Patents Assigned to Secure-it Inc.
  • Patent number: 7162899
    Abstract: A security device includes a locking member, a ratchet mechanism, and a plurality of cables. The cables extend through both a fastener and a base of the locking member and are wrapped around all six sides of a box-like structure. The fastener is releasably snap-fitted into the base of the locking member and secured therein by a magnetically attractable tine. The ratchet mechanism includes a housing containing a spool and a locking pawl. A bottom wall encloses a portion of the housing and includes a rotatable central portion having a key receiving recess for unlocking the spool from the pawl. The housing has a rotatable top wall portion which includes a flip-up handle for rotating the top wall portion and the internal ratchet to tighten the cable about an article. An alarm system is contained in the housing of the ratchet mechanism and actuates an audible alarm upon certain unauthorized actions occurring. An LED located within the housing provides a visual indication that the alarm system is activated.
    Type: Grant
    Filed: December 28, 2004
    Date of Patent: January 16, 2007
    Assignee: Alpha Security Products, Inc.
    Inventors: Christopher J. Fawcett, Ronald M. Marsilio, Dennis D. Belden, Jr.
  • Publication number: 20070008099
    Abstract: The present invention is directed to providing systems and methods for remotely monitoring sites to provide real-time information which can readily permit distinguishing false alarms, and which can identify and track the precise location of an alarm. In embodiments, monitoring capabilities such as intrusion/fire detection and tracking capabilities, can be implemented through the use of multistate indicators in an interface which permits information to be transmitted using standard network protocols from a remote site to a monitoring station in near real-time. In embodiments, communications can be handed from the centrally located host monitoring station to a mobile monitoring station (for example, a laptop computer in a responding vehicle, such as a police or fire vehicle). Additional embodiments include the measurement of environmental parameters such as temperature, carbon monoxide and differential air pressure to detect, monitor and manage a fire event.
    Type: Application
    Filed: May 15, 2006
    Publication date: January 11, 2007
    Applicant: NetTalon Security Systems, Inc.
    Inventors: David Kimmel, Donald Jones, Ronald Dubois, Daniel Colin
  • Patent number: 7162649
    Abstract: Providing a user with assurance that a networked computer is secure, typically before completion of the log-in operation. This can be accomplished by extending the local log-in process to perform a host assessment of the workstation prior to requesting the user's credentials. If the assessment finds a vulnerability, the log-in process can inform the user that the machine is or may be compromised, or repair the vulnerability, prior to completion of the log-in operation. By performing vulnerability assessment at the level of the workstation, a network server is able to determine whether the workstation is a “trusted” platform from which to accept authentication requests. If the vulnerability assessment shows that the workstation is compromised, or if the possibility of remote compromise is high, the network server can elect to fail the authentication on the grounds that the workstation cannot be trusted.
    Type: Grant
    Filed: June 30, 2000
    Date of Patent: January 9, 2007
    Assignee: Internet Security Systems, Inc.
    Inventors: Curtis E. Ide, Philip C. Brass, Theodore R. Doty
  • Publication number: 20060293933
    Abstract: A method of enhancing capabilities is provided. A family of systems capability and operational analysis is conducted to generate a set of operationally decomposed capability needs. Further, a family of systems functional analysis and allocation is conducted on the set of operationally decomposed capability needs to determine a set of deficiencies. In addition, a family of systems design synthesis is conducted on the set of operationally decomposed capability needs, a set of existing solutions, and a set of emerging solutions to identify and describe an optimal integrated solution set of existing solutions and emerging solutions to satisfy the set of operationally decomposed capability needs. Further, the optimal integrated solution set of existing solutions and emerging solutions is generated from the family of systems design synthesis.
    Type: Application
    Filed: May 9, 2006
    Publication date: December 28, 2006
    Applicant: BAE Systems National Security Solutions, Inc.
    Inventors: Paul Millhouse, Jacqueline Lancaster, Charles Dickerson, George Kim, Kevin Shaw
  • Publication number: 20060272011
    Abstract: Providing a user with assurance that a networked computer is secure, typically before completion of the log-in operation. This can be accomplished by extending the local log-in process to perform a host assessment of the workstation prior to requesting the user's credentials. If the assessment finds a vulnerability, the log-in process can inform the user that the machine is or may be compromised, or repair the vulnerability, prior to completion of the log-in operation. By performing vulnerability assessment at the level of the workstation, a network server is able to determine whether the workstation is a “trusted” platform from which to accept authentication requests. If the vulnerability assessment shows that the workstation is compromised, or if the possibility of remote compromise is high, the network server can elect to fail the authentication on the grounds that the workstation cannot be trusted.
    Type: Application
    Filed: May 8, 2006
    Publication date: November 30, 2006
    Applicant: Internet Security Systems, Inc.
    Inventors: Curtis Ide, Philip Brass, Theodore Doty
  • Publication number: 20060265746
    Abstract: A security management system includes a fusion engine which “fuses” or assembles information from multiple data sources and analyzes this information in order to detect relationships between raw events that may indicate malicious behavior and to provide an organized presentation of information to consoles without slowing down the processing performed by the data sources. The multiple data sources can comprise sensors or detectors that monitor network traffic or individual computers or both. The sensors can comprise devices that may be used in intrusion detection systems (IDS). The data sources can also comprise firewalls, audit systems, and other like security or IDS devices that monitor data traffic in real-time. The present invention can identify relationships between one or more real-time, raw computer events as they are received in real- time. The fusion engine can also assess and rank the risk of real-time raw events as well as mature correlation events.
    Type: Application
    Filed: May 11, 2006
    Publication date: November 23, 2006
    Applicant: Internet Security Systems, Inc.
    Inventors: Timothy Farley, John Hammer, Bryan Williams, Philip Brass, George Young, Derek Mezack
  • Patent number: 7137513
    Abstract: A merchandise display system includes a rod lockably connected to a peg board, a hanging member hanging from the rod and a swivel member rotatably connected to the hanging member about a first axis. The swivel member is connected to a lockable display case for carrying an item of merchandise and is rotatable about a second axis perpendicular to the first axis. Thus, the display case is rotatable about the first and second axes to facilitate viewing the merchandise from any angle while the case is lockably connected to the rod. The hanging and swivel members may be a ball and socket combination. Alternately, the swivel member may connect to the display case via a hinge pin about which portions of the case may rotate to open and close. Alternately, a lower member may extend from within the case through holes therein to rotatably connect to the swivel member about the second axis.
    Type: Grant
    Filed: January 9, 2004
    Date of Patent: November 21, 2006
    Assignee: Alpha Security Products, Inc.
    Inventors: Nicholas M. Sedon, Richard E. Corney
  • Patent number: 7131542
    Abstract: A merchandise display hook attaches to a display board and has a rod assembly from which items of merchandise are hung and a base assembly that moves relative to the rod assembly. The base may lock directly to the rod or to an inner base member attached to the rod. When locked, the display hook is locked to the display board. The display hook may include an end assembly that slides along and selectively locks to the rod assembly to allow or prevent removal and loading of the items of merchandise from and onto the rod assembly. The display hook may alternately include an anti-sweeping mechanism to prevent rapid removal of the items of merchandise from the rod assembly.
    Type: Grant
    Filed: March 18, 2003
    Date of Patent: November 7, 2006
    Assignee: Alpha Security Products, Inc.
    Inventors: Nicholas M. Sedon, Frank H. Copen
  • Patent number: 7127775
    Abstract: An improved door hinge attachment device is provided. The device includes a plate formed separately of the door and door frame that is attached to a door or door frame. The device has elongate threaded bores alignable with screw holes in the hinge plates. The device is useful with metal doors and door frames. The attachment devices have projections on the backside thereof and may be provided with covers to prevent construction material or debris from fouling the threads in the threaded bores.
    Type: Grant
    Filed: July 22, 2004
    Date of Patent: October 31, 2006
    Assignee: Sentry Security Fasteners, Inc.
    Inventors: Michael Frank Ferre, Thomas Edward Ferre, Stephen Paul Cramer
  • Patent number: 7124183
    Abstract: Provided is a managed network service delivery system and method. The managed network service delivery system includes an IOC (Internetworking Operating Center) and a SCA (SAM (Security Activity Manager) Collector Agent) at at least one of a plurality of customer sites of a customer. The customer sites are connected to the IOC through a VPN (Virtual Private Network) or directly from a respective one of the SCAs to the IOC. The SCAs collect log and statistical information from equipment at a respective one of the customer sites and provide summary information to the IOC. The SCAs also perform queries regarding status of equipment and report to the IOC. The customer accesses reports from a web server at the IOC or through a PSTN (Public Switched Telephone Network) connection at the SCAs. A redundant connection, through the PSTN, between a SCA and the IOC provides a robust system for management, monitoring and security of the customer sites.
    Type: Grant
    Filed: May 16, 2002
    Date of Patent: October 17, 2006
    Assignee: Bell Security Solutions Inc.
    Inventors: Dave Pekary, Chris Sibbitt, Michael Kelland, Arthur Vardanyan, Ronald Ross
  • Patent number: 7118817
    Abstract: A method and associated apparatus for preventing applying a reverse polarity voltage to an electronic circuit from a coin cell used to power such circuit by providing a first insulating wafer over the top conductive surface of a coin cell and a second insulating wafer over the bottom conductive surface of the cell. The first wafer has a central opening and the second wafer is designed to cover the portion of the bottom conductive surface corresponding to the opening of the first wafer so that when the two wafers of the protection system are placed over the coin cell with the first wafer and the insulating area positioned on the top and bottom conductive surfaces respectively, the insulating area extends fully under the first opening.
    Type: Grant
    Filed: September 5, 2003
    Date of Patent: October 10, 2006
    Assignee: 3SI Security Systems, Inc.
    Inventors: Joel Bartholf, Michael Larry Poorbaugh
  • Patent number: 7117700
    Abstract: The present invention provides a wheel-immobilizing device that does not require holes or indentations in the wheel in order for the device to be secured around the wheel or caster being immobilized. Additionally, a wheel-immobilizing device according to the invention is configured such that it may be placed on the ground in front of a cabinet, and the cabinet simply rolled into position with one of its casters between side walls of the device. The wheel-immobilizing device is then secured around the caster by passing a cross member or, in some embodiments, two cross members through the side walls on either side of the caster stem and then securing the cross member or members in position, thereby locking the wheel-immobilizing device to the caster of the cabinet and hampering rolling movement of the cabinet.
    Type: Grant
    Filed: October 15, 2004
    Date of Patent: October 10, 2006
    Assignee: D & D Security Resources, Inc.
    Inventors: Donna L. Smith, Dean H. Smith
  • Patent number: 7100783
    Abstract: A bottle security device includes an inner member, an intermediate member and an outer member that cooperate to lock the device on a bottle neck. The inner member includes a plurality of fingers adapted to fit under the bead on a bottle neck. The intermediate member slides over the inner member and forces the fingers against the bottle. The intermediate member includes a plurality of upwardly extending arms with inwardly projecting teeth that engage outwardly extending teeth on the inner member to lock the inner and intermediate members together. A key unlocks and rotates a rotatable member to separate the intermediate and inner members to unlock the device. Upon rotation of the cover cap, camming surfaces on the rotatable member engage the upwardly extending arms to move them radially outward to disengage them from the inner member.
    Type: Grant
    Filed: May 20, 2005
    Date of Patent: September 5, 2006
    Assignee: Alpha Security Products, Inc.
    Inventor: Dennis D. Belden, Jr.
  • Patent number: D531009
    Type: Grant
    Filed: February 3, 2005
    Date of Patent: October 31, 2006
    Assignee: Computerized Security Systems, Inc.
    Inventor: Scott M. Waldron
  • Patent number: RE39364
    Abstract: An improved security cylinder lock and key for operating the cylinder lock are disclosed. The cylinder lock has conventional tumbler locking structure and a secondary locking bar that operates independently of the tumblers. The secondary locking bar prevents operation of the cylinder lock until a properly configured key is placed in the keyway of the cylinder lock.
    Type: Grant
    Filed: November 24, 2003
    Date of Patent: October 31, 2006
    Assignee: Stanley Security Solutions, Inc.
    Inventor: Greg N. Brandt
  • Patent number: D531629
    Type: Grant
    Filed: November 10, 2005
    Date of Patent: November 7, 2006
    Assignee: Computerized Security Systems, Inc.
    Inventors: Dan Boulware, Bryan Urben
  • Patent number: D533047
    Type: Grant
    Filed: August 12, 2005
    Date of Patent: December 5, 2006
    Assignee: Computerized Security Systems, Inc.
    Inventors: Michael J. Wright, Charles W. Moon, Ernst K. Mitchell, Dale Mathias
  • Patent number: D533762
    Type: Grant
    Filed: August 12, 2005
    Date of Patent: December 19, 2006
    Assignee: Computerized Security Systems, Inc.
    Inventors: Michael J. Wright, Charles W. Moon, Ernst K. Mitchell, Dale Mathias
  • Patent number: D533763
    Type: Grant
    Filed: August 12, 2005
    Date of Patent: December 19, 2006
    Assignee: Computerized Security Systems, Inc.
    Inventors: Michael J. Wright, Charles W. Moon, Ernst K. Mitchell, Dale Mathias
  • Patent number: D535296
    Type: Grant
    Filed: November 10, 2005
    Date of Patent: January 16, 2007
    Assignee: Computerized Security Systems, Inc.
    Inventor: Dan Boulware