US20140066012A1 - Small cell service delivery platform usage compliance - Google Patents

Small cell service delivery platform usage compliance Download PDF

Info

Publication number
US20140066012A1
US20140066012A1 US14/075,072 US201314075072A US2014066012A1 US 20140066012 A1 US20140066012 A1 US 20140066012A1 US 201314075072 A US201314075072 A US 201314075072A US 2014066012 A1 US2014066012 A1 US 2014066012A1
Authority
US
United States
Prior art keywords
cellular
controlled area
monitoring system
cellular device
small cells
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US14/075,072
Inventor
Jeffrey M. Sweeney
Kelsyn Rooks
Jeff Stafford
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
CenturyLink Intellectual Property LLC
Original Assignee
CenturyLink Intellectual Property LLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by CenturyLink Intellectual Property LLC filed Critical CenturyLink Intellectual Property LLC
Priority to US14/075,072 priority Critical patent/US20140066012A1/en
Assigned to EMBARQ HOLDINGS COMPANY, LLC reassignment EMBARQ HOLDINGS COMPANY, LLC ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: STAFFORD, JEFF, SWEENEY, JEFFREY M., ROOKS, KELSYN D.S.
Assigned to CENTURYLINK INTELLECTUAL PROPERTY LLC reassignment CENTURYLINK INTELLECTUAL PROPERTY LLC CHANGE OF NAME (SEE DOCUMENT FOR DETAILS). Assignors: EMBARQ HOLDINGS COMPANY, LLC
Publication of US20140066012A1 publication Critical patent/US20140066012A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/02Access restriction performed under specific conditions
    • H04W48/04Access restriction performed under specific conditions based on user or terminal location or mobility data, e.g. moving direction, speed
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/04Large scale networks; Deep hierarchical networks
    • H04W84/042Public Land Mobile systems, e.g. cellular systems
    • H04W84/045Public Land Mobile systems, e.g. cellular systems using private Base Stations, e.g. femto Base Stations, home Node B

Definitions

  • the disclosed embodiments are related to the field of cellular technology.
  • the disclosed embodiments provide an apparatus, method, and computer program product for managing cellular usage in controlled areas including penitentiaries, schools, nuclear facilities, military bases, and other high security areas.
  • Cellular usage in a high security area poses a security risk.
  • the majority of cellular phones today may include video and/or still image cameras that may enable a recording and/or photographs to be taken of confidential information.
  • the ability for inmates to place unmonitored cellular calls poses an obvious security risk in penitentiaries. For instance, a recent published article stated that officials at a Texas prison have confiscated more than three hundred contraband cell phones in recent years. The cell phones are being smuggled in by visitors, corrupt prison guards, and, in some cases, carrier pigeon.
  • cellular usage in certain places may be distracting or prohibited.
  • cellular usage in a classroom or school campus may disrupt classes, distract students, or provide a means for cheating on exams.
  • the disclosed embodiments seek to address some of the problems associated with having uncontrolled cellular usage.
  • Embodiments of the disclosed invention include an apparatus, method, and computer program product for managing cellular usage in controlled areas.
  • a method executed by a cellular monitoring system for managing cellular usage in a controlled area includes the steps of configuring a size of the controlled area by varying the signal strengths associated with the one or more small cells; identifying a cellular device within signal range of one or more small cells placed in the controlled area; determining whether the cellular device is an authorized device within the controlled area; and alerting security personnel in response to determination that the cellular device is not an authorized device within the controlled area.
  • FIG. 1 depicts an embodiment of a network environment in which the illustrative embodiments may be implemented
  • FIG. 2 depicts an embodiment of a femto cell in accordance with the illustrative embodiments
  • FIG. 3 depicts an embodiment of a cellular monitoring system for managing cellular communications in a controlled area in accordance with some of the disclosed embodiments
  • FIG. 4 depicts another embodiment of a femto cell for managing cellular communications in a controlled area in accordance with certain of the disclosed embodiments.
  • FIG. 5 depicts an embodiment of a process for managing cellular usage in a controlled area in accordance with some of the disclosed embodiments.
  • Embodiments of the disclosed invention include a system, method, and computer program product for managing cellular usage in controlled areas.
  • a controlled area is defined as an area where cellular communication may be intentionally restricted by authorities in control of the area.
  • controlled areas may include, but are not limited to, a prison facility, a school campus/classroom, a workplace, and/or a private viewing of a show.
  • certain of the disclosed embodiments may be utilized to simply detect the presence of unauthorized cellular devices within a controlled area.
  • the disclosed embodiments may be used to block cellular usage of all or unauthorized devices within the controlled area and/or record communications associated with cellular devices within a controlled area.
  • FIGS. 1-5 of the drawings like numerals being used for like and corresponding parts of the various drawings.
  • Other features and advantages of the disclosed embodiments will be or will become apparent to one of ordinary skill in the art upon examination of the following figures and detailed description. It is intended that all such additional features and advantages be included within the scope of the disclosed embodiments.
  • the illustrated figures are only exemplary and not intended to assert or imply any limitation with regard to the environment, architecture, design, or process in which different embodiments may be implemented.
  • FIG. 1 depicts an embodiment of a network environment 100 in which the illustrative embodiments may be implemented.
  • a cellular monitoring system 300 communicates with one or more femto cells 200 placed in one or more locations within a controlled area 140 .
  • the one or more femto cells 200 may be placed in strategic locations within controlled area 140 for restricting cellular communications to a particular location or locations within controlled area 140 .
  • the particular size of a controlled area may be determined by varying the signal strengths associated with one or more of the femto cells and/or by modifying the number and/or location of femto cells within the controlled area.
  • a femto cell is a miniature cellular signal transmission device that communicates directly with cellular devices and routes cellular communications associated with the cellular devices over an IP network, such as the Internet, for facilitating cellular communications.
  • Femto cells may be utilized to provide and/or improve cellular service to cellular devices that are located in areas that do not receive adequate cellular coverage.
  • femto cells 200 may comprise one or more femto cells capable of communicating with a plurality of cellular devices on a plurality of different cellular frequencies and network technology.
  • femto cells 200 may include a universal femto cell capable of communicating with cellular devices on a 850 MHz Global System for Mobile Communications (GSM) network, a 1900 MHz GSM network, a 1900 MHz Code-Division Multiple Access (CDMA) network, and a 700 MHz 3G network.
  • GSM Global System for Mobile Communications
  • CDMA Code-Division Multiple Access
  • femto cells 200 may comprise a plurality of single service provider femto cells, each capable of communicating with cellular devices on a single service provider cellular network.
  • femto cells 200 may be configured to support cellular communications with a cellular device 142 over a first cellular frequency/network technology and support cellular communication with a cellular device 144 over a second cellular frequency/network technology.
  • Femto cells 200 act like regular cell towers, except that femto cells 200 backhaul the voice or data communications associated with a mobile device over an IP network instead of using cellular terrestrial towers. Similar to how cellular communications is handed off from one cellular terrestrial tower to the next closest cellular terrestrial tower, in one embodiment, when a mobile communication device is within signal range of femto cells 200 , the cellular communication associated with the mobile device is automatically handed off to femto cells 200 . Accordingly, in a preferred embodiment, all cellular communications of mobile devices within signal range of femto cells 200 are automatically routed through femto cells 200 based on the configuration settings of femto cells 200 .
  • femto cells 200 route the all cellular communications for cellular devices located within controlled area 140 to cellular monitoring system 300 via IP network 110 for enabling cellular monitoring system 300 to control cellular usage within controlled area 140 .
  • femto cells 200 may route all cellular communications to cellular monitoring system 300 over a direct wired or wireless connection.
  • femto cells 200 may route information pertaining to the cellular communication, such as, but not limited to, an identifier of the calling device and a calling number, to cellular monitoring system 300 instead of routing the entire cellular communication to cellular monitoring system 300 .
  • cellular monitoring system 300 merely gathers information instead of handling the actual routing the cellular communications.
  • IP network 110 may include one or more data networks, such as, but not limited to, the Internet, for routing communications between one or more communication devices and/or data processing systems.
  • the Internet is a global system of interconnected computer networks that interchange data using the standardized Internet Protocol Suite (TCP/IP).
  • IP network 110 may include other types of data networks, such as, but not limited to, an intranet, a private local area network (LAN), a wide area network (WAN), and a wireless local area network (WLAN).
  • LAN local area network
  • WAN wide area network
  • WLAN wireless local area network
  • IP network 110 may communicate with other types of network, such as, but not limited to, cellular network 120 and landline telephone network 130 for routing cellular communications to and from femto cells 200 .
  • cellular network 120 may include one or more GSM networks, CDMA networks, an Enhanced Data GSM Environment (EDGE) network, and a 3G/4G network, each for facilitating voice communications to cellular devices, such as, cellular device 122 .
  • GSM networks Global System for Mobile communications
  • CDMA networks Code Division Multiple Access (EDGE) network
  • EDGE Enhanced Data GSM Environment
  • 3G/4G network 3G/4G network
  • Landline telephone network 130 may include a public switched telephone network (PSTN) for facilitating voice communication landline telephone devices, such as, telephone 132 .
  • PSTN public switched telephone network
  • the public switched telephone network is the standard analog telephone network utilized by most homes.
  • landline telephone network 130 may also include digital telephone networks, such as, but not limited to, an integrated services digital network (ISDN) and a fiber distributed data interface (FDDI) network.
  • ISDN integrated services digital network
  • FDDI fiber distributed data interface
  • cellular monitoring system 300 may include logic for communicating with a web server 112 for receiving configurations from a user 102 .
  • logic is defined as hardware, software, and/or a combination thereof.
  • user 102 may utilize a computer 104 to access a website/portal hosted on web server 112 for remotely configuring cellular monitoring system 300 .
  • user 102 may locally configure cellular monitoring system 300 .
  • femto cell 200 includes a system-on-a-chip (SoC) 201 .
  • SoC 201 may integrate all or a majority of the components of femto cell 200 , such as, but not limited to, one or more processors/microprocessors 202 and memory 204 (e.g., RAM), into a single integrated circuit chip.
  • SoC 201 may include an analog-to-digital converter (ADC) and a digital-to-analog converter (DAC) 206 for converting between analog signals and digital format.
  • ADC analog-to-digital converter
  • DAC digital-to-analog converter
  • femto cell 200 may include one or more data storage units 210 , such as, but not limited to, a hard disk drive for storing executable instructions 212 and/or other data, such as, but not limited to, access rules, routing tables, and quality of service (QoS) rules for intelligent routing.
  • executable instructions 212 may include executable instructions for authenticating user access and for routing all cellular communications within controlled area 140 to cellular monitoring system 300 via network interface 240 .
  • Network interface 240 may be a network interface card, such as, but not limited to, a modem, an Ethernet card, and/or a wireless network interface card for connecting femto cell 200 to IP network 110 .
  • femto cell 200 may include a cellular transceiver 220 for communicating cellular signals between femto cell 200 and one or more cellular devices within signal range of femto cell 200 , such as, cellular device 142 .
  • femto cell 200 may be configured to communicate with cellular device 142 on a control channel to determine the mobile identification number (MIN) or international mobile equipment identity (IMEI) associated with cellular device 142 .
  • MIN mobile identification number
  • IMEI international mobile equipment identity
  • a control channel is a channel carrying network information rather than the actual voice or data messages transmitted over the network for enabling cellular devices to identify themselves and their location to the cellular networks.
  • femto cell 200 may pass the MIN or IMEI associated with cellular device 142 to cellular monitoring system 300 to determine whether cellular device 142 is an authorized cellular device within controlled area 140 .
  • femto cell 200 may include multiple cellular transceivers, such as, optional cellular transceiver 222 .
  • optional cellular transceiver 222 may be configured to operate on a different service provider cellular network than that associated with cellular transceiver 220 .
  • femto cell 200 may include a radio frequency (RF) transceiver 224 .
  • radio frequency transceiver 224 supports the Wireless Application Protocol (WAP) and/or Wi-Fi standard for enabling wireless data communication with one or more wireless Internet accessible devices, such as, but not limited to, a laptop computer and/or a PDA device with Wi-Fi capabilities.
  • WAP Wireless Application Protocol
  • user 102 may utilize laptop computer 104 to remotely configure cellular monitoring system 300 via femto cell 200 .
  • femto cell 200 may include one or more external data ports 220 (e.g., a USB port) for transferring and/or storing data on an external data storage unit and/or for connecting femto cell 200 to an external device.
  • external data ports 220 e.g., a USB port
  • FIG. 3 depicts an embodiment of cellular monitoring system 300 for managing cellular communications in a controlled area in accordance with some of the disclosed embodiments.
  • cellular monitoring system 300 includes, among other components, a processing unit 302 , memory 304 , and at least one data storage unit 310 .
  • Processing unit 302 serves to execute computer executable instructions stored in memory 304 and/or data storage unit 310 .
  • processing unit 302 may include one or more processing cores, such as, but not limited to, a microcontroller, microprocessor, or digital signal processor, for executing instructions and processing data for managing cellular communications within a controlled area.
  • memory 304 may be volatile memory. Volatile memory is memory that requires power to maintain stored information.
  • memory 304 may be random access memory (RAM). Random access memory stores currently executing instructions and/or other data utilized by an operating system, software application and/or hardware device.
  • data storage unit 310 may be non-volatile memory, such as, but not limited to, a hard disk drive, for storing data.
  • data storage unit 310 may store computer executable instructions 320 and/or other data.
  • computer executable instructions 320 may include executable instructions associated with a cellular management application 118 for managing cellular usage in a controlled area.
  • data storage unit 310 may include one or more databases, such as, but not limited to, an authorized devices database 352 , a recorded communications database 354 , and an accounts database 356 .
  • the depicted databases may be stored on one or more remote systems and/or the data contained in the databases may be stored in other types of data structures, such as, but not limited to, a data table, a linked list, and/or an array.
  • cellular monitoring system 300 may also include one or more external data ports 330 .
  • external data ports 330 may include a universal serial bus (USB) port for connecting one or more USB devices to cellular monitoring system 300 , such as, but not limited to, a USB flash drive for providing external data storage.
  • cellular monitoring system 300 may include one or more input/output (I/O) ports 306 .
  • input/output ports 306 may include communication ports for coupling one or more input/output device to cellular monitoring system 300 , such as, but not limited to, a monitor, a keyboard, and a mouse.
  • cellular monitoring system 300 may include a network interface 340 .
  • network interface 340 may be a network interface card, such as, but not limited to, an Ethernet card for connecting cellular monitoring system 300 to a network, such as, but not limited to, IP network 110 .
  • cellular management application 118 may include a configuration module 332 .
  • configuration module 332 may comprise computer executable instructions for configuring cellular monitoring system 300 .
  • configuration module 332 may include instructions for interfacing with a front-end system, such as, but not limited to, web server 112 for receiving user specified configuration parameters.
  • a user may configure cellular monitoring system 300 to block all cellular communications within a controlled area.
  • a user may configure cellular monitoring system 300 to enable cellular communications to only authorized cellular devices and/or to only authorized calling numbers (e.g., 911 calls only and/or other user-specified numbers).
  • configuration module 332 may comprise computer executable instructions for enabling a user to edit a list of authorized cellular devices stored in authorized devices database 352 .
  • cellular management application 118 may include an alert module 334 .
  • alert module 334 may comprise computer executable instructions for alerting security personnel of unauthorized cellular devices in a controlled area.
  • a user may configure alert module 334 to alert the appropriate personnel either via text message, email, voice recording, and/or via an audible alarm.
  • the alert message may contain information about the unauthorized device, such as, but not limited to, the mobile identification number associated with the unauthorized device and an approximate location of the unauthorized device.
  • the alert message may include location information of the unauthorized device based on the location of the detecting femto cell within the controlled area.
  • alert module 334 may communicate with a cellular service provider subscriber database to determine a subscriber name associated with the unauthorized device.
  • alert module 334 may comprise computer executable instructions for blocking cellular communications associated with the unauthorized device.
  • alert module 334 may comprise computer executable instructions for transmitting a text message or simultaneously calling one or more of the cellular devices communicating via femto cell 200 .
  • alert module 334 may be utilized to transmit an alert message to a specified group of cellular devices registered with alert module 334 or to all cellular devices informing the users of the cellular devices of an emergency, such as, but not limited to, informing prison guards of a fight in a particular area of a penitentiary or informing school personnel to lock down a school because of a security risk.
  • cellular management application 118 may also include a call monitoring module 336 .
  • call monitoring module 336 may comprise computer executable instructions for monitoring communications of authorized or unauthorized cellular devices within a controlled area.
  • call monitoring module 336 may enable authorized cellular devices to be utilized within a controlled area during specified times (e.g., during lunch hours) and/or for a specified duration (e.g., to limit personal calls to 5 minutes).
  • call monitoring module 336 may be utilized to track calling activities and monitor cellular usage. For instance, in one embodiment, authorized cellular devices may be given to a prison inmate for enabling the inmate to make calls using minutes earned in exchange for good behavior and/or work programs.
  • call monitoring module 336 tracks the duration of the call to ensure that the call does not exceed an allotted amount of time and subtracts the duration of the call from a user account stored in accounts database 356 . Further, in some embodiments, call monitoring module 336 may be configured to record communications associated with cellular devices located in a controlled area (e.g., in a prison environment). In some embodiments, cellular monitoring system 300 may store the recorded communications locally in recorded communications database 354 . Alternatively, in some embodiments, cellular monitoring system 300 may store the recorded communications on a separate device or storage unit.
  • femto cell 200 A may include all of the components as presented in femto cell 200 as described in FIG. 2 .
  • femto cell 200 A may incorporate the logic of cellular monitoring system 300 , as described above, into an all-in-one intelligent femto cell.
  • femto cell 200 A may communicate with a Web server such as Web server 112 for receiving configuration data for managing cellular usage in a controlled area, such as, but not limited to, a list of authorized cellular devices.
  • femto cell 200 A may include logic for enabling a user to configure femto cell 200 A locally.
  • a user using laptop computer 104 , may communicate wirelessly with femto cell 200 A, via radio frequency (RF) transceiver 224 , to configure femto cell 200 A.
  • RF radio frequency
  • a data processing system may communicate with femto cell 200 A using a wired connection via network interface 240 .
  • femto cell 200 A may be a stand-alone system capable of performing some or all of features of managing cellular usage in a controlled area as described above in certain embodiments.
  • FIGS. 2-4 are not intended to imply and/or restrict the architecture, functionality, and operation of other possible implementations of femto cell 200 , femto cell 200 A, and cellular monitoring system 300 that are within the scope of the disclosed embodiments.
  • other possible implementations may include additional components not depicted in FIGS. 2-4 and/or the deletion/combination of one or more of the illustrated components.
  • the depicted embodiment in FIG. 3 describes the modules as computer implemented instructions, the features and functions provided by the modules may be in any form of logic including an entirely hardware embodiment or an embodiment containing both hardware and software elements.
  • the disclosed modules may be implemented in software, including, but not limited to, firmware, resident software, and microcode, that are executed by a processor, such as, but not limited to, processing unit 302 .
  • process 500 may be executed by a data processing system, such as, cellular monitoring system 300 .
  • process 500 begins, at step 502 , by receiving a cellular identifier, such as, a phone number or international mobile equipment identifier, associated with a cellular device that is detected by a femto cell located within a controlled area.
  • a cellular identifier such as, a phone number or international mobile equipment identifier
  • the process determines whether the detected cellular device is an authorized device within the controlled area. For example, in one embodiment, the process queries an authorized cellular device database to determine whether the received cellular identifier is an authorized device.
  • the process determines that the cellular device is unauthorized, the process, at step 506 , blocks all cellular communication associated with the unauthorized cellular device.
  • the process alerts the appropriate personnel via a user-specified means, such as, but not limited to, text message, email, voice recording, and/or via an audible alarm.
  • the process monitors for cellular communication associated with the cellular device at step 510 .
  • the process may, at step 514 , determine whether the call is occurring during an authorized time.
  • the process at step 530 , blocks the inbound or outbound call from connecting, with process 500 terminating thereafter.
  • the process may log the calling information, such as, but not limited to, the time of the call and the caller identification of the second calling party, in a log file that is accessible to authorized personnel.
  • the process may automatically route all calls directly to a voicemail server associated with the cellular device (e.g., in a classroom environment).
  • the process connects the call at step 516 .
  • the process at step 518 , records the conversation between the calling parties (e.g., all calls from a prison facility are automatically recorded).
  • the process continues to monitor and record the phone conversation until a determination is made that the call has ended at step 524 .
  • the process may monitor the duration of the call at step 520 .
  • the process may, at step 522 , determine whether the call duration exceeds a specified allotted time.
  • process 500 may terminate the call, at step 526 , if the call duration exceeds a specified allotted time.
  • the process may deduct the call duration from a user account at step 528 , with process 500 terminating thereafter.
  • the disclosed embodiments provide a system and method for managing cellular usage in controlled areas.
  • certain of the disclosed embodiments enable detection of unauthorized cellular devices within a controlled area, such as, but not limited to, a prison and/or a top-secret facility.
  • the disclosed embodiments are described above with reference to flowchart illustrations, sequence diagrams, and/or block diagrams.
  • Each block of the flowchart illustrations and/or block diagrams, and combinations of blocks in the flowchart illustrations and/or block diagrams may be implemented by computer program instructions.
  • the flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present invention.
  • each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which may include one or more executable instructions for implementing the specified logical function(s).
  • each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration may be implemented entirely with hardware or as a software embodiment (including firmware, resident software, micro-code, etc.) or an embodiment combining software and hardware aspects for performing the specified functions or acts.
  • computer program instructions for executing the disclosed embodiments may also be stored in a computer-readable medium that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable medium produce an article of manufacture including instruction means which implement the function/act specified in the flowchart and/or block diagram block or blocks.
  • the computer program instructions may also be loaded onto a data processing apparatus to cause a series of operational steps to be performed on the data processing system to produce a computer implemented process such that the instructions which execute on the data processing system provide processes for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)

Abstract

Embodiments of the disclosed invention include an apparatus, method, and computer program product for managing cellular usage in controlled areas. For example, in one embodiment, a method executed by a cellular monitoring system for managing cellular usage in a controlled area is disclosed that includes the steps of configuring a size of the controlled area by varying the signal strengths associated with the one or more small cells; identifying a cellular device within signal range of one or more small cells placed in the controlled area; determining whether the cellular device is an authorized device within the controlled area; and alerting security personnel in response to determination that the cellular device is not an authorized device within the controlled area.

Description

    CROSS REFERENCE TO RELATED APPLICATIONS
  • This application is a Continuation of U.S. patent application Ser. No. 12/471,682 filed on May 26, 2009 entitled FEMTO CELL SERVICE DELIVERY PLATFORM USAGE COMPLIANCE, the entire teachings of which are incorporated herein.
  • BACKGROUND OF THE INVENTION
  • The disclosed embodiments are related to the field of cellular technology. In particular, the disclosed embodiments provide an apparatus, method, and computer program product for managing cellular usage in controlled areas including penitentiaries, schools, nuclear facilities, military bases, and other high security areas.
  • Cellular usage in a high security area poses a security risk. For example, the majority of cellular phones today may include video and/or still image cameras that may enable a recording and/or photographs to be taken of confidential information. In addition, the ability for inmates to place unmonitored cellular calls poses an obvious security risk in penitentiaries. For instance, a recent published article stated that officials at a Texas prison have confiscated more than three hundred contraband cell phones in recent years. The cell phones are being smuggled in by visitors, corrupt prison guards, and, in some cases, carrier pigeon.
  • In addition to security risks, cellular usage in certain places may be distracting or prohibited. For example, cellular usage in a classroom or school campus may disrupt classes, distract students, or provide a means for cheating on exams.
  • Therefore, the disclosed embodiments seek to address some of the problems associated with having uncontrolled cellular usage.
  • SUMMARY
  • Embodiments of the disclosed invention include an apparatus, method, and computer program product for managing cellular usage in controlled areas. For example, in one embodiment, a method executed by a cellular monitoring system for managing cellular usage in a controlled area is disclosed that includes the steps of configuring a size of the controlled area by varying the signal strengths associated with the one or more small cells; identifying a cellular device within signal range of one or more small cells placed in the controlled area; determining whether the cellular device is an authorized device within the controlled area; and alerting security personnel in response to determination that the cellular device is not an authorized device within the controlled area.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • Illustrative embodiments of the present invention are described in detail below with reference to the attached figures, which are incorporated by reference herein and wherein:
  • FIG. 1 depicts an embodiment of a network environment in which the illustrative embodiments may be implemented;
  • FIG. 2 depicts an embodiment of a femto cell in accordance with the illustrative embodiments;
  • FIG. 3 depicts an embodiment of a cellular monitoring system for managing cellular communications in a controlled area in accordance with some of the disclosed embodiments;
  • FIG. 4 depicts another embodiment of a femto cell for managing cellular communications in a controlled area in accordance with certain of the disclosed embodiments; and
  • FIG. 5 depicts an embodiment of a process for managing cellular usage in a controlled area in accordance with some of the disclosed embodiments.
  • DETAILED DESCRIPTION OF THE DRAWINGS
  • Embodiments of the disclosed invention include a system, method, and computer program product for managing cellular usage in controlled areas. As referenced herein, a controlled area is defined as an area where cellular communication may be intentionally restricted by authorities in control of the area. For example, controlled areas may include, but are not limited to, a prison facility, a school campus/classroom, a workplace, and/or a private viewing of a show. As will be further described, in some embodiments, certain of the disclosed embodiments may be utilized to simply detect the presence of unauthorized cellular devices within a controlled area. In other embodiments, the disclosed embodiments may be used to block cellular usage of all or unauthorized devices within the controlled area and/or record communications associated with cellular devices within a controlled area.
  • The disclosed embodiments and advantages thereof are best understood by referring to FIGS. 1-5 of the drawings, like numerals being used for like and corresponding parts of the various drawings. Other features and advantages of the disclosed embodiments will be or will become apparent to one of ordinary skill in the art upon examination of the following figures and detailed description. It is intended that all such additional features and advantages be included within the scope of the disclosed embodiments. Further, the illustrated figures are only exemplary and not intended to assert or imply any limitation with regard to the environment, architecture, design, or process in which different embodiments may be implemented.
  • FIG. 1 depicts an embodiment of a network environment 100 in which the illustrative embodiments may be implemented. In the depicted embodiment, a cellular monitoring system 300 communicates with one or more femto cells 200 placed in one or more locations within a controlled area 140. For instance, in some embodiments, the one or more femto cells 200 may be placed in strategic locations within controlled area 140 for restricting cellular communications to a particular location or locations within controlled area 140. The particular size of a controlled area may be determined by varying the signal strengths associated with one or more of the femto cells and/or by modifying the number and/or location of femto cells within the controlled area.
  • A femto cell, as referenced herein, is a miniature cellular signal transmission device that communicates directly with cellular devices and routes cellular communications associated with the cellular devices over an IP network, such as the Internet, for facilitating cellular communications. Femto cells may be utilized to provide and/or improve cellular service to cellular devices that are located in areas that do not receive adequate cellular coverage.
  • In accordance with one embodiment, femto cells 200 may comprise one or more femto cells capable of communicating with a plurality of cellular devices on a plurality of different cellular frequencies and network technology. For instance, in some embodiments, femto cells 200 may include a universal femto cell capable of communicating with cellular devices on a 850 MHz Global System for Mobile Communications (GSM) network, a 1900 MHz GSM network, a 1900 MHz Code-Division Multiple Access (CDMA) network, and a 700 MHz 3G network. Alternatively, in other embodiments, femto cells 200 may comprise a plurality of single service provider femto cells, each capable of communicating with cellular devices on a single service provider cellular network. For example, in the disclosed embodiment, femto cells 200 may be configured to support cellular communications with a cellular device 142 over a first cellular frequency/network technology and support cellular communication with a cellular device 144 over a second cellular frequency/network technology.
  • Femto cells 200 act like regular cell towers, except that femto cells 200 backhaul the voice or data communications associated with a mobile device over an IP network instead of using cellular terrestrial towers. Similar to how cellular communications is handed off from one cellular terrestrial tower to the next closest cellular terrestrial tower, in one embodiment, when a mobile communication device is within signal range of femto cells 200, the cellular communication associated with the mobile device is automatically handed off to femto cells 200. Accordingly, in a preferred embodiment, all cellular communications of mobile devices within signal range of femto cells 200 are automatically routed through femto cells 200 based on the configuration settings of femto cells 200.
  • For instance, in one embodiment, femto cells 200 route the all cellular communications for cellular devices located within controlled area 140 to cellular monitoring system 300 via IP network 110 for enabling cellular monitoring system 300 to control cellular usage within controlled area 140. In other embodiments, femto cells 200 may route all cellular communications to cellular monitoring system 300 over a direct wired or wireless connection. Further, in some embodiments, femto cells 200 may route information pertaining to the cellular communication, such as, but not limited to, an identifier of the calling device and a calling number, to cellular monitoring system 300 instead of routing the entire cellular communication to cellular monitoring system 300. In other words, in some embodiments, cellular monitoring system 300 merely gathers information instead of handling the actual routing the cellular communications.
  • In one embodiment, IP network 110 may include one or more data networks, such as, but not limited to, the Internet, for routing communications between one or more communication devices and/or data processing systems. The Internet is a global system of interconnected computer networks that interchange data using the standardized Internet Protocol Suite (TCP/IP). Additionally, IP network 110 may include other types of data networks, such as, but not limited to, an intranet, a private local area network (LAN), a wide area network (WAN), and a wireless local area network (WLAN).
  • In addition, in some embodiments, IP network 110 may communicate with other types of network, such as, but not limited to, cellular network 120 and landline telephone network 130 for routing cellular communications to and from femto cells 200. In one embodiment, cellular network 120 may include one or more GSM networks, CDMA networks, an Enhanced Data GSM Environment (EDGE) network, and a 3G/4G network, each for facilitating voice communications to cellular devices, such as, cellular device 122.
  • Landline telephone network 130 may include a public switched telephone network (PSTN) for facilitating voice communication landline telephone devices, such as, telephone 132. The public switched telephone network is the standard analog telephone network utilized by most homes. In addition, in some embodiments, landline telephone network 130 may also include digital telephone networks, such as, but not limited to, an integrated services digital network (ISDN) and a fiber distributed data interface (FDDI) network.
  • In accordance with one embodiment, cellular monitoring system 300 may include logic for communicating with a web server 112 for receiving configurations from a user 102. As referenced herein, logic is defined as hardware, software, and/or a combination thereof. For instance, in one embodiment, user 102 may utilize a computer 104 to access a website/portal hosted on web server 112 for remotely configuring cellular monitoring system 300. Alternatively, or in addition, in some embodiments, user 102 may locally configure cellular monitoring system 300.
  • With reference now to FIG. 2, an embodiment of a femto cell 200 is presented in accordance with certain of the disclosed embodiments. In the depicted embodiment, femto cell 200 includes a system-on-a-chip (SoC) 201. In one embodiment, SoC 201 may integrate all or a majority of the components of femto cell 200, such as, but not limited to, one or more processors/microprocessors 202 and memory 204 (e.g., RAM), into a single integrated circuit chip. In addition, in some embodiments, SoC 201 may include an analog-to-digital converter (ADC) and a digital-to-analog converter (DAC) 206 for converting between analog signals and digital format.
  • In some embodiments, femto cell 200 may include one or more data storage units 210, such as, but not limited to, a hard disk drive for storing executable instructions 212 and/or other data, such as, but not limited to, access rules, routing tables, and quality of service (QoS) rules for intelligent routing. For instance, in some embodiments, executable instructions 212 may include executable instructions for authenticating user access and for routing all cellular communications within controlled area 140 to cellular monitoring system 300 via network interface 240. Network interface 240 may be a network interface card, such as, but not limited to, a modem, an Ethernet card, and/or a wireless network interface card for connecting femto cell 200 to IP network 110.
  • In accordance with one embodiment, femto cell 200 may include a cellular transceiver 220 for communicating cellular signals between femto cell 200 and one or more cellular devices within signal range of femto cell 200, such as, cellular device 142. For instance, femto cell 200 may be configured to communicate with cellular device 142 on a control channel to determine the mobile identification number (MIN) or international mobile equipment identity (IMEI) associated with cellular device 142. A control channel is a channel carrying network information rather than the actual voice or data messages transmitted over the network for enabling cellular devices to identify themselves and their location to the cellular networks. In accordance with one embodiment, femto cell 200 may pass the MIN or IMEI associated with cellular device 142 to cellular monitoring system 300 to determine whether cellular device 142 is an authorized cellular device within controlled area 140. In some embodiments, femto cell 200 may include multiple cellular transceivers, such as, optional cellular transceiver 222. For instance, in some embodiments, optional cellular transceiver 222 may be configured to operate on a different service provider cellular network than that associated with cellular transceiver 220.
  • In addition, in some embodiments, femto cell 200 may include a radio frequency (RF) transceiver 224. In one embodiment, radio frequency transceiver 224 supports the Wireless Application Protocol (WAP) and/or Wi-Fi standard for enabling wireless data communication with one or more wireless Internet accessible devices, such as, but not limited to, a laptop computer and/or a PDA device with Wi-Fi capabilities. For instance, in one embodiment, user 102 may utilize laptop computer 104 to remotely configure cellular monitoring system 300 via femto cell 200. Additionally, in some embodiments, femto cell 200 may include one or more external data ports 220 (e.g., a USB port) for transferring and/or storing data on an external data storage unit and/or for connecting femto cell 200 to an external device.
  • FIG. 3 depicts an embodiment of cellular monitoring system 300 for managing cellular communications in a controlled area in accordance with some of the disclosed embodiments. In the depicted embodiment, cellular monitoring system 300 includes, among other components, a processing unit 302, memory 304, and at least one data storage unit 310. Processing unit 302 serves to execute computer executable instructions stored in memory 304 and/or data storage unit 310. In one embodiment, processing unit 302 may include one or more processing cores, such as, but not limited to, a microcontroller, microprocessor, or digital signal processor, for executing instructions and processing data for managing cellular communications within a controlled area.
  • In one embodiment, memory 304 may be volatile memory. Volatile memory is memory that requires power to maintain stored information. For example, in some embodiments, memory 304 may be random access memory (RAM). Random access memory stores currently executing instructions and/or other data utilized by an operating system, software application and/or hardware device.
  • Additionally, data storage unit 310 may be non-volatile memory, such as, but not limited to, a hard disk drive, for storing data. For example, in some embodiments, data storage unit 310 may store computer executable instructions 320 and/or other data. In some embodiments, computer executable instructions 320 may include executable instructions associated with a cellular management application 118 for managing cellular usage in a controlled area. In addition, in some embodiments, data storage unit 310 may include one or more databases, such as, but not limited to, an authorized devices database 352, a recorded communications database 354, and an accounts database 356. Alternatively, in some embodiments, the depicted databases may be stored on one or more remote systems and/or the data contained in the databases may be stored in other types of data structures, such as, but not limited to, a data table, a linked list, and/or an array.
  • In some embodiments, cellular monitoring system 300 may also include one or more external data ports 330. For example, in one embodiment, external data ports 330 may include a universal serial bus (USB) port for connecting one or more USB devices to cellular monitoring system 300, such as, but not limited to, a USB flash drive for providing external data storage. In addition, in some embodiments, cellular monitoring system 300 may include one or more input/output (I/O) ports 306. In one embodiment, input/output ports 306 may include communication ports for coupling one or more input/output device to cellular monitoring system 300, such as, but not limited to, a monitor, a keyboard, and a mouse. Further, in some embodiments, cellular monitoring system 300 may include a network interface 340. For example, in one embodiment, network interface 340 may be a network interface card, such as, but not limited to, an Ethernet card for connecting cellular monitoring system 300 to a network, such as, but not limited to, IP network 110.
  • In accordance with one embodiment, cellular management application 118 may include a configuration module 332. In one embodiment, configuration module 332 may comprise computer executable instructions for configuring cellular monitoring system 300. For instance, in one embodiment, configuration module 332 may include instructions for interfacing with a front-end system, such as, but not limited to, web server 112 for receiving user specified configuration parameters. For example, in one embodiment, a user may configure cellular monitoring system 300 to block all cellular communications within a controlled area. Alternatively, in some embodiments, a user may configure cellular monitoring system 300 to enable cellular communications to only authorized cellular devices and/or to only authorized calling numbers (e.g., 911 calls only and/or other user-specified numbers). Additionally, in some embodiments, configuration module 332 may comprise computer executable instructions for enabling a user to edit a list of authorized cellular devices stored in authorized devices database 352.
  • In addition, in some embodiments, cellular management application 118 may include an alert module 334. For example, in one embodiment, alert module 334 may comprise computer executable instructions for alerting security personnel of unauthorized cellular devices in a controlled area. In one embodiment, a user may configure alert module 334 to alert the appropriate personnel either via text message, email, voice recording, and/or via an audible alarm. In some embodiments, the alert message may contain information about the unauthorized device, such as, but not limited to, the mobile identification number associated with the unauthorized device and an approximate location of the unauthorized device. For example, in one embodiment, the alert message may include location information of the unauthorized device based on the location of the detecting femto cell within the controlled area. In other embodiments, alert module 334 may communicate with a cellular service provider subscriber database to determine a subscriber name associated with the unauthorized device. In one embodiment, alert module 334 may comprise computer executable instructions for blocking cellular communications associated with the unauthorized device. Further, in some embodiments, alert module 334 may comprise computer executable instructions for transmitting a text message or simultaneously calling one or more of the cellular devices communicating via femto cell 200. For example, in one embodiment, alert module 334 may be utilized to transmit an alert message to a specified group of cellular devices registered with alert module 334 or to all cellular devices informing the users of the cellular devices of an emergency, such as, but not limited to, informing prison guards of a fight in a particular area of a penitentiary or informing school personnel to lock down a school because of a security risk.
  • Additionally, in some embodiments, cellular management application 118 may also include a call monitoring module 336. In one embodiment, call monitoring module 336 may comprise computer executable instructions for monitoring communications of authorized or unauthorized cellular devices within a controlled area. For example, in one embodiment, call monitoring module 336 may enable authorized cellular devices to be utilized within a controlled area during specified times (e.g., during lunch hours) and/or for a specified duration (e.g., to limit personal calls to 5 minutes). In addition, in some embodiments, call monitoring module 336 may be utilized to track calling activities and monitor cellular usage. For instance, in one embodiment, authorized cellular devices may be given to a prison inmate for enabling the inmate to make calls using minutes earned in exchange for good behavior and/or work programs. In one embodiment, call monitoring module 336 tracks the duration of the call to ensure that the call does not exceed an allotted amount of time and subtracts the duration of the call from a user account stored in accounts database 356. Further, in some embodiments, call monitoring module 336 may be configured to record communications associated with cellular devices located in a controlled area (e.g., in a prison environment). In some embodiments, cellular monitoring system 300 may store the recorded communications locally in recorded communications database 354. Alternatively, in some embodiments, cellular monitoring system 300 may store the recorded communications on a separate device or storage unit.
  • With reference now to FIG. 4, an embodiment of a femto cell 200A is depicted in accordance with certain of the disclosed embodiments. For example, in one embodiment, femto cell 200A may include all of the components as presented in femto cell 200 as described in FIG. 2. In addition, in certain embodiments, femto cell 200A may incorporate the logic of cellular monitoring system 300, as described above, into an all-in-one intelligent femto cell. In these embodiments, femto cell 200A may communicate with a Web server such as Web server 112 for receiving configuration data for managing cellular usage in a controlled area, such as, but not limited to, a list of authorized cellular devices. Alternatively, in some embodiments, femto cell 200A may include logic for enabling a user to configure femto cell 200A locally. For example, in one embodiment, a user, using laptop computer 104, may communicate wirelessly with femto cell 200A, via radio frequency (RF) transceiver 224, to configure femto cell 200A. In other embodiments, a data processing system may communicate with femto cell 200A using a wired connection via network interface 240. Accordingly, in some embodiments, femto cell 200A may be a stand-alone system capable of performing some or all of features of managing cellular usage in a controlled area as described above in certain embodiments.
  • FIGS. 2-4 are not intended to imply and/or restrict the architecture, functionality, and operation of other possible implementations of femto cell 200, femto cell 200A, and cellular monitoring system 300 that are within the scope of the disclosed embodiments. For example, other possible implementations may include additional components not depicted in FIGS. 2-4 and/or the deletion/combination of one or more of the illustrated components. In addition, although, the depicted embodiment in FIG. 3 describes the modules as computer implemented instructions, the features and functions provided by the modules may be in any form of logic including an entirely hardware embodiment or an embodiment containing both hardware and software elements. In addition, in some embodiments, the disclosed modules may be implemented in software, including, but not limited to, firmware, resident software, and microcode, that are executed by a processor, such as, but not limited to, processing unit 302.
  • With reference now to FIG. 5, an embodiment of a process 500 for managing cellular communicating in a controlled area is presented. In accordance with one embodiment, process 500 may be executed by a data processing system, such as, cellular monitoring system 300. In the depicted embodiment, process 500 begins, at step 502, by receiving a cellular identifier, such as, a phone number or international mobile equipment identifier, associated with a cellular device that is detected by a femto cell located within a controlled area. At step 504, the process determines whether the detected cellular device is an authorized device within the controlled area. For example, in one embodiment, the process queries an authorized cellular device database to determine whether the received cellular identifier is an authorized device. In one embodiment, if the process determines that the cellular device is unauthorized, the process, at step 506, blocks all cellular communication associated with the unauthorized cellular device. At step 508, the process alerts the appropriate personnel via a user-specified means, such as, but not limited to, text message, email, voice recording, and/or via an audible alarm.
  • However, if, at step 504, the process determines that the cellular device is an authorized device, the process monitors for cellular communication associated with the cellular device at step 510. In one embodiment, if the process, at step 512, receives an inbound or outbound call associated with the cellular device, the process may, at step 514, determine whether the call is occurring during an authorized time. In one embodiment, if the process determines that the call is occurring during an unauthorized time, the process, at step 530, blocks the inbound or outbound call from connecting, with process 500 terminating thereafter. In some embodiments, the process may log the calling information, such as, but not limited to, the time of the call and the caller identification of the second calling party, in a log file that is accessible to authorized personnel. Alternatively, in some embodiments, the process may automatically route all calls directly to a voicemail server associated with the cellular device (e.g., in a classroom environment).
  • In one embodiment, if the process, at step 514, determines that the inbound or outbound call occurs during an authorized time, the process connects the call at step 516. In some embodiments, the process, at step 518, records the conversation between the calling parties (e.g., all calls from a prison facility are automatically recorded). In one embodiment, the process continues to monitor and record the phone conversation until a determination is made that the call has ended at step 524. In other embodiments, the process may monitor the duration of the call at step 520. For example, in some embodiments, the process may, at step 522, determine whether the call duration exceeds a specified allotted time. In these embodiments, process 500 may terminate the call, at step 526, if the call duration exceeds a specified allotted time. In addition, the process may deduct the call duration from a user account at step 528, with process 500 terminating thereafter.
  • Accordingly, the disclosed embodiments provide a system and method for managing cellular usage in controlled areas. In addition, certain of the disclosed embodiments enable detection of unauthorized cellular devices within a controlled area, such as, but not limited to, a prison and/or a top-secret facility. The disclosed embodiments are described above with reference to flowchart illustrations, sequence diagrams, and/or block diagrams. Each block of the flowchart illustrations and/or block diagrams, and combinations of blocks in the flowchart illustrations and/or block diagrams, may be implemented by computer program instructions. In addition, the flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which may include one or more executable instructions for implementing the specified logical function(s).
  • In some alternative implementations, the functions noted in the block may occur out of the order noted in the figures and/or may be omitted. For instance, in some embodiments, process 500 may alert the appropriate personnel of an unauthorized cellular device without blocking cellular communications associated with unauthorized device. In addition, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. Further, in some embodiments, each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, may be implemented entirely with hardware or as a software embodiment (including firmware, resident software, micro-code, etc.) or an embodiment combining software and hardware aspects for performing the specified functions or acts.
  • Additionally, computer program instructions for executing the disclosed embodiments may also be stored in a computer-readable medium that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable medium produce an article of manufacture including instruction means which implement the function/act specified in the flowchart and/or block diagram block or blocks. The computer program instructions may also be loaded onto a data processing apparatus to cause a series of operational steps to be performed on the data processing system to produce a computer implemented process such that the instructions which execute on the data processing system provide processes for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks.
  • The terminology used herein is for describing particular embodiments only and is not intended to be limiting of the invention. As used herein, the singular forms “a”, “an” and “the” are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the terms “comprise” and/or “comprising,” when used in this specification and/or the claims, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
  • The description of the present invention has been presented for purposes of illustration and description, but is not intended to be exhaustive or limited to the invention in the form disclosed. Many modifications and variations will be apparent to those of ordinary skill in the art without departing from the scope and spirit of the invention. The disclosed embodiments were chosen to explain the principles of the invention and the practical application, and to enable others of ordinary skill in the art to understand the invention for various embodiments with various modifications as are suited to the particular use contemplated.

Claims (20)

We claim:
1. A method executed by a cellular monitoring system for managing cellular usage in a controlled area, the method comprising:
identify a cellular device within signal range of one or more small cells placed in a controlled area, wherein a size of the controlled area is configurable by varying the signal strengths associated with the one or more small cells;
determining whether the cellular device is an authorized device within the controlled area; and
alerting security personnel in response to determination that the cellular device is not an authorized device within the controlled area.
2. The method of claim 1, wherein identify the cellular device within signal range of one or more small cells placed in the controlled area is performed using a control channel.
3. The method of claim 1, further comprising updating a location status of the cellular device to provide an approximate location of the cellular device in response to a determination that the cellular device is an authorized device within the controlled area.
4. The method of claim 1, further comprising receiving user configurations for alerting the security personnel from a user via a Web portal associated with the cellular monitoring system, wherein an alert message includes information about an unauthorized cellular device including a mobile identification number associated with the unauthorized cellular device and an approximate location of the unauthorized cellular device.
5. The method of claim 1, wherein the small cells support 4G LTE standard for wireless communications.
6. The method of claim 1, further comprising recording an incoming or outgoing call associated with the cellular device.
7. The method of claim 1, wherein the small cells support Wi-Fi standard for wireless communications.
8. The method of claim 1, further comprising disconnecting a call associated with the cellular device in response to a determination that the call has exceeded a predetermined amount of time.
9. The method of claim 1, further comprising communicating with a cellular service provider subscriber database to determine a subscriber name associated with the cellular device in response to a determination that the cellular device is an unauthorized device.
10. The method of claim 1, further comprising:
receiving an incoming or outgoing call associated with the cellular device;
determining whether the incoming or outgoing call occurs during an authorized time; and
blocking the incoming or outgoing call in response to a determination that the incoming or outgoing call occurs during an unauthorized time.
11. A cellular monitoring system for managing cellular usage in a controlled area, the cellular monitoring system comprising:
a network interface for communicating with one or more small cells placed in a controlled area for identifying cellular devices in the controlled area;
a data storage unit for storing identification data associated with authorized cellular devices within the controlled area; memory for storing computer executable instructions;
a processor configured to execute the computer executable instructions to perform operations comprising:
configuring a size of the controlled area by varying the signal strengths associated with the one or more small cells;
identifying a cellular device within signal range of one or more small cells placed in the controlled area;
determining whether the cellular device is an authorized device within the controlled area; and
alerting security personnel in response to determination that the cellular device is not an authorized device within the controlled area.
12. The cellular monitoring system of claim 11, wherein the small cells support 4G LTE standard for wireless communications.
13. The cellular monitoring system of claim 11, wherein the alert includes location information for assisting the security personnel in determining an approximation location of the cellular device within the controlled area.
14. The cellular monitoring system of claim 11, wherein the operations further include blocking cellular communications associated with the cellular device during specified times.
15. The cellular monitoring system of claim 11, wherein the operations further include recording cellular communications associated with the cellular device.
16. The cellular monitoring system of claim 11, wherein the small cells support Wi-Fi standard for wireless communications.
17. The cellular monitoring system of claim 11, wherein the network interface is further configured to receive user specified configuration parameters from a user via a web portal interface.
18. The cellular monitoring system of claim 11, wherein the operations further include monitoring a duration of a call associated with the cellular device and terminating the call in response the call exceeding a prespecified duration.
19. The cellular monitoring system of claim 10, wherein the operations further include blocking all cellular communications within the controlled area.
20. A non-transitory computer program product comprising a computer usable medium having a computer readable program code embodied therein, said computer readable program code comprising instructions that when executed causes one or more machines to perform operations comprising:
configuring a size of the controlled area by varying the signal strengths associated with the one or more small cells;
identifying a cellular device within signal range of one or more small cells placed in the controlled area;
determining whether the cellular device is an authorized device within the controlled area; and
alerting security personnel in response to determination that the cellular device is not an authorized device within the controlled area.
US14/075,072 2009-05-26 2013-11-08 Small cell service delivery platform usage compliance Abandoned US20140066012A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US14/075,072 US20140066012A1 (en) 2009-05-26 2013-11-08 Small cell service delivery platform usage compliance

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US12/471,682 US8583078B2 (en) 2009-05-26 2009-05-26 Femto cell service delivery platform usage compliance
US14/075,072 US20140066012A1 (en) 2009-05-26 2013-11-08 Small cell service delivery platform usage compliance

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US12/471,682 Continuation US8583078B2 (en) 2009-05-26 2009-05-26 Femto cell service delivery platform usage compliance

Publications (1)

Publication Number Publication Date
US20140066012A1 true US20140066012A1 (en) 2014-03-06

Family

ID=43220781

Family Applications (2)

Application Number Title Priority Date Filing Date
US12/471,682 Active 2030-08-22 US8583078B2 (en) 2009-05-26 2009-05-26 Femto cell service delivery platform usage compliance
US14/075,072 Abandoned US20140066012A1 (en) 2009-05-26 2013-11-08 Small cell service delivery platform usage compliance

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US12/471,682 Active 2030-08-22 US8583078B2 (en) 2009-05-26 2009-05-26 Femto cell service delivery platform usage compliance

Country Status (1)

Country Link
US (2) US8583078B2 (en)

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9094844B2 (en) 2007-08-31 2015-07-28 Centurylink Intellectual Property Llc Method and apparatus for configuring a universal femto cell
US9148759B2 (en) 2009-07-08 2015-09-29 Centurylink Intellectual Property Llc Wireless service platforms
US9473959B2 (en) 2012-11-30 2016-10-18 Centurylink Intellectual Property Llc Universal near field self-configuring femtocell
US9866666B2 (en) 2009-03-12 2018-01-09 Centurylink Intellectual Property Llc System and method for providing call gating using a femto cell
US9900428B1 (en) 2016-10-05 2018-02-20 Global Tel*Link Corporation System and method for detecting and controlling contraband devices in a controlled environment
US10206064B2 (en) 2016-12-14 2019-02-12 Global Tel*Link Corp. System and method for detecting and locating contraband devices in a secure environment
US10217311B2 (en) 2013-09-18 2019-02-26 Renovo Software, Inc. Apparatus for controlling access to and use of portable electronic devices
US10362528B2 (en) 2017-04-11 2019-07-23 Global Tel*Link Corporation System and method for detecting and controlling contraband devices
US10432343B2 (en) 2006-08-16 2019-10-01 Global Tel*Link Corporation Integration of cellular phone detection and reporting into a prison telephone system
US20190312978A1 (en) * 2017-06-30 2019-10-10 Global Tel*Link Corporation Call Processing System for Modifying Inmate Communication Limits
US20190320074A1 (en) * 2016-03-22 2019-10-17 Huawei Technologies Co., Ltd. Ringtone Setting Method, Electronic Device, and Storage Medium
US10735131B2 (en) 2016-08-24 2020-08-04 Global Tel*Link Corporation System and method for detecting and controlling contraband devices in a correctional facility utilizing portable electronic devices

Families Citing this family (29)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8437729B2 (en) * 2005-05-10 2013-05-07 Mobile Communication Technologies, Llc Apparatus for and system for enabling a mobile communicator
US8326296B1 (en) 2006-07-12 2012-12-04 At&T Intellectual Property I, L.P. Pico-cell extension for cellular network
US8522312B2 (en) 2008-05-13 2013-08-27 At&T Mobility Ii Llc Access control lists and profiles to manage femto cell coverage
US8719420B2 (en) 2008-05-13 2014-05-06 At&T Mobility Ii Llc Administration of access lists for femtocell service
US8510801B2 (en) * 2009-10-15 2013-08-13 At&T Intellectual Property I, L.P. Management of access to service in an access point
EP2514263A1 (en) * 2009-12-18 2012-10-24 Nokia Siemens Networks Oy Management method and apparatuses
US8548508B2 (en) * 2010-07-30 2013-10-01 General Motors Llc Method of identifying telematics calls
US8478234B1 (en) * 2011-02-09 2013-07-02 Brian Francis Byrne System and method for controlling, monitoring and recording of wireless communications in penal institutions
US9271145B2 (en) * 2011-02-09 2016-02-23 Brian Francis Byrne System and method for controlling, monitoring and recording of wireless communications in penal institutions
US9026779B2 (en) 2011-04-12 2015-05-05 Mobile Communication Technologies, Llc Mobile communicator device including user attentiveness detector
US9026780B2 (en) 2011-04-12 2015-05-05 Mobile Communication Technologies, Llc Mobile communicator device including user attentiveness detector
US10139900B2 (en) 2011-04-12 2018-11-27 Mobile Communication Technologies, Llc Mobile communicator device including user attentiveness detector
US8995945B2 (en) 2011-08-30 2015-03-31 Mobile Communication Technologies, Llc Mobile communicator and system
US20130225183A1 (en) * 2012-02-24 2013-08-29 Qualcomm Incorporated Methods and apparatus for turning off macro carriers to deploy femtocells
US9166732B2 (en) * 2012-04-19 2015-10-20 At&T Mobility Ii Llc Facilitation of security employing a femto cell access point
US8843103B2 (en) 2012-04-24 2014-09-23 At&T Intellectual Property I, L.P. Use of the commercial mobile alert system to trigger alternative receivers
EP2677814B1 (en) * 2012-06-22 2016-05-18 Alcatel Lucent A small cell base station, and a method of controlling communications between a user terminal and a small cell base station
US9763095B2 (en) 2015-09-25 2017-09-12 Harris Corporation Managed access system that determines authorized and unauthorized mobile wireless devices
US9584252B1 (en) 2015-09-25 2017-02-28 Harris Corporation Managed access system with mobile wireless device geolocation capability
US9820150B2 (en) * 2015-09-25 2017-11-14 Harris Corporation Managed access system having filtered communications using network interface device
US9769666B2 (en) 2015-09-25 2017-09-19 Harris Corporation Managed access system with monitoring device to determine and change radio equipment
US9736706B2 (en) 2015-09-25 2017-08-15 Harris Corporation Managed access system with monitoring device to determine system operability
US9681360B1 (en) * 2016-05-13 2017-06-13 Harris Corporation Managed access system that provides selective communications and registration of mobile wireless devices
US10284559B2 (en) 2016-05-13 2019-05-07 Harris Corporation Managed access system with security assessment equipment
US10405184B2 (en) 2017-01-31 2019-09-03 Harris Corporation Mobile wireless device managed access system providing enhanced authentication features and related methods
US10104710B1 (en) * 2017-06-19 2018-10-16 Global Tel*Link Corporation Dual mode transmission in a controlled environment
US10333870B2 (en) 2017-07-06 2019-06-25 Global Tel*Link Corporation Presence-based communications in a controlled environment
RU2766273C1 (en) * 2020-09-24 2022-02-10 Акционерное общество "Лаборатория Касперского" System and method of detecting an unwanted call
US11785530B2 (en) * 2021-07-30 2023-10-10 Polaris Wireless, Inc. Preventing the use of a wireless terminal in a proscribed area

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7333800B1 (en) * 2004-09-08 2008-02-19 Airtight Networks, Inc. Method and system for scheduling of sensor functions for monitoring of wireless communication activity
US8521186B2 (en) * 2006-01-18 2013-08-27 Rockstar Consortium Us Lp Method and device for determining location-enhanced presence information for entities subscribed to a communications system
US8233880B2 (en) * 2006-08-16 2012-07-31 Global Tel*Link Corporation Integration of cellular phone detection and reporting into a prison telephone system
US8355487B2 (en) * 2007-08-03 2013-01-15 Alcatel Lucent Multiple maximum durations defined for sessions over a communication network
US8504032B2 (en) * 2008-06-12 2013-08-06 At&T Intellectual Property I, L.P. Femtocell service registration, activation, and provisioning
US9143991B2 (en) * 2008-06-13 2015-09-22 Fujitsu Limited Seamless handover of a mobile station from a macro base station to a privately accessible femto base station

Cited By (33)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11757560B2 (en) 2006-08-16 2023-09-12 Global Tel*Link Corporation Integration of cellular phone detection and reporting into a prison telephone system
US10432343B2 (en) 2006-08-16 2019-10-01 Global Tel*Link Corporation Integration of cellular phone detection and reporting into a prison telephone system
US11258530B2 (en) 2006-08-16 2022-02-22 Global Tel*Link Corporation Integration of cellular phone detection and reporting into a prison telephone system
US9094844B2 (en) 2007-08-31 2015-07-28 Centurylink Intellectual Property Llc Method and apparatus for configuring a universal femto cell
US9866666B2 (en) 2009-03-12 2018-01-09 Centurylink Intellectual Property Llc System and method for providing call gating using a femto cell
US9148759B2 (en) 2009-07-08 2015-09-29 Centurylink Intellectual Property Llc Wireless service platforms
US9473959B2 (en) 2012-11-30 2016-10-18 Centurylink Intellectual Property Llc Universal near field self-configuring femtocell
US11403908B2 (en) 2013-09-18 2022-08-02 Renovo Software, Inc. Apparatus for controlling access to and use of portable electronic devices
US11935353B2 (en) 2013-09-18 2024-03-19 Renovo Software, Inc. Apparatus for controlling access to and use of portable electronic devices
US10217311B2 (en) 2013-09-18 2019-02-26 Renovo Software, Inc. Apparatus for controlling access to and use of portable electronic devices
US10282935B2 (en) 2013-09-18 2019-05-07 Renovo Software, Inc. Apparatus for controlling access to and use of portable electronic devices
US10922915B2 (en) 2013-09-18 2021-02-16 Renovo Software, Inc. Apparatus for controlling access to and use of portable electronic devices
US20190320074A1 (en) * 2016-03-22 2019-10-17 Huawei Technologies Co., Ltd. Ringtone Setting Method, Electronic Device, and Storage Medium
US10735131B2 (en) 2016-08-24 2020-08-04 Global Tel*Link Corporation System and method for detecting and controlling contraband devices in a correctional facility utilizing portable electronic devices
US11606162B2 (en) 2016-08-24 2023-03-14 Global Tel* Link Corporation System and method for detecting and controlling contraband devices in a correctional facility utilizing portable electronic devices
US10674008B2 (en) 2016-10-05 2020-06-02 Global Tel*Link Corporation System and method for detecting and controlling contraband devices in a controlled environment
US11800006B2 (en) 2016-10-05 2023-10-24 Global Tel*Link Corporation System and method for detecting and controlling contraband devices in a controlled environment
US10187519B2 (en) 2016-10-05 2019-01-22 Global Tel*Link Corporation System and method for detecting and controlling contraband devices in a controlled environment
US9900428B1 (en) 2016-10-05 2018-02-20 Global Tel*Link Corporation System and method for detecting and controlling contraband devices in a controlled environment
US11178273B2 (en) 2016-10-05 2021-11-16 Global Tel*Link Corporation System and method for detecting and controlling contraband devices in a controlled environment
US11405750B2 (en) 2016-12-14 2022-08-02 Global Tel*Link Corp. System and method for detecting and locating contraband devices in a secure environment
US11418910B2 (en) 2016-12-14 2022-08-16 Global Tel*Link Corp. System and method for detecting and locating contraband devices in a secure environment
US10681495B2 (en) 2016-12-14 2020-06-09 Global Tel*Link Corp. System and method for detecting and locating contraband devices in a secure environment
US11778417B2 (en) 2016-12-14 2023-10-03 Global Tel*Link Corporation System and method for detecting and locating contraband devices in a secure environment
US10206064B2 (en) 2016-12-14 2019-02-12 Global Tel*Link Corp. System and method for detecting and locating contraband devices in a secure environment
US11388648B2 (en) 2017-04-11 2022-07-12 Global Tel*Link Corporation System and method for detecting and controlling contraband devices
US10887823B2 (en) 2017-04-11 2021-01-05 Global Tel*Link Corporation System and method for detecting and controlling contraband devices
US10362528B2 (en) 2017-04-11 2019-07-23 Global Tel*Link Corporation System and method for detecting and controlling contraband devices
US11943696B2 (en) 2017-04-11 2024-03-26 Global Tel*Link Corporation System and method for detecting and controlling contraband devices
US11349998B2 (en) 2017-06-30 2022-05-31 Global Tel*Link Corporation Call processing system for modifying inmate communication limits
US10757268B2 (en) * 2017-06-30 2020-08-25 Global Tel*Link Corporation Call processing system for modifying inmate communication limits
US11750746B2 (en) 2017-06-30 2023-09-05 Global Tel*Link Corporation Call processing system for modifying inmate communication limits
US20190312978A1 (en) * 2017-06-30 2019-10-10 Global Tel*Link Corporation Call Processing System for Modifying Inmate Communication Limits

Also Published As

Publication number Publication date
US8583078B2 (en) 2013-11-12
US20100304712A1 (en) 2010-12-02

Similar Documents

Publication Publication Date Title
US8583078B2 (en) Femto cell service delivery platform usage compliance
CA2991833C (en) Mobile wireless device managed access system providing enhanced authentication features and related methods
US9826358B2 (en) Method and system for geolocation and coordinated communication with emergency responders
US9148759B2 (en) Wireless service platforms
US9544773B2 (en) System and method for enforcing communication policies
US20110077022A1 (en) Carrier based in-network location triggered managed processing of wireless communications
US20170094490A1 (en) Method and system for wireless communication in emergency situation
US10034153B1 (en) Creation and use of mobile communications device identities
US20230089496A1 (en) Systems and methods for communication control in a restricted environment
EP3032883A2 (en) Geographical detection of mobile terminals
WO2018227926A1 (en) Method and system for implementing private network communication
ES2528945T3 (en) Alert system with controlled network load
US11877171B1 (en) Wireless proximity detection reporting
EP2677814B1 (en) A small cell base station, and a method of controlling communications between a user terminal and a small cell base station
EP2962477B1 (en) Method, apparatus and system for performing prioritized barring of service access
US9398151B2 (en) System and method for handling special number calls conveyed to a predetermined destination
US10609089B1 (en) Influencing the location of contraband wireless communications devices within controlled-environment facilities
US11166160B1 (en) Alerting on contraband device detection
KR20070076645A (en) Method for limiting use of mobile phone with camera
US20140242938A1 (en) Method, apparatus and system for performing prioritized barring of service access
US20060240812A1 (en) Network support for suspect's geo-location monitoring and alerting
US10735265B2 (en) Transaction monitoring for remote update of wireless router account settings
US10135962B2 (en) Method and system to intercept accidental emergency calls in a device repair facility
US20140155044A1 (en) Femtocell Base Station for Controlling Communication According to Specified Criteria
GB2564799B (en) Systems and methods to provide wireless accessory backup communication links

Legal Events

Date Code Title Description
AS Assignment

Owner name: CENTURYLINK INTELLECTUAL PROPERTY LLC, COLORADO

Free format text: CHANGE OF NAME;ASSIGNOR:EMBARQ HOLDINGS COMPANY, LLC;REEL/FRAME:031608/0603

Effective date: 20120323

Owner name: EMBARQ HOLDINGS COMPANY, LLC, KANSAS

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:SWEENEY, JEFFREY M.;ROOKS, KELSYN D.S.;STAFFORD, JEFF;SIGNING DATES FROM 20090518 TO 20090519;REEL/FRAME:031567/0212

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION