WO1990007759A1 - Electronic security device - Google Patents

Electronic security device Download PDF

Info

Publication number
WO1990007759A1
WO1990007759A1 PCT/US1990/000084 US9000084W WO9007759A1 WO 1990007759 A1 WO1990007759 A1 WO 1990007759A1 US 9000084 W US9000084 W US 9000084W WO 9007759 A1 WO9007759 A1 WO 9007759A1
Authority
WO
WIPO (PCT)
Prior art keywords
signal
electronic security
security device
loop
generating
Prior art date
Application number
PCT/US1990/000084
Other languages
French (fr)
Inventor
Eugene A. Eschbach
Jeffery W. Griffin
Edward J. Leblanc
Original Assignee
Battelle Memorial Institute
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Battelle Memorial Institute filed Critical Battelle Memorial Institute
Publication of WO1990007759A1 publication Critical patent/WO1990007759A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/067Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
    • G06K19/07Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
    • G06K19/077Constructional details, e.g. mounting of circuits in the carrier
    • G06K19/07749Constructional details, e.g. mounting of circuits in the carrier the record carrier being capable of non-contact communication, e.g. constructional details of the antenna of a non-contact smart card
    • G06K19/07758Constructional details, e.g. mounting of circuits in the carrier the record carrier being capable of non-contact communication, e.g. constructional details of the antenna of a non-contact smart card arrangements for adhering the record carrier to further objects or living beings, functioning as an identification tag
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/067Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
    • G06K19/07Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
    • G06K19/077Constructional details, e.g. mounting of circuits in the carrier
    • G06K19/07749Constructional details, e.g. mounting of circuits in the carrier the record carrier being capable of non-contact communication, e.g. constructional details of the antenna of a non-contact smart card
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C1/00Registering, indicating or recording the time of events or elapsed time, e.g. time-recorders for work people
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/02Mechanical actuation
    • G08B13/12Mechanical actuation by the breaking or disturbance of stretched cords or wires
    • G08B13/126Mechanical actuation by the breaking or disturbance of stretched cords or wires for a housing, e.g. a box, a safe, or a room

Definitions

  • Sensitive, dangerous or valuable materials are frequently stored in and shipped from sealed enclosures such as restricted access rooms, cabinets, containers or processing vessels having portals such as doors or lids by means of which entrance is obtained.
  • devices commonly referred to simply as seals have been applied to the portals of such enclosures. Since these devices are damaged by unauthorized entry, such damage serves as evidence of the unauthorized entry.
  • the prior devices do not allow for the time of an unauthorized entry to be recorded, do not provide sufficient means for detecting efforts to interfere with the proper operation of the seals, and are otherwise less effective than desired.
  • the security device comprises a control box linked to a communications loop such as a conductive wire over which a signal is transmitted and received by an electronic system. If the communications loop is tampered with or the signal is interrupted, the electronic system detects this event and records the time of its occurrence for later reference.
  • the device is applied by installing the control box and the communications loop at one of the boundaries defined by a portal into an enclosure so that the portal cannot be opened without breaking the loop and interrupting the signal.
  • the electronic system is microprocessor-based and comprises a detection module which resolves the voltage level and phase of a signal transmitted over a communications loop.
  • the microprocessor executes a program whereby it samples voltage level and phase data generated by the detection module, and registers significant changes in these data keeping track of changes in real time.
  • the initial voltage and phase data is suitably stored and compared with later data.
  • the actual initial impedance of the loop need not be known or calculated, and can be the random impedance of a randomly selected loop having random orientation. Any subsequent change in the impedance will be detected.
  • the electronic system also comprises a clock module and a digital time display subject to control by the microprocessor when data changes associated with tampering events occur.
  • the microprocessor may record the time of the event by accessing time data kept by the clock module for reference and later display and/or by "freezing" the time display to show the time of the tampering event.
  • FIG. 1 is a front view of the security device of the present invention as may be installed on a door to a sealed room;
  • FIG. 3 is a functional block diagram of the electronic system associated with the control box of the present invention.
  • FIG. 4 is a detailed function block diagram of the detection module component of the present invention.
  • FIG. 5 is a diagram of alternative loop circuitry for the security system according to the present invention.
  • FIG. 6 is a diagram of further alternative loop circuitry employing inductive coupling
  • FIGS. 7A and 7B are diagrams of loop circuitry utilizing capacitive coupling
  • FIG. 8 is a flowchart of the overall process of operation of the software for the microprocessor portion of the present invention
  • FIG. 9 is a functional block diagram of an alternative embodiment of the present invention.
  • the present invention constitutes a security device 10 comprising a tamper- resistant control box 12 adapted for being fastened to a structural surface, and a lead or loop 14 of wire separately secured at its ends 15 and 17 to one side of the control box 12.
  • the control box 12 includes a metal or plastic case having reinforced walls and is sufficiently rugged so as to be able to withstand a certain amount of physical abuse while being large enough to house electronic components sensitive to impedance changes in the loop as occasioned by breaking or tampering with the loop.
  • the loop 14 is suitably constructed of electrically conductive wire such as Nichrome wire having an impedance distributed along its length which may be random and unknown as to its exact value.
  • the resistivity or other impedance component may vary along the length of the conductive wire, and the loop may comprise a randomly selected piece of such wire making a given loop very difficult to duplicate. Thus, merely shorting the loop or providing a substitute loop will be noneffective for an intruder trying to bypass the device.
  • One or more fittings 16 enable the far end of the loop opposite the control box 12 to be secured to another surface, i.e., a surface different from the surface to which the control box 12 is attached.
  • the security device 10 is intended for being fastened across a boundary of a portal to an enclosure into which access is restricted.
  • control box 12 may be secured to the door 20 of a sealed storage cabinet while the fitting 16 is secured to the doorjamb 22 whereby the loop 14 extends across the boundary between the door 20 and the jamb 22.
  • the positioning of the security device 10 insures that entrance to the sealed cabinet can only be effected by breaking the loop 14.
  • the control box 12 may be provided with a clock display 24 associated with a clock module and a graphics display 26 that are both located on its front face.
  • the clock display 24 is operative for showing a time and a date while the graphics display 26 is adapted for drawing attention to the device 10 by flashing between different types of geometric patterns when the loop is violated.
  • Both of the displays 24 and 26 are covered by a layer of clear shock-resistant plastic in order to afford a degree of protection against abuse.
  • the microprocessor based electronic system 50 associated with the control box 12 includes a microprocessor 52 such as an Intel model 8085.
  • the microprocessor 52 is conriected over a bus 54 to the RAM memory unit 60, ROM memory unit 62, decoder 64, input keyboard 68, clock module 70, and detection module 72.
  • the RAM unit 60, ROM unit 62, decoder 64, and keyboard 68 are conventional in construction and function in a known manner.
  • the RAM and ROM memory units 60 and 62 provide volatile storage for program data and non-volatile storage for the software governing the operation of system 50.
  • the decoder 64 receives address information from the microprocessor 52 in accordance with which it supplies suitable chip select signals over the control lines 66 to the various components of the system 50 required to access the bus 54 during particular steps in the operation of the system.
  • the input keyboard 68 allows the operator to input data to the microprocessor 52, e.g. as may then be employed in setting the clock 70, the starting, or resetting, the system 50 after the system has registered a tampering incident.
  • a power supply of a type suitable for long term operation such as an alkaline battery supplies the required power to the active components of the system.
  • the control box 12 further contains an oscillator 74 that generates an alternating current signal for transmission through the loop 14.
  • the capacitance Cl represents capacitance associated with the loop 14 which is partially operative for setting the phase difference between the signals STL and SCL and may comprise an actual capacitor shunted across the loop 14 as shown, or may represent capacitance otherwise associated with the loop.
  • Capacitors C3 and C4 represent distributed shunt capacitance of the loop with respect to ground. In addition, the loop may exhibit inductive reactance.
  • Resistor R2 can be shunted with a capacitor C2.
  • Analog-to-Digital converter 90 processes the signal SCL and furnishes a digital signal DCL indicative of the voltage level at the node 82, the latter being a function of the impedance normally associated with the loop 14.
  • the data carried by the signal DCL is supplied over the bus 54 to the microprocessor 52 when the A/D converter is enabled onto the bus 54 by the decoder 64.
  • the detection module 72 also comprises comparators 92 and 94 connected for receiving the signals STL and SCL, respectively, by way of the resistors R3 and R4.
  • the comparators 92 and 94 are referenced to ground and therefore produce a high level signal only when the signals STL and/or SCL are greater than zero.
  • the comparators 92 and 94 switch and provide high level outputs at different times.
  • the logic circuit 96 comprises a state machine of conventional design which supplies a signal EC for enabling the operation of counter 98 when the signal ST from the comparator 92 goes high and terminating this signal when the signal SP from the other comparator 94 goes high.
  • the counter 98 is operated by a clock 100 outputting a periodic signal PS composed of regular pulses registered by the counter 98 when it is operationally enabled.
  • the counter 98 provides a digital signal CNT representative of the time difference between the signals ST and SP and therefore the phase difference between the signals STL and SCL.
  • the data carried by the signal CNT from the counter 98 may be supplied over the bus 54 to the microprocessor 52 as the counter is enabled onto the bus 54 by the decoder 64.
  • the microprocessor determines whether the value of signal SCL and its phase relative to signal STL are representative of a properly connected, i.e., non-violated, loop. Of course, if the loop is broken, intrusion will be indicated.
  • the clock module 70 keeps track of real time and includes the clock display 24 whereby time readings may be displayed to the operator.
  • the clock module 70 is a conventional type real time clock such as a model MM58167 clock unit manufactured by National Semiconductor Company of
  • the clock module 70 is connected to
  • step 200 the system 50 is first powered up in step 200 and the software governing the operation of the system is then entered.
  • step 202 clock module 70 is set to the correct time by the microprocessor 52 in accordance with data entered by the operator into the system via keyboard 68.
  • the clock display 24 should then show a correct real time reading.
  • the operator may use the keyboard 68 to enter a security code which starts automatic monitoring of loop 14 by the system 50.
  • steps 206 and 208 the voltage level and phase difference measured by the detection module 72 are initially checked pursuant to the microprocessor 52 reading out a first set of data from the A/D converter 90 and counter 92, and this data is stored in memory for future reference.
  • the program proceeds to steps 210 and 212 in which the voltage level and phase difference are rechecked as a subsequent set of data is read from A/D converter 90 and counter 92.
  • the new data is compared with the data previously stored in memory to determine whether the new measurements are within a predetermined or prescribed tolerance range of the previous measurements. If the data indicates the new measurements are within prescribed range, the program automatically returns to step 210 for again rechecking the voltage and phase.
  • step 214 the current time is read out of the clock module 70 and recorded in the RAM memory 60 for later use, while the graphics display is activated to show a flashing pattern indicating that a tampering event has been detected.
  • the time reading recorded in memory may be accessed by the operator, as indicated in step 216, upon entry of the correct security code whereupon the program directs the time reading to be displayed on the clock display 24.
  • a continuously visible clock display 24 may be "frozen" at the current time reading in step 214, thereby providing an immediate indication of the time at which the system 50 detected a tempering event.
  • the loop may be constructed to exhibit substantial inductance.
  • the loop may be formed as indicated at 14' in FIG. 5 as a tightly- wound coil or helix.
  • the loop 14' in FIG. 5 is shown only diagrammatically and it will be understood such loop is extended in a physical sense across a boundary such as between door 20 and doorjamb 22 in FIG. 1.
  • the loop 14' is formed as a coil of insulating wire having a diameter of approximately 1 mm, a length of several inches, and a pitch of 30-50 turns per inch.
  • a random length of coil is selected or cut from a longer stock of preformed coil, and the cut ends are provided with end connections of the type illustrated in FIG. 2.
  • the inductance of the loop is essentially random and not easily duplicated; however, it will be seen that tampering with the loop 14' after installation will have the effect of changing the phase of the SCL signal and will readily register an intrusion incident even though the loop is not broken. That is to say, even moving or rearranging the loop 14' will have the effect of changing the inductive reactance thereof and therefore will change the phase of the SCL signal.
  • the loop 14' may be shunted with a capacitance Cl' if desired and/or Cl' represents the distributed capacitance of the loop.
  • the inductance and distributed capacitance of the loop are adjustable by rearranging the position or pitch of a loop 14' coil in the installation of the device, and before initialization thereof as described in connection with the FIG. 8 flowchart.
  • the loop may take the form indicated at 14" in FIG. 6 that is separate from and inductively coupled to the detection circuitry by way of mutual inductance or transformer 100 which may be internal to or external of control box 12 in FIG. 1.
  • a "link" coupling is suitably provided wherein primary 100a of the transformer has a greater number of turns than secondary 100b interconnected with loop 14" .
  • the primary may be shunted with resistor Rl' or other impedance as desired.
  • other impedances can be inserted in series with or in parallel with the loop 14".
  • the mutual inductance 100 need not compromise a conventional transformer, but may instead consist of a coil or conductor 100a which is inductively linked with loop 14". That is to say, primary 100a may comprise a first loop extending from control box 12, having a second loop 14" inductively linked therewith.
  • capacitive means are illustrated for coupling the loop 14 (represented by resistor Rl) with the detection circuit 72.
  • a first capacitor 102 is interposed between node 80 and the STL input of detection circuit 72, while a capacitor 104 couples node 82 to the SCL input of the detection circuit.
  • Oscillator 74 is coupled to loop 14 by capacitor 14.
  • a capacitor 106 is located between node 80 and the STL input of the detector, with the SCL detector input being connected to node 82 r , which is in turn coupled to resistors Rl and R2 by capacitors 108 and 110 respectively.
  • phase differences detected by circuit 72 will be affected by the capacitive coupling, since the exact impedance of the loop 14 is frequently unknown and essentially random the circuit may be varied to a considerabe extent as convenient to provide coupling to the loop. It will also be apparent that the capacitive coupling between detection circuit .72 and resistor Rl in FIG. 7A may have inductive, i.e., transformer, coupling substituted therefor.
  • a constant source 152 of voltage such as a battery is connected directly to a loop 14 represented by resistor Rl connected in series with resistor R2 to form a voltage divider defining a voltage level VL at node 82 coupled to the inverting input of comparator 154 and to the non-inverting input of comparator 156.
  • the resistance Rl may be randomly disposed along the length of loop 14.
  • the non-inverting input of the comparator 154 is coupled to a source of DC constant reference voltage REF1, while the inverting input of the comparator 156 is connected to a source of constant voltage REF2.
  • the voltages REF1 and REF2 are adjusted so that normally REF1 ⁇ VL ⁇ REF2. If the loop 14 is tampered with such that voltage VL is changed whereby VL ⁇ REF1 or VL > REF2, then signal ALT on line 160 connected to the flip-flop 162 goes high. When the signal ALT goes high, the flip-flop 162 changes state, setting the signal DT on the line 164 connected to the clock 70 and the graphics display 26. As the signal DT goes high, the time reading currently displayed may be frozen on clock display 24, and the graphics display 26 is energized to draw attention to the security device. Time input buttons 170 allow the time kept by the clock 70 and displayed on the clock display 24 to be set prior to installation.
  • loop 14 has been described as being formed of wire, it will be appreciated that the wire is advantageously covered with a layer of tough insulating material to avoid measurements, for example of its resistance, by an intruder.
  • loop 14 comprises a transmission line disposed between a radio frequency source 180 and a line termination 182.
  • the transmission line may take any one of a number of forms and may, for example, consist of a length of coaxial cable or strip line on flexible plastic material.
  • the source 180 will normally be included within control box 12 (illustrated in
  • the termination 184 can be positioned within control box 12 or elsewhere as hereinafter more fully described. Assuming the termination is located within the control box, tap 182 (corresponding to node 82 in FIG. 3) couples the voltage at the transmission line termination to A to D converter 190, which may include phase sensing means.
  • the digital output of converter 190 is provided to microprocessor system 192 operating in a manner as described in connection with the previous embodiments, so as to input and store the "normal" or undisturbed output of the transmission line, and provide an indication when such output is disturbed through tampering.
  • the termination (184) may be equal in value to the characteristic impedance of the line, but is preferably of some other value such that the voltage at 182 is quite dependent upon the length and the position of the line.
  • the loop member can be very sensitive to small changes in impedance as occasioned by the presence of unauthorized personnel close to the loop, according to the programmed sensitivity as to how much the loop impedance may be allowed to vary before registering an intrusion.
  • Different sensitivities may be programmed for different times of day if desired, or an additional sensor or sensors, 73 in FIG. 3, may be programmed or remotely actuated at certain times to sense the approach of a human.
  • the sensor 73 may, for example, comprise a capacitive sensor or an infrared sensor.

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Microelectronics & Electronic Packaging (AREA)
  • Theoretical Computer Science (AREA)
  • Burglar Alarm Systems (AREA)

Abstract

The present invention relates to a security device having a control box (12) containing an electronic system (50) and a communications loop (14) over which the system transmits a signal. The device is constructed so that the communications loop can be extended from the control box across the boundary of a portal such as a door into a sealed enclosure into which access is restricted whereby the loop must be damaged or moved in order for an entry to be made into the enclosure. The device is adapted for detecting unauthorized entries into such enclosures such as rooms or containers and for recording the time at which such entries occur for later reference. Additionally, the device detects attempts to tamper or interfere with the operation of the device itself and records the time at which such events take place. In the preferred embodiment, the security device includes a microprocessor-based electronic system (50) and a detection module (72) capable of registering changes in the voltage and phase of the signal transmitted over the loop.

Description

ELECTRONIC SECURITY DEVICE
Background of the Invention
The present invention relates to systems for detecting unauthorized entries into rooms or containers into which access is restricted.
Sensitive, dangerous or valuable materials are frequently stored in and shipped from sealed enclosures such as restricted access rooms, cabinets, containers or processing vessels having portals such as doors or lids by means of which entrance is obtained. In the past, devices commonly referred to simply as seals have been applied to the portals of such enclosures. Since these devices are damaged by unauthorized entry, such damage serves as evidence of the unauthorized entry. Unfortunately, the prior devices do not allow for the time of an unauthorized entry to be recorded, do not provide sufficient means for detecting efforts to interfere with the proper operation of the seals, and are otherwise less effective than desired.
It is therefore an object of the present invention to provide an improved security device capable of registering unauthorized entry into sealed enclosures, and for recording the times at which such events take place.
It is another object of the present invention to provide an improved security device which is difficult to circumvent and which is sensitive to attempts to interfere with the device itself, registering and recording the times of such attempts.
It is a further object of the present invention to provide an improved security device which is inexpensive to construct and yet reliably performs its function with great efficiency and low energy drain. Summary of the Invention
The present invention constitutes a device for detecting security breaches due to tampering with sealed enclosures. For example, when tampering takes place or when an unauthorized entry is made through a door to a room into which access is restricted, the present invention registers the event and records the time of its occurrence.
The security device according to the invention comprises a control box linked to a communications loop such as a conductive wire over which a signal is transmitted and received by an electronic system. If the communications loop is tampered with or the signal is interrupted, the electronic system detects this event and records the time of its occurrence for later reference. In use, the device is applied by installing the control box and the communications loop at one of the boundaries defined by a portal into an enclosure so that the portal cannot be opened without breaking the loop and interrupting the signal.
In the preferred embodiment, the electronic system is microprocessor-based and comprises a detection module which resolves the voltage level and phase of a signal transmitted over a communications loop. The microprocessor executes a program whereby it samples voltage level and phase data generated by the detection module, and registers significant changes in these data keeping track of changes in real time. Thus, the initial voltage and phase data is suitably stored and compared with later data. The actual initial impedance of the loop need not be known or calculated, and can be the random impedance of a randomly selected loop having random orientation. Any subsequent change in the impedance will be detected.
The electronic system also comprises a clock module and a digital time display subject to control by the microprocessor when data changes associated with tampering events occur. The microprocessor may record the time of the event by accessing time data kept by the clock module for reference and later display and/or by "freezing" the time display to show the time of the tampering event. The subject matter of the present invention is particularly pointed out and distinctly claimed in the concluding portion of this specification. However, both the organization and method of operation, together with further advantages and objects thereof, may best be understood by reference to the following description taken in connection with accompanying drawings wherein like reference characters refer to like elements.
Brief Description of the Drawings
FIG. 1 is a front view of the security device of the present invention as may be installed on a door to a sealed room;
FIG. 2 is a cross-sectional view of one of the fasteners used in the present invention for securing the communications loop of the present invention to a control box;
FIG. 3 is a functional block diagram of the electronic system associated with the control box of the present invention;
FIG. 4 is a detailed function block diagram of the detection module component of the present invention;
FIG. 5 is a diagram of alternative loop circuitry for the security system according to the present invention;
FIG. 6 is a diagram of further alternative loop circuitry employing inductive coupling; FIGS. 7A and 7B are diagrams of loop circuitry utilizing capacitive coupling;
FIG. 8 is a flowchart of the overall process of operation of the software for the microprocessor portion of the present invention; FIG. 9 is a functional block diagram of an alternative embodiment of the present invention; and
FIG. 10 is a functional block diagram of a further alternative embodiment of the present invention.
Description of the Preferred Embodiment
Referring now to FIG. 1, the present invention constitutes a security device 10 comprising a tamper- resistant control box 12 adapted for being fastened to a structural surface, and a lead or loop 14 of wire separately secured at its ends 15 and 17 to one side of the control box 12. The control box 12 includes a metal or plastic case having reinforced walls and is sufficiently rugged so as to be able to withstand a certain amount of physical abuse while being large enough to house electronic components sensitive to impedance changes in the loop as occasioned by breaking or tampering with the loop. The loop 14 is suitably constructed of electrically conductive wire such as Nichrome wire having an impedance distributed along its length which may be random and unknown as to its exact value. The resistivity or other impedance component may vary along the length of the conductive wire, and the loop may comprise a randomly selected piece of such wire making a given loop very difficult to duplicate. Thus, merely shorting the loop or providing a substitute loop will be noneffective for an intruder trying to bypass the device. One or more fittings 16 enable the far end of the loop opposite the control box 12 to be secured to another surface, i.e., a surface different from the surface to which the control box 12 is attached. The security device 10 is intended for being fastened across a boundary of a portal to an enclosure into which access is restricted. For example, the control box 12 may be secured to the door 20 of a sealed storage cabinet while the fitting 16 is secured to the doorjamb 22 whereby the loop 14 extends across the boundary between the door 20 and the jamb 22. The positioning of the security device 10 insures that entrance to the sealed cabinet can only be effected by breaking the loop 14.
The control box 12 may be provided with a clock display 24 associated with a clock module and a graphics display 26 that are both located on its front face. The clock display 24 is operative for showing a time and a date while the graphics display 26 is adapted for drawing attention to the device 10 by flashing between different types of geometric patterns when the loop is violated. Both of the displays 24 and 26 are covered by a layer of clear shock-resistant plastic in order to afford a degree of protection against abuse.
Fasteners 30 may be provided for securing a first end plug 15 and a second end plug 17 of the loop 14 to the control box 12. As shown in FIG. 2, a fastener 30 comprises a pair of resilient clips 40 having latching members 42. The latching members 42 spring apart when the loop end plug 15 is admitted into the fastener 30, but anchor the loop end plug 15 to the fastener 30 by gripping the restraining ring 44 of the loop end plug 15 when it is fully engaged with the fastener. Whenever the loop end plug 15 is so engaged, it makes electrical contact at its tip 34 with electrical connector 48 whereby the loop 14 is interfaced with the electrical components within the control box 12.
Referring now to FIG. 3, the microprocessor based electronic system 50 associated with the control box 12 includes a microprocessor 52 such as an Intel model 8085. The microprocessor 52 is conriected over a bus 54 to the RAM memory unit 60, ROM memory unit 62, decoder 64, input keyboard 68, clock module 70, and detection module 72. The RAM unit 60, ROM unit 62, decoder 64, and keyboard 68 are conventional in construction and function in a known manner. The RAM and ROM memory units 60 and 62 provide volatile storage for program data and non-volatile storage for the software governing the operation of system 50. The decoder 64 receives address information from the microprocessor 52 in accordance with which it supplies suitable chip select signals over the control lines 66 to the various components of the system 50 required to access the bus 54 during particular steps in the operation of the system. The input keyboard 68 allows the operator to input data to the microprocessor 52, e.g. as may then be employed in setting the clock 70, the starting, or resetting, the system 50 after the system has registered a tampering incident. A power supply of a type suitable for long term operation such as an alkaline battery supplies the required power to the active components of the system. The control box 12 further contains an oscillator 74 that generates an alternating current signal for transmission through the loop 14.
The clock and detection modules 70 and 72 function in coordination with the system software to provide a mechanism for detecting tampering events indicative of unauthorized entries or interference with the operation of the device 50 itself, and record when such entries or interferences take place. The detector 72 receives two input signals STL and SCL corresponding to the signal generated by an oscillator 74 as supplied to node 80 at one end of the loop 14 and the signal received by node 82 at the other end of the loop 14 (after transmission over the loop). The resistance Rl represents the impedance of the loop 14 between the nodes 80 and 82 and acts in cooperation with additional resistance R2, positioned between the node 82 and ground, to form a voltage divider that sets the normal voltage level of the signal SCL. The capacitance Cl represents capacitance associated with the loop 14 which is partially operative for setting the phase difference between the signals STL and SCL and may comprise an actual capacitor shunted across the loop 14 as shown, or may represent capacitance otherwise associated with the loop. Capacitors C3 and C4 represent distributed shunt capacitance of the loop with respect to ground. In addition, the loop may exhibit inductive reactance. Resistor R2 can be shunted with a capacitor C2.
Referring now to FIG. 4, the detection module 72 is shown in greater detail. Analog-to-Digital converter 90 ("A/D" converter) processes the signal SCL and furnishes a digital signal DCL indicative of the voltage level at the node 82, the latter being a function of the impedance normally associated with the loop 14. The data carried by the signal DCL is supplied over the bus 54 to the microprocessor 52 when the A/D converter is enabled onto the bus 54 by the decoder 64.
The detection module 72 also comprises comparators 92 and 94 connected for receiving the signals STL and SCL, respectively, by way of the resistors R3 and R4. The comparators 92 and 94 are referenced to ground and therefore produce a high level signal only when the signals STL and/or SCL are greater than zero. However, since a phase difference exists between the signals STL and SCL as a function of the impedance of the loop 14, the comparators 92 and 94 switch and provide high level outputs at different times. The logic circuit 96 comprises a state machine of conventional design which supplies a signal EC for enabling the operation of counter 98 when the signal ST from the comparator 92 goes high and terminating this signal when the signal SP from the other comparator 94 goes high. The counter 98 is operated by a clock 100 outputting a periodic signal PS composed of regular pulses registered by the counter 98 when it is operationally enabled. The counter 98 provides a digital signal CNT representative of the time difference between the signals ST and SP and therefore the phase difference between the signals STL and SCL. The data carried by the signal CNT from the counter 98 may be supplied over the bus 54 to the microprocessor 52 as the counter is enabled onto the bus 54 by the decoder 64. The microprocessor determines whether the value of signal SCL and its phase relative to signal STL are representative of a properly connected, i.e., non-violated, loop. Of course, if the loop is broken, intrusion will be indicated. Moreover, disturbing the configuration or shape of the loop by tampering with the same will tend to change its complex impedance and register an intrusion. It will also be seen that merely shorting the loop or applying a voltage to a loop terminal would be ineffective in disguising an attempted break-in, and if the value of the impedance of the loop 14 is random and unknown, sophisticated tampering techniques will usually be rendered ineffective.
The clock module 70 keeps track of real time and includes the clock display 24 whereby time readings may be displayed to the operator. The clock module 70 is a conventional type real time clock such as a model MM58167 clock unit manufactured by National Semiconductor Company of
Santa Clara, California. The clock module 70 is connected to
the bus 54 in order to allow the microprocessor 52 to control its operation. The operator may set the time kept by the clock module 70 by using the keyboard 68 to enter the desired time reading via microprocessor 52.
In operation, a power source is installed in the control box 12 and the control box 12 is secured to the door 20, while the far end of the loop 14 is attached to the doorjamb 22 through the use of a fitting such as the fitting 16, or hooked through part of the existing structure of the doorjamb 22. First and second ends 15 and 17 of the loop 14 are then fully engaged with fasteners 30.
Referring to FIG. 8, the system 50 is first powered up in step 200 and the software governing the operation of the system is then entered. In step 202, clock module 70 is set to the correct time by the microprocessor 52 in accordance with data entered by the operator into the system via keyboard 68. The clock display 24 should then show a correct real time reading. As indicated in step 204, the operator may use the keyboard 68 to enter a security code which starts automatic monitoring of loop 14 by the system 50.
In steps 206 and 208, the voltage level and phase difference measured by the detection module 72 are initially checked pursuant to the microprocessor 52 reading out a first set of data from the A/D converter 90 and counter 92, and this data is stored in memory for future reference. The program proceeds to steps 210 and 212 in which the voltage level and phase difference are rechecked as a subsequent set of data is read from A/D converter 90 and counter 92. In step 212, the new data is compared with the data previously stored in memory to determine whether the new measurements are within a predetermined or prescribed tolerance range of the previous measurements. If the data indicates the new measurements are within prescribed range, the program automatically returns to step 210 for again rechecking the voltage and phase. It should be noted that steps 210 and 212 form an integral loop that is continuously executed during the operation of the system 50 for the purpose of detecting voltage and phase variation. The steps 209 and 211 shown in phantom may be executed as an alternative to having the program loop directly back to step 210 from step 212. In step 209, the new data read out from the A/D converter 90 and counter 92 in step 212 is stored in memory for future reference, replacing the data stored in step 208. Pursuant to step 211, further execution of the program is delayed for a significant period. Through the implementation of steps 209 and 211, the system 50 is adapted to account for any gradual "drift" in the measurements taken with respect to voltage and phase due to temperature changes and the like. Step 211 prevents the system from adapting too rapidly to changing conditions which may in fact be due to tampering.
If the data indicates that new measurements are outside a prescribed tolerance range, then the program proceeds to step 214 in which the current time is read out of the clock module 70 and recorded in the RAM memory 60 for later use, while the graphics display is activated to show a flashing pattern indicating that a tampering event has been detected. The time reading recorded in memory may be accessed by the operator, as indicated in step 216, upon entry of the correct security code whereupon the program directs the time reading to be displayed on the clock display 24. Alternatively, a continuously visible clock display 24 may be "frozen" at the current time reading in step 214, thereby providing an immediate indication of the time at which the system 50 detected a tempering event.
The system of FIG. 3 is additionally desirably provided with a communications link to a central watch station (not shown) via block 71 which may comprise a radio transmitter or transmitter-receiver that transmits a signal to the central station when loop 14 is violated. An r.f. signal may be initiated, or coded modulation may be provided on a continuous carrier. Alternatively, a plurality of devices according to the present invention may be monitored or interrogated on a programmed or random basis from a central station, with each device providing its own distinguishable check-in signal. As a substitute for radio communication means, ultrasonic or optical communication means may be employed.
For communications purposes, an identification code may be stored in the random access memory 60 of each security device, and if the loop 14 is broken or tampered with, the identification code is automatically destroyed or erased. On interrogating each device, a key code may be sent by the central station to each security device which responds indicating whether the key code is correct or not.
Instead of employing a loop 14 which is principally resistive in nature, the loop may be constructed to exhibit substantial inductance. For instance, the loop may be formed as indicated at 14' in FIG. 5 as a tightly- wound coil or helix. The loop 14' in FIG. 5 is shown only diagrammatically and it will be understood such loop is extended in a physical sense across a boundary such as between door 20 and doorjamb 22 in FIG. 1. In a typical instance, the loop 14' is formed as a coil of insulating wire having a diameter of approximately 1 mm, a length of several inches, and a pitch of 30-50 turns per inch. In selecting the loop 14' , a random length of coil is selected or cut from a longer stock of preformed coil, and the cut ends are provided with end connections of the type illustrated in FIG. 2. The inductance of the loop is essentially random and not easily duplicated; however, it will be seen that tampering with the loop 14' after installation will have the effect of changing the phase of the SCL signal and will readily register an intrusion incident even though the loop is not broken. That is to say, even moving or rearranging the loop 14' will have the effect of changing the inductive reactance thereof and therefore will change the phase of the SCL signal. The loop 14' may be shunted with a capacitance Cl' if desired and/or Cl' represents the distributed capacitance of the loop. Of course, the inductance and distributed capacitance of the loop are adjustable by rearranging the position or pitch of a loop 14' coil in the installation of the device, and before initialization thereof as described in connection with the FIG. 8 flowchart.
In accordance with another example of the device according to the present invention, the loop may take the form indicated at 14" in FIG. 6 that is separate from and inductively coupled to the detection circuitry by way of mutual inductance or transformer 100 which may be internal to or external of control box 12 in FIG. 1. A "link" coupling is suitably provided wherein primary 100a of the transformer has a greater number of turns than secondary 100b interconnected with loop 14" . The primary may be shunted with resistor Rl' or other impedance as desired. Similarly, other impedances can be inserted in series with or in parallel with the loop 14". The mutual inductance 100 need not compromise a conventional transformer, but may instead consist of a coil or conductor 100a which is inductively linked with loop 14". That is to say, primary 100a may comprise a first loop extending from control box 12, having a second loop 14" inductively linked therewith.
Referring to FIG. 7A and 7B, capacitive means are illustrated for coupling the loop 14 (represented by resistor Rl) with the detection circuit 72. In FIG. 7A, a first capacitor 102 is interposed between node 80 and the STL input of detection circuit 72, while a capacitor 104 couples node 82 to the SCL input of the detection circuit. Oscillator 74 is coupled to loop 14 by capacitor 14. Alternatively, as illustrated in FIG. 7B, a capacitor 106 is located between node 80 and the STL input of the detector, with the SCL detector input being connected to node 82 r, which is in turn coupled to resistors Rl and R2 by capacitors 108 and 110 respectively. Although the phase differences detected by circuit 72 will be affected by the capacitive coupling, since the exact impedance of the loop 14 is frequently unknown and essentially random the circuit may be varied to a considerabe extent as convenient to provide coupling to the loop. It will also be apparent that the capacitive coupling between detection circuit .72 and resistor Rl in FIG. 7A may have inductive, i.e., transformer, coupling substituted therefor.
Referring now to FIG. 9, an alternative embodiment of the present invention is illustrated wherein the electronic system is implemented in hardware. In system 150, a constant source 152 of voltage such as a battery is connected directly to a loop 14 represented by resistor Rl connected in series with resistor R2 to form a voltage divider defining a voltage level VL at node 82 coupled to the inverting input of comparator 154 and to the non-inverting input of comparator 156. The resistance Rl may be randomly disposed along the length of loop 14. The non-inverting input of the comparator 154 is coupled to a source of DC constant reference voltage REF1, while the inverting input of the comparator 156 is connected to a source of constant voltage REF2. The voltages REF1 and REF2 are adjusted so that normally REF1 < VL < REF2. If the loop 14 is tampered with such that voltage VL is changed whereby VL < REF1 or VL > REF2, then signal ALT on line 160 connected to the flip-flop 162 goes high. When the signal ALT goes high, the flip-flop 162 changes state, setting the signal DT on the line 164 connected to the clock 70 and the graphics display 26. As the signal DT goes high, the time reading currently displayed may be frozen on clock display 24, and the graphics display 26 is energized to draw attention to the security device. Time input buttons 170 allow the time kept by the clock 70 and displayed on the clock display 24 to be set prior to installation.
While loop 14 has been described as being formed of wire, it will be appreciated that the wire is advantageously covered with a layer of tough insulating material to avoid measurements, for example of its resistance, by an intruder.
Alternately, the conductive loop itself may be manufactured of resistive plastic cord in turn covered by plastic insulation. Referring to FIG. 10, depicting a further alternative embodiment according to the present invention, loop 14 comprises a transmission line disposed between a radio frequency source 180 and a line termination 182. The transmission line may take any one of a number of forms and may, for example, consist of a length of coaxial cable or strip line on flexible plastic material. The source 180 will normally be included within control box 12 (illustrated in
FIG. 1), but the termination 184 can be positioned within control box 12 or elsewhere as hereinafter more fully described. Assuming the termination is located within the control box, tap 182 (corresponding to node 82 in FIG. 3) couples the voltage at the transmission line termination to A to D converter 190, which may include phase sensing means. The digital output of converter 190 is provided to microprocessor system 192 operating in a manner as described in connection with the previous embodiments, so as to input and store the "normal" or undisturbed output of the transmission line, and provide an indication when such output is disturbed through tampering. The termination (184) may be equal in value to the characteristic impedance of the line, but is preferably of some other value such that the voltage at 182 is quite dependent upon the length and the position of the line.
Instead of locating termination 184 within control box 12, it may be positioned elsewhere, e.g. in fitting 16 on the doorjamb, with no return of the loop being made to control box 12. The tap is then located at position 182' in FIG. 10 rather than 182, at which point the transmission line voltage is a function of reflections from the termination. The termination suitably has a value other than the characteristic impedance of the line. It will be again seen that substantial tampering with the line is readily detected by a change in voltage at tap 182'. As a further alternative, source 180 may constitute a source of pulses and element 184 may represent plural spaced terminations reflecting plural pulses back to tap 182' that are detectable time-wise by converter 190 as the correct signature or "key" of the line.
It will be appreciated, especially with regard to the embodiments of FIGS. 3-7 and 10, that the loop member can be very sensitive to small changes in impedance as occasioned by the presence of unauthorized personnel close to the loop, according to the programmed sensitivity as to how much the loop impedance may be allowed to vary before registering an intrusion. Different sensitivities may be programmed for different times of day if desired, or an additional sensor or sensors, 73 in FIG. 3, may be programmed or remotely actuated at certain times to sense the approach of a human. The sensor 73 may, for example, comprise a capacitive sensor or an infrared sensor.
It will be apparent that many other changes and modifications may be made without departing from the true spirit and scope of the invention. For example, the aforementioned loop could be formed of superconductive material, the superconductivity of which is destroyed or affected by tampering. The appended claims are therefore intended to cover all such changes and modifications as fall within the true spirit and scope of the invention.

Claims

1. A portable electronic security device for detecting when a portal has been tampered with, comprising: a communications lead (14) adapted for being attached to a side of a portal boundary, said lead having a first end and a second end between which a signal may be transmitted; and a signal control module (12) adapted for being affixed to another side of said portal boundary to which at least one end of said loop may also be secured; including means (74, 152, 180) for generating a signal for said communications lead, and means (72, 150, 190) for monitoring one or more characteristic of said signal and generating an alert signal indicative of alteration of one or more of said characteristics.
2. The electronic security device of claim 1 wherein said means for generating a signal comprises an oscillator (74), and said means for monitoring (72) comprises means (90, 96, 98) for detecting voltage levels and phase.
3. The electronic security device of claim 1 wherein said communications lead comprises a conductor (14) having random impedance along its length.
4. The electronic security device of claim 1 further including graphics display means (24, 26) for drawing attention to said device upon the detection of a tampering event and for displaying the time of such event.
5. The electronic security device of claim 1 wherein said communication lead comprises an inductance coil (14').
6. The electronic security device of claim 1 further including capacitor means (102, 104, 106, 108 110) for coupling said monitoring means to said communications lead.
7. The electronic security device of claim 1 further including inductive means (100) for coupling said monitoring means to said communications lead.
8. The electronic security device of claim 7 wherein said communications lead comprises a closed loop (14").
9. The electronic security device of claim 1 wherein said communications lead comprises a r.f. transmission line (14).
10. The electronic security system according to claim 9 wherein only one end of said transmission line (14) is coupled to said control signal module and said means for monitoring (.182') monitors reflection or absence of reflections on said transmission line.
11. The electronic security system according to claim 1 further provided with means (71) for communicating its status to a remote point.
12. The electronic security system according to claim 1 wherein said mans for generating a signal comprises a DC source.
13. An electronic security device for detecting when a portal to a sealed enclosure has been tampered with, comprising: a communications lead (14) adapted for being secured on one side of a portal boundary, said lead having a first end and a second end between which a signal may be transmitted; a signal control module (12) adapted for being secured on another side of said portal boundary and to which at least one end of said lead may also be affixed; means (74, 180) for generating a signal and directing this signal to the first end of said lead, and means (72, 190) for monitoring one or more characteristic of said signal and generating an alert signal indicative of alteration of one or more of said characteristics; clock means (70) including display means (24) for displaying real time readings; and microprocessor means (52) for reading and recording the time kept by said clock means in response to said alert signal generated by said monitoring means and for controlling said clock means to display said time on said display means.
14. The electronic security device of claim 13 wherein said means for generating a signal comprises an oscillator (74) and said meas for monitoring (72) comprises means for detecting voltage levels and phase.
15. The electronic security device of claim 13 wherein said communications loop (14) comprises a conductor having random impedance along its length.
16. The electronic security device of claim 13 further including graphic display means (26) for drawing attention to said device upon the detection of a tampering event.
17. A electronic security device for detecting when a portal to a sealed enclosure has bee tampered with, said device comprising: a transmission line (14) over which a signal may be transmitted from the first end thereof to the second end thereof; means (74, 180) for generating a signal for transmission over said line from said first end to said second end; means (72, 190) for monitoring one or more of the characteristics of said signal on said line and generating an alert signal indicative of changes in characteristics resulting from tampering therewith; and means (60, 70, 72, 24) for recording time readings in response to said alert signal and for displaying said readings.
18. The electronic security device of claim 17 wherein said means for recording time readings and displaying said readings comprises: clock means (70) including display means (24) for displaying real time readings, and microprocessor means (52) for recording the time kept by said clock means and controlling said display means to display time readings in response to said alert signal.
19. The electronic security device of claim 17 wherein said means for generating a signal comprises an oscillator (74), and said means for monitoring (72) comprises means for detecting voltage level and phase.
20. The electronic security device according to claim 17 wherein said means for generating a signal comprises an r.f. oscillator (180), and said transmission line comprises an r.f. transmission line (14).
21. The electronic security device of claim 17 further including graphics display means (26) for drawing attention to said device upon the detection of a tampering event.
22. The electronic security device of claim 17 further including sensor means (73) for detecting the approach of personnel.
PCT/US1990/000084 1989-01-06 1990-01-04 Electronic security device WO1990007759A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US29420789A 1989-01-06 1989-01-06
US294,207 1989-01-06

Publications (1)

Publication Number Publication Date
WO1990007759A1 true WO1990007759A1 (en) 1990-07-12

Family

ID=23132352

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US1990/000084 WO1990007759A1 (en) 1989-01-06 1990-01-04 Electronic security device

Country Status (2)

Country Link
CA (1) CA2007098A1 (en)
WO (1) WO1990007759A1 (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1995024023A1 (en) * 1994-03-01 1995-09-08 Brand, Edith Electronic attachment or sealing device
WO1998007116A1 (en) * 1996-08-13 1998-02-19 Fyrtech Microelectronics Ab. Sealing device
EP0955617A2 (en) * 1998-05-05 1999-11-10 Hi-G-Tek Ltd Anti-theft electronic tag
EP0955618A2 (en) * 1998-05-07 1999-11-10 Hi-G-Tek Ltd Weapon tag
WO1999057701A1 (en) * 1998-05-05 1999-11-11 Plaza Miranzo Jose Electronic seal
ES2138931A1 (en) * 1998-05-07 2000-01-16 Plaza Miranzo Jose Electronic device for sealing and detecting manipulation of fuel-dispensing pumps
ES2138930A1 (en) * 1998-05-05 2000-01-16 Plaza Miranzo Jose Electronic seal
WO2009080317A1 (en) * 2007-12-21 2009-07-02 Oltre S.R.L. Anti-theft device, particularly for pallets loaded with goods
WO2015013236A1 (en) * 2013-07-25 2015-01-29 3M Innovative Properties Company A method to calibrate a fiber optic strap on a body worn device
US9777510B2 (en) 2011-03-03 2017-10-03 Assa Abloy Ab Tamper switch activation without power

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US3938124A (en) * 1971-07-06 1976-02-10 Salient Electronics, Inc. Alarm system sensing device
DE2749720A1 (en) * 1977-11-07 1979-05-10 Emmerich Christoph Kg SAFETY AND ALARM DEVICE FOR SAFETY DOORS
DE2952007A1 (en) * 1979-12-21 1981-06-25 Manfred Dipl.-Volksw. 1000 Berlin Hirche Automatic time and date recording system - is for multiple loop alarm system with display of time and date and recording of interrupt
US4746909A (en) * 1986-09-02 1988-05-24 Marcia Israel Modular security system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US3938124A (en) * 1971-07-06 1976-02-10 Salient Electronics, Inc. Alarm system sensing device
DE2749720A1 (en) * 1977-11-07 1979-05-10 Emmerich Christoph Kg SAFETY AND ALARM DEVICE FOR SAFETY DOORS
DE2952007A1 (en) * 1979-12-21 1981-06-25 Manfred Dipl.-Volksw. 1000 Berlin Hirche Automatic time and date recording system - is for multiple loop alarm system with display of time and date and recording of interrupt
US4746909A (en) * 1986-09-02 1988-05-24 Marcia Israel Modular security system

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1995024023A1 (en) * 1994-03-01 1995-09-08 Brand, Edith Electronic attachment or sealing device
WO1998007116A1 (en) * 1996-08-13 1998-02-19 Fyrtech Microelectronics Ab. Sealing device
EP0825554A1 (en) * 1996-08-13 1998-02-25 Fyrtech Microelectronics AB Sealing device
EP0955617A3 (en) * 1998-05-05 2000-11-29 Hi-G-Tek Ltd Anti-theft electronic tag
WO1999057701A1 (en) * 1998-05-05 1999-11-11 Plaza Miranzo Jose Electronic seal
ES2138930A1 (en) * 1998-05-05 2000-01-16 Plaza Miranzo Jose Electronic seal
EP0955617A2 (en) * 1998-05-05 1999-11-10 Hi-G-Tek Ltd Anti-theft electronic tag
US6255958B1 (en) 1998-05-05 2001-07-03 H-G-Tek Ltd. Anti-theft electronic tag
EP0955618A2 (en) * 1998-05-07 1999-11-10 Hi-G-Tek Ltd Weapon tag
ES2138931A1 (en) * 1998-05-07 2000-01-16 Plaza Miranzo Jose Electronic device for sealing and detecting manipulation of fuel-dispensing pumps
EP0955618A3 (en) * 1998-05-07 2000-11-29 Hi-G-Tek Ltd Weapon tag
WO2009080317A1 (en) * 2007-12-21 2009-07-02 Oltre S.R.L. Anti-theft device, particularly for pallets loaded with goods
US9777510B2 (en) 2011-03-03 2017-10-03 Assa Abloy Ab Tamper switch activation without power
WO2015013236A1 (en) * 2013-07-25 2015-01-29 3M Innovative Properties Company A method to calibrate a fiber optic strap on a body worn device

Also Published As

Publication number Publication date
CA2007098A1 (en) 1990-07-06

Similar Documents

Publication Publication Date Title
US5097253A (en) Electronic security device
US4337466A (en) Tamper protection for an automatic remote meter reading unit
US4357601A (en) Tamper protection for an automatic remote meter reading unit
US5473322A (en) Apparatus and method for sensing tampering with a utility meter
US5712621A (en) Security system with variable inductance sensor
US6724316B2 (en) Method and apparatus for detection of motion with a gravitational field detector in a security system
US8111157B2 (en) Apparatus for detecting tampering with a latch mechanism
US6040771A (en) Intelligent safe system
US6727817B2 (en) Tamper detection and prevention for an object control and tracking system
DE69908957T2 (en) SYSTEM FOR DETECTION AND RF IDENTIFICATION
CA2565505C (en) Electronic lock box with key presence sensing
US5111184A (en) Tamper-proof device for detecting opening and closing of a secure container
US5111407A (en) System for measuring and recording a utility consumption
US4396910A (en) Coded security switch
WO1990007759A1 (en) Electronic security device
MXPA06011331A (en) Wireless monitoring device.
EP0035323A1 (en) Electricity meters
US4209777A (en) Non-compromisable intrusion sensor circuit
US4549168A (en) Remote station monitoring system
US6369708B2 (en) Intrusion alarm and detection system
CN113392944A (en) Wireless safety monitoring device for computer application
EP0846823A1 (en) Improvements on safety lock systems
WO2013081469A1 (en) Electronic seal device
US3883868A (en) Sweep frequency control apparatus and method
CN211530510U (en) Meter box with anti-electricity-stealing function

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): JP

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): AT BE CH DE DK ES FR GB IT LU NL SE