×

Double-end fiber optic security system for sensing intrusions

  • US 7,852,213 B2
  • Filed: 08/06/2007
  • Issued: 12/14/2010
  • Est. Priority Date: 08/06/2007
  • Status: Active Grant
First Claim
Patent Images

1. A security system for detecting unauthorized intrusions at a plurality of predetermined locations having moveable closure members which must be moved in order to gain entry into said locations, said system comprising:

  • a plurality of intrusion sensors disposed at said locations for detecting movement of said closure members and attempted intrusions at said locations and generating intrusion signals when one or more intrusion sensors are activated by a prescribed level of intrusion activity;

    a primary optical fiber sensor line routed through said intrusion sensors being operable to monitor downstream sensors downstream of a break in said primary sensor line;

    a secondary optical fiber sensor line routed through said intrusion sensors being operable to monitor upstream sensors upstream of said break in said secondary sensor line;

    a primary scanning unit in communication with said primary sensor line for generating and transmitting light pulse signals along said primary sensor line, and receiving reflected pulse signals reflected back along said primary sensor line;

    a secondary scanning unit in communication with said secondary sensor line for generating and transmitting light pulse signals along said secondary sensor line, and receiving reflected pulse signals reflected back along said secondary sensor line;

    a processor in communication with said primary and secondary scanning units for processing said reflected pulse signals to determine if a change has occurred in a reflected pulse signal signifying a prescribed level of unauthorized intrusion activity and an intrusion signal; and

    said processor generating an alarm signal in response to determining said intrusion signal for signaling a predetermined response to the activity and an indication of the specific location of the unauthorized activity.

View all claims
  • 4 Assignments
Timeline View
Assignment View
    ×
    ×