WO2014147621A1 - Aversion of covert pursuit - Google Patents
Aversion of covert pursuit Download PDFInfo
- Publication number
- WO2014147621A1 WO2014147621A1 PCT/IL2014/050301 IL2014050301W WO2014147621A1 WO 2014147621 A1 WO2014147621 A1 WO 2014147621A1 IL 2014050301 W IL2014050301 W IL 2014050301W WO 2014147621 A1 WO2014147621 A1 WO 2014147621A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- pursuer
- stop
- analysis
- derived
- clearing
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
Definitions
- the present invention is in the field of personal security and policing affairs.
- the present invention relates to a system and a method for detecting a covert pursuit and to the field of geographic information systems and navigation assisted by location technologies.
- the present invention provides means to analyze such intents objectively, for facilitation of better analysis of such seemingly hostile occurrences and their aversion.
- the invention is described infra as implementable by vehicle occupants, it is also implementable by pedestrians.
- vehicle relates to cars and land vehicles such as trucks, lorries, sport utility vehicle (SUVs) and also to motorcycles occupied by one or two persons.
- SUVs sport utility vehicle
- a pursuing party may be a person or a group of persons, a vehicle or a group of such. In each case the pursued or seemingly pursued party is referred to herein below as a potential target.
- maps In addition to maps that are designed for general navigation purpose, maps can meet specific objectives.
- GIS Graphic Information Systems
- This technology also facilitates inter- layer processing, output of special maps and distribution of geographic data.
- ESRI of 380 New York Street Redlands, CA 92373-8100, USA is a well known provider of such software systems.
- FIG. 1 shows a high-level block of a computer system according to one embodiment disclosed herein;
- Fig. 2 is an example of a clearing region map, showing T junctions ;
- Fig. 3 is an exemplary map of clearing zones showing the associated stop over locations.
- FIG. 4 illustrates a flowchart of a procedure performed by the system of
- Fig. 5 is a block diagram describing the input and output channels of the pursuing application.
- FIG. 6 shows a high-level block of a computer system according to another embodiment disclosed herein;
- FIG. 7 illustrates a flowchart of a procedure performed by the system of Fig.
- a potential target who is a user of a service in accordance with the present invention becomes aware of a follower, which may be either a vehicle or a pedestrian. Subsequently, the potential target may opt to maneuver such that the intentions of a follower may be exposed.
- an event starts when a potential target, either occupying a subject vehicle or a pedestrian, receives information about a suspicious follower that may be considered as following the potential target, or is intending to do so or alternatively the potential target may choose to be protected against such threat without receiving any signal.
- An event in accordance with the present invention may start for any reason by a potential target, which may become self informed, receiving external information or may start an event without any information received at all.
- An external information source may communicate with the potential target typically using cellular telephone.
- Fig. 1 is a high level block diagram illustrating exemplary architecture of a computer system 12 that executes, runs, interprets, operates or otherwise performs a pursuing application 22-1 and a pursuing process 22-2 suitable for use in explaining example configurations disclosed herein.
- the computer system may be found on a vehicle native hardware, Smartphone of the vehicle occupant/s, on another Smartphone or somewhere else such as a server in the service provider's premises on the cloud.
- the computer system 12 includes an interconnection mechanism 16 such a data bus that couples a memory system 18, a processor 20, an input/output interface 14 and communications interface 24.
- An input device 30 such as a keyboard, a mouse, voice recording accessory, enables the user (a potential target) to provide input commands, record notes in anticipation of the continuation of the pursuit.
- the processor 20 accesses the memory system 18 via the communication interface 16 in order to launch, run, execute and perform the logic instructions of the pursuing application 22-1.
- the 1 pursuing process 22-2 represents the runtime instance of the tracking application 22-1.
- the communication interface 24 enables the computer system 12 to communicate with any network as required to obtain external information.
- the computer system 12 may include other processes, software and hardware components not shown in this example.
- the computer program that controls the processes and procedures taking place as an event is unfolding is referred to hereinafter as pursuing process.
- the expression "clearing region” relates to a geographic region which a dedicated GIS application defines as an arena in which the analysis of the threat is advantageous.
- the clearing region is a unit of geographic area from which one or more maps can be produced for use by the user. The calculation and forming of such regions and maps may be performed by an independent application program. The preparation of such clearing regions may be made off-line on large or very large scale map basis and stored in the service provider's facilities or may be prepared during an event, based on spatial data provided in real time.
- a clearing zone is an area on the clearing region or in a map, defined by the computer program that allows the user to verify the existence of a pursuit vehicle.
- FIG. 2 A map as produced by the pursuing application of the invention demonstrating some fundamental definitions as laid out on the map is shown in Fig. 2.
- Window 52 which is a clearing region, defines a rectangular geographic area in which a network of roads is depicted.
- Road 54 and road 56 meet at a T junction marked by circle 58A.
- circle 58A In the same clearing region 52 three more circles are distributed, each one defining a specific T junction, namely 58B, 58C and 58D.
- a typical GIS system contains one or several layers of information relating to a specific area defined by geographic coordinates.
- One layer as described above is a T- j unction layer, but other layers functional in carrying out the task of identifying a covert pursuit are typically available.
- all layer properties that can become handy in carrying out the task of the invention are typically available.
- Typical to the GIS discipline in geographic presentation of data is the combining of data layers to form ad-hoc or pre- made combinations. For example a T- junction layer on which all the roads having a linear stretch over 400 meters is shown.
- FIG. 3 the implementation of stopping over and deployment of stop-over stretches (SOS) are demonstrated.
- T junction 58A has a stop-over stretch 132A associated, likewise T junction 58B has SOS 132B associated and T junction 58D has SOS 132D associated with respectively.
- the orientation of the stop- over stretch depends heavily on the direction of arrival of the subject vehicle at the T junction.
- the pursuing application (PA) will designate stop - over locations dynamically according to the direction from which the subject vehicle arrives at a pre-planned point, such as the T junction in this example.
- the second kind is a place required to enable the occupants of the subject to have a close look at a suspicious pursuer (vehicle, vehicles or person/s), such as a sharp turn, in order to record notes and make general preparations in anticipation of the continuation of the pursuit.
- a suspicious pursuer vehicle, vehicles or person/s
- Such notes for example are the color of the potential pursuer vehicle, plate number and dress description of a potential of an individual person suspected.
- a stop-over location such as a filling station
- a verification of a pursuer can also be attempted.
- the actual stopping or lingering of travelers in such a public place is a common practice.
- the significance of a potential pursuer following the potential target in three T junction bends consecutively is very high. However, it is the PA that can decide, based on statistical rationale, how many turnings in the course of seemingly following a target, consecutive or not, can be regarded as surpassing a significance threshold.
- Fig. 4 is a flowchart illustrating the sequence of events through which the pursuing application is implemented.
- the potential target activates the readily available map presenter, such as the computer system shown at Fig. 1 having a display, which shows to the potential target, such as occupants of the subject vehicle their own location on a map and instructions where to go from thence.
- the map presenter either automatically or the occupiers themselves, select a clearing region at step 124.
- the occupants of the subject vehicle (the potential target) would then strive to reach a clearing zone, in step 126, referenced here as clearing zone A.
- step 128 the occupants of the subject vehicle watch for the suspected vehicle at the corresponding stop over stretch and record notes. If the pursuer is observed, in step 130, the number of the pursuer occurrences is incremented and the occupants of the subject vehicle may be directed to the next clearing zone B in step 134. If the follower has not been observed in step 130, the process does typically continue by selecting a next clearing zone in step 138 which may be situated in the same clearing region or in another one. The process can continue until the event is ended based on statistical considerations such as how many turnings in the course of seemingly following a target consecutive or not, can be regarded as surpassing a significance threshold, indicating the end of the event in step 136.
- the parameter MATCH_THRESH mentioned in step 140 is a configurable parameter of the PA (Pursuer Application).
- the list of possible values for the configuration of the parameter MATCH_THRESH is derived from training sessions
- a subject vehicle first spotting a suspect pursuer of for that matter receiving an outside warning about the existence of such an entity, or acting in response to a hunch, would start an event as described above in connection with Fig. 4.
- the PA may decide to advise the user to travel to a preferred clearing region, which may better be suited for a specific speed of pursuit, for example a region with a large proportion of linear roads may be suitable for faster pursuit or a nearest clearing zone.
- the PA may also decide on how many times the spotting of an identical pursuer may be considered as surpassing the threshold of doubt and thus be considered a confirmation.
- Fig. 5 the input and output channels of the PA are shown.
- PA 72 receives input from a variety of sources in general referred to as sources ensemble 76.
- the total output channels supply information to the user and is referred to as ensemble of receivers 78.
- the sources ensemble 76 includes user location finder 82, which is typically a processed location statement which is based on signals of the user carried GPS receiver/processor, other global system/s, cellular positioning service, or other navigation services.
- GIS geo information system/s
- Source of ancillary data 86 is obtained chiefly by typing text or by implementing voice recording, preferably using voice to text conversion.
- these include at least maps 92 and audio/text/video messages. Such messages may be associated with maps, but generally are aimed at conveying instructions and or requirements for data and or statements to the user.
- Fig. 6 is a high level block diagram illustrating another exemplary architecture of a computer system 12 that executes, runs, interprets, operates or otherwise performs a pursuing application 22-1 and a pursuing process 22-2 suitable for use.
- the computer system 12 includes an additional accessory 40 - "Pursuer Sniffer System” ( PSS), connected to the computer system 12 through I/O interface 14 to record the messages sent through a wireless network.
- PSS may be implemented as a daughterboard as an alternative to the external accessory.
- the PSS is implemented based on the knowledge of Tire Pressure Monitoring System (TPMS) technology and protocols.
- TPMS Tire Pressure Monitoring System
- An example for such accessory is the USRPTM X300 (see at http://www.ettus.com).
- the PA using the PSS enables to find out if two pursuing parties are identified erroneously as a single pursuing party, even without the unique identifier of the pursuing party - which in this example is the sensor identifier.
- the periodicity of the messages including the unique identifier, the structure of the message and the exact location of the unique identifier in the message are sufficient for differentiating between two sources of communications, even if static encryption is used.
- Fig. 7 is a flowchart illustrating the sequence of events through which the pursuing application is implemented in case a PSS is included as part of the architecture of the computer system 12.
- the potential target activates the readily available map presenter, such as the computer system shown at Fig. 6 having a display, which shows to the potential target, such as occupants of the subject vehicle, their own location on a map and instructions where to go from thence.
- the map presenter either automatically or the occupiers themselves select a clearing region at step 124.
- the occupants of the subject vehicle would then strive to reach a clearing zone, in step 126, referenced here as clearing zone A.
- the PA When clearing zone A is reached, in step 128, the PA performs an analysis in procedure 200 based on the consecutive number of times the PA detects the potential pursuer in step 152 in this example.
- the PA waits during N time periods for the recorded messages from the PSS in step 150, N being a configurable parameter and PERIOD set as the periodicity of the messages.
- the pursuer is considered as observed if M same unique ID has been identified. If the pursuer is observed, in step 152, the number of the pursuer occurrences is incremented and the occupants of the subject vehicle may be directed to the next clearing zone B in step 134.
- step 152 the process does typically continue by selecting a next clearing zone in step 138 which may be situated in the same clearing region or in another one.
- the process can continue until the event is ended based on statistical considerations such as how many turnings in the course of seemingly following a target consecutive or not, can be regarded as surpassing a significance threshold, indicating the end of the event in step 136.
- an analysis is carried out in procedure 300 based on the consecutive number of times the potential target detects the potential pursuer in step 140 in this example.
- the parameter MATCH THRESH mentioned in step 140 is a configurable parameter of the PA (Pursuer Application).
- the list of possible values for the configuration of the parameter MATCH_THRESH is derived from training sessions.
- the parameter M mentioned in the context of step 142 is a configurable parameter of the pursuer application (PA).
- PA pursuer application
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Economics (AREA)
- Entrepreneurship & Innovation (AREA)
- Human Resources & Organizations (AREA)
- Marketing (AREA)
- Operations Research (AREA)
- Quality & Reliability (AREA)
- Strategic Management (AREA)
- Tourism & Hospitality (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Traffic Control Systems (AREA)
Abstract
Description
Claims
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201361803804P | 2013-03-21 | 2013-03-21 | |
US61/803,804 | 2013-03-21 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2014147621A1 true WO2014147621A1 (en) | 2014-09-25 |
Family
ID=51579394
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/IL2014/050301 WO2014147621A1 (en) | 2013-03-21 | 2014-03-19 | Aversion of covert pursuit |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO2014147621A1 (en) |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040027258A1 (en) * | 2002-04-30 | 2004-02-12 | Telmap Ltd | Template-based map distribution system |
US6693518B2 (en) * | 2000-05-23 | 2004-02-17 | Sharp Kabushiki Kaisha | Surround surveillance system for mobile body, and mobile body, car, and train using the same |
US20100198513A1 (en) * | 2009-02-03 | 2010-08-05 | Gm Global Technology Operations, Inc. | Combined Vehicle-to-Vehicle Communication and Object Detection Sensing |
-
2014
- 2014-03-19 WO PCT/IL2014/050301 patent/WO2014147621A1/en active Application Filing
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6693518B2 (en) * | 2000-05-23 | 2004-02-17 | Sharp Kabushiki Kaisha | Surround surveillance system for mobile body, and mobile body, car, and train using the same |
US20040027258A1 (en) * | 2002-04-30 | 2004-02-12 | Telmap Ltd | Template-based map distribution system |
US20100198513A1 (en) * | 2009-02-03 | 2010-08-05 | Gm Global Technology Operations, Inc. | Combined Vehicle-to-Vehicle Communication and Object Detection Sensing |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11710251B2 (en) | Deep direct localization from ground imagery and location readings | |
US11733710B2 (en) | Remote token-based control of autonomous vehicles | |
US6853849B1 (en) | Location/status-addressed radio/radiotelephone | |
US9483939B2 (en) | Method and apparatus for providing traffic flow signaling | |
US9965950B2 (en) | Method and apparatus for classifying a traffic jam from probe data | |
US9904286B2 (en) | Method and apparatus for providing adaptive transitioning between operational modes of an autonomous vehicle | |
US9566903B1 (en) | Multi-vehicle user-assistance systems and methods | |
EP3800445A1 (en) | Method, apparatus, and system for generating vehicle paths in a limited graph area | |
EP3739293B1 (en) | Method and apparatus for providing lane connectivity data for an intersection | |
CN112446989A (en) | Method for occupant authentication and door operation of an autonomous vehicle | |
US20140031068A1 (en) | Regional information distribution server, mobile terminal, regional information distribution system, regional information distribution method, and regional information display method | |
CN109357681B (en) | Vehicle navigation service coordinated with handheld wireless device | |
US20120135746A1 (en) | Method and apparatus for determining and providing location-based resource availability information based on mobile device data | |
US20180109915A1 (en) | Systems, methods and devices for virtual fencing | |
CN107421554A (en) | Guidance path determines method, apparatus, mobile unit and storage medium | |
US20150009327A1 (en) | Image capture device for moving vehicles | |
US20160140613A1 (en) | Advertisement providing system and method thereof | |
CN112073936A (en) | System and method for network node communication | |
US20200372796A1 (en) | Method, apparatus, and system for collecting and providing route-related information based on citizen band radio | |
Anedda et al. | A social smart city for public and private mobility: A real case study | |
US20160055175A1 (en) | Geographic search system | |
JP2012527142A (en) | Two-way ad hoc-network wireless communication controller | |
JP2018526613A (en) | User context detection using mobile devices based on wireless signal characteristics | |
Cammin et al. | Concept for a Real-Time IoT-Architecture for Collision Avoidance in Smart Cities based on the 5G Mobile Technology | |
WO2014147621A1 (en) | Aversion of covert pursuit |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 14767682 Country of ref document: EP Kind code of ref document: A1 |
|
DPE1 | Request for preliminary examination filed after expiration of 19th month from priority date (pct application filed from 20040101) | ||
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WPC | Withdrawal of priority claims after completion of the technical preparations for international publication |
Ref document number: 61/803,804 Country of ref document: US Date of ref document: 20150901 Free format text: WITHDRAWN AFTER TECHNICAL PREPARATION FINISHED |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 14767682 Country of ref document: EP Kind code of ref document: A1 |