Patent classifications
H04M3/205
SYSTEM AND METHOD FOR DETECTING AND LOCATING CONTRABAND DEVICES IN A SECURE ENVIRONMENT
There is a growing problem in correctional facilities in which contraband devices may be smuggled into a correctional facility. These devices are not subject to the typical monitoring and control provided by the inmate communication system provided by the correctional facility, and thus pose a significant security risk. The present disclosure provides details of a system and method that leverages the sanctioned mobile devices and the wireless infrastructure of the inmate communication system to scan for and triangulate the location of contraband devices. The mobile and wireless infrastructure devices scan for transmissions indicative of a contraband device and send alerts to each other and to a central monitoring system. The central monitoring system then leverages multiple alerts to determine a location of the contraband device using multiple triangulation techniques. The triangulation may also be performed by the mobile devices themselves.
SYSTEM AND METHOD FOR DETECTING AND LOCATING CONTRABAND DEVICES IN A SECURE ENVIRONMENT
There is a growing problem in correctional facilities in which contraband devices may be smuggled into a correctional facility. These devices are not subject to the typical monitoring and control provided by the inmate communication system provided by the correctional facility, and thus pose a significant security risk. The present disclosure provides details of a system and method that leverages the sanctioned mobile devices and the wireless infrastructure of the inmate communication system to scan for and triangulate the location of contraband devices. The mobile and wireless infrastructure devices scan for transmissions indicative of a contraband device and send alerts to each other and to a central monitoring system. The central monitoring system then leverages multiple alerts to determine a location of the contraband device using multiple triangulation techniques. The triangulation may also be performed by the mobile devices themselves.
Base station device, gateway device, call connecting method, and wireless communication system
A system is provided which is capable of connecting a call without degrading the security level in a mobile terminal network, even when a call addressed to a user equipment (UE) arrives via the Internet or a home network. A femto base station receives a packet addressed to a UE via the Internet or a home network, and starts a paging procedure. The UE establishes an RRC connection to the femto base station. The UE transmits, to the femto base station, a paging response addressed to the SGSN. The femto base station performs NAS verification. If the femto base station detects the paging response to a paging request that the femto base station itself has issued, the femto base station changes the service type of the service request received from the UE from the paging response to signaling.
System and method for detecting and locating contraband devices in a secure environment
There is a growing problem in correctional facilities in which contraband devices may be smuggled into a correctional facility. These devices are not subject to the typical monitoring and control provided by the inmate communication system provided by the correctional facility, and thus pose a significant security risk. The present disclosure provides details of a system and method that leverages the sanctioned mobile devices and the wireless infrastructure of the inmate communication system to scan for and triangulate the location of contraband devices. The mobile and wireless infrastructure devices scan for transmissions indicative of a contraband device and send alerts to each other and to a central monitoring system. The central monitoring system then leverages multiple alerts to determine a location of the contraband device using multiple triangulation techniques. The triangulation may also be performed by the mobile devices themselves.
System and method for detecting and controlling contraband devices in a controlled environment
The present disclosure provides details of a system and method for detecting and monitoring a contraband device including communication devices by utilizing a combination of mobile devices, fixed monitoring devices, and a contraband monitoring center. The mobile devices include smart phones or tablets that are borrowed, rented, or purchased by an inmate from a correctional facility. These mobile devices are configured to detect, monitor, and intervene in the communications of target devices. Further, the mobile devices are configured to communicate with fixed monitoring devices located throughout the correctional facility in performing intervention operations. The contraband monitoring center may also be utilized in the coordination, monitoring, and intervention of target devices.
Influencing the location of contraband wireless communications devices within controlled-environment facilities
Systems and methods for identifying individuals using contraband communications devices in a controlled-environment facility are disclosed. Wireless communications are intercepted using a plurality of access points positioned at different locations within the controlled-environment facility. All wireless communications are blocked in a first group of locations, and individuals assigned to the first group of locations are identified. Some or all wireless communications are allowed in a second group of locations. Individuals are identified as possible contraband sources if they move from the first group of locations to one of the second group of locations after wireless communications are allowed in the second group of locations.
INTEGRATION OF CELLULAR PHONE DETECTION AND REPORTING INTO A PRISON TELEPHONE SYSTEM
The present subject matter is directed to an apparatus and methodology for monitoring for the occurrence of use of unauthorized telecommunications equipment within a designated area. The present subject matter has particular utility to the corrections environment in that it discloses a methodology for detecting and reporting the unauthorized operation of cellular telephones within a corrections facility. The present technology may be used advantageously in combination with inmate telephone systems to transmit information to appropriate personnel in the form of email messages and/or voice communications by way of telephone local or corrections facility external telephone lines. The present technology also provides for recordation and storage of time, date and location information for detected events.
BASE STATION DEVICE, GATEWAY DEVICE, CALL CONNECTING METHOD, AND WIRELESS COMMUNICATION SYSTEM
A system is provided which is capable of connecting a call without degrading the security level in a mobile terminal network, even when a call addressed to a user equipment (UE) arrives via the Internet or a home network. A femto base station receives a packet addressed to a UE via the Internet or a home network, and starts a paging procedure. The UE establishes an RRC connection to the femto base station. The UE transmits, to the femto base station, a paging response addressed to the SGSN. The femto base station performs NAS verification. If the femto base station detects the paging response to a paging request that the femto base station itself has issued, the femto base station changes the service type of the service request received from the UE from the paging response to signaling.
Base station device, gateway device, call connecting method, and wireless communication system
A system is provided which is capable of connecting a call without degrading the security level in a mobile terminal network, even when a call addressed to a user equipment (UE) arrives via the Internet or a home network. A femto base station receives a packet addressed to a UE via the Internet or a home network, and starts a paging procedure. The UE establishes an RRC connection to the femto base station. The UE transmits, to the femto base station, a paging response addressed to the SGSN. The femto base station performs NAS verification. If the femto base station detects the paging response to a paging request that the femto base station itself has issued, the femto base station changes the service type of the service request received from the UE from the paging response to signaling.
Integration of cellular phone detection and reporting into a prison telephone system
The present subject matter is directed to an apparatus and methodology for monitoring for the occurrence of use of unauthorized telecommunications equipment within a designated area. The present subject matter has particular utility to the corrections environment in that it discloses a methodology for detecting and reporting the unauthorized operation of cellular telephones within a corrections facility. The present technology may be used advantageously in combination with inmate telephone systems to transmit information to appropriate personnel in the form of email messages and/or voice communications by way of telephone local or corrections facility external telephone lines. The present technology also provides for recordation and storage of time, date and location information for detected events.