The present invention relates generally to security systems, and more particularly, to fiber optic security systems and methods of using the same.
Security systems are widely used in attempts to protect various types of items. Certain items are particularly difficult to protect with conventional security systems. For example, items in remote areas may be difficult to monitor and protect. Further, items that are generally kept outside are particularly susceptible to theft and/or damage.
Solar photovoltaic panels and solar photovoltaic substrates are examples of such items. As is known to those skilled in the art, solar panels are generally installed outside (e.g., on a roof of a building, or on frames mounted directly on the ground, etc.) to receive light from the sun. The solar substrates are typically connected to a frame (i.e., support structure) of the substrate using bolts. Thus, it is relatively easy for a thief to steal valuable solar panels through the removal of a few bolts and electrical cables.
Likewise, cargo that travels in remote areas (e.g., by train, by boat, etc.) is a common target for thieves. Conventional locking mechanisms may be defeated or destroyed rendering the contents of cargo containers accessible by the thief, and some mechanisms may be defeated and later replaced without leaving externally visible evidence of tampering.
Thus, it would be desirable to provide improved security systems for items to be monitored using the security systems.
According to an exemplary embodiment of the present invention, a fiber optic security system is provided. The fiber optic security system includes at least one length of fiber optic cable affixed to at least one item to be monitored using the fiber optic security system. The fiber optic security system also includes at least one local control node, the at least one local control node including at least one light source for generating and transmitting light through the at least one length of fiber optic cable, the at least one local control node monitoring a status of the light. The fiber optic security system also includes a remote control unit for receiving information regarding the status of the light from the at least one local control node.
According to another exemplary embodiment of the present invention, a method of operating a fiber optic security system is provided. The method includes the steps of: (1) affixing at least one length of fiber optic cable to at least one item to be monitored using the fiber optic security system; (2) generating and transmitting light through the at least one length of fiber optic cable using at least one light source of at least one local control node of the fiber optic security system; (3) monitoring a status of the light generated and transmitted in step (2); and (4) transmitting information regarding the status of the light from the at least one local control node to a remote control unit of the fiber optic security system that may provide alarm status information directly to a user or to a higher level monitoring system.
It is to be understood that both the foregoing general description and the following detailed description are exemplary, but are not restrictive, of the invention.
The invention is best understood from the following detailed description when read in connection with the accompanying drawings. It is emphasized that, according to common practice, the various features of the drawings are not to scale. On the contrary, the dimensions of the various features are arbitrarily expanded or reduced for clarity. Included in the drawings are the following figures:
As will be explained in greater detail below, according to certain exemplary embodiments of the present invention, a self-contained security system designed to prevent the theft/removal of valuable equipment is provided. Such an exemplary system includes an enclosure unit (e.g., a sealed enclosure unit) containing an optical transmitter/receiver, a wireless transmitter/receiver, a primary (e.g., external) power source, an automatic (e.g., internal) backup power source, and input/output connections for fiber optical cable (e.g., plastic fiber optic cable). A fiber optic cable is looped through or otherwise securely attached to the item/equipment being monitored (with both ends connected to the sealed enclosure unit) such that it is difficult for the equipment to be removed without the cable being cut or broken, and/or without damage being caused to the sealed enclosure unit (the local control node) or to the item being monitored. In one example, the fiber optic cable is affixed to the item to be monitored in a manner such that the item can not be separated from the fiber optic cable without at least one of: (1) damaging the item, (2) damaging the local control node, (3) cutting the fiber optic cable, and/or (4) separating the fiber optic cable from the local control node. A light signal is transmitted through the cable and monitored for continuity. A loss of the light signal is indicative of a break in the cable (e.g., attempted theft of the item being monitored). The loss of the light signal results in an alarm which can be discerned locally and/or remotely (e.g., via a wireless connection to a central monitoring station). Unauthorized opening or damaging the enclosure unit will also send an alarm (e.g., to the central monitoring station). The system may also monitor other system characteristics as desired, and provide alarms or other indications related to such other characteristics. Multiple systems (e.g., multiple lengths of fiber optic cable attached to different items to be monitored, multiple enclosure units, etc.) can be operated simultaneously, with all reporting wirelessly to the central monitoring station either directly or via a wireless mesh network.
Referring now to the drawings, in which like reference numbers refer to like elements throughout the various figures that comprise the drawings,
Fiber optic cable 100 (e.g., 100a, 100b, 100c, . . . , 100n) may be any type of fiber optic cable generally available such as, for example, silica based optical fiber cables (e.g., SMF-28, manufactured by Corning, Inc.), plastic optical fiber cables (e.g., Super Eska fiber cable, produced by the Eska Optical Fiber Division of Mitsubishi Rayon Co., Ltd.), or others.
One end of fiber optic cable 100 is attached to light source/optical source 200 through connector/adapter 101a. Light source 200 may be a laser, or may be a light emitting diode (LED) such as an edge emitting light emitting diode (an EELED), a surface light emitting diode (an SLED), or others. Light source 200 may be operated in a continuous wave (CW) mode, in a pulsed mode, or other transmission modes. In an exemplary pulsed mode, an optical signal with a pulse width on the order of 1 millisecond and a repetition rate on the order of 10 Hz is provided. An exemplary range for the repetition rate is between approximately 0.001 seconds and 10 seconds. As will be appreciated by those skilled in the art, such short optical pulses minimize the electrical power used; however, such a moderate repetition rate ensures that the fiber can not be cut and re-attached before the system can determine that a security breach has occurred. Another end of fiber optic cable 100 is attached to optical receiver 500 through connector/adapter 101b.
Light source 200 is controlled by optical current control circuit 250, and generates an optical signal transmitted along fiber optic cable 100. The optical signal travels along fiber optic cable 100 and returns to optical receiver 500 of local control node 150. The output of optical receiver 500 is connected to processor 600 (e.g., digital signal processor 600, microcontroller 600, etc.). Processor 600 also receives auxiliary information 110 related to fiber optic security system 10. As will be explained in greater detail below, auxiliary information 110 may include information from various additional sources such as, for example, an input (e.g., a digital input) from an interlock of enclosure 152 (e.g., interlock 152a shown in
The output of optical receiver 500 (after it passes through ADC 540) is connected to processor 600. Processor 600 may be considered to include a detection unit for analyzing the output electrical signal from optical receiver 500. For example, processor 600 may be used to detect at least one of (1) continuity of the fiber optic cable, and (2) connectivity between the fiber optic cable and the local control node. Further, processor 600 may also analyze the output electrical signal from optical receiver 500 to monitor the intensity of light received from each corresponding optical pulse signal. If the intensity of light received during a light pulse is above a preset threshold, a normal condition exists, and no alarm state is communicated. However, if the pulse intensity is below the preset threshold, a tamper or theft condition may be assumed, and processor 600 transmits an appropriate signal to communications device 700 (See
Certain of the elements of local control node 150 may be included in a single module within enclosure 152 of
By analyzing the various signals provided to processor 600, local control node 150 (e.g., through processor 600) may be used to determine a variety of alarm conditions, whereby the alarm condition may be communicated to remote control unit 160 (and may be further communicated to monitoring station 170 by remote control unit 160). Exemplary alarm conditions include, but are not limited to: (1) damage to the fiber optic cable; (2) disconnection between the fiber optic cable and the local control node; (3) damage or tampering with the local control node; (4) unintended restart of a local control node; and (5) a characteristic of the light generated and transmitted through the fiber optic cable differing from a predetermined range of the characteristic. Such a characteristic of the light may be (a) an intensity of the light generated and transmitted through the fiber optic cable, (b) a repetition rate of a pulsing of the light generated and transmitted through the fiber optic cable, and (c) a duration of pulses of the light generated and transmitted through the fiber optic cable. Another exemplary alarm condition that may be communicated from the remote control unit 160 (e.g., to monitoring station 170) is an interruption or loss of electrical power to the local control node.
The fiber optic security systems according to the present invention may be used to monitor any type of item(s) as desired. Exemplary items that may monitored using the fiber optic security system of the present invention include, for example: (1) solar photovoltaic panel(s) configured to convert light energy received by the solar photovoltaic panel into electrical energy; (2) a cargo container configured to hold and secure goods during transit or storage; (3) a camera; (4) an entry door, amongst others.
Solar photovoltaic panels are increasingly subject to theft. The panels are valuable and are generally removable from a mounting structure (e.g., a metal frame) that holds the panels by removing bolts. The panels are often in a remote location making them particularly accessible to thieves. Thus, according to certain exemplary embodiments of the present invention, solar photovoltaic panel security systems are provided.
As provided above, another exemplary application for fiber optic security systems according to the present invention is the monitoring of cargo containers configured to hold and secure goods during transit or storage.
As provided above, another exemplary application for fiber optic security systems according to the present invention is the monitoring of cameras (e.g., video cameras).
As provided above, another exemplary application for fiber optic security systems according to the present invention is the monitoring of entry doors (e.g., entry doors into rooms).
At step 1002, light is generated and transmitted through the at least one length of fiber optic cable using at least one light source of at least one local control node of the fiber optic security system. For example,
According to an exemplary embodiment of the present invention, each local control node periodically communicates its status to the remote control unit to provide information concerning a number of potential tamper conditions. Detected tamper conditions are transmitted as alarms by the local control node immediately to the remote control unit. One such potential tamper condition is a restart of the local control node (e.g., indicating interruption of power to the local control node). For example, if power is removed from the local control node, and then re-applied to the local control node, this may be communicated to the remote control unit as an unexpected restart (e.g., communicated as an alarm condition, communicated a status indication, etc.).
The present invention may utilize a “handshake” type methodology to automatically respond to interference by other systems operating at the same communication frequency (or by intentional attempts to jam the operating frequency). Upon startup (and/or at a predetermined time interval), the remote control unit may be configured to “search” for a desirable operational frequency. That is, the remote control unit “listens” for transmissions from the local control nodes (e.g., status transmissions from the local control nodes are considered “healthy” status transmissions). Upon detection of these transmissions, the remote control unit broadcasts “received” messages at a predetermined interval (e.g., 1 second intervals) until status transmissions sent from a predetermined percentage of the local control nodes are detected. Upon detection of status transmissions from fewer than the predetermined percentage of the local control nodes within a predetermined time interval, logic of the remote control unit determines that the system is operating at a sub-optimal frequency (e.g., one that has been jammed or one on which a nearby system is also operating). The remote control unit then listens at other available operating frequencies (e.g., selected from a group of predetermined frequencies) and selects another frequency based on certain predetermined criteria (e.g., criteria such as a frequency at which there is the lowest amount of total received energy, that is, the fewest current number of users on that frequency). After the remote control unit changes the frequency, if a broadcast from the remote control unit has not been received by a given local control node within a predetermined timeout period, logic of the local control node assumes that its operational communication frequency is different from that of the remote control unit (e.g., because it was changed by the remote control unit). In such a case, a status message is sent by the local control node at the next frequency in a predetermined series of potential operational frequencies. This continues until a “received” message has been received by the local control node. At that point in time, the local control node logic assumes it is operating at the correct frequency.
It will be appreciated that the fiber optic security system may be designed to accommodate many (e.g., hundreds) of local control nodes in communication with a single remote control unit. Such an arrangement creates the potential problem of conflicts during which multiple local control nodes are attempting to communicate with the remote control unit simultaneously. To mitigate this problem, it is desirable that status messages be sent at a reasonable rate. More specifically, in connection with certain exemplary embodiments of the present invention, the rate of transmission of a status message from the local control node may vary (e.g., the rate of transmission may change from a first rate before proper communication is established, and at a second less frequent rate after proper communication is established). In a specific example, the local control node transmits a message (e.g., at a predetermined frequency configured to be received by the remote control unit) at a first transmission rate, such as 1 transmission per second, in an attempt to establish (or continue) proper communication with the remote control unit. After receipt of the message from the local control node, the remote control unit broadcasts a “received” message to each of the plurality of local control nodes, where the remote control unit message includes the unique address of the local control node from which the transmission had been received. Receipt of this “received” message at the local control node whose address matches the broadcast “received” message causes this local control node to reset a timer/counter. That is, as opposed to transmitting the message at the first rate (e.g., one transmission per second), the local control node transmits the message at a second transmission rate, such as 1 transmission per 15 seconds. By reducing the transmission rate, this helps conserve energy within the batteries of the local control node, and also clears the communication frequency for an extended period of time enabling more unimpeded time for other local control nodes that may be having their transmissions in conflict with each other.
It will be appreciated that if a remote control unit has not received a status message from a local control node within a predetermined time (e.g., 60 seconds), the remote control unit logic assumes that the local control node has been damaged or destroyed, and the remote control unit may transmit an alarm condition (e.g., a “lost” alarm condition) to a user and/or monitoring station 170 illustrated in
Although illustrated and described above with reference to certain specific embodiments, the present invention is nevertheless not intended to be limited to the details shown. Rather, various modifications may be made in the details within the scope and range of equivalents of the claims and without departing from the spirit of the invention.
This application claims the benefit of priority to U.S. Provisional Patent Application Ser. No. 61/338,822, filed on Feb. 23, 2010, the contents of which are incorporated in this application by reference.
Number | Name | Date | Kind |
---|---|---|---|
4155005 | Knowlton et al. | May 1979 | A |
4255015 | Adams et al. | Mar 1981 | A |
4292628 | Sadler | Sep 1981 | A |
4800267 | Freal et al. | Jan 1989 | A |
4826322 | Philips | May 1989 | A |
4879755 | Stolarczyk et al. | Nov 1989 | A |
4893930 | Garrett et al. | Jan 1990 | A |
4994668 | Lagakos et al. | Feb 1991 | A |
5011262 | Layton | Apr 1991 | A |
5051799 | Paul et al. | Sep 1991 | A |
5227857 | Kersey | Jul 1993 | A |
5367376 | Lagakos et al. | Nov 1994 | A |
5397891 | Udd et al. | Mar 1995 | A |
5493390 | Varasi et al. | Feb 1996 | A |
5680489 | Kersey | Oct 1997 | A |
5712932 | Alexander et al. | Jan 1998 | A |
5798834 | Brooker | Aug 1998 | A |
5986749 | Wu et al. | Nov 1999 | A |
6104492 | Giles et al. | Aug 2000 | A |
6157711 | Katz | Dec 2000 | A |
6281976 | Taylor et al. | Aug 2001 | B1 |
6381048 | Chraplyvy et al. | Apr 2002 | B1 |
6453022 | Weinman, Jr. | Sep 2002 | B1 |
6654521 | Sheng et al. | Nov 2003 | B2 |
6819812 | Kochergin et al. | Nov 2004 | B2 |
6891621 | Berg et al. | May 2005 | B2 |
6900726 | Graves | May 2005 | B2 |
7013729 | Knudsen et al. | Mar 2006 | B2 |
7282697 | Thomas et al. | Oct 2007 | B2 |
7683312 | Goldner et al. | Mar 2010 | B2 |
7840105 | Goldner et al. | Nov 2010 | B2 |
7994469 | Goldner et al. | Aug 2011 | B2 |
7999946 | Andersen et al. | Aug 2011 | B2 |
20020063866 | Kersey et al. | May 2002 | A1 |
20020064331 | Davis et al. | May 2002 | A1 |
20020064332 | Martin | May 2002 | A1 |
20030145654 | Knudsen et al. | Aug 2003 | A1 |
20040046111 | Swierkowski | Mar 2004 | A1 |
20040246816 | Ogle | Dec 2004 | A1 |
20050097955 | Berg et al. | May 2005 | A1 |
20050111788 | Tsuyama | May 2005 | A1 |
20060120675 | Goldner et al. | Jun 2006 | A1 |
20070065149 | Stevens et al. | Mar 2007 | A1 |
20080137589 | Barrett | Jun 2008 | A1 |
20090101800 | Goldner et al. | Apr 2009 | A1 |
20090140852 | Stolarczyk et al. | Jun 2009 | A1 |
20100005860 | Coudray et al. | Jan 2010 | A1 |
Number | Date | Country |
---|---|---|
2001-221684 | Aug 2001 | JP |
2006-172339 | Jun 2006 | JP |
2007-232515 | Sep 2007 | JP |
10-1997-0002776 | Jan 1997 | KR |
10-2002-0008457 | Jan 2002 | KR |
9905493 | Feb 1999 | WO |
2011050227 | Apr 2011 | WO |
Entry |
---|
International Search Report for International Application No. PCT/US2010/053659 issued by the Korean Intellectual Property Office on Aug. 2, 2011. |
International Search Report for International Application No. PCT/US2010/053763 issued by the Korean Intellectual Property Office on Jul. 28, 2011. |
International Search Report for International Application No. PCT/US2011/025206 issued by the Korean Intellectual Property Office on Oct. 17, 2011. |
International Search Report for International Application No. PCT/US2011/024465 issued by the Korean Intellectual Property Office on Oct. 27, 2011. |
International Search Report for International Application No. PCT/US2010/025248 issued by the Korean Intellectual Property Office on Oct. 11, 2011. |
International Search Report for International Application No. PCT/US2012/022356 issued by the Korean Intellectual Property Office on Sep. 3, 2012. |
International Search Report for International Application No. PCT/US2012/028224 issued by the Korean Intellectual Property Office on Sep. 24, 2012. |
Number | Date | Country | |
---|---|---|---|
20110206369 A1 | Aug 2011 | US |
Number | Date | Country | |
---|---|---|---|
61338822 | Feb 2010 | US |