This invention relates to a wireless alarm system that can detect and verify an illegal attempt to open or breach an access hatch that provides protection for an asset.
Companies operating in the water, gas, electricity and other utility industries need to protect their assets to ensure the safety of customers and provide uninterrupted supply of commodity. The threat of vandalism, terrorism or extortion means that points of access are vulnerable to attack. These include inspection and access hatches that may be remote and outside secure premises. Rapid response to any attack is required to limit any damage to assets, people or the environment. This will entail an alarm condition triggering a police response, which is governed by restrictions imposed in the UK by the ACPO (Association of Chief of Police Officers). Any alarm that has the potential to initiate police response must be verified before action is taken. Increasingly, companies are looking for low cost, easily maintainable solutions to address this issue.
This invention offers a detection system that is low cost, simple to install and verifies an alarm condition that could signify an attack on a hatch.
The main problem associated with installation of detection systems of this type is that long runs of expensive cabling is required to link hatches to a central monitoring point so that an alarm signal may be transmitted to a control centre. The cost of the cabling and installation is very high. Because each hatch requires a unit (slave) containing a set of sensors located within the hatch, traditional wireless systems have difficulty penetrating the hatch's metallic construction, resulting in reduced operating range and reliability. This invention uses an antenna design that attaches to the wall of the hatch by a strong magnet and electro magnetically couples radio frequencies through the hatch to the atmosphere.
The slave unit contains a radio frequency transceiver unit that operates in the license-free ISM (Industrial, Scientific & Medical) bands within the restrictions of the regulatory document CEPT/ERC/70-03. This communicates with a master unit situated in another hatch or control hut.
Each slave and master unit contains sensors capable of detecting attack by:
These sensors use a dual-technology approach to verify that an actual attack is taking place rather than a random disturbance or accidental trigger event. Specifically, this invention uses a variable hardware and software algorithm to verify attack by portable hand tools such as drills, angle grinders and thermal cutting devices. The mechanical strength of hatches reduce the speed at which a successful attack may take place, therefore it may take 30 seconds or more to breach a hatch successfully. This invention monitors audio and vibration disturbances over an adjustable timeline to determine whether a real attack is in progress. If two thresholds are crossed, an alarm is communicated necessitating police response.
Audio is monitored using a microphone in combination with an electronic timer. When audio is detected above the adjustable level a, the timer is started. A time window is created (finishing at variable point b) whereby if the threshold is additionally crossed a set number of times, a flag generates the trigger for an alarm to be communicated by the system.
Vibration is monitored using a tilt mechanism in combination with an electronic timer. When vibration is detected above the adjustable level c, the timer is started. A time window is created (finishing at variable point d) whereby if the threshold is additionally crossed a set number of times, a flag generates the trigger for an alarm to be communicated by the system.