Methods and systems for threat engagement management
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
G06F-017/10
F41G-007/20
F41G-009/00
G06F-017/00
F41G-007/00
출원번호
US-0340495
(2008-12-19)
등록번호
US-8563908
(2013-10-22)
발명자
/ 주소
Lew, Carissa E.
Chan, Moses W.
Monney, Paul-Andre
Romberg, Paul M.
Laux, Leo J.
출원인 / 주소
Lockheed Martin Corporation
대리인 / 주소
McDermott Will & Emery LLP
인용정보
피인용 횟수 :
1인용 특허 :
13
초록▼
Sensor(s) may be used to detect threat data. A processing system and/or a method may be used to fuse the detected threat data over time. Threat data may comprise information on a munition, missile, rocket, or nuclear/biological/chemical (NBC) projectile or delivery system. Detected threat data may b
Sensor(s) may be used to detect threat data. A processing system and/or a method may be used to fuse the detected threat data over time. Threat data may comprise information on a munition, missile, rocket, or nuclear/biological/chemical (NBC) projectile or delivery system. Detected threat data may be processed to create a target track-lethality list comprising the locations of any target(s) and a ranking of their lethality in comparison to decoys or chaff. The target track-lethality list may be used to create a target engagement-track list that matches available threat elimination resources (e.g. interceptors) to targets with a weapon-to-target assignment module.
대표청구항▼
1. A method for target engagement management, comprising: acquiring, via a processor-based system, threat data at different points in time from an area of interest with multiple sensors;correlating the threat data from the multiple sensors;aggregating the correlated threat data based on at least two
1. A method for target engagement management, comprising: acquiring, via a processor-based system, threat data at different points in time from an area of interest with multiple sensors;correlating the threat data from the multiple sensors;aggregating the correlated threat data based on at least two data points of the correlated threat data acquired at different points in time;creating a target track-lethality list from the aggregated threat data; andcreating a target engagement track list based at least in part on the target track-lethality list. 2. The method of claim 1, further comprising: providing the target engagement track list to a weapon-to-target assignment module;comparing the target engagement track list to assignable threat management resources, the threat management resources referencing at least one interceptor; andassigning an interceptor to engage at least one target on the target engagement track list. 3. The method of claim 2, further comprising: monitoring the interceptor's health and status; anddispensing the interceptor to engage the at least one target. 4. The method of claim 1, wherein the aggregating the correlated threat data comprises processing the correlated threat data with at least one of a feature fusion module and a lethality fusion module. 5. The method of claim 1, wherein the correlated threat data comprises at least one of a correlated threat object map, and a correlated set of feature data. 6. The method of claim 1, wherein the aggregating the correlated threat data comprises processing the correlated threat data with at least one of the following: a matrix multiplication technique, a least squares technique, and a regression technique. 7. The method of claim 1, further comprising: extracting feature data from the threat data. 8. A non-transitory machine-readable medium encoded with instructions for target engagement management, the instructions executable by one or more processors to facilitate performing a method, the method comprising: acquiring threat data at different points in time from an area of interest with multiple sensors;correlating the threat data from the multiple sensors;aggregating the correlated threat data based on at least two data points of the correlated threat data obtained at different points in time;creating a target track-lethality list from the aggregated threat data; andcreating a target engagement track list based at least in part on the target track-lethality list. 9. The non-transitory machine-readable medium of claim 8, wherein the method further comprises: providing the target engagement track list to a weapon-to-target assignment module;comparing the target engagement track list to assignable threat management resources, the threat management resources referencing at least one interceptor; andassigning an interceptor to engage at least one target on the target engagement track list. 10. The non-transitory machine-readable medium of claim 9, wherein the method further comprises: monitoring the interceptor's health and status; anddispensing the interceptor to engage the at least one target. 11. The non-transitory machine-readable medium of claim 8, wherein the aggregating the correlated threat data comprises processing the correlated threat data with at least one of a feature fusion module and a lethality fusion module. 12. The non-transitory machine-readable medium of claim 8, wherein the correlated threat data comprises at least one of a correlated threat object map, and a correlated set of feature data. 13. The non-transitory machine-readable medium of claim 8, wherein the aggregating the correlated threat data comprises code for processing the correlated threat data with at least one of the following: a matrix multiplication technique, a least squares technique, and a regression technique. 14. The non-transitory machine-readable medium of claim 8, wherein the method further comprises extracting feature data from the threat data. 15. A processing system for target engagement management, comprising: a threat data acquisition module configured to acquire threat data at different points in time from an area of interest with multiple sensors;a correlator configured to correlate the threat data from the multiple sensors;an aggregation module configured to aggregate the correlated threat data based on at least two data points of the correlated threat data obtained at different points in time; anda controller configured to create a target track-lethality list from the aggregated threat data, and to create a target engagement track list based at least in part on the target track-lethality list. 16. The processing system of claim 15, further comprising: a weapon-to-target assignment module configured to receive the target engagement track list, to compare the target engagement track list to assignable threat management resources, the threat management resources referencing at least one interceptor; and to assign an interceptor to engage at least one target on the target engagement track list. 17. The processing system of claim 16, wherein the weapon-to-target assignment module is configured to monitor the interceptor's health and status, and to dispense the interceptor to engage the at least one target. 18. The processing system of claim 15, wherein the aggregation module comprises at least one of a feature fusion module and a lethality fusion module. 19. The processing system of claim 15, wherein the correlated threat data comprises at least one of a correlated threat object map, and a correlated set of feature data. 20. The processing system of claim 15, wherein the aggregation module is configured to process the correlated threat data with at least one of the following: a matrix multiplication technique, a least squares technique, and a regression technique. 21. The processing system of claim 15, wherein the controller is configured to extract feature data from the threat data. 22. A computer system for target engagement management comprising: a processing system, the processor system comprising: a threat data acquisition module configured to acquire threat data at different points in time from an area of interest with multiple sensors;a correlator configured to correlate the threat data from the multiple sensors;an aggregation module configured to aggregate the correlated threat data based on at least two data points of the correlated threat data obtained at different points in time; anda controller configured to create a target track-lethality list from the aggregated threat data, and to create a target engagement track list based at least in part on the target track-lethality list;a display;a keyboard;an interface;a bus; anda machine-readable medium.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (13)
Schnatterly, Susan Elizabeth; Lord, Spencer Allen; Martorana, Joseph; Canfield, Henry William; Hunter, John Bockett; Chevere, Joseph John; Shlyakhter, Yuriy; Potts, Joseph Kevin; Petrosky, Matthew Wi, Command and control system architecture for convenient upgrading.
Robertson David B. (North Kingstown RI) Perruzzi Joseph J. (Tiverton RI) Rabenold Laura C. (Bristol RI), Method and apparatus for avoiding detection by a threat projectile.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.