Systems and methods for detecting and controlling transmission devices

ABSTRACT

A system for managing devices within a restricted area or facility provides for the collection of information from sources, such as commercial carriers, private network carrier, etc., local management systems and area or facility related information and performs a correlation of the information, which may be both current and historical, to determine a status of a device attempting to transmit or receive communicative (voice or text) while within the area or the facility. The system provides for the identification of devices that are unauthorized or contraband devices operating within the area or facility while distinguishing devices that are either authorized to operate within the area or devices that are not registered within the area but are also not to be interfered with.

CLAIM OF PRIORITY

This application claims priority to, and the benefit of the earlierfiling date, pursuant to 35 USC 119, of patent application Ser. No.62/619,550 filed on Jan. 19, 2018 and pursuant to 35 USC § 120, as aContinuation to patent application Ser. No. 15/899,165, filed Feb. 19,2018, which claimed priority as a Continuation to patent applicationSer. No. 14/933,06, filed Dec. 29, 2015 (U.S. Pat. No. 9,900,776), whichclaimed priority, as Continuation, to patent application Ser. No.13/887,300, filed May 4, 2013, (U.S. Pat. No. 9,222,59), which claimedbenefit of provisional application Ser. No. 61/642,526, May 4, 2012, andclaimed priority, as a Continuation-in-part, to patent application Ser.No. 13/287,0808, filed Aug. 28, 2010 (U.S. Pat. No. 8,626,195), whichclaimed benefit of provisional application Ser. No. 61/307,4838, filedFeb. 24, 2010, Ser. No. 61/264,838, filed Nov. 30, 2009 and Ser. No.61/237,682, filed Aug. 28, 2009; and

claimed priority, as a Continuation-in-part, to patent application Ser.No. 12/510,036, filed Jul. 27, 2007 (U.S. Pat. No. 8,983,448), whichclaimed priority, as a Continuation-in-part, to patent application Ser.No. 11/457,786, filed Jul. 14, 2006 (U.S. Pat. No. 8,078,190), whichclaimed benefit of provisional application Ser. No. 60/739,877, filedNov. 13, 2005 and Ser. No. 60/699,281, filed Jul. 14, 2005, the entirecontents of all of which are incorporated by reference, herein.

Patent application Ser. No. 13/887,300, further claimed priority to, andbenefit of the earlier filing, as a Continuation-in-part to patentapplication Ser. No. 12/231,437, filed Sep. 2, 2008 (U.S. Pat. No.9,037,098), which claimed priority, as a Continuation in part, to patentapplication Ser. No. 12/157,530, (now U.S. Pat. No. 8,238,936), whichclaimed priority, as a Continuation-in-part to patent application Ser.No. 11/457,786, (now U.S. Pat. No. 8,078,190), the entire contents ofall of which are incorporated by reference, herein.

RELATED APPLICATION

This application is related to patent application Ser. No. 14/887,268,filed Oct. 19, 2015, Ser. No. 14/953,400, filed Nov. 29, 2015 and Ser.No. 14/95757, filed Dec. 3, 2105, the contents of all of which areincorporated by reference, herein.

BACKGROUND

This invention relates to the field of wireless transmission and moreparticularly controlling the use of wireless communication devices inconfined areas.

There are many facilities, such as government buildings, and inparticular correctional facilities, such as prisons, that do not permitcellular phone usage or wireless transmission devices on the premises oreven possession of cellular phones within the premises. Finding andpreventing usage of cell phones and other transmission facilities isdifficult, and a need exists for improved methods of detecting,locating, and managing the transmission of such devices particularlywhen an emergency call is initiated.

SUMMARY OF THE INVENTION

Provided herein are methods and systems for locating transmissiondevices (or transmission facilities) such as cellular phones, cellphones, mobile phones, satellite phones, radios, transmitters, PDAs,beepers, pagers, walkie-talkies, email devices, instant messengerdevices, voice over IP devices, and other types of wirelesscommunication or transmission facilities whose possession is prohibited.In addition, control of the devices is important as such wirelessdevices are known to be used to detonate bombs, as in the case ofimprovised explosive devices. The methods herein are also to positivelyidentify, locate and track individuals with such transmissionfacilities. For example, the system provides the location and trackingof one or more individuals who utilize a wireless device to communicateand further determines whether the individual is authorized to transmitwithin a general area local to the individual. In one aspect, lawenforcement may be interested in tracking the individual'sidentification and movements.

Methods relate to locating and managing the use and presence of wirelesscommunication facilities are further disclosed. Embodiments relate todetecting wireless devices when they transmit a signal are furtherdisclosed. Other embodiments relate to detecting of transmission deviceswhen the transmission devices (i.e., facilities) are in a non-activetransmission active state.

In embodiments the methods and systems disclosed herein include methodsand systems for detecting a transmitting device within an obstructionrich environment. The methods and systems may include detecting thetransmitting device within a wireless detection transmission facility;communicating signal information relating to the detected transmittingdevice from the wireless transmission detection facility to a centralunit; determining the location of the transmitting device; displayinginformation of the detection and location of the transmitting devicethrough a user interface; and providing the information to an actionfacility for causing actions related to the detected transmittingdevice. In embodiments, the wireless transmission detection facility isan antenna. In embodiments, the antenna is a dual dipole embeddedantenna. In embodiments, the dual dipole embedded antenna is tuned toreceive cell phone transmissions. In embodiments the dual dipoleembedded antenna is tuned to receive a frequency band of approximately700 to 950 MHz. In embodiments the dual dipole embedded antenna is tunedto receive a frequency band of approximately 1.7 to 2.0 GHz. Inembodiments the dual dipole antenna is tuned to receive signals infrequency bands of approximately 700 to 950 MHz and 1.7 to 2.0 GHz. Inembodiments the obstruction rich environment is a correctional facility.In embodiments the obstruction rich environment is a mall. Inembodiments, communicating the information relating to the detectedtransmitting device from the wireless transmission detection facility toa central unit involves wireless communications. In embodiments, thewireless communications are 802.11 communications. In embodiments,determining the location of the transmitting device is accomplishedthrough transmission triangulation. In embodiments location of thetransmitting device is accomplished through a known location of a singleantenna. In embodiments the location of the transmitting device isdetermined based on extrapolation of the receipt of a plurality ofreceived signals through a series of non-iterative linear equations.

Disclosed is a system for managing wireless transmitting devices inwhich a wireless transmission from a transmission device is detectedwithin or about a set area and an allowability of the transmissiondevice to continue transmitting is based on an identificationinformation of the device, a location of the device and a number beingcalled by the device.

BRIEF DESCRIPTION OF FIGURES

The systems and methods described herein may be understood by referenceto the following figures:

FIG. 1 shows a transmission detection, identification, and reportingsystem.

FIG. 2 illustrates a system for detecting a transmission facility

FIG. 3 illustrates exemplary antenna configurations.

FIG. 4 illustrates a first system configuration for detecting atransmission facility in a cell environment.

FIG. 5 shows a second system configuration for detecting a transmissionfacility in a cell environment.

FIG. 6 illustrates a block diagram relating to actions taken whendetecting transmission facilities.

FIG. 7 shows a transmission facility detection system wherein an antennaarray is used to determine location.

FIG. 8 shows a transmission facility detection system wherein a signalsource is differentiated between two adjacent rooms.

FIG. 9 illustrates a transmission facility detection systemconfiguration employing multiple antennas are used to identify alocation of a signal source after an omni-directional antenna hasdetected its presence.

FIG. 10 shows a schematic diagram of a system for detecting signals of atransmission facility.

FIG. 11 shows a schematic diagram of an alternate embodiment of a systemfor detecting a signal of a transmission facility.

FIG. 12 shows a schematic diagram of a main circuit board within asystem for detecting transmission facilities.

FIG. 13 shows a schematic diagram of a sub-station in a system fordetecting transmission facilities.

FIG. 14 illustrates a null detection facility.

FIG. 15 Illustrates a system for detecting and controlling atransmission facility.

FIG. 16 Illustrates a system for tracking and locating transmissionfacilities.

FIG. 17 Illustrates an exemplary corrections facility designed forautomation.

FIG. 18 illustrates a system for implementing the processing describedherein.

FIG. 19A illustrates an exemplary process for capturing a wirelesstransmission in accordance with the principles of the invention.

FIG. 19B illustrates an exemplary geographical representation to explainthe processing shown in FIG. 19A.

FIGS. 20A and 20B illustrate exemplary distance and power graphsassociated with the network configuration shown in FIG. 19A.

FIG. 21 illustrates a second example of an exemplary cellular networkconfiguration.

FIGS. 22, 23, and 24 illustrate exemplary power graphs associated withthe network configuration shown in FIG. 21.

FIG. 24A illustrates an exemplary process of determining authorizedand/or unauthorized wireless communication devices

FIG. 25 further illustrates an exemplary process of determiningauthorized and/or unauthorized wireless communication devices.

FIG. 26 further illustrates an exemplary process of determiningauthorized and/or unauthorized wireless communication devices.

FIG. 26A further illustrates an exemplary process of determiningauthorized and/or unauthorized wireless communication devices.

FIG. 27 further illustrates an exemplary process of determiningauthorized and/or unauthorized wireless communication devices.

FIG. 28 further illustrates an exemplary process of determiningauthorized and/or unauthorized wireless communication devices.

FIG. 29 further illustrates an exemplary process of determiningauthorized and/or unauthorized wireless communication devices.

FIG. 30 further illustrates an exemplary process of determiningauthorized and/or unauthorized wireless communication devices.

FIG. 31 illustrates a flow chart of an exemplary processing 3100 inaccordance with the principles of the invention for managing emergencycommunicative actions by a wireless device.

FIG. 32 illustrates an exemplary processing for managing emergencycommunicative actions.

FIG. 33 illustrates a more detailed exemplary processing of thecategorizing devices associated with further criteria.

FIG. 34 illustrates an exemplary processing associated with emergencycommunicative actions.

DETAILED DESCRIPTION OF THE INVENTION

Detection of a transmission facility, such as a mobile phone orhand-held radio transmitter, or other transmission facility as describedherein, within an obstruction rich environment, such as a facility withmany physical barriers to electronic transmission, is difficult toachieve. Referring to FIG. 1, the transmission detection,identification, and reporting system 100 described herein provides amethod of detecting a transmission facility 202, such as depicted inFIG. 2, within an environment rich in obstructions 102. One embodimentof the transmission detection, identification, and reporting system 100may involve the detection of a mobile phone within a heavily walled andmetal-barred government facility such as a correctional facility. Inthis embodiment, the system may utilize an array of antennas 104selectively placed within the facility, collection substations 108 forlocalized collection of detected signals, a central unit 110 for theprocessing of incoming signals from the facility, a display 112 forshowing the location of the detected transmission facility 202, and anaction facility 114 for implementing standard procedures in the event ofa detection. In this embodiment, the communications between the antennas104 and the substations 108, and between the substations 108 and thecentral unit 110, may be wireless to make installation and maintenanceof the system within the facility, cost and time effective. Selectiveplacement of the antennas 104, combined with algorithms and methods fordetermining location of the transmission facility 202, may allow asubstantially improved means for locating transmission facilities 202,such as mobile phones, in an otherwise heavily shielded environment.

In embodiments the antenna 104 may be a multi-dipole embedded antenna.Two examples of dual dipole embedded antennas are provided in FIG. 3 asa first dual-dipole embedded antenna 302 and a second dual dipoleembedded antenna 304. In embodiments the antenna may be adapted toreceive one, two, three, four, or more bandwidths. In embodiments theantenna 104 may be selected as one or more of a dipole antenna 104, aYagi-Uda antenna 104, a loop antenna 104, a quad antenna 104, amicro-strip antenna 104, a quad antenna 104, a helical antenna 104, aphase array antenna 104, a patch antenna or a combination thereof.

In embodiments, the transmission facility 202 may be a mobile phone,such as a flip phone, a slide phone, a cellular phone, a handset, asatellite phone, a 3G phone, a wireless phone, a cordless phone or thelike. In embodiments, the transmission facility 202 may be a radio, suchas a Walkie-Talkie, a mobile radio, a short-wave radio, or the like.

In embodiments, the transmission band from the transmission may bewithin the radio or other electromagnetic frequency spectrum, such asextremely low frequency (ELF), super low frequency (SLF), ultra lowfrequency (ULF), very low frequency (VLF), low frequency (LF), mediumfrequency (MF), high frequency (HF), very high frequency (VHF), ultrahigh frequency (UHF), super high frequency (SHF), extremely highfrequency (EHF), microwave, a frequency suitable for 802.11x wirelesscommunications, ultra wide band (UWB), Bluetooth, or the like.

In embodiments, the obstruction rich environment 102 may be a building,such as a corrections facility, a school, a government facility, astore, a mall, a residence, a hotel, a motel, or the like. Inembodiments, the obstruction rich environments 102 may be a largeconfined space, such as a courtyard, a food court, a recess area, ahallway, greenhouse, recreation room, gymnasium, auditorium, kitchen,cafeteria, craft area, work area, library, prison yard, or the like. Inembodiments, the transmission obstruction 102 materials such ascinderblock, cement, rebar, wire cage, metal, metal coated surface, orthe like. In embodiments, the obstructions in the obstruction richenvironments 102 may be other construction materials, such as wood,glass, rug, flooring materials, roofing materials, and the like.

In embodiments, the transmitting signal information from the antenna 104module to the central unit 110 may be through a communicationsconnection, such as an IEEE 802.15.4 wireless network, IEEE 802.11Wi-Fi, Bluetooth, Ethernet, and/or other similar type wirelesscommunication protocols. In embodiments, the communications connectionmay utilize CAT-5, RJ-45, RS-232 connections, and/or other similar typewired communication protocols and hardware. In embodiments thecommunications connection may utilize an optical connection, such as awireless infrared link, wireless visible light, an optical fiber, andthe like.

In embodiments, the transmitting signal information from the antenna 104module to the central unit 110 may contain data, such as CDMA, CDPD,GSM, TDMA, and the like, and may be used to discriminate which servicesignal is being used, such as Verizon, Cingular, T-Mobile, Sprint, andthe like. The detection of the cell phones may be further resolved downto cell phone manufacturer and cell phone provider.

In embodiments, the transmitting signal information to the central unit110 may be made through an intermediate connection, such as a substation108, router, switch, hub, bridge, multiplexer, modem, network card,network interface, processing unit, preprocessor, computer, repeater,antenna 104, and the like. (see FIG. 2).

In embodiments, the central unit 110 may have in part a computer, acomputer system, a network of computers, a state machine, a sequencer, amicroprocessor, a digital signal processor, an audio processor, apreprocessor, a microprocessor, and the like.

In embodiments, the central unit 110 may process information, such aslocation information, such as the location of people, inmates,corrections personnel, visitors, all personnel within the facility,equipment, resources, weapons, products, incoming goods, outgoing goods,and the like. In embodiments, the information may be a type of signal,such as mobile phone standard protocols such as CDMA, CDPA, GSM, TDMA,and the like. In embodiments, the information may be an eventnotification, such as personnel under duress, an emergency medicalcondition, a call for assistance, a fire, a call for police, a theft,and the like. In embodiments, the processed information may allow forthe tracking of the person or object in possession of the transmissionfacility 202, such as a mobile phone, a radio, a weapon, a product, aresource, and the like. In embodiments, the processed information mayallow for the discrimination and/or association between people orobjects, such as determining the ownership of the transmission facility202, the assignment of the source of transmission, current location of atransmission facility 202 compared to its predicted location, and thelike. In embodiments, the processed information may also have time codesand unique identifiers assigned.

In embodiments, the central unit 110 may have a display 112, such as acathode ray tube (CRT), liquid crystal display (LCD), electronic paper,3D display, head-mounted display, projector, segmented display, computerdisplay, graphic output display, and the like. In embodiments, thecentral unit 110 may have an action facility 114, comprising a userinterface for causing actions relating to the detected transmissionfacility 202. Actions may for example represent operations such asclosing a door, sealing a room, deploying and action signal, initiatingan alarm, and the like.

In embodiments the functions of a central unit 110 as described hereinmay be replaced by an alternate configuration, such as a configurationof multiple computers, such as a group of servers, processors, or thelike, operating in parallel. In embodiments the methods and systemsdescribed herein may involve locating computing capabilities inalternative network configurations, such as in a mesh network or apeer-to-peer network.

In embodiments, the location of a transmission facility 202 may bedetermined by various radiolocation or signal measurement techniques,including measuring phase, amplitude, time, or a combination of these;or by identifying and locating an area associated with an antenna 104with the highest signal strength. In embodiments, the location of atransmission facility 202 may be determined when the transmissionfacility 202 is powered off though detection of a null in the band-passof a transmitted frequency sweep due to the presence of a mobile phoneantenna.

In embodiments, a method of detecting a transmission facility 202 (e.g.cell phone) when the transmission facility 202 is not powered mayrequire a transmitting device and a receiving device that can recognizethe signature of an antenna 104 associated with the transmissionfacility 202. By transmitting a known frequency and receiving thedisturbance pattern produced by having a particular antenna 104 designin the transmission path, the pattern or ‘signature’ of that antenna 104can be characterized. In embodiments, this characterization may beevaluated by central unit 110 with results output to a display 112. Adatabase of these signatures can be placed into the unit, and as thetransmitter sweeps across the various cell frequencies, a patternreceived can be matched against the database patterns to determine thepresence of transmission facilities 202. In embodiments, any class ofantenna (e.g. WI-FI, Blackberry, Walkie-Talkie, etc.) can be classifiedand identified.

In embodiments, the range of a hand held device that can detect aninactive transmission facility is approximately 10 feet. In embodiments,greater distances could be attained for stationary units by increasingthe power.

Radiolocation, also referred to as radio-determination, as used herein,encompasses any process of finding the location of a transmitter bymeans of the propagation properties of waves. The angle, at which asignal is received, as well as the time it takes to propagate, may bothcontribute to the determination of the location of the transmissionfacility 202. There are a variety of methods that may be employed in thedetermination of the location of a transmission facility 202. Methodsinclude (i) a cell-sector system that collects information pertaining tocell and sector ID's, (ii) the assisted-global positioning satellite(GPS) technology utilizing a GPS chipset in a mobile communicationfacility, (iii) standard GPS technology, (iv) enhanced-observed timedifference technology utilizing software residing on a server that usessignal transmission of time differences received by geographicallydispersed radio receivers to pinpoint a user's location, (v) timedifference of arrival, (vi) time of arrival, (vii) angle of arrival,(viii) triangulation of cellular signals, (iix) location based onproximity to known locations (including locations of otherradio-transmitters), (ix) map-based location, or any combination of anyof the foregoing, as well as other location facilities known to those ofskill in the art.

Obstructions to radio wave propagation in the obstruction richenvironments 102 may greatly reduce the effectiveness of many of theconventional radiolocation methods due to obstruction of theline-of-sight between the transmission facilities 202 and the receivingantennas 104. However, by employing a large array of antennas 104,positioned so as to maintain line-of-sight between possible transmissionfacility 202 locations and the receiving antennas 104, several of thesemethods may be effectively used in the location of the transmissionfacility 202. These methods include time difference of arrival, time ofarrival, and angle of arrival, amplitude comparison, and the like. Thetime difference of arrival method determines the difference in the time,or the difference in phase, of the same radio-transmitting signalarriving at different receiving antennas 104. Together with the knownpropagation speed of the radio wave, allows the determination of thelocation of the transmission facility 202. The time of arrival methoddetermines the absolute time of reception of the signal at differentreceiving antennas 104, and again, along with the known propagationspeed of the radio wave, allows the determination of the location of thetransmission facility 202. The angle of arrival method utilizesdirection of transmission to different antennas 104 to determine thelocation of the transmission facility. Amplitude comparison methodcompares the strength of the signal detected at each antenna todetermine the location of a transmission facility 202. For example, twoantennas 104 located in the same room would detect different signalamplitudes for the same transmission facility 202 output, therebyproviding a means of determining which antenna 104 the transmissionfacility 202 is closer to. Increasing the number of antennas 104therefore increases the resolution with which the location of thetransmission facility 202 may be determined. All of these methods, andcombinations of these methods, may employ mathematical processes such astriangulation, trilateration, multi-lateration, or like, in determiningthe location of the transmission facility.

Triangulation is the process of finding coordinates and distance to apoint by calculating the length of one side of a triangle, givenmeasurements of angles and/or sides of the triangle formed by thatpoint, such as the target transmission facility 202, and two other knownreference points, such as the receiving antennas 104. The calculation ofthe location of the transmission facility 202 may then be performedutilizing the law of Sines from trigonometry. Tri-lateration is a methodsimilar to triangulation, but unlike triangulation, which uses anglemeasurements, together with at least one known distance, to calculatethe subject's location, tri-lateration uses the known locations of twoor more reference points and the measured distance to the subject, suchas the transmission facility 202, and each reference point, such as thereceiving antennas 104. Multi-lateration, or hyperbolic positioning, issimilar to tri-lateration, but multi-lateration uses measurements oftime difference of arrival, rather than time of arrival, to estimatelocation using the intersection of hyperboloids.

While several radiolocation and triangulation techniques have beendescribed in connection with locating the transmitting device, it shouldbe understood that one skilled in the art would appreciate that thereare other location methodologies and such location methodologies areencompassed by the present invention. For example, in embodiments, thelocation of a single antenna may be known and the single antenna maydetect a transmitting device. The location of the transmitting devicemay be estimated through its known proximity to the single antennalocation. This may provide adequate location resolution for certainapplications of the technology. Similarly, two or more antennas may beused and each of the antenna locations may be known. When each of theantennas receives a transmission, the corresponding signal strengths maybe compared. The one with the highest signal strength may be determinedas the one closest to the transmitting device so the correspondingantenna location may provide enough location resolution for certainapplications.

In an embodiment of the transmission detection, identification, andreporting system 100, a corrections facility, with its substantial andinherent obstruction rich environment 102, presents a significantchallenge to authorities of the correction facilities. In an embodimentof the invention shown and described herein, the system may be placedthroughout the corrections facility for the purpose of alerting thecorrections staff that cell phone activity is taking place, the locationof the activity and the type, i.e., Nextel, T-Mobile, Verizon, and thelike. The following technology may also allow for a standalone detectionunit 408 or set of detection units 408 (see FIG. 4) to detect cellphones in schools, buildings and other environments in which thefacility's or area's provider does not wish the use of cell phones andis interested in the detection of cell phone use.

In an embodiment, the system may include an integrated antenna 104 andRF detector (together referred to as a detector unit 408) (FIG. 4), asubstation 108, (FIG. 1) whose purpose may be to communicate with eachdetector unit 408 within its sector, and report activity to the centralunit 110 which reports confirmed activity, type of cell phone, andlocation to the display 112 of the central unit 110. These detectionunits 408 may be used individually or in conjunction with each other andmay triangulate detection within a specific area. The outside yard areasmay be monitored by detection units 408, which may cover large areas,such as 25×25 foot sectors or smaller areas, e.g., 5×5 foot sectors, tolocalize the detection of a cell phone (i.e., wireless transmissionfacility) and track its position from one sector to any adjoiningsector. That is, as the person moves with a phone, the changing positionof that phone may be reported. If the phone moves inside the facility,tracking may continue as interior detection units 408 detect the phone.

In an embodiment, within these basic groups of detection units 408 maybe various detection unit 408 types. Some detection units 408 may bedesigned to be hard wired via RJ-45 connectors and/or CAT 5e cable,other detection units 408 may use 802.11b (WI-FI) wirelesscommunications between detection units 408, and there may also be anInfra Red (IR) set of detection units 408 which utilize opticalcommunications techniques. Each communications type may have a specificpurpose within the corrections facility or other type of building and/orareas. Hard-wired units may be used when it is not possible to useeither an optical unit or a WI-FI unit. Used when there are wallsembedded with metal or where the distance and the obstructions 102 maypreclude a wireless technique. WI-FI detection units 408 may be usedwhen it is effective to communicate in an area where there areobstructions 102 such as cement walls or cement with embedded rebarwalls, facades, and the like. Optical detection units 408 may be used inareas where clear, line-of-sight communications may be possible. Opticaldetection units 408 may operate over relatively long distances, (e.g.,3,000 feet), while WI-FI detection units 408 may be limited to shorterdistances, such as 250 feet.

In an embodiment, there may also be a hand-held detection units 408 tobe used once a cell phone has been detected, and the correctionsofficer(s) or monitor are attempting to pinpoint the location. Thishand-held detection unit 408 may be similar to the integratedantenna/detector unit of the main system. This embodiment may alsoinclude a detector, discriminator and decoder module. The hand-helddetection units 408 may detect and identify each cell phone and comparethe cell phone identity to the allowed cell phone user list or in thiscase to a list of unauthorized cell phones. This detector unit 408 mayoutput an audible alarm whose pitch changes as the signal becomesstronger or weaker.

In an embodiment, a second type of hand-held detector unit 408 may beused to detect a cell phone when it is either off or in a standbycondition, also referred to as null detecting. Null detection may beused at an ingress or egress of a building or an area as a way ofdetecting a communication device or device with an antenna. Thistechnique may be used in areas where it is unpractical, unwanted orunwarranted to have x-ray machines or more intrusive detection systems.A null detection system may also be deployed in a handheld device so aninspector can move through an area attempting to detect a communicationdevice. In embodiments, the null detection system may detect thepresence of a transmission facility even when the transmission facilityis not transmitting a signal. In embodiments, a hand held or mountednull detection device may be used in a correctional institution or othergovernment facility.

In embodiments, null detection may utilize a transmission-detectionsource, independent of the transmission source being detected, which iscapable of sweeping across the frequency spectrum of interest andreceiving its returning signal. The transmission source sweeps thespectrum of interest, searching for distortions in the returned field.Distortions in the spectrum may be due to the presence of an antenna ofa transmission facility 202. Matching the distortion, also referred toas a null in the band pass, to characteristics of known antennas usedwith mobile phones may allow the detection and/or identification of thetransmission facility 202. The unit may output an audible “beep” if itdetects a null, allowing the officers to focus in on the location of thecell phone. The range of the hand-held detection units 408 may be, forexample, 15 to 20 feet. This will allow cell phones that are in theimmediate vicinity to be quickly detected. The null detection may beapplicable for ingress and/or egress detection.

In an embodiment, a survey may be performed to determine optimalplacement and the type and number of detection units 408 required. Thiswill insure the minimum number of required detection units 408 toperform optimal detection. The team may provide a report detailing thelayout determined to be optimized for the facility and may review thisreport with the facilities staff so that any required modifications tothe plan may be incorporated before installation is begun.

In an embodiment, the initial coverage of a facility may be in the cellblocks 402 (FIG. 4) and/or pod areas. The same may be true for linearfacilities. The survey may cover the entire facility, including openareas, such as courtyards, where required. Inmate also work in largeyard and plantations such as Angola State Prison, it is anticipated thistechnology may be deployed over a large outside area.

In an embodiment, the cell block detection units 408 may be mountedinside each chase 404 (a column positioned between cells in a cell blockthat includes various utility facilities, such as for plumbing andelectricity), as shown in FIG. 4, and may communicate to a substation108 (not shown in FIG. 4) located at one end of the block. Thisdetection unit 408 may communicate its information to the central unit110 so that tracking, confirmation, and display may be accomplished. Forlinear facilities 500, as shown in FIG. 5, detector units 408 may bemounted along the walls in the obstruction rich environment 102 oppositethe cells 402 and perform their function similar to the detection units408 mounted within a chase 404.

In an embodiment, detector units 408 may be installed in open areas suchas gymnasiums, kitchens, cafeterias, craft and work areas and other openareas where a cell phone may be used. The difference in these locationsfrom the cell blocks 402 may include the method of detection andtracking. Since most facilities may only require the identification of acell phones presence within a room, and there could be many inmateswithin that room, the process may be to lock-down the room, or rooms, inthat area and use a hand held device and a physical search to pinpointthe phone location. A generalized block diagram of a detector unit 408is shown in FIG. 6. For those facilities that require resolving thelocation within a large interior room or area, the use of triangulationto resolve to a 10×10 foot area may be used.

In an embodiment, facilities with the requirement to detect cell phones202 in outside yard areas, the use of triangulation to a 25×25 footspace or smaller foot space (e.g., 5×5 foot) may be constructed. As aphone 202 is moved from area coverage 702 to area coverage 702, thesystem may track its movement. Each square foot sector may overlap anadjoining sector. In this way, as shown in FIG. 7, tracking may becontinuous, without any gaps.

In an embodiment, it may also be important to know whether a phone islocated on one side of an obstruction or the other, such as doors,walls, and the like. If the wrong room is identified, it may make itmore difficult to locate a phone and its user. As shown in FIG. 8,detection of the correct room may depend upon the level of the signalreceived. Proper placement of the detector units 408 may insure that thephone may be identified in the correct location.

In an embodiment, when sectoring a large room such as a gymnasium, thenumber and placement of antennas 104 may be critical. In order to sectorlarge regions, such as a 10×10 foot section, within the room, theantenna 104 may need to be capable of narrowing their window to an areasmall enough to meet the requirement. In FIG. 9, there is shown anomni-directional antenna 104, which detects signal presence generally ina 360 degree direction. Once a signal crosses a threshold, the directionfinding antennas 104 may be turned on to determine the position of thesignal. This may be reported to the display 112 and tracked until it iseither turned off or moves to another room or hallway. Then, normalpositional tracking may take place.

In an embodiment, the transmission detection, identification, andreporting system 100 may work in conjunction with a personal alarmsystem, or an inmate tracking system, or a combination of all three andthe like. This dual/tri role system(s) may allow for more cost effectiveuse of the detection units 408 and provide for greater protection forthe correctional officer and inmate alike. This detection system mayutilize an individualized frequency, with known frequency separationbetween detection units 408 and between corrections officer'sfrequencies and Inmate frequencies. The detection configuration of thedetection units 408 may provide complete coverage of the facility. Eachtransmission facility unit may be continually tracked throughout thefacility. At all ingress or egress points the focus of the detection mayensure accurate location of all correctional and inmate personnel. Withthe combined systems more detection units 408 may be needed to ensurefull coverage. In an embodiment, the known identity of the transmissionfacility, in this case a cell phone being carried and/or used by anofficer or inmate can be accurately associated with another knownidentity of another transmission facility, in this case a correctionsofficer and/or inmate wearing a transmission facility. In thisembodiment, the use of an authorized cell phone or an authorizedtransmission facility by an unauthorized person can be accuratelydetected and reported. This embodiment can be utilized inside thefacility or outside the facility.

In an embodiment, the transmission detection, identification, andreporting system 100 may allow for cell phone owner discrimination. Thesystem may provide for the allowance of authorized cell phones withinthe prohibited area. The system may detect and identify each cell phoneand compare the cell phone identity to the allowed cell phone user list.The system may record all phone use and may automatically alert thefacility of all prohibited cell phone use. In addition, each cell phonedetection event may be identified with a unique identifier and timecode, to ensure proper identification. The CCTV system may also beintegrated to ensure greater accuracy identifying illegal use ofwireless transmission devices.

The cell scan-1 detection system 1000, shown in FIG. 10, is anembodiment of a system for detecting signals of a transmission facility.Antenna 104 receives transmission signals from wireless transmissiondevice (not shown). Antenna 104 may operate, for example in the range of2.4 GHz with a bandwidth of 465 MHz. The received signals are thenprovided to a low pass filter and a log amplifier, wherein the level ofamplification is based on the input level of the input signal. Theamplified signal is next provided to a shaping filter and an operationalamplifier. The amplified signals are provided to an analog-to-digital(ADC) converter and provided to a Field Programmable Gate Array (FPGA).Information from the FPGA may be provided to a microprocessor tosupplement the processing and control imposed by the FPGA. The FPGA mayreceive information from dedicated frequency bands (e.g., 9000 MHz) orfrom known wireless protocols (e.g., 802.15.4). The microprocessor maythen determine whether a detected transmission facility, for example, isa person with a transmission facility (e.g., wristband, a cell phone)and may allow or prevent that person from accessing an area. Themicroprocessor may also alert the central unit of the persons enteringor desire to enter a restricted area. In another embodiment, if thetransmission facility, for example, is a cell phone and the cell phonewas in use within a restricted area, the cell phone would be identifiedby the central unit as being in a restricted area, then the system willdetermine whether the cell phone is authorized or not authorized, thenthe system would decide, based upon set rules whether to allow ordisallow the transmission unit within the restricted area.

The cell scan-1 detection system 1000, shown in FIG. 10, is anembodiment of a system for detecting signals of a transmission facility.An antenna 104 receives wireless transmission facilities in a 2.4 GHzband, with a 465 MHz antenna. In other aspects, the detection system maydetect signals in other frequency bands,—for example, 933 MHz, 433 Mhz,2.4 GHz and other known frequencies. The detected signals are providedto High and Low band RF filter. The RF filters (band pass filter)isolate sets of frequencies for greater sensitivity. For example, thereceived signals may be provided to a low band RF filter to isolate lowband RF signals and high band RF filters to isolate high band RFsignals. The isolated RF signals are provided to Log Amplifiers thatamplify or boost the signals using known amplification methods. Theswitch between two Wi-Fi frequencies switches all three wireless signalinputs into a log amp circuit and then to a smoothing filter to clean upthe signal to be analyzed. The signals are then provided to anOperational Amplifier (Op Amp) which amplifies the received analogsignal. The amplified RF signal is then processed through an A/Dconverter which changes the signal into a digital signal. The signal isthen processed in a processing unit (in this case a dedicated FieldProgrammable Gate Array (FPGA)) and the results are then transmitted viaa dedicated 2.4 GHz transceiver unit. The 2.4 GHz transceiver unit hasseveral other applications, and is used to transmit and receivecommunication information and to connect to external Wi-Fi communicationdevices. An example of this is an education system for inmates, medicalmonitoring equipment in a hospital application, an interactive ID forsafe school applications. The 900 MHz transceiver unit is for synch-ingthe sensors. The 465 MHz transceiver unit is for communication withinmates bracelets and Staff (personal alarm system) as is furtherdiscussed in the aforementioned related patent applications. The lowerfrequency of the 465 MHz unit also provides better wall penetration andalternative wireless communication device with better wall penetration.In another embodiment, the front end of the signal detection circuit anamplifier (e.g., 0-40 db) gain is added before the RF filter (forexample a 824-849 MHz RF filter) to provide for greater sensitivity. Inaddition, a mixer and Voltage Controlled Oscillator (VCO) (not shown) isadded after the RF filter. The output of the mixer is an IF(intermediate) frequency that is amplified and then provided to a bandpass filter (e.g., a 200 MHz filter with a bandwidth of 4 MHZ). Thesignal is then amplified and then provided to the Log Amp then to an OpAmp and then to the ADC (A/D). Depending on the noise floor (which isdetermined by proper grounding), one with an understanding of RFcircuitry would know to have proper impedance matching betweencomponents, and will utilize transformer(s) where appropriate. The IFsection's general parameters are 70 MHz to 350 MHz and sensitivity isrelated to frequency and the width of the band pass filter. As would beappreciated, the tighter the width of the band pass, the greater thesensitivity. In another embodiment, the VCO/mixer may be fixed and theIF band pass filter may be the bandwidth of a desired frequencyproviding for faster detection without the need to scan. Additionally,the greater the dynamic range of the sensor system the greater accuracyand resolution in determining the exact location of the transmissionfacility.

In an embodiment as shown in FIG. 10, the processing section may beplaced on a separate board, this provides for multiple sensors frontends utilizing one back end processing unit. This provides for more costeffective sensors and versatility of assets. This also allows forspecific functionality such as antenna array directional location andangle tri-angulation being synchronized to at least one processing unit.It is also anticipated the more expensive processing component be sharedsuch as transmission signal decoding, data analysis, communications andthe like.

The cell scan-2 detection system 1100, shown in FIG. 11, shows analternate embodiment of a system for detecting a signal of atransmission facility. The RF filters (i.e., band pass filter) isolatesets of frequencies for greater sensitivity, in this example a low bandcell phone signals and high band cell phone signals. The operation ofthe elements in FIG. 11 is similar to that of FIG. 10 and need not bediscussed in detail herein.

The main board system 1200, shown in FIG. 12, is an embodiment of a maincircuit board within a system for detecting transmission facilities. Thesystem may be used to determine each signal received is an actual cellphone signal and not a spurious output. Thus, a test may need to beperformed that checks for the ‘persistence’ of the received signal. Apersistence test may run a timer 1202 for a minimum required time thatmay be nearly as long as the time of the shortest signal type expected.If the signal is present at the end of the timeout period, it is lesslikely to be a spurious response and more likely that it is a cell phoneoutput. For example, if a GSM signal of 500 microseconds long is theshortest duration signal of all the cell phone protocols received, thepersistence test may run for 450 microseconds to further ensure that thereceived signal is not merely a spurious response.

The sub-station system 1300, shown in FIG. 13, is an embodiment of asub-station in a system for detecting transmission facilities

FIG. 14 illustrates an embodiment of a null detector (1400), wherein theVCO in FIG. 14 tunes to known antenna frequencies and the system detectsa null in the known antenna frequencies in which the antenna isdetected. In embodiments, the null detection system may detect thepresence of a transmission facility even when the transmission facilityis not transmitting a signal. In embodiments, a hand held or mountednull detection device may be used in a correctional institution or othergovernment facility. In embodiments, null detection may utilize atransmission-detection source, independent of the transmission sourcebeing detected, which is capable of sweeping across the frequencyspectrum of interest and receiving its returning signal. Thetransmission source sweeps the spectrum of interest, searching fordistortions in the returned field. Distortions in the spectrum may bedue to the presence of an antenna of a transmission facility 202.

In embodiments of the system described herein, detection levels may bedetermined by which output levels are possible with the various cellphone technologies that are in use today. Since the system described isan amplitude system, the strongest and weakest possible signals must bedetermined in order to identify the system's required dynamic range.Cell phone signals vary from −22 dBW to 6 DBW and this range defines thedetection requirements of the system. This translates to a maximumsignal of 4.0 Watts at the antenna. The minimum value is equal to 0.006Watts or 6 milliwatts. Therefore, the dynamic range required is −52 dBmto +36 dBm. In order to achieve such a dynamic range, an amplifier thatis gain adjustable is required such that with an input value of +36 dBm,the amplifier is not saturated.

In the embodiment, the system determines the characteristics required toensure that each cell phone is correctly identified. The amplitude ofeach signal is determined which allows the system to determine whichsensor (i.e., transmission detection facility, antenna) has received thelargest signal. The system time stamps each data sample so that othersensors receiving the same signal will be recognized as such when thedata is presented for analysis. Each sensor analyzes the wave shape ofthe signal detected. Each transmission type (i.e., CDMA2000, PCS, TDMA,GSM, IS-95, etc.) has a unique wave shape. These wave shapes allow theanalysis software to recognize that signals seen in different parts of afacility can be associated with each other (using time and wave shape)and the signal that consistently contains the largest amplitude will beidentified as closest to the cell phone transmission

In embodiments of the invention, signals directed toward an IED(improvised explosive device) may be intercepted, identified and deniedservice. Such interception may be up to a known range in forward andside quadrants. The identification and determination of the position ofthe person or persons using a satellite phone and/or land-based cellphone may be determined. Cell phones, as well as other RF devices, e.g.,garage door openers, walkie-talkie, etc., may be captured, identifiedand/or jammed that are attempting to activate or contact the IED.

In embodiments of the invention, when a cell phone, for example, is on,but not in an active communication, the cell phone is essentiallyinvisible to anyone attempting to monitor cell phone activity. In orderto be aware of the existence of such “on but not transmitting devices”the system described herein operates as a cell tower. That is, thesystem actively addresses the problem of cell phone detection byoperating (becoming) the tower. A vehicle with similar but modifiedequipment to that of a cell tower may actively poll the area of phonesthat are “on but not in a communication of any sort.” The vehicle (i.e.,Pseudo Tower) collects the current database of active phones and thosephones in standby from the tower(s) in the area and uses this data baseto poll these phones in order to locate them. Once potential phones thatcould be possible detonation cell phones are identified and located, thePseudo Tower would affect a handoff and make itself the active tower.Thus, the captured cell phones are not allowed to rotate back to (i.e.,connect to) the local cell phone tower, insuring that any callsattempting to communicate with the detonation cell phone will not besent. As one of the goals is to identify the person who is attempting tocontact the detonation cell phone, a call history of each suspect cellphone may be analyzed.

When a caller attempts to activate an IED, the caller's presence can beidentified. Furthermore, the call being made is not forwarded to thedetonation cell phone and the IED will not be activated. By determininga peak angle (triangulation) the caller's cell phone/satellite phonesignal, the direction of the caller is then known. Directionidentification is performed by using a technique such an interferometry.In this case, multiple antennas employing interferometry may be used toscan through the current cell phone traffic identifying first, candidatethreats and then, pinpointing high probability locations which can beviewed through a high powered binoculars to determine whether thecandidate is in need of investigation. Criteria for determining whichcell locations may be threats is a pole or road sign, etc. The PseudoTower may continue controlling all of the phones in the area, preventingany forwarding of calls until all possible threats have been cleared. Atthis point, the personnel have the option of going after the caller ordeactivating the IED, or both. It would be possible to clear the areaand detonate the device later if that is a desired plan of action.

Given the varying parameters by which detonation can take place, thePseudo Tower may also be designed to deny service to any active andinactive phone within a given geographical area and pinpoint thelocation of said phones.

Satellite cell phone transmission presents a somewhat different problem.Since the transmission from phone to satellite to phone is communicatedto a number of satellites, becoming a replacement for the satellite willrequire cooperation from the provider. Via one or more specific codes,the satellites may be told that the vehicle mounted satellite simulator(i.e., Pseudo Tower) will be taking over the control of phones within acertain radius. Since this is a moving or ever changing circle, thereplacement “satellite” will have to continuously update the actualsatellite of its position and which phones are being released and whichphones are being controlled. Once this function has been implemented,the control of the suspect phones is similar to that of the cell phone.Determining the caller's position and the location of the detonationphone is as above.

FIG. 15 illustrates an embodiment of a Cell Phone Detection, Control andPosition Identification system (1500) in accordance with the principlesof the invention which comprises cell phone jammer (1501) system thatcovers at least one of the known frequency ranges assigned to cell phoneor mobile communication devices, a Power Unit (1502) that provides thenecessary power to run all the units within the Cell Phone Detection,Control and Position Identification system 1500, Satellite Cell PhoneInterface 1503 that operates as an interface and communications unitbetween the Cell Phone Detection, Control and Position Identificationsystem 1500 and a satellite cell phone provider (not shown), a CellPhone Ground Interface unit 1504, which includes base station technologyfor all communication devices operating within an area of interest. Alsoshown is an optional 300-350 MHz Jammer unit (1505) that operates to jamcommunication devices that communicate through an intermediary device,such as door openers, Walkie-Talkies and the like. It is anticipatedthat the system described herein to be modular and expandable to coverthe entire frequency spectrum in which transmission facilities (cellphones, mobile communications devices) operate. The Computer CommandI/O, User Display and Interface 1506, comprises a communication, commandand control system (C³) that manages communication, command and controlof the detection system 1500. Unit 1506 may further comprise one or moredatabases, and/or processes to execute the processing described, herein.Although not shown it would be appreciated that Command I/O unit 1506may be in communication, via a public or private network, to one or moredevices to provide information to or obtain information from remotesites (not shown).

FIG. 16 Illustrates a block diagram of an embodiment of a Cell Phone andWireless Transmission Detection Facility in accordance with theprinciples of the invention. In the illustrated embodiment 1600, antenna1602 is a multi-band directional array that operates to detect signalsin a low band and in a high band (835 and 1.85 GHz range, respectively),a two way radio band (465 MHz), a Wi-Fi, a Bluetooth band (2.5 GHz) andPAL (Personal Alarm Locator) band (950 MHz). In the illustratedembodiment, the antenna connects to two components, first to a detector(1603) and also to a decoder (1604). The detector 1603 and decoder 1604decodes the PAL Identification signal and may further decode biometricinformation, emergency information. In other embodiments, detector 1603and decoder 1604 are configured to decode cell phone identifications.Antenna 1602 provides detected signals to a 6 way input switch (1605).The output of switch 1605 is connected to a wideband RF amplifier(1606). Wideband RF amplifier 1606 represents a variable gain amplifierthat adjusts the detected signal amplitude based on the band in which adetected signal is detected by antenna 1602. In another aspect of theinvention switch 1606 may be connected to a block gain amplifier (notshown) to provide amplification of the detected signal and the amplifieddetected signal may then be provided to a corresponding RF filter basedon the frequency band of the detected frequency.

The wideband RF amplifier 1606 is connected to a Logarithmic amplifier1607 (i.e., log amp) that amplifies the received or detected signalusing an logarithmic function. Log amplifiers are well-known in the artto provide a larger amplification of a weak signal and a smalleramplification of a strong signal. The output of Log amplifier 1607 isprovided to an Operational amplifier (OpAmp) 1608. The OpAmp 1608amplifies the input signal and provides the amplified input signal to anA/D converter 1609 for conversion of the input analog signal to adigital signal. The converted (i.e., digital) signal is then provided toa FPGA (Field Programmable Gate Array) 1610 for subsequent processing.FPGA 1610 controls the operation of the illustrated Cell Phone andWireless Transmission Detection Facility 1600 through feedback signalsto switch 1605, for example. FPGA 1610 controls which signal frequencyband and signal frequency is evaluated in what sequence. In theillustrated embodiment, FPGA 1610 communicates with the other sensorsand/or access points via a communication interface 1612. In one aspectof the invention, communication interface 1612 may communicate with oneor more wireless communication devices that operate using well-knownIEEE wireless standard communication protocols (e.g., 802.15 and 802.11). In another embodiment, the communication interface may operate as atransceiver (transmitter/receiver) that may interface with two-waywireless transmission devices such as Walkie-Talkie or cellulartelephone phones. The FPGA 1610 also interfaces with a microprocessor1613, e.g., a Zilog Z86, an Intel xx86 series, Motorola Power PC.Processor 1613 may assist in the decoding, and operation of the CellPhone and Wireless Transmission Detection Facility 1600. FPGA 1610 andthe microprocessor 1613 may be synchronized by a crystal clock 1614. Inother embodiments of the invention, the communications may be via acategory 5 network interface connection in conjunction to thecommunication Interface 1612. Although an FPGA is referred to andillustrated in the embodiment of the invention, it would be recognizedby those skilled in the art that the processing described by the FPGAmay also be performed in other specific processors (e.g., ASIC) or ingeneral purpose processor which when loaded with and executing anapplicable software module converts the general purpose processor into aspecial purpose processor. As would be recognized, the system shown inFIG. 16 is similar to those shown in FIGS. 10 and 11.

Returning to the embodiment of the Cell Phone Detection, Control, andPosition Identification system shown in FIG. 15, control of a wirelesscommunication device (i.e., transmission facility 202) may utilizejammers, base station technology, Wi-Fi, and 3rd party base stationtechnology, to acquire, control, obtain location and/or to stimulate awireless communication device, which may be, in an active,non-transmitting, state or in a standby state.

The embodiment shown in FIG. 15 utilizes a high level of signaldetection sensitivity to detect the presence of a wireless communicationdevice (transmission facility) within a known distance from thetransmission detection facility. As power is a critical component whendealing with wireless transmission devices, the communication protocoltypically, by design, causes communication with the largest availablesignal source. Typically, this is the closest source (i.e., basestation).

In accordance with one embodiment of the invention, the jammer units1501 may jam or interfere with one or more frequencies or frequencybands to force wireless communication device within a local area to losecontact with an available base station and/or access point and toreacquire a connection to a local base station cell tower and/or accesspoint. When the transmission facility (wireless communication device)initiates a process (referred to as hand-shake) to re-acquire acommunication link with the available local base station cell tower, thecommunication link is diverted to, and re-acquired by, the detectionsystem 1500 (which is referred to as a pseudo-base station) due to thegreater signal power of the pseudo-base station. In another aspect ofthe invention, the pseudo-base station power is raised so as to begreater than an actual cell tower signal strength. Thus, the cell phone,for example, will transition to the larger signal strength of thepseudo-base station and establish a communication with the pseudo basestation. In a further aspect of the invention, the pseudo-base stationmay actively poll the area for cell phone (transmission facilities), andtrigger the cell phones within an area of interest to cause the cellphones within the area to attach to the pseudo-base station.

In one aspect of the invention, where the application is to control thetransmission facility within a local area, and to prevent communicationsfrom reaching the transmission facility of interest, the pseudo-basestation may deny transmission of signals from the transmission facilityto an actual base station or deny transmission of signals from the basestation to the transmission facility.

In an embodiment of the invention where it is important to identify andnot control the transmission facility within an area of interestproviding greater power, polling, control line request, interleavingexisting towers and/or jamming to force the transmission facility tocommunicate its identification parameters. In this embodiment of theinvention, gaining control of the cell phone (or wireless communicationdevice or transmission facility) within the area of interest allows thesystem to prevent incoming and/or outgoing communications. Thus, as thewireless communication device is re-acquiring a communication link withthe access point or base station, the wireless communication deviceprovides its identification information that positively identifies eachtransmission facility within the area of interest. This identificationinformation may be provided to the actual cell tower provider, whichuses this information to individually disable the cell phone(transmission facility) from receiving or transmitting data, voiceand/or communicating in any manner.

In an embodiment, the detection system 1000 (see FIG. 10) issynchronized with an access point, and/or base station technology. Thissynchronization allows the tracking and positive identification of eachtransmission facility within an area of interest. In this example, thetransmission facility of interest (a triggering device) may be connectedto or trying to communicate with another transmission facility, such asa cell phone or a land line phone.

In an embodiment, of the Cell Phone Detection, Control, and PositionIdentification System shown in FIG. 15, determines the identification ofan incoming caller based on information contained in the transmissionsignal and does not allow connection to the wireless network whiledetermining the location of the caller by triangulating the caller froma plurality of detected signals and tracks the caller thereafter. Inthis embodiment of the invention, the system shown in FIG. 15 disablesthe wireless device from receiving or transmitting signals from/to thewireless network and tracks the caller using the wireless device. TheCell Phone Detection, Control, and Position Identification Systemdescribed in FIG. 15 also has the capacity to track wirelesstransmission facilities from great distances, and in this application,the system is mobile, therefore, tracking the caller. In one aspect ofthe invention, where the cell phone or transmission facility informationis known, as determined through its communication with a pseudo-basestation, for example, additional information can be gathered, requestedand/or extracted from the cell phone or transmission facility.Information such as other transmission devices, cell phones, etc., thathave been contacted or which have data transferred may be gathered,requested and/or extracted.

In an embodiment where information redundancy and positive authorizationis important and positive identification is critical, the tools used inthe school bus safety application egress point and school trackingsystem have direct applicability to positive identification of personneland prison system automation, cost effectively tracking and monitoringlower threat classified inmates and staff and inmate safety. Safetyapplication and tracking systems are more fully disclosed in theaforementioned related patent applications, whose contents areincorporated by reference herein. The tools and application describedmay include facial recognition, retina scan technology, card swipe,fingerprint analysis, in preventing escapes and misidentification withina prison environment.

In an embodiment where positive identification of the transmissionfacility 202 and positive identification of the user of the transmissionfacility 202 is important, as discussed earlier hand-held detectionunits 408 detector decoding module (and or chipset) or a hand-helddetection units 408 in sync with the pseudo-base station/wireless accesspoint module provides the location and the identification of thetransmission facility 202 or in this case, for example a cell phone or a802.xx (e.g., 802.11a/b/g/n, 802.15) communication device. Incorrections facilities, outside areas of the facility, for example alarge area like Angola state prison, a close-circuit television (CCTV)in synchronization with, or in communication, with the hand-helddetection units 408 allows the CCTV to focus on the user of the cellphone. The CCTV system feeds images to the facial recognition softwareand a database of all known personal and/or inmates, to find a matchand/or create an entry of new found cell phone and their owner's and oruser's identity. In the case of a prison application, building adatabase of know criminals their associate and biometric information,including facial recognition, for data mining purposes is critical Anexample, where inmates are passing contraband and using cell phone tocoordinate their efforts, where positive identification of thetransmission facility 202 and positive identification of the user of thetransmission facility 202 is important, utilizing cell phoneidentification, location tracking and positive identify of the criminalsinvolved is crucial to preventing and stopping their criminalenterprise.

In another embodiment and application where positive identification ofthe transmission facility 202 and positive identification of the user ofthe transmission facility 202 is important, as discussed earlier thehand-held detection units 408 detector decoding module (and or chipset)or a hand-held detection units 408 in sync with the Pseudo-basestation/wireless access point module provides the location. In schoolsafety where a student's location and a perpetrator who preys on schoolstudents, the tagging of visitors, student and employees is critical. Inthis application, CCTV and facial recognition, for data mining purposesof student, facility visitors (wanted or unwanted) is critical. Theembodiment includes an allowance unit which determines who is allowedwithin the facility and/or area and who is suspect and who is a knowndanger. Tracking all transmission facilities and making positiveidentification of all communications. Utilizing CORI and SORI databasesof known perpetrator of students to detect when a threat is near aroundor in a school facility is critical to school safety.

In embodiments, a method of detecting, identifying and tracking themovements of a specific transmission facility 202 in standby requiresprovoking and/or requiring the transmission facility to transmit asignal and to detect their unique identification. As discussed andexplained previously, a hand-held detection units 408 with an integratedidentification detector/decoding module (and or identification chipsetmodule) and/or a hand-held detection units 408 which functions inconjunction base station and/or wireless access point technology,blocking and/or jamming technique in concert of the identificationfunction provides the tools to detect the transmission facility, trackits location, and to detect its unique identification.

In the embodiment of FIG. 15, an interface with existing communicationdevices, such as a wireless cell phone provider or Wi-Fi accessprovider, may be provided. The interface which will allow and/or denycontrol is executed by the wireless provider. According, the embodimentsshown may also include an interface to the third party controlling unit.For example, the system shown in FIG. 15 may include a system interfacewith the commercial satellite cell phone provider and control of thecell phones passed between the carrier and the transmission detection,identification, control and reporting system.

In the embodiment of FIG. 15 the detector units (not shown) may includean antenna and a controlling unit, where matching the transmissionfacilities 202 with its unique identifier is critical for properidentification, tracking and control in this configuration, the detectorunits may individually control or may direct control over thetransmission facilities 202.

FIG. 17 illustrates an embodiment, where it is the intention to run anautomated prison to lower the necessary number of personnel and stillrun a safe and secure facility. This automated facility is controlled bya centralized command and control center and/or a decentralizecompartmental command and control center for all functions of thefacility including movement of the persons within the facility. In thistype of a facility, where complete and accurate identification andlocation of all personnel is critical, the tracking of individuals,their wireless transmission devices, cell phones, identification units,Walkie-Talkies, and verifying their access to authorized areas,integrating their movement with CCTV and positive facial identification,biometric identification, preventing movement into unauthorized area,developing inclusion zones, creating exclusion zones, ensuring propercount, providing an ability to restrict and/or authorize movement, aspecific design of the facility and convergence of technology isessential. The technologies discussed herein integrated to the centralcontrol provide the backbone and framework to operate such an automatedfacility, wherein each staff member and inmate transmission facilitywill allow specific movement throughout the facility. All movementthroughout the facility may be monitored through CCTV and facialrecognition. At each egress point, movement will be restricted toindividual movement through one area to another area of the facility.For example, daily functions include meals, medical, programs, courtvisits, and recreation may be functions that may be monitored andcontrolled. As an example of the facility of the needs within theautomation and the parameters and rules, may be established. Forexample, Inmate Movement: need a creation of a Movement list andmovement schedule, scheduling resources, allocation seating inparticular program area classrooms, access to computers, access to theLaw library, time allocation in program and use facility assets, Enemyexclusion, (predator sheep wolf exclusion) conflicts in scheduling GED,adult education, culinary arts; and anger management developing Waitinglist, ability for inmates to signup, Morning schedule and movement,afternoon schedule and movement, Pre-trail and religious servicesscheduling. Data mining database techniques and methodologies may beexecuted to provide for inmate scheduling movement and allocation ofassets for the inmate relying on transmission facility authorization.The transmission facility will control access to all movement, assetresources, doors and egress, facility resources and the time allocationon facility assets and in which movement takes place. Because of minimumhuman interaction, display kiosks display schedules and inform theinmate where it is scheduled.

In this embodiment, where there is limited corrections personnel, allcells will be designed to allow outdoor access and unit access. Thefacility structure may need to be modified to allow inmate access to theoutdoor area, this design modification eliminates the need for outsidemovement and still provides greater freedom for the inmates with lessneed for direct supervision.

In this embodiment, for medical reasons all inmates will wear twotransmission detection sensors. Each sensor will monitor biometric signsincluding heart rate, temperature, and the like. With two wristbandsecho cardiogram can be generated with provide for health monitoring andfor positive identification. The Cell Phone Detection, Control andPosition Identification system 1500 (FIG. 15) will include a detectorand decoder for all transmission facilities, which will provide positiveidentification for all transmission facilities, including cell phone andother hand held communication devices, and the specific individual inposition of the transmission facility. All CCTV units will integratewith facial recognition software, all egress points will requirebiometric checks, such as fingerprint and renal eye scan devices, andthis combined with the transmission facility positive identification.The design of the facility is important to provide adequate exercisemovement and limited interaction with staff and other inmates.Therefore, a redesign of the facility, to provide services such asdecentralized education is important.

In this embodiment, the wireless communication of the sensors will alsocarry education information and data to each of the inmate cells. Asearlier described, the ideal location of sensors may be in water-chasesto prevent tampering. This also provides the opportunity to havewireless communication with education units within the cells. Thiswireless communication also provides the ability to as wirelesssurveillance devices such as cell monitoring into the mix.

In this embodiment where inmate programs, services, commissary, inmatephones, medicine distribution, vending machines, GED education, needs tobe inmate specific, positive identification is a critical must. Toensure this outcome, the positive identification of each transmissionfacility is paramount. An example of this embodiment, when an inmateapproaches an education display system, the unique identifier of theinmate's transmission facility provides information to the transmissionfacility detector of the unique identifier of the transmission facility.A database controls and provides all the applicable information toprovide the correct information for each transmission facility. In thiscase, the transmission facility is a wristband ID bracelet.

In an embodiment, the transmission facility is a cell phone, PDA or aWi-Fi appliance, the education display system is a interactive displayscreen in a school telling the school supervisors that one or morestudents or personnel needs to turn off his cell phone, or a hospitaladvising a specific visitor by name, that cell phone even in standby maycause harm the medical devices being used to treat patients or thetransmission facility provides information to the transmission facilitydetector of a unique identifier of the transmission facility via aninteractive screen on the road side to tell a user to slow down as he isspeeding. These are just examples of uses of the system illustrated. Inaddition, the system illustrated may be connected to any data miningdatabase (not shown) to provide customized information to anytransmission facility and specific information to a uniquely identifiedtransmission facility.

In an embodiment where the classification of inmates is such where manyinmates can co-exist in an inside and outside (minimum security,non-violent, criminals and the like) the use of CCTV, facial recognitionand laser microphone, and inmate tracking and a database driven set ofrules and parameters, coupled with the combined technologies mentionedin this application. This provides the solutions to reduce the number ofemployees while maintaining a high level of safety and security.

In an embodiment of FIG. 15 the detector units (not shown) may includean antennas 104 and a controlling unit, that are externally integratedwith the transmission detection, controlling, identification, andreporting system 1500, where matching the transmission facilities 202with its unique identifier is critical for proper identification,tracking and location matching of the transmission facility 202 uniqueidentifier with the proper transmission facility 202 may be accomplishedthrough the time of signal arrival, phone type, transmission frequency,time division separation, time sync, channel frequency, cell toweridentifier, (cell phone) transmission facility identifier or acombination of one or more methodologies depending on complexity andtransmission facility 202 environment and the like.

In the embodiment of FIG. 15 in a situation where there is a largenumber of transmission facilities 202 (in this example, cell phones) ona congested highway being able to find all the transmission facility(s)and their accurate location is critical. In addition, being able tocontinuously track and positively identify each transmission is alsocritical wherein controlling a significant number of transmissionfacilities (cell phones) may be necessary. Therefore, specifictechniques need to be developed to regulate the frequency band thewireless devices occupy, when and in what order they are processed, therate and the density and rate in which they are monitored. Techniquesdiscussed earlier describe how to have a cell phone provide theiridentification. Here we will discuss some of the techniques to regulatethe detection, frequency, volume and period of those transmissions.

Knowing the frequency and time of the transmission facility 202transmissions provides the ability to tighten the bandwidth of thedetection sensors, which increases sensitivity, and thus providesgreater distance of detection. It also provides an intercept, in timeand frequency providing for faster processing of signals. One techniqueis for the transmission detection sensor to tell the base station and/orenabling technology when to transmit and also indicate the desiredresponse frequency and/or channel. Another methodology is to regulateand/or schedule the transmission time of the base station(s) and/orenabling technologies within geographical areas and set parameter on thedirection, radiation pattern, zone, and strength of the signal beingtransmitted to regulate a number of transmission facility(s) contactedand/or regulating the number of responding transmission facilities.

In an embodiment, in a corrections complex, such as Angola State Prison,or a arbitrarily defined area where transmission facilities 202 areprohibited except for authorized transmission devices, the transmissiondetection, controlling, identification, and reporting system 100 whetherinternal or external to the facility may control, identify and prohibittransmissions from transmission facility 202 depending on the locationor approximate location of the transmission facility 202. There are avariety of methods that may be employed in the determination of thelocation of a transmission facility 202. Methods include (i) acell-sector system that collects information pertaining to cell andsector ID's, (ii) the assisted-global positioning satellite (GPS)technology utilizing a GPS chipset in a mobile communication facility,(iii) standard GPS technology, (iv) enhanced-observed time differencetechnology utilizing software residing on a server that uses signaltransmission of time differences received by geographically dispersedradio receivers to pinpoint a user's location, (v) time difference ofarrival, (vi) time of arrival, (vii) angle of arrival, (viii)triangulation of cellular signals, (ix) location based on proximity toknown locations (including locations of other radio-transmitters), (x)map-based location, or any combination of any of the foregoing, as wellas other location facilities known to those of skill in the art. In oneaspect of the invention, the location may be determined using a methodof non-iterative linear equations.

In an embodiment of the transmission detection, controlling,identification, and reporting system 1500 whether to control thetransmission facility 202, may be determined by location of thetransmission facility 202, type of transmission facility 202,identification of transmission facility 202, time of transmission of thetransmission facility 202, frequency of the transmission facility 202,based on type of base station technology and/or location of base stationtechnology and the like.

In an embodiment of the transmission detection, controlling,identification, and reporting system 1500 where the system is insynchronization with base station technology and techniques correlatethe wireless signals, wherein the unique identifier is supplied by thebase station when the transmission facility is stimulated by the jammerand/or base stations unit. Then the transmission facility is tracked andits interest is related to its location to the road, other variablesinclude whether it is alone or it is in the hands of an individual andthe like. The unique identifier is provided by the signal detectionsensor or the base station unit and is used to synchronize the basestation identification and the location of the transmission facility.

In an embodiment of FIG. 15, the transmission detection, controlling,identification, and reporting system 1500 may also transmit the type,time, frequency of the wireless transmission facility of interest to abase station. The base station may then provide the system with theunique identifier of the detected transmission facility or the basestation may detect a transmission facility at a specific frequency andthe transmission detection, controlling, identification, and reportingsystem 100 tunes to that frequency to determine the location and uniqueidentifying information of the transmission device. The system 100/1500may then compare the unique identifying information to a data base (notshown), the information and the parameters obtained from the data basemay then be used decide how to treat the transmission facility; what todo with the transmission facility depending on where the transmissionfacility is considered friend or foe (i.e., allowed or disallowed).

In an embodiment of the transmission detection, controlling,identification, and reporting system 1500 where the transmissiondetection units includes a transmission decoding unit the systemdetermines the location and the allowability of the transmission unit bycomparing the transmission found with allowable or non-allowabletransmission facility lists.

In an embodiment shown in FIG. 15 of the transmission detection,controlling, identification, and reporting system 1500, the base stationindicates there is a transmission facility within the area covered bythe transmission detection, controlling, identification, and reportingsystem 1500. The base station provides at least one unique identifier tothe transmission detection, controlling, identification, and reportingsystem 1500. For example, the base station may provide at least one of:a frequency; a type of transmission facility; a time of arrival (TOA),an IMEI and other similar identifiers (e.g., encoded IMEI). Thetransmission detection, controlling, identification, and reportingsystem 1500 determines the location of the transmission facility,depending on the provided parameters, directs the base station and/orrecorder, jammer, CCTV . . . to perform a set of actions. Some of theactions to be performed are jam the signal specific to the cell phone,deny service (Denial of Service (DoS)) to the cell phone, allow thecontinued receiving and allow transmission of the detected transmission,record the content of the transmission, provide an indication that thetransmission is allowable. In addition, the provided parameters maychange depending on location, and other variables depending onapplication parameter and the like.

In an embodiment shown in FIG. 15 of the transmission detection,controlling, identification, and reporting system 1500 where detectionsystem is separate from the discriminator unit, the discriminator unitmay also include the controlling unit (base station technology and thelike). In this case, when a unique set characteristics (parameters) arereceived by the detecting unit, and/or system 1500, which then providesinformation to the discriminator unit and/or controlling unit, whichthen passes back the correlated transmission facilities (the controllingunit, software radio, and the like) this information is processed. Forexample, a cell phone on the side of the road, with a person talking onit may not need to be disabled, in contrast to a cell phone in standbylocated within a zone of danger (60 meters of the road) may need to becontrolled and disabled.

In an embodiment, the system 1500 will allow an authorized transmissionfacility to continue and/or provide the ability for the wirelesstransmission, (i.e., to talk and/or to receive calls) depending on theconfiguration and application. In an embodiment of the transmissiondetection, controlling, identification, and reporting system 100/1500where detection system is separate from the discriminator unit, in thiscase the discriminator unit may also the controlling unit (base stationtechnology and the like,) the system 1500 may further provideinstruction to the controlling unit to allow or disallow transmissionfacilities, determined by their location.

In an embodiment of the transmission detection, controlling,identification, and reporting system 1500 the system compares theobtained information and depending on whether the detected transmissionfacility is determined to be a potential danger, the system may take theincoming transmission facility and determine its position prior todisallowing further transmission. This process is accomplished byknowing an identification of the transmission facility and using theinformation obtained by the controlling facility (frequency, time, type,channel, etc.) and searching for the incoming call signal. For example,in an improvised explosive detection (IED) situation, finding thetrigger man may require the detection, identification and locationdetermination in real-time. The array antennas will utilize large frontend gain for the greatest distance. As discussed previously, jamming thearea, to gain control of the transmission facility is one method ofcapturing the transmission facility. The ability exists to then trackthe trigger man from his current location and where he goes forinvestigative reasons.

In an embodiment shown in FIG. 15 of the transmission detection,controlling, identification, and reporting system 1500 wheretransmission facility retrieved data may be used to locate threats topersonnel, and/or prevent an escape. Recovered transmission facilitydata may be used to track co-conspirators location and/or identify anunauthorized transmission facility.

FIG. 18 illustrates a system 1800 for implementing the principles of theinvention shown herein. In this exemplary system embodiment 1800, inputdata is received from sources 1801 over network 1850 and is processed inaccordance with one or more programs, either software or firmware,executed by processing system 1810. The results of processing system1810 may then be transmitted over network 1880 for viewing on display1892, reporting device 1890 and/or a second processing system 1895.

Processing system 1810 includes one or more input/output devices 1802that receive data from the illustrated sources or devices 1801 overnetwork 1850. The received data is then applied to processor 1803, whichis in communication with input/output device 1802 and memory 1804.Input/output devices 1802, processor 1803 and memory 1804 maycommunicate over a communication medium 1825. Communication medium 1825may represent a communication network, e.g., ISA, PCI, PCMCIA bus, oneor more internal connections of a circuit, circuit card or other device,as well as portions and combinations of these and other communicationmedia.

Processing system 1810 and/or processor 1803 may be representative of ahandheld calculator, special purpose or general purpose processingsystem, desktop computer, laptop computer, palm computer, or personaldigital assistant (PDA) device, etc., as well as portions orcombinations of these and other devices that can perform the operationsillustrated.

Processor 1803 may be a central processing unit (CPU) or a specialpurposed processing unit or dedicated hardware/software, such as a PAL,ASIC, FGPA, operable to execute computer instruction code or acombination of code and logical operations. In one embodiment, processor1803 may include, or access, code which, when executed by the processor,performs the operations illustrated herein. As would be understood bythose skilled in the art when a general purpose computer (e.g., a CPU)loaded with or accesses code to implement the processing shown herein,the execution of the code transforms the general purpose computer into aspecial purpose computer. The code may be contained in memory 1804, maybe read or downloaded from a memory medium such as a CD-ROM or floppydisk, represented as 1883, may be provided by a manual input device1885, such as a keyboard or a keypad entry, or may be read from amagnetic or optical medium (not shown) or via a second I/O device 1887when needed. Information items provided by devices 1883, 1885, 1887 maybe accessible to processor 1803 through input/output device 1802, asshown. Further, the data received by input/output device 1802 may beimmediately accessible by processor 1803 or may be stored in memory1804. Processor 1803 may further provide the results of the processingto display 1892, recording device 1890 or a second processing unit 1895.

As one skilled in the art would recognize, the terms processor,processing system, computer or computer system may represent one or moreprocessing units in communication with one or more memory units andother devices, e.g., peripherals, connected electronically to andcommunicating with the at least one processing unit. Furthermore, thedevices illustrated may be electronically connected to the one or moreprocessing units via internal busses, e.g., serial, parallel, ISA bus,Micro Channel bus, PCI bus, PCMCIA bus, USB, etc., or one or moreinternal connections of a circuit, circuit card or other device, as wellas portions and combinations of these and other communication media, oran external network, e.g., the Internet and Intranet. In otherembodiments, hardware circuitry may be used in place of, or incombination with, software instructions to implement the invention. Forexample, the elements illustrated herein may also be implemented asdiscrete hardware elements or may be integrated into a single unit.

As would be understood, the operations illustrated may be performedsequentially or in parallel using different processors to determinespecific values. Processing system 1810 may also be in two-waycommunication with each of the sources 1801. Processing system 1810 mayfurther receive or transmit data over one or more network connectionsfrom a server or servers over, e.g., a global computer communicationsnetwork such as the Internet, Intranet, a wide area network (WAN), ametropolitan area network (MAN), a local area network (LAN), aterrestrial broadcast system, a cable network, a satellite network, awireless network, or a telephone network (POTS), as well as portions orcombinations of these and other types of networks. As will beappreciated, networks 1850 and 1880 may also be internal networks or oneor more internal connections of a circuit, circuit card or other device,as well as portions and combinations of these and other communicationmedia or an external network, e.g., the Internet and Intranet.

FIG. 19A illustrates an exemplary process 1900 for capturing a wirelesstransmission in accordance with the principles of the invention and FIG.19B illustrates an exemplary geographic configuration for explaining theprocessing shown in FIG. 19A. Referring now to FIG. 19A, at block 1910,a reference signal transmitted by a transmitter (1972, FIG. 19B) isreceived at a transceiving system (1975). The transmitter 1972 has atransmitting range represented by a distance R₁. An estimated distance(Do) between the transceiving system 1975 and a transmitter 1972 of thereference signal is determined based on a received power at thetransceiving system. At block 1920, a determination is made regarding anexpected power of the reference signal to be received at wirelesstransmission facilities a known distance (R₂) from the transceivingsystem 1975. In one aspect of the invention, an expected received powermay be determined without regard to the positions of the referencesignal transmitter 1972 and the transceiving system 1975. That is, anexpected received power may be determined a known distance (R₂) aboutthe transceiving system 1975 based solely on the received power at thetransceiving system 1975 and, thus, the expected received power at pointA is the same as that received at point B. In another aspect of theinvention, a position of the reference signal transmitter 1972 may bedetermined or provided to the transceiving system 1975. For example, adirection of the reference signal transmitter 1972 may be determined,using directional receiving antennas (or multiple receiving antennasseparated by a known angular measure, such as four antenna spatiallyoriented 90 degrees to each other, such that the 3 dB antenna gainpoints intersect at 45 degrees from the antenna maximum gain) at thetransceiving system 1975, and a position relative to the transceivingsystem 1975 may be determined based on the determined direction andestimated distance (Do). In another aspect, a direction of the referencesignal transmitter 1972 may be determined using a received signalstrength of the reference signal on at least one receiving antenna. Inanother aspect, the position or location of the reference signaltransmitter 1972 may be known and, thus, available to the transceivingsystem 1975. For example, the position of the transmitter 1972 may beknown through a mapping of such transmitters and/or the location isknown based on conventional surveying methods or from a globalpositioning satellite system (GPS). With the position of the referencesignal transmitter 1972 known, the expected power of the referencesignal may then be determined more accurately. For example, the expectedreceived power of the reference signal a known distance from thetransceiving system 1975 in line with, and between, the transmitter 1972and the transceiving system 1975 is greater than the expected receivedpower of the reference signal a known distance from the transceivingsystem in line with but on an opposite side of the transceiving system1975.

With reference to FIG. 19B, the received signal strength at wirelesstransmission facility 1980 is greater than that of wireless transmissionfacility 1990. The expected received power may be determinedcontinuously along the known distance (R2) about the transceiving system1975 or may be determined at designated angles about the transceivingsystem 1975 (e.g., every 10 degrees). Interpolation between twodesignated angles may be used to determine an expected received power atan intermediate point. At block 1930, a signal is transmitted from thetransceiving system within a general area, as represented by R2. Thearea may include wireless transmission facilities 1980, 1985, 1990,capable of receiving the reference signal and wireless transmissionfacilities 1995 that may not be capable of receiving the referencesignal. In one aspect, the signal may be transmitted in anomni-directional manner wherein the general area represents an areacircling the transceiving system; assuming the system and correspondingantenna(s) are co-located. In another aspect of the invention, thesignal may be transmitted in a directional manner wherein the generalarea represents a pie-shape area, 1997, 1998, having an apex at thetransceiving system 1975 (a sector); assuming the antenna(s) and thesystem 1975 are co-located. The angular spread of the pie-shared areaα₁, α₂ may be determined based on the directivity of the transmittingantenna. The signal transmitted by the transceiving system 1975 istransmitted with sufficient power to interfere with communicationsbetween the reference signal and wireless transmission facilities withinan area in which wireless transmission facilities may receive thereference signal. The transmitted signal may be a continuous wave typesignal (i.e., a jamming signal) or may be a discrete signal thatcommands the wireless transmission facilities to reestablishcommunication with the reference signal transmitter. At block 1940, asimulated reference signal, having the same characteristics as thereference signal, is transmitted by the transceiving system 1975. Thesimulated reference signal is transmitted at a power level such that thereceived power of the simulated reference signal at the known distance(R₂) from the transceiving system 1975 is greater than the receivedpower of the reference signal. At block 1950, signal(s) received by thetransceiving system 1975 from wireless transmission facilities 1980,1985, 1990, 1995 in response to the interfering signal are analyzed andprocessed.

In one aspect of the invention, a distance D₁′, D₂′, D₃′, to each of thewireless transmission facilities 1980, 1985, 1990, respectively may beestimated based on a received power, at block 1960. In another aspect ofthe invention, a direction of the wireless transmission facilities maybe determined using, for example, directional antennas and/or anamplitude-based angle of arrival method. In one aspect of the invention,the signals received by the transceiving system 1975 may be analyzed todetermine if they are allowed to send and/or receive communication aspreviously disclosed at block 1970. As discussed previously,allowability may be determined based on a known set of wirelesstransmission facilities that are allowed within an area. All others arenot allowed and, thus, communication is prohibited. If the signals aredetermined to be allowable, then control of the signal is “handed-off”to the reference signal transmitter 1972. Otherwise, the receivedsignals may be further processed.

In one aspect of the invention, allowability of a wireless transmissionfacility may be determined based on a position of the wirelesstransmission facility with respect to the transceiving system 1972. Forexample, if the wireless transmission facility is determined to bewithin a predetermined distance, R3, from the transceiving system 1975,then communication to and from the wireless transmission facility maynot be allowed, even though the transmission would normally be allowed.In one aspect, the area defined by R3 may be limited using directionalinformation of the received signal associated with the wireless facilityand the transceiving system 1975. Thus, if the transceiving system 1975is moving towards the wireless transmission facility, then communicationmay not be allowed, while communication may be allowed if thetransceiving system 1975 is moving away from the wireless transmissionfacility, even though the wireless transmission facility is within thearea defined by R3. In another aspect of the invention, transceivingsystem 1975 may attempt to determine other wireless transmissionfacilities within a region, R4, attempting to communicate with thenot-allowed transmission facility.

FIG. 20A illustrates a graph of exemplary distances between theoperating ranges of base stations 212 and device 252 as a function ofangle, wherein the angle is normalized with respect to a line betweenbase station 212 and device 252 (see FIG. 21). Thus, a minimum distancebetween base station 212 and device 252 is represented as R1, at anangle of zero degrees between base station 212 and device 252 andextends to a maximum distance of R1+2R2, at an angle of 180 degrees (seecurve a).

However, as the operating range of device 152 exceeds the operatingrange of base station 212 at 180 degrees, the distance may thus berepresented as R3 (see curve b).

Thus, as the angle between base station 212 and device 252 increases,the distance between base station 212 and device 252, at distance R2from device 152, increases and becomes limited to a distance of R3 foran angular period around 180 degrees. The distance then decreases to R1as the angle increases.

FIG. 20B illustrates an exemplary power received at the operating rangeR2 of device 252. In this case, the power received by a wireless deviceis a maximum at distance R1 and is a minimum at distance R1+2R2. (seecurve a). However, as the distance R1+2R2 exceeds the operating range ofbase station 212, the power at distance R3 is limited to the power atthe edge of the operating range of base station 112. (see curve b).Thus, to capture any devices within the local area of device 252, device252 must transmit at a power between that received at R1 and thatreceived at R3. Further the power transmitted varies as a function ofthe angle between base station 212 and device 252, as described withregard to FIG. 20A.

FIG. 21 illustrates a second exemplary network configuration inaccordance with the principles of the invention. In this exemplaryconfiguration overlapping regions 210, 220, 230, 240 provide continuouscoverage of one or more devices within their respective regions. In thiscase, each of the regions 210, 220, 230, 240 are represented as having acoverage area defined as R3 with respect to corresponding base stations212, 222, 232, and 242. As illustrated, a hexagon representation of eachof the coverage areas 214, 224, 234 and 244 is used to define acontinuous coverage area. The hexagon representations are providedsolely to illustrate the interlocking coverage of the overlappingcoverage regions 210, 220, 230, 240.

Also illustrated is a transceiving station (device) 252, (which isequivalent to device 1975 of FIG. 19B). Also illustrates are wirelessdevices 262, 264, 266, and 268. Devices 262 and 268 are well within thecoverage region of base station 212, while device 264 is within anoverlapping zone between areas 210 and 230. Device 266 is outside thecoverage area of base station 212 and within coverage of base station224. Each of the wireless devices is within a local area represented bydistance R2 centered on transceiving device 252.

In addition, R1 represents the closest distance between base station 212and transceiving system 252. R4 represents the closest distance betweenbase station 222 and transceiving system 252 and R5 represents theclosest distance between base station 232 and transceiving system 252.FIGS. 22-24 represent graphs of power at R2 for each of base stations212, 222 and 234, respectively, in a manner similar to that shown inFIG. 20B. In this illustrated example, the power of each base station isassumed to be substantially equal so that the coverage areas,represented by R3, are substantially the same. However, it would berecognized that the power of each base station may be altered to providegreater or lesser coverage areas. In this case, the power received at R2may be greater or lesser and is a function of the output transmissionpower and the distance (e.g., R1, R4 and R5, respectively).

In one aspect of the invention, the transceiving system 252 may selectone of the base stations as a primary cell. The primary cell may beselected based on the base station being determined to be closest, indistance, to the transceiving device 252. The transceiving system 252may normalize the received power based on distance and transmissionpower of each of the base stations. In addition, the transceiving system252 may normalize the location of each of the base stations with respectto the location of the base station of the primary cell. That is, in theillustrated network configuration shown in FIG. 21, base station 212 maybe selected as the primary cell and base stations 222 and 232 may bedetermined as angularly separated with respect to the line between theprimary cell base station and the transceiving station 252. Thus, basestation 232 is slightly greater than 90 degrees offset from the linebetween base station 212 and transceiving station 252. Similarly, basestation 222 is slightly greater than 180 degrees offset from the linebetween base station 212 and transceiving station 252.

In one embodiment of the invention a repeat jamming module, providesrepeat jamming capability and specifically jams targeted cell phonesand/or wireless communication device. The repeat jamming techniquesutilize the outgoing signal of the cell phone and repeats thetransmission 100 ns after the initial signal with matching power so thatthe effect of the overlapping communication on the receiving transceiverprovides a confusion in the receiving transceiver and makescommunication impossible and the call and/or wireless communication isdropped. In one embodiment of the invention the jamming module include adual repeating circuit with a programmable delay line built in to allowthe same communication to be delayed by the programmed delay amount. Inanother embodiment of the invention, the repeat jammers are placed ineach section of the facility. When the signal detection array detects anunauthorized cell phone the repeat jammer takes that cell phone and onlythat cell phone off line. When the phone tries to acquire the tower thecell phone identification is re-verified.

In one embodiment of the invention, a Base Station Controlling Module,which identifies and controls cell phones interfaces with the Cell PhoneDetection system to determine authorized or unauthorized phones,provides phone type, the time of arrival and the cell phones frequencyand seamlessly interfaces backhaul and Denial of Service (DoS)capabilities. The Base Station Controlling Module, which identifiesand/or controls cell phones, interfaces with the Cell phone detectionsystem to determine whether a cell phone is an authorized orunauthorized cell phone. The cell phone detection system provides phonetype, the time of arrival and the cell phones frequency to the basestation unit, the base station unit matches the cell phone detectedsignal with the base station controlled and/or required cell phones andverifies the cell phone of interest is within the unauthorized areas. Italso verifies in one embodiment of the invention whether the cell phoneis an authorized cell phone for use within the facility, the data matrixdetermines authorized vs. unauthorized cell phone and authorized areavs. unauthorized areas and, seamlessly interfaces either providingbackhaul and/or DoS capabilities.

In one aspect of the invention, a cell phone identification module whichidentifies cell phone identifications (IDs), determines whether anauthorized or unauthorized phone exists, and provides the phone type,the time of arrival and the cell phone's frequency and seamlesslyinterfaces with the repeater jammer module, to disable the unauthorizedphone in either the unauthorized area and/or an unauthorized phone inany area of interest. The repeat jamming unit jams all unauthorized cellphones within the facility and allows authorized cell phones.

In one embodiment of the invention, the signal detection sensors areplaced throughout the facility to provide full coverage of the facility.Any cell phone within the facility will be detected and displayed on thecentralized console interface. This information will be sent to thesoftware radio Identification module to verify if this is an authorizedor unauthorized cell phone. If the cell phone is unauthorized the repeatjammer module will disable the cell phone or the software radioidentification module will deny service. The software radioidentification module is designed to receive a signal being transmittedfrom a cell phone and decode the IMEI number. The IMEI number iscompared against a database of authorized IMEI cell phones. In oneaspect of the invention, to prevent cell phone from entering a facilityundetected, Low Noise Jammers will be installed at all egress (entrance)points within the facility so that all cell phones coming into thefacility are verified by the Software Radio Identification Module. Anancillary benefit is anyone mistakenly or unknowingly bringing a cellphone into the facility will be picked-up at the entrance point. Inanother embodiment, the Software Radio Identification Module (SRIM)identifies all cell phones within the coverage area. Any cell phone thatis in an on state within the coverage area will be identified. TheInternational Mobile Equipment Identity number or IMEI (Cell phone ID)will be compared with the facility's “authorized cell phone list”. Anauthorized cell phone is allowed to make and receive calls. Allunauthorized cell phones are prevented from making or receiving incomingand outgoing calls. The software radio Identification module can beexpanded to provide cell phone call monitoring.

In one aspect of the invention, the base station acquires a new cellphone, the base station provides, time code, band, and type to the cellphone Detection Sensor Array. The cell phone Detection Sensor Arraydetermines whether the cell phone is within an exclusion zone. If thecell phone is detected outside the “Cell phone control area”, then thecell phone is released back to the Network Cell Tower and/or the callsare allowed where the cell phone is backhauled to the network. If thecell phone is found within the exclusion zone or “control area”, thebase station determines whether the cell phone is authorized and an“Authorized Cell Phone” (VIA HLR Database interface) and the consoledisplays the location of authorized cell phone, the (IMEI), and“Authorized cell phone status”. Alternatively, if the cell phone isdetermined to be an “Unauthorized Cell Phone” (VIA HLR Databaseinterface) and the base station prevents incoming and outgoing calls,the console displays the IMEI, the cell phone and “Unauthorized phonestatus.” In addition, the repeat jammer module may jam the cell phonesignal and the console displays the IMEI, the cell phone location and“Unauthorized phone status”, depending on the system configuration. Inanother embodiment, the base station identifies all cell phones withinthe coverage area. Any cell phone on and within the coverage area willbe identified. The International Mobile Equipment Identity number orIMEI (Cell phone ID) will be compared with the facility's “authorizedcell phone list”. An authorized cell phone is allowed to make andreceive calls. All unauthorized cell phones are prevented from making orreceiving incoming and outgoing calls. The base station module can alsobe expanded to provide cell phone call monitoring.

In another embodiment the signal detection sensor array is used toprovide Real-time tracking of inmates utilizing the Signal Sensor Arraywith wristband tracking technology on each inmate. (See patentapplication Ser. No. 12/231,437). The system is expanded to include aStaff Safety Alert & Tracking System (SSAT) utilizing the Signal Sensorarray with built-in real-time wristband and/or security tags for thetracking of correction officers. In this embodiment of the system, thesystem, reports real-time time and position of every inmate and officerin the facility. The database collects every movement of a wristband upto 1000 times per second and provides this data into a data mining andhistorical playback capability. In another embodiment of the system thewristband has a signal detection module which detects a cell phonewithin a specific area the wrist band determines the user of the cellphone and reports the information back to the console. Some of theadvantages in tracking Officer and Inmates include: Increased StaffSafety; Inmate escape prevention tool; Inmate and staff out of positiontool; Continuous and accurate count of inmates; Group/gangs interactionmonitoring; Accurate work scheduling and monitoring tool; On post/offpost position of all security personnel; Escape alarm; last knownposition; immediate alarm and the like. The data mining capabilitiesenable the data base and data mining to; Accurately locate inmates inrelationship to other inmate/staff at all times and to accuratelyinvestigate assault/rape and assist in prosecution tool; and ability tophysically contact detection system for incident/rape investigation andprevention tool; Inmate tracking/Data Mining which provides for theidentification of predators and predatory behaviors, create exclusionzones and alerting system to notify security of a boundary violation;Inmate tracking and Data Mining: for assessing staff and inmates'vulnerabilities; provides for decreased agency liability by providingaccurate forensic information for court; the system also provides foraudio and alarm capability (incident/rape prevention tool).

In another embodiment of the invention, the Cell Phone Detection systemis integrated with a Base Station(s) Module in which the base station(s)may also have back haul capability wherein the system utilizes apico/nano base station technology and cell phone detection system,wherein the base station registers the cell phone(s) and has the cellphone detection system verify the location of cell phone and theallowability module determines whether the detected phone is authorizedand/or unauthorized. The system verifies who the cell phone belongs to aknown IMEI (via database). The base stations directs the system to backhaul all authorized phones and display the authorized phones within theinterested area and not display phones in non-interested areas. Then thebase station(s) is directed to deny services to allnon-registered/unauthorized within the restricted area and display theserestricted phones and notify staff of their location and presence.

In another embodiment of the invention, the Cell Phone Detection systemworks in conjunction with an integrated Base Stations Module withoutback haul capability in which the base station(s) register the phone andhave the Cell Phone Detection system verify the location of cell phone;the allowability module determines whether the detected phone is insidethe restricted area. The system verifies who the phone belongs to by aknown IMEI (via database). The base station is directed to releaseauthorized cell phones and cell phones which are not in the restrictedareas back to the local tower and display the authorized phones withinthe interested area, and not display phones in non-interested areas. Thebase station is directed to Hold on to unauthorized cell phones anddisplay the unauthorized phones. All non-registered cell phones willhave Denial of Service (DoS), by being held onto by the base stationunit and the like.

In another embodiment of the invention, the Cell Phone Detection andIdentification Module in which the Cell Phone Detection system is thecontrolling unit, wherein the system utilizes a sniffer and/or embeddedIMEI decoders within each cell phone detection sensor to determine thelocation and identification of all cell phones within a specific area.The signal detection sensors find and positively locate the phone. In aconfiguration in which each sensor does not possess a decoder IMEImodule, the sensor provides the following information to the sniffer:TOA, frequency, type, channel. The sniffer scans for the phone, thenreports back the identification information. The system verifies who thephone belongs to and whether the cell phone is authorized or notauthorized. In a configuration in which each sensor has a decodermodule, the system displays green for authorized phone, red forunauthorized phones and the like. In another embodiment, the Sniffermodule finds and positively identifies the cell phones. The snifferprovides information to the cell phone detection and location system(TOA, ID, frequency, type, channel . . . ). The Cell phone detection andlocation system then scan for the cell phone, —verifies who the phonebelongs to and whether the cell phone is authorized and/or notauthorized in that location and then displays green for authorizedphones and red for unauthorized phones and the like.

In one aspect of the invention, the Cell Phone Detection andIdentification Module works in conjunction with 3rd party Telco Support.In this aspect the sniffer module (IMEI decoder and identified)positively identify the phones, gives information to the cell phonedetection and location system (TOA, ID, frequency, type, channel . . .). The Cell phone detection system scans and identifies the location ofinterested cell phone, verifies who the phone belongs and whether thecell phone is authorized and/or not authorized and displays green forauthorized phone and red for unauthorized phones. The system alerts theappropriate cell phone provider of unauthorized call phone to have thecell phone provider deny service on the cell phone. The staff may thenconfiscate the detected cell phone.

In another aspect of the invention, the Cell Phone Detection systemworks in conjunction with a repeat Jamming system and an IdentificationModule and/or embedded decoding module in which the sensors find andpositively locate the phones In this case in which there is externalidentification of the IMEI, the system gives information to the sniffer(TOA, frequency, type, channel . . . )-scans—for the phone and reportsback the identification of the cell phone. The system compares the IDwith the database of authorized phone—and verifies whether the phonebelongs to an authorized or an unauthorized person. The system displaysgreen for authorized phone and red for unauthorized phones. The-thefacility may pick up that specific phone. The repeat jammer disrupts thespecific phone with a set repeat delay to take the cell phone off line.Pinpoint jamming disrupts all phones within the channel and area. ABroadband jammer disrupts all phones within area and frequency coverageand the like.

Although not shown, it would be recognized that the receiving and/or thetransmitting antennas and/or the processing systems may be co-located ormay be geographically distributed. When a plurality of receivingantennas are employed and geographically distributed, it would berecognized that correlation of the information obtained from eachantenna is necessary. In one aspect of the invention, a plurality ofantennas having a known angular receiving pattern may be co-located, seeFIG. 7, and remotely located from the processing system, to receivesignals at substantially the same time. It would be recognized that whenthe antenna system is remotely located from the processing system, theareas shown in FIG. 19B are oriented with respect to the antenna system.

In another embodiment of the invention, the wristband as described inpatent application Ser. No. 12/231,437, includes a signal detectionmodule as described in FIG. 6 and/or alternatively in anotherembodiment, FIG. 11, the signal detection module detects cell phonesignals, its use, and unique identifier information of the cell phonebeing used by the inmate. The wristband module may also include a voicerecognition module. A Cell Phone Use, and Authorization Database module(CPU-ADM), interfaces with the cell phone detection system and the basestation control system and controls when an inmate may make a phone calland/or receive a call. This module holds the allowed or dis-allowed cellphone information for each inmate, what cell phone(s) he is allowed touse, the areas and times in which an inmate may use his cell phone, theauthorized places and phone numbers which the inmate may call and/orreceive phone call from. The CPU-ADM system in cooperation with the basestation unit and cell phone detection units inputs, controls and monitorhow long an inmate may stay on the phone, the cost incurred for eachphone call, records the inmates conversations, correlate voice patternwith each inmate to insure each is the inmate who is prescribed to be,and that one inmate is not talking on another inmate's cell phone;correlates voice pattern of all calls made by the inmate and theirrecipient(s). The CPU-ADM system analyzes all calls received, and allcalls made in conjunction with all person(s) contacted and analyzes forthreat group, and security concerns and trends. The system monitorsthreat alerts analysis and on keys words. The CPU-ADM system interfaceswith the canteen/inmate trust fund to debit inmate's account for eachcall made. The CPU-ADM system interface allows for inmates to inputtheir desired call numbers, and system allows for security personnelmonitoring.

One of the challenges of controlling a cell phone is knowing which cellphone is posing a danger and which cell phone does not pose a danger.FIG. 24A illustrates a flow chart of one embodiment of the invention inwhich the system detects a wireless communication device and determineshow that cell phone should be treated. In this embodiment a cell phoneis detected by the Communication Control Unit (2410). A UniqueIdentifier associated with the detected cell phone is determined (orextracted from the detected signal) and compared to a list of“authorized phones” (2420). If the phone is authorized to make a call,(authorization variables, include, time of call, person calling, personcalled, shift information, scheduling information, unit location, jobposition . . . ) (2430) the system then checks the location of the phone(2440) to determine whether the phone is authorized to make a call fromthat area.

In an embodiment of the invention, the signal detection system verifiesthe location of the wireless communication device; the zone databaseidentifies and classifies each area of the facility (2460). For example,red areas or zones may be housing units, inmate areas, inmates cells,programs and inmate population areas, inmate rec yard, etc., grey areasmay be perimeter areas which are susceptible to misidentification.(i.e., fence lines, wall perimeter). Green areas are areas such asadministration areas, staff dominated areas. The exact location of thephone is important to determine whether this phone is actually withinone of those restricted areas and/or sectors. Processing then continuesto process the different zones (see FIG. 26A).

In an embodiment, if the cell phone is not authorized, (2450) (cellphone is determined by the Unique Identifier not being on the authorizedlist), several scenarios need to be determined before the cell phone isdenied making and/or receiving a call. Variables include, who is thecaller trying to call, is this phone actually in a restricted area. FIG.25 illustrates the processing to handle a cell phone that is indicatedto not be an authorized cell phone (2452).

In an embodiment of the invention, the Communication Control Unit,controls and monitors cell phone activity to determine what number isbeing called and programs being executed on the cell phone.Additionally, the Communication Control Unit is monitoring the cellphone activity (email, messaging, tried calls,) so that all data iscapable of being stored for retrieval and analysis. If the cell phonecall is an emergency call (i.e., 911) the system determines how tohandle the emergency call. Some options include, releasing the 911 callback to the commercial carrier to complete the 911 call, or redirectingthe 911 call via a PBX connection routing the call to the facilitysecurity team or redirecting the call via a picocell and the like to theIP backhaul. The two latter options allow monitoring of the callautomatically, and the former solution can be used to monitor the call.(See FIG. 27, for resolving 911 calls).

Returning to FIG. 24A, when the system verifies that the number tryingto be called by the “not authorized” cell phone is not an inmate calledphone number and/or a known number of an associates of inmates, theirfriends and relatives, processing continues in FIG. 25 (2452). A database is generated (2515) from mining at least one of the Inmate phonecalls, the inmate records, visitor records, the cell phone ID sensor inthe lobby and other similar factors that may be used to define a profileof a user. If the telephone number being called is a known security risk(2520), which may be contained in the database numbers and/or the like,the system “denies service” (2530) to the cell phone and notifiessecurity, logs the incident, alerts administration, displays a locationof the disabled phone on a display, notates the location, type andIdentification and service (2540). The system also compiles this datafor investigation, and the like.

In an embodiment of the invention, if the “not authorized” cellphone/wireless device is trying to place a call, text message, email, orother similar electronic messaging (e.g., Twitter, Facetime, etc.) andthe called/text-ed/communicated with device is unknown, and/or thewireless device is in standby, the system looks to the location of thephone to verify (2550) the phone is actually in a restricted zone (e.g.,a red zone) (2560). If the detected phone is determined to be within arestricted zone (e.g., a red zone), a check is made (2563) whether thedetected transmission device (i.e., cell phone) is one that is known.This check for being known may be based on information regarding whetherthere has been previous activity regarding this cell phone. If thedevice is not known, then processing continues as shown in FIG. 28(2570). If the detected cell phone is known, then a determination ismade (2566) whether the known cell phone has been previously deniedservice. If the device has not been previously denied service, theprocessing continues as shown in FIG. 28. Otherwise processing continuesto block 2530 to deny service and notify the appropriate personnel(e.g., security) in order to log the detected call (2545).

FIG. 28 teaches how the Communication Control Unit (CCU) and/or the CellPhone Detection System (CPDS) reconfirms the zone the cell phone islocated (e.g., green, grey, red . . . ) to reliably insure that therehas not been a mistake in identifying the zone (2810). If it may bepositively determined that that the determined location is outside therestricted area, then processing checks whether the call dialed from thedetected cell phone is one that is known. For example, from a neighboror a staff member. In this case a weighted algorithm may use criteriasuch as a neighbors telephone number, a visitor's telephone number, orknown telephone numbers of know agencies; local, state, federal, andother known entities. If the number is known, the processing continuesto block 2855 to allow the call. Otherwise, processing continues toblock 2815 to continue process.

At block 2815, the system checks the history of the known phone to seeif the cell phone has been denied access before (e.g., previously aknown inmate cell phone) (2805 a). To check whether the phone has beendenied access previously, the system runs a weighted set of algorithms(2820) to determine whether the cell phone, pending access, is actuallyan unauthorized phone or a phone which has, by accident, been picked upby the system (e.g., an employee, a visitor, and/or a neighbor outsideof the restricted zone). Some of the variables which make up theanalysis of the weighted algorithms are, but not limited to, a number ofdenials, a number of locations, a number of times numbers were called,the frequency of call attempts, a time and location of events, thevolume of denials, times, frequency, period of time, error logs, missedidentification logs, etc. When the system, detects a phone which is notan authorized phone, but also is confirmed to not pose a threat to thesystem, the detected cell phone is added to a “Possesses No DangerList”. The agency decides how to deal with the phones on the “PossessesNo Danger List.” Some examples of cell phones that may be put on thePossesses No Danger List are neighbors who live next to a securecomplex, people who work at the facility (employees), frequentpedestrian who walk frequently near the complex (visitors) and the like.

In an embodiment of the invention, the system uses different detectiontechniques such as phase angle cell phone detection, narrow band antennasignal detection, phase detection, amplitude detection, time-domaindetection resolve the ambiguity and the precise location of the wirelessdevice. If it is determined the cell phone is most likely outside therestricted zone the system checks to see if the number dialing is aneighbors, visitor, Staff/trusted persons (Possesses No Danger List).The system looks at databases which contain these numbers. The systemalso verifies whether this identification has been released before andverifies the reason for the release. The system also verifies whetherthe number being called is on a known agency list, state agency, and/orknown entity.

In an embodiment if the invention, if the system determines that thephone is not included on the Possesses No Danger list or there is anunambiguous determination to deny service (2824), (i.e., Positiveweighting) then processing continues to step 2826 to deny service.However, if the system determines that the detected phone transmissionbelongs to a neighbor, and/or staff member, the system allows thecall/text and/or the incoming call, and alerts facility administration.Optionally, the system may register neighbor phone(s)—and staffphone(s), verify the location of the call, and may develop a matrix of“zone violation mis-identifications”. Alternatively depending on policydenies service to said cell phone and the like.

In an embodiment of the invention, if it cannot be confirmed that thedevice is outside the restricted area and/or cannot confirm the previoushistory of that cell phone at the facility (i.e., negative weighting),the system runs additional tests (2822) and processing continues in FIG.26.

FIG. 26 details an embodiment of the invention in which the systemutilizes Telco (i.e., telephone company, wireless service provider) callhistory data to make a determination whether the wireless communicationsdevice is, new to the area, arrived that day, is a local cell phone,owned by a staff member, neighbor, relative of a neighbor is migratingthru the area and the like. This TELCO data is also used forinvestigative purposes to verify calls made by said phone calls receivedby said phone, messages and the like.

In an embodiment of the invention, upon entry from the processing shownin FIG. 28 (2610) the system downloads phone history from the commercialprovider (2615) and uses the data to see whether the device has previoushistory (2620). The data from the Telco may include, all dataconnections transfer, cell, locations connections (sector, Cell)transmission history, data, transmissions, GPS information, towerinformation connections history, Telco cell sector(s)/wireless accessnodes, device ownership, payment information, name of owner. The systemlooks for phone's usage, tower information, tower locations, channel andsector/cell locations; checks to see if cell phone arrived in the areatoday; whether the cell phone belong to someone local; whether the phonehistory will show consistency of local usage; whether the phone isregistered to staff. With this analysis the system determines thelikelihood that the cell phone is a legitimate cell phone or not andwhether the call should be allowed and/or the phone should be allowed toreceive calls.

If no history for the dialed telephone number is found, then an analysisis performed, (2630) as previously described, in order to deny theservice and alert staff and security (2645).

Otherwise, a determination is made whether the device has made previoustransmissions that have been detected (2640) and whether the previouslydetected calls were made from non-restricted areas (2643). If yes, thenthe history of location and times of the previously calls is made(2646). A determination is made using the history information todetermine if the detected signal is a recent one (e.g., only receivedtoday). If yes, then a determination is made whether it could be anerror in a connection range (2650). If yes, then the signal is deemed tobe one of a transit and processing continues as shown in FIG. 26A(2653).

However, if there is no error in range, then a determination is madewhether there is a consistency of local usage (2656). If there isconsistent use then a determination is made whether the signal detectedfrom the cell phone is registered to a local (or acceptable) user(2660). If so, then the call is allowed and information regarding thecall is logged. (2663).

However, if the call is not from a registered user, a determination ismade whether the detected signal is from a phone of an acceptable user,who is not registered (2670). If so then a request for registration ismade (2673) and processing continues as shown in FIG. 26A (2653).

If the cell phone is not indicated to be registered to a staff member,then a determination is made whether there has been long term usage fromthis phone (2680). If so, then the call is allowed (2663). Otherwise thecall is denied (2645).

Returning to FIG. 24A, processing determines an initial zone (e.g., red,green, grey) (2460) and proceeds to the processing shown in FIG. 26A

Upon entry to the processing shown in FIG. 26A, from FIG. 24A (2680) adetermination is made whether the phone verifies that the authorizeduser is not calling a known inmate's number (2682), and if the user iscalling an inmate's number, verifying that the user is authorized tocall inmates and/or inmate's family and friends (2684). Otherwise,system verifies that the user is supposed to be onsite (2686) at thetime the call is made and that the user has permission to make call fromthat specific zone (2688). In this case, the call may be allowed andlogged. (2689).

Otherwise the call is allowed, but internal security procedures areimplemented in order to monitor the call (2690).

Otherwise the service is denied, and appropriate security procedures areinitiated (2692).

If the user does not have permission to make the call from thedetermined zone, then the call is denied, and appropriate securityprocedures are initiated (2692). In an embodiment of the invention, thesystem follows security procedures of the facility (allow/don't allow,depending on agency protocol and matrix parameters) to inform the staffof a security of breach. e.g., inform staff not allowed to make callfrom restricted area and/or call inmate and or inmate's relative.

Returning to block 2684, if the user is determined not to be authorized,then a determination is made whether a staff member (who may beassociated with the called or called from number) is on duty (2694). Ifthe staff member is not on duty, then the service is denied, andappropriate security personnel are notified along with logginginformation regarding the call. Otherwise, a determination is made(2698) whether the user is authorized to make the detected call in thedetermined zone. If the user is authorized, then the call is allowed.(2699). However, if the user is not authorized, then the security isnotified (2692).

In an embodiment of the invention, (see FIG. 27) the CommunicationControl Unit is currently controlling and monitoring the cell phone todetermine if an emergency (i.e., 911) call is being attempted, whereinthe system also records all numbers called and all texted messages andthe like attempted to be transmitted. If a user tries to make a 911,(option 1) the Communication Control Unit routes the 911 call to eithera femtocell, (internet backhaul), PBX routed, or routes the 911 callstraight to a facility based 911 center, or to the Telco switch and/oranother application in which the cell phone is still connected thru theCommunication Control Unit, while the call is being made. Once the callhas finished, the unauthorized cell phone is placed back on a holdchannel so that the unauthorized phone can not communicate further. Allfeatures of the cell phone are disabled except the voice and locationindication.

Returning to FIG. 25, if the determined telephone number being called isan emergency number (e.g., 911) (2510), the processing continues to FIG.27, wherein the system (i.e., communication control unit) is currentlycontrolling and monitoring the cell phone to determine the 911 call.Upon entry, in FIG. 27 (2710), the system determines that the user ismaking an emergency call (911) and the Communication Control Unitdisables all phone features, moves the 911 wireless communication deviceto an enabled channel, allows the 911 call (passes it to a wirelessprovider), monitors the channel that the 911 call is using and sweepsthe channel to re-capture 911 wireless communication device after thecall is over. (2730).

Thus, in the processing shown in FIG. 27, the Communication Control Unitis currently controlling and monitoring the cell phone to determine if auser tries to make a 911 call. In one case, the Communication ControlUnit disables all phone features, moves the 911 wireless communicationdevice to an enabled channel, and allows the 911 call (2750). The Telcomonitors the channel that the 911 call is using. When the call isfinished the Telco disables the wireless communication device andswitches the call back to the Communication Control Unit. TheCommunication Control Unit then sweeps the channel to re-capture thewireless communication device making the emergency call and places thecell phone back on a controlled channel (2750).

In a preferred embodiment the system is a local wireless network thatmay be controlled by a Pseudo Tower as previously described, and doesnot allow restricted phones access to the macro wireless network (e.g.,a wide area wireless communication channel operated by a third party)unless the phone is either authorized, or dialing an emergency call(i.e., 911). In the case of a 911 call the phone is prevented frommaking other communication while in a 911 call. In an preferredembodiment of the invention, as shown in FIG. 29, the system is made upof a transceiver (2901) which connects to an Encoder/decoder decryptionprotocol handshake (2902). In a preferred embodiment the system attachesto the wireless device (2903) via communication protocols, the systemthen compares (2904) the IMSI/ESN (a Unique Identifier) with theauthorized list and/or known unauthorized list (2905). If the wirelessdevice is on the unauthorized list (2905) the wireless device, is held,and its operations are monitored (2907). If the “held Phone” attempts todial 911 the phone is allowed to make the call. However, the systemrestricts (2909)—the phone's-ability to place the call (2910) throughthe macro network without preventing the call from performing otheractivities (texting, piggybacking calls, email, data and the like). Thisis performed in one of several ways. In a preferred embodiment of theinvention, the 911 call is routed through a communication module (2910)(PBX Module, which acts as a data filter and communication module) andrerouted locally via a landline to the operator (communication bridge(2912). This allows the system to control the phone while allowing thecall and preventing data transfers. In another embodiment, the phone isrouted via a Data filter, (Software filter, allowing only voicecommunications) to the communication Module (2912), which bridges thecall to the Macro network. This bridging can be performed by IP routing,Land line, satellite, Wi-Fi routing and the like (2912). In a preferredembodiment the 911 call is monitored (2911) and when the call iscompleted the phone is put back in the Hold and Monitor queue (2907). Ina preferred embodiment the “Hold and Monitor queue” (2907) is a localnetwork channel that is not used by the macro network. In a preferredembodiment, the Transceiver (2901) is transmitting on MACRO (CarrierChannel) used by the Telco and in their PRL list. Thus, all of the cellphones within the area of interest are routed through a local wirelessnetwork to the wide area (macro) network. In a preferred embodiment, theTransceiver (2901) will transmit signals on all known carrierfrequencies.

In an embodiment of the invention, (see FIG. 30), the system detects awireless communication with a unique Identifier, which is decoded(3003). The systems verifies whether the wireless communication deviceis authorized or unauthorized (3006). If the wireless communicationdevice is authorized (3007), the Telco, allows the call to proceed(3008). In a preferred embodiment the Telco can be a commercial provideror a local private network and the like. The Telco restricts the abilityof the wireless communication device to perform other features exceptvoice only calls. If the wireless communication device is unauthorized(3010) the system notifies the Telco to hold and monitor the call(3011). If the caller tries to call 911 (3009), the Telco is instructedto allow the call but restricts the feature of the wirelesscommunication device and allows voice only calls. The system (3012)instructs the Telco to add CPDS Data filter features to cell phone toprevent any feature except voice and GPS location information.

As is disclosed in FIGS. 24A-30, processing for the determination ofdevices authorized to communicate when in a restricted area requires thebalancing of several factors to insure only those devices not authorizedto send and/or receive communication (whether voice or text) areinhibited as unauthorized interference with wireless devicecommunication violates both State and Federal laws.

Accordingly, in one aspect of the invention, the determination ofunauthorized and authorized devices begins with the collection of datafrom carriers that provide cellular or WI-FI coverage of an area orfacility that is designated as restricted (see FIG. 26, ele. 2615). Thisinformation may include one or more, but is not limited to: accountowner, addresses, User Equipment phone number, IMSI/ESN, IMEI/MEID, MDN,MIN, related IMSI/ESN, IMEI/MEID, MDN, MIN, account start/end dates(historical), account status (active, cancelled, suspended), serviceyypes/features, associated phone numbers, credit card/bank account usedto pay for service, and subscriber personal information (e.g., Date ofbirth, Social Security number, driver's license number and contactinformation (phone/email).

In addition, data from a signal detection, collection and managementsystem (see FIG. 15) that collects, and stores, data associated withsignals emanating from or transmitted into the restricted area orfacility may be obtained. This collected information may include one ormore, but is not limited to: IMSI and all corresponding IMEI (currentand historical), IMEI and all corresponding IMSI (current andhistorical), Number of 911 attempts (current and historical), date firstdetected (current and historical), date last detected, total number ofdetections (current and historical), data, SMS, calls, registrations,destination telephone numbers (current and historical), number of Timeson a recurring IMSI List (historically), SMS contents and SMSdestination numbers (current and historical), and date/time of everyinteraction. Additional this data or information regarding detectedsignals may be retained for a known period, for example, a ninety-dayperiod, on a list (e.g., IMEI list) to maintain current and historicalinformation regarding signal detection. In order to maintain the listproperly, this list many be maintained using a sliding time window,wherein oldest information is removed as newer information is collected.Thus, the IMEI list maintains an updated history of data communicationswithin the area or facility.

In addition, information regarding parameters associated with the areaor facility may be obtained. For example, information such as: stafflist (with addresses and phone numbers), staff emergency contact list(with addresses and phone numbers), staff schedule information (hours onproperty), approved visitors list (with addresses and phone numbers),visiting hours (hours visitors on property), approved inmate call list,inmate pin list, volunteer list (with addresses and phone numbers),volunteer schedules (hours on property), contractor list (with addressesand phone numbers), contractor schedules (hours on property) andinternal investigation unit inmate gang and association list, may beobtained.

In accordance with the principles of the invention, the obtained datamay then be used to categorize a detected signal from a wireless tocategories, such as Inmate Phone, Known person class 1, Known personclass 2, and Known person class 3.

For example, a device designated as an Inmate Phone may be furtherclassified as one being subjected to additional restriction. Forexample, ability to pay for communication, limited list of telephonenumbers to contact, etc. In addition, the device may be furtherclassified as being unauthorized and subjected to confiscation. A devicedesignated as a Known Person class 1 may be associated with deviceshaving had no communication and are to be reminded that devices and/orthe operation of devices within the area or facility are prohibited. Adevice designated as a Known Person class 2 may be a device for which nosuspicious communication has been received and are to be reminded thatdevices and/or the operation of devices within the area or facility areprohibited. A device designated as a Known Person class 3 may beassociated with devices having had communications that are deemedsuspicious and subjected to further analysis and investigation.

For example, in the case of the detection of a transmission from adevice seen within the restricted area over the course of time (e.g., 30days.), wherein the has made multiple emergency (i.e., 911) calls duringthis time an analysis of data from one or more of the other collecteddata may be used to class the device. From the collected informationprior history, it may be determined whether legitimate emergency callshave been placed during this period. If there have been no legitimateemergency (911) calls placed from the restricted area during this timeperiod and it may further be determined from the collected information,the device has dialed numbers on an Approved Inmate Call List and theaccount is paid for by what appears to be a false name. A review of SMScontents further indicates that user, through the device, is attemptingto send SMS message to another phone number on the Approved Inmate CallList asking that person to mail a package to the facility. This deviceis categorized as an Inmate Phone that is definitively not authorized tooperate and recommend to the appropriate personnel (e.g., Department ofCorrections (DOC) officers) for review and possible termination by thecarrier and confiscation by the DOC.

In another an example of the use of current and historical data inclassifying device, device no. 1 is device only seen on propertyinfrequently (e.g., once a week) and the dates/times line up with thefacility's visitation hours. There have been no 911 attempts. There havebeen no call or SMS attempts while the device no. 1 is on property,however there is another device (device no. 2) seen on property that isplacing calls to the number associated with device no. 1. In this case,Device no. 1 is categorized as a “Known Person #3—suspiciouscommunications” and referred to the appropriate personnel at thefacility for investigation. In addition, Device no. 2 may beinvestigated further to determine whether it is an Inmate device andwhether it is a device authorized to be used by the inmate or notauthorized to be used.

FIGS. 31-34 illustrate exemplary processing associated with thecategorization of devices to determine whether the devices aredefinitively unauthorized and to be terminated or definitivelyauthorized and allowed to continue communication and conditionallyauthorized and subject to further investigation.

FIG. 31 illustrates a flow chart of an exemplary processing 3100 inaccordance with the principles of the invention for managing emergencycommunicative actions by a wireless device.

The presence of a wireless device may be established by the deviceattempting to communicate with a base station covering the area in whichthe wireless device is located. The device may attempt communicationmerely to update its status with the base station. For example, when adevice is turned on, the device and base station may be in communicationto establish the device on the network. Or an update of a locationinformation may provide a communication with the base station.

After detection of the wireless device performing an action, adetermination is made at block 3110 as to whether the device isperforming an action such a initiating a call (i.e., a voicecommunication) or a SMS (i.e., a text message). If not then processingcontinues to block 3112 to wait on the subscriber information to bereceived from the carrier.

Otherwise processing continues to block 3115 to determine whether thecommunication is with an emergency communication (i.e., no branch), theprocessing proceeds to step 3112 to wait for the subscriber informationfrom the carrier associated with the wireless device.

However, if the communication active is associated with an emergencyaction (i.e., yes branch), a determination is made, at block 3117,whether the communication action is an attempt to make an emergency call(e.g., 911). Although a 911 call is discussed, it would be recognizedthat the emergency call may constitute another type of emergencycommunication that may be associated with a system separate from theconventional emergency (i.e., 911) call system.

However, if the communication action is associated with an emergencycommunication, the determination is made, at block 3117, as to thenumber of times such communication have been made (from the device). Ifthe number of attempts is greater than a predetermined number (e.g., 0,1 . . . n), then a determination is made as to who owns the device atblock 3119.

Determination of the owner of the device is made by referring to one ormore lists of owners/numbers as previously discussed. For example, theowner of a device may be determined by correlating informationassociated with the facility (e.g., personnel) with informationassociated with the device (e.g., IMEI).

If the owner of the device is determined to be a visitor, (block 3121)then information associated with visitors is accessed. For example, thedate/time of the communication action may be captured and determinedwhether the visitor is present in the facility. For example, arevisiting hours over?, has the visitor been in the facility on thisdate?, has the visitor been in the facility recently?, etc. (see block3123).

If the determination of the operation of a visitor's device isdetermined to be suspect (i.e., no branch) block 3125, then informationregarding the device is provided to the appropriate authorities, block3127. For example, information regarding the device (make, carrier,etc.) and location may be provided to correction personal to investigatethe presence of the device.

However, if the operation of the determined visitor's device isdetermined not immediately suspect (i.e., yes branch), then furtherprocessing is initiated, block 3129. This processing may further reviewinformation associated with the visitor, block 3131

If the information is found to be associated with a visitor then theprocessing proceeds (i.e., yes branch), wherein information regardingthe device is provided to appropriate personnel to take one or moreactions with regard to the operation of the device, block 3133.

However, if the information is found not to be associated with a visitorthen processing proceeds (i.e., no branch) to wherein informationregarding the device is provided to appropriate personnel to take one ormore actions with regard to the operation of the device 3135.

Returning to the step 3119 of determining who owns the device, if thedevice is determined to be associated with a person (e.g., staff member,volunteer, contractor, etc.), whose device is authorized to operatewithin the facility block 3137, then a determination is made whether thedate/time of the communication action is within a period of time thatthe device is authorized to operate 3139. For example, a contractor'sdevice may only be authorized to operate within the hours of 9 am-3 pmMonday-Friday (such information being recorded in the data basescollected previously). Step 3141.

If the communication action of the determined person's device is outsidethe expected approved dates/times 3141 (i.e., yes branch) thenprocessing proceeds to processing associated with emergencycommunication actions 3143 from devices associated with known orregistered devices outside their period of authorized operation (seeFIG. 32, ele. 3110), wherein the device is classified as Known Personno. 3.

However, if the communication action is not outside the expectedapproved dates/time (i.e., no branch) then processing proceeds to step3145 processing associated with emergency communication actions fromdevices associated with known or registered devices not outside theirperiod of authorized operation (see FIG. 32, ele. 3120), where thedevice is classified as Known Person no. 2.

FIG. 33 illustrates a more detailed processing 3300 of the categorizingdevices associated with further criteria.

FIG. 33 illustrates processing similar to that shown in FIG. 31, whereina determination is made, at block 3310, regarding whether the signal isassociated with a communicative action. If not processing continues tostep 3112. However, if the action is an attempt to communicate, adetermination is made, at block 3312, whether the action is associatedwith an attempt to make a predetermined (n) number of emergencycommunications.

If not, then processing proceeds to the processing shown in FIG. 34.

Otherwise, a determination is made, at block 3314, regarding the ownerof the device. If the device is associated with a visitor (as may beconcurrently or previously recorded) (block 3316), then a determinationis made whether the date/time of the communicative action is withinaspects associated with the visitor (e.g., is the date/time outsidevisiting hours, has the visitor recently been within the facility, whenwas the last time the visitor was present in the facility, etc.) atblock 3318.

If the determination is that the aspects of the visitor is suspect,(i.e., yes branch), block 3320 then the information associated with thedevice and the owner are provided to the appropriate authorities (e.g.,CID) for subsequent action and investigation, at block 3322.

However, if the information is that the visitor is within the visitinghours, block 3324, a further process is introduced wherein theappropriate authorities are notified to determine whether the visitor isthe user 3326. For example, personnel may make visual inspection of thevisitor and the device to insure proper usage of the device.

Returning the determination of ownership at block 3318, if the owner isdetermined to be an authorized person, block 3328, the date/time of theaction is collected, block 3330, and determined whether the device is inoperation with a date/time period the person is authorized to use thedevice.

If the device is determined to be associated with an user duringauthorized periods, bock 3332, a further check is made whether thedevice may be considered suspect (e.g., an unauthorized person using anauthorized device), at block 3334. Information regarding suspect devicesare provided to the CID for further investigation at block 3336.

Returning again to the determination regarding ownership, at block 3314,if the owner is unknown (i.e., not included in one or more data bases)block 3340 or a ownership is considered suspect (e.g., falseidentification information), block 3342, the processing determines theparty paying the bills for the device at block 3344.

If the payment of the bill associated with the device is associated withan false identification, block 3346, then processing proceeds to step3348 to determine whether the owner is believed to be an inmate (i.e.,yes branch) or whether the information is to be provided to the CID(i.e., no branch) block 3350. A further determination regarding whetherthe device is operated outside of designated times is performed at block3352. If yes, then the device is classified as an Inmate Device at block3354. Otherwise, information regarding suspect devices are provided tothe CID for further investigation at block 3356.

If the payment of the bill associated with the device is associated withan unknown identification, block 3360 then processing proceeds to adetermination whether the owner is believed to be an inmate (i.e., yesbranch), block 3362 or whether the information is to be provided to theCID (i.e., no branch), block 3364.

If the payment of the bill associated with the device is associated alegitimate person (i.e., a person who is known to own the wirelessdevice), block 3370, the information is provided to the CID for furtherinvestigation at block 3372.

FIG. 34 illustrates an exemplary process 3400 regarding processingassociated with emergency communicative actions.

At block 3410, a determination is made whether the action is associatedwith a communicative action. If yes then processing continues to theprocessing shown in FIG. 33. However, if the communicative action isassociated with an emergency, then a determination is made, at block3414, regarding the ownership of the device. As previously discussed,the determination of the ownership may be made based on a correlation ofthe IMEI of the device with one or more data bases that includeinformation regarding of the owner of the device.

If the device is associated with an authorized person (staff,contractor, volunteer), bock 3416, then a determination is made, atblock 3418, regarding the date/time of transmission of the communicativeaction with regard to date/time information associated with the owner.

Information within the communicative action is further reviewed todetermine whether the action is suspect at block 3420. The communicativeaction may be provided to appropriate personnel, at block 3422, whereinthe personnel may take further action regarding the device or allow thecommunicative action to proceed.

Returning to the determination of the ownership at block 3414, if it isdetermined ownership is associated with a visitor 3430, then processingcaptures the date/time information associated with the communicativeaction and compares this with information regarding visitors, aspreviously discussed, block 3432. If the action is outside of expectedvisitor usage (e.g., outside visiting hours), (no branch), theninformation regarding the device is provided to the appropriatepersonnel for further examination and review at block 3434.

However, if the device is operational within the expected visitor usage(yes branch), then processing proceeds to determine whether the contentof the communicative action is suspect, block 3436. If so then adetermination is made regarding which party is paying the bill for thedevice at block 3438.

Processing then proceeds to step 3444 to provide information regardingthe payer of the bills (block 3440, 3442, 3444), associated with thedevice to the appropriate personnel. Returning to the determination ofthe ownership is one of false identification or unknown ownership, theprocessing proceeds to determine whether the content of thecommunicative action is suspect.

Returning to the determination of the owner of the device, block 3414,and it is determined the owner is associated with a false name, block3450 or is unknown, block 3452, a determination is made whether theprocessing is suspect, block 3454. If the processing identifies theowner as an inmate, block 3456, and updates the appropriate data baseinformation associated with the user.

However, if the content of the communicative action is not suspect, theprocessing proceeds to block 3458 to provide information to appropriatepersonnel.

As would be recognized, the appropriate personnel receiving informationregarding the devices detected as undertaking a communicative action,may review the information provided and proceed to take one or moreactions regarding the management of the device. For example, theappropriate personnel may allow the communicative action to complete(i.e., allow the device to connect to a base station, or connect thedevice to a land-line system), or prevent the communicative action fromcontinuing (i.e., deny the device from accessing a base station). Forexample, the authorized personnel may direct the device to turn-off, ormay direct the device to a channel that is not used by a base station ormay limit the functions of the device. Additionally, the authorizedpersonnel may monitor and/or the content of the communicative action.Additionally, the authorized personnel may tag the location of thedevice and send additional personnel to retrieve the device.Additionally, the authorized personnel may terminate some or alloperations of the device. For example, the authorized personnel maypossess the necessary information to turn on a camera device associatedwith the device and video transmit information regarding the surroundingarea, which may be used to capture an image of the user.

In a still further embodiment of the invention, information associatedwith current and historical information such as time of detection,incoming/outgoing transmission, phone number of outgoing transmission,date/time of a first capture of a device, date/time of last capture of adevice, a start time of device within the area and end time of devicewithin the area, a total number of calls or text message attempts, adetermination of phone numbers called or texted, specific verbal ortextual content, total number of text message attempts, registrationinformation, number of attempts for emergency contacts, and total numberof calls made may be reviewed and weighted to determine whether a deviceis authorized to communicate from within the area or to be inhibitedfrom communicating (transmitting or receiving) while in the area.

In an exemplary embodiment of the invention, historical data regardingthe communicative capability of a wireless device, along with specificparametric information within the historical data may be weighted todetermine a category into which a detected wireless resides.

In summary, a system for managing devices within a restricted area isdisclosed wherein information from sources, such as commercial carriers,private network carrier, etc., local management systems and area orfacility related information is collected and correlated to determinethe status of a device attempting to transmit or receive communications(voice or text) while within the area or the facility. The systemprovides for the identification of devices that are unauthorized orcontraband devices operating within the area or facility whiledistinguishing devices that are either authorized to operate within thearea or devices that are not registered within the area but are also notto be interfered with.

It is expressly intended that all combinations of those elements thatperform substantially the same function in substantially the same way toachieve the same results are within the scope of the invention.Substitutions of elements from one described embodiment to another arealso fully intended and contemplated. For example, while the term “cellphone” or “transmission facility” or “transmission device” has been usedherein, such terms relate to a general class of wireless transmissiondevices that includes standard cell phones, smart phones (e.g., PALMCENTRO), and iPhones. PALM is a registered trademark and CENTRO is atrademark of the Palm Inc., Sunnyvale, Calif. iPhone is a registeredtrademark of Apple Inc. Culpertino, Calif.

The terms “a” or “an” as used herein are to describe elements andcomponents of the invention. This is done merely for convenience and togive a general sense of the invention. The description herein should beread to include one or at least one and the singular also includes theplural unless indicated to the contrary.

The term “comprises”, “comprising”, “includes”, “including”, “as”,“having”, or any other variation thereof, are intended to covernon-exclusive inclusions. For example, a process, method, article orapparatus that comprises a list of elements is not necessarily limitedto only those elements but may include other elements not expresslylisted or inherent to such process, method, article, or apparatus. Inaddition, unless expressly stated to the contrary, the term “or” refersto an inclusive “or” and not to an exclusive “or”. For example, acondition A or B is satisfied by any one of the following: A is true (orpresent) and B is false (or not present); A is false (or not present)and B is true (or present); and both A and B are true (or present).

While there has been shown, described, and pointed out fundamental andnovel features of the present invention as applied to preferredembodiments thereof, it will be understood that various omissions andsubstitutions and changes in the apparatus described, in the form anddetails of the devices disclosed, and in their operation, may be made bythose skilled in the art without departing from the spirit of thepresent invention.

It is expressly intended that all combinations of those elements thatperform substantially the same function in substantially the same way toachieve the same results are within the scope of the invention.Substitutions of elements from one described embodiment to another arealso fully intended and contemplated.

Any reference signs in the claims should not be construed as limitingthe scope of the claims or the invention described by the subject matterclaimed.

What is claimed is:
 1. A system for managing wireless devicescomprising: a processor configured to: receive information associatedwith a plurality of wireless devices from a central station associatedwith an area; receive second information associated with wirelessdevices within a second area identified as restrictive within said area,wherein said second information comprises current data and historicaldata; receive information associated with parameters associated withsaid restrictive area; receive an indication of a detection of a signal,wherein the signal is one of: emanating from the restrictive area anddirected toward the restrictive area; identify a wireless deviceassociated with the signal; correlate the identified wireless devicewith said received second information; categorize the wireless devicebased on the correlation, wherein the categories are selected from agroup consisting of: definitively unallowed, definitively allowed,conditionally allowed and suspect; and prevent said wireless device fromcommunicating when said wireless device is categorized as one of:definitively unallowed and suspect.
 2. A system for managing wirelessdevices comprising: a receiver configured to: receive transmissionassociated with a wireless device, wherein the transmission is one of:being directed toward the wireless device and being initiated by thewireless device; determine a type of action associated with the receivedtransmission; determining whether the type of action is associated withan emergency call initiated by the wireless device; process thetransmission based on the determination of said emergency call, whereina process associated with the type of action being associated with anemergency call being different than a process associated with the typeof action not being associated with an emergency call, wherein thewireless device is assigned a category from which allowability of thewireless device to operate may be determined.
 3. The system of claim 2,wherein the processing associated with an emergency call comprises:determining a number of initiations of contacting an emergency numberassociated with the emergency call.
 4. The system of claim 2, whereinthe processing associated with the type of action is based on at leastone of: a history of transmissions associated with the wireless devicecontacting a base station, a history of transmission associated with thewireless device detected by a local network controller and parametersassociated with a location of the wireless device.
 5. The system ofclaim 4, wherein the history of transmission associated with thewireless device contacting a base station comprises at least one of: anaccount owner selected from a group consisting of: a name and anaddress, a User Equipment phone number, an IMSI/ESN, an IMEI/MEID, anMDN, an MIN, a related IMSI/ESN, a related IMEI/MEID, a related MDN, arelated MIN, an account start/end dates (historical), an account statusselected from a group consisting of: active, cancelled, and suspended, aservice type, a service feature, associated phone numbers, a creditcard/bank account used to pay for service, and a subscriber personalinformation selected from a group consisting of: Date of birth, SocialSecurity number, driver's license number and contact informationselected from a group comprising: a phone and an email).
 6. The systemof claim 4, wherein the history of transmission associated with thewireless device detected by a local network controller comprises atleast one of: an I MSI and all corresponding IMEI selected from a groupconsisting of current data and historical data, an IMEI and allcorresponding IMSI select from a group consisting of current data andhistorical data, a number of 911 attempts selected from a groupconsisting of: current data and historical data, a date first detected,selected from a group consisting of: current data and historical data,date last detected, a total number of detections selected from a groupconsisting of current data, and historical data, a data, an SMS, anumber of calls, a registration, a destination telephone number selectedfrom a group consisting of: current data and historical data, a numberof times on a recurring IMSI List, an SMS content, an SMS destinationnumber selected from a group consisting of: current data and historicaldata, and a date/time of every interaction.
 7. The system of claim 4,wherein the parameters associated with a location of the wireless devicecomprises at least one of: a staff list comprising addresses and phonenumbers, a staff emergency contact list comprising addresses and phonenumbers, a staff schedule information comprising hours on property, anapproved visitors list comprising addresses and phone numbers, visitinghours comprising hours visitors on property, an approved inmate calllist, an inmate pin list, a volunteer list comprising with addresses andphone numbers, a volunteer schedule comprising hours on property, acontractor list comprising addresses and phone numbers, a contractorschedule comprising hours on property and an internal investigation unitinmate gang and association list.
 8. The system of claim 2, wherein saidcategory is selected from a group consisting of: definitively unallowed,conditionally allowed and definitively allowed.