Security barrier
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Benefits of technology
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0032] The following description refers to the figures identified above. A portion of a security barrier 10 is shown in FIG. 1, in cut-away form. This presentation allows for an explanation of several features of the present invention. The security barrier 10 uses posts 12 that are secured to a post foundation 14. In FIG. 1, the post foundation 14 is shown as an excavated hole 15 in the ground filled with concrete 17. An appropriate post base reinforcement 16 may be used to enhance the anchoring of the post 12.
[0033] Purlins 40 run horizontally between the posts 12, as shown in the cut-away portion of FIG. 1. Interlocking metal panels 42 are attached to the purlins 40 to form the primary barrier of the security barrier 10. An entry deterrent material, such as concertina or razor wire 36 is shown as part of an upper attachment to the security barrier 10 in FIG. 1. Other types of entry deterrent materials might include electric wires, laser or other light beams to detect entry, or ot...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


