Abstract: A method of operating a loudspeaker includes providing a digital audio signal and identifying a target transfer function to be applied to the signal. At least one coefficient of an FIR filter is generated. The generating includes performing Heyser spiral curve fitting, and fitting a three-dimensional curve based on a magnitude and phase of a target transfer function. The digital audio signal is filtered through the FIR filter. The filtered signal is inputted into the loudspeaker.
Type:
Application
Filed:
June 29, 2010
Publication date:
December 29, 2011
Applicants:
Robert Bosch GmbH, Bosch Security Systems, Inc.
Abstract: A method of identifying motion within a field of view includes capturing at least two sequential images within the field of view. Each of the images includes a respective array of pixel values. An array of difference values between corresponding ones of the pixel values in the sequential images is calculated. A sensitivity region map corresponding to the field of view is provided. The sensitivity region map includes a plurality of regions having different threshold values. A presence of motion is determined by comparing the difference values to corresponding ones of the threshold values.
Type:
Application
Filed:
September 6, 2011
Publication date:
December 29, 2011
Applicants:
Robert Bosch GmbH, Bosch Security Systems, Inc.
Abstract: A vehicle communication gateway configured to be located within an overland vehicle. In one embodiment, the vehicle communication gateway includes a controller; a memory connected to the controller; a short-range wireless communication interface connected to the controller; a long-range wireless communication interface connected to the controller; and an input-output module configured to connect to a CAN bus, an in-vehicle entertainment system, and a user interface. The controller is configured to receive information from the CAN bus, the in-vehicle entertainment system, and the user interface. The controller generates diagnostic messages regarding vehicle systems based on information received through the CAN bus. The controller also synchronizes files between the in-vehicle entertainment system and extra-vehicular devices, and communicates with in-building systems through the short-range wireless communication interface.
Type:
Grant
Filed:
January 6, 2009
Date of Patent:
December 27, 2011
Assignee:
Bosch Security Systems Inc.
Inventors:
Dennis Michael Petricoin, Jr., David L. Anderson
Abstract: Identification documents employing laser-etched or -engraved features are detailed, together with methods for their manufacture. Tactile effects produced by the laser-processed features may be felt by touch, helping confirm the authenticity of such documents.
Abstract: A building security arrangement includes a sensor for emitting an audible alarm signal. A security system installed in the building detects the audible alarm signal and transmits an electrical alarm signal over a public switched telephone network in response to the detection of the audible alarm signal. A central monitoring station receives the electrical alarm signal over the public switched telephone network and notifies an alarm authority in response to receiving the electrical alarm signal.
Type:
Grant
Filed:
November 21, 2008
Date of Patent:
December 27, 2011
Assignees:
Bosch Security Systems Inc, Robert Bosch GmbH
Inventors:
Michael G. Marriam, James R Riley, Steven Markham
Abstract: An electromechanical cylinder lock includes an outer lock shell and a rotatable lock barrel located therein which is controlled by dual locking features. A side bar or fence selectively blocks and permits rotation of the barrel with respect to the shell in response to insertion of a key into a keyway in the barrel. A slider bar is movable between a blocking position in which the side bar is prevented from permitting rotation of the barrel, and an unblocking position in which the side bar permits rotation of the barrel. Alternately, a blocking mechanism is provided to block motion of tumbler pins in the cylinder lock. A shape memory alloy actuator, such as a wire made of nitinol, disposed in the barrel is activated by an electric current in response to determination by an electronic control device whether an attempt to open the lock is authorized. Thermal interlock protection from external heating of the lock is also provided.
Abstract: A method of locating the source of an unknown signal is provided that includes calculating a differential offset for a signal for each of a plurality of positions within a region in which the transmitter must lie, for each of a series of times m with respect to first and second signal relays and respective first and second receivers, the positions of the signal relays and receivers being known, generating a cross-ambiguity function (CAF) using data corresponding to samples of the unknown signal received at the first and second receivers via the first and second signal relays respectively, estimating the level of noise in the CAF, and using this data to obtain a measure of the likelihood that the source is located within defined areas within the region, where the differential offsets are differential time offsets, or differential frequency offsets, or both. The method provides location which is unconditionally convergent.
Type:
Grant
Filed:
October 29, 2007
Date of Patent:
December 20, 2011
Assignee:
Kratos Defense and Security Solutions, Inc.
Abstract: Even with proper access privilege, when a secured file is classified, at least security clearance (e.g. a clearance key) is needed to ensure those who have the right security clearance can ultimately access the contents in the classified secured file. According to one embodiment, referred to as a two-Opronged access scheme, a security clearance key is generated and assigned in accordance with a user's security access level. A security clearance key may range from most classified to non-classified. Depending on implementation, a security clearance key with a security level may be so configured that the key can be used to access secured files classified at or lower than the security level or multiple auxiliary keys are provided when a corresponding security clearance key is being requested. The auxiliary keys are those keys generated to facilitate access to secured files classified respectively less than the corresponding security or confidentiality level.
Type:
Application
Filed:
April 1, 2011
Publication date:
December 1, 2011
Applicants:
Pervasive Security Systems, Inc., Guardian Data Storage, LLC
Inventors:
Gary Mark Kinghorn, Denis Jacques Paul Garcia
Abstract: A transformer saturation compensation circuit for loudspeakers in embodiments of the invention may include one or more of the following features: (a) a transformer with a primary winding and a secondary winding electrically coupled to an output, (b) a high pass filter, (c) a current dependent resistive load electrically coupled in parallel with the capacitor and electrically coupled to an input, (d) a switch located at the primary winding electrically coupled to the capacitor and the resistive load, the switch being rotatable to each of the taps, where the current dependent resistive load provides saturation compensation for different loudspeaker configurations without requiring changes to a highpass filter cutoff frequency, and (e) a resistive load electrically coupled in parallel with the current dependent resistive load and the capacitor.
Abstract: A lock core and key blank are disclosed. The disclosed lock core includes a core body, a core sleeve, a core plug, and a side pin assembly including a side pin, a region pin, and a spring.
Abstract: Retroreflective material is used to create security features in secure documents. Retroreflective material in the document or sheets used for document creation is laser engraved to create optically variable images, identification quality grayscale images, different directional images viewable at corresponding angles of incidence, multidimensional images, and floating images. High refractive index glass beads are selectively applied to areas of a document surface using a variety of techniques. The beads may be applied in the form of a pre-determined or personalized pattern.
Type:
Grant
Filed:
April 13, 2005
Date of Patent:
November 22, 2011
Assignee:
L-1 Secure Credentialing, Inc.
Inventors:
Daoshen Bi, Robert L. Jones, Chris Collins
Abstract: An anti-theft device for protecting a laptop computer or similar portable electronic product from theft or unauthorized removal includes at least one retaining assembly including a laterally extending retaining arm terminating in a retaining hook for engaging a lateral edge of the laptop computer or similar portable electronic product, a retaining leg depending from the retaining arm and a retaining base for receiving the retaining leg in a locked configuration. The retaining arm is adjustable to accommodate laptop computers or similar portable electronic products having various widths and a lock mechanism includes a shuttle fixed to a collar made of a magnetically attractive material and a biasing spring for biasing the shuttle into engagement with the retaining leg of the retaining arm.
Abstract: Query processing system and method by query transformation transform a user request query based on an original DB structure, destined to a DBMS of a DB with some columns encrypted, into a query based on an encrypted DB structure so that the DBMS processes the query. The query is processed irrespective of whether or not the query includes an encryption-related item, and query-processing performance is remarkably improved.
Type:
Grant
Filed:
October 15, 2008
Date of Patent:
November 8, 2011
Assignee:
Penta Security Systems, Inc.
Inventors:
Duk Soo Kim, Jin Hyuk Jung, Eui Seok Kim
Abstract: The present invention relates to identification documents and smart cards. In one implementation, we provide a contactless smart identification document comprising a first contact layer, a second contact layer, and a carrier layer. The carrier layer is sandwiched in between the first and second contact layers, and the carrier layer includes least a transceiver and electronic circuitry. At least a portion of the first and second contact layers migrate into the carrier layer.
Abstract: The present invention provides identification documents with security features. For example, a document may include two or more inks that are designed to cohesively fail upon a de-lamination attack. A resulting failure pattern is preferably difficult to predict. The two or more inks are applied to an identification document including a core and laminate layer. At least one of the inks is characterized such that an adhesive strength of the ink to the core and an adhesive strength of the ink to the laminate layer is each greater than the cohesive strength of the ink itself. Thus, the ink rips apart in a somewhat random-like manner upon a de-lamination attack. The ink can be arranged in interwoven or interlocking patterns or in other desired patterns and locations.
Abstract: A system, method and facility for providing training, which may include basic, initial, developmental, intermediate, advanced, sustainment, training, mission rehearsals, exercises, annual events, missions, and practice scenarios, etc. Training may include props and reconfigurable scenarios simulating, e.g., a sensitive site exploitation (SSE) or forensic collection (FC) training scenario, etc. The method may include providing a reconfigurable training area which may be enclosed, in a building, or may be outdoors, or partially in and outdoors. The training area may provide a plurality of reconfigurable wall panels; and providing at least one moveable element in the reconfigurable training area. The training area may include providing an observation area for observing the training scenarios being conducted in the reconfigurable training area. The method may include providing an open, transparent, or one directionally transparent ceiling or wall to allow observation of the reconfigurable training area.
Abstract: A suspension pad for suspending a workpiece with respect to a corrugated enclosure having a closure flap that is moveable between an open position, wherein an opening is defined in the corrugated enclosure, and a closed position, wherein the opening is obstructed by the closure flap. The suspension pad has a mid-section that is engageable with the workpiece and at least one end portion moveable between a raised position, wherein the end portion is disposed within the corrugated enclosure, and a lowered position, wherein the end portion extends through the opening to hold the closure flap in the open position.
Abstract: The invention relates to identification documents, and in particular to providing optically variable personalized data to identification documents. In one implementation, we provide an identification document comprising a document layer and a first indicium. The document layer comprises a material capable of being printed by a thermally transferable optically variable ink. The first indicium is printed on the document layer and comprises personalized data and printed to the document layer by a thermally transferred optically variable ink. The first indicium may be printed to the document layer by disposing a thermally transferable optically variable ink in a mass transfer panel of a printer ribbon adapted for use in a dye diffusion thermal transfer printer, and printing the first indicium as part of a mass transfer printing process.
Type:
Grant
Filed:
April 12, 2010
Date of Patent:
October 11, 2011
Assignee:
L-1 Secure Credentialing, Inc.
Inventors:
Robert L. Jones, Daoshen Bi, Charles F. Duggan, Nelson T. Schneck
Abstract: In one embodiment, a method is provided for selectively providing an alert to a user of a tracked asset in an asset recovery system. The method includes activating a tracking device on the tracked asset to generate a report, evaluating the report and a condition based on a home location assigned to the tracking device for generating an alert, creating the alert based on the evaluation of the condition and the report, and sending the alert to the user.
Type:
Grant
Filed:
May 15, 2008
Date of Patent:
October 11, 2011
Assignee:
3SI Security Systems, Inc.
Inventors:
Timothy Pfafman, Roger Hayward, Richard Fuller
Abstract: An identification document includes a lens system and a specially prepared photo of a document bearer. The lens system and the specially prepared photo cooperate to create a three dimensional photo effect. The document includes two or more document layers. There is a lens structure in one of the document layers, and it includes lens elements. A photo is printed on one or more of the document layers. The photo depicts the document bearer, and includes two or more separate images of the bearer from different perspectives. Parts of the separate images are interleaved together into sets, and the sets are positioned relative to corresponding lens elements of the lens structure. These sets include parts of the separate images such that when viewed through the lens structure, the parts are viewed simultaneously making the subject appear three-dimensional to a viewer.