Laser perimeter awareness system
0 Assignments
0 Petitions
Accused Products
Abstract
A method of laser scanning a perimeter zone of a target site for the detection of potential threats comprises: scanning a pulsed laser beam across the perimeter zone; receiving echoes from the pulsed laser beam during the perimeter zone scan; deriving range data corresponding to the received echoes; determining position data of the received echoes in the perimeter zone; forming a scene image of a scan of the perimeter zone based on the range and position data of the received echoes thereof; repeating the steps of scanning, receiving, deriving, determining and forming for a plurality of perimeter zone scans to form scene images of each scan of the plurality; and comparing scene images of the plurality to detect a potential threat in the perimeter zone. In addition, a method of authenticating a potential threat detected in a perimeter zone of a target site comprises: detecting the potential threat and upon detection, interrogating the potential threat for a response by a wireless transmission; declaring the potential threat unauthorized if no response is transmitted wirelessly within a predetermined time interval from the interrogation; receiving the response, if transmitted, and determining if the response comprises a proper access code; and declaring the potential threat unauthorized if the received response is determined not to comprise the proper access code.
-
Citations
51 Claims
-
1-23. -23. (canceled)
-
24. Method of authenticating a potential threat detected in a perimeter zone of a target site, said method comprising the steps of:
-
detecting the potential threat in the perimeter zone of the target site;
upon detection, interrogating said potential threat for a response by a wireless transmission;
declaring the potential threat unauthorized if no response is transmitted wirelessly within a predetermined time interval from said interrogation;
receiving said response, if transmitted, and determining if the response comprises a proper access code; and
declaring the potential threat unauthorized if the received response is determined not to comprise the proper access code. - View Dependent Claims (25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36)
-
-
37. A system for authenticating a potential threat detected in a perimeter zone of a target site, said system comprising:
-
a personal communicator for each person that has access to the perimeter zone, each said communicator operative to transmit wirelessly an authorized access code in response to a reception of a wirelessly transmitted interrogation signal;
a scanning laser object awareness system (LOAS) for detecting the potential threat in the perimeter zone of the target site and for generating a threat detection signal indicative of said detection;
a wireless transmitter/receiver unit;
an authenticator unit coupled to said scanning LOAS and said wireless transmitter/receiver unit, and responsive to said threat detection signal to control said wireless transmitter/receiver unit to transmit the interrogation signal to said potential threat;
said wireless transmitter/receiver unit operative to receive the response, if transmitted from a personal communicator within a predetermined area of the detected potential threat;
said authenticator unit operative to declare the potential threat unauthorized if no response is received within a predetermined time interval from said interrogation;
said authenticator unit further operative to declare the potential threat unauthorized if the received response is determined not to comprise an authorized access code. - View Dependent Claims (38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50)
-
-
51-65. -65. (canceled)
Specification