CA2949979C - Defense and denial method - Google Patents

Defense and denial method Download PDF

Info

Publication number
CA2949979C
CA2949979C CA2949979A CA2949979A CA2949979C CA 2949979 C CA2949979 C CA 2949979C CA 2949979 A CA2949979 A CA 2949979A CA 2949979 A CA2949979 A CA 2949979A CA 2949979 C CA2949979 C CA 2949979C
Authority
CA
Canada
Prior art keywords
countermeasure
sensor
occurrence
actuator
threat
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CA2949979A
Other languages
English (en)
French (fr)
Other versions
CA2949979A1 (en
Inventor
Charles Lankford Butler, Jr.
Samuel Mcarthur Smith
Vontella Kay Kimball
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Security Oracle Inc
Original Assignee
Security Oracle Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Security Oracle Inc filed Critical Security Oracle Inc
Publication of CA2949979A1 publication Critical patent/CA2949979A1/en
Application granted granted Critical
Publication of CA2949979C publication Critical patent/CA2949979C/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N5/00Computing arrangements using knowledge-based models
    • G06N5/02Knowledge representation; Symbolic representation
    • G06N5/022Knowledge engineering; Knowledge acquisition
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING SYSTEMS, e.g. PERSONAL CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/02Mechanical actuation
    • G08B13/12Mechanical actuation by the breaking or disturbance of stretched cords or wires
    • G08B13/122Mechanical actuation by the breaking or disturbance of stretched cords or wires for a perimeter fence
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING SYSTEMS, e.g. PERSONAL CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • G08B13/19639Details of the system layout
    • G08B13/19645Multiple cameras, each having view on one of a plurality of scenes, e.g. multiple cameras for multi-room surveillance or for tracking an object by view hand-over
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING SYSTEMS, e.g. PERSONAL CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B15/00Identifying, scaring or incapacitating burglars, thieves or intruders, e.g. by explosives
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING SYSTEMS, e.g. PERSONAL CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B25/00Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
    • G08B25/009Signalling of the alarm condition to a substation whose identity is signalled to a central station, e.g. relaying alarm signals in order to extend communication range
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING SYSTEMS, e.g. PERSONAL CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B25/00Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
    • G08B25/01Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium
    • G08B25/10Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium using wireless transmission systems
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING SYSTEMS, e.g. PERSONAL CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B31/00Predictive alarm systems characterised by extrapolation or other computation using updated historic data

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Emergency Management (AREA)
  • Business, Economics & Management (AREA)
  • Computing Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Mathematical Physics (AREA)
  • Evolutionary Computation (AREA)
  • Data Mining & Analysis (AREA)
  • Computational Linguistics (AREA)
  • Artificial Intelligence (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Hardware Design (AREA)
  • Alarm Systems (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
CA2949979A 2014-06-03 2015-06-03 Defense and denial method Active CA2949979C (en)

Applications Claiming Priority (5)

Application Number Priority Date Filing Date Title
US201462006976P 2014-06-03 2014-06-03
US62/006,976 2014-06-03
US201562130367P 2015-03-09 2015-03-09
US62/130,367 2015-03-09
PCT/US2015/033878 WO2015187768A1 (en) 2014-06-03 2015-06-03 Defense and denial method

Publications (2)

Publication Number Publication Date
CA2949979A1 CA2949979A1 (en) 2015-12-10
CA2949979C true CA2949979C (en) 2021-09-21

Family

ID=54702190

Family Applications (1)

Application Number Title Priority Date Filing Date
CA2949979A Active CA2949979C (en) 2014-06-03 2015-06-03 Defense and denial method

Country Status (7)

Country Link
US (1) US11574206B2 (https=)
EP (1) EP3164663B1 (https=)
JP (1) JP6681389B2 (https=)
CA (1) CA2949979C (https=)
ES (1) ES2773442T3 (https=)
MA (1) MA40078A (https=)
WO (1) WO2015187768A1 (https=)

Families Citing this family (40)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7771320B2 (en) 2006-09-07 2010-08-10 Nike, Inc. Athletic performance sensing and/or tracking systems and methods
US9085950B2 (en) * 2010-12-20 2015-07-21 Joe Spacek Oil well improvement system
US9336670B2 (en) * 2013-11-06 2016-05-10 Nettalon Security Systems, Inc. Method for remote initialization of targeted nonlethal counter measures in an active shooter suspect incident
US10609079B2 (en) * 2015-10-28 2020-03-31 Qomplx, Inc. Application of advanced cybersecurity threat mitigation to rogue devices, privilege escalation, and risk-based vulnerability and patch management
US20220014555A1 (en) 2015-10-28 2022-01-13 Qomplx, Inc. Distributed automated planning and execution platform for designing and running complex processes
US11570209B2 (en) 2015-10-28 2023-01-31 Qomplx, Inc. Detecting and mitigating attacks using forged authentication objects within a domain
US10621506B2 (en) * 2015-10-30 2020-04-14 The United States Of America As Represented By The Secretary Of The Army Apparatus and method for activity detection and classification from sensor data
US9664482B1 (en) * 2015-11-07 2017-05-30 John Isaac Boland Multiple adversary suppression system (MASS)
US10051349B2 (en) 2016-04-05 2018-08-14 Tyco Fire & Security Gmbh Sensor based system and method for premises safety and operational profiling based on drift analysis
US11688414B1 (en) 2016-04-26 2023-06-27 Shooter Detection Systems, LLC Low power gunshot detection
US10586109B1 (en) 2016-04-26 2020-03-10 Shooter Detection Systems, LLC Indoor gunshot detection with video analytics
US10830866B1 (en) 2016-04-26 2020-11-10 Shooter Detection Systems, LLC Testing of gunshot sensors
US11282353B1 (en) 2016-04-26 2022-03-22 Shooter Detection Systems, LLC Gunshot detection within an indoor environment with video analytics
US11282358B1 (en) 2016-04-26 2022-03-22 Shooter Detection Systems, LLC Gunshot detection in an indoor environment
US10657800B1 (en) 2016-04-26 2020-05-19 Shooter Detection Systems, LLC Gunshot detection within an indoor environment
US11604248B1 (en) 2016-04-26 2023-03-14 Shooter Detection Systems, LLC Low power gunshot sensor testing
US12566238B1 (en) 2016-04-26 2026-03-03 Shooter Detection Systems, LLC Single unit outdoor gunshot detection
US11417183B1 (en) 2016-08-24 2022-08-16 Shooter Detection Systems, LLC Cable-free gunshot detection
US11216744B2 (en) * 2017-04-28 2022-01-04 Cisco Technology, Inc. Feature-specific adaptive models for support tools
US10210683B1 (en) 2017-09-12 2019-02-19 International Business Machines Corporation Physical condition based intelligent house security system
DE102018110241A1 (de) * 2018-04-27 2019-10-31 Rheinmetall Waffe Munition Gmbh Verfahren und Vorrichtung zum Schutz eines Fahrzeugs vor einer Bedrohung
WO2021090234A1 (en) * 2019-11-06 2021-05-14 Langner Jaco Irritant-spray dispenser
US11680436B2 (en) * 2019-11-11 2023-06-20 Smarter Building Technologies Alliance, Inc. Monitoring system to identify unregistered persons entering premises and to secure rooms containing registered occupants
US11316886B2 (en) * 2020-01-31 2022-04-26 International Business Machines Corporation Preventing vulnerable configurations in sensor-based devices
US11631307B2 (en) * 2020-05-15 2023-04-18 Intellishot Holdings Inc Invisible acoustic safe
WO2022040366A1 (en) * 2020-08-18 2022-02-24 IntelliShot Holdings, Inc. Automated threat detection and deterrence apparatus
US12038795B2 (en) * 2020-12-11 2024-07-16 Dell Products L.P. Information handling system visual presentation with audio vector based information
US11893163B2 (en) 2020-12-11 2024-02-06 Dell Products L.P. Information handling system virtual and physical keyboard position coordination
IL279885A (en) * 2020-12-30 2022-07-01 Essence Security International Esi Ltd A device for monitoring an environment
US11790081B2 (en) * 2021-04-14 2023-10-17 General Electric Company Systems and methods for controlling an industrial asset in the presence of a cyber-attack
US20230015697A1 (en) * 2021-07-13 2023-01-19 Citrix Systems, Inc. Application programming interface (api) authorization
KR20240090319A (ko) 2021-10-07 2024-06-21 제너럴 일렉트릭 레노바블레스 에스빠냐 에스.엘.유. 풍력 터빈을 제어하기 위한 시스템 및 방법
DE102022111513A1 (de) * 2022-05-09 2023-11-09 Vega Grieshaber Kg Füllstandsensor zum Aktivieren und Deaktivieren eines sicheren Betriebszustands
US12271851B2 (en) * 2022-06-07 2025-04-08 International Business Machines Corporation Computer-based risk analysis and mitigation
US12309624B2 (en) 2022-08-31 2025-05-20 T-Mobile Usa, Inc. Responding to device-reported events in a network using modified identifiers systems and methods
CN119856122A (zh) * 2022-09-12 2025-04-18 奥普塔姆软件股份有限公司 基于限制性继承的规则冲突解决
US12610392B2 (en) 2022-11-01 2026-04-21 T-Mobile Usa, Inc. Telecommunication network resource allocation using assigned temporary identifiers systems and methods
WO2025101619A1 (en) * 2023-11-07 2025-05-15 Nec Laboratories America, Inc. 3d gunshot localization, tracking, and ai enhanced system for substation security
US12510052B1 (en) 2024-06-27 2025-12-30 GE Vernova Renovables Espana, S.L. System and method for optimizing control of a wind turbine
CN121028568B (zh) * 2025-10-27 2026-03-20 汉达科技发展集团有限公司 无人机反制的动态防御模型构建方法

Family Cites Families (27)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2761786B1 (fr) * 1997-04-08 1999-06-18 Sgs Thomson Microelectronics Procede de traitement d'information en logique floue
US20020099672A1 (en) * 1999-01-20 2002-07-25 Chidambar Ganesh Fuzzy logic based processing system and method with uncertain input
WO2001095141A1 (en) * 2000-06-09 2001-12-13 Automotive Systems Laboratory, Inc. Situation awareness processor
US9009084B2 (en) * 2002-10-21 2015-04-14 Rockwell Automation Technologies, Inc. System and methodology providing automation security analysis and network intrusion protection in an industrial environment
US7012520B2 (en) * 2003-06-17 2006-03-14 Infraegis, Inc. Global intelligent remote detection system
GB0325504D0 (en) * 2003-10-31 2003-12-03 Leach John Security engineering: A process for developing accurate and reliable security systems
JP4180600B2 (ja) * 2004-01-15 2008-11-12 旭化成株式会社 情報認識装置、情報認識方法、情報認識プログラム及び警報システム
JP2005296510A (ja) * 2004-04-15 2005-10-27 Funai Electric Co Ltd 監視カメラを備えた自走式掃除機
JP4569190B2 (ja) * 2004-06-24 2010-10-27 オムロン株式会社 不審者対策システム及び不審者検出装置
US20060031934A1 (en) * 2004-08-04 2006-02-09 Stonewater Control Systems, Inc. Monitoring system
JP2006092035A (ja) 2004-09-21 2006-04-06 Hasegawa Isamu 遠隔監視制御システム
US8312549B2 (en) * 2004-09-24 2012-11-13 Ygor Goldberg Practical threat analysis
US20070011105A1 (en) * 2005-05-03 2007-01-11 Greg Benson Trusted decision support system and method
JP4611915B2 (ja) * 2006-02-28 2011-01-12 綜合警備保障株式会社 警備装置および警備方法
US8248473B2 (en) 2006-10-05 2012-08-21 Graber Curtis E Robotic sentry with low dispersion acoustic projector
JP4895110B2 (ja) * 2006-10-23 2012-03-14 オムロン株式会社 リスク監視装置、リスク監視システム、リスク監視方法
US7843375B1 (en) * 2007-01-16 2010-11-30 Bae Systems Information And Electronic Systems Integration Inc. Method and apparatus for monitoring the RF environment to prevent airborne radar false alarms that initiate evasive maneuvers, reactionary displays or actions
US7840515B2 (en) * 2007-02-16 2010-11-23 Panasonic Corporation System architecture and process for automating intelligent surveillance center operations
US7710260B2 (en) 2007-08-14 2010-05-04 International Business Machines Corporation Pattern driven effectuator system
GB201004226D0 (en) * 2010-03-15 2010-04-28 Bae Systems Plc Process analysis
US8471700B1 (en) * 2010-04-16 2013-06-25 Kontek Industries, Inc. Global positioning systems and methods for asset and infrastructure protection
WO2012030333A1 (en) * 2010-09-01 2012-03-08 Hewlett-Packard Development Company, L.P. Performing what-if analysis
JP2013125469A (ja) 2011-12-15 2013-06-24 Sogo Keibi Hosho Co Ltd 警備装置および警備動作切替え方法
US9349103B2 (en) * 2012-01-09 2016-05-24 DecisionQ Corporation Application of machine learned Bayesian networks to detection of anomalies in complex systems
US8856057B2 (en) * 2012-09-13 2014-10-07 James Albert Ionson Cognitive security system and method
US9330262B2 (en) * 2012-09-21 2016-05-03 University Of Limerick Systems and methods for runtime adaptive security to protect variable assets
US9000918B1 (en) * 2013-03-02 2015-04-07 Kontek Industries, Inc. Security barriers with automated reconnaissance

Also Published As

Publication number Publication date
JP2017523376A (ja) 2017-08-17
JP6681389B2 (ja) 2020-04-15
EP3164663A4 (en) 2017-08-16
US20150347902A1 (en) 2015-12-03
ES2773442T3 (es) 2020-07-13
MA40078A (fr) 2015-12-10
EP3164663B1 (en) 2019-11-13
CA2949979A1 (en) 2015-12-10
WO2015187768A1 (en) 2015-12-10
EP3164663A1 (en) 2017-05-10
US11574206B2 (en) 2023-02-07

Similar Documents

Publication Publication Date Title
CA2949979C (en) Defense and denial method
Kang et al. Protect your sky: A survey of counter unmanned aerial vehicle systems
Ding et al. An amateur drone surveillance system based on the cognitive Internet of Things
US10907940B1 (en) Deterrent for unmanned aerial systems using data mining and/or machine learning for improved target detection and classification
US8384542B1 (en) Autonomous and federated sensory subsystems and networks for security systems
US11385007B2 (en) Area denial communication latency compensation
Adel et al. Who is watching whom? Military and civilian drone: Vision intelligence investigation and recommendations
Yasmine et al. Anti-drone systems: Current intelligent countermeasures from low to high risks
US10943467B1 (en) Central alarm station interface for situation awareness
ES2686086B1 (es) Sistema autónomo de seguridad privada, capaz de prestar servicios pasivos y activos y en la lucha contra la violencia de género.
HK1237403B (en) Defense and denial method
HK1237403A1 (en) Defense and denial method
HANSEN et al. Protection against Unmanned Aircraft Systems
Kompan et al. Conceptual framework for EOD operations as part of Counter-UAS approach in Peace Support Operations
Yadav et al. Current Challenges, Constraints and Recommendations for Reducing Cost of Physical Security at US Commercial Nuclear Power Plants
Szávay et al. Protection Management Against Drones in Industrial Facilities
Jeong et al. Anti-Drone Technology for Drone Threat Response: Current Status and Future Directions
Tan et al. System Analysis of Counter-Unmanned Aerial Systems Kill Chain in an Operational Environment. Systems 2021, 9, 79
Lee et al. The Strategic Limits of Drone Defense: Empirical Findings and Security Policy Implications
Youvan From Precision to Perdition: The Evolutionary Trajectory of Algorithmic Warfare and the Post-Human Battlefield
Jones et al. Detecting Drone Threats at Stadiums and Public Venues: Overview, Operational Considerations, and Technical Implementation
Jones et al. Detecting Drone Threats at Stadiums and Public Venues
Chakka et al. New and Merging Technology-Based Weapon Systems in Modern Warfare and the International Law
Francis From Pager Explosions to Targeted Drone Attacks in Lebanon: Assessing Israel’s Use of AI in Warfare
Pokorny Cost-Effectiveness Analysis of Counter-Unmanned Aircraft Systems Technologies: A Comparative Study of Kinetic, Electronic Warfare, and Directed Energy Countermeasures (2022-2026)

Legal Events

Date Code Title Description
EEER Examination request

Effective date: 20200611

MPN Maintenance fee for patent paid

Free format text: FEE DESCRIPTION TEXT: MF (PATENT, 10TH ANNIV.) - STANDARD

Year of fee payment: 10

U00 Fee paid

Free format text: ST27 STATUS EVENT CODE: A-4-4-U10-U00-U101 (AS PROVIDED BY THE NATIONAL OFFICE); EVENT TEXT: MAINTENANCE REQUEST RECEIVED

Effective date: 20250409

U11 Full renewal or maintenance fee paid

Free format text: ST27 STATUS EVENT CODE: A-4-4-U10-U11-U102 (AS PROVIDED BY THE NATIONAL OFFICE); EVENT TEXT: MAINTENANCE FEE PAYMENT PAID IN FULL

Effective date: 20250409

MPN Maintenance fee for patent paid

Free format text: FEE DESCRIPTION TEXT: MF (PATENT, 11TH ANNIV.) - STANDARD

Year of fee payment: 11

U00 Fee paid

Free format text: ST27 STATUS EVENT CODE: A-4-4-U10-U00-U101 (AS PROVIDED BY THE NATIONAL OFFICE); EVENT TEXT: MAINTENANCE REQUEST RECEIVED

Effective date: 20260401

U11 Full renewal or maintenance fee paid

Free format text: ST27 STATUS EVENT CODE: A-4-4-U10-U11-U102 (AS PROVIDED BY THE NATIONAL OFFICE); EVENT TEXT: MAINTENANCE FEE PAYMENT PAID IN FULL

Effective date: 20260401