Language selection

Search

Patent 2312542 Summary

Third-party information liability

Some of the information on this Web page has been provided by external sources. The Government of Canada is not responsible for the accuracy, reliability or currency of the information supplied by external sources. Users wishing to rely upon this information should consult directly with the source of the information. Content provided by external sources is not subject to official languages, privacy and accessibility requirements.

Claims and Abstract availability

Any discrepancies in the text and image of the Claims and Abstract are due to differing posting times. Text of the Claims and Abstract are posted:

  • At the time the application is open to public inspection;
  • At the time of issue of the patent (grant).
(12) Patent: (11) CA 2312542
(54) English Title: INTRUDER/ESCAPEE DETECTION SYSTEM AND METHOD USING A DISTRIBUTED ANTENNA AND AN ARRAY OF DISCRETE ANTENNAS
(54) French Title: SYSTEME ET METHODE DE DETECTION D'INTRUSION/EVASION FAISANT APPEL A UNE ANTENNE REPARTIE ET A UN RESEAU D'ANTENNES DISCRETES
Status: Expired and beyond the Period of Reversal
Bibliographic Data
(51) International Patent Classification (IPC):
  • G08B 13/24 (2006.01)
  • H01Q 9/04 (2006.01)
  • H01Q 13/20 (2006.01)
  • H01Q 21/28 (2006.01)
(72) Inventors :
  • GAGNON, ANDRE (Canada)
(73) Owners :
  • AURATEK SECURITY, LLC
(71) Applicants :
  • AURATEK SECURITY, LLC (United States of America)
(74) Agent: SMART & BIGGAR LP
(74) Associate agent:
(45) Issued: 2010-06-01
(22) Filed Date: 2000-06-27
(41) Open to Public Inspection: 2001-12-27
Examination requested: 2005-05-02
Availability of licence: N/A
Dedicated to the Public: N/A
(25) Language of filing: English

Patent Cooperation Treaty (PCT): No

(30) Application Priority Data: None

Abstracts

English Abstract

In a detection system for detecting intruders in the vicinity of a predetermined path or line defined by a distributed antenna, for example an open transmission line, an array of discrete antennas are provided alongside the distributed antenna and within a predetermined distance therefrom. The antennas are spaced apart from each other and the distributed antenna and define a plurality of detection zones. A radio frequency transmitter is connected to one of the distributed antenna and the array of discrete antennas, and a complementary receiver is connected to the other of the distributed antenna and the array of discrete antennas. A control unit controls the transmitter, receiver and array of antennas to exchange radio frequency energy several times via the distributed antenna and selected ones of the array of antennas and to detect perturbations caused by an intruder moving adjacent the path and adjacent a particular antenna. The antennas are scanned in sequence. Any antennas which have shown a perturbation during a previous scan will be scanned more frequently than antennas that have not previously indicated a perturbation. The antennas may be patch antennas and may be fastened to a fence, wall, trees, or a roof with the distributed antenna extending alongside, possibly buried.


French Abstract

Dans un système de détection servant à déceler la présence d'intrus à proximité d'un chemin préétabli ou d'une ligne établie par une antenne répartie, telle une ligne de transmission ouverte, un ensemble d'antennes discrètes est installé parallèlement à l'antenne répartie, à une distance prédéterminée de celle-ci. Les antennes sont séparées de l'antenne répartie et les unes des autres pour ainsi constituer un ensemble de zones de détection. Un émetteur de radiofréquences est connecté à l'un des éléments de l'antenne répartie et à l'ensemble d'antennes discrètes, et un récepteur correspondant est connecté à l'autre élément de l'antenne répartie de même qu'à l'ensemble d'antennes discrètes. Une unité de commande contrôle l'émetteur, le récepteur et l'ensemble d'antennes discrètes en ce qui a trait à l'échange fréquent d'énergie des radiofréquences qui se produit grâce à l'antenne répartie et à certaines des antennes de l'ensemble d'antennes discrètes, et aux perturbations que cause un intrus se déplaçant à proximité du chemin et d'une antenne donnée. Les antennes sont balayées séquentiellement. Celles qui ont montré des signes de perturbation au balayage précédent seront alors balayées plus fréquemment que les autres. Les antennes peuvent être des antennes à plaque que l'on fixe à une clôture, un mur, un arbre ou un toit, l'antenne répartie étant installée à proximité, possiblement enfouie.

Claims

Note: Claims are shown in the official language in which they were submitted.


13
CLAIMS:
What is claimed is
1. A detection system, for detecting intruders moving in the vicinity of a
defined path, comprising a distributed antenna extending along the path and an
array of discrete antennas extending alongside the distributed antenna and
within a predetermined distance therefrom, the antennas being spaced apart
from each other and the distributed antenna and defining a plurality of
detection zones, a radio frequency transmitter connected to one of the
distributed antenna and the array of discrete antennas, and a complementary
receiver connected to the other of the distributed antenna and the array of
discrete antennas, switching means for connecting the antennas individually
and selectively to the transmission line, and control means for controlling
the
transmitter, receiver and switching means to select each of the antennas in
said array in a sequence, exchange radio frequency energy via the distributed
antenna and each selected antenna, analyze the energy received from each
selected one of the array of antennas so as to detect indications of an
intruder
moving adjacent said path and adjacent that particular antenna, and repeat
said
selection sequence.
2. Apparatus according to claim 1, wherein the control means is operable
such that, in the event that, during an instant selection sequence a said
indication is detected in the received energy from a group comprising at least
one of the antennas, the control means records in memory an identifier for
each antenna in said group and, in subsequent selection sequences, selects the
group of antennas more frequently than antennas whose identities are not
recorded in said memory.
3. Apparatus according to claim 2, wherein the control means is operable
to select the entire said group of antennas alternately with individual ones
of
the antennas whose identities are not recorded in memory.
4. Apparatus according to claim 2, wherein the control means is operable
to select individual ones of the antennas in said group alternately with

14
individual ones of the antennas whose identities are not recorded in said
memory.
5. Apparatus according to claim 2, wherein the control means is operable
to select more frequently not only each antenna for which a said indication
was
detected, but also at least one antenna that is an immediate neighbour
thereof.
6. Apparatus according to claim 1, wherein the control means comprises
means for transmitting antenna addresses onto the transmission line and the
switching means comprises a plurality of switching devices each comprising an
address decoder coupled to the transmission line for detecting the address of
the associated antenna and a radio frequency switch controlled by the address
decoder to connect the associated antenna to the transmission line upon
detection of said address.
7. Apparatus according to claim 1, wherein the radio frequency energy has
a wavelength not much less than about ten times the longest dimension of any
of said antennas in said array.
8. Apparatus according to claim 7, wherein each of the array of antennas
comprises a patch antenna having a longest planar dimension of not much
more than about 15 per cent of a wave length of said energy.
9. Apparatus according to claim 1, wherein the antennas are each coupled
to the transmission line by a respective one of a corresponding plurality of
resistance means.
10. Apparatus according to claim 9, wherein the resistance means has a
resistance value of between about 150 and 300 ohms.
11. Apparatus according to claim 1, wherein each of the array of antennas
is rectangular, having a longest planar dimension along any one edge of a
major
plane of about 10 per cent of a wavelength of said energy and having a length

15
to width ratio of about 3:1 in said major plane, and is coupled to the
transmission line by a resistance means having a resistance of about 200
ohms.
12. An intrusion detection apparatus comprising:
a distributed antenna for defining a path near which detection of an
intruder is desired;
a plurality of small antennas for being spaced apart from each other and
along a line spaced adjacent the distributed antenna;
a transmission line having taps, each tap for being coupled to a
respective one of said plurality of spaced small antennas;
switching means for selectively coupling each of the small antennas
individually to the transmission line;
transmitter means for propagating a continuous wave signal along one
of the distributed antenna and the transmission line:
receiver means for receiving any of said continuous wave signal received
by the other of the distributed antenna and the transmission line;
means for controlling the switching means and either or both of the
receiver means to select each antenna in turn to couple the continuous wave
signal between the transmission line and the distributed antenna, detect the
corresponding received signal, and determine from the received signal whether
or not an intruder is present.
13. A method of operating an intrusion detection system having a distributed
antenna extending along a path to be monitored and an array of discrete
antennas extending alongside the distributed antenna and within a
predetermined distance therefrom, the method comprising the steps of:
exchanging radio frequency energy several times between the distributed
antenna and selected ones of the array of discrete antennas, in turn,
analyzing
such received energy exchanged for each selected antenna to detect an
indication of an intruder moving near the path and adjacent that antenna.

16
14. A method for operating an intrusion detection system according to claim
13, wherein, in the event that said indication is detected, the method further
comprises the step of recording the identity of that antenna in memory and, in
subsequent selection sequences, selecting those antennas whose identities are
recorded in memory more frequently than those antennas whose identities are
not recorded.
15. A method for operating an intrusion detection system having a plurality
of zones defined by a corresponding plurality of small antennas coupled to a
transmission line and a distributed antenna extending alongside the small
antennas, each of said small antennas having a unique address for being
addressably enabled for coupling between the transmission line and the
distributed antenna energy supplied by a source of continuous wave energy,
the method comprising the steps of:
enabling said small antennas in a sequence, one after another;
making a record of a characteristic of the energy initially coupled via
each small antenna and thereafter repeatedly enabling each of the small
antennas in the sequence;
comparing the characteristic of the instantly coupled energy of each
small antenna, as it is enabled in the sequence, with the corresponding record
for that zone; and
where the comparison reveals a difference between the instant and
recorded characteristics in excess of a predetermined amount, indicating the
instant antenna and associated zone to be in a potential alarm condition
indicative of an intrusion.

Description

Note: Descriptions are shown in the official language in which they were submitted.


CA 02312542 2000-06-27
1
INTRUDER/ESCAPEE DETECTION SYSTEM AND METHOD USING A
DISTRIBUTED ANTENNA AND AN ARRAY OF DISCRETE ANTENNAS
DESCRIPTION
TECHNICAL FIELD:
The invention relates to detection systems and methods and, in
particular, to detection systems and methods which are used to detect objects
or people moving in the vicinity of a predetermined path or line defined by a
distributed antenna, for example an open transmission line. The invention is
especially applicable to the detection of intruders or escapees.
BACKGROUND ART:
Known such detection systems use at least one open transmission line,
usually a leaky cable, as a distributed receiving antenna to receive a radio
frequency signal transmitted from an associated antenna; or as a transmitting
antenna to transmit signals for reception by a separate antenna. An intruder
or escapee, or other object, moving in the vicinity of the leaky cable causes
a
perturbation in the coupling of continuous wave RF energy into or from the
leaky cable. Detection of the perturbation indicates an intrusion or escape
attempt. It will be appreciated that there is technically no distinction
between
an intruder traversing the path to enter a protected zone and an escapee
traversing the path to leave a protected zone. For convenience, therefore, in
this specification, the term "intruder" will be used to cover both.
It is desirable to determine, at least approximately, the location of the
intruder along the length of the cable. United States patent number 4,994,789
(Harman) issued February 19, 1991 discloses a detection system in which
several detection zones are provided by interposing phase-shifting modulators
at intervals along the leaky cable. Each modulator can be shunted by a switch.
A signal processor analyzes the signal received from the cable while the
switch
is operated so as to shunt the modulator or connect it in series with the
cable
sections, thereby allowing determination of the section in which the intrusion
occurred. When such a system uses only two zones, it may be relatively
economical. However, when such a system is expanded to many zones, the
interdependence of the modulators, the complexities of switching them, and

CA 02312542 2000-06-27
2
intricacies of signal analysis prohibitively increase cost and reduce
reliability.
United States patent specification number 4,887,069 (Maki) issued
December 12, 1989 discloses a detection system which uses two coaxial
cables, one of them a leaky cable, extending along a perimeter of a protection
zone, one coupled to a transmitter and the other to a receiver. The cables are
subdivided into sections which are interconnected by oscillators and switches
allowing selection of one section at a time. If a section has not been
selected,
the RF signal passes along its inner conductor. When a section is selected,
the RF signal is switched to propagate as an external wave along the outer
sheath of the cable section. Maki also discloses a system in which both of the
coaxial cables are leaky cables, with zones provided by serialized switching,
each zone being powered from a switched local oscillator. In either case,
signal
perturbations caused by an intruder are transmitted through the intervening
sections to a receiver located at one end of the cable. The oscillators and
switches increase complexity and reduce reliability.
In either of these known systems, the radio frequency energy from each
cable section must pass through any preceding sections. Consequently, failure
of an oscillator/switch, or modulator, as the case may be, especially near the
receiver end of the cable, may compromise the system or even render it
inoperative.
The present invention seeks to provide a detection apparatus and method
with a plurality of detection zones, while eliminating or at least mitigating
the
afore-mentioned disadvantages of known detection systems.
SUMMARY OF THE INVENTION:
According to one aspect of the present invention, a detection system for
detecting intruders moving in the vicinity of a defined path comprises a
distributed antenna, for example an open transmission line, extending along
the
path and an array of discrete antennas extending alongside the distributed
antenna and within a predetermined distance therefrom, the antennas being
spaced apart from each other and the distributed antenna and defining a
plurality of detection zones, a radio frequency transmitter connected to one
of
the distributed antenna and the array of discrete antennas, a complementary

CA 02312542 2000-06-27
3
receiver connected to the other of the distributed antenna and the array of
discrete antennas, and control means for controlling the transmitter, receiver
and array of antennas to exchange radio frequency energy several times via the
distributed antenna and selected ones of the array of antennas and to analyze
the energy received from each selected one of the array of antennas so as to
detect perturbations caused by an intruder moving adjacent said path and
adjacent that particular antenna.
The control means may comprise switching means for selecting each one
of the array antennas individually for such energy exchange.
The control means may select the antennas in turn in such a sequence
that, if the energy from a particular antenna when previously selected within
a prescribed time period showed a perturbation, that antenna would be selected
more frequently than those antennas which had not shown such a perturbation
within said time period.
Preferably, the array of antennas are each connected to a respective one
of a plurality of taps distributed along a transmission line extending
alongside
the distributed antenna. The control means then may comprise a plurality of
switching devices for connecting respective ones of the antennas to the
transmission line and switch control means for controlling operation of the
switching devices to select the antennas individually.
The switch control means may comprise a means for transmitting
antenna addresses selectively onto the transmission line and each switching
device then may comprise an address decoder for detecting the address of the
associated antenna and an RF switch operable by the decoder to connect the
antenna to the transmission line.
According to a second aspect of the invention, there is provided a
method of operating an intrusion detection system having a distributed antenna
extending along a path to be monitored and an array of discrete antennas
extending alongside the distributed antenna and within a predetermined
distance therefrom, the method comprising the steps of:
exchanging radio frequency energy several times between the distributed
antenna and each of the array of discrete antennas, in turn, and analyzing
energy received by each selected antenna to detect perturbations in the

CA 02312542 2000-06-27
4
received radio frequency energy indicative of an intruder moving near the path
and adjacent that antenna.
Preferably, the array antennas are selected in turn in such a sequence
that, if the energy from a particular array antenna when previously selected
within a prescribed time period showed a perturbation, that array antenna will
be selected more frequently than those array antennas which had not shown
such a perturbation within said time period.
Thus, the selection sequence may comprise alternate selection of
perturbation-indicating antennas with non-perturbation indicating antennas.
Alternatively, the selection sequence may select all of the perturbation-
indicating antennas after each selection of a non-perturbation-indicating
antenna.
In addition to selecting a perturbation-indicating antenna for which a
perturbation was previously recorded, the selection sequence may also be
arranged to select one or each of the antennas adjacent thereto.
In embodiments of either aspect of the invention, the array antennas
may be fastened to a fence, trees, a wall or a roof and the distributed
antenna
may be a leaky cable or the like buried nearby.
Preferably, each array antenna is a "small" antenna, i.e. no dimension of
the antenna exceeds one tenth of the wavelength of the operating signal and
the antenna has substantially no directivity.
When such a small antenna is mounted upon a fence or other generally
unstable support, it may be susceptible to movement of the fence or other
support. A third aspect of the invention addresses this problem by means of
a series resistance of between 150 ohms and 300 ohms between the tap and
the antenna element, preferably about 220 ohms.
According to a third aspect of the invention, a small radio frequency
antenna suitable for mounting upon an unstable support, such as a wire fence,
comprises an insulating board having first and second opposite surfaces, a
conductive layer on the first surface, means for attaching the antenna to the
support with the second surface opposed to the support, and a resistance
means for connecting the conductive layer to a feedline, the resistance having
a value between about 150 ohms and about 300 ohms.

CA 02312542 2000-06-27
BRIEF DESCRIPTION OF THE DRAWINGS:
Further features and advantages of the invention will be apparent from
the following description of preferred embodiments which are described by way
of example only and with reference to the accompanying drawings, in which:-
5 Figure 1 is a pictorial drawing of a detection system;
Figure 2 is a simplified block schematic drawing of the detection system
illustrated in Figure 1;
Figure 3 is a schematic diagram of one of an array of antennas illustrated
in Figures 1 and 2;
Figure 4 is a block schematic diagram of a switching device coupling the
antenna to a transmission line;
Figure 5 is a perspective view of a patch antenna useful in the detection
system illustrated in Figures 1 to 4; and
Figure 6 is a flow chart diagram illustrating a method of operation of the
system.
DETAILED DESCRIPTION OF PREFERRED EMBODIMENTS:
For convenience of illustration, Figure 1 illustrates only a portion,
including
several detection zones, of the detection system. The system comprises a
leaky coaxial cable 102 or other suitable open transmission line means, either
laid upon the surface of the ground or buried a short distance beneath the
surface, which defines a detection path or line to be monitored. A
transmission
line 103, conveniently a regular coaxial cable, is shown mounted along a
security fence 104 (but alternatively may be buried along the base of the
fence
104). The cable 102 is depicted, for purposes of illustration only, as having
a detection field 102a extending radially around it. It will be appreciated
that,
if the cable 102 is connected to a receiver, the detection field 102a will be
induced rather than generated directly. The transmission line 103 has a
plurality of taps 103/1...103/n spaced apart along its length. The taps are
connected by switching devices 107/1...107/n, respectively, to a
corresponding plurality of small antennas 108/1...108/n, respectively. Each
tap is a T-junction allowing the switching devices to select the antennas
individually for connection to the transmission line 103 without the
continuity

CA 02312542 2009-06-12
6
of the transmission line 103 being interrupted. The patch antennas
108/1...108/n are spaced from the cable 102 to provide a required degree of
coupling therebetween while giving some room for a body to intrude into the
detection zones. In operation, electromagnetic fields between the leoky cable
102 and the plurality of taps 103/1...103/n define a corresponding plurality
of
overlapping detection zones depicted, for purposes of illustration only, by
lines
109/1;110/1...109/n;110/n, respectively.
In one experimental setup, the leaky cable 102 and the transmission line
103 were spaced about 20 feet apart and up to 2 miles in length with the
lo antennas at intervals of 50 feet or so. Thus, typically, each antenna forms
a
perimeter sub-zone about 50 ft long, each sub-zone overlapped with its
neighbouring sub-zone to obtain fuli coverage.
As shown in Figure 2, the transmitter 105 and the receiver 106 are
connected to, and controlled by, a microprocessor 111. The transmitter 105,
receiver 106 and processor 111 may be constructed and operate generally in
a manner known to persons skiiied In this art and so will not be described in
detail here. For examples, the reader is directed to International patent
applications numbers PCT/CA91 /00050, PCT/CA98/0055 9 and
PCT/CA98/00$4Q
The transmitter unit 105 inciudes a radio frequency transmitter
(continuous wave source) 112 and a switch address encoder and transmitter
113 connected in common to the transmission line 103. The switch address
encoder transmitter 113 relays encoded address signals, each comprising an
address unique to one of the antennas produced by the processor 111, for
seiectively operating the switching devices 107/1 ... 107/n and hence
connecting the patch antennas to the transmission line 103 individually and
sequentially. The processor 111 "scans" the patch antennas In turn, i.e. it
causes the RF transmitter 112 to transmit a continuous wave radlo frequency
signal onto the transmission line 103 and the address transmitter 113 to
transmit the address of the selected one of the antennas 10811...108/n. The
switching device associated with the selected antenna deteots the address and
connects the selected antenna to the transmission line 103 to receive the
radio
frequency signal and radiate it towards the leaky cable 102. The receiver 106
~

CA 02312542 2000-06-27
7
detects the corresponding radio frequency signal received by the leaky cable
102 and determines whether or not there is a perturbation indicating that an
intruder has affected the electromagnetic coupling between the selected
antenna and the leaky cable 102. This constitutes "scanning" or "sampling"
of that antenna. How the perturbation is detected will depend upon the
transmitter/receiver chosen. A simple amplitude measurement technique is
preferred for its simplicity, but a "synergistic radar" technique might be
used
instead. If such a perturbation is detected, the microcontroller 111 records
in
memory (not shown) that the selected antenna is in a perturbation-indicating
or "pre-alarm" condition. The microcontroller 111 will not signal an actual
"intruder" alarm until a prescribed number of such "pre-alarm" conditions have
been detected, as will be described later.
Referring to Figures 3 and 4, one of the patch antennas 108/n is shown
mounted on a near side 114 of the fence 104 by a base 115 of an electrically
insulating material. The transmission line 103 is mounted on a far side 116 of
the fence 11. The switching device 107/n comprises an address decoder
117/n and a radio frequency switch 118/n. The switch 118/n is coupled via
a capacitor 119/n to the transmission line 103 and via a decoupling resistance
element 120/n to the patch antenna 108/n. Branches of the T-coupling are
labelled IN and OUT as a matter of convenience but energy may traverse the
coaxial transmission line 103 in either direction. The address decoder 117/n
and switch 118/n are housed within an RF shielding enclosure/shroud 121 /n.
The switch 11 8/n may be either any electromechanical relay or a solid state
device suitable for coupling RF energy to the antenna 108/n. The antenna
address decoder 117/n is connected to the transmission line 103 via an RF
blocking device 122/n to receive DC power and the address signals transmitted
by the address transmitter 113 and controls operation of switch element
1 18/n, via a lead 1 23/n, in response to the receipt of the associated
address
control signal coupled from the transmission line 103. When the switch 11 8/n
is closed, energy is exchanged between the transmission line 103 and the
antenna 108/n via the blocking capacitor 119/n and the decoupling resistor
120/n.

CA 02312542 2000-06-27
8
Alternatively, the transmission line 103 and the switching devices
107/1...107/n may be concealed beneath the earth with short coaxial coupling
lines extending between each of the switches 118/1...118/n and the
associated one of the resistors 120/1 ... 1 20/n, the latter each being
located
with the corresponding one of the antennas 108/1...108/n.
Referring to Figure 5, a suitable patch antenna 108/n comprises a
conductive rectangular patch 130/n, typically having a length of 12" along one
major side 131/n and a width of 4" along a minor side 132/n; in other words
an oblong with a length to width ratio of about 3:1. The patch 130/n is
mounted upon insulating substrate 115/n which is half an inch thick and is
larger than the patch 130/n so as to provide a margin around the patch 1 30/n.
Attachment holes 134/n in the margin facilitate easy fastening, perhaps by
loops of cord, to the fence 104. As shown in Figure 3, the resistor 120/n
extends through an opening in the insulating layer 115/n and is connected at
one end to the opposed surface of patch 130/n and at the other end to the tap.
Alternatively, the insulating substrate 11 5/n can be any of several
structures
which will support the patch 130/n spaced and insulated from any conductive
surface, such as when the fence 104 is made of metallic chain link or the
antenna is connected to some other conductive structure.
Problems of false alarms and missed alarms resulting from movement of the
fence 104 or other supporting structure were substantially mitigated during
experimentation by selecting the value of the decoupling resistors
120/1...120/n to be between about 150 ohms and about 300 ohms.
Eventually it was found that the illustrated embodiment, used with an
operating
frequency of about 80 MHz., was generally optimized with decoupling resistors
120/1...120/n of about 200 to 220 ohms. This gave an antenna gain of
-25dBd with noise immunity to tolerate lateral displacement of the fence
fabric
up to +/- 1/4 inch. This is not to suggest that these values are optimal for
other operating wavelengths or for other forms of patch antennas, for example
circular or triangular. Furthermore, although illustrated separately, the
resistor
120/n may be included in the switching device 119/n or the latter may be so
constructed as to dynamically provide a suitable value of coupling resistance.

CA 02312542 2000-06-27
9
Operation of the system will now be described with reference to the
flowchart shown in Figure 6. In function step 6.1, the processor 111
initialises
the system, e.g. counters, memory, and so on, and then begins the scanning
process by scanning the first antenna 108/1. Such scanning entails the
selection, energisation and received signal detection steps as previously
described. In decision box 6.2, processor 111 accesses its memory (not
shown) to determine whether or not there are any antennas in a "pre-alarm"
state as a result of a previous scanning cycle detecting a perturbation in its
signal. There will be no "pre-alarm" antennas because there were no previous
scans, so, in steps 6.4 and 6.5 the processor 111 will select and scan the
next
antenna 108/2. Step 6.6 determines whether or not that is the last antenna
in the array. Because it is not, loop 6.7 returns the processor to decision
step
6.2, whereupon it checks again whether or not any antennas now are in the
pre-alarm state. So long as none of the antennas are in the pre-alarm state,
this loop will repeat steps 6.2 to 6.6 until all of the antennas have been
scanned, whereupon decision step 6.6 and loop 6.8 cause the processor 111
to repeat the complete scanning cycle beginning with antenna 108/1. The
scanning cycle will repeat until the scanning of at least one of the antennas
detects a perturbation indicating that an intruder is present, i.e. a "pre-
alarm"
condition. When that happens, the processor 111 will record that antenna's
identity in memory. During the next scanning cycle, decision step 6.2 will
show that one or more antennas are in the pre-alarm state and, in function
step
6.3, the processor 111 will cause all of those pre-alarm antennas to be
scanned in turn. In practice, the processor may be programmed to scan not
only each antenna that is in the pre-alarm state, but also its immediate
neighbours. Once these "pre-alarm" and neighbouring antennas have been
scanned, the processor 111 will return to the main path of the flowchart
shown in Figure 6 and perform steps 6.4, 6.5 and 6.6 to scan the next antenna
that is not in the pre-alarm condition. It will be appreciated that, each time
the
processor 111 completes the scanning of one of the antennas that are not in
the "pre-alarm" state, it will scan all of the antennas that are in the pre-
alarm
condition again before it scans the next one of the antennas not in the pre-
alarm state.

CA 02312542 2000-06-27
Preferably, the processor 111 processes the results of the scanning
process statistically to determine a probability of an actual intrusion and
raise
an alarm contingent thereupon. If the pre-alarm indication for a particular
antenna turns out to be only a random event, as determined, for example,
5 because neither of its immediate neighbours also registers a pre-alarm, the
processor 111 will not raise an alarm but rather will delete the record from
memory and continue the scanning process with that antenna treated as a
"normal" antenna. This procedure is useful to increase the sensitivity of the
system while avoiding frequent false alarms which might otherwise reduce the
10 response of attendant personnel.
Various modifications to the above-described embodiment are envisaged.
For example, the scanning routine described with reference to Figure 6 could
be arranged to scan the "pre-alarm" antennas alternately with the antennas not
indicating a "pre-alarm".
It is also envisaged that the number of "pre-alarm" antennas selected for
scanning could be limited to a predetermined maximum in order to avoid
reducing their sampling rate to an unacceptable level.
Although, in the above-described detection system, the antennas
transmit and the leaky cable receives, it will be appreciated that antenna
reciprocity applies, meaning that the receiver and the transmitter are
interchangeable.
It should be noted that, because the antennas are isolated electrically
from the leaky cable, mechanical continuity of the coaxial cable 103 can be
maintained, which affords a high level of reliability.
Advantageously, embodiments of the invention allow time- multiplexed
scanning of as many antennas (sub-zones) as possible while maintaining a
sampling rate per antenna high enough to obtain a reasonable resolution of the
intrusion profile signature.
For example, to illustrate the advantages of time multiplexing, the
following practical assumptions may be made:
a) minimum electronic sampling rate:
2 millisec/sample; and
b) typical sample per intrusion profile:

CA 02312542 2000-06-27
11
samples / intrusion;
for a minimum sampling rate per intrusion of:
2 X 5 = 10 millisec/intrusion, or 0.01 sec/int.
c) maximum intruder running speed:
5 8 meters/second (18 miles/hour); and
d) typical width of the detection envelope:
2 meters (6 to 7 feet);
for a minimum intrusion time of:
2 / 8 = 0.25 second
Therefore, the over-sampling ratio for a running intrusion (worst case
scenario)
is:
0.25 / 0.01 = 25
This means that a maximum of 25 sub-zones can be time multiplexed
without sacrificing the probability of detection, even for a fast running
intruder.
As a practical example, a typical correctional facility perimeter might
comprise a dual fence spaced apart by 20 ft and 12 ft high, with 25 antennas
spaced apart by 50 ft, for a total perimeter of 1,250 ft (350 m) maximum per
electronic module with sub-zone resolution of 50 ft.
The concept of a variable sampling rate further improves detection
capability. In the absence of an intrusion (target), the sampling rate per
antenna may be reduced which increases the over-sampling ratio, which
typically increases the number of antennas to "time-multiplex" per electronic
module by a factor of ten (10). Detection of a pre-alarm condition may be
determined according to a pre-alarm threshold, that is normally set midway
between the alarm threshold and background noise. Under quiet operation (i.e.
in the absence of an intrusion) each antenna is switched at a lower rate on an
even basis. But when one antenna response exceeds the pre-alarm threshold,
more time is spent sampling that antenna. This technique presents a variable
sampling rate condition for no intrusion, first intrusion, second intrusion,
etc.,
which means that the probability of detecting a single intrusion is higher
than
detecting a double intrusion and so on. This compromise will usually be
acceptable to increase the number of sub-zones per single electronic module,

CA 02312542 2000-06-27
12
though the acceptance of such a compromise depends on the threat level and
the applications.
Finally, an even finer resolution for the intrusion location may be
obtained by comparing intrusion alarm conditions between adjacent
antennas/sub-zones. This technique allows a resolution accuracy equal to one
third of the antenna spacing to be achieved, for a final location resolution
of
50 ft/3 = 17 ft (5 m).
Advantageously, each antenna/sub-zone may have an individual alarm
threshold, which means that the noise of a difficult sub-zone is not
integrated
with the entire perimeter noise. Also any sub-zone can be temporarily disabled
to allow authorized personnel to cross the perimeter without shutting down the
entire perimeter.
The increased intrusion resolution allows a surveillance video camera,
where applicable, to be pre-set to a finer resolution for more efficient video
assessment.
A wide range of miniature antennas can be used so long as the loaded
impedance is high in reference to the coaxial cable impedance. A high
impedance, like a test probe, extracts a very small portion of the RF signals
that propagate within the coaxial cable in order to minimize the cable loss
along
the array of antennas. Mini-whip antennas, say 10 inches long, or other small,
non-directional antennas, may be used instead of patch antennas.
An advantage of detection systems embodying the present invention
maintain a uniform RF signal strength all along the secured perimeter and
allow
the intrusion/crossing location to be obtained by simply activating only one
antenna at a time, i.e. by time multiplexing the antennas. Therefore, each
individual antenna forms its own detection zone.

Representative Drawing
A single figure which represents the drawing illustrating the invention.
Administrative Status

2024-08-01:As part of the Next Generation Patents (NGP) transition, the Canadian Patents Database (CPD) now contains a more detailed Event History, which replicates the Event Log of our new back-office solution.

Please note that "Inactive:" events refers to events no longer in use in our new back-office solution.

For a clearer understanding of the status of the application/patent presented on this page, the site Disclaimer , as well as the definitions for Patent , Event History , Maintenance Fee  and Payment History  should be consulted.

Event History

Description Date
Time Limit for Reversal Expired 2014-06-27
Inactive: Agents merged 2013-08-14
Letter Sent 2013-06-27
Grant by Issuance 2010-06-01
Inactive: Cover page published 2010-05-31
Inactive: Final fee received 2010-03-08
Pre-grant 2010-03-08
Notice of Allowance is Issued 2009-09-14
Letter Sent 2009-09-14
Notice of Allowance is Issued 2009-09-14
Inactive: Approved for allowance (AFA) 2009-09-09
Amendment Received - Voluntary Amendment 2009-06-12
Inactive: S.30(2) Rules - Examiner requisition 2009-06-09
Small Entity Declaration Determined Compliant 2008-05-26
Small Entity Declaration Request Received 2008-05-26
Inactive: IPC from MCD 2006-03-12
Inactive: IPC from MCD 2006-03-12
Inactive: IPC from MCD 2006-03-12
Letter Sent 2005-08-18
Inactive: Multiple transfers 2005-07-11
Letter Sent 2005-05-27
Letter Sent 2005-05-25
Letter Sent 2005-05-11
All Requirements for Examination Determined Compliant 2005-05-02
Request for Examination Received 2005-05-02
Inactive: Single transfer 2005-05-02
Reinstatement Requirements Deemed Compliant for All Abandonment Reasons 2005-05-02
Request for Examination Requirements Determined Compliant 2005-05-02
Deemed Abandoned - Failure to Respond to Maintenance Fee Notice 2004-06-28
Inactive: Delete abandonment 2003-10-06
Inactive: Office letter 2003-10-06
Deemed Abandoned - Failure to Respond to Maintenance Fee Notice 2003-06-27
Inactive: Agents merged 2002-05-09
Application Published (Open to Public Inspection) 2001-12-27
Inactive: Cover page published 2001-12-26
Inactive: First IPC assigned 2000-09-08
Filing Requirements Determined Compliant 2000-08-03
Inactive: Filing certificate - No RFE (English) 2000-08-03
Inactive: Applicant deleted 2000-08-02
Inactive: Inventor deleted 2000-08-02
Application Received - Regular National 2000-08-02

Abandonment History

Abandonment Date Reason Reinstatement Date
2004-06-28
2003-06-27

Maintenance Fee

The last payment was received on 2009-06-01

Note : If the full payment has not been received on or before the date indicated, a further fee may be required which may be one of the following

  • the reinstatement fee;
  • the late payment fee; or
  • additional fee to reverse deemed expiry.

Please refer to the CIPO Patent Fees web page to see all current fee amounts.

Fee History

Fee Type Anniversary Year Due Date Paid Date
Application fee - small 2000-06-27
MF (application, 2nd anniv.) - small 02 2002-06-27 2002-06-27
MF (application, 3rd anniv.) - small 03 2003-06-27 2003-06-27
MF (application, 5th anniv.) - small 05 2005-06-27 2005-05-02
Reinstatement 2005-05-02
MF (application, 4th anniv.) - small 04 2004-06-28 2005-05-02
Request for examination - small 2005-05-02
Registration of a document 2005-05-02
Registration of a document 2005-07-11
MF (application, 6th anniv.) - small 06 2006-06-27 2006-05-15
MF (application, 7th anniv.) - small 07 2007-06-27 2007-03-14
MF (application, 8th anniv.) - small 08 2008-06-27 2008-05-26
MF (application, 9th anniv.) - small 09 2009-06-29 2009-06-01
Final fee - small 2010-03-08
MF (patent, 10th anniv.) - small 2010-06-28 2010-05-27
MF (patent, 11th anniv.) - small 2011-06-27 2011-06-06
MF (patent, 12th anniv.) - small 2012-06-27 2012-05-30
Owners on Record

Note: Records showing the ownership history in alphabetical order.

Current Owners on Record
AURATEK SECURITY, LLC
Past Owners on Record
ANDRE GAGNON
Past Owners that do not appear in the "Owners on Record" listing will appear in other documentation within the application.
Documents

To view selected files, please enter reCAPTCHA code :



To view images, click a link in the Document Description column. To download the documents, select one or more checkboxes in the first column and then click the "Download Selected in PDF format (Zip Archive)" or the "Download Selected as Single PDF" button.

List of published and non-published patent-specific documents on the CPD .

If you have any difficulty accessing content, you can call the Client Service Centre at 1-866-997-1936 or send them an e-mail at CIPO Client Service Centre.


Document
Description 
Date
(yyyy-mm-dd) 
Number of pages   Size of Image (KB) 
Representative drawing 2001-12-03 1 7
Cover Page 2001-12-21 1 46
Description 2000-06-27 12 615
Abstract 2000-06-27 1 33
Drawings 2000-06-27 12 159
Claims 2000-06-27 4 171
Description 2009-06-12 12 606
Representative drawing 2010-05-04 1 8
Cover Page 2010-05-04 2 52
Filing Certificate (English) 2000-08-03 1 164
Reminder of maintenance fee due 2002-02-28 1 113
Courtesy - Abandonment Letter (Maintenance Fee) 2004-08-23 1 175
Reminder - Request for Examination 2005-03-01 1 117
Acknowledgement of Request for Examination 2005-05-25 1 177
Notice of Reinstatement 2005-05-11 1 164
Courtesy - Certificate of registration (related document(s)) 2005-05-27 1 104
Commissioner's Notice - Application Found Allowable 2009-09-14 1 162
Maintenance Fee Notice 2013-08-08 1 171
Correspondence 2003-10-06 1 17
Fees 2003-06-27 2 60
Fees 2002-06-27 1 40
Fees 2005-05-02 2 86
Fees 2006-05-15 2 54
Fees 2007-03-14 2 56
Fees 2008-05-26 2 73
Correspondence 2008-05-26 2 73
Fees 2009-06-01 1 32
Correspondence 2010-03-08 1 38
Fees 2010-05-27 1 36
Fees 2011-06-06 1 40
Fees 2012-05-30 1 38