CROSS-REFERENCE TO RELATED APPLICATIONSApplication claims priority to Provisional Patent Application No. 61/321,317 filed Apr. 6, 2010, the complete contents of which are incorporated herein by reference.
BACKGROUND OF THE INVENTIONData is sent to computers or sent among computers by electromagnetic transmission through the air (e.g., laser or Wi-Fi), or is sent through wires (typically copper or aluminum), or is sent by fiber optic cables. The transmitted data must be protected in order to guard against intruders intercepting data as it is transmitted. The transmitted data may be encrypted, but encryption impedes potential use of the data and does not restrain the interception of the data in the first place. Encryption also requires time and equipment to encrypt the data, and to decrypt the data, thus increasing expense and causing delays in transmitting and using the data. Since data transmitted over the airways is subject to interception, data transmission over wires or optical cables provides improved resistance to interception.
There is thus a need for an improved way to monitor data transmission between computers or to computers. The U.S. Government need for security and the related development of SIPRNET, JWICS and other secure networks reflects this need for improved ways to prevent data interception or to monitor data to give an alarm when attempts are being made to intercept the transmitted data.
Protective distribution systems are used to deter, detect and/or make difficult the physical access to the communication lines carrying data, especially national security information. Approval authority, standards, and guidance for the design, installation, and maintenance for protective distribution system are stated in NSTISSI 7003. The requirements of this publication apply to U.S. government departments and agencies and further apply to contractors and vendors of these government departments and agencies. Hardened distribution protective distribution systems provide significant physical protection and are typically be implemented in three forms: Hardened Carrier protective distribution systems, alarmed carrier protective distribution systems and Continuously Viewed Carrier protective distribution systems.
In a hardened carrier protective distribution system the data cables are installed in a carrier constructed of electrical metallic tubing (electrical metallic tubing), ferrous conduit or pipe, or ridged sheet steel ducting. All of the connections of the tubing, conduit etc. in a hardened carrier system are permanently sealed around all surfaces with welds, epoxy or other such sealants. If the hardened carrier is buried under ground, to secure cables running between buildings for example, the carrier containing the cables is encased in concrete. The only way to access the data transmission lines is to break through the enclosing physical barrier, and doing so leaves signs of the intrusion which can be detected.
With a hardened carrier system, detection of attempts to intercept the transmitted data is accomplished by human inspections that are required to be performed periodically. Visual inspection requires that hardened carriers be installed below ceilings or above flooring so the physical structure enclosing the data transmission lines can be visually inspected to ensure that no intrusions have occurred. These periodic visual inspections (passive visual inspections) occur at a frequency dependent upon the level of threat to the environment, the security classification of the data being transmitted, and the access control to the area being inspected. Such inspections are costly, subject to inspection error which fails to detect intrusions, and limits the location of the data carrier.
Legacy alarmed carrier systems monitor the carrier containing the data transmission cables being protected. More advanced systems monitor the fibers within the carrier, or are made intrinsic to the carrier, with the cables being protected by turning those cables into sensors, which sensors detect intrusion attempts. But again, such systems are expensive to install, especially if the wire cables serve the dual purpose of acting as intrusion sensors while others transmit data.
Depending on the government organization, using an alarmed carrier protective distribution system in conjunction with suitable protection at cable junctions may, in some cases, allow for the elimination of the carrier systems altogether. In these instances, the cables being protected can be installed in existing conveyance mechanisms (wire basket, ladder rack) or installed in existing suspended cabling (on D-rings, J-Hooks, etc.).
A Continuously Viewed Carrier protective distribution system is one that is under continuous observation, 24 hours per day (including when operational). Viewing circuits may be grouped together to show several sections of the distribution system simultaneously, but should be separated from all non-continuously viewed circuits in order to ensure an open field of view of the needed areas. Standing orders typically include the requirement to investigate any viewed attempt to disturb the protective distribution system. Usually, appropriate security personnel are required to investigate the area of attempted penetration within 15 minutes of discovery. This type of hardened carrier is not used for Top Secret or special category information for non-U.S. Continuously viewing the data distribution system is costly and subject to human error.
Simple protective distribution systems are afforded a reduced level of physical security protection as compared to a Hardened Distribution protective distribution system. They use a simple carrier system (SCS) and the following means are acceptable under NSTISSI 7003: (1) the data cables should be installed in a carrier; (2) The carrier can be constructed of any material (e.g., wood, PVT, electrical metallic tubing, ferrous conduit); (3) the joints and access points should be secured and be controlled by personnel cleared to the highest level of data handled by the protective distribution system; and (4) the carrier is to be inspected in accordance with the requirements of NSTISSI 7003. But this approach also requires high costs, inspections, and manual inspections.
Increasing bandwidth and security demands in Local Area Networks (LAN) are leading to a shift form copper to fiber optic materials to carry the transmitted data. This increased bandwidth will also require Fiber-to-the-Desk (FTTD) as part of the required local area network. The term fiber-to-the-desk is used to describe the (usually) horizontal orientated cabling in the areas of data transmissions and telecommunication, which leads from the floor distributor to the outlets at the workplace on that floor, providing fiber-optic cable transmission to each desktop computer. In the standards ISO/IEC 11801 and EN 50173 this is the tertiary level.
In a secure fiber optic network application Tactical Local Area Network Encryption TACLANE) is a network encryption device developed by the National Security Agency (NSA) to provide network communications security on Internet Protocol (IP) and Asynchronous Transfer Mode (ATM) networks for the individual user or for enclaves of users at the same security level. Tactical local area network encryption allows users to communicate securely over legacy networks such as the Mobile Subscriber Equipment (MSE) packet network, Non-Secure Internet Protocol Router Network (NIPRINet), Secret Internet Protocol Router Network (SIPRNet), and emerging asynchronous transfer mode networks. The tactical local area network encryption limits the bandwidth of a secure fiber optic network to 1 to 10 Gb/s depending on the type network. Providing a secure alarmed protective fiber distribution system enables removing the tactical local area network encryption thereby allowing for 40 Gb/s network systems with that higher data rate provided directly to each desktop.
Approval authority, standards, and guidance for the design, installation, and maintenance for protective distribution system are provided by NSTISSI 7003 to U.S. government departments and agencies and their contractors.
The present invention uses a Protective Distribution System (PDS) solution that can provide Secure Physical Network Security Infrastructure Solution for Secure Passive Optical Network (SPON), Gigabit Passive Optical Network (GPON), and Fiber to the Desk (FTD) in Intrusion Detection of Optical Communication Systems (IDOCS) applications. The present invention can be customized to each application. The disclosed method and apparatus provide an end to end solution for Secure Passive Optical Networks (SPON), for Gigabit Passive Optical Network (GPON), and Fiber to the Desk (FTTD) is provided for Intrusion Detection of Optical Communication Systems (IDOCS) applications. This method and apparatus improves the deployment, management and protection of defense critical networks and C4ISR Facilities where open storage areas become a challenge.
While allowing the customization of Intrusion Detection of Optical Communication Systems (IDOCS)), the present method and apparatus uses fiber optic data transfer which provides improved technology over copper data transmission mechanisms where data protection is imperative and data speed necessary.
An alarmed carrier protective distribution system provides a desirable alternative to conducting human visual inspections and may be constructed to automate the inspection process through electronic monitoring with an alarm system. In an alarmed carrier protective distribution system, the carrier system is “alarmed” with specialized optical fibers deployed within the conduit for the purpose of sensing acoustic vibrations that usually occur when an intrusion is being attempted on the conduit in order to gain access to the cables. But such alarmed systems have been previously used only in main data transfer conduits between buildings or within computer centers. The present system significantly refines the application of the fiber optic alarms and applies the alarmed lines to junction boxes and user lock boxes.
An alarmed carrier protective distribution system offers several advantages over hardened carrier protective distribution system, including (1) providing continuous monitoring, day and night, throughout the year; (2) eliminating the requirement for periodic visual inspections; (3) allowing the carrier to be placed above the ceiling or below the floor or in other difficult to access locations, since passive visual inspections are not required; (4) eliminating the requirement for concrete encasement outdoors; (5) eliminating the need to lock down manhole covers; and (6) enabling rapid redeployment or modification for evolving network arrangements. While offering numerous advantages, such systems are expensive to install.
BRIEF SUMMARYA protected distributed fiber optic network is provided that allows the transmission of non-encrypted data to user terminals at 40 Gbps rates while meeting current government security requirements. The protected distribution fiber optic network has alarmed fiber optic lines in the cables connecting a secured junction box to each of a plurality of secured user lock boxes. An outgoing alarm line, a return alarm line and a data line in each cable connect the junction box to each user box. The outgoing alarm line is looped to the return alarm line of the same cable and looped inside the user lock box. The return alarm line is looped to the outgoing alarm line of a different cable inside the junction box with repeated looping in the junction box and user box interconnecting a plurality of alarm lines passing through a plurality of user boxes. A detector detects an alarm signal in the interconnected alarm lines to trigger an intrusion alarm.
An alarmed fiber optic distribution network and method is provided which include fiber distribution panels and secure fiber optic secure junction boxes. Fiber optic jumpers or loopbacks allow for the alarming or un-alarming of fiber optic lines, which lines may comprise secret Internet protocol router networks or non-secure Internet protocol router networks for classified or unclassified data transmission used in conjunction with a protective distribution systems. The protective distribution system may have interlocking armored fiber optic cable attaching to secure junction boxes and attaching to secure lock boxes through the use of locking connect sleeves that are affixed to the interlocking armored fiber optic cables and also affixed to the boxes. The interlocking armored cable has the fiber optic lines inside the interlocking armored conduit and such construction is known in the art and not described in detail herein. Such interlocking armored cable is constructed to meet government security regulations suitable for use in transmitting secret data. Tampering with the cables containing the alarmed lines results in a signal transmission to a telecommunications room or other detector, resulting in notice of the tampering, which in turn may lead to various actions depending on the nature of the security and protocol for handling security threats or breaches.
A secure and alarmed protective fiber distribution system is provided that includes locking fiber distribution cabinets in a secure telecommunications room. The telecommunications room advantageously supports an alarming system and an optional alarm patching system. Rack mounted fiber distribution panels located in the telecommunications room connect fiber optic cables to new or to existing networks, and preferably provide the secure alarmed protective fiber distribution system. The interlocking armored fiber optic cable is run from the secure telecommunications room to various locations as desired to support classified and un-classified networks with an alarm point for one or more selected users. The interlocking armored fiber optic cable is fitted with connectors. The cables are run to secure junction boxes which clamp to the connectors on the cable. These secure junction box advantageously, but optionally, are constructed to meet all U.S. Air Force AFI33-201V8 mandatory requirements for protective distribution systems, and to meet any other applicable security requirements.
The fiber optic cables extending from the secure junction box(es) may carry both the classified and un-classified lines in order to give the user the ability to make the entire network classified or any selected portions classified and alarmed or unclassified and not alarmed. From each secure junction box interlocking armored fiber optic cables extend to network users locations, with the cables having connectors that are clamped to a secure classified secure lock box. Depending on the type of network the secure lock box meets all U.S. Air Force AFI33-201V8 mandatory requirements for protective distribution systems or such other security requirements as are applicable. Depending on the type of network (i.e. passive optical network or Fiber to the Desk top fiber to the desk), a user device may be installed inside the secure lock box.
Two cores or lines in the interlocking armored fiber optic cable are used for alarming the various selected boxes and networks or selected portions of networks. Inside the secure junction box fiber jumpers are installed to provide an alarmed fiber optic line from the user fiber distribution panel to the alarm fiber distribution panel inside the telecommunications room so that the selected user terminals or selected networks are is connected to the alarming system. Within the secure junction box the alarming core or line will loop back the alarm signal to extend the signal to the selected user lock boxes or selected networks. The alarming core or line is not provided for non-secured lines or users or networks.
A protective system and method are disclosed that include fiber distribution panels and secure fiber optic secure junction boxes with the optional use of fiber optic jumpers or loopbacks to allow for the alarming or un-alarming of secret Internet protocol router networks or non-secure Internet protocol router networks to accommodate classified or unclassified data transmission when used in conjunction with a protective distribution system. The protective distribution system has pre-terminated interlocking armored fiber optic cable(s) attaching to secure junction boxes to secure lock boxes with the use of locking connect sleeves that are affixed to the interlocking armored fiber optic cable with epoxy.
The secure junction boxes and secure lock boxes include steel boxes with hidden hinge systems to avoid mechanical, in-line access to hinges. The boxes may have seams that are welded and ground to further inhibit access at the seams. A cable clamping system is preferably installed to accommodate the cable connect locking sleeves that are affixed to each cable. The cable clamp system may allow for per-terminated, pre-connectorized fiber optic interlocking armored cables to be installed in the box and held such that removal of an optical cable from the box is inhibited and that any such removal will result in visually perceptible damage. A Government Service Agency approved padlock may be used on each secure box for locking and inspection.
There is also provided a factory-manufactured, pre-terminated and pre-connectorized, fiber optic interlocking armored fiber optic cable having at least one pre-terminated and pre-connectorized access location for providing access to at least one pre-terminated and pre-connectorized interlocking armored fiber optic cable connector.
Depending on the application for either passive optical network or fiber to the desk topology, a simplex or duplex fiber may be used for the data transmission. In both topologies, duplex fiber may be used for alarming. In order to maximize the use of the alarming ports, loopback connectors are used in the telecommunications room and/or within the secure junction box in order to extend the duplex alarming fiber to each secret Internet protocol router network user. An additional loopback may be installed within the user secure lockbox to return the alarming loop to the telecommunications room or secure junction box. During the installation the dB signal loss for distances and connections need to be considered and accommodated using known techniques to compensate for signal loss.
The present invention uses Intrusion Detection of Optical Communication Systems (IDOCS) and is especially useful in areas of a protective distribution system that cannot be visually monitored but still require protection at all times. Such an intrusion detection system requires minimal cost to install and operate when considering the rising costs of installing and maintaining a data encryption system, and the costs of other alternative protection systems. The benefit of using intrusion detection of optical communication systems over other alarmed carrier technology is that it monitors the same fiber or cable that required protection. Further, its COMSEC-specific development negates the false alarm issue that would result from the technology transfer of traditional fence line systems.
The Secure Passive Optical Network (SPON) solution of the present invention is based on the International Telecommunications Union-compliant Gigabit Passive Optical Network (GPON) technology. This solution provides connectivity for one or more of voice, data, video, and secure and non-secure local area networks, secure passive optical network seamlessly integrates analog and digital video, broadband data, and telephone services onto a common platform. It also provides a Layer 2 passive optical distribution system to end users. An Optical Line Terminal (OLT) at the data center provides the interconnection to the secure passive optical network system. Single mode fiber is then used to carry the optical signal to an Optical Network Terminal (ONT) at the user station that provides an intelligent managed demarcation point for network services.
The present invention advantageously uses Gigabit Passive Optical Networks (GPON) to provide a capacity boost in both the total bandwidth and bandwidth efficiency through the use of larger, variable-length packets in passive optical network technology. The gigabit passive optical network is standardized by the requirements of ITU-T G.984 (GPON). While those requirements permit several choices of bit rate, the industry has converged on 2.488 Gbps of downstream bandwidth, and 1.244 Gbps of upstream bandwidth. A Gigabit passive optical network Encapsulation Method (GEM) allows very efficient packaging of user traffic, with frame segmentation to allow for higher quality of service (QoS) for delay-sensitive traffic such as voice and video communications.
BRIEF DESCRIPTION OF THE DRAWINGSThese and other advantages of the invention will be better understood in view of the following drawings and description, in which like numbers refer to like parts throughout, and in which:
FIG. 1 shows an armored and alarmed protective distribution system applied to an exemplary telecommunication room;
FIG. 2 shows a pre-terminated interlocking jumper configuration;
FIG. 3 is a top plan view of a secure cable junction box;
FIG. 4 is a top plan view of a secure user lock box cable configuration;
FIG. 5 is a perspective view of a secure cable junction box as partially shown inFIG. 3 but without the fiber optic lines;
FIG. 6 shows a top perspective view of a secure cable lock box also shown inFIG. 4 but without the fiber optic cable connected;
FIG. 7 is a perspective view of the user lock box ofFIGS. 4 and 6;
FIG. 8 shows a top perspective view of a cable connect locking sleeve;
FIG. 9 shows a side perspective view of an alternative embodiment of a cable connect locking sleeve; and
FIG. 10 shows a schematic layout of a communications room and a fiber optic cable distribution system having secured and non-secured lines.
DETAILED DESCRIPTIONReferring toFIG. 10, a fiber optic distribution system10 is shown that includesfiber distribution panels12 preferably, but optionally located in a telecommunications center. The panel(s)12 in the telecommunications center receive one or morefiber optic cables16 bearing signals and routes variousfiber optic cables26 from thepanel12 to various locations schematically illustrated inFIG. 10 through varioussecured boxes14,18 andfiber optic cables58,59, to enduser computer terminals19. The routed data throughcables26 may come from other sources and need not be solely signals received fromfiber optic cables16.
The telecommunications room provides alarm sensors ordetector11 for detecting tampering or unauthorized access to selected cores or lines in any of a plurality offiber optic cables26. Thedetector11 activates one or more ofvarious signals13, including audio signals, visual signals, or laser communication signals or telecommunication signals or electronic signals in response to appropriate signals or lack of signals from the selected alarmed cores or lines within cable(s)26. The alarmed lines are discussed in more detail below.
Thefiber optic cables26 are advantageously routed from thepanel12 to one or more secure fiberoptic junction boxes14 which in turn routefiber optic cables26 through further fiber optic lines (e.g.,58,59) to one or moreuser lock boxes18 connected touser computer terminals19. If desired, thecables26 may go directly from the telecommunications room to theuser lock box18. Thejunction boxes14 may use fiber optic jumpers or loopbacks to allow for the alarming or un-alarming of secret Internet protocol router networks or non-secure Internet protocol router networks for classified or unclassified data transmission when used in conjunction with a protective distribution systems10. The protective distribution system10 uses interlocking armoredfiber optic cables26 attachingsecure junction boxes14 to securelock boxes18 with the use of locking connect sleeves (FIGS. 8-9) that are affixed to the interlocking armoredfiber optic cable26 and thejunction boxes14. If a selected fiber optic line or core is to be secured, then as discussed later,cable26 carrying that line has two additional alarm lines, one line carrying an alarm signal to one or more selected locations and one line returning an alarm signal from the one or more selected locations. Jumpers may loop back the alarming line to a selected plurality of locations and before connecting to the return alarm line thus forming a loop of interconnected alarm lines that end up back atdetector11 so that interference or tampering with thecables26 orboxes14,18 results in an alarm detection bydetector11.
Afiber optic cable26 experiences a signal loss that varies with the length of the cable and any bends in the cable. But signal loss is also caused by touching the cable, moving the cable and changing the light exposure of the cable. The fiber optic cables are sufficiently sensitive to changing conditions and physical contact that the cables experience a signal loss from acoustical vibrations. Thus, a person cutting the protective shielding around afiber optic cable26 to access the cable will cause a signal loss. Because light can travel very fast around a loop of fiber optic cable, any contact with a cable or movement of the cable or vibrations on the cable may be detected fast, and the location of the movement, contact, handling, etc. may be located along the length of the cable. The present invention thus uses pairs of fiber optic lines insidefiber optic cables26 to alarm the cables and detect intrusions or attempts at intrusion. Thedetector11 sends a signal through a fiber optic line and monitors the return signal to detect changes in the signal strength that reflect intrusions or cable movement, and that identifies the location of the intrusion along the fiber optic cable.Various detectors11 may be used, with a detector named the Interceptor and sold by Network Integrity Systems in Hickory, N.C., believed suitable for use.
Thecables26 are preferably pre-terminated (i.e., connectors are attached by the manufacturer) where possible, and are advantageously armored by placing the cables inside a suitable carrier such as an interlocking armored cable, Electrical Metal Tubing (EMT), PVC pipe, or other suitable conduits meeting the security requirements of the particular application. Enclosing thefiber optic cables26 in such armored conduits increases the sensitivity of the alarming lines because of the physical force needed to breach the conduits and reach the fiber optic lines, and because even the change in ambient light from a hole in the cable may be detected.
Referring toFIGS. 1-3,5,7 and10, thecable26 takes the form of one or more data feeds26 from the telecommunications room which feed data to asecure junction box14. For illustration,data cable26ais a classified secret Internet protocol router network data anddata cable feed26bis an unclassified feed. The data feeds26 are secured fiber optic cables. The junction boxes advantageously conform to U.S. Air Force AFI33-201V8 or other applicable specifications or regulations. Thesecure junction box14 is configured to limit access to only authorized personnel, via use of various locking devices including keyed locks, padlocks, or electronic locks which may be unlocked by the authorized personnel. Thejunction boxes14 are usually metal with no access other than through locked access doors, lids or panels with access controlled by the locking devices. Attempts at unauthorized entry to thejunction box14 will leave visual indications, or if electronically locked, the electronics may track time, date and personnel accessing thejunction boxes14 or may track attempts to access the junction box. Various electronic motion sensors or force sensors may be used to detect such attempts at access.
The data feed26amay contain a plurality of lines that may transfer data of differing security levels, with each data transfer line receiving differing security protections. For illustration,feed line26aincludessecure data lines27a,27-bandsecret data lines28a,28b,28c,28d(FIG. 2) whileunsecured feed line26bincludes non-secret andnon-secure data lines29athrough29f(FIG. 2).
Each of the data lines26a,26betc. is separately connected to a fiberoptic patch panel12 that is preferably rack mounted to allow multiple panel support and many connections. The fiberoptic patch panel12 connects thesecure lines26 to a fiber-to-the-premises (FTTP) network using passive optical network (PON) components. Thepatch panel12 is advantageously located within or forms a wall of a secured box or facility so that access to the data lines27,28 and29 are limited and require access through a tamper evident junction box. Thus, the rack mountfiber patch panel12 connects data feeds26 to the new or existing optical line terminal or fiber to the desk network and could also be used for alarm patching. Both classified secret Internetprotocol router networks26aand un-classified non-secure Internetprotocol router network26 are connected to the rack mountfiber patch panel12.
Fiber optic lines26,27 are alarmed fiber jumper lines configured to alarm auser lock box18. From thejunction panel12, the data feeds26 are routed to various junction boxes throughout a floor in a building and then routed to users on that floor. If desired, the alarming of the secure data feeds26 from thedistribution panel12 may be the same as the alarming of the junction box described below. Preferably, thepatch panel12 forms a back wall of apanel junction box14 and the data feed(s)26 may be fastened to the back wall in a way that forms a secure, tamper resistant and tamper evident connection with the junction box.
The alarming devise (in lines27) is also connected to the rack mountfiber patch panel12 and could be jumper connected to anysecure junction box14. Thecables26 may be pre-terminated (i.e., connectors are attached by the manufacturer) and have interlocking armored fiber jumper cable (FIG. 2) to connect from the telecommunications roomfiber patch panel12. Color coded fiber optic connectors may be used to assign the type of connectivity.
Referring toFIG. 2, cableconnector locking sleeves32 are preferably affixed to the armored cable outer jacket. The lockingsleeves32 connect securely to the secure junction boxes18 (FIG. 3) as described later. Theconnectors32 have tubular portions that fit over the armored cable outer jacket and may be affixed annularly with suitable adhesive or epoxy. A strip of adhesive heat shrinktubing34 may overlay the cable connector locking sleeve to further secure it to the cable outer jacket. A one inch length of tubing (shrunk)34 is believed suitable and provides a tamper evident covering and connection.
The data feeds26a,26bmay contain any number of fiber optic feeds, some of which are classified (27) or secure (28) or unclassified (29), with the appropriate level of fiber optic line being physically routed to the appropriate user terminal. The fiber optic lines are preferably color coded, with black fiber optic lines or connectors indicating alarming feed for patching classified users, with red fiber optic connectors indicating classified secret Internet protocol router network feed for patching classified users and with green indicating un-classified non-secure Internet protocol router network feed from the telecommunications room. Appropriate fiber optic connectors37a-b,38ato38dand39ato39fon data lines27a-b,28ato28b, and29ato29f, respectively, provide for connection with other fiber optic lines. The connectors37,38,39 may be color coded as desired, preferably matching the wire colors, with red or black reflecting classified data line connectors and green reflecting non-classified data line connectors.
Referring toFIGS. 3 and 5, the fiber optic data feeds26 havedata lines27,28,29 that are physically routed to appropriate outlet lines connecting touser lock boxes18. For simplicity, only two data feeds26a,26bare shown with a limited number of data lines. But any number of thevarious feed lines26 and data transfer and alarmedlines27,29,29 may be used.
Thejunction box14 may have various shapes, and is shown with a rectangular shape having six (preferably flat) sides, with the datainput feed lines26 connected to afirst end panel42 and data output fiber opticdata transfer cables58,59 on opposingend panel44, withconnectors32 held in mating restraints or recesses50 (FIG. 5) in theend panel44 as described later. Theend panels42,44 are held apart by a bottom46 and a top48, withside walls49a,49b. The top, bottom, ends and sides of thejunction box14 are preferably made with a maximum thickness of 12 gauge steel and a minimum thickness of 16 gauge steel. The top48 is preferably hinged internally at hinge52 (FIG. 5) to form a lid that may be opened to allow access to the inside ofjunction box14. The hinges52 are located inside thebox14 so that the hinge is not externally accessible. The top48 preferably has a depending flange orlip54 around its edges.Channels56 are located around the upper edges of theends42,44 and the twosides49a,49bwith thechannels56 having a U-shaped cross section and oriented to receive theflange54 on the top orlid48. The interlocking ormating lip54 andchannels56 block straight line access to the interior of thejunction box14 so that a screwdriver or pry bar cannot be inserted beneath the top48 to pry it open. The construction provides no mechanical, in-line access to the hinges once the box is locked. Advantageously, thesecure junction box18 has no gap larger than 0.06 inches in any of the interface between the main box and any associated mating components, e.g. hinged top48, access panels, etc.
A locking mechanism preferably releasably holds the top48 to the remainder of thejunction box14. Electronic locks, keyed locks, or padlocks can be used to connect the hinged top48 to the remainder of thejunction box14. A two-part hasp55a,55b, each having an opening through which a padlock shank (not shown) can be inserted is shown to represent a typical locking mechanism. Any padlock is preferably a GSA authorized padlock. The hinges52 are preferably mounted to an outer edge of the channel extending along sidewall49bto conceal thehinges52 inside thejunction box14 and shield the hinges from external access outside thejunction box14.
Thefiber optic lines27,28,29 are routed through thejunction box14 around various fiber optic guides60 to the appropriatecorresponding outlet connector50, and correspondingoutgoing lines57,58,59, respectively. The fiber optic guides60 may take various forms, but are shown as cylindrical hubs62 having a bottom or first end fastened to the bottom46 of thejunction box14, and an upper end or second end forming projections62 extending outward from the hub. The curved shape of the hubs62 is selected to be large enough to not damage the fiber optic cables as thefiber optic lines27,28,29 are wound around the cable guides60 to arrange the lines toappropriate outlet connector50. The projections62 keep the fiber optic cables from sliding up and off the curved hubs62.
Supportingframes66 are optionally fastened to the bottom46 and/orside walls49a,49bto restrain the top48 from being pushed inward toward the hubs60, and to restrain any fiber optic cables or lines inside thejunction box14. Theframes66 are preferably made of angled channel members to allow easy threading of the fiber optic lines around the various cable guides60 and to allow increased strength and easy fastening to the bottom46 and sidewalls49. Theframes66 can also be used for routing of the fiber optic cables within thejunction box14 by allowing cable bundles to be tied to various portions of the frame to support the cables and control cable location and/or cable movement.
Thefiber optic lines27,28 and29 are threaded around one or more of the cable guides60 so the lines connect to the appropriateoutgoing line connector50. The lines are preferably color coded or otherwise labeled to make tracking and checking easier. Advantageously, black fiber optic connectors represent transmitting alarming feed for patching classified users, redjacketed lines28a,28b,28cand connectors indicate classified secret Internet protocol router network data feed from the telecommunications room and green fiber optic connectors andlines29athrough29drepresent transmitting data feed for patching un-classified users with injunction box14.
Referring toFIG. 3, a single alarmedline70 may be used to alarm a plurality of the selecteddata transfer lines28,29 within thejunction box14.Alarm line70 comes from data feedline26, accompanies one or more of the data lines28a,28b,28cexiting thejunction box14 to communicate with user lock box18 (FIGS. 4,6 &10) and then loops back to thejunction box14 before returning a signal back through data feedline26. In more detail, data feed line26 (e.g., from the telecommunications room) and secretdata transfer lines28a,28b,28cand non-securedata transfer lines29athrough29d. But thealarm line70 is looped so it goes along with and returns from eachuser line58a,58band58cto the associateduser lock box18. Specifically, thedata transfer lines28a,28band28care routed to theoutlet connectors50 for correspondinguser lines58a,58b, and58c, respectively. Alarm line70 (identified as70aout) passes through cable orline58aalong withline28aand returns throughcable58aasline70areturn.Line70areturn is looped and accompanies line28basline70bout and returns through cable58basline70breturn.Line70breturn is looped and accompaniesline28casline70cout and returns throughcable58casline70creturn. The looping can be repeated as many times as needed. The final return alarm line (here,70creturn) returns its signal through data transfer cable orline26 to the telecommunications office where the signal is monitored.
If the data transmission is interrupted, as by data tampering, theft, damage or other actions affecting the data transmission through the fiber optic cable, the interruption is detected at the telecommunications office bydetector11, which preferably both sends a signal through the outgoing alarm line and receives a signal from the return line in order to identify variations in the signal strength reflecting intrusions, intrusion attempts, and the location of such intrusions or attempts along the length of the alarm lines. This detection assumes that the data transmission of one line in a cable cannot be intercepted without disrupting the signal in the accompanying alarmed lines in the same cable.
Data transfer lines29athrough29dare routed throughjunction box14 and hubs60 to the correspondingconnectors50 for correspondinguser lines59a,59b,59cand59d. Since these lines are unsecured and not alarmed, thealarm line70 does not accompany these data transfer lines. By removing the top48, the fiber optic connections to any specific end user oruser lock box18 can be altered to add or remove alarmed lines by looping thealarmed line70 around the desired line going to the selecteduser lock box18, or by removing the looped alarmed line from user lock box that need no longer be secured. Thecables26 connecting thejunction box14 with theuser lock box18 can be re-routed for eachuser lock box18 as needed, or the alarm lines70 can be placed in theinitial cables26 and just connected or disconnected in thejunction box14 as needed to form alarmed or non-alarmed lines.
Referring toFIGS. 4,6 and7, theuser lock box18 is described in more detail. Physically, theuser lock box18 can have various shapes and constructions. Advantageously, theuser lock box18 meets all U.S. Air force AFI33-201V8 mandatory requirements for protective distribution systems (PDS) or any other regulatory or security requirements imposed by other organizations or imposed in the future. As shown in the figures, thebox18 has a rectangular box having a top80, an opposing bottom82 joined by opposingsidewalls84a, and84b.Input end panel86 covers one end and opposingoutput end panel88 covers the other end of theuser lock box18.Vents90 are advantageously formed insidewalls84 and top80, with the vents being small enough to inhibit tampering and access for data theft, but large enough and numerous enough to allow air flow for cooling. The top, bottom, ends and sidewalls form an enclosed, sealed container which cannot be accessed without authorization, or by physically damaging part of the lock box and leaving visual evidence of that damage. The various walls, sides and bottom are typically welded with ground seams, made of bent metal joined internal thebox18, or made with nesting joints as in thelid48 ofjunction box14. Onjunction box14, any non-removable sides, walls, top, bottom etc. are also preferably welded with ground seams. On bothboxes14,18, there are preferably no screw access points on any of the visible sides, ends or surfaces, although flush screw mounts on bottom surface that mates to the floor are sometimes used.
Functionally, theinput end86 has at least one connector for receiving acable26 fromjunction box14.Output end88 has at least oneoutput connector92 for data communication with a user device such as a computer (not shown) or for connection to a fiber optical network.FIG. 7 shows a plurality of network patch cords (CAT5E, 6, 7) as comprising theoutput connectors92. The user lock box has appropriate internal apparatus to provide fiber optic communication with the desiredoutput connections92.FIG. 4 shows a connection with only one of fouroutputs92, but appropriate routers and cable dividers can be provided to place any of theoutputs92 in signal communication with thecable26.FIG. 6 showsinternal part100, which is an appropriate device to provide at least fiber to desk (FTTD) or fiber to optical network terminal (ONT or PON) signal connection to theoutputs92 throughnetwork patch cords99 and network couplers101.
The routing of non-secureddata transfer lines29 are similar to the routing of alarmedline28a, except no alarm lines70aout or70areturn accompany the non-secured data transfer lines29. The non-secureddata transfer lines29 may pass through auser lock box18, or not, with thefiber optic cables59 connecting directly to the desired desk or optical network as desired.
Theoutput connectors92 are physically shielded by pivotedcover94 which rotate onhinges96 extending from or betweensidewalls84 and connected to the upper edge ofcover94. Thecover94 is shown as being sized to cover the fouroutlets92 and to cover theoutlet end88. Thecover94 has anend98 forming a U-shape in cross-section, with thehinge96 located in this U-shaped channel. The U-shaped channel limits external access to thehinges96. Thelock box14 is configured to limit access to only authorized personnel, via use of various locking devices including keyed locks, padlocks, or electronic locks which may be unlocked by the authorized personnel. As with thejunction box14, a two-part hasp55a,55beach part respectively connected to a different one of thecover94 andlock box18 is used with a padlock (not shown) to represent the locking mechanism. Any padlock is preferably a GSA authorized padlock. The locking mechanism and removable orrotating cover94 limits access to the end of the fiber optic line and data connection.
Referring toFIG. 4, input fiber optic26 (FIG. 10) is connected tojunction box14 and may comprise any one ofcables58a,58b, and58c. For simplicity it will be described ascable58a, carryingdata transmission lines28aandalarm lines70aout and70areturn, and the description ofanalogous lock boxes14 foralarmed cables58b,58care not give.Data transmission line28ais placed in signal communication with one or more ofoutput connectors92 as described above.Alarm line70aout accompaniesline28athrough a portion of theuser lock box18 and detects tampering with the accompaniedline28a. Preferably, one or both ofalarm lines70aout or70areturn accompany thedata line28auntil the data line enters theelectronic module100 which provides fiber to desk (FTTD) or fiber to optical network terminal (ONT or PON) signal connection to theoutputs92. Thealarm line70aout passes through aloopback102 that passes thealarm line70aout back towardjunction box14 and back throughcable58a. After theloopback102, thealarm line70aout becomesalarm line70areturn as it returns to thejunction box14 through thecable58a. Tampering with thedata transfer line28aaffectsalarm lines70aout and/or70areturn, thus transmitting an alarm signal thoughcable58a.
Theloopback102 may be located around an L-shaped bracket103 (FIG. 6) having the short leg of the L fastened to the bottom82 of theuser lock box18, with the long leg of the L extending from the bottom and having a width sufficient for the fiber optic line to bend around that leg of thebracket103 without damaging the fiber optic line. Optionally, the fiber optic line may be fastened to theb racket103.
Thus, the alarmedfiber28/70 will loopback to the junction box18 (FIG. 3), then loopback again to the next classified secret Internet protocol router network users within the network through a differentuser lock box18, as illustrated inFIGS. 3 and 4. The classified secret Internet protocolrouter network fiber28awill be connected the user device through a fiber to the desk (FTTD) or optical network terminal (ONT), depending on the network topology.
Referring toFIG. 8, the connector used inFIGS. 4-6 ofcable58a(andcables26,26,59) to thelock box18 andjunction box14 is shown. The lockingsleeve connector32 has a tubular or annular shank110 sized to snugly fit over the outside of the shieldedcable26,26,58,59 and is fastened to that cable by suitable adhesive, clamping, or other fastening mechanism. The tubular shank110 extends from a mountingportion112 having a through hole coaxial with the axis of the tubular shank110 so the cable can pass through theentire connector32. The mounting portion has two parallel flanges114a,114bspaced apart a distance that preferably corresponds to the thickness of the wall ofjunction box14 oruser box18 or mounting bracket to which theconnector32 is to be fastened. The mountingportion112 has a square or rectangular shape between the flanges114. The flanges114 are on at least the opposing upper and lower edges of theconnector32 using the orientation seen inFIG. 8.
Depending on the user classification type either red fiber optic connectors indicate classified secret Internet protocol router network users3D and green fiber optic connectors are used to indicate un-classified Non-secure Internet protocol router network users3C. Black fiber optic connectors are to be used for alarming feed for patching3A. All of the patches will be terminated to the multi-plates mounted5B within the junction boxFIG. 5. These patches will also be user to activate or deactivate the data signal from the network for any user boxFIG. 6. Thus, for un-classified non-secure Internet protocol router network users thefiber optic lines29 may run directly to the user device, such as a fiber to the desk (FTTD) or optical network terminal (OTN), depending on the network topology. Classified secret Internet protocol router network users the will havelines28 that are patched along with analarmed fiber70 to thesecure user box18, preferably using pre-terminated interlocking armored fiber jumper cables as generally illustrated inFIG. 2. Using acable connector32 allows thecable26,26,58,59 to connect securely to thesecure junction boxes14 and to thesecure user box18.
Referring toFIG. 11, in use, a mountingbracket115 is attached to the appropriate wall of thejunction box14 oruser box18, surrounding at least a portion of the opening through which thecable26,26,58, or59 is to pass. The mountingbracket115 has a U-shaped cross-section or forms a U-shaped cross-section with the wall of thebox14,18. A lower restraint126 is placed in the bracket slightly below the opening through which thecable26,26,58, or59 is to pass so that thebracket115 stops the restraint126 from moving away from the bracket, and either the bracket or the wall of thebox14,18 stops the restraint from moving toward or past the wall. The cable and attachedconnector32 are placed through the opening in thebox14,18 so that the lower restraint is between the flanges114 of theconnector32. Anupper restraint118 is then placed in thebracket115 and into the space between flanges114 of theconnector32, with therestraint118 being limited in motion by thebracket112 and wall ofbox14,18. The upper andlower restraints126,118 enclose theconnector32 and cooperate with the flanges114 to limit movement of the connector relative to the restraints and the wall of thebox14,18 to which the restraints are connected (throughbracket112. The flanges114 prevent movement ofconnector32 and thecable26,26,58,59 to which the connector is fastened. If needed, the lower and upper restraints can be held together by clips, screws, adhesives or other fasteners.
The flanges114 onconnector32 can be on any opposing edges of theconnector32, top and bottom, or opposing sides, or on all four edges of the connector. Therestraints126,118 are shaped and located to engage the flanges to restrain motion of the connector, and may extend horizontally, vertically, or at inclined angles so that the restraints forconnector32 are not limited to the specific embodiment illustrated. Since theconnector32 is fastened to thecable26,26,58,59 the cable cannot be removed from thebox14,18 without damaging the cable, theconnector32, or therestraints126,118—thus leaving visual damage of tampering. Theconnectors32 thus allow the cables to be connected to theboxes14,18 and secured from movement. Thebracket115 andrestraints116,118 form a clamping mechanism or system to hold theconnectors32 and cables in position. But the specific structure can be varied, with the restraints taking differing forms as long as they engage the connectors to restrain movement relative to thebox14,18 to which the connectors are ultimately fastened. Because the cable extends through a preformed opening in theconnector32, the connector does not put pressure on cable or cable jacket. Moreover, because therestraints116,118 andbracket115 do not abut the cable, the cables are held with no physical compression on the cables by the connection with theboxes14,18. Still further, therestraints116,118 need not compress even theconnector32, further reducing the likelihood of squeezing thefiber optic cable16,26,57,58 fastened to and held by theconnector32. Additionally, theconnectors32 and their connection to theboxes14,18 eliminate visual and/or mechanical access to the inside of thebox14,18 along the path where the cables interface with the connectors and clamping system.
Referring toFIG. 9, another configuration forconnector32 is shown in which the flanges are circular in shape rather than rectangular as inFIG. 8. Further, in the embodiment ofFIG. 9, the mountingportion112 between the flanges114 has a generally cylindrical portion extending between the flanges114, and a three sided, trapezoidal shape for the remainder of the shape. In bothFIGS. 8 and 9, the non-circular shape of the mountingportion112 cooperates with mating recesses in the upper andlower restraints126,118 to prevent rotation of thecoupler32 and thus inhibit removal of theconnector32 from theboxes14,18. The flanges114 and shaped mountingportion112 also help hold theconnectors32 and the associatedcable26,26,58,59 in position during installation, making it easier to lock the connectors in place relative to theboxes14,18 in which theconnectors32 and associated cables are installed. Other shapes for the mounting portion could be used, but the mountingportion112 betweenflanges112 preferably has at least one flat side.
Acable16,26,58,59 with aconnector32 is believed to be new and to provide useful advantages as described herein. The fiberoptical cables16,26,58,59 are preferably constructed using single mode fiber cores. The cables advantageously have a jacketing material made of aluminum interlocked armored material. Advantageously, the cables have one of theconnectors32 on adjacent each opposing end of the cable, with the offset from the adjacent cable end depending on how much cable is needed for routing withinjunction box14, oruser lock box18, ordistribution panel12. Typically, theconnectors32 are located from a few inches to a few feet from the end, and in some instances eachconnector32 is are within about 12 inches from the adjacent end of the cable. Advantageously, the connectors are affixed to the cable with epoxy or other suitable adhesive. Preferably, heat shrink tubing is placed over the epoxied connection and over the annular shank110 and part of the cable to which theconnector32 is fastened, and then the tubing is shrunk.
The various cable connectors used in this fiber optic system and inpanel12 orboxes14,18 are advantageously SC single mode Angled Physical Contact (APC) polished connectors. The pre-terminated jumpers are preferably 100% lab tested with DB loss test results provided for verification. Further, the jumpers are preferably 4 core pre-terminated and interlocked armored jumpers.
Referring again toFIG. 10, thefiber optic lines26,57,58 have opposing first and second ends extending from, between or through various ones of theboxes14,18 anddistribution panels12. Thejunction boxes14 are typically the first boxes when the distribution system is viewed along the line of the data flowing through the fiber optic cables and lines within those cables. Theuser lock boxes18 are usually the second boxes when the distribution system is viewed along the line of the data flowing through the fiber optic cables and lines within those cables. When the distribution system is viewed in the reverse direction, from theuser lock box18, then the user box is the first box and thejunction box14 is the second box, with the telecommunications room potentially containing further distribution boxes.
The interlocking armored fiber optic cables with the alarming lines and loopback features for each secured user allow the transmission of non-encrypted data to user terminals at 40 Gbps rates while meeting current government security requirements. As the capacity of fiber optic cables to carry data increases, the data transfer rate will also increase. This provides a significant improvement over the ability to carry data over copper or other metal lines, while providing the security needed for classified and other secured data transmission. Further, the ability to secure the fiber optic transmission lines without encryption significantly simplifies the system and increases the data transfer rate and the actual speed with which data may be accessed and used by thecomputers19 associated with each user lock box.
The above description is given by way of example, and not limitation. Given the above disclosure, one skilled in the art could devise variations that are within the scope and spirit of the invention disclosed herein, including various ways of routing the alarm lines70 along with thedata transfer line28 that is to be protected against intrusion. Further, the various features of the embodiments disclosed herein can be used alone, or in varying combinations with each other and are not intended to be limited to the specific combination described herein. Thus, the scope of the claims is not to be limited by the illustrated embodiments.