System and method for asymmetric missile defense
First Claim
1. A method of responding to a threat object, the method comprising:
- a method for selecting a response tool comprising;
detecting with a sensor a phase and an identification of a threat object based on a detected portion of the threat object and/or a second object operatively connectable with the portion of the threat object;
determining a model of a lifecycle of the threat object based on the detected portion and/or the second object;
searching for a first set of vulnerabilities of the modeled lifecycle;
choosing a first response tool to impair the performance of the threat object and the detected portion of the threat object and/or the second object; and
storing the identification of the threat object, the model of the lifecycle, and the first response tool;
a method for iteratively selecting a response tool during a first phase comprising;
performing the method for selecting the response tool; and
updating the identification of the threat object, the modeled lifecycle, the first set of vulnerabilities, and the first response tool based on the modeled lifecycle, vulnerabilities, the first response tool, and the first phase; and
a method for iteratively selecting a response tool during a second phase comprising;
detecting with the sensor a second phase;
performing the method for selecting the response tool; and
updating the identification of the threat object, the modeled lifecycle, the first set of vulnerabilities, and the first response tool based on the modeled lifecycle, vulnerabilities, the first response tool, and the second phase; and
implementing the first response tool against the threat object and/or the second object.
1 Assignment
0 Petitions
Accused Products
Abstract
A method for accurately determining whether a response tool will be effective for responding to a given enemy threat object. Embodiments described herein provide a method and system for responding to a threat object, for example, negating missile threats. Embodiments may include validating effectiveness of a response to the threat object. Other embodiments may include verifying the continued effectiveness of a response to the threat object. Further embodiments may include providing feedback to re-perform the method for responding to the threat object. The system may include a mathematical method, and associated algorithms, to assess, in an automated fashion, the performance of non-kinetic techniques with respect to negating the threat object.
3 Citations
20 Claims
-
1. A method of responding to a threat object, the method comprising:
-
a method for selecting a response tool comprising; detecting with a sensor a phase and an identification of a threat object based on a detected portion of the threat object and/or a second object operatively connectable with the portion of the threat object; determining a model of a lifecycle of the threat object based on the detected portion and/or the second object; searching for a first set of vulnerabilities of the modeled lifecycle; choosing a first response tool to impair the performance of the threat object and the detected portion of the threat object and/or the second object; and storing the identification of the threat object, the model of the lifecycle, and the first response tool; a method for iteratively selecting a response tool during a first phase comprising; performing the method for selecting the response tool; and updating the identification of the threat object, the modeled lifecycle, the first set of vulnerabilities, and the first response tool based on the modeled lifecycle, vulnerabilities, the first response tool, and the first phase; and a method for iteratively selecting a response tool during a second phase comprising; detecting with the sensor a second phase; performing the method for selecting the response tool; and updating the identification of the threat object, the modeled lifecycle, the first set of vulnerabilities, and the first response tool based on the modeled lifecycle, vulnerabilities, the first response tool, and the second phase; and implementing the first response tool against the threat object and/or the second object. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A system for responding to a threat object, the system comprising:
-
a selector module for selecting a response tool, comprising; a detection module with a sensor for detecting a phase and an identification of a threat object based on a detected portion of the threat object and/or a second object operatively connectable with the portion of the threat object; a determination module for determining a model of a lifecycle of the threat object based on the detected portion and/or the second object; a search module for searching a first set of vulnerabilities of the modeled lifecycle; a choice module for choosing a first response tool to impair the performance of the threat object and the detected portion of the threat object and/or the second object; and a storage module for storing the identification of the threat object, the model of the lifecycle, and the first response tool; an iterative selection module for iteratively selecting a response tool during a first phase comprising; a feedback loop for communication with the selector module for selecting the response tool; and an update module for updating in the storage module the identification of the threat object, the modeled lifecycle, the first set of vulnerabilities, and the first response tool based on the modeled lifecycle, vulnerabilities, the first response tool, and the first phase; and an iterative selection module for iteratively selecting a response tool during a second phase comprising; a detection module for detecting with the sensor a second phase; a feedback loop for communication with the selector module for selecting the response tool; and an update module for updating in the storage module the identification of the threat object, the modeled lifecycle, the first set of vulnerabilities, and the first response tool based on the modeled lifecycle, vulnerabilities, the first response tool, and the second phase; and an implementation module for implementing the first response tool against the threat object and/or the second object.
-
Specification