Patents Assigned to Secure-it Inc.
-
Patent number: 8833663Abstract: The invention relates to identification documents, and in particular to pre-printing processing covert images, such as UV or IR images, provided on such identification documents. In one implementation, the invention provides a method of processing a digital image that is to be printed on a surface of an identification document as a fluorescing-capable image to improve the quality of the image. Edges or boundaries are detected within the image, the detected edges or boundaries forming an intermediate image. The edges or boundaries within the image are emphasized, and the emphasized image is used for printing the covert image. In some implementations of the invention, a digital watermark is embedded in the covert image.Type: GrantFiled: October 18, 2010Date of Patent: September 16, 2014Assignee: L-1 Secure Credentialing, Inc.Inventors: Nelson T. Schneck, Charles F. Duggan, Robert L. Jones, Daoshen Bi
-
Publication number: 20140259114Abstract: A method and a system for monitoring a threat are described. The system has a gateway, a web server, and a client device. The gateway detects, identifies, and tracks a threat at a location associated with the gateway. The gateway is coupled to a security device. The web server has a management application configured to communicate with the gateway. The client device communicates with the gateway identified by the web server. The gateway aggregates monitoring data from the security device and from other security devices respectively coupled to other gateways correlated with the gateway. The client device receives the aggregated monitoring data and controls the security device coupled to the respective gateway from a web-based user interface at the client device.Type: ApplicationFiled: March 8, 2013Publication date: September 11, 2014Applicant: Next Level Security Systems, Inc.Inventors: Peter A. Jankowski, Chen-Lan Yen, Rand D. Anderson
-
Publication number: 20140253330Abstract: A programmable security system and method for protecting an item of merchandise includes a programming station, a programmable key and a security system. The programming station generates a security code and communicates the security code to a memory of the programmable key. The programmable key initially communicates the security code to a memory of the security device and subsequently operates the security device upon a matching of the security code in the memory of the security device with the security code in the memory of the programmable key. The programmable key may also transfer power via electrical contacts or inductive transfer from an internal battery to the security device to operate a lock mechanism. The security code may be communicated by wireless infrared (IR) systems, electrical contacts or inductive transfer. A timer inactivates the programmable key and/or the security device after a predetermine period of time.Type: ApplicationFiled: April 16, 2014Publication date: September 11, 2014Applicant: InVue Security Products Inc.Inventors: Christopher J. Fawcett, Jeffrey A. Grant, Dennis D. Belden, JR., Ronald M. Marsilio, Ian R. Scott
-
Publication number: 20140253331Abstract: A programmable security system and method for protecting an item of merchandise includes a programming station, a programmable key and a security system. The programming station generates a security code and communicates the security code to a memory of the programmable key. The programmable key initially communicates the security code to a memory of the security device and subsequently operates the security device upon a matching of the security code in the memory of the security device with the security code in the memory of the programmable key. The programmable key may also transfer power via electrical contacts or inductive transfer from an internal battery to the security device to operate a lock mechanism. The security code may be communicated by wireless infrared (IR) systems, electrical contacts or inductive transfer. A timer inactivates the programmable key and/or the security device after a predetermine period of time.Type: ApplicationFiled: April 16, 2014Publication date: September 11, 2014Applicant: InVue Security Products Inc.Inventors: Christopher J. Fawcett, Jeffrey A. Grant, Dennis D. Belden, JR., Ronald M. Marsilio, Ian R. Scott
-
Publication number: 20140254866Abstract: A method and a system for predictive analysis using vehicle license plate recognition are described. The system has a gateway, a web server, and a client device. The gateway is coupled to security devices. The web server has a management application configured to communicate with the gateway. The client device communicates with the gateway identified by the web server. The gateway monitors data from security devices coupled to the gateway. A predictive behavioral model is generated using historical data from the monitoring data comprising identified characters in license plates of vehicles monitored by the security devices.Type: ApplicationFiled: March 8, 2013Publication date: September 11, 2014Applicant: Next Level Security Systems, Inc.Inventors: Peter A. Jankowski, Chen-Lan Yen, Rand D. Anderson
-
Publication number: 20140254878Abstract: A method and a system for identifying a license plate of a vehicle are described. The system has a gateway, a web server, and a client device. The gateway is coupled to a security device. The web server has a management application configured to communicate with the gateway. The client device communicates with the gateway identified by the web server. A non-infrared camera connected to the gateway visually scans a location having a plurality of parked vehicles, and identifies characters in the license plates of the plurality of parked vehicles.Type: ApplicationFiled: March 8, 2013Publication date: September 11, 2014Applicant: Next Level Security Systems, Inc.Inventors: Peter A. Jankowski, Chen-Lan Yen, Rand D. Anderson
-
Patent number: 8832432Abstract: A system and method for validating SCEP certificate enrollment that enforces the pairing of a SCEP challenge password and a set of expected certificate request content. A SCEP Validation Service or software residing in another system component whether a certificate request is legitimate by comparing it to registered SCEP challenges and associated expected certificate request content. This system and method addresses a privilege-escalation vulnerability in prior SCEP-based systems that could lead to a practical attack.Type: GrantFiled: August 13, 2013Date of Patent: September 9, 2014Assignee: Certified Security Solutions, Inc.Inventors: Gary A. Galehouse, Wayne A. Harris, Edward R. Shorter, Kevin M. Tambascio
-
Patent number: 8824750Abstract: A method and a system for distributing facial identifiers to gateways are described. The system has one or more gateways and a web server associate with the gateways. Each gateway is coupled to a video capturing device. The web server identifies one or more gateways using a metadata associated with a picture of a face. The web server then distributes the picture of the face and the metadata to the identified gateways.Type: GrantFiled: March 19, 2012Date of Patent: September 2, 2014Assignee: Next Level Security Systems, Inc.Inventors: Peter A. Jankowski, Chen-Lan Yen
-
Patent number: 8813173Abstract: A mobile communication device surveillance system is described. The system includes a gateway, a web server, a wireless mobile communication device, and a client device. The web server introduces the wireless mobile communication device to a gateway. The gateway authenticates the wireless mobile communication device. The gateway receives media data from the wireless mobile communication device and monitoring data from a security device connected to the gateway. The gateway aggregates the media data and the monitoring data, and communicates the aggregated data to the client device authenticated with the gateway.Type: GrantFiled: December 22, 2011Date of Patent: August 19, 2014Assignee: Next Level Security Systems, Inc.Inventors: Peter A. Jankowski, Daniel T. Petkevich, Rand D. Anderson, Brett J. Going
-
Publication number: 20140225733Abstract: A programmable security system and method for protecting an item of merchandise includes a programming station, a programmable key and a security system. The programming station generates a security code and communicates the security code to a memory of the programmable key. The programmable key initially communicates the security code to a memory of the security device and subsequently operates the security device upon a matching of the security code in the memory of the security device with the security code in the memory of the programmable key. The programmable key may also transfer power via electrical contacts or inductive transfer from an internal battery to the security device to operate a lock mechanism. The security code may be communicated by wireless infrared (IR) systems, electrical contacts or inductive transfer. A timer inactivates the programmable key and/or the security device after a predetermine period of time.Type: ApplicationFiled: April 16, 2014Publication date: August 14, 2014Applicant: InVue Security Products Inc.Inventors: Christopher J. Fawcett, Jeffrey A. Grant, Dennis D. Belden, JR., Ronald M. Marsilio, Ian R. Scott
-
Patent number: 8803685Abstract: A method for scanning and securing a container including a plurality of at least partially composite panels defining an interior volume is disclosed. The method includes: storing unique identification information in an identification element within container; sealing the container; monitoring the container for intrusion; without breaching the seal of the container, remotely identifying the container based on the unique identity information without breaching the seal of the container; without breaching the seal of the container; scanning the identified container to determine the presence or absence of a nuclear weapon in the interior volume; and if the scan determines no nuclear weapon is present remotely storing certificate information associated with the identity of the container in a remote monitor unit.Type: GrantFiled: February 1, 2008Date of Patent: August 12, 2014Assignee: Angel Secure Networks, Inc.Inventor: Fred Hewitt Smith
-
Patent number: 8794530Abstract: An optically variable magnetic stripe assembly comprises a magnetic layer (5); an optically variable effect generating layer (1) over the magnetic layer; and a metallic reflecting layer (3) adjacent the optically variable effect generating layer and comprising an array of spaced metallic regions shaped as regular polygons.Type: GrantFiled: January 23, 2008Date of Patent: August 5, 2014Assignee: Opsec Security Group Inc.Inventors: Brian William Holmes, Mark Deakes
-
Patent number: 8791439Abstract: A particulate composition comprises a plurality of particles wherein at least one of the particles comprises at least two different crystalline and/or glass phases, each phase comprising a host lattice and a dopant sensitive to electromagnetic radiation. The different phases simultaneously produce different responses on exposure to photons of the same energy, whereby the output from the particulate composition when exposed to said photons is the sum of the responses from the different phases.Type: GrantFiled: October 1, 2010Date of Patent: July 29, 2014Assignee: Cabot Security Materials, Inc.Inventors: Scott Haubrich, Jainisha Shah, Steven R. Cordero
-
Patent number: 8792677Abstract: A method for reducing violence within crowded venues includes reading license plates of vehicles passing into entry ports of a parking area, and capturing facial images of persons seeking admission to the venue. A computer compares such license plates to a database of vehicle license plates associated with persons with past histories of violence. A computer also compares captured facial images to a database of facial data for persons with past violent histories. Upon detecting a match, the computer creates an alert presented to law enforcement officers at the venue to facilitate detention of such persons for investigation. Information recorded on entry tickets is scanned and saved together with the facial image of the ticket holder. If a violent act occurs, cameras within the venue capture facial images of participants. The computer matches such participants to stored identifying data to assist in the identification and apprehension of such persons.Type: GrantFiled: April 19, 2012Date of Patent: July 29, 2014Assignee: Intelligence Based Integrated Security Systems, Inc.Inventor: Stanley Loel Kephart
-
Patent number: 8783194Abstract: A marking apparatus (1) for marking an item (12). The apparatus comprises: means to receive the item; a nucleic acid marker; means to release a marking fluid (8); and a distribution mechanism (11) coupled to the nucleic acid marker and the means to release the marking fluid. The means to release the marking fluid can be activated to release the marking fluid such that the distribution mechanism disperses a mixture of the nucleic acid marker and the marking fluid onto the item.Type: GrantFiled: March 21, 2003Date of Patent: July 22, 2014Assignees: Trace Tag International Limited, 3SI Security Systems, Inc.Inventors: Robert Sleat, Greg Van Lint
-
Patent number: 8789150Abstract: A system and method for providing authentication of a user is disclosed. The use of a non-confidential and unique user identification number and a temporary access code separates authentication of the user from transmission of any user passwords or user-identifiable data, as well as provides a ubiquitous means to authenticate the user with unrelated organizations, without any information passing between those organizations.Type: GrantFiled: September 20, 2012Date of Patent: July 22, 2014Assignee: Kinesis Identity Security System Inc.Inventors: Jonathan G. Bell, Kenneth W. Jennings
-
Publication number: 20140199664Abstract: A training system senses a user action that may expose the user to a threat, such as a cybersecurity threat. The user action may be in response to a mock attack delivered via a messaging service, a wireless communication service, a fake malware application or another device, service, system or mechanism. The system selects a training action from a collection of available training actions and causes the training action to be delivered to the user.Type: ApplicationFiled: March 17, 2014Publication date: July 17, 2014Applicant: Wombat Security Technologies, Inc.Inventors: Norman Sadeh-Koniecpol, Kurt Wescoe, Jason Brubaker, Jason Hong
-
Publication number: 20140199663Abstract: A context-aware training system senses a user action that may expose the user to a threat, such as a cybersecurity threat. The system selects a training action from a collection of available training actions and causes the training action to be delivered to the user or a group of users. The system includes an administrator interface that enables an administrator to select, customize and/or assign constraints to the training action that will be delivered to the user(s).Type: ApplicationFiled: March 17, 2014Publication date: July 17, 2014Applicant: Wombat Security Technologies, Inc.Inventors: Norman Sadeh-Koniecpol, Kurt Wescoe, Jason Brubaker, Jason Hong
-
Patent number: 8782750Abstract: A method and a system for monitoring and controlling remote devices are described. The system has a gateway, a web server, and a client device. The gateway is coupled to a security device. The web server has a management application configured to communicate with the gateway. The management application has a service manager module to enable additional services from the gateway and the security device. The client device communicates with the gateway identified by the web server. The gateway aggregates monitoring data from the security device and from other security devices respectively coupled to other gateways correlated with the gateway. The client device receives the aggregated monitoring data, controls the security device coupled to the respective gateway from a web-based user interface at the client device.Type: GrantFiled: April 25, 2011Date of Patent: July 15, 2014Assignee: Next Level Security Systems, Inc.Inventors: Peter A. Jankowski, Daniel T. Petkevich, Raffy Kaloustian, Brian E. Dean, Xihong Zhuang, Rand D. Anderson
-
Publication number: 20140194605Abstract: A SERS tag comprising a core comprising at least two aggregated particles of a SERS enhancing material wherein the contact point between the particles defines a crevice; and a reporter molecule having a length sufficiently short to fit into the crevice and a conjugated path length which is as large as possible, provided the overall reporter molecule length is maintained sufficiently short to fit into the crevice.Type: ApplicationFiled: March 13, 2014Publication date: July 10, 2014Applicant: Cabot Security Materials, Inc.Inventors: Felicia Tam, Marcelo E. Piotti, Richard G. Freeman