Double-end fiber optic security system for sensing intrusions
First Claim
1. A security system for detecting unauthorized intrusions at a plurality of predetermined locations having moveable closure members which must be moved in order to gain entry into said locations, said system comprising:
- a plurality of intrusion sensors disposed at said locations for detecting movement of said closure members and attempted intrusions at said locations and generating intrusion signals when one or more intrusion sensors are activated by a prescribed level of intrusion activity;
a primary optical fiber sensor line routed through said intrusion sensors;
a secondary optical fiber sensor line routed through said intrusion sensors;
a primary scanning unit in communication with said primary sensor line for generating and transmitting light pulse signals along said primary sensor line, and receiving reflected pulse signals reflected back from an end of said primary sensor line;
a secondary scanning unit in communication with said secondary sensor line for generating and transmitting light pulse signals along said secondary sensor line, and receiving reflected pulse signals reflected back from said secondary sensor line;
a processor in communication with said primary and secondary scanning units for processing said reflected pulse signals to determine if a change has occurred in a reflected pulse signal signifying a prescribed level of unauthorized intrusion activity and an intrusion signal; and
said processor generating an alarm signal in response to determining said intrusion signal for signaling a predetermined response to the activity and an indication of the specific location of the unauthorized activity.
4 Assignments
0 Petitions
Accused Products
Abstract
A security system is disclosed for detecting intrusions at a plurality of predetermined locations having moveable closure members. The system comprises a plurality of intrusion sensors disposed at the locations for detecting movement of the closure members. Primary and secondary optical fiber sensor lines are routed through the intrusion sensors, and primary and secondary scanning units pulse signals along the sensor lines and receive reflected signals back from the sensor lines. A processor processes the reflected signals to determine if a reflection and/or attenuation change has occurred in a reflected pulse signal signifying a prescribed level of unauthorized intrusion activity which matches a signature intrusion signal. In the event of a cut through in the sensor lines, the primary sensor line monitors the sensors downstream of the break, and the secondary sensor line is activated to monitor the sensors downstream of the break.
-
Citations
30 Claims
-
1. A security system for detecting unauthorized intrusions at a plurality of predetermined locations having moveable closure members which must be moved in order to gain entry into said locations, said system comprising:
-
a plurality of intrusion sensors disposed at said locations for detecting movement of said closure members and attempted intrusions at said locations and generating intrusion signals when one or more intrusion sensors are activated by a prescribed level of intrusion activity; a primary optical fiber sensor line routed through said intrusion sensors; a secondary optical fiber sensor line routed through said intrusion sensors; a primary scanning unit in communication with said primary sensor line for generating and transmitting light pulse signals along said primary sensor line, and receiving reflected pulse signals reflected back from an end of said primary sensor line; a secondary scanning unit in communication with said secondary sensor line for generating and transmitting light pulse signals along said secondary sensor line, and receiving reflected pulse signals reflected back from said secondary sensor line; a processor in communication with said primary and secondary scanning units for processing said reflected pulse signals to determine if a change has occurred in a reflected pulse signal signifying a prescribed level of unauthorized intrusion activity and an intrusion signal; and said processor generating an alarm signal in response to determining said intrusion signal for signaling a predetermined response to the activity and an indication of the specific location of the unauthorized activity. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A security system for detecting an intrusion at one or more predetermined locations wherein each location includes a moveable closure member which must be moved in order to gain entry into said location, said system comprising:
-
intrusion sensors disposed at each of said one or more locations for detecting a predetermined movement of said moveable closure member to an unsecured position at said location; a primary optical fiber sensor line routed through said intrusion sensors; a secondary optical fiber sensor line routed through said intrusion sensors; scanning means in communication with said sensor lines for transmitting periodic pulse signals along said sensor lines, and receiving reflected pulse signals reflected back from an end of said sensor lines; and said processor controlling said scanning means in the event a break occurs in said sensor lines so that said secondary sensor line pulses intrusion sensors downstream from the break and said primary sensor line pulses intrusion sensors upstream from the break. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
-
21. A security system for detecting an intrusion at one or more predetermined locations wherein each location includes a moveable closure member which must be moved in order to gain entry into said location, said system comprising:
-
intrusion sensors disposed at each of said one or more locations for detecting movement of said moveable closure members; at least one optical fiber sensor line routed through said intrusion sensors; at least one scanning unit in communication with said at least one sensor line for transmitting periodic pulse signals along said sensor line, and receiving reflected pulse signals reflected back from an end of said sensor line; and a processor controlling said scanning unit and receiving said pulse signals; a set of intrusion type data stored in a computer readable medium accessible by the processor corresponding to different levels of unauthorized activity identified by signature intrusion signals; and said processor processing said intrusion signal to identify the type of intrusion based on a match between the intrusion signal and the signature intrusion signals. - View Dependent Claims (22, 23, 24)
-
-
25. A method for detecting intrusion into a protected location comprising:
-
providing at least one intrusion sensor for detecting a predetermined movement of a moveable closure member which must be moved in order to gain entry into said location; routing first and second fiber optic sensor lines through said sensor; pulsing said sensor lines with a periodic pulse signal and receiving a reflected pulse signal back from said sensor lines; and processing said reflected pulse signals to determine if a predetermined reflection and/or attenuation change in said pulse signals has occurred signifying a predetermined level of unauthorized activity and an intrusion signal and identify the type and location of the intrusion. - View Dependent Claims (26, 27, 28, 29, 30)
-
Specification