Access To Electrical Information Patents (Class 340/5.74)
  • Publication number: 20110234372
    Abstract: A motor vehicle includes control apparatus for establishing an interactive human-machine interface (HMI) between a vehicle driver and an on-board communication system that is wirelessly coupled to a nomadic communication device carried by the driver. The on-board communication system has the ability to activate the nomadic communication device to check for messages, and the interactive HMI includes a configurable display through which check-message inquiries are selectively communicated to the driver, and an input device selectively manipulated by the driver to accept a check-message inquiry. An HMI controller responsive to sensed vehicle operating condition data and driver manipulation of the input device determines if and when a check-message inquiry should be communicated to the driver.
    Type: Application
    Filed: March 26, 2010
    Publication date: September 29, 2011
    Applicant: DELPHI TECHNOLOGIES, INC.
    Inventors: DAVID K. LAMBERT, MICHEL F. SULTAN, LACI J. JALICS, FRANCIS E. SZCUBLEWSKI
  • Patent number: 8026805
    Abstract: Methods, systems, and apparatus, including computer program products, for tracking media history using a mobile device. In some implementations, a method includes receiving a notification indicating that a mobile device is in communication range of a first player device. First media context information specifying media content being played by the first device and capabilities for the first device is received. The capabilities indicate types of media content that can be played by the first device. The first media context information is associated with the first player device. A second notification indicating that the mobile device is in communication range of a second player device is received. Second media context information is received. The second context information is associated with the second device. A history of media content is generated from the first media context information and the second media context information.
    Type: Grant
    Filed: April 9, 2009
    Date of Patent: September 27, 2011
    Assignee: Adobe Systems Incorporated
    Inventor: Edward R. W. Rowe
  • Patent number: 8027453
    Abstract: Systems and methods described herein may be incorporated into a “service marketplace” system that matches users with potential information or service providers and establishes a real-time communications connection between the user and a selected information provider. In one embodiment, an alternate is selected for the user when the service provider that the user is trying to connect with cannot be reached. In an alternative embodiment, the alternates can be used in conjunction with the service provider that does connect with the user in order to provide a second opinion or possibly deeper background information. In one embodiment, the service providers can either be a live person at the other end of the connection or a recording.
    Type: Grant
    Filed: July 9, 2007
    Date of Patent: September 27, 2011
    Assignee: UTBK, Inc.
    Inventor: Steven Lurie
  • Patent number: 7948360
    Abstract: A write-protection module for a storage device and the method thereof are disclosed. The write-protection module includes a power supply circuit, a fingerprint sensor, a database, and a microprocessor. The microprocessor for receiving the working power produced by the power supply circuit to maintain operation is respectively coupled to the power supply circuit, the fingerprint sensor, and the database. The fingerprint sensor receives the fingerprint input of a user, and the microprocessor receives the output signal of the fingerprint sensor and converts the output signal into an input cryptograph. Finally, the microprocessor compares the input cryptograph with a predetermined cryptograph stored in the database to produce a comparison information, and determines whether or not the user may access data.
    Type: Grant
    Filed: October 4, 2007
    Date of Patent: May 24, 2011
    Assignee: Transcend Information, Inc.
    Inventor: Chun-Yu Hsieh
  • Patent number: 7930555
    Abstract: A system and method for obtaining information relating to a person, such as contact details, without face-to-face, verbal or other contact. The apparatus uses an image recognition system for obtaining personal information related to a target person, and includes: an image acquisition device for capturing an image of a target person; a database of stored image data items each relating to one of a plurality of candidate persons, each image data item being associated with stored personal data relating to the respective candidate person; a search engine for matching the captured image of the target person to a candidate person image data item and retrieving the personal data relating thereto; a display device for displaying the personal data relating to the target person; and control device, operable by each candidate person, to control third party access to the stored personal data relating to the candidate person.
    Type: Grant
    Filed: September 5, 2003
    Date of Patent: April 19, 2011
    Assignee: Koninklijke Philips Electronics N.V.
    Inventor: David A. Bell
  • Publication number: 20110084800
    Abstract: An access authorization method and apparatus for a wireless sensor network comprises at least a base station and a wireless sensor network formed by a plurality of sensor nodes. After having obtained an access authorization of a user, the at least a base station issues a request message to a target sensor node in the wireless sensor network. The target sensor node requests at least a controlling node in the wireless sensor network for sensing data sensed by the at least a controlling node, and checks if the sensing data meets the requirements of the access authorization of the user. Whether the target sensor node responds with the required multimedia or not is based on the checking result.
    Type: Application
    Filed: January 6, 2010
    Publication date: April 14, 2011
    Inventors: Lee-Chun Ko, Virgil D. Gligor, Hayan Lee
  • Patent number: 7924141
    Abstract: A method of coordinating a plurality of RFID readers includes controlling the RFID readers such that only one of the readers performs an inventory of RFID tags at a time. A system for coordinating a plurality of RFID readers is also provided.
    Type: Grant
    Filed: December 1, 2006
    Date of Patent: April 12, 2011
    Assignee: Round Rock Research, LLC
    Inventor: John R. Tuttle
  • Patent number: 7898388
    Abstract: A system and method for gathering information from an operator of an asset is provided. The system interfaces with a management computer to provide a list of questions for response by the operator. A wireless infrastructure operates to distribute the list of questions from the management computer to the operator. The wireless infrastructure includes an asset communicator having a wireless communication device for communicating the questions, a processing unit, a storage unit for storing the questions and responses thereto, a display unit for displaying the questions, and input unit for the operator to input such responses. The processing unit is operable to prompt the operator with a first question, receive a response from the operator to the first question, select another question based on the response, and prompt the operator with yet another question.
    Type: Grant
    Filed: November 28, 2007
    Date of Patent: March 1, 2011
    Assignee: I.D. Systems, Inc.
    Inventors: Kenneth S. Ehrman, Michael L. Ehrman, Jeffrey M. Jagid, Joseph M. Pinzon, Yaron Hecker, Leonard Pimentel
  • Publication number: 20110032102
    Abstract: In at least one embodiment, a method and a apparatus for restricting audio transmission in a vehicle is provided. The apparatus comprises a control module. The control module is configured to receive an audio feed signal including audio content and a content advisory indicator and compare the content advisory indicator to predetermined criteria. The control module is further configured to restrict transmission of the audio data based on the comparison of the content advisory indicator to the predetermined criteria.
    Type: Application
    Filed: August 5, 2009
    Publication date: February 10, 2011
    Applicant: FORD GLOBAL TECHNOLIGES, LLC
    Inventors: Thomas Lee Miller, Robert Earl Johnson, JR., Kenneth Nkosi Williams
  • Patent number: 7876197
    Abstract: Methods and systems for preventing unauthorized use of a mobile asset are described. The method for providing access to the mobile asset can include providing a control device on the mobile asset. The control device is in communication with the mobile asset to selectively control whether the mobile asset is enabled for operation. The method also includes storing data in the control device that identifies a group of potential operators who are permitted to operate that mobile asset. This stored data includes unique password data for each potential operator in the permitted group. Further, the method includes receiving an identifier and password from an accessing operator and comparing by the control device of the received identifier to the stored data to order confirm that the accessing operator is a potential operator.
    Type: Grant
    Filed: November 28, 2007
    Date of Patent: January 25, 2011
    Assignee: I.D. Systems, Inc.
    Inventors: Kenneth S. Ehrman, Michael L. Ehrman, Jeffrey M. Jagid, Joseph M. Pinzon, Yaron Hecker, Leonard Pimentel
  • Patent number: 7872582
    Abstract: RFID tag circuits, tags, and methods are provided for using alternative memory lock bits. A pointer in tag memory is configured to point to one or the other of the alternative lock bits associated with a section of the memory for performing a function in response to a reader command. Upon receiving the reader command, the tag first checks the pointer and performs the function based on which lock bit(s) is selected.
    Type: Grant
    Filed: October 16, 2007
    Date of Patent: January 18, 2011
    Assignee: Impinj, Inc.
    Inventor: Christopher J. Diorio
  • Patent number: 7868739
    Abstract: A system and method for improving a function of reading information from a Radio Frequency Identification (RFID) tag. The system includes RFID tags installed on a variety of objects, each RFID tag storing information of its associated object and upon detection of a signal based on an effective frequency range, transmitting the information; writers spaced apart at regular intervals and installed near the RFID tags, the writers writing an instruction of informing whether an area is one where it is possible to read the information from an RFID tag; and a terminal having a read-write tag in which the instruction by the writers is written at a time of entering the area where the RFID tags are installed, a terminal controller for determining a start or stop of the read function based on the instruction of the read-write tag, and an RFID reader for starting to read the information from the electronic tag based on the effective frequency range upon receipt of a start command from the terminal controller.
    Type: Grant
    Filed: February 13, 2007
    Date of Patent: January 11, 2011
    Assignee: Samsung Electronics Co., Ltd
    Inventor: Hee-Jae Jung
  • Patent number: 7808371
    Abstract: The invention relates to a fleet security system comprising a vehicle security unit (VSU) to be installed inside each vehicle, on the sun visor or on the dashboard of the vehicle, and connected to the vehicle using the On-Board Diagnostics (OBD) connector of the vehicle. An authorized user holds the key of the vehicle to be used and an electronic security key. When the authorized user opens the door of the vehicle, the VSU detects a disturbance in the vehicle and wirelessly sends a disturbance event message to a fleet master unit. The authorized user then has a given deactivation time period (such as thirteen seconds) to show its security key to a key reader located inside the vehicle, on the VSU. The security key code is validated by the master unit which will command the VSU to disarm its disturbance detection.
    Type: Grant
    Filed: October 2, 2007
    Date of Patent: October 5, 2010
    Assignee: 2862-8030 Quebec Inc.
    Inventors: Robert Blanchet, Marc-André Beliveau
  • Publication number: 20100235429
    Abstract: An approach is provided for enabling access to content in a network service. Location information is received, at a server, relating to a first remote apparatus and another remote apparatus. The received location information is utilized to determine that the first remote apparatus and the another remote apparatus are proximal to each other. Access rights are updated within a network service to enable the user of the another remote apparatus to access content associated with the user of the first remote apparatus.
    Type: Application
    Filed: March 13, 2009
    Publication date: September 16, 2010
    Applicant: Nokia Corporation
    Inventors: Hannu Antero Simonen, Jarno Tapio Vayrynen, Jani Bostrom
  • Publication number: 20100207726
    Abstract: An electronic entity includes a processing circuit (210) capable of receiving a request from a reader and a position sensor (230) capable of measuring an orientation of the electronic entity and of delivering to the processing circuit (210) an item of information indicative of the measured orientation. The processing circuit (210) automatically transmits data to the reader in response to the request provided that the information indicates that the electronic entity is in an orientation included in a predetermined set of orientations.
    Type: Application
    Filed: February 12, 2010
    Publication date: August 19, 2010
    Applicant: OBERTHUR TECHNOLOGIES
    Inventors: Sylvestre DENIS, Gerald GALAN
  • Publication number: 20100176920
    Abstract: This invention relates to a method and system for providing digital security by means of a reconfigurable physical uncloneable function, RPUF. The RPUF comprises a physical system constituted by distributed components arranged to generate a first response when receiving a first challenge at a point of the physical system. The physical reconfiguring of the RPUF comprises redistributing the components such that they generate a second response, which differs from said first response, when again applying the first challenge at the point. The reconfiguration step is further utilized in providing secure storage for digital items. The digital item is data of any kind, including data that needs to be accessed and updated, i.e. which is dynamic in nature. The method is exemplified by implementations such as secure storage of a key, a secure counter and a seed generator.
    Type: Application
    Filed: June 10, 2008
    Publication date: July 15, 2010
    Applicant: INTRINSIC ID BV
    Inventors: Klaus Kursawe, Pim T. Tuyls
  • Patent number: 7710289
    Abstract: A communication apparatus with an anti-theft mode is provided. A preferred embodiment of the apparatus includes an input unit and a CPU. The input unit is for generating an operational signal in response to an operational input. The CPU is for receiving an anti-theft mode signal and setting the communication apparatus in an anti-theft mode, and disabling communication functions of the communication apparatus when the operational signal received from the input unit is a communication operational signal and the communication apparatus is in the anti-theft mode.
    Type: Grant
    Filed: June 28, 2007
    Date of Patent: May 4, 2010
    Assignees: Hong Fu Jin Precision Industry (ShenZhen) Co., Ltd., Hon Hai Precision Industry Co., Ltd.
    Inventors: Fang-Hua Liu, Shih-Fang Wong
  • Publication number: 20100085149
    Abstract: A mount according to the various aspects of the present invention for coupling to a provided object, releasably coupling a provided security device, and providing an information. The mount includes a body, a first coupler, a second coupler, a conductor, and a data carrier. The first coupler for coupling the body to the object. The second coupler for releasably coupling the body to the security device. The conductor for electrically coupling to the security device. The data carrier is positioned in the body and electrically couples to the conductor to provide the information via the conductor. The security device receives the information only while coupled to the second coupler. The data carrier remains in the body while the security device is decoupled from second coupler. The information comprises a unique identifier.
    Type: Application
    Filed: November 30, 2009
    Publication date: April 8, 2010
    Applicant: Roc2Loc Inc.
    Inventors: Roc Lastinger, John Spenik, Brian Woodbury
  • Patent number: 7683759
    Abstract: A patient identification device is disclosed. The device includes a first sensor, a second sensor, and a processor. The first sensor may be configured to be positioned on the patient's finger. The device may include a camera. The device may include an identifier. The identifier displays a randomly generated alphanumeric code for further identification of the patient.
    Type: Grant
    Filed: October 6, 2004
    Date of Patent: March 23, 2010
    Assignee: Martis IP Holdings, LLC
    Inventors: Dinesh J. Martis, Edward S. Biggins, Frederick M. Oehler, Lawrence G. Smith, Olivier Fischer, Jason C. Hispkind, George P. Jones
  • Publication number: 20100071072
    Abstract: Access to a license protected asset is limited by storing license information associated with the asset on at least one radio frequency identification (RFID) tag. Access to the asset is allowed only upon successful retrieval and verification of the license information by a device having at least one RFID reader.
    Type: Application
    Filed: October 26, 2007
    Publication date: March 18, 2010
    Applicant: INTERMEC IP CORP.
    Inventors: Josh Holland, James Seely, Dennis Born, Phyllis Tuner-Brim
  • Publication number: 20100060415
    Abstract: An electronic entity includes contact communication elements (4) and remote communication elements (6). Members (2, K) are also provided to authorize an exchange of certain data at least via the remote communication elements based on the prior reception of an instruction via the contact communication elements. A terminal for communication with such an electronic entity as well as methods for controlling and for customizing the electronic entity are disclosed.
    Type: Application
    Filed: July 24, 2006
    Publication date: March 11, 2010
    Applicant: OBERTHUR CARD SYSTEM SA
    Inventor: Christophe Goyet
  • Patent number: 7667570
    Abstract: A lock and key mechanism comprising a sensor detecting friction between first and second nanostructured surfaces and a controller receiving output from the sensor and comparing same to stored values. Also a method for activating or deactivating a lock comprising providing a first nanostructured surface, causing a second nanostructured surface to frictionally interact with the first nanostructured surface, sensing the interaction with a sensor, the sensor producing an output signal, and via a controller comparing the sensor output signal to a reference signal.
    Type: Grant
    Filed: May 12, 2005
    Date of Patent: February 23, 2010
    Assignee: Lockheed Martin Corporation
    Inventor: Christian Adams
  • Patent number: 7656271
    Abstract: A commercially viable solution for providing an asset management system that provides for accessing assets, tracking location of assets, managing OSHA compliance of the assets, and monitoring impact of the assets. The asset management system may utilize system architecture having intelligent wireless devices associated with the individual assets. The use of intelligent wireless devices allows for the asset management system to operate and maintain functionality substantially without loss of data in the event of a loss of communication between the wireless devices and a management computing system via a network, including an out-of-range condition of the wireless devices with respect to a local monitor.
    Type: Grant
    Filed: April 28, 2003
    Date of Patent: February 2, 2010
    Assignee: I.D. Systems, Inc.
    Inventors: Kenneth S. Ehrman, Michael L. Ehrman, Jeffrey M. Jagid, Joseph M. Pinzon, Yaron Hecker, Leonard Pimentel
  • Publication number: 20090322476
    Abstract: The disclosure provides a system and method for associating an electronic device with a remote electronic device. In the method at the remote device, an authentication process is initiated to authenticate the remote device to the electronic device. The authentication process includes: generating a pass key according to an authentication protocol followed by the remote device; and providing the pass key to a user through an output device on the remote device. The method also includes: waiting for the user to provide the pass key to the electronic device; and if the remote device receives a timely message from the electronic device indicating that the remote device has been authenticated, activating additional applications on the remote device to allow it to communicate with the electronic device.
    Type: Application
    Filed: June 27, 2008
    Publication date: December 31, 2009
    Inventors: Sanathan KASSIEDASS, Sean Taylor
  • Patent number: 7636030
    Abstract: A wireless user interface is operable to interface with an industrial control system including a device operable to store a first password and a wireless interface module operable to store a second password. The wireless user interface includes a processing unit operable to prompt a user for the first and second passwords, connect to the wireless interface module using the second password, and establish a first connection through the wireless interface module to access the device using the second password.
    Type: Grant
    Filed: October 26, 2005
    Date of Patent: December 22, 2009
    Assignee: Rockwell Automation Technologies, Inc.
    Inventors: Christine E. Weingarth, Neil W. Knutsen, James S. Rustad, Elena N. Pokatayev
  • Patent number: 7633375
    Abstract: An RFID notification unit enables an RFID reader to regularly read the RFID code of an RFID tag attached to the relevant terminal itself, its user and its current location and transmits the RFID code to a server. Upon receipt of this code, the using qualification determination unit of the server determines the current using qualification of the terminal referring to a using condition storage unit. When a user attempts to open an important information file, a file using control unit issues a request to the server. A permit determination unit determines whether to permit the opening of the relevant file, based on the using qualification and the storage contents of a file/level storage unit. When the opening is permitted, the important information file is downloaded onto the terminal or its decoding key is returned.
    Type: Grant
    Filed: May 31, 2006
    Date of Patent: December 15, 2009
    Assignee: Fujitsu Limited
    Inventors: Chiaki Matsuda, Kenji Oosawa, Yuji Morita
  • Publication number: 20090303045
    Abstract: A shipping and tracking system has a number of tracking stations that are geographically distributed. The tracking stations gather information from shipping items processed by the shipping and tracking system. The shipping and tracking system provides an enhanced level of security for selected shipping items. The enhanced level of security for the selected shipping items is based at least on the information gathered at the tracking stations. The enhanced security is provided in such a way that personnel of the shipping and delivery system cannot physically discern whether or not a shipping item is being shipped with enhanced security.
    Type: Application
    Filed: June 4, 2009
    Publication date: December 10, 2009
    Applicant: Intermec IP Corp.
    Inventor: Steven J. Winter
  • Publication number: 20090303030
    Abstract: Configuring functional capabilities in a data processing system comprising entitlement data in a non-volatile storage. The position of the data processing system is determined. Based on said position, functional capabilities are changed based on position information comprised in the entitlement data. Changing functional capabilities consists of enabling functional capabilities, disabling functional capabilities, and both enabling and disabling functional capabilities.
    Type: Application
    Filed: June 5, 2009
    Publication date: December 10, 2009
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Christine Axnix, Martin Eckert, Juergen Probst
  • Publication number: 20090299770
    Abstract: A computer-based system for providing physicians automatic, secure access to patient records at the time a patient visits and consults a physician. The system can include one or more computing devices configured to process and display data. The system can also include one or more emitting devices carried by physicians for identifying each particular physician and one or more scanning devices configured to detect and communicatively link to the one or more emitting devices based on the proximity of the physician to an examination room. Additionally, the system can include a manager module communicatively linked to the one or more scanning devices and configured to manage the signal data from the one or more scanning devices.
    Type: Application
    Filed: May 26, 2009
    Publication date: December 3, 2009
    Applicant: The Quantum Group, Inc.
    Inventors: Pedro Martinez, Noel Guillama
  • Patent number: 7623022
    Abstract: Methods are described for securing access to an electronic annotation provided on an object. The methods include the steps of providing the object with a plurality of memory tags, providing an electronic annotation on at least one of the memory tags, and defining a sequence in which the memory tags must be accessed in order to access the annotation. A corresponding object is also described.
    Type: Grant
    Filed: September 29, 2005
    Date of Patent: November 24, 2009
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Christopher Tofts, James Thomas Edward McDonnell
  • Publication number: 20090267728
    Abstract: A method and system for providing an interactive experience to a visitor of an entertainment venue comprising a plurality of locations. The visitor is assigned a portable identification device having stored thereon information uniquely identifying the visitor. A central computer then randomly directs the visitor to a first one of the locations and retrieves at the first location the information from the identification device in order to identify the visitor. In this manner, the visitor can be presented with content customized according to his/her unique profile.
    Type: Application
    Filed: April 21, 2009
    Publication date: October 29, 2009
    Inventor: YVES MAYRAND
  • Publication number: 20090267732
    Abstract: There is disclosed a single space parking meter that includes a low powered radio for communicating with a mobile access point. There is also provided a parking meter management system comprising a single space parking meter and a mobile access point. The mobile access point comprises a coin collection cart, and a mobile data collection terminal including a wireless radio for communicating with the wireless radio of the single space parking meter. Also disclosed is a method of managing single space parking meters comprising the steps of collecting and storing meter information in a single space parking meter, receiving at a main electronics board of the single space parking meter a transmit signal, and transmitting the meter information to a mobile access point using a low powered radio of the single space parking meter.
    Type: Application
    Filed: April 27, 2009
    Publication date: October 29, 2009
    Inventors: Gregory Emile Chauvin, Neil Stuart Erskine, George Allan Mackay
  • Publication number: 20090262381
    Abstract: In an external authentication system for a multifunction printer according to the present invention, a USB device management section, according to an instruction from a USB device management section instructing section, (i) performs a virtualization process for virtually connecting an information processing device to a user information reading device which is locally connected to a multifunction printer, (ii) manages a status of the connection between the information processing device and the user information reading device; and a multifunction printer association management section associates the multifunction printer controlled by the information processing device with the user information reading device which is locally connected to the multifunction printer.
    Type: Application
    Filed: April 21, 2009
    Publication date: October 22, 2009
    Applicant: Sharp Kabushiki Kaisha
    Inventor: Kunihiko Tsujimoto
  • Publication number: 20090251285
    Abstract: At least one N-sided physical object proximate to a computing device can be detected. Each side of the N-sided physical object can be associated with at least one enablement state for a functionality of the computing device. A side of the N-sided object that faces a reference plane can be sensed. An enablement state of a functionality of at least one computing device can be programmatically changed to correspond to an enablement state indicated by the N-sided physical object.
    Type: Application
    Filed: April 7, 2008
    Publication date: October 8, 2009
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: LYDIA M. DO, PAMELA A. NESBITT, LISA A. SEACAT
  • Patent number: 7589642
    Abstract: Upon receiving a keystroke indicator signal from a remote control device, a key code generator device identifies a codeset usable to communicate with a selected consumer device. The keystroke indicator signal contains an indication of a pressed key, which corresponds to a function of the selected consumer device. Using the identified codeset and the key indication, the key code generator device generates a key code and modulates that key code onto a radio frequency carrier signal, thereby generating a first key code signal. The remote control device receives the first key code signal from the key code generator device and modulates the key code onto an infrared frequency carrier signal, thereby generating a second key code signal. The remote control device relays the key code to the selected consumer device in the second key code signal. The key code causes the selected consumer device to perform the desired function.
    Type: Grant
    Filed: December 16, 2003
    Date of Patent: September 15, 2009
    Assignee: UEI Cayman Inc.
    Inventor: Daniel SauFu Mui
  • Patent number: 7579961
    Abstract: A system, method, and apparatus for controlling consumer electronic (CE) devices are provided. A remote control unit controls one or more CE devices by obtaining control information necessary to control each CE device from a Consumer Electronic Device Control Database (CEDB). A CEDB provides control information, such as command codes and metadata, for various CE devices as well as providing a mapping between CE device types, CE brands, and particular CE devices. A remote control unit accesses the records provided by a CEDB to provide automatic and programistic control of CE devices.
    Type: Grant
    Filed: September 15, 2005
    Date of Patent: August 25, 2009
    Assignee: OpenPeak Inc.
    Inventors: Paul Krzyzanowski, Keith Nelson, Glenn Harter, Jonathan Alaimo
  • Publication number: 20090210940
    Abstract: A system and method of granting and removing a user's security access to applications on a computer using proximity of authorized RFID tags is disclosed. A user having an authorized RFID tag that is located near the computer will be granted access to pre-authorized applications.
    Type: Application
    Filed: January 23, 2009
    Publication date: August 20, 2009
    Applicant: Intermec IP Corp.
    Inventor: Stephen Dean
  • Publication number: 20090206992
    Abstract: A healthcare management system and method provide efficient and secure access to private information. A portable physical device, referred to herein as a Personal Digital Key or “PDK”, stores one or more profiles in memory. The biometric profile is acquired in a secure trusted process and is uniquely associated with an individual that is authorized to use and is associated with the PDK. The PDK can wirelessly transmit the identification information including a unique PDK identification number and the biometric profile over a secure wireless channel for use in an authentication process. The PDK is configured to wirelessly communicate with a reader. A provider interface coupled to the reader, and the reader is further configured to receive profile information from the PDK. The healthcare management system also includes an auto login server configured to communicate with the provider interface to allow access to information in a patient database.
    Type: Application
    Filed: February 13, 2009
    Publication date: August 20, 2009
    Applicant: PROXENSE, LLC
    Inventors: John J. Giobbi, Ryan Gallivan, Kent Yundt
  • Patent number: 7532876
    Abstract: A reception intensity measuring unit measures a reception intensity of a radio wave received by a radio reception unit under control of a connection control unit. When it is judged that the reception intensity of the received radio wave is larger than a reception intensity set in advance, the reception intensity measuring unit controls a transmission intensity changing unit to lower a transmission intensity of a radio wave to be transmitted from a radio transmission unit. When the transmission intensity of the radio wave to be transmitted from the radio transmission unit is lowered by the transmission intensity changing unit, an authentication processing unit executes authentication processing with another apparatus via the radio reception unit and the radio transmission unit and controls an authentication data registering unit to register authentication data, which is obtained as a result of the authentication processing, in a memory.
    Type: Grant
    Filed: September 27, 2004
    Date of Patent: May 12, 2009
    Assignee: Sony Corporation
    Inventors: Kazuyuki Yamamoto, Shin Iima
  • Publication number: 20090045914
    Abstract: A write-protection module for a storage device and the method thereof are disclosed. The write-protection module includes a power supply circuit, a fingerprint sensor, a database, and a microprocessor. The microprocessor for receiving the working power produced by the power supply circuit to maintain operation is respectively coupled to the power supply circuit, the fingerprint sensor, and the database. The fingerprint sensor receives the fingerprint input of a user, and the microprocessor receives the output signal of the fingerprint sensor and converts the output signal into an input cryptograph. Finally, the microprocessor compares the input cryptograph with a predetermined cryptograph stored in the database to produce a comparison information, and determines whether or not the user may access data.
    Type: Application
    Filed: October 4, 2007
    Publication date: February 19, 2009
    Applicant: TRANSCEND INFORMATION , INC.
    Inventor: Chun-Yu Hsieh
  • Publication number: 20090040020
    Abstract: A computer message that is being sent from a consumer to a computer resource is checked to determine whether the computer message meets all of a set of one or more specified conditions. If so, the computer message is compared with a baseline, the baseline containing a set of computer messages which have been classified according to whether or not each of the computer messages of the set represents acceptable behaviour in the context of the computer resource. If the comparison with the baseline determines that the computer message represents acceptable behaviour in the context of the computer resource, the computer message is permitted to be passed to the computer resource.
    Type: Application
    Filed: August 6, 2008
    Publication date: February 12, 2009
    Applicant: Secerno Ltd.
    Inventors: Stephen Anthony Moyle, Paul Anthony Galwas
  • Publication number: 20080303631
    Abstract: Embodiments of a mass storage device having a locking mechanism are described. The mass storage device includes a wireless reader to receive identification data from a wireless transponder, and to determine if the identification data matches a pre-stored data. The mass storage device includes a first controller device to enable access to at least a portion of a mass storage unit when the wireless reader determines that the identification data matches the pre-stored data. In one embodiment, a method of locking a mass storage device is described. The method includes receiving first identification data from a first wireless transponder at a mass storage device and unlocking the mass storage device upon determining that the first identification data matches a first pre-stored data.
    Type: Application
    Filed: June 5, 2007
    Publication date: December 11, 2008
    Inventors: John S. Beekley, Donald A. Lieberman, Ngon V. Le
  • Publication number: 20080278285
    Abstract: When a recording media 10 including secure areas is inserted in an electronic terminal 30, the electronic terminal 30 reads a predetermined program from the recording media 10. As a result of processing performed by the program, the recording media 10 judges a boot state of the electronic terminal 30 when the recording media 10 is inserted in the electronic terminal 30. As a result of the judgment, when the recording media 10 is inserted in the electronic terminal 30 immediately after the electronic terminal 30 is booted, the recording media 10 imposes a loose restriction of accessing the secure areas. As a point of time when the recording media 10 is inserted in the electronic terminal 30 is nearer to a point of time when the boot of the electronic terminal 30 has been completed, the recording media 10 imposes a severer restriction of accessing the secure areas.
    Type: Application
    Filed: December 5, 2007
    Publication date: November 13, 2008
    Inventors: Hideki Matsushima, Rieko Asai, Manabu Maeda, Kaoru Yokota
  • Publication number: 20080238612
    Abstract: A computer that self-administers operating in restricted and unrestricted operating modes boots from a main processor and operates normally in the unrestricted operating mode and operates from an alternate processor in a security module in the restricted operating mode. The alternate processor may communicate directly with peripheral devices such as a display controller and keyboard. Because the main processor is not used and may not even be started in the restricted operating mode, viruses, shims, and other related attacks are virtually eliminated. In one embodiment, the security module may operate as a PCI bus master when in the restricted operating mode.
    Type: Application
    Filed: March 28, 2007
    Publication date: October 2, 2008
    Applicant: MICROSOFT CORPORATION
    Inventor: Todd L. Carpenter
  • Patent number: 7397341
    Abstract: A lock and key system is configured to sense an operational signature generated by an object placed into a keyway in the system. The system is further configured to compare the operational signature with a reference signature, and to generate an alarm when the operational signature differs from the reference signature by a threshold.
    Type: Grant
    Filed: April 13, 2006
    Date of Patent: July 8, 2008
    Assignee: Honeywell International, Inc.
    Inventors: Rajeshwari Bhat, Dinesh Kumar K N, Francis C V Saju
  • Publication number: 20080157920
    Abstract: A method for providing varying levels of security access to an engine controller using security levels and seed and key programs to calculate access codes for the levels of security access.
    Type: Application
    Filed: November 14, 2007
    Publication date: July 3, 2008
    Applicant: Detroit Diesel Corporation
    Inventor: Frank S. Groer
  • Publication number: 20080140482
    Abstract: Methods and systems for preventing unauthorized use of a mobile asset are described. The method for providing access to the mobile asset can include providing a control device on the mobile asset. The control device is in communication with the mobile asset to selectively control whether the mobile asset is enabled for operation. The method also includes storing data in the control device that identifies a group of potential operators who are permitted to operate that mobile asset. This stored data includes unique password data for each potential operator in the permitted group. Further, the method includes receiving an identifier and password from an accessing operator and comparing by the control device of the received identifier to the stored data to order confirm that the accessing operator is a potential operator.
    Type: Application
    Filed: November 28, 2007
    Publication date: June 12, 2008
    Applicant: I.D. Systems, Inc.
    Inventors: Kenneth S. Ehrman, Michael L. Ehrman, Jeffrey M. Jagid, Joseph M. Pinzon, Yaron Hecker, Leonard Pimentel
  • Patent number: 7382226
    Abstract: A lock (10, 40, 42, 58) for security devices 26, such as banknote dispensers, to limit access to a confined space (32, 34) within the device. A remote computer (28) exclusively controls opening of the lock (10, 40, 42, 58). A plurality of the devices may form a network controlled by the remote computer (28).
    Type: Grant
    Filed: March 13, 2002
    Date of Patent: June 3, 2008
    Assignee: Mr Eletronic Sa
    Inventor: Jean-Luc Monnier
  • Patent number: 7375615
    Abstract: An apparatus is disclosed for reducing the vexatious complication of personal authentication when using an information technology device or a card. A combination of RFID tags worn by a user is stored when personal authentication is carried out. The RFID tags are detected again In a situation where personal authentication is required. The continuous use of the previous personal authentication is permitted depending on the extent of coincidence between pieces of RFID information thus detected and the combination of stored RFID information, so that further authentication operations can be omitted. In addition, reference is made to a past archive when an RFID list is created. A weighted coefficient is then calculated based on the put-on frequency (put-on archive) in terms of a user's single article or a combination of such articles. The utilization of the weighted coefficient provides personal authentication with a high level of reliability.
    Type: Grant
    Filed: June 8, 2005
    Date of Patent: May 20, 2008
    Assignee: Hitachi, Ltd.
    Inventors: Kenji Kitagawa, Motoaki Satoyama
  • Patent number: 7352288
    Abstract: A malfunction of interpreting one remote control operation as a plurality of remote control operations by mistake is prevented without impairing the responsiveness of a remote controller. A counter code which is updated each time a key of the remote controller is operated is added to a remote control signal. If an electronic device acquires the remote control signal from a control bus, the counter code contained in the remote control signal is checked to determine whether or not a remote control signal having the same count has already been acquired from the remote control light reception unit. If such a remote control signal has already been acquired, the remote control signal acquired subsequently is invalidated. Consequently, it is possible to prevent the inconvenience of a plurality of operations from being carried out due to validated remote control signals subsequently obtained through the control bus, without setting a certain time period in which all signals are considered to be the same.
    Type: Grant
    Filed: June 9, 2004
    Date of Patent: April 1, 2008
    Assignee: Alpine Electronics, Inc.
    Inventor: Takashi Miyake