This invention relates to the field of wireless and more particularly to a system for detecting wireless devices then jamming reception of a signal from a cellular tower.
There are many situations when it is either not desired or not legal to utilize certain types of wireless communications. One good example is in the corrections environment, where the correctional institution forbids wireless communication by inmates because such communications are difficult or impossible to monitor and/or control. Law enforcement entities monitor telephone conversations conducted by inmates within correctional facilities for various reasons. The telecommunications equipment available for use by detainees within the corrections environment meet various requirements of governments and police by monitoring and/or recording telephone conversations as needed.
Cellular technology has progressed in form and size to a point that inmates in the corrections environment find ways to hide and smuggle cellular phones into corrections facilities. These phones are then used by inmates to circumvent the required monitoring and/or recording and are often used to communicate amongst themselves to coordinate unauthorized or dangerous activities within the corrections facility.
In correctional facilities, inmates have a limit of a small number of individuals that the inmate is permitted to call by way of an approval process in which the inmate petitions for the ability to call, for example, a family member. These often include family members, lawyers, and friends. All such calls take place in a very controlled environment, facilitating monitoring and recording, as necessary and legal. Normally, inmates are not permitted to make calls to certain individuals such as judges, jury members, witnesses, known accomplices, etc., to prevent harassing or other unwanted calls. Some correctional facilities also restrict the time of day and length of calls. Such monitoring is typically computer controlled at the correctional facility and/or at remote locations, at times, includes human monitoring and/or control. Additionally, certain laws and privacy norms prohibit recording of certain conversations such as conversations between an inmate and his/her attorney.
The penetration of, for example, cellular phones into many correctional facilities has become alarming. Imagine the harm that results in a purported killer having a smuggled cellular phone and calling judges and jury members every night with threats against them and their families; or being able to continue with unlawful activity through the use of a cellular phone. Yet, cellular phones still find their way into such institutions and are well hidden. To avoid detection and to extend battery life, often the cellular phones are powered completely off when not in use, thereby not emitting any type of radio frequency signal until the inmate desires to make a call. Such devices are so small that they are easily hidden and, because there are no radio frequency emissions when powered off, such devices cannot be detected by radio frequency sweeps of the inmate areas (e.g. cells, common areas, etc.).
In the past, attempts at detecting cellular activity within correctional facilities typically consisted of fixed antenna systems, in which, antennas are strategically located throughout the correctional facility and the radio frequency bands used by cellular phones are monitored, reporting detection to a central location. Such systems require an expensive, fixed infrastructure within the correctional facility and only determine that a cellular phone is in use, being incapable of pinpointing the actual user.
Other systems utilize one or more fixed antenna within the facility that terminate the unwanted cellular calls, acting as the cellular phone network, thereby making it difficult or impossible to initiate a call from a cellular phone within the facility. As with the prior attempts, this too does not pinpoint the actual inmate making the call. Furthermore, because signals from this system may extend beyond the prison walls, this system is capable of inadvertently blocking a valid call which could be disastrous if such a call was an emergency call. There are also questions as to whether such a system would be approved for operation by government agencies such as the FCC in the United States. Similarly, jamming devices are available to prevent connections between these cellular phones and the cellular network/towers, but it is also difficult to assure that such jamming devices will not interfere with legitimate calls, especially emergency calls and, again, there are questions related to approval by government agencies.
Another prior attempt to find cellular phones includes portable detection devices that monitor and detect radio frequency emissions in the cellular range. Such devices have been found to be less reliable because, in a prison environment, often there is a tight inmate communication system (e.g. signaling by making certain noises, etc.) that alerts the inmate who is using the cellular phone that a guard is coming in sufficient time as to power down and/or hide the phone before the guard can pinpoint the radio frequency signal. The use of phone (electronics) sniffing dogs faces similar issues when used as the primary means of cell phone detection.
What is needed is a system that will detect and pinpoint radio frequency usage for locating and confiscating of unauthorized communications equipment; report any detected devices; and prevent such devices from making a connection.
The basic system provides for radio frequency detection of a device within a specific range of a body worn device. Upon detection of a targeted radio frequency signal, the body worn device emits a jamming signal to preclude or impair communications by a device using that targeted radio frequency signal. In some embodiments, the body worn device also communicates to an infrastructure to alert of the presence of the targeted radio frequency signal. In such, the user and/or location of the body worn device is/are revealed and the source of the radio frequency signal is readily determined for confiscation of the offending device. Other features include locating/tracking of the body worn device (and wearer) detection of tampering with or removal of the body worn device, detection of cloaking of the body worn device (e.g. submerging in water or covering with aluminum foil, etc.), and various internal diagnostics.
Although there are many applications of the described body worn device(s), one exemplary use is within correctional facilities. As noted above, various communications devices are often smuggled into correctional facilities and are easily hidden. The use of such devices is not allowed, but still happens. By equipping at least a subset of the inmate population with the disclosed body worn devices, the correctional facility staff is provided the ability to disable and locate any covered radio frequency emitting device within the correctional facility. Guards and staff are alerted when the inmate wearing the body worn device or someone close to that inmate uses a targeted wireless device, such as a cellular phone. Once alerted, the guards know the exact identification of the inmate and, therefore, the location of the illegal device enabling confiscation of the illegal device.
In one embodiment, a system for detecting radio frequency emitting devices is disclosed including at least one base station. The base station includes a base station processor and a base station transceiver which is operatively coupled to the base station processor. A plurality of body worn devices is provided. Each body worn device has a processor, a transceiver operatively coupled to the processor, a radio frequency detector operatively coupled to the processor, a jammer operatively coupled to the processor, and a source of power for providing operational power to the processor, the transceiver, and the radio frequency detector. Software running on the processor of the body worn device communicates with the radio frequency detector and, if a target radio frequency is detected by the radio frequency detector, the software initiates jamming and a communication from the transceiver to the base station transceiver indicating that the target radio frequency was detected. Upon receipt of the communication indicating that the target radio frequency was detected, software running on the base station processor determines the offending body worn device and signals an alert.
In another embodiment, a method of detecting a radio frequency emission is disclosed. The method includes monitoring a predetermined radio frequency (or frequencies) at a body worn device and, if the predetermined radio frequency of at least a predetermined radio frequency strength is detected, jamming communications frequencies associated with the radio frequency to preclude or limit usage of an offending device.
In another embodiment, a computer-based system for detecting radio frequency transmissions is disclosed includes a body worn device. The body worn device has a processor, a wireless transceiver communicatively coupled to the processor, a jammer operatively coupled to the processor and a radio frequency transmission detector interfaced to the processor. The radio frequency transmission detector detects any radio frequency transmission of at least one frequency and at a power level above a predetermined threshold for each of the at least one frequency. Software running on the processor monitors the radio frequency transmission detector and, upon detection of any of the at least one frequency exceeding a corresponding threshold of the predetermined threshold for each of the at least one frequency, the processor the processor signals the jammer to jam at least one other frequency, the at least one other frequency associated with the at least one frequency for two-way communications.
The invention can be best understood by those having ordinary skill in the art by reference to the following detailed description when considered in conjunction with the accompanying drawings in which:
Reference will now be made in detail to the presently preferred embodiments of the invention, examples of which are illustrated in the accompanying drawings. Throughout the following detailed description, the same reference numerals refer to the same elements in all figures.
The described system pertains to a collection of hardware devices for monitoring the location and environment of any target person. Throughout this description, the target person is typically a detained person such as an inmate in a correctional facility, but there is no restriction to any particular type of target person, nor that the target be a human being, in that the described body worn device functions the same for any type of movable object. The described system is equally applicable to any other type of scenario. For example, the target person is a teen child and the body worn device is worn by the teen child to monitor, for example, cell phone usage while driving.
For simplicity purposes, the following description uses, as an example, the inmate as the target person. In general, depending upon security and policies at a prison, the population (inmates) is not allowed to communicate with those inside or outside the prison without using approved forms of communication that are easily monitored by prison authorities. In such, the inmate population is not allowed to use pagers, cellular phones, cordless phones, wireless Internet access, etc., to communicate with anybody, within or outside of the prison. Attempts to keep devices capable of such communications out of the hands of inmates has proved ineffective, in that inmates have long periods of time to think of ways to smuggle communications devices into the prison and, to hide those devices once the devices are within the prison. This is further exacerbated by potential corruption within the prison staff and guards.
Jamming devices are well known in the industry, but have not been integrated into a device that is worn, for example, worn by an inmate. Typically, jamming devices emit random radio frequency noise, random pulse, stepped tones, warbler tones, pulses, or sweep through a range of radio frequencies. Such radio frequency emissions in the proper bands are capable of jamming other radio frequency devices, such as cellular phones, Citizen Band (CB) devices, etc.
Some jamming devices recognize digital modulation techniques and, upon recognizing the presence of a cellphone utilizing the digital modulation technique, such jamming devices continuously attempts to connect with the cellphone, aborting the connection before it is complete, then starting over again.
As the body worn device described has limited power (e.g. from a rechargeable battery), reducing power consumption is critical. Therefore, continuous emission of a series of jamming signals is less desirable as such will consume too much of the precious battery power.
Referring to
Throughout this description, a cellular network 10 is used as an example, though this example is not to be interpreted as limiting in any way. In the example of the cellular network 10, each end user terminal 12/14/15 communicates with cellular towers (not shown for brevity reasons) utilizing a pre-defined protocol and a pre-defined frequency or set of frequencies. As known in the industry, cellular networks 10 are assigned a set of frequencies in which they are allowed to operate (in the US the assignment is made by the Federal Communications Commission or FCC), and, depending upon the protocol, the frequencies are allocated for certain parts of the protocol such as signaling (e.g. indicating the desire to make a connection), voice communications, data communications, etc. It is also known, based upon the protocol, how to process/avoid collisions (e.g. two cellular phones 12 attempt to initiate a call at the same time), how to handle varying distances from the cellular towers (e.g. measuring signal strength and signaling a request for increases or decreases in power output), and how to hand off a cellular phone from one cellular tower to the next, etc.
Whatever the wireless communications being used, every end user terminal 12/14/15 must, at some time, emit a radio frequency signal 20 that is then received by one or more receivers within the cellular network 10 (e.g. cell towers). Although it is desired to communicate such radio frequency signals 20 directionally to an entity (e.g. cell tower) within the cellular network 10 (or other device in a point-to-point system), the laws of physics do not cooperate and the radio frequency signal 20 radiates in multiple directions from an antenna, the antenna being associated with (internal, external, or connected) the transmitting device (e.g end user terminal 12/14/15. For example, when the cellular phone 12 communicates to the cellular network 10, some portion of the radio frequency signal 21 reaches an antenna 82/82A (see
Within the body worn device 40 is circuitry 50/50A (see
Referring to
The circuitry 50 of the body worn device 40 includes a source of power 98. It is well known how to power such devices ranging from miniature body worn devices such as watches to more complicated devices that are often specialized worn devices such as house-arrest tracking devices. Any source(s) of power are anticipated, including, but not limited to, batteries, rechargeable batteries, solar cells, radio frequency parasitic extraction, capacitors, super capacitors, fuel cells, etc., including combinations of such. The source of power 98 includes circuitry to condition and regulate the power which is then distributed to the various subsystems 60/70/80/90 by power distribution 99 which are any known conductors as used in the industry, including, but not limited to, wires, printed circuit paths, etc. In some embodiments, the source of power 98 further includes circuitry to control charging as well as a connection or interface to a source of charging power (e.g. a wall-wart, base station, etc).
The radio frequency detection subsystem 80/80A is interfaced to the processor 60. The processor controls the operation of the radio frequency detection subsystem 80/80A by sending commands 65 to the radio frequency detection subsystem 80/80A and receiving status and data back 66 in a similar manner (e.g. signal frequency and strength). The radio frequency detection subsystem 80/80A includes one or more antenna 82/82A as needed, either internal or external to an enclosure 41 of the body worn device 40 (see
In some embodiments, the radio frequency detection subsystem 80 operates independently of the processor 60, notifying the processor 60 of the detection of any of the targeted radio frequencies (e.g. cellular band frequencies, etc.). In some embodiments, the processor 60 performs some of the radio frequency detection, such as setting or sweeping the detection frequency and comparing the received radio frequency power levels at each frequency to a predetermined acceptable value. For example, the processor 60 instructs the radio frequency detector 80 to monitor three specific frequency, such as 900 MHz, 1.8 GHz and 1.9 Ghz, and then reads back a signal strength from the radio frequency detector 80, comparing the signal strength to an internal threshold, signaling an alert (as will be discussed with
The tamper detection subsystem 90 is also interfaced to the processor 60. The processor 60 controls the operation of the tamper detection subsystem 90 by sending commands and/or signals to the tamper detection subsystem 90 and receiving status and data back in a similar manner 67 (e.g. intact or “device removed from body,” etc.). It is anticipated that the body worn device 40 is issued to a particular individual (e.g. inmate) and is to be locked onto that person by, for example, a leg cuff, arm cuff, neck cuff, belt, etc. Although the body worn device 40 is secured to the person and not easily removed, it is important that any tampering with the body worn device 40 be detected (and reported). There are many methods of detecting tampering or removal of a body worn device 40 known in the industry, all of which are anticipated and included here within. For example, in some embodiments, a conduction path fully encircles the body appendage to which the body worn device 40 is attached such that, if the enclosure 41 (see
In some embodiments, the tamper detection subsystem 90 also includes intrusion detection to determine if the enclosure 41 (see
In some embodiments, the circuitry 50 of the body worn device 40 communicates with the land based system (e.g. base stations 110) through a wireless transceiver 70, preferably having an antenna 74, though in some embodiments, the wireless transceiver 70 utilizes the antenna 82 used in radio frequency detection through, for example, a splitter or antenna switch (not shown). The wireless transceiver 70 is interfaced to the processor 60 and the processor 60 communicates with and controls the operation of the wireless transceiver 70 by sending commands 62 and data 63 to the wireless transceiver 70 and receiving status and data back in a similar manner. Because such transceivers often consume significant power, in some embodiments, the processor 60 has an enable interface 64 to power down the wireless transceiver 70 (or any other subsystem) when not in use. Any appropriate signaling protocol is anticipated, as transmission collisions with other body worn devices 40, lost packets, out-of-order packets, noise, etc., must be overcome. The data and signaling is modulated onto a radio frequency using any modulation format such as frequency modulation, amplitude modulation, pulse code modulation, pulse width modulation, etc.
It is anticipated that the wireless transceiver 70 be any type of transceiver, operating over any known frequency or group of frequencies, any known power level(s), and either half-duplex or full-duplex. When the wireless transceiver 70 is half-duplex, the processor 60 controls whether the wireless transceiver 70 is receiving or it is transmitting by a mode control 62.
Data is transferred between the processor 60 and the wireless transceiver 70 in any way known in the industry including, but not limited to, shared memory (not shown), serial transfer, parallel transfer, any combination, etc. In a preferred embodiment, though not required, data from the processor 60 is encrypted before transmission. In such, the data is either encrypted by instructions running on the processor 60, or, in some embodiments, by an encryption module 72 within or external to the wireless transceiver 70. Also in a preferred embodiment, though not required, data from the base station 110 (see
Any band, frequency, wavelength, set of wavelengths, protocols, protocol stacks are anticipated for use by the wireless transceiver 70 (and transceiver 935 in
In some embodiments, a piezoelectric or other sound emitting device 97 is included. The sound emitting device 97 emits a sound as an audible alert when an event such as tampering or a targeted RF signal is detected. The audible alert from the sound emitting device is used to augment the wireless delivery of the alert information or as an alternative. For example, if a wireless communication fails, the audible alert is initiated.
In some embodiments, a clock or timekeeper 59 is included, either as a subsystem of the processor 60 or a separate, discrete timing device 59 that is interface to the processor 60. In such embodiments, the body worn device 40 has the ability to record the time and/or date of any event and to transmit the time and/or date to the base station 110 along with any alert and/or heartbeat transmission.
After the processor 60 detects an offending radio frequency signal (e.g. after the processor 60 receives indication of a specific signal strength of a specific wavelength from one of the radio frequency detectors 80/82), the processor initiates action to jam operation of an offending device 12.
Jamming a radio signal requires transmission of radio frequency energy on one or many frequencies in order to prevent or make difficult communications between, for example, the offending device 12 and a cell tower. As the body worn device 40 has limited power available from the source of power 98, it is not preferred to continuously jam a broad range of frequencies, as the power of the power source 98 will soon deplete.
Instead, jamming is only performed after the processor 60 detects an offending radio frequency signal. In many forms of communications, the offending device 12 transmits a signal on a first frequency at a relatively high-power output, for example, to reach a distant cell tower. In response, the cell tower communicates back to the device over a second frequency, but because of the distance from the cell tower to the offending device 12 (power reduces proportionately to the square of the distance) is often great, the power level of the received signal (second frequency) is often very low and, therefore, easier to jam using much less power. Therefore, the processor 60 determines which frequencies need to be jammed based upon the indication of a specific signal strength of a specific wavelength from one of the radio frequency detectors 80/82. The processor then instructs the jammer 980 to emit radio frequency energy or a jamming signal 921 on one or more frequencies/bands which emanate from a jamming antenna 982. The jammer 980 emits, for example, random radio frequency noise, random pulse, stepped tones, warbler tones, pulses, or sweep through a range of radio frequencies. Such radio frequency emissions in the proper bands are capable of jamming other radio frequency devices, such as cellular phones, Citizen Band (CB) devices, etc. In some embodiments, the jammer 980 recognizes digital modulation techniques through the radio frequency detection subsystem 80/80A and, upon recognizing the presence of a cellphone, the jammer 980 utilizes a digital modulation technique such as continually attempting to connect with the cellphone, aborting the connection before it is complete, then starting over again, until the radio frequency detection subsystem 80/80A no longer detects a presence of the offending device 12 (e.g. the offending device 12 is turned off).
Referring to
The second exemplary circuit 50A of the body worn device 40 includes a source of power 98. It is well known how to power such devices ranging from simple body worn devices such as watches to more complicated devices that are often body worn such as cellular phones, to specialized worn devices such as house-arrest tracking devices. Any source(s) of power are anticipated, including, but not limited to, batteries, rechargeable batteries, solar cells, radio frequency parasitic extraction, capacitors, super capacitors, fuel cells, etc., including combinations of such. The source of power 98 includes circuitry to condition and regulate the power which is then distributed to the various subsystems 60/70/80/90/94 by conductors 99 which are any known conductor as used in the industry, including, but not limited to, wires, printed circuit paths, etc. In some embodiments, the source of power 98 further includes circuitry to control charging as well as a connection or interface to a source of charging power.
The radio frequency detection subsystem 80/80A is interfaced to the processor 60. The processor controls the operation of the radio frequency detection subsystem 80/80A by sending commands 65 to the radio frequency detection subsystem 80/80A and receiving status and data back 66 in a similar manner (e.g. signal frequency and strength). The radio frequency detection subsystem 80/80A includes one or more antenna 82/82A as needed, either internal or external to an enclosure 41 (see
The tamper detection subsystem 90 is also interfaced to the processor 60. The processor 60 controls the operation of the tamper detection subsystem 90 by sending commands and/or signals to the tamper detection subsystem 90 and receiving status and data back in a similar manner 67 (e.g. intact or “device removed from body,” etc.). It is anticipated that the body worn device 40 is issued to a particular individual (e.g. inmate) and is to be locked onto that person by, for example, a leg cuff, arm cuff, neck cuff, belt, etc. Although the body worn device 40 is secured to the person and not easily removed, it is important that any tampering with the body worn device 40 be detected. There are many methods of detecting tampering or removal of a body worn device 40 known in the industry, all of which are anticipated and included here within. For example, in some embodiments, a conduction path fully encircles the body appendage to which the body worn device 40 is attached such that, if the strap 42 (see
In some embodiments, a method of determining the body worn device's proximity to the body is used to determine if the device has been removed. Some methods known in the industry for detecting proximity include continuity sensors and mechanical switches that determine if the device is no longer in contact with the body. Such continuity sensors and mechanical switches are prone to false positives and nuisance alerts and can be defeated more easily than other methods.
In some embodiments, more elaborate measurements are used to detect the added resistance (or change in resistance) of the external wire. In some embodiments, an optical light pipe embedded in a strap encircles the body part to which the body worn device 40 is attached and a specific wavelength an encoded light wave signal is emitted or periodically emitted into one end of the light pipe. If the same signal is detected at the other end, then it is believed that no tampering has been done, but if the signal is not detected, then tampering is detected.
In some embodiments, the tamper detection subsystem 90 also includes intrusion detection to determine if the enclosure 41 around the electronics has been penetrated. Again, there are many ways to detect such intrusion as known in the industry, all of which are included here within. For example, a simple method includes the detection of light within the enclosure 41. Normally, there is no light being that the enclosure 41 is completely sealed with no openings, but when the enclosure 41 is penetrated, light is allowed to enter and triggers the tamper detection system 90. In other embodiments, there is an internal detector that detects one or more materials or physics typically present in the atmosphere (e.g., atmospheric pressure, humidity, oxygen, nitrogen, etc.) and the enclosure 41 is either evacuated or filled with some other gas (e.g. helium). In this, normally, the detector measures little or no presence of the material, but when the enclosure 41 is cut, atmosphere enters the enclosure 41, the material is detected, and the tamper detection system 90 is triggered.
There are many tamper detection mechanisms known in the industry, all of which are anticipated for use with the body worn device 40. Further examples include the use of a motion sensor or accelerometer to determine if the device experiences long periods of time with no motion, indicating that the device has been removed and has been placed somewhere in a static mode.
In some embodiments, the body worn device 40 communicates with the land based system (e.g. base stations 110) through a wireless transceiver 70, preferably a transceiver having an antenna 74, though in some embodiments, the wireless transceiver 70 utilizes the antenna 82 used in radio frequency detection through, for example, a splitter or antenna switch (not shown). The wireless transceiver 70 is interfaced to the processor 60 and the processor 60 communicates with and controls the operation of the wireless interface and wireless transceiver 70 by sending commands 62 and data 63 to the wireless transceiver 70 and receiving status and data back in a similar manner. Because such transceivers often consume significant power, in some embodiments, the processor 60 has an enable interface 64 to power down the wireless transceiver 70 (or any other subsystem such as the positioning subsystem 94) when not in use.
Throughout this description, the wireless transceiver 70 is referred to as a wireless transceiver 70, which is the preferred form of communications with the base station 110. The wireless transceiver 70 transmits a wireless signal to the base station and receives a wireless signal back, either on the same band/wavelength/frequency or a different band/wave/frequency utilizing any protocol or stack of protocols. For example, if a signal/message from the wireless transceiver 70 of the body worn device 40 is not received and acknowledged by the transceiver 935 (see
It is anticipated that the wireless transceiver 70 be any type of transceiver, operating over any known frequency or group of frequencies, using any known modulation technique, at any known power level(s), and either half-duplex or full-duplex. When the wireless transceiver 70 is half-duplex, the processor 60 controls whether the transceiver is receiving or it is transmitting by a mode control 62.
Data is transferred between the processor 60 and the wireless transceiver 70 in any way known in the industry including, but not limited to, shared memory (not shown), serial transfer, parallel transfer, any combination, etc. In a preferred embodiment, though not required, data from the processor 60 is encrypted before transmission. In such, the data is either encrypted by instructions running on the processor 60, or, in some embodiments, by an encryption module 72 within or external to the wireless transceiver 70. Also in a preferred embodiment, though not required, data from the base station 110 (see
In the embodiment of
Upon detecting an offending radio frequency signal (e.g. after the processor 60 receives indication of a specific signal strength of a specific wavelength from one of the radio frequency detectors 80/82) at the processor 60, the processor initiates action to jam operation of an offending device 12.
Jamming a radio signal requires transmission of radio frequency energy on one or many frequencies in order to prevent or make difficult communications between, for example, the offending device 12 and a cell tower. As the body worn device 40 has limited power available from the source of power 98, it is not preferred to continuously jam a broad range of frequencies, as the power of the source of power 98 will soon deplete.
Instead, jamming is only performed after the processor 60 detects an offending radio frequency signal. In many forms of communications, the offending device 12 transmits a signal on a first frequency at a relatively high-power output, for example, to reach a distant cell tower. In response, the cell tower communicates back to the device over a second frequency, but because of the distance from the cell tower to the offending device 12 (power reduces proportionately to the square of the distance) is often great, the power level of the received signal (second frequency) is often very low and, therefore, easier to jam using much less power. Therefore, the processor 60 determines which frequencies need to be jammed based upon the indication of a specific signal strength of a specific wavelength from one of the radio frequency detectors 80/82. The processor then instructs the jammer 980 to emit radio frequency energy (jamming signal 921) on one or more frequencies/bands which emanate from a jamming antenna 982. The jammer 980 emits, for example, random radio frequency noise, random pulse, stepped tones, warbler tones, pulses, or sweep through a range of radio frequencies. Such radio frequency emissions in the proper bands are capable of jamming other radio frequency devices, such as cellular phones, Citizen Band (CB) devices, etc. In some embodiments, the jammer 980 recognizes digital modulation techniques through the radio frequency detection subsystem 80/80A and, upon recognizing the presence of a cellphone, the jammer 980 utilizes a digital modulation technique such as continually attempting to connect with the cellphone, aborting the connection before it is complete, then starting over again, until the radio frequency detection subsystem 80/80A no longer detects a presence of the offending device 12 (e.g. the offending device 12 is turned off).
By way of the body worn device 40 being in proximity of the wearer at all times, the circuitry 50/50A will primarily respond to radio frequency signals emitted from an offending device 12 used by the wearer or used in close proximity to the wearer. Further, jamming signals, as being of generally low powered, will tend to jam the offending device 12 that is in proximity of the wearer and not jam distant devices that may be in legitimate use. This feature (low power jamming) reduces the probability that a legitimate cellular call (or any other wireless communications) is jammed.
Referring to
Although any form of attachment mechanism is anticipated for the body worn device 40, in some embodiments, the attachment mechanisms and enclosure 41 are designed to prevent removal under normal wear and impact that often occurs during the wearing of such device such as, during exercise, walking, running, etc. Furthermore, in some embodiments, the attachment mechanisms and enclosure 41 are designed to resist penetration by substances that normally contact the wearer such as during showering, rain, etc. Although any suitable material is anticipated, it is preferred that at least the surface of the strap 42 and/or enclosure 41 be made from a hypoallergenic material such as Santoprene, being that the body worn device 40 will be worn for long periods of time. It is also preferred that the strap 42 be made from materials that will not significantly stretch, even when heated. Stretching is not desired because, in some cases, stretching enables easy removal without detection of tampering. In some embodiments, the enclosure 41 is made of an impact resistant polycarbonate that is rugged, tamper resistant, and seals the electronics from the surrounding environment.
As previously described, in some embodiments, the body worn device 40 includes a perimeter detection loop 45 that consists of a conductor (either light or electrical signal) that helps detect tampering. For example, if the strap 42 is cut, the perimeter detection loop 45 is broken and a tamper signal is sent from the wireless transceiver 70 of the body worn device 40 to the base station 110.
In some embodiments, an RFID 46 is mounted in/on the enclosure 41 and/or in the strap 42. This optional RFID (or other readable mechanism such as a bar code, QR code, etc.) is available for use to facility systems for many uses such as head counts, usage accounting, commissary expense charges, etc.
Referring to
The software operating within the body worn device 40 is also updated, as necessary, through the wireless interface.
In some embodiments, the condition of the battery in the body worn device 40 is also reported during some or all transmissions. In some embodiments, diagnostics or self-tests are performed during initialization and/or periodically and any anomalies are reported through the wireless interface.
Referring to
Although not required, the transmission of the signal/message is performed using an end-to-end protocol that assures proper reception of the signal/message. All forms of reliable transmissions are anticipated, including automatic retransmission of unacknowledged attempts, retransmission of signals/messages that were received with errors, error correcting protocols, etc. In such embodiments, once an event occurs, transmission is continually attempted until it is properly received at the base station or, in some embodiments, until it is deemed futile to continue such transmissions. In some embodiments, if a second event occurs during the transmission and/or retransmission of a first event is underway, the second event (and subsequent events as storage permits) is captured in memory (e.g. nonvolatile memory 825 (see
In some embodiments, the circuit 50A within the body worn device 40 includes a positioning system 94 and the message includes, for example, the latitude and longitude of the body worn device 40. In some embodiments, the circuitry 50 within the body worn device 40 lacks a positioning system 94 and/or positioning signals are not being received and the message cannot include a location of the body worn device 40. In such, triangulation is used to determine the location of the body worn device 40 as is described along with
Referring to
An exemplary alert report screen that is displayed after reception of such a message and triangulation by the base station 110 is shown in
The following examples use a fictitious inmate, John Doe, as an example of a person assigned and wearing a body worn device 40. This does not imply that the disclosed inventions are in any way limited to prisons or correctional facilities.
Referring to
Referring to
Referring to
The user interface shown is an overly simplified interface for understanding purposes. It is anticipated that the Location (latitude and longitude) be used to pin point the user (e.g. inmate) within a floor map of the building to quickly find that user (e.g. inmate) and confiscate the infringing transmitting device. Furthermore, other information regarding the radio frequency signal 21 that was detected by the body worn device 40, when available, are displayed, for example, frequencies and signal strength for each frequency received, durations of signals, etc. In some embodiments, such information is further analyzed to classify the transmission device so that after confiscation, it is known whether the correct device has been confiscated. For example, if a cellular signal is detected but, after searching, only a tablet computer 15 is found, authorities know to keep searching until they find a cellular phone 12.
Referring to
Until reset, the body worn device circuitry 50 continuously loops, each time through the loop accessing the radio frequency receiver/detector 80 to determine if the cellular network 10 is present 420 (e.g. is the body worn device being cloaked?), accessing the tamper detection circuit 90 to determine if tampering has been detected 430, and accessing the radio frequency receiver/detector 80 to determine if there has been any unauthorized radio frequency transmission 440. If the cellular network 10 is not present 420, a signal or packet indicating that this particular body worn device 40 has been cloaked or masked 450 is sent to the base station 110. If tampering has been detected 430, a signal or packet indicating that this particular body worn device 40 has been tampered (e.g. removed, broke) 460 is sent to the base station 110. If there has been any unauthorized radio frequency transmission 440, a signal or packet indicating that this particular body worn device 40 has detected such radio frequencies is transmitted 470 is sent to the base station 110 and one or more jamming signals 921 are emitted 990 that preclude or limit usage of the offending device 12.
Referring to
Next the radio frequency receiver/detector 80 is enabled 412 to monitor radio frequency transmissions in the local of the body worn device 40.
Until reset, the circuitry 50 of the body worn device 40 continuously loops, each time through the loop accessing the radio frequency receiver/detector 80 to determine if the cellular network 10 is present 420 (e.g. is the body worn device being cloaked?), accessing the tamper detection circuit 90 to determine if tampering has been detected 430, accessing the radio frequency receiver/detector 80 to determine if there has been any unauthorized radio frequency transmission 440, and checking the heartbeat timer in the body worn device 40 to determine if a heartbeat needs to be transmitted 442. If the cellular network 10 is not present 420, a signal or packet indicating that this particular body worn device 40 has been cloaked or masked 450 is sent to the base station 110. If tampering has been detected 430, a signal or packet indicating that this particular body worn device 40 has been tampered (e.g. removed, broke) 460 is sent to the base station 110. If there has been any unauthorized radio frequency transmission 440, a signal or packet indicating that this particular body worn device 40 has detected such radio frequencies is transmitted 470 is sent to the base station 110 and one or more jamming signals 921 are emitted 990 that preclude or limit usage of the offending device 12. If a heartbeat needs to be transmitted 442, the heartbeat signal/packet is transmitted and the heartbeat timer is reset to schedule the next heartbeat transmission 444.
Referring to
The simplified example of transmitting between the body worn device 40 and the base station 110 as described is but an example as reliable data transmission is well known and many methods and protocols exist to perform such transmissions. The exemplary program flows described here within are but examples and one skilled in the art will readily be able to produce a transmission mechanism capable of such communication.
Referring to
The following relates to communications with one or many body worn device 40. When the application starts running, general initialization is performed 600, communications is initialized 602, and then communication with the body worn device(s) 40 is established 604, looping until communication is made. Once communications are established 604, the identification of the body worn device 40 is read or set 606 (as described with
Now a loop is entered. The first step of the loop is to determine if a packet or signal has been received 615 from the body worn device 40. If no packet or signal has been received 615, the heartbeat timer is checked for expiration 680 (e.g. the timer expires if no heartbeats are received within the heartbeat timer interval). If the heartbeat timer expired 680, an appropriate indication/alarm is made 685 (e.g. message display, flashing light, etc.) and the loop continues.
If a packet or signal has been received 615 from the body worn device 40, a determination of the type of packet or signal is made. If the packet/signal indicates that the body worn device 40 has lost presence of a cellular network signal 620 (e.g. it is cloaked), an appropriate indication/alarm is made 625 (e.g. message display, flashing light, etc.) and the loop continues.
If the packet/signal indicates that the body worn device 40 has been tampered with 630 (e.g. it has been removed from the user/inmate), an appropriate indication/alarm is made 635 (e.g. message display, flashing light, etc.) and the loop continues.
If the packet/signal indicates that the body worn device 40 detected an unauthorized radio frequency transmission 640, an appropriate indication/alarm is made 645 (e.g. message display, flashing light, etc.—hopefully alerting staff/guards to confiscate the offending device); one or more jamming signals 921 are emitted 990 that preclude or limit usage of the offending device 12; and the loop continues.
If the packet/signal indicates that the body worn device 40 is sending a heartbeat signal 650, the heartbeat timer is reset 655 and the loop continues.
If none of the above (e.g., an unknown packet/signal was received), an error is recorded and appropriate actions taken to restore the system to level of operation such as a complete reset, etc.
Referring to
The exemplary system of the body worn device 40 is shown in its simplest form, having a single processor 60 (e.g., controller, microcontroller, microprocessor, etc.). Many different computer architectures are known that accomplish similar results in a similar fashion and the present invention is not limited in any way to any particular processing element. In exemplary circuitry of the body worn device 40, a processor 60 executes or runs stored programs that are generally stored for execution within a memory 820. The processor 60 is any processor, for example an Intel 80051 single chip processor or the like. The memory 820 is connected to the processor by a memory bus 815 and is any memory 820 suitable for connection with the selected processor 60, such as SRAM, DRAM, SDRAM, RDRAM, DDR, DDR-2, etc. Also connected to the processor 60 is a system bus 830 for connecting to peripheral subsystems. In general, the non-volatile memory 825 is interfaced to the processor 60 through the system bus 830 and is used to store programs, executable code and data persistently. Examples of persistent storage include core memory, FRAM, flash memory, etc.
In embodiments in which Global Positioning is included, a positioning system 94 (e.g. GPS) is interfaced to the processor 60 by the system bus 830. In such, the processor controls the positioning system 94 operation by sending commands to the positioning system 94 over the system bus 830 and receiving status and data back in a similar manner (e.g. latitude and longitude).
The Radio Frequency Detection subsystem 80 is also interfaced to the processor 60 by the system bus 830. In such, the processor controls the operation of the Radio Frequency Detection subsystem 80 by sending commands to the Radio Frequency Detection subsystem 80 over the system bus 830 and receiving status and data back in a similar manner (e.g. signal frequency and strength).
The jammer 980 is also interfaced to the processor 60 by the system bus 830. In such, the processor controls the operation of the jammer 980 by sending commands to the jammer 980 over the system bus 830 and receiving status and data back in a similar manner (e.g. jamming frequency and output strength). Responsive, the jammer 980 selectively emits the jamming signal 921 to preclude or limit usage of the offending device 12.
The tamper detection subsystem 90 is also interfaced to the processor 60 by, for example, the system bus 830 (or through an input/output port, etc.). In such, the processor controls the operation of the tamper detection subsystem 90 by sending commands to the tamper detection subsystem 90 over the system bus 830 and receiving status and data back in a similar manner (e.g. intact or “device removed from body,” etc.).
The circuitry 50 of the body worn device 40 communicates with the land based system (e.g. base stations 110) through a wireless interface and wireless transceiver 70. The wireless interface and wireless transceiver 70 is also interfaced to the processor 60 by, for example, the system bus 830 (or through an input port, etc.). In such, the processor communicates with and controls the operation of the wireless interface and wireless transceiver 70 by sending commands and data to the wireless interface and wireless transceiver 70 over the system bus 830 and receiving status and data back in a similar manner.
Although a specific architecture is shown connecting the various subsystems 94/80/90/825/70 to the processor 60, any known interface is anticipated including, but not limited to, parallel bus architectures, serial bus architectures, parallel/serial bus architectures, input/output port interfaces, Inter-Integrated Circuit links (I2C—two-wire interface), etc.
In some embodiments, a sound emitting device 97 is interfaced to the processor 60, in this example, through an output pin, though any form of connection is anticipated, including an interface to the bus 830. Any type of sound emitting device 97 is anticipated such as a piezoelectric element, speaker, electromechanical vibrator, indirect sound emitter, etc. In some embodiments, the sound emitting device is driven directly by the processor 60; while in other embodiments, the sound emitting device includes driver circuitry such as an oscillator and/or power amplifier.
Referring to
The exemplary base station 110 as shown in its simplest form has a single processor for the base station controller 900 (e.g., controller, microcontroller, microprocessor, etc.). Many different computer architectures are known that accomplish similar results in a similar fashion and the present invention is not limited in any way to any particular processing element 900. In exemplary systems, a processor (the base station controller 900) executes or runs stored programs that are generally stored for execution within a memory 920. The processor (the base station controller 900) is any processor. The memory 920 is connected to the processor by a memory bus 915 and is any memory 920 suitable for connection with the selected processor 900, such as SRAM, DRAM, SDRAM, RDRAM, DDR, DDR-2, etc. Also connected to the processor 900 is a system bus 930 for connecting to peripheral subsystems. In general, the secondary storage 925 is interfaced to the processor 900 through the system bus 930 and is used to store programs, executable code and data persistently. Examples of secondary storage 925 include semiconductor disks, rotating media, hard disks, CD-ROM, DVD-RW, CD-RW, flash memory, etc.
The base station 110 communicates with the body worn devices 40 through a wireless interface and transceiver 935. The wireless interface and transceiver 935 is preferably interfaced to the processor 900 by, for example, the system bus 930 but alternately interfaces through an input port, etc. The processor 900 communicates with and controls the operation of the wireless interface and transceiver 935 by sending commands and data to the wireless interface and transceiver 935 over the system bus 930 and receiving status and data back in a similar manner.
For completeness, optional input and output devices 991/993 are shown such as a display 991 and a keyboard 993, though many different back end architectures are anticipated including one or more processors/computer systems, linked together for distribution and/or redundancy reasons along with a variety of input and output devices optionally including any or all of card readers, badge readers, indicator lights, lighting control systems, audible alarms, interfaces to cell locking systems, interfaces to door locking systems, camera systems, motion detection systems, door open/closed detection systems, etc.
In some embodiments, the base station 110 also includes tamper detection 985 similar or different from the tamper detection subsystem 90 of the body worn device 40. In such, intrusion into the base station 110 and/or relocation of the base station outside of a given allowed area is determined, recorded, and/or alerted. For example, in one embodiment, the tamper detection 985 includes a positioning device (e.g., GPS) that constantly monitors the location of the base station 110. If the base station 110 is moved to a new location that is outside of a predetermined area, alerts are made such as transmitting an alert to other base stations 110 or repeaters 100, locking/encrypting data, etc. Other types of base station tamper detectors 985 are anticipated, including, but not limited to, motion sensors, accelerometers, etc. It is also anticipated that the base station 110 be physically affixed to furniture to reduce chances of removal.
In some embodiments, the base station 110 (and/or the repeaters 100) is/are mobile devices, allowing for the base station 110 to be portable and carried by guards, staff, etc.
Equivalent elements can be substituted for the ones set forth above such that they perform in substantially the same manner in substantially the same way for achieving substantially the same result.
It is believed that the system and method as described and many of its attendant advantages will be understood by the foregoing description. It is also believed that it will be apparent that various changes may be made in the form, construction and arrangement of the components thereof without departing from the scope and spirit of the invention or without sacrificing all of its material advantages. The form herein before described being merely exemplary and explanatory embodiment thereof. It is the intention of the following claims to encompass and include such changes.
Number | Name | Date | Kind |
---|---|---|---|
5218716 | Comroe et al. | Jun 1993 | A |
5295180 | Vendetti et al. | Mar 1994 | A |
5515042 | Nelson | May 1996 | A |
5959533 | Layson et al. | Sep 1999 | A |
6011973 | Valentine et al. | Jan 2000 | A |
6195529 | Linz et al. | Feb 2001 | B1 |
6222458 | Harris | Apr 2001 | B1 |
6381533 | Crane et al. | Apr 2002 | B1 |
6393254 | Pousada Carballo et al. | May 2002 | B1 |
6490455 | Park et al. | Dec 2002 | B1 |
6502022 | Chastain et al. | Dec 2002 | B1 |
6542730 | Hosain | Apr 2003 | B1 |
6556810 | Suzuki | Apr 2003 | B2 |
6643517 | Steer | Nov 2003 | B1 |
6687497 | Parvulescu et al. | Feb 2004 | B1 |
6687506 | Girod | Feb 2004 | B1 |
6701158 | Moreth | Mar 2004 | B2 |
6728542 | Meda | Apr 2004 | B2 |
6771946 | Oyaski | Aug 2004 | B1 |
6832093 | Ranta | Dec 2004 | B1 |
7027619 | Pavlidis et al. | Apr 2006 | B2 |
7123874 | Brennan | Oct 2006 | B1 |
7162285 | Owens et al. | Jan 2007 | B2 |
7181229 | Singh et al. | Feb 2007 | B2 |
7187952 | Lin | Mar 2007 | B2 |
7187953 | Bauchot et al. | Mar 2007 | B2 |
7292848 | Mazzara, Jr. et al. | Nov 2007 | B2 |
7653385 | Arend et al. | Jan 2010 | B2 |
7715854 | Bogart | May 2010 | B2 |
7876205 | Catten et al. | Jan 2011 | B2 |
7949296 | Arend et al. | May 2011 | B2 |
8019354 | Rae et al. | Sep 2011 | B2 |
8019384 | Shah | Sep 2011 | B2 |
8089923 | Ito et al. | Jan 2012 | B2 |
8131205 | Rosen | Mar 2012 | B2 |
8981925 | Chapin et al. | Mar 2015 | B2 |
20010050614 | Yang | Dec 2001 | A1 |
20030137408 | Breiner | Jul 2003 | A1 |
20040077339 | Martens | Apr 2004 | A1 |
20040198306 | Singh et al. | Oct 2004 | A1 |
20040246139 | Harris | Dec 2004 | A1 |
20050222933 | Wesby | Oct 2005 | A1 |
20060099940 | Pfleging et al. | May 2006 | A1 |
20060105701 | Cornwell | May 2006 | A1 |
20060252432 | Gruchala et al. | Nov 2006 | A1 |
20060286930 | Rathus et al. | Dec 2006 | A1 |
20070026850 | Keohane et al. | Feb 2007 | A1 |
20070035384 | Belcher et al. | Feb 2007 | A1 |
20070171047 | Goodman et al. | Jul 2007 | A1 |
20070254632 | Beadle et al. | Nov 2007 | A1 |
20070281603 | Nath et al. | Dec 2007 | A1 |
20080043993 | Johnson | Feb 2008 | A1 |
20090215387 | Brennan et al. | Aug 2009 | A1 |
20110059688 | Noonan et al. | Mar 2011 | A1 |
20120242501 | Tran | Sep 2012 | A1 |
20120309288 | Lu | Dec 2012 | A1 |
20130150004 | Rosen | Jun 2013 | A1 |
20130316638 | Jang | Nov 2013 | A1 |
20170026147 | Smith | Jan 2017 | A1 |