Managed access system with mobile wireless device geolocation capability
09584252 ยท 2017-02-28
Assignee
Inventors
Cpc classification
G01S5/06
PHYSICS
H04W64/00
ELECTRICITY
H04W4/021
ELECTRICITY
International classification
G01S5/06
PHYSICS
Abstract
A managed access system for mobile wireless devices (MWDs) in a facility that is geographically within a wireless communications network includes a plurality of antennas arranged at the facility. Radio equipment is coupled to the antennas. A management access controller cooperates with the radio equipment to communicate with a given MWD within the facility, block outside communications via the wireless communications network when the given MWD is an unauthorized MWD, and provide outside communications when the given MWD is an authorized MWD. The management access controller cooperates with at least one MWD geolocation device to locate the given MWD within the facility.
Claims
1. A managed access system for mobile wireless devices (MWDs) in a facility, the facility being geographically within a wireless communications network, the managed access system comprising: a plurality of directional antennas arranged around a periphery of the facility; radio equipment coupled to said plurality of antennas, said radio equipment comprising a plurality of radios each coupled to a respective antenna; at least one MWD geolocation device for the wireless communications network; and a management access controller cooperating with said radio equipment to communicate with a given MWD within the facility, block outside communications via the wireless communications network when the given MWD is an unauthorized MWD, and provide outside communications when the given MWD is an authorized MWD; said management access controller cooperating with said at least one MWD geolocation device to locate the given MWD within the facility and implement a corresponding change in said radio equipment in response to a change in the wireless communications network as at least one of change in a power level of at least one of said radios, a change in a communications protocol of at least one of said radios, and a change in a frequency range of at least one of said radios.
2. The managed access system of claim 1 wherein the at least one MWD geolocation device is operable for both cellular and non-cellular communications.
3. The managed access system of claim 1 wherein the at least one MWD geolocation device comprises a plurality of external geolocation devices arranged around a periphery of the facility.
4. The managed access system of claim 3 wherein the plurality of external geolocation devices operate based upon time-difference-of-arrival signals.
5. The managed access system of claim 1 wherein the at least one MWD geolocation device comprises a plurality of internal geolocation devices arranged within a periphery of the facility.
6. The managed access system of claim 5 wherein the facility comprises a building; and wherein at least some of the plurality of internal geolocation devices are located within the building.
7. The managed access system of claim 1 wherein each radio comprises a picocell radio.
8. The managed access system of claim 1 wherein said management access controller provides outside communications when the given MWD is an authorized MWD via another network other than the wireless communications network.
9. The managed access system of claim 1 wherein said management access controller provides outside communications when the given MWD is an authorized MWD via at least one of the Public Switched Telephone Network (PSTN), and an Internet Protocol (IP) network.
10. The managed access system of claim 1 wherein said radio equipment is operable according to at least one of an LTE, CDMA, UMTS and GSM protocol.
11. A management access controller for a managed access system for mobile wireless devices (MWDs) in a facility, the facility being geographically within a wireless communications network, the managed access system comprising a plurality of directional antennas arranged at around a periphery of the facility, radio equipment coupled to the plurality of antennas, said radio equipment comprising a plurality of radios each coupled to a respective antenna, and at least one MWD geolocation device for the wireless communications network, the management access controller comprising: a processor and a memory coupled thereto to cooperate with said radio equipment to communicate with a given MWD within the facility, block outside communications via the wireless communications network when the given MWD is an unauthorized MWD, and provide outside communications when the given MWD is an authorized MWD, cooperate with said at least one MWD geolocation device to locate the given MWD within the facility, and implement a corresponding change in said radio equipment in response to a change in the wireless communications network as at least one of change in a power level of at least one of said radios, a change in a communications protocol of at least one of said radios, and a change in a frequency range of at least one of said radios.
12. The management access controller of claim 11 wherein the processor and memory cooperate with the at least one MWD geolocation device to provide for both cellular and non-cellular communications.
13. The management access controller of claim 11 wherein the at least one MWD geolocation device comprises a plurality of external geolocation devices arranged around a periphery of the facility; and wherein the processor and memory cooperate with the external geolocation devices to locate the given MWD within the facility.
14. The management access controller of claim 13 wherein the processor and memory cooperate with the plurality of external geolocation devices to operate based upon time-difference-of-arrival signals.
15. The management access controller of claim 11 wherein the at least one MWD geolocation device comprises a plurality of internal geolocation devices arranged within a periphery of the facility; and wherein the processor and memory cooperate with the internal geolocation devices to locate the given MWD within the facility.
16. The management access controller of claim 11 wherein each radio comprises a picocell radio.
17. The management access controller of claim 11 wherein said processor and memory provide outside communications when the given MWD is an authorized MWD via another network other than the wireless communications network.
18. The management access controller of claim 11 wherein said processor and memory provide outside communications when the given MWD is an authorized MWD via at least one of the Public Switched Telephone Network (PSTN), and an Internet Protocol (IP) network.
19. The management access controller of claim 11 wherein said radio equipment is operable according to at least one of an LTE, CDMA, UMTS and GSM protocol.
20. A method for operating a managed access system for mobile wireless devices (MWDs) in a facility, the facility being geographically within a wireless communications network, the managed access system comprising a plurality of directional antennas arranged around the periphery of the facility, radio equipment coupled to the plurality of antennas, said radio equipment comprising a plurality of radios each coupled to a respective antenna, and at least one MWD geolocation device for the wireless communications network, the method comprising: operating a management access controller to cooperate with the radio equipment to communicate with a given MWD within the facility, block outside communications via the wireless communications network when the given MWD is an unauthorized MWD, and provide outside communications when the given MWD is an authorized MWD, cooperate with the at least one MWD geolocation device to locate the given MWD within the facility, and implement a corresponding change in said radio equipment in response to a change in the wireless communications network as at least one of change in a power level of at least one of said radios, a change in a communications protocol of at least one of said radios, and a change in a frequency range of at least one of said radios.
21. The method of claim 20 wherein the management access controller comprises a processor and a memory coupled thereto.
22. The method of claim 20 further comprising operating the management access controller to operate the at least one MWD geolocation device for both cellular and non-cellular communications.
23. The method of claim 20 wherein the at least one MWD geolocation device comprises a plurality of external geolocation devices arranged around a periphery of the facility; and further comprising operating the management access controller to cooperate with the plurality of external geolocation devices to locate the given MWD within the facility.
24. The method of claim 23 further comprising operating the plurality of external geolocation devices based upon time-difference-of-arrival signals.
25. The method of claim 20 wherein the at least one MWD geolocation device comprises a plurality of internal geolocation devices arranged within a periphery of the facility; and further comprising operating the management access controller to cooperate with the plurality of internal geolocation devices to locate the given MWD within the facility.
26. The method of claim 25 wherein the facility comprises a building; and wherein at least some of the plurality of internal geolocation devices are located within the building.
27. The method of claim 20 wherein each radio comprises a picocell radio.
28. The method of claim 20 further comprising operating the management access controller to provide outside communications when the given MWD is an authorized MWD via another network other than the wireless communications network.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
(1) Other objects, features and advantages of the present invention will become apparent from the detailed description of the invention which follows, when considered in light of the accompanying drawings in which:
(2)
(3)
(4)
(5)
(6)
(7)
(8)
(9)
(10)
(11)
(12)
(13)
(14)
(15)
(16)
(17)
(18)
(19)
(20)
(21)
(22)
(23)
(24)
(25)
(26)
(27)
(28)
(29)
(30)
(31)
(32)
(33)
(34)
(35)
DETAILED DESCRIPTION
(36) Different embodiments will now be described more fully hereinafter with reference to the accompanying drawings, in which preferred embodiments are shown. Many different forms can be set forth and described embodiments should not be construed as limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope to those skilled in the art. Like numbers refer to like elements throughout.
(37) The managed access system, in accordance with a non-limiting example, permits communications from authorized mobile wireless devices and detects and disrupts wireless communications from unauthorized or contraband mobile wireless devices within a protected facility, such as a correctional facility. The different embodiments will be described relative to a correctional facility, but it should be understood that the managed access system, in accordance with a non-limiting example, may be used in many different facilities, including non-secure and secure buildings such as government offices, military compounds, corporate workplaces, and other areas where managed access systems may be implemented to detect and disrupt wireless communications from contraband and unauthorized mobile wireless devices, but permit authorized users to communicate either internally within the facility or with an outside commercial communications network.
(38) The managed access system as will be described can be scaled to address a wide variety of wireless communication threats within a facility and mitigate the threat presented by contraband cellular and other unauthorized mobile wireless devices. The managed access system may be used to prohibit contraband and other unauthorized mobile wireless devices from accessing commercial voice and data networks. The system may provide a full-spectrum cellular service so that every mobile wireless device within the facility, regardless of commercial carrier or technology, e.g., as 4G LTE, 3G LTE, or other communication standards, is connected to the managed access system for both voice and data network communications rather than connected to any commercial networks.
(39) Because local commercial cellular coverage varies from facility to facility, including a) the number of carriers, b) the technology mix of 2G, 3G and 4G standards, and c) the frequencies used by local carriers, the managed access system is built upon a modular system architecture and allows the communications technology mix to be optimized for any facility. For example, the managed access system may be reconfigured to address changes to the local communications environment and facilitate upgrades for future cellular and other communications technologies, such as 5G and beyond. The managed access system includes support for WiFi (802.11X) and other conventional radio technologies, including push-to-talk radios that can be added to the cellular core functionality to increase the diversity of the types of communications technology that can be detected and disrupted by the system. Drone detection capability may be implemented.
(40) As will be explained in greater detail below, the managed access system is implemented after an initial site survey is performed where on-site data is collected to determine which commercial carriers are in the area and what cellular technologies and frequency bands cover the particular facility where the managed access system will be implemented. The collected data is used to determine the technology mix and frequency coverage necessary to provide effective cellular mitigation within the facility. To implement the managed access system, radio frequency (RF) propagation data for the facility is collected and provides empirical measurements to understand how signals propagate throughout the facility. This propagation data is used to design a Distributed Antenna System (DAS) using directional antennae and mitigate cellular access coverage from within the facility using a managed access system RF bubble over the facility. The empirical propagation data is used to predict signal levels in and around the facility. A cellular elevation survey is completed to determine the type and scope of infrastructure for improvements to support the managed access system RF bubble. Once installed, the system is maintained and monitored, including continuous system alarm monitoring.
(41) Referring now to
(42) Referring now to
(43) The management access server 12 interoperates with an Ethernet switch 52 and includes a network firewall 54, physical security 56, e.g., locks for the rack 36, a GPS time server 58, GPS splitter 60, power distribution circuits 62 and UPS (uninterrupted power supply) 64. The management access server 12 interoperates through an electrical-to-optical (E/O) interface 66 to at least one external geolocation device that is formed as an external geolocation sensor array 70 and includes wideband remote sensors 72 as external geolocation devices, which are operable for both cellular and non-cellular communications to detect those signals in the facility 44. These wideband sensors 72 are arranged around the periphery of the facility in a non-limiting example, and may communicate using an Ethernet connection via optical/electrical converters 74 and interconnect via an optical fiber bundle to the electrical/optical interface 66 and the management access server 12.
(44) An internal location sensor array 80 is arranged within the periphery of the facility 44, and in an example, located within a building. Internal geolocation devices are sensors 82 that may connect via wireless link to each other and via Ethernet to the management access server 12.
(45) The system 10 includes cellular environmental monitoring 86 of the wireless communications network and includes a remote cellular scanner 88 that connects via Ethernet connection to the management access server 12. The monitoring device 86 determines a change in the wireless communications network as a commercial network, for example, and implements a corresponding change in the radio equipment 40 such as a change in the power level of one of the picocell radios, a change in communications protocol, and/or a frequency change. Such protocols could include data and address formats, address mapping changes, routing changes, change in acknowledgement systems, change in direction of data flow, and changes in sequence and flow control.
(46) It is possible to change different communication standards, including TCP/IP models and protocol layering with different encapsulation data formats. Changes in software layering are possible. Different network protocols can be used. Power levels may be changed to increase or decrease the power in towers connected to radio equipment 40 and directional antennas 46. Frequency changes may occur with changes in protocol or depending on what occurs at the wireless communications network 45 such as commercial networks. Frequencies can vary depending on what other outside communication networks are used or other transmitters and radio sources are monitored and determined near the facility to adjust HF, VHF, UHF, and other frequency ranges, including those in the cellular commercial band. Different carriers have different frequencies, including frequency bands such as 3G, 4G, GSM, IS-95 as CDMA, 3G, and 5G. Different bands include the 700, 800, 850, 1400, PCS, AWS, and BRS/EBS frequency bands. These are non-limiting examples only. Power may also depend on the type of cell such as use of a picocell that is a small cellular base station covering a small area such as a shopping mall or train station. The system allows an authorized user to connect into a commercial carrier network that provides roaming services so that even if an authorized user of a mobile wireless device is not able to connect directly to their carrier they use on their mobile wireless device, it is possible to connect into a commercial carrier network that could be the same as the wireless communications network around a facility or a different network that provides roaming services. The system is deployable on cruise ships, oil platforms, and in mines as non-limiting examples.
(47) An example could be a change in the wireless communications network 45 such as the addition of a rogue base station. The management access server 12 would be changed and configured to block communications from any mobile wireless device (MWD) 42 with that rogue base station. The management access server 12 also may provide outside communications when the given mobile wireless device is an authorized mobile wireless device using a Session Initiation Protocol (SIP) and provide outside communication when the given mobile wireless device is an authorized mobile wireless device via another network other than the commercial wireless network, such as a land-line connection via the Public Switched Telephone Network (PSTN). Another network could be used, such as an Internet Protocol (IP) network.
(48) The managed access system 10 provides both the signaling and services for all cellular devices within the facility 44 and uses strategic channel selection, parameter configuration, and signal dominance. For example, the management access server 12 strategically selects channels used to establish the voice and data network within the facility 44 and may configure key parameters of the system 10 to attract cellular and other mobile wireless devices 42 to the system while making the commercial cellular network 45 unavailable. This can be accomplished using a) signal dominance, such as delivering a higher power, b) delivering a better quality signal, and c) adjusting other parameters relative to the commercial carrier network 45 to help ensure that the managed access system 10 provides a cellular voice and data network that is the strongest and most attractive signal within the facility as seen by cellular or other mobile wireless devices 42 and block any device from connecting directly to the commercial communications network 45. The system 10 is effective for use with smart phones, tablets, cell phones, modems and other types of wireless devices that use cellular technology and other radio frequency communications to access voice or data networks.
(49) As noted before, because commercial cellular carrier coverage varies between different facilities, to optimize the system for a particular facility, a survey of the cellular network in and around a facility 44 is first completed. The collected data determines the technology mix and frequency coverage necessary to provide the effective cellular mitigation within the facility 44. Using this data, the RF bubble is created around the facility using the distributed antenna system 14 and its individual directional antennas 46. Inside the RF bubble, all cellular and other mobile wireless devices 42 connect to the management access server 12 while outside the RF bubble, cellular and other mobile wireless devices operate as normal by connecting to the available commercial communications network 45. Use of the management access server 12 and radios 40 connected to the directional antennas 46 allow the size and shape of the RF bubble to be contoured and tailored to the facility 42 by selecting specific antenna locations and RF power levels for each unique signal.
(50) As noted before, it is possible to have a roaming partnership with commercial carriers to give the flexibility to use authorized mobile wireless devices 42 in their fullest commercial capability. Nothing has to change with the billing involved with the commercial carrier. The management access server 12 may provide the device either all, some, or none of the services inside the bubble on a case-by-case basis. The system may push a mobile wireless device 42 to a SIP, a voice connection, or PSTN and move from the cellular network as noted before.
(51) Also, the management access server 12 may cooperate with the at least one MWD monitoring device 88 to determine whether the radio equipment 40 and at least one MWD monitoring device 88 both detect the given mobile wireless device and may generate an indication or alarm when one and not the other of the at least one MWD monitoring device and radio equipment detects the given MWD. The system 10 is tiered so that the indication or alarm could indicate that the MWD is outside the facility and beyond the fence line, for example, when the monitoring device 88 detects the device, but not the radio equipment 40.
(52)
(53) The at least one MWD geolocation device is operable for both cellular and non-cellular communications whether it is internal or external, and in one embodiment, includes a plurality of external geolocation devices 72 forming an external sensor array and arranged around the periphery of the facility as the wideband remote sensors. These devices as the sensors 72 may operate based on the time-difference-of-arrival signals. Another series of MWD geolocation devices include a plurality of internal geolocation devices 82 as internal sensors and arranged within the periphery of the facility, and in an example, within a building (B) as described later. The radios 40 may be picocell radios each coupled to a respective directional antenna 46.
(54) The management access server 12 may implement a corresponding change in the radio equipment 40 in response to a change in the wireless communications network 45 of at least one of a change in the power level of at least one of the picocell radios, a change in a communications protocol of at least one of the picocell radios, and a frequency range of at least one of the picocell radios. This allows an RF bubble to form around the facility, and which the RF bubble can be maintained and adjusted as necessary. The management access server 12 may provide outside communications when the given MWD 42 is an authorized MWD via another network other than the wireless communications network 45 such as through the Public Switched Telephone Network (PSTN) 244 and/or an Internet Protocol (IP) network such as through an SIP server 242 (
(55) As illustrated, the facility 44 includes at least one monitoring device 88 for the wireless communications network. The management access server 12 may cooperate with the monitoring device 88 to determine a change in the wireless communications network and implement a corresponding change in the radio equipment 40 to adjust the radio equipment and adjust the RF bubble. This is advantageous such as when a rogue base station 45b is monitored and determined to be active in causing a change in the RF bubble such that the rogue base station communicates with a MWD within the facility. The management access server 12 may block communications with the rogue base station 45b. The management access server 12 may also cooperate with at least one MWD monitoring device 88 to determine whether the radio equipment 40 and at least one MWD monitoring device both detect the given MWD and operate to determine if the system is operating.
(56) The management access server 12 also cooperates with the at least one MWD geolocation device as external or internal sensors 72, 82 to determine that a given MWD is within the facility and compares an identification of the given MWD to a last of authorized MWDs and determine whether a given MWD is unauthorized or authorized. It may coordinate with the wireless communications network 45 to block outside communications when the given MWD is an authorized MWD, provide outside communications via the radio equipment 40 and the wireless communications network 45 when the given MWD is an authorized MWD. It may block the outside communications when the given MWD 42 is an authorized MWD based upon a coordinated access denial with the wireless communications network 45 by allowing the base stations 45a and a service provider 45c of the wireless communications network to prevent communications. As illustrated, a network interface device 280 operates as an in-line ID monitor or filter to the wireless communications network and configured to communicate with MWDs 42 via the radio equipment and compare an identification of a given MWD to a list of authorized MWDs to determine whether the given MWD is authorized or unauthorized. The management access server 12 will filter communications between an unauthorized MWD and the network interface device that is configured to provide communications with the communications carrier. Communications will pass between an authorized MWD and the network interface device. The identification of the given MWD may be an International Mobile Subscriber Identity (IMSI).
(57)
(58) After the signal is evaluated for its type and the RSSI measurements collected and a determination has been made the device is non-cellular (block 110), a determination is made whether the device is authorized (block 134) and if not, it is geolocated (block 126). If the device is authorized, then the process ends (block 136).
(59)
(60)
(61) The Distributed Antenna System (DAS) 14 includes the plurality of directional antennas 46, which in this example are positioned at a height of about 10 meters for this example correctional facility. In one example, twelve (12) directional antennas 46 are used in the example shown in
(62) An example directional antenna 46 is an antenna manufactured and sold by Galtronics under the EXTENT tradename such as a model D5778I. These example antennas are designed as 60/60 narrow beam directional antenna with an operating range of 698-960 MHz and 1695-2700 MHz and adapted as a broadband directional, single-sector MIMO antenna for high-capacity venues. Each directional antenna 46 is connected to a radio 40, which in one example is a picocell commercial radio as noted before and shown diagrammatically in
(63) The distributed antenna system 14 is controlled via the DAS master server 48 by the management access server 12 that includes its main server or radio rack 36 as illustrated in
(64) The management access server 12 with the corresponding DAS master server 48 are contained in a secure facility such as a communications closet on site at the facility 44 and in a cooled location and includes easy power access and a ready optical fiber connection. The directional antennae 46 connect by optical fiber to the DAS master server 48, which includes the appropriate processor, RF interface modules, optical modules, power supply, and UPS as shown in
(65) A block diagram is shown in
(66)
(67) A Managed Access Carrier Generator (MACG) may interoperate with the distributed antenna system 14 and is part of the management access server 12 and has multi-carrier transmitter functionality for wireless networks. It generates up to four independently tuned control channels in one of several wireless licensed bands. It is possible to modulate a PN sequence with multiple frequency bands with an RF power output of about 1 watt. It may include various interfaces, including four individual TNC connectors in one example on a back patch panel with a combined carrier single TNC preferred so long as it is individually power controlled. The network may be 10/100 Ethernet TCP/IP with a standard RJ45 on the back panel and use SNMP.
(68) Generated messages may include bit, active channels, temperature, frequency tuning, output power adjustment per channel, channel on or off, soft reset and hard reset. The state of health reports and events may be generated via SNMP messaging with a time sensitive active, temperature, power, radio fault, and VSWR alarm. The distributed antenna system 14 shown in
(69) Referring now to
(70) Using this network security design shown in
(71) As noted before with reference to
(72) An example monitoring device as a remote cellular scanner 88 is a fixed autonomous telecommunications measuring receiver such as manufactured and sold by Gladiator Forensics under the tradename Gladiator 6700. One or more devices may be positioned at the facility 44 in a central or other location at the fence line or other areas. This monitoring device 88 provides layer 3 data for primary bands and technologies except IDEN and WiMax, in an example, although it is possible to provide a monitoring device to also scan IDEN and WiMax. The device or scanner 88 operates at 0-55 C. and uses minimal power. It uses a 9-34 volt DC input and a control connection via USB or WiFi. It is a small package of about 369 inches in one example. It can be operated manually with single button operation and autonomously scans and measures 2G, 3G, and 4G wireless networks and supports GSM, UMTS, LTE (TDD and FDD), CDMA, and EVDO. Most bands are supported in the frequency range of about 447 MHz to 3.8 GHz with pre-selection up to 8 bands. It includes MIMO downlink characterization. It has a nominal operating power consumption of 40 watts and is small and lightweight at 7 kg and ruggedized to an environmental specification of class 2 vibration and shock. Downconverted RF to IF signals are pre-filtered and passed to a signal processor where the data is collected and processed and sent to the drive application for analysis. It should be understood that other types of monitoring devices may also be used.
(73) Changes to the commercial cellular network 45 may have a significant impact on the performance of the managed access system 10 and/or size and shape of the coverage area, i.e., the RF bubble 150. The cellular network monitoring device 88 will examine any commercial carrier cellular network environment, looking for changes in its environment that will impact the performance or coverage area of the managed access system 10. The monitoring system 16 supports most frequency bands and cellular technologies currently in use within the United States, including TD-LTE, LTE-FDD, UMTS, CDMA, 1RTT, CDMA, EVDO, and GSN.
(74) The monitoring system 16 also regularly surveys the cellular environment at the facility 44 and the results of these surveys are compared to the previously established baseline for that site. A comparison will detect configuration changes to any commercial carrier signals, including changes in transmitted power, alteration of configuration parameters, and changed or any new frequencies, channels or bands that are deployed in the area. Regular monitoring is important because changes to the commercial cellular network 45 will have an impact on the effectiveness of the managed access system's ability to prevent contraband or unauthorized mobile wireless devices from accessing the commercial voice and data networks. This task can be performed daily at the facility 44. Thus, the system 10 is able to mitigate changes in the commercial cellular footprint. The state of health monitoring 22 and system and configuration management 24 (
(75) TABLE-US-00001 Cellular Weekly Reports Baseline System System Health Verification Blocked Call Detail Record User ID Report Audit Log Reports Authorized Number Alert Report Authorized Number Reports Authorized Number Expiration Reports Cellular Environment Current Status (Threat Assessment) State of Health Alerts Over-temperature Alert Tamper Alert - Rack Off-line System Components Internal Weekly Reports Localization System Health Verification Sensor Array Cellular/WiFi Event Localization Report
(76) When a commercial carrier change in the commercial communications network 45 indicates a change is required to the software configuration for the managed access system 10, a file may be pushed electronically to the management access server 12 at the facility 44. Any software upgrades or updates can be coordinated with a designated facility officer or at the network operations center 160 to ensure any potential system operation disruption is coordinated and minimized. Once the update is applied, a repeat survey can be completed to ensure that the event risk has been mitigated and the issue resolved.
(77) If a change in commercial carrier 45 dictates a hardware configuration change in the system 10, the system builder may coordinate with a designated facility office to schedule a site visit and make the prescribed changes. An example could be when the change in cellular coverage indicates an alignment of one or more directional antennas 46 is required or an adjustment should be made to improve signal delivery and compensate for an increased commercial carrier signal level. If a change also indicates a new or additional hardware upgrade is necessary to maintain system performance effectiveness, such as when a new commercial carrier has added coverage to the area, the system builder may develop a proposal for necessary changes and add or upgrade equipment.
(78) As noted before, the monitoring device 88 initially determines the existing commercial coverage site baseline using a cellular site survey. For example,
(79)
(80) A preliminary distributed antenna system 14 design is implemented (block 254) and the location, height and directional antenna 46 type are determined based upon the site baseline and the system 10 signal coverage zones established throughout the facility 44. The signal coverage boundary at the facility 44 for the fence and property lines 152, 156 are also calculated. A preliminary distributed antenna system 14 configuration is established.
(81) The preliminary distributed antenna system 14 design is verified and finalized (block 256), followed by an on-site installation with verification and tuning of directional antennas (block 258) and on-site system coverage tuning (block 260). The process ends (block 262).
(82) An example of an external geolocation device or sensor 72 that forms the external geolocation sensor array 70 around the periphery of the facility 44 is an array of sensor devices such as the RFeye array sensor manufactured and sold by CRFS as the RFeye series of sensor devices. These external geolocation devices 72 are arranged around the periphery of the facility such as shown in
(83) Referring to
(84) With angle of arrival sensing, the devices 72 rapidly switch between the directional antenna modules 72c and respond directly to the received RF power. Thus, they are effective with most types of RF transmission. Using angle of arrival, three receiver points ensure geolocation to a small area, even when the target is colinear with two receivers. Results may be limited by the noise floor of the receiver.
(85) With time difference of arrival, the devices 72 use synchronous time domain to determine the relative time of arrival of a signal at different receiver locations. Two monitoring receiver points provide geolocation probability in two dimensions along a hyperbolic curve, while three receiver points provide geolocation probability to a bounded area or point. An advantage is that the processing gain of correlations permits successful geolocation of signals close to or even below the receiver noise floor. Power on arrival uses synchronous frequency domain and is beneficial for those mobile wireless devices 46 that are close to or among different buildings where amplitude comparison will yield sufficient differences. It uses three or more monitoring receiver points.
(86) An internal location sensor array 80 is formed from internal geolocation devices as internal sensors 82 and are arranged within the periphery of the facility. In addition to adding the ability to localize a cellular or other mobile wireless device 42 in and around the buildings on facility grounds, the internal sensor array 80 provides the added capability to detect and estimate the location of WiFi devices in and around the various buildings of the facility 44.
(87) An example internal geolocation sensor 82 is a location-based WiFi and cellular detection and monitoring device manufactured and sold by AirPatrol under the tradename ZoneAware, as a precision location-based services platform. These sensors 82 may interoperate with a ZoneEngine application programming interface, also manufactured and sold by AirPatrol. The sensor 82 location is accurate to within 6 to 50 feet depending on the type of device and their spacing. The sensors 82 may incorporate positioning capabilities using beacons and a Bluetooth standard known as Bluetooth Low Energy (BLE) to broadcast messages to other devices within a small tunable radius around the beacon. In one non-limiting example, sensors 82 may be located approximately 65 feet apart with different sensors located on different floors and linked in a mesh network via WiFi or connected via wired Ethernet or Power over Ethernet. The sensors 82 are deployed throughout buildings in the facility, usually on the exterior of the buildings, and at a higher elevation for enhanced security to prevent tampering.
(88) The detection of cellular signals using the managed access system 10 is a layered or tiered approach and focuses on determining which internal or external geolocation sensor 72, 82 detected the signal and at what level the signal was detected. An indication or alert can be placed on the user interface 30 to indicate the sensor or sensors that identified the signal transmission and at what power level. This alert will provide a general location where the mobile wireless devices 42 are located, such as shown in the example of
(89) Detection and accuracy of the localization functionality are dependent on the ability of the sensor 82 to: (1) receive a signal at a sufficient level (often 100 dBm or greater); (2) the construction of the facility being protected; and (3) the placement separation of the sensors themselves. An example placement for sensors 82 is shown in the facility 44 of
(90) In the example of
(91) The managed access system 10 prohibits cellular and other mobile wireless devices within the protected facility 44 from accessing commercial voice and data networks by attracting and providing service to those devices within the facility. The system 10 interacts with each device using industry standard messaging traffic and these device interactions can be used to generate event records within the system 10 that identify specific information. The system 10 may process each event with a time/date stamp, the type of event (registration, voice call, text message and other details of the event), along with any electronic hardware identifier (IMEI/ESN/MEID) that is associated with the event, including carrier account identifiers (IMSI, MIN), and the dialed number if applicable. The system 10 may store each event record in the local database such as the event log database 34. The system provides a flexible routing capability that allows the system 10 to route unauthorized device voice call and data access attempts. For example, voice calls could be routed to a standard or custom pre-recorded announcement or to a voice mailbox or even local dialed extension.
(92) Further information could be verified as to the caller to allow the call to be connected or disabled. Data access attempts can be routed to a standard or customized website maintained locally within the facility 44 or can be configured to send traffic to a predefined address on the outside commercial communications network 45. Authorized users are allowed to access outside voice and data networks so their devices can make outside voice calls, send texts, and access content on the internet. This may be authorized by several techniques through the managed access system 10 such as redirecting authorized devices to the commercial communications network 45 and allow them to access the outside voice and data networks. This approach allows an authorized mobile wireless device 42 access to all services provided by their home commercial carrier. Another approach allows all authorized calls through the existing inmate telephone system (ITS), but this approach has privacy concerns for authorized device users.
(93) A preferred technique is to provide voice conductivity through a third party SIP server 242 (
(94) As noted before, each call interaction with a mobile wireless device 42 connected to the managed access system 10 generates an event record within the system 10 that includes the time/date stamp, the type of event such as the registration, voice call, text message and other details along with the hardware identifier and any carrier account identifier that was associated with the event. The system 10 stores each event record in the event log database 34 such as shown in
(95) As noted before, different reports may be generated with the aid of the user interface 30, such as the example screen shots in
(96) The system 10 may also operate in a passive or active mode. In the passive mode, the system 10 allows a mobile wireless device 42 within the coverage area formed by the RF bubble 150 to interact with the system, but does not disrupt access to the commercial communications network 45. It may be used during system verification prior to going-live. Once the system 10 is tuned and adjusted, it can be switched over to operate in the active mode where the system attracts and holds cellular and other mobile wireless devices 42 within the facility coverage area. The system 10 prevents those devices from obtaining service from the commercial networks. In this mode, authorized mobile wireless devices 42 are allowed access to voice and data services, while unauthorized devices are not. The active mode would be the normal mode of operation for the system 10.
(97) Because the system 10 has enterprise capability with connection to external communications of a commercial communications network 45, the system 10 is provisioned to log and report event data in customizable ways that make use easy for the operator. In this case, reports, system alerts, emails, and even text messages can be sent and displayed on the graphical user interface 30 when specific events occur. This may include:
(98) 1) Health Monitoring: Provides the ability to monitor and view the system health, including status and performance of all major components, equipment alarms, software issues, performance of the servers and web portals.
(99) 2) Report Generation: The system also provides the ability to monitor and generate reports on the system performance and threat assessments, create alert logs, audit trails, and long-term activity records. Time and date information are synchronized to the facility logs. Some of the standard reports and alerts are listed below.
(100) Blocked Call Detail Record: Identifies all blocked cellular wireless calls and includes information about the facility from which the call was placed, i.e., date and time, originator's phone number, originator's cellular device hardware ID, and destination phone number (dialed digits). If the optional sensor array is installed, a location estimate is also provided.
(101) User ID Report: Reflects the activity of user ID accounts created/activated during a specific reporting period. This report indicates the name and User ID of the device user that created/activated the account with the date and time stamp, the user account(s) created/activated, the date the profile was deactivated, the last successful or attempted log-in, and all updates to the account.
(102) User ID Alert: Notification of modifications to a device user account.
(103) Audit Log: Provides the User ID, name, log-in date and time, activities (files accessed) for each session. The system also records and reports the user ID, name, time and date of failed attempts.
(104) Authorized Number: Notifies the appropriate operator of the system 10 when a new mobile wireless device 42 has been added or devices have been deleted from the authorized cellular device list. Details the telephone numbers that have been identified as authorized to make calls within the facility. Includes the unique user identifier of the personnel that entered or modified the Authorized Number status as well as the dates of status changes to each number.
(105) Authorized Number Expiration: Provides for authorized cellular wireless device or group of devices due to expire within 30 calendar days.
(106) The system 10 is designed to self-monitor and report the system state of health in order to minimize the operational labor costs. Each functional component of the system 10 is monitored to ensure it is operating normally so the system operates at peak performance. The system 10 verifies communication links to provide a high reliability fault management approach. Any alarm or change in the operating conditions generates a system alert. All alerts are first acknowledged by the appropriate operator prior to the condition being either automatically or manually cleared.
(107) As part of the state of health monitoring 22 (
(108) As noted before, the physical security includes the ability to control physical access to hardware and record and log physical access events. Built-in physical security includes an integrated camera 210 and environmental sensors, including temperature 218, humidity 216, airflow such as smoke 212, door 220, and audio and video recording (
(109) Automated Health Monitoring includes status of the physical (hardware) elements of the system, performance monitoring and metric collection, fault detection and alarms. The status of each line replaceable unit (LRU) is tracked and reported independently, including damaged cables, antennas and sensors.
(110) The system includes an uninterruptable power supply (UPS) 64 (
(111) In order to control costs, any remote LRU's may be connected to protected, back-up power, allowing their continued operation during temporary power outages. The system 10 is also designed to withstand the challenging environment of a correctional institution, if the system 10 is implemented in such a facility. As such, it is not anticipated to require frequent repair from routine damage of wear and tear. Should the system 10 be damaged from events such as lightning strikes, the system provider or installer may be automatically alerted to the event by the state of health monitoring 22 and the system 10 may generate an alert to notify an operator and system provider of the issue.
(112) It is possible that the system 10 may identify and characterize rogue cellular towers using the various sensors and scanners 72, 82, 88, in accordance with a non-limiting example. An example is a rogue fempto cell tower, which is typically a small, low-power cellular base station and connects via broadband such as by DSL or cable to the network 45. Rogue fempto cell towers create threats to the managed access system 10 and will be identified and managed. Other towers may be a newly provisioned commercial service or covertly placed near and network connected. A fempto cell could also be a voice over IP (VoIP) WiFi cell tower or rogue cell tower. The various devices and sensors 72, 82, 88 may use a cellular protocol layer-3 information to identify the existence and location of a rogue cellular tower in near real-time. The sensors 72, 82, 88 identify the operating characteristics of the new and/or rogue cellular towers in sufficient detail to allow the site to be mitigated by the managed access system 10 or they may be investigated by others. It is advantageous over those techniques that authenticate tokens and blacklist, or use a baseband man-in-the-middle approach for mitigating threats.
(113) Referring now to
(114) As noted before, the management access server 12 may filter communications between an unauthorized MWD and the network interface device as the in-line IDS monitor and pass communications between an authorized MWD and the network interface device. As noted before, the system is a tiered approach. Unauthorized devices may be held within a holding pen where no communications are allowed, and it is possible to deny portions of services and allow the devices to communicate with other authorized or unauthorized devices only in the facility. It is possible to limit outside communications to the device. It is possible to allow the devices to text an SMS message. It is also possible to allow the devices to send alerts and other messages. Thus, the management access server 12 may be configured to permit an unauthorized MWD to communicate with other MWD's at the facility whether unauthorized or authorized depending on how the system is established.
(115)
(116) Referring now to
(117)
(118)
(119) As noted before, the site survey will be used to form a baseline of the existing commercial cell coverage, design distributed antenna system, verify the distributed antenna system 14, and finalize construction. As a non-limiting example, once the system is installed and operational and tuning of the distributed antenna system verified, a Site Acceptance Test (SAT) is completed, which ensures that operational coverage and functionality are acceptable for the facility 44. Table 1 below is an example of the tests and verifications that may be completed for final installation as a non-limiting example.
(120) TABLE-US-00002 TABLE 1 Example of High Level Tests and Verification Success Determination Step Capability Key Performance Metrics Criteria Methodology Notes: 1 Operation System Detects 100% System A sample of Faulted Hardware running. random LRU's Select any will be tested LRU and pull power, disconnect Ethernet connection, or remove optical connector. Detect fault 2 Operation System Detects 100% System Temp, Water, Physical Alarms running. Smoke, Humidity, and reports event Apply a Video, Door Ajar heater to the rack temp sensor. Verify notification and log. Repeat for other sensors 3 Operation System Allows 100% Remotely Remote Software Upgrades flash a new software load and verify new executable image loaded from a network login 4 Operation System Allows Remote 100% Verify GUI Control and Status works from Monitoring outside firewall 5 Operation System Provides Tiered 100% System Repeat for each User Access levels Running, log user class via System Sign-on in, determine Credentials access and lock outs 6 Electronic Threats System Identifies 95% System Multiply by Detection contraband running. At All: local cellular phone selected technologies x in coverage area and locations, Providers x reports turn on Bands. Harris Locations will provided test be determined contraband by applying a cellular 10 wide x 10 phones. long grid Verify across coverage registration area and and event selecting test logs points within each grid sector 7 Electronic Threats System Provides 100% System Multiply by Detection Logs of running, All: local detected device invoke technologies x events events, view Providers x logs Bands. Locations will be determined by applying a 10 wide x 10 long grid across coverage area and selecting test points within each grid sector 8 Electronic Threats System Provides TBD System Each protected Detection Localization of meters running, building will User Equipment invoke be tested at in Covered Area contraband evenly to within (If cellular distributed option phone, view test points. implemented) GUI report 10- points/building 9 Interdictions System 95% System Multiply by Interdicts running, turn All: local contraband on contraband technologies x cellular phone cellular Providers x voice calls and phone in Bands. reports event coverage Locations will area, verify be determined no service at by applying a cellular 10 wide x 10 phone long grid across coverage area and selecting test points within each grid sector 10 Interdictions System 95% System Multiply by Interdicts running, send All: local cellular phone SMS from technologies x Generated SMS contraband Providers x Messages and phone, verify Bands. reports event no SMS sent Locations will be determined by applying a 10 wide x 10 long grid across coverage area and selecting test points within each grid sector 11 Interdictions System provides 95% System Multiply by graphic running, All: local representation invoke technologies x of localized contraband Providers x cellular phone cellular Bands. on phone, locate Locations will representative on site map be determined map of coverage by applying a area 10 wide x 10 long grid across coverage area and selecting test points within each grid sector 12 Interdictions System 95% System Multiply by prevents running, call All: local incoming voice a contraband technologies x calls to cellular Providers x contraband phone number Bands. cellular phones hosted in Locations will in coverage covered area, be determined area verify no by applying a call 10 wide x 10 completed long grid across coverage area and selecting test points within each grid sector 13 Interdictions System prevents 95% System Multiply by delivery of within running, SMS All: local SMS messages to 1 hr message technologies x contraband powered Providers x cellular phones contraband Bands. in coverage cellular Locations will area phone in be determined covered area by applying a from outside 10 wide x 10 cellular long grid phone, verify across coverage no SMS area and delivered selecting test over 1 hour points within each grid sector 14 Access management System Provides 95% System Multiply by cellular phone running, turn All: local initiated Voice on authorized technologies x Service to cellular Providers x authorized phone in Bands. users and coverage Locations will reports event area, verify be determined voice service by applying a at cellular 10 wide x 10 phone long grid across coverage area and selecting test points within each grid sector 15 Access management System Provides 95% System Multiply by 911 from any running, dial All: local cellular phone 911 from technologies x in coverage cellular Providers x area and phone in Bands. forwards to coverage Locations will specified area, verify be determined cellular phone rings through by applying a and reports to specified 10 wide x 10 event cellular long grid phone across coverage area and selecting test points within each grid sector 16 Access management System 95% System Multiply by facilitates running, SMS All: local delivery message technologies x incoming SMS powered Providers x Service to authorized Bands. authorized cellular Locations will cellular phones phone in be determined and reports covered area, by applying a event verify SMS 10 wide x 10 delivered long grid across coverage area and selecting test points within each grid sector 17 Access management System 95% System Multiply by facilitates running, SMS All: local delivery of message sent technologies x SMS Service from powered Providers x from authorized authorized Bands. cellular phone cellular Locations will and reports phone in be determined event covered area, by applying a verify SMS 10 wide x 10 delivered long grid across coverage area and selecting test points within each grid sector 18 Access management System does not 95% System Multiply by interfere with running, All: local commercial verify OEM technologies x cellular service Providers x service outside outside of Bands. the property property Locations will boundary of the boundary be determined facility by applying a 10 wide x 10 long grid across coverage area and selecting test points within each grid sector
(121) Once the physical site survey is accomplished as explained above, engineers can determine site specific data such as power and cooling requirements for equipment, any cable routing access, any access and power requirements, and any antenna locations and similar details. Engineers may determine specifics relating to local or state building codes and issues relating to site (customer) specific permitting. Existing underground utilities may be identified and any other cables tested prior to being energized, including existing and new voltage, fiber optic or Ethernet cables.
(122) As noted before, the managed access system 10 monitors and generates reports for system performance and threat assessments such as alert logs, audit trails, and long-term activity records. These reports can be standardized. Possible reports could include a blocked call detail record that identifies all blocked cellular wireless calls and includes information about the facility from which the call was placed, its date and time, the originator's phone number, the originator's cellular device hardware identifier (ID), and the destination phone number as the dialed digits.
(123) A user ID report may reflect the activity of user ID accounts created and activated during a specific reporting period. This report may indicate the name and user ID of a user that created or activated the account with the date and time stamp and the user accounts that were created or activated and the date the profile was deactivated as well as the last successful or attempted log-in. Information regarding the creation, modification and deletion of a user account may be generated. An audit log report may provide the user ID, name, log-in date and time, activities with the files accessed for each session, and the records and reports for the user ID, name, time and date of failed attempts.
(124) An authorized number alert report may be generated to notify an appropriate operator when a new mobile wireless device 42 has been added or mobile wireless devices deleted from the authorized device list. Authorized number reports may detail the telephone numbers that have been identified as authorized to make calls within the facility 44. This report may include the unique identifier of a user that entered or modified the authorized number status and the dates of status changes to each number. Expiration reports may be provided for authorized cellular wireless device or groups of devices due to expire within 30 calendar days as a non-limiting example.
(125) Software CSCI (Computer Software Configuration Items) are now described with reference to
(126) The MAS main application CSCI 308 is shown in
(127) The network manager 316 shown in
(128)
(129) The surveyor manager 318 will initiate periodic surveys of surrounding cellular towers and the survey results are stored in the local coverage database 26 (
(130) Referring now to
(131) The web server 302 serves the web application and supports multiple simultaneous operators. As shown in
(132) This application is related to copending patent applications entitled, MANAGED ACCESS SYSTEM WITH MONITORING DEVICE TO DETERMINE AND CHANGE RADIO EQUIPMENT, and MANAGED ACCESS SYSTEM WITH MONITORING DEVICE TO DETERMINE SYSTEM OPERABILITY, and MANAGED ACCESS SYSTEM THAT DETERMINES AUTHORIZED AND UNAUTHORIZED MOBILE WIRELESS DEVICES, and MANAGED ACCESS SYSTEM HAVING FILTERED COMMUNICATIONS USING NETWORK INTERFACE DEVICE, which are filed on the same date and by the same Assignee, the disclosures which are hereby incorporated by reference.
(133) Many modifications and other embodiments of the invention will come to the mind of one skilled in the art having the benefit of the teachings presented in the foregoing descriptions and the associated drawings. Therefore, it is understood that the invention is not to be limited to the specific embodiments disclosed, and that modifications and embodiments are intended to be included within the scope of the appended claims.