Abstract: An EAS system employs multiple antennas which are in separate electrical circuits and do not overlap to avoid magnetic coupling. Each antenna is paired with each other antenna. The controls for the system employ multi-function amplifier filters (MAF) to perform a difference operation on the signals in each pair. The results are converted from analog to digital and directed to a digital signal processor (DSP). The DSP adjusts digital potentiometers to minimize the differences at the MAFs. The controls then operate at least one antenna to pulse generate an interrogation field. The controls monitor the antenna signals for additional signal at the MAFs. The DSP performs pattern recognition on additional signals at the MAFs to distinguish types of EAS tags.
Abstract: A reader for article identification comprises one or more solenoids configured to generate a magnetic field for locally exciting portions of a marker element carrying at least one data feature as the marker element moves through the magnetic field and for causing the marker element to generate a varying magnetic field; and one or more giant magnetoimpedance (GMI) sensors upstream of the one or more solenoids configured to detect the varying magnetic field and produce output based on the varying magnetic field.
Type:
Application
Filed:
July 5, 2016
Publication date:
March 2, 2017
Applicant:
Custom Security Industries Inc.
Inventors:
Morton ROSEMAN, Piotr RUDKOWSKI, Grazyna RUDKOWSKA, Arthur YELON, David MENARD, Stephan BRAUER
Abstract: A fast and reliable single or dual transfer process is provided. Unlike prior art foil transfer techniques, which rely on the very fragile nature of the transferred pattern and/or shape to obtain a clean break at the die edge, the present invention is directed toward relatively non-tearable or tear resistant materials that can be difficult or impossible to effectively transfer using these known foil transfer techniques. This problem is addressed by precision cutting, for example, patches in the relatively non-tearable or tear resistant material positioned on a carrier substrate and in one exemplary embodiment transferring areas surrounding the cut patches to a sacrificial carrier substrate. The resulting sharply defined, precision cut patches left on the carrier substrate may then be transferred to objects to be protected such as banknotes.
Abstract: A security device and base for a mobile device. The security device includes a body, at least two sliding arms coupled to the body, and a leveling plate coupled to the body and configured to receive the mobile device.
Abstract: A programmable security system and method for protecting an item of merchandise includes a programming station, a programmable key and a security system. The programming station generates a security code and communicates the security code to a memory of the programmable key. The programmable key initially communicates the security code to a memory of the security device and subsequently operates the security device upon a matching of the security code in the memory of the security device with the security code in the memory of the programmable key. The programmable key may also transfer power via electrical contacts or inductive transfer from an internal battery to the security device to operate a lock mechanism. The security code may be communicated by wireless infrared (IR) systems, electrical contacts or inductive transfer. A timer inactivates the programmable key and/or the security device after a predetermine period of time.
Type:
Grant
Filed:
August 19, 2016
Date of Patent:
February 21, 2017
Assignee:
InVue Security Products Inc.
Inventors:
Christopher J. Fawcett, Jeffrey A. Grant, Dennis D. Belden, Jr., Ronald M. Marsilio, Ian R. Scott
Abstract: Exemplary embodiments of the present invention include receiving subscriber identity information for a cellular network at a mobile communication device via a short-range wireless communication network. The subscriber identity information is received from a device issued by a provider of the cellular network. Exemplary embodiments further include storing the subscriber identity information at a subscriber identity module embedded in the mobile communication device. Exemplary embodiments additionally include transmitting the subscriber identity information from the subscriber identity module to a server of the provider for authenticating a subscriber of the cellular network. Exemplary embodiments still further include receiving, from the server of the provider, authorization for the subscriber to access the cellular network, and accessing the cellular network via the mobile communication device.
Type:
Grant
Filed:
March 2, 2015
Date of Patent:
February 14, 2017
Assignee:
Giesecke & Devrient Mobile Security America, Inc.
Abstract: An anti-theft device for protecting a portable electronic device from theft or unauthorized removal in a retail environment is provided. A shroud may at least partially enclose a portable electronic device. A dock may releasably engage the shroud such that the shroud and portable electronic device are locked to the dock when engaged with the dock. A key may engage activate a lock mechanism to release the shroud and the portable electronic device from the dock.
Type:
Grant
Filed:
June 10, 2014
Date of Patent:
February 14, 2017
Assignee:
InVue Security Products Inc.
Inventors:
Andrew W. Moock, Jeffrey A. Grant, Christopher J. Fawcett, Nicholas M. Sedon, Matthew Thomas Kerley
Abstract: A propane burner assembly is provided for producing a fast cook-off environment. The burner assembly includes a frame, parallel delivery pipes, a pair of manifolds with a corresponding pair of feed lines, a supply line, a fuel reservoir, a valve and an igniter pilot. The frame geometrically defines a platform region with a plurality of corners. The frame includes at least two opposite sides. The delivery pipes are supported by the frame. Each delivery pipe has a plurality of orifices. The manifold pair supplies propane to the delivery pipes. The manifolds are respectively disposed adjacent the two opposite sides. The feed lines transport propane to the manifolds. The fuel reservoir stores the propane. The supply line delivers propane from the fuel reservoir to the feed lines. The valve controls delivery of propane to the feed lines. The igniter pilot initiates combustion. Activating the valve enables propane to eject through the orifices to propagate combustion within the frame.
Type:
Application
Filed:
December 18, 2015
Publication date:
January 26, 2017
Applicants:
United States of America, as represented by the Secretary of the Navy, Kratos Defense & Security Solutions, Inc.
Inventors:
David O. Hubble, Jon J. Yagla, Ephraim B. Washburn, Kevin P. Ford
Abstract: Security systems and methods configured for use with an item of merchandise for retail display include a housing, at least one sensor carried by the housing and at least one output device carried by the housing. The security system further includes a controller carried by the housing and operably coupled to the sensor and to the output device. The controller is operable to determine a distance traveled by the item of merchandise from a retail display “home” position based upon a sensor input from the sensor, and to activate the output device based upon the distance traveled by the item of merchandise exceeding a threshold distance. The controller may utilize the at least one sensor in conjunction with an inertial navigation system (INS) and motion processing algorithms or techniques to determine the distance traveled by the item of merchandise from the retail display “home” position.
Type:
Grant
Filed:
September 23, 2014
Date of Patent:
January 24, 2017
Assignee:
InVue Security Products Inc.
Inventors:
Jeffrey A. Grant, Michael R. Johnston, Jonathon D. Phillips
Abstract: A linear gate drive assembly with a drive rail connectable to a gate panel. The drive rail has a first drive surface. A linear drive portion is coupled to the first drive surface and has teeth thereon with a first rolling tooth profile. The linear drive portion defines a toothed second drive surface. Dive motors are pivotally coupled to a support structure. A first drive wheel is attached to one drive motor and engages the first drive surface to impart an axial drive force on the drive rail. A second drive wheel is attached to another drive motor and engages the second drive surface. The second drive wheel has second teeth that mate with the first teeth and that define a second rolling tooth profile that substantially corresponds to the first rolling tooth profile. Rotation of the second drive wheel imparts axial and normal forces via a rolling teeth interface the mating teeth for moving the drive rail and the gate panel.
Type:
Application
Filed:
March 16, 2016
Publication date:
January 19, 2017
Applicant:
Hy-Security Gate, Inc.
Inventors:
David Younce, Geoffrey M. Pate, Brian G. DeNault, Steven A. Carlsen
Abstract: A method for issuing a certificate signing request (CSR) certificate in a vehicle-to-anything (V2X) communication environment includes: receiving, at a first server, a certificate issuance request message including vehicle identification information transmitted from a communication module of the vehicle; determining, by a second server, whether a CSR certificate corresponding to the vehicle identification information has already been issued with reference to a database; and determining, by the second server, whether to issue the corresponding CSR certificate or whether to generate an error message, based on the determination of whether the corresponding CSR certificate has already been issued.
Type:
Grant
Filed:
December 15, 2014
Date of Patent:
December 20, 2016
Assignees:
Hyundai Motor Company, Penta Security System Inc.
Inventors:
Jong Rok Park, Cho Rong Ryu, Dae Sung Hwang, Su Lyun Sung, Dong Gyu Noh, Hahk Rel Noh, Duk Soo Kim, Sang Gyoo Sim, Eun Ho Shin, Jung Bai Kim, Byung Gwan Kim, Seok Woo Lee, You Sik Lee
Abstract: An apparatus for preventing unwanted opening of a locked enclosure. The enclosure includes a lock, a door and a door bolt. The door is openable when the door bolt is retracted from a structure surrounding the enclosure. The apparatus includes a frangible guard plate, and an arm coupled to the guard plate by a spring. The arm is maintained in a first position under a bias of the spring. When the guard plate is fractured, the arm is free to move from the first position into a second position. The arm is positioned to engage the door bolt in the second position, thereby preventing retraction of the door bolt.
Abstract: A programmable security system and method for protecting an item of merchandise includes a programming station, a programmable key and a security system. The programming station generates a security code and communicates the security code to a memory of the programmable key. The programmable key initially communicates the security code to a memory of the security device and subsequently operates the security device upon a matching of the security code in the memory of the security device with the security code in the memory of the programmable key. The programmable key may also transfer power via electrical contacts or inductive transfer from an internal battery to the security device to operate a lock mechanism. The security code may be communicated by wireless infrared (IR) systems, electrical contacts or inductive transfer. A timer inactivates the programmable key and/or the security device after a predetermine period of time.
Type:
Grant
Filed:
January 28, 2015
Date of Patent:
November 22, 2016
Assignee:
InVue Security Products Inc.
Inventors:
Christopher J. Fawcett, Jeffrey A. Grant
Abstract: Determining an entity's cybersecurity risk and benchmarking that risk includes non-intrusively collecting one or more types of data associated with an entity. Embodiments include calculating a security score for at least one of the one or more types of data based, at least in part, on processing of security information extracted from the at least one type of data, wherein the security information is indicative of a level of cybersecurity. Some embodiments also comprise assigning a weight to the calculated security score based on a correlation between the extracted security information and an overall security risk determined from analysis of one or more previously-breached entities in the same industry as the entity. Embodiments include calculating an overall cybersecurity risk score for the entity based, at least in part, on the calculated security score and the weight assigned to the calculated security score.
Type:
Grant
Filed:
May 1, 2015
Date of Patent:
November 22, 2016
Assignee:
Security Scorecard, Inc.
Inventors:
Aleksandr Yampolskiy, Rob Blackin, Alexander Heid, Samuel Kassoumeh
Abstract: A programmable security system and method for protecting an item of merchandise includes a programming station, a programmable key and a security system. The programming station generates a security code and communicates the security code to a memory of the programmable key. The programmable key initially communicates the security code to a memory of the security device and subsequently operates the security device upon a matching of the security code in the memory of the security device with the security code in the memory of the programmable key. The programmable key may also transfer power via electrical contacts or inductive transfer from an internal battery to the security device to operate a lock mechanism. The security code may be communicated by wireless infrared (IR) systems, electrical contacts or inductive transfer. A timer inactivates the programmable key and/or the security device after a predetermine period of time.
Type:
Grant
Filed:
February 18, 2016
Date of Patent:
October 25, 2016
Assignee:
InVue Security Products Inc.
Inventors:
Christopher J. Fawcett, Jeffrey A. Grant, Dennis D. Belden, Jr., Ronald M. Marsilio, Ian R. Scott
Abstract: A network traffic analysis method for tracking, analyzing, and mitigating security threats in a network includes receiving information based on monitoring traffic at a plurality of layers at one or more monitors deployed in the network utilizing deep packet inspection; receiving information based on monitoring the traffic at an endpoint of the network; analyzing the monitored traffic from the endpoint and the one or more monitors to determine network infrastructure and cyber security posture of the network infrastructure; and providing visualizations based on the network infrastructure and the cyber security posture, continuously to track threats, watch lateral movement in the network of the traffic, and determine security event history in the network.
Type:
Application
Filed:
April 20, 2016
Publication date:
October 20, 2016
Applicant:
Phirelight Security Solutions Inc.
Inventors:
David James Wayne TEEPLE, Christopher A. DODUNSKI