U.S. patent application number 15/077862 was filed with the patent office on 2018-01-25 for method and system for tracking and determining a location of a wireless transmission.
This patent application is currently assigned to BINJ Laboratories, Inc.. The applicant listed for this patent is BINJ Laboratories, INC.. Invention is credited to Joseph S. Noonan.
Application Number | 20180027517 15/077862 |
Document ID | / |
Family ID | 59898418 |
Filed Date | 2018-01-25 |
United States Patent
Application |
20180027517 |
Kind Code |
A9 |
Noonan; Joseph S. |
January 25, 2018 |
Method and System for Tracking and Determining a Location of a
Wireless Transmission
Abstract
An apparatus for detecting and timing a transmitting device is
disclosed. The device includes a receiving system receiving a
signal containing at least a preamble code of a known length and at
least one pulse within a receive window after the preamble code, a
circuit receiving the at least one pulse comprising a zero-crossing
circuit for indicting a zero-voltage crossing of the at least one
pulse and a trigger device for latching the indication of
zero-voltage crossing, and a ripple circuit counter, receiving the
latched indication of said zero-voltage crossing and associating a
time to the receipt of the latched indication. A system for
detecting and locating a transmitting device is further disclosed.
The system includes a plurality of sensor apparatus each
determining a reception time of a signal and a processor for
determining a location based on groups of the reception times
Inventors: |
Noonan; Joseph S.;
(Scituate, MA) |
|
Applicant: |
Name |
City |
State |
Country |
Type |
BINJ Laboratories, INC. |
Scituate |
MA |
US |
|
|
Assignee: |
BINJ Laboratories, Inc.
|
Prior
Publication: |
|
Document Identifier |
Publication Date |
|
US 20170280411 A1 |
September 28, 2017 |
|
|
Family ID: |
59898418 |
Appl. No.: |
15/077862 |
Filed: |
March 22, 2016 |
Related U.S. Patent Documents
|
|
|
|
|
|
Application
Number |
Filing Date |
Patent Number |
|
|
13567086 |
Aug 5, 2012 |
9332520 |
|
|
15077862 |
|
|
|
|
12157530 |
Jun 11, 2008 |
8238936 |
|
|
13567086 |
|
|
|
|
11457786 |
Jul 14, 2006 |
8078190 |
|
|
12157530 |
|
|
|
|
Current U.S.
Class: |
455/456.1 |
Current CPC
Class: |
H04W 64/00 20130101;
G01S 5/02 20130101; H04W 4/90 20180201 |
International
Class: |
H04W 64/00 20090101
H04W064/00; H04W 72/04 20090101 H04W072/04; H04W 4/22 20090101
H04W004/22 |
Claims
1. A system for managing communication access in a designated area,
the system comprising: a first system comprising: at least one
transmitting system configured to transmit a pre-determined signal
into the designated area; and at least one receiving system
configured to receive a signal in response to the pre-determined
signal, said response signal being received within a time slot
window assigned to a transmission element, said time slot window
initiated a pre-determined time after transmission of the
pre-determined signal; and a second system comprising: at least one
receiving system configured to receive a transmission from a
transmission device; and a processing system configured to: receive
information associated with the responses received from
transmission elements; associate the transmission elements with a
corresponding user based on received information within the
response signal; determine an action to be performed based on the
information received.
2. The system of claim 1, wherein said pre-determined signal is a
synchronization signal.
3. The system of claim 1, wherein said transmission from the
transmission device being an unsolicited transmission.
4. The system of claim 1, wherein said action is at least an
indication of allowability of the transmission device based on the
correlation.
5. The system of claim 4, wherein said indication of allowability
is based on a positive correlation of an identity of the user with
the transmission device.
6. The system of claim 4, wherein said processor configured to:
allow subsequent transmission from the transmission device when the
associated user is an indication of allowance.
7. The system of claim 4, wherein said indication of allowability
is based on a positive correlation of a location of the user with
the transmission device.
8. The system of claim 1, wherein said processor configured to:
correlate the transmission device with a user.
9. The system of claim 1, wherein said processor configured to:
determine a location of selected ones of the transmission elements
and the transmission device.
10. The system of claim 1, wherein said correlation is based on at
least one of: a location and an identity of a corresponding
user.
11. The system of claim 1, wherein each of the transmission
elements is allocated a time slot within a time frame between
periodic transmissions of said pre-determined signal, said time
slot occurring a predetermined time after the pre-determined
signal.
12. The system of claim 1, wherein each of the transmission
elements is assigned a preamble code.
13. The system of claim 1, wherein each of the transmission
elements is assigned an identification code.
14. The system of claim 12, wherein said identification code is one
of: pre-assigned and provided to the transmission element.
15. The system of claim 14, wherein said response signal includes
within the allocated time slot, the preamble code and at least one
pulse transmitted a predetermined time after an end of the preamble
code.
16. The system of claim 1, wherein said response signal includes
bio-metric information.
17. The system of claim 1, wherein said transmission from the
transmission device represents an occurrence of an event.
18. The system of claim 1, wherein said action comprises at least
one of: informing at least one person associated with a user of the
transmission device a location said user.
19. The system of claim 1, wherein said transmission is received in
a frequency band associated with at least one of: cellular,
walkie-talkie, Wi-Fi, transceiver technology and VolP.
20. The system of claim 17, wherein said event represents an
emergency condition.
21. The system of claim 17, said processor configured to: provide
instruction to selected ones of the users of a location of the
event.
Description
CLAIM OF PRIORITY
[0001] This application claims the benefit of the earlier filing
date, pursuant to 35 USC 120, as a continuation in part of that
patent application filed on Aug. 5, 2012and afforded Ser. No.
13/567,086, which claimed the benefit of the earlier filing data,
pursuant to 35 USC, as a continuation of that patent applications,
filed on Jun. 11, 2008 and afforded Ser. No. 12/157,530, now U.S.
Pat. No. 8,238,936, which claimed the benefit of the earlier filing
date, pursuant to 35 USC 120 , as a continuation-in-part to that
patent application entitled "System and Methods of Detection
Transmission Facilities," filed on Jul. 14, 2006, and assigned Ser.
No. 11/457,786, now U.S. Pat. No. 8,078,190, which claimed,
pursuant to 35 USC 119, priority to US Provisional Patent
application entitled "Signal Tracking and Identification Including
Cell Phone Detection," filed on Nov. 23, 2005 and afforded Ser. No.
60/739,877 and U.S. Provisional Patent application entitled "Cell
Phone Detection System," filed on Jul. 14, 2005 and afforded Ser.
No. 60/699,281, the contents of all of which are incorporated by
reference herein.
Related Application
[0002] This application is related to that patent application Ser
No. 11/610493, entitled "Methods and Systems for High Speed
Broadband Digital Link," filed on Dec. 13, 2006, and to that patent
application entitled "Method and System for Tracking and
Determining a Location of a Wireless Transmission, filed on Sept.
8, 2008 and afforded Ser. No. 12/231,437, the contents of which are
incorporated by reference herein.
FIELD OF THE INVENTION
[0003] The present invention is related to the field of wireless
communication and more particularly to a method and system for
tracking and determining the location of a wireless
transmission.
BACKGROUND OF THE INVENTION
[0004] There are many facilities, such as government buildings,
schools and in particular correctional complexes, such as prisons,
that do not permit wireless transmission (which is referred to
herein as cellular phone usage) on the premises or even possession
of cell phones on the premises. Preventing usage of such cell
phones and other transmission facilities in such facilities/areas
is of critical importance. For example, in government buildings,
such as courts, cell phones usage is limited to prevent
disturbances within the court room. In military facilities, cell
phone use is limited to prevent the distribution of classified
materials through a text or photographic feature of the cell phone.
Cell phone usage in schools is limited to avoid distractions that
may occur during the class session. And in prisons or correction
facilities, cell phone usage is limited to maintain control of the
population within the facility. Hence, detecting, tracking and
determining the location of such unauthorized cell phone usage is
important to each of these different types of facilities.
[0005] In other aspects, the use of wireless communication (cell
phone usage and or other wireless transmission devices) is
important in determining a location of the communication and the
location of the person or object wearing such communication device.
For example, in fighting a fire within a high-rise building, fire
personnel may be distributed among a number of floors and there is
a need to know their location, first, to better organize their fire
fighting skills and second, and to provide direction for a safe
exit in case of blockage to one or more of their egresses.
Similarly, in a school situation, while student usage of cell
phones may be prohibited, a wireless communication system may be
useful to the student's parents in knowing that their child is
actually in the school environment. Additionally, in a correctional
environment the movement of staff, detainees, and equipment are
critical to know the status and location of such staff, detainees
and equipment.
[0006] Hence, there is a need for methods of detecting,
identifying, tracking and locating wireless communication
transmissions within facilities to limit regulate prevent, and/or
monitor the ability to complete such wireless communication
transmission.
SUMMARY OF THE INVENTION
[0007] An apparatus for detecting and timing a transmitting device
is disclosed. The device includes a receiving system receiving a
signal containing at least a preamble code of a known length and at
least one pulse within a receive window after the preamble code, a
circuit receiving the at least one pulse comprising a zero-crossing
circuit for indicting a zero-voltage crossing of the at least one
pulse and a trigger device for latching the indication of
zero-voltage crossing, and a ripple circuit counter, receiving the
latched indication of said zero-voltage crossing and associating a
time to the receipt of the latched indication. A system for
detecting and locating a transmitting device is further disclosed.
The system includes a plurality of sensor apparatus each
determining a reception time of a signal and a processor for
determining a location based on groups of the reception times.
BRIEF DESCRIPTION OF THE DRAWINGS
[0008] For a better understanding of the invention, reference is
now made to the drawings wherein:
[0009] FIG. 1 illustrates a first exemplary application of a
detecting, tracking, and locating system in accordance with the
principle of the invention;
[0010] FIG. 2 illustrates one section of a detecting, tracking and
locating system in accordance with the principles of the
invention;
[0011] FIG. 3 illustrates a block diagram of a sensor apparatus in
accordance with the principles of the invention;
[0012] FIG. 4 illustrates a second block diagram of a sensor
apparatus in accordance with the principles of the invention;
[0013] FIGS. 5A and 5B illustrates exemplary message protocols in
accordance with the principles of the invention;
[0014] FIG. 6 illustrates an exemplary process for identifying
wireless communication systems in accordance with the principles of
the invention;
[0015] FIG. 7A illustrates an exemplary process for tracking a
wireless communication in accordance with the principles of the
invention;
[0016] FIG. 7B illustrates an exemplary process for locating a
wireless transmission in accordance with the principles of the
invention;
[0017] FIGS. 8A-8C illustrates further exemplary applications of
the detecting, tracking, and locating system in accordance with the
principles of the invention;
[0018] FIG. 9 illustrates a block diagram of an exemplary remote
device in accordance with the principles of the invention; and
[0019] FIG. 10 illustrates a system for implementing the system in
accordance with the principles of the invention.
[0020] FIG. 11 illustrates an exemplary system configuration in
accordance with the principles of the invention.
[0021] FIG. 12 illustrates a flow chart of an exemplary processing
in accordance with the principles of the invention.
[0022] It is to be understood that these drawings are solely for
purposes of illustrating the concepts of the invention and are not
intended as a definition of the limits of the invention. The
embodiments shown in the figures herein and described in the
accompanying detailed description are to be used as illustrative
embodiments and should not be construed as the only manner of
practicing the invention. Also, the same reference numerals,
possibly supplemented with reference characters where appropriate,
have been used to identify similar elements.
DETAILED DESCRIPTION OF THE INVENTION
[0023] Detection of a transmission facility, such as a mobile phone
or hand-held radio transmitter, radio transceiver, or other wire
transmission device as described herein, within an obstruction rich
environment, such as a facility with many physical barriers to
electronic transmission, is difficult to achieve. Similarly the
detection of a transmission outside a facility over great distances
presents difficult challenges.
[0024] Referring to FIG. 1, the transmission detection,
identification, and reporting system 100 described herein provides
a method of detecting a transmission facility 202, such as depicted
in FIG. 2, within an environment rich in obstructions 102. In this
illustrated example, substation (or sensing device) 108 operates as
an independent detection. One embodiment of the transmission
detection, identification, and reporting system 100 may involve the
detection of a mobile phone 202 within a heavily walled and
metal-barred government facility such as a correctional facility.
In this embodiment, the system may utilize an array of antennas 104
selectively placed within the facility, collection substations 108
for localized collection of detected signals, a central unit 110
for the processing of incoming signals from the facility, a display
112 for showing the location of the detected transmission facility
202, and an action facility 114 for implementing standard
procedures in the event of a detection. In this embodiment, the
communications between the antennas 104 and the substations 108,
and between the substations 108 and the central unit 110, may be
wireless to make installation and maintenance of the system within
the facility, cost and time effective. Selective placement of the
antennas 104, combined with algorithms and methods for determining
location of the transmission facility 202, may allow a
substantially improved means for locating transmission facilities
202, such as mobile phones, in an otherwise heavily shielded
environment.
[0025] In embodiments the antenna 104 may be a multi-dipole
embedded antenna. Two examples of dual dipole embedded antennas are
provided in FIG. 3 as a first dual-dipole embedded antenna 302 and
a second dual dipole embedded antenna 304. In embodiments the
antenna may be adapted to receive one, two, three, four, or more
bandwidths. In embodiments the antenna 104 may be a dipole antenna
104, a Yagi-Uda Log-Periodic antenna 104, a loop antenna 104, a
quad antenna 104, a micro-strip antenna 104, a helical antenna 104,
and a phase array antenna 104, a patch antenna or the like.
[0026] In embodiments, the transmission facility 202 may be a
mobile phone, such as a flip phone, a slide phone, a cellular
phone, a handset, a satellite phone, a 3 G phone, a wireless phone,
a cordless phone, wireless transmission or the like. In
embodiments, the transmission facility 202 may be a radio, such as
a walkie-talkie, a mobile radio, a short-wave radio, or the
like.
[0027] In embodiments, the transmission band from the transmission
may be within the radio or other electromagnetic frequency
spectrum, such as extremely low frequency (ELF), super low
frequency (SLF), ultra low frequency (ULF), very low frequency
(VLF), low frequency (LF), medium frequency (MF), high frequency
(HF), very high frequency (VHF), ultra high frequency (UHF), super
high frequency (SHF), extremely high frequency (EHF), microwave, a
frequency suitable for 802.11x wireless communications, ultra wide
band (UWB), Bluetooth, or the like. In embodiments, the
transmission may be within the radio or other electromagnetic
frequency spectrum and may include multiple radio and other
electromagnetic frequency spectrum transmissions, performing multi
functions.
[0028] In embodiments, the obstruction 102 rich environment may be
a building, such as a corrections facility, a school, a government
facility, a store, a mall, a residence, a hotel, a storage complex,
a motel, or the like. In embodiments, the obstruction 102 rich
environment may be a large confined space, such as a courtyard, a
food court, a recess area, a hallway, greenhouse, recreation room,
gymnasium, auditorium, kitchen, cafeteria, craft area, work area,
library, prison yard, or the like. In embodiments, the obstruction
102 may be a transmission, device transmission obstruction 102,
such as cinderblock, cement, rebar, wire cage, metal, metal coated
surface, or the like. In embodiments, the obstruction 102 may be
other construction materials, such as wood, glass, rug, flooring
materials, roofing materials, and the like. In embodiments, antenna
104 may be placed a great distances from the area where the
transmission facility is located, in that case, the obstruction 102
to a transmission may be another building, rocks, trees or the
like. In embodiments, the obstruction 102 may be other construction
materials, such as wood, glass, rug, flooring materials, roofing
materials, and the like.
[0029] In embodiments, the transmitting signal information from the
antenna 104 module to the central unit 110 may be through a
communications connection, such as an IEEE 802.15.4, IEEE 802.11
a/b/g/n or coaxial cable, wireless network, wireless sensor to
sensor (i.e., leapfrogging, hopping and repeater methodologies),
IEEE 802.11 microwave, Wi-Fi, Bluetooth, Ethernet, or the and the
like. In embodiments, the communications connection may utilize
CAT-5, cat-6, microwave, RJ-45, RS-232, coaxial cable connections,
and the like. In embodiments the communications connection may
utilize an optical connection, such as a wireless infrared link, an
optical fiber, and the like.
[0030] In embodiments, the transmitting signal information from the
antenna 104 module to the central unit 110 may contain data, such
as CDMA, CDPD, GSM, TDMA, and the like, and may be used to
discriminate which service signal is being used, such as Verizon,
Cingular, T-Mobile, Sprint, and the like and may transmit data sets
such as text, video, data, images, and the like. The detection of
the cell phones may be resolved down to cell phone manufacturer,
EMEI, cell phone type, EMSI and cell phone provider and the
like.
[0031] In embodiments, the transmitting signal information to the
central unit 110 may be made through an intermediate connection,
such as a substation 108, router, switch, hub, bridge, multiplexer,
modem, network card, existing network, wireless hopping and
leapfrogging meshed networks, network interface, processing unit,
preprocessor, computer, repeater, antenna 104, and the like. In
embodiments, the transmitting signal information to the central
unit may encompass video and audio data and protocols and may
include 3.sup.rd party network traffic, TCP/IP or other protocol
information and the like. In embodiments, the transmitting signal
information to the central unit may be sent through internal and
external network systems and the like.
[0032] In embodiments, the central unit 110 may have in part a
computer, a computer system, a network of computers, a state
machine, a sequencer, a microprocessor, a digital signal processor,
an audio processor, a preprocessor, a microprocessor,
microcontroller, and the like.
[0033] In embodiments, the central unit 110 may process
information, such as data information, educational information,
identification information, audio, video information, environmental
(water, heat, toxins), proximity information and the like,
emergency information, such as, biometric information, alert and
danger information and the like, location information, such as the
location of people, inmates, corrections personnel, visitors, all
personnel within the facility, equipment, cell phones, wireless
devices, resources, weapons, products, incoming goods, outgoing
goods, movement information, such as speed, direction, height and
the like. In embodiments, the information may be the identification
of the transmission facility wearer. The information may be the
type of signal, such as mobile phone standard protocols such as
WiMax, CDMA, CDPA, GSM, TDMA, IS-95 and the like. In embodiments,
the information may be an event notification, such as personnel
under duress, an emergency medical condition, a call for
assistance, a fire, a call for police, a theft, and the like. In
embodiments, the processed information may allow for the tracking
of the person or object in possession of the transmission facility
202, such as a mobile phone, a radio, a weapon, a product, a
resource, and the like. In embodiments, the processed information
may allow for the discrimination and/or association between people
or objects, such as determining the ownership of the transmission
facility 202, the assignment of the source of transmission, current
location of a transmission facility 202 compared to its predicted
location, and the like. In embodiments, the processed information
may also have time codes and unique identifiers assigned and the
like. In embodiments, the processed information may include other
near area transmission facility information with unique identifiers
assigned and the like.
[0034] In embodiments, the central unit 110 may have a display 112,
such as a cathode ray tube (CRT), liquid crystal display 112 (LCD),
electronic paper, 3D display 112, head-mounted display 112,
projector, segmented display 112, computer display 112, graphic
output display 112, and the like. In embodiments, the central unit
110 may have an action facility 114, comprising a user interface
for causing actions relating to the detected transmission facility
202, such as closing a door, sealing a room, deploying and action
signal, initiating an alarm, and the like. In embodiments, the
central unit 110 may have an action facility 114, comprising an
interfacing unit that interfaces with existing networks or
processes which utilize the information that may be generated by
one or more of the embodiments described herein.
[0035] In embodiments the functions of a central unit 110 as
described herein may be replaced by an alternate configuration,
such as a configuration of multiple computers, such as a group of
servers, processors, or the like, operating in parallel. In
embodiments the methods and systems described herein may involve
locating computing capabilities in alternative network
configurations, such as in a mesh network or a peer-to-peer
network.
[0036] In embodiments, the location of a transmission facility 202
may be determined by various radiolocation or signal measurement
techniques, including measuring phase, Magnetic field strength,
amplitude, time, or a combination of these; or by identifying and
locating an area associated with an antenna 104 with the highest
signal strength. In embodiments, the location of a transmission
facility 202 may be determined by various radiolocation or signal
measurement techniques, including measuring phase, amplitude, time,
or a combination of these; or by identifying and locating an area
associated with other transmission facility. In embodiments, the
location of a transmission facility 202 may be determined by a
transceiver transmission facility 202 which includes a location
sensing, such GPS, or by another transmission facility 202
containing proximity sensor, e.g., capacitive coupling, or
detecting sensor, e.g., Bluetooth or other similar short range
wireless detection device. In embodiments, the location of a
transmission facility 202 may be determined when the transmission
facility 202 is powered off though detection of a null in the band
pass of a transmitted frequency sweep due to the presence of a
mobile phone antenna. In embodiments, the location of a
transmission facility 202 may be determined by measurement
techniques, including measuring resistance, a null in the band
pass, impedance, Electrometric field, near field technology radio
frequency radiation methodologies, or a combination of these; or by
identifying and locating an area associated with other transmission
facility.
[0037] In embodiments, a method of detecting a transmission
facility 202 (e.g. cell phone) when the transmission facility 202
is not powered may require a transmitting device and a receiving
device that can recognize the signature of an antenna 104
associated with the transmission facility 202. By transmitting a
known frequency and receiving the disturbance pattern produced by
having a particular antenna 104 design in the transmission path,
the pattern or `signature` of that antenna 104 can be
characterized. In embodiments, this characterization may be
evaluated with a microprocessor 1402 with results output to a
display 112. A database of these signatures can be placed into the
device, and as the transmitter sweeps across the various cell
frequencies, a pattern received can be matched against the database
patterns to determine the presence of transmission facilities 202.
In embodiments, any class of antenna (e.g. WI-FI, Blackberry,
Walkie-Talkie, etc.) can be classified and identified.
[0038] In embodiments, the range of a hand held device that can
detect an inactive transmission facility is approximately 10 feet.
In embodiments, greater distances could be attained for stationary
units by increasing the power and/or changing sensitivity.
[0039] Radiolocation, also referred to as radio-determination, as
used herein encompasses any process of finding the location of a
transmitter by means of the propagation properties of waves. The
angle at which a signal is received, as well as the time it takes
to propagate, may both contribute to the determination of the
location of the transmission facility 202. There are a variety of
methods that may be employed in the determination of the location
of a transmission facility 202. Methods include (i) a cell-sector
system that collects information pertaining to cell and sector
ID's, (ii) the assisted-global positioning satellite (GPS)
technology utilizing a GPS chipset in a mobile communication
facility, (iii) standard GPS technology, (iv) enhanced-observed
time difference technology utilizing software residing on a server
that uses signal transmission of time differences received by
geographically dispersed radio receivers to pinpoint a user's
location, (v) time difference of arrival, (vi) time of arrival,
(vii) angle of arrival, (viii) triangulation of cellular signals,
(iix) location based on proximity to known locations (including
locations of other radio-transmitters), (ix) map-based location, or
any combination of any of the foregoing, as well as other location
facilities known to those of skill in the art.
[0040] Obstructions 102 to radio wave propagation may greatly
reduce the effectiveness of many of the conventional radiolocation
methods due to obstruction of the line-of-sight between the
transmission facilities 202 and the receiving antennas 104.
However, by employing a large array of antennas 104, positioned so
as to maintain line-of-sight between possible transmission facility
202 locations and the receiving antennas 104, several of these
methods may be effectively used in the location of the transmission
facility 202. Additionally, by employing an array of antennas 104,
positioned to detect transmission facility 202 locations wherein
the receiving antennas 104 are obstructed in such manner that
line-of-sight prevented, several of these methods may be
effectively used in the location of the transmission facility 202.
These methods include time difference of arrival, time of arrival,
and angle of arrival, amplitude comparison, and the like. The time
difference of arrival method determines the difference in the time,
or the difference in phase, of the same radio-transmitting signal
arriving at different receiving antennas 104. Together with the
known propagation speed of the radio wave, allows the determination
of the location of the transmission facility 202. The time of
arrival method determines the absolute time of reception of the
signal at different receiving antennas 104, and again, along with
the known propagation speed of the radio wave, allows the
determination of the location of the transmission facility 202. The
angle of arrival method utilizes direction of transmission to
different antennas 104 to determine the location of the
transmission facility. Amplitude comparison method compares the
strength of the signal detected at each antenna to determine the
location of a transmission facility 202. For example, two antennas
104 located in the same room would detect different signal
amplitudes for the same transmission facility 202 output, thereby
providing a means of determining which antenna 104 the transmission
facility 202 is closer to. Increasing the number of antennas 104
therefore increases the resolution with which the location of the
transmission facility 202 may be determined. All of these methods,
and combinations of these methods, may employ mathematical
processes such as triangulation, trilateration, multilateration, or
like, in determining the location of the transmission facility.
[0041] Triangulation is the process of finding coordinates and
distance to a point by calculating the length of one side of a
triangle, given measurements of angles and/or sides of the triangle
formed by that point, such as the target transmission facility 202,
and two other known reference points, such as the receiving
antennas 104. The calculation of the location of the transmission
facility 202 may then be performed utilizing the law of Sines from
trigonometry. Tri-lateration is a method similar to triangulation,
but unlike triangulation, which uses angle measurements, together
with at least one known distance, to calculate the subject's
location, tri-lateration uses the known locations of two or more
reference points and the measured distance to the subject, such as
the transmission facility 202, and each reference point, such as
the receiving antennas 104. Multi-lateration, or hyperbolic
positioning, is similar to tri-lateration, but multi-lateration
uses measurements of time difference of arrival, rather than time
of arrival, to estimate location using the intersection of
hyperboloids.
[0042] While several radiolocation and triangulation techniques
have been described in connection with locating the transmitting
device, it should be understood that one skilled in the art would
appreciate that there are other location methodologies and such
location methodologies are encompassed by the present invention.
For example, in embodiments, the location of a single antenna may
be known and the single antenna may detect a transmitting device.
The location of the transmitting device may be estimated through
its known proximity to the single antenna location. This may
provide adequate location resolution for certain applications of
the technology. Similarly, two or more antennas may be used and
each of the antenna locations may be known. When each of the
antennas receives a transmission, the corresponding signal
strengths may be compared. The one with the highest signal strength
may be determined as the one closest to the transmitting device so
the corresponding antenna location may provide enough location
resolution for certain applications.
[0043] In an embodiment of the transmission detection,
identification, and reporting system 100, a corrections facility,
with its substantial and inherent obstruction 102 rich environment,
presents an ideal example of how the transmission detection,
identification, and reporting system 100 may significantly increase
the detection of transmission facilities 202 such as mobile phones,
a significant challenge to authorities of the correction
facilities. In this embodiment, the system maybe placed throughout
the corrections facility for the purpose of alerting the
corrections staff that cell phone activity is taking place, the
time of the activity, the location of the activity and the type of
device or service i.e., Nextel, T-Mobile, Verizon, and the like. In
another example of an embodiment of the transmission detection,
identification, and reporting system 100 may be placed on the
perimeter of a selected area for the purpose of alerting school
officials, neighborhood watch programs, homeland security personnel
and/or law enforcement that cell phone and/or transmission facility
movement and/or activity is taking place, within the parameter of
the area covered. The time of the activity, the location of the
activity and the type, i.e., transmission facility identification,
such as, Nextel, T-Mobile, Verizon, and the like, may also be
determined and provided. A further embodiment of the system
suitable for school safety includes the identification of all cell
phone usage within the facility. In this embodiment the integration
with a CCTV apparatus, with positional coordinates, the
transmission facility and the sensor array nodes have audio, video
surveillance capability with biometric and alert technologies, such
as bomb detection, bio-hazards, prohibited substances detection and
the like. In an embodiment of the transmission detection,
identification, and reporting system 100 may also direct other
types of transmission detection, identification, and reporting
system 100 to focus on a specific transmission facility and the
like. In an embodiment of the transmission detection,
identification, and reporting system 100 may provide energy
conservation methodologies, such as idle mode and the like, to
reduce the power requirements of battery or solar powered
equipments. The technologies described herein may also allow for
standalone detection units incorporated in a transmission facility
or a set of detection units to detect transmission devices in
schools, buildings and other environments in which the facility's
or area's provider does not wish the use of cell phones and is
interested in the detection of cell phone use.
[0044] FIG. 3 illustrates a high-level block diagram of an
exemplary sensing system in accordance with the principles of the
invention. In this illustrated embodiment, antenna 104-1 receives
low power data signals from a transmission facility or wireless
transmission device (not shown). The data signal is provided to
transceiver (transmitter/receiver) 310 that down-converts the data
signal and provides the data signal to process 330. In this case,
processor 330 is implemented as Field Programmable Gate Array
(FPGA). Processor 330 may similarly be presented as a general
purpose processor unit or an Application Specific Integrated
Circuit (ASIC).
[0045] Antenna 104-2 receives a Radio Frequency (RF) signal and
provides the RF signal to RF stage 370 for down-converting and
amplification. The down-converted signal is then applied to a "log"
amplifier 375. Log amplifiers are known in the art to provide a
gain value to a received signal based on the magnitude of the
received signal. In this case, the gain is applied according to a
logarithmic function rather than a linear function. The output of
RF stage 370 and log amplifier are applied to a dual comparator
380.
[0046] One output of the dual comparator 380 is applied to FPGA 330
and one output is applied to a stop clock circuit 390, which
determines a time when a designated received pulse is detected.
FPGA 330 provides an enable signal to the stop clock circuit 390.
An output of the stop clock circuit 390 is applied to a ripple
circuit, which maintains an accurate time to determine a accurate
time when the designated received pulse is detected.
[0047] Also shown is a high-accuracy clock 360 that provides a
clock signal to FPGA 330. Preferably, clock 360 is a rubidium clock
having a measurement accuracy in the order of picoseconds. The
rubidium clock 360 may be connected to a dedicated category 6 cable
that allows for allowing connection of one or more devices
requiring a high-accuracy clock signal.
[0048] Processor clock/FPGA clocks 350 are provided to the
respective devices for the internal operation of these devices. The
processor clock and FPGA clock signals may be generated
independently.
[0049] FIG. 4 illustrates a further detailed block diagram
implementation f a sensing system in accordance with the principles
of the invention. In illustrated embodiment, antenna 104-1 receives
a data signal, as previously described, and applies the received
signal to transceiver 310. The output of transceiver 310 is applied
to FPGA 330. In one aspect of the invention, the data signal is
transmitted on a carrier frequency of 434 Mhz. Antenna 104-2
receives a signal and applies the received signal to RF stage 370.
RF stage 370 is composed of a low-pass filter 405 to remove high
frequency signals, a 20 db (decibel) amplifier 410 to amplify the
remaining received signal, a mixer 415 to down-convert the received
signal to a known baseband signal and a second amplifier 420 to
amplify the baseband signal. The output of the RF stage 370 is
applied to log amplifier 375. Log amplifier 375 is composed of log
amplifier 375-1 and operational amplifier 375-2. Log amplifier
375-1 amplifies the received signal based on a logarithmic
function, as previous described, and operational amplifier 375-2
amplifies the received signal based on a linear function.
[0050] The output of the operational amplifier 375-2 is applied to
a Analog/Digital Converter 430 that digitizes the received signal,
which is then applied to FPGA 330. In addition, the output of each
of the log amplifier and the operational amplifier is applied to a
dual comparator 380, which compares the applied inputs to known
threshold values to reduce spurious signals. The log amplifier
signal and the operational amplifier are each applied to the FGPA
330 and the output of the operational amplifier is further applied
to a stop clock circuit 390. Stop clock circuit 390 is composed of
a zero-crossing circuit 390-1 and a trigger device 390-2 (e.g., a
D-flip flop). Zero-crossing circuit 390-1 are known in the art to
provide an indication when a modulation of a signal crosses a
zero-voltage value. The zero-crossing indication is then provided
to trigger circuit 390-2 which provides a digital representation of
the zero-crossing.
[0051] The digital representation output of the clock stop circuit
is next applied to the ripple counter circuit 340. In this
illustrated embodiment, ripple counter circuit 340 is composed of a
clock multiplier 340.1 that multiples a clock signal received from
FPGA 330. The multiplied clock is provided to a divide by two
circuit 340.2 to reduce the clock rate. The reduced clock rate is
applied to a ripple counter 340.3. In this illustrated case, the
ripple counter 340.3 provides a signal to FPGA when a stop clock
signal is received from stop clock circuit 390.
[0052] In a preferred embodiment, a 160 MHz clock is provided to
clock multiplier 340.1 which produces a clock rate of 2.4 GHz. The
2.4 GHz clock is divided to a clock rate of 1.2 GHz to operate
ripple counter 340.3 The output of the divide by two device is
presented to the FPGA, representing the most significant bit, prior
to the ripple counter. In this case the ripple counter 340.3
operates in the order of nanosecond resolution. Although, the clock
rate is shown as being increased and then decreased, this is merely
a function of an implementation and is not to be considered the
only means of generating a clock signal or that the clock is
limited to a 2.4 GHz signal.
[0053] FPGA in 330 receives a ripple counter value associated with
stop clock indication. The ripple counter value represents a time
value, which in conjunction with similar ripple counter values may
be used to determine a location of a cell phone or similar
transmitting device, as is described with regard to FIGS.
7A-7B.
[0054] FIG. 5A illustrates an exemplary message protocol in
accordance with the principles of the invention. In this exemplary
message, a preamble message 510 is composed of a plurality of data
bits represented as 510.1-510.n. Each of the data bits 510.1-510.n
may represent one or more additional bit. For the purposes of
describing the principles of the invention, each illustrated data
bit 510.1-510.n represents a single data bit. The preamble message
may represent an identification of a user, a characteristic of a
user, biometric data of a user or combinations thereof. Preamble
510 further represents a marker and a trigger that identifies the
beginning of the reception of a transmission of particular user. In
one aspect of the invention the number of bits in preamble 510 is
fixed at sixteen (16). However, it would be recognized that the
number of preamble bits may be selected based on desired
transmission characteristics and have been contemplated and
considered within the scope of the invention described herein.
[0055] After reception of a number of known preamble bits
510.1-510.n, a pulse projection window 515 is open for a known
period of time to capture the occurrence of a next pulse 530 in the
pulse sequence. This next pulse is referred to as clock stop pulse.
The clock stop pulse is used to accurately determine end of
transmission as described with regard to FIG. 4. Clock stop pulse
530 is further composed of a plurality of individual pulses
530.1-530.n, that are distributed among the clock stop pulse. The
detection of at least one pulse 530.1-530.n satisfying at least one
known criterion is used as a time marker to mark the end of
transmission from a user.
[0056] In one aspect of the invention, the preamble pulses are
selected as being of a duration of 71 nanoseconds uniformly
distributed over a 1.136 microsecond time frame. The pulse window
is established as 50 nanoseconds and each of the pulses 530.1-530.n
within clock stop pulse 530 are represented as 32 pulses of a 2.2
nanosecond duration. It would be recognized that the preamble
described herein is representative of a single aspect of the
invention and that the particular values described herein are
provided to not limit the scope of the invention to this value.
[0057] FIG. 5B illustrates an exemplary Time Division Multiple
Access (TDMA) protocol 550 in accordance with the principles of the
invention. In this exemplary protocol, each user is assigned a time
slot in which a user may transmit a message to a sensor or
substation (see FIG. 1) by the central office. The time slot
assignment may be established dynamically by the central office 110
or substation 108 based on the number of users within a general
range of the central office. In another aspect, each of the users
may have allocated a predetermined time slot and when the user
enters a general area managed by the central office or substation,
the central office 110 or substation 108 may register the user and
determine whether conflicts may exist. Conflict resolution may for
example be resolved by incorporating a CDMA (Code Division Multiple
Access) protocol (not shown) on each of the conflicting users. In
this case, two users may thus transmit in the same time slot by the
central office assigning and providing a known code to each of the
conflicting users. CDMA technology is well known in the art and
need not be discussed in detail herein.
[0058] In the illustrated protocol shown, each user is allocated a
one millisecond (1 ms) time slot 550 (or a time slot which varies
from 500 microseconds to 20 milliseconds) in which to communicate
with a sensor. That is, the preamble 510 is received substantially
at the beginning of the time window, as each user is synchronized
to the time frame 560. The stop clock bit 530, when received marks
the end of the reception of the user preamble, which may include
identification information. The remaining time 570, in the time
slot 510, may be utilized for the transmission of additional
information, e.g., type of device, biometric data, text data, voice
data, etc., to the central office or substation. For example, the
biometric data may include information such as heart rate, pulse
rate, temperature or with appropriate placement of one or more
transmitting devices, an electrocardiogram.
[0059] In this illustrated example, the time frame 560 is selected
as two (2) seconds to accommodate up to 2000 users, without CDMA
encoding. However, it would be recognized that the time slot and/or
time period may be adjusted based on the type and number of
expected users with the system. For example, in critical
situations, the time period may be adjusted to a smaller value to
provide faster updates of the location of a user. As would be
recognized, synchronization of the wireless transmission devices
with respect to the frame is performed periodically to insure the
correct time relationship between the wireless devices and the
frame.
[0060] FIG. 6 illustrates a flow chart of an exemplary process 600
for determining a time of receiving information from a user in
accordance with the principles of the invention. In this exemplary
process 600, a sensor is turned on to accept an assigned user
identification during a selected time slot (not shown). A
determination is made at block 610 whether the preamble (510, FIG.
5a) is received. If the answer is negative, then processing
continues to test the receipt of the preamble.
[0061] This process is performed until the time slot expires and a
new identification is searched for.
[0062] However, when the preamble is received, a time projection
window is opened at block 620. At block 630, a determination is
made whether the stop clock pulse (530, FIG. 5A) is received. In
this case, a reference to clock stop pulse 530, any of the clock
stop sub pulses 530.1-530.n, may be used to indicate that the clock
stop pulse 530 has been received.
[0063] If the answer is negative, then a determination is made
whether the time of the window has expired. If the time of the
projection window has not expired, then processing continues to
monitor whether the stop clock pulse has been received (block
630).
[0064] However, if the clock stop pulse (or at least one of the
clock stop sub pulses 530.1-530.n,) is received, then a
determination is made whether a measured amplitude of the received
clock stop pulse is above a threshold value at block 640. If the
amplitude is below the threshold value then processing continues to
monitor for a received pulse at block 630.
[0065] However, if the measured amplitude is above a threshold
value then processing continues at block 650, wherein a stop clock
indication (e.g., time) is made wherein the time of the received
pulse is determined and the projection window is closed. The time
of the received stop clock indication is provided to a processor at
block 660 for further analysis.
[0066] Although not shown, it would be appreciated that the
threshold value may be determined dynamically based, for example,
on an average of the measure amplitude of each of the received
pulses in the preamble 510. In another aspect, the threshold value
may be determined based on the measured amplitude value of those
pulses in the preamble that lie within a known level with regard to
the maximum amplitude value. In either aspect, the threshold value
may then be determined as being a known level below the measured
amplitude of the preamble pulses. In still another aspect, the
threshold value may be set at being a known level above and below
the measured amplitude to the preamble pulses. For example, a
threshold value may be established as 1 decibel (db) above and
below a measured amplitude of the pulses in the preamble. In this
example, a pulse is only accepted when it is detected during the
projected window (temporal criterion) and within an amplitude range
(amplitude consistency criterion).
[0067] FIG. 7A illustrates a flow chart of an exemplary process 700
for determining a location of a wireless transmission in accordance
with the principles of the invention. In this illustrated
embodiment, time slots are assigned to each user in a network at
block 710. As previously discussed, this assignment may be based on
the number of users, a time frame and a time slot length. At block
720, an index is set for each time slot within a time frame. At
block 730 a determination is made whether an identification
associated with the user assigned to the time slot has been
received. As previously discussed, this identification may be
included within the preamble that is received during the time slot
(see FIG. 5B). If the identification has not been received then a
determination is made at block 735 whether the time slot has ended.
If the answer is negative, the processing continues at block
730.
[0068] However, if the identification has been received, then a
determination is made whether the identification is associated with
the designated time slot at block 740. If the answer is negative,
the processing continues at block 730 to wait the correct
identification.
[0069] However, if the identification is acceptable, then the user
is identified based on the identification at block 745, the type of
device may be determined at block 750 and a location may be
determined at block 760, using triangulation techniques, as
previously discussed. At block 770, the parameters associated with
the user may then be output to a display device, for example.
[0070] Returning to block 735, if the time period associated with
the time slot expires, then processing continues at block 775
wherein a next time period is selected. At block 780, a
determination is made whether all the time slots in the frame have
been scanned. If the answer is in the affirmative, then the value
associated with the time slot is reset to repeat the processing at
the beginning at the time frame.
[0071] Although not shown, it would be appreciated that processing
of identification and/or determination of type of device in blocks
745 and 750, respectively, may be performed prior to accepting the
identification in block 740. Similarly, the determination of the
acceptable identification may be removed without altering the scope
of the invention.
[0072] FIG. 7B illustrates a flow chart of exemplary process 760
(see FIG. 7A) for determining a location or position of a
transmitting facility in accordance with the principles of the
invention. In this illustrated embodiment, a time value is obtained
from each of the sensors within the network at block 761. At block
762 a determination is made whether a sufficient number of time
values have been obtained. If the answer is positive, then groups
of times are formed at block 763, wherein each group includes
selected ones of the time values. At block 764 a position or
location is determined based on each group of times. In one aspect
of the invention, the location based on a group of times may be
determined using a linear algebra based algorithm. The linear
algebra based algorithm is well known in the art and need not be
described herein.
[0073] At block 765 each of the positions obtained from the groups
of times is obtained and at block 766 a final position is
determined as a function of the obtained positions. For example, a
final position may be determined as an average of the obtained
positions. In another aspect, selected ones of the obtained
positions may be used for determining a final position.
[0074] As an example, when six (6) sensors are included in the
system, with times designated at T.sub.1-T.sub.6, two groups of
times (T.sub.1-T.sub.5 and T.sub.2-T.sub.6) may be formed and a
position obtained for each of these two groups. While a position
may be determined based on at least three time values within a
group in a horizontal plane, in a preferred embodiment of the
invention at least five (5) time values within each group are
utilized. The use of five time values is preferable to account for
vertical displacement of the transmitting facility and it has been
found the use of five time values converges to a solution faster
than four time values.
[0075] FIG. 8A illustrates an exemplary application of the system
described herein. In this exemplary application, which is
associated with a fire fighting situation, of identifying,
monitoring, tracking and locating a fire fighter 805 located in
building 810.
[0076] In this illustrated exemplary application, one or more
sensors 400 may be located on building 815 or a tower 820 adjacent
to the building 810. In one aspect of the invention, the location
of the sensors may be built into command vehicles, wherein, the
sensors may be placed in a configuration that provides for best
determining location of the firefighter. The fire fighter 805 may
have on his/her person a wireless transmission device, e.g., a cell
phone or a special purpose device. The special purpose device may
be a transceiving device (wireless device) that may be attached to
a wrist (a wrist band), pinned to a garment or attached around a
neck (a badge). The wireless transmission device may further
provide emergency notification capability incorporation (i.e.,
alarm alert, panic button, audio communication capability,
biometric information, altitude and attitude indication). The
wireless transmission device may be pre-loaded with an
identification code or the identification code may be dynamically
assigned and downloaded to the wireless transmitting device at the
moment the device is needed. Thus, the location of each of the
firefighters 805 may then be monitored, tracked and located as
previously disclosed as the sensors 400 provide identification of
firefighter 805 via a wireless communication link to wireless
interface 860. Computer 880 may then correlate the information from
each of the sensors to determine a location of firefighter 805.
[0077] Although the principles of the invention are applicable to
the illustrated example, it would be recognized that in this
dynamic situation, the location of the sensors are not determined a
priori nor is the general configuration of the building 810 known.
Hence, to provide proper location of firefighter 805 locations of
sensors 400 and a general layout of the building 810 is needed. To
determine the location of the sensors a laser range finder and
theodolite 830 may be used. The theodolite may determine the
position, both horizontal and vertical with respect to the position
of the theodolite. The position of the theodolite may be determined
based on a GPS (Global Positioning Satellite) system. In one
aspect, the sensors 400 may also include a GPS receiver, which may
provide the location of the sensor 400 via a wireless communication
link to interface 860. In addition, a high definition RADAR 840 may
be used to map the interior elements of building 810. This mapping
may be performed periodically to account for changes in the
structure of building 810. The information from the RADAR 840 may
be provided to a processor 870 that correlates the location of
firefighter 805 with the current structure of building 810. It
would be recognized that such correlation may be performed in
computer 880 also. In another aspect, an infrared scanner 850 may
be incorporated to determine the location of hot spots within
building 810. In this illustrated system 800, computer 880 may for
example, direct a firefighter 805 toward or away from hot spots
depending upon the situation that is occurring within building
810.
[0078] FIG. 8B illustrates another exemplary application of the
system described herein. In this exemplary application, multiple
sensors 400 are positioned vertically on tower 820 to provide
accurate location of each of the firefighters on different levels
within building 810. Computer system 880, as previously discussed,
may correlate the interior structure of each floor of building 810
to accurately locate the position of firefighter 805.
[0079] FIG. 8C illustrates another exemplary application of the
system described herein. In this exemplary application, sensor 400
may be included on a school bus, for example, wherein each student
is allocated a badge 885 that is detected upon the students entry
to the bus. Detection and identification is performed in a manner
as shown in FIG. 7B. The identification and status of each person
(student, parent, driver) may then be provided to central office
895 that maintains a register of the persons on the school bus. In
the case of an accident, for example, information regarding the bus
may be determined by collision or impact sensor 890 and provided to
the central office 895. The central office having a registration of
the persons on the bus may then provide information to parents,
school officials, and police. In this aspect of the invention, the
bus itself may include a long-range wireless transmitting device
(previously discussed) or transmission facility (as earlier
discussed for outside applications) or a GPS system (not shown)
that determines the location of the bus.
[0080] FIG. 9 illustrates a block diagram of an exemplary wireless
transmission device 900 in accordance with the principles of the
invention. In this illustrated exemplary, device 900 includes
antenna 904-1 receiving a signal from sensor 400 (not shown). The
signal may include a synchronization pulse, an identification code,
and/or a time slot indication within a frame allocated to the
device. The provided signal is down converted by transceiver 910
and the signal is applied to microcontroller 920. Microcontroller
920 may be in communication with memory 922, which may include
instructions or code for controlling the processing of
microcontroller 920. Memory 922 may also be preloaded with an
identification code or provide storage for information received
from sensor 400. Processor 920, when active during the allocated
time slot, may provide control to shift register 960 to cause the
output of the preamble message (see FIGS. 5A and 5B) in the
allocated time slot. The preamble bits are next provided to a
modulator 970 to modulate a carrier signal (in this case 448 MHz).
The modulated carrier is then provided to driver 980 for
transmission via antenna 904-2.
[0081] Processor 920 further provides instruction to shift register
960 to output a clock stop pulse and a 56 MHz bit rate data
package. In a preferred embodiment, the clock stop pulse is of a
known duration and is not modulated by modulator 970.
[0082] RF switch 930 controls an input to shift register 960 in
allowing one of a preamble signal, a clock stop signal or a data
signal to be applied to shift register 960. Crystal clock 940 and
multiplier 950 are used to generate a clock signal suitable for the
pulse duration of the preamble bits. (see FIG. 5A). An emergency
signal mode may further be incorporated as represented by block
990. In this case, a known emergency signal may be transmitted
within the preamble code or in the data section (see FIG. 5B). This
emergency signal may override other data that may be transmitted
during this time period.
[0083] FIG. 10 illustrates a system 1000 for implementing the
principles of the invention as depicted in the exemplary processing
shown herein. In this exemplary system embodiment 1000, input data
is received from sources 1005 over network 1050 and is processed in
accordance with one or more programs, either software or firmware,
executed by processing system 1010. The results of processing
system 1010 may then be transmitted over network 1070 for viewing
on display 1080, reporting device 1090 and/or a second processing
system 1095.
[0084] Processing system 1010 includes one or more input/output
devices 1040 that receive data from the illustrated sources or
devices 1005 over network 1050. The received data is then applied
to processor 1020, which is in communication with input/output
device 1040 and memory 1030. Input/output devices 1040, processor
1020 and memory 1030 may communicate over a communication medium
1025. Communication medium 1025 may represent a communication
network, e.g., ISA, PCI, PCMCIA bus, one or more internal
connections of a circuit, circuit card or other device, as well as
portions and combinations of these and other communication
media.
[0085] Processing system 1010 and/or processor 1020 may be
representative of a handheld calculator, special purpose or general
purpose processing system, desktop computer, laptop computer, palm
computer, or personal digital assistant (PDA) device, etc., as well
as portions or combinations of these and other devices that can
perform the operations illustrated.
[0086] Processor 1020 may be a central processing unit (CPU) or
dedicated hardware/software, such as a PAL, ASIC, FGPA, operable to
execute computer instruction code or a combination of code and
logical operations. In one embodiment, processor 1020 may include
code which, when executed by the processor, performs the operations
illustrated herein. The code may be contained in memory 1030, may
be read or downloaded from a memory medium such as a CD-ROM or
floppy disk, represented as 1083, may be provided by a manual input
device 1085, such as a keyboard or a keypad entry, or may be read
from a magnetic or optical medium (not shown) or via a second I/O
device 1087 when needed. Information items provided by devices
1083, 1085, 1087 may be accessible to processor 1020 through
input/output device 1040, as shown. Further, the data received by
input/output device 1040 may be immediately accessible by processor
1020 or may be stored in memory 1030. Processor 1020 may further
provide the results of the processing to display 1080, recording
device 1090 or a second processing unit 1095.
[0087] As one skilled in the art would recognize, the terms
processor, processing system, computer or computer system may
represent one or more processing units in communication with one or
more memory units and other devices, e.g., peripherals, connected
electronically to and communicating with the at least one
processing unit. Furthermore, the devices illustrated may be
electronically connected to the one or more processing units via
internal busses, e.g., serial, parallel, ISA bus, microchannel bus,
PCI bus, PCMCIA bus, USB, etc., or one or more internal connections
of a circuit, circuit card or other device, as well as portions and
combinations of these and other communication media, or an external
network, e.g., the Internet and Intranet. In other embodiments,
hardware circuitry may be used in place of, or in combination with,
software instructions to implement the invention. For example, the
elements illustrated herein may also be implemented as discrete
hardware elements or may be integrated into a single unit.
[0088] As would be understood, the operations illustrated may be
performed sequentially or in parallel using different processors to
determine specific values. Processing system 1010 may also be in
two-way communication with each of the sources 1005. Processing
system 1010 may further receive or transmit data over one or more
network connections from a server or servers over, e.g., a global
computer communications network such as the Internet, Intranet, a
wide area network (WAN), a metropolitan area network (MAN), a local
area network (LAN), a terrestrial broadcast system, a cable
network, a satellite network, a wireless network, or a telephone
network (POTS), as well as portions or combinations of these and
other types of networks. As will be appreciated, networks 1050 and
1070 may also be internal networks or one or more internal
connections of a circuit, circuit card or other device, as well as
portions and combinations of these and other communication media or
an external network, e.g., the Internet and Intranet.
[0089] Aspect of the invention, which are applicable in the fields
of corrections, law enforcement and in society in general have
contemplated the convergence of a plurality of technologies. In
this case, the sensors may perform multi functions, as they may
communicate both in a wired and wireless mode. The communications
may be setup to work in a Wide Area Network (WAN) or a closed loop
network, with known wireless protocols and access points. The
sensors can detect multiple wireless transmissions, including those
from conventional cell phone, and wrist bands, badges and
transmission facility units, as described herein. The wrist bands
can pass and receive audio, biometric, video, data and information
to and from the sensors, and receive wireless communication and
data/information from other wristbands and pass information and
receive information to at least one 3.sup.rd party application or
device. The wrist bands transmission capability includes, sync,
transceiver communication, and pico-second rise-time transmission
circuit, and a battery conservation circuit. The wristband includes
at least one 3.sup.rd party application or device and incorporates
biometric, identification, alarm and alert functionality and
circuitry. The sensors can also pass audio and video to a central
unit, or receive wireless communication from each other sensor and
pass that information to at least one 3.sup.rd party application or
device. Additionally, the central unit may accept data from the
3.sup.rd party network and pass the data to the sensors to be
broadcast out each node. An embodiment of the system is to provide
communication to each cell, wherein a user can receive and transmit
audio video data, and phone services. The sensors are also designed
to connect to smoke detector and other alarm detection devices, for
example. The central interface, transmission detection,
identification, and reporting system 100, and transmission
facility, may be designed to communicate and integrate with
existing systems and new CJIS compliant systems, via built-in
active, passive radio technology (i.e., offender management
systems, commissary systems, medical records systems, inmate
telephone systems, scheduling software, etc.) may be provided by
the methods described herein.
[0090] The embodiment and central unit is designed to collect data
on at least a portion of the wireless transmissions including time,
status, biometric, environmental and location and the like. The
embodiment of the system may dissect this information to make
better decisions regarding on the environment within the sensor
range of the sensors. In this case, conditions such as heart attack
detection, suicide prevention, and stress analysis may be detected
and provided to a central office. The transmission facility central
interface, transmission detection, identification, and reporting
system 100, embodiment can adjust its transmission, and/or
sensitivity to conform to the building and/or outside environment.
The control unit is designed to be stand alone or be able to handle
multi-facility (buildings) coordination and display.
[0091] In one aspect of the invention, each of a plurality of
persons (e.g., inmates, correction personal, firefighter, police,
etc.) may be equipped with one or more transmitting devices. For
example, transmission devices may be incorporated in wristbands,
belts, badges or other wearable items. Each of the transmission
devices may be assigned a code that identifies the transmission
device. For example, a code for a badge may be assigned a code that
is comparable to the number assigned to the badge. Or the badge may
be assigned a code that represents a unique value independent of
the number assigned to the badge. Furthermore, the codes assigned
to one or more transmission devices may be related. For example,
the codes assigned to two transmission devices assigned to a same
person may possess a unique identification code which defines the
device, while having a further identification associated with the
specific person. The assigned code may thus be represented as a
single code value obtained as a concatenation of the two codes or a
hash of the two codes. In this case, a unique code may be used to
identify the device and the associated person. The use of two
transmission devices is advantageous in situations, as will be
discussed.
[0092] In accordance with the principles of the invention, at least
one sensor may be fixedly or temporarily established around or
within a designed area. Each of the at least one sensors may
include one or more of an active transmitter and a receiver
configuration. The active transmitter may transmit, periodically,
synchronization signal into the designed area. The synchronization
signal provides a trigger signal for each of the transmission
devices within the designated area, as previously discussed. The
time between the transmissions of the synchronization signal is
referred to as a time frame. Each of the transmission devices may
be assigned a preamble code that defines the device, and a time
slot within the time frame. The preamble code may further define
the assigned time slot within the time frame. The time frame, the
duration of the time slot and the number of time slots may be
determined based on a number of transmission devices to be
monitored within the designated area. In addition, the number of
transmission devices that may be monitored may be further increased
without increasing the time frame using modulation techniques such
as CDMA within each time slot.
[0093] As previously discussed, each transmission device in
response to the reception of the synchronization signal transmits,
within its assigned time slot, the assigned preamble code and the
stop clock pulse and at least its identification code. In addition,
biometric data may be transmitted. For example, heart rate may be
transmitted within the allocated time slot.
[0094] As previously discussed, the sensor receiver configuration
detects (receives) the transmission from a corresponding
transmission device within the designated area. The sensor provides
the received information to a processor for determining a location
of the transmission devices and, in the case, of two devices,
validating the user within the designated area.
[0095] In one aspect of the invention, when at least two devices
are assigned a same person, the detection of response signal from
less than a majority of the devices assigned to the same person may
indicate the existence of an abnormal condition. For example, if
the two devices are located at a substantially distance from each
other, then the devices may not be in the possession of the same
person. In this case, an alarm signal may be generated that
notifies one or more additional personal of the potential alarm
system. For example, if a transmission device is assigned to a
weapon and the location of the weapon is determined to be
significantly different than the person to whom the weapon is
assigned may indicate a serious error.
[0096] In accordance with the principles of the invention, the time
of detection of the response transmission from each of the
transmission devices may be determined as previously discussed
using the stop pulse generated a predetermined time after the end
of the preamble code.
[0097] In one aspect of the invention the transmission devices may
communicate with each other to authenticate the presence of two
devices that are substantially adjacent to each other. In one
aspect of the invention, the transmission devices may include, in
addition to a local area wireless communication transmitting system
(e.g., cellular communication, WiFi communication, etc.), a short
range communication system (e.g., a Near-Field Communication (NFC),
BLUETOOTH, etc.).
[0098] In accordance with the principles of the invention, one or
more second receiving systems may be positioned around or within
the designated area. The second receiving system may be configured
to detect event transmissions that occur within the designated
area. For example, an event transmission may represent a generation
of a fire alarm signal or an emergency condition signal. The second
receiving system may further be configured to detect an event
transmission associated with a wireless transmission that may be
associated with mobile devices, such as cellular phones, smart
phones, etc. The event transmission in this case may be a voice
and/or data (e.g., text) communication.
[0099] In accordance with the principles of the invention, the one
or more second receiving system may detect the event transmission
and provide information regarding the detected event transmission
to a central unit that includes a processing system. The processing
system may determine a location of the event transmission and
correlate the location of the event transmission with a location of
each person associated with a transmission device within an area
surrounding the location of the event transmission.
[0100] In accordance with the principles of the invention,
information regarding the event transmission may then be provided
to each of the persons within an area surrounding the location of
the event transmission. For example, if the event transmission is a
fire alarm, each person within an area associated with the fire
alarm may be informed of the fire alarm. In addition, each person
may be provided with information regarding a best route to avoid
the first alarm. Similarly, the processing system may provide
information regarding the event transmission and the persons
affected by the event transmission to a display unit and one or
more first responding agencies in order to provide assistance in a
timely manner. In addition, the first responding agencies may be
provided with information regarding the number of persons affected
by the event causing the event transmission. Additionally, one or
more persons associated with the identified persons may be informed
of the occurrence of an event and the location of persons within an
area surrounding the event.
[0101] In one aspect of the invention, when the event transmission
is associated with cellular or WiFi communications, at least one
second system detecting the transmission provides information
regarding the detected transmission to the processing system. The
information provided may include a time of detection of the
transmission in addition to characteristics of the detected
transmission (e.g., transmission frequency, type of transmission,
signal strength, etc.). The processing system may correlate the
detected transmission with at least one person within the
designated area. In addition, a location of the detected
transmission may be determined based on the detected transmission.
For example, location may be determined based on an amplitude of
the detected transmission received on at least one second receiving
system. Or may be determined based on a time of arrival of the
detected transmission at one or more receiving systems.
[0102] In accordance with the principles of the invention, a
determination may be made regarding whether the detected
transmission (i.e., cellular communication, Wi-Fi communication,
VoIP communication) is allowed to continue transmission. Based on
the identification of a device (e.g., a cell phone) associated with
the detected transmission and an identity of a user associated with
the identified cell phone, continued transmission of the cell phone
may be allowed or not allowed. For example, when the device
associated with the detected transmission is positively correlated
with a user within the area and the user is identified as being
authorized within the area, transmissions may continue to be
allowed from the area. However, if the device associated with the
detected transmission is positively correlated with a user within
the area and is user is identified as not being authorized to
operate within the area, further communication may be denied or
directed to a channel that prevents subsequent communication.
Similarly, if the device associated with the detected transmission
is positively correlated with a user within the area but a location
of the device is significantly different than the location of the
user, further communication may be denied or directed to a channel
that prevents subsequent communication.
[0103] In one aspect of the invention, a second transmitting system
may be positioned to transmit information within one or more areas
within the designated area. The second transmitting system may
provide information, such as educational information, to selected
persons within the designated area. The education information may
be selected based on a number of persons that have similar
educational needs.
[0104] FIG. 11 illustrates an exemplary system configuration of a
system in accordance with the principles of the invention.
[0105] Area 1110 includes at least one area (e.g., building) 1120,
which includes at least one transmission device 1130 (1132, . . .
1138). As discussed previously, transmission device 1130, 1132 . .
. 1138 may be grouped such that one than one may be associated with
a single user. Further illustrated is at least one
transmitter/receiving system 1115 positioned about (i.e., around,
within) area 1110. As discussed at least one of the systems 1115
may generate a synchronization signal that is detected by
transmission devices 1130 . . . 1138. Each of the transmission
devices may then provide a response transmission to the
synchronization in a time slot assigned the transmission device. A
processing system (not shown) may identify, correlate and locate a
position of the transmission devices.
[0106] Concurrently a second receiving system 1140 may be position
about (i.e., around, within) area 1110. Receiving system 1140 may
detect a transmission from a device, such as a (cellular, Wi-Fi,
VoIP) telephone 1160. Information regarding the detected
transmission may be provided to the processing system, wherein
correlation of the detected transmission with the persons
determined within the area is performed. Based on the correlation a
determination may be made to perform one of: allow continued
transmission and not allow continued transmission.
[0107] FIG. 12 illustrates a flow chart of an exemplary process in
accordance with the principles of the invention.
[0108] At block 1210 a synchronization signal is transmitted into
the designated area. At block 1215, a response to the
synchronization signal is received in a time slot allocated or
assigned to a specific transmission device. A location of the
transmission device is determined based on the received response
signal. At block 1225 a determination is made whether an
unsolicited transmission is detected. That is, the second receiving
system detects a transmission that is a transmission that is not
one that is responsive to the synchronization signal. If a
transmission is detected, then a location is determined and a
correlation of the detected transmission with at least one of the
transmission devices determined to be resident within the area is
performed. Based on the correlation, a determination is made
whether subsequent transmissions are allowed at block 1240. If
subsequent transmissions are not allowed then processing continues
to block 1245, wherein access to an external network (e.g., a
cellular network) are denied. However, if the device associated
with the detected transmission is indicated to be allowed
processing continues at block 1250 wherein access to the external
network is allowed.
[0109] Processing continues to block 1255, where a determination is
made whether responses have been received from each of the
allocated or assigned time slots. If not then processing continues
at block 1260 wherein a next time slot is selected. However, if all
time slots are processed, then processing continues to block 1210
to restart the time frame by transmitting a synchronization
signal.
[0110] In other embodiment, the wireless transmission facility such
as a cell phone, PDA or a Wi-Fi appliance, can trigger an action.
For customized actions, positive identification and unique
identifier is established, wherein when an inmate's wristband (or
badge or other transmission device) comes in proximity to an
interactive education display system within his cell, the system
positively identifies him/her and logs the inmate into the system.
This is accomplished via short range communications such as the 802
.xx technology in the wrist band and the education device.
Similarly other forms of Near-Field Communication (NFC) may be
used. In another aspect, short range communication such as
BLUETOOTH, may be employed. In another embodiment the interaction
may use an RFID chip (e.g. active, passive and/or semi-active) that
identifies the user. In another embodiment, e.g., a school
environment, when wireless communication device is detected,
positive identification is established and the system transmits an
action for the interactive display screen informing the school
supervisors that one or more students or personnel needs to turn
off his cell phone. The action facility, further accesses an
allowability database and verifies the ability of the transmission
facility (e.g., cell phone) to operate within an area. If the
transmission facility is not authorized or the wireless
communication device (e.g., cell phone) is in an unauthorized area
information may be provided to the user to information the user of
the presence of the transmission facility in the unauthorized area.
For example, in a hospital setting, the presence of a cell phone,
even in standby, may cause harm the medical devices being used to
treat patients), the system may advise the user, by name, of the
detection of the cell phone. In this case, the transmission
facility provides information to the transmission facility detector
of a unique identifier of the transmission facility. As a second
example, on a road side the system may be used to inform a user to
slow down as he is speeding or informing the driver he is not
allowed to use a cell phone or wireless communication device while
driving. I n this embodiment, utilizing femto and/or Pico cell
and/or transceiver technology action facilities is necessary to
provide the specific information to the user. As would be
recognized these are just examples of uses of the system
illustrated. In addition, the system illustrated may be connected
to a data mining database (not shown) to provide customized
information to any transmission facility and specific information
to a uniquely identified transmission facility.
[0111] In an embodiment, a transmission from transmission facility
provides a unique identifier which activates a function in an
action facility, such as a display that is specifically targeted to
the unique identifier. Or the system may provide information
specifically designated for the user and the like. Or the system
may provide an indicator that the detected wireless transmission
facility is prohibited within a designated area or while driving.
Or the system may provide information regarding the a current
location where the wireless transmission facility and/or a
potential danger, via a display unit, associated with the current
location. The database may be developed to focus information
associated with the unique identifier, to meet the mission of the
display.
[0112] In an embodiment, where it is the intention to run an
automated prison to lower the necessary number of personnel and
still the run a safe and secure facility, the automated facility is
controlled by a centralized command and control center and/or a
decentralize compartmental command and control center for all
functions of the facility including movement of the persons within
the facility. In this type of a facility, where complete and
accurate identification and location of all personnel is critical,
the tracking of individuals, their wireless transmission devices,
cell phones, identification units, Walkie-Talkies, and verifying
their access to authorized areas, integrating their movement with
CCTV (close-circuit TV) and positive facial identification,
biometric identification, preventing movement into unauthorized
area, developing inclusion zones, creating exclusion zones,
ensuring proper count, providing an ability to restrict and/or
authorized movement a specific design of the facility and
convergence of technology is essential. The technologies discussed
herein integrate to the central control to provide the backbone and
framework to operate such an automated facility, wherein each staff
member and inmate transmission facility will provide for specific
identification of each staff member and inmate transmission
facility and manage and/or allow specific movement throughout the
facility. All movement throughout the facility may be monitored
through CCTV and facial recognition. At each egress point, movement
may be restricted to individual movement through one area to
another area of the facility. For example, daily functions include,
meals, medical, programs, court visits, and recreation, may be
functions that may be monitored and controlled. As an example of
the needs within the automation and the parameters and rules, the
system may manage, for example, Inmate Movement, wherein a Movement
list is created, which includes elements such as movement schedule,
scheduling recourses, seat allocation programs area classrooms,
access to computers, access to a Law library, a time allocation in
program and use of facility assets. In addition, the Movement list
may further include elements such as enemy exclusion, (i.e.,
predator wolf/sheep identification and exclusion), conflicts in
scheduling of programs such as GED, adult education , culinary
arts, and anger management. In another aspect the Movement list may
include a Waiting list, an ability for inmates to signup for
classes, a morning schedule and movement, an afternoon schedule and
movement, a pre-trail and religious services scheduling. Data
mining database techniques and methodologies may be executed to
provide for inmate scheduling movement and allocation of assets for
the inmate relying on transmission facility authorization. The
transmission facility will control access of moment, asset
recourses, doors and egress, facility resources and time allocation
on facility assets and in which movement takes place. As there is a
need for minimum human interaction, display kiosks may display
events associated with a specialized schedule for an identified
user and inform the inmate of the scheduled events.
[0113] In another aspect of the invention, inmates may further wear
or possess two transmission detection sensors. Each sensor monitor
biometric signs including heart rate, temperature, and the like.
With two transmission detection sensors (incorporated in one or
more wristbands) medical information (e.g., echo cardiogram) may be
generated to provide for health monitoring and for positive
identification. The Cell Phone Detection, Control and Position
Identification system 1500 will include a detector and decoder for
all transmission facilities, which will provide positive
identification for all transmission facilities, including cell
phone and other hand held communication devices, and the specific
individual in position of the transmission facility. All CCTV units
will integrate with facial recognition software, all egress points
will require biometric checks, such as fingerprint and renal eye
scan devices, and this combined with the transmission facility
positive identification. The design of the facility is important to
provide adequate exercise movement and limited interaction with
staff and other inmates. Therefore a redesign of the facility, to
provide services such as decentralized education is important.
[0114] In this embodiment, the wireless communication of the
sensors will also carry education information and data to each of
the inmate cells. Each inmate is equipped with a wireless Tablet to
take interactive education. The 802.15.4 will provide a dual role
of sensor sync and education communication. In embodiment and fully
automated wireless communications and personnel and asset tracking,
the communication to the sensors will be transmitted via cat 5
cables, which will be placed to communicate with the microprocessor
and the 802.11. In this configuration the 802.11 will carry the
interactive education and monitoring capability. The microprocessor
in that configuration will act as a throughput conduit to isolate
high-speed interactive communications between the cat 5 and the
802.11. In this configuration, audio and video, live interaction is
capable to perform parole hearings, live interactive education,
video visitations, suicide watch, video attorney visits and video
court appearances. In this configuration a video server and
interactive video switching system will be deployed to handle the
interactive communication. As earlier described, the ideal location
of sensors maybe the water chases to prevent tampering. This also
provides the opportunity to have wireless communication with
education units within the cells. This wireless communication also
provides the ability to as wireless surveillance devices such as
cell monitoring into the mix and the like.
[0115] In this embodiment where inmate programs, services,
commissary, inmate phones, medicine distribution, vending machines,
GED education, needs to be inmate specific, positive identification
is a critical must. To ensure this outcome, the positive
identification of each transmission facility is paramount. An
example of this embodiment, when an inmate approaches an education
display system, the unique identifier of the inmate's transmission
facility, provides information to the transmission facility
detector of the unique identifier of the transmission facility. A
database controls and provides all the applicable information to
provide the correct information for each transmission facility. In
this case, the transmission facility is a wristband ID bracelet and
the like.
[0116] Being able to continuously track and positively identify
each transmission sensor each is also critical wherein controlling
a significant number of transmission facilities (cell phones) may
be necessary. As discussed herein, techniques discussed, herein,
describe how a cell phone or a transmission facility provides their
identification, whether in an active mode and/or an inactive.
[0117] In a preferred embodiment of the invention, a Managed Access
System utilizes a Software Defined Radio (SDR) transceiver system
that incorporates a time domain invention as disclosed herein, and
phased array antenna system to create a sensor system incorporated
into wearable elements (e.g. wristband) to allow for tracking and
monitoring a large number of personal and the location of the
personal. The embodiment of the preferred invention utilizes and
controls/tracks all wireless communication within an area of
interest. The invention allows the tracking and control system of a
plurality of transmission systems which may be identified using
characteristics such as uplink frequency, downlink frequency,
unique Identifier, IMSI, MEID, IMEI, ESN, BCCH, CDMA sub channel,
UMTS, LTE, GSM, CDMA, WIFI, and/or time hack, The transmission
systems currently tracked include WIFI access points, cell phones,
Walkie-Talkies, drone communications, access points, Bluetooth
communications, RFID transmission, (active, semi-active), time
domain wristband technology, The system's design provides the
ability to track and control independently a significantly large
number of wireless communications simultaneously, from all known
used frequency bands and the like.
[0118] In one aspect of the invention tracking and locating drones
within or around a secured area may be performed. For example, in
one aspect of the invention, communication frequencies within a
band(s) associated with drone control may be monitored. In another
aspect of the invention, a frequency of the rotation of the drone
blades may be detected and analyzed to track drones within or about
the secured area. In still another aspect of the invention, sonar
and motion detection equipment may be employed about the secure
perimeter to detect and identify the presence of a drone within or
about the secured area. In still another aspect, CCTV may be
employed to visually detect and track drones within or about the
secure area. In still other aspects of the invention, SDR and small
cross section radar may be used to identify and locate drones.
Similarly, audio detection, explosive detection sniffer and ammonia
detector may be utilized to detect and track drones within and/or
about the secure area. As would be appreciated one or more the
above methods may be concurrently employed to provide accurate
detection and tracking of drones. In one aspect of the invention,
once the Drone is located, a manage access system may provide
alerts to the appropriate personnel and deploy the countermeasures.
Depending on the detection protocol and procedures set up,
parameters for determining a response include size of drone, cargo
of the drone, a location of drone, the location of drone driver. In
one aspect of the invention, the countermeasures options include
but is not limited to: 1) jamming the communication frequencies of
the drone, 2) deployment of Birds of prey, 3) speadnet trajectory,
4) Trajectory options, Focus EMP trajectory onto the drone, and the
like.
[0119] In a preferred embodiment of the invention, the a
programmable radio front-end to receive and transmit specific
frequencies, in a well implemented development of the Software
Defined Radio (SDR) to be able to implement filtering in real-time
to implement spectrum hoping. This embodiment not only allows you
to define and program the signal bandwidth, amplitude via a
variable gain amplifier, Baseband processing, center frequency,
with up to 8 pll digital up/down conversion, front-end FCC defined
selectable uplink/downlink bandpass filters, noise floor reduction
circuity, in a preferred embodiment of the invention a Programmable
power amplifier with individualize channel selected multiple
bandpass filter(s) are added to the chain to filter out unwanted
amplification allowing for a clean hi power up to 200 watt LNA . A
programmable array antenna which can be set to optimize the phased
array data and the like.
[0120] In a preferred embodiment of the invention, the system
disclosed incorporates a broad spectrum radio transceivers,
operating with directional antenna arrays, co-located within a
network of sensors. The system controls and monitors the RF
environment within the secure perimeter (e.g., a correctional
facility. This system would accomplish four major objectives: (1)
control all cellular phones, a military facility; (2) deploy Radio
Frequency IDentifications (RFID) tagging applications, and (3)
accurately detect all active/passive RFID tags; (4) use of advanced
features of smart phones, to control and manage movement of
personal and/or inmates, to improve a safety and security within
the secure perimeter; and (5) monitor the RF spectrum for
unauthorized RF signals as a threat to the facility.
[0121] While there has been shown, described, and pointed out
fundamental novel features of the present invention as applied to
preferred embodiments thereof, it will be understood that various
omissions and substitutions and changes in the apparatus described,
in the form and details of the devices disclosed, and in their
operation, may be made by those skilled in the art without
departing from the spirit of the present invention. It is expressly
intended that all combinations of those elements that perform
substantially the same function in substantially the same way to
achieve the same results are within the scope of the invention.
Substitutions of elements from one described embodiment to another
are also fully intended and contemplated.
* * * * *