专利摘要:
The invention relates to a threat management procedure for a ground-based vehicle, including the steps of: - providing (s410) at least two types of said threat management systems (250; 260), said threat management including establishing information regarding said threats and establishing measures for handling said threats. threats in dependence on said information; and - providing (s420) a control unit (200) for controlling the supply system (250; 260); - providing (s430) a separate hardware security configuration unit (210); and - supplying (s440) said separate hardware security configuration unit (210) by means of provided systems (250; 260) determined information relating to said threat to determine in an evaluation step whether said control unit (200) should be given the go-ahead to handle said threat or not. The invention also relates to a computer program product comprising program code (P) for a computer (200) for implementing a method according to the invention. The invention also relates to a device and a ground-going vehicle (100) equipped with the device. Figure 2 for publication
公开号:SE1350219A1
申请号:SE1350219
申请日:2013-02-25
公开日:2014-08-26
发明作者:Ronny Backström;Gösta Svensson
申请人:BAE Systems Hägglunds Aktiebolag;
IPC主号:
专利说明:

15 20 25 30 A collective name for hard-kill systems and soft-kill systems is action and antidote system. Various effects and antidote systems are known today.
Many such systems include so-called "Plug and-Play" functionality, whereby various subsystems with standardized interfaces can be installed in vehicles.
Systems including Plug and Play devices are fairly easy to build, operate and maintain.
In the military vehicle industry, for example, it is common to use so-called "Off the shelf" or "bolt on" products. These do not include standard interfaces for easy integration into on-board vehicle systems. These products can also be called "stand alone" products. These products are relatively expensive and are generally not competed to communicate with each other or other products in a vehicle-friendly system.
Today there is a fairly large demand for vehicles that are specially developed, i.e. where many stand alone products are included. This naturally creates problems regarding component integration in vehicles where different subsystems, sensor configurations, etc. are not of the Plug and Play type.
One of the difficulties in integrating stand-alone components is associated with safety-critical aspects. It is time-consuming and resource-intensive to develop software that must be certified as security-critical. installation of stand-alone products in dangerous systems in a vehicle may require extensive adaptation of software in a control unit.
US 7,049,998 discloses a ship protection system, which protection system is trained by integrating publicly available subsystems which can exhibit "plug and play" capabilities, US 2004/0061595 discloses a decision support system for ground combat vehicles.
SUMMARY OF THE INVENTION An object of the present invention is to provide a new and advantageous threat management method for a ground-based vehicle.
Another object of the invention is to provide a new and advantageous device and a new and advantageous computer program for threat management for a ground-based vehicle.
Another object of the invention is to provide a method, a device and a computer program for achieving a more robust threat management for a ground-based vehicle.
A further object of the invention is to provide a method, a device and a computer program for providing a safer ground-based vehicle.
Another object of the invention is to provide a method, a device and a computer program for providing a versatile ground-based vehicle that can handle various types of threat images.
Another object of the invention is to provide an alternative method, an alternative device and an alternative computer program for threat management for ground-based vehicles.
These objects are achieved by a ground handling method for a ground-based vehicle according to claim 1. According to one aspect of the invention, a ground-based vehicle handling method is provided, including the steps of: - providing at least two kinds of systems for said ground handling , wherein said threat management includes establishing information regarding said threat and establishing measures for managing said threat in dependence on said information; - providing a control unit for controlling provided systems; - provide a separate hardware security configuration unit; supplying said separate hardware security control unit by means of provided systems determined information concerning said threat in order to determine in an evaluation step whether said control unit is to be given the go-ahead to handle said threat or not.
This provides advantageous functionality and performance of sensors and actuators of said two types of systems for said threat handling, which sensors and actuators can be used to a greater extent in combination with important vehicle functions.
In this case, a safety-critical hardware safety control unit, functionality in which integration cost and delivery time of the vehicle as a result. encapsulated said entails reduced Advantageously, both a standardized process for integration of components and equipment of the said two different systems is provided as well as improved user-friendliness, availability and reliability.
Said control unit can be a so-called DAS controller. This enables an easy-to-use DAS system with integrated DAS functionality. Said control unit is arranged to control and monitor integrated DAS systems in the form of any of said at least two different systems. Said control unit can in this case incorporate DAS systems from a computer logic point of view, said control unit handling communication with, for example, information systems and control systems of the vehicle.
This effectively provides the opportunity to integrate so-called "Stand alone" sensors such as using other sensitive sensors in the vehicle handled by the control unit.
Said control unit can handle all computer logic interfaces to control hard-kill systems and soft-kill systems of the type "off the shelf" and / or "bolt on".
Said control unit is adapted to handle system start-up, different DAS modes and certain user interaction, but also sensor handling and data fusion processes regarding data from different sensors in the vehicle, where applicable.
Said hardware security configuration unit may be a so-called Control (CESC). The hardware safety control unit can provide interfaces for the said Enabling Safety Circuit. Integration of "off the shelf" products, where safety technology is incorporated in said hardware safety control unit and said integrated products. The inventive architecture also enables extended functionality through shared use of the control unit and the said respect and hardware safety control unit sensors controls of the integrated products.
In the method, a system can be a so-called hard-kill threat control system. In the method, a system can be a so-called soft-kill system for avoiding threats.
Said vehicle may be a combat vehicle, for example a tank. Said vehicle may be a suitable ground-going vehicle. Said vehicle may be an off-road vehicle or an auxiliary vehicle. The method may further comprise the step of: - by means of said control unit controlling provided systems for automatic handling of said threats and / or semi-automatic handling of said threats. In this case, a versatile functionality of said ground-going vehicle is provided where an operator can, by means of suitable means, select the operating mode of the vehicle, for example an automatic mode or a semi-automatic mode.
In this connection, it should be pointed out that certain steps in an automatic handling of said threat can be semi-automatic or manual. For example, the alignment of a barrel of the vehicle can be set for action against said threat, where the step of firing the projectile can be manual or semi-automatic. This provides a safe system, where an operator of the vehicle can make certain decisions, such as firing a weapon to handle said threats.
According to one aspect of the present invention, an appropriate number of different antidotes may be activated and used in sequence. For example, an antidote sequence may include the functions of glare, smoke screen, evasive maneuver and combat of incoming threats.
According to one aspect of the present invention, an appropriate number of different antidotes may be activated and used substantially simultaneously. For example, at least two of the antidote functions of glare, smoke shield, evasive maneuver and control of incoming threats can be performed simultaneously.
The method may further comprise the step of: - connecting both said hardware security configuration unit and said control unit to provided information transmission systems. In this case, advantageous redundancy is achieved according to the inventive procedure. In this case, said hardware security control unit can ensure that said control unit, for example in a case where a bug of software stored therein does not exist, does not perform operation of said hard-kill system or soft-kill system in an undesired manner. This provides a safe procedure for handling threats according to an aspect of the present invention. Information transfer from said hardware security configuration unit to said control unit may be unidirectional. In this case, said control unit can only read information from said hardware security configuration unit according to an embodiment of the invention. This ensures that the said and decisions of the said control unit can not affect the processes of the hardware security configuration unit. In this case, a safe procedure is provided according to an aspect of the invention.
Said control unit may be arranged to be supplied with information from one type of provided systems for controlling another type of provided systems. In this case, said control unit can have access to the necessary information for effectively controlling at least one hard-kill system and / or at least one soft-kill system of the vehicle.
The procedure is easy to implement in existing motor vehicles. Threat management software for a ground-based vehicle according to the invention can be installed in a control unit of the vehicle during its manufacture. A buyer of the vehicle can thus be given the opportunity to choose the function of the procedure as an option.
Alternatively, software including program code for performing the innovative threat management procedure for a ground-based vehicle may be installed in a control unit of the vehicle when upgrading at a service station. In this case, the software can be loaded into a memory in the control unit.
Software that includes threat management code for a ground-based vehicle can be easily updated or replaced. Furthermore, different parts of the software that include the program code for threat management for a ground-based vehicle can be replaced independently of each other. This modular configuration is advantageous from a maintenance perspective. According to one aspect of the invention, there is provided a threat management device for a ground-based vehicle, comprising: - at least two types of systems for said threat management; means adapted to establish information concerning said threat; bodies adapted to determine measures to deal with said threats in the light of said information; - a control unit for controlling provided systems; - a separate hardware security configuration unit; said means provided - means adapted to supply separate hardware security control unit by means of systems determined information concerning said threat; and - means adapted to determine whether or not said control unit is to be given the go-ahead to deal with said threat.
Said control unit may be a DAS controller. Said hardware security configuration unit may be a security rated hardware device. According to one embodiment, said hardware security configuration unit may comprise so-called CPLD code. Even when said hardware safety control unit includes CPLD code According to one aspect of the present invention, there is provided an architecture with a DAS controller and a Control Enabling Safety Circuit mechanism for integrating hard-kill systems and soft-kill systems of the off-shelf type. ”. Advantageously, a DAS architecture is provided with several levels of countermeasures where functionality of both hard-kill systems and soft-kill systems can be combined. In this case, the performance of the overall system can be advantageously improved.
A type of system can be a so-called hard-kill systems for combating threats, and wherein a type of system can be a so-called soft-kill system for avoiding threats. Said vehicle may be a combat vehicle, for example a tank.
Said control unit may be adapted to control provided systems for automatic and / or semi-automatic management of said threats.
The device may further comprise: - means adapted to connect both said hardware security configuration unit and said control unit to provided information transmission systems.
Said hardware security control unit may be adapted for unidirectional information transmission to said control unit.
Said control unit may be adapted to receive information from one type of provided system and to control another type of provided system on the basis of said received information.
The above objects are also achieved with a vehicle comprising a device according to any one of claims 8-14.
Said vehicle may be something of a tank, off-road vehicle or other military vehicle.
According to one aspect of the invention, there is provided a threat management computer program for a ground based vehicle, said computer program comprising program code stored on a computer readable medium to cause an electronic control unit to perform the steps of: - determining information regarding said threat; - establish measures for dealing with said threats in dependence on said information; control the provided systems for automatic and / or semi-automatic handling of said threats on the basis of a decision determined by a separate 10 15 20 25 30 10 hardware safety control unit whether to give a green light to handle said threat or not.
Said hardware security configuration unit may be a hardware unit without stored software. Said hardware security configuration unit may be a hardware unit which must be associated with a relatively high security rating. Said control unit may be a unit that does not have to be associated with a relatively high safety rating.
According to one aspect of the invention, there is provided a computer program for threat management for a ground-based vehicle, said computer program comprising program code for causing an electronic control unit to perform the steps of: - determining information concerning said threat; - establish measures for dealing with said threats in dependence on said information; control the provided systems for the automatic and / or semi-automatic handling of said threats on the basis of a decision determined by means of a separate hardware security control unit whether to give the go-ahead to handle said threats or not.
Said hardware security configuration unit may be a hardware unit without stored software. Said hardware security configuration unit may be a hardware unit which must be associated with a relatively high security rating. Said control unit may be a unit that does not have to be associated with a relatively high safety rating.
According to one aspect of the invention, there is provided a computer program product comprising a program code stored on a computer readable medium for performing the method steps of: - determining information regarding said threat; - establish measures for dealing with said threats in dependence on said information; Control the provided systems for automatic and / or semi-automatic handling of said threats on the basis of a decision determined by means of a separate hardware security control unit whether to give a green light to handle said threats or not, when said computer program is run on a electronic control unit.
Said hardware security configuration unit may be a hardware unit without stored software. Said hardware security configuration unit may be a hardware unit which must be associated with a relatively high security rating. Said control unit may be a unit which does not have to be relatively computer program product does not have to be associated with a relatively high associated with a high security rating. Said security classification.
Additional objects, advantages, and novel features of the present invention will become apparent to those skilled in the art from the following details, as well as through the practice of the invention. While the invention is described below, it should be understood that the invention is not limited to the specific details described. Those skilled in the art having access to the teachings herein will recognize additional applications, modifications, and incorporations in other areas, which are within the scope of the invention. SUMMARY DESCRIPTION OF THE DRAWINGS For a more complete understanding of the present invention and further objects and advantages thereof, reference is now made to the following detailed description which is to be read in conjunction with the accompanying drawings in which like reference numerals refer to like parts throughout the several gurus, 1 schematically illustrates a vehicle, according to an embodiment of the invention; Figure 2 schematically illustrates a threat management device for a ground-based vehicle, according to an embodiment of the invention; Figure 3 schematically illustrates a threat management device for a ground-based vehicle, according to an embodiment of the invention; Figure 4a schematically illustrates a fate diagram of a threat management procedure for a ground-based vehicle, according to an embodiment of the invention; Figure 4b schematically illustrates in further detail a flow chart of a threat management method for a ground-based vehicle, according to an embodiment of the invention; and Figure 5 schematically illustrates a computer, according to an embodiment of the invention.
DETAILED DESCRIPTION OF THE FIGURES Referring to Figure 1, a side view of a vehicle 100 is shown. The vehicle 100 is a ground-based vehicle. The vehicle 100 may be of a suitable type. According to one embodiment, said vehicle 100 is a military vehicle. According to one embodiment, said vehicle 100 is an off-road vehicle. According to one embodiment, the vehicle 100 is slightly selected from the group of tank, tracked vehicle, infantry cannon vehicle, am fi auxiliary vehicle, artillery vehicle and command center vehicle. The vehicle 100 may include crawler feet and / or wheels for propelling said vehicle.
Here, the term "link" refers to a communication link which may be a physical line, such as an optoelectronic communication line, or a non-physical line, such as a wireless connection, for example a radio or microwave link.
Referring to Figure 2, there is shown a threat management device 299 for the vehicle 100. The device 299 is arranged in the vehicle 100. The device 299 comprises an electronic control unit 200. According to one embodiment, the control unit 200 may be a so-called DAS controller. The control unit 200 is arranged to control and monitor a number of different subsystems of the vehicle 100.
A schematic exemplary embodiment of is shown with reference to Figure 5 below.
The device 299 comprises at least a first subsystem 250 of a first category. Said control unit 200 is arranged for communication with the first subsystem 250 via a link L250a. Said control unit 200 is arranged to control and monitor said first subsystem 250. The at least one subsystem 250 is a so-called hard-kill system. Said first subsystem 250 may include means for neutralizing threats, such as incoming missiles, robots, grenades or projectiles. Said first subsystem 250 may include means for neutralizing threats, such as e.g. Public vehicles, ships, aircraft or helicopters. Said first subsystem 250 may include means for neutralizing threats, such as e.g. ground troops or individual soldiers. Said devices may be of a suitable type. Said devices may, for example, comprise an air defense system.
The device 299 comprises at least one subsystem 260 of a second category. The at least one second subsystem 260 is a so-called soft-kill system.
Said control unit 200 is arranged for communication with the second subsystem 260 via a link L260a. Said control unit 200 is arranged to control and monitor said second subsystem 260. Said second subsystem 260 may comprise means for enabling evasive maneuvers of the vehicle to escape a threat. Said second subsystem 260 may comprise devices for performing vehicle obscuring measures, for example by means of smoke cartridges.
Said second subsystem 260 may include means for performing deceptive actions, such as e.g. to fire IR flares or magnesium femSOf. 10 15 20 25 30 14 Said first subsystem and said second subsystem are described in further detail with reference to Figure 3 below.
Some sensors of the vehicle 100 may be included in both said first subsystem 250 and said second subsystem 260 as a shared resource.
The control unit 200 is arranged to communicate with a security unit 210 via a link L210. According to one embodiment, said control unit 200 and said security unit can be arranged for bidirectional communication with each other via said link L210. According to one embodiment, said control unit 200 and said security unit 210 may be arranged for one-way communication with each other via said link L210, where only said security unit 210 is arranged to send, where applicable, a signal S1 to the control unit 200.
Said signal S1 may include information about said control unit 200 being given a green light to deal with a determined threat or not.
Said safety unit 210 may comprise a Control Enabling Safety Circuit 210. Said safety unit designated 210 is arranged for communication with said first subsystem 250 via a link mechanism. Said security unit also hardware security configuration unit.
L250b. Said security unit 210 is arranged for communication with said second subsystem 260 via a link L260b.
Said security unit 210 is a hardware unit. Said security unit 210 according to one embodiment does not comprise any software. Said safety unit 210 includes an electrical circuit of suitable architecture. According to one embodiment, said security circuit may include CPLD code. In this case, it is nevertheless considered that said security unit 210 is a pure hardware. Said safety unit 210 can advantageously be certified according to a highest safety class. Said security unit 210 is sensor configurations which are included in both said at least first arranged to receive signals from subsystem 250 and said at least second subsystem 260. Said security unit 210 is so configured that it can evaluate information in said received signals and determine whether the control unit 200 shall be given the green light to control the operation of said at least first subsystem 250 and / or said at least second subsystem 260. In this case, the safety unit 210 may be arranged to, where applicable, give the control unit 200 permission to perform certain measures to deal with a determined threat. .
According to an exemplary embodiment, the security unit 210 may be arranged to activate at least one suitable countermeasure, of said first subsystem 250 and / or According to the security unit 210, may be arranged to activate at least one suitable second subsystem 260. an exemplary embodiment, countermeasures of said first subsystem 250 and / or second subsystem 260 based on signals received by sensors on board vehicle 100.
According to one embodiment, some sensor configurations are only included in a hard-kill system or a soft-kill system. Sensor configurations for hard-kill systems can be adapted to detect a threat at a shorter distance than sensor configurations for soft-kill systems. Sensor configurations for hard-kill systems may be adapted to detect a threat at a later stage than sensor configurations for soft-kill systems. According to an embodiment of the invention, sensor data from a hard-kill system can be advantageously used for operation of a soft-kill system of the vehicle 100. In this case, the safety unit 210 can be arranged to activate certain suitable parts of a soft-kill system on the basis of sensor data from a or several hard-kill systems.
According to an embodiment of the invention, in other words sensor data from said at least first subsystem 250 can be advantageously used for operation of at least a second subsystem 260 of the vehicle 100. Hereby the safety unit 210 can be arranged to activate certain suitable parts of said second system 260 on the basis of sensor data from one or your first subsystems 250. 10 15 20 25 30 16 Sensor configurations for soft-kill systems may be adapted to detect a threat at a longer distance than sensor configurations for hard-kill systems.
Sensor configurations for soft-kill systems may be more suitable for detecting a threat at an earlier stage than sensor configurations for hard-kill systems.
According to an embodiment of the invention, sensor data from a soft-kill system can be advantageously used for operation of a hard-kill system of the vehicle 100. In this case, the safety unit 210 can be arranged to activate certain suitable parts of a hard-kill system on the basis of sensor data from a or fl your soft-kill system.
According to an embodiment of the invention, in other words sensor data from said at least second subsystem 250 can be advantageously used for operation of at least a first subsystem 260 of the vehicle 100. Hereby the safety unit 210 can be arranged to activate certain suitable parts of said first system 260 on the basis of sensor data from one or your other subsystems 250.
In this connection, it should be pointed out that said control unit 200 cannot take countermeasures regarding an established threat unless said safety unit so permits. Said control unit 200 can only take measures by means of said first system 250 and / or said second system 260 if said safety unit has sent the signal S1 including information that a certain threat can be handled.
Referring to Figure 3, the device 299 shown in Figure 2 is illustrated in further detail.
The control unit 200 is arranged to continuously determine the presence of threats.
Said threats can be of various kinds, for example tank, missile, grenade, robot, laser illumination, eye plane, grenade launcher, grenade launcher or general ground troop. Said control unit 200 may be arranged to automatically determine the presence of threats on the basis of information determined by a first sensor configuration 310, second sensor configuration 320, third sensor configuration 330 and / or fourth sensor configuration 340, which are described in further detail below.
Said control unit 200 may be arranged to automatically determine information concerning threat characteristics. Said threat characteristics are associated with said threat. Said threat characteristics may be of an appropriate nature.
For example, said threat characteristics may include information about equipment, performance and weapons of a public vehicle or individual soldier.
Said control unit 200 is arranged to automatically determine information concerning said threat characteristics on the basis of information determined by said first sensor configuration 310, second sensor configuration 320, third sensor configuration 330 and / or fourth sensor configuration 340. According to one embodiment, information regarding the threat characteristics may be stored in a memory of said control unit 200. According to one embodiment, information on e.g. equipment, performance and weapons for certain threats, such as specific military vehicles, are stored in a memory of said control unit 200.
Said control unit 200 is arranged to: - determine information concerning said threat; - establish measures for dealing with said threats in dependence on said information; control the provided systems for the automatic and / or semi-automatic handling of said threats on the basis of a decision determined by means of a separate hardware security control unit whether to give the go-ahead to handle said threats or not.
It is illustrated here that the security unit 210 is arranged for communication with the control unit via said link L210. The security unit 210 may be referred to as the hardware security configuration unit. 10 15 20 25 30 18 Said first sensor configuration 310 is arranged for communication with link L310. Said other arranged for link arranged for link L330. arranged for a connection configuration 305 via a 320, the connection configuration 330 is the connection configuration with a third with communication L320. communication sensor configuration 305 via a Said sensor configuration 305 via a 340 is the switching configuration 305 via a link L340. Said switching configuration Said fourth sensor configuration communication with 305 is arranged for communication with the control unit 200 via a link L300.
Said switching configuration 305 is arranged for communication with the security unit 210 via a link L310. Said clutch configuration can be a clutch box. In this case, the first sensor configuration 310 is arranged to continuously or intermittently send signals to both the control unit 200 and the safety unit 210 via said switching configuration 305. Here, the second sensor configuration 320 is arranged to continuously or intermittently send signals via both the control unit 200 and the safety switching unit 210. In this case, the third sensor configuration 330 is arranged to continuously or intermittently send signals to both the control unit 200 and the safety unit 210 via 305. the sensor configuration 340 is arranged to continuously or intermittently send said switching configuration. Here, the fourth signals to both the control unit 30 and the control unit 200
According to one embodiment, said coupling configuration 305 can be omitted, wherein said four sensor configurations 310, 320, 330 and 340 can be connected directly to both the control unit 200 and the safety unit 310. In this case, said four sensor configurations 310, 320, 330 and 340 can be connected directly to L392, L39 and L392, L39, respectively. L394. According to one embodiment, some of the sensor configurations 310, 320, 330 and 340 can be connected directly to said control unit 200 and said safety unit 210 via dedicated links L391, 10 15 20 25 30 19 safety unit 210 while other sensor configurations can be connected to said control unit 200 and said safety unit. 210 via said coupling configuration 305.
According to the example shown with reference to Figure 3, said first sensor configuration 310, second sensor configuration 320 and third sensor configuration 330 are included in at least a first subsystem 250, which includes a hard-kill system. According to the example shown with reference to Figure 3, said fourth sensor configuration 340 is included in at least a second subsystem 260, which includes a soft-kill system.
According to the example shown with reference to Figure 3, a first antidote configuration 350 and a second antidote configuration 360 are included in at least a first subsystem 250, which includes a hard-kill system.
According to the example shown with reference to Figure 3, a third antidote configuration 370 is included in at least a second subsystem 260, which includes a soft-kill system.
The control unit 200 is arranged for communication with a first sensor configuration 310 via a link L310. Said first sensor configuration 310 may include a light illumination detection configuration. Said first sensor configuration 310 may include a laser warning unit. Said first sensor configuration 310 is arranged to continuously determine whether the vehicle is illuminated by a threat by means of a light signal, for example laser light for position indication. Said first sensor configuration 310 may further be arranged to determine a threat on the basis of said detected light illumination.
This can be done, for example, by means of frequency analysis and amplitude analysis of the detected light. Said determination of threat may include determination of information on the type of threat. Said determination of threat can take place by means of said first sensor configuration 310 and / or said control unit 200. Said determination of threat can take place by means of said first sensor configuration 310 10 15 20 25 30 20 and / or said control unit 200 together with information which is pre-defined in a memory in the controller 200.
The control unit 200 is the sensor configuration 320 via a link L320. Said second sensor configuration 320 may sensor configuration 320 may include an acoustic sensor. Said second arranged for communication with a second include a sound detection configuration. Said second sensor configuration 320 is arranged to continuously determine whether the vehicle is hit by an audio signal emitted from a threat, for example ultrasound for position indication. Said second sensor configuration 320 may further be arranged to determine a threat on the basis of said detected sound signal. This can be done, for example, by means of frequency analysis and amplitude analysis of the detected sound. Said determination of threat may include determination of information on the type of threat. Said determination of threats can take place by means of said second sensor configuration 320 and / or said control unit 200. Said determination of threats can take place by means of said second sensor configuration 320 and / or said control unit 200 together with tasks which are pre-stored in a memory in the control unit 200.
The control unit 200 is arranged for communication with a third sensor configuration 330 via a link L330. The third sensor configuration 330 may include a radar unit 290. Said radar unit may include a determination of position indications for a threat and / or changes of position indications of radar transmitters for transmitting radar waves for a threat. Said radar unit may include a radar receiver for receiving radar waves for determining position indications for a threat and / or changes of position indications for a threat. Said threat may be a mobile threat or an xt xt positioned threat. Said mobile threats can be, for example, a tank, a ship. Said xt xt positioned threat may be a fixed artillery piece or a bunker. 10 15 20 25 30 21 The control unit 200 is arranged for communication with a fourth sensor configuration 340 via a link L340. Said fourth sensor configuration 340 may include at least one visual sensor, such as a camera, camcorder or IR camera. Said visual sensor may include a light amplifier. Said fourth sensor configuration 340 is arranged to continuously determine ambient images of the vehicle. Said ambient images can be used to determine a position indication for a possible threat.
Said fourth sensor configuration 340 may further be arranged to determine a threat on the basis of said detected ambient images. This can be done, for example, by means of image processing of the determined ambient images.
Said determination of threat may include determination of information on the type of threat. Said determination of threat can take place by means of said fourth sensor configuration 340 and / or said control unit 200. Said determination of threat can take place by means of said fourth sensor configuration 340 and / or said control unit 200 together with information which is pre-stored in a memory in the control unit 200.
The control unit 200 and / or the safety unit 210 can be arranged for communication with an assistive device configuration (not shown) via a link adapted therefor (not shown). Said assistive device configuration may include navigation equipment of an appropriate type. Said navigation equipment may comprise a suitable number of gyros. Said navigation equipment may include a GPS device. The control unit 200 and / or the safety unit 210 may be arranged to continuously receive signals comprising information from said support means configuration. The control unit 200 may be arranged to use information from the assistive device configuration in a suitable manner according to an aspect of the present invention.
The control unit 200 is arranged for communication with said first 350 via an L350. Countercurrent configuration 350 may include a hard-kill system. countermeasure control link Said first 10 15 20 25 30 22 The security unit 210 is arranged for communication with said first countermeasure control 350 via a link L385. The security unit 210 is arranged to, where applicable, send a signal comprising information on activation of said first countermeasure configuration 350. In this case, the control unit 200 can only control the action by means of said first countermeasure configuration 350 if said security unit 210 has activated said first countermeasure configuration 350. said signal.
Said first countermeasure configuration 350 may include a threat mitigation system. Said first antidote configuration 350 may comprise an air defense system. According to one embodiment, said first countermeasure configuration 350 may comprise an air defense system including air defense robots.
The control unit 200 is a counter-means configuration arranged for communication with a second 360 via an L360. countermeasure configuration 360 may include a hard-kill system. link Said second The security unit 210 is arranged for communication with said second countermeasure configuration 360 via a link L386. The security unit 210 is arranged to, where applicable, send a signal comprising information on activation of said second countermeasure configuration 360. In this case, the control unit 200 can only control the effect by means of said second countermeasure configuration 360 if said security unit 210 has activated said second countermeasure configuration 350. said signal.
According to one embodiment, said second countermeasure configuration 295 may comprise an active armor. The control unit 200 may be arranged to activate and / or control said active armor. Said activation can take place on the basis of an established threat and associated threat characteristics. According to one embodiment, said activation can only take place after said safety circuit 210 has given a green signal by means of the signal S1. According to one embodiment, said second countermeasure configuration 360 may comprise an automatic or semi-automatic so-called hard-kill system. Said hard-kill system may include an anti missile system.
The control unit 200 is a counter-means configuration arranged for communication with a third link L370. countermeasure configuration 370 may include a soft-kill system. 370 via a said third The security unit 210 is arranged for communication with said third countermeasure configuration 370 via a link L387. The security unit 210 is arranged to send, where applicable, a signal comprising information on activation of said third countermeasure configuration 370. In this case, the control unit 200 can only control the action by means of said third countermeasure configuration 370 if said security unit 210 has activated said third countermeasure configuration 350. said signal. 370 can smoke cartridge configuration. The control unit 200 may be arranged to fire said third anti-vehicle configuration including at least one smoke cartridge to effect the laying out of camouflage smoke. A number of smoke cartridges can be fired simultaneously. An operator can control the laying of smoke in an appropriate way, for example by deciding in which direction a smoke cartridge should be fired. An operator can control the laying of smoke in an appropriate way, for example by deciding how far a smoke cartridge should be pushed. Alternatively, a number of smoke cartridges can be fired intermittently.
The control unit 200 may be arranged to dispense camouflage smoke in a vicinity of the vehicle 100 in a suitable manner. Said at least one smoke cartridge can be fired by an operator of the vehicle 100 by means of dedicated equipment.
According to one embodiment, said at least one smoke cartridge, where applicable, may be fired automatically on the basis of a determined threat and associated threat characteristics, wherein said safety unit 210 has given the go-ahead according to an aspect of the present invention. According to one embodiment, said third counter-means configuration 370 may comprise an automatic or semi-automatic system, which is adapted to deceive, for example, incoming heat-seeking robots by manipulating the means 100 according to a counter-means configuration 370 to be arranged to cool the vehicle 100 on heat signature. exemplary embodiment, said third may suitably, such as to a temperature corresponding to an ambient temperature to reduce the risk of detection by means of an IR camera of said threat.
According to one embodiment, said third anti-agent configuration 370 may comprise a suitable optical camouflage. Said optical camouflage can be activated or deactivated automatically or semi-automatically on the basis of said determined threats and associated threat characteristics. According to one embodiment, said activation can only take place after said safety circuit 210 has given the green signal by means of the signal S1.
According to one embodiment, said third antidote configuration 370 may include suitable glare equipment to dazzle a threat. Said threat may consist of a civilian soldier with a grenade launcher or grenade launcher.
According to one embodiment, said third countermeasure configuration 370 may include suitable deterrent equipment to deter a threat. Said threat may consist of a civilian soldier with a grenade launcher or grenade launcher. Said deterrent equipment may, for example, include an amplifier and a loudspeaker for playing very loud sounds, which may cause discomfort to said threats.
According to one embodiment, said third countermeasure configuration 370 may comprise suitable equipment for, for example, electromagnetic interference. In this case, said third countermeasure configuration 370 may comprise equipment for generating and transmitting an electromagnetic pulse against a threat to destroy electronic equipment of said threat. According to one embodiment, said third countermeasure configuration 370 may comprise suitable equipment for, for example, interference with radar units of said threat.
According to one embodiment, said third countermeasure configuration 370 may comprise or IR flares and / or metal strips to confuse said threat in a suitable manner.
The control unit 200 is arranged to, where applicable, automatically control said first, second and / or third countermeasure configuration, according to an aspect Various to be used by the present invention. functions of said antidote configurations can be simultaneously, individually or in combination.
Figure 4a schematically illustrates a fate diagram of a ground handling method for a ground-based vehicle, according to an embodiment of the invention. The method comprises a first method step s401. The step s401 comprises the steps of: - providing at least two kinds of systems for said threat management, said threat management comprising determining information concerning said threat and determining measures for managing said threat in dependence on said information; - providing a control unit for controlling provided systems; - provide a separate hardware security configuration unit; and - supplying said separate hardware security control unit by means of provided systems with specified information concerning said threat in order to determine in an evaluation step whether said control unit is to be given the go-ahead to handle said threat or not. After step s401, the process is terminated.
Figure 4b schematically illustrates a fate diagram of a threat management procedure for a ground-based vehicle, according to an embodiment of the invention. The method comprises a first method step s410. The method step s410 comprises the step of providing at least two kinds of systems for said determining information concerning said threat and determining measures for handling threat management, wherein said threat management includes said threat depending on said information. Said two types of systems can be hard-kill systems and soft-kill systems respectively. After the process step s410, a subsequent process step s420 is performed.
Method step s420 includes the step of providing a controller 200 for controlling provided systems. Said control unit 200 comprises various sensor configurations, such as the sensor configurations 310, 320, 330 and or 340, controlling said provided systems. After the process step s420, a subsequent process step s430 is performed. software for, on the basis of signals received from Method step s430, including the step of providing a separate 310. hardware security control unit 310 is arranged to, where the hardware security control unit is said to be applicable, send a signal S1 to said control unit, which information S1 contains information for example, the use of a hard-kill system or soft-kill system to deal with an identified threat in an appropriate manner.
After the process step s430, a subsequent process step s440 is performed.
Method step s440 includes the step of supplying said separate hardware security control unit 210 by means of systems provided with said information regarding said threat to determine in an evaluation step whether said control unit should be given the go-ahead to handle said threat or not.
In this case, at least one of the first, second, third and fourth sensor configurations can provide information on threats and / or threat characteristics associated with said threats. After the process step s440, a subsequent process step s450 is performed. The method step s450 comprises the step of controlling by means of said control unit provided systems for automatic handling of said threats and / or semi-automatic handling of said threats. Said control is performed on the basis of information from said hardware security configuration unit 210. After the procedure step s450, the procedure is terminated.
Referring to Figure 5, there is shown a diagram of an embodiment of a device 500. The controllers 200 and 210 described with reference to Figure 2 may in one embodiment include the device 500. The device 500 includes a non-usable memory 520, a data processing unit 510, and a read / write memory 550. The non-usable memory 520 has a first memory portion 530 in which a computer program, such as an operating system, is stored to control the operation of the device 500. Furthermore, the device 500 comprises a bus controller, a serial communication port , I / O means, an A / D converter, a time and date input and transfer unit, an event counter and an interrupt controller (not shown). The useless memory 520 also has a second memory portion 540.
A computer program P is provided which includes threat management routines for a ground-based vehicle according to the innovative procedure. The computer program P includes routines for determining information concerning said threat.
The computer program P includes routines for determining measures for dealing with said threat in dependence on said information. The computer program P comprises routines for controlling provided systems, for example the first system 250 and the second system 260 for automatic and / or semi-automatic handling of said threat on the basis of a green light determined by means of a separate 210 to be given to handle said threat or not. hardware security configuration unit determining whether Program P can be stored in an executable manner or in a compressed manner in a memory 560 and / or in a read / write memory 550. 10 15 20 25 30 28 When it is described that the data processing unit 510 performs a certain function, it should be understood that the data processing unit 510 executes a certain part of the program which is stored in the memory 560, or a certain part of the program which is stored in the read / write memory 550.
The data processing device 510 can communicate with a data port 599 via a data bus 515. The useless memory 520 is intended for communication with the data processing unit 510 via a data bus 512. The separate memory 560 is intended to communicate with the data processing unit 510 via a data bus 511. Read / write memory 550 is arranged to communicate with the data processing unit 510 via a data bus 514. To the data port 599, e.g. the links L210, L250a, L260b, L300, L350, L360 and L370 are connected (see Figure 2 and Figure 3).
When data is received on the data port 599, it is temporarily stored in the second memory part 540. Once the received input data has been temporarily stored, the data processing unit 510 is arranged to perform code execution in a manner described above. According to one embodiment, signals received at the data port 599 include information about a green light to handle a particular threat.
According to one embodiment, signals received at the data port 599 include information determined by the first sensor configuration 310, the second sensor configuration 320, the third sensor configuration 330 and the fourth sensor configuration 340. / or the third countermeasure configuration 370. The received signals on the data port 599 may be used by the device 500 to handle a determined threat.
Parts of the methods described herein may be performed by the device 500 by means of the data processing unit 510 running the program stored in the memory 560 10 29 or the read / write memory 550. When the device 500 runs the program, the methods described herein are executed.
The foregoing description of the preferred embodiments of the present invention has been provided for the purpose of illustrating and describing the invention. It is not intended to be exhaustive or to limit the scope to the variants described. Obviously, many modifications and variations will occur to those skilled in the art. The embodiments were selected and described to best explain the principles of the invention and its practical applications, thereby enabling those skilled in the art to understand the invention for various embodiments and with the various modifications suitable for the intended use.
权利要求:
Claims (18)
[1]
A threat management method for a ground-based vehicle, comprising the steps of: - providing (S410) at least two types of systems (250; 260) for said threat management, said threat management including establishing information relating to said threat and establishing measures for managing said threat in dependence on said information; and - providing (s420) a control unit (200) for controlling provided systems (250; 260), characterized by the steps of: - providing (s430) a separate hardware security configuration unit (210); supplying (s440) said separate hardware security control unit (210) by means of provided systems (250; 260) determined information concerning said threat to determine in an evaluation step whether said control unit (200) should be given the green light to handle said threat or not.
[2]
A method according to claim 1, wherein a system of both so-called hard-kill system (250) for combating threats such as so-called soft-kill system (260) to avoid threats is provided.
[3]
A method according to claim 1 or 2, wherein said vehicle is a combat vehicle, for example a tank.
[4]
A method according to any one of the preceding claims, further comprising the step of: - controlling (s450) systems (250; 260) provided by said control unit for automatically handling said threats and / or semi-automatic handling of said threats. 10 15 20 25 30 31
[5]
A method according to any one of the preceding claims, further comprising the step of: - connecting both said hardware security control unit (210) and said control unit (200) to provided systems (250; 260) for transmitting information.
[6]
The method of claim 5, wherein information transfer from said hardware security configuration unit (210) to said control unit (200) is unidirectional.
[7]
A method according to any one of the preceding claims, wherein said control unit (200) is arranged to be supplied with information from one kind of provided systems (250; 260) for controlling another kind of provided systems.
[8]
A threat management device for a ground-based vehicle (100), comprising: - at least two types of systems (250; 260) for said threat management; means (200; 250; 260; 310; 320; 330; 340) adapted to determine information concerning said threat; means (200) adapted to establish measures for dealing with said threat in dependence on said information; a control unit (200) for controlling provided systems (250; 260), characterized by: - a separate hardware security configuration unit (210); means (310; 320; 330; 340; 305) adapted to supply said separate hardware security control unit (210) by means of provided systems (250; 260) determined information concerning said threat; and - means (210) adapted to determine whether or not said control unit (200) should be given the go-ahead to deal with said threat.
[9]
Device according to claim 8, wherein a type of system is a so-called hard-kill system (250) for combating threats, and wherein a type of system is a so-called soft-kill system (260) to avoid threats. 10 15 20 25 30 32
[10]
Device according to claim 8 or 9, wherein said vehicle is a combat vehicle, for example a tank.
[11]
The apparatus of any of claims 8-10, wherein said control unit (200) is adapted to control provided systems (250; 260) for automatic and / or semi-automatic handling of said threat.
[12]
The apparatus of any of claims 8-11, further comprising: - means (305; L300; L310; L320; L330; L340; L310; L350; L360; L370) adapted to connect both said hardware security configuration unit (210) and said control unit (210); 200) to provided systems (250; 260) for transmitting information. claim 12, the hardware security configuration unit (210) is adapted for unidirectional
[13]
An apparatus according to wherein said information transmission to said control unit (200).
[14]
The apparatus of any of claims 8-13, wherein said controller (200) is adapted to receive information from one type of provided system (250; 260) and control another type of provided system based on said received information.
[15]
A vehicle (100) comprising a device according to any one of claims 8-14.
[16]
The vehicle (100) of claim 15, wherein said vehicle is any of a tank, off-road vehicle or other military vehicle.
[17]
A computer program (P) for threat management for a ground-based vehicle, said computer program (P) comprising program code stored on a computer-readable medium for causing an electronic control unit (200; 500) to perform the steps of: 33 - establishing information concerning said threats; - establish measures for dealing with said threats in dependence on said information; control provided systems (250; 260) for automatic and / or semi-automatic handling of said threats on the basis of a green light determined by a separate (210) shall be given to handle said threats or not. hardware safety control unit decisive if
[18]
A computer program product comprising a program code stored on a computer readable medium for performing the method steps of: - determining information concerning said threat; - establish measures for dealing with said threats in dependence on said information; control provided systems (250; 260) for automatic and / or semi-automatic handling of said threat on the basis of a separate (210) green light to be given to handle said threat or not, hardware security skon control unit determined determining when said computer program runs on an electronic control unit (200; 500).
类似技术:
公开号 | 公开日 | 专利标题
US9830695B2|2017-11-28|System, method, and computer program product for indicating hostile fire
US9569849B2|2017-02-14|System, method, and computer program product for indicating hostile fire
US9658108B2|2017-05-23|System, method, and computer program product for hostile fire strike indication
US9244459B2|2016-01-26|Reflexive response system for popup threat survival
US9410783B1|2016-08-09|Universal smart fuze for unmanned aerial vehicle or other remote armament systems
SE1350219A1|2014-08-26|Threat management device and procedure for a ground-based vehicle
SE1350218A1|2014-08-26|Threat management device and procedure for ground-based vehicles
US8274023B2|2012-09-25|Missile training system
US20130205980A1|2013-08-15|Weapon System Methods for Firing and Detecting Ammunition Bodies
KR101649510B1|2016-08-22|Integrated survivability display apparatus of aircraft
EP2950035A1|2015-12-02|Method and system for a tactical visualization
KR101269235B1|2013-05-30|Air-to-air missile guidance device
RU2467277C1|2012-11-20|Device to launch rocket from mobile carrier
RU2465532C1|2012-10-27|Device to launch missile from mobile carrier
WO2021009955A1|2021-01-21|Threat-coping system
KR20220030242A|2022-03-10|Dynamic weapon-target assignment using a control-based methodology
RU2456531C1|2012-07-20|Device to launch rocket from mobile carrier
KR20200042476A|2020-04-23|Laser instruction verification tool
KR101314654B1|2013-10-04|Air-to-air missile guidance method
KR20120027660A|2012-03-22|Integrated launching control switch of self-protective equipment of the airplane and method thereof
RU2453792C9|2014-02-20|Device to launch rocket from mobile carrier
RU2465533C1|2012-10-27|Device to launch missile from mobile carrier
RU2467280C1|2012-11-20|Device to launch rocket from mobile carrier
RU2460029C1|2012-08-27|Device to launch missile from mobile carrier
SE1050239A1|2011-09-18|Device and method for assessing a potential target
同族专利:
公开号 | 公开日
EP2959260A4|2016-10-05|
PL2959260T3|2019-09-30|
DK2959260T3|2019-05-20|
IL239511A|2019-07-31|
WO2014129961A1|2014-08-28|
US20160010955A1|2016-01-14|
EP2959260A1|2015-12-30|
EP2959260B1|2019-04-10|
US10054403B2|2018-08-21|
IL239511D0|2015-08-31|
SE536875C2|2014-10-14|
引用文献:
公开号 | 申请日 | 公开日 | 申请人 | 专利标题

US6995660B2|2002-09-26|2006-02-07|Bae Systems Information And Electronic Systems Integration Inc.|Commander's decision aid for combat ground vehicle integrated defensive aid suites|
GB2410786B|2004-02-06|2007-04-18|Buck Neue Technologien Gmbh|Method and apparatus for protection of battlefield vehicles|
US6903676B1|2004-09-10|2005-06-07|The United States Of America As Represented By The Secretary Of The Navy|Integrated radar, optical surveillance, and sighting system|
US8200605B2|2006-02-16|2012-06-12|Saab Ab|Decision making unit for autonomous platform|
US7921588B2|2007-02-23|2011-04-12|Raytheon Company|Safeguard system for ensuring device operation in conformance with governing laws|
IL197522A|2009-03-10|2013-10-31|Bird Aerosystems Ltd|System and method for protecting an aircraft against an incoming threat|
US8464949B2|2011-02-24|2013-06-18|Raytheon Company|Method and system for countering an incoming threat|US11181346B1|2019-09-30|2021-11-23|Bae Systems Information And Electronic Systems Integration Inc.|Methods for enhanced soft-kill countermeasure using a tracking radar|
法律状态:
优先权:
申请号 | 申请日 | 专利标题
SE1350219A|SE536875C2|2013-02-25|2013-02-25|Threat management device and procedure for a ground-based vehicle|SE1350219A| SE536875C2|2013-02-25|2013-02-25|Threat management device and procedure for a ground-based vehicle|
DK14754527.1T| DK2959260T3|2013-02-25|2014-02-20|Method and device for controlling threats of a ground vehicle|
PCT/SE2014/050209| WO2014129961A1|2013-02-25|2014-02-20|Method and arrangement for threat management for ground-based vehicle|
EP14754527.1A| EP2959260B1|2013-02-25|2014-02-20|Method and arrangement for threat management for ground-based vehicle|
PL14754527T| PL2959260T3|2013-02-25|2014-02-20|Method and arrangement for threat management for ground-based vehicle|
US14/770,055| US10054403B2|2013-02-25|2014-02-20|Method and arrangement for threat management for ground-based vehicle|
IL239511A| IL239511A|2013-02-25|2015-06-18|Method and arrangement for threat management for ground-based vehicle|
[返回顶部]