Systems and methods for detecting and controlling transmission devices

ABSTRACT

A method of detecting, controlling and managing transmission of a transmitting device within a facility is disclosed. The method involves transmitting information to the transmission device, detecting a response transmission from the transmission device by a least one transmission detection facility, extracting identification information associated with the transmission device in response to the transmitted information; and determining a location of the transmission device based on the response transmission received by the at least one received transmission detection facility, wherein the response transmissions are sorted by the identification information, determining an allowability of the located transmission device within the set area and reducing a power level of a transmitted signal for a predetermined period of time, when allowability is indicated.

CLAIM OF PRIORITY

This application claims the benefit of the earlier filing date, pursuantto 35 USC §119, to that patent application entitled “Systems and Methodsfor Detecting and Controlling Transmission Devices” filed in the UnitedStates Patent and Trademark Office on Jul. 6, 2012 and afforded Ser. No.61/668,852, and, pursuant to §120, as a continuation-in-part

to that patent application entitled “System and Method of Detection ofTransmission Facilities,” filed in the United States Patent andTrademark Office on Aug. 28, 2010 and afforded Ser. No. 12/870,808,

-   -   which claimed the benefit of the earlier filing date, pursuant        to 35 USC 119, to U.S. Provisional App. No. 61/237,682, entitled        “Method and System for Determining a Location and Tracking of a        Wireless Device,” filed on Aug. 28, 2009 and to U.S. Provisional        App. No. 61/264,838, entitled “System and Method of Detection        and Allowing Access of Transmission Facilities, filed on Nov.        30, 2009 and to U.S. Provisional App. No. 61/307,838, entitled        “System and Method for Capturing and Controlling Transmission        Devices,” filed on Feb. 24, 2010 and further claimed the benefit        of the earlier filing date, pursuant to 35 USC §120, as a        continuation-in-part

to that patent application entitled “System and Method of Detection andAllowing Access of Transmission Facilities,” filed in the United StatesPatent and Trademark Office on Jul. 27, 2009 and afforded Ser. No.12/510,036, which claimed the benefit of the earlier filing date,pursuant to 35 USC 120, as a continuation-in-part;

to that patent application entitled “Tracking and Determining a Locationof a Wireless Transmission,” filed in the United States Patent andTrademark Office on Jun. 11, 2008 and afforded Ser. No. 12/157,530,which claimed the benefit of the earlier filing date, pursuant to 35 USC120, as a continuation-in-part;

to that patent application entitled “Systems and Methods of DetectionTransmission Facilities,” filed in the United States Patent andTrademark Office on Jul. 14, 2006 and afforded Ser. No. 11/457,786 (nowU.S. Pat. No. 8,078,190), which claimed the benefit of the earlierfiling date, pursuant to 35 USC §119, of U.S. Provisional App. No.60/699,281 filed on Jul. 14, 2005 and U.S. Provisional App. No.60/739,877 filed on Nov. 23, 2005. The entire contents of all of whichare incorporated by reference, herein.

This application further claims the benefit of the earlier filing date,pursuant to 35 USC §120,

as a continuation-in-part to that patent application entitled “WristBand Transmitter,” filed in the United States Patent and TrademarkOffice on Sep. 2, 2008 and afforded Ser. No. 12/231,437, which claimedthe benefit of the earlier filing date, pursuant to 35 USC §120,

as a continuation-in-part to that patent application entitled “Trackingand Determining a Location of a Wireless Transmission,” filed in theUnited States Patent and Trademark Office on Jun. 11, 2008 and affordedSer. No. 12/157,530, which claimed the benefit of the earlier filingdate, pursuant to 35 USC §120,

as a continuation-in-part to that patent application entitled “Systemsand Methods of Detection Transmission Facilities,” filed in the UnitedStates Patent and Trademark Office on Jul. 14, 2006 and afforded Ser.No. 11/457,786 (now U.S. Pat. No. 8,078,190), the entire contents of allof which are incorporated by reference, herein.

RELATED APPLICATION

This application is related to patent application entitled “Systems andMethods of Detection of Transmission Facilities,” filed on May 4, 2013,and afforded Ser. No. 13/887,300, which claimed the benefit, pursuant to35 USC 120, as a continuation that patent application entitled “Systemsand Methods of Detection Transmission Facilities,” filed in the UnitedStates Patent and Trademark Office on Nov. 19, 2011 and afforded Ser.No. 12/323,817, which claimed the benefit, pursuant to 35 USC 120,

as a continuation that patent application entitled “Systems and Methodsof Detection Transmission Facilities,” filed in the United States Patentand Trademark Office on Jan. 1, 2011 and afforded Ser. No. 12/983,294,which claimed the benefit, pursuant to 35 USC 120,

as a continuation that patent application entitled “Systems and Methodsof Detection Transmission Facilities,” filed in the United States Patentand Trademark Office on Jul. 27, 2009 and afforded Ser. No. 12/510,006,

which claimed the benefit, pursuant to 35 USC 120,

as a continuation that patent application entitled “Systems and Methodsof Detection Transmission Facilities,” filed in the United States Patentand Trademark Office on Jul. 14, 2006 and afforded Ser. No. 11/457,786(now U.S. Pat. No. 8,078,190), the contents of all of which areincorporated by reference, herein.

BACKGROUND

1. Field of the Invention

This invention relates to tracking and location of the field of wirelesstransmission and more particularly to the identification and determininga location of a wireless transmission device and controlling its use.

2. Background

There are many facilities, such as government buildings, and inparticular correctional facilities, such as prisons, that do not permitcellular phone usage or wireless transmission devices on the premises oreven possession of cellular phones being used by criminals. In earlierapplications we explained how to positively identify wirelesscommunication devices such as cell phone the premises or even possessionof cellular phones and PDA and locate them, track their movements andcontrol the use of the cell, if necessary.

Finding and preventing usage of cell phones and other transmissionfacilities is difficult, and a need exists for improved methods ofdetecting, locating, and managing the transmission of such devices.

SUMMARY OF THE INVENTION

Provided herein are methods and systems for locating transmissiondevices (or transmission facilities) such as cellular phones, cellphones, mobile phones, satellite phones, radios, transmitters, PDAs,beepers, pagers, walkie-talkies, email devices, instant messengerdevices, voice over IP devices, and other types of wirelesscommunication or transmission facilities whose possession is prohibited.In addition, control of the devices is important as such wirelessdevices are known to be used to detonate bombs, as in the case ofimprovised explosive devices. The methods herein are also to positivelyidentify, locate and track such transmission facilities. For example,the system provides the location and tracking of one or more individualswho utilize a wireless device to communicate and further determineswhether the individual is authorized to transmit within a general arealocal to the individual. In one aspect, law enforcement may beinterested in tracking the individual's identification and movements.

Methods relate to locating and managing the use and presence of wirelesscommunication facilities are further disclosed. Embodiments relate todetecting wireless devices when they transmit a signal are furtherdisclosed. Other embodiments relate to detecting of transmission deviceswhen the transmission devices (i.e., facilities) are in a non-activetransmission active state.

In embodiments the methods and systems disclosed herein include methodsand systems for detecting a transmitting device within an obstructionrich environment. The methods and systems may include detecting thetransmitting device within a wireless detection transmission facility;communicating signal information relating to the detected transmittingdevice from the wireless transmission detection facility to a centralunit; determining the location of the transmitting device; displayinginformation of the detection and location of the transmitting devicethrough a user interface; and providing the information to an actionfacility for causing actions related to the detected transmittingdevice. In embodiments, the wireless transmission detection facility isan antenna. In embodiments, the antenna is a dual dipole embeddedantenna. In embodiments, the dual dipole embedded antenna is tuned toreceive cell phone transmissions. In embodiments the dual dipoleembedded antenna is tuned to receive a frequency band of approximately700 to 950 MHz. In embodiments the dual dipole embedded antenna is tunedto receive a frequency band of approximately 1.7 to 2.0 GHz. Inembodiments the dual dipole antenna is tuned to receive signals infrequency bands of approximately 700 to 950 MHz and 1.7 to 2.0 GHz. Inembodiments the obstruction rich environment is a correctional facility.In embodiments the obstruction rich environment is a mall. Inembodiments, communicating the information relating to the detectedtransmitting device from the wireless transmission detection facility toa central unit involves wireless communications. In embodiments, thewireless communications are 802.11 communications. In embodiments,determining the location of the transmitting device is accomplishedthrough transmission triangulation. In embodiments location of thetransmitting device is accomplished through a known location of a singleantenna. In embodiments the location of the transmitting device isdetermined based on extrapolation of the receipt of a plurality ofreceived signals through a series of non-iterative linear equations.

BRIEF DESCRIPTION OF FIGURES

The systems and methods described herein may be understood by referenceto the following figures. It is to be understood that the figures anddescriptions of the present invention described herein have beensimplified to illustrate the elements that are relevant for a clearunderstanding of the present invention, while eliminating, for purposesof clarity only, many other elements. However, because these eliminatedelements are well-known in the art, and because they do not facilitate abetter understanding of the present invention, a discussion of suchelements or the depiction of such elements is not provided herein. Thedisclosure herein is directed also to variations and modifications knownto those skilled in the art.

FIG. 1 illustrates an exemplary transmission detection, identification,and reporting system in accordance with the principles of the invention.

FIG. 2 illustrates a system for detecting a transmission facility.

FIG. 3 illustrates exemplary antenna configurations.

FIG. 4 illustrates a first system configuration for detecting atransmission facility in a cell environment.

FIG. 5 shows a second system configuration for detecting a transmissionfacility in a cell environment.

FIG. 6 illustrates a block diagram relating to actions taken whendetecting transmission facilities.

FIG. 7 shows a transmission facility detection system wherein an antennaarray is used to determine location.

FIG. 8 shows a transmission facility detection system wherein a signalsource is differentiated between two adjacent rooms.

FIG. 9 illustrates a transmission facility detection systemconfiguration employing multiple antennas used to identify a location ofa signal source after detection of its presence.

FIG. 10 shows a schematic diagram of a system for detecting signals of atransmission facility.

FIG. 11 shows a schematic diagram of an alternate embodiment of a systemfor detecting a signal of a transmission facility.

FIG. 12 shows a schematic diagram of a main circuit board within asystem for detecting transmission facilities.

FIG. 13 shows a schematic diagram of a sub-station in a system fordetecting transmission facilities.

FIG. 14 illustrates a null detection facility.

FIG. 15 Illustrates a system for detecting and controlling atransmission facility.

FIG. 16 Illustrates a system for tracking and locating transmissionfacilities.

FIG. 17 Illustrates an exemplary corrections facility designed forautomation.

FIG. 18 illustrates a system for implementing the processing describedherein.

FIG. 19 illustrates an exemplary process for determining location inaccordance with the principles of the invention.

FIGS. 19A and 19B illustrates an exemplary geographical representationto determine power allocation in accordance with the principles of theinvention.

FIGS. 20A and 20B illustrates exemplary distance and power graphsassociated with the network configuration shown in FIG. 19B.

FIG. 21 illustrates a second example of an exemplary cellular networkconfiguration.

FIGS. 22, 23, and 24 illustrate exemplary power graphs associated withthe network configuration shown in FIG. 21.

FIG. 25 illustrates a superposition of the graphs shown in FIGS. 22, 23,and 24.

FIG. 26 illustrates an exemplary power transmission in accordance withthe principles of the invention.

FIG. 27 illustrates a flow chart of an exemplary process for determiningpower transmission in accordance with the principles of the invention.

FIG. 28 illustrates an exemplary process and options for controllingwireless transmission within an area in accordance with the principlesof the invention.

FIG. 28A illustrates an alternative exemplary process and options forcontrolling wireless transmission within an area in accordance with theprinciples of the invention.

FIG. 29 illustrates an exemplary methodology of allowing communicationsvia a wireless communication device within a controlled area and optionsfor controlling wireless transmission within the area in accordance withthe principles of the invention.

FIG. 29A illustrates an exemplary methodology of allowing communicationsvia a wireless communication device within a controlled area and optionsallowing phones to communicate in accordance with the principles of theinvention.

FIG. 30 illustrates an alternative exemplary methodology forcommunicating when controlling wireless transmission within an area inaccordance with the principles of the invention.

FIG. 31 illustrates an exemplary process for controlling and processinga wireless transmission in accordance with the principles of theinvention.

FIG. 32 illustrates an exemplary base station power grid matrix tostimulate cell phones in standby mode.

FIG. 33 illustrates a second exemplary base station power grid matrix tostimulate cell phones in standby mode.

DETAILED DESCRIPTION OF THE INVENTION

Detection of a transmission facility, such as a mobile phone orhand-held radio transmitter, or other transmission facility as describedherein, within an obstruction rich environment, such as a facility withmany physical barriers to electronic transmission, is difficult toachieve. Referring to FIG. 1, the transmission detection,identification, and reporting system 100 described herein provides amethod of detecting a transmission facility 202, such as depicted inFIG. 2, within an environment rich in obstructions 102. One embodimentof the transmission detection, identification, and reporting system 100may involve the detection of a mobile phone within a heavily walled andmetal-barred government facility such as a correctional facility. Inthis embodiment, the system may utilize an array of antennas 104selectively placed within the facility, collection substations 108 forlocalized collection of detected signals, a central unit 110 for theprocessing of incoming signals from the facility, a display 1975 forshowing the location of the detected transmission facility 202, and anaction facility 114 for implementing standard procedures in the event ofa detection. In this embodiment, the communications between the antennas104 and the substations 108, and between the substations 108 and thecentral unit 110, may be wireless to make installation and maintenanceof the system within the facility cost and time effective. Selectiveplacement of the antennas 104, combined with algorithms and methods fordetermining location of the transmission facility 202, may allow asubstantially improved means for locating transmission facilities 202,such as mobile phones, in an otherwise heavily shielded environment.

In embodiments the antenna 104 may be a multi-dipole embedded antenna.Two examples of dual dipole embedded antennas are provided in FIG. 3 asa first dual-dipole embedded antenna 302 and a second dual dipoleembedded antenna 304. In embodiments the antenna may be adapted toreceive one, two, three, four, or more bandwidths. In embodiments theantenna 104 may be selected as one or more of a dipole antenna 104, aYagi-Uda antenna 104, a loop antenna 104, a quad antenna 104, amicro-strip antenna 104, a quad antenna 104, a helical antenna 104, anda phase array antenna 104, a patch antenna or a combination thereof.

In embodiments, the transmission facility 202 may be a mobile phone,such as a flip phone, a slide phone, a cellular phone, a handset, asatellite phone, a 3G phone, a wireless phone, a cordless phone or thelike. In embodiments, the transmission facility 202 may be a radio, suchas a Walkie-Talkie, a mobile radio, a short-wave radio, or the like.

In embodiments, the transmission band from the transmission may bewithin the radio or other electromagnetic frequency spectrum, such asextremely low frequency (ELF), super low frequency (SLF), ultra lowfrequency (ULF), very low frequency (VLF), low frequency (LF), mediumfrequency (MF), high frequency (HF), very high frequency (VHF), ultrahigh frequency (UHF), super high frequency (SHF), extremely highfrequency (EHF), microwave, and/or a frequency suitable for 802.11xwireless communications, ultra wide band (UWB), Bluetooth, or the like.

In embodiments, the obstruction rich environment 102 may be a building,such as a corrections facility, a school, a government facility, astore, a mall, a residence, a hotel, a motel, or the like. Inembodiments, the obstruction rich environment 102 may be a largeconfined space, such as a courtyard, a food court, a recess area, ahallway, greenhouse, recreation room, gymnasium, auditorium, kitchen,cafeteria, craft area, work area, library, prison yard, or the like. Inembodiments, the transmission obstruction materials such as cinderblock,cement, rebar, wire cage, metal, metal coated surface, or the like. Inembodiments, the obstructions in the obstruction rich environments 102may be other construction materials, such as wood, glass, rug, flooringmaterials, roofing materials, and the like.

In embodiments, the transmitting signal information from the antenna 104module to the central unit 110 may be through a communicationsconnection, such as an IEEE 802.15.4 wireless network, IEEE 802.11Wi-Fi, Bluetooth, Ethernet, and/or other similar type wirelesscommunication protocols. In embodiments, the communications connectionmay utilize CAT-5, RJ-45, RS-232 connections, and/or other similar typewired communication protocols and hardware. In embodiments thecommunications connection may utilize an optical connection, such as awireless infrared link, wireless visible light, an optical fiber, andthe like.

In embodiments, the transmitting signal information from the antenna 104module to the central unit 110 may contain data, such as CDMA, CDPD,GSM, TDMA, and the like, and may be used to discriminate which servicesignal is being used, such as Verizon, Cingular, T-Mobile, Sprint, andthe like. The detection of the cell phones may be further resolved downto cell phone manufacturer and cell phone provider.

In embodiments, the transmitting signal information to the central unit110 may be made through an intermediate connection, such as a substation108, router, switch, hub, bridge, multiplexer, modem, network card,network interface, processing unit, preprocessor, computer, repeater,antenna 104, and the like. (see FIG. 2).

In embodiments, the central unit 110 may have in part a computer, acomputer system, a network of computers, a state machine, a sequencer, amicroprocessor, a digital signal processor, an audio processor, apreprocessor, a microprocessor, and the like.

In embodiments, the central unit 110 may process information, such aslocation information, such as the location of people, inmates,corrections personnel, visitors, all personnel within the facility,equipment, resources, weapons, products, incoming goods, outgoing goods,and the like. In embodiments, the information may be a type of signal,such as mobile phone standard protocols such as CDMA, CDPA, GSM, TDMA,and the like. In embodiments, the information may be an eventnotification, such as personnel under duress, an emergency medicalcondition, a call for assistance, a fire, a call for police, a theft,and the like. In embodiments, the processed information may allow forthe tracking of the person or object in possession of the transmissionfacility 202, such as a mobile phone, a radio, a weapon, a product, aresource, and the like. In embodiments, the processed information mayallow for the discrimination and/or association between people orobjects, such as determining the ownership of the transmission facility202, the assignment of the source of transmission, current location of atransmission facility 202 compared to its predicted location, and thelike. In embodiments, the processed information may also have time codesand unique identifiers assigned.

In embodiments, the central unit 110 may have a display 1975, such as acathode ray tube (CRT), liquid crystal display (LCD), electronic paper,3D display, head-mounted display, projector, segmented display, computerdisplay, graphic output display, and the like. In embodiments, thecentral unit 110 may have an action facility 114, comprising a userinterface for causing actions relating to the detected transmissionfacility 202. Actions may for example represent operations such asclosing a door, sealing a room, deploying and action signal, initiatingan alarm, and the like.

In embodiments the functions of a central unit 110 as described hereinmay be replaced by an alternate configuration, such as a configurationof multiple computers, such as a group of servers, processors, or thelike, operating in parallel. In embodiments the methods and systemsdescribed herein may involve locating computing capabilities inalternative network configurations, such as in a mesh network or apeer-to-peer network.

In embodiments, the location of a transmission facility 202 may bedetermined by various radiolocation or signal measurement techniques,including measuring phase, amplitude, time, or a combination of these;or by identifying and locating an area associated with an antenna 104with the highest signal strength. In embodiments, the location of atransmission facility 202 may be determined when the transmissionfacility 202 is powered off though detection of a null in the band-passof a transmitted frequency sweep due to the presence of a mobile phoneantenna.

In embodiments, a method of detecting a transmission facility 202 (e.g.cell phone) when the transmission facility 202 is not powered mayrequire a transmitting device and a receiving device that can recognizethe signature of an antenna 104 associated with the transmissionfacility 202. By transmitting a known frequency and receiving thedisturbance pattern produced by having a particular antenna 104 designin the transmission path, the pattern or ‘signature’ of that antenna 104can be characterized. In embodiments, this characterization may beevaluated by central unit 110 with results output to a display 1975. Adatabase of these signatures can be placed into the unit, and as thetransmitter sweeps across the various cell frequencies, a patternreceived can be matched against the database patterns to determine thepresence of transmission facilities 202. In embodiments, any class ofantenna (e.g. WI-FI, Blackberry, Walkie-Talkie, etc.) can be classifiedand identified.

In embodiments, the range of a hand held device that can detect aninactive transmission facility is approximately 10 feet. In embodiments,greater distances could be attained for stationary units by increasingthe power.

Radiolocation, also referred to as radio-determination, as used herein,encompasses any process of finding the location of a transmitter bymeans of the propagation properties of waves. The angle, at which asignal is received, as well as the time it takes to propagate, may bothcontribute to the determination of the location of the transmissionfacility 202. There are a variety of methods that may be employed in thedetermination of the location of a transmission facility 202. Methodsinclude (i) a cell-sector system that collects information pertaining tocell and sector ID's, (ii) the assisted-global positioning satellite(GPS) technology utilizing a GPS chipset in a mobile communicationfacility, (iii) standard GPS technology, (iv) enhanced-observed timedifference technology utilizing software residing on a server that usessignal transmission of time differences received by geographicallydispersed radio receivers to pinpoint a user's location, (v) timedifference of arrival, (vi) time of arrival, (vii) angle of arrival,(viii) triangulation of cellular signals, (iix) location based onproximity to known locations (including locations of otherradio-transmitters), (ix) map-based location, or any combination of anyof the foregoing, as well as other location facilities known to those ofskill in the art.

Obstructions to radio wave propagation in the obstruction richenvironments 102 may greatly reduce the effectiveness of many of theconventional radiolocation methods due to obstruction of theline-of-sight between the transmission facilities 202 and the receivingantennas 104. However, by employing a large array of antennas 104,positioned so as to maintain line-of-sight between possible transmissionfacility 202 locations and the receiving antennas 104, several of thesemethods may be effectively used in the location of the transmissionfacility 202. These methods include time difference of arrival, time ofarrival, and angle of arrival, amplitude comparison, and the like. Thetime difference of arrival method determines the difference in the time,or the difference in phase, of the same radio-transmitting signalarriving at different receiving antennas 104. Together with the knownpropagation speed of the radio wave, allows the determination of thelocation of the transmission facility 202. The time of arrival methoddetermines the absolute time of reception of the signal at differentreceiving antennas 104, and again, along with the known propagationspeed of the radio wave, allows the determination of the location of thetransmission facility 202. The angle of arrival method utilizesdirection of transmission to different antennas 104 to determine thelocation of the transmission facility. Amplitude comparison methodcompares the strength of the signal detected at each antenna todetermine the location of a transmission facility 202. For example, twoantennas 104 located in the same room would detect different signalamplitudes for the same transmission facility 202 output, therebyproviding a means of determining which antenna 104 the transmissionfacility 202 is closer to. Increasing the number of antennas 104therefore increases the resolution with which the location of thetransmission facility 202 may be determined. All of these methods, andcombinations of these methods, may employ mathematical processes such astriangulation, tri-lateration, multi-lateration, or like, in determiningthe location of the transmission facility.

Triangulation is the process of finding coordinates and distance to apoint by calculating the length of one side of a triangle, givenmeasurements of angles and/or sides of the triangle formed by thatpoint, such as the target transmission facility 202, and two other knownreference points, such as the receiving antennas 104. The calculation ofthe location of the transmission facility 202 may then be performedutilizing the law of Sines from trigonometry. Tri-lateration is a methodsimilar to triangulation, but unlike triangulation, which uses anglemeasurements, together with at least one known distance, to calculatethe subject's location, tri-lateration uses the known locations of twoor more reference points and the measured distance to the subject, suchas the transmission facility 202, and each reference point, such as thereceiving antennas 104. Multi-lateration, or hyperbolic positioning, issimilar to tri-lateration, but multi-lateration uses measurements oftime difference of arrival, rather than time of arrival, to estimatelocation using the intersection of hyperboloids.

While several radiolocation and triangulation techniques have beendescribed in connection with locating the transmitting device, it shouldbe understood that one skilled in the art would appreciate that thereare other location methodologies and such location methodologies areencompassed by the present invention. For example, in embodiments, thelocation of a single antenna may be known and the single antenna maydetect a transmitting device. The location of the transmitting devicemay be estimated through its known proximity to the single antennalocation. This may provide adequate location resolution for certainapplications of the technology. Similarly, two or more antennas may beused and each of the antenna locations may be known. When each of theantennas receives a transmission, the corresponding signal strengths maybe compared. The one with the highest signal strength may be determinedas the one closest to the transmitting device so the correspondingantenna location may provide enough location resolution for certainapplications.

In an embodiment of the transmission detection, identification, andreporting system 100, a corrections facility, with its substantial andinherent obstruction rich environment 102, presents a significantchallenge to authorities of the correction facilities. In an embodimentof the invention shown and described herein, the system may be placedthroughout the corrections facility for the purpose of alerting thecorrections staff that cell phone activity is taking place, the locationof the activity and the type, i.e., Nextel, T-Mobile, Verizon, and thelike. The following technology may also allow for a standalone detectionunit 408 or set of detection units 408 (see FIG. 4) to detect cellphones in schools, buildings and other environments in which thefacility's or area's provider does not wish the use of cell phones andis interested in the detection of cell phone use.

In an embodiment, the system may include an integrated antenna 104 andRF detector (together referred to as a detector unit 408) (FIG. 4), asubstation 108, (FIG. 1) whose purpose may be to communicate with eachdetector unit 408 within its sector, and report activity to the centralunit 110; which reports confirmed activity, type of cell phone, andlocation to the display 1975 of the central unit 110. These detectionunits 408 may be used individually or in conjunction with each other andmay triangulate detection within a specific area. The outside yard areasmay be monitored by detection units 408, which may cover large areas,such as 25×25 foot sectors or smaller areas, e.g., 5×5 foot sectors, tolocalize the detection of a cell phone (i.e., wireless transmissionfacility) and track its position from one sector to any adjoiningsector. That is, as the person moves with a phone, the changing positionof that phone may be reported. If the phone moves inside the facility,tracking may continue as interior detection units 408 detect the phone.

In an embodiment, within these basic groups of detection units 408 maybe various detection unit 408 types. Some detection unit 408 types maybe designed to be hard wired via RJ-45 connectors and/or CAT 5e cable,other detection units 408 may use 802.11b (WI-FI) wirelesscommunications between detection units 408, and there may also be anInfra-Red (IR) set of detection units 408, which utilize opticalcommunications techniques. Each communications type may have a specificpurpose within the corrections facility or other type of building and/orareas. Hard-wired units may be used when it is not possible to useeither an optical unit or a WI-FI unit. When there are walls embeddedwith metal or where the distance and the obstructions 102 may preclude awireless technique. WI-FI detection units 408 may be used when it iseffective to communicate in an area where there are obstructions 102such as cement walls or cement with embedded rebar walls, facades, andthe like. Optical detection units 408 may be used in areas where clear,line-of-site communications may be possible. Optical detection units 408may operate over relatively long distances, (e.g., 3,000 feet), whileWI-FI detection units 408 may be limited to shorter distances, such as250 feet.

In an embodiment, there may also be a hand-held detection units 408 tobe used once a cell phone has been detected, and the correctionsofficer(s) or monitor are attempting to pinpoint the location. Thishand-held detection unit 408 may be similar to the integratedantenna/detector unit of the main system. This embodiment may alsoinclude a detector, discriminator and decoder module. The hand-helddetection units 408 may detect and identify each cell phone and comparethe cell phone identity to the allowed cell phone user list or in thiscase to a list of unauthorized cell phones. This detector unit 408 mayoutput an audible alarm whose pitch changes as the signal becomesstronger or weaker.

In an embodiment, a second type of hand-held detector unit 408 may beused to detect a cell phone when it is either off or in a standbycondition, also referred to as null detecting. Null detection may beused at an ingress or egress of a building or an area as a way ofdetecting a communication device or device with an antenna. Thistechnique may be used in areas where it is unpractical, unwanted orunwarranted to have x-ray machines or more intrusive detection systems.A null detection system may also be deployed in a handheld device so aninspector can move through an area attempting to detect a communicationdevice. In embodiments, the null detection system may detect thepresence of a transmission facility even when the transmission facilityis not transmitting a signal. In embodiments, a hand held or mountednull detection device may be used in a correctional institution or othergovernment facility.

In embodiments, null detection may utilize a transmission-detectionsource, independent of the transmission source being detected, which iscapable of sweeping across the frequency spectrum of interest andreceiving it's returning signal. The transmission source sweeps thespectrum of interest, searching for distortions in the returned field.Distortions in the spectrum may be due to the presence of an antenna ofa transmission facility 202. Matching the distortion, also referred toas a null in the band pass, to characteristics of known antennas usedwith mobile phones may allow the detection and/or identification of thetransmission facility 202. The unit may output an audible “beep” if itdetects a null, allowing the officers to focus in on the location of thecell phone. The range of the hand-held detection units 408 may be, forexample, 15 to 20 feet. This will allow cell phones that are in theimmediate vicinity to be quickly detected. The null detection may beapplicable for ingress and/or egress detection.

In an embodiment, a survey may be performed to determine optimalplacement and the type and number of detection units 408 required. Thiswill insure the minimum number of required detection units 408 toperform optimal detection. The team may provide a report detailing thelayout determined to be optimized for the facility and may review thisreport with the facilities staff so that any required modifications tothe plan may be incorporated before installation is begun.

In an embodiment, the initial coverage of a facility may be in the cellblocks 402 (FIG. 4) and/or pod areas. The same may be true for linearfacilities. The survey may cover the entire facility, including openareas, such as courtyards, where required. Inmate also work in largeyard and plantations such as Angola State Prison, it is anticipated thistechnology may be deployed over a large outside area.

In an embodiment, the cell block detection units 408 may be mountedinside each chase 404 (a column positioned between cells in a cell blockthat includes various utility facilities, such as plumbing andelectricity), as shown in FIG. 4, and may communicate to a substation108 (not shown in FIG. 4) located at one end of the block. Thisdetection unit 408 may communicate its information to the central unit110 so that tracking, confirmation, and display may be accomplished. Forlinear facilities 500, as shown in FIG. 5, detector units 408 may bemounted along the walls in the obstruction rich environment 102 oppositethe cells 402 and perform their function similar to the detection units408 mounted within a chase 404.

In an embodiment, detector units 408 may be installed in open areas suchas gymnasiums, kitchens, cafeterias, craft and work areas and other openareas where a cell phone may be used. The difference in these locationsfrom the cell blocks 402 may include the method of detection andtracking. Since most facilities may only require the identification of acell phones presence within a room, and there could be many inmateswithin that room, the process may be to lock-down the room, or rooms, inthat area and use a hand held device and a physical search to pinpointthe phone location. A generalized block diagram of a detector unit 408is shown in FIG. 6. For those facilities that require resolving thelocation within a large interior room or area, the use of triangulationto resolve to a 10×10 foot area may be used.

In an embodiment, facilities with the requirement to detect cell phones202 in outside yard areas, the use of triangulation to a 25×25 footspace or smaller foot space (e.g., 5×5 foot) may be constructed. As aphone 202 is moved from area coverage 702 to area coverage 702, thesystem may track its movement. Each square foot sector may overlap anadjoining sector. In this way, as shown in FIG. 7, tracking may becontinuous, without any gaps.

In an embodiment, it may also be important to know whether a phone islocated on one side of an obstruction or the other, such as doors,walls, and the like. If the wrong room is identified, it may make itmore difficult to locate a phone and its user. As shown in FIG. 8,detection of the correct room may depend upon the level of the signalreceived. Proper placement of the detector units 408 may insure that thephone may be identified in the correct location.

In an embodiment, when sectoring a large room such as a gymnasium, thenumber and placement of antennas 104 may be critical. In order to sectorlarge regions, such as a 10×10 foot section, within the room, theantenna 104 may need to be capable of narrowing their window to an areasmall enough to meet the requirement. In FIG. 9, there is shown anomni-directional antenna 104, which detects signal presence generally ina 360 degree direction. Once a signal crosses a threshold, the directionfinding antennas 104 may be turned on to determine the position of thesignal. This may be reported to the display 1975 and tracked until it iseither turned off or moves to another room or hallway. Then, normalpositional tracking may take place. It is to be understood that thefigures and descriptions of the present invention described herein havebeen simplified to illustrate the elements that are relevant for a clearunderstanding of the present invention, while eliminating, for purposesof clarity only, many other elements. However, because these eliminatedelements are well-known in the art, and because they do not facilitate abetter understanding of the present invention, a discussion of suchelements or the depiction of such elements is not provided herein. Thedisclosure herein is directed also to variations and modifications knownto those skilled in the art.

In an embodiment, the transmission detection, identification, andreporting system 100 may work in conjunction with a personal alarmsystem, or an inmate tracking system, or a combination of all three andthe like. This dual/tri role system(s) may allow for more cost effectiveuse of the detection units 408 and provide for greater protection forthe correctional officer and inmate alike. This detection system mayutilize an individualized frequency, with known frequency separationbetween detection units 408 and between corrections officer'sfrequencies and Inmate frequencies. The detection configuration of thedetection units 408 may provide complete coverage of the facility. Eachtransmission facility unit may be continually tracked throughout thefacility. At all ingress or egress points the focus of the detection mayensure accurate location of all correctional and inmate personnel. Withthe combined systems more detection units 408 may be needed to ensurefull coverage. In an embodiment, the known identity of the transmissionfacility, in this case a cell phone being carried and/or used by anofficer or inmate can be accurately associated with another knownidentity of another transmission facility, in this case a correctionsofficer and/or inmate wearing a transmission facility. In thisembodiment, the use of an authorized cell phone or an authorizedtransmission facility by an unauthorized person can be accuratelydetected and reported. This embodiment can be utilized inside thefacility or outside the facility.

In an embodiment, the transmission detection, identification, andreporting system 100 may allow for cell phone owner discrimination. Thesystem may provide for the allowance of authorized cell phones withinthe prohibited area. The system may detect and identify each cell phoneand compare the cell phone identity to the allowed cell phone user list.The system may record all phone use and may automatically alert thefacility of all prohibited cell phone use. In addition, each cell phonedetection event may be identified with a unique identifier and timecode, to ensure proper identification. The CCTV system may also beintegrated to ensure greater accuracy identifying illegal use ofwireless transmission devices.

The cell scan-1 detection system 1000, shown in FIG. 10, is anembodiment of a system for detecting signals of a transmission facility.Antenna 104 receives transmission signals from wireless transmissiondevice (not shown). Antenna 104 may operate, for example in the range of2.4 GHz with a bandwidth of 465 MHz. The received signals are thenprovided to a low pass filter and a log amplifier, wherein the level ofamplification is based on the input level of the input signal. Theamplified signal is next provided to a shaping filter and an operationalamplifier. The amplified signals are provided to an analog-to-digital(ADC) converter and provided to a Field Programmable Gate Array (FPGA).Information from the FPGA may be provided to a microprocessor tosupplement the processing and control imposed by the FPGA. The FPGA mayreceive information from dedicated frequency bands (e.g., 900 MHz) orfrom known wireless protocols (e.g., 802.15.4). The microprocessor maythen determine whether a detected transmission facility for example is aperson with a transmission facility (e.g., wristband, a cell phone) andmay allow or prevent that person from accessing an area. Themicroprocessor may also alert the central unit of the persons enteringor desire to enter a restricted area. In another embodiment, if thetransmission facility, for example, is a cell phone and the cell phonewas in use within a restricted area, the cell phone would be identifiedby the central unit as being in a restricted area, then the system willdetermine whether the cell phone is authorized or not authorized, thenthe system would make a determination, based upon set rules whether toallow or disallow the transmission unit within the restricted area.

The cell scan-1 detection system 1000, shown in FIG. 10, is anembodiment of a system for detecting signals of a transmission facility.An antenna 104 receives wireless transmission facilities in a 2.4 GHzband, with a 465 MHz antenna. In other aspects, the detection system maydetect signals in other frequency bands, for example, 933 MHz, 433 Mhz,2.4 GHz and other known frequencies. The detected signals are providedto High and Low band RF filter. The RF filters (band pass filter)isolate sets of frequencies for greater sensitivity. For example, thereceived signals may be provided to a low band RF filter to isolate lowband RF signals and high band RF filters to isolate high band RFsignals. The isolated RF signals are provided to Log Amplifiers thatamplify or boost the signals using known amplification methods. Theswitch between two Wi-Fi frequencies switches all three wireless signalinputs into a log amp circuit and then to a smoothing filter to clean upthe signals to be analyzed. The signals are then provided to anOperational Amplifier (Op Amp) which amplifies the received analogsignal. The amplified RF signal is then processed through an A/Dconverter which changes the signal into a digital signal. The signal isthen processed in a processing unit (in this case a dedicated FieldProgrammable Gate Array (FPGA)) and the results are then transmitted viaa dedicated 2.4 GHz transceiver unit. The 2.4 GHz transceiver unit hasseveral other applications, and is used to transmit and receivecommunication information and to connect to external Wi-Fi communicationdevices. An example of this is an education system for inmates, medicalmonitoring equipment in a hospital application, an interactive ID forsafe school applications. The 900 MHz transceiver unit is for sync-ingthe sensors. The 465 MHz transceiver unit is for communication withinmates bracelets and Staff (personal alarm system) as is furtherdiscussed in the aforementioned related patent applications. The lowerfrequency of the 465 MHz unit also provides better wall penetration andalternative wireless communication device with better wall penetration.In another embodiment, the front end of the signal detection circuit anamplifier (e.g., 0-40 db gain) is added before the RF filter (forexample a 824-849 MHz RF filter) to provide for greater sensitivity. Inadditional, a mixer and Voltage Controlled Oscillator (VCO) (not shown)is added after the RF filter. The output of the mixer is an IF(intermediate) frequency that is amplified and then provided to a bandpass filter (e.g., a 200 MHz filter with a bandwidth of 4 MHZ). Thesignal is then amplified and then provided to the Log Amp then to an OpAmp and then to the ADC (A/D). Depending on the noise floor (which isdetermined by proper grounding), one with an understanding of RFcircuitry would know to have proper impedance matching betweencomponents, and will utilize transformer(s) where appropriate. The IFsection's general parameters are 70 MHz to 350 MHz and sensitivity isrelated to frequency and the width of the band pass filter. As would beappreciated, the tighter the width of the band pass, the greater thesensitivity. In another embodiment, the VCO/mixer may be fixed and theIF band pass filter may be the bandwidth of a desired frequencyproviding for faster detection without the need to scan. Additionallythe greater the dynamic range of the sensor system the greater accuracyand resolution in determining the exact location of the transmissionfacility.

In an embodiment as shown in FIG. 10, the processing section may beplaced on a separate board, this provides for multiple sensors frontends utilizing one back end processing unit. This provide for more costeffective sensors and versatility of assets. This also allows forspecific functionality such as antenna array directional location andangle triangulation being synchronized to at least one processing unit.It is also anticipated the more expensive processing component be sharedsuch a transmission signal decoding, data analysis, communications andthe like.

The cell scan-2 detection system 1100, shown in FIG. 11, shows analternate embodiment of a system for detecting a signal of atransmission facility. The RF filters (i.e., band pass filter) isolatesets of frequencies for greater sensitivity, in this example a low bandcell phone signals and high band cell phone signals. The operation ofthe elements in FIG. 11 is similar to that of FIG. 10 and need not bediscussed in detail herein.

The main board system 1200, shown in FIG. 12, is an embodiment of a maincircuit board within a system for detecting transmission facilities. Thesystem may be used to determine each signal received is an actual cellphone signal and not a spurious output. Thus, a test may need to beperformed that checks for the ‘persistence’ of the received signal. Apersistence test may run a timer 1202 for a minimum required time thatmay be nearly as long as the time of the shortest signal type expected.If the signal is present at the end of the timeout period, it is lesslikely to be a spurious response and more likely that it is a cell phoneoutput. For example, if a GSM signal of 500 microseconds long is theshortest duration signal of all the cell phone protocols received, thepersistence test may run for 450 microseconds to further ensure that thereceived signal is not merely a spurious response.

The sub-station system 1300, shown in FIG. 13, is an embodiment of asub-station in a system for detecting transmission facilities.

FIG. 14 illustrates an embodiment of a null detector (1400), wherein theVCO in FIG. 14 tunes to known antenna frequencies and the system detectsa null in the known antenna frequencies in which the antenna isdetected. In embodiments, the null detection system may detect thepresence of a transmission facility even when the transmission facilityis not transmitting a signal. In embodiments, a hand held or mountednull detection device may be used in a correctional institution or othergovernment facility. In embodiments, null detection may utilize atransmission-detection source, independent of the transmission sourcebeing detected, which is capable of sweeping across the frequencyspectrum of interest and receiving its returning signal. Thetransmission source sweeps the spectrum of interest, searching fordistortions in the returned field. Distortions in the spectrum may bedue to the presence of an antenna of a transmission facility 202.

In embodiments of the system described herein, detection levels may bedetermined by which output levels are possible with the various cellphone technologies that are in use today. Since the system described isan amplitude system, the strongest and weakest possible signals must bedetermined in order to identify the system's required dynamic range.Cell phone signals vary from −22 dBW to 6 dBW and this range defines thedetection requirements of the system. This translates to a maximumsignal of 4.0 Watts at the antenna. The minimum value is equal to 0.006Watts or 6 milliwatts. Therefore, the dynamic range required is −52 dBmto +36 dBm. In order to achieve such a dynamic range, an amplifier thatis gain adjustable is required such that with an input value of +36 dBm,the amplifier is not saturated.

In the embodiment, the system determines the characteristics required toinsure that each cell phone is correctly identified. The amplitude ofeach signal is determined which allows the system to determine whichsensor has received the largest signal. The system time stamps each datasample so that other sensors receiving the same signal will berecognized as such when the data is presented for analysis. Each sensoranalyzes the wave shape of the signal detected. Each transmission type(i.e., CDMA2000, PCS, TDMA, GSM, IS-95, etc.) has a unique wave shape.These wave shapes allow the analysis software to recognize that signalsseen in different parts of a facility can be associated with each other(using time and wave shape) and the signal that consistently containsthe largest amplitude will be identified as closest to the cell phonetransmission

In embodiments of the invention, signals directed toward an IED(improvised explosive device) may be intercepted, identified and deniedservice. Such interception may be up to a known range in forward andside quadrants. The identification and determination of the position ofthe person or persons using a satellite phone and/or land-based cellphone may be determined. Cell phones, as well as other RF devices, e.g.,garage door openers, walkie-talkie, etc., may be captured, identifiedand/or jammed that are attempting to activate or contact the IED.

In embodiments of the invention, when a cell phone, for example, is on,but not in an active communication, the cell phone is essentiallyinvisible to anyone attempting to monitor cell phone activity. In orderto be aware of the existence of such “on but not transmitting devices”the system described herein operates as a cell tower. That is, thesystem actively addresses the problem of cell phone detection byoperating (becoming) the tower. A vehicle with similar (but modifiedequipment to that of a cell tower) may actively poll the area of phonesthat are “on but not in a communication of any sort. The vehicle (i.e.,Pseudo Tower) collects the current database of active phones and thosephones in standby from the tower(s) in the area and uses this data baseto poll these phones in order to locate them. Once potential phones thatcould be possible detonation cell phones are identified and located, thePseudo Tower would affect a handoff and make itself the active tower.Thus, the captured cell phones are not allowed to rotate back to (i.e.,connect to) the local cell phone tower, insuring that any callsattempting to communicate with the detonation cell phone will not besent. As one of the goals is to identify the person who is attempting tocontact the detonation cell phone, a call history of each suspect cellphone may be analyzed.

When a caller attempts to activate an IED, the caller's presence can beidentified. Furthermore, the call being made is not forwarded to thedetonation cell phone and the IED will not be activated. By determininga peak angle (triangulation) the caller's cell phone/satellite phonesignal, the direction of the caller is then known. Directionidentification is performed by using a technique such an interferometry.In this case, multiple antennas employing interferometry may be used toscan through the current cell phone traffic identifying first, candidatethreats and then, pinpointing high probability locations which can beviewed through a high powered binoculars to determine whether thecandidate is in need of investigation. Criteria for determining whichcell locations may be threats is a pole or road sign, etc. The PseudoTower may continue controlling all of the phones in the area, preventingany forwarding of calls until all possible threats have been cleared. Atthis point, the personnel have the option of going after the caller ordeactivating the IED, or both. It would be possible to clear the areaand detonate the device later if that is a desired plan of action.

Given the varying parameters by which detonation can take place, thePseudo Tower may also be designed to deny service to any active andinactive phone within a given geographical area and pinpoint thelocation of said phones.

Satellite cell phone transmission presents a somewhat different problem.Since the transmission from phone to satellite to phone is communicatedto a number of satellites, becoming a replacement for the satellite willrequire cooperation from the provider. Via one or more specific codes,the satellites may be told that the vehicle mounted satellite simulator(i.e., Pseudo Tower) will be taking over the control of phones within acertain radius. Since this is a moving or ever changing circle, thereplacement “satellite” will have to continuously update the actualsatellite of its position and which phones are being released and whichphones are being controlled. Once this function has been implemented,the control of the suspect phones is similar to that of the cell phone.Determining the caller's position and the location of the detonationphone is as above.

FIG. 15 illustrates an embodiment of a Cell Phone Detection, Control andPosition Identification system (1500) in accordance with the principlesof the invention which comprises cell phone jammer (1501) system thatcovers at least one of the known frequency ranges assigned to cell phoneor mobile communication devices. In this embodiment to cover all theknown frequencies and also used to stimulate wireless communicationdevices, a Power Unit (1502) provides the necessary power to run all theunits within the Cell Phone Detection, Control and PositionIdentification system 1500, Satellite Cell Phone Interface 1503 operatesas an interface and communications unit between the Cell PhoneDetection, Control and Position Identification system 1500 and asatellite cell phone provider (not shown), a Cell Phone Ground Interfaceunit 1504, which includes base station technology for all communicationdevices operating within an area of interest. Also shown is an optional300-350 MHz Jammer unit (1505) that operates to jam communicationdevices that communicate through an intermediary device, such as dooropeners, Walkie-Talkies and the like. It is anticipated that the systemdescribed herein is to be modular and expandable to cover the entirefrequency spectrum in which transmission facilities (cell phones, mobilecommunications devices) operate. The Computer Command I/O, User Displayand Interface 1506, comprises a communication, command and controlsystem (C³) that manages communication, command and control of thedetection system 1500. Unit 1506 may further comprise one or moredatabases, and/or processes to execute the processing described, herein.Although not shown it would be appreciated that Command I/O unit 1506may be in communication, via a public or private network, to one or moredevices to provide information to or obtain information from remotesites (not shown).

FIG. 16 Illustrates a block diagram of an embodiment of a Cell Phone andWireless Transmission Detection Facility in accordance with theprinciples of the invention. In the illustrated embodiment 1600, antenna1602 is a multi-band directional array that operates to detect signalsin a low band and in a high band (835 and 1.85 GHz range, respectively),a two way radio band (465 MHz), a Wi-Fi, a Bluetooth band (2.5 GHz) andPAL (Personal Alarm Locator) band (950 MHz). In the illustratedembodiment, the antenna connects to two components, first to a detector(1603) and also to a decoder (1604). The detector 1603 and decoder 1604decodes the PAL Identification signal and may further decode biometricinformation, emergency information. In other embodiments, detector 1603and decoder 1604 are configured to decode cell phone identifications.Antenna 1602 provides detected signals to a 6 way input switch (1605).The output of switch 1605 is connected to a wideband RF amplifier(1606). Wideband RF amplifier 1606 represents a variable gain amplifierthat adjusts the detected signal amplitude based on the band in which adetected signal is detected by antenna 1602. In another aspect of theinvention switch 1605 may be connected to a block gain amplifier (notshown) to provide amplification of the detected signal and the amplifieddetected signal may then be provided to a corresponding RF filter basedon the frequency band of the detected frequency.

The wideband RF amplifier 1606 is connected to a Logarithmic amplifier1607 (i.e., log amp) that amplifies the received or detected signalusing an logarithmic function. Log amplifiers are well-known in the artto provide a larger amplification of a weak signal and a smalleramplification of a strong signal. The output of Log amplifier 1607 isprovided to an Operational amplifier (OpAmp) 1608. The OpAmp 1608amplifies the input signal and provides the amplified input signal to anA/D converter 1609 for conversion of the input analog signal to adigital signal. The converted (i.e., digital) signal is then provided toa FPGA (Field Programmable Gate Array) 1610 for subsequent processing.FPGA 1610 controls the operation of the illustrated Cell Phone andWireless Transmission Detection Facility 1600 through feedback signalsto switch 1605, for example. FPGA 1610 controls which signal frequencyband and signal frequency is evaluated in what sequence. In theillustrated embodiment, FPGA 1610 communicates with the other sensorsand/or access points via a communication interface 1612. In one aspectof the invention, communication interface 1612 may communicate with oneor more wireless communication devices that operate using well-knownIEEE wireless standard communication protocols (e.g., 802.15 and802.11). In another embodiment, the communication interface may operateas a transceiver (transmitter/receiver) that may interface with two-waywireless transmission devices such as Walkie-Talkie or cellulartelephone phones. The FPGA 1610 also interfaces with a microprocessor1613, e.g., a Zilog Z86, an Intel xx86 series, Motorola Power PC.Processor 1613 may assist in the decoding, and operation of the CellPhone and Wireless Transmission Detection Facility 1600. FPGA 1610 andthe microprocessor 1613 may be synchronized by a crystal clock 1614. Inother embodiments of the invention, the communications may be via acategory 5 network interface connection in conjunction to thecommunication Interface 1612. Although an FPGA is referred to andillustrated in the embodiment of the invention, it would be recognizedby those skilled in the art that the processing described by the FPGAmay also be performed in other specific processor processors (e.g.,ASIC) or in a general purpose processor which when loaded with andexecuting an applicable software module converts the general purposeprocessor into a special purpose processor. As would be recognized, thesystem shown in FIG. 16 is similar to those shown in FIGS. 10 and 11.

Returning to the embodiment of the Cell Phone Detection, Control, andPosition Identification system shown in FIG. 15, control of a wirelesscommunication device (i.e., transmission facility 202) may utilizejammers, and/or transmitter to either prevent the wireless communicationdevice to receive or transmit information (preventing the triggering ofthe device), additionally the jammer/transmitter may be used tostimulate the transmission device and force the transmission device tore-acquire the base station technology, Wi-Fi, and 3rd party (in thisexample, when the wireless communication device re-acquires the basestation technology, it will attach to our base station (Pseudo-tower).To ensure wireless communication device acquires our base stations asopposed to the network's base station, we provide greater signalstrength drawing the wireless communication device to our base station.To facilitate the manipulation of incoming calls, the base station inFIG. 15 is backhauled to the actual wireless communication provider.This will provide for the ability to intercept all incoming calls,identify who the calls are and triangulate where those calls areoriginating from. In this embodiment, it is anticipated the incomingcaller is in visual range as the detonation device. The signal detectionsensors are deployed to locate the triggering communication device, aswell the detonating device. Another method in this embodiment to acquirewireless communications is to raise the signal strength of the basestation, in which the target wireless communication device sees thegreater signal and automatically acquires the greater signal. The goalof this embodiment is to acquire, control, and obtain location and/or tostimulate a wireless communication device, which may be, in an active,non-transmitting, state or in a standby state, then to take control ofsaid device, and prevent the device from detonating the IED.Additionally, this embodiment is designed to jam all communicationsdevices in which control in not possible; an example would be the cardoor opener device. In a preferred embodiment, such as in 3G and 4Gtechnology, an example a UMTS communication device, where encryptionkeys are required to communicate with cellular devices and there is aninterest to control such devices, such as in a prison environment, andthe Communication Control unit is not connected, and/or not beingprovided the encryption keys to communicate with the devices, and thesystem is not looking to disrupt the Commercial Cellular network,providing a greater signal then the commercial carrier, on the samefrequency, signal and with or without the same scrambling codes (PilotInformation) as the commercial cellular network, the cellular devicewill attempt to communicate with the Communication Control unitemulating a UMTS radio (without encryption keys), the cellular devicewill determine it cannot communicate and then is forced to a 2Gprotocol, then the system, can capture the cellular device and controlit. One of the downside to this technique, when the cellular device istrying to communicate with the Communication Control unit, the cellulardevice broadcasts its inability to communicate with the CommunicationControl unit, this signal is picked up by the Commercial Cellularnetwork and the commercial cellular network's Key Performance Indicators(KPI's) are degraded. To prevent this, in a preferred embodiment,jamming the uplink of the cellular device preventing the device fromcommunicating to the Commercial Cellular network and/or modifying theinstructing the cellular device's Maximum Allowed Uplink Transmit Powerto −50 db and the Inter-frequency Neighbor Cell Maximum Allowed UplinkPower to −50 db, will prevent the commercial cellular network fromreceiving the cellular devices signal and thus not distributing thecommercial cellular network's Key Performance Indicators (KPIs).

The embodiment shown in FIG. 15 utilizes a high level of signaldetection sensitivity to detect the presence of a wireless communicationdevice (transmission facility) within a known distance from thetransmission detection facility. In this embodiment, the application isinterested in two distinct communication devices; 1) the detonationdevice; 2) the trigger of the detention device. To take control of thedetonation device, understanding the communications of that device andthe communications device's access point is important. The controlsoftware is designed to first detect wireless communication devices inthe zone of interest, in this application (a roadside application) thesignal sensor provides a variable gain component with gain control over60 dB range with approximately −40 dB attenuation and +20 dB gain. (seeFIG. 16). This ability provides vary the sensitivity, depending on thetype of wireless communication detected, and provide a safe and adequatedistance from potential IED. The transmitter module also has a variablegain output to stimulate and jam different distances depending onspecific applications. Furthermore, the base station transceivertechnology provides viable gain to increase and/or decrease the captureradius as desired. Once the wireless communications devices within thearea of interest are captured by the base station, the systemconcentrates on the trigger wireless communication device. The samemethods as described above are used to detect and hone-in on thetriggering device. All sensors and transceivers have omni- anddirectional-capability, which increases their versatility. As mentionedearlier, signal power is a critical component when dealing with wirelesstransmission devices, the communication protocol typically, by design,causes communication with the largest available signal source.Typically, this is the closest source (i.e., base station), in our case,we are interested in all wireless communications devices within the areaof interest to be controlled by our base station technology.

In accordance with one embodiment of the invention, the jammer units1501 may jam or interfere with one or more frequencies or frequencybands to force wireless communication device within a local area to losecontact with an available base station and/or access point and toreacquire a connection to a local base station cell tower and/or accesspoint. When the transmission facility (wireless communication device)initiates a process (referred to as handshake) to re-acquire acommunication link with the available local base station cell tower, thecommunication link is diverted to, and re-acquired by, the detectionsystem 1500 (which is referred to as a pseudo-base station) due to thegreater signal power of the pseudo-base station or taking the actualbase station and/or access point off-line. In another aspect of theinvention, the pseudo-base station power is raised so as to be greaterthan an actual cell tower signal strength. The signal detection sensorsmonitor the signal strength of the actual cell tower output to thewireless communication devices and increases the transceiver output ofthe pseudo-base station to provide the adequate difference between theactual base station and the pseudo-base station to transfer the wirelesscommunication device from one base station to another. Thus, the cellphone, for example, will transition to the larger signal strength of thepseudo-base station and establish a communication with the pseudo basestation. In a further aspect of the invention, the pseudo-base stationmay actively poll the area for cell phone (transmission facilities), andtrigger the cell phones within an area of interest to cause the cellphones within the area to attach to the pseudo-base station.

In one aspect of the invention, where the application is to control thetransmission facility within a local area, and to prevent communicationsfrom reaching the transmission facility of interest, the pseudo-basestation may deny transmission of signals from the transmission facilityto an actual base station or deny transmission of signals from the basestation to the transmission facility. As mentioned earlier, in thelatter case, backhauling the pseudo-base station to the local carriernetwork will allow for the positive identification of the triggeringdevice, while still denying the ability to detonate the IED.

In an embodiment of the invention where it is important to identify andnot control the transmission facility within an area of interestproviding greater power, polling, control line request, interleavingexisting towers and/or jamming to force the transmission facility tocommunicate its identification parameters. In this embodiment of theinvention, gaining control of the cell phone (or wireless communicationdevice or transmission facility) within the area of interest allows thesystem to prevent incoming and/or outgoing communications. Thus, as thewireless communication device is re-acquiring a communication link withthe access point or base station, the wireless communication deviceprovides its identification information that positively identifies eachtransmission facility within the area of interest. This identificationinformation may be provided to the actual cell tower provider, whichuses this information to individually disable the cell phone(transmission facility) from receiving or transmitting data, voiceand/or communicating in any manner.

In an embodiment, the detection system 1000 (see FIG. 10) issynchronized with an access point, an/or base station technology. Thissynchronization allows the tracking and positive identification of eachtransmission facility within an area of interest. In this example, thetransmission facility of interest (a triggering device) may be connectedto or trying to communicate with another transmission facility, such asa cell phone or a land line phone.

In an embodiment, of the Cell Phone Detection, Control, and PositionIdentification System shown in FIG. 15, determines the identification ofan incoming caller based on information contained in the transmissionsignal and does not allow connection to the wireless network whiledetermining the location of the caller by triangulating the caller froma plurality of detected signals and tracks the caller thereafter. Inthis embodiment of the invention, the system shown in FIG. 15 disablesthe wireless device from receiving or transmitting signals from/to thewireless network and tracks the caller using the wireless device. TheCell Phone Detection, Control, and Position Identification Systemdescribed in FIG. 15 also has the capacity to track wirelesstransmission facilities from great distances, and in this application,the system is mobile, therefore, tracking the caller. In one aspect ofthe invention, where the cell phone or transmission facility informationis known, as determined through its communication with a pseudo-basestation, for example, additional information can be gathered, requestedand/or, extracted from the cell phone or transmission facility.Information such other transmission devices, cell phones, etc., thathave been contacted or which have data transferred may be gathered,requested and/or extracted.

In an embodiment where information redundancy and positive authorizationis important and positive identification is critical, the tools used ina school bus safety application egress point and school tracking systemhave direct applicability to positive identification of personnel andprison system automation, cost effectively tracking and monitoring lowerthreat classified inmates and staff and inmate safety. Safetyapplication and tracking systems are more fully disclosed in theaforementioned related patent applications, whose contents areincorporated by reference herein. In an embodiment Cell Phone Detection,Control, and Position Identification System, the tools and applicationdescribed may include facial and voice recognition, retina scantechnology, card swipe, fingerprint analysis, in preventing escapes andmisidentification within a prison environment. Classification of aninmate is a key component to safety within a correctional environment.

In an embodiment where positive identification of the transmissionfacility 202 and positive identification of the user of the transmissionfacility 202 is important, as discussed earlier hand-held detectionunits 408 detector decoding module (and or chipset) or a hand-helddetection units 408 in sync with the pseudo-base station/wireless accesspoint module provides the location and the identification of thetransmission facility 202 or in this case, for example a cell phone or a802.xx (e.g., 802.11a/b/g/n, 802.15) communication device. Incorrections facilities, outside areas of the facility, for example,represent a large area and the like. For example, like Angola stateprison, where inmates and visitors and staff work a close-circuittelevision (CCTV) in synchronization with, or in communication, with thehand-held detection units 408 allows the CCTV to focus on the user ofthe cell phone. The CCTV system feeds images to the facial recognitionsoftware and a database of all known personal and/or inmates, to find amatch and/or create an entry of new found cell phone and their owner'sand/or user's identity. In the case of a prison application, building adatabase of know criminals, their associate and biometric information,including facial recognition, for data mining purposes is critical. Anexample, is where inmates are passing contraband and using cell phone tocoordinate their efforts. Where positive identification of thetransmission facility 202 and positive identification of the user of thetransmission facility 202 is important, utilizing cell phoneidentification, location tracking and positive identify of the criminalsinvolved is crucial to preventing and stopping their criminalenterprise.

In another embodiment and application where positive identification ofthe transmission facility 202 and positive identification of the user ofthe transmission facility 202 is important, as discussed earlier thehand-held detection units 408 detector/decoding module (and or chipset)or a hand-held detection units 408 in sync with the Pseudo-basestation/wireless access point module provides the location, in schoolsafety where a student's location and a perpetrator who preys on schoolstudents, the tagging of visitors, student and employees is critical. Inthis application, CCTV and facial recognition, for data mining purposesof student, facility visitors (wanted or unwanted) is critical. Inanother embodiment, a biometric detection device is deployed topositively identify people. This device may include several devices todetermine unique characteristics of a person, fingerprint, IRIS scan,and DNA detection. These biometric system are built to detect passively,the fingerprint detection device can be built into door handles in largebuilding and other egress points. The DNA detector can be deployed inturnstile doors and egress points pressured air and vacuum systems canfunnel the biometric identifiers to the DNA a receptors for analysis.Each embodiment of the biometric applications will be outlined in detailfor implementation.

In embodiments, a method of detecting, identifying and tracking themovements of a specific transmission facility 202 in standby requiresprovoking and/or requiring the transmission facility to transmit asignal and to detect its unique identification. As discussed andexplained previously, a hand-held detection units 408 with an integratedidentification detector/decoding module (and or identification chipsetmodule) and/or a hand-held detection units 408 which functions inconjunction base station and/or wireless access point technology,blocking and/or jamming technique in concert of the identificationfunction provides the tools to detect the transmission facility, trackits location, and to detect its unique identification. Tracking alltransmission facilities and making positive identification of allcommunications and utilizing CORI and SORI databases of knownperpetrator of students to detect when a threat is near, around or in aschool facility is critical to school safety.

In the embodiment of FIG. 15, an interface with existing communicationdevices, such as a wireless cell phone provider or Wi-Fi accessprovider, may be provided. The interface which will allow and/or denycontrol is executed by the wireless provider.

In the embodiment of FIG. 15 the detector units (not shown) may includean antenna and a controlling unit, where matching the transmissionfacilities 202 with its unique identifier is critical for properidentification, tracking and control in this configuration, the detectorunits may individually control or may direct control over thetransmission facilities 202.

FIG. 17 illustrates an embodiment, where it is the intention to run anautomated prison to lower the necessary number of personnel and stillthe run a safe and secure facility.

In this embodiment, where there is limited, corrections personnel, allcells will be designed to allow outdoor access and unit access.

In this embodiment, for medical reasons all inmates will wear twotransmission detection sensors.

In this embodiment, the wireless communication of the sensors will alsocarry education information and data to each of the inmate cells.

In this embodiment where inmate programs, services, commissary, inmatephones, medicine distribution, vending machines, GED education, needs tobe inmate specific, positive identification is a critical must.

In other embodiment, the transmission facility is a cell phone, PDA or aWi-Fi appliance, the education display system is an interactive displayscreen in a school telling the school supervisors that one or morestudents or personnel needs to turn off his cell phone, or a hospitaladvising a specific visitor by name, that cell phone even in standby maycause harm the medical devices being used to treat patients or thetransmission facility provides information to the transmission facilitydetector of a unique identifier of the transmission facility via aninteractive screen on the road side to tell a user to slow down as he isspeeding. These are just examples of uses of the system illustrated. Inaddition, the system illustrated may be connected to any data miningdatabase (not shown) to provide customized information to anytransmission facility and specific information to a uniquely identifiedtransmission facility.

In an embodiment where the classification of inmates is such where manyinmates can co-exist in an inside and outside (minimum security,non-violent, criminals and the like) the use of CCTV, facial recognitionand laser microphone, and inmate tracking and a database driven set ofrules and parameters, coupled with the combine technologies mentionedthis application provides the solutions to reduce the number ofemployees while maintaining a high level of safety and security.

In another embodiment, positive identification is critical to publicsafety within a correctional environment, understanding an inmate'srelationship with other inmates, staff and their prior acts, impacts thesafety and security of the institution. Outside a correctional facility,authenticated positive identification and the system's ability to crossreference that person's positive identification through fingerprints,facial and voice recognition, retina scan technology, and DNA with hispersonal data and data set, identify his family, his friends. Hisacquaintances, associations, and their relationship to criminal act andthe ability cross reference the subject's information with criminalrecords, prior bad acts, local unsolved crimes, place of residence,place of work, habits, trends, mode of operations, court records, andprior incidents. When investigating a crime, a subject's favorite bar,hangouts, friends, relatives, associations, travel patterns, homeaddress, places where they spend money, work address, family andfriends, home address and work address and the like, become critical toinvestigate whether they are involved with or have committed a crime. Inone embodiment of the wireless transmission tracking and identificationsystem, the data key will be the unique identifier of the known personand all transmission facilities associated with that person will bemined and tied to that person. In an analysis, data key is determiningpositive identification of the transmission facility and positiveidentification of the person carrying the transmission facility. Thedata key is the unique identifier when a known person of interest isidentified. In an embodiment an overlay of all criminal activity withinan area, all known locations of all known, criminals and criminalassociates, is overlaid with all transmission facilities, within thearea and crossed reference with time and location looking for matchesand time and location intersection points. All objects entering and/orleaving the area in the time of interest will be identified andcataloged in reference to the incident.

In a preferred embodiment of the invention, the program develops theflow of how the data is compiled and dissected, the DNA is sorted, thesuspects' DNA is compared to the crime scene and know all of the partialmatches, determining who their relatives are the program uses all thedata and cross references of all people in the area and drills down onall people at the scene within a prescribed window of time; the programsearches their phone records to determine who they have called, texted,then checks their criminal records, and their associates criminalrecords. The programs categorizes their criminal behavior learnsbehavior and patterns of like incidents. The program gathers from thedevices and sensors identification information on victim, witnesses andsuspects, their voice, facial, fingerprints, wireless communication. Theprogram drills down for database matches, Identifies all parties presentand identifies all wireless communications, DNA, video, voiceidentification from crime scene and the like. The program correlates theidentity of the victim, the perpetrator(s), and co-perpetrators, toidentify co-victims, identify witnesses and cross references forpositive identification of all parties present. The tracking of thecellular devices and the overlay of the incident are tied together on atimeline by the program. If positive, identification of perpetrator(s)may be sufficient to make an arrest. If lack of information onparticipants remains, the program expands time around criminal act untilinformation is more useful. The program reverse tracks the movements ofthe victim(s) and looks for intersection section with perpetrator(s).The program expands the search prior and post of the incident includingall wireless communications movement and movement in and around thatarea, cars pedestrians each time cross-referencing the relationship ofvictim, witnesses and potential perpetrators. The program exams eachvictim, parses all known data on said victim, criminal records, place ofwork, relationship to perpetrator (phone calls, common address, commonacquaintances, hangouts). The iterative process program cross referencesdatasets of causal connections, relationships to the relationship of theperpetrator. Using the DNA records of all known criminals, the programsthen looks at the relatives of suspects and the like, until a crossreference of the victim, and the suspects can be positively identified.

In another embodiment and application where positive identification ofthe transmission facility 202 and positive identification of the usersof the transmission facility 202 is important, in school safety where ofall student's locations and a perpetrator who preys on school students,the tagging of visitors, (see wristband technology) student, thevisitors and their employees is critical. In this application, digitalcamera, CCTV facial and voice recognition, provides for a positiveidentification of all wearers and users of wireless communication andthe like. Verifying all people and all movement being tracked is thefirst step, verifying that all people who are being tracked arepositively being identified; verifying all positively identified peopleare not a danger to the students. In this embodiment full motion/motionactivated cameras with voice and facial recognition software and adatabase of all known persons capability. Where and tracking camerashave full coverage of all school and/or area of concern, when movementis detected, CCTV units verifies identity, sensors identify transmissionfacilities database and data mining verifies information and the like.As an example when a person triggers a camera identification trap, thefollowing occurs; 1) the signal detection sensors monitor and the systemstimulate all wireless communications for unique identifiers; 2) ifwristband/ID matches facial recognition software and a database of allknown persons database (positive facial recognition and positivetracking intact; 3) if no wristband, is wireless communication present;a) if yes, does wireless communication and facial recognition match; b)if yes, when database lookup, of person equal danger; c) if yes, orunknown, sound alarm; d) if no, communicate via wireless communicationdevice and request they return to front office to receive badge.

The embodiment includes an allowance unit which determines who isallowed within the facility and/or area and who is suspect and who is aknown danger. Tracking all transmission facilities and making positiveidentification of all communications and the holder of thosecommunication devices. Once positive identification is obtained, datamining may include, RMV, NCIC, W3, CORI and SORI, student databases,historical student and visitor databases and the like.

In embodiments, a method of detecting, identifying and tracking themovements of a specific transmission facility 202 in standby requiresprovoking and/or requiring the transmission facility to transmit asignal and to detect and identify its unique identification. Asdiscussed and explained earlier, a hand-held detection units 408 with anintegrated identification detector/decoding module (and oridentification chipset module) and/or a hand-held detection units 408which functions in conjunction base station and/or wireless access pointtechnology, in which the base station unit (and or pseudo-base station)increases and/or decreases its output power to provoke a wirelesstransmission to acquire and/or re-acquire a new base station, during thehandshake the unique identifier of the wireless communication can beintercepted and/or read/obtained. In other embodiments blocking and/orjamming a wireless communications signal with an access point/basestation and/or tower, forces the wireless communication device toacquire and/or reacquire a base station and/or access point. In aroadside bomb embodiment, calculating the actual tower's power, thenincreasing the pseudo-base station's signal power to a X factor greaterthan the actual tower will manipulate the cell phone to reacquire thedetection systems pseudo-base station. At the same time increasing thejamming signal to an a X factor greater than the actual tower, willforce the cell phone off line and will cause the cell phone to triggerthe IED, if the IED is set to explode when jamming is occurred, then ifthe phone is a connection to triggered IED, allowing the cell phone toacquire the pseudo-base station whose signal power has been increases toa X factor greater than the actual tower's provides for a capture of thetriggering cell phone and an ability to go after the trigger man asdescribed in this application. Other methods include the base stationrequesting the wireless transmission facility to reacquire and provide ahandshake methodology or a control line request, or a stimulatingsignal, having at least one similar characteristic of the network basestation, which requires a wireless communication device in standby toacquire/re-acquire an access point and/or base station. This methodologyin concert of the identification function provides the tools to detectthe transmission facility, track its location, and to detect its uniqueidentification. As discussed above the detector units may include anantenna(s) 104 and a controlling unit, that are externally integratedwith the transmission detection, controlling, identification, andreporting system 1500, where matching the transmission facilities 202with its unique identifier is critical for proper identification,tracking and location matching of the transmission facility 202 uniqueidentifier with the proper transmission facility 202 may be accomplishedthrough the time of signal arrival, phone type, transmission frequency,time division separation, time sync, channel frequency, cell toweridentifier, (cell phone) transmission facility identifier or acombination of one or more methodologies depending on complexity andtransmission facility 202 environment and the like. In an embodiment inwhich the unique identifier is encoded the tracking principle works thesame, each unique identifier whether encode or decoded will be tracked.

In an earlier application, we described methods to positively identifyand track and control cell phones and other transmission facilities, itis also known in the art how to utilize voice and facial recognitiontechnology. Here we will describe methodologies to positively identifyand track people and their vehicles through their transmissionfacilities. In an embodiment, each time a transmission is located, itsposition, and identification will be confirmed. As in a prison facility,each location of the transmission facility will be monitored by a CCTVcamera and this information and data will be stored, each digital framewill be analyzed to determine whether positive identification can bedetermined. All data will be stored in a depositary where the key to thedata set is the transmission facility unique identifier. The personand/or vehicle associated with the transmission facility uniqueidentifier will be cross referenced by disparate database, for exampleDepartment of Motor Vehicles (DMV) records and Criminal History RecordSystem (CHRS), transmission facility purchasing information records(most stores in which disposable cell phones are purchased have cameras)and the like.

In an embodiment, at each egress point of the facility, distinct areaswithin a facility, for example, a prison, or a bank, each transmissionfacility is identified and each egress point has CCTV and facialrecognition and if located, its position, and its identification will beconfirmed. A set of processes are developed to determine the positiveidentification of the carrier of the transmission facility and link thewireless transmission to the person's identification. In an embodimentto properly identify all people carrying the tracked wirelesscommunications, the use of facial recognition, voice recognition,biometric detection, is deployed to positively identify the personsand/or person carrying the wireless communications. In an embodiment thecamera system focuses on all faces and provides a positive facialrecognition, wherein the information is cataloged with the wirelesstransmission information. In an embodiment the camera identificationsystem can be one of many types, for example digital, pan and tilt, w/180 degree focus and the like.

In an embodiment, to combat high crime districts, curb gang violence, acell phone (wireless transmission) detection, location and trackingsystem can be deployed throughout a large city. Each wireless device canbe stimulated and tracked throughout the city. This information can beoverlaid with criminal history records, Department of Motor Vehicles,parole and probation information, including where each known person ofinterest lives and works, where their associates live and work, and anoverlay of all current and previous crime activity. In anotherembodiment the camera system identifies all not moving objects withinits coverage area and catalogs the area identifying all fixed objects;the camera is equipped with several tools; laser finder, a microphone,motion detection software and infra-red analysis capability. The laserfinder assists the camera system to positively identify height, widthand depth of objects. Any movement entering/exiting or moving throughthe space is cataloged. Color, shape, size, temperature, parameters aresetup within the system to detect nuisances within the object todetermine unique identifiers. For example, a car identified isclassified as a light blue 1997 Cadillac, however this Cadillac has abroken light on the left back fender. The system is loaded with allknown product specifications to be used as reference material. Thesystem also classifies and categories unknown objects.

In an embodiment of the invention, the system determines andcross-references all possible intersections of known persons ofinterest, their propensity to commit criminal act, their motives andhabits, to known criminal acts, parole data, probation data, DNA crossreference matching, to known movement of all wireless communication andtheir movements. Through this embodiment, the system can determine whatcriminal acts have been committed upon whom, the movements of theparties to the criminal act prior to the act, movements after the act,other player, witness, their movement and transmissions. The programanalysis the biometric data and the data is correlated with time,cameras, egress points, correlates passing and suspect cars, GPS w/phone information, WIFI Database correlation, wireless information, andother known transmission facility, such as on star communications andthe like.

In the embodiment of FIG. 15, an interface with existing communicationdevices, such as a wireless cell phone provider or Wi-Fi accessprovider, may be provided. The interface which is in communication withthe 3^(rd) party or other communication devices will provide the correctinformation (unique identifier) to the access provider which controland/or is connected to the transmission facility and will then allowand/or deny access to and/or prevent communication with the wirelessprovider or third party triggering device. According, the embodimentsshown may also include an interface to the third party controlling unit.For example, the system shown in FIG. 15 may include a system interfacewith a commercial satellite cell phone provider and control of the cellphones passed between the carrier and the transmission detection,identification, control and reporting system.

In the embodiment, of FIG. 15 in a situation where there is a largenumber of transmission facilities 202 (in this example, cell phones) ona congested highway being able to find all the transmission facility(s)and their accurate location is critical.

Knowing the frequency and time of the transmission facility 202transmissions provides the ability to tighten the bandwidth of thedetection sensors, which increases sensitivity, and thus providesgreater distance of detection. It also provides an intercept, in timeand frequency providing for faster processing of signals.

In an embodiment, in a corrections complex, such as Angola State Prison,or a arbitrarily defined area where transmission facilities 202 areprohibited except for authorized transmission devices, the transmissiondetection, controlling, identification, and reporting system 100 whetherinternal or external to the facility may control, identify and prohibittransmissions from transmission facility 202 depending on the locationor approximate location of the transmission facility 202. There are avariety of methods that may be employed in the determination of thelocation of a transmission facility 202. Methods include (i) acell-sector system that collects information pertaining to cell andsector ID's, (ii) the assisted-global positioning satellite (GPS)technology utilizing a GPS chipset in a mobile communication facility,(iii) standard GPS technology, (iv) enhanced-observed time differencetechnology utilizing software residing on a server that uses signaltransmission of time differences received by geographically dispersedradio receivers to pinpoint a user's location, (v) time difference ofarrival, (vi) time of arrival, (vii) angle of arrival, (viii)triangulation of cellular signals, (ix) location based on proximity toknown locations (including locations of other radio-transmitters), (x)map-based location, or any combination of any of the foregoing, as wellas other location facilities known to those of skill in the art. In oneaspect of the invention, the location may be determined using a methodof non-iterative linear equations.

In an embodiment of the transmission detection, controlling,identification, and reporting system 1500 whether to control thetransmission facility 202, may be determined by location of thetransmission facility 202, type of transmission facility 202,identification of transmission facility 202, time of transmission of thetransmission facility 202, frequency of the transmission facility 202,based on type of base station technology and/or location of base stationtechnology and the like.

In an embodiment of the transmission detection, controlling,identification, and reporting system 1500 where the system is insynchronization with base station technology and techniques correlatethe wireless signals, wherein the unique identifier is supplied by thebase station when the transmission facility is stimulated by the jammerand/or base stations unit. Then the transmission facility is tracked andits interest is related to its location to the road, other variablesinclude whether it is alone or it is in the hands of an individual andthe like. The unique identifier is provided by the signal detectionsensor or the base station unit and is used in synchronization with thebase station identification and the location of the transmissionfacility. Another method to triangulate the location of the transmissionfacility utilizing with the assistance of the base station and/orsatellite base station is to have the tower request the cell phoneand/or cell phones of interest to re-acquire the tower, or increase itspower. Here, the tower knows it unique identifier and has required thephone to retransmit to triangulate the location of the wirelesscommunication device. This method is also valuable in situations wherethe tower may have only an approximate location of the wirelesstransmission facility, but not an exact, or in such situations, such asin a building or an obstruction rich environment. Requesting the basestation and/or access point to request the transmission facility totransmit a signal which can then be triangulated with the signaldetection sensors improves the location determination.

In an embodiment of FIG. 15, the transmission detection, controlling,identification, and reporting system 1500 may also transmit the type,time, frequency of the wireless transmission facility of interest to abase station. The base station may then provide the system with theunique identifier of the detected transmission facility or the basestation may detect a transmission facility at a specific frequency andthe transmission detection, controlling, identification, and reportingsystem 100 tunes to that frequency to determine the location and uniqueidentifying information of the transmission device. The system 100 maythen compare the unique identifying information to a data base (notshown), the information and the parameters obtained from the data basemay then be used decide how to treat the transmission facility; what todo with the transmission facility depending on where the transmissionfacility is considered friend or foe (i.e., allowed or disallowed).

In an embodiment of the transmission detection, controlling,identification, and reporting system 1500 where the transmissiondetection units includes a transmission decoding unit the systemdetermines the location and the allowability of the transmission unit bycomparing the transmission found with allowable or non-allowabletransmission facility lists.

In an embodiment shown in FIG. 15 of the transmission detection,controlling, identification, and reporting system 1500, the base stationindicates there is a transmission facility within the area covered bythe transmission detection, controlling, identification, and reportingsystem 1500. The base station provides at least one unique identifier tothe transmission detection, controlling, identification, and reportingsystem 1500. For example, the base station may provide at least one of:a frequency, a type of transmission facility, a time of arrival (TOA),an IMEI and other similar identifiers (e.g., encoded IMEI). Thetransmission detection, controlling, identification, and reportingsystem 1500 determines the location of the transmission facility,depending on the provided parameters, directs the base station and/orrecorder, jammer, CCTV to perform a set of actions. Some of the actionsto be performed are jam the signal specific to the cell phone, denyservice (Denial of Service (DoS)) to the cell phone, allow the continuedreceiving and allow transmission of the detected transmission, recordthe content of the transmission, provide an indication that thetransmission is allowable. In addition, the provided parameters maychange depending on location, and other variables depending onapplication parameter and the like.

In an embodiment shown in FIG. 15 of the transmission detection,controlling, identification, and reporting system 1500 where detectionsystem is separate from the discriminator unit, the discriminator unitmay also include the controlling unit (base station technology and thelike). In this case, when a unique set characteristics (parameters) arereceived by the detecting unit, and/or system 1500, which then providesinformation to the discriminator unit and/or controlling unit, whichthen passes back the correlated transmission facilities (the controllingunit, software radio, and the like) this information is processed. Forexample, a cell phone on the side of the road, with a person talking onit may not need to be disabled, in contrast to a cell phone in standbylocated within a zone of danger (60 meters of the road) may need to becontrolled and disabled.

In an embodiment, the system 1500 will allow an authorized transmissionfacility to continue and/or provide the ability for the wirelesstransmission, (i.e., to talk and/or to receive calls) depending on theconfiguration and application. In an embodiment of the transmissiondetection, controlling, identification, and reporting system 1500 wheredetection system is separate from the discriminator unit, in this casethe discriminator unit may also the controlling unit (base stationtechnology and the like,) the system 1500 may further provideinstruction to the controlling unit to allow or disallow transmissionfacilities, determined by their location.

In an embodiment of the transmission detection, controlling,identification, and reporting system 1500 the system compares theobtained information and depending on whether the detected transmissionfacility is determined to be a potential danger, the system may take theincoming transmission facility and determine its position prior todisallowing further transmission. This process is accomplished byknowing an identification of the transmission facility and using theinformation obtained by the controlling facility (frequency, time, type,channel, etc.) and searching for the incoming call signal. For example,in an improvised explosive detection (IED) situation, finding thetrigger man may require the detection, identification and locationdetermination in real-time. The array antennas will utilize large frontend gain for the greatest distance. As discussed previously, jamming thearea, to gain control of the transmission facility is one method ofcapturing the transmission facility. The ability exists to then trackthe trigger man from his current location and where he goes forinvestigative reasons.

In an embodiment shown in FIG. 15 of the transmission detection,controlling, identification, and reporting system 1500 wheretransmission facility retrieved data may be used to locate threats topersonnel, and/or prevent an escape. Recovered transmission facilitydata may be used to track co-conspirators location and/or identify anunauthorized transmission facility.

In an embodiment where tracking and identifying a wireless communicationdevice(s) in an environment where many wireless communication devicesare present, such as a conference center and/or city street environment,some in conversation, some in-standby, some in the process of beingturned-on some in the process of being turned off, the ability to detectand positively identify the movement of a non-transmitting transmissionfacility in an orderly fashion becomes difficult. Cell phones, forexample, in standby, the rate in which wireless communicationre-communicates varies, e.g., 10 sec to minutes. In some cases, theypassively listen and do not transmit in-standby at all.

In an embodiment, where the interest is to detect, locate and identifycell phones in standby, every 10 seconds, a prescribed interval ofpositively identifying and tracking is required, setting the transceivercommunication period, for each wireless transmissions in a denseenvironment is important. There are several methodologies by which tomake a cell phone in-standby to transmit its unique identifier, forexample, triggered by the base station as described earlier in thisapplication. A second methodology is to block the transmission and havethe cell phone re-acquire the tower. A third method is to transmit asignal to induce the cell phone to reacquire the tower, switchfrequencies channels, or if the cell phone loses communications it willautomatically look for a connection. Or if the wireless communicationdevice detects a larger power-ed tower signal, the cell phone willconnect to the perceived closer signal. Each one of these methods willforce a cell phone in standby to re-connect with the tower.

In this embodiment, we will discuss, a methodology to provide for theorderly transmission identification, location and tracking of a set ofwireless transmissions. In this example the wireless transmissionfacility, will be the tracking of a set of cell phones in a denselypopulated area. The phones will be stimulated/manipulated to providetheir unique identifier, their response will be determined by theirlocation within the coverage area, their phone type and theirtransceiver channel, the signal strength of the transceiver, modifyingthe transceiver phone type, transceiver frequency ban, modifying theirtransmission band, modifying their transceiver channel, for example, ifthe coverage area contains 5000 phones to be tracked, stimulating 1/16thor 22.5 degrees (see FIG. 19B) of the designated area, of a particulartype and then multiplexing the transmission transceiver channel, in thisexample, channels 1-24 in a specific order. The first detection of thefirst slice and channel will result in detecting identifying a singlephone type of a known number of cell phones. In this embodiment, thedevelopment of a methodology to determine which stimulating pattern,channel pattern, type and repetition rate will provide the best coverageof movement given the density of wireless transmission devices, versusthe number of sensor within the coverage area, their variablesensitivity, and transceiver strength is discussed. As discussedearlier, in an embodiment in which, roaming base station technology isused to stimulate the cell phone, the power strength ratio of the Telco(network) tower versus the power strength of the pseudo-base station,will determine the range and depth of the area coverage by which thenumber of phone recycled is determined. Adding a backhaul capability asdiscussed earlier, will provide a greater manipulation of the cellphone.

In an embodiment where tracking and identifying a wireless communicationdevice(s) which utilizes, for example, multiplexing technology such asfor example, Code division multiple access (CDMA) phones, which is achannel access method utilized by various radio communicationtechnologies. One of the basic concepts in data communication is theidea of allowing several transmitters to send information simultaneouslyover a single communication channel. This allows several users to sharea bandwidth of different frequencies. This concept is calledmultiplexing. CDMA employs spread-spectrum technology and a specialcoding scheme (where each transmitter is assigned a code) to allowmultiple users to be multiplexed over a same physical channel. In anenvironment where there are several wireless communication devicesco-exist which utilize multiplexing and/or spread spectrum transmissiontechnology, to get an accurate location, as discussed in earlierapplications, an embodiment utilizes a directional transmission facilitywhich provides a specific transmission to stimulate a wirelesscommunication device, causing the wireless communication device tocommunicate with the access point. In this case a receiving and/ortransceiver unit attempts a handshake communication. The wirelesscommunication device, such as a cell phone, provides a unique identifierto the access point, in this case a base station transceiver. In anenvironment where many wireless communication devices are present, suchas a conference center, where many cell phones and/or transmissionfacilities co-exist, the ability to distinguish one CDMA phone fromanother becomes a challenge, depending on the transmission mode of theCDMA signal. Some of the unique identifier are distinguishing TOAmethod, signal pattern distinction phase prediction method.

In an embodiment in which the TOA method is deployed to determine thelocation of a set of transmission facilities, as discussed previously,we discussed the ability to determine the exact location of thetransmission by detecting the TOA (time of arrival) of the initialsignal from the transmission facility (in nanoseconds). In the case ofdetecting multiple CDMA spread spectrum transmission devices, inhandshake acquisition, each CDMA wave form is categorized by detectingthe actual time of arrival of each transmission facility within theinterweaving of other spread spectrum transmissions. The transmissionsare distinguished by the TOA raise time differential coupled with theamplitude change of the signal strength. Additionally, where thepredictability of a new TOA is determined, validation of the TOA isconfirmed. These characteristics are coupled with the predicted locationof the transmission facility, amplitude of the signal, unique identifierof the wireless transmissions, phase and angle of the signal and thelike. Additionally, utilizing, directional antennas with griddingpattern and a variable transmission signal to predict and determine thearea of response coupled with the unique identifier with TOA methodprovide for complete and accurate tracking and location of CDMA phonesin standby.

In an embodiment, a transmission from a transmission facility provides aunique identifier which activates a function in an action facility suchas a display, specifically targeted to the unique identifier, it mayprovide information and the like, or an indicator the wirelesstransmission facilities are prohibited within a certain area or whiledriving or information about the location where the wirelesstransmission facility is currently located and/or danger (display unit).The database is developed to focus information associated with theunique identifier, to meet the mission of the display.

FIG. 17 illustrates an embodiment, where it is the intention to run anautomated prison to lower the necessary number of personnel and stillrun a safe and secure facility. This automated facility is controlled bya centralized command and control center and/or a decentralizecompartmental command and control center for all functions of thefacility including movement of the persons within the facility. In thistype of a facility, where complete and accurate identification andlocation of all personnel is critical, the tracking of individuals,their wireless transmission devices, cell phones, identification units,Walkie-Talkies, and verifying their access to authorized areas,integrating their movement with CCTV and positive facial identification,biometric identification, preventing movement into unauthorized area,developing inclusion zones, creating exclusion zones, ensuring propercount, providing an ability to restrict and/or authorized movement aspecific design of the facility and convergence of technology isessential. The technologies discussed herein integrated to the centralcontrol provide the backbone and framework to operate such an automatedfacility, wherein each staff member and inmate transmission facilitywill allow specific movement throughout the facility. All movementthroughout the facility may be monitored through CCTV and facialrecognition. At each egress point, movement will be restricted toindividual movement through one area to another area of the facility.For example, daily functions include, meals, medical, programs, courtvisits, and recreation, may be functions that may be monitored andcontrolled. As an example of the facility of the needs within theautomation and the parameters and rules; Inmate Movement: need acreation of a Movement list and movement schedule, scheduling resources,allocation of seating in particular program area classrooms, access tocomputers, access to the Law library, time allocation in program and usefacility assets, enemy exclusion, (predator sheep-wolf exclusion)conflicts in scheduling GED, adult education, culinary arts, angermanagement developing waiting list, ability for inmates to signup,morning schedule and movement, afternoon schedule and movement,Pre-trial and religious services scheduling. Data mining databasetechniques and methodologies may be executed to provide for inmatescheduling movement and allocation of assets for the inmate relying ontransmission facility authorization. The transmission facility willcontrol access to all movement, asset resources, doors and egress,facility recourses and the time allocation on facility assets and inwhich movement takes place. Because of minimum human interaction,display kiosks displays schedule and informs the inmate where it isscheduled. The facility structure, may need to be modified to allowinmate access to the outdoor area, this design modification eliminatesthe need for outside movement and still provides greater freedom for theinmates with less need for direct supervision. Each sensor will monitorbiometric signs including heart rate, temperature, and the like. Withtwo wristbands, echo cardiogram can be generated with provide for healthmonitoring and for positive identification. The Cell Phone Detection,Control and Position Identification system 1500 (FIG. 15) will include adetector and decoder for all transmission facilities, which will providepositive identification for all transmission facilities, including cellphone and other hand held communication devices, and the specificindividual in position of the transmission facility. All CCTV units willintegrate with facial recognition software, all egress points willrequire biometric checks, such as fingerprint and renal eye scandevices, and this combined with the transmission facility positiveidentification. The design of the facility is important to provideadequate exercise movement and limited interaction with staff and otherinmates. Therefore a redesign of the facility, to provide services suchas decentralized education is important.

In this embodiment, the wireless communication of the sensors (see FIG.10 and FIG. 16) will also carry education information and data to eachof the inmate cells. Each inmate is equipped with a wireless tablet totake interactive education. In FIG. 10 the 802.15.4 will provide a dualrole of sensor sync and education communication. In embodiment of afully automated wireless communications and personnel and assettracking, the communication to the sensors will be transmitted via cat 5cables, which will be placed to communicate with the microprocessor andthe 802.11. In this configuration the 802.11 will carry the interactiveeducation and monitoring capability. The microprocessor in thatconfiguration will act as a throughput conduit to isolate high-speedinteractive communications between the cat 5 and the 802.11. In thisconfiguration, audio and video, live interaction is capable to performparole hearings, live interactive education, video visitations, suicidewatch, video attorney visits and video court appearances. In thisconfiguration a video server and interactive video switching system willbe deployed to handle the interactive communication. As earlierdescribed, the ideal location of sensors maybe the water chases toprevent tampering. This also provides the opportunity to have wirelesscommunication with education units within the cells. This wirelesscommunication also provides the ability to as wireless surveillancedevices such as cell monitoring into the mix.

In this embodiment where inmate programs, services, commissary, inmatephones, medicine distribution, vending machines, GED education, needs tobe inmate specific, positive identification is a critical must. Toensure this outcome, the positive identification of each transmissionfacility is paramount. An example of this embodiment, when an inmateapproaches an education display system, the unique identifier of theinmate's transmission facility, provides information to the transmissionfacility detector of the unique identifier of the transmission facility.A database controls and provides all the applicable information toprovide the correct information for each transmission facility. In thiscase, the transmission facility is a wristband ID bracelet.

In other embodiments, the wireless transmission facility such as a cellphone, PDA or a WI-FI appliance, can trigger an action, for customizedactions, positive identification and unique identifier is established.One embodiment is when an inmate's wristband comes in proximity to theinteractive education display system within his cell, it positivelyidentifies him/her and logs the inmate into the system; this isaccomplished via short range communications via the 802.xx technology inthe wrist band and the education device. In another embodiment theinteraction is callused by the RFID chip (active, passive and/orsemi-active). In a school environment, when wireless communicationdevice is detected, positive identification is established and thesystem transmits an action for the interactive display screen in aschool informing the school supervisors that one or more students orpersonnel needs to turn off his cell phone. The action facility, firstenables the allowability database and verifies the transmission facilityis not authorized and/or the wireless communication device is in anunauthorized area or a hospital advising a specific visitor by name,that a cell phone, even in standby, may cause harm to the medicaldevices being used to treat patients or the transmission facilityprovides information to the transmission facility detector of a uniqueidentifier of the transmission facility via an interactive screen on theroad side to tell a user to slow down as he is speeding or informing thedriver he is not allowed to use a cell phone or wireless communicationdevise while driving. In this embodiment, utilizing femto/Pico and/ortransceiver technology action facilities is necessary to intersect anddetect transmissions from the wireless device. These are just examplesof uses of the system illustrated.

In an embodiment, where there is a large number of transmissionfacilities 202 (in this example, many cell phones) on a congestedhighway being able to find all the transmission facility(s) and theiraccurate location is critical. In addition being able to continuouslytrack and positively identify each transmission is also critical whereincontrolling a significant number of transmission facilities (cellphones) may be necessary. Therefore specific techniques need to bedeveloped to regulate the frequency band the wireless devices occupy,when and in what order they are processed, the rate and the density andrate in which they are monitored. Techniques discussed earlier describehow to have a cell phone provide their identification. Here we willdiscuss some of the techniques to regulate the detection, frequency,volume and period of those transmissions.

Knowing the frequency and time of the transmission facility 202transmissions provides the ability to tighten the bandwidth of thedetection sensors, which increases sensitivity, and thus providesgreater distance of detection. It also provides an intercept, in timeand frequency, providing for faster processing of signals. One techniqueis for the transmission detection sensor to tell the base station and/orenabling technology when to transmit and also indicate the desiredresponse frequency and/or channel. Another methodology is to regulateand/or schedule the transmission time of the base station(s) and/orenabling technologies within geographical areas and set parameter on thedirection, radiation pattern, zone, and strength of the signal beingtransmitted to enable / regulate a number of transmission facility(s)contacted and/or regulating the number of responding transmissionfacilities.

FIG. 18 illustrates a system 1800 for implementing the principles of theinvention shown herein. In this exemplary system embodiment 1800, inputdata is received from sources 1801 over network 1850 and is processed inaccordance with one or more programs, either software or firmware,executed by processing system 1810. The results of processing system1810 may then be transmitted over network 1880 for viewing on display1892, reporting device 1890 and/or a second processing system 1895.

Processing system 1810 includes one or more input/output devices 1802that receive data from the illustrated sources or devices 1801 overnetwork 1850. The received data is then applied to processor 1803, whichis in communication with input/output device 1802 and memory 1804.Input/output devices 1802, processor 1803 and memory 1804 maycommunicate over a communication medium 1825. Communication medium 1825may represent a communication network, e.g., ISA, PCI, PCMCIA bus, oneor more internal connections of a circuit, circuit card or other device,as well as portions and combinations of these and other communicationmedia.

Processing system 1810 and/or processor 1803 may be representative of ahandheld calculator, special purpose or general purpose processingsystem, desktop computer, laptop computer, palm computer, or personaldigital assistant (PDA) device, etc., as well as portions orcombinations of these and other devices that can perform the operationsillustrated.

Processor 1803 may be a central processing unit (CPU) or a specialpurpose processing unit or dedicated hardware/software, such as a PAL,ASIC, FGPA, operable to execute computer instruction code or acombination of code and logical operations. In one embodiment, processor1803 may include, or access, code which, when executed by the processor,performs the operations illustrated herein. As would be understood bythose skilled in the art when a general purpose computer (e.g., a CPU)loaded with or accesses code to implement the processing shown herein,the execution of the code transforms the general purpose computer into aspecial purpose computer. The code may be contained in memory 1804, maybe read or downloaded from a memory medium such as a CD-ROM or floppydisk, represented as 1883, may be provided by a manual input device1885, such as a keyboard or a keypad entry, or may be read from amagnetic or optical medium (not shown) or via a second I/O device 1887when needed. Information items provided by devices 1883, 1885, 1887 maybe accessible to processor 1803 through input/output device 1802, asshown. Further, the data received by input/output device 1802 may beimmediately accessible by processor 1803 or may be stored in memory1804. Processor 1803 may further provide the results of the processingto display 1892, recording device 1890 or a second processing unit 1895.

As one skilled in the art would recognize, the terms processor,processing system, computer or computer system may represent one or moreprocessing units in communication with one or more memory units andother devices, e.g., peripherals, connected electronically to andcommunicating with the at least one processing unit. Furthermore, thedevices illustrated may be electronically connected to the one or moreprocessing units via internal busses, e.g., serial, parallel, ISA bus,Micro Channel bus, PCI bus, PCMCIA bus, USB, etc., or one or moreinternal connections of a circuit, circuit card or other device, as wellas portions and combinations of these and other communication media, oran external network, e.g., the Internet and Intranet. In otherembodiments, hardware circuitry may be used in place of, or incombination with, software instructions to implement the invention. Forexample, the elements illustrated herein may also be implemented asdiscrete hardware elements or may be integrated into a single unit.

As would be understood, the operations illustrated may be performedsequentially or in parallel using different processors to determinespecific values. Processing system 1810 may also be in two-waycommunication with each of the sources 1801. Processing system 1810 mayfurther receive or transmit data over one or more network connectionsfrom a server or servers over, e.g., a global computer communicationsnetwork such as the Internet, Intranet, a wide area network (WAN), ametropolitan area network (MAN), a local area network (LAN), aterrestrial broadcast system, a cable network, a satellite network, awireless network, or a telephone network (POTS), as well as portions orcombinations of these and other types of networks. As will beappreciated, networks 1850 and 1880 may also be internal networks or oneor more internal connections of a circuit, circuit card or other device,as well as portions and combinations of these and other communicationmedia or an external network, e.g., the Internet and Intranet.

FIG. 19 illustrates an exemplary process for determining a locationusing a non-iterative linear algebra algorithm. In this illustratedprocess, the criteria for determining a location of a device (i.e., acell phone, a transmission device, such as a wrist band transmitter) isdependent upon the selection of a plurality of sensors that havedetected a wireless transmission 1910. Exemplary criteria for selectingsensors are shown in block 1915. For example, in one aspect of theinvention, at least five (5) sensors are to be utilized in the processshown. Further, the sensors must be selected such that no three sensorsare installed within a same line and no four sensors are installed in asame plane. In addition, at block 1910, a reference sensor is determinedas that sensor having the smallest time difference of a received signalamong the selected sensors.

At block 1920, for each of the selected sensors, i, a range R_(i) isdetermined between the sensor and the transmission device and thedifference in distance between two sensors is then determined. Block1925 discloses definitions of the terms used in describing in theexemplary process. At block 1930, the matrix H and the vector C areinitialized and at block 1940, the location vector of the transmissiondevice is determined.

While the processing shown in FIG. 19 relates to a wrist bandtransmission device, as disclosed in related co-pending U.S. patentapplication Ser. No. 12/231,437, entitled “Wrist Band Transmitter,” itwould be recognized by those skilled in the art that the processingshown is applicable to other types of wireless transmission devices,such a cellular telephone, and wireless personal digital assistants andother similar type devices, whether being special purpose (i.e., wristbands) or general purpose (i.e., cell phones).

While there has been shown, described, and pointed out fundamental novelfeatures of the present invention as applied to preferred embodimentsthereof, it will be understood that various omissions and substitutionsand changes in the apparatus described, in the form and details of thedevices disclosed, and in their operation, may be made by those skilledin the art without departing from the spirit of the present invention.For example, while the device described herein is referred to as atransmitting device, it would be recognized by those skilled in the artthat the device may incorporate a receiving unit, designed to operate inone or more frequency bands over a wide frequency range. For example,the receiving system may represent a crystal receiving system that maydetect one or more signals within a frequency range, or may represent asuperhetrodyne receiver that may detect and determine the frequency ofoperation of received signals.

In an embodiment, in a corrections complex, such as Angola State Prison,or a arbitrarily defined area where transmission facilities 202 areprohibited except for authorized transmission devices, the transmissiondetection, controlling, identification, and reporting system 100 whetherinternal or external the facility may control, identify and prohibittransmissions from transmission facility 202 depending on the locationor approximate location of the transmission facility 202.

FIG. 19A illustrates an exemplary process 1902 for capturing a wirelesstransmission in accordance with the principles of the invention and FIG.19B illustrates an exemplary geographic configuration for explaining theprocessing shown in FIG. 19A. Referring now to FIG. 19A, at block 1912,a reference signal transmitted by a transmitter (1972, FIG. 19B) isreceived at a transceiving system (1975). The transmitter 1972 has atransmitting range represented by a distance R₁. An estimated distance(D₀) between the transceiving system 1975 and transmitter 1972 of thereference signal is determined based on a received power at thetransceiving system. At block 1922, a determination is made regarding anexpected power of the reference signal to be received at wirelesstransmission facilities a known distance (R₂) from the transceivingsystem 1975. In one aspect of the invention, an expected received powermay be determined without regard to the positions of the referencesignal transmitter 1972 and the transceiving system 1975. That is, anexpected received power may be determined a known distance (R₂) aboutthe transceiving system 1975 based solely on the received power at thetransceiving system 1975 and, thus, the expected received power at pointA is the same as that received at point B. In another aspect of theinvention, a position of the reference signal transmitter 1972 may bedetermined or provided to the transceiving system 1975. For example, adirection of the reference signal transmitter 1972 may be determined,using directional receiving antennas (or multiple receiving antennasseparated by a known angular measure, such as four antenna spatiallyoriented 90 degrees to each other, such that the 3 dB antenna gainpoints intersect at 45 degrees from the antenna maximum gain) at thetransceiving system 1975, and a position relative to the transceivingsystem 1975 may be determined based on the determined direction andestimated distance (D₀). In another aspect, a direction of the referencesignal transmitter 1972 may be determined using a received signalstrength of the reference signal on at least one receiving antenna. Inanother aspect, the position or location of the reference signaltransmitter 1972 may be known and, thus, available to the transceivingsystem 1975. For example, the position of the transmitter 1972 may beknown through a mapping of such transmitters and/or the location isknown based on conventional surveying methods or from a globalpositioning satellite system (GPS). With the position of the referencesignal transmitter 1972 known, the expected power of the referencesignal may then be determined more accurately. For example, the expectedreceived power of the reference signal a known distance from thetransceiving system 1975 in line with, and between, the transmitter 1972and the transceiving system 1975 is greater than the expected receivedpower of the reference signal a known distance from the transceivingsystem in line with but on an opposite side of the transceiving system1975.

With reference to FIG. 19B, the received signal strength at wirelesstransmission facility 1980 is greater than that of wireless transmissionfacility 1990. The expected received power may be determinedcontinuously along the known distance (R2) about the transceiving system1975 or may be determined at designated angles about the transceivingsystem 1975 (e.g., every 10 degrees). Interpolation between twodesignated angles may be used to determine an expected received power atan intermediate point. At block 1930, a signal is transmitted from thetransceiving system 1975 within a general area, as represented by R₂.The area may include wireless transmission facilities 1980, 1985, 1990,capable of receiving the reference signal and wireless transmissionfacility 1995 that may not be capable of receiving the reference signal.In one aspect, the signal may be transmitted in an omni-directionalmanner wherein the general area represents an area circling thetransceiving system 1975, assuming the system and correspondingantenna(s) are co-located. In another aspect of the invention, thesignal may be transmitted in a directional manner wherein the generalarea represents a pie-shape area, 1997, 1998, having an apex at thetransceiving system 1975 (a sector); assuming the antenna(s) and thesystem 1975 are co-located. The angular spread of the pie-shared areaα₁, α₂ may be determined based on the directivity of the transmittingantenna. The signal transmitted by the transceiving system 1975, whichis similar in at least one characteristic of the reference signal, istransmitted with sufficient power to interfere with communicationsbetween the reference signal and wireless transmission facilities withinan area in which wireless transmission facilities may receive thereference signal. The transmitted signal may be a continuous wave typesignal (i.e., a jamming signal) or may be a discrete signal thatcommands the wireless transmission facilities to reestablishcommunication with the reference signal transmitter 1972. At block 1940,a simulated reference signal, which is similar in at least onecharacteristic of the reference signal, is transmitted by thetransceiving system 1975. The simulated reference signal is transmittedat a power level such that the received power of the simulated referencesignal at the known distance (R₂) from the transceiving system 1975 isgreater than the received power of the reference signal. At block 1952,signal(s) received by the transceiving system 1975 from wirelesstransmission facilities 1980, 1985, 1990, 1995 in response to theinterfering signal are analyzed and processed.

In one aspect of the invention, a distance D₁′, D₂′, D₃′, to each of thewireless transmission facilities 1980, 1985, 1990, respectively may beestimated based on a received power, at block 1962. In another aspect ofthe invention, a direction of the wireless transmission facilities maybe determined using, for example, directional antennas and/or anamplitude-based angle of arrival method. In one aspect of the invention,the signals received by the transceiving system 1975 may be analyzed todetermine if they are allowed to send and/or receive communication aspreviously disclosed at block 1973. As discussed previously,allowability may be determined based on a known set of wirelesstransmission facility characteristics that are allowed within an area.All others are not allowed and, thus, communication is prohibited. Ifthe signals are determined to be allowable, then control of the signalis “handed-off” to the reference signal transmitter 1972. Otherwise, thereceived signals may be further processed.

In one aspect of the invention, allowability of a wireless transmissionfacility may be determined based on a position of the wirelesstransmission facility with respect to the transceiving system 1975. Forexample, if the wireless transmission facility is determined to bewithin a predetermined distance, R₃, from the transceiving system 1975,then communication to and from the wireless transmission facility maynot be allowed, even though the transmission would normally be allowed.In one aspect, the area defined by R₃ may be limited using directionalinformation of the received signal associated with the wireless facilityand the transceiving system 1975. Thus, if the transceiving system 1975is moving towards the wireless transmission facility, then communicationmay not be allowed, while communication may be allowed if thetransceiving system 1975 is moving away from the wireless transmissionfacility, even though the wireless transmission facility is within thearea defined by R₃. In another aspect of the invention, transceivingsystem 1975 may attempt to determine other wireless transmissionfacilities within a region, R₄, attempting to communicate with thenot-allowed transmission facility.

FIG. 20A illustrates a graph of exemplary distances between theoperating ranges of base stations 1975 and device 1972 as a function ofangle, wherein the angle is normalized with respect to a line betweenbase station 1975 and device 1972. Thus, a minimum distance between basestation 1975 and device 1972 is represented as R1, at an angle of zerodegrees between base station 1975 and device 1972 and extends to amaximum distance of R1+2R2, at an angle of 180 degrees (see curve a).

However, as the operating range of device 1972 exceeds the operatingrange of base station 1975 at 180 degrees, the distance may thus berepresented as R3 (see curve b).

Thus, as the angle between base station 1975 and device 1972 increases,the distance between base station 1975 and device 1972, at distance R2from device 1972, increases and becomes limited to a distance of R3 foran angular period around 180 degrees. The distance then decreases to R1as the angle increases.

FIG. 20B illustrates an exemplary power received at the operating rangeR2 of device 1972. In this case, the power received by a wireless deviceis a maximum at distance R1 and is a minimum at distance R1+2R2. (seecurve a). However, as the distance R1+2R2 exceeds the operating range ofbase station 1975, the power at distance R3 is limited to the power atthe edge of the operating range of base station 1975. (see curve b).Thus, to capture any devices within the local area of device 1972,device 1972 must transmit at a power between that received at R1 andthat received at R3. Further the power transmitted varies as a functionof the angle between base station 1975 and device 1972.

FIG. 21 illustrates a second exemplary network configuration inaccordance with the principles of the invention. In this exemplaryconfiguration overlapping regions 210, 220, 230, 240 provide continuouscoverage of one or more devices within their respective regions. In thiscase, each of the regions 210, 220, 230, 240 are represented as having acoverage area defined as R3 with respect to corresponding base stations212, 222, 232, and 242. As illustrated, a hexagon represents each of thecoverage areas 214, 224, 234 and 244. The hexagon representations areprovided solely to illustrate the interlocking coverage of theoverlapping coverage regions 210, 220, 230, 240.

Also illustrates is a transceiving station (device) 252, (which isequivalent to device 1972 of FIG. 19B). Also illustrated are wirelessdevices 262, 264, 266, and 268. Devices 262 and 268 are well within thecoverage region of base station 212, while device 264 is within anoverlapping zone between areas 210 and 230. Device 266 is outside thecoverage area of base station 212 and within coverage of base station222. Each of the wireless devices is within a local area represented bydistance R2 centered on transceiving device 252.

In addition, R1 represents the closest distance between base station 212and transceiving system 252. R4 represents the closest distance betweenbase station 222 and transceiving system 252 and R5 represents theclosest distance between base station 232 and transceiving system 252.FIGS. 22-24 represent graphs of power at R2 for each of base stations212, 222 and 232, respectively, in a manner similar to that shown inFIG. 20B. In this illustrated example, the power of each base station isassumed to be substantially equal so that the coverage areas,represented by R3, are substantially the same. However, it would berecognized that the power of each base station may be altered to providegreater or lesser coverage areas. In this case, the power received at R2may be greater or lesser and is a function of the output transmissionpower and the distance (e.g., R1, R4 and R5, respectively).

In one aspect of the invention, the transceiving system 252 may selectone of the base stations as a primary cell. The primary cell may beselected based on the base station being determined to be closest, indistance, to the transceiving device 252. The transceiving system 252may normalize the received power based on distance and transmissionpower of each of the base stations. In addition, the transceiving system252 may normalize the location of each of the base stations with respectto the location of the base station of the primary cell. That is, in theillustrated network configuration shown in FIG. 21, base station 212 maybe selected as the primary cell and base stations 222 and 232 may bedetermined as angularly separated with respect to the line between theprimary cell base station and the transceiving station 252. Thus, basestation 232 is slightly greater than 90 degrees offset from the linebetween base station 212 and transceiving station 252. Similarly, basestation 222 is slightly greater than 180 degrees offset from the linebetween base station 212 and transceiving station 252.

Referring to FIG. 25, the received power at R2 may then represent offsetbased on the angular difference between the primary cell base stationand the other base stations.

FIG. 26, which represents a superposition of the powers of the threepower curves, and further illustrates the power to be transmitted bytransceiving station 252, as a function of an angle around thetransceiver to maintain control of each of the wireless devices within alocal area 250. As would be understood, the illustrated power is takenwith respect to an known angle about the transceiving system (device)1975.

FIG. 27 illustrates a flow chart of an exemplary process in accordancewith the principles of the invention. In this illustrated process,transceiving system 252 receives the reference signal of each of aplurality of base stations. Although transceiving system 252 is outsidethe coverage area of base station 222, transceiving system 252 is stillable to receive the reference signal from base station 222 but does notcommunicate with this base station.

At block 620 a determination is made regarding the primary cell based onthe received power of the reference signals. At block 630, a position ofeach of the sources (base stations) of each of the reference signals maybe obtained or determined. For example, a base station position may bedetermined based on a received power and an angle of arrival of thereceived signal. Or the base station position may be provided usingGlobal Positioning Satellite system information. Or the base stationposition may be preloaded within general area.

At block 640 a distance is determined to each reference signal based onthe position of the source of the reference signal. At block 650, anexpected received power from each of the base stations is determinedalong a radius defining the local area with respect to transceivingsystem 252. A graph of received power from each of the base stationsalong the local area is determined. At block 660, positions of the basestations are normalized, angularly, with respect to a line between theprimary cell base station and the transceiving system 252 and thereceiving power graphs are oriented with respect to the primary cellbase station. A resultant power graph is determined based on thesuperposition of received power graphs and at block 670, thetransceiving system outputs a power level slightly greater than theresultant power at a corresponding angle.

In one embodiment of the invention a repeat Jamming Module, providesrepeat jamming capability and jams specifically a targeted cell phonesand/or wireless communication device. This repeat jamming techniquesutilizes the outgoing signal of the cell phone and repeats thetransmission 100 ns after the initial signal with matching power. Theeffect of the overlapping communication on the receiving transceiverprovides a confusion in the receiving transceiver and makescommunication impossible and the call and or wireless communication isdropped. In one embodiment of the invention the jamming module include aduel repeating circuit which a programmable delay line built in to allowthe same communication to be delayed by the programmed delay amount. Inanother embodiment of the invention the repeat jammers are placed ineach section of the facility. When the signal detection array detects anunauthorized cell phone the repeat jammer takes that cell phone and onlythat cell phone off line. When the phone tries to acquire the tower thecell phone's identification is re-verified.

In one embodiment of the invention, a Base Station Controlling Module,which identifies and controls cell phones interfaces with Cell PhoneDetection system to determine authorized and unauthorized phones,provides phone type, the time of arrival and the cell phones frequencyand seamlessly provides backhaul and Denial of Service (DoS)capabilities. The Base Station Controlling Module, which identifiesand/or controls cell phones, interfaces with Cell phone detection systemto determine whether a cell phone is an authorized or unauthorized cellphone, the cell phone detection system provides phone type, the time ofarrival and the cell phones frequency to the base station unit, the basestation unit matches the cell phone detected signal with the basestation controlled and/or required cell phones and verifies the cellphone of interest is within the unauthorized areas. It also verifies inone embodiment of the invention whether the cell phone is an authorizedcell phone for use within the facility, wherein the data matrixdetermines authorized vs. unauthorized cell phone and authorized areavs. unauthorized areas and, seamlessly interfaces either providingbackhaul and/or DoS capabilities.

In one aspect of the invention, a cell phone identification module whichidentifies cell phone identifications (IDs), determines whether anauthorized or unauthorized phone exists, and provides the phone type,the time of arrival and the cell phones frequency and seamlesslyinterfaces with the repeater jammer module, to disable the unauthorizedphone in either the unauthorized area and/or an unauthorized phone inany area of interest. The repeat jamming unit jams all unauthorized cellphones within the facility and allows authorized cell phones.

In one embodiment of the invention, the signal detection sensors areplaced throughout the facility to provide full coverage of the facility.Any cell phone within the facility will be detected and displayed on thecentralized console interface. This information will be sent to thesoftware radio Identification module to verify if this is an authorizedor unauthorized cell phone. If the cell phone is unauthorized the repeatJammer module will disable the cell phone or the Software RadioIdentification Module will deny service. The software radioidentification module is designed to receive a signal being transmittedfrom a cell phone and decode the IMEI number. The IMEI number iscompared against a database of authorized IMEI authorized cell phones.In one aspect of the invention, to prevent cell phone from entering afacility undetected, Low Noise Jammers will be installed at all egress(entrance) points within the facility. So that all cell phones cominginto the facility are verified by the Software Radio IdentificationModule. An ancillary benefit is anyone mistakenly or unknowinglybringing a cell phone into the facility will be picked-up at theentrance point. In another embodiment, the Software Radio IdentificationModule (SRIM) identifies all cell phone within the coverage area. Anycell phone that is in an on state within the coverage area (area inlight blue) will be Identified. The International Mobile EquipmentIdentity number or IMEI (Cell phone ID) will be compared with thefacility's “authorized cell phone list”. An authorized cell phone isallowed to make and receive calls. All unauthorized cell phones areprevented from making or receiving incoming and outgoing calls. Thesoftware radio Identification module can be expanded to provide cellphone call monitoring.

In one aspect of the invention, the base station acquires new cellphone, the base station provides, time code, band, and type to the cellphone detection sensor array. The cell phone detection sensor arraydetermines whether the cell phone is within exclusion zone, if the cellphone detected outside “Cell phone control area”, then the cell phone isreleased back to Network Cell Tower and/or the calls are allowed wherethe Cell Phone is backhauled to the network. If the cell phone is foundwithin the “control area”, and the base station determines whether cellphone is an “Authorized Cell Phone” (VIA HLR Database interface), theconsole displays a location of the cell phone, the (IMEI), and“Authorized cell phone status”. Alternatively, if the cell phone isdetermined to be an “Unauthorized Cell Phone” (VIA HLR Databaseinterface) the base station prevents incoming and outgoing calls and theconsole displays the IMEI, the cell phone and “Unauthorized phonestatus”. Or the Repeat Jammer Module jams the cell phone signal and theconsole displays the IMEI, the cell phone location and “Unauthorizedphone status”, depending on the system configuration. In anotherembodiment, the base station identifies all cell phones within thecoverage area. Any cell phone on within the coverage area (area in lightblue) will be identified. The International Mobile Equipment Identitynumber or IMEI (Cell phone ID) will be compared with the facility's“authorized cell phone list”. An authorized cell phone is allowed tomake and receive calls. All unauthorized cell phones are prevented frommaking or receiving incoming and outgoing calls. The base station modulecan also be expanded to provide cell phone call monitoring.

In another embodiment the signal detection sensor array is used toprovide Real-time tracking of inmates utilizing the BINJ Signal SensorArray with wristband tracking technology on each inmate. (See patentapplication Ser. No. 12/231,437). The system is expanded to include aStaff Safety Alert & Tracking System (SSAT) utilizing the Signal Sensorarray with built-in real-time wristband and/or security tags for thetracking of correction officers. In this embodiment of the system, thesystem, reports real-time time and position of every inmate and officerin the facility. The database collects every movement of a wristband upto 1000 times per second and provides this data into a data mining andhistorical playback capability. In another embodiment of the system thewristband has a signal detection module which a detects a cell phonewithin a specific area and the wrist band determines the user of thecell phone and reports the information back to the console. Some of theadvantages in tracking Officer and Inmates include: increased StaffSafety; inmate escape prevention tool; inmate and staff out of positiontool; continuous and accurate count of inmates; group/gangs interactionmonitoring; accurate work scheduling and monitoring tool; on post/offpost position of all security personnel; escape alarm; last knownposition; immediate alarm and the like. The data mining capabilitiesenable the data base and data mining to; accurately location of inmatesin relationship to other inmate/staff at all times and ability toaccurately, investigate assault/rape and assist in prosecution tool; andability to physically contact detection system for incident/rapeinvestigation and prevention tool; inmate tracking/data mining whichprovides for the identification of predators and predatory behaviors,create exclusion zones and alerting system to notify security of aboundary violation; inmate tracking and data mining: for assessing staffand inmates' vulnerabilities; provides for decreased agency liability byproviding accurate forensic information for court; the system alsoprovides for audio and alarm capability (incident/rape prevention tool).

In another embodiment of the invention, the Cell Phone Detection systemis integrated with a Base Station(s) Module, wherein this basestation(s) may also have back haul capability wherein the systemutilizes a Pico/Nano base station technology and cell phone detectionsystem. The base station registers the cell phone(s) and has the cellphone detection system verify the location of cell phone. Theallowability module determines whether the cell phone is authorizedand/or unauthorized. The system verifies who the cell phone belongs toif known IMEI (via database). The base stations directed to the systemto back-haul all authorized phones and display the authorized phoneswithin the interested area, not display cell phones in non-interestedareas. Then the base station(s) is directed to deny services to allnon-registered/unauthorized within the restricted area and display theserestricted phones and notify staff of their location and presence.

In another embodiment of the invention, the Cell Phone Detection systemworks in conjunction with an integrated Base Station Module without backhaul capability in which the base station(s) register the phone and havethe Cell Phone Detection system verify the location of cell phone. Theallowability module determines whether the detected phone is inside therestricted area. The system verifies who the phone belongs to by a knownIMEI (via database). The base station is directed to release authorizedcell phones and cell phones which are not in the restricted areas backto the local tower and display the authorized phones within theinterested area and not display phones in non-interested areas. The basestation is directed to Hold onto unauthorized cell phones and displaythe unauthorized phones. All non-registered cell phones will have Denialof Service (DoS), by being held onto by the base station unit and thelike.

In another embodiment of the invention, the Cell Phone Detection andIdentification Module in which the Cell Phone Detection system is thecontrolling unit. The system utilizes a sniffer and/or embedded IMEIdecoders within each sensor and cell phone detection sensor determinethe location and identification of all cell phones within a specificarea. The signal detection sensors find and positively locate the phone.In a configuration in which each sensor does not possess a decoder IMEImodule, the sensor provides the following information to the snifferTOA, frequency, type, channel. The sniffer scans for the phone, thenreports back the identification information. The system verifies who thephone belongs to and whether the cell phone is authorized or notauthorized. In a configuration in which each sensor has a decodermodule, the system displays green for authorized phone, red forunauthorized phones and the like. In another embodiment, the Sniffermodule finds and positively identifies the cell phones. The snifferprovides information to the cell phone detection and location system(TOA, ID, frequency, type, channel . . . ). The cell phone detection andlocation system then scan for the cell phone, verifies who the phonebelongs to and whether the cell phone is authorized and/or notauthorized in that location. Then the system displays green forauthorized phone red for unauthorized phones and the like.

In one aspect of the invention, the Cell Phone Detection andIdentification Module works in conjunction with 3rd party Telco Support.In this aspect the sniffer module (IMEI decoder and identified)positively identify the phones, gives information to the cell phonedetection and location system (TOA, ID, frequency, type, channel . . .). The Cell phone detection system scans and identifies a location ofinterested cell phone, verifies who the phone belongs and whether thecell phone is authorized and/or not authorized and displays green forauthorized phone, red for unauthorized phones. The system alerts theappropriate cell phone provider of an unauthorized call phone to havethe cell phone provider deny service on the cell phone and has Staffconfiscate cell phone and the like.

In another aspect of the invention, the Cell Phone Detection systemworks in conjunction with a repeat Jamming system and an IdentificationModule and/or embedded decoding module in which the sensors find andpositively locate the phones In this case in which there is externalidentification of the IMEI, the system gives information to the sniffer(TOA, frequency, type, channel . . . ), scans for the phone and reportsback the identification of the cell phone. The system compares theidentification with the database of an authorized phone and verifieswhether the phone belongs is authorized or not authorized user. Thesystem displays green for authorized phone, and red for unauthorizedphones. The facility may pick up that specific phone. The repeat jammerdisrupts the specific phone with a set repeat delay to take the cellphone off line. Pinpoint jamming disrupts all phones within the channeland area A Broadband jammer disrupts all phones within area andfrequency coverage and the like.

Although not shown, it would be recognized that the receiving and/or thetransmitting antennas and/or the processing systems may be co-located ormay be geographically distributed. When a plurality of receivingantennas are employed and geographically distributed, it would berecognized that correlation of the information obtained from eachantenna is necessary. In one aspect of the invention, a plurality ofantennas having a known angular receiving pattern may be co-located, seeFIG. 7, and remotely located from the processing system, to receivesignals at substantially the same time. It would be recognized that whenthe antenna system is remotely located from the processing system, theareas shown in FIG. 19B are oriented with respect to the antenna system.

In another embodiment of the invention, the wristband as described inpatent application Ser. No. 12/231,437, includes a signal detectionmodule as described in FIG. 6 and/or alternatively in anotherembodiment, FIG. 11, the signal detection module detects cell phonesignals, its use, and unique identifier information of the cell phonebeing used by the inmate. The wristband module may also include a voicerecognition module. A Cell Phone Use, and Authorization Database module(CPU-ADM), interfaces with the cell phone detection system and the basestation control system and controls when an inmate may make a phone calland/or receive a call. This module holds the allowed or dis-allowed(unauthorized) cell phone information for each inmate, what cellphone(s) he is allowed to use, the areas and times in which an inmatemay use his cell phone, the authorized places and phone numbers whichthe inmate may call and/or receive phone call from. The CPU-ADM systemin cooperation with the base station unit and cell phone detection unitsinputs, controls and monitor how long an inmate may stay on the phone,the cost incurred for each phone call, records the inmatesconversations, correlated voice pattern with each inmate to insure eachis the inmate who is prescribed to use the cell phone, and that oneinmate is not talking on another inmate's cell phone; correlates voicepattern of all calls made by the inmate and their recipient(s). TheCPU-ADM system analyzes all calls received and all calls made inconjunction with all person(s) contacted and analyzes for threat group,and security concerns and trends. The system monitors threat alertsanalysis and on keys words. The CPU-ADM system interfaces with thecanteen/inmate trust fund to debit inmate's account for each call made.The CPU-ADM system interface allows for inmates to input their desiredcall numbers, system allows for security personnel monitoring.

FIG. 28 illustrates one embodiment of the invention, where a restrictedcell phone (2801) is being controlled by a communication control unit(2802) when a wireless communications device (2801) is detected within arestricted area (2800), and this phone tries to make a 911 call. Thereare several ways to make this possible and to insure security andrestriction on the use of that cell phone. The first embodiment of theinvention is to backhaul (2806) the call to a 911 emergency responsestaff (2807) specifically designed to handle this restricted coveragearea (2800). This methodology will provide for quicker response and thepersonnel (2807) handling the call center will be specially trained torespond to the emergency and this will eliminate wasting personneloutside the restricted area to respond to someone trying to defeat the“no cell phone security system.” Additionally, the law enforcementpersonnel within the jurisdiction of the secure facility responding tothe 911 call may monitor the situation and record the call and provide aquicker response. To assist in the response, integrating thecommunication control unit with the CCTV system (2811), officer alarmsystem (2814) and inmate tracking system (2812) will provide theresponding personnel the ability to see who is making the call, whichinmate(s)(2809)(2815) and/or staff (2810) are around the caller. Toaccomplish the connection to the 911 call center (2805), the backhaulcan be accomplished through a wire line connection (2806) to theemergency call center. However, there are other methods of backhaulingdiscussed in the patent that are also applicable. This same methodologycan be used when transmitting authorized calls.

FIG. 28A illustrates the second methodology to allow the 911 call to bereleased to the commercial carrier. This can happen through severalmethodologies. Several processes however need to be in place, to insurethe inmate does not use the 911 call to get around the “no call phonerestriction system”. In this embodiment of the invention, the callconnection needs to be seamlessly released to the carrier, to provide aquick response to 911 authorities. However where the initial goal is toprevent unauthorized calls, it is important the commercial control unit(2802) has control of the “911 released” wireless communication device(2816), after the caller ends their 911 call. There is an opportunityfor the caller to the place another call through the commercial carrier.One methodology is to monitor the call and to verify it is stillconnected to the 911 system. Once the call is disconnected from the 911system, the communication control unit sweeps the channels of thecommercial provider to which channel the phone was transferred to.

In this embodiment, a communication control unit (2802), is atransceiver communications system which communicates with a wirelesscommunication device, such as a base station system, an access point,including such devices as a wireless access point, a femtocell, apicocell, a microcell and the like.

In this embodiment, illustrated on FIG. 28A, the communication controlunit (2802) connects to all wireless communication devices (2801) withinthe restricted zone (2800). The communication control unit (2802)connects the cell phone (2801) through a common switch (2819) and/orTelco Switch with the commercial carrier (2803) and does a hand off withthe commercial carrier (2803) as a commercial carrier would hand off acall from one tower to another tower, as when a caller is driving andtalking on the phone. FIG. 28A also illustrates another embodiment inwhich the communication control unit (2802) first switches the channelof the phone from a blocked channel (in this example, channel 8) to anopen carrier channel (in this example channel 1), then the communicationcontrol Unit (2802) transfers the phone (2801) off the communicationcontrol unit's channel 8. This can be accomplished by disconnecting thecell phone from the communication control unit. The 911 calling cellphone (2816) will try to reconnect the communication control unit (2802)first because it is a higher power level, (the communication controlunit (2802) has the option to lower its power to eliminate this fromoccurring), the communication control unit (2802) will not accept thereacquiring phone (2816) and the cell phone will go to the next closestaccepting tower, in this case a commercial carrier (2803). Thecommunication control unit may lower its power for a predeterminedperiod of time so that the cell phone may acquire the closest acceptingtower and then return its power level to a power greater than theaccepting tower so as to capture any other cell phones attempting toconnect to the accepting tower. The cell phone attached to the acceptingtower remains connected to the accepting tower even through the powerfrom the communication control unit is greater than that of theaccepting tower.

In another embodiment the communication control unit (2802), controlschannels 2-8 (2821) and does not control channel 1, all cell phones whocome up on channel 1 will attach to the closest commercial carrier(2803). The communication control unit (2802) switches the channel ofthe cell phone (2820) from a blocked channel to the open carrier channel(2817), the cell phone will only find the carrier channel (2817).

FIG. 28A further illustrates the embodiment in which the communicationcontrol unit (2802), Channel Sweep Software Program (2822) initiates aprotocol to capture and/or recapture the phone (2816) which is on theopen commercial channel (2817). This program can run periodically,and/or is initiated by a signal detection unit and/or the communicationcontrol unit and the like, which monitors the open channel (2817)specifically looking to recapture the 911 caller's cell phone and/orunknown cell phone(s) (2801). This methodology prevents the 911transferred cell phone (2816) and/or an unauthorized cell phone(s) frommaking additional calls, send texts and the like. This methodology alsopicks up cell phones within the restricted area (2800) which are on anopen commercial channel (2817). The Channel Sweep Software Program(2822) monitors the phone activity on 2817. In an embodiment of theinvention, if authorized phone(s) are currently using channel 1, theChannel Sweep Software Program moves the authorized phone(s) to anotherTelco Channel, (now the new “open Channel (2821)” and moves theunauthorized cell found to “hold channel” (2824)”.

FIG. 28A furthers illustrates that there is a set of protocols (2823)between the communication control system (2802) and the commercialcarrier (2803) and the like. When a 911 call is finished, the commercialcarrier (2803) will change the channel (2817) of the 911 caller (2816)from the open channel (2817) to a held channel (2824). The commercialcarrier (2803) will terminate the connection (2817) to the 911 caller(2816) and the caller will then re-attach to the communication controlunit (2802) on a held channel (2824).

In another embodiment the protocol (2823) setup between the commercialcarrier and the communication control unit will have a timed programrunning and the commercial carrier (2803) will terminate theconnection(s) to all cell phones in the commercial carrier cell sector(2826) of the restricted area. A variation of this embodiment,commercial carrier (2803) will change all phones in standby to acommunication control system's (2802) held channel (2824).

In another embodiment the communication control unit system (2802)analyzes the current configuration of the commercial carrier and choosesa new “to be opened” channel which is used by the commercial carrier(2803), if that new channel is currently being used by the communicationcontrol unit (2802) as a “captured and hold channel” (2824) thecommunication control unit (2802) will move all “captured and held” cellphone(s) on that channel to another “captured and hold channel”. Oncethe new channel is established, the communication control unit systemwill close the open channel (2817) used by the 911 caller, and all otherphones, will be acquired and held by the communication control unit(2802), the communication control unit will then determine which ofthese phones are “authorized” and which phone are “unauthorized”. Allauthorized phone will be switched to the new “Open “authorized” Channel,all unauthorized phone(s) including the 911 called will be switched to a“captured and hold channel” (2824).

This methodology can also be used to find “unauthorized” phones whichturn-on in the current Open “authorized” Channel. For example, thecommunication control unit releases an authorized phone to an openspecific channel to allow authorized cell phones to make and receivecalls, (this is in a configuration in which the facility allows specificauthorized cell phone(s) in a restricted area), the authorized phone isin standby on a commercial channel, an inmate turns on an unauthorizedphone, the channel happens to be the Open “authorized” channel,therefore the inmate gets the ability to make a call on the openchannel. The control system is interested in capturing the “newunauthorized cell phone” on the Open “authorized” channel. The methoddescribed previously can be implemented on a set schedule, or when aphone is detected in the restricted area and/or when the communicationcontrol system fails to capture.

In this embodiment the communication control system (2802) and/or asignal detection unit passively listens to the Open “authorized” channellooking for a connection by a cell phone originating from therestricted/controlled area.

In an alternative embodiment, the commercial carrier (2803) can changethe channel of the 911 caller to one of the communication control unit'scapture channels (2824) and then terminate the connection to the 911caller. The cell phone will try to reacquire the commercial carrier(2803), however the communication control unit's (2802) signal powerlevel is set to attract the 911 caller and the communication controlunit (2802) will take control and then move the “911 cell phone to a“captured and hold channel”.

In an embodiment of the invention, where the user wants to continuouslycontrol and monitor all authorized call actions including a 911 calleither by an authorized and/or unauthorized caller and may choose not toallow an Open “authorized” Channel, the communication control unit(2802) may connect a 911 call and/or an authorized call via a wirelesscommunication protocol (802.xx,), an IP backhaul, a VOIP backhaul,and/or utilizing a Femtocell and/or Pico base station communicationsportal backhaul, (IP protocol connection), internet and the like (2826)via to the commercial provider (2803) and/or the Telco switch (2819), orin a situation in which the secure facility has a telecommunicationsystem designed to handle landlines, the call can be routed to thelandline system such as an inmate phone system and/or a PBX system. Inthis embodiment, the communication control unit (2802) still maintainscontrol of the cell phone and its functionality.

FIG. 29 illustrates an embodiment of the invention where it is importantto allow an inmate(s) to communicate with their family and friends in asecure, safe and monitored manner, all of the inmate(s) can use any ofthe above communication portals and utilize cell phone (2802) and/orutilize 802 protocol communication devices (2901) and be routed to anyof the above mentioned communication systems. The 802.xx communicationdevices can be mounted on a wall (2904) or in the inmate's cell area(2901). For inmates in segregation units, where calling is restricted,the calling can be done through a two way intercom system (2903), cellphone (2820) or hand set (2902) to a switch (2905) then to the landlinesystem (2907) and/or any of the above, and or through an inmate phonesystem (2908) and/or a PBX system (2909) and the like. These connectionscan work directly through a CCU (2902). In an embodiment of the system,in which an authorized phone is being connected to the commercialcarrier (2803), there are several methodologies. In one embodiment asdiscussed in FIG. 28, the authorized cell is detected and connected tothe communication control unit (CCU) (2802), the CCU, verifies the cellphone is authorized, then the CCU directs the cell phone to the channelof the Femtocell, (2850), wherein the Femtocell then verifies theauthorized cell phone is also on its authorized list. In an embodimentof the invention, the CCU (2802) sends the authorized information to theFemtocell (2850), as the cell phone is being directed to the Femtocell,this way each authorized phone information is simultaneously sent to theFemtocell. In another embodiment of the system, as shown in FIG. 29A,when the CCU (2902) detects an authorized cell phone (2802), the CCU(2902) instructs the Power Control Module (2910) to lower the power ofthe control channel signal for the channel which the authorized cellphone (2802) is being sent to make an authorized call. The power islowered for a set period of time to allow the authorized cell phone toattach to the Telco (telephone service provider). The CCU then raisesthe control channel signal above the Macro signal of the Telco so as toacquire all cell phones that may be initiating a call. In a preferredembodiment, the CCU lowers the power of the control channel for apredetermined period of time. In one embodiment of the system the powerraising and lowering methodology can be performed in the radio head. Inanother embodiment, the methodology is accomplished by a programmableadjustable gain circuit, depending on the power of the Macro signalprovided by the Telco, wherein the power up and power down cycle isadjusted to accommodate the Telco network characteristics. In anembodiment the communication control unit (2802) can be used as amonitoring, scheduling, routing and control for inmate communicationswith family and friends.

In an embodiment of the invention, when the cell phone inside therestricted area (2800) is controlled by the communication control unitCCU, the CCU holds on the cell phone continuously as long as the phoneis in the restricted area. In an embodiment of the invention, tomaintain complete control of a restricted and authorized phone, a directcommunication bridge is created between the communication control unitand the commercial Telco (3001). The embodiment of the invention,whether the cell phone is authorized and/or unauthorized, is to controlthe cell phone, its functionality, abilities, capabilities and featuresof the cell phone(s) while allowing the cell phone to make and/orreceive a call and/or restricting the cell phone by not allowing callsor limiting the ability of the call allowed to be made. Thecommunication bridge, may be cellular, wire line, microwave, wireless,switch sets and the like. In an embodiment, the CCU sends an update tothe controlled phone and modifies its ability to send and receive email,by disabling its ability to send and receive data packets. In anembodiment of the invention, the CCU modifies the cell phone MIN/IMSI,thereby, if the cell phone finds an opening in the restricted zone, itcannot establish a connection to the Macro (Telco), and the like.Through the methodologies described, the cell phone in the restrictedarea can send and receive calls, only if the cell phone is determined tobe authorized to send and receive such calls.

FIG. 30 illustrates a further preferred embodiment where thecommunication control unit (2802) restricts the capabilities of arestricted area cell phone(s) (2801, 2820) by changing and/or modifyingthe feature and capabilities of the cell phone, and/or uploadingsoftware modifications (3003) to the cell phone(s) (2801, 2820) tochange their feature and capabilities. Another methodology is to disablethe features of the controlled wireless communication device (2801), byreprogramming the capabilities and functionality of the cell phones andlimit their ability to communicate (3003). The communication controlunit provides limited conductivity and prevents any alternativecommunications methodology; these functions will be disabled in thecommunication control unit (2801) by the system software when itestablishes the connection to connect the 911 call and/or alternately bythe commercial Telco (3001) when it receives a 911 call via thecommunication protocol. This solution can also be implemented in regardto authorized phones (2820) to limit their capability within arestricted area (2800).

FIG. 30 illustrates an embodiment wherein a direct communication bridge(3002) can be in the form of a cellular connection, wireless conduit, orwire line connections, switch set, straight backhaul to the switch andthe like. When the 911 call is initiated by the unauthorized phone(2801) (or unauthorized or restricted communications device and thelike), the communication control unit connects the controlled wirelesscommunication device to the communications bridge (3002) so the callgoes through and the communication control unit (2801) can monitor thecall, if necessary, and also any attempt by the controlled wirelesscommunication device (2801) to defeat the system, such as dialing asecond number or executing an email, accessing the web, IP chat, and thelike. The communication control unit (2802) can prevent such actions.

FIG. 31 Illustrates a preferred embodiment of the system whereincontrolling the output of the transmission of the cell phone and to thecell phone is critical. The Communication control system (2802) isprogrammed to allow only specific data packets to and from the cellphone (2801). The communication control unit (2802) restricts all dataexcept voice data packet(s) and/or packet-switched data sets and/or thelike. This function is performed by analyzing each packet set and onlyallowing the packet set containing voice data and the like. The goal ofthis embodiment is to disable cell phone features such as email, instantmessaging, video streaming, an ability to make a second call upon anexisting call, three way calling and the like, such as twit, and limitaccess to voice only. The system will also analyze the voice packet tomake sure nothing else in encapsulated in the voice transmission, inthat some restricted area have sensitive data and security documentswhich are not authorized to be transmitted.

One of the challenges of controlling wireless communication with thirdparty systems is the reluctance of the commercial carrier to provideconductivity to the Telco network and infrastructure such asHLR/Encryption keys, and backbone services. A second challenge ofcontrolling wireless communication is retaining complete control of thewireless device, while allowing the Macro network (or Telco) to sendcalls and data, messages to the controlled device. When under thecontrol of the CCU the wireless device is invisible to the Macronetwork, therefore the Macro network does not have an ability to send acall to the wireless device (cell phone) within the controlled area(2800). FIG. 31 illustrates a preferred embodiment of the invention,wherein the CCU's wireless communication emulator (WCE) (3103)establishes a connections with the commercial carrier (2803) as thewireless device, using the cell phone's communication protocols andidentity thereby establishing an over the air communication connectionto the Commercial Carrier (2803). When someone tries to call the cellphone 2801/2820 the CCU's wireless communication emulator (WCE) (3103)receives the communication the CCU and controls the call.

The CCU then has the option to connect the outside caller with therestricted zone cell phone (2801/2820) or preventing thecommunication/data connections, depending on a set of establishedparameters. For example, if the phone is in a restricted area, thecalled party may be played a message the called party cannot receivecalls and is instructed to call back. Or if the phone is an authorizedphone (2820), connecting the communications, however preventing datatransfers because the phone is in a classified area and datatransmissions violate security policy and the like. FIG. 31 alsoillustrates using a Femto cell (3102) (and the like, a device authorizedby the commercial carriers) to be the bridge to the commercial carrier,the CCU (2802) establishes and communicates with the Femto cell, when arestricted phone attempts to make a call the CCU sends the phone toand/or connects the phone to the Femto cell. The Femto cell establishesthe call via the commercial carrier network. When an incoming call for arestricted phone is requested of the commercial carrier network, thecommercial carrier establishes the connection through the Femto cell. Asdiscussed previously the CCU has the option to connect the incomingFemto call to the restricted cell phone. In another embodiment of theinvention all authorized phones are re-directed and connected to thecommercial carrier via the Femto cell. One of the challenges of allowingan air connection to the femtocell is preventing unauthorized users.

Currently, packet switching is a digital networking communicationsmethod that groups all transmitted data regardless of content, type, orstructure into suitably sized blocks, called packets. Packet switchingfeatures delivery of variable-bit-rate data streams (sequences ofpackets) over a shared network. When traversing network adapters,switches, routers and other network nodes, packets are buffered andqueued, resulting in variable delay and throughput depending on thetraffic load in the network. Packet switching contrasts with anotherprincipal networking paradigm, circuit switching, a method which sets upa limited number of dedicated connections of constant bit rate andconstant delay between nodes for exclusive use during the communicationsession. Currently two major packet switching modes exist; (1)connectionless packet switching, also known as datagram switching, and(2) connection-oriented packet switching, also known as virtual circuitswitching. In the first case each packet includes complete addressing orrouting information. The packets are routed individually, sometimesresulting in different paths and out-of-order delivery. In the secondcase a connection is defined and reallocated in each involved nodeduring a connection phase before any packet is transferred. The packetsinclude a connection identifier rather than address information, and aredelivered in order.

Currently, packet mode communication may be utilized with or withoutintermediate forwarding nodes (packet switches or routers). In allpacket mode communication, network resources are managed by statisticalmultiplexing or dynamic bandwidth allocation in which a communicationchannel is effectively divided into an arbitrary number of logicalvariable-bit-rate channels or data streams. Statistical multiplexing,packet switching and other store-and-forward buffering introduce varyinglatency and throughput in the transmission. Each logical stream consistsof a sequence of packets, which normally are forwarded by themultiplexers and intermediate network nodes asynchronously usingfirst-in, first-out buffering. Alternatively, the packets may beforwarded according to some scheduling discipline for fair queuing,traffic shaping or for differentiated or guaranteed quality of service,such as weighted fair queuing or leaky bucket. In case of a sharedphysical medium, the packets may be delivered according to somepacket-mode multiple access schemes.

In this embodiment some voice data packet(s), binary data,circuit-switched wireless digital voice, and/or packet-switched datasets and the like include Short Message Service (SMS); SMS is abidirectional service for short alphanumeric messages. Messages aretransported in a store-and-forward fashion. For point-to-point SMS, amessage can be sent to another subscriber to the service, and anacknowledgement of receipt is provided to the sender. SMS can also beused in a cell-broadcast mode, for sending messages such as trafficupdates or news updates. Multimedia Messaging Service (MMS)—sometimescalled Multimedia Messaging System—is a communications technologydeveloped by 3GPP (Third Generation Partnership Project) that allowsusers to exchange multimedia communications between capable mobilephones and other devices. An extension to the Short Message Service(SMS) protocol, MMS defines a way to send and receive, almostinstantaneously, wireless messages that include images, audio, and videoclips in addition to text.

Currently, EMS (Enhanced Message Service) is the step between SMS andMMS it has some of the MMS function like sending formatted and coloredTEXT, sample Graphics and Audio files which are simple like Ring tones.EMS is being used by some limited phones because it's being supported byold networks instead of MMS, which need (2G) or (3G) network. The (3G)network might support very large MMS size while the (2G) may limit theMMS size to 100 KB only.

Currently, SMS, MMS and EMS services are utilized within the largerwireless domains such as GSM, TDMA, GPRS, and CDMA, CDMA2000-1×, EDGE,UMTS, GPRS and the like.

FIG. 31 further illustrates a preferred embodiment wherein thecommunication control unit decodes the packet-switched wirelesscommunications and blocks the restricted data services from the voiceonly service. The system includes Simple Mail Transport Protocol (SMTP)preventions; a de-encryption tool set for high-speed multi-media, SMS,EMS, and MMS enabled platforms, such as 3G and the like.

In an embodiment communication control unit includes the whole cellularconnections conduit including the Cell Tower and Base Station and subcomponents such as the Base Station Controller (BSC), Mobile SwitchingCentre (MSC) and/or the Gateway GPRS and the like. In an embodiment abase station is the cellular relay station (or cell tower) that a cellphone talks to when initiating or receiving a wireless call.

In this embodiment, the Mobile Switching Center (MSC) is acomputer-controlled switch for managing automated network operations. AnMSC automatically coordinates and controls call setup and routingbetween mobile phones in a given service area. In this embodiment theMSC maintains individual subscriber records, current status ofsubscribers, and information on call routing and subscriber information.Traditionally, there are two subscriber databases called the HomeLocation Register (HLR) and the Visitor Location Register (VLR). The HLRcontains subscriber profiles, while the VLR provides informationrelevant to roamers.

In an embodiment, a modified Home Location Register (HLR) and/or theVisitor Location Register (VLR) are modified to contain theunauthorized/authorized cell phone list and the like.

In this embodiment the SMS, EMS, WMA, and MMS and the like, utilizes theShort Message Service Center (SMSC), which acts as a store-and-forwardsystem for relaying short messages. In a preferred embodiment the systemwill disable and/or manipulate the functionality of the Short MessageService Center to stop the reception of said data packet(s) (message,data file, data packet and the like) and reroute these data sets to adatabase for future analysis. Additionally, since messages are stored inthe network until the destination cell phone becomes available, thecommunication control unit will collect the waiting packets/messages andthe like and prevent them from reaching their destination and reroutethe data for future analysis.

In an another embodiment and application, where the GMSC interrogatesthe Home Location Register (HLR) for subscriber routing information anddelivers the short message to the home MSC or roaming MSC of thedestination mobile unit the communication control unit, will reroutethese SMS, EMS, MMS data packets into a database which will contain thesender's and receipt's unique identifier(s), time-stamp reporting,location of cell phone at the time of send, the receiving andtransmitting cell phone number and the like.

In an embodiment in which the commercial carrier utilizes a basicpoint-to-point or broadcast-to-point subscriber servicesMobile-terminated short messages (MT-SM) and/or a Mobile-originatedshort messages (MO-SM), in which MT-SMs are transmitted from the SMSC tothe handset or from the SMSC to other sources, the communication controlunit will intercept these messages as mentioned above and return areport to the SMSC, confirming that the message was delivered and/orinforming the SMSC of the SMS failure. The answer will depend on theparameter set on the system within a specific application and goal themission of the system.

In an embodiment the commercial carrier deploys the use of a short code,which is a carrier-specific (and therefore carrier-dependent) phonenumber for applications routed through an SMSC. Thus, it is intendedthat this embodiment to capture all transmitted and received non-voicecommunications. However it is also anticipated that a message will beencrypted within a voice packet, and API will be designed on smartphones to bypass the current data transport methodologies and thisinvention anticipates that inevitability and the like.

Additionally, in all of the interception of messages and/or datatransmissions, a preferred embodiment will include the methodology totrigger the correct reply to the unauthorized transmission, that themessage and/or data was received and open by the intended recipient.

In an embodiment, where the Subscriber Identity Modules (SIM) cards isused for activation, and subscriber-profile purposes, the communicationcontrol unit and/or system will modify the SIM information, such as theelectronic serial number (ESN) and/or the mobile identification number,(MIN) within the phone or on the SIM card or within the phone to pull asubscriber offline. By changing the SIM information, and/or theinformation identifying the phone, the cell phone is not able tointerface with the commercial tower and/or the cell phone is deniedaccess because the identification information and the like, isincorrect.

In an embodiment the communication control unit interfaces with theservice-provider gateway(s) and/or commercial carrier gateway(s) andprovides the gateways with the unique identifier of all restrictedphones, and a set of parameters which indicate which features of saidphones should be disabled, which phones should be controlled, maintainedand the like. In another embodiment the communication control unitinterfaces with a set of transmitters and/or transceivers through and/orby the service-provider gateway(s) and/or commercial carrier gateway(s)and the like.

In an embodiment in which the cell phone is a Smart phone and the like,and/or a phone which provides alternative communication capabilitiesand/or advanced features, (i.e. includes the capability to transmitsinformation without utilizing FCC commercial carrier frequencies,utilized web enabled features such as twit and the like, for example theuse of third-party platform, that acts as an operating-system layerbetween the Internet and wireless devices. This communication may be viaWi-Fi on Wi-Fi enabled cell phones (and the like), the communicationcontrol unit interfaces with, a or a set of, Wi-Fi access points (ex.433 mhz, 912 mhz . . . 2.5 ghz, etc.) which attract wirelesscommunications to the communication control unit. The communicationcontrol unit will simulate the transmissions and the intended results ofa completed transmissions and/or send back a “received indication”. Thegoal is to provide the environment, in which the restricted cell phoneuser believes they have an actual connection and communication pathway,and provides the ability to the communication control unit, to capturethe date transmitted from the cell phone and provides a simulated“correct” response.

In another embodiment, the wireless communication access point, providesthe intended recipient the belief the inmate send a message. Howeverthis message is a rogue put in place to assist law enforcement in theinvestigation and to thwart the continuing criminal enterprise and allowthe law enforcement personnel the ability to catch the transmitter andreceivers of restricted area communications.

As previously mentioned one of the goals is to identify the person whois attempting to contact the restricted area cell phone. In a preferredembodiment the communication control unit (2802) and/or the commercialcarrier interrogates the person's cell phone attempting to contact therestricted cell phone and collects investigative data including but notlimited to photos, text email, phone records, voicemail, call historyand the like.

In the case of other wireless communications, such as a Wi-Fi accesspoint being setup outside the restricted area to provide a wirelesscommunication conduit to someone inside the restricted area, it isimportant to be able to detect that wireless communications node and/oraccess point. In an embodiment the signal detection system and/or thecommunication control unit (2802) will monitor the external area aroundthe restricted area to detect for any wireless communications which maybe pointed at or configured in such a way to provide wirelesscommunication devices with in the restricted area to communicate outsidethe restricted area. In an embodiment, the communication control unitand/or the signal detection system will also look to detect wirelesscommunications within the restricted area communicating with otherwireless communications within the restricted area; for example, aninmate in administrative segregation (ADSEG) communicating to an inmateoutside of ADSEG.

In the preferred embodiment, developing a commercial carrier survey,which includes the footprint of the restricted area, the settings,surrounding characteristics and a benchmark on the cellular activitywithin and/or around the restricted area is performed. Also benchmarkingthe characteristics of the commercial base stations, their components,and the cell towers to provide the ability to accurately and seamlesslysimulate and/or clone the towers and all of their characteristics,capabilities, data hand shake protocols, unique identifies of each ofthe tower and channels, signal strengths and the like. This dataset anddatabase of information is important to accurately place and toconfigure the functionality of a communication control unit, so that thecommunication control unit does in fact clone the commercial basestation and its towers. Additionally, this information gathered providesthe ability to catalog into a criminal justice database which can crossreference cell phone activity usage, cell phone purchases, gang activityand provider perimeter detection analysis capabilities, information onthe capturing of contraband cell phone(s), assist in accuratelydetecting of a cell phone, provide critical information for contrabandinvestigations, provide trends and analysis of preferred cell phonebeing used by inmates and their criminal enterprise.

Some of the important and relevant information and data to be gatheredis: What tower cell(s) and/or sector is the restricted area located in?How many towers in the area? What transceiver frequencies does eachtower provide? How many channels does each tower have? What are theparameters of the control and reverse control channels? What are thecell towers sectors and cell and related power levels? What protocols isthe tower capable of communicating? What are the handshake protocols?What are the power levels at each frequency and protocol? What are theunique identifiers of each tower? How many cell phones are locatedinside the restricted area? How cell phone may is located adjacent? Howmany are transient cell phones? (example a corrections officer has acell phone, he drives 5 miles to work each way, the cell phone isswitched between three tower on his way to and from work, the phonespends 8 hours at night sitting in sector/cell 2 of Tower B; Tower B isa mile away from the corrections officer's home, the phone spends 8hours 5 days a week, in sector/cell 6/8 of Tower A).

For each cell phone within the above questions it is important to know:What carrier each phone is connected to? What is the cell phone number?What is the IMEI information? What is the SIM information? What is themake and model of the cell phone? Who the cell phone belongs to? Whereis the billing address? What type of billing on this phone? Is thisphone paid for by check or credit card? Does this phone belong to aperson who works at the facility? Does his phone belong to a friend andfamily member of an inmate? Does this person live next to the restrictedarea? Does this phone migrate from this location? If yes how often?

In a preferred embodiment where the desire is to shut down thecommunications of a cell phone and/or wireless communication device(s)and the protocol is encrypted to communicate with said device, severalmethods are available to detect and take said cell phone off line. Inthis embodiment, when the cell phone turns on, it may or may not try toconnect with the communication control unit because the communicationcontrol unit does not have the protocol to talk to the cell phone, thecell phone cannot communicate with the communication control unit.Therefore, the cell phone attaches to the commercial carrier who canunderstand and communicate with the cell phone. This methodology ofdetection and control is applicable to any wireless communicationdevice. The communication control unit and/or the signal detectionunit(s) detects a cell phone which is in the restricted area, howeverthe cell phone is encrypted and neither system can either connect to thecell phone and/or cannot determine the unique identifier. However bothsystems can determine the general and/or specific location, and/or thefrequency and/or time stamp and/or the type for the cell phone, whichwas detected, however, did not attach to the communication control unit.The communication control unit and/or the signal detection systemprovides that information to the commercial provider by communicationnetworks discussed earlier in this patent or by another real-time and/orother means and the like. Real-time is preferred; however, asynchronouscommunication will also get the desired results. The commercial carriercorrelates the time stamp, frequency, type, location and determines thecell phone which has eluded the communication control unit. Thecommercial carrier provides the information above and the systemdetermines, as discussed in another patent application, whether this isa contraband phone, an authorized phone, a transient phone and the like.

In a preferred embodiment the communication control unit and/or thesignal detection system detects the encrypted identifying informationand utilizes the encrypted information as a positive identification bysending the encrypted information to a location and/or machine, and/orsystem such as the commercial provider to decrypt the information andthe like. Additionally, the communication control unit and/or the signaldetection system utilize the unique encrypted data set to track andidentify the wireless communication device and the like.

In a preferred embodiment, the interface between the communicationcontrol unit and/or the signal detection system and the commercialcarrier allows the “authorities” (the law enforcement agency controllingthe restricted area) to shut down that cell phone rather than thecommercial carrier.

In a preferred embodiment, communication control unit and/or the signaldetection system utilizes analysis algorithm(s) and dataset andparameters on location, payment type, location of the owner, transientproperties of the cell phone, time of call, location of call and thelike, using the data collected above and more and the like to determine,if the cell phone is actually a contraband phone as opposed to a visitorto the facility sitting in their car adjacent to the fence line, and/orthe determined location assures that the cell phone in questions isactually a contraband phone.

In another preferred embodiment, where the desire is to shut down thecommunications of a cell phone and/or wireless communication device andthe protocol and the available technology is a signal detection devicewith and/or without an IMEI/IMSI, electronic serial number (ESN) MINdiscriminator and the like. In this embodiment, when the cell phoneturns on, the signal detections system detects all and any wirelesscommunication devices. When the signal detection system detects a cellphone(s) which is in the restricted area, the system determines thegeneral and/or specific location, and/or the frequency and/or time stampand/or the type for the cell phone, and in some case(s) the uniqueidentifier. The signal detection system provides that information to thecommercial provider by a communication network as discussed earlier inthis patent or by other real-time methods and/or other means and thelike. The Real-time method is preferred; however, asynchronouscommunications will also get the desired results. Currently, in cellulartelecommunications, there are three cell phone identifiers; the cellphone (device) ID, for CDMA it is the MEID, and or GSM it is the IMEI;the subscriber ID, for CDMA it is the MIN, for GSM it is the IMSI; andthe cell phone number to call out and the cell phone number to be calledfor CDMA it is the MDN and for GSM it is the MSISDN. Traditionally, eachcellular telephone has an Electronic Serial Number (ESN) hardwired intothe phone by the manufacturer. This number was uniquely and permanentlyassociated as to identify each and every cellular phone. Also, when acellular telephone is put into service, it is assigned a MobileIdentification Number (MIN) by the cellular service provider. This isthe ten-digit area code and telephone number of the phone. The mobileequipment identifier (MEID) is a globally unique number identifying aphysical piece of CDMA mobile station equipment. The commercial carriercorrelates using the information received from the signal detectionsystem to determine the cell phone(s) identification in the restrictedarea. For example if the signal detection system which provides the ESN,MIN, IMEI, MEID positive identification is automatically determined.Thus, if the signal detection system provides the frequency, location,time stamp and/or the type the commercial carrier can correlate thetimestamp and frequency provided with the phone's IMEI and/or phonenumber. The signal detection system determines, as discussed herein andin the aforementioned related patent applications, whether this is acontraband phone, an authorized phone, an unauthorized phone, arestricted area phone, staff phone, transient phone and the like.

In an embodiment of the invention it is critical to configurecommunication control unit to work with the commercial carrier towerparameters such as frequency, protocols, cell/sector coverage,transceiver power, channel coverage, frequency priorities and the like.To cover all of the channels, protocols and frequencies of a carriertower the communication control unit must know the tower parameters andwhen those parameters change. In an embodiment the communication controlunit monitors all of the towers within the vicinity of the restrictedarea. The communication control system tower configuration database andalgorithm utilizes the data parameters such as frequency, protocols, andcell/sector coverage, transceiver power, and channel coverage, frequencypriorities, to optimize the communication control unit to effectivelyand completely control the cell phone usage within an area.

In a preferred embodiment the commercial carrier provides all the towerparameters such as frequency, protocols, control and reverse controlchannels, cell/sector coverage, transceiver power, channel coverage,frequency priorities and the like, as they change to the communicationcontrol system so that the communication control unit worksproficiently. The communication control system tower configurationdatabase and algorithm utilizes the data parameters such as frequency,protocols, cell/sector coverage, transceiver power, channel coverage,frequency priorities, to optimize the communication control unit toeffectively control the cell phone usage within an area.

In another embodiment the communication control system sets up equipmentwhich interfaces with the tower and/or monitors changes and/or to detectchanges in the tower parameters.

In the preferred embodiment the data derived from the commercial carriersurveys on the cell phone usage in and around the footprint of therestricted area provides an ability to see and understand how contrabandgets into prisons. Correlating who is bring in these phones, what callthese contraband phones call, determining the relationship betweenprisons and who is the organized element providing contraband.

In the preferred embodiment the communication control unit, (also knownas a base station denial of services system) is seamlessly integratedwith a signal detection system. In an embodiment, this signal detectionsystem is a time-domain based location and tracking system, which coversthe frequency of all of the cell phone frequency channels as well as allof the Wi-Fi frequencies, walkie-talkie and rogue frequencies.Currently, 300 MHz to 3.5 g should be scanned; however this will changeover time and will have to be expanded. The integrated detection andcontrol system allows for the accurate determination of whether the cellphone is within the restricted area or is just on the other side of thefence. This ability to accurately determine the location is critical tomake sure only restricted phone are denied service and commercialcarrier customers.

In this embodiment, the base station technology is integrated with atime-domain location and tracking system, and/or an amplitude detectionand location, identification and tracking system with more sensors for amore accurate location capability.

One of the challenges is preventing wireless communication device withina restricted area the ability to defeat the system by being able tochoose and/or choosing a commercial tower and avoiding the control unitsystem. This embodiment solves that situation. When a phone is detectedin the restricted area and is not under the control of the communicationcontrol unit, the system provides the unique identifier(s) (frequency,IMEI, time code, sector/cell and the like) to the commercial provider todisable that cell phone.

In the preferred embodiment, preventing the cell phone from ever beingable to bypass the communication control unit is also the intention ofthis invention. Cell phone apps (applications), in the future, and issome cases, currently, will be able to pick and choose their wirelessconnections/wireless conductivity and their commercial providers and orcommercial providers' towers. To prevent the communication control unitfrom being intentionally and/or accidently bypassed, the communicationcontrol unit needs to simulate the characteristics (e.g., frequency,duty cycle, modulation, phases, etc.) of the signals provided bycommercial provider's towers so that the unauthorized cell phone cannotdistinguish between the tower(s) and communication control unit.

In the preferred embodiment when the cell phone chooses the commercialtower the cell phone will still attach to the communication controlunit, if the cell phone is within the area of interest. This act isperformed working in collaboration with the commercial carriers.

In the preferred embodiment the communication control system towerconfiguration database and algorithm utilizes the data parameters suchas frequency, protocols, cell/sector coverage, control and reversecontrol channels, transceiver power, channel coverage, frequencypriorities, cell tower(s) location(s), transceiver frequencies, channelparameters, sector parameters, channel distribution, cell towers sectorfrequencies, cell power levels, tower protocols handshake protocols,power levels at each frequency and protocol, tower, base station and thecommercial provider's unique identifiers and identification identifiers,cell sector, and channel intersection information and their power levelsat each location, and provider's encryption protocols and identifiersand the like, to clone and optimize the communication control unit tolook like each commercial tower(s) in the area.

In an embodiment when a cell phone in the area of interest looks for analternative cell tower to connect with, such as a commercial provider'stower(s), the cell phone only sees the communication control unit and/orthe communication control system's other wireless communicationsoptions, such as Wi-Fi access points and the like.

In an preferred embodiment, the Wi-Fi access points provides theunauthorized cell phone with a connection which provides the user with acontrolled portal experience, which the restricted user believes he hasfound a hole in the system. However, this portal is controlled. Thisconnections provides the communication control system an ability toinfiltrate the cell phone and gather information of the users, providesan ability to modify the features of the cell phone to the benefit ofthe secure facility. This embodiment is also applicable to allalternative communication transceiver(s), such as Wi-Fi, Wi-Maxcommunications devices and the like and also applicable to all otherwireless communication devices and the like.

In another preferred embodiment when the cell phone looks for analternative cell tower to connect with the cell phone only seesclones/shadows of commercial tower(s) and when the cell phone tries toconnect to the said clone(s)/shadows of commercial tower(s), the phoneactually attaches to the communication control unit. However, the phoneis displayed that it has connected to the commercial and/or alternativetower. This embodiment is also applicable to all alternativecommunication transceiver(s), such as Wi-Fi, Wi-Max and the like andalso applicable to all wireless communication devices and the like.

These preferred embodiments solve a known problem(s) and situationfacing the corrections and law enforcement community, in which arestricted cell phone gets conductivity though a wireless 802.xxconnection which is established outside the restriction zone (i.e., aninmate has friend place an Wi-Fi access point with commercial cellularconductivity in a parking lot which is not within the restricted area,therefore, the access point connects to the commercial tower and hasunrestricted access to the outside world, then the inmate uses a 802.xxconnection to reach that access point and now the inmate has acommunication conduit which a managed access system alone would notdetect. These embodiments in concert remove this threat completely.

In an embodiment of the invention, where the goal is to gather theunique identifier of the wireless communication device without usingtransceiver technology and the cell phone, for example, is in standby,and the system setup a set of repeater signals systems which will repeatthe neighboring cell tower's channel and raise the power level of theneighboring cell tower's channel(s) great than the power of the celltower which the cell phone is currently connected to. This will attractthe cell phone to change towers and provide for a reconnection protocol.

One of the challenges of controlling a cell phone is knowing which cellphone is posing a danger and which cell phone does not pose a danger. Inone embodiment of the invention, the system detects a wirelesscommunication device and determines how that cell phone should betreated. In this embodiment a cell phone is detected by theCommunication Control Unit. The unique identifier is determined andcompared to a list of “authorized phones”. If the phone is authorized tomake a call, (authorization variables, include, time of call, personcalling, person called, shift information, scheduling information, unitlocation, job position . . . ) the system then checks the location ofwhere the phone is presently to determine whether the phone isauthorized to make a call from that area.

In an embodiment of the invention, a signal detection system verifiesthe exact location of the wireless communication device; the zonedatabase identifies and classifies each area of the facility, forexample: (red) areas—may be housing units, inmate areas, inmates cells,programs and inmate population areas, inmate rec yards; (grey) areas—mayrepresent perimeter areas which are susceptible to misidentification.e.g., fence lines, wall perimeters and (green) areas—may represent areassuch as administration areas, staff dominated areas. The exact locationof the phone is important to determine whether this phone is actuallywithin one of those restricted areas and/or sectors.

In an embodiment, If the cell phone is not authorized, (cell phone isdetermined by the unique identifier not being on the authorized list),several scenarios need to be determined before the cell phone is deniedmaking and/or receiving a call. Variables include; who is the callertrying to call, is this phone actually in a restricted area.

In an embodiment, the communication control unit (CCU), controlsunauthorized and monitors the cell phone to determine what number andprograms are being executed on the cell phone and determines what numberis being called. Additionally, the Communication Control Unit ismonitoring the cell phone activity (email, messaging, tried calls,) andall data is being stored for retrieval and analysis. If the cell phonecalls an emergency number (e.g., 911) the program determines how tohandle a 911 call, some option include: releasing the 911 call back tothe commercial carrier to complete the 911 call, or redirecting the 911call via a PBX connection routing the call to the facility security teamor redirecting the call via a picocell and IP backhaul. The two latteroptions allow monitoring of the call automatically; the former solution,call still can be monitored. (see FIG. 27, for resolving 911 calls).

In an embodiment of the invention, the system looks at the number the“not authorized” cell phone is trying to call and the system comparesthe number with numbers in a database of inmate called phone numbers andknown associates of inmates, their friends and relatives; this can befrom the Inmate phone system and/or the inmate records and/or visitorrecords and/or the cell phone ID sensor in the lobby and/or the like. Ifthe number being call is a known security risk, such as the databasenumbers or the like, the system “denies service” and notifies security,logs the incident, alerts administration, displays location of disabledphone on a GUI interface, notates the location, type and identificationand service; the system also compiles this data for investigation, andthe like.

In an embodiment of the invention, if the “not authorized” cellphone/wireless device is trying to place a call, email, and the like andthe called/text/communicated with is unknown, and/or the wireless deviceis in standby, the system looks to the location of the phone to verifythe phone is actually in the restricted zone. The Communication ControlUnit (CCU) and/or the Cell Phone Detection System (CPDS) verifies whichzone the cell phone is located (green, grey, red . . . ). Secondarily,the system looks to see if the cell phone has been denied access before.The system runs a weighted set of algorithms to determine whether thecell phone which was denied access, is actually an unauthorized phone ora phone which has, by accident, been picked up by the system. Some ofthe variables which make up the analysis of the weighted algorithm are,but not limited to, number of denials, number of locations, number oftimes, number called and the like. When the system, detects a phonewhich is not an authorized phone, but also is confirmed to not pose athreat the system adds it to a “Pose No Danger List”. The agency decideshow to deal with the pose no danger list. Some examples are neighborswho live next to the complex, people who work at the facility, frequentpedestrian who walk frequently near the complex and the like.

In an embodiment of the invention, the system uses different detectionstechniques such as phase angle cell phone detection, narrow band antennasignal detection, phase detection, amplitude detection, time-domaindetection resolve the ambiguity and the precise location of the wirelessdevise. If it is determined the cell phone is most likely outside therestricted zone the system checks to see if the number dialing is aneighbors, visitor, staff/trusted persons. The system looks at databaseswhich contains these numbers. The system also verifies whether this IDhas been released before and verifies why. The systems also verifieswhether the number being called on a known agency list, state agency,and/or known entity.

In an embodiment of the invention, if the phone belongs to a neighbor orstaff member, the system allows the call/text and/or the incoming call,alert facility admin, (options register neighbor phone(s), registerstaff phone(s), verify location of call, develop a matrix of “zoneviolation mis-identifications”

In an embodiment of the invention, if the device cannot be confirmedthat it is outside the restricted area and/or cannot confirm previoushistory at the facility, the system runs additional tests. FIG. 26 ofthe embodiment, utilizes Telco History data to make a determinationwhether the wireless communications device is: new to the area, arrivedtoday, migrates thru the area and the like and this data is also usedfor investigative, and documentation history.

The system downloads phone history from the commercial provider and usesthe data to see whether the device has previous history. The data fromthe TELCO may include all data connections transfer, cell, locationsconnections (sector, cell) transmission history, data, transmissions,GPS information, tower information connections history, Telco cellsector(s)/wireless access nodes, device ownership, payment information,name of owner. The system looks for phone's usage, tower information,tower locations, channel and sector/cell locations; checks to see ifcell phone arrived in the area today; whether the cell phone belongs tosomeone local; whether history shows consistency of local usage; whetherthe phone is registered to staff. With this analysis the systemdetermines the likely hood that the cell phone is a legitimate cellphone and whether the call should be allowed.

In an another embodiment where tracking and identifying a wirelesscommunication device (s) in standby, in an environment where manywireless communication devices are present, or in an environment inwhich, the location of the person carrying the cell phone provides dataand/or where the specific location of the cell phone and or wirelessdevice is critical, having the wireless device transmit a signal and/orits identification is important. Such as a conference center, mall,secure facility and/or casino detecting the phone in standby isimportant. FIG. 32 illustrates a method of using base station technologyto stimulate cell phone and/or other wireless communication which are instandby. In the FIG. 32, elements 1, 2, 3, and 4, represent fourFemto/Pico base stations. Femtocells 1 and 2 have distributed antennasproviding a network of spatially separated antenna nodes which providecell coverage in a directional column fashion and Femto cell 3 and 4have distributed antennas providing a network of spatially separatedantenna nodes which provide cell coverage in a directional row fashion.

In this embodiment the power lever of Femto 4 is greater than Femto 1,Femto 1 is greater than Femto 3, and Femto 3 is greater than Femto 2When a cell phone moves from one row to another or from one column toanother row the cell phone detect a different power level, therebyrequesting the cell tower to connect to the new greater powered tower.Additionally, in another embodiment where it is desirable to have cellphone which are stationary (not moving outside the prescribed columnand/or row) to provide their location and identification, modulating theFemto cell transmission power at a set time and power level incoordination with the intersecting directional femtocell provides amethod by which the cell phone in standby which has been stationary willalso switch towers and provide its location and identification.

In another embodiment, other methodologies for detecting cell phone instandby also will produce the same results such as switching and/orsetting intersecting and or adjacent column and row femtocells from lowband to high band, or from one channel to another, one frequency toanother or one protocol or another. In this embodiment, each femtocellis back hauled to provide continuous conductivity to the Telco. Inanother embodiment and methodology the femtocells are not backhauled andto not accept the hand off and the cell phones stay connected to theTelco, still producing a positive identification.

In another embodiment, such as described in FIG. 33, a cell phone in anarea is controlled by femtocell C (see example b) and at certain timeinterval femtocell D increases its power greater than femtocell C, thecell phone in the area re-acquires and attaches to femtocell D. At thatset time all cell phones in the area transmit their handshakeinformation, the femtocell D and the signal detection sensor isolate thelocation of all cell phones. Depending on the density of the cell phoneswithin this area the power decrease is incremented to allow a percentageof the cell phones to reacquire at each incremental decrease in power.

In another embodiment the Pico/Femtocell (base station) which providescell coverage within a complex, is configured to exert a coveragepattern as illustrated in FIG. 33. Example A, where femtocell A providesdirectional column coverage through 9 directional antenna arrays andwhere femtocell B provides directional row coverage through 9directional antenna arrays. This configuration allows for each sectorA5, for example, to be either a femtocell A controlled sector or aFemtocell B controller sector. This is important in situations where theresolution of cell phone in a sector can be determined down to a sectorand in situations where one wants to identify one or more sectors at atime by switching on the switch and regulating the power down thedirectional antenna each sector is controllable.

In another embodiment, the signal detection sensors, are synchronized tothe base station technology (femtocell) to provide positiveidentification of each cell phone within the area. In another embodimentthe signal detection sensor include a cell phone decoder chip topositively identify any phone detected independent of the femtocell.

While the invention has been described in connection with certainpreferred embodiments; other embodiments and/or modifications would beunderstood by one of ordinary skill in the art and are encompassedherein.

Methods may include (i) a cell-sector system that collects informationpertaining to cell and sector ID's, (ii) the assisted-global positioningsatellite (GPS) technology utilizing a GPS chipset in a mobilecommunication facility, (iii) standard GPS technology, (iv)enhanced-observed time difference technology utilizing software residingon a server that uses signal transmission of time differences receivedby geographically dispersed radio receivers to pinpoint a user'slocation, (v) time difference of arrival, (vi) time of arrival, (vii)angle of arrival, (viii) triangulation of cellular signals, (ix)location based on proximity to known locations (including locations ofother radio-transmitters), (x) map-based location, or any combination ofany of the foregoing, as well as other location facilities known tothose of skill in the art. In one aspect of the invention, the locationmay be determined using a method of non-iterative linear equations asshown in FIG. 19. Furthermore, in an embodiment of the transmissiondetection, controlling, identification, and reporting system 1500,discussed earlier, being able to determine the location, the type, theidentification, the unique identifier, the time, and the frequency ofthe transmission facility provides parameters within an algorithm anddata mining program to determine the danger and/or importance of atransmission facility and how to react to said transmission facility. Asdiscussed in this patent application and other related patentapplications, the type of base station, the location of base station andthe power of the base station, also contribute important information,whether to control a transmission facility 202, together and alone thesecontributing factors coupled with the following: location of thetransmission facility 202, type of transmission facility 202,identification of transmission facility 202, time of transmission of thetransmission facility 202 frequency of the transmission facility 202,based on type of base station technology and/or location of base stationtechnology may determine the and the like.

It is expressly intended that all combinations of those elements thatperform substantially the same function in substantially the same way toachieve the same results are within the scope of the invention.Substitutions of elements from one described embodiment to another arealso fully intended and contemplated. For example, while the term “cellphone” or “transmission facility” or “transmission device” has been usedherein, such terms relate to a general class of wireless transmissiondevices that includes standard cell phones, smart phones (e.g., PALMCENTRO), and iPhones. PALM is a registered trademark and CENTRO is atrademark of the Palm Inc., Sunnyvale, Calif. iPhone is a registeredtrademark of Apple Inc. Cupertino, Calif. le, CA.

Other variations to the disclosed embodiments can be understood andeffected by those skilled in the art in practicing the claimedinvention, from a study of the drawings, the disclosure, and theappended claims. In the claims, the word “comprising” does not excludeother elements or steps, and the indefinite article “a” or “an” does notexclude a plurality. A single processor or other unit may fulfill thefunctions of several items recited in the claims. The mere fact thatcertain measures are recited in mutually different dependent claims doesnot indicate that a combination of these measured cannot be used toadvantage.

The term “comprises”, “comprising”, “includes”, “including”, “as”,“having”, or any other variation thereof, are intended to covernon-exclusive inclusions. For example, a process, method, article orapparatus that comprises a list of elements is not necessarily limitedto only those elements but may include other elements not expresslylisted or inherent to such process, method, article, or apparatus. Inaddition, unless expressly stated to the contrary, the term “or” refersto an inclusive “or” and not to an exclusive “or”. For example, acondition A or B is satisfied by any one of the following: A is true (orpresent) and B is false (or not present); A is false (or not present)and B is true (or present); and both A and B are true (or present).

While there has been shown, described, and pointed out fundamental andnovel features of the present invention as applied to preferredembodiments thereof, it will be understood that various omissions andsubstitutions and changes in the apparatus described, in the form anddetails of the devices disclosed, and in their operation, may be made bythose skilled in the art without departing from the spirit of thepresent invention.

It is expressly intended that all combinations of those elements thatperform substantially the same function in substantially the same way toachieve the same results are within the scope of the invention.Substitutions of elements from one described embodiment to another arealso fully intended and contemplated.

Any reference signs in the claims should not be construed as limitingthe scope of the claims or the invention described by the subject matterclaimed.

What is claimed is:
 1. A method for detecting a transmission devicewithin a set area, said method operable in a processor, causing saidprocessor to execute steps comprising: transmitting a signal at adesired power level; detecting a transmission signal associated withsaid transmission device by at least one transmission detectionfacility; determining a location of said-transmission device based onsaid detection of said transmission signal by said at least onetransmission detection facility; determining an allowability of saidtransmission device to receive and transmit signals within at least onearea within said set area based on said determined location; based onthe determined allowability performing one of: reducing said desiredpower level to a second known level when said allowability is indicatedto be allowed, the reduced desired power enabling the transmissiondevice to connect, and remain connected, to a base station controllingthe set area, and directing said transmission device to a hold channelto deny service to said transmission device when said allowability isindicated to not be allowed; and displaying information associated withthe transmission device, said information providing an indication of thedetermined allowability.
 2. The method of claim 1, wherein saidtransmission device communicates at least identification information. 3.The method of claim 2, wherein said identification information comprisesat least one of: a transmission frequency, a transmission identificationnumber, a transmission time of arrival, a transmission type, atransmission characteristic, a transmission location, a transmissionamplitude, a transmission width, a transmission frequency range, and aunique identifier.
 4. The method of claim 1 wherein said desired powerlevel is greater within the set area than a power level associated withthe base station associated with the set area in which said transmissiondevice is located.
 5. The method of claim 1, wherein said location isdetermined utilizing, information from a plurality of non-co-linear,non-co-planar transmission detection facilities detecting saidtransmission signal.
 6. The method of claim 5, wherein at least fournon-co-linear, non-co-planar transmission detection facilities are usedin determining said location.
 7. The method of claim 1, wherein saidallowability is determined based on pre-stored information associatedwith said transmission device with respect to each of said areas withinsaid set area.
 8. The method of claim 7, wherein said pre-storedinformation corresponds to at least one unique identificationinformation associated with the transmission device allowed within eachof said areas within said set area.
 9. A system comprising: at least onefrequency transmission unit transmitting a signal received in a set areaat a power level greater than a power level of an associated basestation; at least one receiving unit; a processor in communication witheach of said at least one frequency transmission unit, said at least onereceiving unit and in communication with a memory, the memory includingcode which when accessed by the processor causes the processor to:receive information from at least one of said at least one receivingunit, said information including identification information associatedwith a transmission device; extract from said identification informationat least one identification characteristic associated with saidtransmission device; determine whether said determined identificationcharacteristic is among at least one corresponding identificationcharacteristics stored in a list of allowable identificationcharacteristics; provide instruction to each of said at least onefrequency transmission units to maintain said power level when saidextracted identification characteristic is not included in said list ofat least one corresponding identification characteristic; and direct thetransmission device to a hold channel, the hold channel receivingfurther communication from said transmission device while denying thetransmission device service to the base station.
 10. The system of claim9, wherein said received information from said transmission deviceprovides at least one unique identification characteristic for positiveidentification and location of an additional transmission device. 11.The system of claim 10, wherein said characteristic is selected from thegroup consisting of: a transmission frequency and an IMEI.
 12. Thesystem of claim 9, further comprising: determining a location of saidtransmission device, wherein said location is determined from at leastone of: a cell-sector system, an assisted-global positioning satellite,GPS chipset technology, a standard GPS technology, transmissionsenhanced-observed time difference technology, transmission amplitude,time difference of arrival, time of arrival, angle of arrival,triangulation, based on proximity to known locations of saidtransmissions device, a map-based location and a non-iterative locationdetermination method.
 13. The system of claim 12, wherein saidnon-iterative location determination method comprises: extractinginformation associated with each of a plurality of receiving units,wherein said receiving units are arranging such that no three receivingunits are installed in a same line and no four receiving units areinstalled in a same plane.
 14. The system of claim 9, wherein at leastone of said at least one frequency transmission units is located at aningress point of each of a plurality of selected areas within said setarea.
 15. The system of claim 14, wherein allowability in each of saidselected areas is determined based on a list of allowable identificationcharacteristics corresponding to each of said selected areas.
 16. Thesystem of claim 9, wherein said at least one of said at least onefrequency transmission unit selectively transmits said signal within afrequency band said transmission device operates within.
 17. The systemof claim 9, wherein said location of said transmission device isdetermined based on being in the set area.
 18. A method, operable in aprocessor, for detecting a transmission device within a set area, saidmethod causing said processor to execute the steps comprising:transmitting a signal at a power level received in said set area greaterthan an expected power level of a signal transmitted by a base stationassociated with said set area; detecting a transmission of saidtransmission device with at least one transmission detection facility;receiving identification information associated with said transmissiondevice; determining a location of said transmission device as beingwithin said set area based on detection of said transmission of saidtransmission device; determining an allowability of the transmissiondevice based on said determined location and said identification;reducing said power level of said transmitted signal for a known periodof time when said allowability is determined to be allowed, the reducedpower level enabling the transmission device to connect to the basestation controlling the set area, and directing said transmission deviceto a hold channel when said allowability is determined to not beallowed; and displaying information associated with the transmissiondevice.
 19. The method of claim 18, wherein said signal is transmittedwithin a frequency band about a frequency of said detected transmission.20. The method of claim 18, wherein said location is determined based ona location of at least one of said transmission detection facility. 21.The method of claim 18, wherein said display including at least onecharacteristic of said transmission device, said at least onecharacteristic being contained within said detected transmission. 22.The method of claim 18, wherein said directing said transmission deviceto a hold channel comprises: transmitting said detected transmission toa second device.
 23. The method of claim 18, wherein allowability isdetermined based on a list of characteristics associated with each of aplurality of transmission devices.
 24. The method of claim 23, whereinallowability in each of a plurality of areas within said set area isbased on a corresponding list of characteristics corresponding to eachof said plurality of areas.
 25. The method of claim 18 wherein saidtransmitted signal includes at least one characteristic corresponding tosaid signal transmission of said associated base station.
 26. The methodof claim 25 wherein said transmitted signal lacks encryption.