The present invention relates generally to the field of security and more particularly to a security bar providing improved security from breach with use of, for example, a hacksaw.
Most security bars, such as those used in prisons, stores' or banks' barred windows, and auto theft devices such as, for example, the Club® (a registered trademark of Winner International Royalty LLC), are one solid bar made of an appropriately strong metal such as iron. Most typically, the biggest threat to the breach of security of a security bar is a hacksaw or similar tool, which is used to cut completely through the security bar, thereby rendering it useless.
One approach that has been suggested is to insert a free rolling internal metal bar inside an outer metal bar which has been fabricated in the form of a hollowed out cylinder. Thus, using a hacksaw, for example, to saw through one side of the bar will be fruitless—once the hacksaw encounters the free rolling inner bar, the inner bar will simply roll back and forth along with the movement of the hacksaw, and will therefore not be cut at all.
However, a security bar fabricated with the above described approach can nonetheless be breached by using two hacksaws in concert. In particular, the two hacksaws may be used to cut simultaneously on opposite sides of the security bar, sawing in the same direction with equal pressure. In this manner, once the outer bar has been cut through and the inner bar reached, the inner bar will not be able to roll, but rather, will also be cut by the two hacksaws working together.
Therefore, it would be highly desirable to provide a security bar which cannot be breached, even with the use of multiple hacksaws. In addition, it would be highly desirable to provide such a security bar whose breach or attempted breach can be monitored automatically (e.g., electronically).
In accordance with the principles of the present invention, a security bar providing improved security from breach is obtained with the use of a plurality of free rolling inner bars so that simultaneous “attack” from opposing sides of the inner bars cannot be easily achieved. In particular, and in accordance with one illustrative embodiment of the present invention, three inner rolling bars, arranged in a triangular relationship, are provided inside a cylindrically hollowed out outer bar, thereby ensuring that no inner bar can be attacked simultaneously from opposing sides thereof. Illustratively, each of these inner bars may be advantageously surrounded with a ring of ball bearings to provide for their ability to roll freely in place with respect to the outer bar.
Moreover, in accordance with certain illustrative embodiments of the present invention, electronic monitoring of the security bar is provided, to thereby identify when an attempt to breach the security bar occurs. For example, in accordance with one such illustrative embodiment, electrical contacts provided on the individual inner rolling bars may be advantageously employed to determine when one or more of the inner bars have in fact changed their position (i.e., rotated). And in accordance with another such illustrative embodiment, a thermocouple may be provided inside the security bar to determine when breach of the security bar is being attempted with use of extreme heat (e.g., with a blowtorch).
Specifically, the security bar of
As can be seen from the figure, the illustrative security bar is protected from breach by even a pair of hacksaws. Any attempt to saw through the entire bar will be defeated because each of the inner bars will advantageously rotate if reached by a saw, and since it will not be possible to simultaneously attack opposing sides of any of the bars, this rotation cannot be inhibited.
Specifically, the security bar of
In particular, and in accordance with the illustrative embodiment of the present invention shown in
Operationally, inner bars 12, 13 and 14 of the illustrative security bar of
As shown in
Finally, the illustrative security bar of
It should be noted that all of the preceding discussion merely illustrates the general principles of the invention. It will be appreciated that those skilled in the art will be able to devise various other arrangements, which, although not explicitly described or shown herein, embody the principles of the invention, and are included within its spirit and scope.
For example, although the illustrative embodiments of the present invention shown in
With respect to the electronic monitoring feature of the present invention, it will also be appreciated that numerous other approaches, all obvious to those of ordinary skill in the art, can be used to determine whether the security bar of the present invention has been breached, or that an attempted breach has occurred. For example, by running current lengthwise through either the outer bar or one or more of the inner bars (or both), any successful attempt at cutting through the security bar will necessarily cut off the flow of current and can thereby be used to identify a breach. (Clearly, however, the illustrative embodiment described above in connection with
In addition, any of a number of mechanisms, also obvious to those skilled in the art, can be used to identify which of a (possibly large) plurality of security bars is “under attack” (i.e., breached or has had an attempted breach). For example, in a prison using electronically monitored security bars in accordance with one of the many illustrative embodiments of the present invention, the electrical signals (indicating breach or attempted breach) from all of the security bars so wired may be advantageously used to supply a central circuit, preferably located at a central monitoring location such as a security booth, designed not only to determine that a breach or attempted breach has occurred, but also to identify, for example, which particular prison cell may be under such an attack.
Finally, all examples and conditional language recited herein are principally intended expressly to be only for pedagogical purposes to aid the reader in understanding the principles of the invention and the concepts contributed by the inventor to furthering the art, and are to be construed as being without limitation to such specifically recited examples and conditions. Moreover, all statements herein reciting principles, aspects, and embodiments of the invention, as well as specific examples thereof, are intended to encompass both structural and functional equivalents thereof. It is also intended that such equivalents include both currently known equivalents as well as equivalents developed in the future—i.e., any elements developed that perform the same function, regardless of structure.
Number | Name | Date | Kind |
---|---|---|---|
1491046 | Kendrick | Apr 1924 | A |
5267688 | Benefield | Dec 1993 | A |
5340172 | Sweet | Aug 1994 | A |
5678871 | Zarzycki | Oct 1997 | A |
5791173 | Montes | Aug 1998 | A |
5893594 | Zarzycki | Apr 1999 | A |
6619079 | Cheung | Sep 2003 | B1 |
6634681 | Redden | Oct 2003 | B1 |
20050024210 | Maki | Feb 2005 | A1 |
Number | Date | Country |
---|---|---|
0 970 289 | Aug 2003 | EP |
Number | Date | Country | |
---|---|---|---|
20050146217 A1 | Jul 2005 | US |