CN106327756B - perimeter security system - Google Patents
perimeter security system Download PDFInfo
- Publication number
- CN106327756B CN106327756B CN201510365012.9A CN201510365012A CN106327756B CN 106327756 B CN106327756 B CN 106327756B CN 201510365012 A CN201510365012 A CN 201510365012A CN 106327756 B CN106327756 B CN 106327756B
- Authority
- CN
- China
- Prior art keywords
- perimeter
- circumference
- control device
- detector
- wireless signal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/02—Mechanical actuation
- G08B13/12—Mechanical actuation by the breaking or disturbance of stretched cords or wires
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Alarm Systems (AREA)
- Burglar Alarm Systems (AREA)
Abstract
The embodiment of the invention discloses a kind of perimeter security systems, including circumference processor, application service equipment, at least one perimeter control device and at least one detection cable being connected with each perimeter control device, it is connected to form the boundary in target security protection region with perimeter control device by the way that cable will be detected, it wherein detects in cable and is provided with multiple detector groups, each detector group includes an emitter-detector and at least one pick-up probe, the emitter-detector in the same detector group carries out wireless signal transmitting-receiving with the pick-up probe, constitute wireless signal radiation area;The system of the present invention can form the protection of non-blind area on the boundary in target placement region, it is not easy to be crossed, degree of safety is high;Circumference processor carries out analysis to the wireless signal of reception and detects whether invader occur, will not be influenced to report by mistake by weather, using detection cable to installation environment no requirement (NR).
Description
Technical field
The present invention relates to security technology area, more particularly to a kind of perimeter security system.
Background technology
In the every profession and trade application of modern society, often there are some to need the region of emphasis management and control, such as airport, prison, danger
Product storage area and chemical plant etc., while with the raising that people's security protection is realized, in the building of the routine such as house, office building, school
It is also more and more with the perimeter protection demand in region, therefore the circumference security and guard technology modernized is widely used.
Currently, common technological prevention scheme mainly has:Infrared emission intrusion detection, the detection of leakage cable intrusion and vibrations
Optical cable intrusion detection etc..Infrared emission intrusion detection mainly utilizes invisible light beam, such as infrared ray, in transmitter and reception
Warning line is formed between machine, by the way of blocking alarm, the guard plot of formation is single beam or the netted defence area of multiple beam;Shake
Dynamic optical cable intrusion detection is alarmed by vibrations and pressure change small around incuding, and the defence area of formation is along vibrations optical cable
Region near direction, be easy across.
There is blind spot in the guard plot of existing safety-protection system, be easy to be crossed, and degree of safety is relatively low, and be easy by outer
Boundary's environment influences (such as sleety weather, animals and plants) and reports by mistake, to the more demanding of installation environment.
Invention content
For the present invention provides a kind of perimeter security systems, in order to solve the above-mentioned technical problem, the embodiment of the present invention discloses
Following technical solution:
A kind of perimeter security system, including circumference processor, application service equipment, at least one perimeter control device and with it is every
At least one detection cable that a perimeter control device is connected, wherein
The detection cable is connected to form the boundary in target security protection region with the perimeter control device, the detection cable
Multiple detector groups are inside provided with, each detector group includes an emitter-detector and at least one pick-up probe, same
The emitter-detector in a detector group carries out wireless signal transmitting-receiving with the pick-up probe, constitutes wireless signal radiation
Area;
The perimeter control device is used to receive the wireless signal that the pick-up probe on the detection cable receives, and will connect
It receives wireless signal and is transmitted to the circumference processor;
The circumference processor is connected with the perimeter control device, for analyzing the nothing sent from the perimeter control device
Line signal, and according to the variation of wireless signal, detect whether invader occur, and, detection case is sent to the application
Service equipment;
The application service equipment is used to show the safe condition in target security protection region.
Preferably, the perimeter security system further includes optical transmitter and receiver and interchanger, wherein
The optical transmitter and receiver is connected with the perimeter control device, the wireless signal for receiving to the perimeter control device into
Row opto-electronic conversion;
The input terminal of the interchanger is connected with the output end of the optical transmitter and receiver, the output end of the interchanger with it is described
Circumference processor is connected, and the interchanger is used to the photosignal that the optical transmitter and receiver is converted being sent to the circumference and handle
Device.
Preferably, the application service equipment includes the alarm being connected with the circumference processor, for when described
When circumference processor detects that invader occurs in the boundary in target security protection region, sound-light alarm prompt is sent out.
Preferably, the application service equipment further includes the Web server being connected with the interchanger, can for providing
Depending on the electronic map of change, perimeter security system operating status described in real-time display.
Preferably, the application service equipment further includes the computer being connected with the interchanger, for by described
Computer checks the monitoring situation of the perimeter security system using browser.
Preferably, the application service equipment further includes the remote monitoring terminal being connected with the interchanger, described remote
Range monitoring terminal includes voice communication station, and the voice communication station is for acquiring VoP to realize circumference security protection area
The voice communication of outer room in domain.
Preferably, the perimeter security system further includes multiple inspection cards, and the inspection card to system by presetting
Identification information makes the personnel of carrying inspection card not alarm in target security protection region, convenient for patrol officer to the detection
Cable is detected.
The technical scheme provided by this disclosed embodiment can include the following benefits:
For a kind of perimeter security system provided by the invention, including circumference processor, application service equipment, at least one week
Boundary's controller and at least one detection cable being connected with each perimeter control device, by the way that cable and perimeter control device will be detected
It is connected to form the boundary in target security protection region, wherein being provided with multiple detector groups, each detector group packet in detection cable
An emitter-detector and at least one pick-up probe are included, the emitter-detector in the same detector group connects with described
It receives detector and carries out wireless signal transmitting-receiving, constitute wireless signal radiation area;Nothing can be formed by placing the boundary in region in target in this way
The protection of blind area, it is not easy to be crossed, degree of safety is high;Receive what pick-up probe on detection cable received by perimeter control device
Wireless signal, and wireless signal will be received and be transmitted to the circumference processor;Circumference processor is for analyzing from the circumference
The wireless signal that controller is sent, and according to the variation of wireless signal, detect whether invader occur, and, by detection case
It is sent to the application service equipment;Circumference processor carries out analysis to the wireless signal of reception and detects whether invader occur,
It will not be influenced to report by mistake by weather, using detection cable to installation environment no requirement (NR).
Description of the drawings
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below
There is attached drawing needed in technology description to be briefly described, it should be apparent that, for those of ordinary skill in the art
Speech, without having to pay creative labor, other drawings may also be obtained based on these drawings.
Fig. 1 is a kind of structural schematic diagram for perimeter security system that the present invention is provided according to embodiment;
Fig. 2 is the schematic diagram that the present invention detects detectable signal covering on cable according to a kind of one that embodiment provides;
Fig. 3 is the schematic diagram that the present invention detects detectable signal covering on cable according to a kind of two that embodiment provides;
Fig. 4 is the schematic diagram that each detector signal variation on cable is detected when not invading;
Fig. 5 is the schematic diagram of saturating ground microwave array when not invading;
Fig. 6 is the schematic diagram for detecting cable intrusion detection process;
Fig. 7 is the schematic diagram that each detector signal variation on cable is detected when invading;
Fig. 8 is the schematic diagram of the signal intensity of probe node when invading;
Fig. 9 is the schematic diagram that saturating ground microwave array changes when invading;
Figure 10 is the structural schematic diagram for another perimeter security system that the present invention is provided according to embodiment;
Figure 11 is a kind of structural schematic diagram of the circumference processor of the perimeter security system of the invention provided according to embodiment.
Specific implementation mode
In order to make those skilled in the art more fully understand the technical solution in the embodiment of the present invention, and make of the invention real
The above objects, features, and advantages for applying example can be more obvious and easy to understand, below in conjunction with the accompanying drawings to technical side in the embodiment of the present invention
Case is described in further detail.
Following examples of the present invention provide a kind of perimeter security system, as shown in Figure 1, the perimeter security system 100 is wrapped
It includes circumference processor 30, application service equipment 40, at least one perimeter control device 20 and is connected with each perimeter control device
At least one detection cable 10.
Wherein, multiple detector groups 50 are provided on every detection cable, each detector group includes an emission detection
Device and at least one pick-up probe, the emitter-detector in the same detector group carry out nothing with the pick-up probe
Line signal transmitting and receiving constitutes wireless signal radiation area.Each detector is wireless signal transceiver module, and each detector is according to one
Extremely short period distances transmitting/receiving wireless signal, and wireless signal covers a range, as shown in Figure 2.It is detected on cable at every
Detector is arranged at a high density, and constitutes continuous, the formation approaches uniformity around cable probe field, while each detector
Wireless signal can be emitted, the wireless signal of adjacent detector transmitting, the wireless signal of the same detector can also be received
It can be received by neighbouring multiple detectors.
In conjunction with shown in Fig. 1, each perimeter control device 30 is connected at least one detection cable 10, multiple perimeter control devices
With mostly connect to form the boundary in target security protection region with detection cable head and the tail, perimeter control device 20 is used to receive the detection cable
The data of the wireless signal of upper acquisition, and by these data forwardings to circumference processor 30, perimeter control device is mainly to detecting line
The data detected on cable play the role of convergence or forwarding, and perimeter control device can be powered with external power supply for detection cable 10.
In addition, each perimeter control device 20 can be that is, two adjacent with two-way each a pair of 500 meters long of detection cable of connection
Longest connection distance between perimeter control device is 1 kilometer;While in order to improve the efficiency of data transmission, all perimeter control devices
Transmission system is constituted after being cascaded by optical fiber, and detection information is sent to circumference processor or monitoring center by optical fiber.
As shown in Figure 1, the detection cable 10 parallel with two of perimeter control device 20 is connected, the detector on every cable
Detectable signal receives and dispatches mode as shown in figure 3, the detecting devices in region of setting up defences includes mainly two parallel detection cables and circumference
Controller, two parallel detection cables can be at different horizontal planes, and spacing is generally 2 to 10 meters, due to every cable
Upper includes multiple detector groups, and each detector group includes an emitter-detector and at least one pick-up probe, so edge
Uniform an electromagnetic radio frequency field, also referred to as probe field are formed around cable.
As shown in Figure 1, each perimeter control device 20 further includes power interface, power interface is used for and external power supply plug phase
Connection so that external power supply can be the detection cable power supply being connected with each perimeter control device 20.
To avoid detectable signal from being stopped by barrier, two parallel detection cables can also be mounted on different level.
For example, by a detection cable buried depth and underground, another cable suspension is on enclosure wall or wire netting.In addition, all spies
Survey line cable uses totally enclosed design, dust-proof, waterproof, anti-oxidant, the energy various outdoor environments of good conformity.
As shown in Figure 1, circumference processor 30 is connected with perimeter control device 20, visited for receiving the reception on detection cable
The wireless signal that device receives is surveyed, and analyzes the wireless signal that these are detected from detector and is detected whether out according to wireless signal
Existing invader, and detection case is sent to application service equipment 40, i.e., the result after analyzing processing is sent to using clothes
Business device 40.In addition, circumference processor 30 can also set the alarm threshold when invading, control according to perimeter security system
Alarm sends out sound-light alarm prompt.The application interface being connect with application service equipment is provided, and to all detections in system
Cable, perimeter control device, application service equipment etc. are managed.
Application service equipment 40 is connected with circumference processor 30, the analyzing processing for receiving the transmission of circumference processor 30
As a result, simultaneously the safe condition in display target security protection region, the security situation include that without invasion shape event conditions and invasion thing occurs
The situation of part.
When detection cable detection occurs without intrusion event, probe field is in relatively steady state, and each detector obtains
The wireless signal of the state of the wireless signal held stationary taken, these detections is transferred to application service equipment, such as Fig. 4 by optical fiber
It is shown the schematic diagram of probe field signal intensity when not invading, 10 detectors of expression of probe node FNODE 01 to 10
Receiving and transmitting signal state, the change in signal strength curve of this 10 sensing points is steady as seen from Figure 4, and big fluctuation does not occur and becomes
Change.Therefore it according to the mode of multiple detector multiple-input multiple-output on detection cable, is built according to the signal strength detection for sending, receiving
Saturating ground microwave array is found to detect in probe field whether intrusion event occurs.
As shown in figure 4, probe node 01 to 10 indicates 10 detectors being distributed in two sections of parallel detection cables, when
When intrusion event not occurring, each detector receives the balance of the signal strength holding general trend of neighbouring other detectors,
A saturating ground microwave array is established using these received signals, saturating ground microwave array shows when not invading as shown in Figure 5
It is intended to, which shows the intensity value for the wireless signal that different moments detector receives.
When being detected with intrusion event generation, invader can cause the signal of detector blocking to absorb and emit, and make
Partial Elements or wireless signal in saturating ground microwave array are obtained, appearance is significantly fluctuated, process such as Fig. 6 institutes of specific intrusion detection
Show.
When there is invader to swarm between two detection cables, the detectable signal of neighbouring multiple points can be caused to stop,
Absorption, reflection or diffraction etc. occurs so that signal passes through and swarms into rapid decay after object, and the detector on offside cable is caused to connect
The signal strength received die-offs;Simultaneously because the reflection of invader, reflects on Signal averaging to the reception signal of script, causes
Homonymy detector, which receives signal strength, slightly to be enhanced.The change in signal strength situation of each node can be worked as by each detector
The intensity value of the signal of preceding acquisition obtains compared with the wireless signal for the node that it sets, as shown in Figure 7, Figure 8.
As shown in fig. 7, when intrusion event occurs, detects the reception signal of multiple detectors on cable and will appear different width
The signal intensity fluctuation of the mutation of degree, the node invaded is larger, as shown in figure 8, being signal strength of the detector in node 5
Situation of change, the downward significantly mutation of signal is as caused by absorbing the blocking of invader, and the upward mutation of signal is smaller, is
As invader caused by the reflection of signal.This variation can directly be reflected by saturating ground microwave array, such as Fig. 9 institutes
Show.
By the wireless signal of comparison diagram 9 and the wireless signal of Fig. 5, the wireless signal on display portion probe node occurs
Variation, and according to the size of signal intensity amplitude, the color of corresponding position is also different, and security personnel is facilitated quickly and accurately to look for
To the invasion position of invader.
In addition, perimeter security system can also preset the secure threshold of alarm, i.e. alarming threshold value, when detector obtains
When the changing value of the signal taken is more than the secure threshold of the node sets, alarm prompt is sent out, to prevent trees, toy etc. to being
The interference of system reduces rate of false alarm, and the secure threshold can also overcome large area such as Changes in weather, such as rain, snow, wind, small in addition
The variation of amplitude is filtered out by saturating ground microwave array.
A kind of perimeter security system provided by the invention is connected to form target by that will detect cable with perimeter control device
The boundary in security protection region, wherein being provided with multiple detector groups in detection cable, each detector group includes an emission detection
Device and at least one pick-up probe, the emitter-detector in the same detector group carry out nothing with the pick-up probe
Line signal transmitting and receiving constitutes wireless signal radiation area;The protection of non-blind area can be formed by placing the boundary in region in target in this way, not allowed
Easily by higher, degree of safety height;The wireless signal that pick-up probe receives on detection cable is received by perimeter control device, and will be connect
It receives wireless signal and is transmitted to the circumference processor;Circumference processor for analyze sent from the perimeter control device it is wireless
Signal, and according to the variation of wireless signal, detect whether invader occur, and, detection case is sent to the application and is taken
Business equipment;Circumference processor carries out analysis to the wireless signal of reception and detects whether invader occur, will not be influenced by weather
It reports by mistake, using detection cable to installation environment no requirement (NR).
In one embodiment, as shown in figure 11, the circumference processor 30 includes memory 301, wireless signal analysis
Device 302 and invasion position determination module 303.
Wherein, radio signal analyser 302 is used to analyze the wireless signal variation situation that each detector receives, in conjunction with
The position distribution situation of detector come determine whether invader invade.
Memory 301, memory 301 are connected with radio signal analyser 302, invasion position determination module 303 respectively,
Memory 301 is used to store the situation of change for receiving wireless signal from each detector, when invader invasion alerts
When, when storage alerts, the waveform of the wireless signal of detector transmitting, the event trace of invader, invasion time and invasion
The relevant informations such as position.
Position determination module 303 is invaded, position when being invaded for determining where invader, wherein the invasion position
Set to be the position where the central point for the invader that adjacent multiple detectors detect.
Circumference processor 30 is additionally operable to obtain radio signal analyser 302 and invades the data letter of position determination module 303
Breath, and the information of the acquisition is sent to application service equipment 40.
In another embodiment of the present invention, as shown in Figure 10, above-mentioned perimeter security system 100 further includes optical transmitter and receiver 60
With interchanger 70, wherein optical transmitter and receiver 60 is connected with perimeter control device 20 by optical fiber, for what is forwarded to perimeter control device 20
Wireless signal carries out opto-electronic conversion, which utilizes light-transfer characteristic mainly by technologies such as signal modulation, opto-electronic conversions
The information obtained on detector is sent to remote equipment, increases the expansion of system.
The input terminal of interchanger 70 is connected with the output end of optical transmitter and receiver 60, output end and the circumference processor of interchanger 70
30 are connected, and interchanger 70 is used to the photosignal that optical transmitter and receiver 60 is converted being sent to circumference processor 30, in addition interchanger 70
Multiple output ports can be connected with a variety of application service equipment, such as alarm, computer, Web server, routing
Device, Internet or other linked systems make the expansion of perimeter system enhance.
As shown in Figure 10, application service equipment 40 includes alarm 401, which is connected with circumference processor 30
It connects, for when intrusion event occurs, perimeter control device 30 to control alarm 401 and send out according to the alarm threshold of default
Sound-light alarm prompts, and reminds Security Personnel to intrusion event timely processing.
In perimeter security system 100, application service equipment 40 further include the Web server being connected with interchanger 70 or
Network server 402, Web server 402 are mounted in perimeter security system, for providing visual electronic map, in real time
Situations such as showing the position that the perimeter system operating status, invasion occur, and support the remote upgrade of miscellaneous equipment in system.
In the above-described embodiments, application service equipment 40 further includes computer or PC machine 403, for passing through the computer
403 check the monitoring situation of perimeter security system using browser, in addition, monitoring personnel is soft by the installation application of computer 403
Part is intuitively and easily monitored and manages to the case where perimeter system.
Application service equipment 40 further includes the remote monitoring terminal 404 being connected with interchanger 70, the remote monitoring terminal
404 include voice communication station, and voice communication station is used to acquire VoP to realize the voice communication of outer room in security protection region,
And by computer voice data packet, the voice communications services station by Ethernet access perimeter system, what system used
User capacity can be according to length of cable linear increase be detected, and server capacity can flexible expansion, the generally same address of detection cable
It is 3-5 people to send number of users side by side, you can to meet 3-5 human speech sound circumference security protections call within and outside the region simultaneously, to facilitate prison
Control personnel carry out speech exchange in the different location of perimeter system.
Application service equipment further includes multiple inspection cards 405, and the inspection card 405 to system by presetting mark letter
Breath, the identification information are the identity information for the personnel for carrying inspection card, make the personnel of carrying inspection card in target security protection area
It is not alerted in domain, the detection cable is detected convenient for patrol officer, is patrolled, and the place of breaking down is repaired
Deng.In addition, system can also position the personnel positions for carrying inspection card, and show on computers, convenient for monitoring inspection
The location information and inspection situation of personnel.
In another embodiment of the application, Web server or computer in application service equipment can also lead to
Cross software application platform realize multiple functions, application platform collection monitoring with the integrated software of Operation and Maintenance, can flexible expansion with
Multiple system interlinks.Application platform major function includes:Real time monitoring, map edit, the monitoring of various dimensions split screen, statistical report form life
At the functions such as historical query, equipment management, system testing.
A kind of the characteristics of perimeter security system disclosed by the invention, is as follows:
1, a variety of topographic features are adapted to.Since detector uses cable-type structure, can not be advised with hypsography, region
Boundary variation then is laid with, and detectable signal is avoided to be stopped by barrier, and two parallel detection cables can also be mounted on difference
Horizontal plane.For example, by a detection cable buried depth and underground, another cable suspension is on enclosure wall or wire netting.In addition,
All detection cables use totally enclosed design, dust-proof, waterproof, anti-oxidant, the energy various outdoor environments of good conformity, to mounting ring
Border no requirement (NR).
2, early warning is accurate.Ground microwave array is formed by multi signal, it can be with the volume of intelligent recognition intrusion target, movement
State and track realize that zero wrong report, zero fail to report not by the interference of toy, trees vegetation and Changes in weather etc..
3, monitoring is accurate.Detector is emitted using low radio frequency power, proximity detection, improves sensitivity;And same
Position multi-detector joint-detection finds invasion fast resolution invasion position and direction simultaneously.
4, simple installation.Cable is both detecting devices and transmission and power supply unit, and probe field is automatically formed after laying,
It can be embedded in underground as common cable or be suspended on enclosure wall, in metal fence.In addition, cable can be sheared, even as needed
It connects;Power supply connects distance farthest up to 1 kilometer, reduces and takes electric number when laying in the wild.
5, all standing, it is high hidden.Probe field is uniformly distributed along cable, and no dead angle forms one of nothing around region of setting up defences
The concealed wall of seam;Cable can be embedded in the underground in region of setting up defences, and good concealment prevents from being destroyed.
6, intelligent maintenance, fast quick-recovery.Perimeter security system provides intelligent maintenance function, monitors all detectors within 24 hours
With the operating status of perimeter control device, alarm is sent out in time once breaking down or destroying;All devices are supported remote reboot, are closed
The operations such as close, upgrade.
7, multi-functional, it is expansible.Perimeter security system can provide identification function simultaneously, to allow the staffing to come in and go out to patrol
Inspection card, system will not trigger alarm when detecting the personnel's crossing the boundary for wearing inspection card, will only record discrepancy situation;For
The period and range that it allows to come in and go out can be also set as needed in the personnel for wearing tag card, once there is discrepancy of going beyond one's commission,
To set out alarm.
Background system can provide a variety of management functions, such as historical query, discrepancy personal management, and offer and video simultaneously
The interconnecting interface of the systems such as monitoring, liaison realizes the linkage extension of multisystem.
Existing circumference security and guard technology, the scheme that can often use two or more set systems compound achieve the purpose that strick precaution,
To the judgement of invader only with simply "AND" or the relational calculus of "or", if using the operation of "AND", need multiple
System detects that invasion is just determined with invasion, can reduce rate of false alarm in this way, but improve rate of failing to report;If using
The operation of "or", then when in multiple systems there are one or more than one system detectio go out invasion be determined with invasion, in this way
Although rate of failing to report can be reduced effectively, rate of false alarm is increased simultaneously.
A kind of perimeter security system of the disclosure passes through the target being made of at least one detection cable, perimeter control device
Security protection region, and multiple detector groups on every detection cable are densely distributed, obtained by the multiple-input multiple-output of a large amount of detectors
Get the detection signal relatively independent to the multichannel of same position, " compound " of testing result, multiple spot mutually school in realization system
It tests, inherently improves the reliability of system;Since all quilts " compound " signal is both from same system so that this compound
Only it is not the simple superposition to upper layer handling result "AND" and "or", but more complicated joint-detection is used in bottom
Algorithm carries out processing and operation, more effectively filters out inaccurate test result, overcomes in hybrid system " wrong report " and " leakage
Report " performance improve can only alternative predicament.
It is required that those skilled in the art can be understood that the technology in the embodiment of the present invention can add by software
The mode of general hardware platform realize.Based on this understanding, the technical solution in the embodiment of the present invention substantially or
Say that the part that contributes to existing technology can be expressed in the form of software products, which can deposit
Storage is in storage medium, such as ROM/RAM, magnetic disc, CD, including some instructions are used so that computer equipment (can be with
Be personal computer, server either network equipment etc.) execute certain part institutes of each embodiment of the present invention or embodiment
The method stated.
Each embodiment in this specification is described in a progressive manner, identical similar portion between each embodiment
Point just to refer each other, and each embodiment focuses on the differences from other embodiments.Especially for system reality
For applying example, since it is substantially similar to the method embodiment, so description is fairly simple, related place is referring to embodiment of the method
Part explanation.
The embodiments of the present invention described above are not intended to limit the scope of the present invention.It is any in the present invention
Spirit and principle within made by modifications, equivalent substitutions and improvements etc., should all be included in the protection scope of the present invention.
Claims (7)
1. a kind of perimeter security system, which is characterized in that including circumference processor, application service equipment, at least one circumference control
Device processed and at least one detection cable being connected with each perimeter control device, wherein
The detection cable is connected to form the boundary in target security protection region with the perimeter control device, the every detection cable
Multiple detector groups are inside provided with, each detector group includes an emitter-detector and at least one pick-up probe, same
The emitter-detector in a detector group carries out wireless signal transmitting-receiving with the pick-up probe, constitutes wireless signal radiation
Area;
The perimeter control device is used to receive the wireless signal that the pick-up probe on the detection cable receives, and will receive
Wireless signal is transmitted to the circumference processor;
The circumference processor is connected with the perimeter control device, for analyzing the wireless communication sent from the perimeter control device
Number, and according to the variation of wireless signal, detect whether invader occur, and, detection case is sent to the application service
Equipment;
The application service equipment is used to show the safe condition in target security protection region.
2. system according to claim 1, which is characterized in that the perimeter security system further includes optical transmitter and receiver and exchange
Machine, wherein
The optical transmitter and receiver is connected with the perimeter control device, and the wireless signal for being received to the perimeter control device carries out light
Electricity conversion;
The input terminal of the interchanger is connected with the output end of the optical transmitter and receiver, the output end of the interchanger and the circumference
Processor is connected, and the interchanger is used to the photosignal that the optical transmitter and receiver is converted being sent to the circumference processor.
3. system according to claim 2, which is characterized in that the application service equipment includes and the circumference processor
The alarm being connected, for when the circumference processor detects that invader occurs in the boundary in target security protection region,
Send out sound-light alarm prompt.
4. system according to claim 2, which is characterized in that the application service equipment further includes and the interchanger phase
The Web server of connection, for providing visual electronic map, perimeter security system operating status described in real-time display.
5. system according to claim 2, which is characterized in that the application service equipment further includes and the interchanger phase
The computer of connection, the monitoring situation for checking the perimeter security system using browser by the computer.
6. system according to claim 2, which is characterized in that the application service equipment further includes and the interchanger phase
The remote monitoring terminal of connection, the remote monitoring terminal include voice communication station, and the voice communication station is for acquiring voice
Data packet is to realize the voice communication of outer room in circumference security protection region.
7. system according to any one of claims 1 to 6, which is characterized in that the perimeter security system further includes multiple
Inspection card, the inspection card make the personnel of carrying inspection card in the target security protection by presetting identification information to system
It does not alarm in region, the detection cable is detected convenient for patrol officer.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510365012.9A CN106327756B (en) | 2015-06-26 | 2015-06-26 | perimeter security system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510365012.9A CN106327756B (en) | 2015-06-26 | 2015-06-26 | perimeter security system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106327756A CN106327756A (en) | 2017-01-11 |
CN106327756B true CN106327756B (en) | 2018-10-23 |
Family
ID=57722950
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510365012.9A Active CN106327756B (en) | 2015-06-26 | 2015-06-26 | perimeter security system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106327756B (en) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109961600A (en) * | 2017-12-22 | 2019-07-02 | 中核核电运行管理有限公司 | A kind of method and system fast moving deployment intrusion detection |
CN108389343B (en) * | 2018-02-05 | 2020-01-07 | 长飞光纤光缆股份有限公司 | Defense area type optical fiber intrusion monitoring system capable of prompting intrusion track |
CN110428587A (en) * | 2019-07-19 | 2019-11-08 | 国网安徽省电力有限公司建设分公司 | A kind of engineering site early warning interlock method and system |
CN113643494A (en) * | 2021-06-15 | 2021-11-12 | 瑞合航天(北京)科技有限公司 | Foreign matter intrusion optical fiber sensing network and using method thereof |
Family Cites Families (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4328487A (en) * | 1980-07-28 | 1982-05-04 | Southwest Microwave, Inc. | Intrusion detector system |
CN2718692Y (en) * | 2003-08-21 | 2005-08-17 | 肖公亮 | Circum ferential invasion guard system for radio electromagnetic field leakage theory |
CN2911813Y (en) * | 2006-04-14 | 2007-06-13 | 王明吉 | Surroundings intruding detection alarming system having single processor multi-zone positioning |
CN101436336B (en) * | 2007-11-15 | 2010-10-27 | 中国科学院自动化研究所 | Intrusion detection system and method |
JP5528313B2 (en) * | 2010-12-06 | 2014-06-25 | 三菱電機株式会社 | Intrusion detection system |
CN202033859U (en) * | 2010-12-20 | 2011-11-09 | 重庆市电力公司超高压局 | Switch yard perimeter warning system based on microwave wall |
CN202871005U (en) * | 2012-11-08 | 2013-04-10 | 新疆美特智能安全工程股份有限公司 | Perimeter protection system of hybrid technology |
CN203644147U (en) * | 2013-12-31 | 2014-06-11 | 吉林澳奇机电集团有限公司 | Outdoor electronic fence protection device |
CN103780883A (en) * | 2014-02-19 | 2014-05-07 | 南京昕天卫光电科技有限公司 | All-fiber perimeter security monitoring equipment capable of being in linkage with video |
CN204087400U (en) * | 2014-08-28 | 2015-01-07 | 深圳市普泰克智能科技有限公司 | perimeter protection warning system |
CN204315020U (en) * | 2014-09-15 | 2015-05-06 | 天津职业技术师范大学 | A kind of personnel's intrusion detection device |
-
2015
- 2015-06-26 CN CN201510365012.9A patent/CN106327756B/en active Active
Also Published As
Publication number | Publication date |
---|---|
CN106327756A (en) | 2017-01-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102279995A (en) | Security pre-warning system based on Internet of things | |
CN101930649B (en) | Method for preventing false alarm under severe weather conditions for fiber fence alarm system | |
CN102323589B (en) | Line monitoring and early warning system | |
CN106327756B (en) | perimeter security system | |
CN110126885B (en) | Railway perimeter intrusion target monitoring method and system | |
CN104574737A (en) | Comprehensive boundary security system | |
CN108986364A (en) | Perimeter security crime prevention system and method | |
CN102243795A (en) | Intelligent optical fiber sensor applied to security systems | |
CN101916492A (en) | Optical fiber intelligent sensor used in security system | |
CN103606236A (en) | Real time safety monitoring system based on distribution type optical fiber invasion alarm unit | |
CN102542707A (en) | Land electronic fence monitoring system | |
CN103794010A (en) | Perimeter safety protection system | |
CN206470893U (en) | Microseismic activity intruder detection system | |
CN107067606A (en) | Wisdom perceptual positioning fence system based on Internet of Things wireless induction | |
CN106781152A (en) | A kind of fiber grating fence intrusion alarm detecting system and method | |
CN206132990U (en) | Safety monitoring system based on phased array radar | |
CN108399698A (en) | Boundary's intrusion preventing alarm system is enclosed on a kind of airport | |
CN103247122A (en) | One cable type optical cable vibration detecting and alarming system | |
CN105374141A (en) | Radar, vibration and hit Internet of Things electronic wall and method thereof | |
CN207020793U (en) | A kind of fiber fence circumference monitoring instruction equipment with video interlink function | |
CN204360494U (en) | A kind of circumference comprehensive precaution system | |
CN108828581A (en) | A kind of electric power line pole tower laser and the outer broken monitoring method of microwave linkage and its system | |
CN206210032U (en) | A kind of perimeter intrusion detecting system | |
CN203025878U (en) | Intelligent optical fiber sensing device applied in security and protection system | |
KR101959142B1 (en) | Fence Intrusion Detection System and Method with Ultra High Frequency Signal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CP02 | Change in the address of a patent holder | ||
CP02 | Change in the address of a patent holder |
Address after: 100176 room 502-1, floor 5, building 2, courtyard 10, keguyi street, Beijing Economic and Technological Development Zone, Daxing District, Beijing Patentee after: NEW SINGULARITY INTERNATIONAL TECHNICAL DEVELOPMENT Co.,Ltd. Address before: 100081 Beijing city Haidian District wanquanzhuang Road No. 28 Wanliu new building 6 storey block A room 614 Patentee before: NEW SINGULARITY INTERNATIONAL TECHNICAL DEVELOPMENT Co.,Ltd. |