[go: up one dir, main page]

WO2013003550A2 - Transmission line protection system - Google Patents

Transmission line protection system Download PDF

Info

Publication number
WO2013003550A2
WO2013003550A2 PCT/US2012/044572 US2012044572W WO2013003550A2 WO 2013003550 A2 WO2013003550 A2 WO 2013003550A2 US 2012044572 W US2012044572 W US 2012044572W WO 2013003550 A2 WO2013003550 A2 WO 2013003550A2
Authority
WO
WIPO (PCT)
Prior art keywords
electrically conductive
controller
conductive layer
coupled
cover
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/US2012/044572
Other languages
French (fr)
Other versions
WO2013003550A3 (en
Inventor
Travis B. Poston
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
University of Texas System
University of Texas at Austin
Original Assignee
University of Texas System
University of Texas at Austin
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by University of Texas System, University of Texas at Austin filed Critical University of Texas System
Publication of WO2013003550A2 publication Critical patent/WO2013003550A2/en
Publication of WO2013003550A3 publication Critical patent/WO2013003550A3/en
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/02Mechanical actuation
    • G08B13/12Mechanical actuation by the breaking or disturbance of stretched cords or wires
    • G08B13/126Mechanical actuation by the breaking or disturbance of stretched cords or wires for a housing, e.g. a box, a safe, or a room
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B25/00Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
    • G08B25/01Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium
    • G08B25/06Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium using power transmission lines
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B3/00Line transmission systems
    • H04B3/54Systems for transmission via power distribution lines
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B2203/00Indexing scheme relating to line transmission systems
    • H04B2203/54Aspects of powerline communications not already covered by H04B3/54 and its subgroups
    • H04B2203/5429Applications for powerline communications
    • H04B2203/5458Monitor sensor; Alarm systems

Definitions

  • the present invention relates to a security device for preventing access to a restricted area or device. More particularly, the invention relates to a barrier for signaling unauthorized entry to a restricted area or device.
  • NID Network Interface Device
  • the exposed power line and/or communication lines are vulnerable to attacks from intruders, vandals, or burglars. This is especially true for 911 services and for telephone lines that are used by security systems for homes and commercial buildings to automatically alert police and/or private security forces of attempted intrusions or disturbances.
  • Such telephone service lines and interconnection boxes are subject to tampering, severing, or destruction by intruders or burglars who know to disable the telephone system in order to defeat the building security system. Once the telephone line is severed, the criminal will be able to access the building without concern that the police or a security call center will be alerted to the intrusion.
  • Described herein is an inexpensive, easy-to-install, protection device which, instead of relying on armor principles to resist penetration presents a "smart" electrical barrier or shield which does not rely on the armor-type protection, but which will respond to an attack on it as if it were an intrusion attempt on the building.
  • a deterrent system deters access to a secured device and/or area.
  • the deterrent system in an embodiment, comprises a cover or wall that includes an outer substrate and an electrically conductive layer positioned next to the outer substrate.
  • the electrically conductive layer is configured such that when the outer substrate is punctured by an intrusion device, the conductivity of the electrically conductive layer is altered.
  • the conductivity of the electrically conductive layer may be monitored by a controller, and the controller may create an alert event which indicates a breech in the cover or barrier wall.
  • a cover includes, at least, an outer substrate 110 and an electrically conductive layer 120.
  • a cover such as depicted in FIGS. 1 - 8 may act as a standalone, permanent and/or temporary barrier to protect data or power transmission lines and Network Interfaces Devices (NIDs) associated with these types of transmission lines.
  • NIDs Network Interfaces Devices
  • the cover is especially useful for protecting telephone, cable and electrical transmission lines that extend out of the ground to connect to their respective NIDs.
  • the cover may also be used for protecting telephone, cable and electrical transmission lines, for transmission lines extending from a transmission line pole to a building.
  • An optional inner substrate may be coupled to the outer substrate, such that the electrically conductive layer is disposed between the inner substrate and the outer substrate.
  • Outer substrate 110 has a primary function to visually and physically deter any attempt to access the components and wires protected by the cover.
  • Outer substrate 110 may be formed from a variety of materials including polymers, woods, wood laminates, and coated and uncoated thin metallic materials.
  • outer substrate 110 may be formed from a non-conductive material.
  • the outer substrate may be composed of a non-conductive material.
  • a non-conductive layer (not shown) may be disposed between the electrically conductive layer and the outer substrate to prevent inadvertent shorting of the electrically conductive layer.
  • a styrene containing polymer may be used to form the outer substrate.
  • styrene containing polymers include, but are not limited to polystyrene, acrylonitrile butadiene styrene (ABS), styrene-butadiene (SBR) rubber, styrene-butadiene latex, styrene-isoprene-styrene (SIS), styrene- ethylene/butylene-styrene (S-EB-S), styrene-divinylbenzene (S-DVB), and styrene-acrylonitrile resin (SAN).
  • Polymeric outer substrates are generally lightweight and tough.
  • the outer substrate may be composed of a UV stabilized polymer.
  • Outer substrate is formed in any shape or size suitable to cover the desired interface device and/or transmission wires.
  • Use of a thermoplastic polymer allows the outer substrate to be molded to different sizes and shapes.
  • Electrically conductive layer 120 is situated next to outer substrate 110.
  • electrically conductive layer 120 includes a conductive material 122 coupled to a non-conductive support material 124.
  • the conductive material forms a conductive trace that is disposed in and/or on the non-conductive support material.
  • the conductive trace is disposed on the non-conductive support material such that at least about 90% of the surface of the non-conductive support material includes the conductive trace.
  • the conductive trace is disposed on the non-conductive support material such that at least about 95% of the surface, at least about 97% of the surface, or at least about 99% of the surface of the non-conductive support material includes the conductive trace.
  • the conductive trace is configured such that penetration of the electrically conductive layer by metallic and/or non-metallic implements will alter the conductivity of the conductive trace.
  • the conductive trace may be formed using an insulated wire that is coupled to a support (which may be conductive or non-conductive) such that at least about 90%> of the surface of the support material includes the insulated wire.
  • FIG. 2 depicts an embodiment of electrically conductive layer 120 prior to folding the layer into a shape that is complementary to the outer substrate 110.
  • electrically conductive layer 120 includes a serpentine conductive trace 122 disposed on a non- conductive substrate 124.
  • Serpentine trace is formed as a single conductive line that covers at least about 90% of the surface of the non-conductive support material 124. The width and spacing of the conductive trace is such that the conductive trace does not touch itself at any point on the surface. Additionally, the spacing between parallel portions of the conductive trace is chosen to make it difficult to pass an implement (conductive or non-conductive) through the electrically conductive layer without contacting and severing one or more portions of the conductive trace.
  • Electrically conductive layer 120 may also include pre-creased fold line 127 that allow the electrically conductive layer to be easily folded to match the shape of outer substrate 110.
  • a conductive trace may be formed in and/or on a non-conductive substrate such that the width and spacing of the conductive trace may be less than about 0.005 inches.
  • the conductive trace is formed such that no two portions of the conductive trace are in contact. Due to the dense pattern of the serpentine conductive trace, an open circuit condition will occur if any type of penetration, by conductive and/or non-conductive implements, that is larger than the width of the conductive trace occurs. Penetration with such an implement will sever the conductor breaking the conductivity of the conductive trace.
  • the electrically conductive layer may be fabricated by forming a conductive trace onto a non-conductive substrate using a variety of known technologies. Examples of techniques that may be used to form a conductive layer include, but are not limited to photoetching,
  • Non-conductive layer in some embodiments, is formed from a flexible, non-conductive material polymer.
  • flexible, non-conductive polymers include, but are not limited to, polyester, polystyrene, polyamides, polyurethanes, and polyethylene oxides. Using any of these techniques and materials, a conductive trace may be prepared that covers the non-conductive surface.
  • the starting point 123 and ending point 125 of the conductor may each be plated- through-hole and coupled to contact pads 142 and 144 on a rigid printed circuit board (PCB) 140, such as F4 type circuit board, and the like.
  • PCB 140 may be physically bonded to the back side (i.e., the side facing away from the outer substrate) of the non-conductive substrate 124.
  • PCB 140 may be bonded to the side of the non-conductive substrate that the conductive trace is formed on. In this embodiment, PCB 140 would be facing toward outer substrate 110 when mounted to the outer substrate.
  • Wires may be coupled to PCB 140 extending to the interior surface of cover 100 to allow connection with a controller and or incoming transmission lines.
  • PCB 140 is coupled to non-conductive substrate 124 with and adhesive (e.g., double-sided tape, epoxy, etc.). In some embodiments, PCB 140 is located on the opposite side of the non-conductive substrate and is positioned to couple to the beginning points and ending points of the conductive trace.
  • adhesive e.g., double-sided tape, epoxy, etc.
  • an electrically conductive layer is formed using a non- conductive polyimide sheet, shaped to fit between an outer substrate 110 and an inner substrate 130.
  • the polyimide polymer may have a conductive pattern printed on one side of the sheet.
  • the conductive pattern may be formed using a metal lines or a metallic polymer (e.g., aluminum- filled elastomers, such as a conductive material that is composed of 70% polymer and 30% aluminum).
  • a serpentine conductive trace is formed on the polyimide substrate having a conductive trace width of 0.026 inches wide and a spacing between conductive lines of 0.026 inches.
  • the conductive trace is formed in a pattern in which a single conductive trace line is formed extending from the starting point to the finishing point. For ease in coupling to a PCB, the conductive trace starts and ends near the same region of the polyimide sheet.
  • the beginning and ending points are plated-through-hole (PTH) connected to contact pads formed on a PCB coupled to the polyimide layer.
  • PTH plated-through-hole
  • the maximum size of a PTH is about 0.022 inches.
  • the contact pads of the PCB are positioned on the side of the PCB that is opposite to the side that the polyimide support is coupled to the PCB.
  • the conductive trace and the PCB connection devices may be placed upon the non- conductive substrate, the conductive trace and PCB may be coated with solutions for anti abrasion, such as UV cured polymers (available from, for example 3M). Weatherizing and anti- corrosion layers (e.g., RTV sealants by Dow Chemical) may also be applied to the conductive trace and PCB.
  • solutions for anti abrasion such as UV cured polymers (available from, for example 3M).
  • Weatherizing and anti- corrosion layers e.g., RTV sealants by Dow Chemical may also be applied to the conductive trace and PCB.
  • FIG. 3 depicts an embodiment of a schematic diagram of a first PCB 140 bonded to a second PCB 150.
  • First PCB 140 may be constructed with one or more threaded posts 148 on the side of the PCB that is not bonded to the non-conductive substrate. Threaded posts 148 are used in conjunction with nuts to attach the electrically conductive layer to the inner substrate 130.
  • other receptacles for screws may be used to couple first PCB 140 to second PCB 150.
  • contact pads 142 and 144 of first PCB may be coupled to contact pads on second PCB 150 using vias 156.
  • vias 156 may be a metal via that extends through the PCB 150, positioned to electrically couple with contact pads 142 and 144 of first PCB 140. Receptacles (not shown) coupling first PCB 140 to second PCB 150 may help to ensure properly alignment of contact pads 142 and 144 with vias 156.
  • contact pads 142 and 144 of first PCB may be bonded to contact pads 152 and 154 of second PCB 150 using conductive epoxy pads (available, e.g., from 3M, Minneapolis, MN) and another manufacturers.
  • Second PCB 150 may have a terminal strip 155 coupled to contact pads 152 and 154 via lines 158. Terminal strip 155 may be coupled to second PCB 150 using posts 157.
  • Posts 157 may be placed into holes 159 to couple terminal strip 155 to second PCB 150. Holes 159 and posts 157 together help to align the terminal strip 155 with lines 158.
  • Terminal strip 155 may be a multi-position, screw-operated-terminal-connector (wire-terminal), which may be used to connect/wire electrically conductive layer 120 to a control system.
  • first PCB 140 and second PCB 150 are coupled to a non- conductive substrate 124, the substrate components may be coated with solutions for anti abrasion, such as UV cured polymers and/or other solutions by 3M. Weatherizing and anti- corrosion compounds may also be used to coat the substrate components, such as by RTV and/or other sealants by Dow Chemical and/or other manufacturers and the like.
  • solutions for anti abrasion such as UV cured polymers and/or other solutions by 3M.
  • Weatherizing and anti- corrosion compounds may also be used to coat the substrate components, such as by RTV and/or other sealants by Dow Chemical and/or other manufacturers and the like.
  • several layers of non-conductive substrates/serpentine conductive traces, as discussed above, may be arrayed and layered and connected together in series, function independently of each other, or a combination of independently functioning layers and coupled together layers.
  • an inner substrate 130 is coupled to the electrically conductive layer 120, on the side opposite to the side of the electrically conductive layer that is coupled to outer substrate 110.
  • Inner substrate 130 may be formed from a variety of materials including polymers, woods, wood laminates, and coated and uncoated thin metallic materials.
  • inner substrate 130 may be formed from a non-conductive material.
  • a non-conductive layer (not shown) may be disposed between the electrically conductive layer and the inner substrate to prevent inadvertent shorting of the electrically conductive layer.
  • a styrene containing polymer may be used to form the inner substrate.
  • styrene containing polymers include, but are not limited to polystyrene, acrylonitrile butadiene styrene (ABS), styrene-butadiene (SBR) rubber, styrene-butadiene latex, styrene-isoprene-styrene (SIS), styrene- ethylene/butylene-styrene (S-EB-S), styrene-divinylbenzene (S-DVB), and styrene-acrylonitrile resin (SAN).
  • Polymeric inner substrates are generally lightweight and tough.
  • the inner substrate may be composed of a UV stabilized polymer.
  • outer substrate 110 is bonded to inner substrate 130, with the electrically conductive layer 120 disposed between the inner and outer substrate.
  • the inner substrate 130 may be bonded to the outer substrate 110 using a suitable adhesive or one or more fasteners (e.g., rivets, screws, bolts, etc.).
  • a silicone based adhesive bonds inner substrate 130 to outer substrate 110, with electrically conductive layer 120 disposed between the inner and outer substrate.
  • Electrically conductive layer 120 may be bonded to inner substrate 130, outer substrate 110, or both the inner and outer substrate.
  • the electrically conductive layer is not bonded to either substrate, however the electrically conductive layer is held in place by the bonded edges of the inner and outer substrates.
  • bonded inner substrate 130, electrically conductive layer 120 and outer substrate 110 form a cover 100.
  • threaded posts 148 on PCB 140 may be used to couple the PCB and the attached conductive layer 120 to inner substrate 130.
  • a precut hole may be used to couple the PCB and the attached conductive layer 120 to inner substrate 130.
  • Threaded posts 148 may extend through predrilled holes 117 of inner substrate 130 and the PCB secured to the inner substrate by attaching a nut to the threaded posts. Since PCB
  • the electrically conductive layer 120 is secured to the electrically conductive layer 120 (e.g., using a UL listed double sided tape) securing the PCB to inner substrate 130 also partially secures the electrically conductive layer to the inner substrate.
  • cover 100 may be attached to a base 160.
  • base 160 may be formed from a plastic or metal material.
  • base 160 is formed from aluminum.
  • Base 160 may be formed having a groove extending through the base which matches the side profile of the cover, such that the cover fits into the groove.
  • FIG. 4 depicts a cross sectional view of base 160 with cover 100 disposed in a groove formed in the base.
  • fasteners 162 e.g., rivets, screws, bolts, etc.
  • cover 100 may be glued to base 160 using a suitable adhesive (e.g., a silicon based adhesive).
  • inner substrate 110 and outer substrate 130 include one or more eyelets 112 that are aligned to form an opening that passes through the cover. Eyelets 112 may be used as passages for fasteners to hold outer substrate 110 and inner substrate 130 together when the inner and outer substrates are being bonded to each other. After the adhesive used to join the substrates has set, the fasteners can be removed, leaving eyelets 112 available for further use. After the cover is completed, eyelets 112 may be used to receive fasteners for coupling the cover to a structure.
  • the completed cover provides a deterrent to tampering with wires and/or interface devices that are surrounded by the cover.
  • the positioning of an electrically conductive layer within the cover provides a way of monitoring when the cover has been penetrated. Penetration of the cover by a conductive or non-conductive tool will alter the conductivity of the electrically conductive layer. If the conductivity of the electrically conductive layer is monitored, the change in conductivity will signal that an attack has been made on the cover which penetrated the cover. In some embodiments, when the conductivity of the electrically conductive layer is altered, an alert event is created. If the cover is attacked by use of a metal implement, the conductivity of the electrically conductive layer may be maintained while the metal implement is embedded in the cover.
  • the metal implement will create a short circuit condition, reducing the resistance of the conductive trace in the electrically conductive layer.
  • an attack on the cover may be detected by either noting a break in the continuity of the conductive trace, or by a decrease in resistance of the conductive trace.
  • the deterrent system also includes one or more displacement switches 170 coupled to the cover and the surface 210 proximate to interface device 200 and/or transmission wires 220 that the cover is protecting.
  • a displacement switch is defined herein as a switch that is part of an electric circuit and when one portion of the switch is displaced with respect to the other portion of the switch a change in the conductivity of an electric circuit is produced. Examples of displacement switches include, but are not limited to, magnetic switches, push button switches, and tilt operated switches (e.g., mercury switches).
  • displacement switches are formed from a magnetic switch 172 that is coupled to the cover and a magnet 174 coupled to the surface proximate to the interface device and/or transmission wires that the cover is protecting (see FIG. 6).
  • a magnetic switch 172 includes a pair of magnetizable, flexible, metal reeds whose end portions are separated by a small gap when the switch is open. When a magnetic field is applied, the reeds come together, thus completing an electrical circuit. The stiffness of the reeds causes them to separate, and open the circuit, when the magnetic field ceases. Magnet 174 creates the magnetic field that causes the magnetic switch to open or close. Magnet 174 may be an electromagnet or a permanent magnet.
  • magnetic switch 172 is coupled to cover 100 and magnet 174 is coupled to the surface proximate to the interface device and/or transmission wire. It should be understood that this configuration may be reversed such that magnetic switch 172 is coupled to the surface and magnet 174 is coupled to the cover. Magnetic switch 172 is also coupled to an electrical circuit that monitors the connectivity of the line. In use the magnetic switch 172 is magnetically coupled to magnet 174 when the cover is positioned over the network interface device and/or transmission wires. The magnetic field generated by magnet 174 is sufficient to close magnetic switch 172, creating a closed circuit. When the cover is removed from the surface, magnetic switch 172 is displaced away from magnet 174, which opens the magnetic switch, creating an open circuit.
  • magnetic switch 172 When magnetic switch 172 is coupled to an electronic monitoring device, opening of the magnetic switch will create a change in the electronic circuit that is detected by an electronic monitoring device. A change in the electronic circuit from a closed circuit to an open circuit will cause the monitoring device to create an alert event that signals that the cover has been removed.
  • the switches may be coupled to each other in series, so that the circuit will become open if any one of the switches is displaced from its corresponding magnetic field.
  • FIG. 6 depicts an interface device 200 coupled to a surface 210.
  • Cover 100 may be coupled to surface 210 using one or more fasteners that are passed through eyelets 112.
  • brackets 230 are coupled to surface 210 and include magnet 174.
  • To attach cover 100 to the surface 210 one or more fasteners are passed through eyelets 112 and into surface 210.
  • brackets 230 are pre -mounted to surface 210 and positioned to align with magnetic switch 172.
  • magnetic switch 172 comes into contact with (or at is positioned in the magnetic field of) magnet 174, which closes the switch forming a closed circuit.
  • Magnetic switches 172 are coupled to a controller disposed on the inner surface of the cover through connector 175.
  • the above described deterrent systems are described as having an open loop detection circuit, where an alarm event is determined if the circuit is in an open state. It should be understood that the circuit may be configured to operate in a closed loop detection state, where the alarm event is determined if the circuit goes from an open state to a closed state. It should also be understood that combinations of open loop/closed loop detection circuits may be used.
  • FIG. 7 depicts an embodiment of a template 300 is used to prepare the surface to receive the cover.
  • template 300 is a weatherized paper mounting template that includes one or more openings that correspond to eyelets 112 of cover 100 and magnetic switches 172.
  • template 300 includes openings 310 which correspond to the eyelet openings of the cover.
  • Template 300 also includes openings 320 which have a shape and size that corresponds to brackets 230 which hold magnets 174.
  • Template 300 may also include an opening 330
  • template 300 is placed on surface 210 such that the interface device and transmission wires extend through the appropriate openings. Template 300 defines the positions where brackets 230 should be mounted (320) and positions (310) where fasteners will enter the surface through the eyelets of cover 100. While template 300 is coupled to surface 210, pilot holes may be drilled at template openings 310 to prepare the surface to receive the fasteners used to couple the cover to the wall.
  • brackets 230 are mounted to the surface at template openings 320, thus ensuring that the magnets 174 on the brackets will be substantially aligned with the magnetic switches 172 of the cover.
  • the template may be removed or the template may be left on the surface. If the template is made of a weatherized material, the template may serve as a seal against weather and insects once the cover is placed on the surface (over the template).
  • an alternate template 350 may be used to position brackets 230 which hold magnets 174. Template 350 may be used to position brackets 230 on a surface with respect to cover 100.
  • the deterrent system When installed on a surface, the deterrent system acts as a tripwire which detects possible unauthorized tampering with interface device and/or transmission wire. If the deterrent system is physically attacked in an effort to "break into” the cover, the conductivity of the electrically conductive layer will be disrupted, causing an alert event to be created.
  • the displacement switches will be altered as a result of the cover being removed.
  • the magnetic switches will be separated from the magnetic field, thus reverting to an open state and creating a change in the conductivity of the circuit, causing an alert event to be created.
  • an alert event is created upon unauthorized tampering with the cover.
  • the alert event may be an audible signal, a visible signal, or a combination of both.
  • An alert event may also include sending a signal to a monitored call center that notes the alert signal and contacts the appropriate authorities.
  • While an alert event may be sufficient to deter unauthorized access to an interface device and/or transmission wires, the person instigating the unauthorized access may be able to disable transmission wire prior to the arrival of the appropriate authorities and/or prior to the alert signal being sent to the monitored call center. For example, if the deterrent system covers both a network interface device and a transmission wire, and cover 100 is removed, the person removing the cover may be able to cut the transmission wire before the alert signal is sent to the monitored call center. To inhibit the ability to cut a transmission wire before the alert signal is sent, a line channel 400 may be positioned over the exposed portion of a transmission wire. FIG. 8 depicts an embodiment of a line channel 400.
  • Line channel 400 may include body 410 defining a channel 420 through which the transmission wire runs.
  • Body 410 may be formed from a material that resists cutting and breaking, such as polymers (e.g., acrylonitrile butadiene styrene) or metals (e.g., aluminum).
  • Line channel 400 also includes one or more openings through which one or more fasteners may be passed to couple line channel 400 to surface 210. It may be difficult to ensure that line channel 400 has the proper length to extend from the ground to the network interface device.
  • a keyway 440 (See FIG. 6) is used to cover the transmission wires that extend between the line channel and the interface device.
  • keyway 440 is formed of a flexible, slitted material that can be readily wrapped around the transmission wires.
  • the keyway extends into the line channel and, in some instances, may also extend into the network interface device.
  • Keyway 440 is preferably formed from a material that resists cutting.
  • keyway 440 may be formed from a rigid polymer (e.g., PVC pipe about one inch in circumference and about four inches long) with a slit in the polymer so that the wires that are connected to the terminal strip, such as wires from the cover, as well as the wires from the displacement switches which are to be connected to the controller, are placed inside the keyway.
  • the slit may be situated to face the premise being protected.
  • Line channel 400 is used to retard rapid access to the transmission lines once a breach, by partial and/or complete removal and/or penetration, of the cover is accomplished.
  • a breach instantly triggers a high-speed, for example less than two seconds, tamper alert data
  • Line channel may be composed of a metal or nonmetal material (e.g., PVC), which will retard rapid access to the transmission lines.
  • Line channel 400 may be wide and deep enough to thwart rapid penetration by man-portable bolt cutters, saws, and other power and hand tools.
  • an additional inner cover may be used in place of line channel
  • An inner cover may be made from a material that resists cutting and breaking, such as polymers (e.g., acrylonitrile butadiene styrene, poly vinyl chloride) or metals (e.g., aluminum). Inner cover may fit over one or more transmission wires and one or more interface devices. The inner cover may be dimensioned to fit under the outer cover 100, when attached to a surface. Inner cover may be used to retard rapid access to the transmission lines once a breach, by partial and/or complete removal and/or penetration, of cover 100 is accomplished.
  • polymers e.g., acrylonitrile butadiene styrene, poly vinyl chloride
  • metals e.g., aluminum
  • the electrically conductive layer may be electrically coupled in series with the displacement switches in a single loop together such that if any attack on the cover will be apparent in a single monitoring circuit. In other embodiments electrically conductive layer and displacement switches may be individually monitored.
  • An electronic controller may be coupled to cover 100.
  • electronic controller is embodied in first PCB 140 and/or second PCB 150.
  • a stand alone electronic controller may be coupled to the inner substrate 130 of the cover.
  • a schematic diagram of an electronic controller 500 is depicted in FIG. 9.
  • Controller 500 includes input ports 510 for receiving signals from various components of the cover. Input ports include interface device input ports 512, electrically conductive layer input ports 514 and displacement switch input ports 516.
  • the controller also includes communications ports.
  • controller 500 may include a phone communication port 522, an Ethernet communication port 524.
  • Controller may also include a wireless communication device 526.
  • Controller 500 also includes one or more signaling devices to alert a user of the status of the controller and cover system. Signaling devices include, but are not limited to low battery indicators 532 and alarm indicators 534 and
  • Electrically conductive layer 120 may be coupled to controller input port 514.
  • Displacement switches 170 may be coupled to each other in series and coupled to the controller input port 516. This allows the controller to monitor the electrical circuits for tampering signals.
  • alert event is an event that indicates that the cover is being tampered with in an unauthorized manner. Alert events include attempts to remove the cover, penetrate the outer substrate, cutting and/or shorting the displacement switches or tampering with the outer covers.
  • Controller 500 includes downloadable and remotely programmable logic devices that allow the controller to monitor the displacement switches and electrically conductive layer and determine when either system has been tampered with.
  • controller 500 Upon the detection of tampering, the controller prepares an alert signal and transmits the alert signal to a monitoring center using a phone line coupled to phone input port 522, an Ethernet line coupled to Ethernet port 524, or using wireless device 526. In some embodiments, controller sends the alert signal over more than one medium (telephone, Ethernet, or wireless). Controller 500 will further cause alarm indicators 534 and 536 to become activated in response to detecting a tampering event. In an embodiment, alarm indicator 534 is activated if the electrically conductive layer is tampered with, while alarm indicator 536 may be activated if the cover is improperly displaced. In some embodiments, controller 500 is battery operated and low battery indicator may be illuminated when the battery power is low. Low battery signals may also be transmitted to a central monitoring station.
  • controller 500 includes electronic circuits capable of monitoring the electrically conductive layer 120.
  • controller 500 may include a voltage comparator for detecting changes in the voltage of power running through the electrically conductive layer 120.
  • controller 500 may include a resistance comparator for detecting changes in resistance of the electrically conductive layer 120.
  • Controller 500 may be programmed to create alarm events when the voltage and/or resistance are different from a preprogrammed value of range. Controllers that include many of these features are commercially available from Honeywell, Inc. Minneapolis, Minnesota. If a controller fails, then an alert event may occur that does not trigger an alert signal. In order to prevent unauthorized access in case of a controller failure, the controller may send a check-in signal periodically (e.g., every 12 hours) to the monitored call center. Failure to receive a check-in signal for more than 12 hours may indicate a controller or communication equipment failure. The monitored call center may then alert the appropriate authorities of the apparent failure of the system.
  • a check-in signal periodically (e.g., every 12 hours) to the monitored call center. Failure to receive a check-in signal for more than 12 hours may indicate a controller or communication equipment failure. The monitored call center may then alert the appropriate authorities of the apparent failure of the system.
  • controller 500 includes phone and or Ethernet lines which allow two-way communication. Additionally, wireless device 526 may also transmit and receive control signals. In an embodiment, a system deactivation signal may be received through telephone port 522, Ethernet port 524, or wireless device 526, or part or all of the input ports. During use, a person requiring legitimate access to the interface device and/or transmission wires can contact a monitoring center and request access permission.
  • the monitoring center may send a deactivation signal to controller 500.
  • the controller 500 will deactivate the system, such that the person requesting access can remove the cover without triggering an alarm event.
  • Controller 500 may be programmed to rearm the cover after a predetermined amount of time has passed after the deactivation signal is received. Additionally, or alternately, controller 500 may be programmed to rearm the cover when a rearm signal is received from the call center.
  • controller 500 has PSTN tip and ring in- and-out screw terminals such that the incoming PSTN tip and ring wires can be removed from the interface device and routed into the controller. The wires are then routed from controller back to the interface device. This places controller 500 between the incoming PSTN line and the premise. When the controller detects an alert event, it will instantly switch the incoming PSTN line away from the building services and transmit the tamper alert signal(s). Once the controller switches the incoming PSTN line, it will complete a tamper alert transmission, and receive an
  • Association DC-04-2000.05 which may include Contact ID, and/or Modem II, and/or Modem He and the like communications, and/or VoIP Internet, and/or dynamic host configuration protocols (DHCP).
  • the controller will operate quickly and be configured to complete the transmission of the alert signal and receipt of the acknowledgement transmission before any transmission lines involved can be severed.
  • controller 500 will transmit tamper alert signal(s) via standard phone line (PSTN) or any type of broadband cables (e.g., coaxial and/or fiber optic lines).
  • PSTN standard phone line
  • the controller's communications capability will be in the form of a modem set up to transmit at least 9.6K bits per second for PSTN applications or transmit at a variable rate up to 56K bits per second for Internet Protocol (such as VoIP, DSL, ADSL, DHCP, or combinations thereof).
  • Power line communication or power line carrier also known as Power line Digital Subscriber Line (PDSL), mains communication, power line telecom (PLT), or power line networking (PLN)
  • PLC Power line communication or power line carrier
  • PDSL Power line Digital Subscriber Line
  • PLT power line telecom
  • PN power line networking
  • BPL Broadband over Power Lines
  • Electrical power is transmitted over high voltage transmission lines, distributed over medium voltage, and used inside buildings at lower voltages.
  • Powerline communications can be applied at each stage.
  • Most PLC technologies limit themselves to one set of wires (for example, premises wiring), but some can cross between two levels (for example, both the distribution network and premises wiring).
  • the deterrent system may be used to protect power transmission lines that are used for both power transmission and data transmission.
  • power transmission lines are routed into a deterrent system, as described above. The power
  • a controller of the deterrent system may also be coupled to the data transmission power lines, such that alert signals may be sent to a monitored call center through the data transmission power lines when an alert event occurs.
  • the deterrent system controller may be coupled to any device that is coupled to a power line adapter that is inside a premise(s).
  • a security system that is coupled to the data transmission power lines thorough an adapter may be in communication with the controller of the deterrent system.
  • the controller can send alert signals to the security system, which can be forwarded by the security system to a monitored call center.
  • Other devices such as motion activated and/or continuous feed video cameras, smoke detectors, fire detectors, carbon monoxide detectors, infrared motion detectors, microwave motion detectors, wireless medical- and/or duress- pendants) may be in communication with the deterrent system controller, through the data transmission power line.
  • the controller of the deterrent system may act as a communication device for alerting the proper authorities in the event of an alert event occurring on any security device coupled to the power line.
  • controller 500 may be coupled to one or more power line communication (PLC ) devices.
  • PLCs include, but are not limited to power line telecommunication (PLT) devices, power line networking (PLN) devices, power line digital subscriber line (PDSL) devices, and broadband over power lines (BPL) devices.
  • PLCs include, but are not limited to power line telecommunication (PLT) devices, power line networking (PLN) devices, power line digital subscriber line (PDSL) devices, and broadband over power lines (BPL) devices.
  • controller 500 may be configured to receive status updates and alert notices from PLT, PLN, BPL and other PLC type devices.
  • controller 500 may be coupled to PLC devices through a power line entering the premises that the deterrent system is protecting.
  • the power line used for data communications is coupled through controller 500 to the premises.
  • controller 500 is in communication with a monitored call center (e.g., via phone lines, Ethernet, wireless, etc.), any changes in the status of any PLC devices coupled to the controller may be relayed to the monitored call center.
  • the monitored call center may notify the appropriate personnel of the status changes to take the appropriate action.
  • controller 500 may be capable of monitoring the status of a backup power system (e.g., battery backup) used to power the controller. If the backup power system is not capable of supporting the controller in the event of a loss of power from the power line, the controller may send an alert to the monitored call center that the backup power system is in need of service. The monitored call center may inform the appropriate personnel of the status and provide an alert to the owner of the premises.
  • a backup power system e.g., battery backup
  • deterrent system 500 is used to protect the power line providing power to all or a portion of a premises.
  • the power line may be coupled to controller 500, such that the power passes through controller to the premises.
  • controller 500 may be configured to measure the amount of power being supplied to the premises, through the controller, for metering purposes. Upon receipt of a request, or periodically, controller 500 may send the power usage measurements to an energy provider to be used for billing or other purposes.
  • controller 500 may be coupled to a metering device which is used to measure the power usage of the premises. Controller 500 may periodically, or upon receipt of a "read" command, collect power usage information from the metering device and relay the information to an energy provider. Controller may be coupled to electricity meters and/or gas meters.
  • Controller 500 is wired to the electrically conductive layer 120 and the displacement switches 170 via a wire -terminal which is accessible through an opening in the inside substrate.
  • Controller input monitoring circuits may be connected in a supervised manner, such as utilizing an end-of-line resistor(s), to the multi-position terminal-connector.
  • controller 500 is set up to operate with a stand alone audible siren 540, commercially available, for example, from Ademco Distribution). When an alert event occurs, the controller may activate the siren, creating an audible deterrent.
  • a stand alone audible siren 540 commercially available, for example, from Ademco Distribution.
  • Controller 500 may be powered by AC (e.g., 120V AC). Controller may also include a battery backup with low battery visual and audible alerts. Battery backup may use a rechargeable battery which charges when the main AC power source is in service. In some embodiments, battery backup may be located inside of the building serviced by the transmission line.
  • AC e.g. 120V AC
  • Controller may also include a battery backup with low battery visual and audible alerts. Battery backup may use a rechargeable battery which charges when the main AC power source is in service. In some embodiments, battery backup may be located inside of the building serviced by the transmission line.
  • controller 500 may also include an integrated with a wireless device 526 that acts as a receiver and/or transmitter.
  • the wireless device may be part of an independent system such as the LYNXR series by Ademco.
  • wireless device may be a wireless transceiver (e.g., Wi-Fi device) as defined by IEEE 802.11 (e.g., a WRT54G by Linksys).
  • the wireless transceiver may be part of a wireless local area and/or a wide area network(s).
  • the wireless device may communicate with other wireless devices such as motion activated and/or continuous feed video cameras, smoke detectors, fire detectors, carbon monoxide detectors, infrared motion detectors, microwave motion detectors, wireless medical- and/or duress-pendant(s), or combinations of these devices.
  • the wireless device may receive alert signals from any other wireless devices that communicate with the wireless device.
  • the controller may determine the source of the wireless signal(s) received and pass the differentiated signal(s) to a monitored call station using the transmitter of the wireless device, a telephone line, or an Ethernet connection.
  • wireless device may a cellular and/or long range radio system, which will transmit alert signals directly into cellular and/or long range radio systems.
  • an alert signal is prepared and sent by the controller to a central monitoring station. Detection of an alert event by any of the monitoring circuits will create an alert signal.
  • the alert signal may be sent to a monitoring station over one or more transmission devices of the controller (e.g., phone line, Ethernet line, wireless
  • the controller may rapidly transmit the alert signal (e.g., data and/or video signal(s)) to a monitored call station that understands the specific nature and the purpose of the alert signal.
  • the monitored call station's data message receiving equipment will rapidly transmit an acknowledgement signal(s) and the like to our controller.
  • the monitored call station will provide prompt and credible communications with all applicable authorities, such as police, fire, security, and safety personnel, a service which is standard procedure at monitored call stations such as Monitronics
  • the controller may be wired to a security system located inside the building serviced by the protected transmission lines.
  • the controller send out the alert signals to the premises security system, which transmits the alert signals to a monitored call center.
  • the controller is configured to send such signals in a time period that is less than the time an intruder takes to gain access to the interface device or transmission lines.
  • an alert signal is sent to a monitored call station, and a receipt acknowledgement received from the monitored control center, within 5 seconds, within 3 second, within 2 seconds, or within 1 second of an alert event.
  • a controller includes A/D converters, comparators, programmable external interrupts, low power consumption, and internal memory.
  • the comparators available in the controller may be used to form a simple switch closure (or opening) in the protection scheme.
  • a pull up resistor may be used on one of the inputs to a comparator. If two normally closed displacement switches are installed in series, then if either one was opened, the comparator would switch and recognize an alert event.
  • a resistive measurement may be made on this component of the system.
  • a small current is passed through the conductive trace of the electrically conductive layer.
  • a fixed resistor is placed in series with this conductor and the A/D converter on the controller may be used to measure the voltage across this known resistance. If the conductive trace is cut or if it shows an increased resistance, the voltage across the known resistor would decrease. This would be interpreted by the controller as an alert event. Since the resistance of the conductive trace may change from one system to the next, a "learning" step at installation time may be implemented to determine the normal voltage for this input.
  • controller 500 includes a pulse generator that may be used to contact the monitored call center. Use of a pulse generator allows the alert signal to be sent to the monitored call center, and the kiss-off acknowledgement tone from the monitored call center to be received, in a time of less than 2 seconds.
  • PSTN signals are used to transmit alert signals and receive acknowledgement signals. PSTN signals may be transmitted using audio tones, which may be produced by a tone generator embedded into controller 500.
  • Tone generator may send the tone signals at the 9.6K bits per second or greater.
  • a modulation and demodulation (i.e. MODEM) circuit may be embedded in the circuitry of the controller.
  • MODEM modulation and demodulation
  • a 1 : 1 ratio transformer may be used to couple the controller circuitry to the phone line. Embedded modems with baud rates from 1200 to 56K may be used for this function.
  • a switch on the line side of the transformer is closed. At this juncture, the line appears as a 600 ohm load.
  • Some other signal conditioning may be necessary to provide useful signals to the controller. Standard electronic techniques such as filtering, buffering and amplification may be employed to condition the signals.
  • a single bit of information (alert signal) is all that is required to be relayed to the monitored call center.
  • the modem may be able to detect if another handset is active and terminate the phone call. Specifically, if the premise telephone is being used when an alert event is detected (penetration and/or removal of the cover) controller 500 is configured to switch the phone line away from the premise to transmit the alert signal.
  • a cellular communication system may serve as a backup to the telephone line.
  • the cellular communication system may be coupled to controller 500.
  • controller 500 may determine when the phone line is not available (no dial tone) and automatically switch to the cellular communication system.
  • a secondary method of alerting the dispatcher is to send the alert signal via a high speed DSL line, if available at the premises. This may be, for example, via a cable TV type service or the telephone line DSL service. If the telephone line is used, it would eliminate the dial up period that would otherwise be required.
  • an Ethernet connection may be made between the module and the residential computer. Stand alone Ethernet controllers are available (i.e., Microchip ENC28J60) which may be used for remote
  • the controller cited above only requires four lines to interface to a host microcontroller.
  • the controller is designed for low-power management and system robustness in the event that the application loses its primary source of energy. Many devices in the home operate with simple AC outlet transformers. It is proposed to operate the controller circuits with the same type of supply.
  • a backup power system is used.
  • the backup power system may be a supercapacitor or a battery backup (e.g., a rechargeable lithium battery).
  • a deterrent system may be positioned over one or more interface devices and one or more transmission wires using a template.
  • a line channel (e.g., line channel 440 is placed against the building on top of the transmission lines and at least one inch into the ground, if the transmission lines pass from the ground to the network interface device.
  • Mounting holes are drilled for the line channel and, if necessary, anchors may be used to secure the line channel to the surface.
  • an access hole is drilled at the selected location into the building for the RJ-3 IX wire and the alarm panel zone wire.
  • the interface device is aligned on the building flush against the top of the line channel.
  • the keyway is placed over the transmission lines and the keyway is inserted through the grommet so that at least half of the keyway protrudes down into the line channel with the keyway opening facing the building.
  • the keyway may be secured to the interface device with a fastener (e.g., a cable tie).
  • a communication wire e.g., a RJ-3 IX wire
  • the interface device is aligned on the building flush against the top of the line channel.
  • a communication wire e.g., a RJ-3 IX wire
  • a communication wire is threaded through the access hole in the building and up through the keyway into the interface device.
  • communication wire is connected to the interface device and the building transmission lines. Additional wires for the alarm panel zone may be threaded through the line channel and through the keyway slit. Once all wiring is set up properly, line channel may be mounted to the surface.
  • the cover of a deterrent system may be placed over the interface device and line channel.
  • lines may be drawn on the surface defining the outline of the cover.
  • lines are drawn on the surface starting from the bottom left and right sides of the edges up to about the middle of the cover.
  • the eyelets While holding the cover against the wall, the eyelets may be used as a guide to drill pilot mounting holes at each eyelet positioned. In some embodiments, it may be necessary to insert a suitable anchor at each eyelet position.
  • the left side of the bracket mounting template may be aligned with the left side line drawn on the building, with the large cross hairs on the template centered over the bottom left side mounting hole.
  • the bracket is positioned within the designated outline, and, while holding the bracket firmly in place, pilot mounting holes are drilled through the bracket into the building.
  • anchors may be used to secure the bracket in place.
  • the right side magnet bracket may be mounted in the same manner using the right side of the mounting template.
  • the magnetic brackets may be mounted to the surface with the magnets on top and facing away from the building toward the displacement switches on the cover. Using approved silicone filled connectors (e.g., 3M Scotchlok connectors (or equivalent)), connect the cover sensor leads to the alarm panel zone wires. Install an EOL resistor into the cover EOL terminal block.
  • a moisture resistance coating (e.g., RTV-l 18 silicone) may be by applying onto the EOL resistor and EOL resistor terminal block with a uniform coat covering all exposed parts. Complete the installation by securing the cover in place with mounting screws through the cover eyelets.
  • the deterrent system described in the above embodiments is particularly designed for protecting transmission lines that transfer data into a house or building through an interface device coupled to the outside of the house or building.
  • Another vulnerable point for utilities providers is a regional node. Tampering with a regional node may isolate not just a single residence or business, but an entire neighborhood or area.
  • a deterrent system, configured as disclosed herein may be used for any type of transmission line/interface device including but not limited to regional telephone nodes, regional power nodes, and regional cable nodes - regardless of whether such nodes are coupled to a building or fee standing proximate to a property or roadway.
  • FIG. 10 depicts a schematic diagram showing the use of multiple deterrent systems to protect a residence or business transmission lines and a regional node.
  • a first deterrent system (CommHut) is positioned at the residence or business transmission lines to protect the lines from tampering.
  • a second deterrent system (NodeHut) is positioned at the regional node connecting the residence or business to the main control center.
  • CommHut and NodeHut disrupt today's perimeter security paradigm (shown by the red circle), with a new perimeter paradigm that include protection for exposed phone wireline connections on the outside of all premises, and the multiple phone wireline connections inside of all regional node enclosures (shown by the green circle).
  • Extending the perimeter paradigm to include nodes is significant in that many residential and industrial entities will want all nodes involved with their communications to be included in their security system. When multiple nodes are protected using a deterrent system, both the residence/business and the wire carrier will benefit from the added protection that multiple deterrent systems provide.
  • the deterrent system may be modified in any shape or
  • the deterrent system may surround the node and a portion of the transmission wires coupled to the node.
  • two or more deterrent systems may be used together to protect transmission wires or nodes.
  • the deterrent system may be modified for protecting interface devices and transmission lines that are coupled at or near the roof of a building or house (e.g., overhead transmission lines that are coupled to the house or building).
  • the deterrent system disclosed herein may be modified to detect breaches in a variety of articles other than nodes and transmission lines. For example, banks have occasionally been broken into through a roof, walls or by tunneling from underground.
  • An array of electrically conductive layers, and continuity monitors as described herein, may be disposed on or in walls, floors, ceilings, or doors to protect an entire building or specific areas of a building (e.g., an entryway or a vault). A breach of these surfaces (e.g., by penetration with a cutting tool, breaking with a hammer, explosives, etc.) would generate an alert signal by breaking the continuity of the electrically conductive layer and/or altering the resistance of the layer.
  • an electrically conductive layer and continuity detectors may be disposed on the inside of a shipping container's walls, floors, ceilings, or doors to create a secure container.
  • RFID devices may be used to allow the shipper to keep track of the container.
  • RFID devices generally include a transmitter and a receiver.
  • an RFID transmitter is placed in a shipping container and coupled to a controller of a deterrent system that is used to monitor the electrically conductive layers of the walls.
  • the transmitter may provide an identification number to a receiver when the receiver is operated near the shipping container. In this manner, the shipping container may be identified and information regarding the shipping container its contents may be accessed using the identification number (e.g., through a computer system or a handheld device).
  • a deterrent system as described herein may be used to protect access to the RFID transmitter, inhibiting tampering of the RFID transmitter.
  • a shipping container intrusion detection system may use a battery power supply and wireless communication media. A breach of these surfaces (e.g., by penetration with a cutting tool, breaking with a hammer, explosives, etc.) would generate an alert signal by breaking the continuity of the electrically conductive layer and/or altering the resistance of the layer.
  • a deterrent system may be coupled to one or more power transmission lines and interface devices used to provide power to a mining operation.
  • power transmission lines In mining operations, it is necessary to use power transmission lines to provide power to the interior of a mine. There are, therefore, power lines running throughout the mines.
  • One difficulty in mining operations can be keeping track of the people working at the mine. Since the ground acts as an insulator to wireless transmission, it can be difficult to maintain communications with the people working in the mines.
  • multiple deterrent systems may be coupled to power lines and/or nodes and/or telecommunication transmission lines and/or nodes.
  • RFID receivers may be coupled to a controller of the deterrent systems, creating a system of RFID receivers extending throughout the mines.
  • Employees of the mines may carry an RFID transmitter around the mine which transmits an identification code that identifies the employee.
  • the employee's location may be transmitted to a central control station for the mines. This allows the mine operators to keep track of the employees at all times, which may be crucial during an emergency situation.
  • the use of a deterrent system throughout the mine, as well as at the central control station also provides the additional advantage of protecting the transmission wires and nodes from damage or sabotage. This may be particularly important for the transmission lines and nodes that are associated with the central control station. Attacks on one or more of these nodes may compromise the entire system, so security of the transmission wires and nodes at the central control station is important.
  • a deterrent system that includes electrically conductive layers and continuity detectors may be used in an ABS-walled safe with magnetic locks.
  • the safe may also be coupled to external and internal displacement switches, such that movement of the safe may create an alert event.
  • Use of a controller, disposed inside the safe, which can only be remotely disarmed, will prevent circumvention of any measures normally used to restrict access to the safe (e.g., locks).
  • magnetic locks may be used to secure the safe in a specified location. Use of magnetic locks will prevent unauthorized movement of the safe, while the deterrent system will alert authorities if an attempt is made to break into the safe.
  • Electrically conductive layers and continuity detectors may also be arrayed in other personal property where breach monitoring is advantageous, such as personal safes, safe rooms, or vehicles.

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Emergency Management (AREA)
  • Power Engineering (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Alarm Systems (AREA)
  • Burglar Alarm Systems (AREA)

Abstract

A deterrent system for an interface device, includes a barrier comprising an outer substrate and an electrically conductive layer coupled to the outer substrate; a controller coupled to the electrically conductive layer, wherein the controller creates an alert signal when the conductivity of the electrically conductive layer is altered; and one or more displacement switches coupling a portion of the barrier to a surface on or proximate to the interface device.

Description

TITLE: TRANSMISSION LINE PROTECTION SYSTEM
BACKGROUND OF THE INVENTION
1. Field of the Invention
The present invention relates to a security device for preventing access to a restricted area or device. More particularly, the invention relates to a barrier for signaling unauthorized entry to a restricted area or device.
2. Description of the Relevant Art
Most power lines and communication lines enter residential and commercial buildings through an interface device (commonly referred to as a Network Interface Device or "NID") coupled to the exterior of the building. If the power line and/or communication lines are buried underground, there is usually an area where these lines come out of the ground and into an interface device coupled to the building. If the power line and/or communication lines are carried through a series of poles to the building, the lines may extend from a pole to the interface device coupled to the building. Generally, a portion of the power line and/or communication line is exposed and readily visible to a person in the vicinity of the interface device under these situations.
The exposed power line and/or communication lines are vulnerable to attacks from intruders, vandals, or burglars. This is especially true for 911 services and for telephone lines that are used by security systems for homes and commercial buildings to automatically alert police and/or private security forces of attempted intrusions or disturbances. Such telephone service lines and interconnection boxes are subject to tampering, severing, or destruction by intruders or burglars who know to disable the telephone system in order to defeat the building security system. Once the telephone line is severed, the criminal will be able to access the building without concern that the police or a security call center will be alerted to the intrusion.
In general, various devices have been proposed for protection of telephones and telephone lines from vandalism or intrusion. Many devices rely on an "armored" solution to prevent access to interface devices and wires. These devices generally rely on the physical strength of the materials used to form a protective body as the main deterrent to intrusion. Such protective devices, in addition to being expensive to manufacture and typically requiring professional installation, have proven vulnerable to attack by intruders using high-powered (typically battery- operated) drills or other powered cutting tools.
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS
It is to be understood the present invention is not limited to particular devices or methods, which may, of course, vary. It is also to be understood that the terminology used herein is for the purpose of describing particular embodiments only, and is not intended to be limiting. As used in this specification and the appended claims, the singular forms "a", "an", and "the" include singular and plural referents unless the content clearly dictates otherwise. Furthermore, the word "may" is used throughout this application in a permissive sense (i.e., having the potential to, being able to), not in a mandatory sense (i.e., must). The term "include," and derivations thereof, mean "including, but not limited to." The term "coupled" means directly or indirectly connected.
Described herein is an inexpensive, easy-to-install, protection device which, instead of relying on armor principles to resist penetration presents a "smart" electrical barrier or shield which does not rely on the armor-type protection, but which will respond to an attack on it as if it were an intrusion attempt on the building.
In one embodiment, a deterrent system deters access to a secured device and/or area. The deterrent system, in an embodiment, comprises a cover or wall that includes an outer substrate and an electrically conductive layer positioned next to the outer substrate. The electrically conductive layer is configured such that when the outer substrate is punctured by an intrusion device, the conductivity of the electrically conductive layer is altered. The conductivity of the electrically conductive layer may be monitored by a controller, and the controller may create an alert event which indicates a breech in the cover or barrier wall.
An exploded view of an embodiment of a cover is depicted in FIG.1. A cover includes, at least, an outer substrate 110 and an electrically conductive layer 120. A cover, such as depicted in FIGS. 1 - 8 may act as a standalone, permanent and/or temporary barrier to protect data or power transmission lines and Network Interfaces Devices (NIDs) associated with these types of transmission lines. The cover is especially useful for protecting telephone, cable and electrical transmission lines that extend out of the ground to connect to their respective NIDs. The cover may also be used for protecting telephone, cable and electrical transmission lines, for transmission lines extending from a transmission line pole to a building. An optional inner substrate may be coupled to the outer substrate, such that the electrically conductive layer is disposed between the inner substrate and the outer substrate.
Outer substrate 110 has a primary function to visually and physically deter any attempt to access the components and wires protected by the cover. Outer substrate 110 may be formed from a variety of materials including polymers, woods, wood laminates, and coated and uncoated thin metallic materials. Depending on the configuration of electrically conductive layer 120, outer substrate 110 may be formed from a non-conductive material. For example, if electrically conductive layer 120 has exposed conductive traces on the outer surface, the outer substrate may be composed of a non-conductive material. Alternatively, a non-conductive layer (not shown) may be disposed between the electrically conductive layer and the outer substrate to prevent inadvertent shorting of the electrically conductive layer. In one embodiment, a styrene containing polymer may be used to form the outer substrate. Examples of styrene containing polymers include, but are not limited to polystyrene, acrylonitrile butadiene styrene (ABS), styrene-butadiene (SBR) rubber, styrene-butadiene latex, styrene-isoprene-styrene (SIS), styrene- ethylene/butylene-styrene (S-EB-S), styrene-divinylbenzene (S-DVB), and styrene-acrylonitrile resin (SAN). Polymeric outer substrates are generally lightweight and tough. In some embodiments, the outer substrate may be composed of a UV stabilized polymer.
Outer substrate is formed in any shape or size suitable to cover the desired interface device and/or transmission wires. Use of a thermoplastic polymer allows the outer substrate to be molded to different sizes and shapes.
Electrically conductive layer 120 is situated next to outer substrate 110. In an embodiment, electrically conductive layer 120 includes a conductive material 122 coupled to a non-conductive support material 124. In one embodiment, the conductive material forms a conductive trace that is disposed in and/or on the non-conductive support material. In some embodiments, the conductive trace is disposed on the non-conductive support material such that at least about 90% of the surface of the non-conductive support material includes the conductive trace. In other embodiments, the conductive trace is disposed on the non-conductive support material such that at least about 95% of the surface, at least about 97% of the surface, or at least about 99% of the surface of the non-conductive support material includes the conductive trace. The conductive trace is configured such that penetration of the electrically conductive layer by metallic and/or non-metallic implements will alter the conductivity of the conductive trace.
Alternately, the conductive trace may be formed using an insulated wire that is coupled to a support (which may be conductive or non-conductive) such that at least about 90%> of the surface of the support material includes the insulated wire.
FIG. 2 depicts an embodiment of electrically conductive layer 120 prior to folding the layer into a shape that is complementary to the outer substrate 110. In an embodiment, electrically conductive layer 120 includes a serpentine conductive trace 122 disposed on a non- conductive substrate 124. Serpentine trace is formed as a single conductive line that covers at least about 90% of the surface of the non-conductive support material 124. The width and spacing of the conductive trace is such that the conductive trace does not touch itself at any point on the surface. Additionally, the spacing between parallel portions of the conductive trace is chosen to make it difficult to pass an implement (conductive or non-conductive) through the electrically conductive layer without contacting and severing one or more portions of the conductive trace. Electrically conductive layer 120 may also include pre-creased fold line 127 that allow the electrically conductive layer to be easily folded to match the shape of outer substrate 110.
In one embodiment, a conductive trace may be formed in and/or on a non-conductive substrate such that the width and spacing of the conductive trace may be less than about 0.005 inches. The conductive trace is formed such that no two portions of the conductive trace are in contact. Due to the dense pattern of the serpentine conductive trace, an open circuit condition will occur if any type of penetration, by conductive and/or non-conductive implements, that is larger than the width of the conductive trace occurs. Penetration with such an implement will sever the conductor breaking the conductivity of the conductive trace.
The electrically conductive layer may be fabricated by forming a conductive trace onto a non-conductive substrate using a variety of known technologies. Examples of techniques that may be used to form a conductive layer include, but are not limited to photoetching,
photolithography, screen printing, electro deposition, vacuum deposition, vacuum metalizing, sputter metalizing, ink-jet printing, flexography, spray printing, stamping, etc. An alternate method of fabricating the electrically conductive layer is to lay a continuous length of insulated wire in the desired pattern, using, for example, a modified coil winder. Non-conductive layer, in some embodiments, is formed from a flexible, non-conductive material polymer. Examples of flexible, non-conductive polymers include, but are not limited to, polyester, polystyrene, polyamides, polyurethanes, and polyethylene oxides. Using any of these techniques and materials, a conductive trace may be prepared that covers the non-conductive surface.
The starting point 123 and ending point 125 of the conductor may each be plated- through-hole and coupled to contact pads 142 and 144 on a rigid printed circuit board (PCB) 140, such as F4 type circuit board, and the like. PCB 140 may be physically bonded to the back side (i.e., the side facing away from the outer substrate) of the non-conductive substrate 124. In other embodiments, PCB 140 may be bonded to the side of the non-conductive substrate that the conductive trace is formed on. In this embodiment, PCB 140 would be facing toward outer substrate 110 when mounted to the outer substrate. Wires may be coupled to PCB 140 extending to the interior surface of cover 100 to allow connection with a controller and or incoming transmission lines. In an embodiment, PCB 140 is coupled to non-conductive substrate 124 with and adhesive (e.g., double-sided tape, epoxy, etc.). In some embodiments, PCB 140 is located on the opposite side of the non-conductive substrate and is positioned to couple to the beginning points and ending points of the conductive trace.
In a specific embodiment, an electrically conductive layer is formed using a non- conductive polyimide sheet, shaped to fit between an outer substrate 110 and an inner substrate 130. The polyimide polymer may have a conductive pattern printed on one side of the sheet. The conductive pattern may be formed using a metal lines or a metallic polymer (e.g., aluminum- filled elastomers, such as a conductive material that is composed of 70% polymer and 30% aluminum). In an embodiment, a serpentine conductive trace is formed on the polyimide substrate having a conductive trace width of 0.026 inches wide and a spacing between conductive lines of 0.026 inches. The conductive trace is formed in a pattern in which a single conductive trace line is formed extending from the starting point to the finishing point. For ease in coupling to a PCB, the conductive trace starts and ends near the same region of the polyimide sheet.
The beginning and ending points are plated-through-hole (PTH) connected to contact pads formed on a PCB coupled to the polyimide layer. In an embodiment, the maximum size of a PTH is about 0.022 inches. The contact pads of the PCB are positioned on the side of the PCB that is opposite to the side that the polyimide support is coupled to the PCB.
Once the conductive trace and the PCB connection devices are placed upon the non- conductive substrate, the conductive trace and PCB may be coated with solutions for anti abrasion, such as UV cured polymers (available from, for example 3M). Weatherizing and anti- corrosion layers (e.g., RTV sealants by Dow Chemical) may also be applied to the conductive trace and PCB.
It should be understood that while a single conductive trace is depicted, several layers of non-conductive substrates/conductive traces, as discussed above, may be disposed between the inner and outer substrates. The multiple electrically conductive layers may be arrayed, layered, and coupled together in series, may function independently of each other, or in a combination of coupled and independent operation.
FIG. 3 depicts an embodiment of a schematic diagram of a first PCB 140 bonded to a second PCB 150. First PCB 140 may be constructed with one or more threaded posts 148 on the side of the PCB that is not bonded to the non-conductive substrate. Threaded posts 148 are used in conjunction with nuts to attach the electrically conductive layer to the inner substrate 130. In addition, other receptacles for screws (not shown) may be used to couple first PCB 140 to second PCB 150. In an embodiment, contact pads 142 and 144 of first PCB may be coupled to contact pads on second PCB 150 using vias 156. In an embodiment, vias 156 may be a metal via that extends through the PCB 150, positioned to electrically couple with contact pads 142 and 144 of first PCB 140. Receptacles (not shown) coupling first PCB 140 to second PCB 150 may help to ensure properly alignment of contact pads 142 and 144 with vias 156. In an embodiment, contact pads 142 and 144 of first PCB may be bonded to contact pads 152 and 154 of second PCB 150 using conductive epoxy pads (available, e.g., from 3M, Minneapolis, MN) and another manufacturers. Second PCB 150 may have a terminal strip 155 coupled to contact pads 152 and 154 via lines 158. Terminal strip 155 may be coupled to second PCB 150 using posts 157. Posts 157 may be placed into holes 159 to couple terminal strip 155 to second PCB 150. Holes 159 and posts 157 together help to align the terminal strip 155 with lines 158. Terminal strip 155 may be a multi-position, screw-operated-terminal-connector (wire-terminal), which may be used to connect/wire electrically conductive layer 120 to a control system.
Once conductive trace 122, first PCB 140 and second PCB 150 are coupled to a non- conductive substrate 124, the substrate components may be coated with solutions for anti abrasion, such as UV cured polymers and/or other solutions by 3M. Weatherizing and anti- corrosion compounds may also be used to coat the substrate components, such as by RTV and/or other sealants by Dow Chemical and/or other manufacturers and the like. In some embodiments, several layers of non-conductive substrates/serpentine conductive traces, as discussed above, may be arrayed and layered and connected together in series, function independently of each other, or a combination of independently functioning layers and coupled together layers.
In some embodiments, an inner substrate 130 is coupled to the electrically conductive layer 120, on the side opposite to the side of the electrically conductive layer that is coupled to outer substrate 110. Inner substrate 130 may be formed from a variety of materials including polymers, woods, wood laminates, and coated and uncoated thin metallic materials. Depending on the configuration of electrically conductive layer 120, inner substrate 130 may be formed from a non-conductive material. For example, if electrically conductive layer 120 has exposed conductive traces on the outer surface that contacts the inner substrate, when assembled, the inner substrate may be composed of a non-conductive material. Alternatively, a non-conductive layer (not shown) may be disposed between the electrically conductive layer and the inner substrate to prevent inadvertent shorting of the electrically conductive layer. In one embodiment, a styrene containing polymer may be used to form the inner substrate. Examples of styrene containing polymers include, but are not limited to polystyrene, acrylonitrile butadiene styrene (ABS), styrene-butadiene (SBR) rubber, styrene-butadiene latex, styrene-isoprene-styrene (SIS), styrene- ethylene/butylene-styrene (S-EB-S), styrene-divinylbenzene (S-DVB), and styrene-acrylonitrile resin (SAN). Polymeric inner substrates are generally lightweight and tough. In optional embodiments, the inner substrate may be composed of a UV stabilized polymer.
In an embodiment, outer substrate 110 is bonded to inner substrate 130, with the electrically conductive layer 120 disposed between the inner and outer substrate. The inner substrate 130 may be bonded to the outer substrate 110 using a suitable adhesive or one or more fasteners (e.g., rivets, screws, bolts, etc.). In some embodiments, a silicone based adhesive bonds inner substrate 130 to outer substrate 110, with electrically conductive layer 120 disposed between the inner and outer substrate. Electrically conductive layer 120 may be bonded to inner substrate 130, outer substrate 110, or both the inner and outer substrate. In some embodiments, the electrically conductive layer is not bonded to either substrate, however the electrically conductive layer is held in place by the bonded edges of the inner and outer substrates. Together the bonded inner substrate 130, electrically conductive layer 120 and outer substrate 110 form a cover 100. In an embodiment, threaded posts 148 on PCB 140 may be used to couple the PCB and the attached conductive layer 120 to inner substrate 130. In an embodiment, a precut hole
115 may be formed in inner substrate 130 to allow access to terminal strip 155 through the inner substrate. Threaded posts 148 may extend through predrilled holes 117 of inner substrate 130 and the PCB secured to the inner substrate by attaching a nut to the threaded posts. Since PCB
140 is secured to the electrically conductive layer 120 (e.g., using a UL listed double sided tape) securing the PCB to inner substrate 130 also partially secures the electrically conductive layer to the inner substrate.
Once cover 100 is formed, the cover may be attached to a base 160. In an embodiment, base 160 may be formed from a plastic or metal material. In some embodiments, base 160 is formed from aluminum. Base 160 may be formed having a groove extending through the base which matches the side profile of the cover, such that the cover fits into the groove. FIG. 4 depicts a cross sectional view of base 160 with cover 100 disposed in a groove formed in the base. One or more fasteners 162 (e.g., rivets, screws, bolts, etc.) may be used to couple the base to the cover. Alternatively, or in addition, cover 100 may be glued to base 160 using a suitable adhesive (e.g., a silicon based adhesive).
In an embodiment, inner substrate 110 and outer substrate 130 include one or more eyelets 112 that are aligned to form an opening that passes through the cover. Eyelets 112 may be used as passages for fasteners to hold outer substrate 110 and inner substrate 130 together when the inner and outer substrates are being bonded to each other. After the adhesive used to join the substrates has set, the fasteners can be removed, leaving eyelets 112 available for further use. After the cover is completed, eyelets 112 may be used to receive fasteners for coupling the cover to a structure.
The completed cover provides a deterrent to tampering with wires and/or interface devices that are surrounded by the cover. The positioning of an electrically conductive layer within the cover provides a way of monitoring when the cover has been penetrated. Penetration of the cover by a conductive or non-conductive tool will alter the conductivity of the electrically conductive layer. If the conductivity of the electrically conductive layer is monitored, the change in conductivity will signal that an attack has been made on the cover which penetrated the cover. In some embodiments, when the conductivity of the electrically conductive layer is altered, an alert event is created. If the cover is attacked by use of a metal implement, the conductivity of the electrically conductive layer may be maintained while the metal implement is embedded in the cover. In such situations, the metal implement, however, will create a short circuit condition, reducing the resistance of the conductive trace in the electrically conductive layer. Thus, an attack on the cover may be detected by either noting a break in the continuity of the conductive trace, or by a decrease in resistance of the conductive trace.
The use of an electrically conductive layer allows a user to monitor for physical attacks to the cover. The electrically conductive layer, however, will not be affected by removal of the cover. Thus, a person trying to improperly access the interface device and/or wires may try and remove the cover, rather than physically attacking the cover. In an embodiment, depicted in FIG. 5, the deterrent system also includes one or more displacement switches 170 coupled to the cover and the surface 210 proximate to interface device 200 and/or transmission wires 220 that the cover is protecting. A displacement switch is defined herein as a switch that is part of an electric circuit and when one portion of the switch is displaced with respect to the other portion of the switch a change in the conductivity of an electric circuit is produced. Examples of displacement switches include, but are not limited to, magnetic switches, push button switches, and tilt operated switches (e.g., mercury switches).
In one embodiment, displacement switches are formed from a magnetic switch 172 that is coupled to the cover and a magnet 174 coupled to the surface proximate to the interface device and/or transmission wires that the cover is protecting (see FIG. 6). In one embodiment, a magnetic switch 172 includes a pair of magnetizable, flexible, metal reeds whose end portions are separated by a small gap when the switch is open. When a magnetic field is applied, the reeds come together, thus completing an electrical circuit. The stiffness of the reeds causes them to separate, and open the circuit, when the magnetic field ceases. Magnet 174 creates the magnetic field that causes the magnetic switch to open or close. Magnet 174 may be an electromagnet or a permanent magnet.
In one embodiment, magnetic switch 172 is coupled to cover 100 and magnet 174 is coupled to the surface proximate to the interface device and/or transmission wire. It should be understood that this configuration may be reversed such that magnetic switch 172 is coupled to the surface and magnet 174 is coupled to the cover. Magnetic switch 172 is also coupled to an electrical circuit that monitors the connectivity of the line. In use the magnetic switch 172 is magnetically coupled to magnet 174 when the cover is positioned over the network interface device and/or transmission wires. The magnetic field generated by magnet 174 is sufficient to close magnetic switch 172, creating a closed circuit. When the cover is removed from the surface, magnetic switch 172 is displaced away from magnet 174, which opens the magnetic switch, creating an open circuit. When magnetic switch 172 is coupled to an electronic monitoring device, opening of the magnetic switch will create a change in the electronic circuit that is detected by an electronic monitoring device. A change in the electronic circuit from a closed circuit to an open circuit will cause the monitoring device to create an alert event that signals that the cover has been removed. In an embodiment when two or more magnetic switches are used, the switches may be coupled to each other in series, so that the circuit will become open if any one of the switches is displaced from its corresponding magnetic field.
FIG. 6 depicts an interface device 200 coupled to a surface 210. A transmission wire
220 extends from the ground, up to the interface device. Cover 100 may be coupled to surface 210 using one or more fasteners that are passed through eyelets 112. In addition, brackets 230 are coupled to surface 210 and include magnet 174. To attach cover 100 to the surface 210, one or more fasteners are passed through eyelets 112 and into surface 210. In addition, brackets 230 are pre -mounted to surface 210 and positioned to align with magnetic switch 172. Thus when cover 100 is mounted to surface 210, magnetic switch 172 comes into contact with (or at is positioned in the magnetic field of) magnet 174, which closes the switch forming a closed circuit. Magnetic switches 172 are coupled to a controller disposed on the inner surface of the cover through connector 175.
The above described deterrent systems are described as having an open loop detection circuit, where an alarm event is determined if the circuit is in an open state. It should be understood that the circuit may be configured to operate in a closed loop detection state, where the alarm event is determined if the circuit goes from an open state to a closed state. It should also be understood that combinations of open loop/closed loop detection circuits may be used.
Mounting of the cover to the surface proximate to the interface device and/or
transmission wires thus requires that brackets 230 be accurately mounted so that the cover magnetic switches 172 are properly aligned with magnets 172 disposed on the surface. FIG. 7 depicts an embodiment of a template 300 is used to prepare the surface to receive the cover. In an embodiment, template 300 is a weatherized paper mounting template that includes one or more openings that correspond to eyelets 112 of cover 100 and magnetic switches 172. For example, template 300 includes openings 310 which correspond to the eyelet openings of the cover. Template 300 also includes openings 320 which have a shape and size that corresponds to brackets 230 which hold magnets 174. Template 300 may also include an opening 330
corresponding to the location of the interface device and the transmission wire. In use, template 300 is placed on surface 210 such that the interface device and transmission wires extend through the appropriate openings. Template 300 defines the positions where brackets 230 should be mounted (320) and positions (310) where fasteners will enter the surface through the eyelets of cover 100. While template 300 is coupled to surface 210, pilot holes may be drilled at template openings 310 to prepare the surface to receive the fasteners used to couple the cover to the wall.
In addition, brackets 230 are mounted to the surface at template openings 320, thus ensuring that the magnets 174 on the brackets will be substantially aligned with the magnetic switches 172 of the cover. After the pilot holes have been drilled and the brackets mounted, the template may be removed or the template may be left on the surface. If the template is made of a weatherized material, the template may serve as a seal against weather and insects once the cover is placed on the surface (over the template). In another embodiment, an alternate template 350 may be used to position brackets 230 which hold magnets 174. Template 350 may be used to position brackets 230 on a surface with respect to cover 100.
When installed on a surface, the deterrent system acts as a tripwire which detects possible unauthorized tampering with interface device and/or transmission wire. If the deterrent system is physically attacked in an effort to "break into" the cover, the conductivity of the electrically conductive layer will be disrupted, causing an alert event to be created.
Alternatively, if unauthorized removal of the cover is attempted, the displacement switches will be altered as a result of the cover being removed. For example, when using magnetic switches, the magnetic switches will be separated from the magnetic field, thus reverting to an open state and creating a change in the conductivity of the circuit, causing an alert event to be created. In either situation, an alert event is created upon unauthorized tampering with the cover. The alert event may be an audible signal, a visible signal, or a combination of both. An alert event may also include sending a signal to a monitored call center that notes the alert signal and contacts the appropriate authorities.
While an alert event may be sufficient to deter unauthorized access to an interface device and/or transmission wires, the person instigating the unauthorized access may be able to disable transmission wire prior to the arrival of the appropriate authorities and/or prior to the alert signal being sent to the monitored call center. For example, if the deterrent system covers both a network interface device and a transmission wire, and cover 100 is removed, the person removing the cover may be able to cut the transmission wire before the alert signal is sent to the monitored call center. To inhibit the ability to cut a transmission wire before the alert signal is sent, a line channel 400 may be positioned over the exposed portion of a transmission wire. FIG. 8 depicts an embodiment of a line channel 400. Line channel 400 may include body 410 defining a channel 420 through which the transmission wire runs. Body 410 may be formed from a material that resists cutting and breaking, such as polymers (e.g., acrylonitrile butadiene styrene) or metals (e.g., aluminum). Line channel 400 also includes one or more openings through which one or more fasteners may be passed to couple line channel 400 to surface 210. It may be difficult to ensure that line channel 400 has the proper length to extend from the ground to the network interface device. Thus, in some embodiments, a keyway 440 (See FIG. 6) is used to cover the transmission wires that extend between the line channel and the interface device. In an embodiment, keyway 440 is formed of a flexible, slitted material that can be readily wrapped around the transmission wires. The keyway extends into the line channel and, in some instances, may also extend into the network interface device. Keyway 440 is preferably formed from a material that resists cutting. In one embodiment, keyway 440 may be formed from a rigid polymer (e.g., PVC pipe about one inch in circumference and about four inches long) with a slit in the polymer so that the wires that are connected to the terminal strip, such as wires from the cover, as well as the wires from the displacement switches which are to be connected to the controller, are placed inside the keyway. The slit may be situated to face the premise being protected.
Line channel 400 is used to retard rapid access to the transmission lines once a breach, by partial and/or complete removal and/or penetration, of the cover is accomplished. A breach instantly triggers a high-speed, for example less than two seconds, tamper alert data
communications signal which must be transmitted before the transmission lines can be severed. Line channel may be composed of a metal or nonmetal material (e.g., PVC), which will retard rapid access to the transmission lines. Line channel 400 may be wide and deep enough to thwart rapid penetration by man-portable bolt cutters, saws, and other power and hand tools.
In some embodiments, an additional inner cover may be used in place of line channel
400. An inner cover may be made from a material that resists cutting and breaking, such as polymers (e.g., acrylonitrile butadiene styrene, poly vinyl chloride) or metals (e.g., aluminum). Inner cover may fit over one or more transmission wires and one or more interface devices. The inner cover may be dimensioned to fit under the outer cover 100, when attached to a surface. Inner cover may be used to retard rapid access to the transmission lines once a breach, by partial and/or complete removal and/or penetration, of cover 100 is accomplished.
In some embodiments, the electrically conductive layer may be electrically coupled in series with the displacement switches in a single loop together such that if any attack on the cover will be apparent in a single monitoring circuit. In other embodiments electrically conductive layer and displacement switches may be individually monitored.
An electronic controller may be coupled to cover 100. In some embodiments, electronic controller is embodied in first PCB 140 and/or second PCB 150. Alternatively, a stand alone electronic controller may be coupled to the inner substrate 130 of the cover. A schematic diagram of an electronic controller 500 is depicted in FIG. 9. Controller 500 includes input ports 510 for receiving signals from various components of the cover. Input ports include interface device input ports 512, electrically conductive layer input ports 514 and displacement switch input ports 516. The controller also includes communications ports. For example, controller 500 may include a phone communication port 522, an Ethernet communication port 524. Controller may also include a wireless communication device 526. Controller 500 also includes one or more signaling devices to alert a user of the status of the controller and cover system. Signaling devices include, but are not limited to low battery indicators 532 and alarm indicators 534 and
536.
Electrically conductive layer 120 may be coupled to controller input port 514.
Displacement switches 170 may be coupled to each other in series and coupled to the controller input port 516. This allows the controller to monitor the electrical circuits for tampering signals. As used herein the term alert event is an event that indicates that the cover is being tampered with in an unauthorized manner. Alert events include attempts to remove the cover, penetrate the outer substrate, cutting and/or shorting the displacement switches or tampering with the outer covers. Controller 500 includes downloadable and remotely programmable logic devices that allow the controller to monitor the displacement switches and electrically conductive layer and determine when either system has been tampered with. Upon the detection of tampering, the controller prepares an alert signal and transmits the alert signal to a monitoring center using a phone line coupled to phone input port 522, an Ethernet line coupled to Ethernet port 524, or using wireless device 526. In some embodiments, controller sends the alert signal over more than one medium (telephone, Ethernet, or wireless). Controller 500 will further cause alarm indicators 534 and 536 to become activated in response to detecting a tampering event. In an embodiment, alarm indicator 534 is activated if the electrically conductive layer is tampered with, while alarm indicator 536 may be activated if the cover is improperly displaced. In some embodiments, controller 500 is battery operated and low battery indicator may be illuminated when the battery power is low. Low battery signals may also be transmitted to a central monitoring station.
In some embodiments, controller 500 includes electronic circuits capable of monitoring the electrically conductive layer 120. For example, controller 500 may include a voltage comparator for detecting changes in the voltage of power running through the electrically conductive layer 120. Additionally, or alternatively, controller 500 may include a resistance comparator for detecting changes in resistance of the electrically conductive layer 120.
Controller 500 may be programmed to create alarm events when the voltage and/or resistance are different from a preprogrammed value of range. Controllers that include many of these features are commercially available from Honeywell, Inc. Minneapolis, Minnesota. If a controller fails, then an alert event may occur that does not trigger an alert signal. In order to prevent unauthorized access in case of a controller failure, the controller may send a check-in signal periodically (e.g., every 12 hours) to the monitored call center. Failure to receive a check-in signal for more than 12 hours may indicate a controller or communication equipment failure. The monitored call center may then alert the appropriate authorities of the apparent failure of the system.
In order to prevent false alarm signals, there should be a method of deactivating the cover, in case legitimate access to the interface device and/or transmission wire is needed. Any means of deactivating the cover that can be accessed at the site of the cover creates a potential weak spot. In an embodiment, controller 500 includes phone and or Ethernet lines which allow two-way communication. Additionally, wireless device 526 may also transmit and receive control signals. In an embodiment, a system deactivation signal may be received through telephone port 522, Ethernet port 524, or wireless device 526, or part or all of the input ports. During use, a person requiring legitimate access to the interface device and/or transmission wires can contact a monitoring center and request access permission. If the proper protocol is performed by the person requesting access (e.g., providing a predetermined password to the monitoring center), the monitoring center may send a deactivation signal to controller 500. In response to the deactivation signal, the controller 500 will deactivate the system, such that the person requesting access can remove the cover without triggering an alarm event. Controller 500 may be programmed to rearm the cover after a predetermined amount of time has passed after the deactivation signal is received. Additionally, or alternately, controller 500 may be programmed to rearm the cover when a rearm signal is received from the call center. By creating a disarm protocol that is not physically accessible by a person in the vicinity of the cover, the cover is less prone to attacks that could circumvent the security measures that are in place.
In some embodiments, controller 500 has PSTN tip and ring in- and-out screw terminals such that the incoming PSTN tip and ring wires can be removed from the interface device and routed into the controller. The wires are then routed from controller back to the interface device. This places controller 500 between the incoming PSTN line and the premise. When the controller detects an alert event, it will instantly switch the incoming PSTN line away from the building services and transmit the tamper alert signal(s). Once the controller switches the incoming PSTN line, it will complete a tamper alert transmission, and receive an
acknowledgement of receipt of the tamper alert signal(s), using e.g., Security Industry
Association DC-04-2000.05, which may include Contact ID, and/or Modem II, and/or Modem He and the like communications, and/or VoIP Internet, and/or dynamic host configuration protocols (DHCP). The controller will operate quickly and be configured to complete the transmission of the alert signal and receipt of the acknowledgement transmission before any transmission lines involved can be severed.
In an embodiment, controller 500 will transmit tamper alert signal(s) via standard phone line (PSTN) or any type of broadband cables (e.g., coaxial and/or fiber optic lines). The controller's communications capability will be in the form of a modem set up to transmit at least 9.6K bits per second for PSTN applications or transmit at a variable rate up to 56K bits per second for Internet Protocol (such as VoIP, DSL, ADSL, DHCP, or combinations thereof).
Power line communication or power line carrier (PLC), also known as Power line Digital Subscriber Line (PDSL), mains communication, power line telecom (PLT), or power line networking (PLN), is a system for carrying data on a conductor also used for electric power transmission. Broadband over Power Lines (BPL) uses PLC by sending and receiving information bearing signals over power lines to provide access to the Internet. Electrical power is transmitted over high voltage transmission lines, distributed over medium voltage, and used inside buildings at lower voltages. Powerline communications can be applied at each stage. Most PLC technologies limit themselves to one set of wires (for example, premises wiring), but some can cross between two levels (for example, both the distribution network and premises wiring).
In some embodiments, the deterrent system may be used to protect power transmission lines that are used for both power transmission and data transmission. In an embodiment, power transmission lines are routed into a deterrent system, as described above. The power
transmission lines and any interface devices associated with such lines may be protected by the deterrent device. In some embodiments, a controller of the deterrent system may also be coupled to the data transmission power lines, such that alert signals may be sent to a monitored call center through the data transmission power lines when an alert event occurs. Additionally, the deterrent system controller may be coupled to any device that is coupled to a power line adapter that is inside a premise(s). For example, a security system that is coupled to the data transmission power lines thorough an adapter may be in communication with the controller of the deterrent system. Thus the controller can send alert signals to the security system, which can be forwarded by the security system to a monitored call center. Other devices such as motion activated and/or continuous feed video cameras, smoke detectors, fire detectors, carbon monoxide detectors, infrared motion detectors, microwave motion detectors, wireless medical- and/or duress- pendants) may be in communication with the deterrent system controller, through the data transmission power line. In embodiments, where a premise does not have a security system, the controller of the deterrent system may act as a communication device for alerting the proper authorities in the event of an alert event occurring on any security device coupled to the power line.
In some embodiments, controller 500 may be coupled to one or more power line communication (PLC ) devices. Examples of PLCs include, but are not limited to power line telecommunication (PLT) devices, power line networking (PLN) devices, power line digital subscriber line (PDSL) devices, and broadband over power lines (BPL) devices. In an embodiment, controller 500 may be configured to receive status updates and alert notices from PLT, PLN, BPL and other PLC type devices. For example, controller 500 may be coupled to PLC devices through a power line entering the premises that the deterrent system is protecting. In an embodiment, the power line used for data communications is coupled through controller 500 to the premises. In this manner all PLC devices subsequently coupled to the power line in the premises will also be in communication with controller 500 of the deterrent system. Since controller 500 is in communication with a monitored call center (e.g., via phone lines, Ethernet, wireless, etc.), any changes in the status of any PLC devices coupled to the controller may be relayed to the monitored call center. The monitored call center may notify the appropriate personnel of the status changes to take the appropriate action.
In one embodiment, controller 500 may be capable of monitoring the status of a backup power system (e.g., battery backup) used to power the controller. If the backup power system is not capable of supporting the controller in the event of a loss of power from the power line, the controller may send an alert to the monitored call center that the backup power system is in need of service. The monitored call center may inform the appropriate personnel of the status and provide an alert to the owner of the premises.
In another embodiment, deterrent system 500 is used to protect the power line providing power to all or a portion of a premises. In such embodiments, the power line may be coupled to controller 500, such that the power passes through controller to the premises. In such embodiments, controller 500 may be configured to measure the amount of power being supplied to the premises, through the controller, for metering purposes. Upon receipt of a request, or periodically, controller 500 may send the power usage measurements to an energy provider to be used for billing or other purposes. Alternatively, controller 500 may be coupled to a metering device which is used to measure the power usage of the premises. Controller 500 may periodically, or upon receipt of a "read" command, collect power usage information from the metering device and relay the information to an energy provider. Controller may be coupled to electricity meters and/or gas meters.
Controller 500 is wired to the electrically conductive layer 120 and the displacement switches 170 via a wire -terminal which is accessible through an opening in the inside substrate. Controller input monitoring circuits may be connected in a supervised manner, such as utilizing an end-of-line resistor(s), to the multi-position terminal-connector.
In an embodiment, controller 500 is set up to operate with a stand alone audible siren 540, commercially available, for example, from Ademco Distribution). When an alert event occurs, the controller may activate the siren, creating an audible deterrent.
Controller 500 may be powered by AC (e.g., 120V AC). Controller may also include a battery backup with low battery visual and audible alerts. Battery backup may use a rechargeable battery which charges when the main AC power source is in service. In some embodiments, battery backup may be located inside of the building serviced by the transmission line.
In some embodiments, controller 500 may also include an integrated with a wireless device 526 that acts as a receiver and/or transmitter. In some embodiments the wireless device may be part of an independent system such as the LYNXR series by Ademco. In some embodiments, wireless device may be a wireless transceiver (e.g., Wi-Fi device) as defined by IEEE 802.11 (e.g., a WRT54G by Linksys). The wireless transceiver may be part of a wireless local area and/or a wide area network(s). The wireless device may communicate with other wireless devices such as motion activated and/or continuous feed video cameras, smoke detectors, fire detectors, carbon monoxide detectors, infrared motion detectors, microwave motion detectors, wireless medical- and/or duress-pendant(s), or combinations of these devices. The wireless device may receive alert signals from any other wireless devices that communicate with the wireless device. In response to receiving an alert signal from one or more devices, the controller may determine the source of the wireless signal(s) received and pass the differentiated signal(s) to a monitored call station using the transmitter of the wireless device, a telephone line, or an Ethernet connection. In other embodiments, wireless device may a cellular and/or long range radio system, which will transmit alert signals directly into cellular and/or long range radio systems.
Once an alert event occurs, an alert signal is prepared and sent by the controller to a central monitoring station. Detection of an alert event by any of the monitoring circuits will create an alert signal. The alert signal may be sent to a monitoring station over one or more transmission devices of the controller (e.g., phone line, Ethernet line, wireless
transceiver/transmitter). The controller may rapidly transmit the alert signal (e.g., data and/or video signal(s)) to a monitored call station that understands the specific nature and the purpose of the alert signal. The monitored call station's data message receiving equipment will rapidly transmit an acknowledgement signal(s) and the like to our controller. Subsequent to receiving and acknowledging the controllers alert signal, the monitored call station will provide prompt and credible communications with all applicable authorities, such as police, fire, security, and safety personnel, a service which is standard procedure at monitored call stations such as Monitronics
International, Inc., among many others for example.
In some embodiments, the controller may be wired to a security system located inside the building serviced by the protected transmission lines. When an alarm event occurs, the controller send out the alert signals to the premises security system, which transmits the alert signals to a monitored call center. The controller is configured to send such signals in a time period that is less than the time an intruder takes to gain access to the interface device or transmission lines. Generally an alert signal is sent to a monitored call station, and a receipt acknowledgement received from the monitored control center, within 5 seconds, within 3 second, within 2 seconds, or within 1 second of an alert event.
In a specific embodiment, a controller includes A/D converters, comparators, programmable external interrupts, low power consumption, and internal memory. The comparators available in the controller may be used to form a simple switch closure (or opening) in the protection scheme. A pull up resistor may be used on one of the inputs to a comparator. If two normally closed displacement switches are installed in series, then if either one was opened, the comparator would switch and recognize an alert event.
Since the electrically conductive layer might not be completely cut, a resistive measurement may be made on this component of the system. In one embodiment, a small current is passed through the conductive trace of the electrically conductive layer. A fixed resistor is placed in series with this conductor and the A/D converter on the controller may be used to measure the voltage across this known resistance. If the conductive trace is cut or if it shows an increased resistance, the voltage across the known resistor would decrease. This would be interpreted by the controller as an alert event. Since the resistance of the conductive trace may change from one system to the next, a "learning" step at installation time may be implemented to determine the normal voltage for this input.
The primary method of alerting the dispatcher that an alert event has occurred is via the telephone line that is in the process of being attacked. Therefore, the dial up must occur rapidly (e.g., in less than 5 seconds, in less than 3 seconds, in less than 2 seconds, or in less than 1 second). In one embodiment, controller 500 includes a pulse generator that may be used to contact the monitored call center. Use of a pulse generator allows the alert signal to be sent to the monitored call center, and the kiss-off acknowledgement tone from the monitored call center to be received, in a time of less than 2 seconds. In some embodiments, PSTN signals are used to transmit alert signals and receive acknowledgement signals. PSTN signals may be transmitted using audio tones, which may be produced by a tone generator embedded into controller 500. Tone generator may send the tone signals at the 9.6K bits per second or greater. To connect the controller to a standard analog telephone line, a modulation and demodulation (i.e. MODEM) circuit may be embedded in the circuitry of the controller. To interface an analog telephone line to a digital controller, circuitry is provided that will not condition the signaling and also protect the microcontroller from over- voltage conditions and noise. A 1 : 1 ratio transformer may be used to couple the controller circuitry to the phone line. Embedded modems with baud rates from 1200 to 56K may be used for this function.
When it is desired to make a call, a switch on the line side of the transformer is closed. At this juncture, the line appears as a 600 ohm load. Some other signal conditioning may be necessary to provide useful signals to the controller. Standard electronic techniques such as filtering, buffering and amplification may be employed to condition the signals. Once the connection is made, a single bit of information (alert signal) is all that is required to be relayed to the monitored call center. In some embodiments, the modem may be able to detect if another handset is active and terminate the phone call. Specifically, if the premise telephone is being used when an alert event is detected (penetration and/or removal of the cover) controller 500 is configured to switch the phone line away from the premise to transmit the alert signal. In some embodiments a cellular communication system may serve as a backup to the telephone line. The cellular communication system may be coupled to controller 500. During use, controller 500 may determine when the phone line is not available (no dial tone) and automatically switch to the cellular communication system.
A secondary method of alerting the dispatcher is to send the alert signal via a high speed DSL line, if available at the premises. This may be, for example, via a cable TV type service or the telephone line DSL service. If the telephone line is used, it would eliminate the dial up period that would otherwise be required. To tie the security module to the DSL line, an Ethernet connection may be made between the module and the residential computer. Stand alone Ethernet controllers are available (i.e., Microchip ENC28J60) which may be used for remote
communication with embedded applications. The controller cited above only requires four lines to interface to a host microcontroller.
In an embodiment, the controller is designed for low-power management and system robustness in the event that the application loses its primary source of energy. Many devices in the home operate with simple AC outlet transformers. It is proposed to operate the controller circuits with the same type of supply. To compensate for the loss of the AC mains, a backup power system is used. The backup power system may be a supercapacitor or a battery backup (e.g., a rechargeable lithium battery). In an embodiment, a deterrent system may be positioned over one or more interface devices and one or more transmission wires using a template. A line channel (e.g., line channel 440 is placed against the building on top of the transmission lines and at least one inch into the ground, if the transmission lines pass from the ground to the network interface device. Mounting holes are drilled for the line channel and, if necessary, anchors may be used to secure the line channel to the surface. After selecting an appropriate location beneath the line channel, an access hole is drilled at the selected location into the building for the RJ-3 IX wire and the alarm panel zone wire. The interface device is aligned on the building flush against the top of the line channel. The keyway is placed over the transmission lines and the keyway is inserted through the grommet so that at least half of the keyway protrudes down into the line channel with the keyway opening facing the building. The keyway may be secured to the interface device with a fastener (e.g., a cable tie). A communication wire (e.g., a RJ-3 IX wire) is threaded through the access hole in the building and up through the keyway into the interface device. The
communication wire is connected to the interface device and the building transmission lines. Additional wires for the alarm panel zone may be threaded through the line channel and through the keyway slit. Once all wiring is set up properly, line channel may be mounted to the surface.
The cover of a deterrent system may be placed over the interface device and line channel. Using the cover as a guide, lines may be drawn on the surface defining the outline of the cover. For use with the template depicted in FIG. 7B, lines are drawn on the surface starting from the bottom left and right sides of the edges up to about the middle of the cover. While holding the cover against the wall, the eyelets may be used as a guide to drill pilot mounting holes at each eyelet positioned. In some embodiments, it may be necessary to insert a suitable anchor at each eyelet position. The left side of the bracket mounting template may be aligned with the left side line drawn on the building, with the large cross hairs on the template centered over the bottom left side mounting hole. The bracket is positioned within the designated outline, and, while holding the bracket firmly in place, pilot mounting holes are drilled through the bracket into the building. In some embodiments, anchors may be used to secure the bracket in place. The right side magnet bracket may be mounted in the same manner using the right side of the mounting template. The magnetic brackets may be mounted to the surface with the magnets on top and facing away from the building toward the displacement switches on the cover. Using approved silicone filled connectors (e.g., 3M Scotchlok connectors (or equivalent)), connect the cover sensor leads to the alarm panel zone wires. Install an EOL resistor into the cover EOL terminal block. Once the EOL resistor is installed, a moisture resistance coating (e.g., RTV-l 18 silicone) may be by applying onto the EOL resistor and EOL resistor terminal block with a uniform coat covering all exposed parts. Complete the installation by securing the cover in place with mounting screws through the cover eyelets.
The deterrent system described in the above embodiments, is particularly designed for protecting transmission lines that transfer data into a house or building through an interface device coupled to the outside of the house or building. Another vulnerable point for utilities providers is a regional node. Tampering with a regional node may isolate not just a single residence or business, but an entire neighborhood or area. In some embodiments, a deterrent system, configured as disclosed herein, may be used for any type of transmission line/interface device including but not limited to regional telephone nodes, regional power nodes, and regional cable nodes - regardless of whether such nodes are coupled to a building or fee standing proximate to a property or roadway. FIG. 10 depicts a schematic diagram showing the use of multiple deterrent systems to protect a residence or business transmission lines and a regional node. A first deterrent system (CommHut) is positioned at the residence or business transmission lines to protect the lines from tampering. A second deterrent system (NodeHut) is positioned at the regional node connecting the residence or business to the main control center.
CommHut and NodeHut disrupt today's perimeter security paradigm (shown by the red circle), with a new perimeter paradigm that include protection for exposed phone wireline connections on the outside of all premises, and the multiple phone wireline connections inside of all regional node enclosures (shown by the green circle). Extending the perimeter paradigm to include nodes is significant in that many residential and industrial entities will want all nodes involved with their communications to be included in their security system. When multiple nodes are protected using a deterrent system, both the residence/business and the wire carrier will benefit from the added protection that multiple deterrent systems provide.
In these applications, the deterrent system may be modified in any shape or
configuration which allows the deterrent system to surround the node and a portion of the transmission wires coupled to the node. In some embodiments, two or more deterrent systems may be used together to protect transmission wires or nodes. In other embodiments, the deterrent system may be modified for protecting interface devices and transmission lines that are coupled at or near the roof of a building or house (e.g., overhead transmission lines that are coupled to the house or building).
In some embodiments, the deterrent system disclosed herein may be modified to detect breaches in a variety of articles other than nodes and transmission lines. For example, banks have occasionally been broken into through a roof, walls or by tunneling from underground. An array of electrically conductive layers, and continuity monitors as described herein, may be disposed on or in walls, floors, ceilings, or doors to protect an entire building or specific areas of a building (e.g., an entryway or a vault). A breach of these surfaces (e.g., by penetration with a cutting tool, breaking with a hammer, explosives, etc.) would generate an alert signal by breaking the continuity of the electrically conductive layer and/or altering the resistance of the layer.
In other embodiments, an electrically conductive layer and continuity detectors may be disposed on the inside of a shipping container's walls, floors, ceilings, or doors to create a secure container. Additionally, one or more radio frequency identification (RFID) devices may be used to allow the shipper to keep track of the container. RFID devices generally include a transmitter and a receiver. In one embodiment, an RFID transmitter is placed in a shipping container and coupled to a controller of a deterrent system that is used to monitor the electrically conductive layers of the walls. The transmitter may provide an identification number to a receiver when the receiver is operated near the shipping container. In this manner, the shipping container may be identified and information regarding the shipping container its contents may be accessed using the identification number (e.g., through a computer system or a handheld device). In some embodiments, a deterrent system, as described herein may be used to protect access to the RFID transmitter, inhibiting tampering of the RFID transmitter.
Because shipping containers generally lack power supplies and wired communication media, a shipping container intrusion detection system may use a battery power supply and wireless communication media. A breach of these surfaces (e.g., by penetration with a cutting tool, breaking with a hammer, explosives, etc.) would generate an alert signal by breaking the continuity of the electrically conductive layer and/or altering the resistance of the layer.
In another embodiment, a deterrent system may be coupled to one or more power transmission lines and interface devices used to provide power to a mining operation. In mining operations, it is necessary to use power transmission lines to provide power to the interior of a mine. There are, therefore, power lines running throughout the mines. One difficulty in mining operations can be keeping track of the people working at the mine. Since the ground acts as an insulator to wireless transmission, it can be difficult to maintain communications with the people working in the mines. In an embodiment, multiple deterrent systems may be coupled to power lines and/or nodes and/or telecommunication transmission lines and/or nodes. RFID receivers may be coupled to a controller of the deterrent systems, creating a system of RFID receivers extending throughout the mines. Employees of the mines may carry an RFID transmitter around the mine which transmits an identification code that identifies the employee. As the employee passes the various deterrent systems disposed through the mine, the employee's location may be transmitted to a central control station for the mines. This allows the mine operators to keep track of the employees at all times, which may be crucial during an emergency situation. The use of a deterrent system throughout the mine, as well as at the central control station also provides the additional advantage of protecting the transmission wires and nodes from damage or sabotage. This may be particularly important for the transmission lines and nodes that are associated with the central control station. Attacks on one or more of these nodes may compromise the entire system, so security of the transmission wires and nodes at the central control station is important.
In one embodiment, a deterrent system that includes electrically conductive layers and continuity detectors may be used in an ABS-walled safe with magnetic locks. The safe may also be coupled to external and internal displacement switches, such that movement of the safe may create an alert event. Use of a controller, disposed inside the safe, which can only be remotely disarmed, will prevent circumvention of any measures normally used to restrict access to the safe (e.g., locks). In some embodiments, magnetic locks may be used to secure the safe in a specified location. Use of magnetic locks will prevent unauthorized movement of the safe, while the deterrent system will alert authorities if an attempt is made to break into the safe.
Electrically conductive layers and continuity detectors may also be arrayed in other personal property where breach monitoring is advantageous, such as personal safes, safe rooms, or vehicles.
In this patent, certain U.S. patents, U.S. patent applications, and other materials (e.g., articles) have been incorporated by reference. The text of such U.S. patents, U.S. patent applications, and other materials is, however, only incorporated by reference to the extent that no conflict exists between such text and the other statements and drawings set forth herein. In the event of such conflict, then any such conflicting text in such incorporated by reference U.S. patents, U.S. patent applications, and other materials is specifically not incorporated by reference in this patent.
Further modifications and alternative embodiments of various aspects of the invention will be apparent to those skilled in the art in view of this description. Accordingly, this description is to be construed as illustrative only and is for the purpose of teaching those skilled in the art the general manner of carrying out the invention. It is to be understood that the forms of the invention shown and described herein are to be taken as examples of embodiments.
Elements and materials may be substituted for those illustrated and described herein, parts and processes may be reversed, and certain features of the invention may be utilized independently, all as would be apparent to one skilled in the art after having the benefit of this description of the invention. Changes may be made in the elements described herein without departing from the spirit and scope of the invention as described in the following claims.

Claims

WHAT IS CLAIMED IS:
1. A deterrent system for an interface device, comprising: a barrier comprising an outer substrate and an electrically conductive layer coupled to the outer substrate; a controller coupled to the electrically conductive layer, wherein the controller creates an alert signal when the conductivity of the electrically conductive layer is altered; and one or more displacement switches coupling a portion of the barrier to a surface on or proximate to the interface device.
2. The system of claim 1, further comprising an inner substrate, wherein the electrically conductive layer is positioned between the outer substrate and the inner substrate.
3. The system of claim 1, wherein the electrically conductive layer comprises an insulated wire coupled to a support material.
4. The system of claim 1, wherein the electrically conductive layer comprises a conductive trace disposed in or on a support material.
5. The system of claim 1, wherein at least 90% of the surface of the outer substrate includes the electrically conductive layer.
6. The system of claim 1, wherein the controller further creates an alert signal when the cover is displaced from the displacement switches.
7. The system of claim 1, wherein the controller is further coupled to a data transmission line, and wherein the controller sends and received information and alert signals over the data transmission line.
8. The system of claim 7, wherein the controller receives a disarm signal over the data transmission line.
9. The system of claim 1, wherein the interface device is coupled to a transmission line, and wherein the system further comprises a transmission line cover.
10. A wall, floor, or ceiling for a room of a building, comprising: an electrically conductive layer coupled to the wall, floor, or ceiling, wherein at least about 90% of the surface of the wall or floor includes the electrically conductive layer; and a controller coupled to the electrically conductive layer, wherein the controller creates an alert signal when the conductivity of the electrically conductive layer is altered.
11. A safe for storing valuable items, comprising: a plurality of walls defining an interior cavity in which the valuable items are stored, wherein each wall comprises an electrically conductive layer coupled to the wall, disposed on an interior surface of the wall; and a controller coupled to the electrically conductive layers of the walls, wherein the controller creates an alert signal when the conductivity of any one of the electrically conductive layer is altered.
12. The safe of claim 1, wherein the walls of the safe are composed of a polymer.
13. The safe of claim 1, wherein the safe is secured to a location of the premises using one or more magnetic locks.
14. A shipping container comprising: one or more electrically conductive layers coupled to the walls and/or floors of the shipping container, wherein at least about 90% of the surface of the wall or floor includes the electrically conductive layer; and, a controller coupled to the electrically conductive layers of the walls, wherein the controller creates an alert signal when the conductivity of any one of the electrically conductive layer is altered.
15. The shipping container of claim 14, further comprising a radio frequency identification device coupled to the controller, wherein the radio frequency identification device transmits information regarding the identity of the shipping container.
16. A power line system for a mine, comprising: power lines extending through at least a portion of the mine to provide power throughout the portion of the mine; a plurality of deterrent devices coupled to the power lines disposed through the powered portion of the mine, wherein the deterrent devices comprise a radio frequency identification receiver; wherein the radio frequency identification receiver receives information from a radio frequency transmitter carried by employees of the mine when the employee passes within a predetermined range of the deterrent system.
PCT/US2012/044572 2011-06-28 2012-06-28 Transmission line protection system Ceased WO2013003550A2 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US201161502144P 2011-06-28 2011-06-28
US61/502,144 2011-06-28

Publications (2)

Publication Number Publication Date
WO2013003550A2 true WO2013003550A2 (en) 2013-01-03
WO2013003550A3 WO2013003550A3 (en) 2013-05-02

Family

ID=47424792

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2012/044572 Ceased WO2013003550A2 (en) 2011-06-28 2012-06-28 Transmission line protection system

Country Status (1)

Country Link
WO (1) WO2013003550A2 (en)

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5621387A (en) * 1995-08-08 1997-04-15 Elk Products, Inc. Box
DE102005001118A1 (en) * 2005-01-06 2006-07-20 Deutsche Post Ag Method for securing and monitoring containers and containers with securing and monitoring means
JP2007098107A (en) * 2005-09-07 2007-04-19 Yukihiro Handa Article storage case
US20070146132A1 (en) * 2005-12-22 2007-06-28 Florian Krug Tamper detection system, method and apparatus

Also Published As

Publication number Publication date
WO2013003550A3 (en) 2013-05-02

Similar Documents

Publication Publication Date Title
US6310549B1 (en) Wireless security system
US8378822B2 (en) Cable theft monitoring system
CN204166591U (en) A kind of intelligent door lock system based on WIFI and Cloud Server
AU2008293136B2 (en) Electric fence system and components thereof
US5764729A (en) Local alarm system tamper protection device with dual conduits
CN101161968B (en) Access control system and use method thereof
US9206620B2 (en) Alarm incorporated cylinder lock
GB2286423A (en) Security system
WO2007021729A3 (en) Conductive tamper switch for security devices
US20100180350A1 (en) Electronic security device for monitoring computer equipment, associated assemblies and methods
US5519756A (en) Local alarm system tamper protection device
US6844808B2 (en) Method and apparatus for detection of warning system breach
CN202306795U (en) Intelligent lockset security alarm device
US7069160B2 (en) Intrusion detection system and method thereof
CN103839389A (en) Wireless anti-theft alarm system
US4737776A (en) Circuit for detecting cut telephone service line and transmitting signal over telephone trunk line
KR101673929B1 (en) insect net security system to prevent intrusion and theft
US3771153A (en) Defeat resistant burglar alarm contact
WO2013003550A2 (en) Transmission line protection system
US5930355A (en) Protection device for telephone line and interface
WO2011131831A1 (en) Burglar alarm arrangement
AU2013273826B2 (en) Electric fence system and components thereof
KR200208373Y1 (en) Security window of warning
UȚU et al. SOME ACHIEVEMENTS CONCERNING SECURITY SYSTEMS OF PREMISES.
KR101673930B1 (en) insect net security system to prevent intrusion and theft by using impedance change

Legal Events

Date Code Title Description
NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 12804603

Country of ref document: EP

Kind code of ref document: A2