Fence bottom security device
Fencing has a flaw of allowing unwanted access to the fenced area by way of unwanted (predator) animals or humans digging under the base of the fence. The corrective security device consists of an elongated frame with long spikes. The elongated frame may or may not have attachment members attaching the elongated frame with spikes to the post and/or wire of the fenced area or to some post and/or wire of the fenced area or in some cases to no post and/or wire of the fenced area after the device is driven into the ground between posts of a fenced area. This barrier created by this device eliminates the flaw by allowing the fence area to be secured, thus making the fence a workable and financially sound investment.
The present invention relates generally to fence bottom security devices. More particularly, the present application involves a fence bottom security device that may be used as a barrier to prevent predator or domestic animals from digging under a fence to prevent the animal from breaching the fence.
BACKGROUNDFences are used to prevent access to and from a particular area. One common use for fences involves the containment of domestic animals into a desired enclosure. A homeowner often erects a fence in the hope that it will prevent his or her animals from disturbing their neighbors, being hit by vehicles, injuring or breeding with other animals, becoming lost, or hurting children. In a similar manner, fences are often used with the purpose of keeping other animals away from a particular area of the landowner. For instance, the homeowner may wish to protect animals or children within an enclosed area from being attacked by stray animals or taken by strangers. Although various types of fencing are in use to prevent access across the fence, all fences have weak points that can be exploited in order to completely frustrate the intended purpose of having the fence.
For example, a landowner may keep high investment animals such as registered show horses, registered breeding animals, and cattle in addition to other pets or small game or farm animals such as sheep, goats, chickens, turkeys, rabbits and birds within a fenced enclosure. Predatory animals such as coyotes, wild dogs, wolves, or domestic dogs may not be able to jump over the fence or traverse through the fence. However, the predator animal can dig the ground directly under the fence to create an opening under the fence sufficient to enter the enclosed area and kill or injure the animals contained therein. Digging and pushing under a fence made of wire usually pushes out the bottom of the wire to result in the fence being unattractive and less useful for its intended purpose. As such, a fence may be breached by an animal making the owners investment of the fence useless.
The holes can likewise be dug by the owner's animals thus allowing them to escape. Holes left by digging animals will allow animals or children to freely crawl under the fence to both exit and enter the fenced area which facilitates the loss or damage of the homeowner's animals, property, or children. There are known current systems that can be installed at the base of the fence. However, these systems are not designed to prevent an animal from digging under the fence but rather are used for preventing weeds from growing up at the bottom of the fence that will be subsequently difficult to trim or cut. Such systems establish a barrier at ground level that prevents weed growth, but are not tied into or incorporated into the fence such that a system for preventing animals from digging under the fence is realized. Therefore, these systems do not secure or prevent the fence from being breach and thus do not contribute to accomplishing the original purpose of the fence. As such, there remains room for variation and improvement within the art.
A full and enabling disclosure of the present invention, including the best mode thereof, directed to one of ordinary skill in the art, is set forth more particularly in the remainder of the specification, which makes reference to the appended Figs. in which:
Repeat use of reference characters in the present specification and drawings is intended to represent the same or analogous features or elements of the invention.
DETAILED DESCRIPTION OF REPRESENTATIVE EMBODIMENTSReference will now be made in detail to embodiments of the invention, one or more examples of which are illustrated in the drawings. Each example is provided by way of explanation of the invention, and not meant as a limitation of the invention. For example, features illustrated or described as part of one embodiment can be used with another embodiment to yield still a third embodiment. It is intended that the present invention include these and other modifications and variations.
It is to be understood that the ranges mentioned herein include all ranges located within the prescribed range. As such, all ranges mentioned herein include all sub-ranges included in the mentioned ranges. For instance, a range from 100-200 also includes ranges from 110-150, 170-190, and 153-162. Further, all limits mentioned herein include all other limits included in the mentioned limits. For instance, a limit of up to 7 also includes a limit of up to 5, up to 3, and up to 4.5.
The present invention provides for a fence bottom security device 10 that includes an elongated frame 20 and a plurality of spikes 24 for use in preventing animals from entering or escaping an enclosure. The fence bottom security device 10 is positioned at the ground level of a fence 12 and may be attached to one or both adjacent fence posts 14 and 16. The spikes 24 extend into the ground 56 and function as a barrier to prevent animals from attempting to dig under the fence 12 in order to enter or exit the enclosed area. Animals digging under the fence 12 will encounter the spikes 24 and be stopped from digging under the fence 12. The fence bottom security device 10 can be located at ground level between every post section of the entire fenced enclosure so that this protective barrier is maintained at all points as so that a weak spot in the enclosure does not exist. Alternatively, the fence bottom security device 10 can be located along only a portion of the entire fence 12 of the enclosure if desired. The fence bottom security device 10 can be used with a temporary or permanent kennel enclosure. One example of a portable kennel is a galvanized fenced dog pen that sits on the ground 56 and can measure, for example, 10′×10′ in size.
The fence bottom security device 10 may include an elongated frame 20. As shown, the elongated frame 20 extends the entire distance between the subsequent fence posts 14 and 16. However, in other arrangements, the elongated frame 20 need not extend the entire length between adjacent posts 14 and 16 and may instead extend only up to 90%, up to 75%, or up to 50% of the length between posts 14 and 16. With reference now to
The spikes 24 can be made of metal or plastic and can be 8, 9, or 10 inches in length. The spikes 24 may be made of steel and may or may not have a coating in accordance with various embodiments. In other exemplary embodiments, the spikes 24 can extend up to 6 inches, up to 12 inches, up to 24 inches, or up to 48 inches into the ground 56 from the elongated frame 20. Any number of spikes 24 and spike 24 spacing may be employed in the fence bottom security device 10. The spikes 24 may have a circular cross-sectional shape and can be up to ⅜th of an inch wide or wider, or the spikes 24 can have a rectangular or square cross-sectional shape and may be an inch or greater in width. The spikes 24 may be of any width, for example they may be up to one inch in width or greater. The spikes 24 may all be shaped and sized the same, or the various spikes 24 in the plurality of spikes 24 can have sizes and shapes that are different from one another. The spikes 24 may all be spaced the same distance from one another along the length of the elongated frame 20 or their spacing from one another may be varied. Adjacent spikes 24 may be spaced 6 inches from one another in certain embodiments. In accordance with other arrangements, adjacent spikes may be spaced one inch, up to 4 inches, up to 10 inches, up to 15 inches, up to 30 inches, from 1-12 inches, or up to 12 inches from one another.
The fence bottom security device 10 of
It is to be understood that the disclosed attachment members 22 are only exemplary and that others are possible. Further, a single attachment member 22 may be used in other versions of the fence bottom security device 10 and a plurality of attachment members 22 are not necessary. The attachment members 22 function to attach the elongated frame 20 to the first fence post 14 so that the fence bottom security device 10 is securely incorporated into the fence 12 system. However, in other versions of the fence bottom security device 10 the elongated frame 20 need not be attached to the first fence post. Here, the elongated frame 20 may contact the first fence post 14, but an attachment member 22 that contacts the first fence post 14 need not be present. The attachment member or members 22 that are used may be located at a vertical height that is completely below that of the top surface 28, completely above that of the top surface 28, or at locations that are both above and below the vertical height of the top surface 28.
The fence member 18 may be attached to the elongated frame 20. In the fence bottom security device 10 of
The elongated frame 20 is shown as spanning the distance between the first fence post 14 and the second fence post 16. The elongated frame 20 may contact the second fence post 16 or can be spaced a distance therefrom. A second attachment bracket 58 can be provided and may extend vertically upwards from the top surface 28. A second attachment member 60 can be provided to effect attachment of the elongated frame 20 to the second fence post 16. The second attachment member 60 may be a nail that extends through the second attachment bracket 58 and into the second fence post 16. Additionally or alternatively, the second attachment member 60 may be a tie that extends through or around the elongated frame 20 and wrap around the second fence post 16 to effect attachment. The second attachment bracket 58 and second attachment member or members 60 can be configured in the same ways previously discussed with respect to the first attachment member 22 and the first attachment bracket 26 and a repeat of this information is not necessary.
With reference now to
The elongated frame 20 is positioned with respect to the ground 56 so that a portion of the elongated frame 20 is located below the top surface of the ground 56 in the vertical direction 66. For example, half of the height of the elongated frame 20 may be located below the top surface of the ground 56. Every portion of the spikes 24 may be located below the top surface of the ground 56 in certain exemplary embodiments. In other arrangements, a majority of the vertical height of the elongated frame 20 can be located above the top surface of the ground 56, or all of the elongated frame 20 can be located above the top surface of the ground 56. In other exemplary embodiments, the entire elongated frame 20 is located below the top surface of the ground 56. In still further embodiments the elongated frame 20 is located with respect to the ground 56 such that the top surface 28 of the elongated frame 20 is at the same vertical position 66 as the top surface of the ground 56. Minimizing the vertical height of the elongated frame 20 above the upper surface of ground 56 may prevent the accumulation of debris against the sides of the elongated frame 20. Further, minimizing the vertical height of the elongated frame 20 above the upper surface of ground 56 will minimize or eliminate the effect of water flow from rains incident upon the elongated frame 20. In accordance with certain exemplary embodiments, the entire elongated frame 20, and thus all of the fence bottom security device 10 is located below the upper surface of the ground 56 so that no portion of the fence bottom security device 10 is visible.
The spikes 24 can be attached to the bottom of the horizontal portion 36 and may extend downward therefrom in the vertical direction 66 into the ground 56. The spikes 24 can be welded to the bottom of the horizontal portion 36 and to the side of the vertical portion 38. The spikes 24 can alternatively be welded to the side of the horizontal portion 36 and/or vertical portion 38. The elongated frame 20 can be pushed into the ground 56 so that a portion of the vertical portion 38 is likewise pushed into and located within the ground 56. The elongated frame 20 can be located within the ground 56 so that the bottom of the horizontal portion 36 rests against the upper surface of the ground 56. However, it is to be understood that the entire vertical portion 38 may rest on or above the ground 56 in other embodiments. The fence member 18 can be located completely above the top surface 28 of the elongated frame 20 in the vertical direction 66, or as shown with reference to
The first section 44 may have a distance in the length direction 62 that is less than that of section 46. These lengths may be the same in other arrangements. Also, although both of the sections 44 and 46 are shown as having at least one spike 24, it is to be understood that other arrangements are possible in which at least one of the sections of the elongated frame 20 does not have any spikes 24 extending therefrom. Further, although shown as being spliced together through the use of splice plate 52, these components need not be included in other arrangements. For example, the adjacent sections may be welded to one another, may be joined by construction glue, or may be attached to one another with mechanical fasteners without the presence of a separate splicing component. Further, it is to be understood that although two sections 44 and 46 are present, any number of sections may be attached to one another to make up the length of the elongated frame 20 in other arrangements. For example, from 3-5, from 5-8, or up to 10 sections may be present in certain embodiments.
The fence bottom security device 10 can be installed at the same time the fence 12 is erected. In this regard, the fence bottom security device 10 can be installed once the fence posts are put in place. The fence member 18 can then be installed next and connected to the fence bottom security device 10 if desired. The fence bottom security device 10 can be located below a gate of the fence 12. Normally, the fence bottom security device 10 is not attached to the fence member 18 of the gate of the fence 12 because then it would be necessary every time to detach the fence bottom security device 10 from the gate upon opening the gate. However, one could make such a connection if desired. Alternatively, the fence bottom security device 10 can be an add-on component to the fence system. Here, the fence 12 may already be in place, and the fence bottom security device 10 can be installed into the existing fence structure. If it is not possible to place the elongated frame 20 under the fence member 18, the elongated frame 20 can be positioned so as to be up against the fence member 18 so that these components do not overlap in the width direction 64. In a similar manner, the elongated frame 20 may not be capable of being placed with respect to the posts 14 and 16 so that all of these components overlap in the width direction 64. The elongated frame 20 could be placed next to the posts 14 and 16 so that the elongated frame 20 does not overlap any portion of the posts 14 and 16 in the width direction 64. Alternatively, the elongated frame 20 may not be centered with respect to the center-to-center distance of the posts 14 and 16 but may still overlap some portion of the posts 14 and 16 in the width direction 64.
Another exemplary embodiment is illustrated in
However, it is to be understood that the attachment brackets 68, 70, 72 and 74 need not be present in other exemplary embodiments. For example, the sections 44, 46 and 48 can be attached to one another may various mechanisms not requiring the presence of attachment brackets 68, 70, 72 and 74.
The fence bottom security device 10 can be installed during the installation of a new fence 12. Alternatively, the fence bottom security device 10 can be an add-on component to a pre-existing fence 12 and installed at a later time. Generally, a fence 12 will be installed so that the fence member 18 extends to the upper surface of the ground 56 in most locations around the perimeter of the fence 12. The fence bottom security device 10 can thus be installed in such instances so that the spikes 24 and the elongated frame 20 are inserted into the ground 56 completely on one side of the fence member 18 in the width direction 64. The fence bottom security device 10 can be arranged so that only a single row of spikes 24 extend between the first fence post 14 and the second fence post 16. In this regard, all of the spikes 24 of the fence bottom security device 10 can be located on one side of the fence member 18 in the width direction 64. The spikes 24 may be made of metal and can be made of the same material as the elongated frame 20.
While the present invention has been described in connection with certain preferred embodiments, it is to be understood that the subject matter encompassed by way of the present invention is not to be limited to those specific embodiments. On the contrary, it is intended for the subject matter of the invention to include all alternatives, modifications and equivalents as can be included within the spirit and scope of the following claims.
Claims
1. A fence bottom security device, comprising:
- an elongated frame that is attached to a first fence post of a fence;
- an attachment member that contacts the first fence post and functions to attach the elongated frame to the first fence post; and
- a plurality of spikes extending from the elongated frame and located within ground.
2. The fence bottom security device as set forth in claim 1, further comprising an attachment bracket that extends upwards from a top surface of the elongated frame, wherein the attachment bracket defines an aperture therethrough, and wherein the attachment member contacts the attachment bracket.
3. The fence bottom security device as set forth in claim 2, wherein the attachment member is a nail that is disposed through the aperture of the attachment bracket and is located within the first fence post.
4. The fence bottom security device as set forth in claim 2, wherein the attachment member is a tie that is wrapped around the first fence post and that contacts the attachment bracket.
5. The fence bottom security device as set forth in claim 1, wherein the elongated frame is a metal tube.
6. The fence bottom security device as set forth in claim 1, wherein the elongated frame is an L-shaped member that has a horizontal portion and a vertical portion, wherein the horizontal portion is located above the vertical portion.
7. The fence bottom security device as set forth in claim 6, wherein the horizontal portion has a plurality of apertures disposed therethough, and further comprising a plurality of fence member attachment members that are disposed through the apertures of the horizontal portion and contact a fence member of the fence and are used to attach the horizontal portion to the fence member of the fence.
8. The fence bottom security device as set forth in claim 1, wherein the fence has a fence member that extends between the first fence post and a second fence post of the fence, wherein the fence member does not contact the elongated frame.
9. The fence bottom security device as set forth in claim 1, wherein the fence has a fence member that extends between the first fence post and a second fence post of the fence, wherein the fence member is not located directly above the elongated frame, and wherein a portion of the elongated frame is located under the upper surface of the ground.
10. The fence bottom security device as set forth in claim 1, wherein the elongated frame is made of multiple sections that are spliced to one another.
11. The fence bottom security device as set forth in claim 10, wherein at least two of the multiple sections of the elongated frame are of different lengths.
12. The fence bottom security device as set forth in claim 1, wherein the elongated frame is made of metal.
13. A fence bottom security device, comprising:
- an elongated frame that is located between a first fence post and a second fence post of a fence, wherein the elongated frame is positioned such that a fence member of the fence that extends from the first fence post to the second fence post of the fence is located vertically completely on one side of the elongated frame in a width direction that is perpendicular to a length direction that runs from the first fence post to the second fence post; and
- a plurality of spikes extending from the elongated frame and located within ground.
14. The fence bottom security device as set forth in claim 13, wherein the fence member is a panel.
15. The fence bottom security device as set forth in claim 13, wherein the spikes are spaced from one another such that at least four inches of space are present between subsequent ones of the spikes, wherein the spikes are at least six inches in length.
16. The fence bottom security device as set forth in claim 13, further comprising:
- a first attachment bracket that extends upwards from a top surface of the elongated frame;
- a first attachment member that contacts the first attachment bracket and contacts the first fence post, wherein the first attachment member functions to attach the first fence post to the elongated frame;
- a second attachment bracket that extends upwards from the top surface of the elongated frame; and
- a second attachment member that contacts the second attachment bracket and contacts the second fence post, wherein the second attachment member functions to attach the second fence post to the elongated frame.
17. The fence bottom security device as set forth in claim 13, wherein the elongated frame is an L-shaped member that has a horizontal portion and a vertical portion, wherein the horizontal portion is located above the vertical portion, wherein the horizontal portion has a plurality of apertures disposed therethough, and further comprising a plurality of fence member attachment members that are disposed through the apertures of the horizontal portion and contact the fence member of the fence and are used to attach the horizontal portion to the fence member of the fence.
18. A fence bottom security device, comprising:
- an elongated frame that is located between a first fence post and a second fence post of a fence, wherein the fence has a fence member that extends from the first fence post to the second fence post of the fence, wherein the elongated frame is positioned such that no portion of the elongated frame is located directly under the fence member of the fence; and
- a plurality of spikes extending from the elongated frame and located within ground.
19. The fence bottom security device as set forth in claim 18, wherein the elongated frame is made of multiple sections that are spliced to one another.
20. The fence bottom security device as set forth in claim 18, further comprising:
- a first attachment member that contacts the first fence post and functions to attach the elongated frame to the first fence post; and
- a second attachment member that contacts the second fence post and functions to attach the elongated frame to the second fence post.
Type: Application
Filed: Mar 30, 2010
Publication Date: Oct 6, 2011
Inventor: Deborah I. Justice (Fair Play, SC)
Application Number: 12/798,129