U.S. patent application number 15/484883 was filed with the patent office on 2018-10-11 for system and method for detecting and controlling contraband devices.
The applicant listed for this patent is GLOBAL TEL*LINK CORPORATION. Invention is credited to Stephen Lee HODGE.
Application Number | 20180295560 15/484883 |
Document ID | / |
Family ID | 63711393 |
Filed Date | 2018-10-11 |
United States Patent
Application |
20180295560 |
Kind Code |
A1 |
HODGE; Stephen Lee |
October 11, 2018 |
SYSTEM AND METHOD FOR DETECTING AND CONTROLLING CONTRABAND
DEVICES
Abstract
The growing problem of contraband devices being smuggled into a
correctional facility raises both security and safety issue.
General fixed contraband detected systems are not cost effective
because they require a high up-front cost and high maintenance,
training and upgrade cost after installation. The present
disclosure provides details of a system and method to detect and
control the usage of contraband devices in a correctional facility
cost effectively. Such a system is portable and can be relocated to
different locations. Such a system both detects contraband devices
and disrupts the operations of the contraband devices. Such a
system further provides a report on the severity of contraband
usage to the correctional facility.
Inventors: |
HODGE; Stephen Lee; (Aubrey,
TX) |
|
Applicant: |
Name |
City |
State |
Country |
Type |
GLOBAL TEL*LINK CORPORATION |
Reston |
VA |
US |
|
|
Family ID: |
63711393 |
Appl. No.: |
15/484883 |
Filed: |
April 11, 2017 |
Current U.S.
Class: |
1/1 |
Current CPC
Class: |
H04W 24/10 20130101;
H04W 64/003 20130101; H04W 48/02 20130101; H04W 8/005 20130101;
H04W 8/26 20130101; H04W 24/04 20130101 |
International
Class: |
H04W 48/02 20060101
H04W048/02; H04W 8/26 20060101 H04W008/26; H04W 64/00 20060101
H04W064/00; H04W 8/00 20060101 H04W008/00; H04W 24/10 20060101
H04W024/10 |
Claims
1. A portable detection and control system for detecting and
controlling contraband devices in a correctional facility,
comprising: a communication interface configured to: in a detection
mode: detect one or more contraband devices by cycling through
different frequency bands, intercept transmitted data from the one
or more contraband devices, and after the intercepting, transition
from the detection mode to a control mode; in the control mode:
processing the intercepted data to a calling network; and recording
caller information and call audio of the processed call data; a
memory configured to store the transmitted data intercepted by the
communication interface from the one or more contraband devices;
and an application server configured to: instruct the communication
interface to detect the one or more contraband devices, generate
detection event information for each of the one or more contraband
devices when the one or more contraband devices is detected,
instruct the communication interface to intercept transmitted data
from the one or more contraband devices, extract hardware, data
usage, and location information of the one or more contraband
devices from the transmitted data intercepted from the one or more
contraband devices, and instruct the communication interface to
disrupt the operation of the one or more contraband devices; and
wherein the system is capable of being transported or conveyed.
2. The portable detection and control system of claim 1, wherein
the hardware information of the one or more contraband devices
comprises: a hardware identification number of the one or more
contraband devices, a phone number of the one or more contraband
devices, and a phone number of a remote device communicating with
the one or more contraband devices.
3. The portable detection and control system of claim 1, wherein
the detection event information comprises: the date/time when each
of the one or more contraband devices was detected, the duration of
the one or more contraband devices being detected, and the location
of the detection and control system when the one or more contraband
devices was detected.
4. The portable detection and control system of claim 1, wherein
the data usage information comprises: the duration of data
transmission conducted by the one or more contraband devices, and
the volume of the data transmitted by the one or more contraband
devices.
5. The portable detection and control system of claim 1, wherein
the application server is further configured to generate a report
for the detection of the one or more contraband devices, the report
comprises: a total number of the one or more contraband devices
that have been detected, a total time of the one or more contraband
devices being used, and a total volume of the data transmitted by
the one or more contraband devices.
6. The portable detection and control system of claim 1, wherein
the report for the detection of the one or more contraband devices
further comprises a degree of severity of the contraband usage in
the correction facility calculated based on a collection of
detection parameters generated from the detection event
information, the data usage information, the hardware information
and the location information of the one or more contraband
devices.
7. The portable detection and control system of claim 1, wherein
the information of the one or more contraband devices is extracted
by locating the one or more contraband devices using one or more
positioning techniques comprising lateration and angulation.
8. The portable detection and control system of claim 1, wherein
disrupting the operation of the one or more contraband devices
comprises: sending a jamming signal to the one or more contraband
devices to block the communication of the one or more contraband
devices, sending a managed access signal to the one or more
contraband devices and connect with the one or more contraband
devices, or recording the communication transmitted from and to the
one or more contraband devices.
9. The portable detection and control system of claim 1, wherein
the system further comprises a detachable detection and control
unit, configured to: communicate with the communication interface
of the portable detection and control system using wired or
wireless communication technologies, detect the one or more
contraband devices, and disrupt the one or more contraband devices;
and wherein the detachable detection and control unit can be
detached from the portable detection and control system and
transported to a plurality of locations.
10. A method of contraband device detection and control using a
portable system, comprising: at a first location, conducting a
first detection and control operation using the portable system,
comprising: in a detection mode: detecting a first one or more
contraband devices, intercepting a first transmitted data from the
first one or more contraband devices, extracting a first hardware,
data usage, and location information of the first one or more
contraband devices from the first transmitted data from the first
one or more contraband devices, generating a first report for the
first one or more contraband devices, and after the intercepting,
transition from the detection mode to a control mode; and in the
control mode: processing the intercepted data to a calling network;
and recording caller information and call audio of the processed
call data; relocating the portable system from the first location
to a second location, after the relocating, transitioning from the
control mode to the detection mode, and conducting a second
detection and control operation at the second location using the
portable system, comprising: in the detection mode: detecting a
second one or more contraband devices, intercepting a second
transmitted data from the second one or more contraband devices,
extracting a second hardware, data usage, and location information
of the second one or more contraband devices from the second
transmitted data from the second one or more contraband devices,
generating a second report for the second one or more contraband
devices, and transition from the detection mode to the control
mode, and in the control mode: disrupting a second operation of the
second one or more contraband devices.
11. The method of claim 10, wherein each of generating a first
report for the first one or more contraband devices and generating
a second report for the second one or more contraband devices
comprises generating: a total number of the first or the second one
or more contraband devices that have been detected, a total time of
the first or the second one or more contraband devices being used,
and a total volume of the data transmitted by the first or the
second one or more contraband devices.
12. The method of claim 10, wherein each of generating a first
report for the first one or more contraband devices and generating
a second report for the second one or more contraband devices
further comprises generating a degree of severity of the contraband
usage at the first location or the second location, wherein the
degree of severity is calculated based on the first or the second
transmitted data from the first or the second one or more
contraband devices.
13. The method of claim 10, wherein each of disrupting the first
operations of the first one or more contraband devices and
disrupting the second operations of the second one or more
contraband devices comprises: sending a jamming signal to the first
or the second one or more contraband devices to block the
communication of the first or the second one or more contraband
devices, sending a managed access signal to the first or the second
one or more contraband devices and connect with the first or the
second one or more contraband devices, or recording the
communication transmitted to and from the first or the second one
or more contraband devices.
14. A detection and control system, comprising: one or more
detection and control units, the unit comprising a first
communication interface configured to: in a detection mode: detect
one or more contraband devices by cycling through different
frequency bands, intercept transmitted data from the one or more
contraband devices, and after the intercepting, transition from the
detection mode to a control mode; in the control mode: processing
the intercepted data to a calling network; and recording caller
information and call audio of the processed call data; a memory
configured to store the transmitted data intercepted by the first
communication interface from the one or more contraband devices;
and an application server configured to: instruct the first
communication interface to detect the one or more contraband
devices, generate detection event information for each of the one
or more contraband devices when the one or more contraband devices
is detected, instruct the first communication interface to
intercept transmitted data from the one or more contraband devices,
extract hardware, data usage, and location information of the one
or more contraband devices from the transmitted data intercepted
from the one or more contraband devices, instruct the first
communication interface to disrupt the operation of the one or more
contraband devices, and generate a report for the detection of the
one or more contraband devices; and wherein the one or more
detection and control units are enclosed by a transportable casing;
and one or more first mobility units, configured to transport the
one or more detection and control units.
15. The system of claim 14, further comprises a detachable
detection and control unit configured to: communicate with the
first communication interface of the portable detection and control
system using wired or wireless communication technologies, detect
the one or more contraband devices, and disrupt the one or more
contraband devices; and wherein the detachable detection and
control unit can be detached from the from the portable detection
and control system and transported to a plurality of locations.
16. The system of claim 15, wherein the detachable detection and
control unit comprises: a second communication interface, and a
second mobility unit for the detachable detection and control unit,
the second mobility unit for the detachable detection and control
unit is a manned vehicle, an unmanned vehicle or an unmanned aerial
vehicle; wherein the second communication interface is mounted on
the second moving unit.
17. The system of claim 14, wherein the one or more first mobility
units are configured to: communicate with the one or more detection
and control units, receive transport instructions from the one or
more detection and control units, and transport the one or more
detection and control units to a target location based on the
transport instructions.
18. The system of claim 14, wherein the one or more first mobility
units comprise manned vehicles and unmanned vehicles.
19. The system of claim 14, wherein the first communication
interface comprises one or more antennas, wherein the antennas
further comprise: a distributed antenna system (DAS), and one or
more directional antennas.
20. The system of claim 14, wherein the report for the detection of
the one or more contraband devices comprises a degree of severity
of the contraband usage in the correction facility calculated based
on a collection of detection parameters generated from the
detection event information, the data usage information, the
hardware information and the location information of the one or
more contraband devices.
Description
BACKGROUND
Field
[0001] The disclosure relates to a system and method for detecting
and controlling contraband devices in a correctional facility.
Background
[0002] In corrections environments such as prisons,
telecommunications are highly monitored and controlled. However,
contraband devices are frequently discovered in correctional
facilities. Contraband device usage by inmates poses both a safety
and a security risk by interrupting the monitoring-processes in
prisons. To combat the usage the usage of contraband devices, a
fixed detection system can be installed within the correctional
facility. Such fixed detection systems, however, usually requires a
large upfront cost for installation. The operation and maintenance
of the system, training of the staff, and system software, firmware
and hardware upgrade can result in further cost after the
installation of the system. In addition, a fixed detection system
is generally stationed in one correctional facility. After system
is installed in one location, it is not easy to relocate the system
in other locations, which limits the utilization as well as the
cost efficiency of the system. In addition, in general, a fixed
detection system is located within the correctional facility.
Inmates may gain access to the fixed detection system and interrupt
the operation of the system or damage the system, thus posing a
great risk to the detection system.
[0003] While various aspects and alternative features are known in
the field of communication monitoring, no one design has emerged
that generally integrates all of the ideal features and performance
characteristics as discussed herein.
BRIEF DESCRIPTION OF THE DRAWINGS/FIGURES
[0004] The accompanying drawings, which are incorporated herein and
form a part of the specification, illustrate embodiments of the
present disclosure and, together with the description, further
serve to explain the principles of the disclosure and to enable a
person skilled in the pertinent art to make and use the
embodiments.
[0005] FIG. 1 illustrates a block diagram of a correctional
facility and detection and control scheme for a correctional
facility, according to some embodiments of the present
disclosure.
[0006] FIG. 2 illustrates a block diagram of an exemplary detection
and control system, according to some embodiments of the present
disclosure.
[0007] FIG. 3 illustrates a block diagram of an exemplary detection
and control system, according to some embodiments of the present
disclosure.
[0008] FIG. 4 illustrates a block diagram of an exemplary
application server, according to some embodiments of the present
disclosure.
[0009] FIG. 5 illustrates a block diagram of an exemplary
detachable detection and control unit, according to some
embodiments of the present disclosure.
[0010] FIG. 6 illustrates a flow chart for an exemplary method to
operate the detection and control system, according to some
embodiments.
[0011] FIG. 7 illustrates a flow chart for an exemplary method to
operate the detection and control system for detecting and locating
contraband devices, according to some embodiments.
[0012] FIG. 8 illustrates a computer system, according to an
exemplary embodiment of the present disclosure.
[0013] The present disclosure will be described with reference to
the accompanying drawings. In the drawings, like reference numbers
indicate identical or functionally similar elements. Additionally,
the left most digit(s) of a reference number identifies the drawing
in which the reference number first appears.
DETAILED DESCRIPTION
[0014] Advances in communications technology have opened avenues
for inmates to circumvent more traditional forms of monitoring that
are typically available in correctional facilities. Maintaining the
ability to ensure control and/or monitoring of communications from
or to a controlled facility is, therefore, an important aspect to
the security of the correctional facilities. With the advances in
cellular communications technology, maintaining security becomes
more difficult due to such issues as the smuggling of prohibited
equipment into a monitored facility. Due to the small size of
certain of the more recently-developed devices, such may avoid
detection by more conventional search techniques including, but not
limited to, walk through and manual metal detectors and even
physical "pat-down" searches.
[0015] Therefore, correctional facilities have the need to detect
and control the use of the smuggling or "contraband" wireless and
cellular devices. Due to the small size of certain of the more
recently developed devices and the ingenuity of violating parties,
such contraband devices become very hard to detect or control by
conventional searching techniques. The correctional facilities may
choose to install a fixed detection system to detect and monitor
the usage of the contraband devices within the facilities. However,
such systems usually require a large upfront cost for the
installation, hardware and infrastructure, and initial training of
the staff. Due to their complexity and delicacy, such systems
usually require regular maintenances. In addition, with the rapid
advancement of communication technologies, such systems need to be
upgraded frequently to keep up with the most advanced technologies
utilized by the contraband devices. The cost of maintenance and
upgrade further increases the total cost of operation of such fixed
systems.
[0016] Moreover, once a fixed detection system is installed, the
system is stationed within one facility/location. Without knowing
the severity of the contraband device situation in a correctional
facility, it may not be economical to invest a large amount of
funding to install a fixed detection system before evaluating the
need for such a system. Further, inmates may gain access to the
detection system that is fixed in one location within the
correctional facility and cause damage to the system or interrupt
the operations of the system. Such potential risks may also greatly
impact the utilization and security of the detection system.
[0017] In light of the above, the present disclosure provides
details of a system and method for detecting, locating and
disrupting a contraband device by utilizing a portable detection
and control system. The portable detection and control system is
configured to detect and locate contraband devices within a
correctional facility. The portable detection and control system is
also configured to actively disrupt the communication of the
contraband devices to block the communications, intercept the
communication information, and gain control of the contraband
devices. The portable detection and control system can be
self-contained and fully enclosed in a transportable casing, so
that it can be moved from one location to another. More features of
such as portable detection and control system are to be discussed
in detail.
[0018] FIG. 1 illustrates a block diagram of a correctional
facility and detection and control scheme 100 for a correctional
facility, according to some embodiments of the present disclosure.
The detection and control scheme comprises a detection and control
system 110, a correctional facility 140, and a communication center
150. The correctional facility 140 comprises a contraband device
130. In some embodiments, there are more than one contraband
devices in the correctional facility 140. In one embodiment, there
is another contraband device 131 in the correctional facility 140.
The detection and control unit 110 can be placed at location A
outside the correctional facility 140 to detect the contraband
device 130 in a "detection mode". The contraband device 130 is used
by the inmates to communicate with outside network illegally. In
some embodiments, the communication is carried out between the
contraband device 130 and a communication center 150 outside the
correctional facility 140. The communication center 150, in some
embodiments, is a nearby telecommunication tower for the wireless
network carrier of the contraband device. The communication between
the communication 150 and the contraband device 130 can be carried
out with different communication technologies such as, but not
limited to, GSM, 2G-5G technologies, WCDMA, CDMA, TDMA, UMTS,
WIMAX, WIFI, IBEACON, Bluetooth, LTE, 700 MHz to 2200 MHz or other
frequency band communication technologies. The detection and
control unit 110 is configured to detect the transmission of
signals of the contraband device 130 using some or all the
technologies described above. In some embodiments, the contraband
device 130 can also communicate with another communication center
(e.g. communication center 151).
[0019] In some embodiments, the detection and control system 110 is
also configured to intercept the transmitted data from the detected
contraband device 130 and extract information from the detected
contraband device 130 based on the transmitted data. Such
information includes, but is not limited to, hardware information,
data usage information, and location information of the contraband
device 130 when the contraband device is detected. In some
embodiments, the hardware information further includes a hardware
identification number of the contraband device 130 (e.g. an
international mobile subscriber identity number (IMSI), an
electronic serial number (ESN), a mobile device ID, etc.), a phone
number of the contraband device, and a phone number that is
communicating with the contraband device. In some embodiments, the
data usage information includes the duration of data transmission
conducted by the contraband device and the volume of the data
transmitted by the contraband devices.
[0020] In some embodiments, the location information of the
contraband device 130 is extracted by the detection and control
system 110 by locating the contraband device 130 with a number of
different positioning techniques. The positioning techniques
include, but are not limited to, lateration (e.g. trilateration)
and angulation (e.g. triangulation). Lateration is a process of
estimating the location a contraband device given the distance
measurements of the contraband device to a set of detection devices
with known location. The location of the contraband device can be
calculated and estimated by solving a set of equations based on the
measured distances for each of the detection devices. Trilateration
is a lateration process when a set of three detection devices with
known locations are used to estimate the contraband device
location. Angulation is a process of estimating the location of a
contraband device given the measured angles between detecting
devices at known locations and the contraband devices. The location
of the contraband device can be calculated and estimated by solving
a set of equations based on the measured angles for each of the
detection devices. Triangulation is an angulation process when a
set of three detection devices with known locations are used to
estimate the contraband device location. In some embodiments, the
distance of the contraband device to a detection device can be
estimated by the Received Signal Strength Indicator (RSSI) of the
detected signal, and the measured angle can be estimated by the
Direction of Arrival (DOA) of the detected signal. Further, the
detection and control system 110 can be configured to capture the
motion of the contraband device 130 based on motion detection
techniques. One example of such techniques is Doppler effect. In
some embodiments, the detection and control system 110 is further
able to track the location of the contraband device 130 during the
time period when the contraband device is transmitting signal or is
powered on.
[0021] In some embodiments, the detection and control system 110 is
configured to generate detection event information for each
detection event when the contraband device (e.g. contraband device
130) was detected. Such detection event information includes, but
is not limited to, the date/time when the contraband device was
detected, the duration of the contraband device being detected, and
the location of the detection and control system 110 when the
contraband device was detected. In some embodiments, the detection
and control system 110 is configured to record the detection
information (e.g. hardware information, location information, data
usage information, and detection event information, etc.) in a
memory.
[0022] In some embodiments, the detection and control system 110 is
also configured to analyze the recorded detection information in a
given period of time (i.e. all the detection event information, all
the hardware information of the detected contraband devices, all
the data usage information of the detected contraband devices, and
all the location information of the detected contraband devices in
the period of time) to generate a collection of detection
parameters. In some embodiments, the detection parameters include,
but are not limited to, the total number of contraband device
detection events, the total number of detected contraband devices,
the total time of contraband device usage, the total volume of the
data transmitted by the contraband devices, the location and
distribution of the contraband devices, and the time and frequency
of the data transmission made by the contraband devices.
[0023] In some embodiments, the detection and control system 110 is
also configured to generate a report for the detection of the
contraband devices (e.g. the contraband device 130) in a given
period of time. In some embodiments, the report for the detection
of the contraband devices in a given period of time includes all
the detection event information, all the hardware information of
the detected contraband devices, all the data usage information of
the detected contraband devices, and all the location information
of the detected contraband devices in the period of time. In some
embodiments, the report for the detection of the contraband devices
includes the collection of detection parameters such as, but not
limited to, the total number of contraband device detection events,
the total number of detected contraband devices, the total time of
contraband device usage, the total volume of the data transmitted
by the contraband devices, the location and distribution of the
contraband devices, and the time and frequency of the data
transmission made by the contraband devices.
[0024] In some embodiments, the detection and control system 110
further includes a degree of severity (DOS) in the report for the
detection of the contraband devices. In some embodiments, the
degree of severity gives guidance to the jurisdiction on the
severity of the contraband device usage. In some embodiments, the
degree of severity is calculated based on the collection of
detection parameters. In some embodiments, the degree of severity
is a numerical number from 0 to 9, with 0 meaning no contraband
device usage and 9 meaning the most severe contraband device usage.
In some embodiments, the calculation of a degree of severity is
based on a predetermined rule defined by the jurisdiction officers
or the system administrator. In some embodiments, the predetermined
rule defines a selection of detection parameters such as "p1" for
the number of detected contraband devices, "p2" for the number of
detection events, and "p3" for the total time of contraband device
usage. The predetermined rule further defines a coefficient for
each detection parameter (e.g. "c1" for "p1", "c2" for "p2", and
"c3" for "p3"). The predetermined rule defines the relationship
between the degree of severity (DAS) and the detection parameters
by a specific algorithm (e.g.
DAS=c1.times.p1+c2.times.p2+c3.times.p3). In some embodiments, the
number of DAS is rounded to the nearest integer to give the final
number of the degree of severity. A person of ordinary skill in the
art would understand that the algorithm described in the current
disclosure is only for illustration purpose and a different
algorithm can be chosen or defined as needed.
[0025] In some embodiments, the jurisdiction officer and/or the
system administrator refers to the report of the detection of the
contraband devices with or without a DOS before taking further
actions in fighting the contraband device usage. Such actions
include, but are not limited to, extending the detection period,
locating the detected contraband devices physically, instructing
the detection and control system 110 to take disruption actions,
and deciding whether to install a fixed detection system inside the
correctional facility.
[0026] In some embodiments, the detection and control system 110 is
also configured to actively disrupt the operation of the detected
contraband device 130 in a "control mode". A number of methods can
be used by the detection and control system 110 to disrupt the
operation of contraband device 130 in the control mode. In one
embodiment, the detection and control system 110 transmits a
wideband jamming signal to the contraband device 130 to block the
contraband device 130 from successfully communicating with the
communication center 150. In one embodiment, the detection and
control system 110 transmits a managed access request to the
contraband device 130 and force the contraband device 130 to
connect with the detection and control system 110. Upon a
successful setup of a managed access with the contraband device
130, the detection and control system 110 is able to manage the
contraband device 130 and applies usage rules determined by the
jurisdiction offices. In one embodiment, the detection and control
system 110 listens and records the communication transmitted to and
from the contraband device 130. Such communication can include, but
is not limited to, phone calls, emails, voice messages and text
messages.
[0027] In some embodiments, the detection and control system 110 is
fully enclosed in a transportable casing so that the system is
portable. In some embodiments, the detection and control system 110
is carried around by human hand-holding. In some other embodiments,
the detection and control system 110 can also be mounted on powered
vehicles with or without human control. In yet some other
embodiments, the detection and control system 110 can be mounted on
unmanned aerial vehicles (UAVs).
[0028] In some embodiments, the detection and control system 110 is
placed at location A outside the correctional facility 104 for the
duration of a detection. In some embodiments, the location A is a
location between the correctional facility and the communication
center 150. In some other embodiments, the detection and control
system 110 moves around from one location to another location for
the duration of a detection. The detection and control system 110
collects detection information from multiple locations to improve
the accuracy of the detection and cover a larger area of the
correctional facility. In some embodiments, the location
information of the detected contraband devices collected at
multiple locations by the detection and control system 110 is
analyzed using positioning technologies, such as triangulation, to
improve the accuracy of the location of the detected contraband
devices. In yet some other embodiments, the detection and control
system 110 is moved to a location closer to the contraband device
to improve the accuracy of the detection, and/or improve the
efficiency for the disruption.
[0029] In some embodiments, the detection and control scheme 100
further comprises a detection and control system 120. In some
embodiments, the detection and control system 120 is configured the
same way as the detection and control system 110. Referring to FIG.
1, the detection and control system 120 is placed at location B
outside the correctional facility 140. Location B is remote to
location A. In some other embodiments, the detection and control
scheme comprises more detection and control systems than the
detection and control systems 110 and 120.
[0030] In some embodiments, the detection and control system 120 is
configured to detect the contraband devices (e.g. the contraband
device 130) within the correctional facility 140 independently from
the detection and control system 110. In some other embodiments,
the detection and control systems 110 and 120 communicate with each
other before, during, and/or after the detection to share the
detection information of each detected contraband device. In yet
some other embodiments, there are more detection and control
systems than systems 110 and 120. The sharing of detection
information between multiple detection and control systems can be
used for a variety of applications including, but not limited to,
confirming detection events when more than one detection and
control systems detect the same contraband device, locating the
contraband device when location information for the contraband
device are obtained from more than one detection and control system
and used for lateration or angulation, and enhancing detection
coverage when different detection and control systems are located
in different locations around the correction facility.
[0031] In some embodiments, the detection and control systems 110
and 120 communicate with each other to disrupt the communication of
the detected contraband devices (e.g. the contraband device 130).
In one embodiment, the detection and control systems 110 and 120
located in different locations (i.e. location A and location B)
send out jamming signals to the same detected contraband device and
boost the strength of the jamming signals, therefore enhancing the
disruption efficiency.
[0032] Referring to FIG. 1, in some embodiments, the detection and
control scheme 100 further comprises a detachable detection and
control unit 180. In some embodiments, the detachable detection and
control unit 180 is part of the detection and control system 110
and is detachable from the casing of the detection and control
system 110. The detachable detection and control unit 180 is
configured to communicate with the detection and control system 110
wirelessly using technologies including, but not limited to,
Bluetooth, WIFI, and radio frequency communication technologies.
The detachable detection and control unit 180 is further configured
to detect the transmission of signals from the contraband device
130. The detachable and control detection unit 180 is able to
detect signals using technologies such as, but not limited to, GSM,
2G-5G technologies, WCDMA, CDMA, TDMA, UMTS, WIMAX, WIFI, IBEACON,
Bluetooth, LTE, 700 MHz to 2200 MHz or other frequency band
communication technologies.
[0033] In some embodiments, the detachable and control detection
unit 180 is placed at location C outside the correctional facility
140 and location C is remote to location A. The detachable and
control detection unit 180 detects transmission signals from the
contraband device 130 and communicates the detection information of
the detected contraband device with the detection and control
system 110. The communication of data between the detachable
detection and control unit 180 and the detection and control system
110 can be used for a variety of applications including, but not
limited to: confirming detection events when both the detection and
control system 110 and the detachable detection and control unit
180 detect the same contraband device; locating the contraband
device when the contraband device location information from both
the detection and control system 110 and the detachable detection
and control unit 180 are used for positioning; and enhancing the
detection coverage when the detachable detection and control unit
180 is placed at a different location than the detection and
control system 110 around the correction facility 140.
[0034] In some embodiments, the detection and control systems 110
and the detachable detection and control unit 180 communicate with
each other to disrupt the communication of the detected contraband
devices (e.g. the contraband device 130). In one embodiment, the
detection and control system 110 and the detachable detection and
control unit 180 are located in different locations (i.e. location
A and location C). Both the detection and control system 110 and
the detachable detection and control unit 180 send out jamming
signals to the same detected contraband device, which boosts the
strength of the jamming signals received by the detected contraband
device, therefore enhancing the disruption efficiency.
[0035] Referring to FIG. 1, in some embodiments, the correctional
facility 140 further comprises a facility control center 160. In
some embodiments, the facility control center 160 is configured to
communicate with the detection and control system 130 wirelessly to
receive the updated detection information of the detected
contraband devices. In some embodiments, whenever the detection and
control system 130 detects a contraband device usage, the detection
and control system 130 sends an alert to the facility control
center 160 and notify the facility administrators of the detection
event. The alert includes information such as, but not limited to,
the date/time of the detection event, the location of the detected
contraband device, and other information of the detected contraband
devices. In some embodiments, the facility control center 160 is
configured to take instructions from the facility administrators
and transmit the instructions to the detection and control system
130. Such instructions include, but are not limited to, initiate
the control mode of the detection and control system 130 to disrupt
the detected contraband devices, extend the detection period,
relocate to the next target location for detection/disruption,
pause the detection, generate a report of the detection, and
terminate the detection.
[0036] In some embodiments, the correctional facility 140 further
comprises a facility mobile device 170. The facility mobile device
170 can be carried around by the jurisdiction officers in the
facility. In some embodiments, the facility mobile device 170 is
configured to communicate with the facility control center 160. The
communication between the facility control center 160 and the
facility mobile device 170 includes, but is not limited to, voice
messages, text messages, phone calls, emails, and video calls. In
some embodiments, the facility mobile device 170 is configured to
receive alerts from the facility control center 160 whenever a
detection event occurs. The alerts include information such as, but
not limited to, the date/time of the detection event, the location
of the detected contraband device, and other information of the
detected contraband devices. The facility mobile device 170 is also
configured to receive instructions from the facility control center
160, such as, but not limited, conducting a physical search at a
target location, patrolling a target region, and isolating a
certain area of the facility. The facility mobile device 170 is
further configured to send instructions or requests to the facility
control center 160, such as, but not limited to, continuing
detection of the contraband device, sending updated location of the
detected contraband devices, initiating the disruption of the
contraband devices, and improving the location accuracy to narrow
down the search area. In some embodiments, the facility mobile
device 170 is further configured to directly communicate with the
detection and control system 110 to obtain information and send out
instructions.
[0037] FIG. 2 illustrates a block diagram of an exemplary detection
and control system 200, according to some embodiments of the
present disclosure. The detection and control system 200 is an
exemplary embodiment of the detection and control system 110 and
the detection and control system 120 in FIG. 1. The detection and
control system comprises a memory 201, an application server 202, a
communication interface 203, a power unit 204, a plurality of input
means 205, a plurality of output means 206, a plurality of sensors
207, and an antenna unit 208.
[0038] In some embodiments, the memory 201 stores the information
and instructions necessary for the operations of the detection and
control system 200. The information stored in memory 201 includes,
but is not limited to, the detection event information for each
detection event, the information extracted from the contraband
devices in each detection event, the transmitted data intercepted
by the communication interface 203 from the detected contraband
devices, the reports generated by the detection and control system
200 for the detection of the contraband devices in a given period
of time, the instructions received for the application server 202,
the instructions generated by the application server 202, the data
to be transmitted and the data received by the communication
interface 203, the data received by the plurality of input means
205, and the data to be output by the plurality of output means
206.
[0039] In some embodiments, the application server 202 is the main
processing unit for the detection and control system 200. The
application server 202 is configured to execute a variety of tasks,
such as, but not limited to, instructing the communication
interface 203 to detect the contraband devices, generating
detection event information whenever a detection event occurs (e.g.
a contraband device is detected), instructing the communication
interface to intercept transmitted data from the detected
contraband device (e.g. contraband device 130), analyzing the
transmitted data intercepted from the detected contraband device to
extract the hardware information, data usage information, and
location information of the detected contraband devices, recording
the intercepted data from the detected contraband device in the
memory 201, recording the detection event information and the
information extracted from the detected contraband devices in the
memory 201, performing positioning actions using positioning
techniques to locate the contraband devices, generating
instructions to perform disruption actions to disrupt the detected
contraband devices, analyzing all the detection information (e.g.
detection event information, hardware information, location
information, data usage information, etc.) stored in the memory 201
to generate a report of the detection of the contraband devices,
and executing instructions received from the plurality of input
means 206. In some embodiments, the application server 202 is
further configured to generate alerts for the facility control
center 160 and/or the facility mobile device 170, generate location
information of the detection and control system 200, and execute
instructions received from the facility control center 160, the
facility mobile device 170, and/or other detection and control
system communicating with the detection and control system 200.
[0040] In some embodiments, the communication interface 203
includes one or more transceivers, transmitters, and/or receivers
that communicate via the antenna unit 208. The communication
interface 203 is configured to detect transmissions by the
contraband device 130. Detection of the contraband device 130
transmissions includes reception of a transmission signal from an
unauthorized communication via the antenna unit 208. For example,
to detect an unauthorized communication, a receiver of the
communication interface 203 may cycle through different frequencies
bands and/or radio access technologies. In some embodiments, the
communication interface 203 is further configured to output an RF
signal during disruption operations. For example, a transmitter of
the communication interface 203 can be configured to transmit an
interference signal based on the received unauthorized
communication. In some embodiments, the communication interface 203
is further configured to communicate with another detection and
control system 120, the detachable detection and control unit 180,
the facility control center 160, and the facility mobile device 170
to provide or receive information and/or instructions.
[0041] In some embodiments, the antenna unit 208 includes one or
more antennas. The antenna unit 208 can include a distributed
antenna system (DAS), in which a number of antenna elements are
spaced apart from each other. The usage of a DAS can increase the
detection accuracy and reliability by detecting the same area with
multiple units that are spaced apart. The antenna unit 208 can also
include one or more directional antennas which radiate or receive
greater power in specific directions allowing for increased
performance and reduced interference from unwanted sources. The
usage of directional antennas can direct the detection and
disruption to the target area (e.g. the correctional facility 140)
without detecting or interfering unwanted areas (e.g. public
areas).
[0042] In some embodiments, the power unit 204 provides power to
the detection and control system 200 for its operations. In one
embodiment, the power unit 204 is an A/C power adapter that
directly connects to A/C power outlets outside the correctional
facility 140. In another embodiment, the power unit 204 includes a
battery that can be charged. In another embodiment, the power unit
204 includes a power generator that generates power from a number
of sources such as, but not limited to, propane, diesel, gas, and
solar energy. In yet another embodiment, the power unit 204 is a
wireless charging adapter that receives power remotely from a
charging base station.
[0043] In some embodiments, the plurality of input means different
input interfaces for the detection and control system 200
including, but not limited to, a keyboard, a touch screen, a
microphone, and a camera. In some embodiments, the administrator of
the detection and control system 200 can input information and/or
instructions to the detection and control system 200 to complete
specific tasks.
[0044] In some embodiments, the plurality of output means include
different output interfaces for the detection and control system
200 including, but not limited to, a display for video, photo, and
text output, and a loudspeaker for sound output.
[0045] In some embodiments, the plurality of sensors 207 include a
biometric sensor and a position and motion sensor. The biometric
sensor can be a fingerprint sensor that validates the identity of
the user before granting the user an access to the detection and
control system 110. In one embodiment, the biometric sensor
communicates with the application server 202 and the memory 201 to
verify the identity of the user. The biometric sensor obtains the
biometric information of a requesting user, and sends the data to
the application server 202. The application server 202 receives the
biometric data from the biometric sensor 207, and compares the data
from the biometric information database of all the authorized users
stored in memory 201. If the biometric data from the requesting
user matches one of the authorized users' biometric data, the
application server grants access to the requesting user.
[0046] In some embodiments, the position and motion sensor includes
devices such as, but not limited to, Global Positioning System
(GPS) devices, indoor positioning systems (IPS) devices,
accelerometers, and/or gyroscopes to determine position and motion.
The position and motion data obtained by the position and motion
sensor 207 for the detection and control system is sent to the
application server 202 as part of the detection information for a
detection event. The position and motion data is further used by
the application server during the positioning process (e.g.
triangulation) for the current location of the contraband device
130.
[0047] FIG. 3 illustrates a block diagram of an exemplary detection
and control system 300, according to some embodiments of the
present disclosure. The detection and control system 300 is another
exemplary embodiment of the detection and control system 110 and
the detection and control system 120 in FIG. 1. The detection and
control system includes a detection and control unit 310 and a
mobility unit 320. In some embodiments, the detection and control
unit 310 further includes a memory 311, an application server 312,
a communication interface 313, a power unit 314, a plurality of
input means 315, a plurality of output means 316, a plurality of
sensors 317, and an antenna unit 318.
[0048] In some embodiments, the memory 311 stores the information
and instructions necessary for the operations of the detection and
control system 300. The information stored in memory 311 includes,
but is not limited to, the detection event information for each
detection event, the information extracted from the contraband
devices in each detection event, the transmitted data intercepted
by the communication interface 313 from the detected contraband
devices, the reports generated by the detection and control system
300 for the detection of the contraband devices in a given period
of time, the instructions received for the application server 312,
the instructions generated by the application server 312, the data
to be transmitted and the data received by the communication
interface 313, the data received by the plurality of input means
315, and the data to be output by the plurality of output means
316.
[0049] In some embodiments, the application server 312 is the main
processing unit for the detection and control system 300. The
application server 312 is configured to execute a variety of tasks,
such as, but not limited to, instructing the communication
interface 313 to detect the contraband devices, generating
detection event information whenever a detection event occurs (e.g.
a contraband device is detected), instructing the communication
interface to intercept transmitted data from the detected
contraband device (e.g. contraband device 130), analyzing the
transmitted data intercepted from the detected contraband device to
extract the hardware information, data usage information, and
location information of the detected contraband devices, recording
the intercepted data from the detected contraband device in the
memory 311, recording the detection event information and the
information extracted from the detected contraband devices in the
memory 311, performing positioning actions using positioning
techniques to locate the contraband devices, generating
instructions to perform disruption actions for the detected
contraband devices, analyzing all the detection information (e.g.
detection event information, hardware information, location
information, data usage information, etc.) stored in the memory 311
to generate a report of the detection of the contraband devices,
and executing instructions received from the plurality of input
means 206. In some embodiments, the application server 312 is
further configured to generate alerts for the facility control
center 160 and/or the facility mobile device 170, generate location
information of the detection and control system 300, and execute
instructions received from the facility control center 160, the
facility mobile device 170, and/or other detection and control
system communicating with the detection and control system 300.
[0050] In some embodiments, the communication interface 313
includes one or more transceivers, transmitters, and/or receivers
that communicate via the antenna unit 318. The communication
interface 313 is configured to detect transmissions by the
contraband device 130. Detection of the contraband device 130
transmissions includes reception of a transmission signal of an
unauthorized communication via the antenna unit 318. For example,
to detect an unauthorized communication, a receiver of the
communication interface 313 may cycle through different frequencies
bands and/or radio access technologies. The communication interface
313 is further configured to output an RF signal during disruption
operations. For example, a transmitter of the communication
interface 313 can be configured to transmit an interference signal
based on the received unauthorized communication. In some
embodiments, the communication interface 313 is further configured
to communicate with another detection and control system 120, the
detachable detection and control 180, the facility control center
160, and the facility mobile device 170 to provide or receive
information and/or instructions.
[0051] In some embodiments, the antenna unit 318 includes one or
more antennas. In one embodiment, the antenna unit 318 is a
distributed antenna system (DAS), in which a number of antenna
elements are spaced apart from each other. The usage of a DAS can
increase the detection accuracy and reliability by detecting the
same area with multiple units that are spaced apart. In another
embodiment, the antenna unit 318 can be one or more directional
antennas which radiate or receive greater power in specific
directions allowing for increased performance and reduced
interference from unwanted sources. The usage of directional
antennas can direct the detection and disruption to the target area
(e.g. the correctional facility 140) without detecting or
interfering unwanted areas (e.g. public areas). In some
embodiments, a part or the entire antenna unit 318 can be located
on the mobility unit 320.
[0052] In some embodiments, the power unit 314 provides power to
the detection and control system 300 for its operations. In one
embodiment, the power unit 314 is an A/C power adapter that
directly connects to A/C power outlets outside the correctional
facility 140. In another embodiment, the power unit 314 includes a
battery that can be charged. In another embodiment, the power unit
314 includes a power generator that generates power from a number
of sources such as, but not limited to, propane, diesel, gas, and
solar energy. In yet another embodiment, the power unit 314 is a
wireless charging adapter that receives power remotely from a
charging base station. In a further embodiment, the power unit 314
receives the power from the mobility unit 320. In a further
embodiment, the mobility unit 320 directly provides power for the
operation of the detection and control system 300, and the power
unit 314 is not necessary.
[0053] In some embodiments, the plurality of input means include
different input interfaces for the detection and control system 300
including, but not limited to, a keyboard, a touch screen, a
microphone, and a camera. In some embodiments, the administrator of
the detection and control system 300 can input information and/or
instructions to the detection and control system 300 to complete
specific tasks.
[0054] In some embodiments, the plurality of output means include
different output interfaces for the detection and control system
300 including, but not limited to, a display for video, photo, and
text output, and a loudspeaker for sound output.
[0055] In some embodiments, the plurality of sensors 317 include a
biometric sensor and a position and motion sensor. The biometric
sensor can be a fingerprint sensor that validates the identity of
the user before granting the user an access to the detection and
control system 110. In one embodiment, the biometric sensor
communicates with the application server 312 and the memory 311 to
verify the identity of the user. The biometric sensor obtains the
biometric information of a requesting user, and sends the data to
the application server 312. The application server 312 receives the
biometric data from the biometric sensor 317, and compares the data
from the biometric information database of all the authorized users
stored in memory 311. If the biometric data from the requesting
user matches one of the authorized users' biometric data, the
application server grants access to the requesting user.
[0056] In some embodiments, the position and motion sensor includes
devices such as, but not limited to, Global Positioning System
(GPS) devices, indoor positioning systems (IPS) devices,
accelerometers, and/or gyroscopes to determine position and motion.
The position and motion data obtained by the position and motion
sensor 317 for the detection and control system is sent to the
application server 312 as part of the detection information for a
detection event. The position and motion data is further used by
the application server during the positioning process (e.g.
triangulation) for the current location of the contraband device
130.
[0057] In some embodiments, the mobility unit 320 is a manned
vehicle, an unmanned vehicle, or a drone or unmanned aerial
vehicles (UAVs). In some embodiments, the detection and control
unit 310 is mounted on the mobility unit 320. In some embodiments,
the control unit 310 is detachable from the mobility unit 320. In
some other embodiments, a part of the detection and control unit
310 can be mounted on the mobility unit 320.
[0058] In some embodiments, the mobility unit 320 provides power to
the detection and control unit 310 through wired electrical
connection or wireless charging technology.
[0059] In some embodiments, the mobility unit 320 is a self-driving
vehicle with it own processing unit, input/output means,
communication interface, sensors, and memory unit. The mobility
unit 320 can be configured to communicate with the detection and
control unit 310 and transmit/receive information including, but
not limited to, location of the mobility unit 320 and/or the
detection and control unit 310, detection information of all the
detection events, target location for detection and disruption,
instructions for the mobility unit 320 to move to the target
location, and instructions for the operations of the detection and
control unit 310. In some embodiments, the mobility unit 320 works
with the detection and control unit 310 in accordance to detect
contraband devices, locate contraband devices from conducting
detection at different locations, move to the detected contraband
devices, and disrupt the operation of the detected contraband
devices. In some embodiments, the operation of the detection and
control system 300 is fully automated.
[0060] FIG. 4 illustrates a block diagram of an exemplary
application server 400, according to some embodiments of the
present disclosure. The application server 400 is an exemplary
embodiment of the application server 202 in FIG. 2 and the
application server 312 in FIG. 3.
[0061] Application server 400 consists of any number of servers,
and functions as the primary logic processing center in the
detection and control system 200 and the detection and control
system 300. Application server 400 is configured to execute a
variety of tasks, such as, but not limited to, initiating and
coordinating the detection of the contraband devices, analyzing the
data received from the detected contraband devices to obtain the
information of the detected contraband devices, recording
information into and fetching information from the memory of the
detection and control system, performing positioning actions using
positioning techniques to locate the contraband devices, generating
instructions to perform disruption actions for the detected
contraband devices, analyzing the detection information stored in
the memory of the detection and control system, generating a report
of the detection of the contraband devices, and executing
instructions received from different sources. In some embodiments,
the application server 400 is further configured to generate alerts
for the facility control center 160 and/or the facility mobile
device 170, generate location information of the detection and
control system, and execute instructions received from the facility
control center 160, the facility mobile device 170, and/or other
detection and control system communicating with the detection and
control system.
[0062] Application server 400 includes one or more central
processing units (CPU) 410 connected via a bus 401 to several other
components. One of such components can be an internal data storage
420. This data storage 420 is non-volatile storage, such as one or
more magnetic hard disk drives (HDDs) and/or one or more solid
state drives (SSDs). Data storage 420 is used to store a variety of
important files, documents, or other digital information, such as
operating system files, application files, and/or temporary
recording space.
[0063] Application server 400 also includes system memory 430.
System memory 430 is preferably faster and more efficient than Data
storage 420, and is configured as random access memory (RAM) in an
embodiment. System memory 430 contains the runtime environment of
application server 400, storing temporary data for any of operating
system 432, java virtual machine 434, java application server 436,
and detection and monitoring control logic 438.
[0064] In some embodiments, referring to FIG. 4, the application
server 400 can have its own input and output methods. For example,
the input method can be a keyboard and/or mouse 440, and the output
method can be a monitor 442.
[0065] FIG. 5 illustrates a block diagram of an exemplary
detachable detection and control unit 500, according to some
embodiments of the present disclosure. The detachable detection and
control unit 500 is an exemplary embodiment of the detachable
detection and control unit 180 in FIG. 1. In some embodiments, the
detachable detection and control unit 500 is part of the detection
and control system 110 and is detachable from the casing of the
detection and control system. The detachable detection and control
unit 500 is configured to communicate with the detection and
control system 110 wirelessly using technologies including, but not
limited to, Bluetooth, WIFI, and radio frequency communication
technologies. The detachable detection and control unit 500 is
further configured to detect the transmission of signals from the
contraband devices (e.g. contraband device 130). The detachable
detection and control unit 500 is able to detect signals using
technologies such as, but not limited to, GSM, 2G-5G technologies,
WCDMA, CDMA, TDMA, UMTS, WIMAX, WIFI, IBEACON, Bluetooth, LTE, 700
MHz to 2200 MHz or other frequency band communication technologies.
The detachable detection and control unit 500 is further configured
to perform disruption actions to the detected contraband devices
upon receiving instructions from the application server 400,
according to some embodiments.
[0066] In some embodiments, the detachable detection and control
unit 500 includes a communication interface 502, a plurality of
sensors 503, and an antenna unit 506. In some embodiments, the
detachable detection and control unit 500 further includes a memory
501 and a power unit 504. In some embodiments, the detachable
detection and control unit 500 further includes a mobility unit
505.
[0067] The communication interface 502 includes one or more
transceivers, transmitters, and/or receivers that communicate via
the antenna unit 506. The communication interface 502 is configured
to detect transmissions by the contraband device 130. Detection of
the contraband device 130 transmissions includes reception of a
transmission signal of an unauthorized communication via the
antenna unit 506. For example, to detect an unauthorized
communication, a receiver of the communication interface 502 may
cycle through different frequencies bands and/or radio access
technologies. In some embodiments, the communication interface 502
is further configured to output an RF signal during disruption
operations. For example, a transmitter of the communication
interface 502 can be configured to transmit an interference signal
based on the received unauthorized communication. The communication
interface 502 is further configured to communicate with the
detection and control system 110 to transmit information and/or
instructions.
[0068] In some embodiments, the antenna unit 506 includes one or
more antennas. In one embodiment, the antenna unit 506 is a
distributed antenna system (DAS), in which a number of antenna
elements are spaced apart from each other. The usage of a DAS can
increase the detection accuracy and reliability by detecting the
same area with multiple units that are spaced apart. In another
embodiment, the antenna unit 506 includes one or more directional
antennas which radiate or receive greater power in specific
directions allowing for increased performance and reduced
interference from unwanted sources. The usage of directional
antennas can direct the detection and disruption to the target area
(e.g. the correctional facility 140) without detecting or
interfering unwanted areas (e.g. public areas).
[0069] In some embodiments, the plurality of sensors 503 include a
position and motion sensor. The position and motion sensor includes
devices such as, but not limited to, Global Positioning System
(GPS) device indoor positioning systems (IPS) devices,
accelerometers, and/or gyroscopes to determine position and motion.
The position and motion data obtained by the position and motion
sensor 503 for the detachable detection and control unit 500 is
sent to the application server 400 as part of the detection
information for a detection event. The position and motion data is
further used by the application server 400 during the positioning
process (e.g. triangulation) for the current location of the
detected contraband device 130.
[0070] In some embodiments, the power unit 504 provides power to
the detachable detection and control unit 500 for its operations.
In one embodiment, the power unit 504 is an A/C power adapter that
directly connects to A/C power outlets outside the correctional
facility 140. In another embodiment, the power unit 504 includes a
battery that can be charged. In another embodiment, the power unit
504 is a wireless charging adapter that receives power remotely
from a charging base station. In a further embodiment, the power
unit 504 receives the power from the mobility unit 505. In a
further embodiment, the mobility unit 505 directly provides power
for the operation of the detachable detection and control unit 500,
and the power unit 504 is not necessary.
[0071] In some embodiments, the mobility unit 505 is a self-driving
vehicle or an unmanned aerial vehicle with its own processing unit,
input/output means, communication interface, sensors, and memory
unit. The mobility unit 505 can be configured to communicate with
the detection and control unit 310 and transmit information
including, but not limited to, location of the mobility unit 505
and/or the detachable detection and control unit 500, detection
information of all the detection events, target location for
detection and disruption, instructions for the mobility unit 505 to
move to the target location, and instructions for the operations of
the detachable detection and control unit 500. In some embodiments,
the mobility unit 505 cooperates with the detection and control
unit 310 or the detection and control system 200 to detect
contraband devices, locate contraband devices from conducting
detection at different locations, move to the detected contraband
devices, and disrupt the operation of the detected contraband
devices.
[0072] FIG. 6 illustrates a flow chart for an exemplary method 600
to operate the detection and control system 110, according to some
embodiments. At step 602, the detection and control system 110
placed at a first location outside the correctional facility 140.
Referring to FIG. 1, in some embodiments, the first location (e.g.
Location A) is between the correctional facility 140 and a nearby
communication center 150. Such a location set up is favorable in
detecting the signal transmission between the contraband device
(e.g. contraband device 130) and the correctional facility, because
the detection and control system 110 is located close to the signal
transmission pathway between the contraband device 130 and the
communication center 150.
[0073] At step 604, the detection and control system 110 detects
communication signals from the contraband devices in the
correctional facility. In some embodiments, the detection is done
by the communication interface and the antenna unit of the
detection and control system. In some embodiments, the antenna unit
is a DAS system to improve the detection accuracy and reliability.
In some other embodiments, the antenna unit includes one or more
directional antennas directed to the correctional facility 140 to
avoid detecting unwanted areas. When searching for a contraband
device, the detection and control system 110 enables a receiver to
receive transmissions from contraband devices. The detection and
control system 110 may focus on specific types of transmissions
such as GSM, CDMA, LTE, or other cellular transmissions and/or may
rotate through a variety of frequencies and transmission types
including, for example, cellular transmissions and WIFI signals of
a specific type.
[0074] At step 606, the detection and control system 110 conducts
the detection until a contraband device is detected, or when a
pre-determined time period for detection ends. If a contraband
device is not detected within the pre-determined time period, the
system operation jumps to step 618 to determine if the operation
needs to continue. If a contraband device is detected, the system
proceeds to step 608.
[0075] At step 608, the detection and control system 110 perform
actions o extract information of the detected contraband device
(e.g. contraband device 130). The information of the contraband
device 130 to be extracted includes, but is not limited to,
hardware information, data usage information, and location
information of the contraband device 130 when the contraband device
is detected. In some embodiments, the hardware information further
includes a hardware identification number of the contraband device
130 (e.g. an international mobile subscriber identity number
(IMSI), an electronic serial number (ESN), a mobile device ID,
etc.), a phone number of the contraband device, and a phone number
that is communicating with the contraband device. In some
embodiments, the data usage information includes the duration of
data transmission conducted by the contraband device and the volume
of the data transmitted by the contraband devices. In some
embodiments, the detection and control system 110 utilizes one or
more positioning techniques (e.g. lateration and angulation) to
obtain the location of the detected contraband devices. In some
embodiments, at step 608, the detection and control system 110
further intercepts the communication transmitted from and to the
detected contraband device. In some embodiments, the detection and
control system 110 sends an alert to the facility control center
160 to inform the correctional facility 140 of the detection event.
In some embodiments, the detection and control system 110 further
generates detection event information for the detected contraband
device. Such detection event information includes, but is not
limited to, the date/time when the contraband device was detected,
the duration of the contraband device being detected, and the
location of the detection and control system 110 when the
contraband device was detected.
[0076] At step 610, the detection and control system 110 records
the extracted information for the detected contraband device at
step 608 to a memory. In addition to the information extracted at
step 608, the detection and control system 110 can also record
information such as, but not limited to, the date/time when the
contraband device was detected, the duration of the contraband
device being detected, and the location of the detection and
control system 110 when the contraband device was detected.
[0077] At step 612, the detection and control system 110 generates
a report for all the detection events and all the detected
contraband devices during a given period of time. In some
embodiments, the report contains information such as, but not
limited to the total number of contraband device detection events,
the total number of detected contraband devices, the total time of
contraband device usage, the total volume of the data transmitted
by the contraband devices, the location and distribution of the
contraband devices, and the time and frequency of the data
transmission made by the contraband devices. In some embodiments,
based on the extracted data from all the detected contraband
devices and the detection event information for all the detected
devices, the detection and control system 110 generates a degree of
severity in the report to give guidance to the facility
administrators on the severity of the contraband device usage in
the correctional facility.
[0078] At step 614, the detection and control system 110 listens
for input or instruction to activate control mode and perform
disruption to the contraband devices. If the disruption is needed,
the detection and control system 110 jumps to step 616. If no
disruption is needed, the detection and control system 110 jumps to
step 618. In one embodiment, the input and/or instruction comes
from the detection and control system 110 administrator via one of
the input method. In one embodiment, the input and/or instruction
comes from the facility administrator via the facility control
center 160, or from the facility officer via the facility mobility
device 170.
[0079] In some embodiments, at step 614, the detection and control
system 110 have pre-determined instructions to automatically
activate control mode and perform disruption to the contraband
devices. In these embodiments, the detection and control system 110
can automatically activate control mode when the total number of
detection events exceeds a pre-determined number, or the total
number of detected contraband devices exceeds a pre-determined
number, or the total data transmitted by the contraband devices
exceeds a pre-determined amount.
[0080] At step 618, the detection and control system 110 listens
for input or instruction on whether to continue the detection at
the current location. If continued detection is needed, the
detection and control system 110 jumps back to step 604 to continue
the detection. If continued detection at current location is not
needed, the detection and control system 110 jumps to step 620. In
one embodiment, the input and/or instruction comes from the
detection and control system 110 administrator via one of the input
method. In one embodiment, the input and/or instruction comes from
the facility administrator via the facility control center 160, or
from the facility officer via the facility mobility device 170.
[0081] In some embodiments, at step 618, the detection and control
system 110 have pre-determined instructions to automatically
determine whether continued detection is needed at the current
step. In these embodiments, the detection and control system 110
can automatically continue the detection when the total number of
detection events exceeds a pre-determined number, or the total
number of detected contraband devices exceeds a pre-determined
number, or the total data transmitted by the contraband devices
exceeds a pre-determined amount. In these embodiments, the
detection and control system 110 can still listen for input and/or
instructions and alter its operations based on the input and/or
instructions.
[0082] At step 620, the detection and control system 110 listens
for input or instructions on whether to relocate to another
location. If relocation is needed, the detection and control system
110 jumps to step 622. If relocation is not needed, the detection
and control system 110 jumps to step 624. In one embodiment, the
input and/or instruction comes from the detection and control
system 110 administrator via one of the input method. In one
embodiment, the input and/or instruction comes from the facility
administrator via the facility control center 160, or from the
facility officer via the facility mobility device 170. In some
embodiments, at step 620, the detection and control system 110 have
pre-determined instructions to automatically determine whether a
relocation is needed.
[0083] At step 622, the detection and control system 110 is moved
to the next location for detection and disruption. In some
embodiments, the detection and control system 110 is carried to the
next location by human, manned vehicles, unmanned vehicles, and/or
unmanned aerial vehicles. After relocation, the detection and
control system 110 can jump back to step 604 for more detection
and/or disruption.
[0084] At step 624, the detection and control system 110 is in a
standby or power off state, waiting for input and/or instructions
to wake up or power on for operations. In one embodiment, the input
and/or instruction comes from the detection and control system 110
administrator via one of the input method. In one embodiment, the
input and/or instruction comes from the facility administrator via
the facility control center 160, or from the facility officer via
the facility mobility device 170.
[0085] In some embodiments, at step 624, the detection and control
system 110 have pre-determined instructions to automatically wake
up or power on. In one embodiment, the detection and control system
110 automatically wakes up or powers on when a pre-determined
standby or power off time period ends.
[0086] FIG. 7 illustrates a flow chart for an exemplary method 700
to operate the detection and control system 110 for detecting and
locating contraband devices, according to some embodiments.
[0087] At step 702, the detection and control system 110 is placed
at a first location outside the correctional facility 140.
Referring to FIG. 1, in some embodiments, the first location (e.g.
Location A) is between the correctional facility 140 and a nearby
communication center 150. Such a location set up is favorable in
detecting the signal transmission between the contraband device
(e.g. contraband device 130) and the correctional facility, because
the detection and control system 110 is located close to the signal
transmission pathway between the contraband device 130 and the
communication center 150.
[0088] At step 704, the detection and control system 110 detects
communication signals from the contraband devices in the
correctional facility. In some embodiments, the detection is done
by the communication interface and the antenna unit of the
detection and control system. In some embodiments, the antenna unit
is a DAS system to improve the detection accuracy and reliability.
In some other embodiments, the antenna unit includes one or more
directional antennas directed to the correctional facility 140 to
avoid detecting unwanted areas. When searching for a contraband
device, the detection and control system 110 enables a receiver to
receive transmissions. The detection and control system 110 may
focus on specific types of transmissions such as GSM, CDMA, LTE, or
other cellular transmissions and/or may rotate through a variety of
frequencies and transmission types including, for example, cellular
transmissions and WIFI signals of a specific type.
[0089] In some embodiments, at step 704, a detachable detection and
control unit 180 is detached from the detection and control system
110 and placed to another location (e.g. location C) that is
outside the correctional facility and remote to location A. This
detachable detection and control unit 180 can detect communication
signals from the contraband devices in the correctional facility.
In some embodiments, the detection is done by the communication
interface and the antenna unit of the detachable detection and
control unit 180. In some embodiments, the detachable detection and
control unit 180 communicates with the detection and control system
110 and transmits information and/or instructions.
[0090] A step 706, the detection and control system 110 conducts
the detection until a contraband device is detected, or when a
pre-determined time period for detection ends. If a contraband
device is not detected within the pre-determined time period, the
system operation jumps to step 724 to determine if the operation
needs to continue. If a contraband device is detected, the system
proceeds to step 708.
[0091] At step 708, referring to FIG. 1, the detection and control
system 110 finds out whether another detection and control system
(e.g. detection and control system 120) is in operation for the
correctional facility 140. If another detection and control system
is in operation, the detection and control system 110 jumps to step
710. If another detection and control system is not available or
not in operation, the detection and control system 110 jumps to
step 712. In some embodiments, the additional detection and control
system 120 is located at a location B outside the correctional
facility 140 but remote to location A where the detection and
control system 110 is located.
[0092] At step 710, the detection and control system 110
communicates with the additional detection and control system 120
to transmit information and/or instructions. In some embodiments,
such information includes, but is not limited to, the detection
information for all detection events, the information obtained from
all the detected contraband devices, the location and motion
information for the detection and control system, and the reports
generated during the detection period. In some embodiments, there
are more detection and control systems than the detection and
control system 110 and 120. The sharing of detection information
between multiple detection and control systems can be used for a
variety of applications including, but not limited to, confirming
detection events when more than one detection and control systems
detect the same contraband device, locating the contraband device
when location information for the contraband device are obtained
from more than one detection and control system and used for
lateration and/or angulation, and enhancing detection coverage when
different detection and control systems are located in different
locations around the correction facility.
[0093] At step 712, the detection and control system 110 estimates
the location of the detected contraband devices based on one or
more positioning techniques, such as, but not limited to,
lateration and angulation. Depending on different factors such as,
but not limited to, the detection ability of the detection and
control system 110, the relative distance between the contraband
device and the detection and control system 110, and the
positioning technique used to for locating the contraband device,
the estimated location of the contraband device can have a certain
degree of accuracy. Due to the different degrees of accuracy, the
estimated location of the contraband device can be a big region
that can be narrowed down.
[0094] At step 720, the detection and control system 110 determines
whether relocation is needed. If a relocation is needed, the
detection and control system 110 jumps to step 714. If a relocation
is not needed, the detection and control system 110 jumps to step
724. In some embodiments, whether relocation is needed is
determined by input and/or instructions received by the detection
and control system 110. In some embodiments, the input and/or
instruction comes from the detection and control system 110
administrator via one of the input method. In one embodiment, the
input and/or instruction comes from the facility administrator via
the facility control center 160, or from the facility officer via
the facility mobility device 170. In some embodiments, the
detection and control system 110 have pre-determined instructions
to automatically determine whether a relocation is needed.
[0095] At step 714, the detection and control system 110 determines
the next desirable detection location or locations. In some
embodiments, the determination of the next desirable detection
location or locations is conducted automatically by the detection
and control system 110 based on the detection information of the
contraband devices. The next desirable detection location or
locations can be determined based on a variety of reasons such as,
but not limited to, the need to improve the estimation accuracy of
the contraband device location, the need to improve the coverage of
detection within the correctional facility, and the need to focus
the detection on a certain area of the correctional facility. In
some embodiments, the next desirable locations can be input
manually from the detection and control system 110 administrator
via one of the input method. In one embodiment, the next desirable
locations can be input manually from the facility administrator via
the facility control center 160, or from the facility officer via
the facility mobility device 170.
[0096] At step 716, the detection and control system 110 determines
if one or more detachable detection and control unit 180 is
available or in operation. If there are one or more detachable
detection and control unit 180 available or in operation, the
detection and control system 110 jumps to step 722. If there is no
detachable detection and control unit 180 available or in
operation, the detection and control system 110 jumps to step
718.
[0097] At step 722, the detachable detection and control unit 180
is moved to the next desirable locations for the detachable
detection and control unit 180 determined at step 714. In some
embodiments, the detachable detection and control unit 180 is moved
by human, manned vehicles, unmanned vehicles, and/or UAV. In some
embodiments, the detachable detection and control unit 180 is moved
by its own mobility unit. In some embodiments, the mobility unit of
the detachable detection and control unit 180 has an autonomous
mobility unit (e.g. an autonomous car, a drone or an UAV) that
receives instructions directly from the detection and control
system 110 and move to the next desirable location. Advantages of
having a drone or an UAV to move the detachable detection and
control unit 180 include, but are not limited to, the degree of
freedom in the whole space and the speed of movement for fast
response.
[0098] At step 718, the detection and control system 110 is moved
to the next desirable location. In some embodiments, the detection
and control system 110 is moved by human, manned vehicles, unmanned
vehicles, and/or UAVs. In some embodiments, the detection and
control system 110 is moved by its own mobility unit. In some
embodiments, the detection and control system 110 has an autonomous
mobility unit (e.g. an autonomous car, a drone or an UAV) that
receives instructions directly from the detection and control
system 110 and move the detection and control system 110 to the
next desirable location. The advantages of having an autonomous
moving vehicle as the mobility unit includes, but not limited to,
the speed of movement for fast response and the fully automatic
process without requiring human intervention.
[0099] At step 724, the detection and control system 110 determines
whether to continue the operation. If the operation needs to
continue, the detection and control system 110 jumps back to step
704 to continue detecting the contraband devices. If the operation
does not need to continue, the detection and control system jumps
to step 726. In some embodiments, whether the operation needs to
continue is determined by input and/or instructions received by the
detection and control system 110. In some embodiments, the input
and/or instruction comes from the detection and control system 110
administrator via one of the input method. In one embodiment, the
input and/or instruction comes from the facility administrator via
the facility control center 160, or from the facility officer via
the facility mobility device 170. In some embodiments, the
detection and control system 110 have pre-determined instructions
to automatically determine whether a continued operation is
needed.
[0100] It will be apparent to persons skilled in the relevant
art(s) that various elements and features of the present
disclosure, as described herein, can be implemented in hardware
using analog and/or digital circuits, in software, through the
execution of computer instructions by one or more general purpose
or special-purpose processors, or as a combination of hardware and
software.
[0101] The following description of a general purpose computer
system is provided for the sake of completeness. Embodiments of the
present disclosure can be implemented in hardware, or as a
combination of software and hardware. Consequently, embodiments of
the disclosure are implemented in the environment of a computer
system or other processing system. For example, the detection and
control system 200, the detection and control system 300, the
application server 400, and the methods described in FIG. 6 and
FIG. 7 can be implemented in the environment of one or more
computer systems or other processing systems. An example of such a
computer system 800 is shown in FIG. 8. One or more of the modules
depicted in the previous figures can be at least partially
implemented on one or more distinct computer systems 800.
[0102] Computer system 800 includes one or more processors, such as
processor 804. Processor 804 can be a special purpose or a general
purpose digital signal processor. Processor 804 is connected to a
communication infrastructure 802 (for example, a bus or network).
Various software implementations are described in terms of this
exemplary computer system. After reading this description, it will
become apparent to a person skilled in the relevant art(s) how to
implement the disclosure using other computer systems and/or
computer architectures.
[0103] Computer system 800 also includes a main memory 806,
preferably random access memory (RAM), and may also include a
secondary memory 808. Secondary memory 808 may include, for
example, a hard disk drive 810 and/or a removable storage drive
812, representing a floppy disk drive, a magnetic tape drive, an
optical disk drive, or the like. Removable storage drive 812 reads
from and/or writes to a removable storage unit 816 in a well-known
manner. Removable storage unit 816 represents a floppy disk,
magnetic tape, optical disk, or the like, which is read by and
written to by removable storage drive 812. As will be appreciated
by persons skilled in the relevant art(s), removable storage unit
816 includes a computer usable storage medium having stored therein
computer software and/or data.
[0104] In alternative implementations, secondary memory 808 may
include other similar means for allowing computer programs or other
instructions to be loaded into computer system 800. Such means may
include, for example, a removable storage unit 818 and an interface
814. Examples of such means may include a program cartridge and
cartridge interface (such as that found in video game devices), a
removable memory chip (such as an EPROM, or PROM) and associated
socket, a thumb drive and USB port, and other removable storage
units 818 and interfaces 814 which allow software and data to be
transferred from removable storage unit 818 to computer system
800.
[0105] Computer system 800 may also include a communications
interface 820. Communications interface 820 allows software and
data to be transferred between computer system 800 and external
devices. Examples of communications interface 820 may include a
modem, a network interface (such as an Ethernet card), a
communications port, a PCMCIA slot and card, etc. Software and data
transferred via communications interface 820 are in the form of
signals which may be electronic, electromagnetic, optical, or other
signals capable of being received by communications interface 820.
These signals are provided to communications interface 820 via a
communications path 822. Communications path 822 carries signals
and may be implemented using wire or cable, fiber optics, a phone
line, a cellular phone link, an RF link and other communications
channels.
[0106] As used herein, the terms "computer program medium" and
"computer readable medium" are used to generally refer to tangible
storage media such as removable storage units 816 and 818 or a hard
disk installed in hard disk drive 810. These computer program
products are means for providing software to computer system
800.
[0107] Computer programs (also called computer control logic) are
stored in main memory 806 and/or secondary memory 808. Computer
programs may also be received via communications interface 820.
Such computer programs, when executed, enable the computer system
800 to implement the present disclosure as discussed herein. In
particular, the computer programs, when executed, enable processor
804 to implement the processes of the present disclosure, such as
any of the methods described herein. Accordingly, such computer
programs represent controllers of the computer system 800. Where
the disclosure is implemented using software, the software may be
stored in a computer program product and loaded into computer
system 800 using removable storage drive 812, interface 814, or
communications interface 820.
[0108] In another embodiment, features of the disclosure are
implemented primarily in hardware using, for example, hardware
components such as application-specific integrated circuits (ASICs)
and gate arrays. Implementation of a hardware state machine so as
to perform the functions described herein will also be apparent to
persons skilled in the relevant art(s).
[0109] It is to be appreciated that the Detailed Description
section, and not the Abstract section, is intended to be used to
interpret the claims. The Abstract section may set forth one or
more, but not all exemplary embodiments, and thus, is not intended
to limit the disclosure and the appended claims in any way.
[0110] The disclosure has been described above with the aid of
functional building blocks illustrating the implementation of
specified functions and relationships thereof. The boundaries of
these functional building blocks have been arbitrarily defined
herein for the convenience of the description. Alternate boundaries
may be defined so long as the specified functions and relationships
thereof are appropriately performed.
[0111] It will be apparent to those skilled in the relevant art(s)
that various changes in form and detail can be made therein without
departing from the spirit and scope of the disclosure. Thus, the
disclosure should not be limited by any of the above-described
exemplary embodiments, but should be defined only in accordance
with the following claims and their equivalents.
* * * * *