disabled in thecommunication control unit (2801) by the system software when itestablishes the connection to connect the 911 call and/or alternately bythe commercial Telco (3001) when it receives a 911 call via thecommunication protocol. This solution can also be implemented in regardto authorized phones (2820) to limit their capability within arestricted area (2800).

FIG. 30 illustrates an embodiment wherein a direct communication bridge(3002), can be in the form of a cellular connections, wireless conduit,or wire line connections, switch set, straight backhaul to the switchand the like, When the 911 call is initiated by the unauthorized phone(2801) (or unauthorized or restricted communications device and thelike), the communication control unit connects the controlled wirelesscommunication device to the communications bridge (3002) so the callgoes through and the communication control unit (2801) can monitor thecall, if necessary. Communication control unit (2801) can monitor anyattempt by the controlled wireless communication device (2801) to defeatthe system, such as dialing a second number or executing an email,accessing the web, IP chat, and the like. In this case, thecommunication control unit (2802) can prevent such actions.

FIG. 31 Illustrates an exemplary embodiment of the system controllingthe output from the transmission of the cell phone and the input to thecell phone is critical. The Communication control system (2802) isprogrammed to allow only specific data packets to and from the cellphone (2801). The communication control unit (2802) restricts all dataexcept voice data packet(s) and/or packet-switched data sets and/or thelike. This function is performed by analyzing each packet set and onlyallowing the packet set containing voice data and the like. The goal ofthis embodiment is to disable cell phone features such as email, instantmessaging, video streaming, an ability to make a second call upon anexisting call, three way calling and the like, (e.g., a tweet) andallowing voice only . . . . The system will also analyze the voicepacket to make sure nothing else in encapsulated in the voicetransmission, when the phone is detected in a restricted area (i.e.areas of sensitive data and security documents which are not to betransmitted).

Currently, packet switching is a digital networking communicationsmethod that groups all transmitted data regardless of content, type, orstructure into suitably sized blocks, called packets. Packet switchingfeatures delivery of variable-bit-rate data streams (sequences ofpackets) over a shared network. When traversing network adapters,switches, routers and other network nodes, packets are buffered andqueued, resulting in variable delay and throughput depending on thetraffic load in the network. Packet switching contrasts with anotherprincipal networking paradigm, circuit switching,—a method which sets upa limited number of dedicated connections of constant bit rate andconstant delay between nodes for exclusive use during the communicationsession. Currently two major packet switching modes exist; (1)connectionless packet switching, also known as datagram switching, and(2) connection-oriented packet switching, also known as virtual circuitswitching. In the first case each packet includes complete addressing orrouting information. The packets are routed individually, sometimesresulting in different paths and out-of-order delivery. In the secondcase a connection is defined and reallocated in each involved nodeduring a connection phase before any packet is transferred. The packetsinclude a connection identifier rather than address information, and aredelivered in order.

Currently packet mode communication may be utilized with or withoutintermediate forwarding nodes (packet switches or routers). In allpacket mode communication, network resources are managed by statisticalmultiplexing or dynamic bandwidth allocation in which a communicationchannel is effectively divided into an arbitrary number of logicalvariable-bit-rate channels or data streams. Statistical multiplexing,packet switching and other store-and-forward buffering introduce varyinglatency and throughput in the transmission. Each logical stream consistsof a sequence of packets, which normally are forwarded by themultiplexers and intermediate network nodes asynchronously usingfirst-in, first-out buffering. Alternatively, the packets may beforwarded according to some scheduling discipline for fair queuing,traffic shaping or for differentiated or guaranteed quality of service,such as weighted fair queuing or leaky bucket. In case of a sharedphysical medium, the packets may be delivered according to somepacket-mode multiple access schemes.

In this embodiment some voice data packet(s), binary data,circuit-switched wireless digital voice, and/or packet-switched datasets and the like include Short Message Service (SMS); SMS is abidirectional service for short alphanumeric messages. Messages aretransported in a store-and-forward fashion. For point-to-point SMS, amessage can be sent to another subscriber to the service, and anacknowledgement of receipt is provided to the sender. SMS can also beused in a cell-broadcast mode, for sending messages, such as trafficupdates or news updates. Multimedia Messaging Service (MMS)—sometimescalled Multimedia Messaging System is a communications technologydeveloped by 3GPP (Third Generation Partnership Project) that allowsusers to exchange multimedia communications between capable mobilephones and other devices. An extension to the Short Message Service(SMS) protocol, MMS defines a way to send and receive, almostinstantaneously, wireless messages that include images, audio, and videoclips in addition to text.

Currently, EMS (Enhanced Message Service) is the step between SMS andMMS it has some of the MMS function like sending formatted and coloredTEXT, sample Graphics and audio files, which are simple like Ring tones.EMS is being used by some limited phones because it is being supportedby old networks instead of MMS, which need (2G) or (3G) network. The(3G) network might support very large MMS size while the (2G) may limitthe MMS size to 100 KB only.

Currently, SMS, MMS and EMS services are utilized within the largerwireless domains such as GSM, TDMA, GPRS, and CDMA, CDMA2000-1X, EDGE,UMTS, GPRS and the like.

FIG. 31 further illustrates an exemplary embodiment the communicationcontrol unit decodes the packet-switched wireless communications andblocks the restricted data services from the voice only service. TheSystem includes Simple Mail Transport Protocol (SMTP) preventions; ade-encryption tool set for high-speed multi-media, SMS, EMS, and MMSenabled platforms, such as 3G and the like.

In the exemplary embodiment illustrated, communication control unitincludes the whole cellular connections conduit including the Cell Towerand Base Station and sub components such as the (Base Station Controller(BSC), Mobile Switching Centre (MSC) and/or the Gateway GPRS and thelike. In an embodiment, a base station is the cellular relay station (orcell tower) that a cell phone talks to when initiating or receiving awireless call.

In this embodiment, the Mobile Switching Center (MSC) is acomputer-controlled switch for managing automated network operations. AnMSC automatically coordinates and controls call setup and routingbetween mobile phones in a given service area. In this embodiment theMSC maintains individual subscriber records, current status ofsubscribers, and information on call routing and subscriber information,traditionally there are two subscriber databases called the HomeLocation Register (HLR) and the Visitor Location Register (VLR). The HLRcontains subscriber profiles, while the VLR provides informationrelevant to roamers.

In an embodiment, a modified Home Location Register (HLR) and/or theVisitor Location Register (VLR) are modified to contain theunauthorized/authorized cell phone list and the like.

In this embodiment the SMS, EMS, WMA, and MMS and the like utilizes theShort Message Service Center (SMSC), which acts as a store-and-forwardsystem for relaying short messages. In an embodiment, the system willdisable and/or manipulate the functionality of the Short Message ServiceCenter to stop the reception of said data packet(s) (message, data file,data packet and the like) and reroute these data sets to a database forfuture analysis. Additionally, since messages are stored in the networkuntil the destination cell phone becomes available, the communicationcontrol unit will collect the waiting packets/messages and the like andprevent them from reaching their destination and reroute the data forfuture analysis.

In an another embodiment and application, where the GMSC interrogatesthe Home Location Register (HLR) for subscriber routing information anddelivers the short message to the home MSC or roaming MSC of thedestination mobile unit the communication control unit, will reroutethese SMS, EMS, MMS data packets into a database which will contain thesender and receipt's unique identifier(s), time-stamp reporting,location of cell phone at the time of send, the receiving andtransmitting cell phone number and the like.

In an embodiment in which the commercial carrier utilizes a basicpoint-to-point (or broadcast-to-point subscriber servicesMobile-Terminated Short Messages (MT-SM) and/or a Mobile-OriginatedShort Messages (MO-SM), in which MT-SMs are transmitted from the SMSC tothe handset or from the SMSC to other sources. The communication controlunit intercepts the messages as mentioned above and returns a report tothe SMSC, confirming that the message was delivered or informing theSMSC of the SMS failure. The answer will depend on the parameter set onthe system within a specific application and goal the mission of thesystem.

In an embodiment the commercial carrier deploys the use of a short code,which is a carrier-specific (and therefore carrier-dependent) phonenumber for applications routed through an SMSC. Thus, it is intendedthat this embodiment to capture all transmitted and received non-voicecommunications. However it is also anticipated that a message will beencrypted within a voice packet, and API (Application Interface) will bedesigned on a smart phone to bypass the current data transportmethodologies and this invention anticipates that inevitability and thelike.

Additionally, in all of the interception of messages and/or datatransmissions, an embodiment of the invention will trigger a correctreply to the unauthorized transmission, that the message and/or data wasreceived and open by the intended recipient.

In an embodiment, where the Subscriber Identity Modules (SIM) cards isused for activation, and subscriber-profile purposes, the communicationcontrol unit and/or system will modify the SIM information, such as theelectronic serial number (ESN) and/or the mobile identification number,or MIN) within the phone or on the SIM card or within the phone to pulla subscriber offline. By changing the SIM information, and/or theinformation identifying the phone, the cell phone is not able tointerface with the commercial tower and/or the cell phone is deniedaccess because the identification information and the like, isincorrect.

In an embodiment the communication control unit interfaces with theservice-provider gateway(s) and/or commercial carrier gateway(s) andprovides the gateways with the unique identifier of all restrictedphones, and a set of parameters which indicate which features of thephones should be disabled, which phones should be controlled andmaintained and the like. In another embodiment the communication controlunit interfaces with a set of transmitters and/or transceivers throughand/or by the service-provider gateway(s) and/or Commercial carriergateway(s) and the like.

In an embodiment in which the cell phone is a Smart phone and the like,and/or a phone which provides alternative communication capabilitiesand/or advanced features, (i.e., includes the capability to transmitsinformation without utilizing FCC Commercial carrier frequencies,utilized web enabled features such as tweet and the like), for examplethe use of third-party platform, that acts as an operating-system layerbetween the Internet and wireless devices. This communication may bethrough Wi-Fi enabled cell phones (and the like), the communicationcontrol unit interfaces with Wi-Fi access points (ex. 433 mhz, 912 mhz .. . 2.5 g and the like) which attract wireless communications to thecommunication control unit. The communication control unit willsimulates the transmissions and the intended results of a completedtransmission and/or send back a “received indication”. The goal is toprovide the environment in which the restricted cell phone user believesthey have an actual connection and communication pathway, and providesthe ability of the communication control unit to capture the datetransmitted from the cell phone and provides a simulated “correct”response.

In another embodiment, the wireless communication access point, providesthe intended recipient the belief the inmate sent a message. Howeverthis massage is a rogue message put in place to assist law enforcementin the investigation and to thwart the continuing criminal enterpriseand allow the law enforcement personnel the ability to catch thetransmitter and receivers of restricted area communications.

As previously discussed one of the goals is to identify the person whois attempting to contact the restricted area cell phone. In an exemplaryembodiment of the invention, the communication control unit (2802)and/or the commercial carrier interrogates the person's cell phoneattempting to contact the restricted cell phone and collectsinvestigative data including but not limited to photos, text email,phone records, voicemail, call history and the like.

In the case of other wireless communications, such as a Wi-Fi accesspoint being setup outside the restricted area to provide a wirelesscommunication conduit to someone inside the restricted area, it isimportant to be able to detect that wireless communications node and/oraccess point. In an embodiment the signal detection system and/or thecommunication control unit (2802) monitors the external area around therestricted area to detect for any wireless communications that may bepointed at or configured in such a way to provide wireless communicationdevices within the restricted area to communicate outside the restrictedarea. In an embodiment, the communication control unit and/or the signaldetection system will also look to detect wireless communications withinthe restricted area communicating with other wireless communicationswithin the restricted area. For example an inmate in administrativesegregation (ADSEG) communicating to an inmate outside of ADSEG.

In an exemplary embodiment of the invention, developing a commercialcarrier surveys, which includes the footprint of the restricted area,the settings, surrounding characteristics and a benchmark on thecellular activity within and/or around the restricted area. Alsobenchmarking the characteristics of the commercial base stations, theircomponents, and the cell towers to provide the ability to accurately andseamlessly simulate and/or clone the towers and all of theircharacteristics, capabilities, data hand shake protocols, uniqueidentifies of each of the tower and channels, signal strengths and thelike. This Dataset and database of information is important toaccurately place and to configure the functionality of a communicationcontrol unit, so that the communication control unit does, in fact,clone the commercial base station and its towers. Additionally, thisinformation gathered provides the ability to catalog into a criminaljustice database which can cross reference cell phone activity usage,cell phone purchases, gang activity and provider perimeter detectionanalysis capabilities, information on the capturing of contraband cellphone(s), assist in accurately detecting of a cell phone, providecritical information for contraband investigations, provide trends andanalysis of preferred cell phone being used by inmates and theircriminal enterprise.

Some of the important and relevant information and data to be gatheredis: what tower cell(s) and/or sector is the restricted area located in?How many towers in the area? What transceiver frequencies does eachtower provide? How many channels does each tower have? What are theparameters of the control and reverse control channels? What are thecell towers sectors and cell and related power levels? What protocols isthe tower capable of communicating? What are the handshake protocols?What are the power levels at each frequency and protocol? What are theunique identifiers of each tower? How many cell phones are locatedinside the restricted area? How cell phone may is located adjacent? Howmany are transient cell phones? (example a corrections officer has acell phone, he drives 5 miles to work each way, the cell phone isswitched between three tower on his way to and from work, the phonespends 8 hours at night sitting in sector/cell 2 of Tower B; Tower B isa mile away form the corrections officer's home, the phone spends 8hours 5 days a week, in sector/cell 6/8 of Tower A).

For each cell phone answers to the above questions are important toknow: What carrier each phone is connected to? What is the cell phonenumber? What is the IMEI information? What is the SIM information? Whatis the make and model of the cell phone? Who the cell phone belongs to?Where is the billing address? What type of billing on this phone? Isthis phone paid for by check or credit card? Does this phone belong to aperson who works at the facility? Does his phone belong to a friend andfamily member of an inmate? Does this person live next to the restrictedarea? Does this phone migrate from this location? If yes how often?

In an exemplary embodiment where the desire is to shut down thecommunications of a cell phone and/or wireless communication device(s)and the protocol is encrypted to communicate with said device, severalmethods are available to detect and take said cell phone off line. In anembodiment of the invention when the cell phone turns on, it may or maynot try to connect with the communication control unit because thecommunication control unit does not have the protocol to talk to thecell phone. Thus, the cell phone cannot communicate with thecommunication control unit. Therefore, the cell phone attaches to thecommercial carrier who can understand and communicate with the cellphone. This methodology of detection and control is applicable to anywireless communication device. The communication control unit and/or thesignal detection unit(s) detects a cell phone which is in the restrictedarea, however the cell phone is encrypted and neither system can eitherconnect to the cell phone and/or cannot determine the unique identifier.However both systems can determine the general and/or specific location,and/or the frequency and/or time stamp and/or the type for the cellphone, which was detected but did not attach to the communicationcontrol unit. The communication control unit and/or the signal detectionsystem provides that information to the commercial provider bycommunication networks discussed earlier or by another real-time and/orother means and the like. Real-time is preferred; however, asynchronouscommunication will also achieve the desired results. The commercialcarrier correlates the time stamp, frequency, type, location anddetermines the cell phone which has eluded the communication controlunit. The commercial carrier provides the information above to thesystem and the system determines, whether this is a contraband phone, anauthorized phone, a transient phone and the like.

In an exemplary embodiment of the invention, the communication controlunit and/or the signal detection system detects the encryptedidentifying information and utilizes the encrypted information as apositive identification by sending the encrypted information to alocation and/or machine, and/or system such as the commercial providerto decrypt the information and the like. Additionally, the communicationcontrol unit and/or the signal detection system utilize the uniqueencrypted data set to track and indentify said wireless communicationdevice and the like.

In an exemplary embodiment of the invention, the interface between thecommunication control unit and/or the signal detection system and thecommercial carrier allows the “authorities” (i.e., the law enforcementagency controlling the restricted area) to shut down that cell phonerather than the commercial carrier.

In an exemplary embodiment of the invention, communication control unitand/or the signal detection system utilizes analysis algorithm(s) anddataset and parameters on location, payment type, location of the owner,transient properties of the cell phone, time of call, location of calland the like, using the data collected above and more and the like todetermine, if the cell phone is actually a contraband phone as opposedto a visitor to the facility sitting in their car adjacent to the fenceline, and/or the determined location assures that the cell phone inquestions is actually a contraband phone.

In an exemplary embodiment of the invention, where the desire is to shutdown the communications of a cell phone and/or wireless communicationdevice and the protocol and the available technology is a signaldetection device with and/or without an IMEI/IMSI, electronic serialnumber (ESN) MIN discriminator and the like. In this embodiment, whenthe cell phone turns on, the signal detection system detects all and anywireless communication devices. When the signal detection system detectsa cell phone(s) which is in the restricted area, the system determinesthe general and/or specific location, and/or the frequency and/or timestamp and/or the type for the cell phone, and in some case(s) the uniqueidentifier. The signal detection system provides that information to thecommercial provider by a communication network as discussed earlier orby another real-time methods and/or other means and the like. TheReal-time method is preferred. However, asynchronous communications willalso get the desired results. Currently, in cellular telecommunications,there are three cell phone identifiers:

first—the cell phone (device) id, which for CDMA it is the MEID and forGSM it is the IMEI;

second—the subscriber id, which for CDMA it is the MIN and for GSM it isthe IMSI; and

third—the cell phone number to call out and the cell phone number to becalled, which for CDMA it is the MDN for GSM it is the MSISDN.

Traditionally, each cellular telephone had an Electronic Serial Number(ESN) hardwired into the phone by the manufacturer. This number wasuniquely and permanently associated as to identify each and everycellular phone. Also, when a cellular telephone is put into service, itis assigned a Mobile Identification Number (MIN) by the cellular serviceprovider. This is the ten-digit area code and telephone number of thephone. The mobile equipment identifier (MEID) is a globally uniquenumber identifying a physical piece of CDMA mobile station equipment.The commercial carrier correlates using the information received fromthe signal detection system to determine the cell phone(s)identification in the restricted area. For example if the signaldetection system which provides the ESN, MIN, IMEI, MEID positiveidentification is automatically determined. However, if the signaldetection system provides the frequency, location, time stamp and/or thetype the commercial carrier correlate the timestamp and frequency andmay addition provide the phone's IMEI and/or phone number. The Signaldetection system determines, as discussed in the aforementioned relatedpatent applications, whether this is a contraband phone, an authorizedphone, an unauthorized phone, a restricted area phone, staff phone,transient phone and the like.

In an embodiment of the invention it is critical to configure thecommunication control unit to work with the commercial carrier towerparameters, such as frequency, protocols, cell/sector coverage,transceiver power, channel coverage, frequency priorities and the like.To cover all of the channels, protocols and frequencies of a carriertower the communication control unit must know the tower parameters andwhen those parameters change. In an embodiment the communication controlunit monitors all of the towers within the vicinity of the restrictedarea. The communication control system tower configuration database andalgorithm utilizes the data parameters such as frequency, protocols, andcell/sector coverage, transceiver power, and channel coverage, frequencypriorities, to optimize the communication control unit to effectivelyand completely control the cell phone usage within a area.

In a preferred embodiment the commercial carrier provides all the towerparameters such as frequency, protocols, control and reverse controlchannels, cell/sector coverage, transceiver power, channel coverage,frequency priorities and the like, as they change to the communicationcontrol system so that the communication control unit worksproficiently. The communication control system tower configurationdatabase and algorithm utilize the data parameters such as frequency,protocols, cell/sector coverage, transceiver power, channel coverage,frequency priorities, to optimize the communication control unit toeffectively control the cell phone usage within an area.

In another embodiment the communication control system sets up equipmentwhich interfaces with the tower and/or monitors changes and/or to detectchanges in the tower parameters.

In a preferred embodiment the data derived from the commercial carriersurveys on the cell phone usage in and around the footprint of therestricted area provides an ability to see and understand how contrabandget into prisons. Correlating who is bring in these phones, what callthese contraband phones call, determining the relationship betweenprisons and who is the organized element providing contraband is animportant element in stopping contraband cells.

In a preferred embodiment the communication control unit, (also known asa base station denial of services system) is seamlessly integrated witha signal detection system. In the preferred embodiment this signaldetection system is a time-domain based location and tracking system,which covers the frequency of all of the cell phone frequency channelsas well as all of the Wi-Fi frequencies, walkie-talkie and roguefrequencies. Currently, 300 MHz to 3.5 g should be scanned. However thiswill change over time and will have to be expanded as the frequencybands increase or changed. The integrated detection and control systemallows for the accurate determination of whether the cell phone iswithin the restricted area or is just on the other side of the fence.This ability to accurately determine the location is critical to makesure only restricted phone are denied service and commercial carriercustomers.

in one aspect of the invention, in the preferred embodiment, the basestation technology is integrated with a time-domain location andtracking system, and/or an amplitude detection and location,identification and tracking system with more sensors for a ore accuratelocation capability.

One of the challenges is preventing wireless communication device withina restricted area the ability to defeat the system by being able tochoose and/or choosing a commercial tower and avoiding the control unitsystem. This preferred embodiment solves that situation. When a phone isdetected in the restricted area and is not under the control of thecommunication control unit, the system provides the unique identifier(s)(frequency, IMEI, time code, sector/cell and the like) to the commercialprovider to disable that cell phone.

In an exemplary embodiment of the invention, preventing the cell phonefrom ever being able to bypass the communication control unit is alsothe intention of this invention. Cell phone apps, in the future, and issome case now will be able to pick and choose their wirelessconnections/wireless conductivity and their commercial providers and orCommercial providers' towers. To prevent the communication control unitfrom being intentionally and/or accidently bypassed, the communicationcontrol unit needs to simulate the characteristics of the commercialprovider's towers (i.e., number of channels, frequency of each channel,protocols, etc.) so that the unauthorized cell phone either cannotdistinguish between the tower(s) and communication control unit.

In an exemplary embodiment of the invention, when the cell phone choosesthe commercial tower, the cell phone will still attach to thecommunication control unit, if the cell phone is within the area ofinterest. This act is performed working in collaboration with thecommercial carriers.

As the number of handsets and use of cellular technology increases,including the need for large amounts of data bandwidth, the TELCO(Telephone companies) that are providing voice and data channels at eachtower and are allowing the handsets to choose which channel(s) (for dataand/or voice) to communicate with, this creates a challenge for theconfiguration and management of the communication control unit. In anembodiment of the system, the communication control unit broadcasts aset of instructions on each of the channels provided by the carriers(i.e., TELCOs). These instructions instruct the handset (i.e.,transmission device, mobile device, cell phone, etc. to choose anotherchannel and/or inform the handset that that this channel is or is notavailable for communications. The transmissions of the signal from thecommunication control unit are set at a signal strength such that thesignal strength in the area of interest is greater than the signalstrength received from a signal transmitted by the Telco. Theinstructions further include at least one of forwarding channelrequest(s), channel under repair and/or maintenance announcements. Theinstructions that are provided are dependent upon on what have beendeveloped as commands for the handset and the like.

In another embodiment of the invention, the communication control systemuses the handset GPS, handset RSSI, and other location information ofthe handset to validate whether the handset is inside or outside therestricted coverage area.

In another embodiment of the invention, in which a smart handset freezes(i.e., locks-up) and cannot make authorized calls because the handsetrequires an interactive (EvDO) signal before the handset will be undercommunication control unit. The communication control unit's EvDOchannel is programmed to lower the EVDO channel signal below the EVDOcarrier channel for a known time (e.g., one (1) second). This allows theSmart phone to start an initial handset handshake with the EVDO Carrierchannel. The handset then connects to the Carrier's 1xrtt voice channeland can make and receive calls. The exemplary one (1) second period isshort enough to prevent unauthorized handsets to access the commercialcarrier EVDO (data) Channel. Examples of smart phones includes RIMBlackberry, APPLE iPhones, Samsung Galaxy and the like.

In another embodiment of the invention, a backhaul (i.e., connectionsbetween base stations) is created for authorized handset directly to thecarrier switch, through the use of a Femtocell and the like. This allowsan authorized handset an alternative connection back to its own carrier.To prevent an unauthorized handset from using this backhaul, theauthorized list is synchronized with the Femtocell and the emergencynumber (911) option is disabled on the Femtocell. The emergency numbercommunication is routed through a landline back haul to the PSAP. TheFemtocell backhaul eliminates the need for the UMTS/LTE Encryption keys,and eliminates the need of a more sweeping solution and the like.

In another embodiment of the invention, the communication control systemwhen an authorized phone is released to the carrier through the channelsweeping methodology, the Pilot, Sync and Paging Channel powers aremodified to make to carrier channel signal more attractive than thechannel signal of the communication control units (e.g., lower power forthe communication control unit). However, when the communication controlsystem holds onto an unauthorized phone, the Pilot, Sync and PagingChannel powers are modified to make to communication control unit'schannel signal more attractive than the Commercial Carrier channelsignal and the like (e.g., higher power for the communication controlunit).

In the preferred embodiment the communication control system towerconfiguration database and algorithm utilizes the data parameters suchas frequency, protocols, cell/sector coverage, control and reversecontrol channels, transceiver power, channel coverage, frequencypriorities, cell tower(s) location(s), transceiver frequencies, channelparameters, sector parameters, channel distribution, cell towers sectorfrequencies, cell power levels, tower protocols handshake protocols,power levels at each frequency and protocol, tower, base station and thecommercial provider's unique identifiers and identification identifiers,cell sector, and channel intersection information and their power levelsat each location, and the provider's encryption protocols andidentifiers and the like, to clone and optimize the communicationcontrol unit to look like a corresponding commercial tower(s) in thearea.

In an exemplary embodiment of the invention, when a cell phone in thearea of interest looks for an alternative cell tower to connect with,such as a commercial provider's tower(s), the cell phone only see thecommunication control unit and/or the communication control system'sother wireless communications options, such as Wi-Fi access points andthe like.

In an exemplary embodiment of the invention, the Wi-Fi access pointsprovides the unauthorized cell phone with a connection which providesthe user with a controlled portal experience, in which the restricteduser believes he has found a hole in the system. However, this portal iscontrolled. This connection provides the communication control system anability to infiltrate the cell phone and gather information of theusers, and provides an ability to modify the features of the cell phoneto the benefit of the secure facility. This embodiment is alsoapplicable to all alternative communication transceiver(s), such asWi-Fi, Wi-Max communications devices and the like and also applicable toall other wireless communication devices and the like.

In an exemplary embodiment of the invention, when the cell phone looksfor an alternative cell tower to connect with, the cell phone only seesclones/shadows of commercial tower(s) and when the cell phone tries toconnect to the clone(s)/shadows of commercial tower(s), the phoneactually attaches to the communication control unit. However, the phoneis displayed that it has connected to the commercial carrier (i.e.,tower) an alternative tower. This embodiment is also applicable to allalternative communication transceiver(s), such as Wi-Fi, Wi-Max and thelike and also applicable to all wireless communication devices and thelike.

The embodiments of the invention described herein solve problems andsituations facing the corrections and law enforcement community, inwhich a restricted cell phone achieves conductivity though a wireless802.xx connection which is established outside the restriction zone. Forexample, an inmate has friend place an Wi-Fi access point withcommercial cellular conductivity in a parking lot which is not withinthe restricted area, therefore, the access point connects to thecommercial tower and has unrestricted access to the outside world, thenthe inmate uses a 802.xx connection to reach that access point and nowthe inmate has a communication conduit which a managed access systemalone would not detect. These embodiments, whether taken individually orin concert, remove this situation completely.

it is expressly intended that all combinations of those elements thatperform substantially the same function in substantially the same way toachieve the same results are within the scope of the invention.Substitutions of elements from one described embodiment to another arealso fully intended and contemplated. For example, while the term “cellphone” or “transmission facility” or “transmission device” has been usedherein, such terms relate to a general class of wireless transmissiondevices that includes standard cell phones, smart phones (e.g., PALMCENTRO), and iPhones. PALM is a registered trademark and CENTRO is atrademark of the Palm Inc., Sunnyvale, Calif. iPhone is a registeredtrademark of Apple Inc. Culpertino, Calif.

While the invention has been described in connection with certainpreferred embodiments; other embodiments and/or modifications would beunderstood by one of ordinary skill in the art and are encompassedherein.

What is claimed is:
 1. A method for controlling a transmission devicewithin a restricted area within a coverage area controlled by anavailable base station, said method, operable in a communication controlcenter, causing said communication control center to execute the stepscomprising: transmit a first signal to said transmission device, saidsignal being transmitted at a first signal strength, said first signalstrength causing said signal received in said restricted area to be at agreater strength than a signal strength of a signal transmitted fromsaid available base station received in said restricted area, saidsignal causing said transmission device to lose contact with saidavailable base station receive a signal from said transmission, saidsignal connecting said transmission device to said to communicationcontrol center; extract identification information associated with saidtransmission device; determine an allowability of said identifiedtransmission device within said restricted area based on saididentification information; transmit information to said transmissiondevice causing said transmission device to operate on a channelassociated with said communication control center when said allowabilityindicates said transmission device is not allowed; and reduce said firstsignal strength of said first signal, said reduced signal strengthcausing said signal received in said restricted area from said firstsignal to be lower than said signal strength of said signal from saidavailable base station in said restricted area, causing saidtransmission device to operate on a channel associated with saidavailable base station when said allowability indicates saidtransmission device is allowed,
 2. The method of claim 1, wherein saidextracted identification information comprises a unique identificationcharacteristic associated with said transmission device
 3. The method ofclaim 1, wherein said allowability of the transmission device is basedon a list of allowable identification characteristics.
 4. The method ofclaim 1, wherein said transmitting said information is in a channel usedby said available base station.
 5. The method of claim 1 further causingsaid communication control center to execute the step of: output a stateof said identified transmission device.
 6. The method of claim 1 furthercausing said communication control center to execute the stepscomprising: determine whether transmission from said transmission deviceis associated with an emergency number; and transmit information to saidtransmission device, said information causing said transmission deviceto operate on an emergency channel; and reduce said first signalstrength of said first signal, said reduced first signal strengthcausing said signal received in said restricted area to be lowered thansaid signal strength of said signal from said available base stationreceived in said restricted area.
 7. The method of claim 6 furthercausing said communication control center to execute the stepscomprising: monitor said transmission associated with said emergencynumber; and transmit, upon termination of said transmission associatedwith said emergency number, information to said transmission device,said information causing said transmission device to operate on achannel not used by said available base station.
 8. The method of claim1 further causing said communication control center to execute the stepscomprising: determine whether transmission from said transmission deviceis associated with an emergency number; and cause said transmissiondevice to operate through a land line connection to communicate with anemergency operator.
 9. The method of claim 1 further causing saidcommunication control center to execute the step comprising: monitortransmissions of said transmission device.
 10. The method of claim 1causing said communication control center to execute the stepcomprising: determine characteristics of said available base station,said characteristics comprising at least one of: a plurality ofoperating channels, operating powers of said channels, and area ofcoverage.
 11. A method for controlling a transmission device within aset area within a coverage area controlled by an available base station,said method operable in a communication control center causing saidcommunication control center to execute the steps comprising: transmit afirst signal to said transmission device, said first signal beingtransmitted at a first signal strength, said first signal strengthcausing said first signal received in said restricted area to be at agreater strength than a signal strength of a signal transmitted fromsaid available base station received in said restricted area, said firstsignal causing said transmission device to lose contact with saidavailable base station; transmit a second signal to said transmissiondevice, said second signal being transmitted at a second signalstrength, said second signal strength causing said second signalreceived in said restricted area to be at a greater strength than asignal strength of a second signal transmitted from said available basestation received in said restricted area, said second signal causingsaid transmission device to connect to said communication controlcenter; extract identification information associated with saidtransmission device; determine an allowability of said identifiedtransmission device within said set area based said identificationinformation; monitor said transmission device when said allowabilityindicates said transmission device is not allowed; and transmitinformation to said transmission device causing said transmission deviceto operate on a channel associated with said available base station whensaid allowability indicates said transmission device is allowed.
 12. Themethod of claim 11, wherein said extracted identification informationcomprises a unique identification characteristic associated with saidtransmission device
 13. The method of claim 11, wherein saidallowability of the transmission device is based on a list of allowableidentification characteristics.
 14. The method of claim 11, wherein saidtransmitting said information is in a channel used by said availablebase station.
 15. The method of claim 11 further causing saidcommunication control center to execute the step comprising: output astate of said identified transmission device.
 16. The method of claim 11further causing said communication control center to execute the stepscomprising: determine whether transmission from said transmission deviceis associated with an emergency number; and transmit information to saidtransmission device, said information causing said transmission deviceto operate on an emergency channel associated with said available basestation.
 17. The method of claim 16 further causing said communicationcontrol center to execute the steps comprising: monitor saidtransmission associated with said emergency number; transmit, upontermination of said transmission, information to said transmissiondevice, said information causing said transmission device to operate ona channel not used by said available base station.
 18. The method ofclaim 11 further causing said communication control center to executethe step comprising: determine whether transmission from saidtransmission device is associated with an emergency number; and causesaid transmission device to operate through a land line connection tocommunicate with an emergency operator.
 19. The method of claim 11further causing said communication control center to execute the stepcomprising: monitor transmissions of said transmission device.
 20. Themethod of claim 11 further causing said communication control center toexecute the step comprising: determine characteristics of said availablebase station, said characteristics comprising at least one of: aplurality of operating channels, operating powers of said channels, andarea of coverage.
 21. A communication control center controlling atransmission device within a set area within a coverage area controlledby an available base station, said communication control centercomprising: means for transmitting an information on a signal to saidtransmission device, said signal being transmitted at a first signalstrength, said first signal strength causing said signal received insaid restricted area to be at a greater strength than a signal strengthof a signal transmitted from said available base station received insaid restricted area, said information causing said transmission deviceto lose contact with said available base station; means for transmittingan information on a second signal to said transmission device, saidsecond signal being transmitted at a second signal strength, said secondsignal strength causing said second signal received in said restrictedarea to be at a greater strength than a signal strength of a secondsignal transmitted from said available base station received in saidrestricted area, said second signal causing said transmission device toconnect to said communication control center; means for receiving atransmission from said transmission device said transmission connectingsaid transmission device to said communication control center; means forextracting identification information associated with said transmissiondevice; means for determining an allowability of said identifiedtransmission device within said set area based said identificationinformation; means for monitoring said transmission device, when saidallowability indicates said transmission device is not allowed; meansfor transmitting information to said transmission device causing saidtransmission device to operate on a channel associated with saidavailable base station, when said allowability indicates saidtransmission device is allowed.
 22. The control center of claim 21,wherein said extracted identification information comprises a uniqueidentification characteristic associated with said transmission device23. The control center of claim 21, wherein said allowability of thetransmission device is based on a list of allowable identificationcharacteristics.
 24. The control center of claim 21, wherein saidtransmitting said information on a channel used by said available basestation.
 25. The control center of claim 21 further comprising: meansfor outputting a state of said identified transmission device.
 26. Thecontrol center of claim 21 further comprising: determining whethertransmission from said transmission device is associated with anemergency number; and transmitting information to said transmissiondevice, said information causing said transmission device to operate onan emergency channel associated with said available base station. 27.The control center of claim 26 comprising: means for monitoring saidtransmission associated with said emergency number; and means fortransmitting, upon termination of said transmission, information to saidtransmission device, said information causing said transmission deviceto operate on a channel not used by said available base station.
 28. Thecontrol center of claim 21 further comprising: means for determiningwhether transmission from said transmission device is associated with anemergency number; and means for causing said transmission device tooperate through a land line connection to communicate with an emergencyoperator.
 29. The control center of claim 21 further comprising: meansfor monitoring transmissions of said transmission device.
 30. Thecontrol center of claim 21 further comprising: means for determiningcharacteristics of said available base station, said characteristicscomprising at least one of: a plurality of operating channels, operatingpowers of said channels, and area of coverage.
 31. A method forcontrolling a transmission device within a set area within a coveragearea controlled by an available base station, said method causing acommunication control center to execute the steps comprising: transmitan information on a signal to said transmission device, said signalbeing transmitted at a signal strength, said signal strength causingsaid signal received in said set area to be at a greater strength than asignal strength of a signal transmitted from said available base stationreceived in said set area, said information causing said transmissiondevice to lose contact with said available base station; receivetransmission from said transmission device to connect to saidcommunication control center; extract identification informationassociated with said transmission device; determine an allowability ofsaid identified transmission device within said set area based saididentification information; monitor said transmission device, when saidallowability indicates said transmission device is not allowed; transmitinformation to said transmission device, said information causing saidtransmission device to operate on a channel associated with an availablecarrier network when said allowability indicates said transmissiondevice is allowed.
 32. The method of claim 31, wherein said extractedidentification information comprises a unique identificationcharacteristic associated with said transmission device
 33. The methodof claim 31, wherein said allowability of the transmission device isbased on a list of allowable identification characteristics.
 34. Themethod of claim 31, wherein said transmitting said information is in achannel used by said available base station.
 35. The method of claim 31further causing said communication control center to execute the stepcomprising: output a state of said identified transmission device. 36.The method of claim 31 further causing said communication control centerto execute the steps comprising: determine whether transmission fromsaid transmission device is associated with an emergency number; andtransmit information to said transmission device, said informationcausing said transmission device to operate on an emergency channelassociated with said available base station.
 37. The method of claim 36further causing said communication control center to execute the stepcomprising: monitor said transmission associated with said emergencynumber; and transmit, upon termination of said transmission, informationto said transmission device, said information causing said transmissiondevice to operate on a channel not used by said available base station.38. The method of claim 31 further causing said communication controlcenter to execute the steps comprising: determine whether transmissionfrom said transmission device is associated with an emergency number;and cause said transmission device to operate through a land lineconnection to communicate with an emergency operator.
 39. The method ofclaim 31 further causing said communication control center to executethe step comprising: monitor transmissions of said transmission device.40. The method of claim 31 further causing said communication controlcenter to execute the step comprising: determine characteristics of saidavailable base station, said characteristics comprising at least one of:a plurality of operating channels, operating powers of said channels,and area of coverage.
 41. A communication control center for controllinga transmission device within a restricted area within a coverage area ofan available base station, said communication control center comprising:means for transmitting information to said transmission device, saidinformation being transmitted at a first signal power, said first signalpower causing a signal power from said first signal power within saidrestricted area to be greater than a signal power from said availablebase station within said restricted area, said information causing saidtransmission device to connect to said communication control center;means for determining whether said transmission device is within saidrestricted area; means for extracting identification informationassociated with said transmission device when said transmission deviceis determined to be located within said restricted area; means fordetermining an allowability of said identified transmission device basedon said identification information; and means for reducing said firstsignal power, said reduced first signal power causing said signal powerfrom said first signal power within said restricted area to be less thana signal power from said available base station within said restrictedarea when allowability is indicated.
 42. The communication controlcenter of claim 41 further comprising: means for transmittinginformation to said transmission device, said information causing saidtransmission device to operate on a channel not available to saidavailable base station, when non-allowability is indicated.
 43. Thecommunication control center of claim 41 further comprising: means forobtaining characteristics of said available base station, saidcharacteristics comprising at least one of: a plurality of operatingchannels, operating powers of said channels, and area of coverage. 44.The communication control center of claim 41 further comprising: meansfor monitoring transmissions of said transmission device.
 45. Thecommunication control center of claim 41 further comprising: means forinstructing the transmission device to not return to the communicationcontrol center
 46. The communication control center of claim 41 furthercomprising: means for instructing the transmission device to remainconnected an available base station.
 47. The communication controlcenter of claim 41 further comprising: means for connecting saidtransmission device to a specific channel an identification of saidtransmission device
 48. The communication control center of claim 41further comprising: means for connecting said transmission device to thePSAP via a landline.
 49. The communication control center of claim 41further comprising: means for re-directing said transmission device to aspecific channel depending an identification of said transmissiondevice.
 50. The communication control center of claim 41 furthercomprising: means for reducing said greater signal strength to belowered than an available base station signal strength in saidrestricted area.
 51. The communication control center of claim 41wherein said allowability of the transmission device is based on a listof allowable identification characteristics.
 52. The communicationcontrol center of claim 41, wherein said extracted identificationinformation comprises: a unique identification characteristic associatedwith said transmission device
 53. The communication control center ofclaim 41 wherein transmitting said first information is transmitted on achannel associated with said available base station.
 54. Thecommunication control center of claim 41 further comprising: means foroutputting a state and said location of said identified transmissiondevice.
 55. The communication control center of claim 41 furthercomprising: means for outputting a signal within a frequency band abouta frequency of said response transmission of said transmission device.56. A communication control center for controlling a transmission devicewithin a set area within a coverage area controlled by an available basestation, said communication control center comprising: means fortransmitting an information on a signal to said transmission device,said signal being transmitted at a signal strength, said signal strengthcausing said signal received in said restricted area to be at a greaterstrength than a signal strength of a signal transmitted from saidavailable base station received in said restricted area, saidinformation causing said transmission device to lose contact with saidavailable base station causing said transmission device to connect tocommunication control center; means for extracting identificationinformation associated with said transmission device; means fordetermining an allowability of said identified transmission devicewithin said set area based said identification information; means fortransmitting information to said transmission device, causing saidtransmission device to operate on a channel associated with saidcommunication control center a when said allowability indicates saidtransmission device is not allowed; means for transmitting informationto said transmission device causing said transmission device to operateon a channel associated with said available base station when saidallowability indicates said transmission device is allowed.
 57. Acommunication control center for controlling a transmission devicewithin a set area within a coverage area controlled by an available basestation, said communication control center comprising: means fortransmitting an information on a signal to said transmission device,said signal being transmitted at a signal strength, said signal strengthcausing said signal received in said restricted area to be at a greaterstrength than a signal strength of a signal transmitted from saidavailable base station received in said restricted area, saidinformation causing said transmission device to lose contact with saidavailable base station causing said transmission device to connect tocommunication control center; means for extracting identificationinformation associated with said transmission device; means fordetermining an allowability of said identified transmission devicewithin said set area based said identification information; means formonitoring said transmission device when said allowability indicatessaid transmission device is not allowed; and means for transmittinginformation to said transmission device, said information causing saidtransmission device to operate on a channel associated with saidavailable base station when said allowability indicates saidtransmission device is allowed.
 58. A method, operable in acommunication control center, for controlling a transmission devicewithin a set area within a coverage area controlled by an available basestation, said method comprising: transmitting an information on a signalto said transmission device, said signal being transmitted at a signalstrength, said signal strength causing said signal received in said setarea to be at a greater strength than a signal strength of a signaltransmitted from said available base station received in said set area,said information causing said transmission device to lose contact withsaid available base station receiving a signal from said transmissiondevice, said transmission device connecting to communication controlcenter; extracting identification information associated with saidtransmission device; determining an allowability of said identifiedtransmission device within said set area based said identificationinformation; transmitting information to said transmission device, saidinformation causing said transmission device to operate on a channelassociated with said communication control center, when saidallowability indicates said transmission device is not allowed;transmitting information to said transmission device, said informationcausing said transmission device to operate on a channel associated withsaid available base station when said allowability indicates saidtransmission device is allowed.