1. Field of the Invention
The present invention relates to security systems and, more particularly, to such systems which mount over junction boxes to prevent tampering therewith.
2. Description of the Prior Art
Security systems have become widely popular in today's society and are used in many different applications. For instance, many times security systems are installed in automobiles in an effort to prevent those automobiles from being stolen or otherwise vandalized. Often times security systems are installed in dwellings to detect any unauthorized individuals breaking in the residence. Similarly, alarms are frequently installed in business and commercial establishments since it is appreciated that burglars believe that most business are attended at night, and that many such business establishments house very valuable equipment on the premises.
This increase in the number of alarms can be contributed to a number of factors. One such factor is that technology has made such alarm systems affordable and available to the majority of the population. Another factor is that many people today, due to job availability or other reasons, live in urban communities which are often associated with relatively high-crime rates. This leads to a sense of fear and insecurity, which for many people is to some degree alleviated by installing security systems in their homes or automobiles.
In addition, those living in more rural areas can often feel isolated and alone, and view security systems as a necessary means of protection. With the closest neighbor some distance away there is more opportunity for a burglar to access the residence without detection. In addition, police response to remote areas is often wanting.
Because of the above conditions, and due to technological advances today many security firms offer what are commonly referred to as central monitoring stations. A homeowner may install a security system in his or her residence to monitor access points like doors and windows for unauthorized entry and, if within a certain period of time a preselected code is not input into a keypad located within the residence, the security system will make contact with a central monitoring station via the residence's telephone lines to alert the station regarding the potential intruder. Such a system assures that even, if the residents of the home are unaware of the intruder, police will be notified and will respond to the residence.
The security systems, however, are not free from shortcomings. While most of these systems include some type of audible alarm, the real benefit is in the contacting of the central monitoring station which ensures a rapid police response. One significant drawback with alarms is that many people have become desensitized to the sound of an audible alarm and do not react. Often it is a false alarm, having been accidentally set off by the homeowner or car owner himself, which compounds the problem. Enterprising burglars realize this, and understand that if the telephone lines to the residence are cut such that a central monitoring station cannot be contacted, then even if the alarm in the residence is triggered, there will be sufficient time to enter the residence and remove the valuable items therefrom before anyone hearing the audible alarm might contact the authorities.
A number of devices have been proposed which mount over a telephone box and associated telephone lines on the exterior of a residence or other building to protect such lines from being severed or otherwise tampered with. A form of such device is disclosed in U.S. Pat. No. 3,868,080 to Olson. Such a device includes a channel-shaped stake adapted to be driven into the ground for receipt within the channel of the telephone line leading into the residence. A plate is secured to the upper end of the stake and has mounted thereon a telephone circuit protector. Such devices suffer from a number of shortcomings, however. In the first place, a persistent burglar can eventually breach the stake to gain access to the telephone lines to cut same and thereby prevent the security system monitoring the residence from alerting a central monitoring station of the impending break-in. In addition, such devices are vulnerable to tampering with the stake or plate without detection. Thus a burglar has the luxury of unlimited time to gain access to the enclosure and cut the telephone lines without concern for triggering the alarm.
Yet another type of security device is disclosed in U.S. Pat. No. 5,315,654 to Kraft and includes a cover which mounts over a terminal block attached to the exterior of a residence or other building. A motion sensor type alarm is included in the device to sense movement of the cover and generate an audible alarm signal in response thereto. This device is likewise not free from significant shortcomings. First of all, the alarm only activates upon removal of the cover from over the terminal block, and only generates an audible signal which, as discussed above, will often be of no benefit. Furthermore, once the cover is remove, the potential intruder will have access to the telephone lines to cut same before any type of alarm signal can be transmitted to a central monitoring station.
As such, it will be appreciated that there continues to be a need for an inexpensive reliable security device which provides a secure enclosure to protect telephone lines from being tampered with, and which is responsive to any such tampering to alert a central monitoring station before the unauthorized individual tampering with the telephone lines gains access to such lines to cut them. The present invention addresses such needs and others.
Other efforts have lead to the proposal that a rectangular tubular, open, sheet metal type frame be mounted over a juncture box. Mounted to the interior surface of the frame are mounting blocks formed with forwardly opening threaded bores. Mounted on the blocks are plunger switches having their plungers depressed by a cover held in place by threaded bolts screwed into the bores. Should a burglar remove the cover, the plungers will be free to shift the switches to their open positions activating an alarm at the central monitoring station. While effective to activate the alarm, there are considerable constraints on the switch mounting as their respective plungers have only limited travel and opening and closing thereof is critical to the effective operation of the system. In effort to solve this problem I have experimented with and even marketed some tamper proof enclosures mounting plunger switches to the inside of a rectangular housing frame with rigid L-shaped actuators mounted pivotally adjacent thereto, each having a first leg to be engaged by a cover mounting screw to, upon screwing the cover in place, rotate the respective actuators to depress the switch plungers and hold the alarm circuit closed. While effective for activating the alarm, this device suffered the shortcoming that the rigid actuators allowed for only limited play in opening and closing the respective switches thus requiring precise placement and careful adjustment upon assembly for proper activation. This tended to render the device prohibitively expensive and unacceptable for many applications. A device of this type was disclosed in my prior U.S. patent application Ser. No. 08/861,955 filed May 22, 1997, now abandoned.
Briefly, and in general terms, the present invention is characterized by an apparatus for protecting telephone lines and is responsive to any tampering to contact a central monitoring station before those telephone lines can be cut. The apparatus includes an open frame housing formed with a periphery dimensioned for mounting to a building to envelope the junction box and is constructed at its front with an inturned flange formed with bores for receipt of mounting screws. A cover is positioned over the flange and includes bores about its periphery to align with the flange bores so mounting screws may be inserted through the bores and screwed through respective nuts mounted behind the flanges. Mounted interiorly to the frame are plunger switches to be connected in circuit with an alarm circuit. Mounted in cantilever fashion to the frame adjacent the respective switches are elongated, leaf actuator springs. The springs are configured with respective intermediate sections overlying the respective plungers and are formed on their respective free extremities with drive tabs disposed in the paths of the respective screws as they are screwed to their respective closure positions, to drive the respective plungers to their switch-closed positions. Should the screws be unscrewed the tabs will tend to follow the screws thus releasing the intermediate positions of the springs to free the plungers to be biased to the respective switch opened positions to trigger an associated central alarm.
Other features and advantages of the invention will become apparent from the following detailed description, taken in conjunction with the accompanying drawings which illustrate, by way of example, the features of the invention.
Referring to
Mounted interiorly to the respective top and bottom walls of the frame are pairs of plunger switches 29 arranged with the respective plungers 30 projecting longitudinally to travel in a path orthogonal to the respective axis of the bolts 23 connecting the cover to the mounting flange 13. The plungers are operative to, upon being driven inwardly through a predetermined stroke open the associated electrical switch and to then bottom out without further travel.
Referring to
Referring to
Referring to
The switches actuators 40 and bolts 23 are so arranged that, travel of the respective bolts toward their closed position is sufficient to close the switches. Any additional travel of the screws necessary to tighten the cover into position will be accommodated as lost motion by flexure of the respective springs.
Referring to
With further reference to
In an alternative embodiment, the enclosure apparatus may still further include a motion detector (not shown) to sense assault by abnormal movement of the frame, such as in response to violent attacks thereupon by a potential burglar.
Referring to
It will be appreciated that the respective sensor switches could also be electrically connected to an existing alarm system within the residence, such system being responsive to receipt of an alarm signal from the enclosure apparatus to contact the central monitoring station 124, thereby alleviating the need for a separate processor and modulator/demodulator device. In addition, the processor 120 could be mounted inside the frame or alternatively could be disposed at a remote location such that even if an individual were to gain access to the inside of the enclosure apparatus, the processor would remain inaccessible and could still perform its function of contacting the central monitoring station.
In use, a worker may select a frame 11 and cover 15 having the appropriate dimensions for encasing the particular junction box 16 to be protected. The junction box is mounted to the building and wired. The frame 11 will then be positioned over the junction box 16 and the mounting screws 33 (
Referring to
Should an authorized individual attempt to remove the cover 15 by unscrewing the security bolts 23, it will be appreciated that such individual will first have to acquire a special tool designed for manipulating the specially configured screws. Even if that individual should be in possession of such a tool, once he or she begins to unscrew any of the security screws, the corresponding tamper switch 29 will be opened to generate a warning signal indicative of such tampering which is transmitted to the processor 120. Should the individual then succeed in grasping the cover 15 and prying it off the frame not only will the tamper switch be actuated, the cover tamper sensor will also be actuated to transmit a warning signal to the processor. If the entire frame is removed from the building, that will trigger the enclosure removal switch 98 to transmit a corresponding warning signal to the processor thus sounding an alarm.
From the foregoing, it will be appreciated that the enclosure apparatus of the present invention provides an inexpensive and reliable enclosure to restrict unauthorized access to a telephone junction box. The apparatus is inexpensive to manufacture and assemble, yet providing full proof protection.
While a particular form of the present invention has been illustrated and described, it will also be apparent that various modifications can be made without departing from the spirit and scope of the invention. Accordingly, it is not intended that the invention be limited, except as by the appended claims.
Number | Name | Date | Kind |
---|---|---|---|
1112346 | Wilcox | Sep 1914 | A |
2465935 | Scalia | Mar 1949 | A |
2480288 | Donadio | Aug 1949 | A |
3295124 | Burleson et al. | Dec 1966 | A |
3556394 | Caldes | Jan 1971 | A |
3707260 | Gelineau, Sr. et al. | Dec 1972 | A |
3767867 | Altenberger | Oct 1973 | A |
3835461 | Nelson | Sep 1974 | A |
3868080 | Olson | Feb 1975 | A |
3935994 | Darvishian | Feb 1976 | A |
4018148 | Wolbrink | Apr 1977 | A |
4033477 | Hoppe et al. | Jul 1977 | A |
4150371 | Scaglione | Apr 1979 | A |
4151506 | Schoenmetz | Apr 1979 | A |
4154393 | Darvishian | May 1979 | A |
4230450 | LeFever | Oct 1980 | A |
4235491 | Korber | Nov 1980 | A |
D260090 | Hughes et al. | Aug 1981 | S |
D260876 | Pershyn | Sep 1981 | S |
4287514 | Wartman et al. | Sep 1981 | A |
4297683 | Roberts | Oct 1981 | A |
4329681 | Parsons | May 1982 | A |
4385288 | Bitko | May 1983 | A |
4447005 | Kelly et al. | May 1984 | A |
4464792 | Owerko | Aug 1984 | A |
4520350 | Huang | May 1985 | A |
4583483 | Rausch | Apr 1986 | A |
4623765 | Leyden | Nov 1986 | A |
4638129 | Partus et al. | Jan 1987 | A |
4688023 | McGill et al. | Aug 1987 | A |
4749359 | White | Jun 1988 | A |
4752232 | De Luca | Jun 1988 | A |
4800588 | Poster, Jr. | Jan 1989 | A |
4823381 | Olson | Apr 1989 | A |
4823572 | Signorelli | Apr 1989 | A |
4825466 | Dowler et al. | Apr 1989 | A |
4853960 | Smith | Aug 1989 | A |
4872210 | Benages | Oct 1989 | A |
4895299 | Okunami | Jan 1990 | A |
4939960 | Kinzli | Jul 1990 | A |
5023595 | Bennett | Jun 1991 | A |
5172097 | Arnold | Dec 1992 | A |
5227668 | Mutch et al. | Jul 1993 | A |
5235133 | Roth et al. | Aug 1993 | A |
5239305 | Murphy et al. | Aug 1993 | A |
5293115 | Swanson | Mar 1994 | A |
5315654 | Kraft | May 1994 | A |
5369548 | Combs | Nov 1994 | A |
5519756 | Clift | May 1996 | A |
5621387 | Phillips et al. | Apr 1997 | A |
5666831 | Doros | Sep 1997 | A |
5764729 | Black et al. | Jun 1998 | A |
6061447 | Poston | May 2000 | A |
6094136 | Wyman | Jul 2000 | A |
7170403 | Noguchi | Jan 2007 | B2 |
Number | Date | Country | |
---|---|---|---|
20090133610 A1 | May 2009 | US |