The present invention relates to a pipeline intruder locator system. More specifically, the invention provides a system to detect and track unauthorized intrusions and activities within pipeline rights of way (ROWs).
Pipeline infrastructures, particularly in regions like Nigeria, Mexico, Iraq, Colombia, Russia, and India, are critical to the economic stability and energy supply of the nation. However, these infrastructures are frequently targeted for illegal activities, such as crude oil theft, and pipeline vandalism. This leads to significant financial losses and also poses severe risks to the environment and public safety. Current solutions for monitoring and protecting these assets include horizontal directional drilling (HDD), reinforced pipelines, and drone surveillance of the pipeline ROW. While these methods offer some level of security, they have significant limitations in effectively deterring and addressing the real-time activities of intruders.
For instance, HDD and reinforced pipelines primarily focus on preventing physical breaches, but do not address the detection of actual intruders or the ongoing monitoring of pipeline ROWs. Drone surveillance, on the other hand, provides a visual overview but often falls short in continuous and real-time tracking, especially under adverse weather conditions or during night-time operations. These methods fail to provide an integrated approach that both detects intrusions and facilitates the immediate tracking and apprehension of perpetrators.
Moreover, the existing systems do not offer a scalable solution that can adapt to vast and geographically diverse pipeline networks, which is critical for countries with extensive pipeline infrastructures. The need for a comprehensive, real-time monitoring and response system is evident to minimize the impact of illegal activities and ensure the safety and integrity of pipeline assets.
Therefore, a pipeline intruder locator system that addresses pipeline asset theft by integrating advanced sensing technologies with real-time data processing and tracking capabilities is needed. This system detects intrusions using fiber-optic and satellite technologies and provides for continuous tracking of intruders beyond the initial point of detection. The system further provides for coordinating closely with security forces, public or private, to ensure rapid response and apprehension. This system addresses the critical gaps left by existing technologies, offering a more effective and efficient means of securing pipeline assets against unauthorized access and theft.
In light of the devices disclosed in the known art, it is submitted that the present invention substantially diverges in design elements and methods from the known art and consequently it is clear that there is a need in the art for a pipeline intruder locator system. In this regard the instant invention substantially fulfills these needs.
In view of the foregoing disadvantages inherent in the known types of pipeline intruder locator system now present in the known art, the present invention provides a new pipeline intruder locator system for enhancing the security and monitoring of pipeline rights of way (ROW). The system comprises a mapping system having fiber-optic sensors and satellite surveillance to delineate the ROW and enable accurate mapping and monitoring. An intruder detection system is operably connected to the mapping system and is configured to detect unauthorized presences, tag these presences as intruders, and assign a unique identification number to each detected intruder. Furthermore, the system includes a follow-on locator system that employs a satellite network to track the movement of these intruders in real-time once they move outside of the ROW. A communication interface is integrated into the system to facilitate the transmission of intruder location data to a computer system, such that security personnel can be rapidly deployed with real time information.
It is an objective of the present invention to offer a pipeline intruder locator system designed to provide comprehensive surveillance of pipeline rights of way (ROW). This system utilizes advanced technologies, such as fiber-optic sensors and satellite surveillance, to detect unauthorized intrusions and activities, enhancing security measures and reducing the incidence of oil theft and vandalism.
It is an objective of the present invention to offer a pipeline intruder locator system that facilitates real-time tracking and monitoring of intruders. The system assigns unique identification numbers to detected intruders and tracks their movements using geolocation technologies, enabling continuous monitoring even when the intruder moves outside of the initially mapped area.
It is yet another objective of the present invention to offer a pipeline intruder locator system that provides real-time data of intruders so as to facilitate the coordination and efficiency of response operations. Thus, the system significantly improves the likelihood of apprehending intruders and preventing further illegal activities.
Another objective of the present invention is to offer a pipeline intruder locator system that minimizes environmental and financial impacts of pipeline intrusions. The early detection and rapid response capabilities of the system are designed to reduce the frequency and severity of oil spills and other environmental damages, thereby safeguarding both ecological and economic interests.
It is an objective of the present invention to offer a pipeline intruder locator system adaptable for use in various geographical and infrastructural contexts. The flexibility and scalability of the system make it suitable for deployment in diverse pipeline networks, ensuring broad applicability and effectiveness across different regions and pipeline configurations.
It is therefore an object of the present invention to provide a new and improved pipeline intruder locator system that has all of the advantages of the known art and none of the disadvantages.
Other objects, features and advantages of the present invention will become apparent from the following detailed description taken in conjunction with the accompanying drawings.
Although the characteristic features of this invention will be particularly pointed out in the claims, the invention itself and manner in which it may be made and used may be better understood after a review of the following description, taken in connection with the accompanying drawings wherein like numeral annotations are provided throughout.
Reference is made herein to the attached drawings. Like reference numerals are used throughout the drawings to depict like or similar elements of the system. For the purpose of presenting a brief and clear description of the present invention, the embodiment discussed will be used for providing security and monitoring of pipeline rights of way (ROW). The figures are intended for representative purposes only and should not be considered to be limiting in any respect. Furthermore, the described features, structures, or characteristics may be combined in any suitable manner in one or more embodiments. In the following description, numerous specific details are provided to give a thorough understanding of embodiments.
Reference will now be made in detail to the exemplary embodiment(s) of the invention. References to “one embodiment,” “at least one embodiment,” “an embodiment,” “one example,” “an example,” “for example,” and so on indicate that the embodiment(s) or example(s) may include a feature, structure, characteristic, property, element, or limitation but that not every embodiment or example necessarily includes that feature, structure, characteristic, property, element, or limitation. Further, repeated use of the phrase “in an embodiment,” “first embodiment,” “second embodiment,” or “third embodiment” does not necessarily refer to the same embodiment.
As used herein, “computer-readable medium” or “memory” excludes any transitory signals, but includes any non-transitory data storage circuitry, e.g., buffers, cache, and queues, within transceivers of transitory signals. As used herein, “logic” refers to (i) logic implemented as computer instructions and/or data within one or more computer processes and/or (ii) logic implemented in electronic circuitry.
Referring to
In one embodiment, fiber-optic sensors 1120 are installed along the ROW as part of the mapping system. These sensors are either buried alongside the pipeline or attached directly to it. They function primarily based on the principle of distributed acoustic sensing (DAS), which utilizes the inherent properties of fiber optics to detect vibrations and acoustic signals along the length of the fiber. When vibrations occur—such as those caused by digging, heavy machinery operation near the pipeline, or even foot traffic—the light signals within the fiber-optic cable are disturbed, and these disturbances are detected and analyzed.
In one embodiment, the intruder detection system 1200 is linked to the fiber-optic sensors 1120 and is tasked with interpreting the signals they emit. In one embodiment, the intruder detection system 1200 relies on artificial intelligence (AI) or image recognition technologies directly in the fiber-optic sensing part of the detection process. Alternatively, the intruder detection system 1200 analyzes the patterns of disturbances detected by the sensors to determine whether they match the characteristics of typical intruder activities, such as unauthorized digging or tampering.
In one embodiment, the intruder detection system 1200 is configured to distinguish authorized users from intruders. The system 1200 is configured to recognize specific signals or electronic tags carried by authorized personnel. These tags might emit signals detectable by the intruder detection system, ensuring that activities by personnel with legitimate access do not trigger the security protocols. This can be integrated through RFID (Radio-Frequency Identification) tags, smart badges, or other forms of electronic identification that are uniquely coded and recognized by the system's sensors.
In one embodiment, the intruder detection system 1200 is configured to tag the unauthorized presences as an intruder and assign a unique identification number to each detected intruder. A follow-on locator system 1400 comprises a satellite network configured to track the movement of the intruders in real-time outside of the ROW using geolocation technologies, such as GPS. In one embodiment, after a unique identification number has been assigned to each detected intruder, the satellite network is used to track the intruder. The unique identification number is linked with the specific location and time of the detected activity along with other relevant sensor data. Additionally, image recognition technologies may supplement this process by capturing visual data to confirm and enhance the tagging process. High-resolution cameras or satellite images provide visual documentation that aids in distinguishing the physical appearance or activities of the intruder, which is associated with the unique identification tag. Following the initial detection and tagging within the ROW, the intruder's position is tracked through real-time satellite tracking employing geolocation technologies. In one embodiment, the system often utilizes differential GPS (DGPS), which significantly refines the accuracy of traditional GPS systems. DGPS employs a network of fixed, ground-based reference stations which broadcast differences between the positions indicated by satellite systems and their known fixed positions.
In one embodiment, the intruder detection system 1200 includes a communication interface 1300 configured to transmit intruder location data to a computer system 1500. The computer system is remote computer system accessible by security or law enforcement agencies. The communications interface 1300 provides real-time updates to the computer system 1500 that allow for security management of the intruders. The interface 1300 sends data collected from the intruder detection and follow-on locator systems 1200, 1400. In some embodiments, the data includes detailed geographic coordinates of detected intruders, timestamps of their detection, and any visual data captured by integrated surveillance technologies. To safeguard this sensitive information, the data is encrypted using advanced encryption standards, such as the Advanced Encryption Standard (AES). Furthermore, in one embodiment the communication interface 1200 utilizes established secure communication protocols like Secure Sockets Layer (SSL) or Transport Layer Security (TLS) to transmit the encrypted data. These protocols ensure that a secure channel is maintained during data transmission, preventing unauthorized access and data breaches. The interface's 1300 capability to transmit data over diverse networks includes, but is not limited to wired, cellular, and satellite communications.
Referring to
Referring now to
The data concerning the location and movement of each intruder is captured and processed in real time and transmitted directly to a central computer system via the communication interface. This interface ensures that the transmission is secure, utilizing encryption protocols to safeguard the data from unauthorized access. The information sent to the computer system includes not only the geographic coordinates and movement paths of each intruder but also timestamps and potentially visual data from surveillance cameras if available. This real-time information allows security agencies to deploy resources to intercept the intruders based on their current locations and projected paths as displayed in the satellite overlay.
In some embodiments, the intruder detection system further comprises an alert system configured to activate audible and/or visual alerts to notify security personnel when an intruder is detected within the ROW. In the illustrated embodiment, the alert system is configured to provide tiered notifications based on the proximity of the intruder to critical infrastructure within the pipeline system. The tiered notifications provide both a visual and audible alert to a first tier closest in proximity to the intruder location. A second tier receives an audible alert, wherein a third tier, furthest from the location (including personnel offsite) receives a text communication.
It is therefore submitted that the instant invention has been shown and described in what is considered to be the most practical and preferred embodiments. It is recognized, however, that departures may be made within the scope of the invention and that obvious modifications will occur to a person skilled in the art. With respect to the above description then, it is to be realized that the optimum dimensional relationships for the parts of the invention, to include variations in size, materials, shape, form, function and manner of operation, assembly and use, are deemed readily apparent and obvious to one skilled in the art, and all equivalent relationships to those illustrated in the drawings and described in the specification are intended to be encompassed by the present invention.
Therefore, the foregoing is considered as illustrative only of the principles of the invention. Further, since numerous modifications and changes will readily occur to those skilled in the art, it is not desired to limit the invention to the exact construction and operation shown and described, and accordingly, all suitable modifications and equivalents may be resorted to, falling within the scope of the invention.
Number | Name | Date | Kind |
---|---|---|---|
6243483 | Petrou et al. | Jun 2001 | B1 |
7856157 | Beinhocker | Dec 2010 | B2 |
9983293 | Farhadiroushan et al. | May 2018 | B2 |
10275402 | Guerriero et al. | Apr 2019 | B2 |
20060068754 | Goldfarb | Mar 2006 | A1 |
20060129338 | Turley | Jun 2006 | A1 |
20100156637 | Samuelson | Jun 2010 | A1 |
20130043887 | Ziolkowski | Feb 2013 | A1 |
20160377232 | Boker | Dec 2016 | A1 |
20200158290 | Hlady | May 2020 | A1 |
20220236115 | Tailor | Jul 2022 | A1 |
20220276116 | Sadovnychiy et al. | Sep 2022 | A1 |
20230091659 | Kendall | Mar 2023 | A1 |
Number | Date | Country |
---|---|---|
102573052 | Jul 2012 | CN |
107238833 | Oct 2017 | CN |
2023209413 | Nov 2023 | WO |