Patents Assigned to CERTIS CISCO SECURITY PTE LTD
  • Patent number: 12283108
    Abstract: This document describes a method for identifying anomaly constructs in real-time based on multimodal surveillance data, the identification being done using a multimodal sensory and cognitive abstraction module. Meta-descriptors are generated for the surveillance data and subsequently, meta-descriptor embeddings are generated for the meta-descriptors whereby the meta-descriptor embeddings are used by an anomaly assertion model to detect anomaly constructs within the surveillance data.
    Type: Grant
    Filed: November 15, 2023
    Date of Patent: April 22, 2025
    Assignee: CERTIS CISCO SECURITY PTE LTD
    Inventor: Keng Leng Albert Lim
  • Patent number: 11514373
    Abstract: The bionic computing system includes a perception subsystem, an attention subsystem, and a temporal-spatial awareness subsystem. The perception subsystem has several perceptual devices for detecting objects from sequences of sensory data and generating an object record for each object. The attention subsystem adjusts the object records by re-identifying the tracking identities across sensory devices, generates several object associations, generate several location associations, and generates several motion implications. The temporal-spatial awareness subsystem organizes and retains the object records in a working memory space.
    Type: Grant
    Filed: June 26, 2020
    Date of Patent: November 29, 2022
    Assignees: BigObject, Inc., CERTIS CISCO SECURITY PTE LTD.
    Inventors: Wenwey Hseush, Shyy San Foo
  • Patent number: 10693904
    Abstract: A system and method for disrupting an information security threat that constitutes an attack on a computer asset in a computer network is provided. The provided system and method disrupts this information security threat after the attack on the computer asset has been detected by at least one of the monitoring devices on the affected computer network. An intermediate upstream gateway of the affected computer network is then utilized to disrupt this information security threat. As the detected attack is being disrupted, a mitigation action will be automatically initiated if a mitigation action associated with the attack is stored in the system's database; else information about the attack will be sent to a central command centre for further assessment. At the central command centre, a mitigating action will be further developed and executed to address the intention of the attack.
    Type: Grant
    Filed: March 18, 2015
    Date of Patent: June 23, 2020
    Assignee: CERTIS CISCO SECURITY PTE LTD
    Inventor: Keng Leng Albert Lim
  • Patent number: 10419453
    Abstract: This invention relates to a system and method for simultaneously displaying real-time information security threat posture of a plurality of computers and its intermediary networks that are under surveillance. In particular, the invention involves displaying a three-dimensional abstract object that has been scaled according to the size and orientation of a display screen so that the entirety of the three-dimensional abstract object may be simultaneously viewed by viewers of the display technology in its entirety. The displayed three-dimensional abstract object is made up of an amalgamation of semi-translucent three-dimensional shapes that are arranged together to achieve the unified shape and form of the three-dimensional abstract object.
    Type: Grant
    Filed: December 14, 2015
    Date of Patent: September 17, 2019
    Assignee: CERTIS CISCO SECURITY PTE LTD
    Inventor: Keng Leng Albert Lim
  • Patent number: 9609677
    Abstract: The system provides secure controlled access to multiple Bluetooth devices issued to users. For example an officer may be issued a weapon. To enable monitoring of weapon status, a Bluetooth sensor may be fitted to a holster and the Officer issued with a Bluetooth enabled mobile phone. In order to establish a secure Bluetooth connection between the devices, sensor contains a restored link key and the mobile phone stores a partial link key. The supervisor enters their username and password, and a secret key into the phone which is then used with the partial link key to generate a copy of the link key stored in the first device, so that a secure connection can be established with the first device. The officer enters their username and password into the sensor, and once the secure connection is established it is sent over the secure connection to the mobile phone which then sends both user names and passwords to a verification authority.
    Type: Grant
    Filed: September 4, 2012
    Date of Patent: March 28, 2017
    Assignee: CERTIS CISCO SECURITY PTE LTD
    Inventors: Poh Beng Tan, Martin James Baptist, Keen Hon Wong, Honching Lui, Xiang Li
  • Publication number: 20160156636
    Abstract: A system for securely controlling access between two wireless (i.e. Bluetooth-enabled) apparatuses, also comprising a supervisor apparatus. The first apparatus is paired to the second by establishing a secure wireless (i.e. Bluetooth) link The first apparatus includes a stored partial link key and a link key generator: The first apparatus receives a first secret key from the apparatus user, and may also receive a second secret key from the supervisor apparatus. The link key generator generates either a first link key based upon a stored first partial link key, the first secret key and the second secret key or a second link key based upon the stored first partial link key and the first secret key. An access control module in the second apparatus determines the level of access that the first apparatus is granted based upon the link key used to establish the secure connection—full/restricted access.
    Type: Application
    Filed: March 18, 2014
    Publication date: June 2, 2016
    Applicant: CERTIS CISCO SECURITY PTE LTD.
    Inventors: Poh Beng TAN, Martin James BAPTIST, Keen Hon WONG, Honching LUI, Xiang LI
  • Publication number: 20130038448
    Abstract: An access control system is disclosed comprising a credential reader arranged to gather at least one credential from a person desiring to pass through an access point associated with the access control system, the system being arranged to use the at least one credential to provide an indication about the identity of the person. The system also comprises at least one access control device controlling access through a respective access point such that a person is allowed or denied access dependent on whether the person is positively identified, and a data storage device that stores data indicative of a current security level applicable for each access point associated with the system, the security level defining the criteria required to provide a positive identification of the person. Stored security level data can be modified to change the criteria required for positively identifying a person.
    Type: Application
    Filed: May 25, 2012
    Publication date: February 14, 2013
    Applicant: CERTIS CISCO SECURITY PTE LTD
    Inventors: Kai Yew Paul Chong, Joon Keng Yong, Honching Lui, Liang Cheng Wang