Systems and methods for detecting and controlling transmission devices

ABSTRACT

Disclosed is a system for managing wireless transmitting devices in which a wireless transmission from a transmission device is detected within or about a set area and an allowability of the transmission device to continue transmitting is based on an identification information, of the device, a location of the device and a number being called by the device.

CLAIM OF PRIORITY

This application claims pursuant to 35 USC 119 priority to and thebenefit of the earlier filing date, of provisional patent application:

-   -   Ser. No. 62/151,923 filed on Apr. 23, 2015; and

further claims pursuant to 35 USC 120 priority to and the benefit of theearlier filing data of that patent application entitled “System andMethods for Detecting and Controlling Transmission Devices filed on Feb.17, 2016 and afforded Ser. No. 15/046,378; and

further claims pursuant to 35 USC 120, priority to and the benefit ofthe earlier filed data of that patent application entitled “System andMethods for Detecting and Controlling Transmission Devices filed on Jul.6, 2013 and afforded Ser. No. 13/936,166, which claimed

pursuant to 35 USC § 119, priority to and the benefit of the earlierfiling date of that patent application entitled “Systems and Methods forDetecting and Controlling Transmission Devices” filed in the UnitedStates Patent and Trademark Office on Jul. 6, 2012 and afforded Ser. No.61/668,852, and,

pursuant to 35 USC § 120, as a continuation-in-part

to that patent application entitled “System and Method of Detection ofTransmission Facilities,” filed in the United States Patent andTrademark Office on Aug. 28, 2010 and afforded Ser. No. 12/870,808,

-   -   which claimed the benefit of the earlier filing date, pursuant        to 35 USC 119, to U.S. Provisional App. No. 61/237,682, entitled        “Method and System for Determining a Location and Tracking of a        Wireless Device,” filed on Aug. 28, 2009 and to U.S. Provisional        App. No. 61/264,838, entitled “System and Method of Detection        and Allowing Access of Transmission Facilities, filed on Nov.        30, 2009 and to U.S. Provisional App. No. 61/307,838, entitled        “System and Method for Capturing and Controlling Transmission        Devices,” filed on Feb. 24, 2010 and

further claimed the benefit of the earlier filing date, pursuant to 35USC § 120, as a continuation-in-part

to that patent application entitled “System and Method of Detection andAllowing Access of Transmission Facilities,” filed in the United StatesPatent and Trademark Office on Jul. 27, 2009 and afforded Ser. No.12/510,036, which claimed the benefit of the earlier filing date,pursuant to 35 USC 120, as a continuation-in-part;

to that patent application entitled “Tracking and Determining a Locationof a Wireless Transmission,” filed in the United States Patent andTrademark Office on Jun. 11, 2008 and afforded Ser. No. 12/157,530,which claimed the benefit of the earlier filing date, pursuant to 35 USC120, as a continuation-in-part;

to that patent application entitled “Systems and Methods of DetectionTransmission Facilities,” filed in the United States Patent andTrademark Office on Jul. 14, 2006 and afforded Ser. No. 11/457,786 (nowU.S. Pat. No. 8,078,190), which claimed the benefit of the earlierfiling date, pursuant to 35 USC § 119, outs. Provisional App. No.60/699,281 filed on Jul. 14, 2005 and U.S. Provisional App. No.60/739,877 filed on Nov. 23, 2005. The entire contents of all of whichare incorporated by reference, herein.

This application further claims the benefit of the earlier filing date,pursuant to 35 USC § 120,

as a continuation-in-part to that patent application entitled “WristBand Transmitter,” filed in the United States Patent and TrademarkOffice on Sep. 2, 2008 and afforded Ser. No. 12/231,437, which claimedthe benefit of the earlier filing date, pursuant to 35 USC § 120,

as a continuation-in-part to that patent application entitled “Trackingand Determining a Location of a Wireless Transmission,” filed in theUnited States Patent and Trademark Office on Jun. 11, 2008 and affordedSer. No. 12/157,530, which claimed the benefit of the earlier filingdate, pursuant to 35 USC § 120,

as a continuation-in-part to that patent application entitled “Systemsand Methods of Detection Transmission Facilities,” filed in the UnitedStates Patent and Trademark Office on Jul. 14, 2006 and afforded Ser.No. 11/457,786 (now U.S. Pat. No. 8,078,190), the entire contents of allof which are incorporated by reference, herein.

RELATED APPLICATION

This application is related to co-pending patent application entitled“Systems and Methods of Detection of Transmission Facilities,” filed onMay 4, 2013, and afforded Ser. No. 13/887,300, which claimed thebenefit, pursuant to 35 USC 120, as a continuation that patentapplication entitled “Systems and Methods of Detection TransmissionFacilities,” filed in the United States Patent and Trademark Office onNov. 19, 2011 and afforded Ser. No. 12/323,817, which claimed thebenefit, pursuant to 35 USC 120,

as a continuation that patent application entitled “Systems and Methodsof Detection Transmission Facilities,” filed in the United States Patentand Trademark Office on Jan. 1, 2011 and afforded Ser. No. 12/983,294,which claimed the benefit, pursuant to 35 USC 120,

as a continuation that patent application entitled “Systems and Methodsof Detection Transmission Facilities,” filed in the United States Patentand Trademark Office on Jul. 27, 2009 and afforded Ser. No. 12/510,006,

which claimed the benefit, pursuant to 35 USC 120,

as a continuation that patent application entitled “Systems and Methodsof Detection Transmission Facilities,” filed in the United States Patentand Trademark Office on Jul. 14, 2006 and afforded Ser. No. 11/457,786(now U.S. Pat. No. 8,078,190), the contents of all of which areincorporated by reference, herein.

BACKGROUND Field of the Invention

This invention relates to tracking and location of the field of wirelesstransmission and more particularly to the identification and determininga location of a wireless transmission device and controlling its use.

Background

There are many facilities, such as government buildings, and inparticular correctional facilities, such as prisons, that do not permitcellular phone usage or wireless transmission devices on the premises oreven possession of cellular phones being used by criminals. In earlierapplications we explained how to positively identify wirelesscommunication devices such as cell phone the premises or even possessionof cellular phones and PDA and locate them, track their movements andcontrol the use of the cell, if necessary.

Finding and preventing usage of cell phones and other transmissionfacilities is difficult, and a need exists for improved methods ofdetecting, locating, and managing the transmission of such devices.

SUMMARY OF THE INVENTION

Provided herein are methods and systems for locating transmissiondevices (or transmission facilities) such as cellular phones, cellphones, mobile phones, satellite phones, radios, transmitters, PDAs,beepers, pagers, walkie-talkies, email devices, instant messengerdevices, voice over IP devices, and other types of wirelesscommunication or transmission facilities whose possession is prohibited.In addition, control of the devices is important as such wirelessdevices are known to be used to detonate bombs, as in the case ofimprovised explosive devices. The methods herein are also to positivelyidentify, locate and track such transmission facilities. For example,the system provides the location and tracking of one or more individualswho utilize a wireless device to communicate and further determineswhether the individual is authorized to transmit within a general arealocal to the individual. In one aspect, law enforcement may beinterested in tracking the individual's identification and movements.

Methods relate to locating and managing the use and presence of wirelesscommunication facilities are further disclosed. Embodiments relate todetecting wireless devices when they transmit a signal are furtherdisclosed. Other embodiments relate to detecting of transmission deviceswhen the transmission devices (i.e., facilities) are in a non-activetransmission active state.

In embodiments the methods and systems disclosed herein include methodsand systems for detecting a transmitting device within an obstructionrich environment. The methods and systems may include detecting thetransmitting device within a wireless detection transmission facility;communicating signal information relating to the detected transmittingdevice from the wireless transmission detection facility to a centralunit; determining the location of the transmitting device; displayinginformation of the detection and location of the transmitting devicethrough a user interface; and providing the information to an actionfacility for causing actions related to the detected transmittingdevice. In embodiments, the wireless transmission detection facility isan antenna. In embodiments, the antenna is a dual dipole embeddedantenna. In embodiments, the dual dipole embedded antenna is tuned toreceive cell phone transmissions. In embodiments the dual dipoleembedded antenna is tuned to receive a frequency band of approximately700 to 950 MHz. In embodiments the dual dipole embedded antenna is tunedto receive a frequency band of approximately 1.7 to 2.0 GHz. Inembodiments the dual dipole antenna is tuned to receive signals infrequency bands of approximately 700 to 950 MHz and 1.7 to 2.0 GHz. Inembodiments the obstruction rich environment is a correctional facility.In embodiments the obstruction rich environment is a mall. Inembodiments, communicating the information relating to the detectedtransmitting device from the wireless transmission detection facility toa central unit involves wireless communications. In embodiments, thewireless communications are 802.11 communications. In embodiments,determining the location of the transmitting device is accomplishedthrough transmission triangulation. In embodiments location of thetransmitting device is accomplished through a known location of a singleantenna. In embodiments the location of the transmitting device isdetermined based on extrapolation of the receipt of a plurality ofreceived signals through a series of non-iterative linear equations.

BRIEF DESCRIPTION OF FIGURES

The systems and methods described herein may be understood by referenceto the following figures. It is to be understood that the figures anddescriptions of the present invention described herein have beensimplified to illustrate the elements that are relevant for a clearunderstanding of the present invention, while eliminating, for purposesof clarity only, many other elements. However, because these eliminatedelements are well-known in the art, and because they do not facilitate abetter understanding of the present invention, a discussion of suchelements or the depiction of such elements is not provided herein. Thedisclosure herein is directed also to variations and modifications knownto those skilled in the art.

FIG. 1 illustrates an exemplary transmission detection, identification,and reporting system in accordance with the principles of the invention.

FIG. 2 illustrates a system for detecting a transmission facility.

FIG. 3 illustrates exemplary antenna configurations.

FIG. 4 illustrates a first system configuration for detecting atransmission facility in a cell environment.

FIG. 5 shows a second system configuration for detecting a transmissionfacility in a cell environment.

FIG. 6 illustrates a block diagram relating to actions taken whendetecting transmission facilities.

FIG. 7 shows a transmission facility detection system wherein an antennaarray is used to determine location.

FIG. 8 shows a transmission facility detection system wherein a signalsource is differentiated between two adjacent rooms.

FIG. 9 illustrates a transmission facility detection systemconfiguration employing multiple antennas used to identify a location ofa signal source after detection of its presence.

FIG. 10 shows a schematic diagram of a system for detecting signals of atransmission facility.

FIG. 11 shows a schematic diagram of an alternate embodiment of a systemfor detecting a signal of a transmission facility.

FIG. 12 shows a schematic diagram of a main circuit board within asystem for detecting transmission facilities.

FIG. 13 shows a schematic diagram of a sub-station in a system fordetecting transmission facilities.

FIG. 14 illustrates a null detection facility.

FIG. 15 Illustrates a system for detecting and controlling atransmission facility.

FIG. 16 Illustrates a system for tracking and locating transmissionfacilities.

FIG. 17 Illustrates an exemplary corrections facility designed forautomation.

FIG. 18 illustrates a system for implementing the processing describedherein.

FIG. 19 illustrates an exemplary process for determining location inaccordance with the principles of the invention.

FIGS. 19A and 19B illustrates an exemplary geographical representationto determine power allocation in accordance with the principles of theinvention.

FIGS. 20A and 20B illustrates exemplary distance and power graphsassociated with the network configuration shown in FIG. 19B.

FIG. 21 illustrates a second example of an exemplary cellular networkconfiguration.

FIGS. 22, 23, and 24 illustrate exemplary power graphs associated withthe network configuration shown in FIG. 21.

FIG. 25 illustrates a superposition of the graphs shown in FIGS. 22, 23,and 24.

FIG. 26 illustrates an exemplary power transmission in accordance withthe principles of the invention.

FIG. 27 illustrates a flow chart of an exemplary process for determiningpower transmission in accordance with the principles of the invention.

FIG. 28 illustrates an exemplary process and options for controllingwireless transmission within an area in accordance with the principlesof the invention.

FIG. 28A illustrates an alternative exemplary process and options forcontrolling wireless transmission within an area in accordance with theprinciples of the invention.

FIG. 29 illustrates an exemplary methodology of allowing communicationsvia a wireless communication device within a controlled area and optionsfor controlling wireless transmission within the area in accordance withthe principles of the invention.

FIG. 29A illustrates an exemplary methodology of allowing communicationsvia a wireless communication device within a controlled area and optionsallowing phones to communicate in accordance with the principles of theinvention.

FIG. 30 illustrates an alternative exemplary methodology forcommunicating when controlling wireless transmission within an area inaccordance with the principles of the invention.

FIG. 31 illustrates an exemplary process for controlling and processinga wireless transmission in accordance with the principles of theinvention.

FIG. 32 illustrates an exemplary base station power grid matrix tostimulate cell phones in standby mode.

FIG. 33 illustrates a second exemplary base station power grid matrix tostimulate cell phones in standby mode.

FIG. 34 illustrates a flow chart of an exemplary process for managingwireless communication devices in accordance with the principles of theinvention.

FIGS. 35A-35C illustrate flow charts of exemplary processes for managingwireless communication devices operating in a first aspect of a firstmode in accordance with the principles of the invention.

FIGS. 36A-36D illustrate flow charts of exemplary processes for managingwireless communication devices operating in a second aspect of a firstmode in accordance with the principles of the invention.

FIG. 37 illustrates a flow chart of an exemplary process for managingwireless communication device operating in a third aspect of a firstmode in accordance with the principles of the invention.

FIG. 38 illustrates a flow chart of an exemplary process for managingwireless communication device operating in a first aspect of a secondmode in accordance with the principles of the invention.

FIG. 39 illustrates a flow chart of an exemplary process for managingwireless communication device operating in a second aspect of a secondmode in accordance with the principles of the invention.

FIG. 40 illustrates a flow chart of an exemplary process for managingwireless communication device in accordance with the principles of theinvention.

FIG. 41 illustrates a flow chart of an exemplary process for managing awireless communication device in accordance with the principles of theinvention.

DETAILED DESCRIPTION OF THE INVENTION

Detection of a transmission facility, such as a mobile phone orhand-held radio transmitter, or other transmission facility as describedherein, within an obstruction rich environment, such as a facility withmany physical barriers to electronic transmission, is difficult toachieve. Referring to FIG. 1, the transmission detection,identification, and reporting system 100 described herein provides amethod of detecting a transmission facility 202, such as depicted inFIG. 2, within an environment rich in obstructions 102. One embodimentof the transmission detection, identification, and reporting system 100may involve the detection of a mobile phone within a heavily walled andmetal-barred government facility such as a correctional facility. Inthis embodiment, the system may utilize an array of antennas 104selectively placed within the facility, collection substations 108 forlocalized collection of detected signals, a central unit 110 for theprocessing of incoming signals from the facility, a display 112 forshowing the location of the detected transmission facility 202, and anaction facility 114 for implementing standard procedures in the event ofa detection. In this embodiment, the communications between the antennas104 and the substations 108, and between the substations 108 and thecentral unit 110, may be wireless to make installation and maintenanceof the system within the facility cost and time effective. Selectiveplacement of the antennas 104, combined with algorithms and methods fordetermining location of the transmission facility 202, may allow asubstantially improved means for locating transmission facilities 202,such as mobile phones, in an otherwise heavily shielded environment.

In embodiments the antenna 104 may be a multi-dipole embedded antenna.Two examples of dual dipole embedded antennas are provided in FIG. 3 asa first dual-dipole embedded antenna 302 and a second dual dipoleembedded antenna 304. In embodiments the antenna may be adapted toreceive one, two, three, four, or more bandwidths. In embodiments theantenna 104 may be selected as one or more of a dipole antenna 104, aYagi-Uda antenna 104, a loop antenna 104, a quad antenna 104, amicro-strip antenna 104, a quad antenna 104, a helical antenna 104, anda phase array antenna 104, a patch antenna or a combination thereof.

In embodiments, the transmission facility 202 may be a mobile phone,such as a flip phone, a slide phone, a cellular phone, a handset, asatellite phone, a 3G phone, a wireless phone, a cordless phone or thelike. In embodiments, the transmission facility 202 may be a radio, suchas a Walkie-Talkie, a mobile radio, a short-wave radio, or the like.

In embodiments, the transmission band from the transmission may bewithin the radio or other electromagnetic frequency spectrum, such asextremely low frequency (ELF), super low frequency (SLF), ultra lowfrequency (ULF), very low frequency (VLF), low frequency (LF), mediumfrequency (MF), high frequency (HF), very high frequency (VHF), ultrahigh frequency (UHF), super high frequency (SHF), extremely highfrequency (EHF), microwave, and/or a frequency suitable for 802.11xwireless communications, ultra wide band (UWB), Bluetooth, or the like.

In embodiments, the obstruction rich environment 102 may be a building,such as a corrections facility, a school, a government facility, astore, a mall, a residence, a hotel, a motel, or the like. Inembodiments, the obstruction rich environment 102 may be a largeconfined space, such as a courtyard, a food court, a recess area, ahallway, greenhouse, recreation room, gymnasium, auditorium, kitchen,cafeteria, craft area, work area, library, prison yard, or the like. Inembodiments, the transmission obstruction materials such as cinderblock,cement, rebar, wire cage, metal, metal coated surface, or the like. Inembodiments, the obstructions in the obstruction rich environments 102may be other construction materials, such as wood, glass, rug, flooringmaterials, roofing materials, and the like.

In embodiments, the transmitting signal information from the antenna 104module to the central unit 110 may be through a communicationsconnection, such as an IEEE 802.15.4 wireless network, IEEE 802.11Wi-Fi, Bluetooth, Ethernet, and/or other similar type wirelesscommunication protocols. In embodiments, the communications connectionmay utilize CAT-5, RJ-45, RS-232 connections, and/or other similar typewired communication protocols and hardware. In embodiments thecommunications connection may utilize an optical connection, such as awireless infrared link, wireless visible light, an optical fiber, andthe like.

In embodiments, the transmitting signal information from the antenna 104module to the central unit 110 may contain data, such as CDMA, CDPD,GSM, TDMA, and the like, and may be used to discriminate which servicesignal is being used, such as Verizon, Cingular, T-Mobile, Sprint, andthe like. The detection of the cell phones may be further resolved downto cell phone manufacturer and cell phone provider.

In embodiments, the transmitting signal information to the central unit110 may be made through an intermediate connection, such as a substation108, router, switch, hub, bridge, multiplexer, modem, network card,network interface, processing unit, preprocessor, computer, repeater,antenna 104, and the like. (see FIG. 2).

In embodiments, the central unit 110 may have in part a computer, acomputer system, a network of computers, a state machine, a sequencer, amicroprocessor, a digital signal processor, an audio processor, apreprocessor, a microprocessor, and the like.

In embodiments, the central unit 110 may process information, such aslocation information, such as the location of people, inmates,corrections personnel, visitors, all personnel within the facility,equipment, resources, weapons, products, incoming goods, outgoing goods,and the like. In embodiments, the information may be a type of signal,such as mobile phone standard protocols such as CDMA, CDPA, GSM, TDMA,and the like. In embodiments, the information may be an eventnotification, such as personnel under duress, an emergency medicalcondition, a call for assistance, a fire, a call for police, a theft,and the like. In embodiments, the processed information may allow forthe tracking of the person or object in possession of the transmissionfacility 202, such as a mobile phone, a radio, a weapon, a product, aresource, and the like. In embodiments, the processed information mayallow for the discrimination and/or association between people orobjects, such as determining the ownership of the transmission facility202, the assignment of the source of transmission, current location of atransmission facility 202 compared to its predicted location, and thelike. In embodiments, the processed information may also have time codesand unique identifiers assigned.

In embodiments, the central unit 110 may have a display 112, such as acathode ray tube (CRT), liquid crystal display (LCD), electronic paper,3D display, head-mounted display, projector, segmented display, computerdisplay, graphic output display, and the like. In embodiments, thecentral unit 110 may have an action facility 114, comprising a userinterface for causing actions relating to the detected transmissionfacility 202. Actions may for example represent operations such asclosing a door, sealing a room, deploying and action signal, initiatingan alarm, and the like.

In embodiments the functions of a central unit 110 as described hereinmay be replaced by an alternate configuration, such as a configurationof multiple computers, such as a group of servers, processors, or thelike, operating in parallel. In embodiments the methods and systemsdescribed herein may involve locating computing capabilities inalternative network configurations, such as in a mesh network or apeer-to-peer network.

In embodiments, the location of a transmission facility 202 may bedetermined by various radiolocation or signal measurement techniques,including measuring phase, amplitude, time, or a combination of these;or by identifying and locating an area associated with an antenna 104with the highest signal strength. In embodiments, the location of atransmission facility 202 may be determined when the transmissionfacility 202 is powered off though detection of a null in the band-passof a transmitted frequency sweep due to the presence of a mobile phoneantenna.

In embodiments, a method of detecting a transmission facility 202 (e.g.cell phone) when the transmission facility 202 is not powered mayrequire a transmitting device and a receiving device that can recognizethe signature of an antenna 104 associated with the transmissionfacility 202. By transmitting a known frequency and receiving thedisturbance pattern produced by having a particular antenna 104 designin the transmission path, the pattern or ‘signature’ of that antenna 104can be characterized. In embodiments, this characterization may beevaluated by central unit 110 with results output to a display 112. Adatabase of these signatures can be placed into the unit, and as thetransmitter sweeps across the various cell frequencies, a patternreceived can be matched against the database patterns to determine thepresence of transmission facilities 202. In embodiments, any class ofantenna (e.g. WI-FI, Blackberry, Walkie-Talkie, etc.) can be classifiedand identified.

In embodiments, the range of a hand held device that can detect aninactive transmission facility is approximately 10 feet. In embodiments,greater distances could be attained for stationary units by increasingthe power.

Radiolocation, also referred to as radio-determination, as used herein,encompasses any process of finding the location of a transmitter bymeans of the propagation properties of waves. The angle, at which asignal is received, as well as the time it takes to propagate, may bothcontribute to the determination of the location of the transmissionfacility 202. There are a variety of methods that may be employed in thedetermination of the location of a transmission facility 202. Methodsinclude (i) a cell-sector system that collects information pertaining tocell and sector ID's, (ii) the assisted-global positioning satellite(GPS) technology utilizing a GPS chipset in a mobile communicationfacility, (iii) standard GPS technology, (iv) enhanced-observed timedifference technology utilizing software residing on a server that usessignal transmission of time differences received by geographicallydispersed radio receivers to pinpoint a user's location, (v) timedifference of arrival, (vi) time of arrival, (vii) angle of arrival,(viii) triangulation of cellular signals, (iix) location based onproximity to known locations (including locations of otherradio-transmitters), (ix) map-based location, or any combination of anyof the foregoing, as well as other location facilities known to those ofskill in the art.

Obstructions to radio wave propagation in the obstruction richenvironments 102 may greatly reduce the effectiveness of many of theconventional radiolocation methods due to obstruction of theline-of-sight between the transmission facilities 202 and the receivingantennas 104. However, by employing a large array of antennas 104,positioned so as to maintain line-of-sight between possible transmissionfacility 202 locations and the receiving antennas 104, several of thesemethods may be effectively used in the location of the transmissionfacility 202. These methods include time difference of arrival, time ofarrival, and angle of arrival, amplitude comparison, and the like. Thetime difference of arrival method determines the difference in the time,or the difference in phase, of the same radio-transmitting signalarriving at different receiving antennas 104. Together with the knownpropagation speed of the radio wave, allows the determination of thelocation of the transmission facility 202. The time of arrival methoddetermines the absolute time of reception of the signal at differentreceiving antennas 104, and again, along with the known propagationspeed of the radio wave, allows the determination of the location of thetransmission facility 202. The angle of arrival method utilizesdirection of transmission to different antennas 104 to determine thelocation of the transmission facility. Amplitude comparison methodcompares the strength of the signal detected at each antenna todetermine the location of a transmission facility 202. For example, twoantennas 104 located in the same room would detect different signalamplitudes for the same transmission facility 202 output, therebyproviding a means of determining which antenna 104 the transmissionfacility 202 is closer to. Increasing the number of antennas 104therefore increases the resolution with which the location of thetransmission facility 202 may be determined. All of these methods, andcombinations of these methods, may employ mathematical processes such astriangulation, tri-lateration, multi-lateration, or like, in determiningthe location of the transmission facility.

Triangulation is the process of finding coordinates and distance to apoint by calculating the length of one side of a triangle, givenmeasurements of angles and/or sides of the triangle formed by thatpoint, such as the target transmission facility 202, and two other knownreference points, such as the receiving antennas 104. The calculation ofthe location of the transmission facility 202 may then be performedutilizing the law of Sines from trigonometry. Tri-lateration is a methodsimilar to triangulation, but unlike triangulation, which uses anglemeasurements, together with at least one known distance, to calculatethe subject's location, tri-lateration uses the known locations of twoor more reference points and the measured distance to the subject, suchas the transmission facility 202, and each reference point, such as thereceiving antennas 104. Multi-lateration, or hyperbolic positioning, issimilar to tri-lateration, but multi-lateration uses measurements oftime difference of arrival, rather than time of arrival, to estimatelocation using the intersection of hyperboloids.

While several radiolocation and triangulation techniques have beendescribed in connection with locating the transmitting device, it shouldbe understood that one skilled in the art would appreciate that thereare other location methodologies and such location methodologies areencompassed by the present invention. For example, in embodiments, thelocation of a single antenna may be known and the single antenna maydetect a transmitting device. The location of the transmitting devicemay be estimated through its known proximity to the single antennalocation. This may provide adequate location resolution for certainapplications of the technology. Similarly, two or more antennas may beused and each of the antenna locations may be known. When each of theantennas receives a transmission, the corresponding signal strengths maybe compared. The one with the highest signal strength may be determinedas the one closest to the transmitting device so the correspondingantenna location may provide enough location resolution for certainapplications.

In an embodiment of the transmission detection, identification, andreporting system 100, a corrections facility, with its substantial andinherent obstruction rich environment 102, presents a significantchallenge to authorities of the correction facilities. In an embodimentof the invention shown and described herein, the system maybe placedthroughout the corrections facility for the purpose of alerting thecorrections staff that cell phone activity is taking place, the locationof the activity and the type, i.e., Nextel, T-Mobile, Verizon, and thelike. The following technology may also allow for a standalone detectionunit 408 or set of detection units 408 (see FIG. 4) to detect cellphones in schools, buildings and other environments in which thefacility's or area's provider does not wish the use of cell phones andis interested in the detection of cell phone use.

In an embodiment, the system may include an integrated antenna 104 andRF detector (together referred to as a detector unit 408) (FIG. 4), asubstation 108, (FIG. 1) whose purpose may be to communicate with eachdetector unit 408 within its sector, and report activity to the centralunit 110; which reports confirmed activity, type of cell phone, andlocation to the display 112 of the central unit 110. These detectionunits 408 may be used individually or in conjunction with each other andmay triangulate detection within a specific area. The outside yard areasmay be monitored by detection units 408, which may cover large areas,such as 25×25 foot sectors or smaller areas, e.g., 5×5 foot sectors, tolocalize the detection of a cell phone (i.e., wireless transmissionfacility) and track its position from one sector to any adjoiningsector. That is, as the person moves with a phone, the changing positionof that phone may be reported. If the phone moves inside the facility,tracking may continue as interior detection units 408 detect the phone.

In an embodiment, within these basic groups of detection units 408 maybe various detection unit 408 types. Some detection unit 408 types maybe designed to be hard wired via RJ-45 connectors and/or CAT 5e cable,other detection units 408 may use 802.11b (WI-FI) wirelesscommunications between detection units 408, and there may also be anInfra-Red (IR) set of detection units 408, which utilize opticalcommunications techniques. Each communications type may have a specificpurpose within the corrections facility or other type of building and/orareas. Hard-wired units may be used when it is not possible to useeither an optical unit or a WI-FI unit. When there are walls embeddedwith metal or where the distance and the obstructions 102 may preclude awireless technique. WI-FI detection units 408 may be used when it iseffective to communicate in an area where there are obstructions 102such as cement walls or cement with embedded rebar walls, facades, andthe like. Optical detection units 408 may be used in areas where clear,line-of-site communications may be possible. Optical detection units 408may operate over relatively long distances, (e.g., 3,000 feet), whileWI-FI detection units 408 may be limited to shorter distances, such as250 feet.

In an embodiment, there may also be a hand-held detection units 408 tobe used once a cell phone has been detected, and the correctionsofficer(s) or monitor are attempting to pinpoint the location. Thishand-held detection unit 408 may be similar to the integratedantenna/detector unit of the main system. This embodiment may alsoinclude a detector, discriminator and decoder module. The hand-helddetection units 408 may detect and identify each cell phone and comparethe cell phone identity to the allowed cell phone user list or in thiscase to a list of unauthorized cell phones. This detector unit 408 mayoutput an audible alarm whose pitch changes as the signal becomesstronger or weaker.

In an embodiment, a second type of hand-held detector unit 408 may beused to detect a cell phone when it is either off or in a standbycondition, also referred to as null detecting. Null detection may beused at an ingress or egress of a building or an area as a way ofdetecting a communication device or device with an antenna. Thistechnique may be used in areas where it is unpractical, unwanted orunwarranted to have x-ray machines or more intrusive detection systems.A null detection system may also be deployed in a handheld device so aninspector can move through an area attempting to detect a communicationdevice. In embodiments, the null detection system may detect thepresence of a transmission facility even when the transmission facilityis not transmitting a signal. In embodiments, a hand held or mountednull detection device may be used in a correctional institution or othergovernment facility.

In embodiments, null detection may utilize a transmission-detectionsource, independent of the transmission source being detected, which iscapable of sweeping across the frequency spectrum of interest andreceiving it's returning signal. The transmission source sweeps thespectrum of interest, searching for distortions in the returned field.Distortions in the spectrum may be due to the presence of an antenna ofa transmission facility 202. Matching the distortion, also referred toas a null in the band pass, to characteristics of known antennas usedwith mobile phones may allow the detection and/or identification of thetransmission facility 202. The unit may output an audible “beep” if itdetects a null, allowing the officers to focus in on the location of thecell phone. The range of the hand-held detection units 408 may be, forexample, 15 to 20 feet. This will allow cell phones that are in theimmediate vicinity to be quickly detected. The null detection may beapplicable for ingress and/or egress detection.

In an embodiment, a survey may be performed to determine optimalplacement and the type and number of detection units 408 required. Thiswill insure the minimum number of required detection units 408 toperform optimal detection. The team may provide a report detailing thelayout determined to be optimized for the facility and may review thisreport with the facilities staff so that any required modifications tothe plan may be incorporated before installation is begun.

In an embodiment, the initial coverage of a facility may be in the cellblocks 402 (FIG. 4) and/or pod areas. The same may be true for linearfacilities. The survey may cover the entire facility, including openareas, such as courtyards, where required. Inmate also work in largeyard and plantations such as Angola State Prison, it is anticipated thistechnology may be deployed over a large outside area.

In an embodiment, the cell block detection units 408 may be mountedinside each chase 404 (a column positioned between cells in a cell blockthat includes various utility facilities, such as plumbing andelectricity), as shown in FIG. 4, and may communicate to a substation108 (not shown in FIG. 4) located at one end of the block. Thisdetection unit 408 may communicate its information to the central unit110 so that tracking, confirmation, and display may be accomplished. Forlinear facilities 500, as shown in FIG. 5, detector units 408 may bemounted along the walls in the obstruction rich environment 102 oppositethe cells 402 and perform their function similar to the detection units408 mounted within a chase 404.

In an embodiment, detector units 408 may be installed in open areas suchas gymnasiums, kitchens, cafeterias, craft and work areas and other openareas where a cell phone may be used. The difference in these locationsfrom the cell blocks 402 may include the method of detection andtracking. Since most facilities may only require the identification of acell phones presence within a room, and there could be many inmateswithin that room, the process may be to lock-down the room, or rooms, inthat area and use a hand held device and a physical search to pinpointthe phone location. A generalized block diagram of a detector unit 408is shown in FIG. 6. For those facilities that require resolving thelocation within a large interior room or area, the use of triangulationto resolve to a 10×10 foot area may be used.

In an embodiment, facilities with the requirement to detect cell phones202 in outside yard areas, the use of triangulation to a 25×25 footspace or smaller foot space (e.g., 5×5 foot) may be constructed. As aphone 202 is moved from area coverage 702 to area coverage 702, thesystem may track its movement. Each square foot sector may overlap anadjoining sector. In this way, as shown in FIG. 7, tracking may becontinuous, without any gaps.

In an embodiment, it may also be important to know whether a phone islocated on one side of an obstruction or the other, such as doors,walls, and the like. If the wrong room is identified, it may make itmore difficult to locate a phone and its user. As shown in FIG. 8,detection of the correct room may depend upon the level of the signalreceived. Proper placement of the detector units 408 may insure that thephone may be identified in the correct location.

In an embodiment, when sectoring a large room such as a gymnasium, thenumber and placement of antennas 104 may be critical. In order to sectorlarge regions, such as a 10×10 foot section, within the room, theantenna 104 may need to be capable of narrowing their window to an areasmall enough to meet the requirement. In FIG. 9, there is shown anOmni-directional antenna 104, which detects signal presence generally ina 360 degree direction. Once a signal crosses a threshold, the directionfinding antennas 104 may be turned on to determine the position of thesignal. This may be reported to the display 112 and tracked until it iseither turned off or moves to another room or hallway. Then, normalpositional tracking may take place. It is to be understood that theFIG.s and descriptions of the present invention described herein havebeen simplified to illustrate the elements that are relevant for a clearunderstanding of the present invention, while eliminating, for purposesof clarity only, many other elements. However, because these eliminatedelements are well-known in the art, and because they do not facilitate abetter understanding of the present invention, a discussion of suchelements or the depiction of such elements is not provided herein. Thedisclosure herein is directed also to variations and modifications knownto those skilled in the art.

In an embodiment, the transmission detection, identification, andreporting system 100 may work in conjunction with a personal alarmsystem, or an inmate tracking system, or a combination of all three andthe like. This dual/tri role system(s) may allow for more cost effectiveuse of the detection units 408 and provide for greater protection forthe correctional officer and inmate alike. This detection system mayutilize an individualized frequency, with known frequency separationbetween detection units 408 and between corrections officer'sfrequencies and Inmate frequencies. The detection configuration of thedetection units 408 may provide complete coverage of the facility. Eachtransmission facility unit may be continually tracked throughout thefacility. At all ingress or egress points the focus of the detection mayensure accurate location of all correctional and inmate personnel. Withthe combined systems more detection units 408 may be needed to ensurefull coverage. In an embodiment, the known identity of the transmissionfacility, in this case a cell phone being carried and/or used by anofficer or inmate can be accurately associated with another knownidentity of another transmission facility, in this case a correctionsofficer and/or inmate wearing a transmission facility. In thisembodiment, the use of an authorized cell phone or an authorizedtransmission facility by an unauthorized person can be accuratelydetected and reported. This embodiment can be utilized inside thefacility or outside the facility.

In an embodiment, the transmission detection, identification, andreporting system 100 may allow for cell phone owner discrimination. Thesystem may provide for the allowance of authorized cell phones withinthe prohibited area. The system may detect and identify each cell phoneand compare the cell phone identity to the allowed cell phone user list.The system may record all phone use and may automatically alert thefacility of all prohibited cell phone use. In addition, each cell phonedetection event may be identified with a unique identifier and timecode, to ensure proper identification. The CCTV system may also beintegrated to ensure greater accuracy identifying illegal use ofwireless transmission devices.

The cell scan-1 detection system 1000, shown in FIG. 10, is anembodiment of a system for detecting signals of a transmission facility.Antenna 104 receives transmission signals from wireless transmissiondevice (not shown). Antenna 104 may operate, for example in the range of2.4 GHz with a bandwidth of 465 MHz The received signals are thenprovided to a low pass filter and a log amplifier, wherein the level ofamplification is based on the input level of the input signal. Theamplified signal is next provided to a shaping filter and an operationalamplifier. The amplified signals are provided to an analog-to-digital(ADC) converter and provided to a Field Programmable Gate Array (FPGA).Information from the FPGA may be provided to a microprocessor tosupplement the processing and control imposed by the FPGA. The FPGA mayreceive information from dedicated frequency bands (e.g., 900 MHz) orfrom known wireless protocols (e.g., 802.15.4). The microprocessor maythen determine whether a detected transmission facility for example is aperson with a transmission facility (e.g., wristband, a cell phone) andmay allow or prevent that person from accessing an area. Themicroprocessor may also alert the central unit of the persons enteringor desire to enter a restricted area. In another embodiment, if thetransmission facility, for example, is a cell phone and the cell phonewas in use within a restricted area, the cell phone would be identifiedby the central unit as being in a restricted area, then the system willdetermine whether the cell phone is authorized or not authorized, thenthe system would make a determination, based upon set rules whether toallow or disallow the transmission unit within the restricted area.

The cell scan-1 detection system 1000, shown in FIG. 10, is anembodiment of a system for detecting signals of a transmission facility.An antenna 104 receives wireless transmission facilities in a 2.4 GHzband, with a 465 MHz antenna. In other aspects, the detection system maydetect signals in other frequency bands, for example, 933 MHz, 433 Mhz,2.4 GHz and other known frequencies. The detected signals are providedto High and Low band RF filter. The RF filters (band pass filter)isolate sets of frequencies for greater sensitivity. For example, thereceived signals may be provided to a low band RF filter to isolate lowband RF signals and high band RF filters to isolate high band RFsignals. The isolated RF signals are provided to Log Amplifiers thatamplify or boost the signals using known amplification methods. Theswitch between two Wi-Fi frequencies switches all three wireless signalinputs into a log amp circuit and then to a smoothing filter to clean upthe signals to be analyzed. The signals are then provided to anOperational Amplifier (Op Amp) which amplifies the received analogsignal. The amplified RF signal is then processed through an A/Dconverter which changes the signal into a digital signal. The signal isthen processed in a processing unit (in this case a dedicated FieldProgrammable Gate Array (FPGA)) and the results are then transmitted viaa dedicated 2.4 GHz transceiver unit. The 2.4 GHz transceiver unit hasseveral other applications, and is used to transmit and receivecommunication information and to connect to external Wi-Fi communicationdevices. An example of this is an education system for inmates, medicalmonitoring equipment in a hospital application, an interactive ID forsafe school applications. The 900 MHz transceiver unit is for sync-ingthe sensors. The 465 MHz transceiver unit is for communication withinmates bracelets and Staff (personal alarm system) as is furtherdiscussed in the aforementioned related patent applications. The lowerfrequency of the 465 MHz unit also provides better wall penetration andalterative wireless communication device with better wall penetration.In another embodiment, the front end of the signal detection circuit anamplifier (e.g., 0-40 dB gain) is added before the RF filter (forexample an 824-849 MHz RF filter) to provide for greater sensitivity. Inadditional, a mixer and Voltage Controlled Oscillator (VCO) (not shown)is added after the RF filter. The output of the mixer is an IF(intermediate) frequency that is amplified and then provided to a bandpass filter (e.g., a 200 MHz filter with a bandwidth of 4 MHZ). Thesignal is then amplified and then provided to the Log Amp then to an OpAmp and then to threads (A/D). Depending on the noise floor (which isdetermined by proper grounding), one with an understanding of RFcircuitry would know to have proper impedance matching betweencomponents, and will utilize transformer(s) where appropriate. The IFsection's general parameters are 70 MHz to 350 MHz and sensitivity isrelated to frequency and the width of the band pass filter. As would beappreciated, the tighter the width of the band pass, the greater thesensitivity. In another embodiment, the VCO/mixer maybe fixed and the IFband pass filter may be the bandwidth of a desired frequency providingfor faster detection without the need to scan. Additionally the greaterthe dynamic range of the sensor system the greater accuracy andresolution in determining the exact location of the transmissionfacility.

In an embodiment as shown in FIG. 10, the processing section may beplaced on a separate board, this provides for multiple sensors frontends utilizing one back end processing unit. This provide for more costeffective sensors and versatility of assets. This also allows forspecific functionality such as antenna array directional location andangle tri-angulation being synchronized to at least one processing unit.It is also anticipated the more expensive processing component be sharedsuch a transmission signal decoding, data analysis, communications andthe like.

The cell scan-2 detection system 1100, shown in FIG. 11, shows analternate embodiment of a system for detecting a signal of atransmission facility. The RF filters (i.e., band pass filter) isolatesets of frequencies for greater sensitivity, in this example a low bandcell phone signals and high band cell phone signals. The operation ofthe elements in FIG. 11 is similar to that of FIG. 10 and need not bediscussed in detail herein.

The main board system 1200, shown in FIG. 12, is an embodiment of a maincircuit board within a system for detecting transmission facilities. Thesystem may be used to determine each signal received is an actual cellphone signal and not a spurious output. Thus, a test may need to beperformed that checks for the ‘persistence’ of the received signal. Apersistence test may run a timer 1202 for a minimum required time thatmay be nearly as long as the time of the shortest signal type expected.If the signal is present at the end of the timeout period, it is lesslikely to be a spurious response and more likely that it is a cell phoneoutput. For example, if a GSM signal of 500 microseconds long is theshortest duration signal of all the cell phone protocols received, thepersistence test may run for 450 microseconds to further ensure that thereceived signal is not merely a spurious response.

The sub-station system 1300, shown in FIG. 13, is an embodiment of asub-station in a system for detecting transmission facilities.

FIG. 14 illustrates an embodiment of a null detector (1400), wherein theVCO in FIG. 14 tunes to known antenna frequencies and the system detectsa null in the known antenna frequencies in which the antenna isdetected. In embodiments, the null detection system may detect thepresence of a transmission facility even when the transmission facilityis not transmitting a signal. In embodiments, a hand held or mountednull detection device may be used in a correctional institution or othergovernment facility. In embodiments, null detection may utilize atransmission-detection source, independent of the transmission sourcebeing detected, which is capable of sweeping across the frequencyspectrum of interest and receiving its returning signal. Thetransmission source sweeps the spectrum of interest, searching fordistortions in the returned field. Distortions in the spectrum may bedue to the presence of an antenna of a transmission facility 202.

In embodiments of the system described herein, detection levels may bedetermined by which output levels are possible with the various cellphone technologies that are in use today. Since the system described isan amplitude system, the strongest and weakest possible signals must bedetermined in order to identify the system's required dynamic range.Cell phone signals vary from −22 dBW to 6 dBW and this range defines thedetection requirements of the system. This translates to a maximumsignal of 4.0 Watts at the antenna. The minimum value is equal to 0.006Watts or 6 milliwatts. Therefore, the dynamic range required is −52 dBmto +36 dBm. In order to achieve such a dynamic range, an amplifier thatis gain adjustable is required such that with an input value of +36 dBm,the amplifier is not saturated.

In the embodiment, the system determines the characteristics required toinsure that each cell phone is correctly identified. The amplitude ofeach signal is determined which allows the system to determine whichsensor has received the largest signal. The system time stamps each datasample so that other sensors receiving the same signal will berecognized as such when the data is presented for analysis. Each sensoranalyzes the wave shape of the signal detected. Each transmission type(i.e., CDMA2000, PCS, TDMA, GSM, IS-95, etc.) has a unique wave shape.These wave shapes allow the analysis software to recognize that signalsseen in different parts of a facility can be associated with each other(using time and wave shape) and the signal that consistently containsthe largest amplitude will be identified as closest to the cell phonetransmission

In embodiments of the invention, signals directed toward an IED(improvised explosive device) may be intercepted, identified and deniedservice. Such interception may be up to a known range in forward andside quadrants. The identification and determination of the position ofthe person or persons using a satellite phone and/or land-based cellphone may be determined. Cell phones, as well as other RF devices, e.g.,garage door openers, walkie-talkie, etc., may be captured, identifiedand/or jammed that are attempting to activate or contact the IED.

In embodiments of the invention, when a cell phone, for example, is on,but not in an active communication, the cell phone is essentiallyinvisible to anyone attempting to monitor cell phone activity. In orderto be aware of the existence of such “on but not transmitting devices”the system described herein operates as a cell tower. That is, thesystem actively addresses the problem of cell phone detection byoperating (becoming) the tower. A vehicle with similar (but modifiedequipment to that of a cell tower) may actively poll the area of phonesthat are “on but not in a communication of any sort. The vehicle (i.e.,Pseudo Tower) collects the current database of active phones and thosephones in standby from the tower(s) in the area and uses this data baseto poll these phones in order to locate them. Once potential phones thatcould be possible detonation cell phones are identified and located, thePseudo Tower would affect a handoff and make itself the active tower.Thus, the captured cell phones are not allowed to rotate back to (i.e.,connect to) the local cell phone tower, insuring that any callsattempting to communicate with the detonation cell phone will not besent. As one of the goals is to identify the person who is attempting tocontact the detonation cell phone, a call history of each suspect cellphone may be analyzed.

When a caller attempts to activate an IED, the caller's presence can beidentified. Furthermore, the call being made is not forwarded to thedetonation cell phone and the IED will not be activated. By determininga peak angle (triangulation) the caller's cell phone/satellite phonesignal, the direction of the caller is then known. Directionidentification is performed by using a technique such an interferometry.In this case, multiple antennas employing interferometry may be used toscan through the current cell phone traffic identifying first, candidatethreats and then, pinpointing high probability locations which can beviewed through a high powered binoculars to determine whether thecandidate is in need of investigation. Criteria for determining whichcell locations may be threats is a pole or road sign, etc. The PseudoTower may continue controlling all of the phones in the area, preventingany forwarding of calls until all possible threats have been cleared. Atthis point, the personnel have the option of going after the caller ordeactivating the IED, or both. It would be possible to clear the areaand detonate the device later if that is a desired plan of action.

Given the varying parameters by which detonation can take place, thePseudo Tower may also be designed to deny service to any active andinactive phone within a given geographical area and pinpoint thelocation of said phones.

Satellite cell phone transmission presents a somewhat different problem.Since the transmission from phone to satellite to phone is communicatedto a number of satellites, becoming a replacement for the satellite willrequire cooperation from the provider. Via one or more specific codes,the satellites may be told that the vehicle mounted satellite simulator(i.e., Pseudo Tower) will be taking over the control of phones within acertain radius. Since this is a moving or ever changing circle, thereplacement “satellite” will have to continuously update the actualsatellite of its position and which phones are being released and whichphones are being controlled. Once this function has been implemented,the control of the suspect phones is similar to that of the cell phone.Determining the caller's position and the location of the detonationphone is as above.

FIG. 15 illustrates an embodiment of a Cell Phone Detection, Control andPosition Identification system (1500) in accordance with the principlesof the invention which comprises cell phone jammer (1501) system thatcovers at least one of the known frequency ranges assigned to cell phoneor mobile communication devices. In this embodiment to cover all theknown frequencies and also used to stimulate wireless communicationdevices, a Power Unit (1502) provides the necessary power to run all theunits within the Cell Phone Detection, Control and PositionIdentification system 1500, Satellite Cell Phone Interface 1503 operatesas an interface and communications unit between the Cell PhoneDetection, Control and Position Identification system 1500 and asatellite cell phone provider (not shown), a Cell Phone Ground Interfaceunit 1504, which includes base station technology for all communicationdevices operating within an area of interest. Also shown is an optional300-350 MHz Jammer unit (1505) that operates to jam communicationdevices that communicate through an intermediary device, such as dooropeners, Walkie-Talkies and the like. It is anticipated that the systemdescribed herein is to be modular and expandable to cover the entirefrequency spectrum in which transmission facilities (cell phones, mobilecommunications devices) operate. The Computer Command I/O, User Displayand Interface 1506, comprises a communication, command and controlsystem (C³) that manages communication, command and control of thedetection system 1500. Unit 1506 may further comprise one or moredatabases, and/or processes to execute the processing described, herein.Although not shown it would be appreciated that Command I/O unit 1506may be in communication, via a public or private network, to one or moredevices to provide information to or obtain information from remotesites (not shown).

FIG. 16 Illustrates a block diagram of an embodiment of a Cell Phone andWireless Transmission Detection Facility in accordance with theprinciples of the invention. In the illustrated embodiment 1600, antenna1602 is a multi-band directional array that operates to detect signalsin a low band and in a high band (835 and 1.85 GHz range, respectively),a two way radio band (465 MHz), a Wi-Fila Bluetooth band (2.5 GHz) andPAL (Personal Alarm Locator) band (950 MHz). In the illustratedembodiment, the antenna connects to two components, first to a detector(1603) and also to a decoder (1604). The detector 1603 and decoder 1604decodes the PAL Identification signal and may further decode biometricinformation, emergency information. In other embodiments, detector 1603and decoder 1604 are configured to decode cell phone identifications.Antenna 1602 provides detected signals to a 6 way input switch (1605).The output of switch 1605 is connected to a wideband RF amplifier(1606). Wideband RF amplifier 1606 represents a variable gain amplifierthat adjusts the detected signal amplitude based on the band in which adetected signal is detected by antenna 1602. In another aspect of theinvention switch 1605 may be connected to a block gain amplifier (notshown) to provide amplification of the detected signal and the amplifieddetected signal may then be provided to a corresponding RF filter basedon the frequency band of the detected frequency.

The wideband RF amplifier 1606 is connected to a Logarithmic amplifier1607 (i.e., log amp) that amplifies the received or detected signalusing a logarithmic function. Log amplifiers are well-known in the artto provide a larger amplification of a weak signal and a smalleramplification of a strong signal. The output of Log amplifier 1607 isprovided to an Operational amplifier (OpAmp) 1608. The OpAmp 1608amplifies the input signal and provides the amplified input signal to anA/D converter 1609 for conversion of the input analog signal to adigital signal. The converted (i.e., digital) signal is then provided toa FPGA (Field Programmable Gate Array) 1610 for subsequent processing.FPGA 1610 controls the operation of the illustrated Cell Phone andWireless Transmission Detection Facility 1600 through feedback signalsto switch 1605, for example. FPGA 1610 controls which signal frequencyband and signal frequency is evaluated in what sequence. In theillustrated embodiment, FPGA 1610 communicates with the other sensorsand/or access points via a communication interface 1612. In one aspectof the invention, communication interface 1612 may communicate with oneor more wireless communication devices that operate using well-knownIEEE wireless standard communication protocols (e.g., 802.15 and802.11). In another embodiment, the communication interface may operateas a transceiver (transmitter/receiver) that may interface with two-waywireless transmission devices such as Walkie-Talkie or cellulartelephone phones. The FPGA 1610 also interfaces with a microprocessor1613, e.g., a Zilog Z86, an Intel xx86 series, Motorola Power PC.Processor 1613 may assist in the decoding, and operation of the CellPhone and Wireless Transmission Detection Facility 1600. FPGA 1610 andthe microprocessor 1613 may be synchronized by a crystal clock 1614. Inother embodiments of the invention, the communications may be via acategory 5 network interface connection in conjunction to thecommunication Interface 1612. Although an FPGA is referred to andillustrated in the embodiment of the invention, it would be recognizedby those skilled in the art that the processing described by the FPGAmay also be performed in other specific processor processors (e.g.,ASIC) or in a general purpose processor which when loaded with andexecuting an applicable software module converts the general purposeprocessor into a special purpose processor. As would be recognized, thesystem shown in FIG. 16 is similar to those shown in FIGS. 10 and 11.

Returning to the embodiment of the Cell Phone Detection, Control, andPosition Identification system shown in FIG. 15, control of a wirelesscommunication device (i.e., transmission facility 202) may utilizejammers, and/or transmitter to either prevent the wireless communicationdevice to receive or transmit information (preventing the triggering ofthe device), additionally the jammer/transmitter may be used tostimulate the transmission device and force the transmission device tore-acquire the base station technology, Wi-Fi, and 3rd party (in thisexample, when the wireless communication device re-acquires the basestation technology, it will attach to our base station (Pseudo-tower).To ensure wireless communication device acquires our base stations asopposed to the network's base station, we provide greater signalstrength drawing the wireless communication device to our base station.To facilitate the manipulation of incoming calls, the base station inFIG. 15 is backhauled to the actual wireless communication provider.This will provide for the ability to intercept all incoming calls,identify who the calls are and triangulate where those calls areoriginating from. In this embodiment, it is anticipated the incomingcaller is in visual range as the detonation device. The signal detectionsensors are deployed to locate the triggering communication device, aswell the detonating device. Another method in this embodiment to acquirewireless communications is to raise the signal strength of the basestation, in which the target wireless communication device sees thegreater signal and automatically acquires the greater signal. The goalof this embodiment is to acquire, control, and obtain location and/or tostimulate a wireless communication device, which may be, in an active,non-transmitting, state or in a standby state, then to take control ofsaid device, and prevent the device from detonating the IED.Additionally, this embodiment is designed to jam all communicationsdevices in which control in not possible; an example would be the cardoor opener device. In a preferred embodiment, such as in 3G and 4Gtechnology, an example a UMTS communication device, where encryptionkeys are required to communicate with cellular devices and there is aninterest to control such devices, such as in a prison environment, andthe Communication Control unit is not connected, and/or not beingprovided the encryption keys to communicate with the devices, and thesystem is not looking to disrupt the Commercial Cellular network,providing a greater signal then the commercial carrier, on the samefrequency, signal and with or without the same scrambling codes (PilotInformation) as the commercial cellular network, the cellular devicewill attempt to communicate with the Communication Control unitemulating a UMTS radio (without encryption keys), the cellular devicewill determine it cannot communicate and then is forced to a 2Gprotocol, then the system, can capture the cellular device and controlit. One of the downsides to this technique, when the cellular device istrying to communicate with the Communication Control unit, the cellulardevice broadcasts its inability to communicate with the CommunicationControl unit, this signal is picked up by the Commercial Cellularnetwork and the commercial cellular network's Key Performance Indicators(KPI's) are degraded. To prevent this, in a preferred embodiment,jamming the uplink of the cellular device preventing the device fromcommunicating to the Commercial Cellular network and/or modifying theinstructing the cellular device's Maximum Allowed Uplink Transmit Powerto −50 dB and the Inter-frequency Neighbor Cell Maximum Allowed UplinkPower to −50 dB, will prevent the commercial cellular network fromreceiving the cellular devices signal and thus not distributing thecommercial cellular network's Key Performance Indicators (KPIs).

The embodiment shown in FIG. 15 utilizes a high level of signaldetection sensitivity to detect the presence of a wireless communicationdevice (transmission facility) within a known distance from thetransmission detection facility. In this embodiment, the application isinterested in two distinct communication devices; 1) the detonationdevice; 2) the trigger of the detention device. To take control of thedetonation device, understanding the communications of that device andthe communications device's access point is important. The controlsoftware is designed to first detect wireless communication devices inthe zone of interest, in this application (a roadside application) thesignal sensor provides a variable gain component with gain control over60 dB range with approximately −40 dB attenuation and +20 dB gain. (seeFIG. 16). This ability provides vary the sensitivity, depending on thetype of wireless communication detected, and provide a safe and adequatedistance from potential IED. The transmitter module also has a variablegain output to stimulate and jam different distances depending onspecific applications. Furthermore, the base station transceivertechnology provides viable gain to increase and/or decrease the captureradius as desired. Once the wireless communications devices within thearea of interest are captured by the base station, the systemconcentrates on the trigger wireless communication device. The samemethods as described above are used to detect and hone-in on thetriggering device. All sensors and transceivers have Omni- anddirectional-capability, which increases their versatility. As mentionedearlier, signal power is a critical component when dealing with wirelesstransmission devices, the communication protocol typically, by design,causes communication with the largest available signal source.Typically, this is the closest source (i.e., base station), in our case,we are interested in all wireless communications devices within the areaof interest to be controlled by our base station technology.

In accordance with one embodiment of the invention, the jammer units1501 may jam or interfere with one or more frequencies or frequencybands to force wireless communication device within a local area to losecontact with an available base station and/or access point and toreacquire a connection to a local base station cell tower and/or accesspoint. When the transmission facility (wireless communication device)initiates a process (referred to as hand-shake) to re-acquire acommunication link with the available local base station cell tower, thecommunication link is diverted to, and re-acquired by, the detectionsystem 1500 (which is referred to as a pseudo-base station) due to thegreater signal power of the pseudo-base station or taking the actualbase station and/or access point off-line. In another aspect of theinvention, the pseudo-base station power is raised so as to be greaterthan actual cell tower signal strength. The signal detection sensorsmonitor the signal strength of the actual cell tower output to thewireless communication devices and increases the transceiver output ofthe pseudo-base station to provide the adequate difference between theactual base station and the pseudo-base station to transfer the wirelesscommunication device from one base station to another. Thus, the cellphone, for example, will transition to the larger signal strength of thepseudo-base station and establish a communication with the pseudo basestation. In a further aspect of the invention, the pseudo-base stationmay actively poll the area for cell phone (transmission facilities), andtrigger the cell phones within an area of interest to cause the cellphones within the area to attach to the pseudo-base station.

In one aspect of the invention, where the application is to control thetransmission facility within a local area, and to prevent communicationsfrom reaching the transmission facility of interest, the pseudo-basestation may deny transmission of signals from the transmission facilityto an actual base station or deny transmission of signals from the basestation to the transmission facility. As mentioned earlier, in thelatter case, backhauling the pseudo-base station to the local carriernetwork will allow for the positive identification of the triggeringdevice, while still denying the ability to detonate the IED.

In an embodiment of the invention where it is important to identify andnot control the transmission facility within an area of interestproviding greater power, polling, control line request, interleavingexisting towers and/or jamming to force the transmission facility tocommunicate its identification parameters. In this embodiment of theinvention, gaining control of the cell phone (or wireless communicationdevice or transmission facility) within the area of interest allows thesystem to prevent incoming and/or outgoing communications. Thus, as thewireless communication device is re-acquiring a communication link withthe access point or base station, the wireless communication deviceprovides its identification information that positively identifies eachtransmission facility within the area of interest. This identificationinformation may be provided to the actual cell tower provider, whichuses this information to individually disable the cell phone(transmission facility) from receiving or transmitting data, voiceand/or communicating in any manner.

In an embodiment, the detection system 1000 (see FIG. 10) issynchronized with an access point, and/or base station technology. Thissynchronization allows the tracking and positive identification of eachtransmission facility within an area of interest. In this example, thetransmission facility of interest (a triggering device) may be connectedto or trying to communicate with another transmission facility, such asa cell phone or a land line phone.

In an embodiment, of the Cell Phone Detection, Control, and PositionIdentification System shown in FIG. 15, determines the identification ofan incoming caller based on information contained in the transmissionsignal and does not allow connection to the wireless network whiledetermining the location of the caller by triangulating the caller froma plurality of detected signals and tracks the caller thereafter. Inthis embodiment of the invention, the system shown in FIG. 15 disablesthe wireless device from receiving or transmitting signals from/to thewireless network and tracks the caller using the wireless device. TheCell Phone Detection, Control, and Position Identification Systemdescribed in FIG. 15 also has the capacity to track wirelesstransmission facilities from great distances, and in this application,the system is mobile, therefore, tracking the caller. In one aspect ofthe invention, where the cell phone or transmission facility informationis known, as determined through its communication with a pseudo-basestation, for example, additional information can be gathered, requestedand/or, extracted from the cell phone or transmission facility.Information such other transmission devices, cell phones, etc., thathave been contacted or which have data transferred may be gathered,requested and/or extracted.

In an embodiment where information redundancy and positive authorizationis important and positive identification is critical, the tools used ina school bus safety application egress point and school tracking systemhave direct applicability to positive identification of personnel andprison system automation, cost effectively tracking and monitoring lowerthreat classified inmates and staff and inmate safety. Safetyapplication and tracking systems are more fully disclosed in theaforementioned related patent applications, whose contents areincorporated by reference herein. In an embodiment Cell Phone Detection,Control, and Position Identification System, the tools and applicationdescribed may include facial and voice recognition, retina scantechnology, card swipe, fingerprint analysis, in preventing escapes andmisidentification within a prison environment. Classification of aninmate is a key component to safety within a correctional environment.

In an embodiment where positive identification of the transmissionfacility 202 and positive identification of the user of the transmissionfacility 202 is important, as discussed earlier hand-held detectionunits 408 detector decoding module (and or chipset) or a hand-helddetection units 408 in sync with the pseudo-base station/wireless accesspoint module provides the location and the identification of thetransmission facility 202 or in this case, for example a cell phone or a802.xx (e.g., 802.11a/b/g/n, 802.15) communication device. Incorrections facilities, outside areas of the facility, for example,represent a large area and the like. For example, like Angola stateprison, where inmates and visitors and staff work a close-circuittelevision (CCTV) in synchronization with, or in communication, with thehand-held detection units 408 allows the CCTV to focus on the user ofthe cell phone. The CCTV system feeds images to the facial recognitionsoftware and a database of all known personal and/or inmates, to find amatch and/or create an entry of new found cell phone and their owner'sand/or user's identity. In the case of a prison application, building adatabase of know criminals. their associate and biometric information,including facial recognition, for data mining purposes is critical. Anexample, is where inmates are passing contraband and using cell phone tocoordinate their efforts. Where positive identification of thetransmission facility 202 and positive identification of the user of thetransmission facility 202 is important, utilizing cell phoneidentification, location tracking and positive identify of the criminalsinvolved is crucial to preventing and stopping their criminalenterprise.

In another embodiment and application where positive identification ofthe transmission facility 202 and positive identification of the user ofthe transmission facility 202 is important, as discussed earlier thehand-held detection units 408 detector/decoding module (and or chipset)or a hand-held detection units 408 in sync with the Pseudo-basestation/wireless access point module provides the location, in schoolsafety where a student's location and a perpetrator who preys on schoolstudents, the tagging of visitors, student and employees is critical. Inthis application, CCTV and facial recognition, for data mining purposesof student, facility visitors (wanted or unwanted) is critical. Inanother embodiment, a biometric detection device is deployed topositively identify people. This device may include several devices todetermine unique characteristics of a person, fingerprint, IRIS scan,and DNA detection. These biometric system are built to detect passively,the fingerprint detection device can be built into door handles in largebuilding and other egress points. The DNA detector can be deployed inturnstile doors and egress points pressured air and vacuum systems canfunnel the biometric identifiers to the DNA a receptors for analysis.Each embodiment of the biometric applications will be outlined in detailfor implementation.

In embodiments, a method of detecting, identifying and tracking themovements of a specific transmission facility 202 in standby requiresprovoking and/or requiring the transmission facility to transmit asignal and to detect its unique identification. As discussed andexplained previously, a hand-held detection units 408 with an integratedidentification detector/decoding module (and or identification chipsetmodule) and/or a hand-held detection units 408 which functions inconjunction base station and/or wireless access point technology,blocking and/or jamming technique in concert of the identificationfunction provides the tools to detect the transmission facility, trackits location, and to detect its unique identification. Tracking alltransmission facilities and making positive identification of allcommunications. Utilizing and utilizing CORI and SORI databases of knownperpetrator of students to detect when a threat is near, around or in aschool facility is critical to school safety.

In the embodiment of FIG. 15, an interface with existing communicationdevices, such as a wireless cell phone provider or Wi-Fi accessprovider, may be provided. The interface which will allow and/or denycontrol is executed by the wireless provider.

In the embodiment of FIG. 15 the detector units (not shown) may includean antenna and a controlling unit, where matching the transmissionfacilities 202 with its unique identifier is critical for properidentification, tracking and control in this configuration, the detectorunits may individually control or may direct control over thetransmission facilities 202.

FIG. 17 illustrates an embodiment, where it is the intention to run anautomated prison to lower the necessary number of personnel and stillthe run a safe and secure facility.

In this embodiment, where there is limited, corrections personnel, allcells will be designed to allow outdoor access and unit access.

In this embodiment, for medical reasons all inmates will wear twotransmission detection sensors.

In this embodiment, the wireless communication of the sensors will alsocarry education information and data to each of the inmate cells.

In this embodiment where inmate programs, services, commissary, inmatephones, medicine distribution, vending machines, GED education, needs tobe inmate specific, positive identification is a critical must.

In other embodiment, the transmission facility is a cell phone, PDA or aWi-Fi appliance, the education display system is an interactive displayscreen in a school telling the school supervisors that one or morestudents or personnel needs to turn off his cell phone, or a hospitaladvising a specific visitor by name, that cell phone even in standby maycause harm the medical devices being used to treat patients or thetransmission facility provides information to the transmission facilitydetector of a unique identifier of the transmission facility via aninteractive screen on the road side to tell a user to slow down as he isspeeding. These are just examples of uses of the system illustrated. Inaddition, the system illustrated may be connected to any data miningdatabase (not shown) to provide customized information to anytransmission facility and specific information to a uniquely identifiedtransmission facility.

In an embodiment where the classification of inmates is such where manyinmates can co-exist in an inside and outside (minimum security,non-violent, criminals and the like) the use of CCTV, facial recognitionand laser microphone, and inmate tracking and a database driven set ofrules and parameters, coupled with the combine technologies mentionedthis application provides the solutions to reduce the number ofemployees while maintaining a high level of safety and security.

In another embodiment, positive identification is critical to publicsafety within a correctional environment, understanding an inmate'srelationship with other inmates, staff and their prior acts, impacts thesafety and security of the institution. Outside a correctional facility,authenticated positive identification and the system's ability to crossreference that person's positive identification through fingerprints,facial and voice recognition, retina scan technology, and DNA with hispersonal data and data set, identify his family, his friends. Hisacquaintances, associations, and their relationship to criminal act andthe ability cross reference the subject's information with criminalrecords, prior bad acts, and local unsolved crimes, place of residence,place of work, habits, trends, and mode of operations, court records,and prior incidents. When investigating a crime, a subject's favoritebar, hangouts, friends, relatives, associations, travel patterns, homeaddress, places where they spend money, work address, family and friend,home address and work address and the like, become critical toinvestigate whether they are involved with or have committed a crime. Inone embodiment of the wireless transmission tracking and identificationsystem, the data key will be the unique identifier of the known personand all transmission facilities associated with that person will bemined and tied to that person. In an analysis, data key is determiningpositive identification of the transmission facility and positiveidentification of the person carrying the transmission facility. Thedata key is the unique identifier when a known person of interest isidentified. In an embodiment an overlay of all criminal activity withinan area, all known locations of all known, criminals and criminalassociates, is overlaid with all transmission facilities, within thearea and crossed reference with time and location looking for matchesand time and location intersection points. All objects entering and/orleaving the area in the time of interest will be identified andcataloged in reference to the incident.

In a preferred embodiment of the invention, the program develops theflow of how the data is compiled and dissected, the DNA is sorted, thesuspects' DNA is compared to the crime scene and know all of the partialmatches, determining who their relatives are the program uses all thedata and cross references of all people in the area and drills down onall people at the scene within a prescribed window of time; the programsearches their phone records to determine who they have called, texted,then checks their criminal records, and their associates criminalrecords. The programs categorizes their criminal behavior learnsbehavior and patterns of like incidents. The program gathers from thedevices and sensors identification information on victim, witnesses andsuspects, their voice, facial, fingerprints, wireless communication. Theprogram drills down for database matches, Identifies all parties presentand identifies all wireless communications, DNA, video, voiceidentification from crime scene and the like. The program correlates theidentity of the victim, the perpetrator(s), and co-perpetrators, toidentify co-victims, identify witnesses and cross references forpositive identification of all parties present. The tracking of thecellular devices and the overlay of the incident are tied together on atimeline by the program. If positive, identification of perpetrator(s)may be sufficient to make an arrest. If lack of information onparticipants remains, the program expands time around criminal act untilinformation is more useful. The program reverse tracks the movements ofthe victim(s) and looks for intersection section with perpetrator(s).The program expands the search prior and post of the incident includingall wireless communications movement and movement in and around thatarea, cars pedestrians each time cross-referencing the relationship ofvictim, witnesses and potential perpetrators. The program exams eachvictim, parses all known data on said victim, criminal records, place ofwork, relationship to perpetrator (phone calls, common address, commonacquaintances, hangouts). The iterative process program cross referencesdatasets of causal connections, relationships to the relationship of theperpetrator. Using the DNA records of all known criminals, the programsthen looks at the relatives of suspects and the like, until a crossreference of the victim, and the suspects can be positively identified.

In another embodiment and application where positive identification ofthe transmission facility 202 and positive identification of the usersof the transmission facility 202 is important, in school safety where ofall students' locations and a perpetrator who preys on school students,the tagging of visitors, (see wristband technology) student, thevisitors and their employees is critical. In this application, digitalcamera, CCTV facial and voice recognition, provides for a positiveidentification of all wears and users of wireless communication and thelike. Verifying all people and all movement being tracked is the firststep, verifying that all people who are being tracked are positivelybeing identified; verifying all positively identified people are not adanger to the students. In this embodiment full motion/motion activatedcameras with voice and facial recognition software and a database of allknown persons capability. Where tracking cameras have full coverage ofall school and/or area of concern, when movement is detected, CCTV unitsverifies identity, sensors identify transmission facilities database anddata mining verifies information and the like. As an example when aperson triggers a camera identification trap, the following occurs; 1)the signal detection sensors monitor and the system stimulate allwireless communications for unique identifiers; 2) if wristband/IDmatches facial recognition software and a database of all known personsdatabase (positive facial recognition and positive tracking intact; 3)if no wristband, is wireless communication present; a) if yes, doeswireless communication and facial recognition match; b) if yes, whendatabase lookup, of person equal danger; c) if yes, or unknown, soundalarm; d) if no, communicate via wireless communication device andrequest they return to front office to receive badge.

The embodiment includes an allowance unit which determines who isallowed within the facility and/or area and who is suspect and who is aknown danger. Tracking all transmission facilities and making positiveidentification of all communications and the holder of thosecommunication devices. Once positive identification is obtained, datamining may include, RMV, NCIC, W3, CORI and SORI, student databases,historical student and visitor databases and the like.

In embodiments, a method of detecting, identifying and tracking themovements of a specific transmission facility 202 in standby requiresprovoking and/or requiring the transmission facility to transmit asignal and to detect and identify its unique identification. Asdiscussed and explained earlier, a hand-held detection units 408 with anintegrated identification detector/decoding module (and oridentification chipset module) and/or a hand-held detection units 408which functions in conjunction base station and/or wireless access pointtechnology, in which the base station unit (and or pseudo-base station)increases and/or decreases its output power to provoke a wirelesstransmission to acquire and/or re-acquire a new base station, during thehandshake the unique identifier of the wireless communication can beintercepted and/or read/obtained. In other embodiments blocking and/orjamming a wireless communications signal with an access point/basestation and/or tower, forces the wireless communication device toacquire and/or reacquire a base station and/or access point. In aroadside bomb embodiment, calculating the actual tower's power, thenincreasing the pseudo-base station's signal power to a X factor greaterthan the actual tower will manipulate the cell phone to reacquire thedetection systems pseudo-base station. At the same time increasing thejamming signal to an a X factor greater than the actual tower, willforce the cell phone off line and will cause the cell phone to triggerthe IED, if the IED is set to explode when jamming is occurred, then ifthe phone is a connection to triggered IED, allowing the cell phone toacquire the pseudo-base station whose signal power has been increases toa X factor greater than the actual tower's provides for a capture of thetriggering cell phone and an ability to go after the trigger man asdescribed in this application. Other methods include the base stationrequesting the wireless transmission facility to reacquire and provide ahandshake methodology or a control line request, or a stimulatingsignal, having at least one similar characteristic of the network basestation, which requires a wireless communication device in standby toacquire/re-acquire an access point and/or base station. This methodologyin concert of the identification function provides the tools to detectthe transmission facility, track its location, and to detect its uniqueidentification. As discussed above the detector units may include anantenna(s) 104 and a controlling unit, that are externally integratedwith the transmission detection, controlling, identification, andreporting system 1500, where matching the transmission facilities 202with its unique identifier is critical for proper identification,tracking and location matching of the transmission facility 202 uniqueidentifier with the proper transmission facility 202 maybe accomplishedthrough the time of signal arrival, phone type, transmission frequency,time division separation, time sync, channel frequency, cell toweridentifier, (cell phone) transmission facility identifier or acombination of one or more methodologies depending on complexity andtransmission facility 202 environment and the like. In an embodiment inwhich the unique identifier is encoded the tracking principle works thesame, each unique identifier whether encode or decoded will be tracked.

In an earlier application, we described methods to positively identifyand track and control cell phones and other transmission facilities, itis also known in the art how to utilize voice and facial recognitiontechnology. Here we will describe methodologies to positively identifyand track people and their vehicles through their transmissionfacilities. In an embodiment, each time a transmission is located, itsposition, and identification will be confirmed. As in a prison facility,each location of the transmission facility will be monitored by a CCTVcamera and this information and data will be stored, each digital framewill be analyzed to determine whether positive identification can bedetermined. All data will be stored in a depositary where the key to thedata set is the transmission facility unique identifier. The personand/or vehicle associated with the transmission facility uniqueidentifier will be cross referenced by disparate database, for exampleDepartment of Motor Vehicles (DMV) records and Criminal History RecordSystem (CHRS), transmission facility purchasing information records(most stores in which disposable cell phones are purchased have cameras)and the like.

In an embodiment, at each egress point of the facility, distinct areaswithin a facility, for example, a prison, or a bank, each transmissionfacility is identified and each egress point has CCTV and facialrecognition and if located, its position, and its identification will beconfirmed. A set of processes are developed to determine the positiveidentification of the carrier of the transmission facility and link thewireless transmission to the person's identification. In an embodimentto properly identify all people carrying the tracked wirelesscommunications, the use of facial recognition, voice recognition,biometric detection, is deployed to positively identify the personsand/or person carrying the wireless communications. In an embodiment thecamera system focuses on all faces and provides a positive facialrecognition, wherein the information is cataloged with the wirelesstransmission information. In an embodiment the camera identificationsystem can be one of many types, for example digital, pan and tilt, w/180 degree focus and the like.

In an embodiment, to combat high crime districts, curb gang violence, acell phone (wireless transmission) detection, location and trackingsystem can be deployed throughout a large city. Each wireless device canbe stimulated and tracked throughout the city. This information can beoverlaid with criminal history records, Department of Motor Vehicles,parole and probation information, including where each known person ofinterest lives and works, where their associates live and work, and anoverlay of all current and previous crime activity. In anotherembodiment the camera system identifies all not moving objects withinits coverage area and catalogs the area identifying all fixed objects;the camera is equipped with several tools; laser finder, a microphone,motion detection software and infra-red analysis capability. The laserfinder assists the camera system to positively identify height, widthand depth of objects. Any movement entering/exiting or moving throughthe space is cataloged. Color, shape, size, temperature, parameters aresetup within the system to detect nuisances within the object todetermine unique identifiers. For example, a car identified isclassified as a light blue 1997 Cadillac; however this Cadillac has abroken light on the left back fender. The system is loaded with allknown product specifications to be used as reference material. Thesystem also classifies and categories unknown objects.

In an embodiment of the invention, the system determines andcross-references all possible intersections of known persons ofinterest, their propensity to commit criminal act, their motives andhabits, to known criminal acts, parole data, probation data, DNA crossreference matching, to known movement of all wireless communication andtheir movements. Through this embodiment, the system can determine whatcriminal acts have been committed upon whom, the movements of theparties to the criminal act prior to the act, movements after the act,other player, witness, their movement and transmissions. The programanalysis the biometric data and the data is correlated with time,cameras, egress points, correlates passing and suspect cars, GPS w/phone information, WIFI Database correlation, wireless information, andother known transmission facility, such as on star communications andthe like.

In the embodiment of FIG. 15, an interface with existing communicationdevices, such as a wireless cell phone provider or WI-FI accessprovider, may be provided. The interface which is in communication withthe 3^(rd) party or other communication devices will provide the correctinformation (unique identifier) to the access provider which controland/or is connected to the transmission facility and will then allowand/or deny access to and/or prevent communication with the wirelessprovider or third party triggering device. According, the embodimentsshown may also include an interface to the third party controlling unit.For example, the system shown in FIG. 15 may include a system interfacewith a commercial satellite cell phone provider and control of the cellphones passed between the carrier and the transmission detection,identification, control and reporting system.

In the embodiment, of FIG. 15 in a situation where there is a largenumber of transmission facilities 202 (in this example, cell phones) ona congested highway being able to find all the transmission facility(s)and their accurate location is critical.

Knowing the frequency and time of the transmission facility 202transmissions provides the ability to tighten the bandwidth of thedetection sensors, which increases sensitivity, and thus providesgreater distance of detection. It also provides an intercept, in timeand frequency providing for faster processing of signals.

In an embodiment, in a corrections complex, such as Angola State Prison,or a arbitrarily defined area where transmission facilities 202 areprohibited except for authorized transmission devices, the transmissiondetection, controlling, identification, and reporting system 100 whetherinternal or external to the facility may control, identify and prohibittransmissions from transmission facility 202 depending on the locationor approximate location of the transmission facility 202. There are avariety of methods that may be employed in the determination of thelocation of a transmission facility 202. Methods include (i) acell-sector system that collects information pertaining to cell andsector ID's, (ii) the assisted-global positioning satellite (GPS)technology utilizing a GPS chipset in a mobile communication facility,(iii) standard GPS technology, (iv) enhanced-observed time differencetechnology utilizing software residing on a server that uses signaltransmission of time differences received by geographically dispersedradio receivers to pinpoint a user's location, (v) time difference ofarrival, (vi) time of arrival, (vii) angle of arrival, (viii)triangulation of cellular signals, (ix) location based on proximity toknown locations (including locations of other radio-transmitters), (x)map-based location, or any combination of any of the foregoing, as wellas other location facilities known to those of skill in the art. In oneaspect of the invention, the location may be determined using a methodof non-iterative linear equations.

In an embodiment of the transmission detection, controlling,identification, and reporting system 1500 whether to control thetransmission facility 202, may be determined by location of thetransmission facility 202, type of transmission facility 202,identification of transmission facility 202, time of transmission of thetransmission facility 202, frequency of the transmission facility 202,based on type of base station technology and/or location of base stationtechnology and the like.

In an embodiment of the transmission detection, controlling,identification, and reporting system 1500 where the system is insynchronization with base station technology and techniques correlatethe wireless signals, wherein the unique identifier is supplied by thebase station when the transmission facility is stimulated by the jammerand/or base stations unit. Then the transmission facility is tracked andits interest is related to its location to the road, other variablesinclude whether it is alone or it is in the hands of an individual andthe like. The unique identifier is provided by the signal detectionsensor or the base station unit and is used in synchronization with thebase station identification and the location of the transmissionfacility. Another method to triangulate the location of the transmissionfacility utilizing with the assistance of the base station and/orsatellite base station is to have the tower request the cell phoneand/or cell phones of interest to re-acquire the tower, or increase itspower. Here the tower knows it unique identifier and has required thephone to retransmit to triangulate the location of the wirelesscommunication device. This method is also valuable in situations wherethe tower may have only an approximate location of the wirelesstransmission facility, but not an exact, or in such situations, such asin a building or an obstruction rich environment. Requesting the basestation and/or access point to request the transmission facility totransmit a signal which can then be triangulated with the signaldetection sensors improves the location determination.

In an embodiment of FIG. 15, the transmission detection, controlling,identification, and reporting system 1500 may also transmit the type,time, frequency of the wireless transmission facility of interest to abase station. The base station may then provide the system with theunique identifier of the detected transmission facility or the basestation may detect a transmission facility at a specific frequency andthe transmission detection, controlling, identification, and reportingsystem 100 tunes to that frequency to determine the location and uniqueidentifying information of the transmission device. The system 100 maythen compare the unique identifying information to a data base (notshown), the information and the parameters obtained from the data basemay then be used decide how to treat the transmission facility; what todo with the transmission facility depending on where the transmissionfacility is considered friend or foe (i.e., allowed or disallowed).

In an embodiment of the transmission detection, controlling,identification, and reporting system 1500 where the transmissiondetection units includes a transmission decoding unit the systemdetermines the location and the allowability of the transmission unit bycomparing the transmission found with allowable or non-allowabletransmission facility lists.

In an embodiment shown in FIG. 15 of the transmission detection,controlling, identification, and reporting system 1500, the base stationindicates there is a transmission facility within the area covered bythe transmission detection, controlling, identification, and reportingsystem 1500. The base station provides at least one unique identifier tothe transmission detection, controlling, identification, and reportingsystem 1500. For example, the base station may provide at least one of:a frequency, a type of transmission facility, a time of arrival (TOA),an IMEI and other similar identifiers (e.g., encoded IMEI). Thetransmission detection, controlling, identification, and reportingsystem 1500 determines the location of the transmission facility,depending on the provided parameters, directs the base station and/orrecorder, jammer, CCTV to perform a set of actions. Some of the actionsto be performed are jam the signal specific to the cell phone, denyservice (Denial of Service (DoS)) to the cell phone, allow the continuedreceiving and allow transmission of the detected transmission, recordthe content of the transmission, provide an indication that thetransmission is allowable. In addition, the provided parameters maychange depending on location, and other variables depending onapplication parameter and the like.

In an embodiment shown in FIG. 15 of the transmission detection,controlling, identification, and reporting system 1500 where detectionsystem is separate from the discriminator unit, the discriminator unitmay also include the controlling unit (base station technology and thelike). In this case, when a unique set characteristics (parameters) arereceived by the detecting unit, and/or system 1500, which then providesinformation to the discriminator unit and/or controlling unit, whichthen passes back the correlated transmission facilities (the controllingunit, software radio, and the like) this information is processed. Forexample, a cell phone on the side of the road, with a person talking onit may not need to be disabled, in contrast to a cell phone in standbylocated within a zone of danger (60 meters of the road) may need to becontrolled and disabled.

In an embodiment, the system 1500 will allow an authorized transmissionfacility to continue and/or provide the ability for the wirelesstransmission, (i.e., to talk and/or to receive calls) depending on theconfiguration and application. In an embodiment of the transmissiondetection, controlling, identification, and reporting system 1500 wheredetection system is separate from the discriminator unit, in this casethe discriminator unit may also the controlling unit (base stationtechnology and the like,) the system 1500 may further provideinstruction to the controlling unit to allow or disallow transmissionfacilities, determined by their location.

In an embodiment of the transmission detection, controlling,identification, and reporting system 1500 the system compares theobtained information and depending on whether the detected transmissionfacility is determined to be a potential danger, the system may take theincoming transmission facility and determine its position prior todisallowing further transmission. This process is accomplished byknowing an identification of the transmission facility and using theinformation obtained by the controlling facility (frequency, time, type,channel, etc.) and searching for the incoming call signal. For example,in an improvised explosive detection (IED) situation, finding thetrigger man may require the detection, identification and locationdetermination in real-time. The array antennas will utilize large frontend gain for the greatest distance. As discussed previously, jamming thearea, to gain control of the transmission facility is one method ofcapturing the transmission facility. The ability exists to then trackthe trigger man from his current location and where he goes forinvestigative reasons.

In an embodiment shown in FIG. 15 of the transmission detection,controlling, identification, and reporting system 1500 wheretransmission facility retrieved data may be used to locate threats topersonnel, and/or prevent an escape. Recovered transmission facilitydata may be used to track co-conspirators location and/or identify anunauthorized transmission facility.

In an embodiment where tracking and identifying a wireless communicationdevice(s) in an environment where many wireless communication devicesare present, such as a conference center and/or city street environment,some in conversation, some in-standby, some in the process of beingturned-on, some in the process of being turned off, the ability todetect and positively identify the movement of a non-transmittingtransmission facility in an orderly fashion becomes difficult. Cellphones, for example, in standby, the rate in which wirelesscommunication re-communicates varies, e.g., 10 sec to minutes. In somecases, they passively listen and do not transmit in-standby at all.

In an embodiment, where the interest is to detect, locate and identifycell phones in standby, every 10 seconds, a prescribed interval ofpositively identifying and tracking is required, setting the transceivercommunication period, for each wireless transmissions in a denseenvironment is important. There are several methodologies by which tomake a cell phone in-standby to transmit its unique identifier, forexample, triggered by the base station as described earlier in thisapplication. A second methodology is to block the transmission and havethe cell phone re-acquire the tower. A third method is to transmit asignal to induce the cell phone to reacquire the tower, switchfrequencies channels, or if the cell phone loses communications it willautomatically look for a connection. Orr if the wireless communicationdevice detects a larger power-ed tower signal, the cell phone willconnect to the perceived closer signal. Each one of these methods willforce a cell phone in standby to re-connect with the tower.

In this embodiment, we will discuss, a methodology to provide for theorderly transmission identification, location and tracking of a set ofwireless transmissions. In this example the wireless transmissionfacility, will be the tracking of a set of cell phones in a denselypopulated area. The phones will be stimulated/manipulated to providetheir unique identifier, their response will be determined by theirlocation within the coverage area, their phone type and theirtransceiver channel, the signal strength of the transceiver, modifyingthe transceiver phone type, transceiver frequency ban, modifying theirtransmission band, modifying their transceiver channel, for example, ifthe coverage area contains 5000 phones to be tracked, stimulating 1/16thor 22.5 degrees (see FIG. 19B) of the designated area, of a particulartype and then multiplexing the transmission transceiver channel, in thisexample, channels 1-24 in a specific order. The first detection of thefirst slice and channel will result in detecting identifying a singlephone type of a known number of cell phones. In this embodiment, thedevelopment of a methodology to determine which stimulating pattern,channel pattern, type and repetition rate will provide the best coverageof movement given the density of wireless transmission devices, versusthe number of sensor within the coverage area, their variablesensitivity, and transceiver strength is discussed. As discussedearlier, in an embodiment in which, roaming base station technology isused to stimulate the cell phone, the power strength ratio of the Telco(network) tower versus the power strength of the pseudo-base station,will determine the range and depth of the area coverage by which thenumber of phone recycled is determined. Adding a backhaul capability asdiscussed earlier, will provide a greater manipulation of the cellphone.

In an embodiment where tracking and identifying a wireless communicationdevice(s) which utilizes, for example, multiplexing technology such asfor example, Code division multiple access (CDMA) phones, which is achannel access method utilized by various radio communicationtechnologies. One of the basic concepts in data communication is theidea of allowing several transmitters to send information simultaneouslyover a single communication channel. This allows several users to sharea bandwidth of different frequencies. This concept is calledmultiplexing. CDMA employs spread-spectrum technology and a specialcoding scheme (where each transmitter is assigned a code) to allowmultiple users to be multiplexed over a same physical channel. In anenvironment where there are several wireless communication devicesco-exist which utilize multiplexing and/or spread spectrum transmissiontechnology, to get an accurate location, as discussed in earlierapplications, an embodiment utilizes a directional transmission facilitywhich provides a specific transmission to stimulate a wirelesscommunication device, causing the wireless communication device tocommunicate with the access point. In this case a receiving and/ortransceiver unit attempts a handshake communication. The wirelesscommunication device, such as a cell phone, provides a unique identifierto the access point, in this case a base station transceiver. In anenvironment where many wireless communication devices are present, suchas a conference center, where many cell phones and/or transmissionfacilities co-exist, the ability to distinguish one CDMA phone fromanother becomes a challenge, depending on the transmission mode of theCDMA signal. Some of the unique identifier are distinguishing TOAmethod, signal pattern distinction, phase prediction method.

In an embodiment in which the TOA method is deployed to determine thelocation of a set of transmission facilities, as discussed previously,we discussed the ability to determine the exact location of thetransmission by detecting the TOA (time of arrival) of the initialsignal from the transmission facility (in nanoseconds). In the case ofdetecting multiple CDMA spread spectrum transmission devices, inhandshake acquisition, each CDMA wave form is categorized by detectingthe actual time of arrival of each transmission facility within theinterweaving of other spread spectrum transmissions. The transmissionsare distinguished by the TOA raise time differential coupled with theamplitude change of the signal strength. Additionally, where thepredictability of a new TOA is determined, validation of the TOA isconfirmed. These characteristics are coupled with the predicted locationof the transmission facility, amplitude of the signal, unique identifierof the wireless transmissions, phase and angle of the signal and thelike. Additionally, utilizing, directional antennas with griddingpattern and a variable transmission signal to predict and determine thearea of response coupled with the unique identifier with TOA methodprovide for complete and accurate tracking and location of CDMA phonesin standby.

In an embodiment, a transmission from a transmission facility provides aunique identifier which activates a function in an action facility suchas a display, specifically targeted to the unique identifier, it mayprovide information and the like, or an indicator the wirelesstransmission facilities are prohibited within a certain area or whiledriving or information about the location where the wirelesstransmission facility is currently located and/or danger (display unit).The database is developed to focus information associated with theunique identifier, to meet the mission of the display.

FIG. 17 illustrates an embodiment, where it is the intention to run anautomated prison to lower the necessary number of personnel and stillrun a safe and secure facility. This automated facility is controlled bya centralized command and control center and/or a decentralizecompartmental command and control center for all functions of thefacility including movement of the persons within the facility. In thistype of a facility, where complete and accurate identification andlocation of all personnel is critical, the tracking of individuals,their wireless transmission devices, cell phones, identification units,Walkie-Talkies, and verifying their access to authorized areas,integrating their movement with CCTV and positive facial identification,biometric identification, preventing movement into unauthorized area,developing inclusion zones, creating exclusion zones, ensuring propercount, providing an ability to restrict and/or authorized movement aspecific design of the facility and convergence of technology isessential. The technologies discussed herein integrated to the centralcontrol provide the backbone and framework to operate such an automatedfacility, wherein each staff member and inmate transmission facilitywill allow specific movement throughout the facility. All movementthroughout the facility may be monitored through CCTV and facialrecognition. At each egress point, movement will be restricted toindividual movement through one area to another area of the facility.For example, daily functions include, meals, medical, programs, courtvisits, and recreation, may be functions that may be monitored andcontrolled. As an example of the facility of the needs within theautomation and the parameters and rules; Inmate Movement: need acreation of a Movement list and movement schedule, scheduling resources,allocation seating in particular, program area classrooms, access tocomputers, access to the Law library, time allocation in program and usefacility assets, enemy exclusion, (predator sheep-wolf exclusion)conflicts in scheduling GED, adult education, culinary arts, angermanagement developing waiting list, ability for inmates to signup,morning schedule and movement, afternoon schedule and movement,Pre-trial and religious services scheduling. Data mining databasetechniques and methodologies may be executed to provide for inmatescheduling movement and allocation of assets for the inmate relying ontransmission facility authorization. The transmission facility willcontrol access to all movement, asset resources, doors and egress,facility recourses and the time allocation on facility assets and inwhich movement takes place. Because of minimum human interaction,display kiosks displays schedule and informs the inmate where it isscheduled. The facility structure, may need to be modified to allowinmate access to the outdoor area, this design modification eliminatesthe need for outside movement and still provides greater freedom for theinmates with less need for direct supervision. Each sensor will monitorbiometric signs including heart rate, temperature, and the like. Withtwo wristbands, echo cardiogram can be generated with provide for healthmonitoring and for positive identification. The Cell Phone Detection,Control and Position Identification system 1500 (FIG. 15) will include adetector and decoder for all transmission facilities, which will providepositive identification for all transmission facilities, including cellphone and other hand held communication devices, and the specificindividual in position of the transmission facility. All CCTV units willintegrate with facial recognition software, all egress points willrequire biometric checks, such as fingerprint and renal eye scandevices, and this combined with the transmission facility positiveidentification. The design of the facility is important to provideadequate exercise movement and limited interaction with staff and otherinmates. Therefore a redesign of the facility, to provide services suchas decentralized education is important.

In this embodiment, the wireless communication of the sensors (see FIG.10 and FIG. 16) will also carry education information and data to eachof the inmate cells. Each inmate is equipped with a wireless tablet totake interactive education. In FIG. 10 the 802.15.4 will provide a dualrole of sensor sync and education communication. In embodiment of afully automated wireless communications and personnel and assettracking, the communication to the sensors will be transmitted via cat 5cables, which will be placed to communicate with the microprocessor andthe 802.11. In this configuration the 802.11 will carry the interactiveeducation and monitoring capability. The microprocessor in thatconfiguration will act as a throughput conduit to isolate high-speedinteractive communications between the cat 5 and the 802.11. In thisconfiguration, audio and video, live interaction is capable to performparole hearings, live interactive education, video visitations, suicidewatch, video attorney visits and video court appearances. In thisconfiguration a video server and interactive video switching system willbe deployed to handle the interactive communication. As earlierdescribed, the ideal location of sensors maybe the water chases toprevent tampering. This also provides the opportunity to have wirelesscommunication with education units within the cells. This wirelesscommunication also provides the ability to as wireless surveillancedevices such as cell monitoring into the mix.

In this embodiment where inmate programs, services, commissary, inmatephones, medicine distribution, vending machines, GED education, needs tobe inmate specific, positive identification is a critical must. Toensure this outcome, the positive identification of each transmissionfacility is paramount. An example of this embodiment, when an inmateapproaches an education display system, the unique identifier of theinmate's transmission facility, provides information to the transmissionfacility detector of the unique identifier of the transmission facility.A database controls and provides all the applicable information toprovide the correct information for each transmission facility. In thiscase, the transmission facility is a wristband ID bracelet.

In other embodiments, the wireless transmission facility such as a cellphone, PDA or a WI-FI appliance, can trigger an action, for customizedactions, positive identification and unique identifier is established.One embodiment is when an inmate's wristband comes in proximity to theinteractive education display system within his cell, it positivelyidentifies him/her and logs the inmate into the system; this isaccomplished via short range communications via the 802.xx technology inthe wrist band and the education device. In another embodiment theinteraction is callused by the RFID chip (active, passive and/orsemi-active). In a school environment, when wireless communicationdevice is detected, positive identification is established and thesystem transmits an action for the interactive display screen in aschool informing the school supervisors that one or more students orpersonnel needs to turn off his cell phone. The action facility, firstenables the allowability database and verifies the transmission facilityis not authorized and/or the wireless communication device is in anunauthorized area or a hospital advising a specific visitor by name,that a cell phone, even in standby, may cause harm to the medicaldevices being used to treat patients or the transmission facilityprovides information to the transmission facility detector of a uniqueidentifier of the transmission facility via an interactive screen on theroad side to tell a user to slow down as he is speeding or informing thedriver he is not allowed to use a cell phone or wireless communicationdevise while driving. In this embodiment, utilizing femto/Pico and/ortransceiver technology action facilities is necessary to intersect anddetect transmissions from the wireless device. These are just examplesof uses of the system illustrated.

In an embodiment, where there is a large number of transmissionfacilities 202 (in this example, many cell phones) on a congestedhighway being able to find all the transmission facility(s) and theiraccurate location is critical. In addition being able to continuouslytrack and positively identify each transmission is also critical whereincontrolling a significant number of transmission facilities (cellphones) may be necessary. Therefore specific techniques need to bedeveloped to regulate the frequency band the wireless devices occupy,when and in what order they are processed, the rate and the density andrate in which they are monitored. Techniques discussed earlier describehow to have a cell phone provide their identification. Here we willdiscuss some of the techniques to regulate the detection, frequency,volume and period of those transmissions.

Knowing the frequency and time of the transmission facility 202transmissions provides the ability to tighten the bandwidth of thedetection sensors, which increases sensitivity, and thus providesgreater distance of detection. It also provides an intercept, in timeand frequency, providing for faster processing of signals. One techniqueis for the transmission detection sensor to tell the base station and/orenabling technology when to transmit and also indicate the desiredresponse frequency and/or channel. Another methodology is to regulateand/or schedule the transmission time of the base station(s) and/orenabling technologies within geographical areas and set parameter on thedirection, radiation pattern, zone, and strength of the signal beingtransmitted to enable/regulate a number of transmission facility(s)contacted and/or regulating the number of responding transmissionfacilities.

FIG. 18 illustrates a system 1800 for implementing the principles of theinvention shown herein. In this exemplary system embodiment 1800, inputdata is received from sources 1801 over network 1850 and is processed inaccordance with one or more programs, either software or firmware,executed by processing system 1810. The results of processing system1810 may then be transmitted over network 1880 for viewing on display1892, reporting device 1890 and/or a second processing system 1895.

Processing system 1810 includes one or more input/output devices 1802that receive data from the illustrated sources or devices 1801 overnetwork 1850. The received data is then applied to processor 1803, whichis in communication with input/output device 1802 and memory 1804.Input/output devices 1802, processor 1803 and memory 1804 maycommunicate over a communication medium 1825. Communication medium 1825may represent a communication network, e.g., ISA, PCI, PCMCIA bus, oneor more internal connections of a circuit, circuit card or other device,as well as portions and combinations of these and other communicationmedia.

Processing system 1810 and/or processor 1803 may be representative of ahandheld calculator, special purpose or general purpose processingsystem, desktop computer, laptop computer, palm computer, or personaldigital assistant (PDA) device, etc., as well as portions orcombinations of these and other devices that can perform the operationsillustrated.

Processor 1803 may be a central processing unit (CPU) or a specialpurpose processing unit or dedicated hardware/software, such as a PAL,ASIC, FGPA, operable to execute computer instruction code or acombination of code and logical operations. In one embodiment, processor1803 may include, or access, code which, when executed by the processor,performs the operations illustrated herein. As would be understood bythose skilled in the art when a general purpose computer (e.g., a CPU)loaded with or accesses code to implement the processing shown herein,the execution of the code transforms the general purpose computer into aspecial purpose computer. The code may be contained in memory 1804, maybe read or downloaded from a memory medium such as a CD-ROM or floppydisk, represented as 1883, may be provided by a manual input device1885, such as a keyboard or a keypad entry, or may be read from amagnetic or optical medium (not shown) or via a second I/O device 1887when needed. Information items provided by devices 1883, 1885, 1887 maybe accessible to processor 1803 through input/output device 1802, asshown. Further, the data received by input/output device 1802 may beimmediately accessible by processor 1803 or may be stored in memory1804. Processor 1803 may further provide the results of the processingto display 1892, recording device 1890 or a second processing unit 1895.

As one skilled in the art would recognize, the terms processor,processing system, computer or computer system may represent one or moreprocessing units in communication with one or more memory units andother devices, e.g., peripherals, connected electronically to andcommunicating with the at least one processing unit. Furthermore, thedevices illustrated may be electronically connected to the one or moreprocessing units via internal busses, e.g., serial, parallel, ISA bus,Micro Channel bus, PCI bus, PCMCIA bus, USB, etc., or one or moreinternal connections of a circuit, circuit card or other device, as wellas portions and combinations of these and other communication media, oran external network, e.g., the Internet and Intranet. In otherembodiments, hardware circuitry may be used in place of, or incombination with, software instructions to implement the invention. Forexample, the elements illustrated herein may also be implemented asdiscrete hardware elements or may be integrated into a single unit.

As would be understood, the operations illustrated may be performedsequentially or in parallel using different processors to determinespecific values. Processing system 1810 may also be in two-waycommunication with each of the sources 1801. Processing system 1810 mayfurther receive or transmit data over one or more network connectionsfrom a server or servers over, e.g., a global computer communicationsnetwork such as the Internet, Intranet, a wide area network (WAN), ametropolitan area network (MAN), a local area network (LAN), aterrestrial broadcast system, a cable network, a satellite network, awireless network, or a telephone network (POTS), as well as portions orcombinations of these and other types of networks. As will beappreciated, networks 1850 and 1880 may also be internal networks or oneor more internal connections of a circuit, circuit card or other device,as well as portions and combinations of these and other communicationmedia or an external network, e.g., the Internet and Intranet.

FIG. 19 illustrates an exemplary process for determining a locationusing a non-iterative linear algebra algorithm. In this illustratedprocess, the criteria for determining a location of a device (i.e., acell phone, a transmission device, such as a wrist band transmitter) isdependent upon the selection of a plurality of sensors that havedetected a wireless transmission 1910. Exemplary criteria for selectingsensors are shown in block 1915. For example, in one aspect of theinvention, at least five (5) sensors are to be utilized in the processshown. Further, the sensors must be selected such that no three sensorsare installed within a same line and no four sensors are installed in asame plane. In addition, at block 1910, a reference sensor is determinedas that sensor having the smallest time difference of a received signalamong the selected sensors.

At block 1920, for each of the selected sensors, i, a range R_(i) isdetermined between the sensor and the transmission device and thedifference in distance between two sensors is then determined. Block1925 discloses definitions of the terms used in describing the exemplaryprocess. At block 1930, the matrix H and the vector C are initializedand at block 1940, the location vector of the transmission device isdetermined.

While the processing shown in FIG. 19 relates to a wrist bandtransmission device, as disclosed in related co-pending U.S. patentapplication Ser. No. 12/231,437, entitled “Wrist Band Transmitter,” itwould be recognized by those skilled in the art that the processingshown is applicable to other types of wireless transmission devices,such a cellular telephone, and wireless personal digital assistants andother similar type devices, whether being special purpose (i.e., wristbands) or general purpose (i.e., cell phones).

While there has been shown, described, and pointed out fundamental novelfeatures of the present invention as applied to preferred embodimentsthereof, it will be understood that various omissions and substitutionsand changes in the apparatus described, in the form and details of thedevices disclosed, and in their operation, may be made by those skilledin the art without departing from the spirit of the present invention.For example, while the device described herein is referred to as atransmitting device, it would be recognized by those skilled in the artthat the device may incorporate a receiving unit, designed to operate inone or more frequency bands over a wide frequency range. For example,the receiving system may represent a crystal receiving system that maydetect one or more signals within a frequency range, or may represent asuperhetrodyne receiver that may detect and determine the frequency ofoperation of received signals.

In an embodiment, in a corrections complex, such as Angola State Prison,or a arbitrarily defined area where transmission facilities 202 areprohibited except for authorized transmission devices, the transmissiondetection, controlling, identification, and reporting system 100 whetherinternal or external the facility may control, identify and prohibittransmissions from transmission facility 202 depending on the locationor approximate location of the transmission facility 202.

FIG. 19A illustrates an exemplary process 1902 for capturing a wirelesstransmission in accordance with the principles of the invention and FIG.19B illustrates an exemplary geographic configuration for explaining theprocessing shown in FIG. 19A. Referring now to FIG. 19A, at block 1912,a reference signal transmitted by a transmitter (1972, FIG. 19B) isreceived at a transcribing system (1975). The transmitter 1972 has atransmitting range represented by a distance R₁. An estimated distance(D₀) between the transceiving system 1975 and transmitter 1972 of thereference signal is determined based on a received power at thetransceiving system. At block 1922, a determination is made regarding anexpected power of the reference signal to be received at wirelesstransmission facilities a known distance (R₂) from the transceivingsystem 1975. In one aspect of the invention, an expected received powermay be determined without regard to the positions of the referencesignal transmitter 1972 and the transceiving system 1975. That is, anexpected received power may be determined a known distance (R₂) aboutthe transceiving system 1975 based solely on the received power at thetransceiving system 1975 and, thus, the expected received power at pointA is the same as that received at point B. In another aspect of theinvention, a position of the reference signal transmitter 1972 may bedetermined or provided to the transceiving system 1975. For example, adirection of the reference signal transmitter 1972 may be determined,using directional receiving antennas (or multiple receiving antennasseparated by a known angular measure, such as four antenna spatiallyoriented 90 degrees to each other, such that the 3 dB antenna gainpoints intersect at 45 degrees from the antenna maximum gain) at thetransceiving system 1975, and a position relative to the transceivingsystem 1975 may be determined based on the determined direction andestimated distance (D₀). In another aspect, a direction of the referencesignal transmitter 1972 may be determined using a received signalstrength of the reference signal on at least one receiving antenna. Inanother aspect, the position or location of the reference signaltransmitter 1972 may be known and, thus, available to the transceivingsystem 1975. For example, the position of the transmitter 1972 may beknown through a mapping of such transmitters and/or the location isknown based on conventional surveying methods or from a globalpositioning satellite system (GPS). With the position of the referencesignal transmitter 1972 known, the expected power of the referencesignal may then be determined more accurately. For example, the expectedreceived power of the reference signal a known distance from thetransceiving system 1975 in line with, and between, the transmitter 1972and the transceiving system 1975 is greater than the expected receivedpower of the reference signal a known distance from the transceivingsystem in line with but on an opposite side of the transceiving system1975.

With reference to FIG. 19B, the received signal strength at wirelesstransmission facility 1980 is greater than that of wireless transmissionfacility 1990. The expected received power may be determinedcontinuously along the known distance (R2) about the transceiving system1975 or may be determined at designated angles about the transceivingsystem 1975 (e.g., every 10 degrees). Interpolation between twodesignated angles may be used to determine an expected received power atan intermediate point. At block 1930, a signal is transmitted from thetransceiving system 1975 within a general area, as represented by R₂.The area may include wireless transmission facilities 1980, 1985, 1990,capable of receiving the reference signal and wireless transmissionfacility 1995 that may not be capable of receiving the reference signal.In one aspect, the signal may be transmitted in an omni-directionalmanner wherein the general area represents an area circling thetransceiving system 1975, assuming the system and correspondingantenna(s) are co-located. In another aspect of the invention, thesignal may be transmitted in a directional manner wherein the generalarea represents a pie-shape area, 1997, 1998, having an apex at thetransceiving system 1975 (a sector); assuming the antenna(s) and thesystem 1975 are co-located. The angular spread of the pie-shared areaα₁, α₂ may be determined based on the directivity of the transmittingantenna. The signal transmitted by the transceiving system 1975, whichis similar in at least one characteristic of the reference signal, istransmitted with sufficient power to interfere with communicationsbetween the reference signal and wireless transmission facilities withinan area in which wireless transmission facilities may receive thereference signal. The transmitted signal may be a continuous wave typesignal (i.e., a jamming signal) or may be a discrete signal thatcommands the wireless transmission facilities to reestablishcommunication with the reference signal transmitter 1972. At block 1940,a simulated reference signal, which is similar in at least onecharacteristic of the reference signal, is transmitted by thetransceiving system 1975. The simulated reference signal is transmittedat a power level such that the received power of the simulated referencesignal at the known distance (R₂) from the transceiving system 1975 isgreater than the received power of the reference signal. At block 1952,signal(s) received by the transceiving system 1975 from wirelesstransmission facilities 1980, 1985, 1990, 1995 in response to theinterfering signal are analyzed and processed.

In one aspect of the invention, a distance D₁′, D₂′, D₃′, to each of thewireless transmission facilities 1980, 1985, 1990, respectively may beestimated based on a received power, at block 1962. In another aspect ofthe invention, a direction of the wireless transmission facilities maybe determined using, for example, directional antennas and/or anamplitude-based angle of arrival method. In one aspect of the invention,the signals received by the transceiving system 1975 may be analyzed todetermine if they are allowed to send and/or receive communication aspreviously disclosed at block 1973. As discussed previously,allowability may be determined based on a known set of wirelesstransmission facility characteristics that are allowed within an area.All others are not allowed and, thus, communication is prohibited. Ifthe signals are determined to be allowable, then control of the signalis “handed-off” to the reference signal transmitter 1972. Otherwise, thereceived signals may be further processed.

In one aspect of the invention, allowability of a wireless transmissionfacility may be determined based on a position of the wirelesstransmission facility with respect to the transceiving system 1975. Forexample, if the wireless transmission facility is determined to bewithin a predetermined distance, R₃, from the transceiving system 1975,then communication to and from the wireless transmission facility maynot be allowed, even though the transmission would normally be allowed.In one aspect, the area defined by R₃ may be limited using directionalinformation of the received signal associated with the wireless facilityand the transceiving system 1975. Thus, if the transceiving system 1975is moving towards the wireless transmission facility, then communicationmay not be allowed, while communication may be allowed if thetransceiving system 1975 is moving away from the wireless transmissionfacility, even though the wireless transmission facility is within thearea defined by R₃. In another aspect of the invention, transceivingsystem 1975 may attempt to determine other wireless transmissionfacilities within a region, R₄, attempting to communicate with thenot-allowed transmission facility.

FIG. 20A illustrates a graph of exemplary distances between theoperating ranges of base stations 1975 and device 1972 as a function ofangle, wherein the angle is normalized with respect to a line betweenbase station 1975 and device 1972. Thus, a minimum distance between basestation 1975 and device 1972 is represented as R1, at an angle of zerodegrees between base station 1975 and device 1972 and extends to amaximum distance of R1+2R2, at an angle of 180 degrees (see curve a).

However, as the operating range of device 1972 exceeds the operatingrange of base station 112 at 180 degrees, the distance may thus berepresented as R3 (see curve b).

Thus, as the angle between base station 1975 and device 1972 increases,the distance between base station 1975 and device 1972, at distance R2from device 1972, increases and becomes limited to a distance of R3 foran angular period around 180 degrees. The distance then decreases to R1as the angle increases.

FIG. 20B illustrates an exemplary power received at the operating rangeR2 of device 152. In this case, the power received by a wireless deviceis a maximum at distance R1 and is a minimum at distance R1+2R2. (seecurve a). However, as the distance R1+2R2 exceeds the operating range ofbase station 112, the power at distance R3 is limited to the power atthe edge of the operating range of base station 1975. (see curve b).Thus, to capture any devices within the local area of device 1972,device 1972 must transmit at a power between that received at R1 andthat received at R3. Further the power transmitted varies as a functionof the angle between base station 1975 and device 1972.

FIG. 21 illustrates a second exemplary network configuration inaccordance with the principles of the invention. In this exemplaryconfiguration overlapping regions 210, 220, 230, 240 provide continuouscoverage of one or more devices within their respective regions. In thiscase, each of the regions 210, 220, 230, 240 are represented as having acoverage area defined as R3 with respect to corresponding base stations212, 222, 232, and 242. As illustrated, a hexagon represents each of thecoverage areas 214, 224, 234 and 244. The hexagon representations areprovided solely to illustrate the interlocking coverage of theoverlapping coverage regions 210, 220, 230, 240.

Also illustrates is a transceiving station (device) 252, (which isequivalent to device 1972 of FIG. 19B). Also illustrated are wirelessdevices 262, 264, 266, and 268. Devices 262 and 268 are well within thecoverage region of base station 212, while device 264 is within anoverlapping zone between areas 210 and 230. Device 266 is outside thecoverage area of base station 212 and within coverage of base station222. Each of the wireless devices is within a local area represented bydistance R2 centered on transceiving device 252.

In addition, R1 represents the closest distance between base station 212and transceiving system 252. R4 represents the closest distance betweenbase station 222 and transceiving system 252 and R5 represents theclosest distance between base station 232 and transceiving system 252.FIGS. 22-24 represent graphs of power at R2 for each of base stations212, 222 and 232, respectively, in a manner similar to that shown inFIG. 20B. In this illustrated example, the power of each base station isassumed to be substantially equal so that the coverage areas,represented by R3, are substantially the same. However, it would berecognized that the power of each base station may be altered to providegreater or lesser coverage areas. In this case, the power received at R2may be greater or lesser and is a function of the output transmissionpower and the distance (e.g., R1, R4 and R5, respectively).

In one aspect of the invention, the transceiving system 252 may selectone of the base stations as a primary cell. The primary cell may beselected based on the base station being determined to be closest, indistance, to the transceiving device 252. The transceiving system 252may normalize the received power based on distance and transmissionpower of each of the base stations. In addition, the transceiving system252 may normalize the location of each of the base stations with respectto the location of the base station of the primary cell. That is, in theillustrated network configuration shown in FIG. 21, base station 212 maybe selected as the primary cell and base stations 222 and 232 may bedetermined as angularly separated with respect to the line between theprimary cell base station and the transceiving station 252. Thus, basestation 232 is slightly greater than 90 degrees offset from the linebetween base station 212 and transceiving station 252. Similarly, basestation 222 is slightly greater than 180 degrees offset from the linebetween base station 212 and transceiving station 252.

Referring to FIG. 25, the received power at R2 may then represent offsetbased on the angular difference between the primary cell base stationand the other base stations.

FIG. 26, which represents a superposition of the powers of the threepower curves, and further illustrates the power to be transmitted bytransceiving station 252, as a function of an angle around thetransceiver to maintain control of each of the wireless devices within alocal area 250. As would be understood, the illustrated power is takenwith respect to a known angle about the transceiving system (device)1975.

FIG. 27 illustrates a flow chart of an exemplary process in accordancewith the principles of the invention. In this illustrated process,transceiving system 252 receives the reference signal of each of aplurality of base stations. Although transceiving system 252 is outsidethe coverage area of base station 222, transceiving system 252 is stillable to receive the reference signal from base station 222 but does notcommunicate with this base station.

At block 620 a determination is made regarding the primary cell based onthe received power of the reference signals. At block 630, a position ofeach of the sources (base stations) of each of the reference signals maybe obtained or determined. For example, a base station position may bedetermined based on a received power and an angle of arrival of thereceived signal. Or the base station position may be provided usingGlobal Positioning Satellite system information. Or the base stationposition may be preloaded within general area.

At block 640 a distance is determined to each reference signal based onthe position of the source of the reference signal. At block 650, anexpected received power from each of the base stations is determinedalong a radius defining the local area with respect to transceivingsystem 252. A graph of received power from each of the base stationsalong the local area is determined. At block 660, positions of the basestations are normalized, angularly, with respect to a line between theprimary cell base station and the transceiving system 252 and thereceiving power graphs are oriented with respect to the primary cellbase station. A resultant power graph is determined based on thesuperposition of received power graphs and at block 670, thetransceiving system outputs a power level slightly greater than theresultant power at a corresponding angle.

In one embodiment of the invention a repeat Jamming Module, providesrepeat jamming capability and = jams specifically a targeted cell phonesand/or wireless communication device. This repeat jamming techniquesutilizes the outgoing signal of the cell phone and repeats thetransmission 100 ns after the initial signal with matching power. Theeffect of the overlapping communication on the receiving transceiverprovides a confusion in the receiving transceiver and makescommunication impossible and the call and/or wireless communication isdropped. In one embodiment of the invention the jamming module include aduel repeating circuit which a programmable delay line built in to allowthe same communication to be delayed by the programmed delay amount. Inanother embodiment of the invention the repeat jammers are placed ineach section of the facility. When the signal detection array detects anunauthorized cell phone the repeat jammer takes that cell phone and onlythat cell phone off line. When the phone tries to acquire the tower thecell phone's identification is re-verified.

In one embodiment of the invention, a Base Station Controlling Module,which identifies and controls cell phones interfaces with Cell PhoneDetection system to determine authorized and unauthorized phones,provides phone type, the time of arrival and the cell phones frequencyand seamlessly provides backhaul and Denial of Service (DoS)capabilities. The Base Station Controlling Module, which identifiesand/or controls cell phones, interfaces with Cell phone detection systemto determine whether a cell phone is an authorized or unauthorized cellphone, the cell phone detection system provides phone type, the time ofarrival and the cell phones frequency to the base station unit, the basestation unit matches the cell phone detected signal with the basestation controlled and/or required cell phones and verifies the cellphone of interest is within the unauthorized areas. It also verifies inone embodiment of the invention whether the cell phone is an authorizedcell phone for use within the facility, wherein the data matrixdetermines authorized vs. unauthorized cell phone and authorized areavs. unauthorized areas and, seamlessly interfaces either providingbackhaul and/or DoS capabilities.

In one aspect of the invention, a cell phone identification module whichidentifies cell phone identifications (IDs), determines whether anauthorized or unauthorized phone exists, and provides the phone type,the time of arrival and the cell phones frequency and seamlesslyinterfaces with the repeater jammer module, to disable the unauthorizedphone in either the unauthorized area and/or an unauthorized phone inany area of interest. The repeat jamming unit jams all unauthorized cellphones within the facility and allows authorized cell phones.

In one embodiment of the invention, the signal detection sensors areplaced throughout the facility to provide full coverage of the facility.Any cell phone within the facility will be detected and displayed on thecentralized console interface. This information will be sent to thesoftware radio Identification module to verify if this is an authorizedor unauthorized cell phone. If the cell phone is unauthorized the repeatJammer module will disable the cell phone or the Software RadioIdentification Module will deny service. The software radioidentification module is designed to receive a signal being transmittedfrom a cell phone and decode the IMEI number. The IMEI number iscompared against a database of authorized IMEI authorized cell phones.In one aspect of the invention, to prevent cell phone from entering afacility undetected, Low Noise Jammers will be installed at all egress(entrance) points within the facility. So that all cell phones cominginto the facility are verified by the Software Radio IdentificationModule. An ancillary benefit is anyone mistakenly or unknowinglybringing a cell phone into the facility will be picked-up at theentrance point. In another embodiment, the Software Radio IdentificationModule (SRIM) identifies all cell phone within the coverage area. Anycell phone that is in an on state within the coverage area (area inlight blue) will be Identified. The International Mobile EquipmentIdentity number or IMEI (Cell phone ID) will be compared with thefacility's “authorized cell phone list”. An authorized cell phone isallowed to make and receive calls. All unauthorized cell phones areprevented from making or receiving incoming and outgoing calls. Thesoftware radio Identification module can be expanded to provide cellphone call monitoring.

In one aspect of the invention, the base station acquires new cellphone, the base station provides, time code, band, and type to the cellphone detection sensor array. The cell phone detection sensor arraydetermines whether the cell phone is within exclusion zone, if the cellphone detected outside “Cell phone control area”, then the cell phonesreleased back to Network Cell Tower and/or the calls are allowed wherethe Cell Phone is backhauled to the network. If the cell phone is foundwithin the “control area”, and the base station determines whether cellphone is an “Authorized Cell Phone” (VIA HLR Database interface), theconsole displays a location of the cell phone, the (IMEI), and“Authorized cell phone status”. Alternatively, if the cell phone isdetermined to be an “Unauthorized Cell Phone” (VIA HLR Databaseinterface) the base station prevents incoming and outgoing calls and theconsole displays the IMEI, the cell phone and “Unauthorized phonestatus.” Or the Repeat Jammer Module jams the cell phone signal and theconsole displays the IMEI, the cell phone location and “Unauthorizedphone status”, depending on the system configuration. In anotherembodiment, the base station identifies all cell phones within thecoverage area. Any cell phone on within the coverage area (area in lightblue) will be identified. The International Mobile Equipment Identitynumber or IMEI (Cell phone ID) will be compared with the facility's“authorized cell phone list”. Authorized cell phones allowed making andreceiving calls. All unauthorized cell phones are prevented from makingor receiving incoming and outgoing calls. The base station module canalso be expanded to provide cell phone call monitoring.

In another embodiment the signal detection sensor array is used toprovide Real-time tracking of inmates utilizing the BINJ Signal SensorArray with wristband tracking technology on each inmate. (See patentapplication Ser. No. 12/231,437). The system is expanded to include aStaff Safety Alert & Tracking System (SSAT) utilizing the Signal Sensorarray with built-in real-time wristband and/or security tags for thetracking of correction officers. In this embodiment of the system, thesystem, reports real-time time and position of every inmate and officerin the facility. The database collects every movement of a wristband upto 1000 times per second and provides this data into a data mining andhistorical playback capability. In another embodiment of the system thewristband has a signal detection module which detects a cell phonewithin a specific area and the wrist band determines the user of thecell phone and reports the information back to the console. Some of theadvantages in tracking Officer and Inmates include: increased StaffSafety; inmate escape prevention tool; inmate and staff out of positiontool; continuous and accurate count of inmates; group/gangs interactionmonitoring; accurate work scheduling and monitoring tool; on post/offpost position of all security personnel; escape alarm; last knownposition; immediate alarm and the like. The data mining capabilitiesenable the data base and data mining to; accurately location of inmatesin relationship to other inmate/staff at all times and ability toaccurately, investigate assault/rape and assist in prosecution tool; andability to physically contact detection system for incident/rapeinvestigation and prevention tool; inmate tracking/data mining whichprovides for the identification of predators and predatory behaviors,create exclusion zones and alerting system to notify security of aboundary violation; inmate tracking and data mining: for assessing staffand inmates' vulnerabilities; provides for decreased agency liability byproviding accurate forensic information for court; the system alsoprovides for audio and alarm capability (incident/rape prevention tool).

In another embodiment of the invention, the Cell Phone Detection systemis integrated with a Base Station(s) Module, wherein this basestation(s) may also have back haul capability wherein the systemutilizes a Pico/Nano base station technology and cell phone detectionsystem. The base station registers the cell phone(s) and has the cellphone detection system verify the location of cell phone. Theallowability module determines whether the cell phone is authorizedand/or unauthorized. The system verifies who the cell phone belongs toif known IMEI (via database). The base stations directed to the systemto back-haul all authorized phones and display the authorized phoneswithin the interested area, not display cell phones in non-interestedareas. Then the base station(s) is directed to deny services to allnon-registered/unauthorized within the restricted area and display theserestricted phones and notify staff of their location and presence.

In another embodiment of the invention, the Cell Phone Detection systemworks in conjunction with an integrated Base Station Module without backhaul capability in which the base station(s) register the phone and havethe Cell Phone Detection system verify the location of cell phone. Theallowability module determines whether the detected phone is inside therestricted area. The system verifies who the phone belongs to by a knownIMEI (via database). The base station is directed to release authorizedcell phones and cell phones which are not in the restricted areas backto the local tower and display the authorized phones within theinterested area and not display phones in non-interested areas. The basestation is directed to Hold onto unauthorized cell phones and displaysthe unauthorized phones. All non-registered cell phones will have Denialof Service (DoS), by being held onto by the base station unit and thelike.

In another embodiment of the invention, the Cell Phone Detection andIdentification Module in which the Cell Phone Detection system is thecontrolling unit. The system utilizes a sniffer and/or embedded IMEIdecoders within each sensor and cell phone detection sensor determinethe location and identification of all cell phones within a specificarea. The signal detection sensors find and positively locate the phone.In a configuration in which each sensor does not possess a decoder IMEImodule, the sensor provides the following information to the sniffer(TOA, frequency, type, and channel). The sniffer scans for the phone,and then reports back the identification information. The systemverifies who the phone belongs to and whether the cell phone isauthorized or not authorized. In a configuration in which each sensorhas a decoder module, the system displays green for authorized phone,red for unauthorized phones and the like. In another embodiment, theSniffer module finds and positively identifies the cell phones. Thesniffer provides information to the cell phone detection and locationsystem (TOA, ID, frequency, type, channel . . . ). The cell phonedetection and location system then scan for the cell phone, verifies whothe phone belongs to and whether the cell phone is authorized and/or notauthorized in that location. Then the system displays green forauthorized phone red for unauthorized phones and the like.

In one aspect of the invention, the Cell Phone Detection andIdentification Module works in conjunction with 3rd party Telco Support.In this aspect the sniffer module (IMEI decoder and identified)positively identify the phones, gives information to the cell phonedetection and location system (TOA, ID, frequency, type, channel . . .). The Cell phone detection system scans and identifies a location ofinterested cell phone, verifies who the phone belongs and whether thecell phone is authorized and/or not authorized and displays green forauthorized phone, red for unauthorized phones]. The system alerts theappropriate cell phone provider of an unauthorized call phone to havethe cell phone provider deny service on the cell phone and has Staffconfiscate cell phone and the like.

In another aspect of the invention, the Cell Phone Detection systemworks in conjunction with a repeat Jamming system and an IdentificationModule and/or embedded decoding module in which the sensors find andpositively locate the phones In this case in which there is externalidentification of the IMEI, the system gives information to the sniffer(TOA, frequency, type, channel . . . ), scans for the phone and reportsback the identification of the cell phone. The system compares theidentification with the database of an authorized phone and verifieswhether the phone belongs is authorized or not authorized user. Thesystem displays green for authorized phone, and red for unauthorizedphones. The facility may pick up that specific phone. The repeat jammerdisrupts the specific phone with a set repeat delay to take the cellphone off line. Pinpoint jamming disrupts all phones within the channeland area A Broadband jammer disrupts all phones within area andfrequency coverage and the like.

although not shown, it would be recognized that the receiving and/or thetransmitting antennas and/or the processing systems may be co-located ormay be geographically distributed. When a plurality of receivingantennas are employed and geographically distributed, it would berecognized that correlation of the information obtained from eachantenna is necessary. In one aspect of the invention, a plurality ofantennas having a known angular receiving pattern may be co-located, seeFIG. 7, and remotely located from the processing system, to receivesignals at substantially the same time. It would be recognized that whenthe antenna system is remotely located from the processing system, theareas shown in FIG. 19B are oriented with respect to the antenna system.

In another embodiment of the invention, the wristband as described inpatent application Ser. No. 12/231,437, includes a signal detectionmodule as described in FIG. 6 and/or alternatively in anotherembodiment, FIG. 11, the signal detection module detects cell phonesignals, its use, and unique identifier information of the cell phonebeing used by the inmate. The wristband module may also include a voicerecognition module. A Cell Phone Use, and Authorization Database module(CPU-ADM), interfaces with the cell phone detection system and the basestation control system and controls when an inmate may make a phone calland/or receive a call. This module holds the allowed or dis-allowed(unauthorized) cell phone information for each inmate, what cellphone(s) he is allowed to use, the areas and times in which an inmatemay use his cell phone, the authorized places and phone numbers whichthe inmate may call and/or receive phone call from. The CPU-ADM systemin cooperation with the base station unit and cell phone detection unitsinputs, controls and monitor how long an inmate may stay on the phone,the cost incurred for each phone call, records the inmatesconversations, correlated voice pattern with each inmate to insure eachis the inmate is prescribed to use the cell phone, and that one inmateis not talking on another inmate's cell phone; correlates voice patternof all calls made by the inmate and their recipient(s). The CPU-ADMsystem analyzes all calls received and all calls made in conjunctionwith all person(s) contacted and analyzes for threat group, and securityconcerns and trends. The system monitors threat alerts analysis and onkeys words. The CPU-ADM system interfaces with the canteen/inmate trustfund to debit inmate's account for each call made. The CPU-ADM systeminterface allows for inmates to input their desired call numbers, systemallows for security personnel monitoring.

FIG. 28 illustrates one embodiment of the invention, where a restrictedcell phone (2801) is being controlled by a communication control unit(2802) when a wireless communications device (2801) is detected within arestricted area (2800), and this phone tries to make a 911 call. Thereare several ways to make this possible and to insure security andrestriction on the use of that cell phone. The first embodiment of theinvention is to backhaul (2806) the call to a 911 emergency responsestaff (2807) specifically designed to handle this restricted coveragearea (2800). This methodology will provide for quicker response and thepersonnel (2807) handling the call center will be specially trained torespond to the emergency and this will eliminate wasting personneloutside the restricted area to respond to someone trying to defeat the“no cell phone security system.” Additionally, the law enforcementpersonnel within the jurisdiction of the secure facility responding tothe 911 call may monitor the situation and record the call and provide aquicker response. To assist in the response, integrating thecommunication control unit with the CCTV system (2811), officer alarmsystem (2814) and inmate tracking system (2812) will provide theresponding personnel the ability to see who is making the call, whichinmate(s)(2809)(2815) and/or staff (2810) are around the caller. Toaccomplish the connection to the 911 call center (2805), the backhaulcan be accomplished through a wire line connection (2806) to theemergency call center. However, there are other methods of backhaulingdiscussed in the patent that are also applicable. This same methodologycan be used when transmitting authorized calls.

FIG. 28A illustrates the second methodology to allow the 911 call to bereleased to the commercial carrier. This can happen through severalmethodologies. Several processes however need to be in place, to insurethe inmate does not use the 911 call to get around the “no call phonerestriction system”. In this embodiment of the invention, the callconnection needs to be seamlessly released to the carrier, to provide aquick response to 911 authorities. However where the initial goal is toprevent unauthorized calls, it is important the commercial control unit(2802) has control of the “911 released” wireless communication device(2816), after the caller ends their 911 call. There is an opportunityfor the caller to the place another call through the commercial carrier.One methodology is to monitor the call and to verify it is stillconnected to the 911 system. Once the call is disconnected from the 911system, the communication control unit sweeps the channels of thecommercial provider to which channel the phone was transferred to.

In this embodiment, a communication control unit (2802), is atransceiver communications system which communicates with a wirelesscommunication device, such as a base station system, an access point,including such devices as a wireless access point, a femtocell, apicocell, a microcell and the like.

In this embodiment, illustrated on FIG. 28A, the communication controlunit (2802) connects to all wireless communication devices (2801) withinthe restricted zone (2800). The communication control unit (2802)connects the cell phone (2801) through a common switch (2819) and/orTelco Switch with the commercial carrier (2803) and does a hand off withthe commercial carrier (2803) as a commercial carrier would hand off acall from one tower to another tower, as when a caller is driving andtalking on the phone. FIG. 28A also illustrates another embodiment inwhich the communication control unit (2802) first switches the channelof the phone from a blocked channel (in this example, channel 8) to anopen carrier channel (in this example channel 1), then the communicationcontrol unit (2802) transfers the phone (2801) off the communicationcontrol unit's channel 8. This can be accomplished by disconnecting thecell phone from the communication control unit. The 911 calling cellphone (2816) will try to reconnect the communication control unit (2802)first because it is a higher power level, (the communication controlunit (2802) has the option to lower its power to eliminate this fromoccurring), the communication control unit (2802) will not accept thereacquiring phone (2816) and the cell phone will go to the next closestaccepting tower, in this case a commercial carrier (2803). Thecommunication control unit may lower its power for a predeterminedperiod of time so that the cell phone may acquire the closest acceptingtower and then return its power level to a power greater than theaccepting tower so as to capture any other cell phones attempting toconnect to the accepting tower. The cell phone attached to the acceptingtower remains connected to the accepting tower even through the powerfrom the communication control unit is greater than that of theaccepting tower.

In another embodiment the communication control unit (2802), controlschannels 2-8 (2821) and does not control channel 1, all cell phones whocome up on channel 1 will attach to the closest commercial carrier(2803). The communication control unit (2802) switches the channel ofthe cell phone (2820) from a blocked channel to the open carrier channel(2817), the cell phone will only find the carrier channel (2817).

FIG. 28A further illustrates the embodiment in which the communicationcontrol unit (2802), Channel Sweep Software Program (2822) initiates aprotocol to capture and/or re-capture the phone (2816) which is on theopen commercial channel (2817). This program can run periodically,and/or is initiated by a signal detection unit and/or the communicationcontrol unit and the like, which monitors the open channel (2817)specifically looking to recapture the 911 caller's cell phone and/orunknown cell phone(s) (2801). This methodology prevents the 911transferred cell phone (2816) and/or an unauthorized cell phone(s) frommaking additional calls, send texts and the like. This methodology alsopicks up cell phones within the restricted area (2800) which are on anopen commercial channel (2817). The Channel Sweep Software Program(2822) monitors the phone activity on 2817. In an embodiment of theinvention, if authorized phone(s) are currently using channel 1, theChannel Sweep Software Program moves the authorized phone(s) to anotherTelco Channel, (now the new “open Channel (2821)” and moves theunauthorized cell found to “hold channel” (2824).

FIG. 28A furthers illustrates that there is a set of protocols (2823)between the communication control system (2802) and the commercialcarrier (2803) and the like. When a 911 call is finished, the commercialcarrier (2803) will change the channel (2817) of the 911 caller (2816)from the open channel (2817) to a held channel (2824). The commercialcarrier (2803) will terminate the connection (2817) to the 911 caller(2816) and the caller will then re-attach to the communication controlunit (2802) on a held channel (2824).

In another embodiment the protocol (2823) setup between the commercialcarrier and the communication control unit will have a timed programrunning and the commercial carrier (2803) will terminate theconnection(s) to all cell phones in the commercial carrier cell sector(2826) of the restricted area. A variation of this embodiment,commercial carrier (2803) will change all phones in standby to acommunication control system's (2802) held channel (2824).

In another embodiment the communication control unit system (2802)analyzes the current configuration of the commercial carrier and choosesa new “to be opened” channel which is used by the commercial carrier(2803), if that new channel is currently being used by the communicationcontrol unit (2802) as a “captured and hold channel” (2824) thecommunication control unit (2802) will move all “captured and held” cellphone(s) on that channel to another “captured and hold channel”. Oncethe new channel is established, the communication control unit systemwill close the open channel (2817) used by the 911 caller, and all otherphones, will be acquired and held by the communication control unit(2802), the communication control unit will then determine which ofthese phones are “authorized” and which phone are “unauthorized”. Allauthorized phone will be switched to the new “Open “authorized” Channel,all unauthorized phone(s) including the 911 called will be switched to a“captured and hold channel” (2824).

This methodology can also be used to find “unauthorized” phones whichturn-on in the current Open “authorized” Channel. For example, thecommunication control unit releases an authorized phone to an openspecific channel to allow authorized cell phones to make and receivecalls, (this is in a configuration in which the facility allows specificauthorized cell phone(s) in a restricted area), the authorized phone isin standby on a commercial channel, an inmate turns on an unauthorizedphone, the channel happens to be the Open “authorized” channel,therefore the inmate gets the ability to make a call on the openchannel. The control system is interested in capturing the “newunauthorized cell phone” on the Open “authorized” channel. The methoddescribed previously can be implemented on a set schedule, or when aphone is detected in the restricted area and/or when the communicationcontrol system fails to capture.

In this embodiment the communication control system (2802) and/or asignal detection unit passively listens to the Open “authorized” channellooking for a connection by a cell phone originating from therestricted/controlled area.

In an alternative embodiment, the commercial carrier (2803) can changethe channel of the 911 caller to one of the communication control unit'scapture channels (2824) and then terminate the connection to the 911caller. The cell phone will try to reacquire the commercial carrier(2803), however the communication control unit's (2802) signal powerlevel is set to attract the 911 caller and the communication controlunit (2802) will take control and then move the “911 cell phone to a“captured and hold channel”.

In an embodiment of the invention, where the user wants to continuouslycontrol and monitor all authorized call actions including a 911 calleither by an authorized and/or unauthorized caller and may choose not toallow an Open “authorized” Channel, the communication control unit(2802) may connect a 911 call and/or an authorized call via a wirelesscommunication protocol (802.xx), an IP backhaul, a VOIP backhaul, and/orutilizing a Femtocell and/or Pico base station communications portalbackhaul, (IP protocol connection), internet and the like (2826) via tothe commercial provider (2803) and/or the Telco switch (2819), or in asituation in which the secure facility has a telecommunication systemdesigned to handle landlines, the call can be routed to the landlinesystem such as an inmate phone system and/or a PBX system. In thisembodiment, the communication control unit (2802) still maintainscontrol of the cell phone and its functionality.

FIG. 29 illustrates an embodiment of the invention where it is importantto allow an inmate(s) to communicate with their family and friends in asecure, safe and monitored manner, all of the inmate(s) can use any ofthe above communication portals and utilize cell phone (2802) and/orutilize 802 protocol communication devices (2901) and be routed to anyof the above mentioned communication systems. The 802.xx communicationdevices can be mounted on a wall (2904) or in the inmate's cell area(2901). For inmates in segregation units, where calling is restricted,the calling can be done through a two way intercom system (2903), cellphone (2820) or hand set (2902) to a switch (2905) then to the landlinesystem (2907) and/or any of the above, and or through an inmate phonesystem (2908) and/or a PBX system (2909) and the like. These connectionscan work directly through a CCU (2902). In an embodiment of the system,in which an authorized phone is being connected to the commercialcarrier (2803), there are several methodologies. In one embodiment asdiscussed in FIG. 28, the authorized cell is detected and connected tothe communication control unit (CCU) (2802), the CCU, verifies the cellphone is authorized, then the CCU directs the cell phone to the channelof the Femtocell, (2850), wherein the Femtocell then verifies theauthorized cell phone is also on its authorized list. In an embodimentof the invention, the CCU (2802) sends the authorized information to theFemtocell (2850), as the cell phone is being directed to the Femtocell,this way each authorized phone information is simultaneously sent to theFemtocell. In another embodiment of the system, as shown in FIG. 29A,when the CCU (2902) detects an authorized cell phone (2802), the CCU(2902) instructs the Power Control Module (2910) to lower the power ofthe control channel signal for the channel which the authorized cellphone (2802) is being sent to make an authorized call. The power islowered for a set period of time to allow the authorized cell phone toattach to the Telco (telephone service provider). The CCU then raisesthe control channel signal above the Macro signal of the Telco so as toacquire all cell phones that may be initiating a call. In a preferredembodiment, the CCU lowers the power of the control channel for apredetermined period of time. In one embodiment of the system the powerraising and lowering methodology can be performed in the radio head. Inanother embodiment, the methodology is accomplished by a programmableadjustable gain circuit, depending on the power of the Macro signalprovided by the Telco, wherein the power up and power down cycle isadjusted to accommodate the Telco network characteristics. In anembodiment the communication control unit (2802) can be used as amonitoring, scheduling, routing and control for inmate communicationswith family and friends.

In an embodiment of the invention, when the cell phone inside therestricted area (2800) is controlled by the communication control unitCCU, the CCU holds on the cell phone continuously as long as the phoneis in the restricted area. In an embodiment of the invention, tomaintain complete control of a restricted and authorized phone, a directcommunication bridge is created between the communication control unitand the commercial Telco (3001). The embodiment of the invention,whether the cell phone is authorized and/or unauthorized, is to controlthe cell phone, its functionality, abilities, capabilities and featuresof the cell phone(s) while allowing the cell phone to make and/orreceive a call and/or restricting the cell phone by not allowing callsor limiting the ability of the call allowed to be made. Thecommunication bridge maybe cellular, wire line, microwave, wireless,switch sets and the like. In an embodiment, the CCU sends an update tothe controlled phone and modifies its ability to send and receive email,by disabling its ability to send and receive data packets. In anembodiment of the invention, the CCU modifies the cell phone MIN/IMSI,thereby, if the cell phone finds an opening in the restricted zone, itcannot establish a connection to the Macro (Telco), and the like.Through the methodologies described, the cell phone in the restrictedarea can send and receive calls, only if the cell phone is determined tobe authorized to send and receive such calls.

FIG. 30 illustrates a further preferred embodiment where thecommunication control unit (2802) restricts the capabilities ofrestricted area cell phone(s) (2801, 2820) by changing and/or modifyingthe feature and capabilities of the cell phone, and/or uploadingsoftware modifications (3003) to the cell phone(s) (2801, 2820) tochange their feature and capabilities. Another methodology is to disablethe features of the controlled wireless communication device (2801), byreprogramming the capabilities and functionality of the cell phones andlimit their ability to communicate (3003). The communication controlunit provides limited conductivity and prevents any alternativecommunications methodology; these functions will be disabled in thecommunication control unit (2801) by the system software when itestablishes the connection to connect the 911 call and/or alternately bythe commercial Telco (3001) when it receives a 911 call via thecommunication protocol. This solution can also be implemented in regardto authorized phones (2820) to limit their capability within arestricted area (2800).

FIG. 30 illustrates an embodiment wherein a direct communication bridge(3002) can be in the form of a cellular connection, wireless conduit, orwire line connections, switch set, straight backhaul to the switch andthe like. When the 911 call is initiated by the unauthorized phone(2801) (or unauthorized or restricted communications device and thelike), the communication control unit connects the controlled wirelesscommunication device to the communications bridge (3002) so the callgoes through and the communication control unit (2801) can monitor thecall, if necessary, and also any attempt by the controlled wirelesscommunication device (2801) to defeat the system, such as dialing asecond number or executing an email, accessing the web, IP chat, and thelike. The communication control unit (2802) can prevent such actions.

FIG. 31 Illustrates a preferred embodiment of the system whereincontrolling the output of the transmission of the cell phone and to thecell phone is critical. The Communication control system (2802) isprogrammed to allow only specific data packets to and from the cellphone (2801). The communication control unit (2802) restricts all dataexcept voice data packet(s) and/or packet-switched data sets and/or thelike. This function is performed by analyzing each packet set and onlyallowing the packet set containing voice data and the like. The goal ofthis embodiment is to disable cell phone features such as email, instantmessaging, video streaming, an ability to make a second call upon anexisting call, three way calling and the like, such as twit, and limitaccess to voice only. The system will also analyze the voice packet tomake sure nothing else in encapsulated in the voice transmission, inthat some restricted area have sensitive data and security documentswhich are not authorized to be transmitted.

One of the challenges of controlling wireless communication with thirdparty systems is the reluctance of the commercial carrier to provideconductivity to the Telco network and infrastructure such asHLR/Encryption keys, and backbone services. A second challenge ofcontrolling wireless communication is retaining complete control of thewireless device, while allowing the Macro network (or Telco) to sendcalls and data, messages to the controlled device. When under thecontrol of the CCU the wireless device is invisible to the Macronetwork, therefore the Macro network does not have an ability to send acall to the wireless device (cell phone) within the controlled area(2800). FIG. 31 illustrates a preferred embodiment of the invention,wherein the CCU's wireless communication emulator (WCE) (3103)establishes a connections with the commercial carrier (2803) as thewireless device, using the cell phone's communication protocols andidentity thereby establishing an over the air communication connectionto the Commercial Carrier (2803). When someone tries to call the cellphone 2801/2820 the CCU's wireless communication emulator (WCE) (3103)receives the communication the CCU and controls the call.

The CCU then has the option to connect the outside caller with therestricted zone cell phone (2801/2820) or preventing thecommunication/data connections, depending on a set of establishedparameters. For example, if the phone is in a restricted area, thecalled party maybe played a message the called party cannot receivecalls and is instructed to call back. Or if the phone is an authorizedphone (2820), connecting the communications, however preventing datatransfers because the phone is in a classified area and datatransmissions violate security policy and the like. FIG. 31 alsoillustrates using a Femto cell (3102) (and the like, a device authorizedby the commercial carriers) to be the bridge to the commercial carrier,the CCU (2802) establishes and communicates with the Femto cell, when arestricted phone attempts to make a call the CCU sends the phone toand/or connects the phone to the Femto cell. The Femto cell establishesthe call via the commercial carrier network. When an incoming call for arestricted phone is requested of the commercial carrier network, thecommercial carrier establishes the connection through the Femto cell. Asdiscussed previously the CCU has the option to connect the incomingFemto call to the restricted cell phone. In another embodiment of theinvention all authorized phones are re-directed and connected to thecommercial carrier via the Femto cell. One of the challenges of allowingan air connection to the femtocell is preventing unauthorized users.

Currently, packet switching is a digital networking communicationsmethod that groups all transmitted data regardless of content, type, orstructure into suitably sized blocks, called packets. Packet switchingfeatures delivery of variable-bit-rate data streams (sequences ofpackets) over a shared network. When traversing network adapters,switches, routers and other network nodes, packets are buffered andqueued, resulting in variable delay and throughput depending on thetraffic load in the network. Packet switching contrasts with anotherprincipal networking paradigm, circuit switching, a method which sets upa limited number of dedicated connections of constant bit rate andconstant delay between nodes for exclusive use during the communicationsession. Currently two major packet switching modes exist; (1)connectionless packet switching, also known as datagram switching, and(2) connection-oriented packet switching, also known as virtual circuitswitching. In the first case each packet includes complete addressing orrouting information. The packets are routed individually, sometimesresulting in different paths and out-of-order delivery. In the secondcase a connection is defined and reallocated in each involved nodeduring a connection phase before any packet is transferred. The packetsinclude a connection identifier rather than address information, and aredelivered in order.

Currently, packet mode communication may be utilized with or withoutintermediate forwarding nodes (packet switches or routers). In allpacket mode communication, network resources are managed by statisticalmultiplexing or dynamic bandwidth allocation in which a communicationchannel is effectively divided into an arbitrary number of logicalvariable-bit-rate channels or data streams. Statistical multiplexing,packet switching and other store-and-forward buffering introduce varyinglatency and throughput in the transmission. Each logical stream consistsof a sequence of packets, which normally are forwarded by themultiplexers and intermediate network nodes asynchronously usingfirst-in, first-out buffering. Alternatively, the packets may beforwarded according to some scheduling discipline for fair queuing,traffic shaping or for differentiated or guaranteed quality of service,such as weighted fair queuing or leaky bucket. In case of a sharedphysical medium, the packets may be delivered according to somepacket-mode multiple access schemes.

In this embodiment some voice data packet(s), binary data,circuit-switched wireless digital voice, and/or packet-switched datasets and the like include Short Message Service (SMS); SMS is abidirectional service for short alphanumeric messages. Messages aretransported in a store-and-forward fashion. For point-to-point SMS, amessage can be sent to another subscriber to the service, and anacknowledgement of receipt is provided to the sender. SMS can also beused in a cell-broadcast mode, for sending messages such as trafficupdates or news updates. Multimedia Messaging Service (MMS)—sometimescalled Multimedia Messaging System—is a communications technologydeveloped by 3GPP (Third Generation Partnership Project) that allowsusers to exchange multimedia communications between capable mobilephones and other devices. An extension to the Short Message Service(SMS) protocol, MMS defines a way to send and receive, almostinstantaneously, wireless messages that include images, audio, and videoclips in addition to text.

Currently, EMS (Enhanced Message Service) is the step between SMS andMMS it has some of the MMS function like sending formatted and coloredTEXT, sample Graphics and Audio files which are simple like Ring tones.EMS is being used by some limited phones because it's being supported byold networks instead of MMS, which need (2G) or (3G) network. The (3G)network might support very large MMS size while the (2G) may limit theMMS size to 100 KB only.

Currently, SMS, MMS and EMS services are utilized within the largerwireless domains such as GSM, TDMA, GPRS, and CDMA, CDMA2000-1λ, EDGE,UMTS, GPRS and the like.

FIG. 31 further illustrates a preferred embodiment wherein thecommunication control unit decodes the packet-switched wirelesscommunications and blocks the restricted data services from the voiceonly service. The system includes Simple Mail Transport Protocol (SMTP)preventions; a de-encryption tool set for high-speed multi-media, SMS,EMS, and MMS enabled platforms, such as 3G and the like.

In an embodiment communication control unit includes the whole cellularconnections conduit including the Cell Tower and Base Station and subcomponents such as the Base Station Controller (BSC), Mobile SwitchingCentre (MSC) and/or the Gateway GPRS and the like. In an embodiment abase station is the cellular relay station (or cell tower) that a cellphone talks to when initiating or receiving a wireless call.

In this embodiment, the Mobile Switching Center (MSC) is acomputer-controlled switch for managing automated network operations. AnMSC automatically coordinates and controls call setup and routingbetween mobile phones in a given service area. In this embodiment theMSC maintains individual subscriber records, current status ofsubscribers, and information on call routing and subscriber information.Traditionally, there are two subscriber databases called the HomeLocation Register (HLR) and the Visitor Location Register (VLR). The HLRcontains subscriber profiles, while the VLR provides informationrelevant to roamers.

In an embodiment, a modified Home Location Register (HLR) and/or theVisitor Location Register (VLR) are modified to contain theunauthorized/authorized cell phone list and the like.

In this embodiment the SMS, EMS, WMA, and MMS and the like, utilizes theShort Message Service Center (SMSC), which acts as a store-and-forwardsystem for relaying short messages. In a preferred embodiment the systemwill disable and/or manipulate the functionality of the Short MessageService Center to stop the reception of said data packet(s) (message,data file, data packet and the like) and reroute these data sets to adatabase for future analysis. Additionally, since messages are stored inthe network until the destination cell phone becomes available, thecommunication control unit will collect the waiting packets/messages andthe like and prevent them from reaching their destination and reroutethe data for future analysis.

In an another embodiment and application, where the GMSC interrogatesthe Home Location Register (HLR) for subscriber routing information anddelivers the short message to the home MSC or roaming MSC of thedestination mobile unit the communication control unit, will reroutethese SMS, EMS, MMS data packets into a database which will contain thesender's and receipt's unique identifier(s), time-stamp reporting,location of cell phone at the time of send, the receiving andtransmitting cell phone number and the like.

In an embodiment in which the commercial carrier utilizes a basicpoint-to-point or broadcast-to-point subscriber servicesMobile-terminated short messages (MT-SM) and/or a Mobile-originatedshort messages (MO-SM), in which MT-SMs are transmitted from the SMSC tothe handset or from the SMSC to other sources, the communication controlunit will intercept these messages as mentioned above and return areport to the SMSC, confirming that the message was delivered and/orinforming the SMSC of the SMS failure. The answer will depend on theparameter set on the system within a specific application and goal themission of the system.

In an embodiment the commercial carrier deploys the use of a short code,which is a carrier-specific (and therefore carrier-dependent) phonenumber for applications routed through an SMSC. Thus, it is intendedthat this embodiment to capture all transmitted and received on-voicecommunications. However it is also anticipated that a message will beencrypted within a voice packet, and API will be designed on smartphones to bypass the current data transport methodologies and thisinvention anticipates that inevitability and the like.

Additionally, in all of the interception of messages and/or datatransmissions, a preferred embodiment will include the methodology totrigger the correct reply to the unauthorized transmission, that themessage and/or data was received and open by the intended recipient.

In an embodiment, where the Subscriber Identity Modules (SIM) cards isused for activation, and subscriber-profile purposes, the communicationcontrol unit and/or system will modify the SIM information, such as theelectronic serial number (ESN) and/or the mobile identification number(MIN) within the phone or on the SIM card or within the phone to pull asubscriber offline. By changing the SIM information, and/or theinformation identifying the phone, the cell phone is not able tointerface with the commercial tower and/or the cell phone is deniedaccess because the identification information and the like, isincorrect.

In an embodiment the communication control unit interfaces with theservice-provider gateway(s) and/or commercial carrier gateway(s) andprovides the gateways with the unique identifier of all restrictedphones, and a set of parameters which indicate which features of saidphones should be disabled, which phones should be controlled, maintainedand the like. In another embodiment the communication control unitinterfaces with a set of transmitters and/or transceivers through and/orby the service-provider gateway(s) and/or commercial carrier gateway(s)and the like.

In an embodiment in which the cell phone is a Smart phone and the like,and/or a phone which provides alternative communication capabilitiesand/or advanced features, (i.e., includes the capability to transmitsinformation without utilizing FCC commercial carrier frequencies,utilized web enabled features such as twit and the like, for example theuse of third-party platform, that acts as an operating-system layerbetween the Internet and wireless devices. This communication may be viaWi-Fi on Wi-Fi enabled cell phones (and the like), the communicationcontrol unit interfaces with, a or a set of, Wi-Fi access points (ex.433 mhz, 912 mhz . . . 2.5 ghz, etc.) which attract wirelesscommunications to the communication control unit. The communicationcontrol unit will simulate the transmissions and the intended results ofa completed transmissions and/or send back a “received indication”. Thegoal is to provide the environment, in which the restricted cell phoneuser believes they have an actual connection and communication pathway,and provides the ability to the communication control unit, to capturethe date transmitted from the cell phone and provides a simulated“correct” response.

In another embodiment, the wireless communication access point, providesthe intended recipient the belief the inmate send a message. Howeverthis message is a rogue put in place to assist law enforcement in theinvestigation and to thwart the continuing criminal enterprise and allowthe law enforcement personnel the ability to catch the transmitter andreceivers of restricted area communications.

As previously mentioned one of the goals is to identify the person whois attempting to contact the restricted area cell phone. In a preferredembodiment the communication control unit (2802) and/or the commercialcarrier interrogates the person's cell phone attempting to contact therestricted cell phone and collects investigative data including but notlimited to photos, text email, phone records, voicemail, call historyand the like.

In the case of other wireless communications, such as a Wi-Fi accesspoint being setup outside the restricted area to provide a wirelesscommunication conduit to someone inside the restricted area, it isimportant to be able to detect that wireless communications node and/oraccess point. In an embodiment the signal detection system and/or thecommunication control unit (2802) will monitor the external area aroundthe restricted area to detect for any wireless communications which maybe pointed at or configured in such a way to provide wirelesscommunication devices with in the restricted area to communicate outsidethe restricted area. In an embodiment, the communication control unitand/or the signal detection system will also look to detect wirelesscommunications within the restricted area communicating with otherwireless communications within the restricted area; for example, aninmate in administrative segregation (ADSEG) communicating to an inmateoutside of ADSEG.

In the preferred embodiment, developing a commercial carrier survey,which includes the footprint of the restricted area, the settings,surrounding characteristics and a benchmark on the cellular activitywithin and/or around the restricted area is performed. Also benchmarkingthe characteristics of the commercial base stations, their components,and the cell towers to provide the ability to accurately and seamlesslysimulate and/or clone the towers and all of their characteristics,capabilities, data hand shake protocols, unique identifies of each ofthe tower and channels, signal strengths and the like. This dataset anddatabase of information is important to accurately place and toconfigure the functionality of a communication control unit, so that thecommunication control unit does in fact clone the commercial basestation and its towers. Additionally, this information gathered providesthe ability to catalog into a criminal justice database which can crossreference cell phone activity usage, cell phone purchases, gang activityand provider perimeter detection analysis capabilities, information onthe capturing of contraband cell phone(s), assist in accuratelydetecting of a cell phone, provide critical information for contrabandinvestigations, provide trends and analysis of preferred cell phonebeing used by inmates and their criminal enterprise.

Some of the important and relevant information and data to be gatheredis: What tower cell(s) and/or sector is the restricted area located in?How many towers in the area? What transceiver frequencies does eachtower provide? How many channels does each tower have? What are theparameters of the control and reverse control channels? What are thecell towers sectors and cell and related power levels? What protocols isthe tower capable of communicating? What are the handshake protocols?What are the power levels at each frequency and protocol? What are theunique identifiers of each tower? How many cell phones are locatedinside the restricted area? How cell phone may is located adjacent? Howmany are transient cell phones? (example a corrections officer has acell phone, he drives 5 miles to work each way, the cell phone isswitched between three tower on his way to and from work, the phonespends 8 hours at night sitting in sector/cell 2 of Tower B; Tower B isa mile away from the corrections officer's home, the phone spends 8hours 5 days a week, in sector/cell 6/8 of Tower A).

For each cell phone within the above questions it is important to know:What carrier each phone is connected to? What is the cell phone number?What is the IMEI information? What is the SIM information? What is themake and model of the cell phone? Who the cell phone belongs to? Whereis the billing address? What type of billing on this phone? Is thisphone paid for by check or credit card? Does this phone belong to aperson who works at the facility? Does his phone belong to a friend andfamily member of an inmate? Does this person live next to the restrictedarea? Does this phone migrate from this location? If yes how often?

In a preferred embodiment where the desire is to shut down thecommunications of a cell phone and/or wireless communication device(s)and the protocol is encrypted to communicate with said device, severalmethods are available to detect and take said cell phone off line. Inthis embodiment, when the cell phone turns on, it may or may not try toconnect with the communication control unit because the communicationcontrol unit does not have the protocol to talk to the cell phone, thecell phone cannot communicate with the communication control unit.Therefore, the cell phone attaches to the commercial carrier who canunderstand and communicate with the cell phone. This methodology ofdetection and control is applicable to any wireless communicationdevice. The communication control unit and/or the signal detectionunit(s) detects a cell phone which is in the restricted area, howeverthe cell phone is encrypted and neither system can either connect to thecell phone and/or cannot determine the unique identifier. However bothsystems can determine the general and/or specific location, and/or thefrequency and/or time stamp and/or the type for the cell phone, whichwas detected, however, did not attach to the communication control unit.The communication control unit and/or the signal detection systemprovides that information to the commercial provider by communicationnetworks discussed earlier in this patent or by another real-time and/orother means and the like. Real-time is preferred; however, asynchronouscommunication will also get the desired results. The commercial carriercorrelates the time stamp, frequency, type, location and determines thecell phone which has eluded the communication control unit. Thecommercial carrier provides the information above and the systemdetermines, as discussed in another patent application, whether this isa contraband phone, an authorized phone, a transient phone and the like.

In a preferred embodiment the communication control unit and/or thesignal detection system detects the encrypted identifying informationand utilizes the encrypted information as a positive identification bysending the encrypted information to a location and/or machine, and/orsystem such as the commercial provider to decrypt the information andthe like. Additionally, the communication control unit and/or the signaldetection system utilize the unique encrypted data set to track andidentify the wireless communication device and the like.

In a preferred embodiment, the interface between the communicationcontrol unit and/or the signal detection system and the carrier allowsthe “authorities” (the law enforcement agency controlling the restrictedarea) to shut down that cell phone rather than the carrier.

In a preferred embodiment, communication control unit and/or the signaldetection system utilizes analysis algorithm(s) and dataset andparameters on location, payment type, location of the owner, transientproperties of the cell phone, time of call, location of call and thelike, using the data collected above and more and the like to determine,if the cell phone is actually a contraband phone as opposed to a visitorto the facility sitting in their car adjacent to the fence line, and/orthe determined location assures that the cell phone in questions isactually a contraband phone.

In another preferred embodiment, where the desire is to shut down thecommunications of a cell phone and/or wireless communication device andthe protocol and the available technology is a signal detection devicewith and/or without an IMEI/IMSI, electronic serial number (ESN) MINdiscriminator and the like. In this embodiment, when the cell phoneturns on, the signal detections system detects all and any wirelesscommunication devices. When the signal detection system detects a cellphone(s) which is in the restricted area, the system determines thegeneral and/or specific location, and/or the frequency and/or time stampand/or the type for the cell phone, and in some case(s) the uniqueidentifier. The signal detection system provides that information to thecommercial provider by a communication network as discussed earlier inthis patent or by other real-time methods and/or other means and thelike. The Real-time method is preferred; however, asynchronouscommunications will also get the desired results. Currently, in cellulartelecommunications, there are three cell phone identifiers; the cellphone (device) ID, for CDMA it is the MEID, and or GSM it is the IMEI;the subscriber ID, for CDMA it is the MIN, for GSM it is the IMSI; andthe cell phone number to call out and the cell phone number to be calledfor CDMA it is the MDN and for GSM it is the MSISDN. Traditionally, eachcellular telephone has an Electronic Serial Number (ESN) hardwired intothe phone by the manufacturer. This number was uniquely and permanentlyassociated as to identify each and every cellular phone. Also, when acellular telephone is put into service, it is assigned a MobileIdentification Number (MIN) by the cellular service provider. This isthe ten-digit area code and telephone number of the phone. The mobileequipment identifier (MEID) is a globally unique number identifying aphysical piece of CDMA mobile station equipment. The commercial carriercorrelates using the information received from the signal detectionsystem to determine the cell phone(s) identification in the restrictedarea. For example if the signal detection system which provides the ESN,MIN, IMEI, MEID positive identification is automatically determined.Thus, if the signal detection system provides the frequency, location,time stamp and/or the type the commercial carrier can correlate thetimestamp and frequency provided with the phone's IMEI and/or phonenumber. The signal detection system determines, as discussed herein andin the aforementioned related patent applications, whether this is acontraband phone, an authorized phone, an unauthorized phone, arestricted area phone, staff phone, transient phone and the like.

In an embodiment of the invention it is critical to configurecommunication control unit to work with the commercial carrier towerparameters such as frequency, protocols, cell/sector coverage,transceiver power, channel coverage, frequency priorities and the like.To cover all of the channels, protocols and frequencies of a carriertower the communication control unit must know the tower parameters andwhen those parameters change. In an embodiment the communication controlunit monitors all of the towers within the vicinity of the restrictedarea. The communication control system tower configuration database andalgorithm utilizes the data parameters such as frequency, protocols, andcell/sector coverage, transceiver power, and channel coverage, frequencypriorities, to optimize the communication control unit to effectivelyand completely control the cell phone usage within an area.

In a preferred embodiment the commercial carrier provides all the towerparameters such as frequency, protocols, control and reverse controlchannels, cell/sector coverage, transceiver power, channel coverage,frequency priorities and the like, as they change to the communicationcontrol system so that the communication control unit worksproficiently. The communication control system tower configurationdatabase and algorithm utilizes the data parameters such as frequency,protocols, cell/sector coverage, transceiver power, channel coverage,frequency priorities, to optimize the communication control unit toeffectively control the cell phone usage within an area.

In another embodiment the communication control system sets up equipmentwhich interfaces with the tower and/or monitors changes and/or to detectchanges in the tower parameters.

In the preferred embodiment the data derived from the commercial carriersurveys on the cell phone usage in and around the footprint of therestricted area provides an ability to see and understand how contrabandgets into prisons. Correlating who is bring in these phones, what callthese contraband phones call, determining the relationship betweenprisons and who is the organized element providing contraband.

In the preferred embodiment the communication control unit, (also knownas a base station denial of services system) is seamlessly integratedwith a signal detection system. In an embodiment, this signal detectionsystem is a time-domain based location and tracking system, which coversthe frequency of all of the cell phone frequency channels as well as allof the Wi-Fi frequencies, walkie-talkie and rogue frequencies.Currently, 300 MHz to 3.5 g should be scanned; however this will changeover time and will have to be expanded. The integrated detection andcontrol system allows for the accurate determination of whether the cellphone is within the restricted area or is just on the other side of thefence. This ability to accurately determine the location is critical tomake sure only restricted phone are denied service and commercialcarrier customers.

In this embodiment, the base station technology is integrated with atime-domain location and tracking system, and/or an amplitude detectionand location, identification and tracking system with more sensors for amore accurate location capability.

One of the challenges is preventing wireless communication device withina restricted area the ability to defeat the system by being able tochoose and/or choosing a commercial tower and avoiding the control unitsystem. This embodiment solves that situation. When a phone is detectedin the restricted area and is not under the control of the communicationcontrol unit, the system provides the unique identifier(s) (frequency,IMEI, time code, sector/cell and the like) to the commercial provider todisable that cell phone.

In the preferred embodiment, preventing the cell phone from ever beingable to bypass the communication control unit is also the intention ofthis invention. Cell phone apps (applications), in the future, and issome cases, currently, will be able to pick and choose their wirelessconnections/wireless conductivity and their commercial providers and orcommercial providers' towers. To prevent the communication control unitfrom being intentionally and/or accidently bypassed, the communicationcontrol unit needs to simulate the characteristics (e.g., frequency,duty cycle, modulation, phases, etc.) of the signals provided bycommercial provider's towers so that the unauthorized cell phone cannotdistinguish between the tower(s) and communication control unit.

In the preferred embodiment when the cell phone chooses the commercialtower the cell phone will still attach to the communication controlunit, if the cell phone is within the area of interest. This act isperformed working in collaboration with the commercial carriers.

In the preferred embodiment the communication control system towerconfiguration database and algorithm utilizes the data parameters suchas frequency, protocols, cell/sector coverage, control and reversecontrol channels, transceiver power, channel coverage, frequencypriorities, cell tower(s) location(s), transceiver frequencies, channelparameters, sector parameters, channel distribution, cell towers sectorfrequencies, cell power levels, tower protocols handshake protocols,power levels at each frequency and protocol, tower, base station and thecommercial provider's unique identifiers and identification identifiers,cell sector, and channel intersection information and their power levelsat each location, and provider's encryption protocols and identifiersand the like, to clone and optimize the communication control unit tolook like each commercial tower(s) in the area.

In an embodiment when a cell phone in the area of interest looks for analternative cell tower to connect with, such as a commercial provider'stower(s), the cell phone only sees the communication control unit and/orthe communication control system's other wireless communicationsoptions, such as Wi-Fi access points and the like.

In an preferred embodiment, the Wi-Fi access points provides theunauthorized cell phone with a connection which provides the user with acontrolled portal experience, which the restricted user believes he hasfound a hole in the system. However, this portal is controlled. Thisconnections provides the communication control system an ability toinfiltrate the cell phone and gather information of the users, providesan ability to modify the features of the cell phone to the benefit ofthe secure facility. This embodiment is also applicable to allalternative communication transceiver(s), such as Wi-Fi, Wi-Maxcommunications devices and the like and also applicable to all otherwireless communication devices and the like.

In another preferred embodiment when the cell phone looks for analternative cell tower to connect with the cell phone only seesclones/shadows of commercial tower(s) and when the cell phone tries toconnect to the said clone(s)/shadows of commercial tower(s), the phoneactually attaches to the communication control unit. However, the phoneis displayed that it has connected to the commercial and/or alternativetower. This embodiment is also applicable to all alternativecommunication transceiver(s), such as Wi-Fi, Wi-Max and the like andalso applicable to all wireless communication devices and the like.

These preferred embodiments solve a known problem(s) and situationfacing the corrections and law enforcement community, in which arestricted cell phone gets conductivity though a wireless 802.xxconnection which is established outside the restriction zone (i.e., aninmate has friend place an Wi-Fi access point with commercial cellularconductivity in a parking lot which is not within the restricted area,therefore, the access point connects to the commercial tower and hasunrestricted access to the outside world, then the inmate uses a 802.xxconnection to reach that access point and now the inmate has acommunication conduit which a managed access system alone would notdetect. These embodiments in concert remove this threat completely.

In an embodiment of the invention, where the goal is to gather theunique identifier of the wireless communication device without usingtransceiver technology and the cell phone, for example, is in standby,and the system setup a set of repeater signals systems which will repeatthe neighboring cell tower's channel and raise the power level of theneighboring cell tower's channel(s) great than the power of the celltower which the cell phone is currently connected to. This will attractthe cell phone to change towers and provide for a reconnection protocol.

One of the challenges of controlling a cell phone is knowing which cellphone is posing a danger and which cell phone does not pose a danger. Inone embodiment of the invention, the system detects a wirelesscommunication device and determines how that cell phone should betreated. In this embodiment a cell phone is detected by theCommunication Control Unit. The unique identifier is determined andcompared to a list of “authorized phones”. If the phone is authorized tomake a call, (authorization variables, include, time of call, personcalling, person called, shift information, scheduling information, unitlocation, job position . . . ) the system then checks the location ofwhere the phone is presently to determine whether the phone isauthorized to make a call from that area.

In an embodiment of the invention, a signal detection system verifiesthe exact location of the wireless communication device; the zonedatabase identifies and classifies each area of the facility, forexample: (red) areas—may be housing units, inmate areas, inmates cells,programs and inmate population areas, inmate rec yards; (grey) areas—mayrepresent perimeter areas which are susceptible to misidentification.e.g., fence lines, wall perimeters and (green) areas—may represent areassuch as administration areas, staff dominated areas. The exact locationof the phone is important to determine whether this phone is actuallywithin one of those restricted areas and/or sectors.

In an embodiment, If the cell phone is not authorized, (cell phone isdetermined by the unique identifier not being on the authorized list),several scenarios need to be determined before the cell phone is deniedmaking and/or receiving a call. Variables include: who is the callertrying to call, is this phone actually in a restricted area.

In an embodiment, the communication control unit (CCU), controlsunauthorized and monitors the cell phone to determine what number andprograms are being executed on the cell phone and determines what numberis being called. Additionally, the Communication Control Unit ismonitoring the cell phone activity (email, messaging, tried calls,) andall data is being stored for retrieval and analysis. If the cell phonecalls an emergency number (e.g., 911) the program determines how tohandle a 911 call, some option include: releasing the 911 call back tothe commercial carrier to complete the 911 call, or redirecting the 911call via a PBX connection routing the call to the facility security teamor redirecting the call via a picocell and IP backhaul. The two latteroptions allow monitoring of the call automatically; the former solution,call still can be monitored. (see FIG. 27, for resolving 911 calls).

In an embodiment of the invention, the system looks at the number the“not authorized” cell phone is trying to 44 e call and the systemcompares the number with numbers in a database of inmate called phonenumbers and known associates of inmates, their friends and relatives;this can be from the Inmate phone system and/or the inmate recordsand/or visitor records and/or the cell phone ID sensor in the lobbyand/or the like. If the number being call is a known security risk, suchas the database numbers or the like, the system “denies service” andnotifies security, logs the incident, alerts administration, displayslocation of disabled phone on a GUI interface, notates the location,type and identification and service; the system also compiles this datafor investigation, and the like.

In an embodiment of the invention, if the “not authorized” cellphone/wireless device is trying to place a call, email, and the like andthe called/text/communicated with is unknown, and/or the wireless deviceis in standby, the system looks to the location of the phone to verifythe phone is actually in the restricted zone. The Communication ControlUnit (CCU) and/or the Cell Phone Detection System (CPDS) verifies whichzone the cell phone is located (green, grey, red . . . ). Secondarily,the system looks to see if the cell phone has been denied access before.The system runs a weighted set of algorithms to determine whether thecell phone which was denied access, is actually an unauthorized phone ora phone which has, by accident, been picked up by the system. Some ofthe variables which make up the analysis of the weighted algorithm are,but not limited to, number of denials, number of locations, number oftimes, number called and the like. When the system, detects a phonewhich is not an authorized phone, but also is confirmed to not pose athreat the system adds it to a “Pose No Danger List”. The agency decideshow to deal with the pose no danger list. Some examples are neighborswho live next to the complex, people who work at the facility, frequentpedestrian who walk frequently near the complex and the like.

In an embodiment of the invention, the system uses different detectionstechniques such as phase angle cell phone detection, narrow band antennasignal detection, phase detection, amplitude detection, time-domaindetection resolve the ambiguity and the precise location of the wirelessdevise. If it is determined the cell phone is most likely outside therestricted zone the system checks to see if the number dialing is aneighbors, visitor, staff/trusted persons. The system looks at databaseswhich contains these numbers. The system also verifies whether this IDhas been released before and verifies why. The systems also verifieswhether the number being called on a known agency list, state agency,and/or known entity.

In an embodiment of the invention, if the phone belongs to a neighbor orstaff member, the system allows the call/text and/or the incoming call,alert facility admin, (options register neighbor phone(s), registerstaff phone(s), verify location of call, develop a matrix of “zoneviolation mis-identifications”

In an embodiment of the invention, if the device cannot be confirmedthat it is outside the restricted area and/or cannot confirm previoushistory at the facility, the system runs additional tests. FIG. 26illustrates utilizing Telco History data to make a determination whetherthe wireless communications device is: new to the area, arrived today,migrates thru the area and the like and this data is also used forinvestigative, and documentation history.

The system downloads phone history from the commercial provider and usesthe data to see whether the device has previous history. The data fromthe TELCO may include all data connections transfer, cell, locationsconnections (sector, cell) transmission history, data, transmissions,GPS information, tower information connections history, Telco cellsector(s)/wireless access nodes, device ownership, payment information,name of owner. The system looks for phone's usage, tower information,tower locations, channel and sector/cell locations; checks to see ifcell phone arrived in the area today; whether the cell phone belongs tosomeone local; whether history shows consistency of local usage; whetherthe phone is registered to staff. With this analysis the systemdetermines the likely hood that the cell phone is a legitimate cellphone and whether the call should be allowed.

In an another embodiment where tracking and identifying a wirelesscommunication device (s) in standby, in an environment where manywireless communication devices are present, or in an environment inwhich, the location of the person carrying the cell phone provides dataand/or where the specific location of the cell phone and or wirelessdevice is critical, having the wireless device transmit a signal and/orits identification is important. Such as a conference center, mall,secure facility and/or casino detecting the phone in standby isimportant. FIG. 32 illustrates a method of using base station technologyto stimulate cell phone and/or other wireless communication which are instandby. In the FIG. 32, elements 1, 2, 3, and 4, represent fourFemto/Pico base stations. Femtocells 1 and 2 have distributed antennasproviding a network of spatially separated antenna nodes which providecell coverage in a directional column fashion and Femto cell 3 and 4have distributed antennas providing a network of spatially separatedantenna nodes which provide cell coverage in a directional row fashion.

In this embodiment the power lever of Femto 4 is greater than Femto 1,Femto 1 is greater than Femto 3, and Femto 3 is greater than Femto 2.When a cell phone moves from one row to another or from one column toanother row the cell phone detect a different power level, therebyrequesting the cell tower to connect to the new greater powered tower.Additionally, in another embodiment where it is desirable to have cellphone which are stationary (not moving outside the prescribed columnand/or row) to provide their location and identification, modulating theFemto cell transmission power at a set time and power level incoordination with the intersecting directional femtocell provides amethod by which the cell phone in standby which has been stationary willalso switch towers and provide its location and identification.

In another embodiment, other methodologies for detecting cell phone instandby also will produce the same results such as switching and/orsetting intersecting and or adjacent column and row femtocells from lowband to high band, or from one channel to another, one frequency toanother or one protocol or another. In this embodiment, each femtocellis back hauled to provide continuous conductivity to the Telco. Inanother embodiment and methodology the femtocells are not backhauled andto not accept the hand off and the cell phones stay connected to theTelco, still producing a positive identification.

In another embodiment, such as described in FIG. 33, a cell phone in anarea is controlled by either femtocell C (see example b) and at certaintime interval femtocell D increases its power greater than femtocell C,the cell phone in the area re-acquires and attaches to femtocell D. Atthat set time all cell phones in the area transmit their handshakeinformation, the femtocell D and the signal detection sensor isolate thelocation of all cell phones. Depending on the density of the cell phoneswithin this area the power decrease is incremented to allow a percentageof the cell phones to reacquire at each incremental decrease in power.

In another embodiment the Pico/Femtocell (base station) which providescell coverage within a complex, is configured to exert a coveragepattern as illustrated in FIG. 33. Example A, where femtocell A providesdirectional column coverage through 9 directional antenna arrays andwhere femtocell B provides directional row coverage through 9directional antenna arrays. This configuration allows for each sectorA5, for example, to be either a femtocell A controlled sector or aFemtocell B controller sector. This is important in situations where theresolution of cell phone in a sector can be determined down to a sectorand in situations where one wants to identify one or more sectors sectorat a time by switching on the switch and regulating the power down thedirectional antenna each sector is controllable.

In another embodiment, the signal detection sensors, are synchronized tothe base station technology (femtocell) to provide positiveidentification of each cell phone within the area. In another embodimentthe signal detection sensor include a cell phone decoder chip topositively identify any phone detected independent of the femtocell.

While the invention has been described in connection with certainpreferred embodiments; other embodiments and/or modifications would beunderstood by one of ordinary skill in the art and are encompassedherein.

Methods may include (i) a cell-sector system that collects informationpertaining to cell and sector ID's, (ii) the assisted-global positioningsatellite (GPS) technology utilizing a GPS chipset in a mobilecommunication facility, (iii) standard GPS technology, (iv)enhanced-observed time difference technology utilizing software residingon a server that uses signal transmission of time differences receivedby geographically dispersed radio receivers to pinpoint a user'slocation, (v) time difference of arrival, (vi) time of arrival, (vii)angle of arrival, (viii) triangulation of cellular signals, (ix)location based on proximity to known locations (including locations ofother radio-transmitters), (x) map-based location, or any combination ofany of the foregoing, as well as other location facilities known tothose of skill in the art. In one aspect of the invention, the locationmay be determined using a method of non-iterative linear equations asshown in FIG. 19. Furthermore, in an embodiment of the transmissiondetection, controlling, identification, and reporting system 1500,discussed earlier, being able to determine the location, the type, theidentification, the unique identifier, the time, and the frequency ofthe transmission facility provides parameters within an algorithm anddata mining program to determine the danger and/or importance of atransmission facility and how to react to said transmission facility. Asdiscussed in this patent application and other related patentapplications, the type of base station, the location of base station andthe power of the base station, also contribute important information,whether to control a transmission facility 202, together and alone thesecontributing factors coupled with the following: location of thetransmission facility 202, type of transmission facility 202,identification of transmission facility 202, time of transmission of thetransmission facility 202 frequency of the transmission facility 202,based on type of base station technology and/or location of base stationtechnology may determine the and the like.

FIG. 34 illustrates a flow chart 3400 of an exemplary process operablein a pseudo-base station for detecting and processing a wirelesscommunication device or transmission facility in accordance with theprinciples of the invention.

As illustrate a signal transmission from a wireless communication deviceis detected at block 3410. At block 3420, a determination is maderegarding a potential mode of operation of the detected wireless device.At block 3430, the detected signal mode of operation or operationalprotocol may be determined based on the frequency band and the bandwidthof the detected signal. At block 3440, an identification of a commercialcarrier may be determined based on the determined operation protocol.For example, it is known that the commercial carrier AT&T utilizes aprotocol referred to as GSM (Global System for Mobile Communication)which may operate in what is commonly referred to as 1G, 2G, 3G and 4G.1G refers to a first generation wireless communication protocol, 2Grefers to a second generation wireless communication protocol, etc. Eachsucceeding protocol generation provides greater capability of thewireless communication device. Similarly, the commercial carrier Verizonutilizes a protocol referred to a CDMA (Code Division Multiple) and LTE(Long Term Evolution). CMDA technology may operate is what is commonlyreferred to as 2G and 3G, similar to GSM. LTE is similar is capabilityto GSM 4G. Other commercial carriers such as Sprint and T-Mobile useeither GSM or CDMA.

At block 3450, a determination is made regarding the commercial carrierassociated with the wireless device and the general protocol under whichthe wireless device is operating. If it is determined the protocol isdetermined to be GSM (associated with AT&T, for example), thenprocessing continues at block 3460. However, if the protocol isdetermined to be CDMA (associated with Verizon, for example) thenprocessing continues at block 3470.

At block 3460, a determination is made, with regard to GSM processingwhich generation of GSM processing the wireless device is operating on.If 2G, then processing continues to block 3462, if 3G processingcontinues to block 3464 and if 4G processing continues to block 3466.

At block 3470, a determination is made, with regard to CDMA, whichgeneration of CDMA processing the wireless device is operating on. Ifthe mode is 2G/3G then processing continues to block 3472, if LTEprocessing continues to block 3474.

FIGS. 35A-35C illustrate flowcharts of exemplary processes associatedwith 2G GSM processing (block 3462) in accordance with the principles ofthe invention.

FIG. 35A illustrates an exemplary process wherein at block 3510 thedetected signal is decoded and at block 3520 an identification of thedetected signal is made based on information contained in or associatedwith the detected signal (as has been previously described). At block3625 a determination of allowability is made. At block 3630 based on thedetermination of allowability, processing continues to block 3535, whenthe signal is determined to be allowed and to block 3550 when the signalis determined not to be allowed.

At block 3535, 2G allowable processing is performed and at block 3537 achannel output power of the pseudo base station is maintained. The basestation seeing the wireless device on a different channel which enablesthe wireless device to continue to transmit and receive messages (e.g.,voice and/or text).

At block 3550, 2G non-allowable processing is performed and at block3580, a current level of signal power is maintained in order to retainthe wireless device attached to the pseudo-base station, as previouslydiscussed.

FIG. 35B illustrates a flow chart of an exemplary process associatedwith 2G allowed processing (block 3535). As shown, an available or openchannel is determined at block 3536. The open channel represents achannel that is associated with a base station, which containssufficient capability to allow one or more wireless devices to operateon. At block 3538, a determination is made regarding the type ofprocessing to be performed on the determined allowed wireless device.For example, in one aspect of the invention, a channel redirect commandmay be transmitted (block 3540) to the wireless device to command thewireless device to operate on the determined open channel. The pseudobase station continues to maintain its output power level to a currentlevel so as to enable the detection and capture of other devices.

However, in another aspect of the invention, at block 3544, a commandmay be transmitted to the wireless device to operate on a channelassociated with a Femtocell device. The Femto cell may be a device thatis separate and independent of the base station and the pseudo basestation. In this case the open channel is associated with a channel thathas sufficient capability to handle one or more devices. At block 3546,a re-authorization process is initiated to insure that the device(s)allocated to the Femto cell are allowable devices. The allowed devicesmay continue to operate on Femto cell channel while unallowed devicesare processed in accordance with 2G unallowed processing (block 3550).

In still a further aspect, referred to as C, block 3548 the wirelessdevice may be assigned to the MCS (Message Control Station) associatedwith the base station. The MCS then directs the wireless device to abackhaul switch that connects the wireless device to a base stationand/or landline.

FIG. 36C illustrates a flow chart of an exemplary process associatedwith 2G non-allowed processing (block 3550). As illustrated, activitiesof the determined non-allowed wireless device are monitored and managedat block 3552. At block 3554 a determination is made with regard to thetype of call being made (i.e., voice text and emergency 911). At block3556, processing is directed based on the determined type of call. Ifvoice processing continues to block 3558, where the PBX server voicerecording is initiated and processing continues at block 3552 tocontinue monitoring the voice communication until the call is completed.In this case the voice call has not been connected to the base stationas the wireless device has remained on the channel that the wirelessdevice was captured on. At block 3560, text processing logs the messageand may provide a response message. Processing continues at block 3552to continue monitoring the text messaging. If the processing is to anemergency number (e.g. 911) then a determination is made regarding anumber of calls made to 911 by the wireless device at block 3662. If thenumber of calls made exceeds a predetermined limit then the wirelessdevice is marked as blacklisted and prevented from connecting to the 911emergency personnel at block 2568. However, if the number of calls hasnot exceeded the limit, then the wireless device is connected to a PBXlandline at block 3566 in order to complete the emergency call.Processing continues at block 3552 for continued monitoring of theemergency call.

FIGS. 36A-36D illustrate flow charts of exemplary processes for 3G GSMprocessing.

FIG. 36 illustrates at block 3610 the detected signal is decoded. Atblock 3620, a determination is made whether the detected signal has beensuccessfully decode. If not, then processing continues to block 3622,where re-direct 3G processing is performed. At block 3630, a controlchannel signal is transmitted to the wireless device to command thewireless device to operate in a lower protocol mode (e.g., 2G). At block3632, the output power of the pseudo station is maintained in order tore-capture the wireless device using a lower protocol.

However, if the signal is decodable, then processing continues at block3640, wherein an identification of the wireless device is made based oninformation of the signal or within the signal. At block 3462, adetermination is made regarding allowability of the wireless device andat block 3644 processing is directed to 3G allowable processing (block3660) for allowed signals and to 3G non-allowable processing (block3670) for non-allowable signals.

FIG. 36B illustrates a flow chart of an exemplary 3G re-directprocessing (block 2622) wherein the detection of the 3G signal is loggedat block 3624 and a protocol command is established which directs thewireless device to operate at a lower protocol (e.g., 2G) at block 3626.

FIG. 36C illustrates a flow chart of an exemplary 3G non-allowedprocessing (block 3670) wherein at block 3672, the wireless device is inone aspect of the invention, held on to the current channel andprevented from connecting to the base station. In another aspect of theinvention, the wireless device is directed (i.e., re-directed) to a newhold channel. The new hold channel may be one that is not used by thebase station. At block 3674, a current power output of the pseudostation is maintained in order to prevent the wireless device fromaccessing or connecting to the base station. At block 3676, 2Gnon-allowed processing (block 3550) is performed in order to monitor andmanage the activity of the detected device.

FIG. 36D illustrates a flow chart of an exemplary 3G allowed processing(block 3660). In this illustrated processing, allowed 3G processingdetermines an open or available channel at block 3661. At block 3662 adetermination is made regarding a type of processing to be performed. Ina first aspect, processing may continue to block 3664, where thewireless device is left on its current channel and the output power ofthe pseudo base station is lowered for a predetermined time. This causesthe wireless device to lose contact with the pseudo base station andattempt to re-establish contact. In this case the wireless devicedetects the power of the base station as being the highest and connectsdirectly to the base station. After the predetermined time has expiredthe output power of the pseudo base station is again raised to begreater than that of the base station in the area of interest.

Alternatively, the open channel may be associated with a Femto cell aspreviously discussed, and at block 3666, the wireless device receives are-direct command to operate on the Femto cell open channel. Are-authorization of the devices on the Femto cell channel is again madeto insure the devices on the Femto cell channel(s) are allowed devices.

In a further alternative aspect, the allowed wireless device may betransferred to a MSC, which backhauls the wireless device to anappropriate commercial carrier to accept the wireless device at block3668.

FIG. 37 illustrates a flow chart of an exemplary process associated with4G GSM processing (block 3466). As shown, 4G GSM processing is similarto 3G GSM processing and processing continues to block 3464.

FIG. 38 illustrates a flow chart of an exemplary process associated withCDMA (2G/3G) processing (block 3472). In this illustrated processing,the detected signal is decoded at block 3805. At block 3810 adetermination is made whether the signal was decodable. If not thenprocessing continues to block 3815, wherein processing similar to 3G GSMnon-decodable signal processing is performed (i.e., NO branch at step3620). However, if the signal is decodable, then processing continues toblock 3820, wherein processing similar to 3G decodable signal processing(i.e., YES branch at step 3620) is performed.

FIG. 39 illustrates a flow chart of an exemplary process associated withLTE processing (block 3474) wherein LTE processing is similar to 4G GSMprocessing 3466.

In another embodiment of the invention, where the commercial carrier(s)does not provide non-encryption based carrier channels such as CDMAand/or GSM protocol, and the Managed Access system is required toprovide an authorized cell phones capacity, there is presented severalchallenges: 1) determining whether the handset is authorized and/orunauthorized, choosing the methodology of providing the handset aconnection to the carrier channel, 2) determining the methodology toverify and prevent unauthorized handset for getting on an authorizedcarrier channel; 3) preventing an unauthorized headset from dialing 911and hopping on an authorized channel and the like.

In an embodiment of the invention available to connect the handset tothe commercial carrier, (1) re-directing the authorized Handset to aFemtocell, where the encryption key process is performed by thecommercial carrier system via the IP base connections to the MACROswitch.

In this embodiment of the invention to utilize the Femtocell solutionrequires providing an authorized list to the Femtocell, and wherenecessary, disabling the 911 feature so that an unauthorized phonedoesn't inadvertently find the femto cell channel and utilize the femtochannel to facilitate a call.

In an embodiment of the invention to verify authorized cell phone and toprovide the ability to make a call and/or receive a call via 3G/4Gtechnology with an encrypted base hand set, the methodology includesproviding the encryption keys (K1) to the MAS system, by connecting theauthorized handset to the commercial carrier via MAS MSC to Telco MSCand/or via a connection to carrier connection and the like.

In an embodiment of the invention, utilizing the commercial carrier's KIkeys to authorize and authenticate the handset by, (transferringencryptions keys (Ki)) from the commercial carrier's network though theMAS network via a (MAS MSC, -TELCO MSC) and/or connecting to a specificcommercial carrier channel, authenticating the handset, verifying theauthorized functionality of the handset then utilized the mythologiessuch as sweeping the UMTS and/or LTE channel, Up/down signalmethodology, transferring said handset to an open TELCO channel (UNDERthe MAS) then at a set interval, raising the MAS power on that(authorized) Commercial channel with a MAS like Channel and thenverifying all handsets on said channel are all authorized, if anunauthorized handset is found, move the unauthorized handset to theUMTS/LTE hold channel then release the channel back to the MACRO bylowering the power on the MAS channel covering the “Authorized channel”and then process the authorized handset accordingly and the like.

In an embodiment of the invention, setting parameter of the protocolsprovide a methodology to hold on to an unauthorized handset under theMAS, these include but are not limited to setting neighbor list orvoiding out neighbor lists, setting GSM speech setting or not settingTCH and PDCH to dynamic mode, setting BTS for four dedicated TCHchannels and three dynamic setting the TCH/PDCH channels, setting theLAC-RAC setting the BSIC, setting the RxLevMin level, setting thePenalty Time and setting the Cell Reselect Hysteresis setting and thelike.

In an embodiment of the invention, to eliminate the issuance of KPI'sand dropped call and Missing Neighbors, setting the commercial carrierparameters to a Roaming carrier and/or test carrier channel settingwhich is not on the commercial carrier channel and not a legitimate incall handoff will remove the issuance of KPI's and dropped call andMissing Neighbors alert and the like.

The challenge in capturing cell phones and/or other wirelesscommunication devices, is covering all the channels of the TELCO (i.e.,Telecommunication Company, Commercial Carrier, Mobile CommunicationProvider, etc.), on each of their broadcasting frequency bands and beingable to communicate and attract each a cell phone to a Management AccessSystem (i.e., MAS) in accordance with the principles of the invention.

Currently all handsets or mobile devices have the capability tocommunicate on a plurality of protocols; some requiring encryption keysand some which do not require encryption keys. For example onetechnology referred to as GSM (Global System for Mobile communications,is utilized by carriers such as ATT and T-mobile and a secondtechnology, referred to as CDMA is utilized by carriers, such asVerizon, Sprint, US cellular and C-Spire. AT&T and T-Mobile cell phoneshave the ability to communicate as a 2G Phone using the GSM Protocol(2G), a 3G Phone using the UMTS protocol (3G) and also as a 4G phoneusing the LTE protocol (4G). Verizon, Sprint, Us Cellular and C-spirecell phones have the ability to communicate as a 2G/3G Phone using theCDMA Protocol and as a 4G phone using the LTE Protocol.

The challenge and this invention lays out a set of methodologies andprocesses which allows the MAS system to attract, capture, and controlall cell phones within a specific geographical area on all frequencybands, covering all protocols on all carrier channels, with and withoutthe use of encryption keys, while providing authorized and 911 calls andmonitoring all unauthorized calls.

In an embodiment of the invention, for each given protocol/standard(e.g., second generation (2G), third generation (3G), fourth generationLTE and/or UMTS(4G)), utilized by the common or commercial carriers(e.g., Verizon, T-Mobile, Sprint, AT&T) depending on the preference ofthe client, a specific methodology is used to process and control amobile device or handset.

In the invention shown in FIGS. 40 and 41 exemplary processingassociated with the detection, capture and authorization processassociated with specific commercial carriers and allocation of carrierchannels are shown. In these exemplary embodiments of the invention,redirection to MAS (Mobile Access System) channels, playback coveragechannels, blocking channel, backhaul and switching methodologies ofauthored and unauthorized handsets are further shown.

For example, for a Code Division Multiple Access (CDMA) technology,which is currently used by commercial carrier such as Verizon andSprint, for the capture of a 2G/3G/4G capable cell phones (see FIG. 40,4000), the system in accordance with the present invention (hereinafterreferred to as a Managed Access System (MASK, transmits a dominatesignal strength of the control channel associated with the commoncarrier, wherein the dominate signal strength has generally a receivedsignal strength within a designated area that is at least 7 db greaterthan the signal strength provided by the commercial carrier within thedesignated area. In addition, the MAS provided signal provides a betterEc/Io (Energy carrier/interference) characteristic depending on theparameter set by the specific CDMA commercial carrier. In accordancewith the principles of the invention, a handset or mobile device withinthe designated area is under the coverage of the MAS and is attracted tothe a pilot channel (e.g., 384), wherein the MAS detects the handset andcommunicates and connects the handset to the MAS 384 radio. The MASdetermines whether the handset is an authorized or unauthorized handset.If the handset is unauthorized, the MAS directs the handset to a secondchannel. In an exemplary embodiment of the invention, the second channelmay represent channel 507. The detected or captured handset is thenmonitored for any activity. In dependence upon the regulations imposedby the FCC (Federal Communication Commission, Federal and State lawsregarding communications and/or customer requirements, the MAS providesan audio message of all attempted voice calls and an SMS (Small MessageService) message response for every message attempted. The MAS may alsoprovide a connection to the PSAP—(Public Service Answer Points) via aSIP and/or a redirection to the MACRO (e.g., a base station associatedwith a commercial carrier) to complete a 911 call. In specific cases,the MAS may limit the number of 911 attempts (FIG. 40, 4055, 4060, 4065,4070, 4075, 4080)

In the exemplary embodiments shown in FIG. 40, if the handset isdetermined to be authorized, (4020) the hand set is directed to stay onor move to channel 384 (4025) and the transmitted power associated withthe 384 channel is lowered (4030) to a value such that the receivedsignal strength within the designated area is lower the received signalstrength associated with the commercial carrier. This allows the handsetto attach to the signal provided by the commercial carrier, as thecommercial carrier signal strength in the area is greater than the powerof the MAS in the area. (4035) In another aspect of the invention, theauthorized feature can also be connected to the Macro via a SIP (SessionInitiation Protocol) connection, can be redirected via a femto call orto a back haul switch via to the commercial carrier. The authorizeddetermination can be redundantly checked, via a femto cell systemparameter or by the commercial carrier HLR/VLR (Home LocationRegister/Visitor Location Register).

In a preferred embodiment of the invention the MAS provides a radio seton a frequency and parameter of the commercial carrier, and/or setup toattract all handsets of a specific carrier and/or protocol/standard tocover the LTE (4G)/UMTS (3G) channel(s) of the commercial carrier. Inthis aspect of the invention, the MAS are connected to the commercialcarrier's database to obtain the encryption keys to communicate with thehandset attracted to the MAS. Alternatively, the MAS is provided a setof encryption keys of the phones identified to be under the MAS coveragearea (4015). If the handset is determined to be authorized the handsetmay be redirected (4045) to the commercial carrier radio channel, orredirected to the commercial carrier network via a switch or via a femtocell channel or via a MSC (Mobile Switching System) to MSC (MobileSwitching System) interconnection or via a SS7 (Signalling System No. 7)switch or similarly known conventional transfer means. If the handset isdetermined to be unauthorized, the handset is held on the capturechannel or moved to a hold channel to maintain control of the handsetand to monitor its attempted activities. In another embodiment of theinvention, where the encryption keys are not provided or available, theMAS provides a radio transceiver on the frequency and parameter of thecommercial carrier, and setup to attract all handset of a specificcarrier and/or protocol/standard to cover the LTE (4G) channel(s) of thecommercial carrier, however, without encryption keys, the LTEcommunication handshake cannot be accomplished, and the MAS will thenre-direct the handset to a lower protocol (4050) which does not requireencryption keys to communicate. In a preferred situation the handset,even without encryption keys provides its ESN and/or Pseudo ESN and/orIMSI and the authorized/unauthorized determination can be made. In sucha case the authorized handsets can be redirected to the commercialcarrier radio channel, or redirected to the commercial carrier networkvia switch or via a femtocell channel or via a MAS MSC (Mobile SwitchingCenter) to Commercial Carrier MSC (Mobile Switching Center)interconnection or via similarly known conventional transfer means. Insuch a case, If the handset is determined to be unauthorized, thehandset will be redirected to a CDMA protocol that does not requireencryption keys and is held on the capture channel and/or moved to ahold channel to maintain control of the handset and to monitor itsattempted activities.

If the MAS possesses the ability to communicate with the handset via theencryption keys, the MAS can hold the handset on the channel it hasacquired by redirecting the handset to operate an a designated channelthat lacks any ability to communicate with a commercial carrier (i.e., ahold channel). The hold channel may be a channel that is not associatedwith the commercial carrier, for example. When the mobile device isoperating on the hold channel, the communication activity of the handsetmay be monitored to determine factors such as number being called,content of voice message, recording of text message, etc.

In a situation in which the encryption keys were not provided to theMAS, the handset can be redirected to a different standard/protocol(e.g., 3G to 2G) (4050) and reacquired with the protocol of a 2G system.In this case the communication of the handset may be monitored on achannel, using a protocol, in which the handset can communicate with theMAS. See FIG. 40.

In an embodiment of the invention, shown in FIG. 41 processing stepsassociated with the MAS to control of 2G (GSM), 3G (UMTS, W-CDMA) and 4G(LTE) protocol capable handsets are shown. In these exemplaryembodiments, one modification from the previously discussedmethodologies is to provide a dominant GSM channel (dominant in theterms of greater received signal strength in a designated area) anddetect, capture and attract all handset within the designated area ontothe GSM control channel. Processing steps similar to those previouslydescribed with regard to authorization (allowed, not allowed), numberdetermination (911), etc. are performed to manage and monitorunauthorized/and authorized handsets and the like. As discussedpreviously, when the MAS has the encryption keys for the handsetsassociated with the commercial carrier and the protocol employed by thecommercial carrier, the MAS has the ability to communicate with thehandsets, the MAS controls the handsets on channels it has the abilityto communicate with. FIG. 41 illustrates the exemplary processingassociated with an authorized connection methodology associated with acommercial carrier and also processing associated with an emergencynumber (i.e., 911) connection methodology including landlineconnections, for example.

Thus, in accordance with the principles of the invention, where the MASis covering UMTS channels and the encryption keys are not available, theUMTS handsets are actively pushed to a 2G GSM channel of the MAS forprocessing (4120, 4130), and as previously discussed in situations inwhich the IMSI and IMEI is obtained, and the authorized handset aredetermined, the authorized handsets can be redirected to the commercialcarrier radio channel, or redirected to the commercial carrier networkvia switch or via a femtocell channel or via a MAS MSC (Mobile SwitchingCenter) to Commercial Carrier MSC (Mobile Switching Center)interconnection or via similarly known conventional transfer means.However, If the handset is determined to be unauthorized (4120), thehandset will be redirected to a GSM protocol which does not requireencryption keys and is held on a capture or hold channel and/or moved toa hold channel to maintain control of the handset and to monitor theattempted activities of the handset (4125).

Returning to the embodiments of the invention described in FIGS. 34-39,these figures describe and outline the exemplary processing associatedwith the detection, capture and control of handset depending of theparameters set forth by the underlying commercial carrier (e.g.,Verizon, AT&T) and/or set forth by law and regulation. These figuresdescribe and outline some of the aspects of the MAS system includingdetection, handshake, band identification, carrier identification,processes depending and Commercial Carrier network core implementation,encryption setup and deployment parameters, protocol and handsetcharacteristics and standards.

Referring again to FIG. 34, FIG. 34 illustrates exemplary processingsteps in accordance with an embodiment of the invention to detect,capture and control a wireless communication device. (3400). At step3410, a signal transmission is detected. At step 3420, identification ofthe signal and the signal bandwidth of the transmission is determined.At step 3430, the processing determines the type of protocol of thetransmission (e.g., 2G, 3G, 4G, LTE, UMTS). At step 3440, the processingidentifies the commercial carrier based on the bandwidth type. At step3430, the processing determines the process path depending on thecarrier type. At steps 3462, 3264, 3466, 3472 and 3474 the processingdetermines, which of a plurality of commercial carrier/protocol specificprocessing steps is to be employed in order to continue processing thedetected signal transmission from the wireless communication device.

Referring again to FIG. 35A, FIG. 35A illustrates exemplary processingsteps in accordance with an embodiment of the invention to capture andcontrol a wireless communication device operating using a 2G protocol.In this exemplary aspect of the invention, step 3510, the processingdecodes the signal to obtain characteristics of the transmission signaland of the wireless transmission device that may be included within thetransmission signal. At step 3520, the processing determines theidentification of the wireless communication device (mobile device,handset, etc.) based on the signal information transmitted in thetransmission signal. At step 3525, the processing determines theallowability of the wireless communication device. The allowablity ofthe device depends on a set of pre-determined parameters as has beenpreviously described. At step 3530, the processing determines a next setof step of processing steps depending on the determined allowability ofthe wireless communication device. At step 3535, for example, processingassociate with allowable 2G wireless communication device is initiated(refer to FIG. 35B). At step 3537, the processing determines a channelupon which the wireless device may be re-directed to so that the devicemay communicate with the associated commercial carrier (i.e., Macro).However, if the processing indicates that the device is not allowed,then processing is directed to step 3550 wherein the non-allowable 2Gprotocol is initiated (refer to FIG. 35C). At step 3580, the processingperforms steps to retain control of the device by providing controlsignals to direct the device to operate on a hold channel or maintainthe signal power at a current power level to prevent the device fromconnecting to the commercial carrier or provide commands to the deviceto alter the ability of the device to transmit any information.

Returning to FIG. 35B, FIG. 35B illustrates exemplary processing stepsin accordance with an embodiment of the invention to capture and controla wireless communication device for a allowed 2G processing. In thisexemplary aspect of the invention, an open or available channel isdetermined at step 3536. At step 3538, a determination is made regardinga particular processing to perform is made. Based on the desiredprocessing the wireless device may be directed to the open channelassociated with the commercial carrier (step 3540), redirected to theopen channel of a Femto cell associated with the MSC (step 3544)), orassigned to be directed to a backhaul switch that may be associated withthe MSC (step 3548).

Returning to FIG. 35C, FIG. 35C illustrates exemplary processing stepsin accordance with an embodiment of the invention to capture and controla wireless communication device for a non-allowed 2G processing. In thisexemplary aspect of the invention, step 3550 starts the non-allowable 2Gprocess, wherein at step 3552, the processing initiates a monitoring andmaintaining process of the 2G held device, wherein the communication ofthe device may be recorded and/or managed. At step 3554, the processingdetermines the attempted activity of the wireless communication device(e.g., voice, text, emergency call). At step 3556, processing isdirected based on the type of communication or action being attemptedthe wireless communication device. That is the communication or actionmay be one of: an attempted voice call, an attempted 911 call and anattempted text call (e.g., data call, data push attempt, and applicationconnection attempt). At step 3558 processing directs and connects thewireless communication device to a PBX servicer to record thecommunication and receive a recorded message regarding the attemptedvoice communication. At step 3560, the processing records the receivedtext message and provides a text response to the wireless communicationdevice in response to the attempted text message. At the processingdetermines a number of attempted 911 calls and redirect the processingto determine a number of 911 call attempts. At step 3564, the processingdetermines whether the number of 911 call attempts exceeds a designatedvalue (e.g., 5) and directs the wireless communication deviceaccordingly. At step 3566, the number of 911 attempts is less than thelimit, thus, the processing connects the wireless communication deviceto a landline connection for subsequent connection to a local PSAP 911operator. Otherwise at step 3568, the processing marks the wirelesscommunication device as attempting too many calls as black listed andproceeds with a set of instruction set for wireless communicationdevices that are blacklisted. For example, the wireless device may beinhibited to make 911 for a predetermined period of time (e.g., a day).Alternatively, the number of 911 calls may be monitored on a per timebasis wherein the limit is based on a per time bases (e.g., number of911 attempts/hour, or /day).

Returning to FIG. 36A, FIG. 36A illustrates exemplary processing stepsin accordance with an embodiment of the invention to capture and controla wireless communication device, wherein at step 3464 3G protocolprocess is initiated. At step 3610, the processing decodes the 3Gwireless transmitted signal. At step 3620, the processing determineswhether the signal is decodable and also determine whether the systemcan properly communicate with the wireless communication device. Theprocessing redirect the wireless communication device accordingly. Atstep 3622, the processing re-direct the 3G capable wirelesscommunication device to a decodable protocol and also to a protocol thatallows for the proper communication capability with the wirelesscommunication device. Furthermore, the system at step 3630 directs towireless communication device to a proper communication capable protocol(e.g., to a lower protocol like a 2G un-encrypted protocol). At step3632, the processing sets and or maintains the signal level of there-directed channel to a power level and/or signal setup wherein thewireless communication device is connected to the new channel. At step3640 the processing determines an Identification of the wirelesscommunication device based on the decoded information. At step 3642 theprocessing determines the allowability of the wireless communicationdevice depending on a pre-determined set of parameters. At step 3644 theprocessing determines the allowability of the wireless communicationdevice and redirects the processing according to the determinedallowability. At step 3660 the processing starts the 3G allow processing(FIG. 36B). At step 3670 the processing starts the 3G non-allowprocessing (FIG. 36C).

Returning to FIG. 36B, FIG. 36B illustrates exemplary processing stepsin accordance with an embodiment of the invention to, wherein, at step3622, the processing starts the re-direct process of a 3G Protocolwireless communication device that cannot be decoded. At step 3624, thesystem log the 3G detection and at step 3626 sets the protocol to a 2Gwireless communication device.

Returning to FIG. 36C, FIG. 36C illustrates exemplary processing stepsin accordance with an embodiment of the invention wherein at step 3670the 3G non-allow process is initiated. At step 3672 the processingdetermines hold channel parameters and preferences. That is the channel,not available to the commercial carrier, that the wireless communicationdevice should be held or, alternatively, re-directed to a new holdchannel based on the system configuration. The processing furtherdetermines on which channel to keep a non-allowed wireless communicationdevice, depending on a pre-determined set of parameters. Thepre-determined parameters may include channel capacity, wirelesscommunication device location, wireless communication device ownership,wireless communication device relationship to another wirelesscommunication device and the like. At step 3674 the processing determinethe proper signal parameters to maintain control of the wirelesscommunication device. At step 3637 the processing performs theprocessing of the 3G wireless communication device, similar to the stepsfor processing a 2G wireless communication device which is also notallowed.

Returning to FIG. 36D, FIG. 36D illustrates exemplary processing stepsin accordance with an embodiment of the invention wherein at step 3630,s 3G allow process of wireless communication device is initiated. Atstep 3661 the processing determines a proper allowable channel andprocessing the wireless communication device so that it may (in thisexample make and receive call, text messages and data). At step 3662,the processing outlines three possible processes for the wirelesscommunication device to achieve a connection with the commercial carriersuch that the wireless device may make and receive voice communication(calls), text messages and data. At step 3664 the processing leaves thewireless communication device on the current channel and lowers thesignal parameters to allow the wireless communication device tocommunicate with an available channel associated with the commercialcarrier. For example, the power may be lowered for a set of period oftime, which is set to be long enough for the wireless communicationdevice to acquire communication with the commercial carrier channel andshort enough so that non allowed wireless communication devices areretained captured and/or be recaptured and re-directed to theappropriate hold channel as previously described. At step 3666 theprocessing re-directs the wireless communication device to a Femto cellchannel, and in this example, the Femto cell may be set to re-authorizethe wireless communication device according to pre-determined set ofparameters, to insure that a non-allowed wireless communication deviceis not inadvertently allowed to continue communication with heauthorized Femto cell channel. At step 3668 the processing transfers thewireless communication device via the MSC and/or the SS7 connectionsthrough the Telco switch and allows the macro connection to thecommercial carrier and the like.

Returning to FIG. 37, FIG. 37 illustrates exemplary processing steps inaccordance with an embodiment of the invention wherein at step 3466, 4Gprocessing of wireless communication device is initiated. The 4Gprocessing performs processing similar to that of 3G processing,previously described. 4G protocol utilizes parameters and protocolsassociated with the 46 protocol. However, the processing is similar tothat of 3G.

Returning to FIG. 38, FIG. 38 illustrates exemplary processing steps inaccordance with an embodiment of the invention wherein at step 3472 CDMAprocessing of wireless communication device is initiated. Asillustrated, 3G processing performs a similar processing as previouslydescribed with 3G processing. In this case, 3G CDMA protocol processingincludes its own set of pre-determined parameters, including, forexample, encryption capabilities and the like. At step 3805 theprocessing attempts to communicate and decode the wireless communicationdevice. At step 3810, the processing determines the decodability of thewireless communication device. At step 3815, the processing performs the2G GSM/3G UMTS signal processing, as previously described, with regardto non-decodable wireless communication device. At step 3820, theprocessing, performs the 2G GSM/3GUMTS signal processing, as previouslydescribed, for a decodable wireless communication device.

Returning to FIG. 39, FIG. 39 illustrates exemplary processing steps inaccordance with an embodiment of the invention wherein at step 3474,CDMA 4G LTE processing is initiated. As illustrated 4G processingperforms similar processing as that of the 4G GSM based processingand/or the 3G UMTS (W-CDMA) utilizing its owns set of pre-determinedparameters and the like, including for example encryption capabilitiesand the like. At step 3476 the processing performs the same steps forthe CDMA base 4G LTE processes as was performed on a 4G GSM basedwireless communication device, as previously described.

It is expressly intended that all combinations of those elements thatperform substantially the same function in substantially the same way toachieve the same results are within the scope of the invention.Substitutions of elements from one described embodiment to another arealso fully intended and contemplated. For example, while the term “cellphone” or “transmission facility”, “transmission device”, “mobiledevice”, “handset”, have been used herein, such terms relate to ageneral class of wireless transmission devices that includes standardcell phones, smart phones (e.g., PALM CENTRO), and iPhones. PALM is aregistered trademark and CENTRO is a trademark of the Palm Inc.,Sunnyvale, Calif., iPhone is a registered trademark of Apple Inc.Cupertino, Calif.

Other variations to the disclosed embodiments can be understood andeffected by those skilled in the art in practicing the claimedinvention, from a study of the drawings, the disclosure, and theappended claims. In the claims, the word “comprising” does not excludeother elements or steps, and the indefinite article “a” or “an” does notexclude a plurality. A single processor or other unit may fulfill thefunctions of several items recited in the claims. The mere fact thatcertain measures are recited in mutually different dependent claims doesnot indicate that a combination of these measured cannot be used toadvantage.

The term “comprises”, “comprising”, “includes”, “including”, “as”,“having”, or any other variation thereof, are intended to covernon-exclusive inclusions. For example, a process, method, article orapparatus that comprises a list of elements is not necessarily limitedto only those elements but may include other elements not expresslylisted or inherent to such process, method, article, or apparatus. Inaddition, unless expressly stated to the contrary, the term “or” refersto an inclusive “or” and not to an exclusive “or”. For example, acondition A or B is satisfied by any one of the following: A is true (orpresent) and B is false (or not present); A is false (or not present)and B is true (or present); and both A and B are true (or present).

While there has been shown, described, and pointed out fundamental andnovel features of the present invention as applied to preferredembodiments thereof, it will be understood that various omissions andsubstitutions and changes in the apparatus described, in the form anddetails of the devices disclosed, and in their operation, may be made bythose skilled in the art without departing from the spirit of thepresent invention.

It is expressly intended that all combinations of those elements thatperform substantially the same function in substantially the same way toachieve the same results are within the scope of the invention.Substitutions of elements from one described embodiment to another arealso fully intended and contemplated.

Any reference signs in the claims should not be construed as limitingthe scope of the claims or the invention described by the subject matterclaimed.

What is claimed is:
 1. A system for managing a wireless devicecomprising: a transmitting system configured to: transmit a signal at asignal power such that a received signal power within a designated areais greater than a received signal power associated with a commercialcarrier associated with said designated area; a receiving systemconfigured to: receive a signal transmitted by the wireless device,wherein said higher signal power causing said wireless device to attachto said system; and a processing system configured to: receive thesignal received by the receiving system; determine at least onecharacteristic value from the received signal; determine a signal modeof operation of the wireless device from the determined at least onecharacteristic value; determine whether the received signal is decodableon information available to the system; when said signal is determinednot decodable: retain said signal power; provide instruction to thewireless device, wherein said instruction causing said wireless deviceto change a current communication protocol associated with thedetermined signal mode of operation of the wireless device to a secondcommunication protocol associated with the determined signal mode ofoperation of the wireless device, receive signals subsequentlytransmitted by the wireless device, utilizing the second communicationprotocol; decode the signals subsequently transmitted by the wirelessdevice utilizing the second communication protocol using informationavailable to the system; determine an allowability of the wirelessdevice to continue transmission based on said decoded signals; anddetermine a processing for allowing continued transmission of thewireless device.
 2. The system of claim 1, wherein the signal mode ofoperation may be one of: 2G, 3G, 4G, GSM, TDMA, GPRS, CDMA, CDMA2000-1×,EDGE, UMTS, GPRS, 802.xx, and LTE.
 3. The system of claim 1, wherein thecommunication protocol may be one of: 2G, 3G, 4G, GSM, TDMA, GPRS, CDMA,CDMA2000-1×, EDGE, UMTS, GPRS, 802.xx, and LTE.
 4. The system of claim1, wherein the step of determining whether the signal is decodablecomprises: determining whether the received signal is encrypted; anddetermining whether the information available to the system comprisesencryption keys suitable for decoding the encrypted received signal. 5.The system of claim 4, wherein the encryption keys are provided by saidcommercial carrier.
 6. The system of claim 4, the processing systemconfigured to: provide instruction to the wireless device to cause thewireless device to operate on the second communication protocolassociated with the signal mode of operation when the received signal isdetermined to be encrypted and the encryption keys are not available. 7.The system of claim 1, the transmitting system further configured to:lower said signal power of the transmitted signal for a predeterminedtime when the wireless device is determined to be allowable.
 8. Thesystem of claim 1, the processing system configured to: provideinstruction to the wireless device to cause the wireless device tooperate on a hold channel when the received signal is determined not tobe allowed, wherein the hold channel is one of: an unused commercialcarrier channel and a channel not available to the commercial carrier.9. The system of claim 1, the transmitting system configured to:maintain the transmitted signal power when the wireless device isdetermined not to be allowable.
 10. The system of claim 1, whereinallowability is determined based on at least one of: a location of thewireless device and a registered identification of the wireless device.11. The system of claim 1, wherein said at least one characteristicvalue is a least one of: a unique identifier, a frequency, a type, atime of arrival (TOA), an IMEI, a channel, a subscriber ID, MSISDN, anElectronic Serial Number (ESN), a Mobile Identification Number (MIN), amobile equipment identifier (MEID), an IMEI, an event notification, aprocessed information, and a device information.
 12. The system of claim1, the processing system configured to: provide instruction to thewireless device to cause the wireless device to operate on a holdchannel when the wireless device is determined not to be allowed,wherein the hold channel is a least one of: a femtocell channel, anunused commercial carrier channel, an unused local network channel, aused local network channel, a channel not available to the commercialcarrier, a commercial carrier channel and a channel associated with saidsystem.
 13. The system of claim 1, the processing system configured to:provide instruction to the wireless device to cause the wireless deviceto operate using the second communication protocol of the signal mode ofoperation when the signal is determined not to be decodable and theencryption keys are not available, wherein the second communicationprotocol having a lesser communication capability than said currentcommunication protocol.
 14. The system of claim 1, wherein allowabilityis based on at least one of: a location, a time, a length of time, anumber called, a person called, a person calling, said characteristicvalues, a voice recognition identification, a biometric identificationand a registered identification.
 15. The system of claim 1, theprocessing system configured to: monitor activity of the wirelessdevice, wherein the activity is at least one of: a call, a chat, anemail, a data transfer, a connection to a second number, executing anemail, accessing the web, an IP chat, a specific data packet, an alert,a request, an inmate services request, an inmate communication request,an education function, a call request, and an inmate program request.16. The system of claim 1, the processing system configured to: monitorchanges in parameters associated with a central station.
 17. The systemof claim 16, the processing system configured to: provide instruction tothe wireless device to cause modification of parameters associated witha central station when changes are detected.
 18. The system of claim 1,the processing system configured to: provide instruction to the wirelessdevice to cause modification of parameters of said wireless device, saidmodified parameters causing at least one of: changing features,disabling features, modifying features, modifying capabilities,uploading software, reprogramming capabilities, and reprogrammingfeatures.
 19. The system of claim 1, the processing system configuredto: provide services, via said wireless device, said services comprisingat least one of: scheduling services, commissary services, inmate phonesservices, medicine distribution services, vending machines services, GEDservices, rehabilitation services, education services, and medicalservices.
 20. The system of claim 19, wherein said inmate phone servicescomprising at least one of: a monitoring of a wireless device service, ascheduling of a wireless device service, a call forensic service, aninmate phone functionality service, a call routing service, an inmatephone payment service, and an inmate communications control service. 21.The system of claim 1, the processing system configured to: determine anidentification of a user of said wireless device, said determinationincluding at least one of: a facial recognition, a voice recognition, abiometric identification, a fingerprint, a renal eye scan, and a CCTVidentification.
 22. The system of claim 1, said processing systemconfigured to: determine at least one of: a frequency band, a handshakeprotocol, a carrier channel, a communication protocol, access pointcharacteristics, characteristics of a commercial base station,components of a commercial base station, characteristics of the basestation, capabilities of the base station, hand shake protocols of thebase station, unique identifiers of a cell tower associated with thebase station, identification of a cell tower's channels, a signalstrength, a parameter of said tower, a cell/sector coverage, atransceiver power, a channel coverage, a frequency priority, a bandwidthof a received communication signal; a type of communication protocol andparameters associated with the received communication signal.
 23. Thesystem of claim 1, wherein said processing for allowing continuedtransmission of the wireless device comprises at least one of: connectto a femto cell, connect to an inmate phone system, connect to a landline switch, connect to a PBX system, connect to a T1 Line, connect to acommercial carrier switch, connect to a carrier, connect to an Open“authorized” channel, via a wireless communication protocol (802.xx),connect to an IP backhaul, connect to a VOIP backhaul, connect to a Picobase station communications portal backhaul, connect to an access point,connect to a cellular connection, connect to a wireless conduit, connectto a wire line connection, connect to a switch set, connect to straightbackhaul to the switch, connect to a service-provider gateway, connectto a commercial carrier gateway, connect to a wireless communicationsnode, connect to a WiFi access point, connect to a cellular connection,connect to a wireless conduit, connect to a switch set, perform astraight backhaul to the switch.