-
公开(公告)号:CA2526075C
公开(公告)日:2012-07-03
申请号:CA2526075
申请日:2004-05-07
Applicant: ROSEMOUNT AEROSPACE INC
Inventor: RAY MARK D , JAMIESON JAMES R
IPC: G01S17/42 , G01S7/48 , G01S7/481 , G01S13/78 , G01S13/86 , G01S17/02 , G01S17/58 , G01S17/66 , G01S17/74 , G01S17/89
Abstract: A method of laser scanning a perimeter zone of a target site for the detection of potential threats comprises: scanning a pulsed laser beam across the perimeter zone; receiving echoes from the pulsed laser beam and forming for a plurality of perimeter zone scans to form scene images. In addition, a method of authenticating a potential threat detected in a perimeter zone of a target site comprises: detecting the potential threat, interrogating the potential threat by a wireless transmission; declaring the potential threat unauthorized if no response is transmitted within a predetermined time interval or if the received response is determined not to comprise the proper access code.
-
公开(公告)号:FR2869114B1
公开(公告)日:2009-11-13
申请号:FR0503804
申请日:2005-04-15
Applicant: ROSEMOUNT AEROSPACE INC
Inventor: JAMIESON JAMES R , HALAMA GARY E , MENEELY CLINTON T
-
公开(公告)号:AU2007203608B2
公开(公告)日:2009-07-23
申请号:AU2007203608
申请日:2007-08-02
Applicant: ROSEMOUNT AEROSPACE INC
Inventor: JAMIESON JAMES R , MENEELY CLINTON T , RAY MARK D
-
公开(公告)号:AU2002318268B2
公开(公告)日:2007-08-30
申请号:AU2002318268
申请日:2002-07-18
Applicant: ROSEMOUNT AEROSPACE INC
Inventor: JAMIESON JAMES R , MENELLY CLINTON T , RAY MARK D
IPC: B64D45/00 , B64C27/00 , B64D43/00 , B64D45/08 , G01C23/00 , G01P5/26 , G01S7/48 , G01S7/481 , G01S7/483 , G01S17/06 , G01S17/42 , G01S17/58 , G01S17/87 , G01S17/88 , G01S17/93 , G02B27/01
Abstract: A block arrangement of optical elements is provided for use as a transmitter/receiver for a light detection and ranging (LIDAR) system. The block arrangement comprises: a plurality of glass modules aligned together as a block to form a plurality of optical paths therein and secured together to maintain said alignment; a collimated light source secured to said block for generating a coherent beam of light over at least one optical path in said block which guides said coherent beam of light to an exit point of said block; and a light detector secured to said block. The block serves for receiving a return coherent beam of light and is configured to conduct said return coherent beam of light to the light detector over at least one other optical path formed in said block.
-
公开(公告)号:CA2526075A1
公开(公告)日:2004-12-02
申请号:CA2526075
申请日:2004-05-07
Applicant: ROSEMOUNT AEROSPACE INC
Inventor: RAY MARK D , JAMIESON JAMES R
IPC: G01S17/42 , G01S7/48 , G01S7/481 , G01S13/78 , G01S13/86 , G01S17/02 , G01S17/58 , G01S17/66 , G01S17/74 , G01S17/89
Abstract: A method of laser scanning a perimeter zone of a target site for the detecti on of potential threats comprises: scanning a pulsed laser beam across the perimeter zone; receiving echoes from the pulsed laser beam and forming for a plurality of perimeter zone scans to form scene images. In addition, a metho d of authenticating a potential threat detected in a perimeter zone of a targe t site comprises: detecting the potential threat, interrogating the potential threat by a wireless transmission; declaring the potential threat unauthoriz ed if no response is transmitted within a predetermined time interval or if the received response is determined not to comprise the proper access code.
-
公开(公告)号:AU2004242390A1
公开(公告)日:2004-12-02
申请号:AU2004242390
申请日:2004-05-07
Applicant: ROSEMOUNT AEROSPACE INC
Inventor: RAY MARK D , JAMIESON JAMES R
IPC: G01S7/48 , G01S7/481 , G01S13/78 , G01S13/86 , G01S17/02 , G01S17/42 , G01S17/58 , G01S17/66 , G01S17/74 , G01S17/89
Abstract: A method and system are provided for authenticating a potential threat detected in a perimeter zone of a target site. The method comprises the steps of: detecting a potential threat in the perimeter zone of the target site; upon detection, interrogating said potential threat for a response by a wireless transmission; declaring the potential threat unauthorised if no response is transmitted wirelessly within a predetermined time interval from said interrogation; receiving said response if transmitted, and determining if the response comprises a proper access code; and declaring the potential threat unauthorised if the received response is determined not to comprise a proper access code.
-
-
-
-
-