Patents Assigned to Secure-it Inc.
  • Patent number: 11391070
    Abstract: A key for a security device is provided. The key may include an electronic component configured to communicate with one or more security devices to initially receive one or more codes associated with each of the security devices. The key may also include a memory configured to store the one or more codes associated with the one or more security devices. The electronic component is configured to communicate with each of the one or more security devices for arming and/or disarming the security devices upon a matching of the code stored by the memory with the code associated with the security device.
    Type: Grant
    Filed: April 23, 2021
    Date of Patent: July 19, 2022
    Assignee: InVue Security Products Inc.
    Inventors: Jeffrey A. Grant, Christopher J. Fawcett
  • Patent number: 11393308
    Abstract: In one example, a connector assembly for providing security to an article of merchandise is provided. The connector assembly includes a cord having a plurality of conductors and a body portion connected to the cord. The connector assembly also includes a connection portion engaged with the body portion and including a plurality of engagement members. Each of the engagement members is electrically connected to a respective conductor in the cord, and the connection portion is configured to engage the article of merchandise to thereby electrically connect the engagement members to one another for establishing a sense loop through the conductors in the cord. Interruption of the sense loop is indicative of a security event.
    Type: Grant
    Filed: June 19, 2020
    Date of Patent: July 19, 2022
    Assignee: InVue Security Products Inc.
    Inventors: Jonathon D. Phillips, Gary A. Taylor, Christopher J. Fawcett, Eric Brutke
  • Patent number: 11381489
    Abstract: A data tracking method, which is performed by a data tracking apparatus in an edge cloud environment including at least one edge node communicating with an end device and a central cloud, includes receiving data from the end device by a first edge node, creating, by the first edge node, a tracing history and distributing the data to a plurality of edge nodes so as to allow the plurality of edge nodes to create tracing histories, transmitting the created tracing histories to the central cloud by the first edge node and the plurality of edge nodes, and verifying, by the central cloud, linkability of the tracing histories transmitted to the central cloud, storing the tracing histories, analyzing the tracing histories, and providing a data tracking function.
    Type: Grant
    Filed: November 29, 2021
    Date of Patent: July 5, 2022
    Assignee: Penta Security Systems Inc.
    Inventors: Jin Hyeok Oh, Myung Woo Chung, Sang Gyoo Sim, Duk Soo Kim, Seok Woo Lee
  • Patent number: 11381042
    Abstract: In one example, the connector includes a body portion configured to be connected to a cord and a connection portion engaged with the body portion and comprising a plurality of conductors. The connection portion includes a conductive shield electrically connected to a plurality of the conductors when the connection portion is not engaged with the article of merchandise, and the connection portion also includes at least one ground conductor that is not electrically connected to the remaining conductors and/or the conductive shield when the connection portion is not engaged with the article of merchandise. At least one of the conductors and/or the conductive shield is configured to cooperate with the ground conductor to define a sense loop when the connector is engaged with the article of merchandise, and interruption of the sense loop is indicative of a security event.
    Type: Grant
    Filed: February 10, 2021
    Date of Patent: July 5, 2022
    Assignee: InVue Security Products Inc.
    Inventors: Jeffrey A. Grant, Gary A. Taylor, Christopher J. Fawcett, Jonathon D. Phillips
  • Patent number: 11373515
    Abstract: A fire alarm communication device having a first and second output voltage which are constant during normal operation of the fire alarm communicator.
    Type: Grant
    Filed: March 29, 2021
    Date of Patent: June 28, 2022
    Assignee: Napco Security Technologies, Inc.
    Inventors: Michael A. Carrieri, Thomas F. Karl, Lance S. Lindsay
  • Publication number: 20220196204
    Abstract: A security apparatus for a launch monitor comprises a guide member extending from a first end to a second end. The guide member comprises a top surface defining one or more top surface features, and opposing side surfaces defining one or more side surface features. A mount is configured to moveably couple to the guide member. The mount comprises a mount body, and a plurality of securing members. Each of the securing members includes a retainer configured to retain and secure a portion of the launch monitor to the mount body and enable the launch monitor to be moved relative to the guide member.
    Type: Application
    Filed: December 17, 2021
    Publication date: June 23, 2022
    Applicant: Scorpion Security Products, Inc.
    Inventors: Grant William Gulick, Franklyn W. Gulick, JR., Gary R. Page
  • Patent number: 11363884
    Abstract: A secure product dispenser assembly comprises a base portion having a first end and a second end, and being configured to hold a plurality of units of product. The base portion comprises a bottom, a first divider coupled to the bottom, and a second divider positioned opposite the first divider and coupled the bottom. A top portion is configured to adjustably couple to the base portion and a dispenser portion is coupled to the top portion and positioned at the first end of the base portion. The dispenser portion is configured to rotate between an open position to enable removal of one unit of product from the first end of the base, and a closed position inhibiting removal of the one unit of product from the first end of the base.
    Type: Grant
    Filed: April 3, 2020
    Date of Patent: June 21, 2022
    Assignee: Scorpion Security Products, Inc.
    Inventors: Franklyn W. Gulick, Jr., John Farinola, Eric Henry, Gary R. Page
  • Patent number: 11361635
    Abstract: Merchandise security systems and methods are provided. In one example, a merchandise security system includes a plurality of security devices arranged in a wireless network, wherein the plurality of security devices are arranged in a planogram and each configured to protect one or more items from theft, each of the plurality of security devices configured to wirelessly communicate data with a remote device. The system also includes a plurality of electronic keys arranged in the wireless network and configured to wirelessly communicate data with the plurality of security devices and/or the remote device. Each of the plurality of electronic keys is configured to operate the plurality of security devices. The system also includes a gateway configured to receive the data from the plurality of security devices and electronic keys via wireless communication, wherein the gateway is configured to communicate the data to the remote computing device.
    Type: Grant
    Filed: May 7, 2020
    Date of Patent: June 14, 2022
    Assignee: InVue Security Products Inc.
    Inventors: Kyle Baker, Gary A. Taylor, Steven R. Bohon, Jeffrey A. Grant, Christopher J. Fawcett, James Richard Terrell, II
  • Publication number: 20220180774
    Abstract: A tamper evident label is formed of destructible material and has opposite major surfaces. One of the major surfaces has an adhesive thereon and is configured to overlie a theft protection sensor and adhere to an article to be protected. At least one weakness formation is provided in the label adjacent the periphery thereof.
    Type: Application
    Filed: February 28, 2022
    Publication date: June 9, 2022
    Applicant: Custom Security Industries Inc.
    Inventors: Lucien Curnew, Robert Petryczka, Morton Roseman
  • Patent number: 11348421
    Abstract: Embodiments of the present invention are directed to merchandise security systems and methods for displaying and protecting items of merchandise from theft. A merchandise security system and method according to the invention includes at least one tag and a plurality of nodes positioned within a display area. The plurality of nodes are operable for determining a location of the tag. The wireless beacon tracking system further includes a server operably associated with the plurality of nodes for receiving information related to the location of the tag.
    Type: Grant
    Filed: December 13, 2019
    Date of Patent: May 31, 2022
    Assignee: InVue Security Products Inc.
    Inventors: David N. Berglund, Christopher J. Fawcett, Gary A. Taylor
  • Publication number: 20220154872
    Abstract: A security apparatus for securing a portable electronic device includes a base that defines a cavity extending from a first end of the base to a second end of the base. A holder is structured to engage the base. The holder includes an outer surface defining a plurality of channels terminating at a support surface and a holder groove defined on the outer surface of the holder. The security apparatus further includes a securing portion with a plurality of projections that are each structured to contact the support surface and engage one of the holder grooves. Rotation of the securing portion relative to the holder acts to move at least a portion of each of the plurality of projections into the holder channel and secure the securing portion to the holder, where the portable electronic device is secured between the securing portion and the holder.
    Type: Application
    Filed: February 1, 2022
    Publication date: May 19, 2022
    Applicant: Scorpion Security Products, Inc.
    Inventors: Franklyn W. Gulick, JR., Gary R. Page
  • Patent number: 11337074
    Abstract: A method for mobile device security of a mobile device. The mobile device includes a global positioning system (GPS) tracker for locating the mobile device. A first zone and a second zone are established in a monitoring area. The mobile device is maintained in a first operating mode when the mobile device is located in the first zone and a second operating mode when the mobile device is located in the second zone. One or more characteristics of the first zone are received from a management system. Upon the mobile device being located outside the first zone for longer than a predetermined time period, one or more first actions are performed. Upon the mobile device returning to the first zone, one or more second actions are performed.
    Type: Grant
    Filed: June 11, 2020
    Date of Patent: May 17, 2022
    Assignee: Scorpion Security Products, Inc.
    Inventors: Franklyn W. Gulick, Jr., Grant William Gulick, Anuj Thakral
  • Publication number: 20220142378
    Abstract: A secure product dispenser assembly comprises a base portion having a first end and a second end, and being configured to hold a plurality of units of product. The base portion comprises a bottom, a first divider coupled to the bottom, and a second divider positioned opposite the first divider and coupled the bottom. A top portion is configured to adjustably couple to the base portion and a dispenser portion is coupled to the top portion and positioned at the first end of the base portion. The dispenser portion is configured to rotate between an open position to enable removal of one unit of product from the first end of the base, and a closed position inhibiting removal of the one unit of product from the first end of the base.
    Type: Application
    Filed: January 26, 2022
    Publication date: May 12, 2022
    Applicant: Scorpion Security Products, Inc.
    Inventors: Franklyn W. Gulick, JR., John Farinola, Eric Henry, Gary R. Page
  • Patent number: 11314859
    Abstract: According to one embodiment, a method detecting and mitigating a privilege escalation attack on an electronic device is described. The method involves operations by a user agent mode operating within a user space and a kernel driver mode operating within a kernel space. The kernel driver mode, in response to detecting an initial activation of a process being monitored, stores metadata associated with an access token. This metadata includes the initial token state information. Responsive to detecting an event associated with the process being monitored, the kernel mode driver extracts a portion of current state information for the access token for comparison to a portion of the stored token state information. Differences between content within the current state information and the stored token state information are used, at least in part, by the user agent mode to detect a privilege escalation attack.
    Type: Grant
    Filed: March 14, 2019
    Date of Patent: April 26, 2022
    Assignee: FireEye Security Holdings, Inc.
    Inventors: Japneet Singh, Ratnesh Pandey, Atul Kabra
  • Patent number: 11313153
    Abstract: A security apparatus for a portable electronic device comprises at least one support member comprising opposing side surfaces and a plurality of support member surface features. At least one of the opposing side surfaces comprises a first engagement structure. One of the at least two arms comprises a second engagement structure configured to slidably engage the first engagement structure allowing movement in a first direction and opposing second direction. At least one locking assembly is positioned on at least one of the at least two arms and comprises a plurality of lock surface features configured to couple to the plurality of support member surface features. In a locked position, the at least one of the at least two arms is enabled to slide in the first direction. In an unlocked position, the at least one of the at least two arms is enabled to slide in the second direction.
    Type: Grant
    Filed: May 3, 2019
    Date of Patent: April 26, 2022
    Assignee: Scorpion Security Products, Inc.
    Inventors: Franklyn W. Gulick, Jr., Gary R. Page
  • Patent number: 11316900
    Abstract: A system and computerized method for generating an improved cyber-security rule ordering for cyber-security threat detection or post-processing activities conducted by a rules-based cyber-security engine deployed within a network device is described. Herein, historical metadata associated with analytics conducted on incoming data by a rule-based cyber-security engine and in accordance with a plurality of rules is described. These rules are arranged in a first ordered rule sequence. The historical metadata is analyzed to determine one or more salient rules from the plurality of rules. The plurality of rules are reprioritized by at least rearranging an order to a second ordered rule sequence with the one or more salient rules being positioned toward a start of the second ordered rule sequence. Thereafter, the rule-based cyber-security engine operates in accordance with the reprioritized rule set that is arranged in the second ordered rule sequence to achieve improved performance.
    Type: Grant
    Filed: March 14, 2019
    Date of Patent: April 26, 2022
    Assignee: FireEye Security Holdings Inc.
    Inventors: Paul Schottland, Chinmoy Dey, Christopher Glyer
  • Patent number: 11315401
    Abstract: A security apparatus comprises a body comprising a first guide and a second guide extending along a guide axis and positioned at opposing side of the body, a first holder moveably coupled to the first guide, and a second holder moveably coupled to the second guide. The security apparatus further comprises an actuator, and at least one driver operatively coupled to the actuator and positioned along the guide axis. The driver is connected to the first holder and the second holder. A controller is in communication with the actuator and comprises a controller input, wherein in response to an authorized input, the actuator is configured to drive the driver to move the first holder along the first guide and to move the second holder along the second guide.
    Type: Grant
    Filed: May 28, 2021
    Date of Patent: April 26, 2022
    Assignee: Scorpion Security Products, Inc.
    Inventors: Franklyn W. Gulick, Jr., Gary R. Page, Patrick McEwen, Andrew Bartoszewski
  • Patent number: 11310238
    Abstract: A system for protecting public cloud-hosted virtual resources features cloud visibility logic. According to one embodiment, the cloud visibility logic includes credential evaluation logic, data collection logic, correlation logic and reporting logic. The credential evaluation logic is configured to gain authorized access to a cloud account within a first public cloud network. The data collection logic is configured to retrieve account data from the cloud account, while the correlation logic is configured to conduct analytics on the account data to determine whether the cloud account is subject to a cybersecurity threat or misconfiguration. The reporting logic is configured to generate an alert when the cloud account is determined by the correlation logic to be subject to the cybersecurity threat or misconfiguration.
    Type: Grant
    Filed: August 30, 2019
    Date of Patent: April 19, 2022
    Assignee: FireEye Security Holdings, Inc.
    Inventors: Sai Vashisht, Sumer Deshpande, Sushant Paithane, Rahul Khul
  • Patent number: 11303439
    Abstract: Provided are a method and device for performing authentication using a hardware security module (HSM) in a one machine-to-machine (oneM2M) environment. The method of performing authentication using an HSM in a oneM2M environment includes extracting a symmetric key stored in the HSM using a security application programming interface (API), generating a first value and a second value using the extracted symmetric key, and performing mutual authentication with an M2M enrolment function (MEF) server through transport layer security pre-shared key ciphersuites (TLS-PSK) using the first value and the second value.
    Type: Grant
    Filed: June 5, 2019
    Date of Patent: April 12, 2022
    Assignee: Penta Security Systems Inc.
    Inventors: Sung Ok Choi, Young In Park, Sang Gyoo Sim, Duk Soo Kim, Seok Woo Lee
  • Patent number: 11297074
    Abstract: According to one embodiment, an apparatus comprises a processor and memory. Communicatively coupled to the processor, the memory includes a detection module that, when executed, conducts an analysis of a received object to determine if the received object is associated with a malicious attack. The detection module is configurable, and thus, certain capabilities can be enabled, disabled or modified. The analysis is to be altered upon receipt of a configuration file that includes information to alter one or more rules controlling the analysis conducted by the detection module.
    Type: Grant
    Filed: July 1, 2019
    Date of Patent: April 5, 2022
    Assignee: FireEye Security Holdings, Inc.
    Inventors: Michael Vincent, Emmanuel Thioux, Sai Vashisht, Darien Kindlund