Patents Assigned to Secure-it Inc.
-
Patent number: 8479545Abstract: A key body and an associated lock core are disclosed. The disclosed lock core includes a core body, a core sleeve, a core plug, and a side pin assembly including a side pin, a region pin, and a spring.Type: GrantFiled: November 29, 2011Date of Patent: July 9, 2013Assignee: Stanley Security Solutions, Inc.Inventor: Diana Teixeira
-
Publication number: 20130173913Abstract: A method of arming or disarming a building security system includes transferring an electronic security credential file from an authorizing environment to a mobile computing device. The electronic security credential file is read by the mobile computing device to extract authentication data. The authentication data is transmitted from the mobile computing device and received at the building security system. Within the building security system, the authentication data is used to verify that a user of the mobile computing device is authorized to communicate with the building security system. The mobile computing device is enabled to communicate with the building security system only if the electronic security credential file has been used to verify that a user of the mobile computing device is authorized to communicate with the building security system.Type: ApplicationFiled: December 31, 2012Publication date: July 4, 2013Applicants: Bosch Security Systems Inc.Inventors: Bosch Security Systems Inc., Robert Bosch GmbH
-
Publication number: 20130169817Abstract: The present invention is directed to providing a method and system that enables a first responder firefighter to take command of a building having a potential fire event. Using the method and system herein, the firefighter is able to clearly signal and guide the safe evacuation of that building. Also mounted in the building are signal arrays that are controlled and triggered by the firefighter to clearly delineate a safe and efficient evacuation route from the building. Room signal stations are provided and can be shown to the first responder firefighter to help prioritize the rescue of a building and allows for interaction and communication between an occupant and a firefighter in order to facilitate or enable more efficient and safer rescue.Type: ApplicationFiled: June 27, 2012Publication date: July 4, 2013Applicant: NetTalon Security Systems, Inc.Inventors: Donald R. Jones, Hussein Mohammed Nosair, Ronald Dubois, David E. Kimmel
-
Publication number: 20130167190Abstract: A mobile communication device surveillance system is described. The system includes a gateway, a web server, a wireless mobile communication device, and a client device. The web server introduces the wireless mobile communication device to a gateway. The gateway authenticates the wireless mobile communication device. The gateway receives media data from the wireless mobile communication device and monitoring data from a security device connected to the gateway. The gateway aggregates the media data and the monitoring data, and communicates the aggregated data to the client device authenticated with the gateway.Type: ApplicationFiled: December 22, 2011Publication date: June 27, 2013Applicant: Next Level Security Systems, Inc.Inventors: Peter A. Jankowski, Daniel T. Petkevich, Rand D. Anderson, Brett J. Going
-
Publication number: 20130155352Abstract: At least a portion of a polarizing layer in the display screen is omitted or removed to temporarily disable image generation but an equivalent polarizing layer is used as a replacement or as a substitute for enabling the display of images on the screen. For instance, the omitted or removed polarizing layer can be replaced in situ or a remote polarizing layer can be substituted through which the images on the display can be seen. The selective reassembly of the display can be used for purposes of security or promotion.Type: ApplicationFiled: May 10, 2011Publication date: June 20, 2013Applicant: Document Security Systems, Inc.Inventor: Kenneth M. Wicker
-
Publication number: 20130152646Abstract: An electromechanical cylinder lock includes an outer lock shell and a rotatable lock barrel located therein which is controlled by dual locking features. A side bar or fence selectively blocks and permits rotation of the barrel with respect to the shell in response to insertion of a key into a keyway in the barrel. A slider bar is movable between a blocking position in which the side bar is prevented from permitting rotation of the barrel, and an unblocking position in which the side bar permits rotation of the barrel. Alternately, a blocking mechanism is provided to block motion of tumbler pins in the cylinder lock. A shape memory alloy actuator, such as a wire made of nitinol, disposed in the barrel is activated by an electric current in response to determination by an electronic control device whether an attempt to open the lock is authorized. Thermal interlock protection from external heating of the lock is also provided.Type: ApplicationFiled: January 24, 2013Publication date: June 20, 2013Applicant: Medeco Security Locks, Inc.Inventor: Medeco Security Locks, Inc.
-
Publication number: 20130155402Abstract: An inline spectroscopic reader having a light source, one or more optics heads, a spectrometer and a data processing system in digital communication with the spectrometer detector. The optics heads include transmission optics providing for the illumination of a target with light from the light source and detection optics providing for the collection of light from the target. Typically, the target is moving with respect to the optics head during spectroscopic interrogation. The spectroscopic reader is thus an inline reader well suited to provide spectrum based production or analytical decision making in real time as the target moves along a production or analysis line. Also disclosed are methods including the steps of illuminating a target with light from a light source; collecting light from the target; obtaining a digitized spectrum with a spectrometer; extracting information content from the digitized spectrum; and basing a contemporaneous process decision upon the information content.Type: ApplicationFiled: August 31, 2011Publication date: June 20, 2013Applicant: Cabot Security Materials, Inc.Inventors: Ian D. Walton, William E. Doering, Michael J. Natan
-
Publication number: 20130141587Abstract: A building security system includes means for detecting human motion. An imaging device scans for a visible code in response to the detection of human motion by the detecting means. A security device deciphers the scanned code, determines an authorization level associated with the deciphered code, and provides the human with a level of access to the building commensurate with the authorization level.Type: ApplicationFiled: December 2, 2011Publication date: June 6, 2013Applicants: Robert Bosch GmbH, Bosch Security Systems Inc.Inventor: Dennis M. Petricoin, JR.
-
Publication number: 20130141239Abstract: A building security system includes a security sensor for sensing a security breach associated with a building. An electronic location-detecting device senses fixed geographic coordinates of the building. An electronic processor responds to a security breach sensed by the security sensor by transmitting an alarm signal to a central monitoring station. The alarm signal includes the fixed geographic coordinates of the building sensed by the location-detecting device.Type: ApplicationFiled: December 2, 2011Publication date: June 6, 2013Applicants: Robert Bosch GmbH, Bosch Security Systems Inc.Inventor: Dennis M. Petricoin, JR.
-
Patent number: 8456532Abstract: A method and a system for transcode avoidance of a data stream from a camera at a client device are described. A camera generates data streams with each data stream having a corresponding data configuration. A web server discovered by the camera dynamically determines data configuration for each data stream, the configuration of the client device, and the network conditions at the client device. The web server dynamically identifies a data stream for the client device based on the data configuration of each data stream from the camera, the configurations of the client device, and the network conditions at the client device so that the client device or an intermediary device do not need to transcode the identified data stream. The web server refers the client device to receive the identified data stream from the camera.Type: GrantFiled: April 25, 2011Date of Patent: June 4, 2013Assignee: Next Level Security Systems, Inc.Inventors: Daniel T. Petkevich, Rand D. Anderson, Brett J. Going, Peter A. Jankowski
-
Patent number: 8444181Abstract: A verifiable/copy-protected document features a combination of nearly identical line-screen patterns for embedding latent images within visually integrated settings. The latent images can be detected for purposes of verification with a matching viewer but are indistinguishable from their visually integrated settings under ordinary viewing conditions. The line-screen patterns, which can be incorporated into document artwork, are printed at certain combinations of line frequencies and print densities so that the line-screen patterns digitally reproduce as a largely undifferentiated solid tint.Type: GrantFiled: August 16, 2007Date of Patent: May 21, 2013Assignee: Document Security Systems, Inc.Inventors: Thomas M. Wicker, David M. Wicker, Michael Scott Caton
-
Patent number: 8429429Abstract: A method is provided for protecting a computer system, comprising: attaching a security descriptor to a process running on a processor of the computer system; associating with the security descriptor an isolation indicator that indicates the process runs in an isolation mode; calling a system routine by the isolated process that is also callable by a process that is not running in isolation mode; attempting to write to an object of a disk or a registry by the system routine called by the isolated process; determining whether the system routine is requesting the write on behalf of the isolated process or not; if the write is requested on behalf of the isolated process, then performing the write in a pseudo storage area; and if the write is requested on behalf of the non-isolated process, then performing the write in an actual storage area in which the disk or registry resides.Type: GrantFiled: October 25, 2010Date of Patent: April 23, 2013Assignee: Secure Vector, Inc.Inventors: James B. Kargman, Peter Scott, Jeffrey Bromberger
-
Patent number: 8423766Abstract: In a server for authenticating a user, an acquiring unit acquires current authentication information that is created using an arbitrary value and that is used for a current authentication process, from user. A receiving unit receives first transmission information in which next authentication information to be used for a next authentication process is hidden using the current authentication information, and second transmission information in which the arbitrary value is hidden using the next authentication information, from the user. A calculating unit calculates the next authentication information based on the first transmission information and the current authentication information, and the arbitrary value based on calculated next authentication information and the second transmission information. A determining unit determines whether to authenticate the user based on the arbitrary value and the current authentication information.Type: GrantFiled: March 7, 2006Date of Patent: April 16, 2013Assignee: Trinity Security Systems, Inc.Inventors: Akihiro Shimizu, Takasuke Tsuji
-
Patent number: 8423483Abstract: Various embodiments are directed to a computer implemented method for updating a policy that is enforced by a computer program. In one embodiment, a computer communicates, to a user, data regarding one or more decisions made by the program over a period of time according to a policy. Each decision is made on the particular policy in force at the time the decision is made. Policy data for the policy is stored in a machine readable format. The user feedback data indicative of feedback by the user regarding the one or more decisions is stored. The computer identifies and ranks one or more potential variations to the policy based on a score of an objective function for each potential variation. The computer communicates, to the user, one or more suggested modifications based on the ranking of the one or more potential variations to the policy. The computer modifies the policy data based on one or more selections by the user in response to the transmission of the one or more suggested modifications.Type: GrantFiled: May 16, 2009Date of Patent: April 16, 2013Assignees: Carnegie Mellon University, Wombat Security Technology, Inc.Inventors: Norman Sadeh-Koniecpol, Paul Hankes Drielsma, Lorrie Faith Candor, Patrick Kelley
-
Publication number: 20130076507Abstract: A building security system including a security sensor configured to sense a security breach associated with a building. An off-the-shelf portable personal electronic computing device is communicatively coupled to the security sensor and to a central monitoring station. The computing device is programmable within the building to transmit an alarm signal to the central monitoring station in response to the security sensor sensing a security breach associated with the building.Type: ApplicationFiled: September 27, 2011Publication date: March 28, 2013Applicants: Robert Bosch GmbH, Bosch Security Systems Inc.Inventor: Dennis Petricoin, JR.
-
Patent number: 8395501Abstract: A hazardous condition detection system with a sensor package employing a reduced resource microprocessor capable of dynamic alarm sensitivity adjustment having volatile and non-volatile memory which receives periodic raw sensor readings from the sensor package and preprocesses each received periodic raw sensor reading by employing at least three distinctive filtering constants which are compared to alarm thresholds stored in memory to generate an alarm condition signal when ionization levels in the ambient environment exceed stored thresholds.Type: GrantFiled: March 8, 2011Date of Patent: March 12, 2013Assignee: Universal Security Instruments, Inc.Inventor: Eric V. Gonzales
-
Publication number: 20130057694Abstract: A battery-powered camera is mounted within the interior of a suitcase. The camera has an awake mode in which the camera captures a plurality of images in response to it being detected that the suitcase is in an open position. A controller switches the camera from a sleep mode to the awake mode in response to the user actuating an awake mode switch, a motion detector mounted to the suitcase detecting motion of the suitcase, and/or a touch sensor mounted to the suitcase detecting a human being touching the suitcase.Type: ApplicationFiled: September 1, 2011Publication date: March 7, 2013Applicants: Robert Bosch GmbH, Bosch Security Systems Inc.Inventor: DENNIS M. PETRICOIN, JR.
-
Patent number: 8378821Abstract: A pluggable security device for protecting an electronic device, such as a laptop, is disclosed. The pluggable security device has a battery, a siren, and an optional accelerometer. The security device is triggered by unplugging from the electronic device, or by sensing acceleration, or by disconnecting the electronic device from AC power or from a network. Once the security device is triggered and its internal siren is activated, it can only be deactivated by reinserting the pluggable security device into the electronic device it has been disconnected from and by entering a password in the electronic device.Type: GrantFiled: March 26, 2010Date of Patent: February 19, 2013Assignee: Cicada Security Technology Inc.Inventors: Fredric Edelstein, James Morrison
-
Patent number: 8377847Abstract: An image destruct material comprises a release layer positioned between an image receiving layer and a base layer. The adhesion between the release layer and the base layer is greater than adhesion between the release layer and the image receiving layer. The release layer material can be used in secure documents that have an image receiving layer. After information is printed on the image receiving layer, an overlaminate is applied over it. Removal of the overlaminate destroys the printed image on the receiving layer because of the relative adhesive properties of the image receiving layer, overlaminate and release layer.Type: GrantFiled: November 15, 2010Date of Patent: February 19, 2013Assignee: L-1 Secure Credentialing, Inc.Inventors: Daoshen Bi, Tung-Feng Yeh, Robert L. Jones, Brian C. Labrec
-
Publication number: 20130038724Abstract: A surveillance camera arrangement includes a camera assembly that is tiltable about a tilt axis and that has a first electrical connector. A flat cable includes first and second opposite ends connected to the first electrical connector and to a second electrical connector, respectively. The cable has a thickness, and a width at least twice as great as the thickness. The cable is bent into a J-shape wherein the width direction of the cable is substantially parallel to the tilt axis of the camera assembly.Type: ApplicationFiled: August 8, 2011Publication date: February 14, 2013Applicants: Robert Bosch GmbH, Bosch Security Systems Inc.Inventor: Eric McCormick