Patents Assigned to Secure-it Inc.
-
Patent number: 7744001Abstract: An identification document manufacturing method makes an identification document with an optically variable security feature by forming a lens structure in the document's lamination layer along with image information. The method provides image information arranged to include at least two different images. The method uses pressure to form a lens profile in a laminate, including combining the laminate with ink representing the image information to form the document. The document is formed together with the laminate and ink such that the lens profile enables display of the at least two different images when the document is viewed at different predetermined angles. An information bearing document comprises a core layer, an image layer depicting at least two different images, and a laminate layer. The laminate layer is pressed on the core layer such that it forms a lens profile that enables display of the at least two different images when the document is viewed at different predetermined angles.Type: GrantFiled: November 16, 2004Date of Patent: June 29, 2010Assignee: L-1 Secure Credentialing, Inc.Inventors: Brian C. LaBrec, Joseph Anderson, Robert L. Jones, Danielle Batey
-
Patent number: 7744002Abstract: A composition is provided for adhering a first article to a second article, the composition comprising a thermally active low Tg polymeric resin; and a multifunctional crystalline polymer. The thermally active low Tg polymeric resin can, for example, comprise 50-99% of the composition. The multifunctional crystalline polymer can, for example, comprise 1-50% of the composition. In one embodiment, the multifunctional crystalline polymer comprises 5-20% by weight of the composition. In one embodiment, the multifunctional crystalline polymer has a low molecular weight.Type: GrantFiled: March 11, 2005Date of Patent: June 29, 2010Assignee: L-1 Secure Credentialing, Inc.Inventors: Robert L. Jones, Daoshen Bi, Tung-Feng Yeh
-
Patent number: 7740214Abstract: A display assembly for automatically orienting a display item includes a base and a mounting member for mounting thereon the display item. The mounting member is removably mounted on the base to allow handling of the display item when removed and when mounted automatically moves from an unaligned orientation to an aligned display orientation. One alignment mechanism is magnetically operable and preferably includes first and second magnets respectively mounted on the base and mounting member wherein north and south poles of the first magnet align respectively with south and north poles of the second magnet to align the mounting member in the display orientation. Another alignment mechanism includes at least one camming surface for facilitating alignment of the mounting member and preferably camming surfaces respectively on the base and the mounting member which engage one another to facilitate to alignment.Type: GrantFiled: May 10, 2006Date of Patent: June 22, 2010Assignee: Invue Security Products Inc.Inventors: Ronald M. Marsilio, Dennis D. Belden, Jr.
-
Publication number: 20100148975Abstract: An article of clothing includes a sensor attached to a fabric body for detecting forces applied to the fabric body. A processor is attached to the fabric body and is communicatively coupled to the sensor. The processor receives signals from the sensor, analyzes the signals, and discerns therefrom whether a physical attack is occurring on a wearer of the fabric body. The processor emits a distress signal if it is discerned that an attack is occurring.Type: ApplicationFiled: December 15, 2008Publication date: June 17, 2010Applicants: Bosch Security Systems Inc., Bobert Bosch GmbHInventors: James Riley, Steve Markham
-
Patent number: 7737845Abstract: A programmable key for use in a security system for protecting items of merchandise has a housing, a power supply mounted in the housing, a logic control circuit which includes a controller, a wireless communication circuit and a security disarm code (SDC) memory. The key has visual indicators such as an LED which is operatively connected to the logic control circuit and pulsed to indicate the state of the SDC. The control circuit includes a timer which has a preset time limit programmed therein, which invalidates the stored SDC if not refreshed by a remote programming source within a certain time period. The logic circuit further includes a counter which counts the number of activations of a control switch, and which permanently deactivates the control circuit upon reaching a certain count value to ensure that the internal battery has sufficient power to maintain the key operational. The wireless communication circuit preferably is infrared (IR) or radio frequency (RF) controlled.Type: GrantFiled: December 14, 2006Date of Patent: June 15, 2010Assignee: Invue Security Products Inc.Inventors: Christopher J. Fawcett, Ronald M. Marsilio, Ian R. Scott
-
Patent number: 7737843Abstract: A security alarm module for attaching to an item of merchandise in a security system for protecting the item of merchandise has a housing, a logic control circuit including a central controller, a wireless interface for communicating with a programmable key containing a security code, and a memory circuit for storing the security code. An attachment device attaches the alarm module to the item of merchandise and a sense loop operatively communicates with the attachment device for sensing when the integrity of the attachment device is compromised. An audio alarm is located within the housing and is actuated when the integrity of the sense loop is compromised. A visual indicator such as an LED, indicates the status of the alarm module. The housing includes a base and a bottom housing member which is spaced from the base to form a sound region. The audio alarm is mounted in the bottom housing member and communicates with the sound region which enhances the sound level of the alarm when actuated.Type: GrantFiled: December 14, 2006Date of Patent: June 15, 2010Assignee: Invue Security Products Inc.Inventors: Dennis D. Belden, Jr., Ronald M. Marsilio, Ian R. Scott
-
Patent number: 7737846Abstract: A security system for protecting items of merchandise includes a programmable key, a programming station for generating a security disarm code (SDC) into the key, and a security device attached to the item of merchandise. The security device is initially programmed with the SDC from the key and is subsequently disarmed by the key upon matching the SDC of the key with the SDC stored in the security device. A wireless interface is provided in the programming station, programmable key and security device for programming the SDC into the key and for matching the SDC of the key with the SDC of the alarm module. An internal timer in the key invalidates the SDC in the key after a predetermined time period to prevent use of the key for disarming a security device after the time period has expired. The programming station initially generates a unique SDC which remains in the programming station for use with the programmable keys and alarm modules.Type: GrantFiled: December 14, 2006Date of Patent: June 15, 2010Assignee: Invue Security Products Inc.Inventors: Dennis D. Belden, Jr., Christopher J. Fawcett, Ronald M. Marsilio, Ian R. Scott
-
Patent number: 7737844Abstract: A programming apparatus for generating and retaining a security disarm code (SDC) for use in a security system for protecting items of merchandise has a housing and a logic control circuit located within the housing. The control circuit includes a controller for generating the SDC, a memory for storing the generated SDC and a wireless communication system for interfacing with a programmable key used for operating a security device attached to an item of merchandise. A visual display includes a plurality of LEDs which indicate the status of the logic control circuit. The SDC is generated initially as a random SDC by the programming apparatus, which SDC is retained in the controller of the apparatus for the life of the programming apparatus.Type: GrantFiled: December 14, 2006Date of Patent: June 15, 2010Assignee: Invue Security Products Inc.Inventors: Ian R. Scott, Christopher J. Fawcett, Ronald M. Marsilio
-
Publication number: 20100138897Abstract: A method, of automatically determining one or more remediations for a device that includes a processor, may include: receiving values of a plurality of parameters which collectively characterize an operational state of the device, there being at least one policy associated with at least a given one of the plurality of parameters, policy defining as a condition thereof one or more potential values of, or based upon, the given parameter, satisfaction of the condition potentially being indicative of unauthorized activity or manipulation of the device; automatically determining, from the received parameter values, whether the conditions for any policies are satisfied, respectively; and automatically selecting one or more remediations for the device according to the satisfied policies, respectively.Type: ApplicationFiled: December 17, 2009Publication date: June 3, 2010Applicant: Secure Elements, Inc.Inventors: Daniel Bailey Bezilla, John Leonard Immordino, James Le Ogura
-
Patent number: 7728048Abstract: the invention provides a composition having laser engraving properties, comprising a host material and a laser enhancing additive. The host material comprises a material, such as a polymer, modified by a first process, whereby the host material as modified by the first process has increased thermal conductivity as compared to the host material before the first process. The laser enhancing additive comprises a first quantity of at least one of copper potassium iodide (CuKI3), Copper Iodide (CuI), potassium iodide (KI), sodium iodide (NaI), and aluminum iodide (AlI), and a second quantity of at least one substance selected from the group consisting of zinc sulfide (ZnS), barium sulfide (BaS), alkyl sulfonate, and thioester.Type: GrantFiled: September 30, 2003Date of Patent: June 1, 2010Assignee: L-1 Secure Credentialing, Inc.Inventor: Brian Labrec
-
Publication number: 20100128446Abstract: A modular building system arrangement includes a plurality of electrical building systems. Each electrical building system has a housing with a mechanical connector that is connectable with a like connector of each other building system housing. Members of any subset of the building system housings are connectable with each other to form a building system assembly. The building systems of the building system assembly conjointly define an electrically conductive pathway interconnecting each of the building systems of the building system assembly. The pathway carries power and/or data.Type: ApplicationFiled: November 21, 2008Publication date: May 27, 2010Applicants: Bosch Security Systems, Inc., Robert Bosch GmbHInventor: William DiPoala
-
Publication number: 20100127865Abstract: A building security arrangement includes a sensor for emitting an audible alarm signal. A security system installed in the building detects the audible alarm signal and transmits an electrical alarm signal over a public switched telephone network in response to the detection of the audible alarm signal. A central monitoring station receives the electrical alarm signal over the public switched telephone network and notifies an alarm authority in response to receiving the electrical alarm signal.Type: ApplicationFiled: November 21, 2008Publication date: May 27, 2010Applicants: Bosch Security Systems, Inc., Robert Bosch GmbHInventors: Michael G. Marriam, James W. Riley, Stevemn Markham
-
Publication number: 20100128123Abstract: A security system includes a video system for capturing images of an intruder. A deterrent dispensing device dispenses a deterrent substance in a selected direction. An actuator module is communicatively coupled to the video system and is coupled to the deterrent dispensing device. The actuator module receives a video signal from the video system and, in response thereto, controls the deterrent dispensing device to thereby aim the dispensed deterrent substance in a direction of the intruder.Type: ApplicationFiled: December 10, 2008Publication date: May 27, 2010Applicants: Bosch Security Systems, Inc., Robert Bosch GmbHInventor: William DiPoala
-
Patent number: 7720195Abstract: The inspection methods and systems of the present invention are mobile, rapidly deployable, and capable of scanning a wide variety of receptacles cost-effectively and accurately on uneven surfaces. The present invention is directed toward a portable inspection system for generating an image representation of target objects using a radiation source, comprising a mobile vehicle, a detector array physically attached to a movable boom having a proximal end and a distal end. The proximal end is physically attached to the vehicle. The invention also comprises at least one source of radiation. The radiation source is fixedly attached to the distal end of the boom, wherein the image is generated by introducing the target objects in between the radiation source and the detector array, exposing the objects to radiation, and detecting radiation.Type: GrantFiled: January 7, 2009Date of Patent: May 18, 2010Assignee: Rapiscan Security Products, Inc.Inventors: Bryan Allman, Andreas F. Kotowski
-
Publication number: 20100115844Abstract: A method for detecting a position of a door includes providing a switch having a body with two electrical contacts and a through-channel. Two lever arms extend from the body. Each of the arms is attached to a respective one of the electrical contacts. The arms have a first position relative to each other wherein the contacts are electrically connected to each other, and a second position relative to each other wherein the contacts are electrically disconnected from each other. A hinge pin is inserted through the through-channel of the switch and is also inserted into a door hinge. The arms are biased against a doorjamb and the door, respectively. It is monitored whether the contacts are electrically connected to each other.Type: ApplicationFiled: November 13, 2008Publication date: May 13, 2010Applicants: Bosch Security Systems, Inc., Robert Bosch GmbHInventors: Jim Riley, Steve Markham
-
Patent number: 7712673Abstract: An identification document includes a lens system and a specially prepared photo of a document bearer. The lens system and the specially prepared photo cooperate to create a three dimensional photo effect. The document includes two or more document layers. There is a lens structure in one of the document layers, and it includes lens elements. A photo is printed on one or more of the document layers. The photo depicts the document bearer, and includes two or more separate images of the bearer from different perspectives. Parts of the separate images are interleaved together into sets, and the sets are positioned relative to corresponding lens elements of the lens structure. These sets include parts of the separate images such that when viewed through the lens structure, the parts are viewed simultaneously making the subject appear three-dimensional to a viewer.Type: GrantFiled: September 29, 2004Date of Patent: May 11, 2010Assignee: L-l Secure Credentialing, INc.Inventor: Robert L. Jones
-
Publication number: 20100114771Abstract: Validation of the identity of the user is performed with the use of a card associated with intelligence that identifies the user. Validation of the document involves one or more of: validating the presence of a signature; validating the amount of the monetary transaction document including a manual entry of the amount by the user; validating CAR against the LAR; and validating the banking system parameters and rules for the customer and/or the transaction. To assist in the automatic analysis of data on monetary transactional documents or on remittance documents, the user is prompted to provide a bounding box about the data. An image touch screen may be touched by the user to locate the bounding box and the user may magnify the data to fill the boundary box to exclude other data from analysis. After document and person validation, the system will dispense money or transfer monies to a savings account, a checking account, a smart card, or the like. The system will also write money orders or wire transfer money.Type: ApplicationFiled: January 13, 2010Publication date: May 6, 2010Applicant: Capital Security Systems, Inc.Inventors: Robin Haley Gustin, Troy W. Livingston, Namsoo Park, Nabil Shekoory
-
Publication number: 20100114765Abstract: Validation of the identity of the user is performed with the use of a card associated with intelligence that identifies the user. Validation of the document involves one or more of: validating the presence of a signature; validating the amount of the monetary transaction document including a manual entry of the amount by the user; validating CAR against the LAR; and validating the banking system parameters and rules for the customer and/or the transaction. To assist in the automatic analysis of data on monetary transactional documents or on remittance documents, the user is prompted to provide a bounding box about the data. An image touch screen may be touched by the user to locate the bounding box and the user may magnify the data to fill the boundary box to exclude other data from analysis. After document and person validation, the system will dispense money or transfer monies to a savings account, a checking account, a smart card, or the like. The system will also write money orders or wire transfer money.Type: ApplicationFiled: January 13, 2010Publication date: May 6, 2010Applicant: Capital Security Systems, Inc.Inventors: ROBIN HALEY GUSTIN, Troy W. Livingston, Namsoo Park, Nabil Shekoory
-
Publication number: 20100114772Abstract: Validation of the identity of the user is performed with the use of a card associated with intelligence that identifies the user. Validation of the document involves one or more of: validating the presence of a signature; validating the amount of the monetary transaction document including a manual entry of the amount by the user; validating CAR against the LAR; and validating the banking system parameters and rules for the customer and/or the transaction. To assist in the automatic analysis of data on monetary transactional documents or on remittance documents, the user is prompted to provide a bounding box about the data. An image touch screen may be touched by the user to locate the bounding box and the user may magnify the data to fill the boundary box to exclude other data from analysis. After document and person validation, the system will dispense money or transfer monies to a savings account, a checking account, a smart card, or the like. The system will also write money orders or wire transfer money.Type: ApplicationFiled: January 13, 2010Publication date: May 6, 2010Applicant: Capital Security Systems, Inc.Inventors: Robin Haley Gustin, Troy W. Livingston, Namsoo Park, Nabil Shekoory
-
Publication number: 20100114766Abstract: Validation of the identity of the user is performed with the use of a card associated with intelligence that identifies the user. Validation of the document involves one or more of: validating the presence of a signature; validating the amount of the monetary transaction document including a manual entry of the amount by the user; validating CAR against the LAR; and validating the banking system parameters and rules for the customer and/or the transaction. To assist in the automatic analysis of data on monetary transactional documents or on remittance documents, the user is prompted to provide a bounding box about the data. An image touch screen may be touched by the user to locate the bounding box and the user may magnify the data to fill the boundary box to exclude other data from analysis. After document and person validation, the system will dispense money or transfer monies to a savings account, a checking account, a smart card, or the like. The system will also write money orders or wire transfer money.Type: ApplicationFiled: January 13, 2010Publication date: May 6, 2010Applicant: Capital Security Systems, Inc.Inventors: Robin Haley Gustin, Troy W. Livingston, Namsoo Park, Nabil Shekoory