Abstract: A corrugated container with integral dunnage for securing a cargo element with respect to the interior of the corrugated container, including at least one wall panel having a substantially planar surface, an aperture defined in the substantially planar surface, and a flap portion connected to the substantially planar surface adjacent to the aperture. The flap portion is subdivided into a plurality of sections that cooperate to define a dunnage element.
Abstract: A security feature for an identification document and method for making it provide layers of security, including, for example, tamper evidence, optically variable effects, and personalized information that links the security information to the document and its bearer. The feature is made by printing a first material representing first information on a core layer of the document. This first material at least partially overlaps the core layer. One example is Xerographic printing of information about the ID document applicant and the applicant's photo. The process also applies a second material representing second information adjacent to the first material. One example is ink jet printing of personal information with a UV curable ink in the form of a relief pattern on the core layer. Finally, the process applies a laminate layer over the core layer. The laminate layer covers the first and second materials.
Type:
Grant
Filed:
June 10, 2008
Date of Patent:
January 11, 2011
Assignee:
L-1 Secure Credentialing, Inc.
Inventors:
Daoshen Bi, Robert Jones, Tung-Feng Yeh, Scott D. Haigh
Abstract: A method for applying labels to a substrate comprises providing a release liner having a repeating sequence of pluralities of pressure-sensitive labels disposed thereon, each of the pluralities comprising at least two labels and applying at least one plurality of labels to a substrate using a label applicator.
Abstract: A wireless access device in a wireless network, whether a known or unknown entity, can be located using a geolocation system. A signal strength is determined by a wireless intrusion detection system (WIDS) node in a wireless network for each wireless access device that it detects. Based on the signal strength, an approximate distance from the node is determined, which, in one embodiment corresponds to a radius of a circle around the node. To account for error, an approximation band of the circle is calculated that will allow a user to determine the approximate location of the device within the wireless network.
Abstract: A microstripline transmission line arrangement carries a signal having a fundamental frequency. The arrangement includes a first microstripline transmission line, a second microstripline transmission line, and a coaxial electrically conductive conduit interconnecting the first transmission line and the second transmission line. The conduit includes a signal conductor and an electrically grounded shield substantially surrounding the signal conductor. The conductor and the shield are positioned relative to each other to thereby comprise a means for lowpass filtering the signal. A cutoff frequency of the lowpass filtering is less than a third harmonic of the fundamental frequency.
Type:
Grant
Filed:
July 28, 2008
Date of Patent:
December 7, 2010
Assignees:
Bosch Security Systems, Inc., Robert Bosch GmbH
Abstract: A latent image is incorporated into an apparent solid-color background for representing a desired solid-color background having a target color. An underlying solid-color background is printed on a print medium using a first color composition that differs from the target color. Line-screen patterns embedding a latent image in a visually integrated setting are printed over the solid-color background using a second color composition that differs from both the first color composition and the target color. The visual characteristics of the line-screen patterns forming the latent image and the visually integrated setting are matched for rendering the latent image practically indistinguishable from the visually integrated setting without a visual aid. The print densities of the line-screen patterns and the first and second color compositions are interrelated so that the line-screen patterns in combination with the underlying solid-color background produce the apparent solid-color background in the target color.
Type:
Grant
Filed:
April 26, 2007
Date of Patent:
December 7, 2010
Assignee:
Document Security Systems, Inc.
Inventors:
David Michael Wicker, Michael Scott Caton
Abstract: A weather-proof notification device includes an enclosure having an integrally formed grille and a speaker located within and attached to the enclosure proximate the grille. The grille is configured to inhibit the entry of rainwater into the interior of the enclosure. A water-resistant or water-tight seal is provided between the speaker and the enclosure, and the speaker includes a water-repellent diaphragm, in order to prevent water from migrating from the sound chamber into the operating electrical compartment. A drain is provided on the grille to permit free drainage of water from the sound chamber.
Abstract: A security sensor apparatus senses movement of an object. The sensor apparatus includes an electronics arrangement having an optical emitter and an optical receiver. The optical receiver has an axis of reception. The optical emitter emits a first beam along an axis of emission in an emission direction. The axis of emission diverges in the emission direction from the axis of reception at an angle of at least two degrees. The electronics arrangement is mounted in association a first surface of the object or a second surface of a structure disposed in opposition to the first surface. A reflector arrangement includes at least one reflective surface and is mounted in association with the other of the first surface and the second surface. The at least one reflective surface receives at least a portion of the first beam and produces a second beam directed at and received by the optical receiver.
Type:
Grant
Filed:
January 7, 2009
Date of Patent:
November 16, 2010
Assignees:
Robert Bosch Security Systems, Inc., Robert Bosch GmbH
Inventors:
David Anderson, William DiPoala, Jeffrey Swan
Abstract: An image destruct material comprises a release layer positioned between an image receiving layer and a base layer. The adhesion between the release layer and the base layer is greater than adhesion between the release layer and the image receiving layer. The release layer material can be used in secure documents that have an image receiving layer. After information is printed on the image receiving layer, an overlaminate is applied over it. Removal of the overlaminate destroys the printed image on the receiving layer because of the relative adhesive properties of the image receiving layer, overlaminate and release layer.
Type:
Grant
Filed:
March 30, 2005
Date of Patent:
November 16, 2010
Assignee:
L-1 Secure Credentialing, Inc.
Inventors:
Daoshen Bi, Tung-Feng Yeh, Robert L. Jones, Brian C. Labrec
Abstract: The invention provides hard coat and image receiving layer structures and related methods used in ID document production. These structures and methods provide ID documents that offer hard protection in areas where needed (e.g., in optical windows for machine readable data), and also provide image receiving layers for later printing of variable data, such as personalization information of the bearer. Implementations of the structure provide an effective interface between hard coat and image receiving layers that provides enhanced durability in manufacture and field use.
Type:
Grant
Filed:
March 30, 2005
Date of Patent:
November 9, 2010
Assignee:
L-I Secure Credentialing, Inc.
Inventors:
Robert L. Jones, Daoshen Bi, Tung-Feng Yeh
Abstract: Particles conveying a code are incorporated into polymer matrix to form a core document substrate. These particles may be colored to create a distinctive look of the document that makes it unique for a particular document issuer and enables visual authentication. Addition of a covert attribute to the particle, such as a UV pigment or hidden layer of material, allows a covert, forensic characteristic and it also allows a mathematical description to be calculated describing the random distribution of a specific area on a document and then captured on it (e.g., in the bar code or magnetic stripe or digital watermark on an ID document).
Abstract: The present invention relates to assembling identification documents in an over-the-counter issuing environment. In one implementation of the present invention, an ink jet printer-based assembling system is provided. An identification document substrate receives ink jet printed information. The printed substrate is laminated. In another implementation, a carrier web carries lamination pieces. Both the carrier web and the document substrate include form feed holes or other registration notches. The holes or notches are used to align the substrate with the lamination pieces, and to align a laminated document substrate for final cutting.
Type:
Grant
Filed:
May 12, 2003
Date of Patent:
November 2, 2010
Assignee:
L-1 Secure Credentialing, Inc.
Inventors:
Robert Jones, Daoshen Bi, Dennis Mailloux
Abstract: An access control system includes first and second portable containers. The first portable container comprises a first sidewall opening and the second portable container comprises a second sidewall opening. The portable containers are arranged such that the first sidewall opening in the first portable container communicates with the second sidewall opening in the second portable container. The first portable container comprises a passing room disposed in the first portable container. The passing room includes a barrier device located in the walkway defining a first space between a first passing room opening and the barrier device, and a second space between the barrier device and a second passing room opening. The access control system is constructed such that when the access control system is disposed between a first area and an enclosed second area ingress and egress from and to the second area is controlled by the access control system.
Abstract: A malicious-process-determining method, a data processing apparatus, and a recording medium according to the present invention each consists of reading the data stored in a buffer memory by one byte, and for a plurality of instruction sequences each having a different read address, sequentially analyzing what kind of instruction code is contained therein. When the int instruction is contained in the analyzed instruction sequence, the number of times the immediate value is pushed to the stack is greater than 1, and the character code corresponding to “/” is contained in the virtual stack, a determination is made that a malicious code is contained in the relevant instruction sequence.
Abstract: A vending machine (10) is provided for storing items. The vending machine (10) includes a lock (18) to control access to the interior of the vending machine (10).
Abstract: The present invention relates to identification documents and smart cards. In one implementation, we provide a contactless smart identification document comprising a first contact layer, a second contact layer, and a carrier layer. The carrier layer is sandwiched in between the first and second contact layers, and the carrier layer includes least a transceiver and electronic circuitry. At least a portion of the first and second contact layers migrate into the carrier layer. This migration helps to secure at least a portion of the transceiver or electronic circuitry to the first and second contact layers.
Abstract: The present invention provides identification documents with security features. For example, a document may include two or more inks that are designed to cohesively fail upon a de-lamination attack. A resulting failure pattern is preferably difficult to predict. The two or more inks are applied to an identification document including a core and laminate layer. At least one of the inks is characterized such that an adhesive strength of the ink to the core and an adhesive strength of the ink to the laminate layer is each greater than the cohesive strength of the ink itself. Thus, the ink rips apart in a somewhat random-like manner upon a de-lamination attack. The ink can be arranged in interwoven or interlocking patterns or in other desired patterns and locations.