Conventional security systems focus on generally a singular point of entry or method to which they address or block. Such systems are prone to a multitude of other methods that exploit the limited barriers or lack any ability to detect entry. Perimeter fences alone, for instance, serve as barriers that an intruder can overcome by scaling it to gain unauthorized entry. Improved barriers are typically expensive, particularly over large scales, and protect against only to few general methods of breach.
Barrier-type systems do not identify or locate the advancing intruder. Moreover, conventional security systems are typically reactive to a breach rather than proactively monitoring protected areas in efforts to mitigate the opportunity of a successful breach and subsequent loss. Once an intruder has breached the barrier and entered physical location, even fewer systems can identify the intruder or where the breach occurred, thereby if it is a cut fence line, the breach point will remain unsecured.
It is to be understood that both the forgoing general description and the following detailed description are exemplary and explanatory only, and should not be considered restrictive of the scope of the invention as described and claimed. An integrated system is disclosed that provides robust and uninterrupted security over a broad range of applications, that can be integrated with multiple sensor systems for the detection and identification of terrestrial, and optionally, subterranean intrusions, and that can transfer data to a remote location for analysis distant from any risk in the event of a security breach.
The following detailed description refers the accompanying drawings. Wherever possible, the same reference numbers are used in the drawings and the following description to refer to the same or similar parts. While several exemplary embodiments and features and are described herein, modifications, adaptations and other implementations are possible without departing from the spirit and scope of the invention.
To overcome the difficulties associated with conventional security systems that focus on singular points of entry or methods to which they address or block and that are prone to exploitation, various embodiments are illustrated herein of a security assembly and integrated system that provides methods of detection, identification and onsite or remote analysis in order to thwart, mitigate, or render unsuccessful any breach.
Referring
The elevated end includes a low-distortion, optically transparent housing 20, preferably dome-shaped and having an elliptical cross-section, as shown in
A consideration in the selection of a camera system is one of having broad spectrum sensitivity range, or of multiple systems that are useable in combination, for instance, a camera system for visible light and an auxiliary system for other spectra. A preferred device is closed circuit camera with sensitivity to infrared and/or ultraviolet spectra.
The camera system of each security system provides a visual detection zone. Assemblies 10 are contemplated to be placed so that their detection zones overlap adjacent systems to form a secure perimeter, as shown graphically in
Referring further to
It is contemplated that transceiver module 32, disclosed in co-filed copending unassigned U.S. patent application ______, is active and within range of other adjacent transceivers for wireless communication to convey data to one or more remote locations that is preferably secure, such as another assembly 10, or to an onsite location, or to remote location, to warn of possible breach and/or for data processing, for example, image and/or video analysis and the like. It is particularly desirable if three assemblies are used in order to triangulate an intruder's position. It is further contemplated that the junction box 31 and the transceiver 32 are protected against vandalism and natural deterioration to avoid compromised security, reduce maintenance costs, and the like.
Referring now to
Referring to
Ground movement may also be monitored by the security system. In one embodiment, seismic waves, and particularly P-waves and S-waves generated by surface or subterranean movement is detected by detector 40 to expand the security around or near a protected zone. A preferred method of P-wave and S-wave detection is using a detector 40 referred to herein as the Q-Box manufactured by Qtronics Manufacturing Ltd (Coquitlam, British Columbia, Canada). This function is depicted in
The security system assembly is secured within the ground, preferably in a stabilizing and/or relatively structurally secure environment 42 such as concrete and the like, and preferably at least 18 inches below the surface. The anchor depth is contemplated to be sufficient hold the system in the ground and also for adequate function of the desired components associated with the system. It is contemplated that the junction box 31 may be contained with environment 42 with securable access door 43 provided to guard against vandalism and natural deterioration to avoid compromised security, reduce maintenance costs, and the like.
A conduit-type access 30 tube routes necessary cables through the concrete from the base of the security system assembly to the adjacent buried junction box and underground cable system provided in addition to a wireless system. The conduit is preferably waterproof and/or preferably enclosed within a waterproof enclosure capable of holding the junction box and may include appropriate entry and exit points (not shown) for communication with associated components or other security systems for use with the security system assembly disclosed herein. It is contemplated that the assembly capable of alerting an intruder may be used in combination with the security assembly with camera system and spaced thereinbetween and conduits are for connection of the assemblies.
Prior to stabilizing the security system assembly in position it necessary to implant in the ground the necessary sensors for the ground sensing system. The act of having the weight of the concrete and security system assembly on top of the implanted sensors further increases their sensitivity to unnatural triggering sounds or waves detected in the ground being detected.
Security personnel may be differentiated from intruders by the use of locator badges worn by the personnel. Such badges may be augmented for biometric personal identification by use of an imbedded finger print reader as known to one of ordinary skill in the art. Should the integrated security system temporally loose track of a specific tab or want to confirm the holder's identity, then a specific command sequence sent via the security system from the onsite or remote information management and processing location.
While certain features and embodiments of the invention have been described, other embodiments of the invention will be apparent to those skilled in the art from consideration of the specification and practice of the embodiments disclosed herein. Further, the steps of the disclosed methods may be modified in any manner, including by reordering steps and/or inserting or deleting steps, without departing from the principles of the invention.
It is intended therefore, that the specification and examples be considered exemplary only, with a true scope and spirit of the invention being indicated by the following claims and their full scope of equivalents.
This application is being filed concurrently with co-pending U.S. patent applications, each of which claims the benefit for priority from U.S. Provisional Application No. 60/886,905 filed Jan. 26, 2007, and each describing aspects of the invention described herein, including GIMBALED MOUNT SYSTEM FOR SATELLITES (U.S. patent application Ser. No. 12/020,269), NETWORKED COMMUNICATIONS SYSTEM AND SEGMENT ADDRESSABLE COMMUNICATIONS ASSEMBLY BOX, CABLE AND CONTROLLER, and NETWORKED COMMUNICATIONS AND EARLY WARNING SYSTEMS, and are hereby incorporated herein in their entirety.
Number | Date | Country | |
---|---|---|---|
60886905 | Jan 2007 | US |