Aspects for identifying and locating contraband telecommunication devices are disclosed. In one such aspect, a system for locating unauthorized wireless devices may be deployed at a secured facility. The system contains base stations, and a processing system configured to identify wireless networks in a facility; obtain a transmission plan for detecting wireless devices at the facility; detect the wireless devices in the facility by executing the transmission plan on the identified wireless networks and free space in the facility; compare the detected wireless devices against a list of known authorized wireless devices to identify unauthorized devices; interrogate the identified potential unauthorized devices at multiple time intervals; extract at least an identifier for one of the identified potential unauthorized devices based on the results of the interrogation; and determine an estimated location of the identified unauthorized devices based on the results from the interrogation
The system manages communication of cellular devices within a secured facility using a shielded box that blocks external RF signals. Inside the box, internal antennas broadcast cellular network signals that mimic a carrier's base station, prompting any placed device to connect. When a device attempts access, the system collects its identifying information and compares it with an authorized-device database stored locally or in the cloud. If the information matches, the device is logged as authorized. A facility network controller then regulates all incoming and outgoing wireless transmissions. When it detects identifying data from a logged authorized device, it permits and manages the transmission to its intended destination. The system offers secure, low-cost, and reliable identification and management of cellular devices in secured facilities by isolating devices, extracting immutable identifiers, registering authorized devices, and enabling carrier-level blocking of unauthorized or contraband transmissions without continuous on-site monitoring or network “bleed” issues.
Aspects for verifying an identification of a cellular device are disclosed. In one such aspect, a method for managing cellular devices may include: receiving a cellular device in an RF containment space configured to provide an electronically isolated environment by blocking electromagnetic waves or radio frequency (RF) wave; providing, on a display, a graphical user interface (GUI); transmitting one or more cellular network signals configured to emulate at least one base station of a telecommunication carrier to cause the cellular device to initiate connecting to a network set up by a virtual base station coupled to the RF containment space; in response to the cellular device attempting to gain access to the network, obtaining device information from the cellular device placed in the RF containment space via the one or more cellular network signal; and extracting and storing identification information from the device information in the log.
H04W 8/22 - Traitement ou transfert des données du terminal, p. ex. statut ou capacités physiques
G01R 29/08 - Mesure des caractéristiques du champ électromagnétique
H04W 8/18 - Traitement de données utilisateur ou abonné, p. ex. services faisant l'objet d'un abonnement, préférences utilisateur ou profils utilisateurTransfert de données utilisateur ou abonné
4.
DETECTING UNAUTHORIZED TELECOMMUNICATION DEVICES AT A SECURED FACILITY
Aspects for verifying an identification of a cellular device are disclosed. In one such aspect, a system for identifying cellular devices may comprise a box configured to provide an electronically isolated environment by blocking electromagnetic waves or radio frequency (RF) waves such that a cellular device is electronically isolated from outside the box when placed in the box. The system may further comprise one or more processors configured to cause the box to transmit, using one or more internal antennas, cellular network signals configured to emulate at least one base station of a telecommunication carrier to cause the cellular device to connect to a network set up by the base station when the cellular device is placed in the box, and in response to the cellular device attempting to gain access to the network, obtain an electronic identifier from the cellular device via the one or more cellular network signals.
Aspects for identifying and locating contraband telecommunication devices are disclosed. In one such aspect, a system contains one or more base stations, and a processing system configured to identify wireless networks in a facility; obtain a transmission plan for detecting wireless devices at the facility; detect the wireless devices in the facility by executing the transmission plan on the identified wireless networks and free space in the facility; compare the detected wireless devices against a list of known authorized wireless devices to identify unauthorized devices; interrogate the identified potential unauthorized devices at multiple time intervals; extract at least an identifier for one of the identified potential unauthorized devices based on the results of the interrogation to identify at least one unauthorized device associated with the extracted identifier; and determine an estimated location of the identified unauthorized devices based on the results from the interrogation.
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Communication services, namely, transmission of voice, audio, visual images and data by telecommunications networks, wireless communication networks, the Internet, information services networks and data networks; communication services, namely, wireless electronic transmission of voice, audio, visual images, text, and data, used in connection with detection and extraction of contraband; data transmission and reception services via telecommunication means; Information transmission via electronic communications networks Providing a web-based service featuring technology that allows detection and disabling of unauthorized electronic devices and detection and extraction of contraband on said electronic devices and detection and disabling of unauthorized electronic devices and detection and extraction of contraband on said electronic devices all within secure facilities, namely, correctional facilities, military facilities, sensitive compartmented information facilities, and commercial facilities
7.
MOBILE ASSESSTMENTS FOR CARRIER-BASED BLOCKING OF CONTRABAND WIRELESS DEVICES
Aspects for initial mobile assessments for use in carrier-based blocking of contraband telecommunication devices are disclosed. In one such aspect, a contractor performs an initial assessment at a correctional facility using memory and a rapid deployable network including a controller configured to regulate wireless transmissions from or to the facility. The system systematically gathers information from the facility as to authorized wireless devices. The controller allows wireless transmissions to and from authorized devices to pass between the wireless device and a remote location via the network. Conversely, the controller blocks transmissions to or from unauthorized devices. After the initial assessment and follow-up assessments, the contractor departs the facility and sends the identifying information of the unauthorized devices to at least one database for use in network carrier-level blocking of unauthorized transmissions.
G06F 3/0484 - Techniques d’interaction fondées sur les interfaces utilisateur graphiques [GUI] pour la commande de fonctions ou d’opérations spécifiques, p. ex. sélection ou transformation d’un objet, d’une image ou d’un élément de texte affiché, détermination d’une valeur de paramètre ou sélection d’une plage de valeurs
8.
Carrier-based blocking of telecommunication devices at correctional facility
Aspects for carrier-based blocking of contraband telecommunication devices are disclosed. In one such aspect, an entity (broadly referenced as a contractor) establishes a network at a correctional facility to collect raw data including telecommunications signaling and identifier data during a preconfiguration period. The data is then stored in a memory and processed by a processing system to determine devices that may be contraband. After the Department of Corrections (DOC) authorizes the activity by the contractor to control the devices, the contractor may send a list of contraband devices to the GSMA, the international carrier governing body, or an affiliate or designee thereof, to include in its database(s) this information. The carriers may prevent access by the contraband devices to remote networks by using a database from which an indicator can be provided when access is attempted.
Aspects for initial mobile assessments for use in carrier-based blocking of contraband telecommunication devices are disclosed. In one such aspect, a contractor performs an initial assessment at a correctional facility using memory and a rapid deployable network including a controller configured to regulate wireless transmissions from or to the facility. The system systematically gathers information from the facility as to authorized wireless devices. The controller allows wireless transmissions to and from authorized devices to pass between the wireless device and a remote location via the network. Conversely, the controller blocks transmissions to or from unauthorized devices. After the initial assessment and follow-up assessments, the contractor departs the facility and sends the identifying information of the unauthorized devices to at least one database for use in network carrier-level blocking of unauthorized transmissions.
Aspects for carrier-based blocking of contraband telecommunication devices are disclosed. In one such aspect, an entity (broadly referenced as a contractor) establishes a network at a correctional facility to collect raw data including telecommunications signaling and identifier data during a preconfiguration period. The data is then stored in a memory and processed by a processing system to determine devices that may be contraband. After the Department of Corrections (DOC) authorizes the activity by the contractor to control the devices, the contractor may send a list of contraband devices to the GSMA, the international carrier governing body, or an affiliate or designee thereof, to include in its database(s) this information. The carriers may prevent access by the contraband devices to remote networks by using a database from which an indicator can be provided when access is attempted.
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Communication services, namely, transmission of voice, audio, visual images and data by telecommunications networks, wireless communication networks, the Internet, information services networks and data networks; communication services namely, wireless electronic transmission of voice, audio, visual images, text, and data, used in connection with detection and extraction of contraband; data transmission and reception services via telecommunication means; Information transmission via electronic communications networks Providing a web-based service featuring technology that allows detection and disabling of unauthorized electronic devices and detection and extraction of contraband on said electronic devices and detection and disabling of unauthorized electronic devices and detection and extraction of contraband on said electronic devices all within secure facilities, namely, correctional facilities, military facilities, sensitive compartmented information facilities, and commercial facilities
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Communication services, namely, transmission of voice, audio, visual images and data by telecommunications networks, wireless communication networks, the Internet, information services networks and data networks; communication services namely, wireless electronic transmission of voice, audio, visual images, text, and data, used in connection with detection and extraction of contraband; data transmission and reception services via telecommunication means; Information transmission via electronic communications networks Providing a web-based service featuring technology that allows detection and disabling of unauthorized electronic devices and detection and extraction of contraband on said electronic devices and detection and disabling of unauthorized electronic devices and detection and extraction of contraband on said electronic devices all within secure facilities, namely, correctional facilities, military facilities, sensitive compartmented information facilities, and commercial facilities
A Managed Access System (MAS) at a correctional facility includes a local database for storing data relevant to authorized and unauthorized cellular communications activity, and a graphical user interface (GUI) for accessing the data and adjusting MAS settings. The local database is capable of synchronization with a remote database at a central facility. The central facility may include a processing system having code for monitoring the MAS and, in some configurations, additional MASs located at other correctional facilities. The code and the remote database may be configured to interface with the local databases at these other correctional facilities. A synchronization operation between the remote database and one or more local databases may be performed by a user with appropriate permissions. In this manner, an authorized user at the central facility can access the different MAS systems at different correctional facilities and manage the data or settings.
H04M 1/66 - Équipement de sous-station, p. ex. pour utilisation par l'abonné avec des moyens pour empêcher les appels non autorisés ou faux appels
G06F 3/0484 - Techniques d’interaction fondées sur les interfaces utilisateur graphiques [GUI] pour la commande de fonctions ou d’opérations spécifiques, p. ex. sélection ou transformation d’un objet, d’une image ou d’un élément de texte affiché, détermination d’une valeur de paramètre ou sélection d’une plage de valeurs
H04M 3/22 - Dispositions de supervision, de contrôle ou de test
H04W 4/021 - Services concernant des domaines particuliers, p. ex. services de points d’intérêt, services sur place ou géorepères
H04M 7/00 - Dispositions d'interconnexion entre centres de commutation
H04L 29/08 - Procédure de commande de la transmission, p.ex. procédure de commande du niveau de la liaison