Method for modeling and testing a security system
First Claim
Patent Images
1. A method of designing and testing a security system using computer modeling, comprising:
- selecting one or more security elements of a security system for a security area;
modeling the security system for the security area using the selected security elements placed at selected locations in the security area;
selecting a breach scenario;
executing the breach scenario to test the efficacy of the modeled security system; and
updating the modeled security system based on results of executing the breach scenario, thereby designing the security system prior to implementing the modeled security system at the security area.
1 Assignment
0 Petitions
Accused Products
Abstract
A method of designing, modeling and testing a security system for protecting a defined security area. The method includes modeling the security area, modeling the security system for the security area, and testing the security system using a computer to run various breach scenarios to determine weaknesses in the security system. The testing may be in the form of a computer game with one or more players implementing the models and scenarios or in real-time.
14 Citations
19 Claims
-
1. A method of designing and testing a security system using computer modeling, comprising:
-
selecting one or more security elements of a security system for a security area; modeling the security system for the security area using the selected security elements placed at selected locations in the security area; selecting a breach scenario; executing the breach scenario to test the efficacy of the modeled security system; and updating the modeled security system based on results of executing the breach scenario, thereby designing the security system prior to implementing the modeled security system at the security area. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A computer-readable medium with instructions recorded thereon for modeling and testing a security system using a computer, the instructions comprising:
-
selecting one or more security elements of a security system for a security area; modeling the security area using the selected security elements placed at selected locations in locations in the security area; selecting a breach scenario; and executing the breach scenario to test efficacy of the modeled security area; updating the modeled security area based on results of executing the breach scenario prior to implementing the modeled security system at the security area; and recording the updated modeled security system in a storage medium.
-
Specification