This application relates to a communications cable. More particularly, this application relates to a communication cable with fiber optic sensor elements.
In the area of network cabling, particularly copper network cables (LAN—Local Area Network cables), there are many issues surround breach of cable security. With fiber optic cables, breach of cable security is detectable by monitoring equipment that can detect decibel loss, mode changes, and the like, indicative of for example unexpected signal loss/change owing to unauthorized splicing.
However, with copper LAN cables it is more difficult to detect an unauthorized signal access because copper signal cables, such as twisted pair LAN cables, do not necessarily demonstrate pronounced signal changes when a cable is moved or otherwise exposed to discrete signal detecting activity or spliced in an unexpected manner.
It is a shortcoming of the prior art to provide a copper twisted pair LAN cable that includes sensor elements capable of detecting unwanted signal detecting activity or stealing of the signals passing through.
The present arrangement solves this issue by providing a hybrid communications cable having both twisted pair LAN cables as the primary communication components, while also having one or more fiber sensor elements used for detection of unauthorized access or signal detecting activity of the cable.
Moreover, because the cable design is for a secure cable, the cable includes many of the ordinary security features such as a metal armor. In order to increase the effectiveness of the fiber elements in their role as tampering detection elements, the fiber sensor elements which would ordinarily (if in a signal carrying role) be protected from outside forces, are instead placed in more vulnerable, less protected locations within the cable structure so that they are more sensitive to movements and/or disruptions caused by attempted violations of the cable integrity.
To this end, a cable is provided for detecting tampering thereof. The cable has at least one copper signal cable, a binder, an inner jacket, an armor, and at least one optical fiber sensor element, disposed within the cable. The at least one optical fiber sensor element is configured attenuate under stress to the cable, sufficient to detect a breach or signal detecting activity of the copper signal cable therein.
In another embodiment a cable is provided for detecting tampering thereof. The cable has at least two copper signal cables, at least one hollow buffer tubes located abutting the two copper signal cables, an inner jacket, an armor, and at least one loose tube optical fiber sensor element disposed within the cable in a configuration that subjects the optical fiber sensor to external conditions. The at least one loose tube optical fiber sensor element is located between and abutting at least one of the copper signal cables and the at least one adjacent hollow buffer tube. The at least one loose tube optical fiber sensor element is configured attenuate under changes in the external conditions.
The present invention can be best understood through the following description and accompanying drawing, wherein:
As shown in
In some arrangements, binder yarn 30 is standard binder armor is a typical binding filament to contain the core elements of cable 10 in place during jacketing and armoring. In some arrangements, internal jacket 60 and external jacket 61 are plenum rated polymer jacketing commonly used in armored cable arrangements for LAN cables, such as for halogen free flame and/or smoke rated jackets.
In some arrangements, filler spacer units 40 are polymer spacer elements for maintaining special geometry of the cable core elements underneath of binder yarn 30. Interlock armor 50 is typically interlocked aluminum armor included for its tamper resistant features. However, armor 50 may be in the form of a braided metal armor or even a dielectric polymer armoring (i.e. durable tamper resistant polymer-separate from jackets 60/61).
As shown in
In first embodiment, as shown in
In a second embodiment, as shown in
It is noted that the embodiments described in
In a third embodiment, as shown in
In a fourth embodiment, as shown in
Regarding the sizing of the sensor elements 81, it is a derivation from the outside diameter of LAN cables 12. Hollow fillers 44 are set to have an outside diameter of about ⅔ (0.66) of the outside diameter of LAN cables 12 so that the internal components of cable 10 have a substantially circular arrangement (i.e. a hypothetical circle could be drawn around such components as shown in
Such an arrangement as shown in
In this arrangement hollow spacers 44 may advantageously acts as “springs” transferring vibrations therethrough to sensor elements 81. Moreover, hollow fillers 81 hold the hollow tube of sensor fiber 81 against binder 30/inner jacket 60/armor 50 akin to someone holding their ear to a door to hear more of what is outside.
In a fifth embodiment, as shown in
In one embodiment such fiber elements 90 may be further subject to external forces by being included within binder 30 in a linear arrangement over the other core components (LAN cables 12, bumpers 40 etc.) which are otherwise stranded as in most communication cables. In this version, sensor elements 90 would run linear over underlying twisted components causing many cross-over points (over the twisting underlying components) that would increase sensitivity.
In a sixth embodiment, as shown in
In a seventh embodiment, as shown in
In an eight embodiment, as shown in
The ninth and tenth embodiments shown in
In an eleventh embodiment, as shown in
In a twelfth embodiment, as shown in
In this twelve-fiber tube arrangement 150 cable 10 may implement a combination of ordinary data transmitting fibers mixed with signal or vibration sensing fibers. For example, an intruder may not know which sensor fiber within cable 10, is which, thus providing more barriers to tampering owing to complicated fiber sensor structuring. We can also overload the 12 (or 24) fibers per tube 150 with data to further mix useful data with trojan horse data, further tying up the analytical resources of the intruder.
In other instances, the arrangement of
In operation, the fiber sensor elements described above are connected to a detection unit. Cable 10 may be used in any desired detection methodology that employs changes in signal quality in the fiber optic sensor elements to detect for example, movements or breeches of the cable. Owing to the sensitive non-protected locations of the fiber sensor elements with respect to armor 50 of cable 10, even slight movements of cable 10 will disrupt optical signals in the sensor elements. As such, it would be difficult to splice or engage in signal detecting activity on the signals in copper LAN cables 12 without detectable variations in the light signals passing through fiber sensor elements.
For example, a detection unit could be used to send a baseline optical signal for each of the fiber sensor elements of cable 12 (be it one or more). In some cases, if different embodiments of sensor elements are used (e.g. a sensor element 70, sensor element 90 and sensor element 110, used in the same cable 10), they may each have their own baseline signal taken, such as after initial installation.
Thereafter movements of cable 10, causing variations in the optical signal would be detected, including loss of signal strength (in dB), mode changes or variations etc. . . . . Some testing or AI (Artificial Intelligence) can be used to develop a profile of certain movements/agitations that create certain corresponding changes to develop a breech detection alert signal change profile. Cable 10 can later be monitored with the baseline signal and in the case of an alert style signal change caused by movement of the fiber sensors then an alert may be generated and distributed to the required personnel.
In some embodiments the fiber sensors elements that are least insulated, such as sensor elements 130 and 140, are signal overloaded in order to provide excess bandwidth to handle the increased level of signal activity that would be needed to use such sensor elements for detection sensors (as they would experience very significant attenuation during movements or attempted accesses.
While only certain features of the invention have been illustrated and described herein, many modifications, substitutions, changes or equivalents will now occur to those skilled in the art. It is therefore, to be understood that this application is intended to cover all such modifications and changes that fall within the true spirit of the invention.
This application is a continuation-in-part of U.S. patent application Ser. No. 16/381,454, filed on Apr. 11, 2019, the entirety of which is incorporated by reference.
Number | Name | Date | Kind |
---|---|---|---|
7154081 | Friedersdorf | Dec 2006 | B1 |
7755027 | Browning, Jr. | Jul 2010 | B2 |
20040071382 | Rich | Apr 2004 | A1 |
20040114888 | Rich | Jun 2004 | A1 |
20050184738 | Weaver | Aug 2005 | A1 |
20050244116 | Evans | Nov 2005 | A1 |
20090220188 | Bremnes | Sep 2009 | A1 |
20100277329 | Worzyk | Nov 2010 | A1 |
20120082422 | Sarchi | Apr 2012 | A1 |
20120174683 | Kemnitz | Jul 2012 | A1 |
20130011106 | Congdon, II | Jan 2013 | A1 |
20130077924 | Shin | Mar 2013 | A1 |
20140254994 | Cho | Sep 2014 | A1 |
20190056278 | Risch | Feb 2019 | A1 |
20190287699 | Schwartz | Sep 2019 | A1 |
Number | Date | Country |
---|---|---|
2948706 | Dec 2010 | CA |
2436015 | Apr 2012 | EP |
2478527 | Jul 2012 | EP |
2494325 | Sep 2012 | EP |
2014180664 | Nov 2014 | WO |
Number | Date | Country | |
---|---|---|---|
Parent | 16381454 | Apr 2019 | US |
Child | 16447189 | US |