Defense Systems | Date: 2015-04-27
The invention relates to an interceptor type system for neutralizing a shaped charge threat, which comprises: (a) a detection system for detecting an approach of a shaped charge projectile, for calculating upon such detection its course of approach, and for activating an interceptor to create a flux of intercepting fragments within a destruction corridor; and (b) one or more of said interceptors, each comprising one or more magazines of fragments, each magazine comprises said fragments and an explosive layer which in turn explodes thereby to create said flux of intercepting fragments within said destruction corridor.
Defense Systems | Date: 2015-11-05
A system for autonomous enforcement of rules may comprise a protected system, including infrastructure, operative in response to input signals and an autonomous control system. The autonomous control system may include a monitor circuit which is coupled to the input signals to monitor the input signals for violations of the rules and an action circuit coupled to the protected system which prevents the violating input signals from affecting the protected system.
Defense Systems | Date: 2015-02-27
A system may be broken down into one or more components. Each of the components may be evaluated to ascribe a security score to each of the components. A composite security score may be generated for the system based on the security scores and a rate of decay measure characterizing a probabilistic security degradation of the system. The rate of decay measure may be applied to the composite security score to obtain a current composite security score.
Defense Systems | Date: 2015-06-12
A method of extracting DNA from a biological sample includes the steps of freezing a biological sample; mechanically breaking down the sample to produce a processed sample; mixing the processed sample with a lysis solution; and cycling the mixture through a series of pressure fluctuations to produce a resulting lysate. The method may further include the steps of exposing the lysate to a material that binds to DNA present in the sample and collecting the DNA from the sample using an elution solution. An apparatus for practicing the method includes a first segment for mechanically breaking down the sample; a second segment for pressurizing a mixture of the processed sample and lysis solution to produce a lysate; and wherein the first segment is fluidly coupled to the second segment. The apparatus may also include a third segment in which the lysate is exposed to the binding material.
Defense Systems | Date: 2015-11-11
Secure electronic access may be provided by receiving at least one electronic certificate from an electronic device seeking to access a secure resource at a device under protection including at least one security processor, the at least one certificate providing device information related to the security of the electronic device, and comparing with at least one autonomous processor of an autonomous system the device information to the security requirement information. The at least one autonomous processor may instruct the at least one security processor to provide the secure resource to the device when the device information meets the security requirement information. The device under protection may provide the secure resource to the electronic device in response to the instruction.
Defense Systems | Date: 2016-01-08
Multiple test coupons are incorporated in the construction of a personal garment for the purpose of determining the presence of foreign substances acquired during garment use or a change in properties or other change in characteristics over time. Each of the test coupons is retained with the garment during the useful life of the garment until the coupon is individually removed for test purposes. Each test coupon has a construction identical to the garment construction and is easily removable and configured to allow for destructive testing. Sufficient multiple coupons are provided with each garment over its life to allow for periodic testing.
Defense Systems | Date: 2015-05-22
A personal ballistic protection device incorporates multiple removable test coupons. Each of the test coupons are retained with the ballistic device during its use until each coupon is removed for test purposes. Each test coupon has a construction identical to the protective portions of the ballistic device and is removable and configured to allow for destructive testing. Sufficient coupons are provided with the ballistic protection device to allow for periodic testing over a predetermined useful life of the ballistic protection device. One embodiment of the device is a body armor vest.
Defense Systems | Date: 2016-04-15
Systems and methods described herein may detect hardware modifications. A test loop may terminate at a transmit pin and a receiver pin of a processor footprint pad. A processor may be coupled to the test loop via the transmit pin and the receiver pin. The processor may cause a signal to be transmitted to the test loop from the transmit pin and receive a modified signal from the test loop at the receiver pin. The processor may analyze the modified signal to detect a hardware modification in communication with the test loop based on the modified signal.
Defense Systems | Date: 2016-03-28
An airborne system for performing surveillance of a stationary or moving object on the ground, comprising: two independent image-acquiring devices that are mounted at two extremities of a pod, respectively, a first of said image-acquiring devices is a scanning device which is used for scanning an area of interest and identifying targets therein, and the second of said image acquiring devices is an investigation device which is used for investigating one or more of said identified targets.
Defense Systems | Date: 2015-03-12
A constraint problem may be represented as a digital circuit comprising at least one gate and at least one constrained input or at least one constrained output, or a combination of at least one constrained input and at least one constrained output. A matrix may be generated for each of the at least one gates. A constraint matrix may be generated for the at least one constrained input, the at least one constrained output, or the combination of at least one constrained input and at least one constrained output. A final matrix comprising a combination of each matrix for each of the at least one gates and the constraint matrix may be generated. The final matrix may be translated into an energy representation useable by a quantum computer. The energy of the energy representation may be minimized to generate a q-bit output, and a result of the constraint problem may be determined based on the q-bit output.