Systems and Methods for Detecting and Controlling Transmission Facilities

ABSTRACT

A method of detecting, controlling and managing transmission of a transmitting device within a facility is disclosed. The method involves transmitting information to the transmission device, detecting a response transmission from the transmission device by a least one transmission detection facility, extracting identification information associated with the transmission device in response to the transmitted information; and determining a location of the transmission device based on the response transmission received by the at least one received transmission detection facility, wherein the response transmissions are sorted by the identification information, determining an allowability of the located transmission device with the set area and interacting and manipulating transmission of the detected transmitting device

CLAIM OF PRIORITY

This application claims the benefit of the earlier filing date, pursuantto 35 USC 1120, as a continuation to that

patent application entitled “System and Method of Detection ofTransmission Facilities,” filed in the United States Patent andTrademark Office on Aug. 28, 2010 and afforded Ser. No. 12/870,808 (nowUSP), which claimed the benefit of the earlier filing date, pursuant to35 USC §120, as a continuation-in-part to that

patent application entitled “System and Method of Detection ofTransmission Facilities,” filed in the United States Patent andTrademark Office on Jul. 27, 2009 and afforded Ser. No. 12/510,036,which claimed the benefit of the earlier filing date, pursuant to 35 USC§120, as a continuation-in-part to that

patent application entitled “Systems and Methods of DetectionTransmission Facilities,” filed in the United States Patent andTrademark Office on Jul. 14, 2006 and afforded Ser. No. 11/457,786, (nowU.S. Pat. No. 8,078,190) which claimed the benefit of the earlier filingdate, pursuant to 35 USC §119, of

U.S. Provisional App. No. 60/699,281 filed on Jul. 14, 2005 and

U.S. Provisional App. No. 60/739,877 filed on Nov. 23, 2005 and furtherclaims the benefit of the earlier filing date, pursuant to 35 USC 119,to

U.S. Provisional App. No. 61/237, 682, entitled “Method and System forDetermining a Location and Tracking of a Wireless Device,” filed on Aug.28, 2009 (BINJ-P-0106) and to

U.S. Provisional App. No. 61/264,838, entitled “System and Method ofDetection and Allowing Access of Transmission Facilities, filed on Nov.30, 2009 (BINJ-P-0108) and to

U.S. Provisional App. No. 61/307,838, entitled “System and Method forCapturing and Controlling Transmission Devices,” filed on Feb. 24, 2010(BINJ-P-109). The entire contents of all of which are incorporated byreference, herein.

The application further claims the benefit of the earlier filing date,pursuant to 35 USC §120, as a continuation-in-part to that

patent application entitled “Wrist Band Transmitter,” filed in theUnited States Patent and Trademark Office on Sep. 2, 2008 and affordedSer. No. 12/231, 437, which claimed the benefit of the earlier filingdate, pursuant to 35 USC §120, as a continuation-in-part to that

patent application entitled “Tracking and Determining a Location of aWireless Transmission,” filed in the United States Patent and TrademarkOffice on Jun. 11, 2008 and afforded Ser. No. 12/157, 530, which claimedthe benefit of the earlier filing date, pursuant to 35 USC §120, as acontinuation-in-part to that

patent application entitled “Systems and Methods of DetectionTransmission Facilities,” filed in the United States Patent andTrademark Office on Jul. 14, 2006 and afforded Ser. No. 11/457,786 (nowU.S. Pat. No. 8,078,190), the entire contents of all of which areincorporated by reference, herein.

BACKGROUND

This invention relates to the field of wireless transmission and moreparticularly to determining a location of a wireless transmission deviceand controlling its use and tracking its movements.

There are many facilities, such as government buildings, and inparticular correctional facilities, such as prisons, that do not permitcellular phone usage or wireless transmission devices on the premises oreven possession of cellular phones within the premises. Finding andpreventing usage of cell phones and other transmission facilities isdifficult, and a need exists for improved methods of detecting,locating, and managing the transmission of such devices.

SUMMARY OF THE INVENTION

Provided herein are methods and systems for locating transmissiondevices (or transmission facilities) such as cellular phones, cellphones, mobile phones, satellite phones, radios, transmitters, PDAs,beepers, pagers, walkie-talkies, email devices, instant messengerdevices, voice over IP devices, and other types of wirelesscommunication or transmission facilities whose possession is prohibited.In addition, control of the devices is important as such wirelessdevices are known to be used to detonate bombs, as in the case ofimprovised explosive devices. The methods herein are also to positivelyidentify, locate and track individuals with such transmissionfacilities. For example, the system provides the location and trackingof one or more individuals who utilize a wireless device to communicateand further determines whether the individual is authorized to transmitwithin the general area local to the individual. In one aspect, lawenforcement may be interested in tracking the individual'sidentification and movements.

Methods relate to locating and managing the use and presence of wirelesscommunication facilities are further disclosed. Embodiments relate todetecting wireless devices when they transmit a signal are furtherdisclosed. Other embodiments relate to detecting of transmission deviceswhen the transmission devices (i.e., facilities) are in a non-activetransmission active state.

In embodiments the methods and systems disclosed herein include methodsand systems for detecting a transmitting device within an obstructionrich environment. The methods and systems may include detecting thetransmitting device within a wireless detection transmission facility;communicating signal information relating to the detected transmittingdevice from the wireless transmission detection facility to a centralunit; determining the location of the transmitting device; displayinginformation of the detection and location of the transmitting devicethrough a user interface; and providing the information to an actionfacility for causing actions related to the detected transmittingdevice. In embodiments, the wireless transmission detection facility isan antenna. In embodiments, the antenna is a dual dipole embeddedantenna. In embodiments, the dual dipole embedded antenna is tuned toreceive cell phone transmissions. In embodiments the dual dipoleembedded antenna is tuned to receive a frequency band of approximately700 to 950 MHz. In embodiments the dual dipole embedded antenna is tunedto receive a frequency band of approximately 1.7 to 2.0 GHz. Inembodiments the dual dipole antenna is tuned to receive signals infrequency bands of approximately 700 to 950 MHz and 1.7 to 2.0 GHz. Inembodiments the obstruction rich environment is a correctional facility.In embodiments the obstruction rich environment is a mall. Inembodiments, communicating the information relating to the detectedtransmitting device from the wireless transmission detection facility toa central unit involves wireless communications. In embodiments, thewireless communications are 802.11 communications. In embodiments,determining the location of the transmitting device is accomplishedthrough transmission triangulation. In embodiments location of thetransmitting device is accomplished through a known location of a singleantenna. In embodiments the location of the transmitting device isdetermined based on extrapolation of the receipt of a plurality ofreceived signals through a series of non-iterative linear equations.

BRIEF DESCRIPTION OF FIGURES

The systems and methods described herein may be understood by referenceto the following figures:

FIG. 1 shows a transmission detection, identification, and reportingsystem.

FIG. 2 illustrates a system for detecting a transmission facility

FIG. 3 illustrates exemplary antenna configurations.

FIG. 4 illustrates a first system configuration for detecting atransmission facility in a cell environment.

FIG. 5 shows a second system configuration for detecting a transmissionfacility in a cell environment.

FIG. 6 illustrates a block diagram relating to actions taken whendetecting transmission facilities.

FIG. 7 shows a transmission facility detection system wherein an antennaarray is used to determine location.

FIG. 8 shows a transmission facility detection system wherein a signalsource is differentiated between two adjacent rooms.

FIG. 9 illustrates a transmission facility detection systemconfiguration employing multiple antennas are used to identify alocation of a signal source after an omni-directional antenna hasdetected its presence.

FIG. 10 shows a schematic diagram of a system for detecting signals of atransmission facility.

FIG. 11 shows a schematic diagram of an alternate embodiment of a systemfor detecting a signal of a transmission facility.

FIG. 12 shows a schematic diagram of a main circuit board within asystem for detecting transmission facilities.

FIG. 13 shows a schematic diagram of a sub-station in a system fordetecting transmission facilities.

FIG. 14 illustrates a null detection facility.

FIG. 15 Illustrates a system for detecting and controlling atransmission facility.

FIG. 16 Illustrates a system for tracking and locating transmissionfacilities.

FIG. 17 Illustrates an exemplary corrections facility designed forautomation.

FIG. 18 illustrates a system for implementing the processing describedherein.

FIG. 19A illustrates an exemplary process for capturing a wirelesstransmission in accordance with the principles of the invention.

FIG. 19B illustrates an exemplary geographical representation to explainthe processing shown in FIG. 19A.

FIGS. 20A and 20 b illustrates exemplary distance and power graphsassociated with the network configuration shown in FIG. 19A.

FIG. 21 illustrates a second example of an exemplary cellular networkconfiguration.

FIGS. 22, 23, 24 illustrate exemplary power graphs associated with thenetwork configuration shown in FIG. 21.

FIG. 25 illustrates a superposition of the graphs shown in FIGS. 22. 23.24.

FIG. 26 illustrates an exemplary power transmission in accordance withthe principles of the invention.

FIG. 27 illustrates a flow chart of an exemplary process for determiningpower transmission in accordance with the principles of the invention.

DETAILED DESCRIPTION OF THE INVENTION

Detection of a transmission facility, such as a mobile phone orhand-held radio transmitter, or other transmission facility as describedherein, within an obstruction rich environment, such as a facility withmany physical barriers to electronic transmission, is difficult toachieve. Referring to FIG. 1, the transmission detection,identification, and reporting system 100 described herein provides amethod of detecting a transmission facility 202, such as depicted inFIG. 2, within an environment rich in obstructions 102. One embodimentof the transmission detection, identification, and reporting system 100may involve the detection of a mobile phone within a heavily walled andmetal-barred government facility such as a correctional facility. Inthis embodiment, the system may utilize an array of antennas 104selectively placed within the facility, collection substations 108 forlocalized collection of detected signals, a central unit 110 for theprocessing of incoming signals from the facility, a display 112 forshowing the location of the detected transmission facility 202, and anaction facility 114 for implementing standard procedures in the event ofa detection. In this embodiment, the communications between the antennas104 and the substations 108, and between the substations 108 and thecentral unit 110, may be wireless to make installation and maintenanceof the system within the facility, cost and time effective. Selectiveplacement of the antennas 104, combined with algorithms and methods fordetermining location of the transmission facility 202, may allow asubstantially improved means for locating transmission facilities 202,such as mobile phones, in an otherwise heavily shielded environment.

In embodiments the antenna 104 may be a multi-dipole embedded antenna.Two examples of dual dipole embedded antennas are provided in FIG. 3 asa first dual-dipole embedded antenna 302 and a second dual dipoleembedded antenna 304. In embodiments the antenna may be adapted toreceive one, two, three, four, or more bandwidths. In embodiments theantenna 104 may be selected as one or more of a dipole antenna 104, aYagi-Uda antenna 104, a loop antenna 104, a quad antenna 104, amicro-strip antenna 104, a quad antenna 104, a helical antenna 104, aphase array antenna 104, a patch antenna or a combination thereof.

In embodiments, the transmission facility 202 may be a mobile phone,such as a flip phone, a slide phone, a cellular phone, a handset, asatellite phone, a 3G phone, a wireless phone, a cordless phone or thelike. In embodiments, the transmission facility 202 may be a radio, suchas a Walkie-Talkie, a mobile radio, a short-wave radio, or the like.

In embodiments, the transmission band from the transmission may bewithin the radio or other electromagnetic frequency spectrum, such asextremely low frequency (ELF), super low frequency (SLF), ultra lowfrequency (ULF), very low frequency (VLF), low frequency (LF), mediumfrequency (MF), high frequency (HF), very high frequency (VHF), ultrahigh frequency (UHF), super high frequency (SHF), extremely highfrequency (EHF), microwave, a frequency suitable for 802.11x wirelesscommunications, ultra wide band (UWB), Bluetooth, or the like.

In embodiments, the obstruction rich environment 102 may be a building,such as a corrections facility, a school, a government facility, astore, a mall, a residence, a hotel, a motel, or the like. Inembodiments, the obstruction rich environments 102 may be a largeconfined space, such as a courtyard, a food court, a recess area, ahallway, greenhouse, recreation room, gymnasium, auditorium, kitchen,cafeteria, craft area, work area, library, prison yard, or the like. Inembodiments, the transmission obstruction 102 materials such ascinderblock, cement, rebar, wire cage, metal, metal coated surface, orthe like. In embodiments, the obstructions in the obstruction richenvironments 102 may be other construction materials, such as wood,glass, rug, flooring materials, roofing materials, and the like.

In embodiments, the transmitting signal information from the antenna 104module to the central unit 110 may be through a communicationsconnection, such as an IEEE 802.15.4 wireless network, IEEE 802.11Wi-Fi, Bluetooth, Ethernet, and/or other similar type wirelesscommunication protocols. In embodiments, the communications connectionmay utilize CAT-5, RJ-45, RS-232 connections, and/or other similar typewired communication protocols and hardware. In embodiments thecommunications connection may utilize an optical connection, such as awireless infrared link, wireless visible light, an optical fiber, andthe like.

In embodiments, the transmitting signal information from the antenna 104module to the central unit 110 may contain data, such as CDMA, CDPD,GSM, TDMA, and the like, and may be used to discriminate which servicesignal is being used, such as Verizon, Cingular, T-Mobile, Sprint, andthe like. The detection of the cell phones may be further resolved downto cell phone manufacturer and cell phone provider.

In embodiments, the transmitting signal information to the central unit110 may be made through an intermediate connection, such as a substation108, router, switch, hub, bridge, multiplexer, modem, network card,network interface, processing unit, preprocessor, computer, repeater,antenna 104, and the like. (see FIG. 2).

In embodiments, the central unit 110 may have in part a computer, acomputer system, a network of computers, a state machine, a sequencer, amicroprocessor, a digital signal processor, an audio processor, apreprocessor, a microprocessor, and the like.

In embodiments, the central unit 110 may process information, such aslocation information, such as the location of people, inmates,corrections personnel, visitors, all personnel within the facility,equipment, resources, weapons, products, incoming goods, outgoing goods,and the like. In embodiments, the information may be a type of signal,such as mobile phone standard protocols such as CDMA, CDPA, GSM, TDMA,and the like. In embodiments, the information may be an eventnotification, such as personnel under duress, an emergency medicalcondition, a call for assistance, a fire, a call for police, a theft,and the like. In embodiments, the processed information may allow forthe tracking of the person or object in possession of the transmissionfacility 202, such as a mobile phone, a radio, a weapon, a product, aresource, and the like. In embodiments, the processed information mayallow for the discrimination and/or association between people orobjects, such as determining the ownership of the transmission facility202, the assignment of the source of transmission, current location of atransmission facility 202 compared to its predicted location, and thelike. In embodiments, the processed information may also have time codesand unique identifiers assigned.

In embodiments, the central unit 110 may have a display 112, such as acathode ray tube (CRT), liquid crystal display (LCD), electronic paper,3D display, head-mounted display, projector, segmented display, computerdisplay, graphic output display, and the like. In embodiments, thecentral unit 110 may have an action facility 114, comprising a userinterface for causing actions relating to the detected transmissionfacility 202. Actions may for example represent operations such asclosing a door, sealing a room, deploying and action signal, initiatingan alarm, and the like.

In embodiments the functions of a central unit 110 as described hereinmay be replaced by an alternate configuration, such as a configurationof multiple computers, such as a group of servers, processors, or thelike, operating in parallel. In embodiments the methods and systemsdescribed herein may involve locating computing capabilities inalternative network configurations, such as in a mesh network or apeer-to-peer network.

In embodiments, the location of a transmission facility 202 may bedetermined by various radiolocation or signal measurement techniques,including measuring phase, amplitude, time, or a combination of these;or by identifying and locating an area associated with an antenna 104with the highest signal strength. In embodiments, the location of atransmission facility 202 may be determined when the transmissionfacility 202 is powered off though detection of a null in the band passof a transmitted frequency sweep due to the presence of a mobile phoneantenna.

In embodiments, a method of detecting a transmission facility 202 (e.g.cell phone) when the transmission facility 202 is not powered mayrequire a transmitting device and a receiving device that can recognizethe signature of an antenna 104 associated with the transmissionfacility 202. By transmitting a known frequency and receiving thedisturbance pattern produced by having a particular antenna 104 designin the transmission path, the pattern or ‘signature’ of that antenna 104can be characterized. In embodiments, this characterization may beevaluated by central unit 110 with results output to a display 112. Adatabase of these signatures can be placed into the unit, and as thetransmitter sweeps across the various cell frequencies, a patternreceived can be matched against the database patterns to determine thepresence of transmission facilities 202. In embodiments, any class ofantenna (e.g. WI-FI, Blackberry, Walkie-Talkie, etc.) can be classifiedand identified.

In embodiments, the range of a hand held device that can detect aninactive transmission facility is approximately 10 feet. In embodiments,greater distances could be attained for stationary units by increasingthe power.

Radiolocation, also referred to as radio-determination, as used herein,encompasses any process of finding the location of a transmitter bymeans of the propagation properties of waves. The angle, at which asignal is received, as well as the time it takes to propagate, may bothcontribute to the determination of the location of the transmissionfacility 202. There are a variety of methods that may be employed in thedetermination of the location of a transmission facility 202. Methodsinclude (i) a cell-sector system that collects information pertaining tocell and sector ID's, (ii) the assisted-global positioning satellite(GPS) technology utilizing a GPS chipset in a mobile communicationfacility, (iii) standard GPS technology, (iv) enhanced-observed timedifference technology utilizing software residing on a server that usessignal transmission of time differences received by geographicallydispersed radio receivers to pinpoint a user's location, (v) timedifference of arrival, (vi) time of arrival, (vii) angle of arrival,(viii) triangulation of cellular signals, (iix) location based onproximity to known locations (including locations of otherradio-transmitters), (ix) map-based location, or any combination of anyof the foregoing, as well as other location facilities known to those ofskill in the art.

Obstructions to radio wave propagation in the obstruction richenvironments 102 may greatly reduce the effectiveness of many of theconventional radiolocation methods due to obstruction of theline-of-sight between the transmission facilities 202 and the receivingantennas 104. However, by employing a large array of antennas 104,positioned so as to maintain line-of-sight between possible transmissionfacility 202 locations and the receiving antennas 104, several of thesemethods may be effectively used in the location of the transmissionfacility 202. These methods include time difference of arrival, time ofarrival, and angle of arrival, amplitude comparison, and the like. Thetime difference of arrival method determines the difference in the time,or the difference in phase, of the same radio-transmitting signalarriving at different receiving antennas 104. Together with the knownpropagation speed of the radio wave, allows the determination of thelocation of the transmission facility 202. The time of arrival methoddetermines the absolute time of reception of the signal at differentreceiving antennas 104, and again, along with the known propagationspeed of the radio wave, allows the determination of the location of thetransmission facility 202. The angle of arrival method utilizesdirection of transmission to different antennas 104 to determine thelocation of the transmission facility. Amplitude comparison methodcompares the strength of the signal detected at each antenna todetermine the location of a transmission facility 202. For example, twoantennas 104 located in the same room would detect different signalamplitudes for the same transmission facility 202 output, therebyproviding a means of determining which antenna 104 the transmissionfacility 202 is closer to. Increasing the number of antennas 104therefore increases the resolution with which the location of thetransmission facility 202 may be determined. All of these methods, andcombinations of these methods, may employ mathematical processes such astriangulation, trilateration, multilateration, or like, in determiningthe location of the transmission facility.

Triangulation is the process of finding coordinates and distance to apoint by calculating the length of one side of a triangle, givenmeasurements of angles and/or sides of the triangle formed by thatpoint, such as the target transmission facility 202, and two other knownreference points, such as the receiving antennas 104. The calculation ofthe location of the transmission facility 202 may then be performedutilizing the law of sines from trigonometry. Tri-lateration is a methodsimilar to triangulation, but unlike triangulation, which uses anglemeasurements, together with at least one known distance, to calculatethe subject's location, tri-lateration uses the known locations of twoor more reference points and the measured distance to the subject, suchas the transmission facility 202, and each reference point, such as thereceiving antennas 104. Multi-lateration, or hyperbolic positioning, issimilar to tri-lateration, but multi-lateration uses measurements oftime difference of arrival, rather than time of arrival, to estimatelocation using the intersection of hyperboloids.

While several radiolocation and triangulation techniques have beendescribed in connection with locating the transmitting device, it shouldbe understood that one skilled in the art would appreciate that thereare other location methodologies and such location methodologies areencompassed by the present invention. For example, in embodiments, thelocation of a single antenna may be known and the single antenna maydetect a transmitting device. The location of the transmitting devicemay be estimated through its known proximity to the single antennalocation. This may provide adequate location resolution for certainapplications of the technology. Similarly, two or more antennas may beused and each of the antenna locations may be known. When each of theantennas receives a transmission, the corresponding signal strengths maybe compared. The one with the highest signal strength may be determinedas the one closest to the transmitting device so the correspondingantenna location may provide enough location resolution for certainapplications.

In an embodiment of the transmission detection, identification, andreporting system 100, a corrections facility, with its substantial andinherent obstruction rich environment 102, presents a significantchallenge to authorities of the correction facilities. In the embodimentif the invention shown and described herein, the system may be placedthroughout the corrections facility for the purpose of alerting thecorrections staff that cell phone activity is taking place, the locationof the activity and the type, i.e., Nextel, T-Mobile, Verizon, and thelike. The following technology may also allow for a standalone detectionunit 408 or set of detection units 408 (see FIG. 4) to detect cellphones in schools, buildings and other environments in which thefacility's or area's provider does not wish the use of cell phones andis interested in the detection of cell phone use.

In an embodiment, the system may include an integrated antenna 104 andRF detector (together referred to as a detector unit 408) (FIG. 4), asubstation 108, (FIG. 1) whose purpose may be to communicate with eachdetector unit 408 within its sector, and report activity to the centralunit 110 which reports confirmed activity, type of cell phone, andlocation to the display 112 of the central unit 110. These detectionunits 408 may be used individually or in conjunction with each other andmay triangulate detection within a specific area. The outside yard areasmay be monitored by detection units 408, which may cover large areas,such as 25.×.25 foot sectors or smaller areas, e.g, 5×5 foot sectors, tolocalize the detection of a cell phone (i.e., wireless transmissionfacility) and track its position from one sector to any adjoiningsector. That is, as the person moves with a phone, the changing positionof that phone may be reported. If the phone moves inside the facility,tracking may continue as interior detection units 408 detect the phone.

In an embodiment, within these basic groups of detection units 408 maybe various detection unit 408 types. Some detection unit 408 s may bedesigned to be hard wired via RJ-45 connectors and/or CAT 5e cable,other detection units 408 may use 802.11b (WI-FI) wirelesscommunications between detection units 408, and there may also be anInfra Red (IR) set of detection units 408 which utilize opticalcommunications techniques. Each communications type may have a specificpurpose within the corrections facility or other type of building and/orareas. Hard-wired units may be used when it is not possible to useeither an optical unit or a WI-FI unit. Used when there are wallsembedded with metal or where the distance and the obstructions 102 maypreclude a wireless technique. WI-FI detection units 408 may be usedwhen it is effective to communicate in an area where there areobstructions 102 such as cement walls or cement with embedded rebarwalls, facades, and the like. Optical detection units 408 may be used inareas where clear, line-of-site communications may be possible. Opticaldetection units 408 may operate over relatively long distances, (e.g.,3,000 feet), while WI-FI detection units 408 may be limited to shorterdistances, such as 250 feet.

In an embodiment, there may also be a hand-held detection units 408 tobe used once a cell phone has been detected, and the correctionsofficer(s) or monitor are attempting to pinpoint the location. Thishand-held detection unit 408 may be similar to the integratedantenna/detector unit of the main system. This embodiment may alsoinclude a detector, discriminator and decoder module. The hand-helddetection units 408 may detect and identify each cell phone and comparethe cell phone identity to the allowed cell phone user list or in thiscase to a list of unauthorized cell phones. This detector unit 408 mayoutput an audible alarm whose pitch changes as the signal becomesstronger or weaker.

In an embodiment, a second type of hand-held detector unit 408 may beused to detect a cell phone when it is either off or in a standbycondition, also referred to as null detecting. Null detection may beused at an ingress or egress of a building or an area as a way ofdetecting a communication device or device with an antenna. Thistechnique may be used in areas where it is unpractical, unwanted orunwarranted to have x-ray machines or more intrusive detection systems.A null detection system may also be deployed in a handheld device so aninspector can move through an area attempting to detect a communicationdevice. In embodiments, the null detection system may detect thepresence of a transmission facility even when the transmission facilityis not transmitting a signal. In embodiments, a hand held or mountednull detection device may be used in a correctional institution or othergovernment facility.

In embodiments, null detection may utilize a transmission-detectionsource, independent of the transmission source being detected, which iscapable of sweeping across the frequency spectrum of interest andreceiving its returning signal. The transmission source sweeps thespectrum of interest, searching for distortions in the returned field.Distortions in the spectrum may be due to the presence of an antenna ofa transmission facility 202. Matching the distortion, also referred toas a null in the band pass, to characteristics of known antennas usedwith mobile phones may allow the detection and/or identification of thetransmission facility 202. The unit may output an audible “beep” if itdetects a null, allowing the officers to focus in on the location of thecell phone. The range of the hand-held detection units 408 may be, forexample, 15 to 20 feet. This will allow cell phones that are in theimmediate vicinity to be quickly detected. The null detection may beapplicable for ingress and/or egress detection.

In an embodiment, a survey may be performed to determine optimalplacement and the type and number of detection units 408 required. Thiswill insure the minimum number of required detection units 408 toperform optimal detection. The team may provide a report detailing thelayout determined to be optimized for the facility and may review thisreport with the facilities staff so that any required modifications tothe plan may be incorporated before installation is begun.

In an embodiment, the initial coverage of a facility may be in the cellblocks 402 (FIG. 4) and/or pod areas. The same may be true for linearfacilities. The survey may cover the entire facility, including openareas, such as courtyards, where required. Inmate also work in largeyard and plantations such as Angola State Prison, it is anticipated thistechnology may be deployed over a large outside area.

In an embodiment, the cell block detection units 408 may be mountedinside each chase 404 (a column positioned between cells in a cell blockthat includes various utility facilities, such as for plumbing andelectricity), as shown in FIG. 4, and may communicate to a substation108 (not shown in FIG. 4) located at one end of the block. Thisdetection unit 408 may communicate its information to the central unit110 so that tracking, confirmation, and display may be accomplished. Forlinear facilities 500, as shown in FIG. 5, detector units 408 may bemounted along the walls in the obstruction rich environment 102 oppositethe cells 402 and perform their function similar to the detection units408 mounted within a chase 404.

In an embodiment, detector units 408 may be installed in open areas suchas gymnasiums, kitchens, cafeterias, craft and work areas and other openareas where a cell phone may be used. The difference in these locationsfrom the cell blocks 402 may include the method of detection andtracking. Since most facilities may only require the identification of acell phones presence within a room, and there could be many inmateswithin that room, the process may be to lock-down the room, or rooms, inthat area and use a hand held device and a physical search to pinpointthe phone location. A generalized block diagram of a detector unit 408is shown in FIG. 6. For those facilities that require resolving thelocation within a large interior room or area, the use of triangulationto resolve to a 10×10 foot area may be used.

In an embodiment, facilities with the requirement to detect cell phones202 in outside yard areas, the use of triangulation to a 25×25 footspace or smaller foot space (e.g., 5×5 foot) may be constructed. As aphone 202 is moved from area coverage 702 to area coverage 702, thesystem may track its movement. Each square foot sector may overlap anadjoining sector. In this way, as shown in FIG. 7, tracking may becontinuous, without any gaps.

In an embodiment, it may also be important to know whether a phone islocated on one side of an obstruction or the other, such as doors,walls, and the like. If the wrong room is identified, it may make itmore difficult to locate a phone and its user. As shown in FIG. 8,detection of the correct room may depend upon the level of the signalreceived. Proper placement of the detector units 408 may insure that thephone may be identified in the correct location.

In an embodiment, when sectoring a large room such as a gymnasium, thenumber and placement of antennas 104 may be critical. In order to sectorlarge regions, such as a 10×10 foot section, within the room, theantenna 104 may need to be capable of narrowing their window to an areasmall enough to meet the requirement. In FIG. 9, there is shown anomni-directional antenna 104, which detects signal presence generally ina 360 degree direction. Once a signal crosses a threshold, the directionfinding antennas 104 may be turned on to determine the position of thesignal. This may be reported to the display 112 and tracked until it iseither turned off or moves to another room or hallway. Then, normalpositional tracking may take place.

In an embodiment, the transmission detection, identification, andreporting system 100 may work in conjunction with a personal alarmsystem, or an inmate tracking system, or a combination of all three andthe like. This dual/tri role system(s) may allow for more cost effectiveuse of the detection units 408 and provide for greater protection forthe correctional officer and inmate alike. This detection system mayutilize an individualized frequency, with known frequency separationbetween detection units 408 and between corrections officer'sfrequencies and Inmate frequencies. The detection configuration of thedetection units 408 may provide complete coverage of the facility. Eachtransmission facility unit may be continually tracked throughout thefacility. At all ingress or egress points the focus of the detection mayensure accurate location of all correctional and inmate personnel. Withthe combined systems more detection units 408 may be needed to ensurefull coverage. In an embodiment, the known Identify of the transmissionfacility, in this case a cell phone being carried and/or used by anofficer or inmate can be accurately associated with another knownidentify of another transmission facility, in this case a correctionsofficer and/or inmate wearing a transmission facility. In thisembodiment, the use of an authorized cell phone or an authorizedtransmission facility by an unauthorized person can be accuratelydetected and reported. This embodiment can be utilized inside thefacility or outside the facility.

In an embodiment, the transmission detection, identification, andreporting system 100 may allow for cell phone owner discrimination. Thesystem may provide for the allowance of authorized cell phones withinthe prohibited area. The system may detect and identify each cell phoneand compare the cell phone identity to the allowed cell phone user list.The system may record all phone use and may automatically alert thefacility of all prohibited cell phone use. In addition, each cell phonedetection event may be identified with a unique identifier and timecode, to ensure proper identification. The CCTV system may also beintegrated to ensure greater accuracy identifying illegal use ofwireless transmission devices.

The cell scan-1 detection system 1000, shown in FIG. 10, is anembodiment of a system for detecting signals of a transmission facility.Antenna 104 receives transmission signals from wireless transmissiondevice (not shown). Antenna 104 may operate, for example in the range of2.4 GHz with a bandwidth of 465 MHz. The received signals are thenprovided to a low pass filter and a log amplifier, wherein the level ofamplification is based on the input level of the input signal. Theamplified signal is next provided to a shaping filter and an operationalamplifier. The amplified signals are provided to an analog-to-digital(ADC) converter and provided to a Field Programmable Gate Array (FPGA).Information from the FPGA may be provided to a microprocessor tosupplement the processing and control imposed by the FPGA. The FPGA mayreceive information from dedicated frequency bands (e.g., 9000 MHz) orfrom known wireless protocols (e.g., 802.15.4). The microprocessor maythen determine whether a detected transmission facility for example is aperson with a transmission facility (e.g., wristband, a cell phone) andmay allow or prevent that person from accessing an area. Themicroprocessor it may also alert the central unit of the personsentering or desire to enter a restricted area. In an another embodiment,if the transmission facility for example is a cell phone and the cellphone was in use within a restricted area, the cell phone would beidentified by the central unit as being in a restricted area, then thesystem will determine whether the cell phone is authorized or notauthorized, then the system would make a determination, based upon setrules whether to allow or disallow the transmission unit within therestricted area.

The cell scan-1 detection system 1000, shown in FIG. 10, is anembodiment of a system for detecting signals of a transmission facility.An antenna 104 receives wireless transmission facilities in a 2.4 GHzband, with a 465 MHz antenna. In other aspects, the detection system maydetect signals in other frequency bands, —for example, 933 MHz, 433 Mhz,2.4 GHz and other known frequencies. The detected signals are providedto High and Low band RF filter. The RF filters (band pass filter)isolate sets of frequencies for greater sensitivity. For example, thereceived signals may be provided to a low band RF filter to isolate lowband RF signals and high band RF filters to isolate high band RFsignals. The isolated RF signals are provided to Log Amplifiers thatamplify or boost the signals using known amplification methods. Theswitch between two Wi-Fi frequencies switches all three wireless signalinputs go into a log amp circuit and then to a smoothing filter to cleanup the signal to be analyzed. The signals are then provided to anOperational Amplifier (Op Amp) which amplifies the received analogsignal. The amplified RF signal is then processed through an A/Dconverter which changes the signal into a digital signal. Te signal isthen processed in a processing unit (in this case a dedicated FieldProgrammable Gate Array (FPGA)) and the results are then transmitted viaa dedicated 2.4 GHz transceiver unit. The 2.4 GHz transceiver unit hasseveral other applications, and is used to transmit and receivecommunication information and to connect to external Wi-Fi communicationdevices. An example of this is an education system for inmates, medicalmonitoring equipment in a hospital application, an interactive ID forsafe school applications. The 900 MHz transceiver unit is for syncingthe sensors. The 465 MHz transceiver unit is for communication withinmates bracelets and Staff (personal alarm system) as is furtherdiscussed in the aforementioned related patent applications. The lowerfrequency of the 465 MHz unit also provides better wall penetration andalternative wireless communication device with better wall penetration.In another embodiment, the front end of the signal detection circuit anamplifier (e.g., 0-40 db gain is added before the RF filter (example a824-849 MHz RF filter) to provide for greater sensitivity. In additionala mixer and Voltage Controlled Oscillator (VCO) (not shown) is addedafter the RF filter. The output of the mixer is a IF frequency that isamplified and then provided to a band pass filter (e.g., a 200 MHzfilter with a bandwidth of 4 MHZ). The signal is then amplified and thenprovided to the Log Amp then to an op amp and then to the ADC. Dependingon the noise floor (which is determined by proper grounding), one withan understanding of RF circuitry would know to have proper impedancematching between components, and will utilize transformer whereappropriate. The IF section's general parameters are 70 MHz to 350 MHzand sensitivity is related to frequency and the width of the band passfilter. As would be appreciated, the tighter the width of the band pass,the greater the sensitivity. In another embodiment, the VCO/mixer may befixed and the IF band pass filter may be the bandwidth of a desiredfrequency providing for faster detection without the need to scan.Additionally the greater the dynamic range of the sensor system thegreater accuracy and resolution in determining the exact location of thetransmission facility.

In an embodiment as shown in FIG. 10, the processing section may beplaced on a separate board, this provides for multiple sensors frontends utilizing one back end processing unit. This provide for more costeffective sensors and versatility of assets. This also allows forspecific functionality such as antenna array directional location andangle tri-angularzation being synchronized to at least one processingunit. It is also anticipated the more expensive processing component beshared such a transmission signal decoding, data analysis,communications and the like.

The cell scan-2 detection system 1100, shown in FIG. 11, shows analternate embodiment of a system for detecting a signal of atransmission facility. The RF filters (i.e., band pass filter) isolatesets of frequencies for greater sensitivity, in this example a low bandcell phone signals and high band cell phone signals. The operation ofthe elements in FIG. 11 is similar to that of FIG. 10 and need not bediscussed in detail herein.

The main board system 1200, shown in FIG. 12, is an embodiment of a maincircuit board within a system for detecting transmission facilities. Thesystem may be used to determine each signal received is an actual cellphone signal and not a spurious output. Thus, a test may need to beperformed that checks for the ‘persistence’ of the received signal. Apersistence test may run a timer 1202 for a minimum required time thatmay be nearly as long as the time of the shortest signal type expected.If the signal is present at the end of the timeout period, it is lesslikely to be a spurious response and more likely that it is a cell phoneoutput. For example, if a GSM signal of 500 microseconds long is theshortest duration signal of all the cell phone protocols received, thepersistence test may run for 450 microseconds to further ensure that thereceived signal is not merely a spurious response.

The sub-station system 1300, shown in FIG. 13, is an embodiment of asub-station in a system for detecting transmission facilities

FIG. 14 illustrates an embodiment of a null detector (1400), wherein theVCO in FIG. 14 tunes to known antenna frequencies and the system detectsa null in the known antenna frequencies in which the antenna isdetected. In embodiments, the null detection system may detect thepresence of a transmission facility even when the transmission facilityis not transmitting a signal. In embodiments, a hand held or mountednull detection device may be used in a correctional institution or othergovernment facility. In embodiments, null detection may utilize atransmission-detection source, independent of the transmission sourcebeing detected, which is capable of sweeping across the frequencyspectrum of interest and receiving its returning signal. Thetransmission source sweeps the spectrum of interest, searching fordistortions in the returned field. Distortions in the spectrum may bedue to the presence of an antenna of a transmission facility 202.

In embodiments of the system described herein, detection levels may bedetermined by which output levels are possible with the various cellphone technologies that are in use today. Since the system described isan amplitude system, the strongest and weakest possible signals must bedetermined in order to identify the system's required dynamic range.Cell phone signals vary from −22 dBW to 6 DBW and this range defines thedetection requirements of the system. This translates to a maximumsignal of 4.0 Watts at the antenna. The minimum value is equal to 0.006Watts or 6 milliwatts. Therefore, the dynamic range required is −52 dBmto +36 dBm. In order to achieve such a dynamic range, an amplifier thatis gain adjustable is required such that an input value of +36 dBm, theamplifier is not saturated.

In the embodiment, the system determines the characteristics required toinsure that each cell phone is correctly identified. The amplitude ofeach signal is determined which allows the system to determine whichsensor has received the largest signal. The system time stamps each datasample so that other sensors receiving the same signal will berecognized as such when the data is presented for analysis. Each sensoranalyzes the wave shape of the signal detected. Each transmission type(i.e., CDMA2000, PCS, TDMA, GSM, IS-95, etc.) has a unique wave shape.These wave shapes allow the analysis software to recognize that signalsseen in different parts of a facility can be associated with each other(using time and wave shape) and the signal that consistently containsthe largest amplitude will be identified as closest to the cell phonetransmission

In embodiments of the invention, signals directed toward an IED(improvised explosive device) may be intercepted, identified and deniedservice. Such interception may be up to a known range in forward andside quadrants. The identification and determination of the position ofthe person or persons using a satellite phone and/or land-based cellphone may be determined. Cell phones, as well as other RF devices, e.g.,garage door openers, walkie-talkie, etc., may be captured, identifiedand/or jammed that are attempting to activate or contact the IED.

In embodiments of the invention, when a cell phone, for example, is on,but not in an active communication, the cell phone is essentiallyinvisible to anyone attempting to monitor cell phone activity. In orderto be aware of the existence of such “on but not transmitting devices”the system described herein operates as a cell tower. That is, thesystem actively addresses the problem of cell phone detection byoperating (becoming) the tower. A vehicle with similar (but modifiedequipment to that of a cell tower may actively poll the area of phonesthat are “on but not in a communication of any sort.” The vehicle (i.e.,Pseudo Tower) collects the current database of active phones and thosephones in standby from the tower(s) in the area and uses this data baseto poll these phones in order to locate them. Once potential phones thatcould be possible detonation cell phones are identified and located, thePseudo Tower would affect a handoff and make itself the active tower.Thus, the captured cell phones are not allowed to rotate back to (i.e.,connect to) the local cell phone tower, insuring that any callsattempting to communicate with the detonation cell phone will not besent. As one of the goals is to identify the person who is attempting tocontact the detonation cell phone, a call history of each suspect cellphone may be analyzed.

When a caller attempts to activate an IED, the caller's presence can beidentified. Furthermore, the call being made is not forwarded to thedetonation cell phone and the IED will not be activated. By determininga peak angle (triangulation) the caller's cell phone/satellite phonesignal, the direction of the caller is then known. Directionidentification is performed by using a technique such an interferometry.In this case, multiple antennas employing interferometry may be used toscan through the current cell phone traffic identifying first, candidatethreats and then, pinpointing high probability locations which can beviewed through a high powered binoculars to determine whether thecandidate is in need of investigation. Criteria for determining whichcell locations may be threats is a pole or road sign, etc. The PseudoTower may continue controlling all of the phones in the area, preventingany forwarding of calls until all possible threats have been cleared. Atthis point, the personnel have the option of going after the caller ordeactivating the IED, or both. It would be possible to clear the areaand detonate the device later if that is a desired plan of action.

Given the varying parameters by which detonation can take place, thePseudo Tower may also be designed to deny service to any active andinactive phone within a given geographical area and pinpoint thelocation of said phones.

Satellite cell phone transmission presents a somewhat different problem.Since the transmission from phone to satellite to phone is communicatedto a number of satellites, becoming a replacement for the satellite willrequire cooperation from the provider. Via one or more specific codes,the satellites may be told that the vehicle mounted satellite simulator(i.e., Pseudo Tower) will be taking over the control of phones within acertain radius. Since this is a moving or ever changing circle, thereplacement “satellite” will have to continuously update the actualsatellite of its position and which phones are being released and whichphones are being controlled. Once this function has been implemented,the control of the suspect phones is similar to that of the cell phone.Determining the caller's position and the location of the detonationphone is as above.

FIG. 15 illustrates an embodiment of a Cell Phone Detection, Control andPosition Identification system (1500) in accordance with the principlesof the invention which comprises cell phone jammer (1501) system thatcovers at least one of the known frequency ranges assigned to cell phoneor mobile communication devices, a Power Unit (1502) that provides thenecessary power to run all the units within the Cell Phone Detection,Control and Position Identification system 1500, Satellite Cell PhoneInterface 1503 that operates as an interface and communications unitbetween the Cell Phone Detection, Control and Position Identificationsystem 1500 and a satellite cell phone provider (not shown), a CellPhone Ground Interface unit 1504, which includes base station technologyfor all communication devices operating within an area of interest. Alsoshown is an optional 300-350 MHz Jammer unit (1505) that operates to jamcommunication devices that communicate through an intermediary device,such as door openers, Walkie-Talkies and the like. It is anticipatedthat the system described herein to be modular and expandable to coverthe entire frequency spectrum in which transmission facilities (cellphones, mobile communications devices) operate. The Computer CommandI/O, User Display and Interface 1506, comprises a communication, commandand control system (C³) that manages communication, command and controlof the detection system 1500. Unit 1506 may further comprise one or moredatabases, and/or processes to execute the processing described, herein.Although not shown it would be appreciated that Command I/O unit 1506may be in communication, via a public or private network, to one or moredevices to provide information to or obtain information from remotesites (not shown).

FIG. 16 Illustrates a block diagram of an embodiment of a Cell Phone andWireless Transmission Detection Facility in accordance with theprinciples of the invention. In the illustrated embodiment 1600, antenna1602 is a multi-band directional array that operates to detect signalsin a low band and in a high band (835 and 1.85 GHz range, respectively),a two way radio band (465 MHz), a Wi-Fi, a Bluetooth band (2.5 GHz) andPAL (Personal Alarm Locator) band (950 MHz). In the illustratedembodiment, the antenna connects to two components, first to a detector(1603) and also to a decoder (1604). The detector 1603 and decoder 1604decodes the PAL Identification signal and may further decode biometricinformation, emergency information. In other embodiments, detector 1603and decoder 1604 are configured to decode cell phone identifications.Antenna 1602 provides detected signals to a 6 way input switch (1605).The output of switch 1605 is connected to a wideband RF amplifier(1606). Wideband RF amplifier 1606 represents a variable gain amplifierthat adjusts the detected signal amplitude based on the band in which adetected signal is detected by antenna 1602. In another aspect of theinvention switch 1606 may be connected to a block gain amplifier (notshown) to provide amplification of the detected signal and the amplifieddetected signal may then be provided to a corresponding RF filter basedon the frequency band of the detected frequency.

The wideband RF amplifier 1606 is connected to a Logarithmic amplifier1607 (i.e., log amp) that amplifies the received or detected signalusing an logarithmic function. Log amplifiers are well-known in the artto provide a larger amplification of a weak signal and a smalleramplification of a strong signal. The output of Log amplifier 1607 isprovided to an Operational amplifier (OpAmp) 1608. The OpAmp 1608amplifies the input signal and provides the amplified input signal to anA/D converter 1609 for conversion of the input analog signal to adigital signal. The converted (i.e., digital) signal is then provided toa FPGA (Field Programmable Gate Array) 1610 for subsequent processing.FPGA 1610 controls the operation of the illustrated Cell Phone andWireless Transmission Detection Facility 1600 through feedback signalsto switch 1605, for example. FPGA 1610 controls which signal frequencyband and signal frequency is evaluated in what sequence. In theillustrated embodiment, FPGA 1610 communicates with the other sensorsand/or access points via a communication interface 1612. In one aspectof the invention, communication interface 1612 may communicate with oneor more wireless communication devices that operate using well-knownIEEE wireless standard communication protocols (e.g., 802.15 and 802.11). In another embodiment, the communication interface may operate as atransceiver (transmitter/receiver) that may interface with two-waywireless transmission devices such as Walkie-Talkie or cellulartelephone phones. The FPGA 1610 also interfaces with a microprocessor1613, e.g., a Zilog Z86, an Intel xx86 series, Motorola Power PC.Processor 1613 may assist in the decoding, and operation of the CellPhone and Wireless Transmission Detection Facility 1600. FPGA 1610 andthe microprocessor 1613 may be synchronized by a crystal clock 1614. Inother embodiments of the invention, the communications may be via acategory 5 network interface connection in conjunction to thecommunication Interface 1612. Although an FPGA is referred to andillustrated in the embodiment of the invention, it would be recognizedby those skilled in the art that the processing described by the FPGAmay also be performed in other specific processor processors (e.g.,ASIC) or may in general purpose processor which when loaded with andexecuting an applicable software module converts the general purposeprocessor into a special purpose processor. As would be recognized, thesystem shown in FIG. 16 is similar to those shown in FIGS. 10 and 11 and

Returning to the embodiment of the Cell Phone Detection, Control, andPosition Identification system shown in FIG. 15, control of a wirelesscommunication device (i.e., transmission facility 202) may utilizejammers, base station technology, Wi-Fi, and 3rd party base stationtechnology, to acquire, control, obtain location and/or to stimulate awireless communication device, which may be, in an active,non-transmitting, state or in a standby state.

The embodiment shown in FIG. 15 utilizes a high level of signaldetection sensitivity to detect the presence of a wireless communicationdevice (transmission facility) with in a known distance from thetransmission detection facility. As power is a critical component whendealing with wireless transmission devices, the communication protocoltypically, by design, causes communication with the largest availablesignal source. Typically, this is the closest source (i.e., basestation).

In accordance with one embodiment of the invention, the jammer units1501 may jam or interfere with one or more frequencies or frequencybands to force wireless communication device within a local area to losecontact with an available base station and/or access point and toreacquire a connection to a local base station cell tower and/or accesspoint. When the transmission facility (wireless communication device)initiates a process (referred to as hand-shake) to re-acquire acommunication link with the available local base station cell tower, thecommunication link is diverted to a, and re-acquired by, the detectionsystem 1500 (which is referred to as a pseudo-base station) due to thegreater signal power of the pseudo-base station. In another aspect ofthe invention, the pseudo-base station power is raised so as to begreater than an actual cell tower signal strength. Thus, the cell phone,for example, will transition to the larger signal strength of thepseudo-base station and establish a communication with the pseudo basestation. In a further aspect of the invention, the pseudo-base stationmay actively poll the area for cell phone (transmission facilities), andtrigger the cell phones within an area of interest to cause the cellphones within the area to attach to the pseudo-base station.

In one aspect of the invention, where the application is to control thetransmission facility within a local area, and to prevent communicationsfrom reaching the transmission facility of interest, the pseudo-basestation may deny transmission of signals from the transmission facilityto an actual base station or deny transmission of signals from the basestation to the transmission facility.

In an embodiment of the invention where it is important to identify andnot control the transmission facility within an area of interestproviding greater power, polling, control line request, interleavingexisting towers and/or jamming to force the transmission facility tocommunicate its identification parameters. In this embodiment of theinvention, gaining control of the cell phone (or wireless communicationdevice or transmission facility) within the area of interest allows thesystem to prevent incoming and/or outgoing communications. Thus, as thewireless communication device is re-acquiring a communication link withthe access point or base station, the wireless communication deviceprovides its identification information that positively identifies eachtransmission facility within the area of interest. This identificationinformation may be provided to the actual cell tower provider, whichuses this information to individually disable the cell phone(transmission facility) from receiving or transmitting data, voiceand/or communicating in any manner.

In an embodiment, the detection system 1000 (see FIG. 10) issynchronized with an access point, an/or base station technology. Thissynchronization allows the tracking and positive identification of eachtransmission facility within an area of interest. In this example, thetransmission facility of interest (a triggering device) may be connectedto or trying to communicate with another transmission facility, such asa cell phone or a land line phone.

In an embodiment, of the Cell Phone Detection, Control, and PositionIdentification System shown in FIG. 15, determines the identification ofan incoming caller based on information contained in the transmissionsignal and does not allow connection to the wireless network whiledetermining the location of the caller by triangulating the caller froma plurality of detected signals and tracks the caller thereafter. Inthis embodiment of the invention, the system shown in FIG. 15 disablesthe wireless device from receiving or transmitting signals from/to thewireless network and tracks the caller using the wireless device. TheCell Phone Detection, Control, and Position Identification Systemdescribed in FIG. 15 also has the capacity to track wirelesstransmission facilities from great distances, and in this application,the system is mobile, therefore, tracking the caller. In one aspect ofthe invention, where the cell phone or transmission facility informationis known, as determined through its communication with a pseudo-basestation, for example, additional information can be gathered, requestedand/or, extracted from the cell phone or transmission facility.Information such other transmission devices, cell phones, etc, that havebeen contacted or which have data transferred may be gathered, requestedand/or extracted.

In an embodiment where information redundancy and positive authorizationis important and positive identification is critical, the tools used inthe school bus safety application egress point and school trackingsystem have direct applicability to positive identification of personneland prison system automation, cost effectively tracking and monitoringlower threat classified inmates and staff and inmate safety. Safetyapplication and tracking systems are more fully discloses in theaforementioned related patent applications, whose contents areincorporated by reference herein. The tools and application describedmay include facial recognition, retina scan technology, card swipe,fingerprint analysis, in preventing escapes and misidentification withina prison environment.

In an embodiment where positive identification of the transmissionfacility 202 and positive identification of the user of the transmissionfacility 202 is important, as discussed earlier hand-held detectionunits 408 detector decoding module (and or chipset) or a hand-helddetection units 408 in sync with the pseudo-base station/wireless accesspoint module provides the location and the Identification of thetransmission facility 202 or in this case, for example a cell phone or a802.xx (e.g., 802.11a/b/g/n, 802.15) communication device. Incorrections facilities, outside areas of the facility, for example alarge area like Angola state prison, a close-circuit television (CCTV)in synchronization with, or in communication, with the hand-helddetection units 408 allows the CCTV to focus on the user of the cellphone. The CCTV system feeds images to the facial recognition softwareand a database of all known personal and/or inmates, to find a matchand/or create an entry of new found cell phone and their owner's and oruser's identity. In the case of a prison application, building adatabase of know criminals their associate and biometric information,including facial recognition, for data mining purposes is critical Anexample, where inmates are passing contraband and using cell phone tocoordinate their efforts. where positive identification of thetransmission facility 202 and positive identification of the user of thetransmission facility 202 is important, utilizing cell phoneidentification, location tracking and positive identify of the criminalsinvolved is crucial to preventing and stopping their criminalenterprise.

In another embodiment and application where positive identification ofthe transmission facility 202 and positive identification of the user ofthe transmission facility 202 is important, as discussed earlier thehand-held detection units 408 detector decoding module (and or chipset)or a hand-held detection units 408 in sync with the Pseudo-basestation/wireless access point module provides the location, in schoolsafety where a student's location and a perpetrator who preys on schoolstudents, the tagging of visitors, student and employees is critical. Inthis application, CCTV and facial recognition, for data mining purposesof student, facility visitors (wanted or unwanted) is critical. Theembodiment includes an allowance unit which determines who is allowedwithin the facility and/or area and who is suspect and who is a knowndanger. Tracking all transmission facilities and making positiveidentification of all communications. Utilizing CORI and SORI databasesof known perpetrator of students to detect when a threat is near aroundor in a school facility is critical to school safety.

In embodiments, a method of detecting, identifying and tracking themovements of a specific transmission facility 202 in standby requiresprovoking and/or requiring the transmission facility to transmit asignal and to detect their unique identification. As discussed andexplained earlier, a hand-held detection units 408 with a integratedidentification detector/decoding module (and or identification chipsetmodule) and/or a hand-held detection units 408 which functions inconjunction base station and/or wireless access point technology,blocking and/or jamming technique in concert of the identificationfunction provides the tools to detect the transmission facility, trackits location, and to detect its unique identification.

In the embodiment of FIG. 15, an interface with existing communicationdevices, such as a wireless cell phone provider or Wi-Fi accessprovider, may be provided. The interface which will allow and/or denycontrol is executed by the wireless provider. According, the embodimentsshown may also include an interface to the third party controlling unit.For example, the system shown in FIG. 15 may include a system interfacewith the commercial satellite cell phone provider and control of thecell phones passed between the carrier and the transmission detection,identification, control and reporting system.

In the embodiment of FIG. 15 the detector units (not shown) may includean antenna and a controlling unit, where matching the transmissionfacilities 202 with its unique identifier is critical for properidentification, tracking and control in this configuration, the detectorunits may individually control or may direct control over thetransmission facilities 202.

FIG. 17 illustrates an embodiment, where it is the intention to run anautomated prison s to lower the necessary number of personnel and stillthe run a safe and secure facility. This automated facility iscontrolled by a centralized command and control center and/or adecentralize compartmental command and control center for all functionsof the facility including movement of the persons within the facility.In this type of a facility, where complete and accurate identificationand location of all personnel is critical, the tracking of individuals,their wireless transmission devices, cell phones, identification units,Walkie-Talkies, and verifying their access to authorized areas,integrating their movement with CCTV and positive facial identification,biometric identification, preventing movement into unauthorized area,developing inclusion zones, creating exclusion zones, ensuring propercount, providing an ability to restrict and/or authorized movement aspecific design of the facility and convergence of technology isessential. The technologies discussed herein integrated to the centralcontrol provide the backbone and framework to operate such an automatedfacility, wherein each staff member and inmate transmission facilitywill allow specific movement throughout the facility. All movementthroughout the facility may be monitored through CCTV and facialrecognition. At each egress point, movement will be restricted toindividual movement through one area to another area of the facility.For example, daily functions include, meals, medical, programs, courtvisits, and recreation, may be functions that may be monitored andcontrolled. As an example of the facility of the needs within theautomation and the parameters and rules, Example—Inmate Movement: need acreation of a Movement list and movement schedule, scheduling recourses,allocation seats in particular Programs area classrooms, Access tocomputers, access to the Law library, time allocation in program and usefacility assets, Enemy exclusion, (predator sheep wolf exclusion)conflicts in scheduling GED, adult education, culinary arts angermanagement developing Waiting list, ability for inmates to signup,Morning schedule and movement, afternoon schedule and movement,Pre-trail and religious services scheduling. Data mining databasetechniques and methodologies may be executed to provide for inmatescheduling movement and allocation of assets for the inmate relying ontransmission facility authorization. The transmission facility willcontrol access to all moment, asset recourses, doors and egress,facility recourses and the time allocation on facility assets and inwhich movement takes place. Because of minimum human interaction,display kiosks displays schedule and informs the inmate where it isscheduled.

In this embodiment, where there is limited, corrections personnel, allcells will be designed to allow outdoor access and unit access. Thefacility structure, may need to be modified to allow inmate access tothe outdoor area, this design modification eliminates the need foroutside movement and still provides greater freedom for the inmates withless need for direct supervision.

In this embodiment, for medical reasons all inmates will wear twotransmission detection sensors. Each sensor will monitor biometric signsincluding heart rate, temperature, and the like. With two wristbandsecho cardiogram can be generated with provide for health monitoring andfor positive identification. The Cell Phone Detection, Control andPosition Identification system 1500 (FIG. 15) will include a detectorand decoder for all transmission facilities, which will provide positiveidentification for all transmission facilities, including cell phone andother hand held communication devices, and the specific individual inposition of the transmission facility. All CCTV units will integratewith facial recognition software, all egress points will requirebiometric checks, such as fingerprint and renal eye scan devices, andthis combined with the transmission facility positive identification.The design of the facility is important to provide adequate exercisemovement and limited interaction with staff and other inmates. Thereforea redesign of the facility, to provide services such as decentralizededucation is important.

In this embodiment, the wireless communication of the sensors will alsocarry education information and data to each of the inmate cells. Asearlier described, the ideal location of sensors maybe the water chasesto prevent tampering. This also provides the opportunity to havewireless communication with education units within the cells. Thiswireless communication also provides the ability to as wirelesssurveillance devices such as cell monitoring into the mix.

In this embodiment where inmate programs, services, commissary, inmatephones, medicine distribution, vending machines, GED education, needs tobe inmate specific, positive identification is a critical must. Toensure this outcome, the positive identification of each transmissionfacility is paramount. An example of this embodiment, when an inmateapproaches an education display system, the unique identifier of theinmate's transmission facility, provides information to the transmissionfacility detector of the unique identifier of the transmission facility.A database controls and provides all the applicable information toprovide the correct information for each transmission facility. In thiscase, the transmission facility is a wristband ID bracelet.

In other embodiment, the transmission facility is a cell phone, PDA or aWi-Fi appliance, the education display system is a interactive displayscreen in a school telling the school supervisors that one or morestudents or personnel needs to turn off his cell phone, or a hospitaladvising a specific visitor by name, that cell phone even in standby maycause harm the medical devices being used to treat patients or thetransmission facility provides information to the transmission facilitydetector of a unique identifier of the transmission facility via aninteractive screen on the road side to tell a user to slow down as he isspeeding. These are just examples of uses of the system illustrated. Inaddition, the system illustrated may be connected to any data miningdatabase (not shown) to provide customized information to anytransmission facility and specific information to a uniquely identifiedtransmission facility.

In an embodiment where the classification of inmates is such where manyinmates can co-exist in an inside and outside (minimum security,non-violent, criminals and the like) the use of CCTV, facial recognitionand laser microphone, and inmate tracking and a database driven set ofrules an parameters, coupled with the combine technologies mentionedthis application. This provides the solutions to reduce the number ofemployees while maintaining a high level of safety and security.

In an embodiment of FIG. 15 the detector units (not shown) may includean antennas 104 and a controlling unit, that are externally integratedwith the transmission detection, controlling, identification, andreporting system 1500, where matching the transmission facilities 202with its unique identifier is critical for proper identification,tracking and location matching of the transmission facility 202 uniqueidentifier with the proper transmission facility 202 maybe accomplishedthrough the time of signal arrival, phone type, transmission frequency,time division separation, time sync, channel frequency, cell toweridentifier, (cell phone) transmission facility identifier or acombination of one or more methodologies depending on complexity andtransmission facility 202 environment and the like.

In the embodiment, of FIG. 15 in a situation where there is a largenumber of transmission facilities 202 (in this example, cell phones) ona congested highway being able to find all the transmission facility(s)and their accurate location is critical. In addition being able tocontinuously track and positively identify each transmission is alsocritical wherein controlling a significant number of transmissionfacilities (cell phones) may be necessary. Therefore specific techniquesneed to be developed to regulate the frequency band the wireless devicesoccupy, when and in what order they are processed, the rate and thedensity and rate in which they are monitored. Techniques discussedearlier describe how to have a cell phone provide their identification.Here we will discuss some of the techniques to regulate the detection,frequency, volume and period of those transmissions.

Knowing the frequency and time of the transmission facility 202transmissions provides the ability to tighten the bandwidth of thedetection sensors, which increases sensitivity, and thus providesgreater distance of detection. It also provides an intercept, in timeand frequency providing for faster processing of signals. One techniqueis for the transmission detection sensor to tell the (base station)and/or enabling technology when to transmit and also indicate thedesired response frequency and/or channel. Another methodology is toregulate and/or schedule the transmission time of the base station(s)and/or enabling technologies within geographical areas and set parameteron the direction, radiation pattern, zone, and strength of the signalbeing transmitted to enable a regulate number of transmissionfacility(s) contacted and/or regulating the number of respondingtransmission facilities.

In an embodiment, in a corrections complex, such as Angola State Prison,or a arbitrarily defined area where transmission facilities 202 areprohibited except for authorized transmission devices, the transmissiondetection, controlling, identification, and reporting system 100 whetherinternal or external to the facility may control, identify and prohibittransmissions from transmission facility 202 depending on the locationor approximate location of the transmission facility 202. There are avariety of methods that may be employed in the determination of thelocation of a transmission facility 202. Methods include (i) acell-sector system that collects information pertaining to cell andsector ID's, (ii) the assisted-global positioning satellite (GPS)technology utilizing a GPS chipset in a mobile communication facility,(iii) standard GPS technology, (iv) enhanced-observed time differencetechnology utilizing software residing on a server that uses signaltransmission of time differences received by geographically dispersedradio receivers to pinpoint a user's location, (v) time difference ofarrival, (vi) time of arrival, (vii) angle of arrival, (viii)triangulation of cellular signals, (ix) location based on proximity toknown locations (including locations of other radio-transmitters), (x)map-based location, or any combination of any of the foregoing, as wellas other location facilities known to those of skill in the art. In oneaspect of the invention, the location may be determined using a methodof non-iterative linear equations.

In an embodiment of the transmission detection, controlling,identification, and reporting system 1500 whether to control thetransmission facility 202, may be determined by location of thetransmission facility 202, type of transmission facility 202,identification of transmission facility 202, time of transmission of thetransmission facility 202 frequency of the transmission facility 202,based on type of base station technology and/or location of base stationtechnology and the like.

In an embodiment of the transmission detection, controlling,identification, and reporting system 1500 where the system is insynchronization with base station technology and techniques correlatethe wireless signals, wherein the unique identifier is supplied by thebase station when the transmission facility is stimulated by the jammerand/or base stations unit. Then the transmission facility is tracked andits interest is related to its location to the road, other variablesinclude whether it is alone or it is in the hands of an individual andthe like. The unique identifier is provided by the signal detectionsensor or the base station unit and is used with sync the base stationidentification and the location of the transmission facility.

In an embodiment of FIG. 15, the transmission detection, controlling,identification, and reporting system 1500 may also transmit the type,time, frequency of the wireless transmission facility of interest to abase station. The base station may then provide the system with theunique identifier of the detected transmission facility or the basestation may detect a transmission facility at a specific frequency andthe transmission detection, controlling, identification, and reportingsystem 100 tunes to that frequency to determine the location and uniqueidentifying information of the transmission device. The system 100 maythen compare the unique identifying information to a data base (notshown), the information and the parameters obtained from the data basemay then be used decide how to treat the transmission facility; what todo with the transmission facility depending on where the transmissionfacility is considered friend or foe (i.e., allowed or disallowed).

In an embodiment of the transmission detection, controlling,identification, and reporting system 1500 where the transmissiondetection units includes a transmission decoding unit the systemdetermines the location and the allowability of the transmission unit bycomparing the transmission found with allowable or non-allowabletransmission facility lists.

In an embodiment shown in FIG. 15 of the transmission detection,controlling, identification, and reporting system 1500, the base stationindicates there is a transmission facility within the area covered bythe transmission detection, controlling, identification, and reportingsystem 1500. The base station provides at least one unique identifier tothe transmission detection, controlling, identification, and reportingsystem 1500. For example, the base station may provide at least one of:a frequency; a type of transmission facility; a time of arrival (TOA),an IMEI and other similar identifiers (e.g., encoded IMEI). Thetransmission detection, controlling, identification, and reportingsystem 1500 determines the location of the transmission facility,depending on the provided parameters, directs the base station and/orrecorder, jammer, CCTV . . . ) to perform a set of actions. Some of theactions to be performed are jam the signal specific to the cell phone,deny service (Denial of Service (DoS)) to the cell phone, allow thecontinued receiving and allow transmission of the detected transmission,record the content of the transmission, provide an indication that thetransmission is allowable. In addition, the provided parameters maychange depending on location, and other variables depending onapplication parameter and the like.

In an embodiment shown in FIG. 15 of the transmission detection,controlling, identification, and reporting system 1500 where detectionsystem is separate from the discriminator unit, the discriminator unitmay also include the controlling unit (base station technology and thelike). In this case, when a unique set characteristics (parameters) arereceived by the detecting unit, and or system 1500, which then providesinformation to the discriminator unit and/or controlling unit, whichthen passes back the correlated transmission facilities (the controllingunit, software radio, and the like) this information is processed. Forexample, a cell phone on the side of the road, with a person talking onit may not need to be disabled, in contrast to a cell phone in standbylocated within a zone of danger (60 meters of the road) may need to becontrolled and disabled.

In an embodiment, the system 1500 will allow an authorized transmissionfacility to continue and/or provide the ability for the wirelesstransmission, (i.e., to talk and/or to receive calls) depending on theconfiguration and application. In an embodiment of the transmissiondetection, controlling, identification, and reporting system 100 wheredetection system is separate from the discriminator unit, in this casethe discriminator unit may also the controlling unit (base stationtechnology and the like,) the system 1500 may further provideinstruction to the controlling unit to allow or disallow transmissionfacilities, determined by their location.

In an embodiment of the transmission detection, controlling,identification, and reporting system 1500 the system compares theobtained information and depending on whether the detected transmissionfacility is determined to be a potential danger, the system may take theincoming transmission facility and determine its position prior todisallowing further transmission. This process is accomplished byknowing an identification of the transmission facility and using theinformation obtained by the controlling facility (frequency, time, type,channel, etc.) and searching for the incoming call signal. For example,in an improvised explosive detection (IED) situation, finding thetrigger man may require the detection, identification and locationdetermination in real-time. The array antennas will utilize large frontend gain for the greatest distance. As discussed previously, jamming thearea, to gain control of the transmission facility is one method ofcapturing the transmission facility. The ability exists to then trackthe trigger man from his current location and where he goes forinvestigative reasons.

In an embodiment shown in FIG. 15 of the transmission detection,controlling, identification, and reporting system 1500 wheretransmission facility retrieved data may be used to locate threats topersonnel, and or prevent an escape. Recovered transmission facilitydata may be used to track co-conspirators location and/or identify of anunauthorized transmission facility.

FIG. 18 illustrates a system 1800 for implementing the principles of theinvention shown herein. In this exemplary system embodiment 1800, inputdata is received from sources 1801 over network 1850 and is processed inaccordance with one or more programs, either software or firmware,executed by processing system 1810. The results of processing system1810 may then be transmitted over network 1880 for viewing on display1892, reporting device 1890 and/or a second processing system 1895.

Processing system 1810 includes one or more input/output devices 1802that receive data from the illustrated sources or devices 1801 overnetwork 1850. The received data is then applied to processor 1803, whichis in communication with input/output device 1802 and memory 1804.Input/output devices 1802, processor 1803 and memory 1804 maycommunicate over a communication medium 1825. Communication medium 1825may represent a communication network, e.g., ISA, PCI, PCMCIA bus, oneor more internal connections of a circuit, circuit card or other device,as well as portions and combinations of these and other communicationmedia.

Processing system 1810 and/or processor 1803 may be representative of ahandheld calculator, special purpose or general purpose processingsystem, desktop computer, laptop computer, palm computer, or personaldigital assistant (PDA) device, etc., as well as portions orcombinations of these and other devices that can perform the operationsillustrated.

Processor 1803 may be a central processing unit (CPU) or a specialpurposed processing unit or dedicated hardware/software, such as a PAL,ASIC, FGPA, operable to execute computer instruction code or acombination of code and logical operations. In one embodiment, processor1803 may include, or access, code which, when executed by the processor,performs the operations illustrated herein. As would be understood bythose skilled in the art when a general purpose computer (e.g., a CPU)loaded with or accesses code to implement the processing shown herein,the execution of the code transforms the general purpose computer into aspecial purpose computer. The code may be contained in memory 1804, maybe read or downloaded from a memory medium such as a CD-ROM or floppydisk, represented as 1883, may be provided by a manual input device1885, such as a keyboard or a keypad entry, or may be read from amagnetic or optical medium (not shown) or via a second I/O device 1887when needed. Information items provided by devices 1883, 1885, 1887 maybe accessible to processor 1803 through input/output device 1802, asshown. Further, the data received by input/output device 1802 may beimmediately accessible by processor 1803 or may be stored in memory1804. Processor 1803 may further provide the results of the processingto display 1892, recording device 1890 or a second processing unit 1895.

As one skilled in the art would recognize, the terms processor,processing system, computer or computer system may represent one or moreprocessing units in communication with one or more memory units andother devices, e.g., peripherals, connected electronically to andcommunicating with the at least one processing unit. Furthermore, thedevices illustrated may be electronically connected to the one or moreprocessing units via internal busses, e.g., serial, parallel, ISA bus,Micro Channel bus, PCI bus, PCMCIA bus, USB, etc., or one or moreinternal connections of a circuit, circuit card or other device, as wellas portions and combinations of these and other communication media, oran external network, e.g., the Internet and Intranet. In otherembodiments, hardware circuitry may be used in place of, or incombination with, software instructions to implement the invention. Forexample, the elements illustrated herein may also be implemented asdiscrete hardware elements or may be integrated into a single unit.

As would be understood, the operations illustrated may be performedsequentially or in parallel using different processors to determinespecific values. Processing system 1810 may also be in two-waycommunication with each of the sources 1805. Processing system 1810 mayfurther receive or transmit data over one or more network connectionsfrom a server or servers over, e.g., a global computer communicationsnetwork such as the Internet, Intranet, a wide area network (WAN), ametropolitan area network (MAN), a local area network (LAN), aterrestrial broadcast system, a cable network, a satellite network, awireless network, or a telephone network (POTS), as well as portions orcombinations of these and other types of networks. As will beappreciated, networks 1850 and 1880 may also be internal networks or oneor more internal connections of a circuit, circuit card or other device,as well as portions and combinations of these and other communicationmedia or an external network, e.g., the Internet and Intranet.

FIG. 19A illustrates an exemplary process 1900 for capturing a wirelesstransmission in accordance with the principles of the invention and FIG.19B illustrates an exemplary geographic configuration for explaining theprocessing shown in FIG. 19A. Referring now to FIG. 19A, at block 1910,a reference signal transmitted by a transmitter (1972, FIG. 19B) isreceived at a transceiving system (1975). The transmitter 1972 has atransmitting range represented by a distance R₁. An estimated distance(D₀) between the transceiving system 1975 and a transmitter 1972 of thereference signal is determined based on a received power at thetransceiving system. At block 1920, a determination is made regarding anexpected power of the reference signal to be received at wirelesstransmission facilities a known distance (R₂) from the transceivingsystem 1975. In one aspect of the invention, an expected received powermay be determined without regard to the positions of the referencesignal transmitter 1972 and the transceiving system 1975. That is, anexpected received power may be determined a known distance (R₂) aboutthe transceiving system 1975 based solely on the received power at thetransceiving system 1975 and, thus, the expected received power at pointA is the same as that received at point B. In another aspect of theinvention, a position of the reference signal transmitter 1972 may bedetermined or provided to the transceiving system 1975. For example, adirection of the reference signal transmitter 1972 may be determined,using directional receiving antennas (or multiple receiving antennasseparated by a known angular measure, such as four antenna spatiallyoriented 90 degrees to each other, such that the 3 dB antenna gainpoints intersect at 45 degrees from the antenna maximum gain) at thetransceiving system 1975, and a position relative to the transceivingsystem 1975 may be determined based on the determined direction andestimated distance (D₀). In another aspect, a direction of the referencesignal transmitter 1972 may be determined using a received signalstrength of the reference signal on at least one receiving antenna. Inanother aspect, the position or location of the reference signaltransmitter 1972 may be known and, thus, available to the transceivingsystem 1975. For example, the position of the transmitter 1972 may beknown through a mapping of such transmitters and/or the location isknown based on conventional surveying methods or from a globalpositioning satellite system (GPS). With the position of the referencesignal transmitter 1972 known, the expected power of the referencesignal may then be determined more accurately. For example, the expectedreceived power of the reference signal a known distance from thetransceiving system 1975 in line with, and between, the transmitter 1972and the transceiving system 1975 is greater than the expected receivedpower of the reference signal a known distance from the transceivingsystem in line with but on an opposite side of the transceiving system1975.

With reference to FIG. 19B, the received signal strength at wirelesstransmission facility 1980 is greater than that of wireless transmissionfacility 1990. The expected received power may be determinedcontinuously along the known distance (R2) about the transceiving system1975 or may determined at designated angles about the transceivingsystem 1975 (e.g., every 10 degrees). Interpolation between twodesignated angles may be used to determine an expected received power atan intermediate point. At block 1930, a signal is transmitted from thetransceiving system within a general area, as represented by R₂. Thearea may include wireless transmission facilities 1980, 1985, 1990,capable of receiving the reference signal and wireless transmissionfacilities 1995 that may not be capable of receiving the referencesignal. In one aspect, the signal may be transmitted in anomni-directional manner wherein the general area represents an areacircling the transceiving system; assuming the system and correspondingantenna(s) are co-located. In another aspect of the invention, thesignal may be transmitted in a directional manner wherein the generalarea represents a pie-shape area, 1997, 1998, having an apex at thetransceiving system 1975 (a sector); assuming the antenna(s) and thesystem 1975 are co-located. The angular spread of the pie-shared areaα₁, α₂ may be determined based on the directivity of the transmittingantenna. The signal transmitted by the transceiving system 1975 istransmitted with sufficient power to interfere with communicationsbetween the reference signal and wireless transmission facilities withinan area in which wireless transmission facilities may receive thereference signal. The transmitted signal may be a continuous wave typesignal (i.e., a jamming signal) or may be a discrete signal thatcommands the wireless transmission facilities to reestablishcommunication with the reference signal transmitter. At block 1940, asimulated reference signal is transmitted by the transceiving system1975. The simulated reference signal is transmitted at a power levelsuch that the received power of the simulated reference signal at theknown distance (R₂) from the transceiving system 1975 is greater thanthe received power of the reference signal. At block 1950, signal(s)received by the transceiving system 1975 from wireless transmissionfacilities 1980, 1985, 1990, 1995 in response to the interfering signalare analyzed and processed.

In one aspect of the invention, a distance D₁′, D₂′, D₃′, to each of thewireless transmission facilities 1980, 1985, 1990, respectively may beestimated base on a received power, at block 1960. In another aspect ofthe invention, a direction of the wireless transmission facilities maybe determined using, for example, directional antennas and/or anamplitude-based angle of arrival method. In one aspect of the invention,the signals received by the transceiving system 1975 may be analyzed todetermine if they are allowed to send and/or receive communication aspreviously disclosed at block 1970. As discussed previously,allowability may be determined based on a known set of wirelesstransmission facilities that are allowed within an area. All others arenot allowed and, thus, communication is prohibited. If the signals aredetermined to be allowable, then control of the signal is “handed-off”to the reference signal transmitter 1972. Otherwise, the receivedsignals may be further processed.

In one aspect of the invention, allowability of a wireless transmissionfacility may be determined based on a position of the wirelesstransmission facility with respect to the transceiving system 1972. Forexample, if the wireless transmission facility is determined to bewithin a predetermined distance, R₃, from the transceiving system 1975,then communication to and from the wireless transmission facility maynot be allowed, even though the transmission would normally be allowed.In one aspect, the area defined by R₃ may be limited using directionalinformation of the received signal associated with the wireless facilityand the transceiving system 1975. Thus, if the transceiving system 1975is moving towards the wireless transmission facility, then communicationmay not be allowed, while communication may be allowed if thetransceiving system 1975 is moving away from the wireless transmissionfacility, even though the wireless transmission facility is within thearea defined by R₃. In another aspect of the invention, transceivingsystem 1975 may attempt to determine other wireless transmissionfacilities within a region, R₄, attempting to communicate with thenot-allowed transmission facility.

FIG. 20A illustrates a graph of exemplary distances between theoperating ranges of base stations 112 and device 152 as a function ofangle, wherein the angle is normalized with respect to a line betweenbase station 112 and device 152. Thus, a minimum distance between basestation 112 and device 152 is represented as R1, at an angle of zerodegrees between base station 112 and device 152 and extends to a maximumdistance of R1+2R2, at an angle of 180 degrees (see curve a).

However, as the operating range of device 152 exceeds the operatingrange of base station 112 at 180 degrees, the distance may thus berepresented as R3 (see curve b).

Thus, as the angle between base station 112 and device 152 increases,the distance between base station 112 and device 152, at distance R2from device 152, increases and becomes limited to a distance of R3 foran angular period around 180 degrees. The distance then decreases to R1as the angle increases.

FIG. 20B illustrates an exemplary power received at the operating rangeR2 of device 152. In this case, the power received by a wireless deviceis a maximum at distance R1 and is a minimum at distance R1+2R2. (seecurve a). However, as the distance R1+2R2 exceeds the operating range ofbase station 112, the power at distance R3 is limited to the power atthe edge of the operating range of base station 112. (see curve b).Thus, to capture any devices within the local area of device 152, device152 must transmit at a power between that received at R1 and thatreceived at R3. Further the power transmitted varies as a function ofthe angle between base station 115 and device 152.

FIG. 21 illustrates a second exemplary network configuration inaccordance with the principles of the invention. In this exemplaryconfiguration overlapping regions 210, 220, 230, 240 provide continuouscoverage of one or more devices within their respective regions. In thiscase, each of the regions 210, 220, 230, 240 are represented as having acoverage area defined as R3 with respect to corresponding base stations212, 222, 232, and 242. As illustrates, are hexagon representations ofeach of the coverage areas 214, 224, 234 and 244. The hexagonrepresentations are provided solely to illustrate the interlockingcoverage of the overlapping coverage regions 210, 220, 230, 240.

Also illustrates is a transceiving station (device) 252, (which isequivalent to device 152 of FIG. 19B). Also illustrates are wirelessdevices 262, 264, 266, and 268. Devices 262 and 268 are well within thecoverage region of base station 212, while device 264 is within anoverlapping zone between areas 210 and 230. Device 266 is outside thecoverage area of base station 212 and within coverage of base station224. However, each of the wireless devices is within a local arearepresented by distance R2 centered on transceiving device 252.

In addition, R1 represents the closest distance between base station 212and transceiving system 252. R4 represents the closest distance betweenbase station 222 and transceiving system 252 and R5 represents theclosest distance between base station 232 and transceiving system 252.FIGS. 22-24 represent graphs of power at R2 for each of base stations212, 222 and 234, respectively, in a manner similar to that shown inFIG. 20B. In this illustrated example, the power of each base station isassumed to be substantially equal so that the coverage areas,represented by R3, are substantially the same. However, it would berecognized that the power of each base station may be altered to providegreater or lesser coverage areas. In this case, the power received at R2may be greater or lesser and is a function of the output transmissionpower and the distance (e.g., R1, R4 and R5, respectively).

In one aspect of the invention, the transceiving system 252 may selectone of the base stations as a primary cell. The primary cell may beselected based on the base station being determined to be closest, indistance, to the transceiving device 252. The transceiving system 252may normalize the received power based on distance and transmissionpower of each of the base stations. In addition, the transceiving system252 may normalize the location of each of the base stations with respectto the location of the base station of the primary cell. That is, in theillustrated network configuration shown in FIG. 2, base station 212 maybe selected as the primary cell and base stations 222 and 232 may bedetermined as angularly separated with respect to the line between theprimary cell base station and the transceiving station 252. Thus, basestation 232 is slightly greater than 90 degrees offset from the linebetween base station 212 and transceiving station 252. Similarly, basestation 222 is slightly greater than 180 degrees offset from the linebetween base station 212 and transceiving station 252.

Referring to FIG. 25, the received power at R2 may then the offset basedon the angular difference between the primary cell base station and theother base stations.

FIG. 26, which represents a superposition of the powers of the threepower curves, and further illustrates the power to be transmitted bytransceiving station 252, as a function of an angle around thetransceiver to maintain control of each of the wireless devices within alocal area 250. As would be understood, the illustrated power is takenwith respect to an known angle about the transceiving system (device).

FIG. 27 illustrates a flow chart of an exemplary process in accordancewith the principles of the invention. In this illustrated process,transceiving system 252 receives the reference signal of each of aplurality of base stations. Although transceiving system 252 is outsidethe coverage area of base station 222, transceiving system 252 is stillable to receive the reference signal from base station 222 but does notcommunicate with this base station.

At block 620 a determination is made regarding the primary cell based onthe received power of the reference signals. At block 630, a position ofeach of the sources (base stations) of each of the reference signals maybe obtained or determined. For example, a base station position may bedetermined based on a received power and an angle of arrival of thereceived signal. Or the base station position may be provided usingGlobal Positioning Satellite system information. Or the base stationposition may be preloaded within general area.

At block 640 a distance is determined to each reference signal based onthe position of the source of the reference signal. At block 650, anexpected received power from each of the base stations is determinedalong a radius defining the local area with respect to transceivingsystem 252. A graph of received power from each of the base stationsalong the local area is determined. At block 660, positions of the basestations are normalized, angularly, with respect to a line between theprimary cell base station and the transceiving system 252 and thereceiving power graphs are oriented with respect to the primary cellbase station. A resultant power graph is determined based on thesuperposition of received power graphs and at block 670, thetransceiving system outputs a power level slightly greater than theresultant power at a corresponding angle.

In one embodiment of the invention a repeat Jamming Module providesrepeat jamming capability and specifically jams a targeted cell phonesand or wireless communication devices. This repeat jamming techniqueutilizes the outgoing signal of the cell phone and repeats thetransmission 100 ns after the initial signal with matching power. Theeffect of the overlapping communication on the receiving transceiverprovides a confusion in the receiving transceiver and makescommunication impossible and the call and or wireless communication isdropped. In one embodiment of the invention the jamming module includesa duel repeating circuit which has a programmable delay line built in toallow the same communication to be delay by the programmed delay amount.In another embodiment of the invention the repeat jammers are placed ineach section of the facility. When the signal detection array detects anunauthorized cell phone the repeat jammer takes that cell phone and onlythat cell phone off line. When the cell phone tries to acquire the towerthe cell phone's identification is re-verified.

In one embodiment of the invention, a Base Station Controlling Module,which identifies and controls cell phones, interfaces with Cell PhoneDetection system to determine authorized and unauthorized phones,provides phone type, the time of arrival and the cell phones frequencyand seamlessly interfaces backhaul and Denial of Service (DoS)capabilities. The Base Station Controlling Module, which identifiesand/or controls cell phones, Interfaces with Cell phone detection systemto determine whether a cell phone is an authorized/or unauthorized cellphone, the cell phone detection system Cell Phone Detection systemprovides phone type, the time of arrival and the cell phones frequencyto the base station unit, wherein the base station unit matches the cellphone detected signal with the base station controlling cell phones andverifies the cell phone of interest is within the unauthorized areas. Italso verifies, in one embodiment of the invention, whether the cellphone is an authorized cell phone for use within the facility, wherein adata matrix determines authorized vs. unauthorized cell phone andauthorized area vs. unauthorized areas and then seamlessly interfaces toprovide backhaul and/or DoS capabilities.

In one aspect of the invention, a cell phone identification module,which identifies cell phone ID's, determines whether an authorized orunauthorized phone exists, and provides the phone type, the time ofarrival and the cell phone's frequency and seamlessly interfaces withthe repeater jammer module, which disables the unauthorized phone in theunauthorized area and/or an unauthorized phone in any area of interest.The repeat jamming unit jams all unauthorized cell phone within thefacility and allows authorized cell phone.

In one embodiment of the invention, the Signal Detection Sensors areplaced throughout the facility to provide full coverage of the facility.Any Cell phone within the facility will be detected and displayed on thecentralized console interface. This information will be sent to thesoftware radio Identification module to verify if this is an authorizedor unauthorized cell phone. If the cell phone is unauthorized the repeatJammer module will disable the cell phone or the Software RadioIdentification Module will deny service. The Software RadioIdentification Module is designed to receive a signal being transmittedfrom a cell phone and decode the IMEI number; this IMEI number iscompared against a database of authorized IMEI authorized cell phones.In one aspect of the invention, to prevent cell phone from entering afacility undetected, Low Noise Jammers will be installed at all egress(Entrance) points within the facility. So that all cell phones cominginto the facility are verified by the Software Radio IdentificationModule. An ancillary benefit is anyone mistakenly or unknowinglybringing a cell phone into the facility will be pickup at the entrancepoint. In another embodiment, the Software Radio Identification Module(SRIM) identifies all cell phone within the coverage area. Any cellphone that is in an on state within the coverage area (area in lightblue) will be identified. The International Mobile Equipment Identitynumber or IMEI (Cell phone ID) will be compared with the Facilities'“authorized cell phone list”. Authorized Cell Phone is allowed to makeand receive calls. All Unauthorized cell phone are prevented from makingor receiving incoming and outgoing calls. The Software IdentificationModule can be expanded to provide cell phone call monitoring.

In one aspect of the invention, the base station acquires a new cellphone. The based station provides time code, band, type to cell phonethe Detection Sensor Array, wherein the Cell phone Detection SensorArray determines whether the cell phone is within an exclusion zone. Ifthe cell phone is detected outside a “Cell phone control area”, then thecell phone is released back to the Network Cell Tower and/or the callsare allowed where the cell phone is backhauled to the network. If thecell phone is found within the “control area”, the Base Stationdetermines whether the cell phone is an “Authorized Cell Phone” (VIA HLRDatabase interface) and the Console displays a location of cell phone,the (IMEI), and “Authorized cell phone status”. Alternatively, if thecell phone is determined to be an “Unauthorized Cell Phone” (VIA HLRDatabase interface), Base station prevents incoming and outgoing callsand the console displays the IMEI, the cell phone and “Unauthorizedphone status.” Or the Repeat Jammer Module Jams the cell phone signaland the Console displays the IMEI, the cell phone location and“Unauthorized phone status”, depending on the system configuration. Inanother embodiment, the Base Station identifies all cell phone withinthe coverage area. Any cell phone on within the coverage area (area inlight blue) will be identified. The International Mobile EquipmentIdentity number or IMEI (Cell phone ID) will be compared with theFacilities' “authorized cell phone list”. Authorized Cell Phone isallowed to make and receive calls. All Unauthorized cell phone areprevented from making or receiving incoming and outgoing calls. The Basestation module can also be expanded to provide cell phone callmonitoring.

In another embodiment the signal detection sensor array, is used toprovide Real-time tracking of inmates utilizing the BINJ Signal SensorArray with wristband tracking technology on each inmate. (See patentapplication Ser. No. 12/231,437). The system is expanded to include aStaff Safety Alert & Tracking System (SSAT) utilizing the Signal Sensorarray with built-in real-time wristband and/or security tags for thetracking of correction officers. In this embodiment of the system, thesystem, reports real-time time and position of every inmate and officerin the facility. The database collects every movement of a wristband upto 1000 times per second and provides this data into a Data mining andhistorical playback capability. In another embodiment of the system thewristband has a signal detection module which detects cell phone withina specific area the wrist band determines the user of the cell phone andreports the information back to the console. Some of the advantages intracking Officer and Inmates include: Increased Staff Safety; Inmateescape prevention tool; Inmate and staff out of position tool;Continuous and accurate count of inmates; Group/gangs interactionmonitoring; Accurate work scheduling and monitoring tool; On post/offpost position of all security personnel; Escape alarm; w/ last knownposition; w/ immediate alarm and the like. The data mining capabilitiesenable the data base and data mining to; accurately locate inmates inrelationship to other inmate/staff at all times and to accuratelyinvestigate assault/rape and assist in prosecution tool; and tophysically contact detection system for incident/rape investigation andprevention tool; Inmate tracking/Data Mining which provides for theidentification of predators and predatory behaviors, create exclusionzones and alerting system to notify security of a boundary violation;Inmate tracking and Data Mining: for assessing staff and inmates'vulnerabilities; provides for decreased agency liability by providingaccurate forensic information for court; the system also provides foraudio and alarm capability (incident/rape prevention tool).

In another embodiment of the invention, the Cell Phone Detection systemis integrated with a Base Station(s) Module, wherein this basestation(s) may also have back haul capability that utilizes a pico/nanobase station technology and cell phone detection system; the basestation registers the cell phone(s) and has the cell phone detectionsystem verify the location of the cell phone; the allowability moduledetermines whether the cell phone is authorized and/or unauthorized, Thesystem verifies who the cell phone belongs to if known IMEI (viadatabase). The base stations directed to the system to back haul allauthorized phones and display the authorized phones within theinterested area, and not display cell phones in non-interested areas.Then the base station(s) is directed to deny services to allnon-registered/unauthorized within the restricted area and display theserestricted phones and notifying staff of their location and presence.

In another embodiment of the invention, the Cell Phone Detection systemworks in conjunction with an integrated Base Stations Module withoutback haul capability, wherein the base station(s) register the phone andhas Cell Phone Detection system that verifies the location of the cellphone. The allowability module determines whether the phone is theinside the restricted area. The system verifies who the phone belongsto, if known IMEI (via database). The base station is directed torelease the authorized cell phone and the cell phone which is not in therestricted areas back to the local tower and display the authorizedphones within the interested area. The base station will not display acell phone a non-interested areas. The base station is directed to holdonto unauthorized cell phones and display the unauthorized phones. Allnon-registered cell phones will have Denial of Service (DoS), via beingheld onto by the base station unit and the like.

In another embodiment of the invention, the Cell Phone Detection andIdentification Module in which the Cell Phone Detection system is thecontrolling unit. In this case the system utilizes a sniffer and/orembedded IMEI decoders within each sensors and cell phone detectionsensors to determine the location and identification of all cell phoneswithin a specific area. The signal detection sensors find and positivelylocate the phone. In a configuration in which each sensor does notpossess a decoder IMEI module, the sensor provide the followinginformation to the sniffer (TOA, frequency, type, channel . . . ). Thesniffer can scan for the phone, then reports back the identificationinformation. The system verifies who the phone belongs to and whetherthe cell phone is authorized or not authorized. In a configuration inwhich each sensor has a decoder module, the system displays green forauthorized phone, red for unauthorized phones and the like. In anotherembodiment, the Sniffer module finds and positively identifies the cellphones and provides information to the cell phone detection and locationsystem (TOA, ID, frequency, type, channel). The Cell phone detection andlocation system then scans for the cell phone, wherein the systemverifies, who the phone belongs to and whether the cell phone isauthorized or not authorized in that location. Then the system displaysgreen for an authorized phone and red for an unauthorized phone and thelike.

In one aspect of the invention, the Cell Phone Detection andIdentification Module works in conjunction with 3rd party Telco Support;in this aspect the sniffer module (IMEI decoder and identified)positively identify the phones; the sniffer gives information to thecell phone detection and location system (TOA, ID, freq, type, channel .. . ); the Cell phone detection system scans and identifies location ofinterested cell phone; the system verifies who the phone belongs andwhether the cell phone is Authorized and/or not authorized; the systemdisplays green for authorized phone red for unauthorized phones; thenthe system an alerts the appropriate cell phone provider of unauthorizedcall phone to have the cell phone provider deny service on said cellphone and has Staff confiscate cell phone and the like.

In another aspect of the invention, the Cell Phone Detection systemworks in conjunction with a repeat Jamming system and an IdentificationModule and/or embedded decoding module; the sensors find and positivelylocate the phones; in the case in which there is external identificationof the IMEI, the system gives information to the sniffer (TOA, freq,type, channel . . . ); the sniffer scan for the phone; the snifferreport back the identification of the cell phone; System compares the IDwith the database of authorized phone; System Verifies who the phonebelongs to Authorized or not authorized; the system displays green forauthorized phone red for unauthorized phones; the unauthorized phonehave the facility pick up that specific phone; the repeat jammerdisrupts specific phone rotates signal w/ a set repeat delay to take thecell phone off line; Pinpoint jam disrupts all phone with in the channeland area and/or the Broadband jammer disrupts all phone within area andfrequency coverage and the like.

Although not shown, it would be recognized that the receiving and/or thetransmitting antennas and/or the processing systems may be co-located ormay be geographically distributed. When a plurality of receivingantennas are employed and geographically distributed, it would berecognized that correlation of the information obtained from eachantenna is necessary. In one aspect of the invention, a plurality ofantennas having a known angular receiving pattern may be co-located, seeFIG. 7, and remotely located from the processing system, to receivesignals at substantially the same time. It would be recognized that whenthe antenna system is remotely located from the processing system, theareas shown in FIG. 19B are oriented with respect to the antenna system.

In another embodiment of the invention, the wristband as described inpatent application Ser. No. 12/231,437, includes a signal detectionmodule as described in FIG. 6 and/or alternatively in anotherembodiment, FIG. 11, the signal detection module detects cell phonesignals, its use, and unique identifier information of the cell phonebeing used by the inmate. The wristband module may also include a voicerecognition module. A Cell Phone Use, and Authorization Database module(CPU-ADM), interfaces with the cell phone detection system and the basestation control system and controls when an inmate may make a phone calland/or receive a call. This module holds the allowed or dis-allowed cellphone information for each inmate, what cell phone(s) he is allowed touse, the areas and times in which an inmate may use his cell phone, theauthorized places and phone numbers which the inmate may call and/orreceive phone call from. The CPU-ADM system in cooperation with the basestation unit and cell phone detection units inputs, controls and monitorhow long an inmate may stay on the phone, the cost incurred for eachphone call, records the inmates conversations, correlated voice patternwith each inmate to insure each is inmate is who the prescribe to be,and that one inmate is not talking on another inmates cell phone;Correlates voice pattern of all calls may by the inmate and theirrecipient(s). The CPU-ADM system analysis all calls received and allcall made in conjunction with all person(s) contacted and analysis forthreat group, and security concerns and trends. The system in monitorsthreat alerts analysis and on keys words. The CPU-ADM system interfaceswith the canteen/inmate trust fund to debit inmate's account for eachcall made. The CPU-ADM system interface allows for inmates to inputtheir desired call numbers, system allows for security personnelmonitoring.

It is expressly intended that all combinations of those elements thatperform substantially the same function in substantially the same way toachieve the same results are within the scope of the invention.Substitutions of elements from one described embodiment to another arealso fully intended and contemplated. For example, while the term “cellphone” or “transmission facility” or “transmission device” has been usedherein, such terms relate to a general class of wireless transmissiondevices that includes standard cell phones, smart phones (e.g., PALMCENTRO), and iPhones. PALM is a registered trademark and CENTRO is atrademark of the Palm Inc., Sunnyvale, Calif. iPhone is a registeredtrademark of Apple Inc. Culpertino, Calif.

While the invention has been described in connection with certainpreferred embodiments; other embodiments and/or modifications would beunderstood by one of ordinary skill in the art and are encompassedherein.

1-20. (canceled)
 21. A method, operable in a processing system, for capturing a transmission facility within a set area, said method causing said processing system to execute the steps of: receiving a reference signal from a base station; determining an expected received power of the reference signal at said transmission facility; transmitting a simulated reference signal, the simulated reference signal having a higher power at said transmission facility than the expected received power, wherein said simulated reference signal causes said transmission facility to re-establish communication with said base station; establishing communication with the transmission facility when said transmission facility attempts to re-establish communication with said base station; and receiving transmission from the transmission facility; determining identification information associated with said transmission facility; determining an allowability of the transmission facility to receive and transmit signals within said set area; and retaining control of said transmission facility communication when said allowability indicates the transmission facility is not allowed to receive and transmit signals.
 22. The method of claim 21 wherein said identification information comprises at least one of: a transmission frequency, a transmission identification number, a transmission time of arrival, a transmission type, a transmission characteristic, a transmission location, a transmission amplitude, a transmission width, a transmission frequency range and a unique identifier.
 23. The method of claim 21, wherein said location of said transmission facility is determined based on at least one of: an amplitude received on at least one receiving antenna, an amplitude received on one receiving antenna with a known angular orientation, a GPS technology, a time difference of arrival at a plurality of receiving antenna, an angle of arrival at at least one receiving antenna, and a map-based location.
 24. The method of claim 21, wherein said simulated reference signal is a command signal instructing said transmission facility to re-establish communication with said base station.
 24. The method of claim 24, wherein said command signal is a discrete signal.
 25. The method of claim 21, wherein the step of determining allowability comprises: determining whether an identification of said transmission facility is contained within an allowability file; and indicating allowability when said identification is contained within said allowability file. 