System and Method for Detecting and Controlling Contraband Devices in a Correctional Facility Utilizing Portable Electronic Devices

ABSTRACT

A system for detecting and monitoring an unmanned aerial vehicle (UAV) unauthorized to enter air space of a facility is disclosed herein. The system includes a fixed monitoring device configured to detect the UAV attempting to enter the air space of the facility by detecting transmission of a signal from the UAV and identifying at least one of a location of the UAV and a speed of the UAV based on the detected transmission, generate an alert indicating that the UAV has been detected, and transmit the alert. The system also includes a contraband monitoring center configured to receive the alert from the fixed monitoring device and perform an intervention operation in response to the alert.

BACKGROUND Field

The disclosure relates to a system and method for detecting andcontrolling contraband devices in a correctional facility utilizingportable electronic devices.

Background

It is common practice in a corrections environment to record and/ormonitor inmates' conversations. Such recording and monitoring takesplace in the very controlled atmosphere of permitted inmatecommunications with individuals outside of the facilities housingprisoners or inmates. Normally prisoners are limited to a small numberof individuals that they are permitted to call. These may include familymembers, their lawyers, and friends and may specifically exclude others,for example judges, jury members, witnesses, former co-conspirators andother like individuals to whom calls from a particular inmate may be ofa harassing or other undesired nature. There may be a time of day, alength of call, three-way call or other restrictions on calls, all ofwhich must be controlled by way of various instrumentalities that mayinclude computer controlled equipment at the facility and/or at remotelocations in addition to human monitoring and/or control. In almost allinstances, such communications must be recorded; yet even in thoseinstances, there are conditions that may impact on the desire, ability,or legal right to record such conversations. For example, it isinappropriate to record or monitor conversations between an inmate andhis/her attorney, and thus, measures must be taken to insure that, wherecalls are made from an inmate to his/her attorney, no recording is madeor monitoring is allowed.

While it is considered well-known that the recording of inmatecommunications is advantageous to governmental agencies and appropriateauthorities in that information regarding the security of facilities andgeneral continuing or past criminal activity may be found in suchrecordings, advances in the communications technology have openedavenues for inmates to circumvent such monitoring and/or recordingadvantages. Maintaining the ability to ensure control and/or monitoringof communications from or to a controlled facility is, therefore, animportant aspect to previously implemented telecommunications systems.With the advances in cellular communications technology, maintainingsecurity is hindered by such issues as the clandestine delivery ofprohibited equipment into a monitored facility. Due to the small size ofcertain of the more recently-developed devices, such may avoid detectionby more conventional search techniques including, but not limited to,walk through and manual metal detectors and even physical “pat-down”searches.

Conventionally, some correctional facilities have prevented the use ofcontraband cellular devices through the use of jamming devices ormanaged access devices (e.g., Stingray surveillance device manufacturedby Harris Corporation) which emit a blanketing signal(s) around acorrectional facility to prevent the use of any unauthorized cellulardevices. However, these technologies are highly discouraged in mostjurisdictions as they can interfere with public use of cellular phoneswhen visiting or merely passing by the correctional facility. Despitethe disadvantages of these jamming and monitoring technologies, they areoccasionally used for a limited amount of time during emergencysituations such as a riot.

While various aspects and alternative features are known in the field ofcommunication monitoring, no one design has emerged that generallyintegrates all of the ideal features and performance characteristics asdiscussed herein.

BRIEF DESCRIPTION OF THE DRAWINGS/FIGURES

The accompanying drawings, which are incorporated herein and form a partof the specification, illustrate embodiments of the present disclosureand, together with the description, further serve to explain theprinciples of the disclosure and to enable a person skilled in thepertinent art to make and use the embodiments.

FIG. 1 illustrates a block diagram of a detection and monitoring system,according to embodiments of the present disclosure.

FIG. 2 illustrates a block diagram of a mobile device, according toembodiments of the present disclosure.

FIG. 3 illustrates a block diagram of a contraband monitoring center,according to embodiments of the present disclosure.

FIG. 4 illustrates a block diagram of an application server, accordingto embodiments of the present disclosure.

FIGS. 5-6 illustrate flowchart diagrams of methods of detecting andmonitoring a contraband device, according to embodiments of the presentdisclosure.

FIG. 7 illustrates a computer system, according to exemplary embodimentsof the present disclosure.

The present disclosure will be described with reference to theaccompanying drawings. In the drawings, like reference numbers indicateidentical or functionally similar elements. Additionally, the left mostdigit(s) of a reference number identifies the drawing in which thereference number first appears.

DETAILED DESCRIPTION

The following Detailed Description refers to accompanying drawings toillustrate exemplary embodiments consistent with the disclosure.References in the Detailed Description to “one exemplary embodiment,”“an exemplary embodiment,” “an example exemplary embodiment,” etc.,indicate that the exemplary embodiment described may include aparticular feature, structure, or characteristic, but every exemplaryembodiment may not necessarily include the particular feature,structure, or characteristic. Moreover, such phrases are not necessarilyreferring to the same exemplary embodiment. Further, when a particularfeature, structure, or characteristic is described in connection with anexemplary embodiment, it is within the knowledge of those skilled in therelevant art(s) to affect such feature, structure, or characteristic inconnection with other exemplary embodiments whether or not explicitlydescribed.

The exemplary embodiments described herein are provided for illustrativepurposes, and are not limiting. Other exemplary embodiments arepossible, and modifications may be made to the exemplary embodimentswithin the spirit and scope of the disclosure. Therefore, the DetailedDescription is not meant to limit the invention. Rather, the scope ofthe invention is defined only in accordance with the following claimsand their equivalents.

Embodiments may be implemented in hardware (e.g., circuits), firmware,software, or any combination thereof. Embodiments may also beimplemented as instructions stored on a machine-readable medium, whichmay be read and executed by one or more processors. A machine-readablemedium may include any mechanism for storing or transmitting informationin a form readable by a machine (e.g., a computing device). For example,a machine-readable medium may include read only memory (ROM); randomaccess memory (RAM); magnetic disk storage media; optical storage media;flash memory devices; electrical, optical, acoustical or other forms ofpropagated signals (e.g., carrier waves, infrared signals, digitalsignals, etc.), and others. Further, firmware, software, routines,instructions may be described herein as performing certain actions.However, it should be appreciated that such descriptions are merely forconvenience and that such actions in fact result from computing devices,processors, controllers, or other devices executing the firmware,software, routines, instructions, etc. Further, any of theimplementation variations may be carried out by a general purposecomputer, as described below.

For purposes of this discussion, any reference to the term “module”shall be understood to include at least one of software, firmware, andhardware (such as one or more circuit, microchip, or device, or anycombination thereof), and any combination thereof. In addition, it willbe understood that each module may include one, or more than one,component within an actual device, and each component that forms a partof the described module may function either cooperatively orindependently of any other component forming a part of the module.Conversely, multiple modules described herein may represent a singlecomponent within an actual device. Further, components within a modulemay be in a single device or distributed among multiple devices in awired or wireless manner.

The following Detailed Description of the exemplary embodiments will sofully reveal the general nature of the invention that others can, byapplying knowledge of those skilled in relevant art(s), readily modifyand/or adapt for various applications such exemplary embodiments,without undue experimentation, without departing from the spirit andscope of the disclosure. Therefore, such adaptations and modificationsare intended to be within the meaning and plurality of equivalents ofthe exemplary embodiments based upon the teaching and guidance presentedherein. It is to be understood that the phraseology or terminologyherein is for the purpose of description and not of limitation, suchthat the terminology or phraseology of the present specification is tobe interpreted by those skilled in relevant art(s) in light of theteachings herein.

Overview

As discussed above, with the advances in communications technologies,correctional facilities have had difficulty in preventing the entranceand use of prohibited equipment. Due to the small size of certain of themore recently developed devices, such may avoid detection by moreconventional search techniques. Further, once within, a correctionalfacility's ability to stop cellular device use is limited to insidertips and room searches, due to the limited if any use of jammingdevices. Further, even when jamming devices are used inmates are able tocircumvent conventional jamming technologies by using cellular devicesin “dead” spots, or areas of the prison that are outside of zones wherejamming and monitoring devices are effective in locating the cellulardevice. In addition to the increase in unauthorized communicationdevices being used, correctional facilities are seeing an increase indrone or unmanned aerial vehicles (UAVs) entering a prison space. Whileseemingly harmless, these drones/UAVs have typically carried contrabandproducts such as drugs, and it is not unimaginable to foresee additionalproducts such as weapons being transported by the drones/UAVs anddropped into prison grounds.

In light of the above, the present disclosure provides details of asystem and method for detecting and monitoring a contraband deviceincluding communication devices and drones/UAVs by utilizing acombination of mobile devices, fixed monitoring devices, and acontraband monitoring center. The mobile devices include smart phones ortablets that are borrowed, rented, or purchased by an inmate from acorrectional facility. These mobile devices are configured to detect,monitor, and intervene in the communications of target devices. Further,the mobile devices are configured to communicate with fixed monitoringdevices located throughout the correctional facility in performingintervention operations. The contraband monitoring center may also beutilized in the coordination, monitoring, and intervention of targetdevices.

Detection and Monitoring System

FIG. 1 illustrates a block diagram of detection and monitoring system100, according to embodiments of the present disclosure. As shown byFIG. 1, a number of mobile devices 1-3 are illustrated in a correctionalfacility 110. Mobile devices 1-3 are communication devices such as smartphones, tablets, or other portable devices that are borrowed, rented,and/or purchased by inmates or workers, such as guards, fromcorrectional facility 110 for communications with individuals outside ofcorrectional facility 110 such as families, friends, counselors, orothers that the inmates are permitted to call. Mobile devices 1-3 areconfigured to transmit and receive authorized communications to/fromoutsiders including text, audio, or video communications. Allcommunications between mobile devices 1-3 and an outside communicationdevice (not shown) are routed by communication center 120. Services formonitoring and recording authorized communications via mobile devices1-3 are also performed by, or on behalf of, correctional facility 110 atcommunication center 120.

Mobile devices 1-3 and communication center 120 connect via network 101which includes a Local-Area Network (LAN), a Wide-Area Network (WAN), orthe Internet, depending on the relative locations of communicationcenter 120 and mobile devices 1-3. For example, communication center 120may be located at a correctional facility where mobile devices 1-3 islocated and therefore a LAN is used. In another example, communicationcenter 120 is located at a different location than the correctionalfacility and therefore network 101 is a WAN or the Internet. In anembodiment, mobile devices 1-3 connects to the network 101 by way of aninterface (not shown) such as a router or access point that is locatedat the correctional facility 110.

Mobile devices 1-3 are configured to detect and monitor unauthorizedcommunications by target device 150. Examples of target device 150include a cellular phone, an unauthorized network router, unauthorizedhotspot, or unauthorized communication device. To do this, mobiledevices 1-3 are configured to monitor different radio accesstechnologies including, but not limited to, GSM, 2G-5G, WCDMA, CDMA,TDMA, UMTS, WIMAX, WIFI, IBEACON, Bluetooth, LTE, 700 mhz to 2200 mhz orother frequency bands, and/or other modes and frequencies. Whilemonitoring a radio access technology, mobile devices 1-3 are configuredto detect a transmission of a signal on the radio access technology fromtarget device 150. For example, mobile device 1 may detect a carrierfrequency of a transmitted signal from target device 150.

Mobile devices 1-3 are configured to transmit information, as will bedescribed in further detail below, to contraband monitoring center 130.Mobile devices 1-3 connect to contraband monitoring center 130, whichprovides additional monitoring and detection services in relation tounauthorized communications by target device 150. These additionalservices include the coordination of target device interventionmeasures, alerts, and/or notifications to one or more mobile devices1-3, one or more fixed devices 4-7, and/or workers (not shown) atcorrectional facility 110. These services are likewise performed at thecontraband monitoring center 130 by, or on behalf of, the correctionalfacility 110.

In an embodiment, interface 140 is configured to couple signals betweenmobile devices 1-3 and contraband monitoring center 130. Interface 140connects to mobile devices 1-3 via wireless technologies such as, butnot limited to, Bluetooth WiFI, or radio frequency (RF) transmissions.Interface 140 connects to contraband monitoring center 130 via wiredtechnologies including, but not limited to, optical cables or RF cablesand/or wireless technologies including, but not limited to, a LAN, aWAN, or the Internet. However, in an embodiment, one or more of themobile devices 1-3 is configured to directly connect to the contrabandmonitoring center 130 without the use of interface 140. In anembodiment, interface 140 may be a router or access point that is usedto couple signals between mobile devices 1-3 and contraband monitoringcenter 130 and mobile devices 1-3 and communication center 120 (notshown).

Mobile devices 1-3 are also configured to intervene between unauthorizedcommunications and target device 150. In an embodiment, interventionoperations by mobile devices 1-3 include transmitting a jamming signalof low RF strength that radiates within predetermined areas 10, 20, 30about a location of the mobile devices 1-3. For example, thepredetermined areas 10, 20, 30 may be jamming signals that radiate 10-15meters in all directions around the mobile devices 1-3. Jamming signalsinclude a signal that interferes or blocks a detected frequency or asignal that associates with the detected frequency. For example, thejamming signal may interfere with the downlink signal that is associatedwith a detected uplink signal of a cellular phone. Jamming signalsinclude signals that have an increased power or signals that include apredetermined number of transmissions that overpower unauthorizedcommunications. Jamming signals may also include signals that corruptunauthorized communications. For example, mobile devices 1-3 can analyzepacket headers transmitted by the target device 150 and transmit asignal that overwrites portions of the unauthorized communication suchthat packets of the unauthorized communication become corrupted.

In an embodiment, jamming signals are configured to not interfere withcommunications between mobile devices 1-3 and an outside communicationdevice. To do this, mobile devices 1-3 emit jamming signals having afrequency band and/or radio access technology that is different from thefrequency band and/or radio access technology used for communicationbetween the mobile devices 1-3 and communication center 120.

Jamming signals are activated based on the detection of target device150 and/or instructions received from contraband monitoring center 130.In doing so, mobile devices 1-3 preserve battery power. While thejamming signal is described as being dependent on the detection oftarget device 150, the present application is not limited as so, and mayinclude an always on mode where such detection of the target device andthe subsequent activation of the jamming signal is always transmitted bythe mobile devices 1-3. In this mode, at least one of mobile devices 1-3are configured to transmit a jamming signal when a main operating system(OS) of the mobile device is powered on, in sleep mode, and/or poweredoff In other words, in this mode, jamming features are operatedindependently of the main processor power of the mobile device.

In an embodiment, intervention operations by mobile devices 1-3 alsoinclude a recording operation where audio and/or video is recorded by amobile device at the time of detection. In this operation, mobiledevices 1-3 are configured to activate their own microphone or camera torecord communications and/or images of the area when target device 150is detected. This allows a mobile device the ability to record actualconversations or capture visual confirmation of the unauthorized use oftarget device 150. Once recorded, the recorded audio/video data istransmitted from the mobile devices 1-3 to contraband monitoring center130 to analyze the recorded audio/video data.

In an embodiment, intervention operations by mobile devices 1-3 furtherinclude a managed access point operation. For this, mobile devices 1-3are configured to utilize an RF transmission to simulate a cellulartransmission tower and thereby record communications to/from targetdevice 150. In detail, mobile devices 1-3 are configured to transmit RFsignals that exceed a signal strength of a nearby cellular tower. When amobile device (either mobile devices 1-3) transmits the RF signal, dueto the strength of the RF signal, target device 150 is forced todisconnect from a cellular tower with which it is connected andestablish a connection with the mobile device. Once connection isestablished between target device 150 and one of the mobile devices 1-3,the mobile device can gather information from target device 150including identification information such as the international mobilesubscriber identity number (IMSI) or the electronic serial number (ESN)of the target device. Further, the mobile device can recordcommunications between the target device and outside devices. Oncegathered, mobile devices 1-3 are configured to compare or transmit thisinformation to contraband monitoring center 130 for comparison of thegathered information against an authorized cellular phone list.

In an embodiment, one or more of the mobile devices 1-3 is configured toperform a survey of transmitted frequencies from sources nearby thecorrectional facility 110, for example cellular tower 160. Informationgathered by the survey is then used to focus the detecting of atransmissions from target device 150 based on the results of the search.For example, mobile device 1 can perform a survey to determine theuplink and downlink frequencies of cellular tower 160 and based onresults of the survey, can focus monitoring, detection, and jammingoperations on the frequencies used by cellular tower 160.

As described above, mobile devices 1-3 operate individually by detectingtarget device 150, transmitting information to contraband monitoringcenter 130, and performing intervening operations. However, in anembodiment, mobile devices 1-3 are also configured to operate in a meshinfrastructure where mobile devices 1-3 communicate with each otherand/or with fixed monitoring devices 4-7 to detect target device 150 andperform intervening operations. In this embodiment, each of the mobiledevices 1-3 acts as a node in a mesh infrastructure where each of thenodes can communicate and even instruct the other node to performoperations such as performing a jamming operation, a recordingoperation, or a managed access operation. For example, as shown by FIG.1, if mobile device 1 detects target device 150, mobile device 1communicates this information to one or more of the mobile devices 2-3and instructs one or more of these devices to output a jamming signal.In a mesh infrastructure, mobile devices 1-3 are able to performintervention operations without the use of contraband detection center130 or before receiving instructions from contraband detection center130.

In an embodiment, mobile devices 1-3 use a change in location (motiondata) to determine what intervention operations to perform and/orinformation to transmit between each other, fixed monitoring devices4-7, and/or the contraband monitoring center 130. Mobile devices 1-3 cantransmit motion data to other devices when target device 150 is detectedand/or after a request to share motion data by another device. Forexample, after mobile device 1 detects target device 150, mobile device1 shares motion data with mobile devices 2-3 or fixed monitoring devices4-7 to indicate that it is moving away from target device 150 such thatmobile devices 2-3 or fixed monitoring devices 4-7 can performintervention operations. In another example, after mobile device 1detects target device 150, mobile device 1 can poll other devices (e.g.,2-5) and receive location and motion data, if available, to determinewhether any of these devices will be in close proximity to perform anintervention operation.

In an embodiment, fixed monitoring devices 4-7 are placed in locations,indoor or outdoor, throughout correctional facility 110. Fixedmonitoring devices 4-7 may be a standalone device or combined withcommon electronics within correctional facility 110 such as a kiosk or awireless access point. Fixed monitoring devices 4-7 are configured toperform all or some of the functions as the mobile devise 1-3, asdescribed above, in detecting target device 150 and performing anintervening operation, as described above.

In an embodiment, one or more fixed monitoring devices 4-7 include adirectional antenna to focus an RF signal at a particular area.Directional antennas of fixed monitoring devices 4-7 may be used tosupplement areas of correctional facility 110 where mobile devices 1-4are not typically allowed or difficult to accessed such as the yard orsparsely populated areas. These types of fixed monitoring devices 4-7may be placed in areas such as fences around correctional facility 110(e.g., fixed monitoring devices 6-7) and directed towards the inside ofthe correctional facility 110 to avoid jamming issues with the public.

In an embodiment, one or more fixed monitoring devices (e.g., fixedmonitoring devices 6-7 as shown by FIG. 1) are located on an outerperimeter of correctional facility 110, such as a fence, wall, orbuilding, and are configured to detect, monitor, and intervene withdrones and/or unmanned aerial vehicles (UAVs) attempting to cross intocorrectional facility 110 air space. In this embodiment, fixedmonitoring devices 6-7 includes one or more detection elements such asdirectional antennas, virtually controlled quad antenna systems, oromnidirectional antennas, infrared cameras, or microphone elements todetect a drone/UAV. Fixed monitoring devices 6-7 that utilizedirectional antennas are pointed in several directions, includingtowards and away from correctional facility 110. Virtually controlledquad antenna systems used fixed monitoring devices 6-7 are configured todetect drones/UAVs by way of Doppler effect and triangulation. Fixedmonitoring devices 6-7 having omnidirectional antennas are configured tointercept a GPS signal of a drone/UAV in addition to quad antenna units.Infrared cameras utilized by fixed monitoring devices 6-7 are configuredto detect heat patterns of drones/UAVs while microphone elements areconfigured to tune into an audio frequency of propeller systems ondrones/UAVs,

To intervene with drones/UAVs, in an embodiment, fixed monitoringdevices 6-7 are configured to use one or more of a projectile launcherto launch such objects such as a bullet or a net to stop a drone/UAV,alert or launch a capture drone to intercept a rogue drone/UAV, and/or aGPS spoofing operation.

Fixed monitoring devices 6-7 provide information directly or by way ofcontraband detection center 130 to the projectile launcher or thecapture drone. The information may include an indication that aUAV/drone is approaching, a location, or a speed of the UAV/drone suchthat the projectile launcher or the capture drone can perform theirrespective functions. The projectile launcher and/or the capture dronemay be mounted on or a part of fixed monitoring devices 6-7 or may belocated in a separate location of the correctional facility.

When performing a GPS spoofing operation, fixed monitoring device 4 or 5emits a false GPS signal that has a signal strength stronger than a realGPS signal. The false GPS signal provides incorrect GPS coordinates tothe drone/UAV which, in doing so, deceives the drone/UAV into adjustingits trajectory according to the false GPS signal. Accordingly, fixedmonitoring devices 6-7 gain control of the drone/UAV, by way of thefalse GPS signal, and divert the trajectory of the drone/UAV.

As shown by FIG. 1, fixed monitoring devices 4-7 connect to contrabandmonitoring center 130 by way of interface 140. Connection to interface140 is by wired technologies including, but not limited to, opticalcables or RF cables and/or wireless technologies including, but notlimited to, a LAN, a WAN, or the Internet. In an embodiment, one or moreof the fixed monitoring devices 4-7 connects directly to contrabandmonitoring center 130 by way of the wired or wireless technologies, aspreviously discussed.

Similar to mobile devices 1-3, fixed monitoring devices 4-7 areconfigured to perform operations individually, or in a meshinfrastructure, where one of the fixed monitoring devices 4-7 providesor receives instructions from at least one of mobile devices 1-3,another one of fixed monitoring devices 4-7, and/or contrabandmonitoring center 130.

Mobile Device

FIG. 2 illustrates a block diagram of mobile device 200, according toembodiments of the present disclosure. Mobile device 200 may be anexemplary embodiment of one or more of mobile devices 1-3. Mobile device200 includes processor circuitry 210 that is communicatively coupled toplurality of communication interfaces 220, input/output circuitry 230,and positional and motion circuitry 240. Processor circuitry 210includes one or more processors 212, circuitry, and/or logic configuredto control the overall operation of mobile device 200, including theoperation of communication interfaces 220, input/output circuitry 230,and positional and motion circuitry 240. Processor circuitry 210 furtherincludes memory 214 to store data and instructions. Memory 214 may beany well-known volatile and/or non-volatile memory that is removableand/or non-removable.

Communication interfaces 220 include one or more transceivers,transmitters, and/or receivers that communicate via one or more antennas222. Communication interfaces 220 are configured to transmit and receivecommunications between an inmate and an outsider via network 101.Communication interfaces 220 are also configured to detect transmissionsby target device 150. Detection of target device 150 transmissionsinclude reception of a communication of an unauthorized communicationvia one or more antennas 222. For example, to detect an unauthorizedcommunication, a receiver of the communication interface 220 may cyclethrough different frequencies bands and/or radio access technologies.Communication interfaces 220 are further configured to output an RFsignal during intervention operations. For example, a transmitter of thecommunication interfaces 220 may be configured to transmit aninterference signal based on the received unauthorized communication.Lastly, communication interfaces 220 is configured to communicate withother mobile devices 1-3, fixed devices 4-7, and/or contrabandmonitoring center 130 to provide or receive information and/orinstructions.

Input/output circuitry 230 includes circuitry such as a keypad, a touchinterface, a microphone, a camera, and a video screen for displayinginformation. Input/output circuitry 230 may be used by a user fortraditional mobile device communications such as audio, video, ortexting communications. Input/output circuitry 230 such as themicrophone and camera are used during intervention operation to captureaudio and/or video of surrounding areas when a unauthorizedcommunication is detected.

Positional and motion sensors 240 include circuitry for determining acurrent location and a change in location of mobile device 200.Positional and motion circuitry 240 may include such circuitry as GlobalPositioning System (GPS) technology, indoor positioning systems (IPS)technology, accelerometers, and/or gyroscopes to determine position andmotion. Positional and motion sensors 240 are used to triangulate afirst current location of mobile device 200 based on signals receivedfrom, for example, positioning systems. Positional and motion sensors240 are configured to determine whether mobile device 200 is in motionbased on second location of the mobile device 200 and determiningwhether a change of location occurred between the first current locationand the second current location.

Contraband Monitoring Center

FIG. 3 illustrates a block diagram of contraband monitoring center 130,according to embodiments of the present disclosure. Contrabandmonitoring center 130 includes communication server 302, location server304, database server 306, biometric server 308, application server 310,and data storage 320, that are all connected to each other via a networkbus 301.

Each of the servers 302-310 can be constructed as individual physicalhardware devices, or as virtual servers. The number of physical hardwaremachines can be scaled to match the number of simultaneous userconnections desired to be supported detection and monitoring system 100.

Communication server 302 consists of any number of servers, and isconfigured to receive and transmit information to/from mobile devices1-3, fixed monitoring devices 4-7, and/or interface 140. Communicationserver 302 receives information such as alerts, recorded audio/videodata, and locations of devices at time of detection of target device andis configured to record and log the information. Because communicationserver 302 receives and transmits information by way of a network, in anexemplary embodiment, communication server 302 can encrypt and decryptthe information for security purposes.

Location server 304 consists of any number of servers, and is configuredto receive location information from one or more of mobile devices 1-3,fixed monitoring devices 4-7, and/or interface 140 and determinelocations of devices that are located near the detection of targetdevice 150. If location information is received from multiple devices,location server 304 can use the information to triangulate an accuratelocation of target device 150.

Database server 306 consists of any number of servers, and is configuredto store and organize data in a relational database. Database server 306is configured to run a database management system, such as MYSQL™, toprovide an example. Database server 306 stores data related to thecorrectional facilities such as locations of fixed monitoring devices4-7, and/or interface 140, authorized cellular devices to be used incorrectional facility 110, identifying information of those using mobiledevices 1-3, and past locations of detected target device 150.

Biometric server 308 consists of any number of servers, and isconfigured to store biometric data of inmates. Biometric data includesat least one of voice data, facial recognition data (2D or 3D), devicedata. Biometric server 308 is configured to assist analyzing audio/videodata received from mobile devices 1-3. Biometric server 308 assists bycomparing received audio/video data against stored biometric data todetermine identities of those near a device at the time of detection.

Data storage 320 provides access to a wide variety of data such as pastlocation information, logs for alerts, notifications etc., audio/videoinformation received from mobile devices 1-3, fixed monitoring devices4-7, and/or interface 140, and/or database data. In general, datastorage 320 stores any data stored by communication server 302, locationserver 304, database server 306, biometric server 308, and applicationserver 310. Because the data stored on data storage 320 may consume asignificant amounts of storage space, data storage 320 may include aNetwork Attached Storage (NAS) device, which is configured as a massstorage device. In order to reduce the required size, data storage 320preferably includes a backup routine to transfer data to permanentstorage devices, such as archival permanent storage or optical disks,after a predetermined time has elapsed since the initial recording ofthat data. Data storage 320 is connected to the servers 302-310 by wayof the network bus 301.

FIG. 4 illustrates application server 400, according to exemplaryembodiments of the present disclosure. Application server 400 mayrepresent an exemplary embodiment of the application server 310 depictedin FIG. 3. Application server 400 consists of any number of servers, andfunctions as the primary logic processing center in detection andmonitoring system 100 such as coordinating a response to detection oftarget device 150. Application server 400 is configured to manage andfacilitate communication between communication server 302, locationserver 304, database server 306, biometric server 308, and data storage320.

Application server 400 includes one or more central processing units(CPU) 410 connected via a bus 401 to several other peripherals. Suchperipherals include an input device, such as keyboard and/or mouse 420,monitor 422 for displaying information, network interface card 424and/or modem 426 that provide network connectivity and communication.

Application server 400 also includes internal data storage 430. Thisdata storage 430 is non-volatile storage, such as one or more magnetichard disk drives (HDDs) and/or one or more solid state drives (SSDs).Data storage 430 is used to store a variety of important files,documents, or other digital information, such as operating system files,application files, user data, and/or temporary recording space.

Application server 400 also includes system memory 440. System memory440 is preferably faster and more efficient than Data storage 430, andis configured as random access memory (RAM) in an embodiment. Systemmemory 440 contains the runtime environment of application server 400,storing temporary data for any of operating system 442, java virtualmachine 444, java application server 446, and detection and monitoringcontrol logic 448.

System Operations

Operations of detecting, monitoring, and intervening in detection andmonitoring system 100 will be described with respect to FIGS. 5-6.Although the physical devices and components that form the system havelargely already been described, additional details regarding their morenuanced operation will be described below with respect to FIGS. 1-4.While FIGS. 5-6 contain methods of operation of detection and monitoringsystem 100, the operations are not limited to the order described below,and various operations can be performed in a different order. Further,two or more operations of each method can be performed simultaneouslywith each other.

FIG. 5 illustrates a flowchart diagram of a method of detecting andmonitoring a contraband device, according to embodiments of the presentdisclosure. In step 502, a detecting device such as one of mobiledevices 1-3 or fixed monitoring devices 4-7 search for a contrabanddevice. When searching for a cellular device or hotspot, for example,the detecting device enables a receiver to receive transmissions. Thedetecting device may focus the receiver on specific types oftransmissions such as GSM, CDMA, LTE, or other cellular transmissionsand/or may rotate through a variety of frequencies and transmissiontypes including, for example, cellular transmissions and WIFI signals ofa specific type. For fixed monitoring devices 4-7, a search may alsoinclude a search for drones/UAVs and may be performed based on thedetection elements, as previously described. The detecting device nextdetermines if a contraband device, such as target device 150, isdetected in step 504. If target device 150 is not detected, thedetecting device continues to search for a contraband device in step502. Otherwise, when target device 150 is detected, the detecting devicetransmits an alert to contraband monitoring center 130 in step 506. Thealert provides information to contraband monitoring center 130 tocoordinate an intervention plan. The alert includes one or more of anindication that target device 150 has been detected, a time and alocation of the detecting device when the detection occurred, or amotion of the detecting device since detection.

After the alert has been transmitted to contraband monitoring center130, the detecting device determines whether instructions forintervening have been received from contraband monitoring center 130 instep 508. If no instructions have been received, the detecting devicethen determines an intervention plan in step 510. Determination of theintervention plan is based on one or more of the time and the locationof the detection, a strength of a signal detected, motion information ofthe detecting device, included technology of the detecting device,communication with other detecting devices such as mobile devices 1-3and fixed monitoring devices 4-7, and/or a location of workers atcorrectional facility 130. Once an intervention plan is determined bythe detecting device, in step 510, one or more of the interventionoperations is activated by the detecting device, in step 512. Aspreviously discussed, the intervention operations include transmitting ajamming signal, activating an audio and/or video recording, performing amanaged access operation, or alerting and/or instructing another device,such as one or more of mobile devices 1-3 or fixed monitoring devices4-7, to perform one or more intervention operations. Further,intervention operations for one or more of the fixed monitoring devices4-7 may include intervening/controlling a drone/UAV by operationspreviously discussed.

If instructions are received from contraband monitoring center 130, instep 508, the device receives the instructions and performs theintervention operations at step 512 as requested in step 530.

Intervention operations may continue until a particular event occurs instep 520. The event may be one or more of a predetermined time since anintervention operation began or motion information indicating that thedevice has moved. The predetermined time is determined based on theintervention operation performed. For example, the predetermined timemay be an arbitrary time for transmitting a jamming signal. As anotherexample the predetermined time may be a sufficient amount of time tosample an audio or video recording, or receive data from the contrabanddevice when performing managed access operation.

If no predetermined event has occurred, the operation returns toperforming one or more intervention operations at step 512. However, ifthe predetermined event occurs the detecting device performs an updatedsearch for the contraband device in step 522. If the contraband deviceis still located, the detecting device performs one or more interventionoperations in step 512. Otherwise, the operation returns to step 502.

FIG. 6 illustrates a flowchart diagram of a method of detecting andmonitoring a contraband device, according to embodiments of the presentdisclosure. In step 602, contraband monitoring center 130 receives analert from one or more of mobile devices 1-3 or fixed monitoring devices4-7. The alert includes a time and a location of the one or more ofmobile devices 1-3 or fixed monitoring devices 4-7 when detection oftarget device 150 occurred. Once received, contraband monitoring center130 gathers additional data to generate an intervention plan. Gatheringadditional information may include polling one or more of mobile devices1-3 or fixed monitoring devices 4-7 near the location informationreceived and requesting location information, motion information, and/ordetection information. Additional information may also include gatheringinformation on locations or availability of prison workers and/orcapabilities of mobile devices 1-3 or fixed monitoring devices 4-7.Next, contraband monitoring center 130 generates an intervention planwhich coordinates one or more intervention operations to be performed tointercept, locate, and/or gather information from target device 150.After the contraband monitoring center 130 generates the interventionplan, instructions are transmitted to those mobile devices 1-3, fixedmonitoring devices, or workers designated to perform interventionoperations.

Exemplary Computer Implementation

It will be apparent to persons skilled in the relevant art(s) thatvarious elements and features of the present disclosure, as describedherein, can be implemented in hardware using analog and/or digitalcircuits, in software, through the execution of computer instructions byone or more general purpose or special-purpose processors, or as acombination of hardware and software.

The following description of a general purpose computer system isprovided for the sake of completeness. Embodiments of the presentdisclosure can be implemented in hardware, or as a combination ofsoftware and hardware. Consequently, embodiments of the disclosure maybe implemented in the environment of a computer system or otherprocessing system. For example, the method of FIGS. 5-6 can beimplemented in the environment of one or more computer systems or otherprocessing systems. An example of such a computer system 700 is shown inFIG. 7. One or more of the modules depicted in the previous figures canbe at least partially implemented on one or more distinct computersystems 700.

Computer system 700 includes one or more processors, such as processor704. Processor 704 can be a special purpose or a general purpose digitalsignal processor. Processor 704 is connected to a communicationinfrastructure 702 (for example, a bus or network). Various softwareimplementations are described in terms of this exemplary computersystem. After reading this description, it will become apparent to aperson skilled in the relevant art(s) how to implement the disclosureusing other computer systems and/or computer architectures.

Computer system 700 also includes a main memory 706, preferably randomaccess memory (RAM), and may also include a secondary memory 708.Secondary memory 708 may include, for example, a hard disk drive 710and/or a removable storage drive 712, representing a floppy disk drive,a magnetic tape drive, an optical disk drive, or the like. Removablestorage drive 712 reads from and/or writes to a removable storage unit716 in a well-known manner. Removable storage unit 716 represents afloppy disk, magnetic tape, optical disk, or the like, which is read byand written to by removable storage drive 712. As will be appreciated bypersons skilled in the relevant art(s), removable storage unit 716includes a computer usable storage medium having stored therein computersoftware and/or data.

In alternative implementations, secondary memory 708 may include othersimilar means for allowing computer programs or other instructions to beloaded into computer system 700. Such means may include, for example, aremovable storage unit 718 and an interface 714. Examples of such meansmay include a program cartridge and cartridge interface (such as thatfound in video game devices), a removable memory chip (such as an EPROM,or PROM) and associated socket, a thumb drive and USB port, and otherremovable storage units 718 and interfaces 714 which allow software anddata to be transferred from removable storage unit 718 to computersystem 700.

Computer system 700 may also include a communications interface 720.Communications interface 720 allows software and data to be transferredbetween computer system 700 and external devices. Examples ofcommunications interface 720 may include a modem, a network interface(such as an Ethernet card), a communications port, a PCMCIA slot andcard, etc. Software and data transferred via communications interface720 are in the form of signals which may be electronic, electromagnetic,optical, or other signals capable of being received by communicationsinterface 720. These signals are provided to communications interface720 via a communications path 722. Communications path 722 carriessignals and may be implemented using wire or cable, fiber optics, aphone line, a cellular phone link, an RF link and other communicationschannels.

As used herein, the terms “computer program medium” and “computerreadable medium” are used to generally refer to tangible storage mediasuch as removable storage units 716 and 718 or a hard disk installed inhard disk drive 710. These computer program products are means forproviding software to computer system 700.

Computer programs (also called computer control logic) are stored inmain memory 706 and/or secondary memory 708. Computer programs may alsobe received via communications interface 720. Such computer programs,when executed, enable the computer system 700 to implement the presentdisclosure as discussed herein. In particular, the computer programs,when executed, enable processor 704 to implement the processes of thepresent disclosure, such as any of the methods described herein.Accordingly, such computer programs represent controllers of thecomputer system 700. Where the disclosure is implemented using software,the software may be stored in a computer program product and loaded intocomputer system 700 using removable storage drive 712, interface 714, orcommunications interface 720.

In another embodiment, features of the disclosure are implementedprimarily in hardware using, for example, hardware components such asapplication-specific integrated circuits (ASICs) and gate arrays.Implementation of a hardware state machine so as to perform thefunctions described herein will also be apparent to persons skilled inthe relevant art(s).

CONCLUSION

It is to be appreciated that the Detailed Description section, and notthe Abstract section, is intended to be used to interpret the claims.The Abstract section may set forth one or more, but not all exemplaryembodiments, and thus, is not intended to limit the disclosure and theappended claims in any way.

The disclosure has been described above with the aid of functionalbuilding blocks illustrating the implementation of specified functionsand relationships thereof. The boundaries of these functional buildingblocks have been arbitrarily defined herein for the convenience of thedescription. Alternate boundaries may be defined so long as thespecified functions and relationships thereof are appropriatelyperformed.

It will be apparent to those skilled in the relevant art(s) that variouschanges in form and detail can be made therein without departing fromthe spirit and scope of the disclosure. Thus, the disclosure should notbe limited by any of the above-described exemplary embodiments, butshould be defined only in accordance with the following claims and theirequivalents.

1. A system for detecting and monitoring an unmanned aerial vehicle(UAV) unauthorized to enter air space of a facility, the systemcomprising: a fixed monitoring device configured to: detect the UAVattempting to enter the air space of the facility by detectingtransmission of a signal from the UAV and identifying a location of theUAV and a speed of the UAV based on the detected transmission; generatean alert indicating that the UAV has been detected; and transmit thealert; a contraband monitoring center configured to: receive the alertfrom the fixed monitoring device; and perform an intervention operationin response to the alert.
 2. The system of claim 1, wherein the fixedmonitoring device includes a directional antenna that is pointed towardsthe facility or away from the facility and configured to detect the UAV.3. The system of claim 1, wherein the fixed monitoring device includes avirtually controlled quad antenna system configured to detect the UAVbased on Doppler effect and triangulation.
 4. The system of claim 1,wherein the fixed monitoring device includes an omnidirectional antennaconfigured to detect the UAV by intercepting a Global Positioning System(GPS) signal of the UAV.
 5. The system of claim 1, wherein the fixedmonitoring device includes an infrared camera configured to detect heatpatterns of the UAV.
 6. The system of claim 1, wherein the fixedmonitoring device includes a microphone element configured to detect theUAV by tuning into an audio frequency of a propeller system in the UAV.7. The system of claim 1, wherein the contraband monitoring center isfurther configured to: receive information from the fixed monitoringdevice, wherein the information comprises an indication that the UAV isapproaching the air space of the facility, the location of the UAV, andthe speed of the UAV.
 8. The system of claim 7, the system furthercomprising: a projectile launcher, wherein the contraband monitoringcenter is further configured to perform the intervention operation byproviding the information from the fixed monitoring device to theprojectile launcher.
 9. The system of claim 8, wherein the projectilelauncher is configured to launch an object at the UAV based on theinformation from the fixed monitoring device.
 10. The system of claim 7,the system further comprising: a capture drone, wherein the contrabandmonitoring center is further configured to perform the interventionoperation by providing the information from the fixed monitoring deviceto the capture drone.
 11. The system of claim 10, wherein the capturedrone is configured to intercept the UAV based on the information fromthe fixed monitoring device.
 12. The system of claim 1, wherein thefixed monitoring device is further configured to: perform GlobalPositioning System (GPS) spoofing by emitting a false GPS signal; andadjust a trajectory of the UAV according to the false GPS signal. 13.The system of claim 12, wherein the false GPS signal comprises a signalstrength stronger than a real GPS signal.
 14. The system of claim 1,wherein the fixed monitoring device comprises a kiosk or a wirelessaccess point in the facility. 15-20. (canceled)
 21. A system fordetecting and monitoring an unmanned aerial vehicle (UAV) unauthorizedto enter air space of a facility, the system comprising: a fixedmonitoring device configured to: detect the UAV attempting to enter theair space of the facility by detecting transmission of a signal from theUAV and identifying a time, a location of the UAV, and a speed of theUAV based on the detected transmission; generate an alert indicatingthat the UAV has been detected, the alert including the time of when theUAV was detected; and transmit the alert; a contraband monitoring centerconfigured to: receive the alert from the fixed monitoring device;generate an intervention operation for intervening with communicationsto or from the UAV based on the alert; and perform the interventionoperation.
 22. The system of claim 21, further comprising: a projectilelauncher, wherein the contraband monitoring center is further configuredto perform the intervention operation by providing the time, thelocation of the UAV, and the speed of the UAV to the projectilelauncher, and wherein the projectile launcher is configured to launchobjects at the UAV.
 23. The system of claim 21, further comprising: acapture drone, wherein the contraband monitoring center is furtherconfigured to perform the intervention operation by providing the time,the location of the UAV, and the speed of the UAV to the capture drone,and wherein the capture drone is configured to intercept the UAV.
 24. Asystem for detecting and monitoring an unmanned aerial vehicle (UAV)unauthorized to enter air space of a facility, the system comprising: afixed monitoring device configured to: detect the UAV attempting toenter the air space of the facility by detecting transmission of asignal from the UAV; generate an alert indicating that the UAV has beendetected, the alert including a location of the UAV and a time of whenthe UAV was detected; and transmit the alert; a contraband monitoringcenter configured to: receive the alert from the fixed monitoringdevice; and perform an intervention operation in response to the alert.25. The system of claim 24, wherein the contraband monitoring center isfurther configured to: generate instructions as part of the interventionplan for the fixed monitoring device to generate a jamming signal or amanaged access signal.
 26. The system of claim 24, wherein the fixedmonitoring device is further configured to: perform Global PositioningSystem (GPS) spoofing by emitting a false GPS signal; and adjust atrajectory of the UAV according to the false GPS signal.