The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Jan. 10, 2006

Filed:

May. 19, 2003
Applicants:

James R. Jamieson, Savage, MN (US);

Mark D. Ray, Burnsville, MN (US);

Inventors:

James R. Jamieson, Savage, MN (US);

Mark D. Ray, Burnsville, MN (US);

Assignee:

Rosemount Aerospace Inc., Burnsville, MN (US);

Attorneys:
Primary Examiner:
Assistant Examiner:
Int. Cl.
CPC ...
G01C 3/08 (2006.01); G01C 1/00 (2006.01); G01B 11/26 (2006.01);
U.S. Cl.
CPC ...
Abstract

A method of laser scanning a perimeter zone of a target site for the detection of potential threats comprises: scanning a pulsed laser beam across the perimeter zone; receiving echoes from the pulsed laser beam during the perimeter zone scan; deriving range data corresponding to the received echoes; determining position data of the received echoes in the perimeter zone; forming a scene image of a scan of the perimeter zone based on the range and position data of the received echoes thereof; repeating the steps of scanning, receiving, deriving, determining and forming for a plurality of perimeter zone scans to form scene images of each scan of the plurality; and comparing scene images of the plurality to detect a potential threat in the perimeter zone. In addition, a method of authenticating a potential threat detected in a perimeter zone of a target site comprises: detecting the potential threat and upon detection, interrogating the potential threat for a response by a wireless transmission; declaring the potential threat unauthorized if no response is transmitted wirelessly within a predetermined time interval from the interrogation; receiving the response, if transmitted, and determining if the response comprises a proper access code; and declaring the potential threat unauthorized if the received response is determined not to comprise the proper access code.


Find Patent Forward Citations

Loading…