WO2021153143A1 - 処理装置、処理方法及び記録媒体 - Google Patents
処理装置、処理方法及び記録媒体 Download PDFInfo
- Publication number
- WO2021153143A1 WO2021153143A1 PCT/JP2020/049077 JP2020049077W WO2021153143A1 WO 2021153143 A1 WO2021153143 A1 WO 2021153143A1 JP 2020049077 W JP2020049077 W JP 2020049077W WO 2021153143 A1 WO2021153143 A1 WO 2021153143A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- data
- mask
- information
- processing apparatus
- processing
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B10/00—Transmission systems employing electromagnetic waves other than radio-waves, e.g. infrared, visible or ultraviolet light, or employing corpuscular radiation, e.g. quantum communication
- H04B10/07—Arrangements for monitoring or testing transmission systems; Arrangements for fault measurement of transmission systems
- H04B10/071—Arrangements for monitoring or testing transmission systems; Arrangements for fault measurement of transmission systems using a reflected signal, e.g. using optical time domain reflectometers [OTDR]
-
- G—PHYSICS
- G01—MEASURING; TESTING
- G01L—MEASURING FORCE, STRESS, TORQUE, WORK, MECHANICAL POWER, MECHANICAL EFFICIENCY, OR FLUID PRESSURE
- G01L11/00—Measuring steady or quasi-steady pressure of a fluid or a fluent solid material by means not provided for in group G01L7/00 or G01L9/00
- G01L11/02—Measuring steady or quasi-steady pressure of a fluid or a fluent solid material by means not provided for in group G01L7/00 or G01L9/00 by optical means
- G01L11/025—Measuring steady or quasi-steady pressure of a fluid or a fluent solid material by means not provided for in group G01L7/00 or G01L9/00 by optical means using a pressure-sensitive optical fibre
-
- G—PHYSICS
- G01—MEASURING; TESTING
- G01D—MEASURING NOT SPECIALLY ADAPTED FOR A SPECIFIC VARIABLE; ARRANGEMENTS FOR MEASURING TWO OR MORE VARIABLES NOT COVERED IN A SINGLE OTHER SUBCLASS; TARIFF METERING APPARATUS; MEASURING OR TESTING NOT OTHERWISE PROVIDED FOR
- G01D5/00—Mechanical means for transferring the output of a sensing member; Means for converting the output of a sensing member to another variable where the form or nature of the sensing member does not constrain the means for converting; Transducers not specially adapted for a specific variable
- G01D5/26—Mechanical means for transferring the output of a sensing member; Means for converting the output of a sensing member to another variable where the form or nature of the sensing member does not constrain the means for converting; Transducers not specially adapted for a specific variable characterised by optical transfer means, i.e. using infrared, visible, or ultraviolet light
- G01D5/32—Mechanical means for transferring the output of a sensing member; Means for converting the output of a sensing member to another variable where the form or nature of the sensing member does not constrain the means for converting; Transducers not specially adapted for a specific variable characterised by optical transfer means, i.e. using infrared, visible, or ultraviolet light with attenuation or whole or partial obturation of beams of light
- G01D5/34—Mechanical means for transferring the output of a sensing member; Means for converting the output of a sensing member to another variable where the form or nature of the sensing member does not constrain the means for converting; Transducers not specially adapted for a specific variable characterised by optical transfer means, i.e. using infrared, visible, or ultraviolet light with attenuation or whole or partial obturation of beams of light the beams of light being detected by photocells
- G01D5/353—Mechanical means for transferring the output of a sensing member; Means for converting the output of a sensing member to another variable where the form or nature of the sensing member does not constrain the means for converting; Transducers not specially adapted for a specific variable characterised by optical transfer means, i.e. using infrared, visible, or ultraviolet light with attenuation or whole or partial obturation of beams of light the beams of light being detected by photocells influencing the transmission properties of an optical fibre
-
- G—PHYSICS
- G01—MEASURING; TESTING
- G01K—MEASURING TEMPERATURE; MEASURING QUANTITY OF HEAT; THERMALLY-SENSITIVE ELEMENTS NOT OTHERWISE PROVIDED FOR
- G01K11/00—Measuring temperature based upon physical or chemical changes not covered by groups G01K3/00, G01K5/00, G01K7/00 or G01K9/00
- G01K11/32—Measuring temperature based upon physical or chemical changes not covered by groups G01K3/00, G01K5/00, G01K7/00 or G01K9/00 using changes in transmittance, scattering or luminescence in optical fibres
-
- G—PHYSICS
- G01—MEASURING; TESTING
- G01M—TESTING STATIC OR DYNAMIC BALANCE OF MACHINES OR STRUCTURES; TESTING OF STRUCTURES OR APPARATUS, NOT OTHERWISE PROVIDED FOR
- G01M11/00—Testing of optical apparatus; Testing structures by optical methods not otherwise provided for
- G01M11/30—Testing of optical devices, constituted by fibre optics or optical waveguides
- G01M11/31—Testing of optical devices, constituted by fibre optics or optical waveguides with a light emitter and a light receiver being disposed at the same side of a fibre or waveguide end-face, e.g. reflectometers
- G01M11/3109—Reflectometers detecting the back-scattered light in the time-domain, e.g. OTDR
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B10/00—Transmission systems employing electromagnetic waves other than radio-waves, e.g. infrared, visible or ultraviolet light, or employing corpuscular radiation, e.g. quantum communication
- H04B10/80—Optical aspects relating to the use of optical transmission for specific applications, not provided for in groups H04B10/03 - H04B10/70, e.g. optical power feeding or optical transmission through water
- H04B10/85—Protection from unauthorised access, e.g. eavesdrop protection
Definitions
- the present invention relates to optical fiber sensing.
- Distributed optical fiber sensing is a well-known technology that uses an installed optical fiber as a distributed sensing element for acquiring environmental information representing the environment of the optical fiber.
- Environmental information is typically information that indicates the existence of vibration, including sound. In this specification, sound is included in vibration. Environmental information also includes environmental temperature and pressure. In the following, in consideration of ease of understanding, the case where the environmental information is mainly the information indicating the existence of vibration will be described.
- the optical fiber sensing for example, coherent light is incident on the sensing optical fiber, the return light from each part of the sensing optical fiber is detected and analyzed, and the disturbance (dynamic distortion) acting on the sensing optical fiber is detected in the environmental information. It is to be acquired as.
- disturbance is typically vibration of the sensing optical fiber caused by an acoustic wave or the like transmitted to a portion of the sensing optical fiber.
- DAS distributed acoustic sensing
- DAS is a kind of OTDR type sensing method.
- OTDR is an abbreviation for optical time-domine reflectometry.
- FIG. 1 is an explanatory diagram of the operation of a general OTDR type optical fiber sensing system.
- FIG. 1A is an explanatory diagram of a main configuration of a sensing system.
- FIG. 1B is an image diagram showing a state of the probe light and its backward scattered light in the sensing system.
- the OTDR type optical fiber sensing system includes an interrogator 100 and an optical fiber 200.
- the interrogator 100 sends the probe light 900 to the optical fiber 200, which is a sensing optical fiber.
- the probe light 900 moves the optical fiber 200 to the right, and in the process of movement, backscattered light such as backscattered light 801 and 802 is generated at each position of the optical fiber 200.
- the backscattered light is typically Rayleigh backscattered light.
- the backscattered light moves the optical fiber 200 to the left toward the interrogator 100 and is incident on the interrogator 100.
- the backscattered light generated at each position of the optical fiber 200 is affected by the environment at that position.
- the environment is, for example, the presence of vibrations such as temperature and sound at that position.
- the interrogator 100 detects the degree of influence on each cable distance of the optical fiber 200 received by the return light of the backscattered light.
- the interrogator 100 derives environmental information regarding the environment at each cable distance of the optical fiber 200 from the information detected from the return light.
- the environmental information is, for example, information indicating a vibration state of an optical cable.
- DAS which is a kind of OTDR type optical fiber sensing system
- environmental information can be acquired every several meters in the optical fiber laying range over a section of 40 km or more. Therefore, if DAS is applied using a cable laid on land or on the seabed, a wide range of environmental information can be obtained.
- FIG. 2 is a conceptual diagram showing a configuration example of a DAS system 300, which is a type of OTDR type optical fiber sensing system described in FIG.
- the DAS system 300 includes an interrogator 100 and an optical fiber 200.
- the optical fiber 200 is a general optical fiber and is provided for cables such as submarine cables and land cables.
- a general optical fiber produces backscattered light that has been altered by the environment, such as the presence of vibrations, including acoustics.
- the backscattered light is typically due to Rayleigh backscattering. In that case, the change is mainly a phase change (phase change).
- the optical fiber 200 may be one in which a plurality of optical fibers are connected by an amplification repeater or the like.
- the cable including the optical fiber 200 may be connected to another optical communication device that performs optical communication via the optical fiber 200 with an optical communication device (not shown) including the interrogator 100.
- the interrogator 100 includes a processing unit 101, a synchronization control unit 109, a light source unit 103, a modulation unit 104, and a detection unit 105.
- the modulation unit 104 is connected to the optical fiber 200 via the optical fiber 201 and the optical coupler 211
- the detection unit 105 is connected to the optical fiber 200 via the optical coupler 211 and the optical fiber 202, respectively.
- the light source unit 103 includes a laser light source, and a continuous laser beam is incident on the modulation unit 104.
- the modulation unit 104 for example, amplitude-modulates the laser beam of continuous light incident from the light source unit 103 in synchronization with the trigger signal from the synchronization control unit 109 to generate probe light having a sensing signal wavelength.
- the probe light is, for example, in the form of a pulse. Then, the modulation unit 104 sends the probe light to the optical fiber 200 via the optical fiber 201 and the optical coupler 211.
- the synchronization control unit 109 also sends a trigger signal to the acquisition processing unit 101a to convey which part of the data that is continuously A / D (analog / digital) converted and input is the time origin.
- the return light from each position of the optical fiber 200 reaches the detection unit 105 from the optical coupler 211 via the optical fiber 202.
- the return light from each position of the optical fiber reaches the interrogator 100 in a shorter time after the probe light is transmitted as the light comes from a position closer to the interrogator 100.
- the backscattered light generated at that position is changed from the probe light at the time of transmission depending on the environment. There is.
- the backscattered light is Rayleigh backscattered light, the change is mainly a phase change.
- the return light in which the phase change occurs is detected by the detection unit 105.
- the detection method includes well-known synchronous detection and delayed detection, but any method may be used.
- delayed detection is used in the method disclosed in Non-Patent Document 1. Since the configuration for performing phase detection is well known, the description thereof is omitted here.
- the electric signal (detection signal) obtained by detection represents the degree of phase change by amplitude or the like.
- the electric signal is input to the processing unit 101.
- the processing unit 101 includes an acquisition processing unit 101a and, in some cases, a specific unit 101c.
- the acquisition processing unit 101a first A / D-converts the above-mentioned electric signal into digital data. Next, the phase change of the light scattered and returned at each point of the optical fiber 200 from the previous measurement is obtained, for example, in the form of a difference from the previous measurement at the same point. Since this signal processing is a general technique of DAS, detailed description is omitted.
- the acquisition processing unit 101a derives data having the same shape as that obtained by arranging virtually point-shaped electric sensors in a string at each point of the optical fiber 200.
- This data is virtual sensor array output data obtained as a result of signal processing, but hereafter, for the sake of simplicity, this data will be referred to as RAW data.
- the acquisition processing unit 101a also generates and outputs summary data (customarily also called waterfall data) that summarizes the RAW data so that it can be viewed from a bird's-eye view.
- summary data customarily also called waterfall data
- the identification unit 101c identifies an event by calculating the similarity with some event patterns held in advance from information such as summary data and RAW data. Then, the data listing the event is output.
- Events that are expected to be automatically identified by this specific unit 101c are diverse depending on the application.
- the event is, for example, on land, an earthquake, a running sound of a car or a train, a collision sound, a gun sound, a scream of a person, or the like.
- the event includes earthquakes, tsunamis, ship navigation sounds, marine life (whales, dolphins, etc.) barking, otter trawl fishing gear moving on the seabed, and heavy objects being dropped and landing. , And so on.
- the event data output by the specific unit 101c varies depending on the application. For example, it detects the traffic vibration of an automobile and outputs the time, place, moving direction, moving speed, etc. of the appearance as event data.
- the acquisition processing unit 101a and the specific unit 101c output the acquired data to the external output unit 106 or store it in the external storage unit 102 via the output I / F 107.
- I / F is an abbreviation for Interface.
- the processing unit 101 and the synchronization control unit 109 are, for example, central processing units of a computer, and in that case, they are operated by software including programs and information. Programs and information necessary for the operations performed by the processing unit 101 and the synchronization control unit 109 are stored in advance in a memory or the like (memory or storage unit) in the processing unit 101 and the synchronization control unit 109 (not shown). Further, the processing unit 101 and the synchronization control unit 109 can store predetermined information in a memory or the like in the processing unit 101 and the synchronization control unit 109 (not shown). The processing unit 101 and the synchronization control unit 109 can also read the information stored in their memories and the like.
- FIG. 3 is an image diagram showing RAW data 901, which is an example of RAW data.
- the example of FIG. 3 is two-dimensional array data composed of a matrix.
- the column number corresponds to the position on the optical fiber to be sensed.
- the positions are set at equal intervals, for example.
- the data collection time time stamp is stored in the first column.
- the line number represents the elapsed time.
- 100 Hz sampling that is, data is collected and recorded every 0.01 seconds.
- Each numerical value specified by the combination of the row number and the column number except the column number 1 is a sensor output value indicating the degree of environmental information.
- this value is referred to as a sensing output value.
- the sensing output value is an output value of each sensor when virtually assuming sensors (sensor arrays) arranged in a string on an optical fiber.
- the acquisition processing unit 101a arithmetically processes the return light to typically calculate data in the form of output from such a virtual sensor array.
- the position on the sensing optical fiber is set every 10 m, and the number of data in the position direction is about 10,000.
- FIG. 4 is an image diagram showing summary data 902, which is an example of summary data.
- the data storage format is the same as that of the RAW data 901 in FIG. 3, but the distance on the sensing optical fiber represented by the column number spacing is 10 times, and the elapsed time interval represented by the row number spacing is 50. Each is doubled.
- the value of one summary data specified by the combination of the row number and the column number is one for 10 RAW data in the fiber distance direction and 50 RAW data in the time axis direction, that is, 500 RAW data.
- the representative value is derived. Therefore, the data size of the summary data 902 is significantly reduced as compared with the RAW data 901.
- the method of obtaining the representative value is, for example, the derivation of the average or the maximum value.
- FIG. 5 is an image diagram showing event data 903, which is an example of event data.
- the event data 903 represents a log of an event automatically identified by the specific unit 101c.
- FIG. 5 shows an example of automatically identifying a ship navigating in the vicinity of the submarine cable.
- one event data is treated from the time when the ship approaches and becomes recognizable until the ship moves away and becomes unrecognizable. Then, the time and place when the recognition started and the time and place where the recognition became unrecognizable are recorded as ancillary information of the event. Such events are recorded sequentially each time they occur.
- the example of the event file in FIG. 5 is an example in which only the detection event of the ship is described, but as described above, the events automatically identified by the specific unit 101c are diverse depending on the intended use. Therefore, multiple event types are output to the event file.
- acquired data data including at least one of RAW data, summary data and event data
- acquired data data including at least one of RAW data, summary data and event data
- FIG. 6 is a conceptual diagram showing an example of a processing flow of environmental information acquisition processing performed by the processing unit 101 shown in FIG.
- the processing unit 101 starts the processing shown in FIG. 6 by inputting start information from the outside, for example.
- the processing unit 101 When the processing is started, the processing unit 101 first derives the above-mentioned RAW data from the current and past detection signals as the processing of S101.
- the detection signal is an output from the detection unit 105 of FIG.
- the processing of S101 is typically performed by the acquisition processing unit 101a.
- the processing unit 101 derives the above-mentioned summary data from the RAW data derived by the processing of S101 as the processing of S102.
- the processing of S102 is performed when summary data is required.
- the processing of S102 is also typically performed by the acquisition processing unit 101a.
- the processing unit 101 identifies an event from the characteristic patterns included in the derived RAW data and the summary data, and derives the above-mentioned event data.
- the processing of S103 is performed when event data is required.
- the processing of S103 is typically performed by the specific unit 101c.
- the processing unit 101 ends the processing shown in FIG.
- the obtained RAW data, summary data, and event data are stored in the external storage unit 102 or displayed as an image in the external output unit 106 via the output I / F 107.
- Patent Documents 2 to 6 are techniques that disclose a method of restricting (masking) a part of necessary digital video data so as to be invisible as it is, if necessary.
- Patent Document 7 discloses a method in which only an authorized person unlocks (decrypts) a mask (encryption) applied to digital video data.
- the sensing area may include, for example, an area where sensing activities are regulated by the national government or local governments.
- An object of the present invention is to provide a sensing system processing device or the like having a function of masking data in a regulated area (area where acquisition is not desirable) in the acquired data.
- the processing device of the present invention is provided inside a transmission / reception device used for optical fiber sensing by an optical fiber, and includes a mask unit that masks a predetermined range of acquired data, which is data acquired by the transmission / reception device by the optical fiber sensing.
- An output unit that outputs post-masked data, which is the masked data, to the outside of the transmission / reception device, and outputs the acquired data in the predetermined range before the masking is performed to the outside. do not.
- the processing apparatus and the like of the present invention can limit the use of the acquired data within a predetermined range as necessary.
- FIG. 7 is a conceptual diagram showing the configuration of the DAS system 300, which is an example of the optical fiber sensing system of the present embodiment.
- the DAS system 300 shown in FIG. 7 is obtained by adding a mask unit 101b to the processing unit 101 of the DAS system 300 shown in FIG.
- the DAS system 300 shown in FIG. 7 differs from the DAS system 300 shown in FIG. 2 in the following points.
- the differences between the DAS system 300 shown in FIG. 7 and the DAS system 300 shown in FIG. 1 will be mainly described.
- the acquisition processing unit 101a of the processing unit 101 inputs the above-mentioned RAW data and summary data to the mask unit 101b.
- the specific unit 101c inputs the above-mentioned event data into the mask unit 101b.
- the mask unit 101b masks a portion of the acquired data input from the acquisition processing unit 101a and the specific unit 101c that satisfies a predetermined condition.
- the acquired data includes at least one of the RAW data, the summary data, and the event data.
- the mask condition setting will be described later.
- the mask unit 101b stores the acquired data after masking and its processing data (data after masking) in the external storage unit 102.
- the mask unit 101b causes the external output unit 106 to output the masked data as needed.
- the output is a display on the display unit or a transmission to another.
- FIG. 8 is a conceptual diagram showing an example of processing performed by the processing unit 101 of the interrogator 100 of FIG. 7.
- FIG. 8 shows that the process of S104 is added after the process of S103 of FIG.
- the processing of S101 to S103 of FIG. 8 is the same as that of FIG. 6, and the description thereof is omitted here.
- the processing unit 101 performs the above-mentioned mask processing on the acquired data.
- the acquired data includes at least one of the RAW data, the summary data, and the event data.
- the processing of S104 is performed by the mask portion 101b of FIG. 7.
- the types of mask processing include those that dynamically change the mask conditions based on the event specified by the specific unit 101c. Therefore, the mask unit 101b receives the event data which is the output from the specific unit 101c in addition to the RAW data and the summary data which are the outputs from the acquisition processing unit 101a.
- the RAW data, summary data, and event data after mask processing are stored in the external storage unit 102 or displayed as an image in the external output unit 106 via the output I / F 107.
- the data before mask processing is designed and manufactured with care so that it is never output to the outside of the interrogator 100.
- FIG. 9 is an image diagram showing a typical example of the operation performed by the DAS system of the present embodiment.
- FIG. 9A is an image diagram showing how a submarine cable including a sensing optical fiber of an optical fiber sensing system is installed.
- the submarine cable is laid on the sea side from the landing point P0.
- an interrogator (not shown) connected to the submarine cable, and the interrogator can acquire environmental information around the submarine cable.
- a sea area where the acquisition of environmental information is regulated is set in the sea, and the section from the cable distance P1 to P2, which is a part of the submarine cable, passes through the regulated sea area.
- a regulated sea area is, for example, a sea area where military actions may be carried out, and the acquisition of environmental information that shows the actions of ships and submarines, for example, is regulated.
- 9 (b) and 9 (c) are image diagrams showing an example of a regulation rule for the act of acquiring acquired data by optical fiber sensing.
- the acquired data subject to regulation is all kinds of data including information acquired by optical fiber sensing, such as RAW data, summary data, and event data described in the section of background technology.
- the regulation rule shown in FIG. 9B is that all the acquired information between the submarine cable distances P1 and P2 is prohibited. In reality, the information around the submarine cable, including the information between P1 and P2, is incident on the interrogator placed at the landing site P0 as return light.
- the interrogator of the embodiment includes a mechanism that does not output the acquired information of the regulated sea area to the outside, at least in a form that can be used as it is.
- the masked section differs depending on the location of the interrogator. Therefore, for example, by creating a mask condition specified by a country or the like as a mask setting file and loading it into the interrogator, the interrogator operates for the first time. As will be described later, the mask setting file is prevented from being forged or rewritten by using electronic signature (certificate) technology.
- the regulation rule shown in FIG. 9 (c) further regulates the frequency range from f1 to f2 in the information that the submarine cable distance is between P1 and P2.
- the regulation range is narrower in FIG. 9C.
- the regulation rule as shown in FIG. 9C can also be observed without violating the regulation by describing the condition in the mask setting file and reading it into the interrogator.
- the number of sets of this mask setting is not limited to one, and a plurality of sets may be specified for one sensing cable.
- the mask activation condition (1) is a condition for activating the mask.
- the set value of the mask activation condition is, for example, a value corresponding to "always", “designated period”, "information due to an external factor of the transmission / reception device", and the like. "Always” means that the mask is always valid.
- the "designated period” is an activation condition in which the period is specified, for example, the mask is valid from March 15, 2020 to July 10, 2020.
- the "information due to an external factor of the transmission / reception device" is, for example, enabling the mask when the amount of solar radiation around the installation location of the sensing optical fiber 200 exceeds a certain threshold value (when it becomes bright).
- the transmitter / receiver is the interrogator 100.
- FIGS. 9 (b) and 9 (c) for the settings of the positions (start position and end position) and frequency range (high-frequency boundary and low-frequency boundary) on the cable to be masked in (2).
- a set value meaning that the mask is to be masked regardless of the frequency is also defined. For example, if both the high-frequency boundary and the low-frequency boundary are set to 0, it means that the entire frequency range is masked, and so on.
- the mask activation condition based on the event data can also be realized.
- the specific unit 101c automatically detects an event from the RAW data and the summary data using a technique such as pattern recognition, creates event data, and inputs the event data to the mask unit 101b. Based on the event data, the mask unit 101b can realize an operation of masking the surroundings of the object and removing the mask when there is a target event.
- Such a mask activation condition will be called an event driven type.
- the event-driven mask activation condition is the event type itself in the event data. For example, as mentioned in the background technology, various things such as earthquakes, impact sounds, gun sounds, people's screams, and the navigation of specific ships can be considered. An example of event-driven mask processing will be described later in the description of [Active mask processing].
- monitoring refers to the acquisition of acquired information by optical fiber sensing.
- a specific acoustic pattern that can be clearly distinguished from background noise and the like is intentionally diffused to the surroundings, and the mask processing is activated when the interrogator detects the acoustic pattern.
- the key information on how to change the acoustic pattern is shared in advance between the interrogator and the concealed object, so that the pattern changes from moment to moment. It is also possible to do.
- [Type of mask processing] The type of mask processing of (3) will be described. Since the target of the mask processing in the present embodiment is digital numerical data, various well-known methods can be applied as a mask processing method for digital numerical data. Mask processing methods include irreversible methods such as deletion and reversible methods such as scrambling.
- the first example of irreversible mask processing is deletion.
- the information of the section is deleted.
- the numerical value to be replaced is not limited to 0, and any numerical value that has nothing to do with the original data will delete the information.
- the numerical value to be replaced may be a random number.
- a processing example corresponding to the deletion mask processing example described above is shown in FIG. Since the description of FIG. 10 is as described in the figure, it is omitted.
- FIG. 11 shows a processing example corresponding to the mask processing example for deleting the acquired data only in the specific frequency range described above. Since the description of FIG. 11 is as described in the figure, it is omitted.
- a method using a fast Fourier transform (FFT) and an inverse fast Fourier transform (inverse FFT) is well known.
- FFT fast Fourier transform
- inverse FFT inverse fast Fourier transform
- the data in the regulated frequency range is replaced with a numerical value unrelated to the original data, and the data is returned to the time domain by the inverse fast Fourier transform.
- Masking of a specific frequency range is performed.
- the data range in the time direction for FFTing this is performed while sliding while partially overlapping. This is a well-known operation as a method for obtaining a running spectrum. This and the filter processing are combined to form a mask processing.
- the second irreversible mask processing is blurring of acquired data.
- This can typically be achieved by a moving average operation.
- the range of column numbers 2000 to 3000 indicating the position on the cable is the regulation range.
- the value in that range is calculated as the moving average of 10 consecutive data in the row direction in the row direction.
- the moving average of 50 consecutive ranges in the column direction is obtained in the column direction.
- the smoothing process by filtering in the column direction which is the time axis direction, is equivalent to removing high frequency components. Therefore, as a blurring processing method, it is also possible to perform high-frequency component removal filter processing on a specified range in the column direction and further in the row direction.
- the third irreversible mask process is mosaicking.
- Mosaicization is a process similar to the process performed when creating summary data from RAW data.
- the range in which the column number indicating the position on the cable is 2000 to 3000 is the regulation range.
- the value in that range is divided into a range of 5 data in the row direction and 50 data in the column direction to obtain a representative value of each division range, and the values in each division range are set respectively. It is realized by replacing it with a representative value.
- the data within the division range has a uniform value.
- the algorithm for obtaining the representative value is, for example, an average.
- a processing example corresponding to the mosaic processing example described above is shown in FIG. Since the description of FIG. 13 is as described in the figure, it is omitted.
- the processing parameters for example, the range for data processing
- the processing parameters are adjusted so that the object to be prevented from being discriminated is obscured to an indistinguishable degree, and the mask is masked. Specified in the settings.
- the fourth irreversible mask process is the transparency of acquired data.
- the entire sensing range is regarded as an aggregate of data ranges divided into predetermined distance units.
- the data range here is the range of the data string.
- the acquired data of each data range when the event is not detected is stored as background sample data.
- FIG. 14A the acquired data of a certain data range is made transparent, it is replaced with the background sample data of the data range.
- Fig. 14 (b) The acquired data has background noise according to the environmental conditions at that time even when no event has occurred. Therefore, when making transparent, it is more desirable to adjust the amplitude magnification so that the background noise amplitude included in the background sample data and the background noise amplitude of the masked target point are about the same, and then replace the data.
- FIG. 14 shows a processing example corresponding to the transparency mask processing example described above.
- FIG. 14A describes a procedure for acquiring background sample data. Background sample data is stored together with the background noise amount NPb for each data range in which the entire sensing range is divided into predetermined distance units. This procedure is performed at regular time intervals, and the background sample data is updated as appropriate.
- FIG. 14B describes the procedure of the transparency process.
- the current background noise amounts NPc1 and NPc2 of the data range adjacent to the data range in which the event to be transparent masked is detected are calculated, and the average value NPc is obtained.
- the data in the data range in which the event is detected is replaced with the data obtained by multiplying the background sample data in the data range in which the event is detected by NPc / NPb.
- a specific frequency range is subject to regulation, it is converted to data in the frequency domain using the Fast Fourier Transform, and then the data in the specific frequency range is encrypted with an encryption key. Then, reversible mask processing can be realized by converting the data into time domain data by the inverse fast Fourier transform. The process of decryption by a person having the decryption key can be performed in the same manner.
- event data can also be masked.
- the masking masks the event data generated in the specified distance range. In that case, or mask, masks the event data of the specified event type. Alternatively, a combination thereof may be performed.
- deletion or encryption is typically assumed.
- the acquired data whose predetermined range is masked is output to the external storage unit 102 or the external output unit 106 outside the interrogator.
- Data may be protected by applying a generally used data protection method to the acquired data output from the interrogator. For example, set access rights to a data file so that only users who have the authority to view the contents or copy the data can access it. Alternatively, it can be made inaccessible until a certain period of time has passed since the acquisition of the acquired data.
- Active mask processing When the above-mentioned event-driven mask activation condition is used in the mask setting described above (typically, a set of mask activation condition, mask range, and type of mask processing), a mask according to the acquired information is used. Processing can also be realized. Hereinafter, this is referred to as active mask processing. Two examples of active mask processing will be described.
- the first example is as follows. That is, first, an object that produces a specific acoustic pattern is detected by the specific unit 101c in FIG. 7 and used as certain event data. It is assumed that an event-driven mask condition is set for the type of event represented by this event data. Then, it is assumed that the mask condition is a mask section in which a designated margin is added around the place where the event is detected. Then, it is assumed that the type of mask processing is transparency.
- the detection position of the object in the event data moves, so the mask section also moves automatically. This masking process is canceled after a certain amount of time has passed since the event is no longer detected as the user moves away.
- the second is an example of a method of more actively utilizing active mask activation.
- an object dares to diffuse a particular acoustic pattern around it that is clearly distinguishable from background noise and the like.
- the specific unit 101c of FIG. 7 detects the acoustic pattern and activates a desired mask.
- the acoustic pattern is a pattern that changes randomly from moment to moment so as not to be recorded and imitated. Therefore, it is assumed that the interrogator 100 and the object share the secret key information for randomly changing the acoustic pattern in advance.
- the type of mask processing is, for example, transparency.
- a well-known method is used as a time-synchronized one-time password generation and authentication method.
- a common calculation formula for generating random numbers based on the time is stored in advance.
- the calculation formula shared only by this specific person is the secret key. Since many types of this calculation formula can be prepared, different random numbers are generated even at the same time if the calculation formulas are different. As a result, the other party can be authenticated only while sharing the calculation formula.
- the acoustic pattern authentication between specific two parties is performed by reflecting the random number generated based on the above-mentioned secret key (calculation formula) and the time in the acoustic pattern.
- the interrogator 100 can surely exclude the information regarding the passage of the object to be excluded from the acquired data without leaking more.
- the installation location of the cable provided with the sensing optical fiber of the present embodiment described above may be fictitious, onshore, underground, underwater, or undersea.
- the optical fiber sensing system of the present embodiment masks acquired data about a preset optical fiber position and vibration frequency range.
- the optical fiber sensing system of the present embodiment thereby limits the use of acquired data.
- the setting of the mask condition differs depending on the installation location of the interrogator 100 in FIG. 7. Since it is difficult to set the mask setting section at the factory when the interrogator 100 is shipped, it is necessary that the mask setting can be set for each interrogator according to the installation location of the sensing cable. That is, it is desirable that the interrogator 100 has a mechanism that allows the mask setting to be set, for example, by reading an electronic file called the mask setting file 440.
- the interrogator 100 cannot be changed arbitrarily, it becomes possible to operate the interrogator 100 without an appropriate mask setting or with a mask setting that does not conform to the sensing regulation. In order to prevent this, it is desired that the interrogator 100 also have a mechanism in which sensing cannot be performed unless the mask setting in accordance with the sensing regulation by the national government or the local government is set.
- a mechanism is provided in which monitoring cannot be performed unless the mask setting is properly set in the interrogator.
- the first is to provide a mechanism in which the interrogator 100 does not perform the monitoring operation unless the correct mask setting file 440 is read and set by the interrogator 100.
- the second is a measure to prevent tampering with the mask setting file. For example, based on mask conditions permitted by coastal states where the subject submarine cable passes through the exclusive economic zone, for example, a given public issuing agency 410 creates an encrypted mask configuration file 440, and , The mask setting file 440 is issued to the monitoring implementer 191 using the interrogator 100.
- the third is to set a valid period in the mask setting file that automatically expires after a predetermined period.
- the fourth is regular monitoring of the usage status (operating status) of the Interrogator 100.
- the interrogator 100 for example, sends the usage status to the monitoring server 500 by communication at a predetermined periodic timing.
- the monitoring server 500 automatically checks whether the interrogator 100 has been used illegally, and notifies the interrogator 100 of the extension of the validity period of the mask setting file only when there is no problem. If the interrogator 100 does not receive this deadline renewal, the interrogator 100 will not perform the monitoring operation by optical fiber sensing after the valid period.
- FIG. 17 is a diagram illustrating a flow from application to issuance of the mask setting file.
- the monitoring permission application 420 which is the application form, includes, for example, individual identification data of the interrogator 100, root coordinates of a cable connected to the interrogator, that is, information on an area to be monitored.
- the individual identification data is, for example, encrypted in order to prevent spoofing.
- it is encrypted data including the manufacturing serial number of the interrogator 100, the MAC (Media Access Control) address, and the like.
- the licensing agency 400 examines, investigates, and determines the licensing of monitoring of the application as an act of A302. As a result of that judgment, if monitoring is permitted on the condition that a regulated area is partially included but appropriate mask setting is performed, as an act of A303, a mask setting file is sent to a credible public issuing agency 410. Request the issuance of.
- the mask setting file issuance request 430 which is a request form related to the request, includes individual identification data and information on mask conditions. In addition, as a result of judgment, monitoring may not be permitted at all. In that case, the licensing body 400 is expected to notify the monitoring implementer 191 to that effect.
- the public issuing institution 410 creates an encrypted mask setting file 440 in which the mask setting contents requested for issuance are described as an act of A304. Then, the public issuing organization 410 sends the mask setting file 440 to the monitoring implementer as an act of A305.
- the monitoring implementer 191 causes the interrogator 100 to read the encrypted mask setting file 440 as an act of A306.
- the interrogator 100 holds in advance the key to decrypt the encryption. Therefore, the interrogator 100 decrypts the read mask setting file 440, confirms that the individual identification data matches its own, and performs the mask setting described in the mask setting file 440. As a result, the interrogator 100 can perform the monitoring operation in the range permitted for the cable.
- the mask setting file 440 can be said to be a monitoring permit in other words.
- the reason is that the mask setting file 440 has a role of setting to mask the acquired information of the regulated area and permitting monitoring of the other application areas.
- the above-mentioned application by the monitoring permission application 420, the request by the mask setting file issuance request 430, and the addition of the mask setting file 440 are all typically performed by electronic data as the main information.
- [Management of proper use] There is a problem that the mask setting file once properly issued is valid indefinitely. The reason is that, for example, an interrogator with loose mask conditions may be sold and used for another purpose in another place. In order to prevent this problem, it is effective to give the mask setting file a valid period and to have a mechanism for automatically updating the valid period at predetermined intervals.
- the procedure as shown in FIG. 17 is generally expected to take a number of days because it involves a human task of determining whether or not to permit monitoring. Therefore, if the validity period is shortened and the update frequency of the mask setting file 440 is shortened, the workload may become excessive and cause a problem. Therefore, the validity period is typically assumed to be one year or longer and cannot be shortened too much.
- the interrogator 100 automatically performs periodic notification 442 with the monitoring server 500 connected via the communication network 510.
- the communication is performed on a regular basis, for example.
- the monitoring server 500 is typically operated by the institution that issued the mask setting file, and holds or can refer to the contents of the latest mask setting file of each interrogator.
- the interrogator 100 notifies the monitoring server 500 of the individual identification data, the information indicating the contents of the mask setting, and the information indicating the current operation status and the operation status at a predetermined timing.
- the mask setting information is also held by the monitoring server 500. Therefore, the interrogator 100 determines in advance a hash function that can detect falsification of the checksum value and hash value of the mask setting information with the monitoring server 500, and sends the hash value to the monitoring server 500. You may.
- the monitoring server 500 automatically determines that the use of the interrogator 100 is appropriate based on the information 442 sent from the interrogator 100, the monitoring server 500 notifies the interrogator 100 of the extension of the validity period of the mask setting file 443. On the other hand, the monitoring server 500 does not extend the validity period of the mask setting file when it is determined that the use of the interrogator 100 is inappropriate or when the regulation needs to be tightened. If the interrogator 100 does not receive the notification 443 for extending the validity period from the monitoring server 500, the validity period expires and the information cannot be acquired by optical fiber sensing.
- the mechanism of FIG. 18 only confirms whether or not each interrogator is used in an permitted manner, and does not reexamine the mask setting content itself. Therefore, quick judgment and response can be performed automatically.
- One way to confirm that the interrogator is being used in a permitted location is to use an earthquake event, for example. Almost all information about earthquakes of a certain magnitude or larger on the earth is recorded and made public. Moreover, since the influence of seismic waves is localized and its velocity is finite, the detection time is clearly delayed in proportion to the distance from the epicenter. From this, the seismic event data detected by each interrogator plays a role similar to the "fingerprint" of the place where the cable is placed. Whether or not the cable installation route matches the route for which the permit was applied can be confirmed by comparing the detection result of the earthquake event felt by the cable with the published earthquake data.
- a thunder sound can be used as another confirmation means for confirming that the interrogator is being used in a permitted place.
- the reason is that the location and time of the lightning strike are published and can be used as control data.
- the mechanism added to the interrogator 100 in the second embodiment will be described with reference to FIGS. 7 and 16.
- the input of the mask setting file 440 is for making it possible to set a mask of conditions as required for each interrogator.
- the time information 441 is information that is indispensable for keeping a record of when and what kind of sensing data was obtained in the case of a sensing (monitoring) device.
- the input of the time information 441 is typically supplied from a device that receives radio waves from a GNSS (Global Navigation Satellite System) satellite and supplies highly accurate time information. As described above, the input of the mask setting file 440 and the time information 441 is not shown in the first embodiment, but should be implemented.
- GNSS Global Navigation Satellite System
- the input of the time information 441 is also necessary for realizing a mechanism for disabling the sensing operation when the valid period expires. It is desirable that the interrogator 100 also has a mechanism for disabling the sensing operation if there is no appropriate time information 441. Further, by providing a plurality of inputs of the time information 441, it is possible to prepare for a failure of the time information supply device or the like.
- the output of the status notification 442 and the input of the validity period update notification 443 are communications for managing proper use, which are described with reference to FIG.
- the above communication to the mask processing unit 111 does not need to be physically separated, and may be integrated into, for example, one Ethernet (registered trademark) interface port.
- an encryption key (not shown) for performing unauthorized modification prevention communication with the public issuance period 410 and the monitoring server 500 is stored at the time of shipment from the factory. Since the individual identification information is described in the encrypted form at the time of communication, for example, even if the same communication text is input to the separate interrogator 100, it is not valid. Such a mechanism is implemented in the mask control unit 111 in the interrogator 100. [effect] By using the monitoring method of the present embodiment, it becomes possible for a reliable public institution to guarantee that the regulated section is not monitored by the interrogator. As a result, even in the case of optical fiber sensing using a cable that partially covers the regulated section, there is a possibility that the acquisition of sensing information is permitted outside the regulated section.
- the RAW data is information representing the vibration of the sensing optical fiber.
- the RAW data may also represent the pressure or temperature of the sensing optical fiber.
- the RAW data may represent the degree of change other than the phase as long as it represents the degree of change due to the environment of the sensing optical fiber.
- the mask processing of the mask condition that is not the event-driven type does not require S103 "derivation of event data" in FIG. 8, so it is clear that the mask processing can be performed in front of S103 without performing S103. Further, for example, if only the mask processing for uniformly erasing a certain cable section is performed, it is possible to perform the processing at the same time as S101 “deriving RAW data” and not to perform the processing of S102 and S103.
- the optical fiber sensing method of the embodiment is not limited to DAS, and may be a sensing method expressed by another name.
- the methods expressed by the other names include, for example, DVS, DTS, and BOTDR.
- DVS is an abbreviation for distributed vibration sensing.
- DTS is an abbreviation for distributed temperament sensing.
- BOTDR is an abbreviation for Brillouin optical time-domine reflectometry.
- an optical fiber sensing other than the OTDR method which can perform sensing widely and distributedly, may be used.
- Patent Document 8 and Japanese Patent Document 3 disclose a distributed optical fiber sensing technique that uses transmitted light instead of the OTDR method that uses reflected return light.
- FIG. 19 is a block diagram showing the configuration of the processing device 101x, which is the minimum configuration of the processing device of the embodiment.
- the processing device 101x is provided inside a transmission / reception device used for optical fiber sensing using an optical fiber.
- the processing device 101x includes a mask unit 101bx and an output unit 107x.
- the mask unit 101bx masks a predetermined range of acquired data, which is data acquired by the transmitting / receiving device by the optical fiber sensing.
- the output unit 107x outputs the masked data, which is the masked data, to the outside of the transmission / reception device.
- the processing device 101x does not output the acquired data before the masking for the predetermined range is performed to the outside.
- the processing device 101x makes it possible to limit the use of the acquired acquired data within a predetermined range as necessary by the above configuration.
- the processing device 100x exhibits the effects described in the section of [Effects of the Invention] according to the above configuration.
- Appendix 1 It is installed inside the transmitter / receiver used for optical fiber sensing using optical fiber.
- a masking means that masks a predetermined range of acquired data, which is data acquired by the transmitting / receiving device, and an output means that outputs post-masked data, which is the masked data, to the outside of the transmitting / receiving device. With, The acquired data before the masking for the predetermined range is not output to the outside. Processing equipment.
- the target range which is the range of the acquired data for performing the mask processing, which is the processing for the mask performed by the mask means
- the activation condition which is the condition for performing the mask processing for the predetermined target range, and the above.
- One or more first combination information which is information indicating a combination of the type of mask processing and the mask processing, can be set.
- the processing apparatus described in Appendix 1. (Appendix 3) The first combination information can be changed.
- the activation condition is a designated period, which is always or a designated period.
- the designated period is based on information from the external factors.
- the activation condition is specified by the type of event detected from the acquired data.
- the processing apparatus according to any one of Supplementary note 2 to Supplementary note 5.
- the target range is designated by at least one of a position range and a frequency range on a cable comprising the optical fiber.
- the target range is set in association with the position of the event detected from the acquired data on the cable including the optical fiber.
- the processing apparatus according to any one of Supplementary note 2 to Supplementary note 8.
- the activation condition is that an object that emits a predetermined sound or vibration pattern is detected.
- the processing apparatus according to any one of Supplementary note 2 to Supplementary note 9.
- the object and the early processing apparatus share a calculation formula for generating a random number based on time information in advance, and the pattern is generated and updated using the early random number.
- the processing apparatus according to Appendix 10. It is a process of replacing the acquired data in the target range with data unrelated to the acquired data, which is deletion.
- the type of mask processing is blurring, which is a process of deriving a moving average of the acquired data in a predetermined time range and a positional range in the time direction and the position direction with respect to the acquired data in the target range.
- the processing apparatus according to any one of Supplementary note 2 to Supplementary note 9. (Appendix 14)
- the type of mask processing is uniformly representative of the acquired data in the predetermined time range and the acquired data in the positional range, which constitute the acquired data in the positional target range. It is a process of replacing with a value, it is a mosaic,
- the type of the mask processing is based on the background sample data which is the acquired data in the target range when the object is detected, which is stored in advance and is the acquired data when the object is not detected. Transparency, which is the process of replacement, The processing apparatus according to Appendix 10. (Appendix 17) The replacement is performed by adjusting the level of the background sample data so that the noise amount of the acquired data at the time of performing the replacement is equal to the background noise amount which is the noise amount of the background sample data. The processing apparatus according to Appendix 16. (Appendix 18)
- the type of mask processing is encryption, which is a process of encrypting the acquired data in the target range with the encryption key that can be decrypted by the decryption key corresponding to the encryption key.
- the processing apparatus according to any one of Supplementary note 2 to Supplementary note 9.
- the encryption is performed by each of the plurality of encryption keys according to the access authority level.
- the mask setting information includes the first combination information.
- the mask setting information includes individual identification information which is information that enables identification of the transmission / reception device, which is second encrypted, and is valid only in the transmission / reception device having the individual identification information. be, The processing apparatus according to Appendix 20.
- the mask setting information is the information in the installation route of the optical fiber that specifies not to acquire the acquired data in the target range in which the optical fiber sensing is regulated, and the third encryption is performed. Including in state, The processing apparatus according to Appendix 21.
- the transmission / reception device is a second combination information which is a combination of information representing the mask setting information set in the self-transmission / reception device and operation status information which is information representing at least a part of the operation status of the self-transmission / reception device.
- the monitoring server represents an extension of the validity period in which the fourth encryption is performed when the mask setting information represented by the information representing the mask setting information and the operation status information have a predetermined relationship.
- the notification information is sent to the transmission / reception device, and the notification information is sent to the transmission / reception device.
- the transmission / reception device confirms that the notification information is addressed to the self-transmission / reception device
- the transmission / reception device extends the validity period of the mask setting information and continues the optical fiber sensing.
- the processing apparatus according to any one of Supplementary note 20 to Supplementary note 22. (Appendix 24)
- the operation status information is event identification data obtained by identifying an event from the acquired data or the acquired data for a sound or vibration whose location and time can be specified by other publicly recorded information. By comparing the acquired data or the event identification data with the recorded information in the monitoring server, it is monitored whether or not the data is used in an appropriate place.
- the processing apparatus according to Appendix 23.
- the sound or vibration whose location and time can be specified is an earthquake.
- the processing apparatus according to Appendix 24. (Appendix 26) The sound or vibration whose location and time can be specified is the thunder that accompanies a lightning strike.
- the processing apparatus according to Appendix 24. (Appendix 27) Inside the transmitter / receiver used for optical fiber sensing using optical fiber The transmitter / receiver masks a predetermined range of the acquired data, which is the data acquired by the optical fiber sensing.
- the masked data which is the masked data, is output to the outside of the transmission / reception device.
- the acquired data before the masking for the predetermined range is not output to the outside. Processing method.
- Appendix 28 For computers installed inside transmitters and receivers used for optical fiber sensing using optical fibers A process of masking a predetermined range of acquired data, which is data acquired by the transmitting / receiving device by the optical fiber sensing, and A process of outputting the masked data, which is the masked data, to the outside of the transmission / reception device. To run, The acquired data before the masking for the predetermined range is not output to the outside. A recording medium on which a processing program is recorded.
- the optical fiber described in the appendix is, for example, an optical fiber included in the optical fiber 200 of FIG. 7 or the submarine cable of FIG.
- the transmission / reception device is, for example, the interrogator 100 of FIGS. 7, 16, 17, and 18.
- the acquired data is, for example, acquired data acquired by the acquisition processing unit 101a or the specific unit 101c of FIG. 7.
- the mask portion is, for example, the mask portion 101b of FIG. 7 or the mask portion 101bx of FIG.
- the output unit is a portion of the processing unit 101 of FIG. 7 that outputs data from the mask unit 101b to the output I / F.
- the processing device is, for example, the processing unit 101 or the interrogator 100 of FIG.
- the target range is, for example, a combination of the regulated sea area of FIG. 9 (b) or the regulated sea area of FIG. 9 (c) and the regulated frequency range.
- the activation condition is, for example, a mask activation condition described in the embodiment.
- the designated period is a designated period as an example of the mask activation condition described in the embodiment.
- the information due to the external factor is, for example, information due to the external factor described in the embodiment.
- the event is the event explained in the background technology section.
- the cable is, for example, the submarine cable of FIG.
- the start position is, for example, a position represented by the cable distance P1 in FIG.
- the end position is, for example, a position represented by the cable distance P2 in FIG.
- the object is, for example, a submarine described in the embodiment.
- the deletion is, for example, the process shown in FIG. 10 or FIG.
- the blurring is, for example, the process shown in FIG.
- the mosaication is, for example, the process shown in FIG.
- the transparency is, for example, the process shown in FIG.
- the encryption is, for example, the process shown in FIG.
- the mask setting information is, for example, the mask setting file 440 of FIG.
- the second encryption is, for example, the encryption performed on the mask setting file 440 of FIG.
- the individual identification information is, for example, the individual identification data of FIG.
- the third encryption is the encryption performed in the status notification 442 of FIG.
- the operation status information is, for example, information sent by the status notification 442 of FIG.
- the monitoring server is, for example, the monitoring server 500 shown in FIG.
- the fourth encryption is, for example, the encryption performed in the validity period update notification 443 of FIG.
- the notification information is, for example, information sent by the validity period update notification of FIG.
- the other recorded information is, for example, information related to an earthquake or information representing a lightning location and time, which is explained in the embodiment.
- the processing program is, for example, a program for causing a computer included in the interrogator 100 of FIG. 7, FIG. 16, FIG. 17 or FIG. 18 to execute processing.
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Electromagnetism (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Optics & Photonics (AREA)
- Chemical & Material Sciences (AREA)
- Analytical Chemistry (AREA)
- Computer Security & Cryptography (AREA)
- Geophysics And Detection Of Objects (AREA)
- Optical Transform (AREA)
Abstract
Description
列番号1を除く、行番号と列番号との組合せにより特定される個々の数値は、環境情報の程度を表すセンサ出力値である。以下、この値をセンシング出力値と呼ぶ。センシング出力値は、光ファイバ上に数珠繋ぎに配置されたセンサ(センサアレイ)を仮想的に想定したときの各センサの出力値である。取得処理部101aは戻り光を演算処理して、典型的にはこのような仮想センサアレイからの出力の形のデータを算出する。
得られたRAWデータ、サマリーデータ、イベントデータは、出力I/F107を介して、外部記憶部102に格納されたり、外部出力部106で画像表示されたりする。
<第一の実施形態>
本実施形態は、取得情報の所定の範囲部分をマスクする光ファイバセンシングシステムに関する実施形態である。なお、以降の説明においては、「マスク」とは、対象範囲の取得情報を、取り除くもしくは暗号化するなどして利用できない状態にすること、をいうことにする。
[インテロゲータの構成]
図7は、本実施形態の光ファイバセンシングシステムの例であるDASシステム300の構成を表す概念図である。図7に表されるDASシステム300は、図2に表されるDASシステム300の処理部101に、マスク部101bを追加したものである。図7に表されるDASシステム300は、以下の点が、図2に表されるDASシステム300と異なる。以下、図7に表されるDASシステム300の図1に表されるDASシステム300からの相違点を主に説明する。
[動作の一例]
図9は、本実施形態のDASシステムが行う動作の代表的な例を表すイメージ図である。図9(a)は光ファイバセンシングシステムのセンシング光ファイバを備える海底ケーブルの設置のされ方を表すイメージ図である。
[マスク発動条件、マスク範囲]
(1)のマスク発動条件とは、マスクを有効化する条件である。マスク発動条件の設定値は、例えば「常時」、「指定期間」、「送受信装置の外部の要因による情報」に対応する値、などである。「常時」とは、当該マスクが常に有効という意味である。「指定期間」とは、例えば2020年3月15日から同年7月10日まで当該マスクが有効、などのように期間を指定した発動条件である。「送受信装置の外部の要因による情報」とは、例えばセンシング光ファイバ200の設置場所周辺の日射量がある閾値を上回ったら(明るくなったら)マスクを有効化する、などである。ここで送受信装置とはインテロゲータ100のことである。
[マスク処理の種類]
(3)のマスク処理の種類について説明する。本実施形態におけるマスク処理の対象はデジタル数値データであるので、デジタル数値データのマスク処理方法として周知の様々な手法が適用可能である。マスク処理方法には、削除などの不可逆な方法と、スクランブルのように可逆な方法がある。
取得データには、イベントが生じていない場合もその時の環境条件に応じた背景ノイズがある。そのため、透明化を行う場合には、背景サンプルデータに含まれる背景ノイズ振幅と、マスク対象地点の背景ノイズ振幅が同程度になるように振幅倍率を調整したのちに置換する方がより望ましい。
[能動的なマスク処理]
以上説明したマスク設定(典型的には、マスク発動条件、マスク範囲、マスク処理の種類、の組である)において、前述のイベントドリブン型のマスク発動条件を用いると、取得した情報に応じたマスク処理も実現可能となる。以降ではこれを能動的なマスク処理と呼ぶ。能動的なマスク処理の例を二例説明する。
[効果]
本実施形態の光ファイバセンシングシステムは、予め設定された光ファイバ位置や振動周波数範囲についての取得データをマスクする。本実施形態の光ファイバセンシングシステムは、これにより、取得データの利用を制限する。
<第二の実施形態>
以上述べた実施形態においては、マスク条件の設定(マスク設定)は、図7のインテロゲータ100の設置場所により異なる。インテロゲータ100を出荷する際に、その工場でマスク設定区間を設定するのは困難であるから、前記マスク設定はインテロゲータ個別に、センシングケーブルの設置場所に即した設定ができる必要がある。すなわちインテロゲータ100は、マスク設定を、例えばマスク設定ファイル440という電子ファイルを読み込ませるなどで設定可能な仕組みを備えることが望ましい。
[マスク設定ファイルの発行管理]
図17はマスク設定ファイルの申請から発行されるまでの流れを説明する図である。
[適正使用の管理]
一度適正に発行されたマスク設定ファイルが無期限に有効なのは問題がある。その理由は、例えば、緩いマスク条件の設定がされたインテロゲータが売られて、別の場所で別の目的に使用される危険性があるためである。この問題を防ぐためには、マスク設定ファイルには有効期間を持たせ、所定の間隔で有効期間を自動更新する仕組みとすることが有効である。
[インテロゲータの追加構成要素]
第二の実施形態でインテロゲータ100に追加された仕組みを、図7と図16を対照しながら説明する。マスク設定ファイル440の入力は、インテロゲータ個別に、必要に応じた条件のマスクを設定可能とするためのものである。時刻情報441は、センシング(モニタリング)装置であれば、いつ、どのようなセンシングデータが得られたのか、という記録を残すために必ず必要となる情報である。時刻情報441の入力は、典型的にはGNSS(Global Navigation Satellite System)衛星からの電波を受信して高精度の時刻情報を供給する装置から供給されるものである。このように、マスク設定ファイル440および時刻情報441の入力は、第一の実施形態においても図示されていないが実装されて然るべきものである。
[効果]
本実施形態の監視方法を用いれば、規制区間が当該インテロゲータによってモニタリングされていないことが、信頼できる公的機関により、担保できるようになる。これにより一部が規制区間にかかっているケーブルを用いた光ファイバセンシングであっても、規制区間外については、センシング情報の取得が認められる可能性が生まれる。
(付記1)
光ファイバによる光ファイバセンシングに用いられる送受信装置の内部に備えられ、
前記送受信装置が前記光ファイバセンシングにより取得したデータである取得データにおける所定の範囲をマスクするマスク手段と
前記マスクを行った前記データであるマスク後データを前記送受信装置の外部に出力する出力手段と、を備え、
前記所定の範囲についての前記マスクが行われる前の前記取得データを前記外部に出力しない、
処理装置。
(付記2)
前記マスク手段で行われる前記マスクのための処理であるマスク処理を行う前記取得データの範囲である対象範囲と、所定の前記対象範囲について前記マスク処理を行う条件である発動条件と、及び、前記マスク処理の種類と、の組合せを表す情報である第一組合せ情報を、一つ以上、設定可能である、
付記1に記載された処理装置。
(付記3)
前記第一組合せ情報を変更可能である、
付記2に記載された処理装置。
(付記4)
前記発動条件が、常時又は指定された期間である指定期間である、
付記2又は付記3に記載された処理装置。
(付記5)
前記指定期間が前記外部の要因による情報に基づくものである、
付記4に記載された処理装置。
(付記6)
前記発動条件は、前記取得データから検出されたイベントの種類により指定される、
付記2乃至付記5のうちのいずれか一に記載された処理装置。
(付記7)
前記対象範囲は、前記光ファイバを備えるケーブル上の位置範囲及び周波数範囲のうちの少なくともいずれかにより指定される、
付記2乃至付記6のうちのいずれか一に記載された処理装置。
(付記8)
前記位置範囲は、開始位置と終了位置とにより特定される、付記7に記載された処理装置。
(付記9)
前記対象範囲を、前記取得データから検出されたイベントの、前記光ファイバを備えるケーブル上の位置に関連付けて設定する、
付記2乃至付記8のうちのいずれか一に記載された処理装置。
(付記10)
前記発動条件は、予め定められた音又は振動のパターンを発する物体が検知されたことである、
付記2乃至付記9のうちのいずれか一に記載された処理装置。
(付記11)
前記物体と前期処理装置は、時刻情報を基に乱数を生成する計算式を予め共有しており、前記パターンは、前期乱数を用いて生成され、更新される、
付記10に記載された処理装置。
(付記12)
前記対象範囲の前記取得データを前記取得データとは無関係なデータで置換する処理である、削除である、
付記2乃至付記9のうちのいずれか一に記載された処理装置。
(付記13)
前記マスク処理の種類は、前記対象範囲の前記取得データについて、所定の時間的範囲及び位置的範囲の前記取得データの、時間方向及び位置方向についての、移動平均の導出を行う処理である、ぼかしである、
付記2乃至付記9のうちのいずれか一に記載された処理装置。
(付記14)
前記マスク処理の種類は、位置的な前記対象範囲の前記取得データを構成する、所定の時間的範囲及び位置的範囲の前記取得データの、各々について、一律に、当該範囲の前記取得データの代表値で置き換える処理である、モザイク化である、
付記2乃至付記9のうちのいずれか一に記載された処理装置。
(付記15)
前記代表値が平均値である、付記14に記載された処理装置。
(付記16)
前記マスク処理の種類は、前記物体が検出されたときの、前記対象範囲の前記取得データを、予め記憶しておいた、前記物体が検出されなかったときの前記取得データである背景サンプルデータにより置換する処理である透明化である、
付記10に記載された処理装置。
(付記17)
前記置換を、前記置換を行う際の前記取得データのノイズ量が、前記背景サンプルデータのノイズ量である背景ノイズ量と等しくなるように、前記背景サンプルデータのレベルを調整することにより行う、
付記16に記載された処理装置。
(付記18)
前記マスク処理の種類は、前記対象範囲の前記取得データを、暗号鍵に対応する復号鍵により復号可能な前記暗号鍵により暗号化する処理である暗号化である、
付記2乃至付記9のうちのいずれか一に記載された処理装置。
(付記19)
前記暗号化は、アクセス権限レベルに応じた複数の前記暗号鍵の各々によるものである、
付記18に記載された処理装置。
(付記20)
有効期間内のマスク設定情報が入力されない限り、前記取得データの取得が行われないように構成され、
前記マスク設定情報は前記第一組合せ情報を含む、
付記2乃至付記19のうちのいずれか一に記載された処理装置。
(付記21)
前記マスク設定情報は、第二の暗号化が行われた、前記送受信装置の識別を可能にする情報である個体識別情報を含み、前記個体識別情報を有する前記送受信装置でのみ有効となるものである、
付記20に記載された処理装置。
(付記22)
前記マスク設定情報は、前記光ファイバの設置ルートにある、前記光ファイバセンシングが規制された前記対象範囲の前記取得データを前記取得しないように指定する情報を、第三の暗号化が行われた状態で含む、
付記21に記載された処理装置。
(付記23)
前記送受信装置は、自送受信装置に設定された前記マスク設定情報を表す情報と、前記自送受信装置の動作状況の少なくとも一部を表す情報である動作状況情報と、の組合せである第二組合せ情報を監視サーバに送付し、
前記監視サーバは、前記マスク設定情報を表す情報が表す前記マスク設定情報と前記動作状況情報とが所定の関係にある場合に、第四の暗号化が行われた、前記有効期間の延長を表す通知情報を、前記送受信装置に送付し、
前記送受信装置は当該通知情報が前記自送受信装置に宛てたものであることを確認した場合に、前記マスク設定情報の前記有効期間を延長して、前記光ファイバセンシングを継続する、
付記20乃至付記22のうちのいずれか一に記載された処理装置。
(付記24)
前記動作状況情報は、公開される他の記録情報により場所と時刻が特定可能な音又は振動についての、前記取得データ又は前記取得データからイベントを識別することにより得られたイベント識別データであり、前記監視サーバにおいて、前記取得データ又は前記イベント識別データを前記記録情報と対照することにより、適正な場所で使用されているか否かが監視される、
付記23に記載された処理装置。
(付記25)
前記場所と時刻が特定可能な音又は振動は、地震である、
付記24に記載された処理装置。
(付記26)
前記場所と時刻が特定可能な音又は振動は、発雷に伴う雷鳴である、
付記24に記載された処理装置。
(付記27)
光ファイバによる光ファイバセンシングに用いられる送受信装置の内部において、
前記送受信装置が前記光ファイバセンシングにより取得したデータである取得データにおける所定の範囲をマスクし、
前記マスクを行った前記データであるマスク後データを前記送受信装置の外部に出力し、
前記所定の範囲についての前記マスクが行われる前の前記取得データを前記外部に出力しない、
処理方法。
(付記28)
光ファイバによる光ファイバセンシングに用いられる送受信装置の内部に備えられるコンピュータに、
前記送受信装置が前記光ファイバセンシングにより取得したデータである取得データにおける所定の範囲をマスクする処理と、
前記マスクを行った前記データであるマスク後データを前記送受信装置の外部に出力する処理と、
を実行させ、
前記所定の範囲についての前記マスクが行われる前の前記取得データを前記外部に出力させない、
処理プログラムを記録した記録媒体。
101 処理部
101x 処理装置
101a 取得処理部
101b、101bx マスク部
101c 特定部
102 外部記憶部
103 光源部
104 変調部
105 検出部
106 外部出力部
107 出力I/F
107x 出力部
109 同期制御部
111 マスク制御部
191 モニタリング実施者
200、201、202 光ファイバ
211 光カプラ
300 DASシステム
400 許認可機関
410 公的発行機関
420 モニタリング許可申請
430 マスク設定ファイル発行依頼
440 マスク設定ファイル
441 時刻情報
442 状態通知
443 有効期間更新通知
500 監視サーバ
801、802 後方散乱光
901 RAWデータ
902 サマリーデータ
903 イベントデータ
Claims (28)
- 光ファイバによる光ファイバセンシングに用いられる送受信装置の内部に備えられ、
前記送受信装置が前記光ファイバセンシングにより取得したデータである取得データにおける所定の範囲をマスクするマスク手段と
前記マスクを行った前記データであるマスク後データを前記送受信装置の外部に出力する出力手段と、を備え、
前記所定の範囲についての前記マスクが行われる前の前記取得データを前記外部に出力しない、
処理装置。 - 前記マスク手段で行われる前記マスクのための処理であるマスク処理を行う前記取得データの範囲である対象範囲と、所定の前記対象範囲について前記マスク処理を行う条件である発動条件と、及び、前記マスク処理の種類と、の組合せを表す情報である第一組合せ情報を、一つ以上、設定可能である、
請求項1に記載された処理装置。 - 前記第一組合せ情報を変更可能である、
請求項2に記載された処理装置。 - 前記発動条件が、常時又は指定された期間である指定期間である、
請求項2又は請求項3に記載された処理装置。 - 前記指定期間が前記外部の要因による情報に基づくものである、
請求項4に記載された処理装置。 - 前記発動条件は、前記取得データから検出されたイベントの種類により指定される、
請求項2乃至請求項5のうちのいずれか一に記載された処理装置。 - 前記対象範囲は、前記光ファイバを備えるケーブル上の位置範囲及び周波数範囲のうちの少なくともいずれかにより指定される、
請求項2乃至請求項6のうちのいずれか一に記載された処理装置。 - 前記位置範囲は、開始位置と終了位置とにより特定される、請求項7に記載された処理装置。
- 前記対象範囲を、前記取得データから検出されたイベントの、前記光ファイバを備えるケーブル上の位置に関連付けて設定する、
請求項2乃至請求項8のうちのいずれか一に記載された処理装置。 - 前記発動条件は、予め定められた音又は振動のパターンを発する物体が検知されたことである、
請求項2乃至請求項9のうちのいずれか一に記載された処理装置。 - 前記物体と前期処理装置は、時刻情報を基に乱数を生成する計算式を予め共有しており、前記パターンは、前期乱数を用いて生成され、更新される、
請求項10に記載された処理装置。 - 前記対象範囲の前記取得データを前記取得データとは無関係なデータで置換する処理である、削除である、
請求項2乃至請求項9のうちのいずれか一に記載された処理装置。 - 前記マスク処理の種類は、前記対象範囲の前記取得データについて、所定の時間的範囲及び位置的範囲の前記取得データの、時間方向及び位置方向についての、移動平均の導出を行う処理である、ぼかしである、
請求項2乃至請求項9のうちのいずれか一に記載された処理装置。 - 前記マスク処理の種類は、位置的な前記対象範囲の前記取得データを構成する、所定の時間的範囲及び位置的範囲の前記取得データの、各々について、一律に、当該範囲の前記取得データの代表値で置き換える処理である、モザイク化である、
請求項2乃至請求項9のうちのいずれか一に記載された処理装置。 - 前記代表値が平均値である、請求項14に記載された処理装置。
- 前記マスク処理の種類は、前記物体が検出されたときの、前記対象範囲の前記取得データを、予め記憶しておいた、前記物体が検出されなかったときの前記取得データである背景サンプルデータにより置換する処理である透明化である、
請求項10に記載された処理装置。 - 前記置換を、前記置換を行う際の前記取得データのノイズ量が、前記背景サンプルデータのノイズ量である背景ノイズ量と等しくなるように、前記背景サンプルデータのレベルを調整することにより行う、
請求項16に記載された処理装置。 - 前記マスク処理の種類は、前記対象範囲の前記取得データを、暗号鍵に対応する復号鍵により復号可能な前記暗号鍵により暗号化する処理である暗号化である、
請求項2乃至請求項9のうちのいずれか一に記載された処理装置。 - 前記暗号化は、アクセス権限レベルに応じた複数の前記暗号鍵の各々によるものである、
請求項18に記載された処理装置。 - 有効期間内のマスク設定情報が入力されない限り、前記取得データの取得が行われないように構成され、
前記マスク設定情報は前記第一組合せ情報を含む、
請求項2乃至請求項19のうちのいずれか一に記載された処理装置。 - 前記マスク設定情報は、第二の暗号化が行われた、前記送受信装置の識別を可能にする情報である個体識別情報を含み、前記個体識別情報を有する前記送受信装置でのみ有効となるものである、
請求項20に記載された処理装置。 - 前記マスク設定情報は、前記光ファイバの設置ルートにある、前記光ファイバセンシングが規制された前記対象範囲の前記取得データを前記取得しないように指定する情報を、第三の暗号化が行われた状態で含む、
請求項21に記載された処理装置。 - 前記送受信装置は、自送受信装置に設定された前記マスク設定情報を表す情報と、前記自送受信装置の動作状況の少なくとも一部を表す情報である動作状況情報と、の組合せである第二組合せ情報を監視サーバに送付し、
前記監視サーバは、前記マスク設定情報を表す情報が表す前記マスク設定情報と前記動作状況情報とが所定の関係にある場合に、第四の暗号化が行われた、前記有効期間の延長を表す通知情報を、前記送受信装置に送付し、
前記送受信装置は当該通知情報が前記自送受信装置に宛てたものであることを確認した場合に、前記マスク設定情報の前記有効期間を延長して、前記光ファイバセンシングを継続する、
請求項20乃至請求項22のうちのいずれか一に記載された処理装置。 - 前記動作状況情報は、公開される他の記録情報により場所と時刻が特定可能な音又は振動についての、前記取得データ又は前記取得データからイベントを識別することにより得られたイベント識別データであり、前記監視サーバにおいて、前記取得データ又は前記イベント識別データを前記記録情報と対照することにより、適正な場所で使用されているか否かが監視される、
請求項23に記載された処理装置。 - 前記場所と時刻が特定可能な音又は振動は、地震である、
請求項24に記載された処理装置。 - 前記場所と時刻が特定可能な音又は振動は、発雷に伴う雷鳴である、
請求項24に記載された処理装置。 - 光ファイバによる光ファイバセンシングに用いられる送受信装置の内部において、
前記送受信装置が前記光ファイバセンシングにより取得したデータである取得データにおける所定の範囲をマスクし、
前記マスクを行った前記データであるマスク後データを前記送受信装置の外部に出力し、
前記所定の範囲についての前記マスクが行われる前の前記取得データを前記外部に出力しない、
処理方法。 - 光ファイバによる光ファイバセンシングに用いられる送受信装置の内部に備えられるコンピュータに、
前記送受信装置が前記光ファイバセンシングにより取得したデータである取得データにおける所定の範囲をマスクする処理と、
前記マスクを行った前記データであるマスク後データを前記送受信装置の外部に出力する処理と、
を実行させ、
前記所定の範囲についての前記マスクが行われる前の前記取得データを前記外部に出力させない、
処理プログラムを記録した記録媒体。
Priority Applications (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US17/795,961 US12323182B2 (en) | 2020-01-30 | 2020-12-28 | Processing device, processing method, and recording medium |
| JP2021574561A JP7310940B2 (ja) | 2020-01-30 | 2020-12-28 | 処理装置及び処理方法 |
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| JP2020013946 | 2020-01-30 | ||
| JP2020-013946 | 2020-01-30 |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2021153143A1 true WO2021153143A1 (ja) | 2021-08-05 |
Family
ID=77079032
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/JP2020/049077 Ceased WO2021153143A1 (ja) | 2020-01-30 | 2020-12-28 | 処理装置、処理方法及び記録媒体 |
Country Status (3)
| Country | Link |
|---|---|
| US (1) | US12323182B2 (ja) |
| JP (1) | JP7310940B2 (ja) |
| WO (1) | WO2021153143A1 (ja) |
Families Citing this family (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US12155748B2 (en) * | 2022-04-07 | 2024-11-26 | Bank Of America Corporation | System and method for generating a block in a blockchain network using a voice-based hash value generated by a voice signature |
Citations (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JPS61500180A (ja) * | 1983-09-12 | 1986-01-30 | ジオソ−ス インコ−ポレ−テツド | 多線地震探査方法および装置 |
| US20160252651A1 (en) * | 2014-10-01 | 2016-09-01 | Halliburton Energy Services, Inc. | Trace downsampling of distributed acoustic sensor data |
| US20180283169A1 (en) * | 2015-10-07 | 2018-10-04 | Swellfix Uk Limited | Data systems, devices, and methods |
| WO2019072899A2 (en) * | 2017-10-11 | 2019-04-18 | Bp Exploration Operating Company Limited | EVENT DETECTION USING FREQUENCY DOMAIN ACOUSTIC CHARACTERISTICS |
| JP2019522197A (ja) * | 2016-06-29 | 2019-08-08 | オプタセンス・ホールデイングス・リミテツド | 列車内の力のモニタリングのための分布型光ファイバセンシング |
Family Cites Families (16)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| GB2126820B (en) | 1982-07-17 | 1986-03-26 | Plessey Co Plc | An optical sensing system |
| US5023445A (en) * | 1990-04-27 | 1991-06-11 | Tektronix, Inc. | Signal acquisition method and automatic masking system for an OTDR |
| JP3722653B2 (ja) | 1999-08-31 | 2005-11-30 | 松下電器産業株式会社 | 監視カメラ装置及び監視カメラの表示方法 |
| JP4566474B2 (ja) | 2001-07-30 | 2010-10-20 | パナソニック株式会社 | 画像処理装置および画像処理方法 |
| JP2004012280A (ja) * | 2002-06-06 | 2004-01-15 | Tokyo Gas Co Ltd | 光ファイバ振動センサ及び振動測定方法 |
| JP3743403B2 (ja) | 2002-07-15 | 2006-02-08 | 株式会社日立製作所 | 防犯装置 |
| JP4143969B2 (ja) | 2003-06-05 | 2008-09-03 | 日本ビクター株式会社 | 監視システム |
| JP4573158B2 (ja) | 2004-02-26 | 2010-11-04 | 日本ビクター株式会社 | 監視画像の生成方法、監視画像生成装置 |
| JP4402998B2 (ja) | 2004-03-29 | 2010-01-20 | 三菱電機株式会社 | マスキング機能付き監視システムおよびカメラ、並びに該カメラとともに用いられるマスク解除装置 |
| US8174627B2 (en) * | 2005-09-06 | 2012-05-08 | Hewlett-Packard Development Company, L.P. | Selectively masking image data |
| JP5471919B2 (ja) | 2010-07-14 | 2014-04-16 | 富士通株式会社 | 画像処理装置、画像処理プログラム及び画像処理方法、並びに移動体 |
| JP6190141B2 (ja) | 2013-04-11 | 2017-08-30 | 日置電機株式会社 | 記録装置、記録方法 |
| US9469247B2 (en) * | 2013-11-21 | 2016-10-18 | Harman International Industries, Incorporated | Using external sounds to alert vehicle occupants of external events and mask in-car conversations |
| GB201519202D0 (en) * | 2015-10-30 | 2015-12-16 | Optasense Holdings Ltd | Monitoring traffic flow |
| US10018558B2 (en) | 2016-08-22 | 2018-07-10 | Nec Corporation | Distributed acoustic sensing in a multicore optical fiber using distributed mode coupling, delay, and simultaneous pulsing with selectable spatial modes |
| JP6850516B2 (ja) * | 2018-05-10 | 2021-03-31 | 学校法人玉川学園 | 信号処理装置 |
-
2020
- 2020-12-28 WO PCT/JP2020/049077 patent/WO2021153143A1/ja not_active Ceased
- 2020-12-28 JP JP2021574561A patent/JP7310940B2/ja active Active
- 2020-12-28 US US17/795,961 patent/US12323182B2/en active Active
Patent Citations (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JPS61500180A (ja) * | 1983-09-12 | 1986-01-30 | ジオソ−ス インコ−ポレ−テツド | 多線地震探査方法および装置 |
| US20160252651A1 (en) * | 2014-10-01 | 2016-09-01 | Halliburton Energy Services, Inc. | Trace downsampling of distributed acoustic sensor data |
| US20180283169A1 (en) * | 2015-10-07 | 2018-10-04 | Swellfix Uk Limited | Data systems, devices, and methods |
| JP2019522197A (ja) * | 2016-06-29 | 2019-08-08 | オプタセンス・ホールデイングス・リミテツド | 列車内の力のモニタリングのための分布型光ファイバセンシング |
| WO2019072899A2 (en) * | 2017-10-11 | 2019-04-18 | Bp Exploration Operating Company Limited | EVENT DETECTION USING FREQUENCY DOMAIN ACOUSTIC CHARACTERISTICS |
Also Published As
| Publication number | Publication date |
|---|---|
| US20230075118A1 (en) | 2023-03-09 |
| JPWO2021153143A1 (ja) | 2021-08-05 |
| US12323182B2 (en) | 2025-06-03 |
| JP7310940B2 (ja) | 2023-07-19 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CA2780673C (en) | Fibre optic distributed sensing | |
| Belikovetsky et al. | Digital audio signature for 3D printing integrity | |
| CN103824406A (zh) | 基于光纤传感的隧道电缆入侵探测方法和系统 | |
| CN109564113B (zh) | 光纤感测 | |
| CN203799460U (zh) | 基于光纤传感的隧道电缆入侵探测系统 | |
| Hastie et al. | Effects of impulsive noise on marine mammals: investigating range‐dependent risk | |
| EP0822551B1 (en) | Recording apparatus with system for authentification of the recorded material | |
| JP2020527236A (ja) | 海洋環境における分散音響センシングの方法及びシステム | |
| KR20140022774A (ko) | 무결성 모니터링 시스템 및 고정적인 구조물의 무결성을 모니터링하는 방법 | |
| WO2012022933A1 (en) | Gunfire detection | |
| JP2024540489A (ja) | 分散型光ファイバセンシングを利用した埋設ケーブルの保護のためのインパルス信号検出 | |
| JP7310940B2 (ja) | 処理装置及び処理方法 | |
| US8284387B2 (en) | Methods and systems for recognizing tamper events | |
| JP7371703B2 (ja) | センシング範囲制限装置および光ファイバセンシング範囲制限方法 | |
| Agbakwuru | Pipeline potential leak detection technologies: assessment and perspective in the Nigeria Niger Delta region | |
| CN106789969B (zh) | 一种使用虚拟现实设备实现保密数据输入的方法及系统 | |
| Adhikari | Manufacturing espionage: from the front office to the factory floor | |
| Kovtun et al. | Fiber-optic perimeter security system based on spectral mode analysis | |
| Levels et al. | ONLINE COURSE | |
| Zhang et al. | Research on Underwater Acoustic Detection Based on Submarine Cable Distributed Acoustic Sensing | |
| CN211597989U (zh) | 一种精确定位型水下安防拦阻网系统 | |
| CN108111231B (zh) | 声光耦合频移加密装置 | |
| Conev | Combating Maritime Cyber Attacks | |
| AlGadi et al. | Systems: An Arduino-Based Case Study | |
| Liu et al. | Detection for weak hydroacoustic signals of uwFBG marine sensors based on GA-PSO optimized PSR and SVM |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 20916352 Country of ref document: EP Kind code of ref document: A1 |
|
| ENP | Entry into the national phase |
Ref document number: 2021574561 Country of ref document: JP Kind code of ref document: A |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| 122 | Ep: pct application non-entry in european phase |
Ref document number: 20916352 Country of ref document: EP Kind code of ref document: A1 |
|
| WWG | Wipo information: grant in national office |
Ref document number: 17795961 Country of ref document: US |