Patents Assigned to Angel Secure Networks, Inc.
  • Patent number: 10185816
    Abstract: Described herein are devices and techniques for remotely controlling user access to a restricted computer resource. The process includes obtaining an image from equipment of a user, wherein the image includes an indication of an individual and an indication of a local environment. The individual is identified within the image to obtain an identification of the individual, and the local environment is determined as a predetermined local environment based on the identification of the local environment. Access to a restricted computing resource is facilitated based on the determining that the individual is the user and that the local environment is the predetermined local environment. Other embodiments are disclosed.
    Type: Grant
    Filed: July 11, 2017
    Date of Patent: January 22, 2019
    Assignee: Angel Secure Networks, Inc.
    Inventor: Fred Hewitt Smith
  • Patent number: 9742771
    Abstract: A system that incorporates the subject disclosure may perform, for example, operations including receiving a request from a first device to access information content of a second device. The process further includes forwarding a token to the second device by way of a second wireless network, to obtain a second device token, and forwarding the token to the first device by way of the first network to obtain a first device token, wherein the first device forwards the first device token to the second device by way of a third network. A confirmation that the token was received at the first device is based on the result of the comparison indicating a match between the first device token and the second device token. Access to the information content of the second device is authorized in response to the confirmation. Other embodiments are disclosed.
    Type: Grant
    Filed: January 25, 2016
    Date of Patent: August 22, 2017
    Assignee: Angel Secure Networks, Inc.
    Inventors: Fred Hewitt Smith, Cynthia Smith
  • Patent number: 9740846
    Abstract: Described herein are devices and techniques for remotely controlling user access to a restricted computer resource. The process includes obtaining an image from a communication device of a user. An individual and a landmark are identified within the image. Determinations are made that the individual is the user and that the landmark is a predetermined landmark. Access to a restricted computing resource is granted based on the determining that the individual is the user and that the landmark is the predetermined landmark. Other embodiments are disclosed.
    Type: Grant
    Filed: May 25, 2015
    Date of Patent: August 22, 2017
    Assignee: ANGEL SECURE NETWORKS, INC.
    Inventor: Fred Hewitt Smith
  • Patent number: 9390280
    Abstract: A server uses an encryption key to decrypt authentication information thereby facilitating communication with network-accessible applications that may be remotely located from the server. Servers can also use encryption keys to decrypt files containing sensitive data. The encryption key is obtained by a collection of software agents, each providing a portion of information necessary for generating the encryption key. Each software agent performs a respective examination, the results of which determine whether the respective portion of information is valid or not. A complete encryption key can be obtained only when all of the contributing portions of information are valid.
    Type: Grant
    Filed: September 16, 2013
    Date of Patent: July 12, 2016
    Assignee: Angel Secure Networks, Inc.
    Inventors: Benjamin Smith, Daniel Sabin, Fred Hewitt Smith
  • Patent number: 9355228
    Abstract: A system that incorporates teachings of the subject disclosure may include, for example, receiving multiple software agents and configuring a network of the multiple software agents according to a predetermined policy. The process can further include facilitating secure communications among software agents of the network of the multiple software agents according to the predetermined policy. A state of one of the system, a system environment within which the system operates, or a combination thereof can be determined, based on the secure communications among the software agents of the network of the multiple software agents. A computing environment can be facilitated conditionally on the state of the one of the system, the system environment, or the combination thereof, according to the predetermined policy to support a mission application. Other embodiments are disclosed.
    Type: Grant
    Filed: July 15, 2013
    Date of Patent: May 31, 2016
    Assignee: Angel Secure Networks, Inc.
    Inventors: Fred Hewitt Smith, III, Cynthia Smith, Benjamin Smith, Daniel Sabin
  • Patent number: 9270660
    Abstract: A system that incorporates the subject disclosure may perform, for example, operations including receiving a request from a first device to access information content of a second device. The process further includes determining that the first device is authorized to access the information content according to authorization credentials, and determining a token associated with the request in response to determining that the first device is authorized to access the information content. The token is forwarded to the first device, and it is confirmed that the token was received at the first device. Access to the information content of the second device is authorized in response to confirming that the token was received at the first device. Other embodiments are disclosed.
    Type: Grant
    Filed: November 25, 2013
    Date of Patent: February 23, 2016
    Assignee: ANGEL SECURE NETWORKS, INC.
    Inventors: Fred Hewitt Smith, Cynthia Smith
  • Patent number: 9058482
    Abstract: Described herein are devices and techniques for remotely controlling user access to a restricted computer resource. The process includes pre-determining an association of the restricted computer resource and computer-resource-proximal environmental information. Indicia of user-proximal environmental information are received from a user requesting access to the restricted computer resource. Received indicia of user-proximal environmental information are compared to associated computer-resource-proximal environmental information. User access to the restricted computer resource is selectively granted responsive to a favorable comparison in which the user-proximal environmental information is sufficiently similar to the computer-resource proximal environmental information. In at least some embodiments, the process further includes comparing user-supplied biometric measure and comparing it with a predetermined association of at least one biometric measure of an authorized user.
    Type: Grant
    Filed: March 1, 2012
    Date of Patent: June 16, 2015
    Assignee: ANGEL SECURE NETWORKS, INC.
    Inventor: Fred Hewitt Smith
  • Patent number: 8930717
    Abstract: Described herein are devices and techniques related to implementation of a trustworthy electronic processing module. During fabrication, a manufacturer is provided with partial technical specifications that intentionally exclude at least one critical design feature. Fabrication of the electronic processing module is monitored from a trusted remote location; wherefrom, the intentionally excluded at least one critical design feature is implemented, thereby completing manufacture of the trustworthy electronic processing module. At least one of the acts of monitoring and implementing can be accomplished by instantiating executable software remotely from a trusted remote location and immediately prior to execution. It is the executable software that enables at least one of the acts of monitoring and implementing. Further, the instantiated executable software is removed or otherwise rendered inoperable immediately subsequent to execution.
    Type: Grant
    Filed: March 1, 2012
    Date of Patent: January 6, 2015
    Assignee: Angel Secure Networks, Inc.
    Inventor: Fred Hewitt Smith
  • Patent number: 8917177
    Abstract: An apparatus is disclosed including one or more security structures. The one or more security structures includes: a weldable frame; a plurality of composite panels, each panel securable to the weldable frame, each composite panel configured to form at least one joint with at least one adjoining composite panel; and a respective security element embedded within each of the composite panels. The security element is configured to detect a breach in the composite panel.
    Type: Grant
    Filed: December 11, 2012
    Date of Patent: December 23, 2014
    Assignee: Angel Secure Networks, Inc.
    Inventor: Fred Hewitt Smith
  • Patent number: 8803685
    Abstract: A method for scanning and securing a container including a plurality of at least partially composite panels defining an interior volume is disclosed. The method includes: storing unique identification information in an identification element within container; sealing the container; monitoring the container for intrusion; without breaching the seal of the container, remotely identifying the container based on the unique identity information without breaching the seal of the container; without breaching the seal of the container; scanning the identified container to determine the presence or absence of a nuclear weapon in the interior volume; and if the scan determines no nuclear weapon is present remotely storing certificate information associated with the identity of the container in a remote monitor unit.
    Type: Grant
    Filed: February 1, 2008
    Date of Patent: August 12, 2014
    Assignee: Angel Secure Networks, Inc.
    Inventor: Fred Hewitt Smith
  • Publication number: 20140157392
    Abstract: A system that incorporates the subject disclosure may perform, for example, operations including receiving a request from a first device to access information content of a second device. The process further includes determining that the first device is authorized to access the information content according to authorization credentials, and determining a token associated with the request in response to determining that the first device is authorized to access the information content. The token is forwarded to the first device, and it is confirmed that the token was received at the first device. Access to the information content of the second device is authorized in response to confirming that the token was received at the first device. Other embodiments are disclosed.
    Type: Application
    Filed: November 25, 2013
    Publication date: June 5, 2014
    Applicant: ANGEL SECURE NETWORKS, INC.
    Inventors: Fred Hewitt Smith, Cynthia Smith
  • Publication number: 20140082354
    Abstract: A server uses an encryption key to decrypt authentication information thereby facilitating communication with network-accessible applications that may be remotely located from the server. Servers can also use encryption keys to decrypt files containing sensitive data. The encryption key is obtained by a collection of software agents, each providing a portion of information necessary for generating the encryption key. Each software agent performs a respective examination, the results of which determine whether the respective portion of information is valid or not. A complete encryption key can be obtained only when all of the contributing portions of information are valid.
    Type: Application
    Filed: September 16, 2013
    Publication date: March 20, 2014
    Applicant: Angel Secure Networks, Inc.
    Inventors: Benjamin Smith, Daniel Sabin, Fred Hewitt Smith
  • Publication number: 20140061082
    Abstract: An apparatus is disclosed including one or more security structures. The one or more security structures includes: a weldable frame; a plurality of composite panels, each panel securable to the weldable frame, each composite panel configured to form at least one joint with at least one adjoining composite panel; and a respective security element embedded within each of the composite panels. The security element is configured to detect a breach in the composite panel.
    Type: Application
    Filed: December 11, 2012
    Publication date: March 6, 2014
    Applicant: ANGEL SECURE NETWORKS INC.
    Inventor: ANGEL SECURE NETWORKS INC.
  • Patent number: 8537009
    Abstract: A dosimeter is disclosed for use in container including outer walls defining an interior volume, the dosimeter including: a radon detection element adapted to detect a radon level for the interior volume; a neutron detection element adapted detect a neutron level for the interior volume. The dosimeter is adapted to measure the radon level and neutron level for a period of time, compare the measured radon level to a first threshold, compare the measured neutron level to a second threshold, and determine information indicative of the presence or absence of fissile material within the interior volume based on the comparisons.
    Type: Grant
    Filed: February 1, 2008
    Date of Patent: September 17, 2013
    Assignee: Angel Secure Networks, Inc.
    Inventors: Charles T. Hess, Fred Hewitt Smith
  • Patent number: 8531292
    Abstract: A design and manufacturing methods for reusable, stackable shipping containers made from composite materials is described. The composite material is embedded with optical fibers, data and electrical paths, and various types of components. These embedded devices are capable of detecting intrusions through the container walls, securely storing and processing information, and securely communicating information to other containers and to remote devices.
    Type: Grant
    Filed: July 14, 2005
    Date of Patent: September 10, 2013
    Assignees: University of Maine System Board of Trustees, Angel Secure Networks, Inc.
    Inventors: Habib J. Dagher, Fred Hewitt Smith
  • Patent number: 8533855
    Abstract: A secure detection network system includes plurality of remote nodes, each remote node comprising a set of detector interfaces configured to couple to a set of detectors disposed to detect the presence of an illegal asset within a shipping container; at least one server node configured to initialize, install, and authenticate each remote node in the plurality of remote nodes, including delivering to each remote node an agent module, said agent module for each remote node comprising a node specific configuration file defining a set of nodes with which the remote node can communicate and a different encryption means corresponding to each node in the set of nodes; and a communication path coupling the plurality of remote nodes and the at least one server node.
    Type: Grant
    Filed: April 18, 2011
    Date of Patent: September 10, 2013
    Assignee: Angel Secure Networks, Inc.
    Inventors: Fred Hewitt Smith, Benjamin Hewitt Smith, Cynthia Smith
  • Patent number: 8344885
    Abstract: An apparatus is disclosed including one or more security structures. The one or more security structures includes: a weldable frame; a plurality of composite panels, each panel securable to the weldable frame, each composite panel configured to form at least one joint with at least one adjoining composite panel; and a respective security element embedded within each of the composite panels. The security element is configured to detect a breach in the composite panel.
    Type: Grant
    Filed: January 22, 2009
    Date of Patent: January 1, 2013
    Assignee: Angel Secure Networks Inc.
    Inventor: Fred Hewitt Smith
  • Patent number: 8336107
    Abstract: A method is disclosed for securing sensitive material on a computer system comprising a network of computers from unauthorized access by a root level user of the computer system, the method including the steps of: limiting access to the sensitive material to one or more authorized users; controlling the operation of one or more system functions to prevent unauthorized access to the sensitive material.
    Type: Grant
    Filed: April 28, 2008
    Date of Patent: December 18, 2012
    Assignee: Angel Secure Networks, Inc.
    Inventor: Fred Hewitt Smith
  • Publication number: 20120227117
    Abstract: Described herein are devices and techniques related to implementation of a trustworthy electronic processing module. During fabrication, a manufacturer is provided with partial technical specifications that intentionally exclude at least one critical design feature. Fabrication of the electronic processing module is monitored from a trusted remote location; wherefrom, the intentionally excluded at least one critical design feature is implemented, thereby completing manufacture of the trustworthy electronic processing module. At least one of the acts of monitoring and implementing can be accomplished by instantiating executable software remotely from a trusted remote location and immediately prior to execution. It is the executable software that enables at least one of the acts of monitoring and implementing. Further, the instantiated executable software is removed or otherwise rendered inoperable immediately subsequent to execution.
    Type: Application
    Filed: March 1, 2012
    Publication date: September 6, 2012
    Applicant: ANGEL SECURE NETWORKS, INC.
    Inventor: Fred Hewitt Smith
  • Publication number: 20120227091
    Abstract: Described herein are devices and techniques for implementing a polymorphic network adapted to change network path configurations among a number of pre-determined network path configurations in response to a perceived threat. Such perceived threats can include detection of an unknown process, or simply according to some schedule, or randomly to prevent or otherwise reduce susceptibility to such perceived threats. Multiple (e.g., redundant) network communications paths can be pre-configured between two endpoints. Network communications between the two endpoints can be periodically redirected, for example, in response to a perceived threat or according to one or more rules and/or a schedule to otherwise avoid a perceived threat. A system adapted to permit such pre-configuration of multiple network paths can include an access restrictor in communication with a network configuration controller to prohibit unauthorized pre-configuration of the network paths.
    Type: Application
    Filed: March 1, 2012
    Publication date: September 6, 2012
    Applicant: ANGEL SECURE NETWORKS, INC.
    Inventor: Fred Hewitt Smith