CN106285191B - Perimeter security protection network and perimeter security means of defence - Google Patents
Perimeter security protection network and perimeter security means of defence Download PDFInfo
- Publication number
- CN106285191B CN106285191B CN201510363884.1A CN201510363884A CN106285191B CN 106285191 B CN106285191 B CN 106285191B CN 201510363884 A CN201510363884 A CN 201510363884A CN 106285191 B CN106285191 B CN 106285191B
- Authority
- CN
- China
- Prior art keywords
- security
- detector
- cable
- safety protection
- detection signal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000001514 detection method Methods 0.000 claims abstract description 183
- 230000008447 perception Effects 0.000 claims abstract description 6
- 230000005855 radiation Effects 0.000 claims description 34
- 238000000034 method Methods 0.000 claims description 26
- 238000004891 communication Methods 0.000 claims description 15
- 238000012545 processing Methods 0.000 claims description 11
- 230000005540 biological transmission Effects 0.000 claims description 6
- 238000007689 inspection Methods 0.000 claims description 5
- 230000008901 benefit Effects 0.000 abstract description 4
- 238000012360 testing method Methods 0.000 abstract description 3
- 238000010586 diagram Methods 0.000 description 11
- 238000012423 maintenance Methods 0.000 description 6
- 230000008569 process Effects 0.000 description 6
- 239000000523 sample Substances 0.000 description 6
- 230000002159 abnormal effect Effects 0.000 description 5
- 230000004044 response Effects 0.000 description 5
- 238000005516 engineering process Methods 0.000 description 4
- 230000006870 function Effects 0.000 description 4
- 230000009545 invasion Effects 0.000 description 4
- 230000007613 environmental effect Effects 0.000 description 3
- 238000013459 approach Methods 0.000 description 2
- 238000010276 construction Methods 0.000 description 2
- 230000006698 induction Effects 0.000 description 2
- 230000007246 mechanism Effects 0.000 description 2
- 238000012544 monitoring process Methods 0.000 description 2
- 239000013307 optical fiber Substances 0.000 description 2
- 239000000047 product Substances 0.000 description 2
- 230000035945 sensitivity Effects 0.000 description 2
- 238000003860 storage Methods 0.000 description 2
- 230000001960 triggered effect Effects 0.000 description 2
- 230000002238 attenuated effect Effects 0.000 description 1
- 230000015572 biosynthetic process Effects 0.000 description 1
- 238000013329 compounding Methods 0.000 description 1
- 230000007123 defense Effects 0.000 description 1
- 238000009826 distribution Methods 0.000 description 1
- 238000000605 extraction Methods 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000005457 optimization Methods 0.000 description 1
- 230000035515 penetration Effects 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 230000001681 protective effect Effects 0.000 description 1
- 230000008439 repair process Effects 0.000 description 1
- 230000008054 signal transmission Effects 0.000 description 1
- 239000013589 supplement Substances 0.000 description 1
Landscapes
- Burglar Alarm Systems (AREA)
Abstract
The invention discloses perimeter security protection network and perimeter security means of defences, and security protection cable is arranged along the protection boundary in security protection region, detector is distributed in security protection cable, detector can transmit/receive detectable signal.The detectable signal of detector transmitting forms detection perception field around security protection cable.When people or object intrusion detection perceives field, causes the fluctuation of detectable signal in detection perception field, invader is determined whether according to the fluctuation of detectable signal.Security protection cable can hang wall, buried or hanging setting, can be suitable for the landform of various complexity.There is very strong concealment after security protection cable is buried, be not easy to be invaded personnel's discovery or evade.Detector is integrated in inside security protection cable, has the advantages that stability height is not easy to be influenced by various natural environment and climate factors.Moreover, the protection network can more effectively filter out influence of the disturbing factor to testing result, the accuracy rate of detection invader is improved.
Description
Technical Field
The invention relates to the technical field of perimeter security protection, in particular to a perimeter safety protection net and a perimeter safety protection method.
Background
The perimeter safety protection system refers to a protection system for preventing the boundary of a certain area or alarming when the boundary is invaded by foreign matters. Perimeter security systems have evolved from the first purely physical precautions (e.g., fences, enclosures) to the current combination of physical, technical, and civil defense integrated perimeter security systems.
Existing perimeter safety protection systems are broadly divided into: and the peripheral alarm systems comprise infrared correlation, microwave correlation, leakage cables, vibrating cables/optical fibers, electronic fences/power grids, electrostatic induction and the like. The infrared correlation and microwave correlation protection system is characterized in that the infrared correlation and microwave correlation protection system is low in protection level, and an intruder with low intention can easily cross or avoid the infrared correlation and microwave correlation protection system and is easily influenced by environmental factors such as terrain conditions or severe weather; the vibration cable/optical fiber is greatly influenced by the outside, and false alarm is easily caused by vibration generated by pedestrians or passing vehicles; the leakage cable has high cost and complex construction, false alarm is easy to generate in thunderstorm days, and the invasion position cannot be accurately positioned; electronic fences/power grids and the like have certain harmfulness to human bodies; the cost of electrostatic induction is too high.
Therefore, the traditional perimeter safety protection system is low in protection level, is easily influenced by external environments (terrain, severe weather and the like) to generate false alarm and missing report, lacks means for accurately positioning an intrusion position, is complex in construction and maintenance and low in self-repairing capability. The problems of low accuracy, low sensitivity, high maintenance cost, poor practicability and the like of the perimeter safety protection system are caused.
Disclosure of Invention
The embodiment of the invention provides a perimeter safety protection net and a perimeter safety protection method, which aim to solve the technical problems in the prior art.
In order to solve the technical problem, the embodiment of the invention discloses the following technical scheme:
in a first aspect, the present invention provides a perimeter safety net, comprising:
the security protection cable of arranging along safety protection zone's protection boundary, evenly be provided with a plurality of detectors in the security protection cable, the detector includes emission detector and/or receiving detector, and the emission detector in each group of detector with receive and transmit between the detector and survey signal formation and survey signal radiation field, the multiunit detector forms a plurality of survey signal radiation field alternately covers form in the safety protection zone and in succession and seamless detection perception field.
Optionally, one security cable is arranged underground in a security protection area, at the lower end of an enclosure or at the upper end of the enclosure, the detectors in the security cable comprise transmitting detectors and receiving detectors which are distributed at intervals, and a plurality of detection signal radiation fields in one security cable form detection sensing fields around the security cable; the number ratio of the transmitting detectors to the receiving detectors in the security cable is a preset ratio, and the preset ratio is smaller than or equal to 1.
Optionally, two security cables are arranged on the underground and/or the enclosing wall in the safety protection area, a detector in one of the two security cables is set as a transmitting detector, a detector in the other of the two security cables is set as a receiving detector, the detection signal radiation fields between the two security cables are in cross coverage, and detection sensing fields are formed around the two security cables.
Optionally, a first security cable and a second security cable are buried underground in a security protection area, and the first security cable and the second security cable are separated by a first preset distance;
or,
burying a third security cable underground in the safety protection area, and arranging a fourth security cable at the upper end or the lower end of the enclosing wall;
or,
the upper end of the enclosure in the safety protection area is provided with a fifth security cable, the lower end of the enclosure is provided with a sixth security cable, and the fifth security cable and the sixth security cable are separated by a second preset distance.
Optionally, three security cables are arranged on the underground and/or the enclosing wall in the safety protection area, detectors in one of the three security cables are all set as emission detectors, detectors in the other two security cables are all set as receiving detectors, one security cable which emits detection signals and two security cables which receive the detection signals are in cross coverage with the detection signal radiation fields, and detection sensing fields are formed around the three security cables.
Optionally, a seventh security cable and an eighth security cable are buried in the ground of the safety protection area, a ninth security cable is arranged at the upper end or the lower end of the enclosure, and the seventh security cable and the eighth security cable are separated by a first preset distance;
or,
and a tenth security cable is buried underground in the security protection area, and an eleventh security cable and a twelfth security cable are respectively arranged at the upper end and the lower end of the enclosing wall.
Optionally, each detector in the security cable has an identity ID, the wireless bandwidth resource utilized by the detector includes a plurality of physical channels, and the ID of the detector distinguishes between the transmitted detection signal and the corresponding received detection signal on the physical channel.
Optionally, one or more communication channels are set in the physical channel of the wireless bandwidth resource division;
the communication channel is to: data is interacted with data processing equipment in the perimeter safety protection system; or sending the monitored information of the identification card to data processing equipment of a perimeter safety protection system, so that the data processing equipment determines the position of an inspection tester wearing the identification card according to the information of the identification card and signal fluctuation of a detection sensing field.
In a second aspect, the invention further provides a perimeter safety protection method, which is applied to a perimeter safety protection net, wherein the perimeter safety protection net comprises a safety protection cable arranged along a protection boundary of a safety protection area, a plurality of detectors are uniformly arranged in the safety protection cable, each detector comprises an emission detector and/or a receiving detector, detection signals are transmitted between the emission detector and the receiving detector in each group of detectors to form a detection signal radiation field, a plurality of detection signal radiation fields formed by a plurality of groups of detectors in the safety protection cable are crossed and covered, and a continuous and seamless detection sensing field is formed in the safety protection area;
the method comprises the following steps:
detecting a detection signal within the detection perception field received by the receiving detector;
and determining whether an invader invades the safety protection area or not according to the fluctuation amplitude of the detection signal.
Optionally, the determining whether an intruding object intrudes into the safety protection area according to the fluctuation amplitude of the detection signal includes:
when the fluctuation amplitude of the detection signal received by the receiving detector is detected to exceed a second preset threshold and is smaller than a first preset threshold, determining that an invader enters an early warning area;
determining the intrusion position of the intruder according to a joint detection algorithm and the deployment position of the receiving detector in the safety protection area, wherein the fluctuation amplitude of the received detection signal exceeds a second preset threshold value;
marking and tracking the location of the invader;
and when the fluctuation amplitude of the detection signal received by the receiving detector is detected to exceed the first preset threshold value, determining that the invader invades the warning area, and sending an alarm signal.
According to the technical scheme, the perimeter safety protection net provided by the embodiment of the invention has the advantages that the safety protection cables are arranged along the protection boundary of the safety protection area, the plurality of detectors are uniformly distributed in the safety protection cables, and the detectors have a duplex communication function and can receive/transmit detection signals. A detection signal radiation field is formed between the transmitting detector and the corresponding receiving detector, and a plurality of detection signal radiation fields are crossed and covered to form a continuous and seamless detection sensing field in a safety protection area. When a person or an object invades the detection sensing field, the fluctuation of the detection signal in the detection sensing field is caused, and the invader is determined after the fluctuation of the detection signal in the detection sensing field is detected. The security protection cable can be hung on a wall, buried or suspended, and can be suitable for various complex terrains. The security cable has strong concealment after being buried, and is not easy to be discovered or avoided by intruders. The detection result obtained by compounding the multiple paths of relatively independent detection signals at the same position is obtained through multiple transmission and multiple reception of a large number of detectors, namely, the detection results of the multiple detectors are verified mutually, so that the reliability of the system is essentially improved. Because the simple superposition of the ' AND ' OR ' of the upper layer processing result is not just adopted, the detection algorithm is adopted to carry out processing and operation on the bottom layer, the influence of interference factors on the detection result can be filtered more effectively, and the accuracy of the detection result is improved. Moreover, the detector adopted by the perimeter safety protection net is integrated inside the security cable, and the perimeter safety protection net has the advantages of high stability and difficult influence of various environmental and climate factors.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious for those skilled in the art that other drawings can be obtained according to the drawings without inventive exercise.
FIG. 1a is a schematic diagram of a stable sensing detection field provided by an embodiment of the present invention;
FIG. 1b is a schematic diagram of a sensing detection field when an intrusion occurs according to an embodiment of the present invention;
FIG. 2 is a schematic diagram of a perimeter safety net according to an embodiment of the present invention;
FIG. 3a is a schematic diagram of a transceiver of a detector in a security cable according to an embodiment of the present invention;
FIG. 3b is a schematic diagram of a transmitting/receiving device of another security cable according to an embodiment of the present invention;
fig. 4 is a schematic diagram of a detection sensing field formed by two security cables according to an embodiment of the present invention;
FIG. 5 is a schematic diagram of a detection sensing field formed by two security cables according to another embodiment of the present invention;
FIG. 6 is a schematic diagram of a detection sensing field formed by two security cables according to another embodiment of the present invention;
FIG. 7 is a schematic diagram of a detection sensing field formed by three security cables according to an embodiment of the present invention;
FIG. 8 is a schematic diagram of a detection sensing field formed by three security cables according to another embodiment of the present invention;
FIG. 9 is a flowchart of a perimeter safety protection method according to an embodiment of the present invention;
FIG. 10 is a flow chart of another perimeter safety protection method according to an embodiment of the present invention.
Detailed Description
According to the perimeter safety protection net provided by the invention, the safety protection cables are arranged on the protection boundary of the safety protection area, for example, the safety protection cables are arranged on the fence constructed in the safety protection area or underground around the fence. A plurality of detectors are uniformly distributed in the security cable, each detector in the security cable is in duplex communication, and can transmit detection signals or receive the detection signals. A detection signal radiation field is formed between the transmitting detector and the corresponding receiving detector, and a plurality of detection signal radiation fields are crossed and covered to form a continuous and seamless detection sensing field in the safety protection area. The emission detector can emit detection signals within 360 degrees of the emission detector, or a three-dimensional range of 180 degrees, 90 degrees or other preset angles in the designated direction, the corresponding receiver can receive the detection signals within the coverage range of the detection signals, and a three-dimensional detection signal radiation field is formed between the emission detector and the receiving detector. It should be noted that, when the perimeter safety protection net is deployed, the safety protection area is determined according to the actual range to be protected.
The detection signals transmitted by the transmitting detector and the receiving detector can adopt the technologies of time division multiplexing, frequency division multiplexing, code division multiplexing and the like, and a unique physical resource is physically allocated to each pair of detectors (transmitting and receiving nodes). The time division multiplexing technique means that different probe signal transceiving groups can utilize the same physical resource in different time periods. The frequency division multiplexing technique is to divide the total bandwidth resource of a transmission channel into a plurality of sub-channels, different transceiving pairs (or transceiving groups) transmit sounding signals by using different sub-channels, and if the number of the transceiving pairs (or transceiving groups) is greater than the number of the sub-channels, at least two transceiving pairs (or transceiving groups) can be allocated to one sub-channel, wherein the two transceiving pairs (or transceiving groups) can time-division multiplex the sub-channel. The code division multiplexing technology means that the sounding signals of different sounding signal transceiving groups can be distinguished by using different codes. Moreover, the detector is low-power consumption equipment, the length of a single security cable can reach 500 meters, and the coverage area is large.
For example, in an application scenario that employs frequency division multiplexing, a wireless bandwidth resource used by a probe is divided into a plurality of physical channels, different transmit-receive pairs or transmit-receive groups use different physical channels, each probe has a unique ID (Identification), and the ID of the probe is used to distinguish the different transmit-receive pairs or transmit-receive groups. If the number of probes is large and only a plurality of transceiving pairs (or transceiving groups) can share the same physical resource, the plurality of transceiving pairs (or transceiving groups) on the same physical channel are distinguished by the ID of the transceiving node.
One or more communication channels can be further arranged in the physical channel, and the communication channels are used for data interaction with data processing equipment in the perimeter safety protection system, such as voice, video or other information collected by a sensor.
The system monitors that personnel wearing the identification card can not trigger alarm after entering the perimeter security area, the inspection test can not influence the normal work of the system, and meanwhile, the inspection test process can be recorded. In addition, the authority of the identification card can be set according to different requirements, and the time period and the area range of the identification card entering the perimeter security area are limited. In the application scenario, the physical channel is further configured to send the detected information of the identification card to data processing equipment of the perimeter security protection system, so that the data processing equipment determines the position of an inspection tester wearing the identification card according to the information of the identification card and signal fluctuation of the detection sensing field.
The detection signal can be a microwave signal, and the microwave is a specific wave band in electromagnetic waves, and generally refers to a frequency band with the frequency of 300 MHz-300 GHz. In the process of space propagation, when the detection signal encounters obstacles such as people or objects, changes such as reflection and diffraction occur, so that the original propagation path is changed, the energy distribution of the detection signal in the space is disturbed, and whether an object intrudes into the safety protection area is detected by utilizing the characteristic of the detection signal. In addition, damage monitoring can be carried out, the state of each detector is monitored in real time by a background, an alarm is triggered once illegal disassembly or abnormal signals occur, and the abnormal occurrence position is indicated according to the deployment position of the abnormal detector.
Specifically, a detection sensing field can be formed in a safety protection area through one, two, three or more security cables, as shown in fig. 1a, when there is no intrusion, the detection sensing field is in a relatively stable state.
As shown in fig. 1b, if a person intrudes, the detection signal emitted by the detector 13 is attenuated rapidly after passing through the intruding object, so that the intensity of the detection signal received by the detector 18 on the receiving side is suddenly reduced; when an object intrudes, the detection signal in the detection sensing field fluctuates, and whether the object intrudes into the safety protection area can be judged according to the fluctuation condition of the detection signal. In the figures 1a and 1b, 11-15 are emission detectors, and 16-20 are reception detectors.
Fig. 1b illustrates only one receiving detector receiving a fluctuation of the detection signal as an example, and actually, when a person enters the device, the detection signals received by a plurality of receiving detectors may fluctuate. The volume of the intruding object affects the number of detectors that cause fluctuations in the received detection signal. And determining the intrusion site of the invader by using a joint detection algorithm according to the signal fluctuation conditions of the plurality of receiving detectors and the deployment positions of the detectors in the security cable, wherein the positioning accuracy can reach 5 meters.
The sending detector establishes a wireless communication link with the pre-distributed receiving detector through sending detection signals, the detection signals are sent and received through the communication link to form a detection signal radiation field, and any shielding and scattering on the communication link can cause disturbance of the detection signal radiation field. The perimeter safety protection net is formed by a plurality of detection signal radiation fields in a crossed covering mode, therefore, the disturbance of the detection signal radiation fields of a plurality of adjacent detector groups can be caused by any intrusion, and the intrusion position of an invader is determined according to the detection signal fluctuation conditions of the detector groups and the deployment position of the detector. Further, according to this joint detection method, the intrusion positions of a plurality of intrusions can be detected simultaneously.
Moreover, the detectors in the security cable are mutually standby, other devices nearby after a certain detector fails can be covered in a supplementary mode, and managers are prompted to arrange maintenance (emergency degrees can be divided according to influences on the system); as long as the number of the fault detectors is within the tolerance of the system, even if the spare parts and the maintenance caused by severe weather are not timely in a short time, the normal use of the system is not influenced, and the reliability of the product is improved.
In order to make those skilled in the art better understand the technical solution of the present invention, the technical solution in the embodiment of the present invention will be clearly and completely described below with reference to the drawings in the embodiment of the present invention, and it is obvious that the described embodiment is only a part of the embodiment of the present invention, and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 2, a schematic diagram of a perimeter safety protection net provided in an embodiment of the present invention is shown in fig. 2, and 6 is a perimeter protective fence; 7 is the perimeter protection ground; 1 is a security cable hung at the upper end of an enclosure wall of a security protection area; 2 is a security cable arranged at the lower end of the enclosure wall; 3, a buried security cable; 4, another buried security cable; 5, hanging a security cable on the inner side; and 8, a hanging-empty fixing mechanism for hanging a hanging-empty security cable.
Example one
Any one of the security cables 1-5 shown in FIG. 2 is adopted to form a detection sensing field of a perimeter security protection area. And setting the receiving/transmitting state of the detector in the security cable for receiving/transmitting the detection signal, so that the detection signal radiation field forms a densely distributed detection sensing field around the security cable.
The detectors in one security cable comprise transmitting detectors and receiving detectors, the transmitting detectors and the receiving detectors are distributed at intervals, the number ratio of the transmitting detectors to the receiving detectors is a preset ratio, and the preset ratio is smaller than or equal to 1. For example, the ratio of the transmitting detectors to the receiving detectors may be 1:1, or less than 1, that is, the number of the transmitting detectors and the number of the receiving detectors arranged in one security cable are the same, or the number of the transmitting detectors is less than the number of the receiving detectors.
The transmitting detector and the receiving detector are arranged at intervals, for example, the first and second detectors from the left in fig. 3a are the transmitting detectors, and the third detector is the receiving detector. The first and third detectors are a transceiver pair, the second and fifth detectors are a transceiver pair, and the fourth and seventh detectors are a transceiver pair. When the frequency division multiplexing technology is adopted, each transceiving pair occupies one physical channel, and detectors positioned on different physical channels cannot transmit detection signals.
As shown in fig. 3b, the first detector from the left is the receiving detector, the second is the transmitting detector, the third and fourth are the receiving detectors. The second detector and the first and fourth detectors are a transceiving group, the fifth detector and the third and seventh detectors are a transceiving group, and the eighth detector and the sixth and tenth detectors are a transceiving group. When the frequency division multiplexing technology is adopted, each transceiving group occupies one physical channel, and detectors positioned on different physical channels cannot transmit detection signals.
The transceiving mode of the probe signal can be one-transmission-one-reception or one-transmission-multiple-reception. Wherein, the one-to-one transmission and reception means that a detection signal transmitted by one transmitting detector can only be received by a corresponding receiving detector; the one-to-many receiving means that a detection signal transmitted by one transmitting detector can be received by a plurality of corresponding receiving detectors.
The security protection cable 3 or 4 in the picture 2 is buried underground and laid under the perimeter protection ground, buried in the depth of 5-20 cm under the ground, and the security protection cable can be sleeved with a cable sleeve, so that the security protection cable can be conveniently penetrated and drawn out. And a security cable is buried outside the enclosure at a second preset distance from the enclosure, and the second preset distance can be determined by the range of a detection sensing field sent by the security cable.
For another example, the security cable 1, 2 or 5 in fig. 2 is directly hung on a fence in a security protection area, or hung on the fence by using a hanging fixing mechanism.
In addition, the warning region and the early warning region may be divided according to the deployment position of the security cable in the security protection region, for example, to prevent an object from entering a certain region, a region farther from a region to be protected in the region where the security cable is deployed may be determined as the early warning region, and a region closer to the region to be protected in the region where the security cable is deployed may be determined as the warning region. And the threshold value of the fluctuation of the detection signal of the warning area is larger than the threshold value of the fluctuation of the detection signal of the early warning area. When the invader approaches the early warning area, a warning can be broadcast to prevent the invasion; when the invader is in the warning area, the invader response reaction is directly made.
According to the perimeter safety protection net provided by the embodiment, the safety protection cable is arranged along the protection boundary of the safety protection area, a plurality of detectors are uniformly distributed in the safety protection cable, and the detectors have a duplex communication function and can receive/send detection signals; a detection signal radiation field is formed between the transmitting detector and the corresponding receiving detector, and a plurality of detection signal radiation fields are crossed and covered to form a continuous and seamless detection sensing field in a safety protection area. When a person or an object invades the detection sensing field, the fluctuation of the detection signal in the detection sensing field is caused, and the invader is determined after the fluctuation of the detection signal in the detection sensing field is detected. The security protection cable can be hung on a wall, buried or suspended, and can be suitable for various complex terrains. The security cable has strong concealment after being buried, and is not easy to be discovered or avoided by intruders. Moreover, the detector integrated inside the security cable adopted by the perimeter safety protection net has the advantages of high stability and difficult influence of various environmental and climate factors.
In addition, the detector adopts low-frequency radio power emission, and close-range detection improves detection sensitivity. Moreover, the same position is jointly detected by a plurality of detectors, and the invader can be found out to rapidly distinguish the invasion position and direction at the same time.
Moreover, the security cable has a self-adaptive repair function, the detectors in the security cable are mutually standby, other detectors nearby after the failure of the individual detector can supplement coverage, and managers are prompted to arrange maintenance (emergency degrees can be divided according to the influence on the system); as long as the number of the fault detectors is within the tolerance of the system, even if the spare parts and the maintenance caused by severe weather are not timely in a short time, the normal use of the system is not influenced, and the reliability of the product is improved.
Example two
The two security cables in fig. 2 are used to form a detection sensing field, specifically, one of the two security cables transmits a detection signal, the other of the two security cables receives the detection signal, the two security cables receive and transmit the detection signal to form a plurality of detection signal radiation fields, and the plurality of detection signal radiation fields are alternately covered to form a continuous and seamless detection sensing field.
Wherein, two security protection cables can divide the labour receiving and dispatching detection signal, also can switch the receiving and dispatching role at any time. Assuming that the two security cables are A and B, the security cable A can be set as a transmitting cable, namely, detectors in the security cable A are set as transmitting detectors; the security cable B is a receiving cable, namely, detectors in the security cable B are all arranged as receiving detectors; the transceiving states of the security cables a and B can also be switched at any time, for example, the security cable a transmits a detection signal at the current time slot, the security cable B receives the detection signal, and the transceiving states of the security cable A, B can be exchanged at the next time slot (a small time slot). Each detector in the security cable has three working modes of fixed transmitting, fixed receiving and transmitting and receiving which are converted according to time. The correspondences may be grouped into different transceiving pairs (one-to-one transceiving) or transceiving groups (one-to-many transceiving) in different time slots.
(1) Two buried security cables form a detection sensing field
By using the security cables 3 and 4 in fig. 2, two security cables are laid in a buried manner in parallel, a first preset distance is arranged between the two security cables, the range of the first preset distance can be 1-10 m, the two security cables are buried in the depth of 5-20 cm below the ground in parallel, the outside of each security cable can be sleeved with a cable sleeve so as to facilitate the penetration and extraction of the security cable, and the cable sleeve can be fixed in a wiring groove below the ground through a support.
As shown in fig. 4, the region above the ground between the two security cables 3 and 4 may be set as a warning region, and the outer sides of the security cables 3 and 4 may be set as an early warning region.
(2) One security cable is buried under the ground, and the other security cable is hung on the enclosing wall
Utilize security protection cable 3 and 1 two in fig. 2, security protection cable 1 hangs in the upper end in the enclosure outside, and security protection cable 3 buries underground 5 ~ 20 centimetre depths.
As shown in fig. 5, the region between the security cables 1 and 3 is set as a warning region, and the region outside the security cables 1 and 3 is set as an early warning region.
Similarly, the security cables 1 and 4, 2 and 3, 2 and 4, 5 and 3, or 5 and 4 in fig. 2 may also be used to form a transceiving pair, but the distance between the two security cables meets the transmission distance requirement of the detection signal.
(3) One security cable is arranged at the upper end of the enclosure, and the other security cable is arranged at the lower end of the enclosure
The two cables 1 and 2 in the security cable in the figure 2 are hung on the wall in parallel, the two cables are separated by a second preset distance, and the second preset distance can be determined according to the transmission distance of the detection signal transmitted by the security cable. Similarly, the security cables 2 and 5 in fig. 1 can be used to form a transceiver pair.
As shown in fig. 6, a superimposed field is formed between the security cables 1 and 2, and an independent field is formed outside the security cables 1 and 2.
The perimeter safety protection net provided by the embodiment utilizes two security cables to form a detection signal transceiving pair, and detection signals transmitted by detectors in the security cables form detection sensing fields around the two security cables. And similarly, judging whether an object enters the safety protection area or not by utilizing the fluctuation amplitude of the detection signal in the detection sensing field. Moreover, the area between the two security cables can be set as a warning area, and the area outside the two security cables can be set as a warning area and can broadcast warning to prevent intrusion when an invader approaches the warning area; when the invader is in the warning area, the invader response reaction is directly made. By setting the early warning area, the suspicious target can be found earlier and paid attention to, and the response speed of the warning area is effectively shortened.
EXAMPLE III
The detection sensing field is formed by the three security cables, and the three security cables can form a plurality of combined modes for receiving and transmitting signals to form a larger security protection area. For example, one security cable transmits a detection signal and the other two security cables receive the detection signal, or two security cables transmit a detection signal and the other security cable receives the detection signal.
(1) Three security cables form a triangular combination
For example, with the security cables 1, 2 and 3 in fig. 2, wherein two security cables 1 and 2 are hung on the enclosure wall and the other security cable 3 is buried under the ground, wherein 2 can be set as a transmitting cable and 1 and 3 can be set as receiving cables, the process of intrusion approaching the enclosure wall and turning over the wall can be detected.
As shown in fig. 7, the area between the security cables 2 and 3 is set as a warning area, and similarly, the area between the security cables 1 and 2 is also set as a warning area, and the area outside the security cables 1 and 3 is set as an early warning area.
Similarly, 1, 2 and 4, or 5, 2 and 3, or 5, 2 and 4 in fig. 1 can be used to form a triangular combination, so that the process of approaching the enclosing wall and turning into the wall by the invader can be detected.
(2) Three security cables form a plane combination
The security cables 2, 3 and 4 in fig. 2, 3 and 4 are buried below the ground in parallel, and 2 is hung at the lower end of the fence. The whole process of approaching an intruding object to the enclosure can be detected by arranging 3 as a transmitting cable and 2 and 4 as receiving cables.
As shown in fig. 8, the security cables 3 and 4, and the area between 2 and 3 are set as warning areas, and the outside of the security cables 2 and 4 is set as a warning area.
The perimeter safety protection net provided by the embodiment utilizes three security cables to form a detection sensing field, increases the protection area, and can detect intrusions more flexibly and accurately in the protection process.
Besides the deployment modes of the security cables provided by the embodiment, other deployment modes are provided, the number of the security cables forming the detection sensing field can be adjusted according to the size of the security area, and if the security area is large, more than three (for example, four) security cables can be adopted to form the detection sensing field, so that a larger security area is formed.
Corresponding to the perimeter safety protection net, the invention also provides an embodiment of a perimeter safety protection method.
Referring to fig. 9, a flowchart of a perimeter safety protection method according to an embodiment of the present invention is shown, where the method is applied to a perimeter safety protection net, and is characterized in that the perimeter safety protection net includes a security cable arranged on a protection boundary of a safety protection area, where multiple detectors are arranged in the security cable, where the detectors include a transmitting detector and/or a receiving detector, and detection signal transmission is performed between the transmitting detector and the receiving detector in the same group of detectors, so as to form a detection signal radiation field, where the multiple detection signal radiation fields are cross-covered, so as to form a continuous and seamless detection sensing field in the safety protection area;
as shown in fig. 9, the method may include the steps of:
s110, detecting the detection signal received by the receiving detector.
And S120, determining whether an invader invades the safety protection area according to the fluctuation range of the detection signal.
According to the perimeter safety protection method provided by the embodiment, the safety protection cable is arranged in the safety protection area, the detectors are uniformly arranged in the safety protection cable, the detectors have a duplex communication function and can receive/transmit detection signals, the same group of detectors receive/transmit the detection signals to form a detection signal radiation field, and a plurality of detection signal radiation fields formed by a plurality of groups of detectors in the safety protection cable are crossed and covered, so that a detection sensing field is formed around the safety protection cable. And determining whether an invader invades the safety protection area according to the signal fluctuation amplitude of the detection signal sensing field.
Referring to fig. 10, a flowchart of step S120 of the embodiment of the present invention is shown, in which the safety protection area includes an early warning area and a warning area, for an object entering the early warning area, the intrusion may be dissuaded from happening by broadcasting a warning, and for an object entering the warning area, the intrusion may be warned directly. As shown in fig. 10, step S120 may include the steps of:
s121, when the fluctuation range of the detection signal received by the receiving detector is detected to exceed a second preset threshold value and is smaller than a first preset threshold value, it is determined that the invader enters the early warning area.
And S122, determining the intrusion position of the intruder according to a joint detection algorithm and the deployment position of the receiving detector in the safety protection area, wherein the fluctuation amplitude of the received detection signal exceeds a second preset threshold value.
The intrusion location of the invader is determined according to the detector and the joint detection algorithm of the fluctuation of the received detection signal, when the integral of the disturbance energy of the plurality of detection signal radiation fields reaches the threshold, the alarm can be generated, the alarm strategy can also combine the parameters such as time length, disturbance integral energy, single disturbance threshold, the number of the detection signal radiation fields with disturbance and the like to carry out joint optimization, and the alarm judgment can also be carried out according to the track of the disturbance.
And S123, marking and tracking the position of the invader.
And S124, when the fluctuation amplitude of the detection signal received by the receiving detector is detected to exceed the first preset threshold value, determining that the invader invades the warning area, and sending an alarm signal.
According to the perimeter safety protection method provided by the embodiment, a safety protection area is divided into an early warning area and a warning area, whether an object invades the early warning area is determined by judging whether signal fluctuation exceeds a second preset threshold value, and when it is determined that an invaded object is close to the early warning area, a warning can be broadcasted to dissuade the invasion; when the invader is in the warning area, the invader response reaction is directly made. By setting the early warning area, the suspicious target can be found earlier and paid attention to, and the response speed of the warning area is effectively shortened. And the specific place where the intrusion occurs can be determined according to the joint detection algorithm and the deployment position of the receiving detector in the safety protection area, wherein the fluctuation amplitude of the received detection signal exceeds a second preset threshold value, and the positioning precision can reach 5 meters. In addition, damage monitoring can be carried out, the states of all detectors in the system are monitored in real time in a background, an alarm is triggered once illegal disassembly or an abnormal signal terminal occurs, and the abnormal occurrence position is determined. The detection result after the composition of the multiple paths of relatively independent detection signals at the same position is obtained through the multi-transmission and multi-reception of a large number of detectors, so that the influence of interference factors on the detection result can be filtered more effectively, and the accuracy of the detection result is improved.
Through the above description of the method embodiments, those skilled in the art can clearly understand that the present invention can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but the former is a better implementation mode in many cases. Based on such understanding, the technical solutions of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the methods according to the embodiments of the present invention. And the aforementioned storage medium includes: various media that can store program codes, such as Read Only Memory (ROM), Random Access Memory (RAM), magnetic or optical disks, and so on.
The foregoing is directed to embodiments of the present invention, and it is understood that various modifications and improvements can be made by those skilled in the art without departing from the spirit of the invention.
Claims (11)
1. A perimeter safety net, comprising:
evenly be provided with a plurality of detectors in at least one security protection cable along the security protection cable that safety protection zone's protection boundary arranged, the detector includes emission detector and receiving detector, and the emission detector in each group's detector and receiving between the detector transmission detection signal form survey signal radiation field, and the multiunit detector forms a plurality of survey signal radiation field alternately covers form in the safety protection zone and in succession and seamless detection perception field.
2. The perimeter safety protection net according to claim 1, wherein one safety protection cable is arranged underground in a safety protection area, at the lower end of a fence or at the upper end of a fence, detectors in the safety protection cable comprise transmitting detectors and receiving detectors which are distributed at intervals, and a plurality of detection signal radiation fields in one safety protection cable form detection sensing fields around the safety protection cable; the number ratio of the transmitting detectors to the receiving detectors in the security cable is a preset ratio, and the preset ratio is smaller than or equal to 1.
3. The perimeter safety protection net according to claim 1, wherein two security cables are further arranged on the underground and/or the enclosure in the safety protection area, a detector in one of the two security cables is set as a transmitting detector, a detector in the other of the two security cables is set as a receiving detector, a plurality of detection signal radiation fields between the two security cables are crossed and covered, and detection sensing fields are formed around the two security cables.
4. The perimeter safety net according to claim 3, wherein:
burying a first security cable and a second security cable underground in a safety protection area, wherein a first preset distance is formed between the first security cable and the second security cable;
or,
burying a third security cable underground in the safety protection area, and arranging a fourth security cable at the upper end or the lower end of the enclosing wall;
or,
the upper end of the enclosure in the safety protection area is provided with a fifth security cable, the lower end of the enclosure is provided with a sixth security cable, and the fifth security cable and the sixth security cable are separated by a second preset distance.
5. The perimeter safety protection net according to claim 1, characterized in that three security cables are further arranged on the underground and/or the enclosure in the safety protection area, the detector in one of the three security cables is set as a transmitting detector, the detectors in the other two security cables are set as receiving detectors, a plurality of the detection signal radiation fields between one security cable transmitting a detection signal and the two security cables receiving the detection signal are crossed and covered, and detection sensing fields are formed around the three security cables.
6. Perimeter safety net according to claim 5, characterized in that:
burying a seventh security cable and an eighth security cable in the underground of a safety protection area, arranging a ninth security cable at the upper end or the lower end of the enclosure, and enabling the seventh security cable and the eighth security cable to be separated by a first preset distance;
or,
and a tenth security cable is buried underground in the security protection area, and an eleventh security cable and a twelfth security cable are respectively arranged at the upper end and the lower end of the enclosing wall.
7. The perimeter safety protection net according to any one of claims 1 to 6, wherein each detector in the safety protection cable has an identity ID, the wireless bandwidth resource utilized by the detector comprises a plurality of physical channels, and the ID of the detector distinguishes the transmitted detection signal and the corresponding received detection signal on the physical channels.
8. The perimeter safety net according to claim 7, characterized in that one or more communication channels are arranged in the physical channel of wireless bandwidth resource division;
the communication channel is to: and data is interacted with the data processing equipment in the perimeter safety protection system.
9. The perimeter safety net according to claim 7, characterized in that one or more communication channels are arranged in the physical channel of wireless bandwidth resource division;
the communication channel is to: and sending the monitored information of the identification card to data processing equipment of a perimeter safety protection system, so that the data processing equipment determines the position of an inspection tester wearing the identification card according to the information of the identification card and the signal fluctuation of a detection sensing field.
10. A perimeter safety protection method is applied to a perimeter safety protection net and is characterized in that the perimeter safety protection net comprises security cables arranged along a protection boundary of a safety protection area, a plurality of detectors are uniformly arranged in at least one security cable, each detector comprises an emission detector and a receiving detector, detection signals are transmitted between the emission detector and the receiving detector in each group of detectors to form a detection signal radiation field, a plurality of detection signal radiation fields formed by a plurality of groups of detectors in the security cables are crossed and covered, and a continuous and seamless detection sensing field is formed in the safety protection area;
the method comprises the following steps:
detecting a detection signal within the detection perception field received by the receiving detector;
and determining whether an invader invades the safety protection area or not according to the fluctuation amplitude of the detection signal.
11. The method of claim 10, wherein said determining whether an intrusion has intruded into said safety zone based on the amplitude of the fluctuation of said detection signal comprises:
when the fluctuation amplitude of the detection signal received by the receiving detector is detected to exceed a second preset threshold and is smaller than a first preset threshold, determining that an invader enters an early warning area;
determining the intrusion position of the intruding object according to a joint detection algorithm and the deployment position of the receiving detector in the safety protection area, wherein the fluctuation amplitude of the received detection signal exceeds a second preset threshold value;
marking and tracking the location of the invader;
and when the fluctuation amplitude of the detection signal received by the receiving detector is detected to exceed the first preset threshold value, determining that the invader invades the warning area, and sending an alarm signal.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510363884.1A CN106285191B (en) | 2015-06-26 | 2015-06-26 | Perimeter security protection network and perimeter security means of defence |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510363884.1A CN106285191B (en) | 2015-06-26 | 2015-06-26 | Perimeter security protection network and perimeter security means of defence |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106285191A CN106285191A (en) | 2017-01-04 |
CN106285191B true CN106285191B (en) | 2018-09-07 |
Family
ID=57650255
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510363884.1A Active CN106285191B (en) | 2015-06-26 | 2015-06-26 | Perimeter security protection network and perimeter security means of defence |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106285191B (en) |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107724775B (en) * | 2017-09-28 | 2019-04-16 | 华冠达工程有限公司 | A kind of multi-functional road construction safety barrier |
CN109348495B (en) * | 2018-12-24 | 2021-11-26 | 奇点新源国际技术开发(北京)有限公司 | Microwave protection wall system optimization method, system and base station management system |
CN110109190B (en) * | 2019-04-16 | 2022-02-08 | 浙江华睿科技股份有限公司 | Object position determining method and system |
CN110905280A (en) * | 2019-10-29 | 2020-03-24 | 上海市政工程设计研究总院(集团)有限公司 | Multifunctional railing for water treatment structure |
CN111145480B (en) * | 2020-01-20 | 2025-03-07 | 南通围界盾智能科技有限公司 | An intrusion detection system for accurately locating buried cables |
CN117039744B (en) * | 2023-10-08 | 2024-02-02 | 广东机电职业技术学院 | Electric control system of electric power inspection robot |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE2559060A1 (en) * | 1974-12-31 | 1976-07-08 | Plessey Handel Investment Ag | METHOD FOR MONITORING AN AREA AND ARRANGEMENT FOR CARRYING OUT THE PROCEDURE |
US4328487A (en) * | 1980-07-28 | 1982-05-04 | Southwest Microwave, Inc. | Intrusion detector system |
CN2718692Y (en) * | 2003-08-21 | 2005-08-17 | 肖公亮 | Circum ferential invasion guard system for radio electromagnetic field leakage theory |
CN2876921Y (en) * | 2006-01-23 | 2007-03-07 | 中国电子科技集团公司第五十四研究所 | Leakage cable invasion detector |
CN201004258Y (en) * | 2006-11-02 | 2008-01-09 | 辛东升 | Leakage cable guard system |
CN201025553Y (en) * | 2007-01-22 | 2008-02-20 | 上海申达自动防范系统工程有限公司 | Motive leakage cable intrusion detector |
CN101436336A (en) * | 2007-11-15 | 2009-05-20 | 中国科学院自动化研究所 | Intrusion detection system and method |
CN102685673A (en) * | 2012-05-18 | 2012-09-19 | 奇点新源国际技术开发(北京)有限公司 | Cable system |
-
2015
- 2015-06-26 CN CN201510363884.1A patent/CN106285191B/en active Active
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE2559060A1 (en) * | 1974-12-31 | 1976-07-08 | Plessey Handel Investment Ag | METHOD FOR MONITORING AN AREA AND ARRANGEMENT FOR CARRYING OUT THE PROCEDURE |
US4328487A (en) * | 1980-07-28 | 1982-05-04 | Southwest Microwave, Inc. | Intrusion detector system |
CN2718692Y (en) * | 2003-08-21 | 2005-08-17 | 肖公亮 | Circum ferential invasion guard system for radio electromagnetic field leakage theory |
CN2876921Y (en) * | 2006-01-23 | 2007-03-07 | 中国电子科技集团公司第五十四研究所 | Leakage cable invasion detector |
CN201004258Y (en) * | 2006-11-02 | 2008-01-09 | 辛东升 | Leakage cable guard system |
CN201025553Y (en) * | 2007-01-22 | 2008-02-20 | 上海申达自动防范系统工程有限公司 | Motive leakage cable intrusion detector |
CN101436336A (en) * | 2007-11-15 | 2009-05-20 | 中国科学院自动化研究所 | Intrusion detection system and method |
CN102685673A (en) * | 2012-05-18 | 2012-09-19 | 奇点新源国际技术开发(北京)有限公司 | Cable system |
Also Published As
Publication number | Publication date |
---|---|
CN106285191A (en) | 2017-01-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106285191B (en) | Perimeter security protection network and perimeter security means of defence | |
CN106297122B (en) | Security protection wall and detector | |
Nguyen et al. | Investigating cost-effective RF-based detection of drones | |
US9454885B2 (en) | Active virtual fence using mesh networked RF tags | |
CN102323589B (en) | Line monitoring and early warning system | |
CN106157507B (en) | A kind of transmission line of electricity solid protective device based on radar and video fusion | |
US20100141276A1 (en) | Method for detecting unauthorized access | |
RU2599527C1 (en) | Method for combined protection of perimeter of extended object | |
US7728725B2 (en) | Intrusion detection system for underground/above ground applications using radio frequency identification transponders | |
US9633535B2 (en) | Method and system for advanced electronic border security | |
US8754770B2 (en) | System and method for beyond perimeter detection and early warning | |
KR101042367B1 (en) | Guard device and its method | |
CN106327756A (en) | Perimeter security and protection system | |
CN107293077B (en) | Perimeter intrusion detecting device and method based on orthogonal CPPM signal | |
RU2724805C1 (en) | Radar-beam system for guarding perimeters of extended objects and monitoring adjacent territory | |
CN106382857A (en) | Unmanned aerial vehicle intercepting method and system | |
RU2601164C2 (en) | Cluster system for monitoring perimeters and superficies of objects | |
JP2007189521A (en) | Intrusion detection system | |
CN102157042A (en) | Monitoring system and method based on vibration sensor array | |
RU2394277C2 (en) | System for detecting attempts at breaking into protected area | |
JP5059931B2 (en) | Intrusion detection system | |
CN211087454U (en) | Airport perimeter security system based on internet of things | |
Heško et al. | Perimeter protection of the areas of interest | |
CN106327755B (en) | Security protection cable | |
CN219497141U (en) | Perimeter security system based on internet of things technology |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CP02 | Change in the address of a patent holder |
Address after: 100176 room 502-1, floor 5, building 2, courtyard 10, keguyi street, Beijing Economic and Technological Development Zone, Daxing District, Beijing Patentee after: NEW SINGULARITY INTERNATIONAL TECHNICAL DEVELOPMENT Co.,Ltd. Address before: 100081 Beijing city Haidian District wanquanzhuang Road No. 28 Wanliu new building 6 storey block A room 614 Patentee before: NEW SINGULARITY INTERNATIONAL TECHNICAL DEVELOPMENT Co.,Ltd. |
|
CP02 | Change in the address of a patent holder |