METHOD AND A SYSTEM FOR PLANNING A SECURITY ARRAY OF SENSOR UNITS
First Claim
1. A computerized method for providing a user with at least one scenario in a modeled theater, said method comprising the steps of:
- a) selecting a plurality of threat-sites in said modeled theater, wherein said threat-site comprises at least one of the following;
at least one threat-area, and at least one threat object;
b) selecting at least one allowed-site in said modeled theater, wherein said allowed-site is at least one of the following;
at least one allowed-area, and at least one allowed-object;
c) providing at least one constraint parameter; and
d) determining said at least one security scenario, the security scenario pertaining to at least one of the following;
the position of at least one sensor in the at least one allowed-site;
wherein the determining said at least one scenario is accomplished based on computational analysis of at least one of the following data;
geographical information data, gathered data, and user input data; and
wherein said computational analysis includes the testing of the effect of said at least one constraint parameter on the monitoring capabilities of said at least one threat-site by said at least one sensor.
1 Assignment
0 Petitions
Accused Products
Abstract
The present invention discloses a computerized method for providing a user with at least one scenario in a modeled theater. The computerized method may include the following steps: a) selecting a plurality of threat-sites in the modeled theater, wherein the threat-site comprises at least one of the following: at least one threat-area, and at least one threat object; b) selecting at least one allowed-site in the modeled theater, wherein the allowed-site is at least one of the following: at least one allowed-area, and at least one allowed-object; c) providing at least one constraint parameter; and d) determining the at least one security scenario. The security scenario may pertain to at least one of the following: the position of at least one sensor in the at least one allowed-site. Determining of the at least one scenario may be accomplished according to computational analysis of at least one of the following: geographical information data, gathered data, and user input data. The computational analysis may include the testing of the effect of the at least one constraint parameter on the monitoring capabilities of the at least one threat-site by the at least one sensor.
60 Citations
31 Claims
-
1. A computerized method for providing a user with at least one scenario in a modeled theater, said method comprising the steps of:
-
a) selecting a plurality of threat-sites in said modeled theater, wherein said threat-site comprises at least one of the following;
at least one threat-area, and at least one threat object;b) selecting at least one allowed-site in said modeled theater, wherein said allowed-site is at least one of the following;
at least one allowed-area, and at least one allowed-object;c) providing at least one constraint parameter; and d) determining said at least one security scenario, the security scenario pertaining to at least one of the following;
the position of at least one sensor in the at least one allowed-site;wherein the determining said at least one scenario is accomplished based on computational analysis of at least one of the following data;
geographical information data, gathered data, and user input data; andwherein said computational analysis includes the testing of the effect of said at least one constraint parameter on the monitoring capabilities of said at least one threat-site by said at least one sensor. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A computer-aided security design system that enables providing a user with at least one scenario in a modeled theater, said system comprising:
-
a computing module able to select a plurality of threat-sites in said modeled theater, wherein said threat-site comprises at least one of the following;
at least one threat-area, and at least one threat object;said computing module able to select at least one allowed-site in said modeled theater, wherein said allowed-site is at least one of the following;
at least one allowed-area, and at least one allowed-object;said computing module able to provide at least one constraint parameter; and said computing module able to determine said at least one security scenario, the security scenario pertaining to at least one of the following;
the position of at least one sensor in the at least one allowed-site;wherein the said computing module determines said at least one scenario according to computational analysis of at least one of the following;
geographical information data, gathered data, and user input data;wherein said computational analysis includes the testing of the effect of said at least one constraint parameter on the monitoring capabilities of said at least one threat-site by said at least one sensor. - View Dependent Claims (17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30)
-
-
31. A system comprising a machine-readable medium embodying therein a computer program enabling the execution of a method by said system, the method comprising the following steps:
-
a) selecting a plurality of threat-sites in said modeled theater, wherein said threat-site comprises at least one of the following;
at least one threat-area, and at least one threat-object;b) selecting at least one allowed-site in said modeled theater, wherein said allowed-site is at least one of the following;
at least one allowed-area, and at least one allowed-object;c) providing at least one constraint parameter; and d) determining said at least one security scenario, the security scenario pertaining to at least one of the following;
the position of at least one sensor in the at least one allowed-site;wherein said determining of said at least one scenario is accomplished according to computational analysis of at least one of the following;
geographical information data, gathered data, and user input data; andwherein said computational analysis includes the testing of the effect of said at least one constraint parameter on the monitoring capabilities of said at least one threat-site by said at least one sensor.
-
Specification