METHOD AND APPARATUS FOR PROTECTING FIBER OPTIC DISTRIBUTION SYSTEMS
20170078043 ยท 2017-03-16
Inventors
Cpc classification
G02B6/4446
PHYSICS
International classification
G02B6/44
PHYSICS
Abstract
A fiber optic network has alarmed fiber optic lines in the cables connecting a secured junction box to plural user lock boxes. An outgoing alarm line and return alarm line in each cable connect the junction box to each user box. The outgoing alarm line is looped to the return alarm line inside the user lock box. The return alarm line is looped to the outgoing alarm line of a different cable inside the junction box to interconnect a plurality of alarm lines passing through a plurality of user boxes. A detector detects an alarm signal in the connected alarm lines to trigger an intrusion alarm.
Claims
1. A protective distribution system with alarmed, interlocking armored fiber optic cables, comprising: a distribution panel in a secured location, at least a first interlocking armored fiber optic cable connected to the distribution and carrying a fiber optic outgoing alarm line and fiber optic return alarm line to transmit alarm signals, and least one data line that is not connected to encryption devices or software and transmitting data that is not encrypted; a secured junction box connected to the first fiber optic cable and having a plurality of interlocking armored, outgoing fiber optic cables each connected to the junction box at one end of each cable and connected to a different secured user lock box at the other end of the each cable so as to transmit data through the outgoing fiber optic cables; at least a selected group of the plurality of outgoing fiber optic cables each having a fiber optic data transfer line transmitting the non-encrypted data, and in addition the fiber optic outgoing alarm line and fiber optic return alarm line to transmit alarm signals, the selected group containing at least a first cable with a first outgoing alarm line and a first return alarm line and a last cable having a last outgoing alarm line and a last return alarm line; a jumper in each user lock box that is connected to the selected group of fiber optic cables, the jumper looping the outgoing alarm line to the return alarm line contained within the same cable connected to that user lock box so an alarm signal can pass from the outgoing line to the return line; at least one jumper in the secured junction box connecting the return alarm line of the first cable within the selected group to the outgoing alarm line of another cable within the selected group to form a continuous fiber optic path of connected alarm lines through the secured user boxes associated with the first cable and said another cable until the last return alarm line is in fiber optic communication with the first outgoing alarm line; and a detector in communication with the least the return alarm line which is in fiber optic communication with the return alarm line at the distribution panel, the detector configured to detect an alarm signal in the continuous fiber optic path of connected alarm lines.
2. The system of claim 1, wherein the secured user lock box contains at least one of an outgoing alarm line and a return alarm line that encircles a substantial portion of the user lock box.
3. The system of claim 1, wherein the secured user lock box is connected to a passive optical network.
4. The system of claim 1, further including a further plurality of cables in the selected group of cables which further plurality of cables pass through a wall of the junction box and also pass through a wall of the user lock box, comprising: at least one connector adhered to each cable in the further plurality of cables and adhered at the location where each cable passes through the wall of the junction box or the wall of the user lock box and connected to the wall at that location, each connector having a hole through which the cable to which the connector is adhered passes, each connector having two spaced apart and parallel flanges on at least two sides of the connector with a portion of each wall or a restraining portion connected to each wall fitting between the flanges of the connector to restrain movement of the connector along a length of the cable at the location of the connector.
5. The system of claim 1, wherein the alarm detector and control panel are in a telecommunications room.
6. The system of claim 1, wherein the secure junction box and secure user lock box meet all U.S. Air Force AFI33-201 VS mandatory requirements for protective distribution systems.
7. The system of claim 1, wherein the distribution panel, junction box and all of the secured user lock boxes are on the same floor of a building.
8-11. (canceled)
12. A method for alarming interlocking armored fiber optic cables in a protective distribution system having a fiber optic distribution panel in fiber optic communication with at least one secured junction box through an interlocking armored fiber optic cable, the junction box having at least one interlocking armored fiber optic input cable and further having a plurality of outgoing interlocking armored fiber optic cables each connected to the junction box and each connected to a different secured user lock box to transmit data through the fiber optic cables, comprising: providing at least a selected group of the plurality of cables each having an optical fiber data transfer line, and further having a fiber optic outgoing alarm line and a fiber optic return alarm line to transmit alarm signals within each of the selected group of cables; within each user lock box connected to the selected group of cables, looping the outgoing alarm line to the return alarm line contained within the same cable connected to that user lock box; forming a continuous fiber optic path of connected alarm lines by connecting the return alarm line of a first cable within the selected group to the outgoing alarm line of another cable within the selected group, the connecting occurring within the secure junction box, and also connecting the outgoing alarm line to the return alarm line within the secure user lock box connected to the cable carrying both the outgoing and return alarm lines that are joined in the secure user lock box; and connecting at least the return alarm line from a last one of the selected group of cables to a detector to detect an alarm signal in the continuous fiber optic path of connected alarm lines.
13. The method of claim 12, wherein a further plurality of cables in the selected group of cables each pass through a wall of the junction box and also pass through a wall of the user lock box, the method further comprising: adhering at least one connector to each cable in the further plurality of cables at the location where each cable passes through the wall of the junction box or the wall of the user lock box, each connector encircling the cable to which it is adhered and each connector having two spaced apart and parallel flanges on at least two sides of the connector; fastening the connectors to the wall through which the cable adhered to the connector passes, the fastening achieved by having the wall or a restraining member connected to the junction box or user box fit between the flanges of the connector to restrain movement of the connector along a length of the cable at the location of the connector.
14. The method of claim 12, wherein the detector is located in a telecommunications room and the detector sends another signal activating an intrusion alert device when the detector detects an alarm signal in the continuous fiber optic path.
15. The method of claim 12, wherein the input cable contains a fiber optic data transfer line, an outgoing alarm line and a return alarm line and wherein the method includes the step of placing that outgoing alarm line in the input cable into fiber optic communication with an outgoing alarm line in the selected group of cables, and wherein the input cable further contains a return alarm line and the method includes the step of placing that return alarm line in fiber optic communication with the return alarm line from the last of the selected group of cables.
16. The method of claim 1, wherein the outgoing alarm line and the return alarm line are in fiber optic communication with the distribution panel and wherein the secure junction box and secure user lock box meet all U.S. Air Force AFI33-201 VS mandatory requirements for protective distribution systems.
17. The method of claim 1, comprising the step of locating the distribution panel, junction box and all of the secured user lock boxes on the same floor of a building.
18. A fiber optic network having at least one secured junction box and a plurality of secured user boxes each connected to the junction box by a different interlocking armored fiber optic cable, the network comprising: a selected plurality of the fiber optic cables including at least a first cable connected to both the junction box and a first secured user box and including a last cable connected to both the junction box and a last secured user box, each of the selected plurality of cables including an outgoing fiber optic alarm line, a return fiber optic alarm line and at least one fiber optic data line; the selected plurality of the fiber optic cables further having the outgoing line being looped to connect to the return line within the secured user box that is connected to the cable such that the outgoing alarm line of the first cable connects to the return alarm line of the first cable within the first secured user box and the outgoing alarm line of the last cable connects to the return alarm line of the last cable within the last secured user box; the selected plurality of fiber optic cables further having the return alarm line connected to the outgoing line of another cable within the selected plurality of fiber optic cables, within the secured junction box, such that the return alarm line of the first cable connects to the outgoing alarm line of another cable within the selected plurality of fiber optic cables to form an interconnected fiber optic alarm line extending through the selected plurality of fiber optic cables and the user boxes associated with the selected plurality of fiber optic cables from the first cable and first user box to the last cable and last user box; and a detector in communication with the last return alarm line configured to send a signal to the outgoing alarm line and to detect an alarm signal in the last return alarm line.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
[0030] These and other advantages of the invention will be better understood in view of the following drawings and description, in which like numbers refer to like parts throughout, and in which:
[0031]
[0032]
[0033]
[0034]
[0035]
[0036]
[0037]
[0038]
[0039]
[0040]
DETAILED DESCRIPTION
[0041] Referring to
[0042] The telecommunications room provides alarm sensors or detector 11 for detecting tampering or unauthorized access to selected cores or lines in any of a plurality of fiber optic cables 26. The detector 11 activates one or more of various signals 13, including audio signals, visual signals, or laser communication signals or telecommunication signals or electronic signals in response to appropriate signals or lack of signals from the selected alarmed cores or lines within cable(s) 26. The alarmed lines are discussed in more detail below.
[0043] The fiber optic cables 26 are advantageously routed from the panel 12 to one or more secure fiber optic junction boxes 14 which in turn route fiber optic cables 26 through further fiber optic lines (e.g., 58, 59) to one or more user lock boxes 18 connected to user computer terminals 19. If desired, the cables 26 may go directly from the telecommunications room to the user lock box 18. The junction boxes 14 may use fiber optic jumpers or loopbacks to allow for the alarming or un-alarming of secret Internet protocol router networks or non-secure Internet protocol router networks for classified or unclassified data transmission when used in conjunction with a protective distribution systems 10. The protective distribution system 10 uses interlocking armored fiber optic cables 26 attaching secure junction boxes 14 to secure lock boxes 18 with the use of locking connect sleeves (
[0044] A fiber optic cable 26 experiences a signal loss that varies with the length of the cable and any bends in the cable. But signal loss is also caused by touching the cable, moving the cable and changing the light exposure of the cable. The fiber optic cables are sufficiently sensitive to changing conditions and physical contact that the cables experience a signal loss from acoustical vibrations. Thus, a person cutting the protective shielding around a fiber optic cable 26 to access the cable will cause a signal loss. Because light can travel very fast around a loop of fiber optic cable, any contact with a cable or movement of the cable or vibrations on the cable may be detected fast, and the location of the movement, contact, handling, etc. may be located along the length of the cable. The present invention thus uses pairs of fiber optic lines inside fiber optic cables 26 to alarm the cables and detect intrusions or attempts at intrusion. The detector 11 sends a signal through a fiber optic line and monitors the return signal to detect changes in the signal strength that reflect intrusions or cable movement, and that identifies the location of the intrusion along the fiber optic cable. Various detectors 11 may be used, with a detector named the Interceptor and sold by Network Integrity Systems in Hickory, North Carolina, believed suitable for use.
[0045] The cables 26 are preferably pre-terminated (i.e., connectors are attached by the manufacturer) where possible, and are advantageously armored by placing the cables inside a suitable carrier such as an interlocking armored cable, Electrical Metal Tubing (EMT), PVC pipe, or other suitable conduits meeting the security requirements of the particular application. Enclosing the fiber optic cables 26 in such armored conduits increases the sensitivity of the alarming lines because of the physical force needed to breach the conduits and reach the fiber optic lines, and because even the change in ambient light from a hole in the cable may be detected.
[0046] Referring to
[0047] The data feed 26a may contain a plurality of lines that may transfer data of differing security levels, with each data transfer line receiving differing security protections. For illustration, feed line 26a includes secure data lines 27a, 27-b and secret data lines 28a, 28b, 28c, 28d (
[0048] Each of the data lines 26a, 26b etc. is separately connected to a fiber optic patch panel 12 that is preferably rack mounted to allow multiple panel support and many connections. The fiber optic patch panel 12 connects the secure lines 26 to a fiber-to-the-premises (FTTP) network using passive optical network (PON) components. The patch panel 12 is advantageously located within or forms a wall of a secured box or facility so that access to the data lines 27, 28 and 29 are limited and require access through a tamper evident junction box. Thus, the rack mount fiber patch panel 12 connects data feeds 26 to the new or existing optical line terminal or fiber to the desk network and could also be used for alarm patching. Both classified secret Internet protocol router networks 26a and un-classified non-secure Internet protocol router network 26 are connected to the rack mount fiber patch panel 12.
[0049] Fiber optic lines 26, 27 are alarmed fiber jumper lines configured to alarm a user lock box 18. From the junction panel 12, the data feeds 26 are routed to various junction boxes throughout a floor in a building and then routed to users on that floor. If desired, the alarming of the secure data feeds 26 from the distribution panel 12 may be the same as the alarming of the junction box described below. Preferably, the patch panel 12 forms a back wall of a panel junction box 14 and the data feed(s) 26 may be fastened to the back wall in a way that forms a secure, tamper resistant and tamper evident connection with the junction box.
[0050] The alarming devise (in lines 27) is also connected to the rack mount fiber patch panel 12 and could be jumper connected to any secure junction box 14. The cables 26 may be pre-terminated (i.e., connectors are attached by the manufacturer) and have interlocking armored fiber jumper cable (
[0051] Referring to
[0052] The data feeds 26a, 26b may contain any number of fiber optic feeds, some of which are classified (27) or secure (28) or unclassified (29), with the appropriate level of fiber optic line being physically routed to the appropriate user terminal. The fiber optic lines are preferably color coded, with black fiber optic lines or connectors indicating alarming feed for patching classified users, with red fiber optic connectors indicating classified secret Internet protocol router network feed for patching classified users and with green indicating un-classified non-secure Internet protocol router network feed from the telecommunications room. Appropriate fiber optic connectors 37a-b, 38a to 38d and 39a to 39f on data lines 27a-b, 28a to 28b, and 29a to 29f, respectively, provide for connection with other fiber optic lines. The connectors 37, 38, 39 may be color coded as desired, preferably matching the wire colors, with red or black reflecting classified data line connectors and green reflecting non-classified data line connectors.
[0053] Referring to
[0054] The junction box 14 may have various shapes, and is shown with a rectangular shape having six (preferably flat) sides, with the data input feed lines 26 connected to a first end panel 42 and data output fiber optic data transfer cables 58, 59 on opposing end panel 44, with connectors 32 held in mating restraints or recesses 50 (
[0055] A locking mechanism preferably releasably holds the top 48 to the remainder of the junction box 14. Electronic locks, keyed locks, or padlocks can be used to connect the hinged top 48 to the remainder of the junction box 14. A two-part hasp 55a, 55b, each having an opening through which a padlock shank (not shown) can be inserted is shown to represent a typical locking mechanism. Any padlock is preferably a GSA authorized padlock. The hinges 52 are preferably mounted to an outer edge of the channel extending along sidewall 49b to conceal the hinges 52 inside the junction box 14 and shield the hinges from external access outside the junction box 14.
[0056] The fiber optic lines 27, 28, 29 are routed through the junction box 14 around various fiber optic guides 60 to the appropriate corresponding outlet connector 50, and corresponding outgoing lines 57, 58, 59, respectively. The fiber optic guides 60 may take various forms, but are shown as cylindrical hubs 62 having a bottom or first end fastened to the bottom 46 of the junction box 14, and an upper end or second end forming projections 62 extending outward from the hub. The curved shape of the hubs 62 is selected to be large enough to not damage the fiber optic cables as the fiber optic lines 27, 28, 29 are wound around the cable guides 60 to arrange the lines to appropriate outlet connector 50. The projections 62 keep the fiber optic cables from sliding up and off the curved hubs 62.
[0057] Supporting frames 66 are optionally fastened to the bottom 46 and/or side walls 49a, 49b to restrain the top 48 from being pushed inward toward the hubs 60, and to restrain any fiber optic cables or lines inside the junction box 14. The frames 66 are preferably made of angled channel members to allow easy threading of the fiber optic lines around the various cable guides 60 and to allow increased strength and easy fastening to the bottom 46 and sidewalls 49. The frames 66 can also be used for routing of the fiber optic cables within the junction box 14 by allowing cable bundles to be tied to various portions of the frame to support the cables and control cable location and/or cable movement.
[0058] The fiber optic lines 27, 28 and 29 are threaded around one or more of the cable guides 60 so the lines connect to the appropriate outgoing line connector 50. The lines are preferably color coded or otherwise labeled to make tracking and checking easier. Advantageously, black fiber optic connectors represent transmitting alarming feed for patching classified users, red jacketed lines 28a, 28b, 28c and connectors indicate classified secret Internet protocol router network data feed from the telecommunications room and green fiber optic connectors and lines 29a through 29d represent transmitting data feed for patching un-classified users with in junction box 14.
[0059] Referring to
[0060] If the data transmission is interrupted, as by data tampering, theft, damage or other actions affecting the data transmission through the fiber optic cable, the interruption is detected at the telecommunications office by detector 11, which preferably both sends a signal through the outgoing alarm line and receives a signal from the return line in order to identify variations in the signal strength reflecting intrusions, intrusion attempts, and the location of such intrusions or attempts along the length of the alarm lines. This detection assumes that the data transmission of one line in a cable cannot be intercepted without disrupting the signal in the accompanying alarmed lines in the same cable.
[0061] Data transfer lines 29a through 29d are routed through junction box 14 and hubs 60 to the corresponding connectors 50 for corresponding user lines 59a, 59b, 59c and 59d. Since these lines are unsecured and not alarmed, the alarm line 70 does not accompany these data transfer lines. By removing the top 48, the fiber optic connections to any specific end user or user lock box 18 can be altered to add or remove alarmed lines by looping the alarmed line 70 around the desired line going to the selected user lock box 18, or by removing the looped alarmed line from user lock box that need no longer be secured. The cables 26 connecting the junction box 14 with the user lock box 18 can be re-routed for each user lock box 18 as needed, or the alarm lines 70 can be placed in the initial cables 26 and just connected or disconnected in the junction box 14 as needed to form alarmed or non-alarmed lines.
[0062] Referring to
[0063] Functionally, the input end 86 has at least one connector for receiving a cable 26 from junction box 14. Output end 88 has at least one output connector 92 for data communication with a user device such as a computer (not shown) or for connection to a fiber optical network.
[0064] The routing of non-secured data transfer lines 29 are similar to the routing of alarmed line 28a, except no alarm lines 70aout or 70areturn accompany the non-secured data transfer lines 29. The non-secured data transfer lines 29 may pass through a user lock box 18, or not, with the fiber optic cables 59 connecting directly to the desired desk or optical network as desired.
[0065] The output connectors 92 are physically shielded by pivoted cover 94 which rotate on hinges 96 extending from or between sidewalls 84 and connected to the upper edge of cover 94. The cover 94 is shown as being sized to cover the four outlets 92 and to cover the outlet end 88. The cover 94 has an end 98 forming a U-shape in cross-section, with the hinge 96 located in this U-shaped channel. The U-shaped channel limits external access to the hinges 96. The lock box 14 is configured to limit access to only authorized personnel, via use of various locking devices including keyed locks, padlocks, or electronic locks which may be unlocked by the authorized personnel. As with the junction box 14, a two-part hasp 55a, 55b each part respectively connected to a different one of the cover 94 and lock box 18 is used with a padlock (not shown) to represent the locking mechanism. Any padlock is preferably a GSA authorized padlock. The locking mechanism and removable or rotating cover 94 limits access to the end of the fiber optic line and data connection.
[0066] Referring to
[0067] The loopback 102 may be located around an L-shaped bracket 103 (
[0068] Thus, the alarmed fiber 28/70 will loopback to the junction box 18 (
[0069] Referring to
[0070] Depending on the user classification type either red fiber optic connectors indicate classified secret Internet protocol router network users 3D and green fiber optic connectors are used to indicate un-classified Non-secure Internet protocol router network users 3C. Black fiber optic connectors are to be used for alarming feed for patching 3A. All of the patches will be terminated to the multi-plates mounted 5B within the junction box
[0071] Referring to
[0072] The flanges 114 on connector 32 can be on any opposing edges of the connector 32, top and bottom, or opposing sides, or on all four edges of the connector. The restraints 126, 118 are shaped and located to engage the flanges to restrain motion of the connector, and may extend horizontally, vertically, or at inclined angles so that the restraints for connector 32 are not limited to the specific embodiment illustrated. Since the connector 32 is fastened to the cable 26, 26, 58, 59 the cable cannot be removed from the box 14, 18 without damaging the cable, the connector 32, or the restraints 126, 118thus leaving visual damage of tampering. The connectors 32 thus allow the cables to be connected to the boxes 14, 18 and secured from movement. The bracket 115 and restraints 116, 118 form a clamping mechanism or system to hold the connectors 32 and cables in position. But the specific structure can be varied, with the restraints taking differing forms as long as they engage the connectors to restrain movement relative to the box 14, 18 to which the connectors are ultimately fastened. Because the cable extends through a preformed opening in the connector 32, the connector does not put pressure on cable or cable jacket. Moreover, because the restraints 116, 118 and bracket 115 do not abut the cable, the cables are held with no physical compression on the cables by the connection with the boxes 14, 18. Still further, the restraints 116, 118 need not compress even the connector 32, further reducing the likelihood of squeezing the fiber optic cable 16, 26, 57, 58 fastened to and held by the connector 32. Additionally, the connectors 32 and their connection to the boxes 14, 18 eliminate visual and/or mechanical access to the inside of the box 14, 18 along the path where the cables interface with the connectors and clamping system.
[0073] Referring to
[0074] A cable 16, 26, 58, 59 with a connector 32 is believed to be new and to provide useful advantages as described herein. The fiber optical cables 16, 26, 58, 59 are preferably constructed using single mode fiber cores. The cables advantageously have a jacketing material made of aluminum interlocked armored material. Advantageously, the cables have one of the connectors 32 on adjacent each opposing end of the cable, with the offset from the adjacent cable end depending on how much cable is needed for routing within junction box 14, or user lock box 18, or distribution panel 12. Typically, the connectors 32 are located from a few inches to a few feet from the end, and in some instances each connector 32 is are within about 12 inches from the adjacent end of the cable. Advantageously, the connectors are affixed to the cable with epoxy or other suitable adhesive. Preferably, heat shrink tubing is placed over the epoxied connection and over the annular shank 110 and part of the cable to which the connector 32 is fastened, and then the tubing is shrunk.
[0075] The various cable connectors used in this fiber optic system and in panel 12 or boxes 14, 18 are advantageously SC single mode Angled Physical Contact (APC) polished connectors. The pre-terminated jumpers are preferably 100% lab tested with DB loss test results provided for verification. Further, the jumpers are preferably 4 core pre-terminated and interlocked armored jumpers.
[0076] Referring again to
[0077] The interlocking armored fiber optic cables with the alarming lines and loopback features for each secured user allow the transmission of non-encrypted data to user terminals at 40 Gbps rates while meeting current government security requirements. As the capacity of fiber optic cables to carry data increases, the data transfer rate will also increase. This provides a significant improvement over the ability to carry data over copper or other metal lines, while providing the security needed for classified and other secured data transmission. Further, the ability to secure the fiber optic transmission lines without encryption significantly simplifies the system and increases the data transfer rate and the actual speed with which data may be accessed and used by the computers 19 associated with each user lock box.
[0078] The above description is given by way of example, and not limitation. Given the above disclosure, one skilled in the art could devise variations that are within the scope and spirit of the invention disclosed herein, including various ways of routing the alarm lines 70 along with the data transfer line 28 that is to be protected against intrusion. Further, the various features of the embodiments disclosed herein can be used alone, or in varying combinations with each other and are not intended to be limited to the specific combination described herein. Thus, the scope of the claims is not to be limited by the illustrated embodiments.