Patents Assigned to Secure-it Inc.
-
Patent number: 11391070Abstract: A key for a security device is provided. The key may include an electronic component configured to communicate with one or more security devices to initially receive one or more codes associated with each of the security devices. The key may also include a memory configured to store the one or more codes associated with the one or more security devices. The electronic component is configured to communicate with each of the one or more security devices for arming and/or disarming the security devices upon a matching of the code stored by the memory with the code associated with the security device.Type: GrantFiled: April 23, 2021Date of Patent: July 19, 2022Assignee: InVue Security Products Inc.Inventors: Jeffrey A. Grant, Christopher J. Fawcett
-
Patent number: 11393308Abstract: In one example, a connector assembly for providing security to an article of merchandise is provided. The connector assembly includes a cord having a plurality of conductors and a body portion connected to the cord. The connector assembly also includes a connection portion engaged with the body portion and including a plurality of engagement members. Each of the engagement members is electrically connected to a respective conductor in the cord, and the connection portion is configured to engage the article of merchandise to thereby electrically connect the engagement members to one another for establishing a sense loop through the conductors in the cord. Interruption of the sense loop is indicative of a security event.Type: GrantFiled: June 19, 2020Date of Patent: July 19, 2022Assignee: InVue Security Products Inc.Inventors: Jonathon D. Phillips, Gary A. Taylor, Christopher J. Fawcett, Eric Brutke
-
Patent number: 11381489Abstract: A data tracking method, which is performed by a data tracking apparatus in an edge cloud environment including at least one edge node communicating with an end device and a central cloud, includes receiving data from the end device by a first edge node, creating, by the first edge node, a tracing history and distributing the data to a plurality of edge nodes so as to allow the plurality of edge nodes to create tracing histories, transmitting the created tracing histories to the central cloud by the first edge node and the plurality of edge nodes, and verifying, by the central cloud, linkability of the tracing histories transmitted to the central cloud, storing the tracing histories, analyzing the tracing histories, and providing a data tracking function.Type: GrantFiled: November 29, 2021Date of Patent: July 5, 2022Assignee: Penta Security Systems Inc.Inventors: Jin Hyeok Oh, Myung Woo Chung, Sang Gyoo Sim, Duk Soo Kim, Seok Woo Lee
-
Patent number: 11381042Abstract: In one example, the connector includes a body portion configured to be connected to a cord and a connection portion engaged with the body portion and comprising a plurality of conductors. The connection portion includes a conductive shield electrically connected to a plurality of the conductors when the connection portion is not engaged with the article of merchandise, and the connection portion also includes at least one ground conductor that is not electrically connected to the remaining conductors and/or the conductive shield when the connection portion is not engaged with the article of merchandise. At least one of the conductors and/or the conductive shield is configured to cooperate with the ground conductor to define a sense loop when the connector is engaged with the article of merchandise, and interruption of the sense loop is indicative of a security event.Type: GrantFiled: February 10, 2021Date of Patent: July 5, 2022Assignee: InVue Security Products Inc.Inventors: Jeffrey A. Grant, Gary A. Taylor, Christopher J. Fawcett, Jonathon D. Phillips
-
Patent number: 11373515Abstract: A fire alarm communication device having a first and second output voltage which are constant during normal operation of the fire alarm communicator.Type: GrantFiled: March 29, 2021Date of Patent: June 28, 2022Assignee: Napco Security Technologies, Inc.Inventors: Michael A. Carrieri, Thomas F. Karl, Lance S. Lindsay
-
Publication number: 20220196204Abstract: A security apparatus for a launch monitor comprises a guide member extending from a first end to a second end. The guide member comprises a top surface defining one or more top surface features, and opposing side surfaces defining one or more side surface features. A mount is configured to moveably couple to the guide member. The mount comprises a mount body, and a plurality of securing members. Each of the securing members includes a retainer configured to retain and secure a portion of the launch monitor to the mount body and enable the launch monitor to be moved relative to the guide member.Type: ApplicationFiled: December 17, 2021Publication date: June 23, 2022Applicant: Scorpion Security Products, Inc.Inventors: Grant William Gulick, Franklyn W. Gulick, JR., Gary R. Page
-
Patent number: 11363884Abstract: A secure product dispenser assembly comprises a base portion having a first end and a second end, and being configured to hold a plurality of units of product. The base portion comprises a bottom, a first divider coupled to the bottom, and a second divider positioned opposite the first divider and coupled the bottom. A top portion is configured to adjustably couple to the base portion and a dispenser portion is coupled to the top portion and positioned at the first end of the base portion. The dispenser portion is configured to rotate between an open position to enable removal of one unit of product from the first end of the base, and a closed position inhibiting removal of the one unit of product from the first end of the base.Type: GrantFiled: April 3, 2020Date of Patent: June 21, 2022Assignee: Scorpion Security Products, Inc.Inventors: Franklyn W. Gulick, Jr., John Farinola, Eric Henry, Gary R. Page
-
Patent number: 11361635Abstract: Merchandise security systems and methods are provided. In one example, a merchandise security system includes a plurality of security devices arranged in a wireless network, wherein the plurality of security devices are arranged in a planogram and each configured to protect one or more items from theft, each of the plurality of security devices configured to wirelessly communicate data with a remote device. The system also includes a plurality of electronic keys arranged in the wireless network and configured to wirelessly communicate data with the plurality of security devices and/or the remote device. Each of the plurality of electronic keys is configured to operate the plurality of security devices. The system also includes a gateway configured to receive the data from the plurality of security devices and electronic keys via wireless communication, wherein the gateway is configured to communicate the data to the remote computing device.Type: GrantFiled: May 7, 2020Date of Patent: June 14, 2022Assignee: InVue Security Products Inc.Inventors: Kyle Baker, Gary A. Taylor, Steven R. Bohon, Jeffrey A. Grant, Christopher J. Fawcett, James Richard Terrell, II
-
Publication number: 20220180774Abstract: A tamper evident label is formed of destructible material and has opposite major surfaces. One of the major surfaces has an adhesive thereon and is configured to overlie a theft protection sensor and adhere to an article to be protected. At least one weakness formation is provided in the label adjacent the periphery thereof.Type: ApplicationFiled: February 28, 2022Publication date: June 9, 2022Applicant: Custom Security Industries Inc.Inventors: Lucien Curnew, Robert Petryczka, Morton Roseman
-
Patent number: 11348421Abstract: Embodiments of the present invention are directed to merchandise security systems and methods for displaying and protecting items of merchandise from theft. A merchandise security system and method according to the invention includes at least one tag and a plurality of nodes positioned within a display area. The plurality of nodes are operable for determining a location of the tag. The wireless beacon tracking system further includes a server operably associated with the plurality of nodes for receiving information related to the location of the tag.Type: GrantFiled: December 13, 2019Date of Patent: May 31, 2022Assignee: InVue Security Products Inc.Inventors: David N. Berglund, Christopher J. Fawcett, Gary A. Taylor
-
Publication number: 20220154872Abstract: A security apparatus for securing a portable electronic device includes a base that defines a cavity extending from a first end of the base to a second end of the base. A holder is structured to engage the base. The holder includes an outer surface defining a plurality of channels terminating at a support surface and a holder groove defined on the outer surface of the holder. The security apparatus further includes a securing portion with a plurality of projections that are each structured to contact the support surface and engage one of the holder grooves. Rotation of the securing portion relative to the holder acts to move at least a portion of each of the plurality of projections into the holder channel and secure the securing portion to the holder, where the portable electronic device is secured between the securing portion and the holder.Type: ApplicationFiled: February 1, 2022Publication date: May 19, 2022Applicant: Scorpion Security Products, Inc.Inventors: Franklyn W. Gulick, JR., Gary R. Page
-
Patent number: 11337074Abstract: A method for mobile device security of a mobile device. The mobile device includes a global positioning system (GPS) tracker for locating the mobile device. A first zone and a second zone are established in a monitoring area. The mobile device is maintained in a first operating mode when the mobile device is located in the first zone and a second operating mode when the mobile device is located in the second zone. One or more characteristics of the first zone are received from a management system. Upon the mobile device being located outside the first zone for longer than a predetermined time period, one or more first actions are performed. Upon the mobile device returning to the first zone, one or more second actions are performed.Type: GrantFiled: June 11, 2020Date of Patent: May 17, 2022Assignee: Scorpion Security Products, Inc.Inventors: Franklyn W. Gulick, Jr., Grant William Gulick, Anuj Thakral
-
Publication number: 20220142378Abstract: A secure product dispenser assembly comprises a base portion having a first end and a second end, and being configured to hold a plurality of units of product. The base portion comprises a bottom, a first divider coupled to the bottom, and a second divider positioned opposite the first divider and coupled the bottom. A top portion is configured to adjustably couple to the base portion and a dispenser portion is coupled to the top portion and positioned at the first end of the base portion. The dispenser portion is configured to rotate between an open position to enable removal of one unit of product from the first end of the base, and a closed position inhibiting removal of the one unit of product from the first end of the base.Type: ApplicationFiled: January 26, 2022Publication date: May 12, 2022Applicant: Scorpion Security Products, Inc.Inventors: Franklyn W. Gulick, JR., John Farinola, Eric Henry, Gary R. Page
-
Patent number: 11314859Abstract: According to one embodiment, a method detecting and mitigating a privilege escalation attack on an electronic device is described. The method involves operations by a user agent mode operating within a user space and a kernel driver mode operating within a kernel space. The kernel driver mode, in response to detecting an initial activation of a process being monitored, stores metadata associated with an access token. This metadata includes the initial token state information. Responsive to detecting an event associated with the process being monitored, the kernel mode driver extracts a portion of current state information for the access token for comparison to a portion of the stored token state information. Differences between content within the current state information and the stored token state information are used, at least in part, by the user agent mode to detect a privilege escalation attack.Type: GrantFiled: March 14, 2019Date of Patent: April 26, 2022Assignee: FireEye Security Holdings, Inc.Inventors: Japneet Singh, Ratnesh Pandey, Atul Kabra
-
Patent number: 11313153Abstract: A security apparatus for a portable electronic device comprises at least one support member comprising opposing side surfaces and a plurality of support member surface features. At least one of the opposing side surfaces comprises a first engagement structure. One of the at least two arms comprises a second engagement structure configured to slidably engage the first engagement structure allowing movement in a first direction and opposing second direction. At least one locking assembly is positioned on at least one of the at least two arms and comprises a plurality of lock surface features configured to couple to the plurality of support member surface features. In a locked position, the at least one of the at least two arms is enabled to slide in the first direction. In an unlocked position, the at least one of the at least two arms is enabled to slide in the second direction.Type: GrantFiled: May 3, 2019Date of Patent: April 26, 2022Assignee: Scorpion Security Products, Inc.Inventors: Franklyn W. Gulick, Jr., Gary R. Page
-
Patent number: 11316900Abstract: A system and computerized method for generating an improved cyber-security rule ordering for cyber-security threat detection or post-processing activities conducted by a rules-based cyber-security engine deployed within a network device is described. Herein, historical metadata associated with analytics conducted on incoming data by a rule-based cyber-security engine and in accordance with a plurality of rules is described. These rules are arranged in a first ordered rule sequence. The historical metadata is analyzed to determine one or more salient rules from the plurality of rules. The plurality of rules are reprioritized by at least rearranging an order to a second ordered rule sequence with the one or more salient rules being positioned toward a start of the second ordered rule sequence. Thereafter, the rule-based cyber-security engine operates in accordance with the reprioritized rule set that is arranged in the second ordered rule sequence to achieve improved performance.Type: GrantFiled: March 14, 2019Date of Patent: April 26, 2022Assignee: FireEye Security Holdings Inc.Inventors: Paul Schottland, Chinmoy Dey, Christopher Glyer
-
Patent number: 11315401Abstract: A security apparatus comprises a body comprising a first guide and a second guide extending along a guide axis and positioned at opposing side of the body, a first holder moveably coupled to the first guide, and a second holder moveably coupled to the second guide. The security apparatus further comprises an actuator, and at least one driver operatively coupled to the actuator and positioned along the guide axis. The driver is connected to the first holder and the second holder. A controller is in communication with the actuator and comprises a controller input, wherein in response to an authorized input, the actuator is configured to drive the driver to move the first holder along the first guide and to move the second holder along the second guide.Type: GrantFiled: May 28, 2021Date of Patent: April 26, 2022Assignee: Scorpion Security Products, Inc.Inventors: Franklyn W. Gulick, Jr., Gary R. Page, Patrick McEwen, Andrew Bartoszewski
-
Patent number: 11310238Abstract: A system for protecting public cloud-hosted virtual resources features cloud visibility logic. According to one embodiment, the cloud visibility logic includes credential evaluation logic, data collection logic, correlation logic and reporting logic. The credential evaluation logic is configured to gain authorized access to a cloud account within a first public cloud network. The data collection logic is configured to retrieve account data from the cloud account, while the correlation logic is configured to conduct analytics on the account data to determine whether the cloud account is subject to a cybersecurity threat or misconfiguration. The reporting logic is configured to generate an alert when the cloud account is determined by the correlation logic to be subject to the cybersecurity threat or misconfiguration.Type: GrantFiled: August 30, 2019Date of Patent: April 19, 2022Assignee: FireEye Security Holdings, Inc.Inventors: Sai Vashisht, Sumer Deshpande, Sushant Paithane, Rahul Khul
-
Patent number: 11303439Abstract: Provided are a method and device for performing authentication using a hardware security module (HSM) in a one machine-to-machine (oneM2M) environment. The method of performing authentication using an HSM in a oneM2M environment includes extracting a symmetric key stored in the HSM using a security application programming interface (API), generating a first value and a second value using the extracted symmetric key, and performing mutual authentication with an M2M enrolment function (MEF) server through transport layer security pre-shared key ciphersuites (TLS-PSK) using the first value and the second value.Type: GrantFiled: June 5, 2019Date of Patent: April 12, 2022Assignee: Penta Security Systems Inc.Inventors: Sung Ok Choi, Young In Park, Sang Gyoo Sim, Duk Soo Kim, Seok Woo Lee
-
Patent number: 11297074Abstract: According to one embodiment, an apparatus comprises a processor and memory. Communicatively coupled to the processor, the memory includes a detection module that, when executed, conducts an analysis of a received object to determine if the received object is associated with a malicious attack. The detection module is configurable, and thus, certain capabilities can be enabled, disabled or modified. The analysis is to be altered upon receipt of a configuration file that includes information to alter one or more rules controlling the analysis conducted by the detection module.Type: GrantFiled: July 1, 2019Date of Patent: April 5, 2022Assignee: FireEye Security Holdings, Inc.Inventors: Michael Vincent, Emmanuel Thioux, Sai Vashisht, Darien Kindlund