Method of defense-in-depth ultrasound intrusion detection
First Claim
1. A method of defense-in-depth ultrasound intrusion detection that provides for sufficient enhancement of the distance of location and detection of an intruder with airborne ultrasound throughout enclosed premises of buildings, near field zone and circumjacent air vicinity of a dome-type, volumetric room that surrounds a protected object, including the techniques of:
- arrangement of the volumetric room into geometrically closed areas that constitute a spatial multi-echelon infrastructure of a defense-in-depth automatic intrusion protection system; and
commissioning each of single-level or multi-sublevel echelons of intrusion detection wherein;
a central indoor echelon (C) containing the enclosed premises of a protected object is being commissioned to detect an intruder'"'"'s presence and direction of ingress or egress motion;
an outdoor short-range echelon (S) of the near field zone adjoining the buildings, works and installations of a protected object is assigned to detect the presence and locality of an intruder relating to the direction of the intruder'"'"'s motion;
an outdoor long-range echelon (L) of a circumjacent air vicinity of a layout area of a protected object detects of the intruder'"'"'s presence, and speed and direction of the intruder'"'"'s motion; and
rating the size of each particular echelon in the designed prevailing direction of intrusion location distance that should not exceed the distance at which an airborne ultrasound wave attenuates along its incidence and reflection trip to the value less than the dead band of ultrasonic transceivers where said transceivers are being chosen regarding their operating frequency and prognosticated conditions of ambient air around a protected object; and
application of different modes of response of an emitted ultrasound signal, at least the reflection, refraction by edge diffraction and interference with shadowing by an intruded target, in accordance with a procedure of intrusion detection and presumptive spatio-temporal conditions of intrusion location in every echelon; and
designing predictive models of intrusion vulnerability of each echelon and the entire area of the protected object regarding previously simulated model of presumptive spatio-temporal behavior of an intruding object along their possible routings; and
plotting an intrusion event tree that reveals cause-effect relations between an intrusion occurrence and subsequent menaces, to echelons and their sublevels therein, and to a protected object integrally where for simple arrangements of ultrasonic intrusion detection systems three or less echelons, each comprising separate sublevels with single units of protected equipment, the event tree is composed with use of techniques of combinations and situational logic transition, whereas for the arrangement of more than three echelons with a plurality of protected units of equipment installed in each echelon or in its sublevels;
the event tree is composed on the basis of complete Markov models with Boolean transition logic; and
derivation of mathematical expressions of logical equations of said cause-effect relations for the intrusion events in every echelon and its sublevels therein, a verifying logical matrix of intrusion justification, a logical decision matrix of inter-echelon cause-effect relations and factors of menaces, a generalized resolving logical equation; and
drawing up control software algorithm for governing at least;
a resolver, which handles the system of said echelon'"'"'s logical equations, the verifying logical matrix, the logical decision matrix and the generalized resolving logical equation;
data control block that operates modes of locating with ultrasound beams and a data acquisition procedure; and
system control block that forms and presents signals of intrusion detection and justification, and triggering signals of intrusion prevention, protection and defense; and
establishing a software-programmable inter-echelon informational and processing logical interrelation among all the juxtaposed and non-adjacent echelons wherein said interrelation is automatically treated and handled in a real time domain by said control software algorithm that operates a continuous status scan of all the ultrasonic transceivers and oppositely aligned pairs of transmitters and receivers in every echelon simultaneously; and
which algorithm provides for;
transferring the data of continuous status scan to the echelons'"'"' logical equations, verifying logical matrix, and logical decision matrix;
ability of said resolver to process acquired data by said echelons'"'"' logical equations, verifying logical matrix, logical decision matrix and generalized resolving logical equation up to the final decision of the goal function of the intrusion detection and protection method; and
creation and presentation of logically true sequence of caution and self-checking signals for every intrusion-suspected echelon, signal of intrusion vindication for the affected echelon, and final triggering signals of alarm and activation of security measures where the creation and presentation of the final triggering signals; and
entry of triggering signals for starting security measures of active and passive protection and defense, which measures include at least;
activation of an alarm system, enclosing movable physical barriers around the protected works and installations, hence entrapping an intruding object inside echelon C, application of disabling tear gas, involving guard troops, deploying inflatable air obstacles in echelons S and L or opening defensive fire in echelon L.
0 Assignments
0 Petitions
Accused Products
Abstract
Method of ingress or egress intrusion detection by ultrasound surveillance throughout volumetric multi-area room around a protected object, where the surveyed room is arranged in juxtaposed volumetric closed or open areas that represent central, short-range and long-range echelons of defense-in-depth intrusion protection infrastructure. The used techniques of ultrasound intrusion detection are based on the phenomena of reflection, refraction by edge diffraction, and interference by shadowing of ultrasonic beams. The ultrasonic beam patterns are closely disposed in 2-D curvilinear or polygonal array, or in 3-D curved surface lattice over multilevel substantial openwork frames of different echelons. The informational and processing inter-echelon interrelation is being treated by control software algorithm that features situational logic transition driven by IF-THEN operator. The disclosed method shall enhance the distance of location, trustworthiness and cost-effectiveness of ultrasonic intrusion detection arrangements.
53 Citations
8 Claims
-
1. A method of defense-in-depth ultrasound intrusion detection that provides for sufficient enhancement of the distance of location and detection of an intruder with airborne ultrasound throughout enclosed premises of buildings, near field zone and circumjacent air vicinity of a dome-type, volumetric room that surrounds a protected object, including the techniques of:
-
arrangement of the volumetric room into geometrically closed areas that constitute a spatial multi-echelon infrastructure of a defense-in-depth automatic intrusion protection system; and commissioning each of single-level or multi-sublevel echelons of intrusion detection wherein;
a central indoor echelon (C) containing the enclosed premises of a protected object is being commissioned to detect an intruder'"'"'s presence and direction of ingress or egress motion;
an outdoor short-range echelon (S) of the near field zone adjoining the buildings, works and installations of a protected object is assigned to detect the presence and locality of an intruder relating to the direction of the intruder'"'"'s motion;
an outdoor long-range echelon (L) of a circumjacent air vicinity of a layout area of a protected object detects of the intruder'"'"'s presence, and speed and direction of the intruder'"'"'s motion; andrating the size of each particular echelon in the designed prevailing direction of intrusion location distance that should not exceed the distance at which an airborne ultrasound wave attenuates along its incidence and reflection trip to the value less than the dead band of ultrasonic transceivers where said transceivers are being chosen regarding their operating frequency and prognosticated conditions of ambient air around a protected object; and application of different modes of response of an emitted ultrasound signal, at least the reflection, refraction by edge diffraction and interference with shadowing by an intruded target, in accordance with a procedure of intrusion detection and presumptive spatio-temporal conditions of intrusion location in every echelon; and designing predictive models of intrusion vulnerability of each echelon and the entire area of the protected object regarding previously simulated model of presumptive spatio-temporal behavior of an intruding object along their possible routings; and plotting an intrusion event tree that reveals cause-effect relations between an intrusion occurrence and subsequent menaces, to echelons and their sublevels therein, and to a protected object integrally where for simple arrangements of ultrasonic intrusion detection systems three or less echelons, each comprising separate sublevels with single units of protected equipment, the event tree is composed with use of techniques of combinations and situational logic transition, whereas for the arrangement of more than three echelons with a plurality of protected units of equipment installed in each echelon or in its sublevels;
the event tree is composed on the basis of complete Markov models with Boolean transition logic; andderivation of mathematical expressions of logical equations of said cause-effect relations for the intrusion events in every echelon and its sublevels therein, a verifying logical matrix of intrusion justification, a logical decision matrix of inter-echelon cause-effect relations and factors of menaces, a generalized resolving logical equation; and drawing up control software algorithm for governing at least;
a resolver, which handles the system of said echelon'"'"'s logical equations, the verifying logical matrix, the logical decision matrix and the generalized resolving logical equation;
data control block that operates modes of locating with ultrasound beams and a data acquisition procedure; and
system control block that forms and presents signals of intrusion detection and justification, and triggering signals of intrusion prevention, protection and defense; andestablishing a software-programmable inter-echelon informational and processing logical interrelation among all the juxtaposed and non-adjacent echelons wherein said interrelation is automatically treated and handled in a real time domain by said control software algorithm that operates a continuous status scan of all the ultrasonic transceivers and oppositely aligned pairs of transmitters and receivers in every echelon simultaneously; and
which algorithm provides for;transferring the data of continuous status scan to the echelons'"'"' logical equations, verifying logical matrix, and logical decision matrix; ability of said resolver to process acquired data by said echelons'"'"' logical equations, verifying logical matrix, logical decision matrix and generalized resolving logical equation up to the final decision of the goal function of the intrusion detection and protection method; and creation and presentation of logically true sequence of caution and self-checking signals for every intrusion-suspected echelon, signal of intrusion vindication for the affected echelon, and final triggering signals of alarm and activation of security measures where the creation and presentation of the final triggering signals; and entry of triggering signals for starting security measures of active and passive protection and defense, which measures include at least;
activation of an alarm system, enclosing movable physical barriers around the protected works and installations, hence entrapping an intruding object inside echelon C, application of disabling tear gas, involving guard troops, deploying inflatable air obstacles in echelons S and L or opening defensive fire in echelon L. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
Specification