System and method for detecting and controlling transmission devices

ABSTRACT

A method of detecting, controlling and managing transmission of a transmitting device within a facility is disclosed. The method involves transmitting information to the transmission device, detecting a response transmission from the transmission device by a least one transmission detection facility, extracting identification information associated with the transmission device in response to the transmitted information; and determining a location of the transmission device based on the response transmission received by the at least one received transmission detection facility, wherein the response transmissions are sorted by the identification information, determining an allowability of the located transmission device with the set area and interacting and manipulating transmission of the detected transmitting device.

CLAIM OF PRIORITY

This application claims the benefit of the earlier filing date, pursuantto 35 USC § 120, as a continuation of that patent application:

entitled “System and Method for Detecting and Controlling TransmissionDevices,” filed in the United States Patent and Trademark Office on Nov.18, 2012 and afforded Ser. No. 13/680,066, which claimed the benefit ofthe earlier filing date, pursuant to 35 USC § 120, as a continuation ofthat patent application:

entitled “System and Method for Detecting and Controlling TransmissionDevices,” filed in the United States Patent and Trademark Office on Aug.15, 2010 and afforded Ser. No. 12/856,672 (now U.S. Pat. No. 8,346,281),which claimed the benefit of the earlier filing date, pursuant to 35 USC119, to U.S. Provisional App. No. 61/237,682, entitled “Method andSystem for Determining a Location and Tracking of a Wireless Device,”filed on Aug. 28, 2009, and which further claimed the benefit of theearlier filing date, as a continuation-in-part to that patentapplication:

entitled “System and Method of Detection of Transmission Facilities,”filed in the United States Patent and Trademark Office on Jul. 27, 2009and afforded Ser. No. 12/510,036 (now U.S. Pat. No. 8,983,446), whichclaimed the benefit of the earlier filing date, pursuant to 35 USC §120, as a continuation-in-part to that patent application:

entitled “Systems and Methods of Detection Transmission Facilities,”filed in the United States Patent and Trademark Office on Jul. 14, 2006and afforded Ser. No. 11/457,786, now U.S. Pat. No. 8,078,190, whichclaimed the benefit of the earlier filing date, pursuant to 35 USC §119, of U.S. Provisional App. No. 60/699,281, filed on Jul. 14, 2005 andU.S. Provisional App. No. 60/739,877 filed on Nov. 23, 2005. The entirecontents of all of which are incorporated by reference, herein.

The application further claims the benefit of the earlier filing date,pursuant to 35 USC § 120, as a continuation-in-part to that patentapplication entitled “Wrist Band Transmitter,” filed in the UnitedStates Patent and Trademark Office on Sep. 2, 2008 and afforded Ser. No.12/231,437 (now U.S. Pat. No. 9,037,098), which claimed the benefit ofthe earlier filing date, pursuant to 35 USC § 120, as acontinuation-in-part to that patent application entitled “Tracking andDetermining a Location of a Wireless Transmission,” filed in the UnitedStates Patent and Trademark Office on Jun. 11, 2008 and afforded Ser.No. 12/157,530 (now U.S. Pat. No. 8,238,936), which claimed the benefitof the earlier filing date, pursuant to 35 USC § 120, as acontinuation-in-part to that patent application entitled “Systems andMethods of Detection Transmission Facilities,” filed in the UnitedStates Patent and Trademark Office on Jul. 14, 2006 and afforded Ser.No. 11/457,786 now U.S. Pat. No. 8,078,190 the entire contents of all ofwhich are incorporated by reference, herein.

RELATED APPLICATION

This application is related to co-pending patent application entitled“Systems and Methods of Detection of Transmission Facilities,” filed onJul. 27, 2009 and afforded Ser. No. 12/510,006 (now U.S. Pat. No.8,996,028), which claimed the benefit, pursuant to 35 USC 120, as acontinuation of that patent application entitled “Systems and Methods ofDetection Transmission Facilities,” filed in the United States Patentand Trademark Office on Jul. 14, 2006 and afforded Ser. No. 11/457,786now U.S. Pat. No. 8,078,190, the contents of all of which areincorporated by reference, herein.

BACKGROUND

This invention relates to the field of wireless transmission and moreparticularly to determining a location of a wireless transmission deviceand controlling its use and tracking its movements.

2. Background

There are many facilities, such as government buildings, and inparticular correctional facilities, such as prisons, that do not permitcellular phone usage or wireless transmission devices on the premises oreven possession of cellular phones within the premises. Finding andpreventing usage of cell phones and other transmission facilities isdifficult, and a need exists for improved methods of detecting,locating, and managing the transmission of such devices.

SUMMARY OF THE INVENTION

Provided herein are methods and systems for locating transmissiondevices (or transmission facilities) such as cellular phones, cellphones, mobile phones, satellite phones, radios, transmitters, PDAs,beepers, pagers, walkie-talkies, email devices, instant messengerdevices, voice over IP devices, and other types of wirelesscommunication or transmission facilities whose possession is prohibited.In addition, control of the devices is important as such wirelessdevices are known to be used to detonate bombs, as in the case ofimprovised explosive devices. The methods herein are also to positivelyidentify, locate and track individuals with such transmissionfacilities. For example, the system provides the location and trackingof one or more individuals who utilize a wireless device to communicateand further determines whether the individual is authorized to transmitwithin the general area local to the individual. In one aspect, lawenforcement may be interested in tracking the individual'sidentification and movements.

Methods relate to locating and managing the use and presence of wirelesscommunication facilities are further disclosed. Embodiments relate todetecting wireless devices when they transmit a signal are furtherdisclosed. Other embodiments relate to detecting of transmission deviceswhen the transmission devices (i.e., facilities) are in a non-activetransmission active state.

In embodiments the methods and systems disclosed herein include methodsand systems for detecting a transmitting device within an obstructionrich environment. The methods and systems may include detecting thetransmitting device within a wireless detection transmission facility;communicating signal information relating to the detected transmittingdevice from the wireless transmission detection facility to a centralunit; determining the location of the transmitting device; displayinginformation of the detection and location of the transmitting devicethrough a user interface; and providing the information to an actionfacility for causing actions related to the detected transmittingdevice. In embodiments, the wireless transmission detection facility isan antenna. In embodiments, the antenna is a dual dipole embedded. Inembodiments, the dual dipole embedded antenna is tuned to receive cellphone transmissions. In embodiments the dual dipole embedded antenna istuned to receive a frequency band of approximately 700 to 950 MHz. Inembodiments the dual dipole embedded antenna is tuned to receive afrequency band of approximately 1.7 to 2.0 GHz. In embodiments the dualdipole antenna is tuned to receive signals in frequency bands ofapproximately 700 to 950 MHz and 1.7 to 2.0 GHz. In embodiments theobstruction rich environment is a correctional facility. In embodimentsthe obstruction rich environment is a mall. In embodiments,communicating the information relating to the detected transmittingdevice from the wireless transmission detection facility to a centralunit involves wireless communications. In embodiments, the wirelesscommunications are 802.11 communications. In embodiments, determiningthe location of the transmitting device is accomplished throughtransmission triangulation. In embodiments location of the transmittingdevice is accomplished through a known location of a single antenna. Inembodiments the location of the transmitting device is determined basedon extrapolation of the receipt of a plurality of received signalsthrough a series of non-iterative linear equations.

BRIEF DESCRIPTION OF FIGURES

The systems and methods described herein may be understood by referenceto the following figures:

FIG. 1 shows a transmission detection, identification, and reportingsystem.

FIG. 2 illustrates a system for detecting a transmission facility

FIG. 3 illustrates exemplary antenna configurations.

FIG. 4 illustrates a first system configuration for detecting atransmission facility in a cell environment.

FIG. 5 shows a second system configuration for detecting a transmissionfacility in a cell environment.

FIG. 6 illustrates a block diagram relating to actions taken whendetecting transmission facilities.

FIG. 7 shows a transmission facility detection system wherein an antennaarray is used to determine location.

FIG. 8 shows a transmission facility detection system wherein a signalsource is differentiated between two adjacent rooms.

FIG. 9 illustrates a transmission facility detection systemconfiguration employing multiple antennas are used to identify alocation of a signal source after an omni-directional antenna hasdetected its presence.

FIG. 10 shows a schematic diagram of a system for detecting signals of atransmission facility.

FIG. 11 shows a schematic diagram of an alternate embodiment of a systemfor detecting a signal of a transmission facility.

FIG. 12 shows a schematic diagram of a main circuit board within asystem for detecting transmission facilities.

FIG. 13 shows a schematic diagram of a sub-station in a system fordetecting transmission facilities.

FIG. 14 illustrates a null detection facility.

FIG. 15 Illustrates a system for detecting and controlling atransmission facility.

FIG. 16 Illustrates a system for tracking and locating transmissionfacilities.

FIG. 17 Illustrates an exemplary corrections facility designed forautomation.

FIG. 18 illustrates a system for implementing the processing describedherein.

FIG. 19 illustrates an exemplary process for determining a location of atransmission facility in accordance with the principles of theinvention.

FIG. 20 illustrates a block diagram of a sensor apparatus in accordancewith the principles of the invention;

FIG. 21 illustrates a second block diagram of a sensor apparatus inaccordance with the principles of the invention;

FIGS. 22 and 23 illustrate exemplary clock signals in accordance withthe principles of the invention;

DETAILED DESCRIPTION OF THE INVENTION

Detection of a transmission facility, such as a mobile phone orhand-held radio transmitter, or other transmission facility as describedherein, within an obstruction rich environment, such as a facility withmany physical barriers to electronic transmission, is difficult toachieve. Referring to FIG. 1, the transmission detection,identification, and reporting system 100 described herein provides amethod of detecting a transmission facility 202, such as depicted inFIG. 2, within an environment rich in obstructions 102. One embodimentof the transmission detection, identification, and reporting system 100may involve the detection of a mobile phone within a heavily walled andmetal-barred government facility such as a correctional facility. Inthis embodiment, the system may utilize an array of antennas 104selectively placed within the facility, collection substations 108 forlocalized collection of detected signals, a central unit 110 for theprocessing of incoming signals from the facility, a display 112 forshowing the location of the detected transmission facility 202, and anaction facility 114 for implementing standard procedures in the event ofa detection. In this embodiment, the communications between the antennas104 and the substations 108, and between the substations 108 and thecentral unit 110, may be wireless to make installation and maintenanceof the system within the facility, cost and time effective. Selectiveplacement of the antennas 104, combined with algorithms and methods fordetermining location of the transmission facility 202, may allow asubstantially improved means for locating transmission facilities 202,such as mobile phones, in an otherwise heavily shielded environment.

In embodiments the antenna 104 may be a multi-dipole embedded antenna.Two examples of dual dipole embedded antennas are provided in FIG. 3 asa first dual-dipole embedded antenna 302 and a second dual dipoleembedded antenna 304. In embodiments the antenna may be adapted toreceive one, two, three, four, or more bandwidths. In embodiments theantenna 104 may be selected as one or more of a dipole antenna 104, aYagi-Uda antenna 104, a loop antenna 104, a quad antenna 104, amicro-strip antenna 104, a quad antenna 104, a helical antenna 104, aphase array antenna 104, a patch antenna or a combination thereof.

In embodiments, the transmission facility 202 may be a mobile phone,such as a flip phone, a slide phone, a cellular phone, a handset, asatellite phone, a 3G phone, a wireless phone, a cordless phone or thelike. In embodiments, the transmission facility 202 may be a radio, suchas a Walkie-Talkie, a mobile radio, a short-wave radio, or the like.

In embodiments, the transmission band from the transmission may bewithin the radio or other electromagnetic frequency spectrum, such asextremely low frequency (ELF), super low frequency (SLF), ultra lowfrequency (ULF), very low frequency (VLF), low frequency (LF), mediumfrequency (MF), high frequency (HF), very high frequency (VHF), ultrahigh frequency (UHF), super high frequency (SHF), extremely highfrequency (EHF), microwave, a frequency suitable for 802.11x wirelesscommunications, ultra wide band (UWB), Bluetooth, or the like.

In embodiments, the obstruction rich environment 102 may be a building,such as a corrections facility, a school, a government facility, astore, a mall, a residence, a hotel, a motel, or the like. Inembodiments, the obstruction rich environments 102 may be a largeconfined space, such as a courtyard, a food court, a recess area, ahallway, greenhouse, recreation room, gymnasium, auditorium, kitchen,cafeteria, craft area, work area, library, prison yard, or the like. Inembodiments, the transmission obstruction 102 materials such ascinderblock, cement, rebar, wire cage, metal, metal coated surface, orthe like. In embodiments, the obstructions in the obstruction richenvironments 102 may be other construction materials, such as wood,glass, rug, flooring materials, roofing materials, and the like.

In embodiments, the transmitting signal information from the antenna 104module to the central unit 110 may be through a communicationsconnection, such as an IEEE 802.15.4 wireless network, IEEE 802.11Wi-Fi, Bluetooth, Ethernet, and/or other similar type wirelesscommunication protocols. In embodiments, the communications connectionmay utilize CAT-5, RJ-45, RS-232 connections, and/or other similar typewired communication protocols and hardware. In embodiments thecommunications connection may utilize an optical connection, such as awireless infrared link, wireless visible light, an optical fiber, andthe like.

In embodiments, the transmitting signal information from the antenna 104module to the central unit 110 may contain data regarding the type ofsignal, such as CDMA, CDPD, GSM, TDMA, and the like, and may be used todiscriminate which service signal is being used, i.e., as Verizon,Cingular, T-Mobile, Sprint, and the like. The detection of the cellphones may be further resolved down to cell phone manufacturer and cellphone provider.

In embodiments, the transmitting signal information to the central unit110 may be made through an intermediate connection, such as a substation108, router, switch, hub, bridge, multiplexer, modem, network card,network interface, processing unit, preprocessor, computer, repeater,antenna 104, and the like. (see FIG. 2).

In embodiments, the central unit 110 may have in part a computer, acomputer system, a network of computers, a state machine, a sequencer, amicroprocessor, a digital signal processor, an audio processor, apreprocessor, a microprocessor, and the like.

In embodiments, the central unit 110 may process information, such aslocation information, such as the location of people, inmates,corrections personnel, visitors, all personnel within the facility,equipment, resources, weapons, products, incoming goods, outgoing goods,and the like. In embodiments, the information may be a type of signal,such as mobile phone standard protocols such as CDMA, CDPD, GSM, TDMA,3G, 4G, WLL, WAN, WiFi, WiMAX, 2G and the like. In embodiments, thecentral unit 110 may process information, such as data andcommunications information, such as one way and two way audioconversations, as one way and two way video transmissions, educationalmaterial, medical information, offender management information, facilitysecurity information, and the like. In embodiments, the information maybe an event notification, such as personnel under duress, an emergencymedical condition, a call for assistance, a fire, a call for police, atheft, and the like. In embodiments, the processed information may allowfor the tracking of the person or object in possession of thetransmission facility 202, such as a mobile phone, a radio, a weapon, aproduct, a resource, and the like. In embodiments, the processedinformation may allow for the discrimination and/or association betweenpeople or objects, such as determining the ownership of the transmissionfacility 202, the assignment of the source of transmission, currentlocation of a transmission facility 202 compared to its predictedlocation, and the like. In embodiments, the processed information mayalso have time codes and unique identifiers assigned.

In embodiments, the central unit 110 may have a display 112, such as acathode ray tube (CRT), liquid crystal display (LCD), electronic paper,3D display, head-mounted display, projector, segmented display, computerdisplay, graphic output display, and the like. In embodiments, thecentral unit 110 may have an action facility 114, comprising a userinterface for causing actions relating to the detected transmissionfacility 202. Actions may for example represent operations such aslocation of people, inmates, wireless communication devices, correctionspersonnel, and visitors, all personnel within the facility, equipment,resources, weapons, products, incoming goods, outgoing goods, and thelike. Actions may for example represent operations such as,allowing/preventing/monitoring/intercepting/wireless communications,audio, video, data and the like, turning on and/or off video cameras,jamming systems, managed access systems, base transceiver stationsoftware radio systems, base station technology, video servers,educational servers, communication transceivers, determining uniqueidentification information, such as MIN, Unique Identifier (IAID) IMEI,personnel identification, EIN, Inmate identifier, International MobileSubscriber Identity (IMSI) ESN, Mac addresses and the like, determiningother information, such as frequency, protocols, period, time, timestamp, angle, phase, amplitude, wave shape, cell, bands, rate, envelop,and the like.

In embodiments the functions of a central unit 110 as described hereinmay be replaced by an alternate configuration, such as a configurationof multiple computers, such as a group of servers, processors, or thelike, operating in parallel. In embodiments the methods and systemsdescribed herein may involve locating computing capabilities inalternative network configurations, such as in a mesh network or apeer-to-peer network.

In embodiments, the location of a transmission facility 202 may bedetermined by various radiolocation or signal measurement techniques,including measuring phase, amplitude, time, or a combination of these;or by identifying and locating an area associated with an antenna 104with the highest signal strength. In embodiments, the location of atransmission facility 202 may be determined when the transmissionfacility 202 is powered off though detection of a null in the band passof a transmitted frequency sweep due to the presence of a mobile phoneantenna.

In embodiments, a method of detecting a transmission facility 202 (e.g.cell phone) when the transmission facility 202 is not powered mayrequire a transmitting device and a receiving device that can recognizethe signature of an antenna 104 associated with the transmissionfacility 202. By transmitting a known frequency and receiving thedisturbance pattern produced by having a particular antenna 104 designin the transmission path, the pattern or ‘signature’ of that antenna 104can be characterized. In embodiments, this characterization may beevaluated by central unit 110 with results output to a display 112. Adatabase of these signatures can be placed into the unit, and as thetransmitter sweeps across the various cell frequencies, a patternreceived can be matched against the database patterns to determine thepresence of transmission facilities 202. In embodiments, any class ofantenna (e.g. WI-FI, Blackberry, Walkie-Talkie, etc.) can be classifiedand identified.

In embodiments, the range of a hand held device that can detect aninactive transmission facility is approximately 10 feet. In embodiments,greater distances could be attained for stationary units by increasingthe power.

Radiolocation, also referred to as radio-determination, as used herein,encompasses any process of finding the location of a transmitter bymeans of the propagation properties of waves. The angle, at which asignal is received, as well as the time it takes to propagate, may bothcontribute to the determination of the location of the transmissionfacility 202. There are a variety of methods that may be employed in thedetermination of the location of a transmission facility 202. Methodsinclude (i) a cell-sector system that collects information pertaining tocell and sector ID's, (ii) the assisted-global positioning satellite(GPS) technology utilizing a GPS chipset in a mobile communicationfacility, (iii) standard GPS technology, (iv) enhanced-observed timedifference technology utilizing software residing on a server that usessignal transmission of time differences received by geographicallydispersed radio receivers to pinpoint a user's location, (v) timedifference of arrival, (vi) time of arrival, (vii) angle of arrival,(viii) triangulation of cellular signals, (iix) location based onproximity to known locations (including locations of otherradio-transmitters), (ix) map-based location, or any combination of anyof the foregoing, as well as other location facilities known to those ofskill in the art.

Obstructions to radio wave propagation in the obstruction richenvironments 102 may greatly reduce the effectiveness of many of theconventional radiolocation methods due to obstruction of theline-of-sight between the transmission facilities 202 and the receivingantennas 104. However, by employing a large array of antennas 104,positioned so as to maintain line-of-sight between possible transmissionfacility 202 locations and the receiving antennas 104, several of thesemethods may be effectively used in the location of the transmissionfacility 202. These methods include time difference of arrival, time ofarrival, and angle of arrival, amplitude comparison, and the like. Thetime difference of arrival method determines the difference in the time,or the difference in phase, of the same radio-transmitting signalarriving at different receiving antennas 104. Together with the knownpropagation speed of the radio wave, allows the determination of thelocation of the transmission facility 202. The time of arrival methoddetermines the absolute time of reception of the signal at differentreceiving antennas 104, and again, along with the known propagationspeed of the radio wave, allows the determination of the location of thetransmission facility 202. The angle of arrival method utilizesdirection of transmission to different antennas 104 to determine thelocation of the transmission facility. Amplitude comparison methodcompares the strength of the signal detected at each antenna todetermine the location of a transmission facility 202. For example, twoantennas 104 located in the same room would detect different signalamplitudes for the same transmission facility 202 output, therebyproviding a means of determining which antenna 104 the transmissionfacility 202 is closer to. Increasing the number of antennas 104therefore increases the resolution with which the location of thetransmission facility 202 may be determined. All of these methods, andcombinations of these methods, may employ mathematical processes such astriangulation, trilateration, multilateration, or like, in determiningthe location of the transmission facility.

Triangulation is the process of finding coordinates and distance to apoint by calculating the length of one side of a triangle, givenmeasurements of angles and/or sides of the triangle formed by thatpoint, such as the target transmission facility 202, and two other knownreference points, such as the receiving antennas 104. The calculation ofthe location of the transmission facility 202 may then be performedutilizing the law of sines from trigonometry. Tri-lateration is a methodsimilar to triangulation, but unlike triangulation, which uses anglemeasurements, together with at least one known distance, to calculatethe subject's location, tri-lateration uses the known locations of twoor more reference points and the measured distance to the subject, suchas the transmission facility 202, and each reference point, such as thereceiving antennas 104. Multi-lateration, or hyperbolic positioning, issimilar to tri-lateration, but multi-lateration uses measurements oftime difference of arrival, rather than time of arrival, to estimatelocation using the intersection of hyperboloids.

While several radiolocation and triangulation techniques have beendescribed in connection with locating the transmitting device, it shouldbe understood that one skilled in the art would appreciate that thereare other location methodologies and such location methodologies areencompassed by the present invention. For example, in embodiments, thelocation of a single antenna may be known and the single antenna maydetect a transmitting device. The location of the transmitting devicemay be estimated through its known proximity to the single antennalocation. This may provide adequate location resolution for certainapplications of the technology. Similarly, two or more antennas may beused and each of the antenna locations may be known. When each of theantennas receives a transmission, the corresponding signal strengths maybe compared. The one with the highest signal strength may be determinedas the one closest to the transmitting device so the correspondingantenna location may provide enough location resolution for certainapplications.

In an embodiment of the transmission detection, identification, andreporting system 100, a corrections facility, with its substantial andinherent obstruction rich environment 102, presents a significantchallenge to authorities of the correction facilities. In the embodimentof the invention shown and described herein, the system may be placedthroughout the corrections facility for the purpose of alerting thecorrections staff that cell phone activity is taking place, the locationof the activity and the type, i.e., Nextel, T-Mobile, Verizon, and thelike. The following technology may also allow for a standalone detectionunit 408 or set of detection units 408 (see FIG. 4) to detect cellphones in schools, buildings and other environments in which thefacility's or area's provider does not wish the use of cell phones andis interested in the detection of cell phone use.

In an embodiment, the system may include an integrated antenna 104 andRF detector (together referred to as a detector unit 408) (FIG. 4), asubstation 108, (FIG. 1) whose purpose may be to communicate with eachdetector unit 408 within its sector, and report activity to the centralunit 110 which reports confirmed activity, type of cell phone, andlocation to the display 112 of the central unit 110. These detectionunits 408 may be used individually or in conjunction with each other andmay triangulate detection within a specific area. The outside yard areasmay be monitored by detection units 408, which may cover large areas,such as 25.×.25 foot sectors or smaller areas, e.g., 5×5 foot sectors,to localize the detection of a cell phone (i.e., wireless transmissionfacility) and track its position from one sector to any adjoiningsector. That is, as the person moves with a phone, the changing positionof that phone may be reported. If the phone moves inside the facility,tracking may continue as interior detection units 408 detect the phone.

In an embodiment, within these basic groups of detection units 408 maybe various detection unit 408 types. Some detection unit 408 s may bedesigned to be hard wired via RJ-45 connectors and/or CAT 5e cable,other detection units 408 may use 802.11b (WI-FI) wirelesscommunications between detection units 408, and there may also be anInfra Red (IR) set of detection units 408 which utilize opticalcommunications techniques. Each communications type may have a specificpurpose within the corrections facility or other type of building and/orareas. Hard-wired units may be used when it is not possible to useeither an optical unit or a WI-FI unit or used when there are wallsembedded with metal or where the distance and the obstructions 102 maypreclude a wireless technique. WI-FI detection units 408 may be usedwhen it is effective to communicate in an area where there areobstructions 102 such as cement walls or cement with embedded rebarwalls, facades, and the like. Optical detection units 408 may be used inareas where clear, line-of-site communications may be possible. Opticaldetection units 408 may operate over relatively long distances, (e.g.,3,000 feet), while WI-FI detection units 408 may be limited to shorterdistances, such as 250 feet. In an embodiment, the wired configuration(Cat 5 configuration), may utilized cat 6 or higher bandwidth throughputtechnology and the like. The system, sensors and sub-stations, consolesand switches and access points, additionally provide a data transmissionand communication backbone for other technologies and data collectionand data transceiver methodologies and the like.

In an embodiment, there may also be a hand-held detection units 408 tobe used once a cell phone has been detected, and the correctionsofficer(s) or monitor are attempting to pinpoint the location. Thishand-held detection unit 408 may be similar to the integratedantenna/detector unit of the main system. This embodiment may alsoinclude a detector, discriminator and decoder module. The hand-helddetection units 408 may detect and identify each cell phone and comparethe cell phone identity to the allowed cell phone user list or in thiscase to a list of unauthorized cell phones. This detector unit 408 mayoutput an audible alarm whose pitch changes as the signal becomesstronger or weaker.

In an embodiment, a second type of hand-held detector unit 408 may beused to detect a cell phone when it is either off or in a standbycondition, also referred to as null detecting. Null detection may beused at an ingress or egress of a building or an area as a way ofdetecting a communication device or device with an antenna. Thistechnique may be used in areas where it is unpractical, unwanted orunwarranted to have x-ray machines or more intrusive detection systems.A null detection system may also be deployed in a handheld device so aninspector can move through an area attempting to detect a communicationdevice. In embodiments, the null detection system may detect thepresence of a transmission facility even when the transmission facilityis not transmitting a signal. In embodiments, a hand held or mountednull detection device may be used in a correctional institution or othergovernment facility.

In embodiments, null detection may utilize a transmission-detectionsource, independent of the transmission source being detected, which iscapable of sweeping across the frequency spectrum of interest andreceiving it's returning signal. The transmission source sweeps thespectrum of interest, searching for distortions in the returned field.Distortions in the spectrum may be due to the presence of an antenna ofa transmission facility 202. Matching the distortion, also referred toas a null in the band pass, to characteristics of known antennas usedwith mobile phones may allow the detection and/or identification of thetransmission facility 202. The unit may output an audible “beep” if itdetects a null, allowing the officers to focus in on the location of thecell phone. The range of the hand-held detection units 408 may be, forexample, 15 to 20 feet. This will allow cell phones that are in theimmediate vicinity to be quickly detected. The null detection may beapplicable for ingress and/or egress detection.

In an embodiment, a survey may be performed to determine optimalplacement and the type and number of detection units 408 required. Thiswill insure the minimum number of required detection units 408 toperform optimal detection. The team may provide a report detailing thelayout determined to be optimized for the facility and may review thisreport with the facilities staff so that any required modifications tothe plan may be incorporated before installation is begun.

In an embodiment, the initial coverage of a facility may be in the cellblocks 402 (FIG. 4) and/or pod areas. The same may be true for linearfacilities. The survey may cover the entire facility, including openareas, such as courtyards, where required. Inmate also work in largeyard and plantations such as Angola State Prison, it is anticipated thistechnology may be deployed over a large outside area.

In an embodiment, the cell block detection units 408 may be mountedinside each chase 404 (a column positioned between cells in a cell blockthat includes various utility facilities, such as for plumbing andelectricity), as shown in FIG. 4, and may communicate to a substation108 (not shown in FIG. 4) located at one end of the block. Thisdetection unit 408 may communicate its information to the central unit110 so that tracking, confirmation, and display may be accomplished. Forlinear facilities 500, as shown in FIG. 5, detector units 408 may bemounted along the walls in the obstruction rich environment 102 oppositethe cells 402 and perform their function similar to the detection units408 mounted within a chase 404.

In an embodiment, detector units 408 may be installed in open areas suchas gymnasiums, kitchens, cafeterias, craft and work areas and other openareas where a cell phone may be used. The difference in these locationsfrom the cell blocks 402 may include the method of detection andtracking. Since most facilities may only require the identification of acell phones presence within a room, and there could be many inmateswithin that room, the process may be to lock-down the room, or rooms, inthat area and use a hand held device and a physical search to pinpointthe phone location. A generalized block diagram of a detector unit 408is shown in FIG. 6. For those facilities that require resolving thelocation within a large interior room or area, the use of triangulationto resolve to a 10×10 foot area may be used.

In an embodiment, facilities with the requirement to detect cell phones202 in outside yard areas, the use of triangulation to a 25×25 footspace or smaller foot space (e.g., 5×5 foot) may be constructed. As aphone 202 is moved from area coverage 702 to area coverage 702, thesystem may track its movement. Each square foot sector may overlap anadjoining sector. In this way, as shown in FIG. 7, tracking may becontinuous, without any gaps.

In an embodiment, it may also be important to know whether a phone islocated on one side of an obstruction or the other, such as doors,walls, and the like. If the wrong room is identified, it may make itmore difficult to locate a phone and its user. As shown in FIG. 8,detection of the correct room may depend upon the level of the signalreceived. Proper placement of the detector units 408 may insure that thephone may be identified in the correct location.

In an embodiment, when sectoring a large room such as a gymnasium, thenumber and placement of antennas 104 may be critical. In order to sectorlarge regions, such as a 10×10 foot section, within the room, theantenna 104 may need to be capable of narrowing their window to an areasmall enough to meet the requirement. In FIG. 9, there is shown anomni-directional antenna 104, which detects signal presence generally ina 360 degree direction. Once a signal crosses a threshold, the directionfinding antennas 104 may be turned on to determine the position of thesignal. This may be reported to the display 112 and tracked until it iseither turned off or moves to another room or hallway. Then, normalpositional tracking may take place.

In an embodiment, the transmission detection, identification, andreporting system 100 may work in conjunction with a personal alarmsystem, or an inmate tracking system, or a combination of all three andthe like. This dual/tri role system(s) may allow for more cost effectiveuse of the detection units 408 and provide for greater protection forthe correctional officer and inmate alike. This detection system mayutilize an individualized frequency, with known frequency separationbetween detection units 408 and between corrections officer'sfrequencies and Inmate frequencies. The detection configuration of thedetection units 408 may provide complete coverage of the facility. Eachtransmission facility unit may be continually tracked throughout thefacility. At all ingress or egress points the focus of the detection mayensure accurate location of all correctional and inmate personnel. Withthe combined systems more detection units 408 may be needed to ensurefull coverage. In an embodiment, the known identity of the transmissionfacility, in this case a cell phone being carried and/or used by anofficer or inmate can be accurately associated with another knownidentity of another transmission facility, in this case a correctionsofficer and/or inmate wearing a transmission facility. In thisembodiment, the use of an authorized cell phone or an authorizedtransmission facility by an unauthorized person can be accuratelydetected and reported. This embodiment can be utilized inside thefacility or outside the facility.

In an embodiment, the transmission detection, identification, andreporting system 100 may allow for cell phone owner discrimination. Thesystem may provide for the allowance of authorized cell phones withinthe prohibited area. The system may detect and identify each cell phoneand compare the cell phone identity to the allowed cell phone user list.The system may record all phone use and may automatically alert thefacility of all prohibited cell phone use. In addition, each cell phonedetection event may be identified with a unique identifier and timecode, to ensure proper identification. The CCTV system may also beintegrated to ensure greater accuracy identifying illegal use ofwireless transmission devices.

The cell scan-1 detection system 1000, shown in FIG. 10, is anembodiment of a system for detecting signals of a transmission facility.Antenna 104 receives transmission signals from wireless transmissiondevice (not shown). Antenna 104 may operate, for example in the range of2.4 GHz with a bandwidth of 465 MHz. The received signals are thenprovided to a low pass filter and a log amplifier, wherein the level ofamplification is based on the input level of the input signal. Theamplified signal is next provided to a shaping filter and an operationalamplifier. The amplified signals are provided to an analog-to-digital(ADC) converter and provided to a Field Programmable Gate Array (FPGA).Information from the FPGA may be provided to a microprocessor tosupplement the processing and control imposed by the FPGA. The FPGA mayreceive information from dedicated frequency bands (e.g., 9000 MHz) orfrom known wireless protocols (e.g., 802.15.4). The microprocessor maythen determine whether a detected transmission facility for example is aperson with a transmission facility (e.g., wristband, a cell phone) andmay allow or prevent that person from accessing an area. Themicroprocessor may also alert the central unit of the persons enteringor desire to enter a restricted area. In an another embodiment, if thetransmission facility for example is a cell phone and the cell phone wasin use within a restricted area, the cell phone would be identified bythe central unit as being in a restricted area, then the system willdetermine whether the cell phone is authorized or not authorized, thenthe system would make a determination, based upon set rules whether toallow or disallow the transmission unit within the restricted area.

The cell scan-1 detection system 1000, shown in FIG. 10, is anembodiment of a system for detecting signals of a transmission facility.An antenna 104 receives wireless transmission facilities in a 2.4 GHzband, with a 465 MHz antenna. In other aspects, the detection system maydetect signals in other frequency bands,—for example, 933 MHz, 433 Mhz,2.4 GHz and other known frequencies. The detected signals are providedto High and Low band RF filter. The RF filters (band pass filter)isolate sets of frequencies for greater sensitivity. For example, thereceived signals may be provided to a low band RF filter to isolate lowband RF signals and high band RF filters to isolate high band RFsignals. The isolated RF signals are provided to Log Amplifiers thatamplify or boost the signals using known amplification methods. Theswitch between two Wifi frequencies switches all three wireless signalinputs into a log amp circuit and then to a smoothing filter to clean upthe signal to be analyzed. The signals are then provided to anOperational Amplifier (Op Amp) which amplifies the received analogsignal. The amplified RF signal is then processed through an A/Dconverter which changes the signal into a digital signal. The signal isthen processed in a processing unit (in this case a dedicated FieldProgrammable Gate Array (FPGA)) and the results are then transmitted viaa dedicated 2.4 GHz transceiver unit. The 2.4 GHz transceiver unit hasseveral other applications, and is used to transmit and receivecommunication information and to connect to external WiFi communicationdevices. An example of this is an education system for inmates, medicalmonitoring equipment in a hospital application, an interactive ID forsafe school applications. The 900 MHz transceiver unit is for syncingthe sensors. The 465 MHz transceiver unit is for communication withinmates bracelets and Staff (personal alarm system) as is furtherdiscussed in the aforementioned related patent applications. The lowerfrequency of the 465 MHz unit also provides better wall penetration andalterative wireless communication device with better wall penetration.In another embodiment, the front end of the signal detection circuit anamplifier (e.g., 0-40 db gain is added before the RF filter (example a824-849 MHz RF filter) to provide for greater sensitivity. In additionala mixer and Voltage Controlled Oscillator (VCO) (not shown) is addedafter the RF filter. The output of the mixer is a IF frequency that isamplified and then provided to a band pass filter (e.g., a 200 MHzfilter with a bandwidth of 4 MHZ). The signal is then amplified and thenprovided to the Log Amp then to an op amp and then to the ADC. Dependingon the noise floor (which is determined by proper grounding), one withan understanding of RF circuitry would know to have proper impedancematching between components, and will utilize transformers whereappropriate. The IF section's general parameters are 70 MHz to 350 MHzand sensitivity is related to frequency and the width of the band passfilter. As would be appreciated, the tighter the width of the band pass,the greater the sensitivity. In another embodiment, the VCO/mixer may befixed and the IF band pass filter may be the bandwidth of a desiredfrequency providing for faster detection without the need to scan.Additionally the greater the dynamic range of the sensor system thegreater accuracy and resolution in determining the exact location of thetransmission facility.

In an embodiment as shown in FIG. 10, the processing section may beplaced on a separate board, that provides for multiple sensors frontends utilizing one back end processing unit. This provides for more costeffective sensors and versatility of assets. This also allows forspecific functionality such as antenna array directional location andangle tri-angularzaton being synchronized to at least one processingunit. It is also anticipated that the more expensive processingcomponent be shared; such a transmission signal decoding, data analysis,communications and the like.

The cell scan-2 detection system 1100, shown in FIG. 11, shows analternate embodiment of a system for detecting a signal of atransmission facility. The RF filters (i.e., band pass filter) isolatesets of frequencies for greater sensitivity, in this example a low bandcell phone signals and high band cell phone signals. The operation ofthe elements in FIG. 11 is similar to that of FIG. 10 and need not bediscussed in detail herein.

The main board system 1200, shown in FIG. 12, is an embodiment of a maincircuit board within a system for detecting transmission facilities. Thesystem may be used to determine each signal received is an actual cellphone signal and not a spurious output. Thus, a test may need to beperformed that checks for the ‘persistence’ of the received signal. Apersistence test may run a timer 1202 for a minimum required time thatmay be nearly as long as the time of the shortest signal type expected.If the signal is present at the end of the timeout period, it is lesslikely to be a spurious response and more likely that it is a cell phoneoutput. For example, if a GSM signal of 500 microseconds long is theshortest duration signal of all the cell phone protocols received, thepersistence test may run for 450 microseconds to further ensure that thereceived signal is not merely a spurious response.

The sub-station system 1300, shown in FIG. 13, is an embodiment of asub-station in a system for detecting transmission facilities

FIG. 14 illustrates an embodiment of a null detector (1400), wherein theVCO in FIG. 14 tunes to known antenna frequencies and the system detectsa null in the known antenna frequencies in which the antenna isdetected. In embodiments, the null detection system may detect thepresence of a transmission facility even when the transmission facilityis not transmitting a signal. In embodiments, a hand held or mountednull detection device may be used in a correctional institution or othergovernment facility. In embodiments, null detection may utilize atransmission-detection source, independent of the transmission sourcebeing detected, which is capable of sweeping across the frequencyspectrum of interest and receiving its returning signal. Thetransmission source sweeps the spectrum of interest, searching fordistortions in the returned field. Distortions in the spectrum may bedue to the presence of an antenna of a transmission facility 202.

In embodiments of the system described herein, detection levels may bedetermined by which output levels are possible with the various cellphone technologies that are in use today. Since the system described isan amplitude system, the strongest and weakest possible signals must bedetermined in order to identify the system's required dynamic range.Cell phone signals vary from −22 dBW to 6 DBW and this range defines thedetection requirements of the system. This translates to a maximumsignal of 4.0 Watts at the antenna. The minimum value is equal to 0.006Watts or 6 milliwatts. Therefore, the dynamic range required is −52 dBmto +36 dBm. In order to achieve such a dynamic range, an amplifier thatis gain adjustable is required such that an input value of +36 dBm, theamplifier is not saturated. In aspects of the invention, the amplitudeof each signal allows the system to determine which sensor has receivedthe largest signal.

In similar embodiments several variables are calculated such as wallcomposition, obstructions, such as steel doors, walls, ceiling,ventilations system and the like. In an integrated embodiment, it thenbecomes imperative to time stamp each data sample so that other sensorsreceiving the same signal will be recognized as such when the data ispresented for analysis. In another embodiment, such as the hand heldsensor, the system can determine and choose which cell phone signal tofocus on and may work independently, or in conjunctions with other handheld devices which can communicate with other hand held sensors todirect other hand held sensors to tune to the same cell phone tofacilitate more accurate location. In the embodiment, the wave shape ofthe signal is also a characteristic that needs identification. Eachtransmission type (i.e., CDMA2000, PCS, TDMA, GSM, IS-95, etc.) has aunique wave shape. These wave shapes allow the analysis software torecognize that signals seen in different parts of a facility can beassociated with each other (using time and wave shape) and the signalthat consistently contains the largest amplitude will be identified asclosest to the cell phone transmission and the like.

In embodiments of the invention, signals directed toward an IED(improvised explosive device) may be intercepted, identified and deniedservice. Such interception may be up to a known range in forward andside quadrants. The identification and determination of the position ofthe person or persons attempting to activate or contact the IED, whetherthey are using a satellite phone and/or land-based cell phone may bedetermined. Cell phones, as well as other RF devices, e.g., garage dooropeners, walkie-talkie, etc., may be captured and identified.

In embodiments of the invention, when a cell phone, for example, is on,but not in an active communication, the cell phone is essentiallyinvisible to anyone attempting to monitor cell phone activity. In orderto be aware of the existence of such “on but not transmitting devices”the system described herein operates as a cell tower. That is, thesystem actively addresses the problem of cell phone detection byoperating (becoming) the tower. A vehicle with similar (but modifiedequipment to that of a cell tower may actively poll the area of phonesthat are “on but not in a communication of any sort.” The vehicle (i.e.,Pseudo Tower) collects the current database of active phones and thosephones in standby from the tower(s) in the area and uses this data baseto poll these phones in order to locate them. Once potential phones thatcould be possible detonation cell phones are identified and located, thePseudo Tower would affect a handoff and make itself the active tower.Thus, the captured cell phones are not allowed to rotate back to (i.e.,connect to) the local cell phone tower, insuring that any callsattempting to communicate with the detonation cell phone will not besent. As one of the goals is to identify the person who is attempting tocontact the detonation cell phone, a call history of each suspect cellphone may be analyzed.

When a caller attempts to activate an IED, the caller's presence can beidentified. Furthermore, the call being made is not forwarded to thedetonation cell phone and the IED will not be activated. By determininga peak angle (triangulation) the caller's cell phone/satellite phonesignal, the direction of the caller is then known. Directionidentification is performed by using a technique such an interferometry.In this case, multiple antennas employing interferometry may be used toscan through the current cell phone traffic identifying first, candidatethreats and then, pinpointing high probability locations which can beviewed through a high powered binoculars to determine whether thecandidate is in need of investigation. Criteria for determining whichcell locations may be threats is a pole or road sign, etc. The PsuedoTower may continue controlling all of the phones in the area, preventingany forwarding of calls until all possible threats have been cleared. Atthis point, the personnel have the option of going after the caller ordeactivating the IED, or both. It would be possible to clear the areaand detonate the device later if that is a desired plan of action.

Given the varying parameters by which detonation can take place, thePseudo Tower may also be designed to deny service to any active andinactive phone within a given geographical area and pinpoint thelocation of said phones.

Satellite cell phone transmission presents a somewhat different problem.Since the transmission from phone to satellite to phone is communicatedto a number of satellites, becoming a replacement for the satellite willrequire cooperation from the provider. Via one or more specific codes,the satellites may be told that the vehicle mounted satellite simulator(i.e., Pseudo Tower) will be taking over the control of phones within acertain radius. Since this is a moving or ever changing circle, thereplacement “satellite” will have to continuously update the actualsatellite of its position and which phones are being released and whichphones are being controlled. Once this function has been implemented,the control of the suspect phones is similar to that of the cell phone.Determining the caller's position and the location of the detonationphone is as above.

FIG. 15 illustrates an embodiment of a Cell Phone Detection, Control andPosition Identification system (1500) in accordance with the principlesof the invention which comprises cell phone jammer (1501) system thatcovers at least one of the known frequency ranges assigned to cellphones or mobile communication devices, a Power Unit (1502) thatprovides the necessary power to run all the units within the Cell PhoneDetection, Control and Position Identification system 1500, SatelliteCell Phone Interface 1503 that operates as an interface andcommunications unit between the Cell Phone Detection, Control andPosition Identification system 1500 and a satellite cell phone provider(not shown), a Cell Phone Ground Interface unit 1504, which includesbase station technology for all communication devices operating withinan area of interest. Also shown is an optional 300-350 MHz Jammer unit(1505) that operates to jam communication devices that communicatethrough an intermediary device, such as door openers, Walkie-Talkies andthe like. It is anticipated that the system described herein to bemodular and expandable to cover the entire frequency spectrum in whichtransmission facilities (cell phones, mobile communications devices)operate. The Computer Command I/O, User Display and Interface 1506,comprises a communication, command and control system (C³) that managescommunication, command and control of the detection system 1500. Unit1506 may further comprise one or more databases, and/or processes toexecute the processing described, herein. Although not shown it would beappreciated that Command I/O unit 1506 may be in communication, via apublic or private network, to one or more devices to provide informationto or obtain information from remote sites (not shown).

FIG. 16 Illustrates a block diagram of an embodiment of a Cell Phone andWireless Transmission Detection Facility in accordance with theprinciples of the invention. In the illustrated embodiment 1600, antenna1602 is a multi-band directional array that operates to detect signalsin a low band and in a high band (835 and 1.85 GHz range, respectively),a two way radio band (465 MHz), a WiFi, a Bluetooth band (2.5 GHz) andPAL (Personal Alarm Locator) band (950 MHz). In the illustratedembodiment, the antenna connects to two components, first to a detector(1603) and also to a decoder (1604). The detector 1603 and decoder 1604decodes the PAL Identification signal and may further decode biometricinformation, emergency information. In other embodiments, detector 1603and decoder 1604 are configured to decode cell phone identifications.Antenna 1602 provides detected signals to a 6 way input switch (1605).The output of switch 1605 is connected to a wideband RF amplifier(1606). Wideband RF amplifier 1606 represents a variable gain amplifierthat adjusts the detected signal amplitude based on the band in which adetected signal is detected by antenna 1602. In another aspect of theinvention switch 1606 may be connected to a block gain amplifier (notshown) to provide amplification of the detected signal and the amplifieddetected signal may then be provided to a corresponding RF filter basedon the frequency band of the detected frequency.

The wideband RF amplifier 1606 is connected to a Logarithmic amplifier1607 (i.e., log amp) that amplifies the received or detected signalusing an logarithmic function. Log amplifiers are well-known in the artto provide a larger amplification of a weak signal and a smalleramplification of a strong signal. The output of Log amplifier 1607 isprovided to an Operational amplifier (OpAmp) 1608. The OpAmp 1608amplifies the input signal and provides the amplified input signal to anA/D converter 1609 for conversion of the input analog signal to adigital signal. The converted (i.e., digital) signal is then provided toa FPGA (Field Programmable Gate Array) 1610 for subsequent processing.FPGA 1610 controls the operation of the illustrated Cell Phone andWireless Transmission Detection Facility 1600 through feedback signalsto switch 1605, for example. FPGA 1610 controls which signal frequencyband and signal frequency is evaluated in what sequence. In theillustrated embodiment, FPGA 1610 communicates with the other sensorsand/or access points via a communication interface 1612. In one aspectof the invention, communication interface 1612 may communicate with oneor more wireless communication devices that operate using well-knownIEEE wireless standard communication protocols (e.g., 802.15 and802.11). In another embodiment, the communication interface may operateas a transceiver (transmitter/receiver) that may interface with two-waywireless transmission devices such as Walkie-Talkie or cellulartelephone phones. The FPGA 1610 also interfaces with a microprocessor1613, e.g., a Zilog Z86, an Intel xx86 series, Motorola Power PC.Processor 1613 may assist in the decoding, and operation of the CellPhone and Wireless Transmission Detection Facility 1600. FPGA 1610 andthe microprocessor 1613 may be synchronized by a crystal clock 1614. Inother embodiments of the invention, the communications may be via acategory 5 network interface connection in conjunction to thecommunication interface 1612. Although an FPGA is referred to andillustrated in the embodiment of the invention, it would be recognizedby those skilled in the art that the processing described by the FPGAmay also be performed in other specific processor processors (e.g.,ASIC) or in a general purpose processor which when loaded with andexecuting an applicable software module converts the general purposeprocessor into a special purpose processor. As would be recognized, thesystem shown in FIG. 16 is similar to those shown in FIGS. 10 and 11.

Returning to the embodiment of the Cell Phone Detection, Control, andPosition Identification system shown in FIG. 15, control of a wirelesscommunication device (i.e., transmission facility 202) may utilizejammers, base station technology, WiFi, and 3rd party base stationtechnology, to acquire, control, obtain location and/or to stimulate awireless communication device, which may be, in an active,non-transmitting, state or in a standby state.

The embodiment shown in FIG. 15 utilizes a high level of signaldetection sensitivity to detect the presence of a wireless communicationdevice (transmission facility) within a known distance from thetransmission detection facility. As power is a critical component whendealing with wireless transmission devices, the communication protocoltypically, by design, causes communication with the largest availablesignal source. Typically, this is the closest source (i.e., basestation).

In accordance with one embodiment of the invention, the jammer units1501 may jam or interfere with one or more frequencies or frequencybands to force wireless communication devices within a local area tolose contact with an available base station and/or access point and toreacquire a connection to a local base station cell tower and/or accesspoint. When the transmission facility (wireless communication device)initiates a process (referred to as hand-shake) to re-acquire acommunication link with the available local base station cell tower, thecommunication link is diverted to a, and re-acquired by, the detectionsystem 1500 (which is referred to as a pseudo-base station) due to thegreater signal power of the pseudo-base station. In another aspect ofthe invention, the pseudo-base station power is raised so as to begreater than an actual cell tower signal strength. Thus, the cell phone,for example, will transition to the larger signal strength of thepseudo-base station and establish a communication with the pseudo basestation. In a further aspect of the invention, the pseudo-base stationmay actively poll the area for cell phone (transmission facilities), andtrigger the cell phones within an area of interest to cause the cellphones within the area to attach to the pseudo-base station.

In one aspect of the invention, where the application is to control thetransmission facility within a local area, and to prevent communicationsfrom reaching the transmission facility of interest, the pseudo-basestation may deny transmission of signals from the transmission facilityto an actual base station or deny transmission of signals from the basestation to the transmission facility.

In an embodiment of the invention where it is important to identify andnot control the transmission facility within an area of interestproviding greater power, polling, control line request, interleavingexisting towers and/or jamming to force the transmission facility tocommunicate its identification parameters. In this embodiment of theinvention, gaining control of the cell phone (or wireless communicationdevice or transmission facility) within the area of interest allows thesystem to prevent incoming and/or outgoing communications. Thus, as thewireless communication device is re-acquiring a communication link withthe access point or base station, the wireless communication deviceprovides its identification information that positively identifies eachtransmission facility within the area of interest. This identificationinformation may be provided to the actual cell tower provider, whichuses this information to individually disable the cell phone(transmission facility) from receiving or transmitting data, voiceand/or communicating in any manner.

In an embodiment, the detection system 1000 (see FIG. 10) issynchronized with an access point, an/or base station technology. Thissynchronization allows the tracking and positive identification of eachtransmission facility within an area of interest. In this example, thetransmission facility of interest (a triggering device) may be connectedto or trying to communicate with another transmission facility, such asa cell phone or a land line phone.

In an embodiment, of the Cell Phone Detection, Control, and PositionIdentification System shown in FIG. 15, determines the identification ofan incoming caller based on information contained in the transmissionsignal and does not allow connection to the wireless network whiledetermining the location of the caller by triangulating the caller froma plurality of detected signals and tracks the caller thereafter. Inthis embodiment of the invention, the system shown in FIG. 15 disablesthe wireless device from receiving or transmitting signals from/to thewireless network and tracks the caller using the wireless device. TheCell Phone Detection, Control, and Position Identification Systemdescribed in FIG. 15 also has the capacity to track wirelesstransmission facilities from great distances, and in this application,the system is mobile, therefore, tracking the caller. In one aspect ofthe invention, where the cell phone or transmission facility informationis known, as determined through its communication with a pseudo-basestation, for example, additional information can be gathered, requestedand/or, extracted from the cell phone or transmission facility.Information such other transmission devices, cell phones, etc, that havebeen contacted or which have data transferred may be gathered, requestedand/or extracted.

In an embodiment where information redundancy and positive authorizationis important and positive identification is critical, the tools used inthe school bus safety application egress point and school trackingsystem have direct applicability to positive identification of personneland prison system automation, cost effectively tracking and monitoringlower threat classified inmates and staff and inmate safety. Safetyapplication and tracking systems are more fully discloses in theaforementioned related patent applications, whose contents areincorporated by reference herein. The tools and application describedmay include facial recognition, retina scan technology, card swipe,fingerprint analysis, in preventing escapes and misidentification withina prison environment.

In an embodiment where positive identification of the transmissionfacility 202 and positive identification of the user of the transmissionfacility 202 is important, as discussed earlier hand-held detectionunits 408 detector decoding module (and or chipset) or a hand-helddetection units 408 in sync with the pseudo-base station/wireless accesspoint module provides the location and the identification of thetransmission facility 202 or in this case, for example a cell phone or a802.xx (e.g., 802.11a/b/g/n, 802.15) communication device. Incorrections facilities, outside areas of the facility, for example alarge area like Angola state prison, a close-circuit television (CCTV)in synchronization with, or in communication with, the hand-helddetection units 408 allows the CCTV to focus on the user of the cellphone. The CCTV system feeds images to the facial recognition softwareand a database of all known personal and/or inmates, to find a matchand/or create an entry of new found cell phone and their owner's and/oruser's identity. In the case of a prison application, building adatabase of know criminals, their associate and biometric information,including facial recognition, for data mining purposes is critical. Anexample, is where inmates are passing contraband and using cell phonesto coordinate their efforts and positive identification of thetransmission facility 202 and positive identification of the user of thetransmission facility 202 is important. Utilizing cell phoneidentification, location tracking and positive identify of the criminalsinvolved is crucial to preventing and stopping their criminalenterprise.

In another embodiment and application where positive identification ofthe transmission facility 202 and positive identification of the user ofthe transmission facility 202 is important, as discussed earlier thehand-held detection units 408 detector decoding module (and or chipset)or a hand-held detection units 408 in sync with the Pseudo-basestation/wireless access point module provides the location, in schoolsafety where a student's location and a perpetrator who preys on schoolstudents, the tagging of visitors, student and employees is critical. Inthis application, CCTV and facial recognition, for data mining purposesof student, facility visitors (wanted or unwanted) is critical. Theembodiment includes an allowance unit which determines who is allowedwithin the facility and/or area and who is suspect and who is a knowndanger. Tracking all transmission facilities and making positiveidentification of all communications. Utilizing CORI and SORI databasesof known perpetrator of students to detect when a threat is near aroundor in a school facility is critical to school safety.

In embodiments, a method of detecting, identifying and tracking themovements of a specific transmission facility 202 in standby requiresprovoking and/or requiring the transmission facility to transmit asignal and to detect their unique identification. As discussed andexplained earlier, a hand-held detection units 408 with a integratedidentification detector/decoding module (and or identification chipsetmodule) and/or a hand-held detection units 408 which functions inconjunction base station and/or wireless access point technology,blocking and/or jamming technique in concert of the identificationfunction provides the tools to detect the transmission facility, trackits location, and to detect its unique identification.

In the embodiment of FIG. 15, an interface with existing communicationdevices, such as a wireless cell phone provider or WiFi access provider,may be provided. The interface which will allow and/or deny control isexecuted by the wireless provider. According, the embodiments shown mayalso include an interface to the third party controlling unit. Forexample, the system shown in FIG. 15 may include a system interface withthe commercial satellite cell phone provider and control of the cellphones passed between the carrier and the transmission detection,identification, control and reporting system.

In the embodiment of FIG. 15 the detector units (not shown) may includean antenna and a controlling unit, where matching the transmissionfacilities 202 with its unique identifier is critical for properidentification, tracking and control in this configuration, the detectorunits may individually control or may direct control over thetransmission facilities 202.

FIG. 17 illustrates an embodiment, where it is the intention to run anautomated prison to lower the necessary number of personnel and stillrun a safe and secure facility. This automated facility is controlled bya centralized command and control center and/or a decentralizecompartmental command and control center for all functions of thefacility including movement of the persons within the facility. In thistype of a facility, where complete and accurate identification andlocation of all personnel is critical, the tracking of individuals,their wireless transmission devices, cell phones, identification units,Walkie-Talkies, and verifying their access to authorized areas,integrating their movement with CCTV and positive facial identification,biometric identification, preventing movement into unauthorized area,developing inclusion zones, creating exclusion zones, ensuring propercount, providing an ability to restrict and/or authorized movement aspecific design of the facility and convergence of technology isessential. The technologies discussed herein integrated to the centralcontrol provide the backbone and framework to operate such an automatedfacility, wherein each staff member and inmate transmission facilitywill allow specific movement throughout the facility. All movementthroughout the facility may be monitored through CCTV and facialrecognition. At each egress point, movement will be restricted toindividual movement through one area to another area of the facility.For example, daily functions include, meals, medical, programs, courtvisits, and recreation, may be functions that may be monitored andcontrolled. As an example of the facility of the needs within theautomation and the parameters and rules, Example—Inmate Movement: need acreation of a Movement list and movement schedule, scheduling recourses,allocation seats in particular Programs area classrooms, Access tocomputers, access to the Law library, time allocation in program and usefacility assets, enemy exclusion, (predator sheep wolf exclusion),conflicts in scheduling GED, adult education, culinary arts, angermanagement, developing waiting list, ability for inmates to signup,morning schedule and movement, afternoon schedule and movement,Pre-trail and religious services scheduling. Data mining databasetechniques and methodologies may be executed to provide for inmatescheduling movement and allocation of assets for the inmate relying ontransmission facility authorization. The transmission facility willcontrol access to all moment, asset recourses, doors and egress,facility recourses and the time allocation on facility assets and inwhich movement takes place. Because of minimum human interaction,display kiosks display schedules and informs the inmate where it isscheduled.

In this embodiment, where there is limited, corrections personnel, allcells will be designed to allow outdoor access and unit access. Thefacility structure, may need to be modified to allow inmate access tothe outdoor area, this design modification eliminates the need foroutside movement and still provides greater freedom for the inmates withless need for direct supervision.

In this embodiment, for medical reasons all inmates will wear twotransmission detection sensors. Each sensor will monitor biometric signsincluding heart rate, temperature, and the like. With two wristbandsecho cardiogram can be generated with provide for health monitoring andfor positive identification. The Cell Phone Detection, Control andPosition Identification system 1500 (FIG. 15) will include a detectorand decoder for all transmission facilities, which will provide positiveidentification for all transmission facilities, including cell phone andother hand held communication devices, and the specific individual inposition of the transmission facility. All CCTV units will integratewith facial recognition software, all egress points will requirebiometric checks, such as fingerprint and renal eye scan devices, andthis combined with the transmission facility positive identification.The design of the facility is important to provide adequate exercisemovement and limited interaction with staff and other inmates. Thereforea redesign of the facility, to provide services such as decentralizededucation is important.

In this embodiment, the wireless communication of the sensors will alsocarry education information and data to each of the inmate cells. Asearlier described, the ideal location of sensors may be the water chasesto prevent tampering. This also provides the opportunity to havewireless communication with education units within the cells. Thiswireless communication also provides the ability to add wirelesssurveillance devices such as cell monitoring into the mix.

In this embodiment where inmate programs, services, commissary, inmatephones, medicine distribution, vending machines, GED education, needs tobe inmate specific, positive identification is a critical must. Toensure this outcome, the positive identification of each transmissionfacility is paramount. An example of this embodiment, when an inmateapproaches an education display system, the unique identifier of theinmate's transmission facility, provides information to the transmissionfacility detector of the unique identifier of the transmission facility.A database controls and provides all the applicable information toprovide the correct information for each transmission facility. In thiscase, the transmission facility is a wristband ID bracelet.

In other embodiment, the transmission facility is a cell phone, PDA or aWi-Fi appliance, the education display system is a interactive displayscreen in a school telling the school supervisors that one or morestudents or personnel needs to turn off his cell phone, or a hospitaladvising a specific visitor by name, that cell phone even in standby maycause harm the medical devices being used to treat patients or thetransmission facility provides information to the transmission facilitydetector of a unique identifier of the transmission facility via aninteractive screen on the road side to tell a user to slow down as he isspeeding. These are just examples of uses of the system illustrated. Inaddition, the system illustrated may be connected to any data miningdatabase (not shown) to provide customized information to anytransmission facility and specific information to a uniquely identifiedtransmission facility.

In an embodiment where the classification of inmates is such where manyinmates can co-exist in an inside and outside (minimum security,non-violent, criminals and the like) the use of CCTV, facial recognitionand laser microphone, and inmate tracking and a database driven set ofrules an parameters, coupled with the combine technologies mentionedthis application. This provides the solutions to reduce the number ofemployees while maintaining a high level of safety and security.

In an embodiment of FIG. 15 the detector units (not shown) may includean antennas 104 and a controlling unit, that are externally integratedwith the transmission detection, controlling, identification, andreporting system 1500, where matching the transmission facilities 202with its unique identifier is critical for proper identification,tracking and location matching of the transmission facility 202 uniqueidentifier with the proper transmission facility 202 maybe accomplishedthrough the time of signal arrival, phone type, transmission frequency,time division separation, time sync, channel frequency, cell toweridentifier, (cell phone) transmission facility identifier or acombination of one or more methodologies depending on complexity andtransmission facility 202 environment and the like.

In the embodiment, of FIG. 15 in a situation where there is a largenumber of transmission facilities 202 (in this example, cell phones) ona congested highway being able to find all the transmission facility(s)and their accurate location is critical. In addition being able tocontinuously track and positively identify each transmission is alsocritical wherein controlling a significant number of transmissionfacilities (cell phones) may be necessary. Therefore specific techniquesneed to be developed to regulate the frequency band the wireless devicesoccupy, when and in what order they are processed, the rate and thedensity and rate in which they are monitored. Techniques discussedearlier describe how to have a cell phone provide their identification.Here we will discuss some of the techniques to regulate the detection,frequency, volume and period of those transmissions.

Knowing the frequency and time of the transmission facility 202transmissions provides the ability to tighten the bandwidth of thedetection sensors, which increases sensitivity, and thus providesgreater distance of detection. It also provides an intercept, in timeand frequency providing for faster processing of signals. One techniqueis for the transmission detection sensor to tell the base station and/orenabling technology when to transmit and also indicate the desiredresponse frequency and/or channel. Another methodology is to regulateand/or schedule the transmission time of the base station(s) and/orenabling technologies within geographical areas and set parameter on thedirection, radiation pattern, zone, and strength of the signal beingtransmitted to enable a regulate number of transmission facility(s)contacted and/or regulating the number of responding transmissionfacilities.

In an embodiment, in a corrections complex, such as Angola State Prison,or a arbitrarily defined area where transmission facilities 202 areprohibited except for authorized transmission devices, the transmissiondetection, controlling, identification, and reporting system 100 whetherinternal or external to the facility may control, identify and prohibittransmissions from transmission facility 202 depending on the locationor approximate location of the transmission facility 202. There are avariety of methods that may be employed in the determination of thelocation of a transmission facility 202. Methods include (i) acell-sector system that collects information pertaining to cell andsector ID's, (ii) the assisted-global positioning satellite (GPS)technology utilizing a GPS chipset in a mobile communication facility,(iii) standard GPS technology, (iv) enhanced-observed time differencetechnology utilizing software residing on a server that uses signaltransmission of time differences received by geographically dispersedradio receivers to pinpoint a user's location, (v) time difference ofarrival, (vi) time of arrival, (vii) angle of arrival, (viii)triangulation of cellular signals, (ix) location based on proximity toknown locations (including locations of other radio-transmitters), (x)map-based location, or any combination of any of the foregoing, as wellas other location facilities known to those of skill in the art. In oneaspect of the invention, the location may be determined using a methodof non-iterative linear equations as shown in FIG. 19

In an embodiment of the transmission detection, controlling,identification, and reporting system 1500 whether to control thetransmission facility 202, may be determined by location of thetransmission facility 202, type of transmission facility 202,identification of transmission facility 202, time of transmission of thetransmission facility 202, frequency of the transmission facility 202,based on type of base station technology and/or location of base stationtechnology and the like.

In an embodiment of the transmission detection, controlling,identification, and reporting system 1500 where the system is insynchronization with base station technology and techniques correlatethe wireless signals, wherein the unique identifier is supplied by thebase station when the transmission facility is stimulated by the jammerand/or base stations unit. Then the transmission facility is tracked andits interest is related to its location to the road. Other variablesinclude whether it is alone or it is in the hands of an individual andthe like. The unique identifier is provided by the signal detectionsensor or the base station unit and is to with sync the base stationidentification and the location of the transmission facility.

In an embodiment of FIG. 15, the transmission detection, controlling,identification, and reporting system 1500 may also transmit the type,time, frequency of the wireless transmission facility of interest to abase station. The base station may then provide the system with theunique identifier of the detected transmission facility or the basestation may detect a transmission facility at a specific frequency andthe transmission detection, controlling, identification, and reportingsystem 1500 tunes to that frequency to determine the location and uniqueidentifying information of the transmission device. The system 1500 maythen compare the unique identifying information to a data base (notshown). The information and the parameters obtained from the data basemay then be used to decide how to treat the transmission facility; whatto do with the transmission facility depending on whether thetransmission facility is considered friend or foe (i.e., allowed ordisallowed).

In an embodiment of the transmission detection, controlling,identification, and reporting system 1500 where the transmissiondetection units includes a transmission decoding unit the systemdetermines the location and the allowability of the transmission unit bycomparing the transmission found with allowable or non-allowabletransmission facility lists.

In an embodiment shown in FIG. 15 of the transmission detection,controlling, identification, and reporting system 1500, the base stationindicates there is a transmission facility within the area covered bythe transmission detection, controlling, identification, and reportingsystem 1500. The base station provides at least one unique identifier tothe transmission detection, controlling, identification, and reportingsystem 1500. For example, the base station may provide at least one of:a frequency; a type of transmission facility; a time of arrival (TOA),an IMEI and other similar identifiers (e.g., encoded NEI). Thetransmission detection, controlling, identification, and reportingsystem 1500 determines the location of the transmission facility, anddepending on the provided parameters, directs the base station and/orrecorder, jammer, CCTV . . . to perform a set of actions. Some of theactions to be performed are jam the signal specific to the cell phone,deny service (Denial of Service (DoS)) to the cell phone, allow thecontinued receiving and allow transmission of the detected transmission,record the content of the transmission, provide an indication that thetransmission is allowable. In addition, the provided parameters maychange depending on location, and other variables depending onapplication parameter and the like.

In an embodiment shown in FIG. 15 of the transmission detection,controlling, identification, and reporting system 1500 where detectionsystem is separate from the discriminator unit, the discriminator unitmay also include the controlling unit (base station technology and thelike,). In this case, when a unique set characteristics (parameters) arereceived by the detecting unit, and/or system 1500, which then providesinformation to the discriminator unit and/or controlling unit, whichthen passes back the correlated transmission facilities (the controllingunit, software radio, and the like) this information is processed. Forexample, a cell phone on the side of the road, with a person talking onit may not need to be disabled, in contrast to a cell phone in standbylocated within a zone of danger (60 meters of the road) may need to becontrolled and disabled.

In an embodiment, the system 1500 will allow an authorized transmissionfacility to continue and/or provide the ability for the wirelesstransmission, (i.e., to talk and/or to receive calls) depending on theconfiguration and application. In an embodiment of the transmissiondetection, controlling, identification, and reporting system 1500 wheredetection system is separate from the discriminator unit, in this casethe discriminator unit may also the controlling unit (base stationtechnology and the like,) the system 1500 may further provideinstruction to the controlling unit to allow or disallow transmissionfacilities, determined by their location.

In an embodiment of the transmission detection, controlling,identification, and reporting system 1500 the system compares theobtained information and depending on whether the detected transmissionfacility is determined to be a potential danger, the system may take theincoming transmission facility and determine its position prior todisallowing further transmission. This process is accomplished byknowing an identification of the transmission facility and using theinformation obtained by the controlling facility (frequency, time, type,channel, etc.) and searching for the incoming call signal. For example,in an improvised explosive detection (IED) situation, finding thetrigger man may require the detection, identification and locationdetermination in real-time. The array antennas will utilize large frontend gain for the greatest distance. As discussed previously, jamming thearea, to gain control of the transmission facility is one method ofcapturing the transmission facility. The ability exists to then trackthe trigger man from his current location and where he goes forinvestigative reasons.

In an embodiment shown in FIG. 15 of the transmission detection,controlling, identification, and reporting system 1500 wheretransmission facility retrieved data may be used to locate threats topersonnel, and or prevent an escape. Recovered transmission facilitydata may be used to track co-conspirators location and/or identify of anunauthorized transmission facility.

FIG. 18 illustrates a system 1800 for implementing the principles of theinvention shown herein. In this exemplary system embodiment 1800, inputdata is received from sources 1801 over network 1850 and is processed inaccordance with one or more programs, either software or firmware,executed by processing system 1810. The results of processing system1810 may then be transmitted over network 1880 for viewing on display1892, reporting device 1890 and/or a second processing system 1895.

Processing system 1810 includes one or more input/output devices 1802that receive data from the illustrated sources or devices 1801 overnetwork 1850. The received data is then applied to processor 1803, whichis in communication with input/output device 1802 and memory 1804.Input/output devices 1802, processor 1803 and memory 1804 maycommunicate over a communication medium 1825.

Communication medium 1825 may represent a communication network, e.g.,ISA, PCI, PCMCIA bus, one or more internal connections of a circuit,circuit card or other device, as well as portions and combinations ofthese and other communication media.

Processing system 1810 and/or processor 1803 may be representative of ahandheld calculator, special purpose or general purpose processingsystem, desktop computer, laptop computer, palm computer, or personaldigital assistant (PDA) device, etc., as well as portions orcombinations of these and other devices that can perform the operationsillustrated.

Processor 1803 may be a central processing unit (CPU) or a specialpurposed processing unit or dedicated hardware/software, such as a PAL,ASIC, FGPA, operable to execute computer instruction code or acombination of code and logical operations. In one embodiment, processor1803 may include, or access, code which, when executed by the processor,performs the operations illustrated herein. As would be understood bythose skilled in the art when a general purpose computer (e.g., CPU)loaded with or accesses code to implement the processing shown herein,the execution of the code transforms the general purpose computer into aspecial purpose computer. The code may be contained in memory 1804, maybe read or downloaded from a memory medium such as a CD-ROM or floppydisk, represented as 1883, may be provided by a manual input device1885, such as a keyboard or a keypad entry, or may be read from amagnetic or optical medium 1887 or via a second I/O device (not shown)when needed. Information items provided by devices 1883, 1885, 1887 maybe accessible to processor 1803 through input/output device 1802, asshown. Further, the data received by input/output device 1802 may beimmediately accessible by processor 1803 or may be stored in memory1804. Processor 1803 may further provide the results of the processingto display 1892, recording device 1890 or a second processing unit 1895.

As one skilled in the art would recognize, the terms processor,processing system, computer or computer system may represent one or moreprocessing units in communication with one or more memory units andother devices, e.g., peripherals, connected electronically to andcommunicating with the at least one processing unit. Furthermore, thedevices illustrated may be electronically connected to the one or moreprocessing units via internal busses, e.g., serial, parallel, ISA bus,Micro Channel bus, PCI bus, PCMCIA bus, USB, etc., or one or moreinternal connections of a circuit, circuit card or other device, as wellas portions and combinations of these and other communication media, oran external network, e.g., the Internet and Intranet. In otherembodiments, hardware circuitry may be used in place of, or incombination with, software instructions to implement the invention. Forexample, the elements illustrated herein may also be implemented asdiscrete hardware elements or may be integrated into a single unit.

As would be understood, the operations illustrated may be performedsequentially or in parallel using different processors to determinespecific values. Processing system 1810 may also be in two-waycommunication with each of the sources 1801. Processing system 1810 mayfurther receive or transmit data over one or more network connectionsfrom a server or servers over, e.g., a global computer communicationsnetwork such as the Internet, Intranet, a wide area network (WAN), ametropolitan area network (MAN), a local area network (LAN), aterrestrial broadcast system, a cable network, a satellite network, awireless network, or a telephone network (POTS), as well as portions orcombinations of these and other types of networks. As will beappreciated, networks 1850 and 1880 may also be internal networks or oneor more internal connections of a circuit, circuit card or other device,as well as portions and combinations of these and other communicationmedia or an external network, e.g., the Internet and Intranet.

FIG. 19 illustrates an exemplary process for determining a locationusing a non-iterative linear algebra algorithm. In this illustratedprocess, the criteria for determining a location of a device (i.e., acell phone, a transmission device, such as a wrist band transmitter) isdependent upon the selection of a plurality of sensors that havedetected a wireless transmission 1910. Exemplary criteria for selectingsensors are shown in block 1915. For example, in one aspect of theinvention, at least five (5) sensors are to be utilized in the processshown. Further, the sensors must be selected such that no three sensorsare installed within a same line and no four sensors are installed in asame plane. In addition, at block 1910, a reference sensor is determinedas that sensor having the smallest time difference of a received signalamong the selected sensors.

At block 1920, for each of the selected sensors, i, for each object, areading (R_(i)) from a clock counter represents a sum of the distancebetween the sensor and the transmission device and a time bias of thesensor to a common accurate clock source. In one aspect of the inventionthe time bias is held to be substantially the same, within a knowntolerance, for each sensor by setting the length of fiber cable betweenthe sensors and the common clock source the same length (see block1905). As shown, a distance between a sensor, i, and the transmittingdevice (wrist band) may be determined using conventional geometricmeans. The distance may then be related to a reading R_(i) and convertedto a matrix form to assist in processing the location of thetransmitting device. Block 1925 discloses definitions of the terms usedin the exemplary process shown herein. At block 1930, the matrix H andthe vector C are known from the sensor installation configuration andthe live time measurements (i.e., R_(i)). At block 1940, because of thedifference in the reading values (R_(i)) between two sensors known andthe matrix H is determined based on the criteria discussed above forchoosing sensor groups, the location vector of the transmission deviceis determined within an error range in the order of know diameter. Aswould be appreciated the error range is proportional to the error of thesensor clock counter, which is controllable. The clock reading (i.e.,R_(i)) may be obtained and determined using the timing signals shown inco-pending U.S. patent application Ser. No. 12/157,530, entitled “Methodand System for Tracking and Determining a Location of a WirelessTransmission,” which has been incorporated by reference, herein. Thatis, a high precision clock signal may be provided to each of thesensors. The clock signal is synchronized among the sensors. The clockreading may be captured when a signal is detected by a sensor. As thedistance between the detected signal and respective sensors is generallydifferent, the time of arrival of the signal at the respective sensorsis also different. Hence, the sensor clock reading will generally bedifferent for each sensor detecting the signal. The different clockreadings may then be used to determine a location of the detected signalas shown in FIG. 19.

Referring to FIGS. 20-23, which are duplicated from FIGS. 3, 4, 5A and5B, respectively, of the aforementioned '530 patent application, FIG. 20represents a block diagram of the system shown in FIG. 16, furtherillustrating the components for generating a high-precision clocksignal. In this illustrated case, a Rubidium clock, 2060, provides abase clock signal, generally in the order of 100 MHz. A ripple counter2040 operates on the Rubidium clock signal to generate a high precisionclock signal that is used to determine a time when a signal is detected.

FIG. 21 illustrates in further detail the generation of the highprecision clock signal and the zero-crossing circuit used as a stopclock signal, which is generated when a signal is detected by theantenna 104-1, 104-2. As noted above the rubidium clock signal isprovided to each sensor with substantially the same delay bias and,thus, the high precision clock signals have substantially the samereference point from which the clock reading R_(i) may be determined.

FIGS. 22 and 23 illustrate exemplary clock signals that may be used indetermining a clock reading R_(i).

Details discussion of the processing shown in FIGS. 20-23 are providedin the incorporated Ser. No. 12/157,530 patent application, with regardto FIGS. 3, 4, 5A and 5B and the description of these figures isrepeated herein in its entirety.

FIG. 20 illustrates a high-level block diagram of an exemplary sensingsystem in accordance with the principles of the invention. In thisillustrated embodiment, antenna 104-1 receives low power data signalsfrom a transmission facility or wireless transmission device (notshown). The data signal is provided to transceiver(transmitter/receiver) 1603 that down-converts the data signal andprovides the data signal to processor 1610. In this case, processor 1610is implemented as Field-Programmable Gate Array (FPGA). Processor 1610may similarly be presented as a general purpose processor unit or anApplication Specific Integrated Circuit (ASIC).

Antenna 104-2 receives a Radio Frequency (RF) signal and provides the RFsignal to RF stage 1605 for down-converting and amplification. Thedown-converted signal is then applied to a “log” amplifier 1607. Logamplifiers are known in the art to provide a gain value to a receivedsignal based on the magnitude of the received signal. In this case, thegain is applied according to a logarithmic function rather than a linearfunction. The output of RF stage 1605 and log amplifier 1607 are appliedto a dual comparator 2009.

One output of the dual comparator 2009 is applied to FPGA 1610 and oneoutput is applied to a stop clock circuit 1611, which determines a timewhen a designated received pulse is detected. FPGA 1610 provides anenable signal to the stop clock circuit 1611. An output of the stopclock circuit 1611 is applied to a ripple circuit 2040, which maintainsan accurate time to determine an accurate time when the designatedreceived pulse is detected.

Also shown is a high-accuracy clock 2060 that provides a clock signal toFPGA 1610. Preferably, clock 2060 is a rubidium clock having ameasurement accuracy in the order of picoseconds. The rubidium clock2060 may be connected to a dedicated category 6 cable that allows forconnection of one or more devices requiring a high-accuracy clocksignal.

Processor clock/FPGA clocks 1614, 2060 are provided to the respectivedevices for the internal operation of these devices. The processor clockand FPGA clock signals may be generated independently.

FIG. 21 illustrates a further detailed block diagram implementation of asensing system in accordance with the principles of the invention. Inthe illustrated embodiment, antenna 104-1 receives a data signal, aspreviously described, and applies the received signal to transceiver1603. The output of transceiver 1603 is applied to FPGA 1610. In oneaspect of the invention, the data signal is transmitted on a carrierfrequency of 434 Mhz. Antenna 104-2 receives a signal and applies thereceived signal to RF stage 1605. RF stage 1605 is composed of alow-pass filter to remove high frequency signals, a 20 db (decibel)amplifier to amplify the remaining received signal, a mixer todown-convert the received signal to a known baseband signal and a secondamplifier to amplify the baseband signal. The output of the RF stage1605 is applied to a log amplifier 1607 and operational amplifier 1613.The log amplifier 1607 is composed of log amplifier 1607′ andoperational amplifier 1608. Log amplifier 1607 amplifies the receivedsignal based on a logarithmic function, as previously described, andoperational amplifier 1608 amplifies the received signal based on alinear function.

The output of the operational amplifier 1613 is applied to aAnalog/Digital Converter 1609 that digitizes the received signal, whichis then applied to FPGA 1610. In addition, the output of each of the logamplifier 1607 and the operational amplifier 1613 is applied to a dualcomparator 2009, which compares the applied inputs to known thresholdvalues to reduce spurious signals. The log amplifier signal and theoperational amplifier signal are each applied to the FGPA 1610 and theoutput of the dual comparator 2009 is further applied to a stop clockcircuit 2190. Stop clock circuit 2190 is composed of a zero-crossingcircuit 2190-1 and a trigger device 2190-1 (e.g., a D-flip flop).Zero-crossing circuit 2190-1 is known in the art to provide anindication when a modulation of a signal crosses a zero-voltage value.The zero-crossing indication is then provided to trigger circuit 2190-2which provides a digital representation of the zero-crossing.

The digital representation output of the clock stop circuit is nextapplied to the ripple counter circuit 2040. In this illustratedembodiment, ripple counter circuit 2040 is composed of a clockmultiplier 2040.1 that multiples a clock signal received from FPGA 1610.The multiplied clock is provided to a divide by two (/2) circuit 2040.2to reduce the clock rate. The reduced clock rate is applied to a ripplecounter 2040.3. In this illustrated case, the ripple counter 2040.3provides a signal to FPGA 1610 when a stop clock signal is received fromstop clock circuit 2190.

In a preferred embodiment, a 160 MHz clock is provided to clockmultiplier 2040.1 which produces a clock rate of 2.4 GHz. The 2.4 GHzclock is divided to a clock rate of 1.2 GHz to operate ripple counter2040.3. The output of the divide by two device is presented to the FPGA1610, representing the most significant bit, prior to the ripplecounter. In this case the ripple counter 2040.3 operates in the order ofnanosecond resolution. Although, the clock rate is shown as beingincreased and then decreased, this is merely a function of animplementation and is not to be considered the only means of generatinga clock signal or that the clock is limited to a 2.4 GHz signal.

FPGA 1610 receives a ripple counter value associated with stop clockindication. The ripple counter value represents a time value, which inconjunction with similar ripple counter values may be used to determinea location of a cell phone or similar transmitting device.

FIG. 22 illustrates an exemplary message protocol in accordance with theprinciples of the invention. In this exemplary message, a preamblemessage 2210 is composed of a plurality of data bits represented as2210.1-2210.n. Each of the data bits 2210.1-2210.n may represent one ormore additional bits. For the purposes of describing the principles ofthe invention, each illustrated data bit 2210.1-2210.n represents asingle data bit. The preamble message may represent an identification ofa user, a characteristic of a user, biometric data of a user orcombinations thereof. Preamble 2210 further represents a marker and atrigger that identifies the beginning of the reception of a transmissionof particular user. In one aspect of the invention the number of bits inpreamble 2210 is fixed at sixteen (16). However, it would be recognizedthat the number of preamble bits may be selected based on desiredtransmission characteristics and have been contemplated and consideredwithin the scope of the invention described herein.

After reception of a number of known preamble bits 2210.1-2210.n, apulse projection window 2215 is open for a known period of time tocapture the occurrence of a next pulse 2230 in the pulse sequence. Thisnext pulse is referred to as clock stop pulse. The clock stop pulse isused to accurately determine end of transmission as described withregard to FIG. 21. Clock stop pulse 2230 is further composed of aplurality of individual pulses 2230.1-2230.n, that are distributed amongthe clock stop pulse. The detection of at least one pulse 2230.1-2230.nsatisfying at least one known criterion is used as a time marker to markthe end of transmission from a user.

In one aspect of the invention, the preamble pulses are selected asbeing of a duration of 71 nanoseconds uniformly distributed over a 1.136microsecond time frame. The pulse window is established as 50nanoseconds and each of the pulses 2230.1-2230.n within clock stop pulse2230 are represented as 32 pulses of a 2.2 nanosecond duration. It wouldbe recognized that the preamble described herein is representative of asingle aspect of the invention and that the particular values describedherein are provided to limit the scope of the invention to this value.

FIG. 23 illustrates an exemplary Time Division Multiple Access (TDMA)protocol 2350 in accordance with the principles of the invention. Inthis exemplary protocol, each user is assigned a time slot in which auser may transmit a message to a sensor or substation (see FIG. 1) bythe central office. The time slot assignment may be establisheddynamically by the central office 110 or substation 108 based on thenumber of users within a general range of the central office. In anotheraspect, each of the users may have allocated a predetermined time slotand when the user enters a general area managed by the central office orsubstation, the central office 110 or substation 108 may register theuser and determine whether conflicts may exist. Conflict resolution mayfor example be resolved by incorporating a CDMA (Code Division MultipleAccess) protocol (not shown) on each of the conflicting users. In thiscase, two users may thus transmit in the same time slot by the centraloffice assigning and providing a known code to each of the conflictingusers. CDMA technology is well known in the art and need not bediscussed in detail herein.

In the illustrated protocol shown, each user is allocated a onemillisecond (1 ms) time slot 2360 (or a time slot which varies from 500microseconds to 20 milliseconds) in which to communicate with a sensor.That is, the preamble 2210 is received substantially at the beginning ofthe time window, as each user is synchronized to the time frame 2350.The stop clock bit 2330, when received marks the end of the reception ofthe user preamble, which may include identification information. Theremaining time 2370, in the time slot 2360, may be utilized for thetransmission of additional information, e.g., type of device, biometricdata, text data, voice data, etc., to the central office or substation.For example, the biometric data may include information such as heartrate, pulse rate, temperature or with appropriate placement of one ormore transmitting devices, an electrocardiogram.

In this illustrated example, the time frame 2350 is selected as two (2)seconds to accommodate up to 2000 users, without CDMA encoding. However,it would be recognized that the time slot and/or time period may beadjusted based on the type and number of expected users with the system.For example, in critical situations, the time period may be adjusted toa smaller value to provide faster updates of the location of a user. Aswould be recognized, synchronization of the wireless transmissiondevices with respect to the frame is performed periodically to insurethe correct time relationship between the wireless devices and theframe.

While the processing shown in FIG. 19 relates to a wrist bandtransmission device, as disclosed in co-pending U.S. patent applicationSer. No. 12/157,530, it would be recognized by those skilled in the artthat the processing shown is applicable to other types of wirelesstransmission devices, such a cell telephone, satellite telephone,wireless personal digital assistants and other similar transmission typedevices, whether the devices are special purpose (i.e., wrist bands) orgeneral purpose (i.e., cell phones).

While there has been shown, described, and pointed out fundamental novelfeatures of the present invention as applied to preferred embodimentsthereof, it will be understood that various omissions and substitutionsand changes in the apparatus described, in the form and details of thedevices disclosed, and in their operation, may be made by those skilledin the art without departing from the spirit of the present invention.For example, while the device described herein is referred to as atransmitting device, it would be recognized by those skilled in the artthat the device may incorporate a receiving unit, designed to operate inone or more frequency bands over a wide frequency range. For example,the receiving system may represent a crystal receiving system that maydetect one or more signals within a frequency range, or may represent asuper-hetrodyne receiver that may detect and determine the frequency ofoperation of received signals.

It is expressly intended that all combinations of those elements thatperform substantially the same function in substantially the same way toachieve the same results are within the scope of the invention.Substitutions of elements from one described embodiment to another arealso fully intended and contemplated. For example, while the term “cellphone” or “transmission facility” or “transmission device” has been usedherein, such terms relate to a general class of wireless transmissiondevices that includes standard cell phones, smart phones (e.g., PALMCENTRO), and iPhones. PALM is a registered trademark and CENTRO is atrademark of the Palm Inc., Sunnyvale, Calif. iPhone is a registeredtrademark of Apple Inc. Culpertino, Calif.

While the invention has been described in connection with certainpreferred embodiments, other embodiments would be understood by one ofordinary skill in the art and are encompassed herein.

What is claimed is:
 1. A system for controlling communication of atransmission device within a space within a coverage area serviced by awireless station, the system comprising: a first receiver systemconfigured to receive a transmission from each of a plurality ofdesignated transmission devices, wherein the transmission received froma designated transmission device is received in a time slot assigned thedesignated transmission device; a second receiver system configured todetect a signal transmission from a transmission device, thetransmission device not being one of the plurality of designatedtransmission devices; and a processor in communication with a memory,said memory including code which when accessed by the processorconfigures the processor to: cause transmission of an interrogationsignal to the plurality of designated transmission devices, wherein saidinterrogation signal defining a beginning of a time frame; identify eachof the plurality of designated transmission devices based on acharacteristic of a received transmission from a corresponding one ofthe plurality of designated transmission devices; match the transmissiondevice associated with the detected signal transmission with one of theidentified plurality of designated transmission devices; determine alocation of the transmission device based on the received signaltransmission; and allow the transmission device to communicate when thelocation of the transmission device is within the space and theidentified designated transmission device matching the transmissiondevice is authorized to operate within the space.
 2. The system of claim1, wherein the processor is configured to: prevent said transmissiondevice from communicating when said location of the transmission deviceis within the space and fails to match one of the identified pluralityof designated transmission devices.
 3. The system of claim 1, whereinthe processor is configured to: identify the transmission deviceassociated with the detected signal transmission based on acharacteristic of the detected signal transmission.
 4. The system ofclaim 3, wherein the identity of the transmission device is based on oneof: an ESN, an IMEI, an IMSI, a telephone number, a coding message, abiometric information, an MIN, a unique identifier, a personnelidentification, an EIN, an inmate identifier, an International MobileSubscriber Identity, a Mac addresses, an encoded IMEI a uniqueidentification, a frequency, a protocol, a period, a time, a time stamp,an angle, a phase, an amplitude, a wave shape, a cell, a band, a rate, apreamble, a coded message, and an envelope.
 5. The system of claim 1,wherein the processor is configured to: provide instruction to saidtransmission device to operate on a known channel.
 6. The system ofclaim 1, wherein the time slot is measured with respect to theinterrogation signal.
 7. The system of claim 1, wherein the transmissionreceived from a designated transmission device represents a response tothe interrogation signal.
 8. The system of claim 1, comprising: a firsttransmitter configured to: transmit a signal into said space, saidsignal having a higher power within said space than a signal transmittedby a transmitting device associated with said wireless station.
 9. Thesystem of claim 1, comprising: a second transmitter configured to:transmit said interrogation signal to each of the plurality of thedesignated transmission devices.
 10. The system of claim 1, wherein saidplurality of designated transmission devices comprise at least one of: awristband, an RF tag, a 802.xx transceiver, a wireless communicationdevice, an identification unit, a cell phone, a walkie-talkie, aBluetooth communication device a PDA, a Wi-Fi device, and an educationdisplay system.
 11. The system of claim 1, wherein said systemintegrates with an action facility, wherein the action facilitycomprises at least one of: a central control unit, a centralized commandunit, a control center, a decentralize compartmental command center, ajamming system, a managed access system, a base transceiver station, asoftware radio system, a base station technology, a server system, aneducational server, and a communication transceiver.
 12. The system ofclaim 11, wherein said action facility is configured to: provide atleast one of: tracking of individuals, accurate identification, controlof daily functions, tracking of wireless transmission devices, trackingof cell phones, tracking of identification units, tracking of awalkie-talkie, verification of access to authorized areas, integrationof movement with CCTV, providing positive facial identification,providing biometric identification, preventing movement intounauthorized area, evaluate enemy exclusion, development of inclusionzones, creation of exclusion zones, management of personnel count,providing an ability to restrict movement, management of turn on/offvisual equipment such as video cameras, determine a location of at leastone of: people, inmates, wireless communication devices, correctionspersonnel, visitors, personnel within the facility, equipment,resources, weapons, products, incoming goods, and outgoing goods,allowing wireless communications, preventing wireless communications,monitoring wireless communications, and intercepting wirelesscommunications.
 13. The system of claim 12, wherein said daily functionscomprises at least one of: meals, medical appointments, court visits,recreation activities, a movement list, a movement schedule, schedulingresources, allocation of seating in designated classrooms, access tocomputers, access to a Law library, time allocation in a program,scheduling of activities, selected from a group consisting of:education, culinary arts, managing scheduling of activities and angermanagement, developing of waiting lists, management of signupprocedures, morning schedule and movement, afternoon schedule andmovement, pre-trail scheduling, religious services scheduling,commissary usage, selective phone system usage, medicine distribution,vending machines usage and kiosk usage.
 14. The system of claim 1,wherein the processor is configured to: interface with at least one of:a CCTV, a facial identification unit, and a biometric identificationunit.
 15. The system of claim 14, wherein said biometric identificationunit is configured to provide, to the processor, at least one of: aheart rate, a temperature, an echo cardiogram, a fingerprint and a renaleye scan.
 16. The system of claim 1, wherein said wireless station isone of: a wireless point, a managed access system, a base stationtransceiver, a software radio system, a base station technology system,a WiFi system, a 3rd party base station, a local base station, a celltower, a pseudo-base station, a 802.11a/b/g/n system, a wireless accesspoint module, a WiFi access provider, a communications network, a cablenetwork, a satellite network, a wireless network, and a telephonenetwork.
 17. The system of claim 1, wherein the processor is configuredto: cause transmission of a preamble value to a corresponding one of theplurality of designated transmission devices.
 18. The system of claim 1,wherein the interrogation signal is transmitted to the plurality ofdesignated transmission devices periodically.
 19. The system of claim 1,wherein the identity of the designated transmission device is based onone of: a preamble, a coding message, an ESN, an IMEI, an IMSI, atelephone number, a biometric information, an MIN, a unique identifier,a personnel identification, an EIN, an inmate identifier, anInternational Mobile Subscriber Identity, a Mac addresses, an encodedIMEI a unique identification, a frequency, a protocol, a period, a time,a time stamp, an angle, a phase, an amplitude, a wave shape, a cell, aband, a rate, and an envelope.
 20. The system of claim 1, wherein saidallowance of the transmission to communicate comprises at least one of:making a call, receiving a call, transmitting a text, receiving a text,and accessing the internet.
 21. A system for controlling access to awireless communication network comprising: a first system comprising: afirst transmitter configured to: transmit a first signal to a pluralityof designated transmission devices, said first signal defining abeginning of a time frame; and a first receiver configured to: receive aresponse transmission from each of the plurality of designatedtransmission devices receiving the first signal, wherein the responsetransmission received from a designated transmission device is receivedin a time slot assigned the designated transmission device; a secondsystem comprising: a second transmitter configured to: transmit a secondsignal; and a second receiver configured to: receive a transmissionsignal from a wireless communication device receiving the second signal,wherein said wireless communication device not being one of saidplurality of designated transmission devices; and a processor configuredto: receive the response transmission from each of the plurality ofdesignated transmission devices receiving the first signal; receive thetransmission signal from the wireless communication device receiving thesecond signal; extract identification information from the responsetransmission of each of the plurality of designated transmission devicesreceiving the first signal, identify each of the plurality of thedesignated transmission devices based on the extracted identificationinformation; extract identification information from the transmissionsignal of the wireless communication device receiving the second signal;match the extracted identification information of each of the pluralityof designated transmission devices with an identification of acorresponding user; determine an allowability of the identifieddesignated transmission device based on a set of preferences of the usermatching the designated transmission device; and allow said identifieddesignated transmission device actions when the set of preferences isindicated as allowed; and do not allow said identified designatedtransmission device actions when the set of preferences is indicated asnot allowed; match the extracted identification information of thewireless communication device to one of the plurality of identifieddesignated transmission device; and determine an allowability of thewireless communication device to perform actions based on the determinedallowability of the matching designated transmission device to performactions.
 22. The system of claim 21, wherein said plurality ofdesignated transmission devices comprise at least one of: an RF tag, an802.xx communications device, a wristband, a cell phone, a wirelesscommunications device, a wireless transmission device, an ID bracelet, acell phone, an identification unit, a walkie-talkie, a Bluetoothcommunication device, a PDA, a Wi-Fi device and an education displaysystem.
 23. The system of claim 21, wherein the processor is configuredto: determine a location of the wireless communication device; andprevent said wireless communication device from communicating with thewireless communication network when said location of the wirelesscommunication device is within a designated space and fails to match oneof the identified designated transmission devices.
 24. The system ofclaim 23, wherein the processor is configured to: allow said wirelesscommunication device to communicate with the wireless communicationnetwork when said location of the wireless communication device isoutside the designated space.
 25. The system of claim 24, wherein saiddesignated space represents an area within a coverage area of thewireless communication network.
 26. The system of claim 21, wherein theprocessor is configured to: identify said wireless communication devicebased on a characteristic of the received transmission signal.
 27. Thesystem of claim 26, wherein the identity of the wireless communicationdevice is based on one of: an ESN, an IMEI, an IMSI, a telephone number,a coding message, a biometric information, an MIN, a unique identifier,a personnel identification, an EIN, an inmate identifier, anInternational Mobile Subscriber Identity, a Mac addresses, an encodedIMEI a unique identification, a frequency, a protocol, a period, a time,a time stamp, an angle, a phase, an amplitude, a wave shape, a cell, aband, a rate, a preamble, a coded message, and an envelope.
 28. Thesystem of claim 21, wherein the time slot assigned to the correspondingdesignated transmission device is measured with respect to the firstsignal.
 29. The system of claim 21, wherein the processor is configuredto: provide instruction to said wireless communication device to operateon a known channel.
 30. The system of claim 21, wherein the secondtransmitting system is configured to: transmit said second signal into aspace, said second signal having a higher power within said space than asignal associated with the wireless communication network.
 31. Thesystem of claim 21, wherein said system integrates with an actionfacility, wherein the action facility comprises at least one of: acentral control unit, a centralized command unit, a control center, adecentralize compartmental command, a jamming system, a managed accesssystem, a base transceiver station, a software radio system, a basestation technology, a server system, an educational server, and acommunication transceiver.
 32. The system of claim 31, wherein saidaction facility is configured to: provide at least one of: tracking ofindividuals, accurate identification, control of daily functions,tracking of wireless transmission devices, tracking of cell phones,tracking of identification units, tracking of a walkie-talkie,verification of access to authorized areas, integration of movement withCCTV, providing positive facial identification, providing biometricidentification, preventing movement into unauthorized area, enemyexclusion, development of inclusion zones, creation of exclusion zones,management of personnel count, providing an ability to restrictmovement, turn on or turn off visual equipment such as video cameras,determine a location of at least one of: people, inmates, wirelesscommunication devices, corrections personnel, visitors, personnel withinthe facility, equipment, resources, weapons, products, incoming goods,and outgoing goods, allowing wireless communications, preventingwireless communications, monitoring wireless communications, andintercepting wireless communications.
 33. The system of claim 32,wherein said daily functions comprises at least one of: meals, medicalappointments, court visits, recreation activities, a movement list, amovement schedule, scheduling resources, allocation of seating indesignated classrooms, access to computers, access to a Law library,time allocation in a program, scheduling of activities, such aseducation, culinary arts, managing scheduling of activities and angermanagement, developing of waiting lists, management of signupprocedures, morning schedule and movement, afternoon schedule andmovement, pre-trail scheduling, religious services scheduling,commissary usage, selective phone system usage, medicine distribution,vending machines usage and kiosk usage.
 34. The system of claim 21,wherein the processor is configured to: interface with at least one of:a CCTV, a facial identification unit, and a biometric identificationunit.
 35. The system of claim 34, wherein said biometric identificationunit is configured to provide, to the processor, at least one of: aheart rate, a temperature, an echo cardiogram, a fingerprint and a renaleye scan.
 36. The system of claim 21, wherein said wirelesscommunication network is associated with one of: a wireless point, amanaged access system, a base transceiver station, a software radiosystem, a base station technology system, a WiFi system, a 3rd partybase station, a local base station, a cell tower, a pseudo-base station,a 802.11a/b/en system, a wireless access point module, a WiFi accessprovider, a communications network, a cable network, a satellitenetwork, a wireless network, and a telephone network.
 37. The system ofclaim 21, wherein the processor is configured to: cause transmission ofa preamble value to a corresponding one of the designated transmissiondevices.
 38. The system of claim 21, wherein the identity of thedesignated transmission device is based on one of: a preamble, a codingmessage, an ESN, an IMEI, an IMSI, a telephone number, a biometricinformation, an MIN, a unique identifier, a personnel identification, anEIN, an inmate identifier, an International Mobile Subscriber Identity,a Mac addresses, an encoded IMEI a unique identification, a frequency, aprotocol, a period, a time, a time stamp, an angle, a phase, anamplitude, a wave shape, a cell, a band, a rate, and an envelope. 39.The system of claim 21, wherein the processor is configured to: identifythe wireless communication device based on a characteristic of thesignal transmission.
 40. The system of claim 21, wherein the responsetransmission received from a designated transmission device represents aresponse to the first signal.
 41. The system of claim 21, wherein thefirst signal is transmitted periodically.
 42. The system of claim 21,wherein the set of preferences comprises at least one: a time of day, alocation of the user, a privileges afforded the user, and aclassification of the user.