Method and apparatus for active tamper indicating device using optical time-domain reflectometry
First Claim
1. A tamper indicating device, comprising:
- a plurality of fiber optic loops, each loop optically connecting a plurality of connector assemblies within the loop;
a control computer functionally connected to the loops and, for each loop, operative to detect a breach in the loop by comparing representations of optical signals injected into the loop to representations of return signals received from the loop;
an optical time-domain reflectometer operative to generate optical breach-identification signals and to receive corresponding return breach-identification signals;
a matrix router optically connected to the reflectometer and operative to selectively connect the reflectometer to each of the fiber optic loops, the matrix router functionally connected to the control computer, which is operative to cause the matrix router to switch the reflectometer into optical connection with a selected one of the fiber optic loops in response to detection of a breach in the selected loop; and
the reflectometer is operative to interrogate the selected loop to identify a particular one of the connector assemblies associated with the breach by comparing breach-identification signals injected into the selected loop to corresponding return breach-identification signals.
3 Assignments
0 Petitions
Accused Products
Abstract
An optical time-domain reflectometer (OTDR) launches pulses of light into a link or a system of multiplexed links and records the waveform of pulses reflected by the seals in the link(s). If a seal is opened, the link of cables will become a discontinuous transmitter of the light pulses and the OTDR can immediately detect that a seal has been opened. By analyzing the waveform, the OTDR can also quickly determine which seal(s) were opened. In this way the invention functions as a system of active seals. The invention is intended for applications that require long-term surveillance of a large number of closures. It provides immediate tamper detection, allows for periodic access to secured closures, and can be configured for many different distributions of closures. It can monitor closures in indoor and outdoor locations and it can monitor containers or groups of containers located many kilometers apart.
-
Citations
20 Claims
-
1. A tamper indicating device, comprising:
-
a plurality of fiber optic loops, each loop optically connecting a plurality of connector assemblies within the loop; a control computer functionally connected to the loops and, for each loop, operative to detect a breach in the loop by comparing representations of optical signals injected into the loop to representations of return signals received from the loop; an optical time-domain reflectometer operative to generate optical breach-identification signals and to receive corresponding return breach-identification signals; a matrix router optically connected to the reflectometer and operative to selectively connect the reflectometer to each of the fiber optic loops, the matrix router functionally connected to the control computer, which is operative to cause the matrix router to switch the reflectometer into optical connection with a selected one of the fiber optic loops in response to detection of a breach in the selected loop; and the reflectometer is operative to interrogate the selected loop to identify a particular one of the connector assemblies associated with the breach by comparing breach-identification signals injected into the selected loop to corresponding return breach-identification signals. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A tamper indicating device, comprising:
-
a plurality of fiber optic loops, each loop defining first and second ends, optically connecting a plurality of connector assemblies between the first and second ends, and comprising an optical transmitter for injecting breach-detection signals into the first end of the loop and a receiver for detecting corresponding return breach-detection signals at the second end of the loop; a control computer functionally connected to the transmitter and the receiver of each loop and, for each loop, the control computer is operative to generate trigger signals for causing the transmitter to inject the breach-detection signals into the first end of the loop, to receive indicator signals from the receiver in response to the breach-detection signals, and to detect a breach in the loop by comparing the trigger signals to the indicator signals; an optical time-domain reflectometer operative to generate optical breach-identification signals and to receive corresponding return breach-identification signals; a matrix router optically connected to the reflectometer and operative to selectively connect the reflectometer to each of the fiber optic loops, the matrix router functionally connected to the control computer, which is operative to cause the matrix router to switch the reflectometer into optical connection with a selected one of the fiber optic loops in response to detection of a breach in the selected loop; and the reflectometer is operative to interrogate the selected loop to identify a particular one of the connector assemblies associated with the breach by comparing breach-identification signals injected into the selected loop to corresponding return breach-identification signals. - View Dependent Claims (11, 12, 13, 14)
-
-
15. A method for optically detecting tampering, comprising the steps of:
-
providing a plurality of fiber optic loops, each loop optically connecting a plurality of connector assemblies within the loop; for each loop, detecting a breach in the loop by comparing representations of optical signals injected into the loop to representations of return signals received from the loop; in response to detecting a breach in a selected loop, injecting optical breach-identification signals to interrogate the selected loop to identify a particular one of the connector assemblies associated with the breach by injecting breach-identification signals into the selected loop and comparing the breach-identification signals to corresponding return breach-identification signals; and injecting optical signals into both ends of the selected fiber optic loop to monitor the integrity of non-breached connector assemblies while the breach subsists in the selected fiber optic loop. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification