×

Method of defense-in-depth ultrasound intrusion detection

  • US 7,233,243 B2
  • Filed: 01/09/2004
  • Issued: 06/19/2007
  • Est. Priority Date: 01/09/2004
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method of defense-in-depth ultrasound intrusion detection that provides for sufficient enhancement of the distance of location and detection of an intruder with airborne ultrasound throughout enclosed premises of buildings, near field zone and circumjacent air vicinity of a dome-type, volumetric room that surrounds a protected object, including the techniques of:

  • arrangement of the volumetric room into geometrically closed areas that constitute a spatial multi-echelon infrastructure of a defense-in-depth automatic intrusion protection system; and

    commissioning each of single-level or multi-sublevel echelons of intrusion detection wherein;

    a central indoor echelon (C) containing the enclosed premises of a protected object is being commissioned to detect an intruder'"'"'s presence and direction of ingress or egress motion;

    an outdoor short-range echelon (S) of the near field zone adjoining the buildings, works and installations of a protected object is assigned to detect the presence and locality of an intruder relating to the direction of the intruder'"'"'s motion;

    an outdoor long-range echelon (L) of a circumjacent air vicinity of a layout area of a protected object detects of the intruder'"'"'s presence, and speed and direction of the intruder'"'"'s motion; and

    rating the size of each particular echelon in the designed prevailing direction of intrusion location distance that should not exceed the distance at which an airborne ultrasound wave attenuates along its incidence and reflection trip to the value less than the dead band of ultrasonic transceivers where said transceivers are being chosen regarding their operating frequency and prognosticated conditions of ambient air around a protected object; and

    application of different modes of response of an emitted ultrasound signal, at least the reflection, refraction by edge diffraction and interference with shadowing by an intruded target, in accordance with a procedure of intrusion detection and presumptive spatio-temporal conditions of intrusion location in every echelon; and

    designing predictive models of intrusion vulnerability of each echelon and the entire area of the protected object regarding previously simulated model of presumptive spatio-temporal behavior of an intruding object along their possible routings; and

    plotting an intrusion event tree that reveals cause-effect relations between an intrusion occurrence and subsequent menaces, to echelons and their sublevels therein, and to a protected object integrally where for simple arrangements of ultrasonic intrusion detection systems three or less echelons, each comprising separate sublevels with single units of protected equipment, the event tree is composed with use of techniques of combinations and situational logic transition, whereas for the arrangement of more than three echelons with a plurality of protected units of equipment installed in each echelon or in its sublevels;

    the event tree is composed on the basis of complete Markov models with Boolean transition logic; and

    derivation of mathematical expressions of logical equations of said cause-effect relations for the intrusion events in every echelon and its sublevels therein, a verifying logical matrix of intrusion justification, a logical decision matrix of inter-echelon cause-effect relations and factors of menaces, a generalized resolving logical equation; and

    drawing up control software algorithm for governing at least;

    a resolver, which handles the system of said echelon'"'"'s logical equations, the verifying logical matrix, the logical decision matrix and the generalized resolving logical equation;

    data control block that operates modes of locating with ultrasound beams and a data acquisition procedure; and

    system control block that forms and presents signals of intrusion detection and justification, and triggering signals of intrusion prevention, protection and defense; and

    establishing a software-programmable inter-echelon informational and processing logical interrelation among all the juxtaposed and non-adjacent echelons wherein said interrelation is automatically treated and handled in a real time domain by said control software algorithm that operates a continuous status scan of all the ultrasonic transceivers and oppositely aligned pairs of transmitters and receivers in every echelon simultaneously; and

    which algorithm provides for;

    transferring the data of continuous status scan to the echelons'"'"' logical equations, verifying logical matrix, and logical decision matrix;

    ability of said resolver to process acquired data by said echelons'"'"' logical equations, verifying logical matrix, logical decision matrix and generalized resolving logical equation up to the final decision of the goal function of the intrusion detection and protection method; and

    creation and presentation of logically true sequence of caution and self-checking signals for every intrusion-suspected echelon, signal of intrusion vindication for the affected echelon, and final triggering signals of alarm and activation of security measures where the creation and presentation of the final triggering signals; and

    entry of triggering signals for starting security measures of active and passive protection and defense, which measures include at least;

    activation of an alarm system, enclosing movable physical barriers around the protected works and installations, hence entrapping an intruding object inside echelon C, application of disabling tear gas, involving guard troops, deploying inflatable air obstacles in echelons S and L or opening defensive fire in echelon L.

View all claims
  • 0 Assignments
Timeline View
Assignment View
    ×
    ×