WO2006115913A2 - Secure transmission cable - Google Patents
Secure transmission cable Download PDFInfo
- Publication number
- WO2006115913A2 WO2006115913A2 PCT/US2006/014601 US2006014601W WO2006115913A2 WO 2006115913 A2 WO2006115913 A2 WO 2006115913A2 US 2006014601 W US2006014601 W US 2006014601W WO 2006115913 A2 WO2006115913 A2 WO 2006115913A2
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- data transmission
- cable
- protective layer
- transmission line
- line
- Prior art date
Links
- 230000005540 biological transmission Effects 0.000 title claims abstract description 89
- 239000000835 fiber Substances 0.000 claims abstract description 52
- 239000011241 protective layer Substances 0.000 claims abstract description 30
- 230000000694 effects Effects 0.000 claims abstract description 15
- 238000000034 method Methods 0.000 claims description 8
- 230000003014 reinforcing effect Effects 0.000 claims description 7
- 238000004891 communication Methods 0.000 claims description 6
- 230000004044 response Effects 0.000 claims description 6
- 230000003287 optical effect Effects 0.000 claims description 4
- 239000013307 optical fiber Substances 0.000 claims description 4
- 230000001681 protective effect Effects 0.000 claims description 4
- 230000008859 change Effects 0.000 claims description 2
- 238000001514 detection method Methods 0.000 description 2
- 238000012545 processing Methods 0.000 description 2
- 230000002159 abnormal effect Effects 0.000 description 1
- 238000005452 bending Methods 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 238000003780 insertion Methods 0.000 description 1
- 230000037431 insertion Effects 0.000 description 1
- 238000005259 measurement Methods 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 230000008569 process Effects 0.000 description 1
- 230000008439 repair process Effects 0.000 description 1
- 239000000126 substance Substances 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
- XLYOFNOQVPJJNP-UHFFFAOYSA-N water Substances O XLYOFNOQVPJJNP-UHFFFAOYSA-N 0.000 description 1
Classifications
-
- G—PHYSICS
- G02—OPTICS
- G02B—OPTICAL ELEMENTS, SYSTEMS OR APPARATUS
- G02B6/00—Light guides; Structural details of arrangements comprising light guides and other optical elements, e.g. couplings
- G02B6/44—Mechanical structures for providing tensile strength and external protection for fibres, e.g. optical transmission cables
- G02B6/4439—Auxiliary devices
- G02B6/4469—Security aspects
-
- G—PHYSICS
- G02—OPTICS
- G02B—OPTICAL ELEMENTS, SYSTEMS OR APPARATUS
- G02B6/00—Light guides; Structural details of arrangements comprising light guides and other optical elements, e.g. couplings
- G02B6/44—Mechanical structures for providing tensile strength and external protection for fibres, e.g. optical transmission cables
- G02B6/4401—Optical cables
- G02B6/4415—Cables for special applications
- G02B6/4416—Heterogeneous cables
Definitions
- This invention is directed to a secure, above-ground high-speed data transmission cable, and particularly to a cable having a data transmission line and additional surrounding fiber optic lines for security monitoring which may be routed above ground.
- Data transmission cables are routinely used to transmit highly sensitive data from one computer to another.
- multiple computers may be linked together over data transmission cables.
- the users of these computers transmit highly sensitive data relating to military operations and national security over these cables.
- an object of the present invention is to provide a secure highspeed data transmission cable protected against accessing of the cable and transmitting data, particularly when installed above ground.
- the above objectives are accomplished by providing a secure data transmission cable for electronically transmitting secure data between remote locations in an exposed condition.
- the data transmission cable comprises a tubular outer protective layer and an inner core disposed within the outer protective layer.
- a data transmission line is carried within the inner core for transmitting secure data between the remote locations.
- a fiber optic sensor line is included in the outer protective layer for detecting unauthorized activity relative to the transmission line.
- the fiber optic data transmission line may comprise a plurality of optical fibers for transmitting data between remote locations.
- a protective casing surrounds the data transmission line for protecting the fiber optic data transmission line from contacting the outer protective layer.
- the casing includes an inner and outer casing which move relative to each other to provide flexibility to the inner core.
- the sensor line may be carried within a hollow tubular strand in the outer protective layer which includes a plurality of reinforcing strands formed with the tubular strand to provide flexibility to the inner core.
- the tubular strands, which contain sensor lines, and the reinforcing strands may be metallic.
- a plurality of the tubular strands may be braided in the outer tubular braid wherein each of the tubular strands contains a fiber optic sensor line for detecting unauthorized activity relative to the transmission line.
- a secure data transmission system for securely transmitting data among remote computers connected by above-ground cables.
- a data transmission cable is provided for connecting first and second computers.
- the data transmission cable includes a data transmission line for transmitting data and a fiber optic sensor line for detecting unauthorized activity relative to the cable.
- a scanning unit is in communication with the fiber optic sensor line for continuously pulsing the sensor line to determine the status of the sensor line.
- a security computer is provided in communication with the scanning device for determining an initial baseline signal based on the initial pulse. The security computer then compares the baseline signal with a status signal determined based on a later pulse of the sensor line.
- a fault signal is generated in response to a predetermined charge in the status signal.
- An audible alarm is included for receiving the fault signal and audibly indicating the occurrence of unauthorized activity is connected to the data transmission cable.
- the scanning unit may comprise an optical time domain reflectometer (OTDR) for continuously pulsing the sensor line to determine the status of the sensor line.
- OTD optical time domain reflectometer
- the objectives are further accomplished by a computerized method for the high-speed, secure transmission of data along an accessible transmission line comprises transmitting data along a data transmission line.
- a protective layer of the cable is provided which surrounds the data transmission line having a fiber optic sensor line extending longitudinally through the protective layer.
- the sensor line is scanned to determine the status of the line. If a change in a signal transmitted along the sensor line in response to a prescribed attempt to compromise the transmission line is detected, an alarm signal is generated and transmitted to an associated alarm. The alarm is then actuated in response to the attempt to compromise the transmission line.
- Figure 1 is a schematic illustration of an embodiment of a secure fiber optic data transmission cable constructed according to the invention for connecting multiple computers and for detecting unauthorized activity relative to the cable.
- Figure 2 is a cutaway perspective view illustrating a fiber optic data transmission cable having a data transmission fiber optic line and a plurality of fiber optic security lines according to the invention
- Figure 3 is a sectional view taken along line 3-3 of Figure 2 illustrating a fiber optic data transmission cable according to the invention
- Figure 4 is a schematic view illustrating a fiber optic data transmission cable included in a computerized intrusion detection system according to the invention connecting multiple computers.
- FIG. 1 illustrates the invention in operation.
- Secure data transmission cable A connects computers 20 and 22, between which data is being transmitted.
- Computers 20 and 22 are housed in different buildings. These buildings are an environment where the burying of data transmission cables is not possible. Thus, fiber optic data transmission cable A is disposed above the ground along fence line
- the cable contains a data transmission line that allows for data to be transmitted between the computers 20 and 22.
- the cable A also contains a fiber optic sensor line which is connected to a fiber optic scanning unit 26.
- the fiber optic scanning device in a preferred embodiment is an OTDR (optical time domain reflectometer).
- the scanning unit 26 is connected to a security computer 24 with an alarm 28. Upon the detection of unauthorized activity on data transmission cable A, alarm 28 will be actuated.
- a secure data transmission cable designated generally as A, is illustrated having an outer tubular protective layer 10, and an inner core 12.
- a fiber optic data transmission line 14 is carried in the inner core extending along the length of the cable for transmitting secured data between remote locations.
- Data transmission line 14 allows for the transmission of data amongst multiple computers, phones, fax machines, and other data transmission devices.
- a fiber optic sensor line 16 extends throughout the length of protective layer 10 for protecting the transmission line.
- Data transmission line 14 includes a bundle of optical fibers for providing high- speed data transmission.
- Fiber optic data transmission line 14 is enclosed in an inner casing 17 and an outer casing 19 to protect the bundle of fibers from exposure that could compromise the data being transmitted.
- Protective casing includes inner casing 17 and outer casing 19 which are used to reinforce the strength of the inner core while allowing for bending of the cable without a loss of strength.
- the security lines may be braided around data transmission line 14 along with braided wires 17 to continuously protect fiber optic data transmission line 12 from unauthorized access along the length of the cable.
- the fiber optic sensor lines are adapted to carry signals that are used to determine the status of the sensor line. Note that in alternative embodiments, a single fiber optic sensor line may be used to protect a fiber optic data transmission line. In further embodiments, any number of fiber optic sensor lines may be included to protect data transmission line 14.
- the fiber optic sensor lines are enclosed in single cable jackets 18a, 18b, and 18c, respectively, to ensure exact measurements of the status of the sensor lines.
- These computer readable instructions may be loaded onto a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine such that the instructions will execute on a computer or other data processing apparatus to create a means for implementing the functions specified herein.
- Scan unit 26 is in communication with security computer system 24. Fault signals are generated to the security computer when a fault condition arises.
- fault condition means a condition in which sensor line 16b has been cut or damaged.
- Scan unit 26 continuously pulses sensor line 16b, in accordance with scanning instructions processed by computer 24. For example, the computer may control the scan unit to pulse the security line every four seconds.
- the scan signals are reflected back, and security computer 24 is programmed to compare the scan signals to the baseline signal to determine whether a predetermined signal (attenuation) deviation representing a fault condition has occurred.
- a fault signal is generated by the computer along with a calculation of the type of fault and location of the fault condition.
- a set of level data can be included in communication with security computer 24.
- the set of level data may be in the form of a look-up table containing attenuation levels and corresponding fault information.
- the baseline signal represents the status of the fiber optic cable being monitored at a normal or undisturbed state.
- computer 24 processes baseline initialization instructions, which signal scanning unit 26 to pulse security line 16b.
- the pulse creates a significant rise in signal level, referred to as a reflective launch spike, proceeded by some noise.
- the normal signal levels start the beginning of the baseline signal.
- the security computer continues to establish the baseline until a drop to the noise floor occurs indicating the end of the sensor line being scanned. After the drop, further noise occurs.
- the security computer will then remove a small portion at the beginning of the baseline and a small portion at the end that are merely reflections of the noise launch, and drop.
- the final baseline signal is then stored for comparison to future attenuations in the sensor line to determine if a fault has occurred.
- security computer 24 controls scanning unit 26 to continuously pulse sensor line 16b and receive back scan signals representing realtime scans. With each incoming scan signal, the security computer checks to see if any abnormal attenuations are detected. If a fault attenuation is detected, its location is compared to the baseline signal previously acquired. If the attenuation matches a pre-existing attenuation from the baseline, then the security computer will not report a fault. Any sensor line being pulsed will have some bends and attenuations in its baseline signal. A straight cable extending perfectly vertically from scanning unit 26 will be one of the few instances that no attenuations will be found in the baseline. Thus, every attenuation detected by the computer system will not indicate a fault and may simply indicate a pre-existing bend.
- Attenuations will be slight, indicating a slight movement of the cable that does not indicate a fault.
- the attenuations that most concern a user of this system will be those that show a breach or significant damage to the sensor line, and hence a fault condition. In this case, an alarm would be actuated.
- Figures 3 and 4 illustrate the alarm as being a speaker for audibly indicating the occurrence of unauthorized activity on fiber optic cable A. Note that in alternative embodiments, visual or other alarms may be used to indicate unauthorized activity.
- the location of the attenuation on the signal will correspond to a location on the sensor line where a breach may have occurred.
- the security computer 24 would be able to display the location of the breach on an associated map by associating the attenuation in the signal with a breach in the barricade cable. This operation is described more fully in U.S. Patent Application Serial No.: 11/083,038, filed on March 17, 2005, and corresponding PCT Application PCT/US/2005/40079, filed November 4, 2005, herein incorporated by reference.
- an advantageous secure above-ground fiber optic data transmission cable can be had according to the invention using a central fiber optic data transmission line and at least one fiber optic security line.
- the cable is monitored according to the invention to provide for secure data transmission.
Landscapes
- Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Physics & Mathematics (AREA)
- Optics & Photonics (AREA)
- Insulated Conductors (AREA)
- Burglar Alarm Systems (AREA)
- Communication Cables (AREA)
Abstract
The invention consists of a secure data transmission cable for electronically transmitting secure data between remote locations. The data transmission cable comprises a tubular outer protective layer (10), an inner core (12) disposed within the outer protective layer, a data transmission line (14) carried within the inner core for transmitting secure data between the remote locations, and a fiber optic sensor line (16) included in the outer protective layer for detecting unauthorized activity related to the transmission line.
Description
Secure Transmission Cable
Field Of The Invention Cross Reference To Related Application
This application claims the priority and benefit of co-pending Provisional Application, Serial No. 60/673,699, filed on April 21 , 2005, entitled Secure Above Ground Fiber Optic Data Transmission Cable; PCT Application Serial No. PCT/US/2005/40080, filed November 4, 2005, entitled Apparatus and Method for A Computerized Fiber Optic Security System; co-pending U.S. Application Serial No. 11/083,038, filed March 17, 2005, entitled Apparatus and Method for A Computerized Fiber Optic Security System; PCT Application Serial No. PCT/US/2005/40079, filed November 4, 2005, entitled Vehicle Denial Security System; U.S. Provisional Application Serial No. 60/626,197, filed November 9, 2004, entitled Vehicle Denial Security System; PCT Application Serial No. PCT/US/2004/013494, filed May 3, 2004, entitled Fiber Optic Security System for Sensing the Intrusion of Secured Locations; U.S. Application Serial No. 10/429,602, filed May 5, 2003, entitled Fiber Optic Security System for Sensing the Intrusion of Secured Locations; and U.S. Provisional Application No. 60/456,687, filed March 15, 2003, entitled Fiber Optic Security System for Sensing the Intrusion of Secured Locations; all of the above applications being incorporated herein by reference in their entireties.
Background Of The Invention
This invention is directed to a secure, above-ground high-speed data transmission cable, and particularly to a cable having a data transmission line and additional surrounding fiber optic lines for security monitoring which may be routed above ground. Data transmission cables are routinely used to transmit highly sensitive data from one computer to another. For example, within a military facility, multiple computers may be linked together over data transmission cables. The users of these computers transmit highly sensitive data relating to military operations and national security over these cables. There exists a need to monitor the cables so as to avoid any interception and theft of the highly sensitive data transmitted on them. For this reason, the cables used in these military facilities are often limited as to their length, as they cannot be monitored over vast lengths.
It is of particular importance to monitor any cables that are above-ground as they are easier to access than buried cables. For a variety of reasons, it is advantageous in certain situations to have data transmission cables above-ground rather than buried. These cables must be monitored to ensure that the data being transmitted over them is not being intercepted by another party. Attempts have been made to monitor fiber optic cables in the past. These attempts have been limited to determining if the cable has been damaged. U.S. Patent Application Publication 2004/0146254 discloses the insertion of an indicator that can be visually seen when the cable has been degraded. While this
allows for repair of a damaged cable, it does nothing for securing the underlying fiber optic data transmission cable and data.
Other attempts have been directed toward cables that are buried under water. These cables must be monitored for damage internally as viewing a cable buried under the ocean is extremely difficult. For example, U.S. Patent 4,623,218 discloses the use of electrical leads within the cables that complete a circuit to send a signal indicating that the electrical leads have not been damaged. Once the electrical leads that surround the fiber optic data transmission cable are damaged, the circuit that they complete is broken, and this indicates to an observer that damage has occurred to the cable. This allows cables that have already been damaged to be repaired. Accordingly, an object of the present invention is to provide a secure highspeed data transmission cable protected against accessing of the cable and transmitting data, particularly when installed above ground.
Summary Of The Invention The above objectives are accomplished by providing a secure data transmission cable for electronically transmitting secure data between remote locations in an exposed condition. The data transmission cable comprises a tubular outer protective layer and an inner core disposed within the outer protective layer. A data transmission line is carried within the inner core for transmitting secure data between the remote locations. A fiber optic sensor line is included in the outer protective layer for detecting unauthorized activity relative to the transmission line.
The fiber optic data transmission line may comprise a plurality of optical fibers for transmitting data between remote locations. A protective casing surrounds the data transmission line for protecting the fiber optic data transmission line from contacting the outer protective layer. The casing includes an inner and outer casing which move relative to each other to provide flexibility to the inner core. The sensor line may be carried within a hollow tubular strand in the outer protective layer which includes a plurality of reinforcing strands formed with the tubular strand to provide flexibility to the inner core. The tubular strands, which contain sensor lines, and the reinforcing strands may be metallic. A plurality of the tubular strands may be braided in the outer tubular braid wherein each of the tubular strands contains a fiber optic sensor line for detecting unauthorized activity relative to the transmission line.
The objectives are further accomplished by a secure data transmission system for securely transmitting data among remote computers connected by above-ground cables. A data transmission cable is provided for connecting first and second computers. The data transmission cable includes a data transmission line for transmitting data and a fiber optic sensor line for detecting unauthorized activity relative to the cable. A scanning unit is in communication with the fiber optic sensor line for continuously pulsing the sensor line to determine the status of the sensor line. A security computer is provided in communication with the scanning device for determining an initial baseline signal based on the initial pulse. The security computer then compares the baseline signal with a status signal determined based on a later pulse of the sensor line. A fault signal is generated in response to a
predetermined charge in the status signal. An audible alarm is included for receiving the fault signal and audibly indicating the occurrence of unauthorized activity is connected to the data transmission cable. The scanning unit may comprise an optical time domain reflectometer (OTDR) for continuously pulsing the sensor line to determine the status of the sensor line. The objectives are further accomplished by a computerized method for the high-speed, secure transmission of data along an accessible transmission line comprises transmitting data along a data transmission line. A protective layer of the cable is provided which surrounds the data transmission line having a fiber optic sensor line extending longitudinally through the protective layer. The sensor line is scanned to determine the status of the line. If a change in a signal transmitted along the sensor line in response to a prescribed attempt to compromise the transmission line is detected, an alarm signal is generated and transmitted to an associated alarm. The alarm is then actuated in response to the attempt to compromise the transmission line. Description Of The Drawings
The construction designed to carry out the invention will hereinafter be described, together with other features thereof. The invention will be more readily understood from a reading of the following specification and by reference to the accompanying drawings forming a part thereof, wherein an example of the invention is shown and wherein:
Figure 1 is a schematic illustration of an embodiment of a secure fiber optic data transmission cable constructed according to the invention for connecting multiple computers and for detecting unauthorized activity relative to the cable.
Figure 2 is a cutaway perspective view illustrating a fiber optic data transmission cable having a data transmission fiber optic line and a plurality of fiber optic security lines according to the invention;
Figure 3 is a sectional view taken along line 3-3 of Figure 2 illustrating a fiber optic data transmission cable according to the invention;
Figure 4 is a schematic view illustrating a fiber optic data transmission cable included in a computerized intrusion detection system according to the invention connecting multiple computers.
Description Of A Preferred Embodiment
Referring now to the drawings, an illustrative embodiment of the invention will be described in more detail.
Figure 1 illustrates the invention in operation. Secure data transmission cable A connects computers 20 and 22, between which data is being transmitted.
Computers 20 and 22 are housed in different buildings. These buildings are an environment where the burying of data transmission cables is not possible. Thus, fiber optic data transmission cable A is disposed above the ground along fence line
30 connecting computers 20 and 22. As the cable is disposed above-ground, it is advantageous for it to have the structure as described above for providing secured data transmission between computers 20 and 22. The cable contains a data
transmission line that allows for data to be transmitted between the computers 20 and 22. The cable A also contains a fiber optic sensor line which is connected to a fiber optic scanning unit 26. The fiber optic scanning device in a preferred embodiment is an OTDR (optical time domain reflectometer). The scanning unit 26 is connected to a security computer 24 with an alarm 28. Upon the detection of unauthorized activity on data transmission cable A, alarm 28 will be actuated.
As can best be seen in Figures 2 and 3, a secure data transmission cable, designated generally as A, is illustrated having an outer tubular protective layer 10, and an inner core 12. A fiber optic data transmission line 14 is carried in the inner core extending along the length of the cable for transmitting secured data between remote locations. Data transmission line 14 allows for the transmission of data amongst multiple computers, phones, fax machines, and other data transmission devices. A fiber optic sensor line 16 extends throughout the length of protective layer 10 for protecting the transmission line.
Data transmission line 14 includes a bundle of optical fibers for providing high- speed data transmission. Fiber optic data transmission line 14 is enclosed in an inner casing 17 and an outer casing 19 to protect the bundle of fibers from exposure that could compromise the data being transmitted. Protective casing includes inner casing 17 and outer casing 19 which are used to reinforce the strength of the inner core while allowing for bending of the cable without a loss of strength. Preferably, there are three sensor lines, fiber optic sensor lines 16a, 16b and
16c, included in outer protective layer 10. The security lines may be braided around
data transmission line 14 along with braided wires 17 to continuously protect fiber optic data transmission line 12 from unauthorized access along the length of the cable. The fiber optic sensor lines are adapted to carry signals that are used to determine the status of the sensor line. Note that in alternative embodiments, a single fiber optic sensor line may be used to protect a fiber optic data transmission line. In further embodiments, any number of fiber optic sensor lines may be included to protect data transmission line 14. The fiber optic sensor lines are enclosed in single cable jackets 18a, 18b, and 18c, respectively, to ensure exact measurements of the status of the sensor lines.
The detailed description that follows may be presented in terms of steps of methods or in program procedures executed on a computer or network of computers. These procedural descriptions are representations used by those skilled in the art to most effectively convey the substance of their work to others skilled in the art. These steps require physical manipulations of physical quantities such as electrical or optical signals capable of being stored, transferred, combined, compared, or otherwise manipulated. A computer readable medium can be included that is designed to perform a specific task or tasks. Actual computer or executable code or computer readable code may not be contained within one file or one storage medium but may span several computers or storage mediums.
These computer readable instructions may be loaded onto a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine such that the instructions will execute on a computer
or other data processing apparatus to create a means for implementing the functions specified herein.
Scan unit 26 is in communication with security computer system 24. Fault signals are generated to the security computer when a fault condition arises. As used herein, "fault condition" means a condition in which sensor line 16b has been cut or damaged. Scan unit 26 continuously pulses sensor line 16b, in accordance with scanning instructions processed by computer 24. For example, the computer may control the scan unit to pulse the security line every four seconds.
The scan signals are reflected back, and security computer 24 is programmed to compare the scan signals to the baseline signal to determine whether a predetermined signal (attenuation) deviation representing a fault condition has occurred. In the event the fault condition is detected, a fault signal is generated by the computer along with a calculation of the type of fault and location of the fault condition. A set of level data can be included in communication with security computer 24. The set of level data may be in the form of a look-up table containing attenuation levels and corresponding fault information.
When security computer 24 begins operation, a baseline signal must be established. The baseline signal represents the status of the fiber optic cable being monitored at a normal or undisturbed state. Initially, computer 24 processes baseline initialization instructions, which signal scanning unit 26 to pulse security line 16b. The pulse creates a significant rise in signal level, referred to as a reflective launch spike, proceeded by some noise. The normal signal levels start the beginning of the
baseline signal. The security computer continues to establish the baseline until a drop to the noise floor occurs indicating the end of the sensor line being scanned. After the drop, further noise occurs. The security computer will then remove a small portion at the beginning of the baseline and a small portion at the end that are merely reflections of the noise launch, and drop. The final baseline signal is then stored for comparison to future attenuations in the sensor line to determine if a fault has occurred.
During the operation, security computer 24 controls scanning unit 26 to continuously pulse sensor line 16b and receive back scan signals representing realtime scans. With each incoming scan signal, the security computer checks to see if any abnormal attenuations are detected. If a fault attenuation is detected, its location is compared to the baseline signal previously acquired. If the attenuation matches a pre-existing attenuation from the baseline, then the security computer will not report a fault. Any sensor line being pulsed will have some bends and attenuations in its baseline signal. A straight cable extending perfectly vertically from scanning unit 26 will be one of the few instances that no attenuations will be found in the baseline. Thus, every attenuation detected by the computer system will not indicate a fault and may simply indicate a pre-existing bend. Further, some attenuations will be slight, indicating a slight movement of the cable that does not indicate a fault. The attenuations that most concern a user of this system will be those that show a breach or significant damage to the sensor line, and hence a fault condition. In this case, an alarm would be actuated. Figures 3 and 4 illustrate the alarm as being a speaker for
audibly indicating the occurrence of unauthorized activity on fiber optic cable A. Note that in alternative embodiments, visual or other alarms may be used to indicate unauthorized activity. The location of the attenuation on the signal will correspond to a location on the sensor line where a breach may have occurred. Thus, the security computer 24 would be able to display the location of the breach on an associated map by associating the attenuation in the signal with a breach in the barricade cable. This operation is described more fully in U.S. Patent Application Serial No.: 11/083,038, filed on March 17, 2005, and corresponding PCT Application PCT/US/2005/40079, filed November 4, 2005, herein incorporated by reference.
Thus, it can be seen that an advantageous secure above-ground fiber optic data transmission cable can be had according to the invention using a central fiber optic data transmission line and at least one fiber optic security line. The cable is monitored according to the invention to provide for secure data transmission.
While a preferred embodiment of the invention has been described using specific terms, such description is for illustrative purposes only and it is to be understood that changes and variations may be made without departing from the spirit or scope of the following claims.
Claims
1. A secure data transmission cable for electronically transmitting secure data between remote locations in an exposed condition comprising: a tubular outer protective layer; an inner core disposed within said outer protective layer; a data transmission line extending longitudinally within said inner core for transmitting secure data between said remote locations; and a fiber optic sensor line extending longitudinally in said outer protective layer for detecting unauthorized activity relative to said transmission line.
2. The cable of claim 1 wherein said fiber optic data transmission line comprises a plurality of optical fibers for transmitting data between remote locations.
3. The cable of claim 1 wherein said fiber optic sensor line comprises a plurality of optical fibers for detecting unauthorized activity relative to said transmission line.
4. The cable of claim 1 further comprising: a protective casing surrounding said data transmission line for protecting said data transmission line and preventing contact with said outer protective layer.
5. The cable of claim 4 wherein said casing includes an inner casing and an outer casing, and said inner and outer casings moving relative to each other to provide flexibility to said inner core.
6. The cable of claim 1 wherein said sensor line is carried within a hollow tubular strand, and said outer protective layer includes a plurality of reinforcing strands formed together with said tubular strand to provide said outer protective layer.
7. The cable of claim 6 wherein said tubular strand and said reinforcing strands are metallic.
8. The cable of claim 6 including a plurality of said tubular strands included in said outer protective layer wherein each of said tubular strands contains a sensor line.
9. The cable of claim 6 wherein said reinforcing strands and said tubular strand containing said sensor line are braided together to form an outer tubular braid providing said outer protective layer.
10. The cable of claim 9 including a plurality of said tubular strands braided in said outer tubular braid wherein each of said tubular stands contains a fiber optic sensor line for detecting unauthorized activity relative to said transmission line.
11. The cable of claim 8 wherein said tubular strands and said reinforcing strands are metallic.
12. A secure data transmission system for securely transmitting data among remote computers connected by an above-ground cable comprising: a data transmission cable connecting first and second computers, said data transmission cable including a data transmission line for transmitting data and a fiber optic sensor line extending generally longitudinally with said data transmission line along the length of said cable for detecting unauthorized activity relative to said cable; a scanning unit in communication with said fiber optic sensor line for continuously pulsing said sensor line to determine the status of said sensor line; and a security computer in communication with said scanning device for determining an initial baseline signal based on said initial pulse, comparing said baseline signal with a status signal determined based on a later pulse of said sensor line, generating a fault signal in response to a predetermined charge in the status signal.
13. The secure data transmission system of claim 12 wherein said data transmission cable comprises: a tubular outer protective layer; an inner core disposed within said outer protective layer; a data transmission line carried within said inner core for transmitting secure data between said remote locations; and a fiber optic sensor line included in said outer protective layer, extending generally longitudinally with said data transmission line along the length of said cable, for detecting unauthorized activity relative to said transmission line.
14. The system of claim 13 further comprising: a protective casing surrounding said data transmission line for protecting said data transmission line and preventing contact with said outer protective layer.
15. The system of claim 14 wherein said casing includes an inner casing and an outer casing, and said inner and outer casings moving relative to each other to provide flexibility to said inner core.
16. The system of claim 13 wherein said sensor line is carried within a hollow tubular strand, and said outer protective layer includes a plurality of reinforcing strands formed together with said tubular strand to provide said outer protective layer.
17. The system of claim 16 including a plurality of said tubular strands included in said outer protective layer wherein each of said tubular strands contains a sensor line.
18. The secure data transmission system of claim 12 further comprising an audible alarm for receiving the fault signal and audibly indicating the occurrence of unauthorized activity.
19. The secure data transmission system of claim 12 wherein said scanning unit comprises an optical time domain reflectometer for continuously pulsing said sensor line to determine the status of said sensor line.
20. A computerized method for the high-speed, secure transmission of data along an accessible transmission line comprising: transmitting data along a data transmission line; providing a protective layer surrounding said data transmission line having a fiber optic sensor line extending longitudinally through said protective layer; scanning said sensor line to determine the status of said line; detecting a change in a signal transmitted along said sensor line in response to a prescribed attempt to compromise said transmission line; and generating an alarm signal in response to said attempt to compromise said transmission line.
21. The method of claim 20 further comprising the step of transmitting the alarm signal to an associated alarm.
22. The method of claim 20 further comprising the step of actuating the alarm to indicate an attempt to compromise the cable.
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/655,433 US7782196B2 (en) | 2003-05-03 | 2007-01-19 | Entrance security system |
US11/975,803 US7755027B2 (en) | 2005-04-21 | 2007-10-22 | Secure transmission cable having windings continuously laid in opposite directions |
US12/448,988 US8514076B2 (en) | 2003-05-03 | 2008-01-22 | Entrance security system |
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US67369905P | 2005-04-21 | 2005-04-21 | |
US60/673,699 | 2005-04-21 | ||
PCT/US2005/040080 WO2006052777A2 (en) | 2004-11-09 | 2005-11-04 | Apparatus and method for a computerized fiber optic security system |
PCT/US2005/040079 WO2006052776A2 (en) | 2004-11-09 | 2005-11-04 | Vehicle denial security system |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2005/040080 Continuation-In-Part WO2006052777A2 (en) | 2003-05-03 | 2005-11-04 | Apparatus and method for a computerized fiber optic security system |
Related Child Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/655,433 Continuation-In-Part US7782196B2 (en) | 2003-05-03 | 2007-01-19 | Entrance security system |
US11/975,803 Continuation-In-Part US7755027B2 (en) | 2005-04-21 | 2007-10-22 | Secure transmission cable having windings continuously laid in opposite directions |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2006115913A2 true WO2006115913A2 (en) | 2006-11-02 |
WO2006115913A3 WO2006115913A3 (en) | 2007-07-19 |
Family
ID=37215242
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2006/014601 WO2006115913A2 (en) | 2003-05-03 | 2006-04-19 | Secure transmission cable |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO2006115913A2 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2928523A4 (en) * | 2012-12-10 | 2016-08-03 | Bigfoot Biomedical Inc | Infusion pump system and method |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4217488A (en) * | 1977-01-21 | 1980-08-12 | Bell Telephone Laboratories, Incorporated | Secure optical communication components, method, and system |
US6236789B1 (en) * | 1999-12-22 | 2001-05-22 | Pirelli Cables And Systems Llc | Composite cable for access networks |
-
2006
- 2006-04-19 WO PCT/US2006/014601 patent/WO2006115913A2/en active Application Filing
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4217488A (en) * | 1977-01-21 | 1980-08-12 | Bell Telephone Laboratories, Incorporated | Secure optical communication components, method, and system |
US6236789B1 (en) * | 1999-12-22 | 2001-05-22 | Pirelli Cables And Systems Llc | Composite cable for access networks |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2928523A4 (en) * | 2012-12-10 | 2016-08-03 | Bigfoot Biomedical Inc | Infusion pump system and method |
US10232108B2 (en) | 2012-12-10 | 2019-03-19 | Bigfoot Biomedical, Inc. | Infusion pump system and method |
US11191891B2 (en) | 2012-12-10 | 2021-12-07 | Bigfoot Biomedical, Inc. | Infusion pump system and method |
Also Published As
Publication number | Publication date |
---|---|
WO2006115913A3 (en) | 2007-07-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7755027B2 (en) | Secure transmission cable having windings continuously laid in opposite directions | |
EP1591816A1 (en) | Cables and cable installations | |
EP2499465B1 (en) | Fibre optic distributed sensing | |
US7536102B1 (en) | Method and apparatus for fiber optic fault locating and mapping | |
US7257280B1 (en) | Method and apparatus for monitoring the security of an optical cablelink during installation | |
WO2019172276A1 (en) | Optical fiber monitoring method, and optical fiber monitoring system | |
US7782196B2 (en) | Entrance security system | |
US7800047B2 (en) | Apparatus and method for a computerized fiber optic security system | |
US9389271B2 (en) | Security system for underground conduit | |
US8514076B2 (en) | Entrance security system | |
CN112798051A (en) | External cable state monitoring system and method based on fiber bragg grating sensing technology | |
WO2006115913A2 (en) | Secure transmission cable | |
CN106448898A (en) | Cable, cable detection device, detection system and cable detection method | |
US6924428B1 (en) | Damage prevention system for cables, pipelines and the like | |
US9547146B2 (en) | Tamper sensitive fiber optic cable | |
WO2006052776A2 (en) | Vehicle denial security system | |
US20240045163A1 (en) | Hybrid telecommunication cable | |
KR20150012758A (en) | Monitoring system for installing submarine cable and monitoring method for installing submarine cable | |
KR102652011B1 (en) | Cable Tube using fiber bragg grating sensor | |
US10755837B1 (en) | Cable with fiber optic sensor elements | |
JPH07320552A (en) | Cable having function of detecting external flaw and detecting system thereof | |
Bogachkov et al. | Methods and Means of Ensuring Information Security in Fiber-Optic Communication Lines | |
CN205920805U (en) | Detection device and detecting system of cable, cable | |
KR20230082810A (en) | Submarine Optical Cable and Subsea Optical Cable Abnormality Detection Device using the same | |
WO2007019158A2 (en) | Intrusion resistant passive fiber optic components |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
NENP | Non-entry into the national phase |
Ref country code: DE |
|
NENP | Non-entry into the national phase |
Ref country code: RU |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 06750603 Country of ref document: EP Kind code of ref document: A2 |