Patents Assigned to Secure Systems Limited
-
Patent number: 10200408Abstract: A system comprises: a representation of a network; a communications requirements file for an application to be executed by a node of said network; and a security policy file defining a security policy for said node of said network. Said files are processed to determine whether said security policy and said communication requirements are compatible.Type: GrantFiled: December 19, 2008Date of Patent: February 5, 2019Assignee: EADS Defence and Security Systems LimitedInventor: Mark Bentall
-
Patent number: 8902064Abstract: A security system comprises a plurality of alarm points distributed at a plurality of positions in a building; signal processing module for receiving alarm signals from at least an alarm point when alarm occurs at the at least an alarm point, transmitting the alarm signals to a server; a database for storing several sets of user information, map data, several sets of alarm point information; the server for receiving user requests from a plurality of clients, responding to the user requests according to the user information, the data map and the alarm point information, and then reverting responses to clients; the clients for sending the user request to the server and receiving and output responses. The present security system is of the advantage that it could be fully computerized and could satisfy the requirements of usage at the same time at several different sites by a plurality of different users.Type: GrantFiled: December 16, 2011Date of Patent: December 2, 2014Assignee: Nixon Security System LimitedInventor: Wing Kee Chan
-
Patent number: 8503052Abstract: We describe techniques for recording a holographic image onto holographic recording film, in particular for security holograms. We thus describe a structure having a stack comprising the holographic recording film and a multichannel image generation device under the film. A three-dimensional object (or hologram of a 3D object) is provided, located under the multichannel image generation device. At least a portion of the multichannel image generation device is substantially transparent or absent in a region above the object. A holographic image is recorded in the film by illuminating the stack with laser light. The multichannel image generation device under the film may comprise a volume reflection hologram of a lenticularly generated image. The structure records a hologram of the 3D object in conjunction with a multi-channel holographic image.Type: GrantFiled: May 7, 2008Date of Patent: August 6, 2013Assignee: Ver-Tec Security Systems LimitedInventors: Patrick Flynn, John David Wiltshire
-
Patent number: 8474021Abstract: A computer security device comprising a processor that is independent of the host CPU for controlling access between the host CPU and the storage device. A program memory that is independent of the computer memory and the storage device unalterably stores and provides computer programs for operating the processor in a manner so as to control access to the storage device. The security device is connected only in line with the data access channel between the host CPU and the storage device, and off the main data and control bus of the host CPU. All data access by the host CPU to the data storage device is blocked before initialization of the security device and is intercepted immediately after the initialization under the control of the processor. The processor effects independent control of the host CPU and configuration of the computer to prevent unauthorized access to the storage device during the interception phase.Type: GrantFiled: June 28, 2002Date of Patent: June 25, 2013Assignee: Secure Systems LimitedInventors: Michael Alfred Hearn, Richard Kabzinski
-
Patent number: 8397026Abstract: An access control system (10) is disclosed for controlling access to data stored on at least one data storage medium (14) of a computing system. The access control system (10) comprises authentication means (25) to authenticate users permitted to access data stored in the at least one data storage medium (14) and database means (29) arranged to store data access profiles. Each data access profile is associated with a user permitted to access data stored in the at least one data storage medium (14), each data access profile includes information indicative of the degree of access permitted by a user to data stored in the at least one data storage medium (14), and each data access profile includes a master data access profile (M) and a current data access profile (C). The current data access profile (C) is modifiable within parameters defined by the master data access profile (M).Type: GrantFiled: March 4, 2005Date of Patent: March 12, 2013Assignee: Secure Systems LimitedInventors: Michael J. Wynne, Michael R. Geddes
-
Patent number: 8250648Abstract: A security system for a computer operating system comprising a processor (37) that is independent of the host CPU (13) for controlling access between the host CPU (13) and a security partition formed in the storage device (21) for storing the operating system. A program memory (41) that is independent of the computer memory and the storage device (21) unalterably stores and provides computer programs for operating the processor (37) in a manner so as to control access to the security partition in the storage device (21). All data access by the host CPU (13) to the data storage device (21) is blocked before initialization of the security system and is intercepted immediately after the initialization under the control of the processor (37). The processor (37) effects independent control of the host CPU (13) and configuration of the computer (11) to prevent unauthorised access to the security partition on the storage device (21) during the interception phase.Type: GrantFiled: March 29, 2004Date of Patent: August 21, 2012Assignee: Secure Systems LimitedInventors: Richard Kabzinski, Michael Alfred Hearn, Russell E. Powers
-
Patent number: 8189247Abstract: Improved techniques for using holograms to provide security for documents and the like. A method of providing a tamper-resistant pattern in association with a hologram on a substrate, the method including: preparing a hologram, the hologram being recorded in a photosensitive recording layer carried by a carrier; printing a pattern onto the photosensitive recording layer; and then attaching the hologram to a substrate by adhesive such that the pattern is between the photosensitive recording layer and the substrate to provide a tamper-resistant pattern in association with the hologram.Type: GrantFiled: August 22, 2008Date of Patent: May 29, 2012Assignee: Ver-Tec Security Systems LimitedInventors: David Roy Winterbottom, John David Wiltshire, Satyamoorthy Kabilian
-
Publication number: 20120096510Abstract: A system comprises: a representation of a network; a communications requirements file for an application to be executed by a node of said network; and a security policy file defining a security policy for said node of said network. Said files are processed to determine whether said security policy and said communication requirements are compatible.Type: ApplicationFiled: December 19, 2008Publication date: April 19, 2012Applicant: EADS Defence and Security Systems LimitedInventor: Mark Bentall
-
Publication number: 20110035578Abstract: A communications system (40) comprises a first entity (42), a first encryption device (48) and a network (46). The first encryption device (48) is adapted to decrypt, using a first decryption algorithm, data sent from a first destination to said first entity via said network (46). The first encryption device (48) is adapted to pass network metric data concerning at least one route between said first entity and said first destination to said first entity without subjecting said network metric data to said first decryption algorithm.Type: ApplicationFiled: January 19, 2009Publication date: February 10, 2011Applicant: EADS Defence and Security Systems LimitedInventor: Mark Bentall
-
Patent number: 7880630Abstract: A security system for a boundary is generally shown as (1) in FIG. 1. The components comprise an elongate member (2) and a support (3) for the bar. The bar support (3) can be fitted to boundary support. A conduit (7) extends through the housing (3). The rod is surrounded by a resilient member. The boundary supports (4) and the bars (2) are in communication with a circuit monitor unit (17) and from an electromechanical disturbance mechanism (EMDM) unit for detecting security breakdown of the boundary.Type: GrantFiled: July 8, 2005Date of Patent: February 1, 2011Assignee: Compound Security Systems LimitedInventor: Howard Stapleton
-
Publication number: 20070300287Abstract: An access control system (10) is disclosed for controlling access to data stored on at least one data storage medium (14) of a computing system. The access control system (10) comprises authentication means (25) to authenticate users permitted to access data stored in the at least one data storage medium (14) and database means (29) arranged to store data access profiles. Each data access profile is associated with a user permitted to access data stored in the at least one data storage medium (14), each data access profile includes information indicative of the degree of access permitted by a user to data stored in the at least one data storage medium (14), and each data access profile includes a master data access profile (M) and a current data access profile (C). The current data access profile (C) is modifiable within parameters defined by the master data access profile (M).Type: ApplicationFiled: March 4, 2005Publication date: December 27, 2007Applicant: Secure Systems LimitedInventors: Michael Wynne, Michael Geddes
-
Publication number: 20070028292Abstract: A computer security system comprising security logic that is independent of the host CPU (13) for controlling access between the host CPU (13) and the storage device (21). A program memory (41) that is independent of the computer memory unalterably stores and provides computer programs for operating the processor (37) in a manner so as to control access to the storage device (21). The security logic comprises logic in bus bridge circuitry . The bus bridge circuitry can be embodied in the south bridge circuit (326) of a computer system (11) or alternatively in a SOC circuit (351) of a HDD. All data access by the host CPU (13) to the data storage device (21) is blocked before initialisation of the security system and is intercepted immediately after the initialisation under the control of the security logic. The security logic effects independent control of the host CPU (13) and configuration of the computer (11) to prevent unauthorised access to the storage device (21) during the interception phase.Type: ApplicationFiled: February 20, 2004Publication date: February 1, 2007Applicant: Secure Systems LimitedInventors: Richard Kabzinski, Michael Hearn, Russell Powers
-
Patent number: 4829286Abstract: A taut wire protective fence system, including a plurality of taut wires and a sensor, the sensor including apparatus for bending of an optical fiber in response to displacement of a taut wire, thereby producing sensible attenuation of light passing through the optical fiber.Type: GrantFiled: May 7, 1987Date of Patent: May 9, 1989Assignee: Magal Security Systems, LimitedInventor: Dank Zvi
-
Patent number: 4820920Abstract: A method of detecting a dangerous substance such as explosives or drugs in an article (27) in transit comprises the steps of taking a sample of atmosphere (28) from the vicinity of the article, causing the sample to enter an ionization chamber (24) of a mass spectrometer (30), obtaining a mass spectrum of one or more constituents of the sample, comparing the mass spectrum with one or more reference spectra, and generating a signal indicative of any said dangerous substance in the sample.Type: GrantFiled: April 24, 1987Date of Patent: April 11, 1989Assignee: Analytical Security Systems LimitedInventor: John M. Bather
-
Patent number: 4777476Abstract: A security fence including a multiplicity of rigid bar elements disposed in a fence configuration, an optical fiber extending through at least some of the hollow rigid bar elements and apparatus for providing predetermined bending of the optical fiber in response to bending of at least some of the rigid bar elements by at least a given amount.Type: GrantFiled: May 7, 1987Date of Patent: October 11, 1988Assignee: Magal Security Systems, LimitedInventor: Zvi Dank
-
Patent number: 4709153Abstract: To monitor that infra-red radiation element 22 within housing 10 has not been disarmed, for instance by rendering opaque an infra-red transparent element 16 masking a window 12, in the housing 10, through which radiation may enter and be focussed by optical system 18 onto the element 22, an infra-red radiation generator 32 comprising a low-temperature lamp 34 is mounted externally of the housing 10 so that element 22 receives radiation therefrom and provides a signal to a processor 30. The latter will provide an alarm in the event of absence of radiation from the generator 32 and/or change in the radiation reaching the element 22 commensurate with approach of a person.Type: GrantFiled: June 6, 1985Date of Patent: November 24, 1987Assignee: Shorrock Security Systems LimitedInventor: Roy A. Schofield
-
Patent number: 4518946Abstract: An alarm device comprises a bell alarm 12 and a flashing light warning means 11, both encased in a housing 13 formed of translucent material. The device of the invention incorporates both an audible and visual alarm means in a single device and electrical circuit means are provided whereby the audible alarm may be turned off after a preselected time period and the visual warning means then comes into operation. Alternatively, both the audible alarm and the visual warning alarm can both operate together initially and then, after a preselected time, the audible alarm is turned off, leaving the visual warning means in operation.The arrangement of the invention is substantially maintenance free and vandal-proof and the translucent housing permits the visual warning means to be seen therethrough, without disclosing the workings of the device.Type: GrantFiled: May 19, 1982Date of Patent: May 21, 1985Assignee: CQR Security Systems LimitedInventor: Dennis R. Solomon
-
Patent number: 4401977Abstract: This radio transmitter is for use in an access control system and comprises a hands-free pocket token arranged to transmit bursts of oscillations at a preset carrier frequency with a preset number of carrier frequency cycles in each burst. The transmitter is controlled by a logic circuit driven from a counter of the number of oscillations both in a transmission burst and in the interval between bursts, so that a particularly simple system is provided which can be easily reset in accordance with requirements.Type: GrantFiled: January 6, 1981Date of Patent: August 30, 1983Assignee: Mastiff Security Systems LimitedInventor: Derek R. Taylor
-
Patent number: 4300236Abstract: This invention is a radio frequency identity system in which each user has a token containing a low power transmitter. If he wants to enter a security area, a receiver operates to let him enter if it recognizes that the transmission is correct. A correct transmission is one having a set number of R.F. carrier cycles between successive modulation pulses.In an alarm system a user can identify himself in a similar manner.Type: GrantFiled: January 8, 1979Date of Patent: November 10, 1981Assignee: Lewis Security Systems LimitedInventor: William D. Gilmour, deceased
-
Patent number: D590831Type: GrantFiled: April 23, 2007Date of Patent: April 21, 2009Assignee: EADS Defence and Security Systems LimitedInventor: Robert Henry Evans