ES2773442T3 - Método de defensa y rechazo - Google Patents

Método de defensa y rechazo Download PDF

Info

Publication number
ES2773442T3
ES2773442T3 ES15802735T ES15802735T ES2773442T3 ES 2773442 T3 ES2773442 T3 ES 2773442T3 ES 15802735 T ES15802735 T ES 15802735T ES 15802735 T ES15802735 T ES 15802735T ES 2773442 T3 ES2773442 T3 ES 2773442T3
Authority
ES
Spain
Prior art keywords
event
countermeasure
threat
sensor
countermeasures
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
ES15802735T
Other languages
English (en)
Spanish (es)
Inventor
Butler, Jr
Samuel Mcarthur Smith
Vontella Kay Kimball
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Security Oracle Inc
Original Assignee
Security Oracle Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Security Oracle Inc filed Critical Security Oracle Inc
Application granted granted Critical
Publication of ES2773442T3 publication Critical patent/ES2773442T3/es
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N5/00Computing arrangements using knowledge-based models
    • G06N5/02Knowledge representation; Symbolic representation
    • G06N5/022Knowledge engineering; Knowledge acquisition
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING SYSTEMS, e.g. PERSONAL CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/02Mechanical actuation
    • G08B13/12Mechanical actuation by the breaking or disturbance of stretched cords or wires
    • G08B13/122Mechanical actuation by the breaking or disturbance of stretched cords or wires for a perimeter fence
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING SYSTEMS, e.g. PERSONAL CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • G08B13/19639Details of the system layout
    • G08B13/19645Multiple cameras, each having view on one of a plurality of scenes, e.g. multiple cameras for multi-room surveillance or for tracking an object by view hand-over
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING SYSTEMS, e.g. PERSONAL CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B15/00Identifying, scaring or incapacitating burglars, thieves or intruders, e.g. by explosives
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING SYSTEMS, e.g. PERSONAL CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B25/00Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
    • G08B25/009Signalling of the alarm condition to a substation whose identity is signalled to a central station, e.g. relaying alarm signals in order to extend communication range
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING SYSTEMS, e.g. PERSONAL CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B25/00Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
    • G08B25/01Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium
    • G08B25/10Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium using wireless transmission systems
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING SYSTEMS, e.g. PERSONAL CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B31/00Predictive alarm systems characterised by extrapolation or other computation using updated historic data

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Emergency Management (AREA)
  • Business, Economics & Management (AREA)
  • Computing Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Mathematical Physics (AREA)
  • Evolutionary Computation (AREA)
  • Data Mining & Analysis (AREA)
  • Computational Linguistics (AREA)
  • Artificial Intelligence (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Hardware Design (AREA)
  • Alarm Systems (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
ES15802735T 2014-06-03 2015-06-03 Método de defensa y rechazo Active ES2773442T3 (es)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US201462006976P 2014-06-03 2014-06-03
US201562130367P 2015-03-09 2015-03-09
PCT/US2015/033878 WO2015187768A1 (en) 2014-06-03 2015-06-03 Defense and denial method

Publications (1)

Publication Number Publication Date
ES2773442T3 true ES2773442T3 (es) 2020-07-13

Family

ID=54702190

Family Applications (1)

Application Number Title Priority Date Filing Date
ES15802735T Active ES2773442T3 (es) 2014-06-03 2015-06-03 Método de defensa y rechazo

Country Status (7)

Country Link
US (1) US11574206B2 (https=)
EP (1) EP3164663B1 (https=)
JP (1) JP6681389B2 (https=)
CA (1) CA2949979C (https=)
ES (1) ES2773442T3 (https=)
MA (1) MA40078A (https=)
WO (1) WO2015187768A1 (https=)

Families Citing this family (40)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7771320B2 (en) 2006-09-07 2010-08-10 Nike, Inc. Athletic performance sensing and/or tracking systems and methods
US9085950B2 (en) * 2010-12-20 2015-07-21 Joe Spacek Oil well improvement system
US9336670B2 (en) * 2013-11-06 2016-05-10 Nettalon Security Systems, Inc. Method for remote initialization of targeted nonlethal counter measures in an active shooter suspect incident
US10609079B2 (en) * 2015-10-28 2020-03-31 Qomplx, Inc. Application of advanced cybersecurity threat mitigation to rogue devices, privilege escalation, and risk-based vulnerability and patch management
US20220014555A1 (en) 2015-10-28 2022-01-13 Qomplx, Inc. Distributed automated planning and execution platform for designing and running complex processes
US11570209B2 (en) 2015-10-28 2023-01-31 Qomplx, Inc. Detecting and mitigating attacks using forged authentication objects within a domain
US10621506B2 (en) * 2015-10-30 2020-04-14 The United States Of America As Represented By The Secretary Of The Army Apparatus and method for activity detection and classification from sensor data
US9664482B1 (en) * 2015-11-07 2017-05-30 John Isaac Boland Multiple adversary suppression system (MASS)
US10051349B2 (en) 2016-04-05 2018-08-14 Tyco Fire & Security Gmbh Sensor based system and method for premises safety and operational profiling based on drift analysis
US11688414B1 (en) 2016-04-26 2023-06-27 Shooter Detection Systems, LLC Low power gunshot detection
US10586109B1 (en) 2016-04-26 2020-03-10 Shooter Detection Systems, LLC Indoor gunshot detection with video analytics
US10830866B1 (en) 2016-04-26 2020-11-10 Shooter Detection Systems, LLC Testing of gunshot sensors
US11282353B1 (en) 2016-04-26 2022-03-22 Shooter Detection Systems, LLC Gunshot detection within an indoor environment with video analytics
US11282358B1 (en) 2016-04-26 2022-03-22 Shooter Detection Systems, LLC Gunshot detection in an indoor environment
US10657800B1 (en) 2016-04-26 2020-05-19 Shooter Detection Systems, LLC Gunshot detection within an indoor environment
US11604248B1 (en) 2016-04-26 2023-03-14 Shooter Detection Systems, LLC Low power gunshot sensor testing
US12566238B1 (en) 2016-04-26 2026-03-03 Shooter Detection Systems, LLC Single unit outdoor gunshot detection
US11417183B1 (en) 2016-08-24 2022-08-16 Shooter Detection Systems, LLC Cable-free gunshot detection
US11216744B2 (en) * 2017-04-28 2022-01-04 Cisco Technology, Inc. Feature-specific adaptive models for support tools
US10210683B1 (en) 2017-09-12 2019-02-19 International Business Machines Corporation Physical condition based intelligent house security system
DE102018110241A1 (de) * 2018-04-27 2019-10-31 Rheinmetall Waffe Munition Gmbh Verfahren und Vorrichtung zum Schutz eines Fahrzeugs vor einer Bedrohung
WO2021090234A1 (en) * 2019-11-06 2021-05-14 Langner Jaco Irritant-spray dispenser
US11680436B2 (en) * 2019-11-11 2023-06-20 Smarter Building Technologies Alliance, Inc. Monitoring system to identify unregistered persons entering premises and to secure rooms containing registered occupants
US11316886B2 (en) * 2020-01-31 2022-04-26 International Business Machines Corporation Preventing vulnerable configurations in sensor-based devices
US11631307B2 (en) * 2020-05-15 2023-04-18 Intellishot Holdings Inc Invisible acoustic safe
WO2022040366A1 (en) * 2020-08-18 2022-02-24 IntelliShot Holdings, Inc. Automated threat detection and deterrence apparatus
US12038795B2 (en) * 2020-12-11 2024-07-16 Dell Products L.P. Information handling system visual presentation with audio vector based information
US11893163B2 (en) 2020-12-11 2024-02-06 Dell Products L.P. Information handling system virtual and physical keyboard position coordination
IL279885A (en) * 2020-12-30 2022-07-01 Essence Security International Esi Ltd A device for monitoring an environment
US11790081B2 (en) * 2021-04-14 2023-10-17 General Electric Company Systems and methods for controlling an industrial asset in the presence of a cyber-attack
US20230015697A1 (en) * 2021-07-13 2023-01-19 Citrix Systems, Inc. Application programming interface (api) authorization
KR20240090319A (ko) 2021-10-07 2024-06-21 제너럴 일렉트릭 레노바블레스 에스빠냐 에스.엘.유. 풍력 터빈을 제어하기 위한 시스템 및 방법
DE102022111513A1 (de) * 2022-05-09 2023-11-09 Vega Grieshaber Kg Füllstandsensor zum Aktivieren und Deaktivieren eines sicheren Betriebszustands
US12271851B2 (en) * 2022-06-07 2025-04-08 International Business Machines Corporation Computer-based risk analysis and mitigation
US12309624B2 (en) 2022-08-31 2025-05-20 T-Mobile Usa, Inc. Responding to device-reported events in a network using modified identifiers systems and methods
CN119856122A (zh) * 2022-09-12 2025-04-18 奥普塔姆软件股份有限公司 基于限制性继承的规则冲突解决
US12610392B2 (en) 2022-11-01 2026-04-21 T-Mobile Usa, Inc. Telecommunication network resource allocation using assigned temporary identifiers systems and methods
WO2025101619A1 (en) * 2023-11-07 2025-05-15 Nec Laboratories America, Inc. 3d gunshot localization, tracking, and ai enhanced system for substation security
US12510052B1 (en) 2024-06-27 2025-12-30 GE Vernova Renovables Espana, S.L. System and method for optimizing control of a wind turbine
CN121028568B (zh) * 2025-10-27 2026-03-20 汉达科技发展集团有限公司 无人机反制的动态防御模型构建方法

Family Cites Families (27)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2761786B1 (fr) * 1997-04-08 1999-06-18 Sgs Thomson Microelectronics Procede de traitement d'information en logique floue
US20020099672A1 (en) * 1999-01-20 2002-07-25 Chidambar Ganesh Fuzzy logic based processing system and method with uncertain input
WO2001095141A1 (en) * 2000-06-09 2001-12-13 Automotive Systems Laboratory, Inc. Situation awareness processor
US9009084B2 (en) * 2002-10-21 2015-04-14 Rockwell Automation Technologies, Inc. System and methodology providing automation security analysis and network intrusion protection in an industrial environment
US7012520B2 (en) * 2003-06-17 2006-03-14 Infraegis, Inc. Global intelligent remote detection system
GB0325504D0 (en) * 2003-10-31 2003-12-03 Leach John Security engineering: A process for developing accurate and reliable security systems
JP4180600B2 (ja) * 2004-01-15 2008-11-12 旭化成株式会社 情報認識装置、情報認識方法、情報認識プログラム及び警報システム
JP2005296510A (ja) * 2004-04-15 2005-10-27 Funai Electric Co Ltd 監視カメラを備えた自走式掃除機
JP4569190B2 (ja) * 2004-06-24 2010-10-27 オムロン株式会社 不審者対策システム及び不審者検出装置
US20060031934A1 (en) * 2004-08-04 2006-02-09 Stonewater Control Systems, Inc. Monitoring system
JP2006092035A (ja) 2004-09-21 2006-04-06 Hasegawa Isamu 遠隔監視制御システム
US8312549B2 (en) * 2004-09-24 2012-11-13 Ygor Goldberg Practical threat analysis
US20070011105A1 (en) * 2005-05-03 2007-01-11 Greg Benson Trusted decision support system and method
JP4611915B2 (ja) * 2006-02-28 2011-01-12 綜合警備保障株式会社 警備装置および警備方法
US8248473B2 (en) 2006-10-05 2012-08-21 Graber Curtis E Robotic sentry with low dispersion acoustic projector
JP4895110B2 (ja) * 2006-10-23 2012-03-14 オムロン株式会社 リスク監視装置、リスク監視システム、リスク監視方法
US7843375B1 (en) * 2007-01-16 2010-11-30 Bae Systems Information And Electronic Systems Integration Inc. Method and apparatus for monitoring the RF environment to prevent airborne radar false alarms that initiate evasive maneuvers, reactionary displays or actions
US7840515B2 (en) * 2007-02-16 2010-11-23 Panasonic Corporation System architecture and process for automating intelligent surveillance center operations
US7710260B2 (en) 2007-08-14 2010-05-04 International Business Machines Corporation Pattern driven effectuator system
GB201004226D0 (en) * 2010-03-15 2010-04-28 Bae Systems Plc Process analysis
US8471700B1 (en) * 2010-04-16 2013-06-25 Kontek Industries, Inc. Global positioning systems and methods for asset and infrastructure protection
WO2012030333A1 (en) * 2010-09-01 2012-03-08 Hewlett-Packard Development Company, L.P. Performing what-if analysis
JP2013125469A (ja) 2011-12-15 2013-06-24 Sogo Keibi Hosho Co Ltd 警備装置および警備動作切替え方法
US9349103B2 (en) * 2012-01-09 2016-05-24 DecisionQ Corporation Application of machine learned Bayesian networks to detection of anomalies in complex systems
US8856057B2 (en) * 2012-09-13 2014-10-07 James Albert Ionson Cognitive security system and method
US9330262B2 (en) * 2012-09-21 2016-05-03 University Of Limerick Systems and methods for runtime adaptive security to protect variable assets
US9000918B1 (en) * 2013-03-02 2015-04-07 Kontek Industries, Inc. Security barriers with automated reconnaissance

Also Published As

Publication number Publication date
JP2017523376A (ja) 2017-08-17
JP6681389B2 (ja) 2020-04-15
EP3164663A4 (en) 2017-08-16
US20150347902A1 (en) 2015-12-03
MA40078A (fr) 2015-12-10
EP3164663B1 (en) 2019-11-13
CA2949979A1 (en) 2015-12-10
WO2015187768A1 (en) 2015-12-10
CA2949979C (en) 2021-09-21
EP3164663A1 (en) 2017-05-10
US11574206B2 (en) 2023-02-07

Similar Documents

Publication Publication Date Title
ES2773442T3 (es) Método de defensa y rechazo
AU2020203351B2 (en) Drone-augmented emergency response services
US11561058B2 (en) Weapon usage monitoring system with situational state analytics
US11385007B2 (en) Area denial communication latency compensation
Adel et al. Who is watching whom? Military and civilian drone: Vision intelligence investigation and recommendations
ES2686086B1 (es) Sistema autónomo de seguridad privada, capaz de prestar servicios pasivos y activos y en la lucha contra la violencia de género.
US20260045088A1 (en) Skyward Facing Helmet Camera and Associated Methods with Artificial Intelligence
HK1237403B (en) Defense and denial method
HK1237403A1 (en) Defense and denial method
US20250349223A1 (en) Simulation system and method for training in electronic counter measures
Pirek et al. The Methodology of Countering the Evolving Threat of Unmanned Aerial Vehicles.
Thornton et al. Automated testing of physical security: Red teaming through machine learning
RU2794559C1 (ru) Интегрированная система безопасности на основе автоматизированных функциональных систем и подсистем
RU2792588C1 (ru) Комбинированный комплекс физической защиты объектов, территорий и прилегающих акваторий с автоматизацией процессов охраны для сокращения численности людских ресурсов по его обслуживанию
Rincón Pabón et al. System for early warning in hostile areas in the context of the military applications
Jones et al. Detecting Drone Threats at Stadiums and Public Venues: Overview, Operational Considerations, and Technical Implementation
RU2708509C1 (ru) Малообслуживаемая система физической защиты объектов
Jones et al. Detecting Drone Threats at Stadiums and Public Venues
Youvan From Precision to Perdition: The Evolutionary Trajectory of Algorithmic Warfare and the Post-Human Battlefield
Pabón et al. System for Early Warning in Harsh Areas in the Context of the Military Applications
Francis From Pager Explosions to Targeted Drone Attacks in Lebanon: Assessing Israel’s Use of AI in Warfare
Ryan The Role of Information Technology
Lee et al. The Strategic Limits of Drone Defense: Empirical Findings and Security Policy Implications
Oh Exploration of border security systems of the ROK Army using agent-based modeling and simulation
Kohli Combating Drone Intrusions: A Survey of Detection Methods & Future Research