Unlock instant, AI-driven research and patent intelligence for your innovation.

Perimeter Security System

A security system and perimeter technology, applied in the field of security, can solve the problems of low security, high installation environment requirements, false alarms, etc., and achieve the effect of high security

Active Publication Date: 2018-10-23
NEW SINGULARITY INT TECHN DEV
View PDF11 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] There are blind spots in the protection zone of the existing security system, which are easy to be crossed, have a low degree of safety, and are easily affected by the external environment (such as rain and snow, animals and plants, etc.) and cause false alarms, which have higher requirements for the installation environment

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Perimeter Security System
  • Perimeter Security System
  • Perimeter Security System

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] In order to enable those skilled in the art to better understand the technical solutions in the embodiments of the present invention, and to make the above-mentioned purposes, features and advantages of the embodiments of the present invention more obvious and understandable, the following describes the technical solutions in the embodiments of the present invention in conjunction with the accompanying drawings For further detailed explanation.

[0034] The following embodiments of the present invention provide a perimeter security system, such as figure 1 As shown, the perimeter security system 100 includes a perimeter processor 30, an application service device 40, at least one perimeter controller 20, and at least one detection cable 10 connected to each perimeter controller.

[0035] Wherein, each detection cable is provided with a plurality of detector groups 50, each detector group includes a transmitting detector and at least one receiving detector, the transmitt...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An embodiment of the invention discloses a perimeter security and protection system, which comprises a perimeter processor, application service equipment, at least one perimeter controller and at least one detection cable connected to each perimeter controller, wherein the detection cable is connected with the perimeter controller to form a boundary of a target security protection region, a plurality of detector groups are arranged in the detection cable, each detector group comprises a transmitting detector and at least one receiving detector, and the transmitting detector and the receiving detector in the same detector group performs wireless signal transmitting and receiving to form a wireless signal radiation region. The perimeter security and protection system provided by the invention can form protection without a dead zone at the boundary of the target security and protection region, is not easy to traverse, and is high in security; and the perimeter processor is used for analyzing received wireless signals to detect whether an invader appears, cannot give false alarm due to the influence of weather, and has no requirement on installation environments when the detection cable is adopted.

Description

technical field [0001] The invention relates to the field of security technology, in particular to a perimeter security system. Background technique [0002] In the application of various industries in modern society, there are often areas that require key control, such as airports, prisons, dangerous goods storage areas, and chemical plants. The perimeter protection requirements of buildings and areas are also increasing, so modern perimeter security technologies have been widely used. [0003] At present, the common technical prevention schemes mainly include: infrared intrusion detection, leakage cable intrusion detection and vibrating optical cable intrusion detection. Infrared beam intrusion detection mainly uses invisible light beams, such as infrared rays, to form a warning line between the transmitter and the receiver, and adopts the method of blocking the alarm to form a single-beam or multi-beam mesh defense area; vibrating optical cable intrusion The detection i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G08B13/12
CPCG08B13/12
Inventor 邵起明郑明吉刘丁阴子阳
Owner NEW SINGULARITY INT TECHN DEV