US20080059130A1 - Method for Modeling and Testing a Security System - Google Patents

Method for Modeling and Testing a Security System Download PDF

Info

Publication number
US20080059130A1
US20080059130A1 US11/932,827 US93282707A US2008059130A1 US 20080059130 A1 US20080059130 A1 US 20080059130A1 US 93282707 A US93282707 A US 93282707A US 2008059130 A1 US2008059130 A1 US 2008059130A1
Authority
US
United States
Prior art keywords
security
security system
breach
computer
modeling
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US11/932,827
Inventor
Dennis Johnson
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ultravision Security Systems Inc
Original Assignee
Ultravision Security Systems Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ultravision Security Systems Inc filed Critical Ultravision Security Systems Inc
Priority to US11/932,827 priority Critical patent/US20080059130A1/en
Assigned to ULTRAVISION SECURITY SYSTEMS, INC. reassignment ULTRAVISION SECURITY SYSTEMS, INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: JOHNSON, DENNIS J.
Publication of US20080059130A1 publication Critical patent/US20080059130A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B29/00Checking or monitoring of signalling or alarm systems; Prevention or correction of operating errors, e.g. preventing unauthorised operation
    • G08B29/18Prevention or correction of operating errors
    • G08B29/20Calibration, including self-calibrating arrangements
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F30/00Computer-aided design [CAD]
    • G06F30/10Geometric CAD
    • G06F30/13Architectural design, e.g. computer-aided architectural design [CAAD] related to design of buildings, bridges, landscapes, production plants or roads
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F30/00Computer-aided design [CAD]
    • G06F30/20Design optimisation, verification or simulation
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B31/00Predictive alarm systems characterised by extrapolation or other computation using updated historic data

Definitions

  • This invention generally relates to security systems for a structure and the area surrounding the structure. More particularly, this invention relates to a method of designing a complex security system that enables determining the efficacy of the security system in real-word scenarios prior to implementation of the actual system components and enables efficient personnel training.
  • Such an area, or security area may be of any size and may include structures, facilities supporting the structures, infrastructures, grounds within a defined perimeter, and outer perimeter grounds and structures.
  • the security area may be a single family dwelling, a multiple family dwelling, a business facility, a government or military installation, or a natural area such as a park or preserve.
  • a security system is designed along with the security area. In other cases, security systems are implemented in existing structures and areas.
  • Security systems today may include sophisticated sensor technology, monitoring systems, command and control systems and security personnel. It is quite obvious that even smaller systems can become expensive to implement, and once implemented, gaps in the security system can be costly in terms of property loss and/or personal injury or loss of life.
  • new or retro-fit systems are designed by receiving customer requirements with specifications of the security area.
  • the security system designer uses the customer requirements, specifications and allocated budget to select system elements and methods to secure the area. Once accepted, the system is physically implemented and tested.
  • the system tests typically consist of physical testing of the system elements, i.e. providing a known input to test for an expected output within element specifications.
  • the '524 patent describes a system and method for simulation of integrated hardware and software components.
  • the described system includes a cycle-accurate simulator where X-number of simulator cycles is equivalent to Y-number of cycles on a simulated hardware component.
  • the cycle-accurate simulator models stages of an operation execution pipeline for a desired hardware component (e.g., a central processing unit).
  • the cycle-accurate simulator may indicate how long an operation takes to execute and may indicate the timing and sequence of operations as they occur.
  • the cycle-accurate simulator is preferably event driven, and events are used to determine timing behavior and interactions of hardware and software components in a simulation.
  • the cycle-accurate simulator also may be used in an “instruction timing” mode, where the number of cycles required for a general operation is determined, but the order or timing of individual operations that make up the general operation are not simulated.
  • the system described in the '524 patent further includes a simulator library for modeling and verifying hardware components of a desired electronic device.
  • the simulator library may include built-in models for simulating multiple internal and external hardware components (e.g., central processing units, memory, memory management units, caches, timers, universal asynchronous receiver transmitters and digital signal processors).
  • the built-in models return a number of cycles on the cycle-accurate simulator executed for a desired simulated operation.
  • the simulator library may also include simulator interface routines for setting a clock for a simulated component to a new clock speed, coordinating between a simulator library clock and a cycle-accurate simulator clock, handling events that occur before or during a current clock cycle, changing interrupt vectors and interrupt priority levels, providing notification of changes in registers during a simulated operation, or for setting one or more individual sub-components (e.g., status bits) of a simulated hardware component.
  • the simulator library with built-in models and routines is used as an interface to the cycle-accurate simulator.
  • Modeling techniques such as those described in the '524 patent are only applicable to a circuit-level system. In other words, the method is essentially an automated circuit and software analysis. These modeling techniques do not address real-world implementation and cannot be extended to designing and testing the functionality of a complete security system in real-world situations. There is no recognition of the problem with meeting all technical system requirements and then having an outside force intentionally attempting to defeat or otherwise breach the system.
  • the present invention addresses some or all of the drawbacks discussed above by providing a method of designing and testing a security system using several real-world breach scenarios to test selected sensors and countermeasures prior to installing the sensors and countermeasures.
  • One aspect of the present invention is a method of modeling and testing a security system comprising selecting one or more security elements of a security system for a predetermined security area, modeling the security area using the selected security elements placed in locations in the security area, selecting a breach scenario to test the modeled security system, and executing the breach scenario.
  • Parameters may be added to the security system model and/or to the breach scenario to enhance realism.
  • the parameters may include conditions such as time of day, environmental conditions, weather conditions and meteorological events. Conditions may include temperature, wind speed, precipitation, high water, vibration and any other realistic condition to enhance realism for the model.
  • the security elements may be selected sensors having known specifications.
  • the elements may include any or all of i) an ultra wide-band (UWB) sensor, ii) a closed-circuit TV (CCTV), iii) a microwave sensor, iv) a laser sensor, v) a contact switch, vi) an infrared sensor, vii) a motion sensor, viii) a heat detector, ix) a smoke detector, x) a pressure sensor, xi) an accelerometer, and xii) a vibration sensor.
  • the security elements may include security forces and/or personnel executing defined countermeasures and/or response procedures.
  • Another aspect of the invention is an implementation of the method in the form of a computer game.
  • the method includes modeling a command and control center for the security system.
  • the game includes a computer simulation, wherein a first player protects the security area using the security system model to respond to an attack from a second player implementing a breach scenario.
  • the security system and/or security area may be updated based in part of a determined weakness.
  • the testing or game is performed at least in part remotely using at least two computers connected by one of i) a LAN, ii) a WAN, iii) an intranet, and iv) an Internet.
  • either one of the first player and the second player may be computer generated. Both players may be computer generated for a fully automated test of the security system.
  • each player may be multiple players collaborating to win the game.
  • a computer-readable medium with instructions recorded thereon for modeling and testing a security system using a computer, the instructions comprising selecting one or more security elements of a security system for a predetermined security area, modeling the security area using the selected security elements placed in locations in the security area, selecting a breach scenario to test the modeled security system, and executing the breach scenario.
  • a method of training personnel using a computer modeled security system includes selecting a breach scenario for the modeled security system and responding to the breach scenario using a computer.
  • FIG. 1 is a wire-frame elevation view of a structure with surrounding perimeter and gated entry;
  • FIG. 2 is a flow of a method according to the present invention.
  • FIG. 3 is another flow of a method according to the present invention, wherein the testing according to the method is implemented as a computer game.
  • FIG. 1 is a wire-frame elevation view of a structure with surrounding perimeter and gated entry to illustrate a generic security area 100 .
  • the security area 100 includes a structure 102 with a defined perimeter 104 .
  • the security area includes the internal volume of the structure 102 , the grounds within the perimeter 104 and the grounds surrounding the perimeter 104 .
  • the structure 102 may include a plurality of structures.
  • the perimeter 104 may be a wall or fence surrounding the structure(s) or the perimeter may be a defined boundary, which cannot be otherwise distinguished by viewing.
  • the perimeter may also include several defined perimeters that may or may not be directly connected to one another.
  • the perimeter may be the boundary of a wildlife refuge, a national or a state park, or the perimeter may be a zone around a military installation.
  • the structure 102 may be a natural structure, e.g. park caverns. Suffice it to say that the term “security area” as used herein means any area for which security is desired.
  • the structure 102 is a building as shown.
  • the building may include multiple floors 106 and inner rooms, walls, floors, roofs, concrete parking structures, windows, doors, interior piping, furniture etc...
  • the security area 108 around the building may also include various facilities and grounds that support the security area.
  • Some examples include fences 118 , roads 120 , sidewalks 122 , underground pipes and sewers 124 , topography, water features, trees, landscaping, etc. . . .
  • a security system for a security area as shown in FIG. 1 might include any number of security elements 110 .
  • Exemplary security elements may line-of-sight sensors, motion detectors, pressure sensors, monitors, ultra-wide band (UWB) sensors, contact sensors, lighting, smoke and heat detectors, biological material sensors, and personnel deployed throughout the security area.
  • a command and control center 112 might be used to integrate and monitor all of the system elements.
  • the system may also include telephone and/or computer access to the outside world for alerting officials of a security breach.
  • the command and control center includes a computer 113 .
  • the computer 113 includes a processor, a storage system, an output monitor, printer and/or any other computer output device.
  • the computer 113 further includes input devices such as a keyboard, mouse, joy stick, and/or any other desired computer input device suitable for implementing the present invention.
  • the computer 113 may be portable, stand-alone or an integral component of a security system command and control console.
  • Structures in the security area may have several sensors 114 or other security elements in the event the outer perimeter is breached.
  • the outer perimeter might also include various buried sensors 116 such as pressure sensors or other sensors for detecting vehicle and/or personnel movements.
  • a method of modeling and testing a security system is depicted in the flow of FIG. 2 .
  • the method includes using a computer system programmed to process instructions stored on a computer-readable medium such as a hard drive, computer disk, tape, optical disk, flash memory, read-only memory (ROM), random-access memory (RAM), or flash memory.
  • a computer-readable medium such as a hard drive, computer disk, tape, optical disk, flash memory, read-only memory (ROM), random-access memory (RAM), or flash memory.
  • the method 200 includes generating a model 200 of the security area 100 .
  • a designer selects 204 detection methods and components, i.e. security elements.
  • the selected security elements are then placed 206 in the security area model 202 to define a security system model.
  • An optional pre-screen program may be executed 208 to test the selected security elements in the placed locations to determine whether blind spots exist.
  • Various breach scenarios and assets are selected 210 .
  • Breach countermeasures are selected or added to the models 212 .
  • the breach scenarios are executed 214 to test the security system model 202 . In this manner weaknesses in the design or security logic can be detected and corrected.
  • Each element of the modeling and testing will now be described in more detail.
  • the security area model 200 may be any desired precision depending upon the security level desired in view of available budget. For example, the model of a residential structure might be much less sophisticated than the model of a military installation.
  • the security area model may include the structure, grounds, perimeter and areas outside the perimeter.
  • the security area model should include actual size and distance information relating to the structure, grounds and perimeter, because many sensors and camera lenses include specifications relating to distance.
  • the security area model may further include materials information, e.g. structure materials such as concrete, wood, metal etc. . . . This information is helpful in determining the proper sensor technology. For example, some sensors can penetrate some materials and not through other materials. If the structure is all metal, for example, one would typically not use an UWB sensor, since it will likely not penetrate the metal structure. However, a concrete, wood or metal frame structure might be a better application of a UWB sensor.
  • materials information e.g. structure materials such as concrete, wood, metal etc. . . . This information is helpful in determining the proper sensor technology. For example, some sensors can penetrate some materials and not through other materials. If the structure is all metal, for example, one would typically not use an UWB sensor, since it will likely not penetrate the metal structure. However, a concrete, wood or metal frame structure might be a better application of a UWB sensor.
  • the security area model may also include floors and inner rooms, walls, floors, roofs, concrete parking structures, windows, doors, interior piping, and furniture for each structure in the security area.
  • the security area model may also include various facilities and grounds such as fences, roads, sidewalks, trees, landscaping, underground pipes and sewers, topography, water features, etc. . . .
  • a database of materials, structures, plants, pipes and the like is used to build the model. Properties of these elements are updates as modeling of similar areas provides additional information.
  • the modeling program provides a modeling tool box for drawing buildings, structures, walls, floors, roofs, concrete structures (e.g., parking garage), windows, doors, interior piping, furniture, and anything else desired for representing the structure 102 .
  • a modeling tool box for drawing buildings, structures, walls, floors, roofs, concrete structures (e.g., parking garage), windows, doors, interior piping, furniture, and anything else desired for representing the structure 102 .
  • Selecting security elements 204 for the model may be from a data base of known elements or the selected security element may be developed for a particular model.
  • the security element may be any number of sensors. Exemplary sensor technology includes ultra wide-band (UWB), closed-circuit TV (CCTV), microwave sensors, laser sensors, contact switches for doors gates and windows, infrared sensors, motion sensors, heat and smoke detectors, pressure sensors, accelerometers and vibration sensors.
  • UWB ultra wide-band
  • CCTV closed-circuit TV
  • microwave sensors laser sensors
  • contact switches for doors gates and windows infrared sensors
  • motion sensors motion sensors
  • heat and smoke detectors pressure sensors
  • the database supports a tool box identifying all available sensors in the database. New sensors developed or selected outside of the database may be added to the database and tool box for future modeling projects.
  • Sensor parameters and specifications are input to a database either before or during modeling. Sensors are selected based in part of the ability of the sensor to accommodate a specified portion of the security area as modeled 202 .
  • the selected sensors are placed 206 in the model 202 to define a security system model.
  • a pre-screen program may be run 208 to identify blind spots in the security system model.
  • a blind-spot is an area of low or no coverage when all of the selected sensors are on-line and operating according to the specifications.
  • the security system model may then be updated by selection additional sensors, changing sensors or adjusting sensor sensitivity where such adjustments are within the selected sensor specifications.
  • the pre-screen program utilizes the security element specifications from the database and the defined security area parameters and materials to calculate coverage for each security element.
  • a blind spot may exist were a wall of a given material obscures the range of a particular selected security element. In some cases, security elements are simply placed too far apart such that the specified ranges do not overlap.
  • a breach scenario is any potential risk to the security area.
  • a breach may be a physical breach by one or more intruders.
  • An intruder may be on foot or in a vehicle, which may be ground, water or flight.
  • the breach scenario should be a realistic scenario. For example, using a human running on foot at an unrealistic speed may not be a valid test of the security system model.
  • any realistic scenario may be selected, one might not expect a civilian single family residence security area to be breached by an armored vehicle even if such a vehicle is available in the database for other models.
  • the breach scenario may be developed by test personnel during testing, and the breach scenario may be developed by a collaborative effort of experts in the various sensor technology selected for the security area model.
  • Breach scenarios as used herein includes the pre-screen program.
  • running a pre-screen program is a type of breach scenario.
  • parameters may be used in either the breach scenario and/or in the security system model to promote realism in the testing.
  • These parameters may be various environmental conditions internal to the structures and/or of the outside conditions of the security area. These conditions may be any number of conditions to promote realism. Without limitation, such conditions may be temperature, wind, precipitation, fog, vibration, high water, ice, vibration (natural or machine) or any other realistic condition useful in determining the effectiveness of the system or in the training of personnel in the use of a security system.
  • At least a portion of a breach scenario may be computer-generated based in part on the selection of security elements.
  • the breach scenario may be selected using a tool box associated with the database including people, soldiers, vehicles and any object that may be moved within the facility to create a security threat.
  • Countermeasures are developed or selected 212 from a database either in anticipation of possible breach scenarios or after breach scenarios are selected 210 .
  • Countermeasures may include personnel response, alarms, and/or alerts to outside entities (e.g., fire, police, or security staff etc).
  • At least a portion of the countermeasures are computer generated and provided to the designer in the form of a computer output.
  • the out may include mandatory procedures where certain breaches require certain response.
  • the output may provide suggested countermeasures where selected scenarios have been successfully countered in past models or in past real-world cases.
  • These countermeasures, mandatory and suggested may be stored in a countermeasure database for ready access when desired.
  • the database of countermeasures may be implemented as a tool box for easy selection. Newly developed countermeasures and procedures for specified breach scenarios may be added to the database and tool box for future modeling projects.
  • the breach scenarios are executed 214 either before or after the selection of countermeasures 212 .
  • the breach scenarios may be executed 214 without previously running the pre-screen program, because the result of running the breach scenario will include a determination of blind spots.
  • a result of executing the breach scenario may be in the form a computer output to the designer.
  • the output may point out weaknesses in the sensor selection, the architecture of the security system or even of the security area itself.
  • the designer may use the output to determine if the overall security system design and implementation plan will meet customer requirements and/or goals. If not, then a change in the selection of security elements, or element parameters may be made and the method can be executed again to optimize the security system model. This optimization may be implemented as an iterative process.
  • the output may be used in effecting a design change to the security area structure, facilities or perimeter system when the method is being implemented in the design and construction phase of an installation. If this is the case, then the security area model 202 may be updated prior to implementing the design change and the method executed again to test the design change and updated security system.
  • FIG. 3 is another aspect of the present invention wherein the security system modeling and testing is performed by one or more users in the form of a computer role-playing game.
  • the implementation is shown as a flow 300 .
  • a security area modeling flow 302 is substantially similar to that described above and shown in FIG. 2 .
  • a flow may also be generated 304 for an actual or existing building/facility having a security system and command and control center. Outputs from the security area flow 302 and/or from the building/facility flow 304 are provided to a computer 306 implementing a program flow for a computer challenge 308 .
  • a model of the security area is generated 302 . Buildings and structures are modeled 310 using a tool box for depicting such elements.
  • a facilities and grounds model is generated 312 using a tool box for depicting fences, roads, sidewalks, trees, landscaping, underground pipes and sewers, topography, water features and anything else desired for representing the grounds around buildings.
  • Security elements are generated 314 using a tool box that includes actual sensor specifications. As described above, any known or developed sensor may be selected such as ultra wide-band (UWB), closed-circuit TV (CCTV), microwave sensors, laser sensors, contact switches for doors gates and windows, infrared sensors, motion sensors, heat and smoke detectors, pressure sensors, accelerometers and vibration sensors.
  • UWB ultra wide-band
  • CCTV closed-circuit TV
  • microwave sensors laser sensors
  • contact switches for doors gates and windows infrared sensors
  • motion sensors heat and smoke detectors
  • pressure sensors accelerometers and vibration sensors.
  • a model of a command and control (C&C) center information and displays is generated 316 using a tool box including the various components, interface requirements and parameters.
  • the C&C model is based on the prior selection of sensors and their placement in the facility from the model 318 .
  • Intruder forces are modeled 324 using a tool box including people, soldiers, vehicles and any object that may be moved within the facility to create a security threat.
  • the C&C models and the Breach models are then used on a computer with one or more users in a role-playing style game for determining whether an intruder can breach or otherwise defeat the security system modeled.
  • Facility Attacker 322 This Player attempts to enter the facility with any available asset from the breach model or may generate a breach scenario in real-time.
  • the Facility Defender may use a computer-generated Attacker.
  • a computer-generated attacker is an algorithm utilizing the security breach models to present a security threat to the facility.
  • the program is implemented as an iterative process to test each aspect of the security system.
  • simultaneous breach scenarios may be executed to determine whether the security system model can respond adequately to simultaneous attacks.
  • the Facility Defender may be a collaboration of several people.
  • the Facility Attacker may be a collaboration of several people.
  • the test game is remotely implemented among players utilizing two or more computers linked using a local-area network (LAN), wide-area network (WAN), an intranet or the Internet.
  • LAN local-area network
  • WAN wide-area network
  • intranet intranet
  • various experts may join from remote locations. This may be the case when designing and/or testing military installations. These personnel may be expert in security systems or in the security elements used in the system, and therefore join on the side of the Facility Defender. Likewise, these personnel may be expert in military or assault tactics, and therefore join in on the side of the Facility Attacker.
  • a method of training personnel using a computer modeled security system includes selecting a breach scenario for the modeled security system and responding to the breach scenario using a computer.
  • the method can be implemented using either the flow described above and shown in FIG. 2 or using the role-playing game flow described above and shown in FIG. 3 .
  • This training method is a simulator method somewhat like the use of flight simulators for pilot training and proficiency tests.
  • the simulator may be a separate facility using a model of an actual security system, or the simulator may be run on an actual security system having a command and control center with a computer programmed with various breach scenarios.
  • Personnel may be trained or proficiency tests may be performed using the method according to the invention.
  • a security system and the security area are modeled according to the flow of FIG. 2 .
  • This portion of the method, or simulator may be preprogrammed and stored on a facility security system computer that may be part of the facility command and control center or a separate computer.
  • Breach scenarios may be preprogrammed and selected or they may be entered during the simulation.
  • Personnel being trained respond to the breach scenario using countermeasures and/or procedures that would normally be made available in a real breach event.
  • the countermeasures may be entered by the trainee during the simulation or may be selected from the simulator.
  • the simulator judges the trainee response and provides an output relating to the effectiveness of the response.
  • the simulator may also be programmed to counter the trainee response with one or more additional breach scenarios.

Abstract

A method of designing, modeling and testing a security system for protecting a defined security area. The method includes modeling the security area, modeling the security system for the security area, and testing the security system using a computer to run various breach scenarios to determine weaknesses in the security system. The testing may be in the form of a computer game with one or more players implementing the models and scenarios or in real-time.

Description

    CROSS-REFERENCE TO RELATED APPLICATIONS
  • This application is a divisional application of U.S. patent application Ser. No. 11/112,437 filed Apr. 22, 2005.
  • BACKGROUND OF THE INVENTION
  • 1. Field of the Invention
  • This invention generally relates to security systems for a structure and the area surrounding the structure. More particularly, this invention relates to a method of designing a complex security system that enables determining the efficacy of the security system in real-word scenarios prior to implementation of the actual system components and enables efficient personnel training.
  • 2. Description of the Related Art
  • A multitude of instances exist wherein it is desirable to implement a security system for a given area. Such an area, or security area, may be of any size and may include structures, facilities supporting the structures, infrastructures, grounds within a defined perimeter, and outer perimeter grounds and structures. The security area may be a single family dwelling, a multiple family dwelling, a business facility, a government or military installation, or a natural area such as a park or preserve. In some cases, a security system is designed along with the security area. In other cases, security systems are implemented in existing structures and areas.
  • Security systems today may include sophisticated sensor technology, monitoring systems, command and control systems and security personnel. It is quite obvious that even smaller systems can become expensive to implement, and once implemented, gaps in the security system can be costly in terms of property loss and/or personal injury or loss of life.
  • Typically, new or retro-fit systems are designed by receiving customer requirements with specifications of the security area. The security system designer uses the customer requirements, specifications and allocated budget to select system elements and methods to secure the area. Once accepted, the system is physically implemented and tested. The system tests typically consist of physical testing of the system elements, i.e. providing a known input to test for an expected output within element specifications.
  • In rare cases, the overall security system is tested using mock drills once the system is installed and operational. In some cases, existing systems are tested by these mock drills, but these drills can be labor intensive, will disrupt normal work hours and schedules of the facility, and may fail to account for certain scenarios of breach. Therefore, there is a need to reduce labor and facility/workforce time required to test security systems and to train personnel on installed security systems.
  • Sometimes rework is required due to specification changes, unforeseen obstacles, or testing results revealing one or more selected elements do not meet customer requirements. These rework operations can become quite costly and cause delay in system completion. Therefore, there is a need to reduce rework of security system elements by optimizing the security system prior to installation.
  • Electrical circuit modeling is known as exemplified by U.S. Pat. No. 6,052,524 to Pauna for “System and method for simulation of integrated hardware and software components.” The '524 patent describes a system and method for simulation of integrated hardware and software components. The described system includes a cycle-accurate simulator where X-number of simulator cycles is equivalent to Y-number of cycles on a simulated hardware component. The cycle-accurate simulator models stages of an operation execution pipeline for a desired hardware component (e.g., a central processing unit). The cycle-accurate simulator may indicate how long an operation takes to execute and may indicate the timing and sequence of operations as they occur. The cycle-accurate simulator is preferably event driven, and events are used to determine timing behavior and interactions of hardware and software components in a simulation. The cycle-accurate simulator also may be used in an “instruction timing” mode, where the number of cycles required for a general operation is determined, but the order or timing of individual operations that make up the general operation are not simulated.
  • The system described in the '524 patent further includes a simulator library for modeling and verifying hardware components of a desired electronic device. The simulator library may include built-in models for simulating multiple internal and external hardware components (e.g., central processing units, memory, memory management units, caches, timers, universal asynchronous receiver transmitters and digital signal processors). The built-in models return a number of cycles on the cycle-accurate simulator executed for a desired simulated operation. The simulator library may also include simulator interface routines for setting a clock for a simulated component to a new clock speed, coordinating between a simulator library clock and a cycle-accurate simulator clock, handling events that occur before or during a current clock cycle, changing interrupt vectors and interrupt priority levels, providing notification of changes in registers during a simulated operation, or for setting one or more individual sub-components (e.g., status bits) of a simulated hardware component. The simulator library with built-in models and routines is used as an interface to the cycle-accurate simulator.
  • Modeling techniques such as those described in the '524 patent are only applicable to a circuit-level system. In other words, the method is essentially an automated circuit and software analysis. These modeling techniques do not address real-world implementation and cannot be extended to designing and testing the functionality of a complete security system in real-world situations. There is no recognition of the problem with meeting all technical system requirements and then having an outside force intentionally attempting to defeat or otherwise breach the system.
  • There is a need for a system and method for designing a security system and testing the design and proposed system architecture prior to implementing the system. There is a need also for a system and method of testing existing security systems with reduced labor and enhanced coverage of a wide range of breach scenarios. The typical security system lacks efficient training capability. Therefore, there is a need for more efficient training in real-world scenarios while minimizing labor and work-hour disruptions.
  • SUMMARY OF THE INVENTION
  • The present invention addresses some or all of the drawbacks discussed above by providing a method of designing and testing a security system using several real-world breach scenarios to test selected sensors and countermeasures prior to installing the sensors and countermeasures.
  • One aspect of the present invention is a method of modeling and testing a security system comprising selecting one or more security elements of a security system for a predetermined security area, modeling the security area using the selected security elements placed in locations in the security area, selecting a breach scenario to test the modeled security system, and executing the breach scenario. Parameters may be added to the security system model and/or to the breach scenario to enhance realism. The parameters may include conditions such as time of day, environmental conditions, weather conditions and meteorological events. Conditions may include temperature, wind speed, precipitation, high water, vibration and any other realistic condition to enhance realism for the model.
  • The security elements may be selected sensors having known specifications. The elements may include any or all of i) an ultra wide-band (UWB) sensor, ii) a closed-circuit TV (CCTV), iii) a microwave sensor, iv) a laser sensor, v) a contact switch, vi) an infrared sensor, vii) a motion sensor, viii) a heat detector, ix) a smoke detector, x) a pressure sensor, xi) an accelerometer, and xii) a vibration sensor. The security elements may include security forces and/or personnel executing defined countermeasures and/or response procedures.
  • Another aspect of the invention is an implementation of the method in the form of a computer game. The method includes modeling a command and control center for the security system. The game includes a computer simulation, wherein a first player protects the security area using the security system model to respond to an attack from a second player implementing a breach scenario.
  • In response to a result of the game or of the test, the security system and/or security area may be updated based in part of a determined weakness.
  • In one aspect the testing or game is performed at least in part remotely using at least two computers connected by one of i) a LAN, ii) a WAN, iii) an intranet, and iv) an Internet. In the game, either one of the first player and the second player may be computer generated. Both players may be computer generated for a fully automated test of the security system. When using human players, each player may be multiple players collaborating to win the game.
  • In another aspect a computer-readable medium with instructions recorded thereon for modeling and testing a security system using a computer, the instructions comprising selecting one or more security elements of a security system for a predetermined security area, modeling the security area using the selected security elements placed in locations in the security area, selecting a breach scenario to test the modeled security system, and executing the breach scenario.
  • In another aspect, a method of training personnel using a computer modeled security system includes selecting a breach scenario for the modeled security system and responding to the breach scenario using a computer.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • For detailed understanding of the present invention, references should be made to the following detailed description of the preferred embodiment, taken in conjunction with the accompanying drawings, in which like elements have been given like numerals and wherein:
  • FIG. 1 is a wire-frame elevation view of a structure with surrounding perimeter and gated entry;
  • FIG. 2 is a flow of a method according to the present invention; and
  • FIG. 3 is another flow of a method according to the present invention, wherein the testing according to the method is implemented as a computer game.
  • DESCRIPTION OF THE PREFERRED EMBODIMENT
  • FIG. 1 is a wire-frame elevation view of a structure with surrounding perimeter and gated entry to illustrate a generic security area 100. The security area 100 includes a structure 102 with a defined perimeter 104. The security area includes the internal volume of the structure 102, the grounds within the perimeter 104 and the grounds surrounding the perimeter 104.
  • The structure 102 may include a plurality of structures. The perimeter 104 may be a wall or fence surrounding the structure(s) or the perimeter may be a defined boundary, which cannot be otherwise distinguished by viewing. The perimeter may also include several defined perimeters that may or may not be directly connected to one another. The perimeter may be the boundary of a wildlife refuge, a national or a state park, or the perimeter may be a zone around a military installation. Furthermore, instead of a man-made structure as shown, the structure 102 may be a natural structure, e.g. park caverns. Suffice it to say that the term “security area” as used herein means any area for which security is desired.
  • In one aspect of the invention, the structure 102 is a building as shown. The building may include multiple floors 106 and inner rooms, walls, floors, roofs, concrete parking structures, windows, doors, interior piping, furniture etc... The security area 108 around the building may also include various facilities and grounds that support the security area. Some examples include fences 118, roads 120, sidewalks 122, underground pipes and sewers 124, topography, water features, trees, landscaping, etc. . . .
  • A security system for a security area as shown in FIG. 1 might include any number of security elements 110. Exemplary security elements may line-of-sight sensors, motion detectors, pressure sensors, monitors, ultra-wide band (UWB) sensors, contact sensors, lighting, smoke and heat detectors, biological material sensors, and personnel deployed throughout the security area. A command and control center 112 might be used to integrate and monitor all of the system elements. The system may also include telephone and/or computer access to the outside world for alerting officials of a security breach. The command and control center includes a computer 113. The computer 113 includes a processor, a storage system, an output monitor, printer and/or any other computer output device. The computer 113 further includes input devices such as a keyboard, mouse, joy stick, and/or any other desired computer input device suitable for implementing the present invention. The computer 113 may be portable, stand-alone or an integral component of a security system command and control console.
  • Structures in the security area may have several sensors 114 or other security elements in the event the outer perimeter is breached. The outer perimeter might also include various buried sensors 116 such as pressure sensors or other sensors for detecting vehicle and/or personnel movements.
  • A method of modeling and testing a security system, such as the system 100, is depicted in the flow of FIG. 2. The method includes using a computer system programmed to process instructions stored on a computer-readable medium such as a hard drive, computer disk, tape, optical disk, flash memory, read-only memory (ROM), random-access memory (RAM), or flash memory.
  • The method 200 includes generating a model 200 of the security area 100. A designer then selects 204 detection methods and components, i.e. security elements. The selected security elements are then placed 206 in the security area model 202 to define a security system model. An optional pre-screen program may be executed 208 to test the selected security elements in the placed locations to determine whether blind spots exist. Various breach scenarios and assets are selected 210. Breach countermeasures are selected or added to the models 212. The breach scenarios are executed 214 to test the security system model 202. In this manner weaknesses in the design or security logic can be detected and corrected. Each element of the modeling and testing will now be described in more detail.
  • The security area model 200 may be any desired precision depending upon the security level desired in view of available budget. For example, the model of a residential structure might be much less sophisticated than the model of a military installation. The security area model may include the structure, grounds, perimeter and areas outside the perimeter. The security area model should include actual size and distance information relating to the structure, grounds and perimeter, because many sensors and camera lenses include specifications relating to distance.
  • The security area model may further include materials information, e.g. structure materials such as concrete, wood, metal etc. . . . This information is helpful in determining the proper sensor technology. For example, some sensors can penetrate some materials and not through other materials. If the structure is all metal, for example, one would typically not use an UWB sensor, since it will likely not penetrate the metal structure. However, a concrete, wood or metal frame structure might be a better application of a UWB sensor.
  • The security area model may also include floors and inner rooms, walls, floors, roofs, concrete parking structures, windows, doors, interior piping, and furniture for each structure in the security area. The security area model may also include various facilities and grounds such as fences, roads, sidewalks, trees, landscaping, underground pipes and sewers, topography, water features, etc. . . . In one embodiment, a database of materials, structures, plants, pipes and the like is used to build the model. Properties of these elements are updates as modeling of similar areas provides additional information.
  • In one implementation of the method, the modeling program provides a modeling tool box for drawing buildings, structures, walls, floors, roofs, concrete structures (e.g., parking garage), windows, doors, interior piping, furniture, and anything else desired for representing the structure 102.
  • Selecting security elements 204 for the model may be from a data base of known elements or the selected security element may be developed for a particular model. The security element may be any number of sensors. Exemplary sensor technology includes ultra wide-band (UWB), closed-circuit TV (CCTV), microwave sensors, laser sensors, contact switches for doors gates and windows, infrared sensors, motion sensors, heat and smoke detectors, pressure sensors, accelerometers and vibration sensors. In one aspect of the invention, the database supports a tool box identifying all available sensors in the database. New sensors developed or selected outside of the database may be added to the database and tool box for future modeling projects.
  • Sensor parameters and specifications are input to a database either before or during modeling. Sensors are selected based in part of the ability of the sensor to accommodate a specified portion of the security area as modeled 202. The selected sensors are placed 206 in the model 202 to define a security system model. A pre-screen program may be run 208 to identify blind spots in the security system model. A blind-spot is an area of low or no coverage when all of the selected sensors are on-line and operating according to the specifications. The security system model may then be updated by selection additional sensors, changing sensors or adjusting sensor sensitivity where such adjustments are within the selected sensor specifications. The pre-screen program utilizes the security element specifications from the database and the defined security area parameters and materials to calculate coverage for each security element. A blind spot may exist were a wall of a given material obscures the range of a particular selected security element. In some cases, security elements are simply placed too far apart such that the specified ranges do not overlap.
  • One or more breach scenarios are selected 210. A breach scenario is any potential risk to the security area. A breach may be a physical breach by one or more intruders. An intruder may be on foot or in a vehicle, which may be ground, water or flight. The breach scenario should be a realistic scenario. For example, using a human running on foot at an unrealistic speed may not be a valid test of the security system model. Furthermore, while any realistic scenario may be selected, one might not expect a civilian single family residence security area to be breached by an armored vehicle even if such a vehicle is available in the database for other models. As will be discussed later, the breach scenario may be developed by test personnel during testing, and the breach scenario may be developed by a collaborative effort of experts in the various sensor technology selected for the security area model. Breach scenarios as used herein includes the pre-screen program. Thus, running a pre-screen program is a type of breach scenario.
  • Other parameters may be used in either the breach scenario and/or in the security system model to promote realism in the testing. These parameters may be various environmental conditions internal to the structures and/or of the outside conditions of the security area. These conditions may be any number of conditions to promote realism. Without limitation, such conditions may be temperature, wind, precipitation, fog, vibration, high water, ice, vibration (natural or machine) or any other realistic condition useful in determining the effectiveness of the system or in the training of personnel in the use of a security system.
  • In one embodiment at least a portion of a breach scenario may be computer-generated based in part on the selection of security elements. In one aspect of the method the breach scenario may be selected using a tool box associated with the database including people, soldiers, vehicles and any object that may be moved within the facility to create a security threat.
  • Countermeasures are developed or selected 212 from a database either in anticipation of possible breach scenarios or after breach scenarios are selected 210. Countermeasures may include personnel response, alarms, and/or alerts to outside entities (e.g., fire, police, or security staff etc).
  • In one embodiment at least a portion of the countermeasures are computer generated and provided to the designer in the form of a computer output. The out may include mandatory procedures where certain breaches require certain response. The output may provide suggested countermeasures where selected scenarios have been successfully countered in past models or in past real-world cases. These countermeasures, mandatory and suggested, may be stored in a countermeasure database for ready access when desired. The database of countermeasures may be implemented as a tool box for easy selection. Newly developed countermeasures and procedures for specified breach scenarios may be added to the database and tool box for future modeling projects.
  • The breach scenarios are executed 214 either before or after the selection of countermeasures 212. The breach scenarios may be executed 214 without previously running the pre-screen program, because the result of running the breach scenario will include a determination of blind spots. A result of executing the breach scenario may be in the form a computer output to the designer. The output may point out weaknesses in the sensor selection, the architecture of the security system or even of the security area itself. The designer may use the output to determine if the overall security system design and implementation plan will meet customer requirements and/or goals. If not, then a change in the selection of security elements, or element parameters may be made and the method can be executed again to optimize the security system model. This optimization may be implemented as an iterative process.
  • The output may be used in effecting a design change to the security area structure, facilities or perimeter system when the method is being implemented in the design and construction phase of an installation. If this is the case, then the security area model 202 may be updated prior to implementing the design change and the method executed again to test the design change and updated security system.
  • FIG. 3 is another aspect of the present invention wherein the security system modeling and testing is performed by one or more users in the form of a computer role-playing game. The implementation is shown as a flow 300. A security area modeling flow 302 is substantially similar to that described above and shown in FIG. 2. A flow may also be generated 304 for an actual or existing building/facility having a security system and command and control center. Outputs from the security area flow 302 and/or from the building/facility flow 304 are provided to a computer 306 implementing a program flow for a computer challenge 308.
  • A model of the security area is generated 302. Buildings and structures are modeled 310 using a tool box for depicting such elements. A facilities and grounds model is generated 312 using a tool box for depicting fences, roads, sidewalks, trees, landscaping, underground pipes and sewers, topography, water features and anything else desired for representing the grounds around buildings. Security elements are generated 314 using a tool box that includes actual sensor specifications. As described above, any known or developed sensor may be selected such as ultra wide-band (UWB), closed-circuit TV (CCTV), microwave sensors, laser sensors, contact switches for doors gates and windows, infrared sensors, motion sensors, heat and smoke detectors, pressure sensors, accelerometers and vibration sensors. The modeling of the security area flow may then be provided to the command and control flow 304.
  • Actual building integration is developed in the command and control flow 302. A structure and surrounding environs with security elements placed in probable desired locations is modeled 318 as described above in FIG. 2 for defining the security system.
  • A model of a command and control (C&C) center information and displays is generated 316 using a tool box including the various components, interface requirements and parameters. The C&C model is based on the prior selection of sensors and their placement in the facility from the model 318.
  • Intruder forces are modeled 324 using a tool box including people, soldiers, vehicles and any object that may be moved within the facility to create a security threat.
  • The C&C models and the Breach models are then used on a computer with one or more users in a role-playing style game for determining whether an intruder can breach or otherwise defeat the security system modeled.
  • Facility Defender 320—This Player sees the command & control center, alarms and viewers. The Defender must respond to any and all alarms with designated counter measures (Security Force.)
  • Facility Attacker 322—This Player attempts to enter the facility with any available asset from the breach model or may generate a breach scenario in real-time.
  • In one aspect the Facility Defender may use a computer-generated Attacker. A computer-generated attacker is an algorithm utilizing the security breach models to present a security threat to the facility. The program is implemented as an iterative process to test each aspect of the security system. In one aspect, simultaneous breach scenarios may be executed to determine whether the security system model can respond adequately to simultaneous attacks.
  • In one aspect, the Facility Defender may be a collaboration of several people. Likewise, the Facility Attacker may be a collaboration of several people. In one aspect, the test game is remotely implemented among players utilizing two or more computers linked using a local-area network (LAN), wide-area network (WAN), an intranet or the Internet. In some cases where complex security systems and facilities are being tested, various experts may join from remote locations. This may be the case when designing and/or testing military installations. These personnel may be expert in security systems or in the security elements used in the system, and therefore join on the side of the Facility Defender. Likewise, these personnel may be expert in military or assault tactics, and therefore join in on the side of the Facility Attacker.
  • In one embodiment, a method of training personnel using a computer modeled security system includes selecting a breach scenario for the modeled security system and responding to the breach scenario using a computer. The method can be implemented using either the flow described above and shown in FIG. 2 or using the role-playing game flow described above and shown in FIG. 3. This training method is a simulator method somewhat like the use of flight simulators for pilot training and proficiency tests. The simulator may be a separate facility using a model of an actual security system, or the simulator may be run on an actual security system having a command and control center with a computer programmed with various breach scenarios.
  • Personnel may be trained or proficiency tests may be performed using the method according to the invention. A security system and the security area are modeled according to the flow of FIG. 2. This portion of the method, or simulator, may be preprogrammed and stored on a facility security system computer that may be part of the facility command and control center or a separate computer. Breach scenarios may be preprogrammed and selected or they may be entered during the simulation. Personnel being trained respond to the breach scenario using countermeasures and/or procedures that would normally be made available in a real breach event. The countermeasures may be entered by the trainee during the simulation or may be selected from the simulator. The simulator then judges the trainee response and provides an output relating to the effectiveness of the response. The simulator may also be programmed to counter the trainee response with one or more additional breach scenarios.
  • The foregoing description is directed to particular embodiments of the present invention for the purpose of illustration and explanation. It will be apparent, however, to one skilled in the art that many modifications and changes to the embodiment set forth above are possible without departing from the scope of the invention and the following claims.

Claims (4)

1. A method of training personnel in the use of a security system, comprising:
a) selecting a breach scenario for the security system; and
b) responding to the breach scenario using a computer.
2. The method of claim 21 further comprising selecting one or more parameters to promote realism for the training.
3. The method of claim 21, wherein the training is implemented on a computer of an actual security system.
4. The method of claim 21, wherein the training is implemented on a computer having programmed thereon a model of the security system.
US11/932,827 2005-02-24 2007-10-31 Method for Modeling and Testing a Security System Abandoned US20080059130A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US11/932,827 US20080059130A1 (en) 2005-02-24 2007-10-31 Method for Modeling and Testing a Security System

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US65642805P 2005-02-24 2005-02-24
US11/112,437 US7308394B2 (en) 2005-02-24 2005-04-22 Method for modeling and testing a security system
US11/932,827 US20080059130A1 (en) 2005-02-24 2007-10-31 Method for Modeling and Testing a Security System

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US11/112,437 Division US7308394B2 (en) 2005-02-24 2005-04-22 Method for modeling and testing a security system

Publications (1)

Publication Number Publication Date
US20080059130A1 true US20080059130A1 (en) 2008-03-06

Family

ID=36913894

Family Applications (2)

Application Number Title Priority Date Filing Date
US11/112,437 Expired - Fee Related US7308394B2 (en) 2005-02-24 2005-04-22 Method for modeling and testing a security system
US11/932,827 Abandoned US20080059130A1 (en) 2005-02-24 2007-10-31 Method for Modeling and Testing a Security System

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US11/112,437 Expired - Fee Related US7308394B2 (en) 2005-02-24 2005-04-22 Method for modeling and testing a security system

Country Status (5)

Country Link
US (2) US7308394B2 (en)
EP (1) EP1866811A2 (en)
JP (1) JP2008536199A (en)
CA (1) CA2599130A1 (en)
WO (1) WO2006091726A2 (en)

Families Citing this family (27)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20040035572A (en) * 2002-10-22 2004-04-29 최운호 Integrated Emergency Response System in Information Infrastructure and Operating Method therefor
US7415385B2 (en) * 2006-11-29 2008-08-19 Mitsubishi Electric Research Laboratories, Inc. System and method for measuring performances of surveillance systems
US8099711B2 (en) 2008-01-08 2012-01-17 International Business Machines Corporation System and method for multi-level security filtering of model representations
US9111237B2 (en) * 2008-12-01 2015-08-18 International Business Machines Corporation Evaluating an effectiveness of a monitoring system
US20100146395A1 (en) * 2008-12-08 2010-06-10 Gustavo De Los Reyes Method and System for Exploiting Interactions Via A Virtual Environment
US7861434B2 (en) * 2009-03-13 2011-01-04 Knudsen N Eric Post sleeve positioning apparatus and method
FR2946440B1 (en) * 2009-06-05 2012-01-13 Thales Sa DEVICE FOR SIMULATION OF AN ENVIRONMENT OF A SYSTEM OF SUPERVISION OF AN INFRASTRUCTURE
WO2011061767A1 (en) * 2009-11-18 2011-05-26 Elsag Datamat Spa Smart security-supervision system
CA2906170C (en) * 2013-03-15 2021-05-04 Adt Us Holdings, Inc. Security system using visual floor plan
US9898921B2 (en) 2013-03-15 2018-02-20 Adt Us Holdings, Inc. Security system installation
HUP1300328A3 (en) * 2013-05-23 2017-03-28 Mta Szamitastechnika Es Automatizalasi Ki Method and system for integrated three dimensional modelling
US10007792B1 (en) * 2013-11-27 2018-06-26 Amazon Technologies, Inc. Modeling a network security environment as a game
US10756830B2 (en) 2015-03-24 2020-08-25 Carrier Corporation System and method for determining RF sensor performance relative to a floor plan
US11036897B2 (en) 2015-03-24 2021-06-15 Carrier Corporation Floor plan based planning of building systems
EP3274934A1 (en) 2015-03-24 2018-01-31 Carrier Corporation Floor plan coverage based auto pairing and parameter setting
EP3275253A1 (en) 2015-03-24 2018-01-31 Carrier Corporation Floor-plan based learning and registration of distributed devices
WO2016154311A1 (en) 2015-03-24 2016-09-29 Carrier Corporation Systems and methods for providing a graphical user interface indicating intruder threat levels for a building
WO2016154306A1 (en) 2015-03-24 2016-09-29 Carrier Corporation System and method for capturing and analyzing multidimensional building information
EP3274932A1 (en) 2015-03-24 2018-01-31 Carrier Corporation Integrated system for sales, installation, and maintenance of building systems
US10230326B2 (en) 2015-03-24 2019-03-12 Carrier Corporation System and method for energy harvesting system planning and performance
US9473522B1 (en) * 2015-04-20 2016-10-18 SafeBreach Ltd. System and method for securing a computer system against malicious actions by utilizing virtualized elements
US9710653B2 (en) 2015-04-20 2017-07-18 SafeBreach Ltd. System and method for verifying malicious actions by utilizing virtualized elements
WO2017156150A1 (en) 2016-03-11 2017-09-14 Knudsen N Eric Post sleeve positioning apparatus and related methods
US10581802B2 (en) 2017-03-16 2020-03-03 Keysight Technologies Singapore (Sales) Pte. Ltd. Methods, systems, and computer readable media for advertising network security capabilities
US11042947B1 (en) 2019-03-19 2021-06-22 Gwen C. Banas System for matching and assembling a water leak detection system
RU2719506C1 (en) * 2019-09-16 2020-04-20 Акционерное общество "Федеральный научно-производственный центр "Производственное объединение "Старт" им. М.В. Проценко" (АО "ФНПЦ ПО "Старт" им. М.В. Проценко") Method of assessing the level of protection of a protected area against intruder threats
US11533329B2 (en) 2019-09-27 2022-12-20 Keysight Technologies, Inc. Methods, systems and computer readable media for threat simulation and threat mitigation recommendations

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4568288A (en) * 1983-09-27 1986-02-04 The Singer Company System and a method to visually simulate subsystems in a fossil fuel power plant simulator
US4613952A (en) * 1983-07-11 1986-09-23 Foster Wheeler Energy Corporation Simulator for an industrial plant
US4962473A (en) * 1988-12-09 1990-10-09 Itt Corporation Emergency action systems including console and security monitoring apparatus
US5017141A (en) * 1985-05-13 1991-05-21 Relf Richard S Computing system
US5213503A (en) * 1991-11-05 1993-05-25 The United States Of America As Represented By The Secretary Of The Navy Team trainer
US5977872A (en) * 1997-01-09 1999-11-02 Guertin; Thomas George Building emergency simulator
US6052524A (en) * 1998-05-14 2000-04-18 Software Development Systems, Inc. System and method for simulation of integrated hardware and software components
US7158022B2 (en) * 2004-10-29 2007-01-02 Fallon Kenneth T Automated diagnoses and prediction in a physical security surveillance system

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH07334779A (en) * 1994-06-10 1995-12-22 Nippon Denshi Kogaku Kk Method and device for guard diagnosis for machine guard system
JPH09297524A (en) * 1996-05-01 1997-11-18 Fujitsu Ltd Training stimulation device of facility controlling system

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4613952A (en) * 1983-07-11 1986-09-23 Foster Wheeler Energy Corporation Simulator for an industrial plant
US4568288A (en) * 1983-09-27 1986-02-04 The Singer Company System and a method to visually simulate subsystems in a fossil fuel power plant simulator
US5017141A (en) * 1985-05-13 1991-05-21 Relf Richard S Computing system
US4962473A (en) * 1988-12-09 1990-10-09 Itt Corporation Emergency action systems including console and security monitoring apparatus
US5213503A (en) * 1991-11-05 1993-05-25 The United States Of America As Represented By The Secretary Of The Navy Team trainer
US5977872A (en) * 1997-01-09 1999-11-02 Guertin; Thomas George Building emergency simulator
US6052524A (en) * 1998-05-14 2000-04-18 Software Development Systems, Inc. System and method for simulation of integrated hardware and software components
US7158022B2 (en) * 2004-10-29 2007-01-02 Fallon Kenneth T Automated diagnoses and prediction in a physical security surveillance system

Also Published As

Publication number Publication date
WO2006091726A3 (en) 2009-04-16
WO2006091726A2 (en) 2006-08-31
EP1866811A2 (en) 2007-12-19
US7308394B2 (en) 2007-12-11
WO2006091726A8 (en) 2006-11-23
JP2008536199A (en) 2008-09-04
CA2599130A1 (en) 2006-08-31
US20060190228A1 (en) 2006-08-24

Similar Documents

Publication Publication Date Title
US7308394B2 (en) Method for modeling and testing a security system
US20110173146A1 (en) Complexity systems management method
US9619589B2 (en) Method of determining optical sensor coverage
Ba et al. Multi-hazard disaster scenario method and emergency management for urban resilience by integrating experiment–simulation–field data
Zhanjun et al. Multiscale analysis of the influence of street built environment on crime occurrence using street-view images
WO2019059816A1 (en) Method of automated design and analysis of security systems
Bowen et al. Evaluation of physical protection systems using an integrated platform for analysis and design
Barnard Intrusion detection systems
Perdikaris Physical security and environmental protection
Chipley et al. Primer to Design Safe School Projects in Case of Terrorist Attacks and School Shootings. Buildings and Infrastructure Protection Series. FEMA-428/BIPS-07/January 2012. Edition 2.
Masek et al. Critical infrastructure protection risk modelling with games technology
Li Intelligent Science Empowers: Building Fire Protection Technology Development
EA043326B1 (en) METHOD FOR AUTOMATED DESIGN AND ANALYSIS OF PHYSICAL PROTECTION SYSTEMS AND SECURITY SYSTEMS IN GENERAL
Little et al. Protection from extreme events: using a socio-technological approach to evaluate policy options
Raybourn et al. Applying Model-Based Situational Awareness and Augmented Reality to Next-Generation Physical Security Systems
Chornoboy Determining the effectiveness of nuclear security through computer simulation
Ilya et al. Planning and Quality Evaluation of Physical Protection Systems Using Simulation Modeling
Echeta et al. PPS Evaluation of An Oil Refinery Using EASI Model
US20220398353A1 (en) Artificial Intelligence Security System Design
Koch et al. A simple evacuation modeling and simulation tool for first responders
Park et al. Agent-based behavioral model and simulation of fire egress
Maki Considerations in outdoor intrusion sensor testing
Leach et al. Conducting a Nuclear Security Assessment
Bartel et al. Metrics for Assessing Underwater Demonstrations for Detection and Classification of Unexploded Ordnance (Presentation)
Holm et al. A platform for simulation of crises in urban environments

Legal Events

Date Code Title Description
AS Assignment

Owner name: ULTRAVISION SECURITY SYSTEMS, INC., NEW HAMPSHIRE

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:JOHNSON, DENNIS J.;REEL/FRAME:020053/0138

Effective date: 20050531

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION