Wireless communications control in a controlled environment facility
First Claim
1. A system comprising:
- a multi-path mesh network of wireless nodes, wherein said network of wireless nodes comprises a plurality of wireless nodes disposed to passively monitor RF signals emitted from wireless devices within at least a portion of a controlled environment facility; and
an information processing platform separate from and in communication with said network of wireless nodes and operable to process information provided by one or more of said wireless node, and provide location information specific to an unauthorized wireless device disposed in said controlled environment facility, wherein said one or more wireless node is further adapted to alert one or more neighboring wireless node, upon detection of a signal from said unauthorized wireless device, said one or more neighboring wireless node being a part of said network of wireless nodes, the unauthorized wireless device being identified as such through a comparison between identification information corresponding to the unauthorized wireless device and identification information corresponding to one or more wireless devices registered with the information processing platform.
27 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods which facilitate wireless communications within a controlled environment in a controlled manner are shown. Embodiments operate to recognize wireless communications terminating within a controlled environment facility and control one or more aspects of the communications. Embodiments also operate to detect wireless devices disposed within a controlled environment facility and determine the location of the wireless devices. Embodiments deploy one or more wireless communication nodes in communication with an information processing platform operating in association with the controlled environment facility, such that wireless devices detected by the wireless communication nodes are located by the call processing platform and wireless communications passing through the wireless communication nodes are subject to call processing by the information processing platform.
-
Citations
38 Claims
-
1. A system comprising:
-
a multi-path mesh network of wireless nodes, wherein said network of wireless nodes comprises a plurality of wireless nodes disposed to passively monitor RF signals emitted from wireless devices within at least a portion of a controlled environment facility; and an information processing platform separate from and in communication with said network of wireless nodes and operable to process information provided by one or more of said wireless node, and provide location information specific to an unauthorized wireless device disposed in said controlled environment facility, wherein said one or more wireless node is further adapted to alert one or more neighboring wireless node, upon detection of a signal from said unauthorized wireless device, said one or more neighboring wireless node being a part of said network of wireless nodes, the unauthorized wireless device being identified as such through a comparison between identification information corresponding to the unauthorized wireless device and identification information corresponding to one or more wireless devices registered with the information processing platform. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A method comprising:
-
detecting a signal emitted by an unauthorized wireless device using one or more wireless node, wherein said one or more wireless node is part of a multi-path mesh network of a plurality of wireless nodes that passively monitor RF signals emitted from wireless devices within at least a portion of a controlled environment facility, the unauthorized wireless device being identified as such by comparing identification information corresponding to the unauthorized wireless device with identification information corresponding to one or more wireless devices registered with the controlled environment facility; alerting one or more neighboring wireless node, using said one or more wireless node, to prompt said one or more neighboring wireless node to aid in locating said unauthorized wireless device, wherein said one or more neighboring wireless node are part of said network of wireless nodes; collecting data associated with said signal, wherein said data associated with said signal is collected by said one or more wireless node and said one or more neighboring wireless node; and determining the location of said unauthorized wireless device using said data. - View Dependent Claims (17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29)
-
-
30. A system comprising:
a multi-path mesh network of a plurality of wireless nodes disposed to passively monitor RF signals emitted from wireless devices within at least a portion of a controlled environment facility, each of the plurality of wireless nodes operating in either an awake mode or sleep mode, upon detection of an unauthorized wireless device the wireless nodes activate one or more neighboring wireless nodes, the one or more neighboring wireless node being part of said network of wireless nodes, wherein said wireless nodes are further adapted to alert one or more neighboring wireless node to prompt said one or more neighboring wireless node to aid in locating said unauthorized wireless device, the unauthorized wireless device being identified as such through a comparison between identification information corresponding to the unauthorized wireless device and identification information corresponding to one or more wireless devices registered with the controlled environment facility. - View Dependent Claims (31)
-
32. A method comprising:
-
detecting an unauthorized wireless device using one or more wireless node disposed to monitor at least a portion of a controlled environment facility, wherein said one or more wireless node is part of a multi-path mesh network of wireless nodes deployed in association with said controlled environment facility, the wireless nodes passively monitor RF signals emitted from wireless devices, the unauthorized wireless device being identified as such by comparing identification information corresponding to the unauthorized wireless device with identification information corresponding to one or more wireless devices registered with the controlled environment facility; intercepting a wireless communication placed from or to said unauthorized wireless device using at least one wireless node disposed to illuminate at least a portion of said controlled environment facility, wherein said at least one wireless node is part of said network of wireless nodes; alerting one or more neighboring wireless node using said one or more wireless node to prompt said one or more neighboring wireless node to aid in locating said unauthorized wireless device, wherein said one or more neighboring wireless node is part of said network of wireless nodes; and collecting data associated with said signal using said one or more wireless node and said one or more neighboring wireless node. - View Dependent Claims (33, 34, 35, 36, 37, 38)
-
Specification