Background:
Technology is often employed to detect whether suspects (individuals, vehicles, or mobile objects) are or may be a hostile threat to a target, such as one or more people, structures, vehicles, etc. Current technology used to detect a suspect typically requires that the suspect is within a proximity to the suspect's intended target. Examples of such technologies are metal detectors, powder scanners, etc.
Other hostile threat detection technology focuses on physical characteristics of a suspect to detect whether the suspect is a hostile threat. For example, technology may target a suspect's voice patterns or facial movement to determine whether the suspect is a hostile threat. Technologies such as lie detectors are examples of such technologies but they too need the suspect to be in a proximity of the machine.
Summary:
The present invention facilitates the determination of whether a suspect is a hostile threat to a target by analyzing the suspect's movement pattern.
In this invention, a method comprising the steps of identifying a suspect, wherein the suspect is a mobile object or individual located in a target zone around a target; determining that the suspect has moved a first distance in the target zone during a first time period; determining a suspect-target distance, wherein the suspect-target distance is the shortest distance between the suspect and the target; determining a suspect-potential destination distance, wherein the suspect-potential destination distance is the shortest distance between the suspect and a potential destination in the target zone for the suspect; determining that the suspect has moved a second distance in the target zone during a second time period; determining a suspect zone around the suspect, wherein the suspect zone comprises a suspect zone entry point indicating the point at which the suspect entered the suspect zone; determining a movement characteristic index such as a movement inefficiency index associated with the suspect zone when the suspect has moved the second distance, wherein the movement inefficiency index is a ratio of the actual distance traveled by the suspect from the suspect zone entry point and the shortest distance between the suspect and the suspect zone entry point; and determining, by a computer, a probability of hostility of the suspect, wherein the probability of hostility is obtained from the movement characteristic index and a ratio of the suspect-target distance and the suspect-potential destination distance. Wherever there are multiple potential destinations for suspect in target zone, various suspect-potential destinations are taken in to consideration. The computer is able to define probability of hostility from maximum movement characteristic index and this could help in picking up proper suspect for interrogation.
Related Article:
Towards Deceptive Intention: Finding Trajectories and Its Analysis
Jiun-Yin Jian, Toshihiko Matsuka, Jeffrey V. Nickerson
First Published October 1, 2006 Review Article
https://doi.org/10.1177/154193120605000324
Article Information
Volume: 50 issue: 3, page(s): 324-328
Issue published: October 1, 2006
Jiun-Yin Jian1, Toshihiko Matsuka1, Jeffrey V. Nickerson1
1 Center for Decision Technologies Stevens Institute of Technology Hoboken, New Jersey
Full Patent: Detection Of Hostile Intent From Movement Patterns
FY07-035
Information Assurance/Cyber Security Sensing Devices / Technology
Jefferson Nickerson Toshihiko Matsuka
David Zimmerman Director of Technology Commercialization Stevens Institute of Technology dzimmer3@stevens.edu