Diversity networks and methods for secure communications
First Claim
1. A network comprising:
- a. a computer; and
b. a computerized sensor;
wherein the computerized sensor is protected within concrete or steel components of a physical security barrier and is communicatively connected to the computer and configured to communicate messages containing sensor data to the computer;
wherein paths, channels, and/or other communications technologies used to link the computerized sensor to the computer are switched automatically and autonomously by the computerized sensor; and
wherein at least some of the messages are sent by the computerized sensor at pseudo-randomly selected times known in advance by both the computer and the computerized sensor.
2 Assignments
0 Petitions
Accused Products
Abstract
Security systems may include sensing, networked communications, stealth, alarms, and countermeasures, any or all of which may adapt to threats. These systems may also include armor and barriers of concrete and/or steel. They can adapt to severity of threats, weather, and/or other situational aspects. They can anticipate at least some threats in order to obtain early warning and react more quickly to those threats. They can adapt by altering their configurations, including alterations in communication networking structures and methods, and changes in data-storage and processing duties at processing nodes. Defensive and/or offensive countermeasures can be employed to deter, confuse, trap, and/or disable terrorists. The systems are capable of self-maintenance, self-healing, and self-restoration as threats subside. The systems can include subsystems capable of autonomous operation. At least some of the systems and/or their subsystems are capable of allocating power among subsystems, and of regulating bandwidth utilizations.
150 Citations
27 Claims
-
1. A network comprising:
-
a. a computer; and b. a computerized sensor; wherein the computerized sensor is protected within concrete or steel components of a physical security barrier and is communicatively connected to the computer and configured to communicate messages containing sensor data to the computer; wherein paths, channels, and/or other communications technologies used to link the computerized sensor to the computer are switched automatically and autonomously by the computerized sensor; and wherein at least some of the messages are sent by the computerized sensor at pseudo-randomly selected times known in advance by both the computer and the computerized sensor. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A network comprising:
-
a. a computer; and b. a computerized sensor; wherein the computerized sensor is protected within concrete or steel components of a physical security barrier and is communicatively connected to the computer and configured to communicate messages containing sensor data from the computerized sensor to the computer over one or more provisioned channels, paths, and/or communications technologies selected automatically and randomly by the computerized sensor; and wherein the computerized sensor initiates messages at randomly selected times known in advance by both the computer and the computerized sensor. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26)
-
-
27. A method of providing security comprising the steps of:
-
a. providing; i. multiple digital-communications media; and ii. an interlinked chain of concrete barrier modules, wherein each module comprises a hole through that module, and wherein each module comprises a steel beam that extends movably through the respective hole of that module; wherein the steel beam of at least one of the modules is rotatably coupled to a respective steel beam of each of two adjacent modules that are located next to the at least one of the modules; wherein at least one of the multiple digital-communications media is routed along a path extending through at least the respective holes of the at least one of the modules and the two adjacent modules; wherein the at least one of the multiple digital-communications media connects a computerized sensor to a computer installed within one of the holes and messages containing sensor data are communicated from the computerized sensor to the computer over one or more provisioned channels, paths, and/or communications technologies of the multiple digital-communications media selected automatically and randomly by the computerized sensor; wherein the computerized sensor initiates the communication of messages at randomly selected times known in advance by both the computer and the computerized sensor; and b. generating a breach alarm when communication of messages along the path becomes disabled.
-
Specification