Patents Assigned to Security Technologies
-
Patent number: 11748691Abstract: A system adapted to collect security parameters from a shipping container while a container lifting mechanism is lifting and moving said container, comprising: a mount adapted to attach at least one sensor to a container lifting mechanism, wherein the at least one sensor is adapted to capture at least one sensor parameter associated with a shipping container while the container lifting mechanism lifts said shipping container; a network interface adapted to receive over a network at least one manifest parameter associated with the shipping container; at least one hardware processor adapted to execute code for detecting a mismatch between data deduced from an analysis of the at least one sensor parameter and the at least one manifest parameter, and outputting a signal indicative of said mismatch.Type: GrantFiled: November 15, 2017Date of Patent: September 5, 2023Assignee: S.T.I. Security Technology Integration Ltd.Inventor: Yuval Ovadia
-
Publication number: 20230237148Abstract: Disclosed herein are systems, methods, and storage media for distributed system security. In an example embodiment, a computer-executable method includes receiving a first item of executable code, calculating a hash of the first item of executable code, and comparing the calculated hash to a database of hashes. Responsive to a determination that the calculated hash does not match any hash in the database of hashes, a first security policy is applied to the first item of executable code. Triggering of the first policy indicates that the first item of executable code should be blocked from execution. If the first item of executable code does not trigger the first security policy, the method includes executing the first item of executable code and intercepting a request initiated by the first item of executable code during execution. In the request matches a second security policy, the request is blocked and/or filtered or sanitized, based on attribute-based access control policies.Type: ApplicationFiled: April 3, 2023Publication date: July 27, 2023Applicant: Data Security Technologies LLCInventors: Fahad Shaon, Sazzadur Rahaman
-
Patent number: 11671434Abstract: User behavior data of multiple users is acquired, and multiple user eigenvalues of user behavior data of each user under preset multiple user behavior dimensions are extracted. A user eigenvector of each user is determined based on the multiple eigenvalues of this user. Multiple user classes are obtained by clustering the user eigenvectors of multiple users are clustered through a preset clustering algorithm. A central vector of each user class is determined based on the user eigenvectors included in this user class. A difference eigenvector of each user class is determined, wherein a distance between the difference eigenvector and a central vector of an aggregation class to which the difference eigenvector belongs is not within a preset distance range. A user characterized by the difference eigenvector is determined as an abnormal user.Type: GrantFiled: May 9, 2019Date of Patent: June 6, 2023Assignee: New H3C Security Technologies Co., Ltd.Inventor: Chengjie Gu
-
Publication number: 20230171246Abstract: A method for agentless monitoring of third-party applications is disclosed. The method includes: initiating by a monitoring agentless application (MAA) executing on a computer a service instance in a cloud-based computing environment of a software as a service (SaaS); providing, to a third-party application by the MAA, application access credentials for use in accessing the service instance; and extracting, by the MAA, behavior data from the service instance based on at least an action performed by the third-party application in the service instance.Type: ApplicationFiled: August 5, 2022Publication date: June 1, 2023Applicant: Canonic Security Technologies Ltd.Inventors: Boris GORIN, Niv STEINGARTEN
-
Publication number: 20230171281Abstract: A method for generating a threat indicator for a third-party application. The method includes: obtaining, by a monitoring agentless application (MAA) executing on a computer, a predetermined set of attributes of a third-party application that operates on top of a software as a service (SaaS) instance, wherein the third party-application is a SaaS add-on; obtaining, by the MAA, behavior data from the SaaS instance based on at least an action performed by the third-party application in the SaaS instance; and generating a threat indicator for the third-party application based on the predetermined set of attributes and the behavior data.Type: ApplicationFiled: August 5, 2022Publication date: June 1, 2023Applicant: Canonic Security Technologies Ltd.Inventors: Boris GORIN, Niv STEINGARTEN
-
Patent number: 11646976Abstract: A method and apparatus for establishing a fast-forwarding table are provided. The method comprises: when a communication packet is received, determining, according to matching rules of services set in a packet processing policy, a target service matching the communication packet; if a fast-forwarding table corresponding to the communication packet is not stored locally, obtaining a preset target priority of the target service, and determining a target resource utilization threshold corresponding to the target priority according to a preset correspondence between priorities and resource utilization thresholds; determining whether a current resource utilization is greater than the target resource utilization threshold; and establishing a fast-forwarding table corresponding to the communication packet if the current resource utilization is not greater than the target resource utilization threshold.Type: GrantFiled: August 30, 2019Date of Patent: May 9, 2023Assignee: New H3C Security Technologies Co., Ltd.Inventor: Tian Xia
-
Patent number: 11647281Abstract: A method and system provides centralized redundant monitoring suitable for effectively recording and tracking video monitoring systems at a plurality of remote surveillance locations. The method and system are configured to track, monitor, capture, and record video originating from transportation vehicles using a novel technological configuration that minimizes overall and sub-system downtime relative to conventional technologies. The remote surveillance locations are capable of utilizing self-healing and recovery mechanisms and reporting status information to the centralized monitoring system. The centralized monitoring system can use information received from the remote surveillance locations to remotely monitor the status of the remote surveillance systems, to initiate remotely self-healing and recovery mechanisms, and request previously recorded surveillance data and live surveillance data in real time.Type: GrantFiled: June 3, 2021Date of Patent: May 9, 2023Assignee: Minuteman Security Technologies, IncInventors: Jay Axson, John Julien, Jr.
-
Patent number: 11620378Abstract: Disclosed herein are systems, methods, and storage media for distributed system security. In an example embodiment, a computer-executable method includes receiving a first item of executable code, calculating a hash of the first item of executable code, and comparing the calculated hash to a database of hashes. Responsive to a determination that the calculated hash does not match any hash in the database of hashes, a first security policy is applied to the first item of executable code. Triggering of the first policy indicates that the first item of executable code should be blocked from execution. If the first item of executable code does not trigger the first security policy, the method includes executing the first item of executable code and intercepting a request initiated by the first item of executable code during execution. In the request matches a second security policy, the request is blocked and/or filtered or sanitized, based on attribute-based access control policies.Type: GrantFiled: November 27, 2019Date of Patent: April 4, 2023Assignee: Data Security Technologies LLCInventors: Fahad Shaon, Sazzadur Rahaman
-
Publication number: 20230055054Abstract: A fire, burglary or access control security communicator having an antenna switching system and method that is external to the cell module to allow complete switching from a primary to a secondary antenna based on signal strength, error rate or other performance parameters.Type: ApplicationFiled: August 23, 2022Publication date: February 23, 2023Applicant: Napco Security Technologies, Inc.Inventors: Richard L. Soloway, Michael A. Carrieri, Christopher Summit
-
Patent number: 11549161Abstract: A graphene-reinforced alloy composite material and a preparation method thereof are disclosed. The method includes preparing a porous graphene colloid, smelting a first-part alloy, pouring it into the porous graphene colloid to be formed, subjecting the formed product to a hot extrusion, and pulverizing into a powder I; smelting a second-part alloy into an alloy melt II, adding a high-purity silicon powder therein, mixing by stirring, and atomizing to obtain a powder II; mixing the powder I and the powder II, to obtain a pretreated alloy powder; placing the pretreated alloy powder in a high-purity ark, transferring the high-purity ark to a high-temperature tubular furnace, subjecting the pretreated alloy powder to a redox treatment, and introducing methane and hydrogen to grow graphene, to obtain a coated alloy powder; subjecting the coated alloy powder to a pre-compressing molding and sintering, to obtain the graphene-reinforced alloy composite material.Type: GrantFiled: September 10, 2021Date of Patent: January 10, 2023Assignee: Beijing Feilixin Information Security Technology Co., Ltd.Inventors: Keqing Luo, Yongquan Zhu, Bo Du, Xuquan Zhu
-
Publication number: 20220352975Abstract: An information interaction system and method for heterogeneous detection and recognition devices for a low-altitude unmanned aerial vehicle (UAV) are provided, where each edge data unit is connected to a uniquely corresponding low-altitude UAV detection and sensing device and an access and distribution unit. The access and distribution unit is connected to a storage service unit and at least one scheduling and calculation unit. Each scheduling and calculation unit is connected to a comprehensive calculation and display unit. The comprehensive calculation and display unit is connected to the storage service unit. The storage service unit sends historical data to the comprehensive calculation and display unit after being authorized. The method is applied to the information interaction system for heterogeneous detection and recognition devices for a low-altitude UAV. A problem of data collaborative application of different low-altitude UAV detection devices is resolved.Type: ApplicationFiled: April 27, 2022Publication date: November 3, 2022Applicants: Zhejiang University of Science & Technology, Genenkosy Intelligence Security Technology(Hangzhou) Co., LtdInventors: Qingchun JIAO, Liqing WANG, Zhongliang SUN
-
Patent number: 11455874Abstract: A security tag including: a housing and circuitry which detects a locked state, the circuitry configured to execute a signal transfer function responsive to interchanging a pin and a lanyard in the circuitry, and/or the housing including a replaceable battery compartment locked by inserting either the pin or the lanyard into a lock mechanism which differently secures the pin and the lanyard; and an alarm, in communication with the circuitry, triggered by an undisarmed breach of the locked state.Type: GrantFiled: September 27, 2021Date of Patent: September 27, 2022Assignee: Hangzhou Timing Security Technologies Co., Ltd.Inventors: Lin Wang, Peter Morello, Sr., Peter A. Morello, Jr.
-
Publication number: 20220262216Abstract: A security device system including portions configured to have a combined state and a separated state. In the combined state, circuitry is configured to have an armed state and a not-armed state, and to trigger an alarm during a breach of the armed state. Depending on the embodiment, at least one of the portions, and in some embodiments more than one of the portions, participate in the armed and not-armed states. In some embodiments, the security device system includes an alarm device portion, a cradle portion, and a stratum portion.Type: ApplicationFiled: May 2, 2022Publication date: August 18, 2022Applicant: Hangzhou Timing Security Technologies Co., Ltd.Inventors: Hexiao Wang, Peter A. Morello, Jr., Lin Wang, Peter Morello, Sr.
-
Patent number: 11373515Abstract: A fire alarm communication device having a first and second output voltage which are constant during normal operation of the fire alarm communicator.Type: GrantFiled: March 29, 2021Date of Patent: June 28, 2022Assignee: Napco Security Technologies, Inc.Inventors: Michael A. Carrieri, Thomas F. Karl, Lance S. Lindsay
-
Patent number: 11322005Abstract: A security device system including portions configured to have a combined state and a separated state. In the combined state, circuitry is configured to have an armed state and a not-armed state, and to trigger an alarm during a breach of the armed state. Depending on the embodiment, at least one of the portions, and in some embodiments more than one of the portions, participate in the armed and not-armed states. In some embodiments, the security device system includes an alarm device portion, a cradle portion, and a stratum portion.Type: GrantFiled: June 10, 2018Date of Patent: May 3, 2022Assignee: Hangzhou Timing Security Technologies Co., Ltd.Inventors: Hexiao Wang, Peter A. Morello, Jr., Lin Wang, Peter Morello, Sr.
-
Publication number: 20220012994Abstract: A security tag including: a housing and circuitry which detects a locked state, the circuitry configured to execute a signal transfer function responsive to interchanging a pin and a lanyard in the circuitry, and/or the housing including a replaceable battery compartment locked by inserting either the pin or the lanyard into a lock mechanism which differently secures the pin and the lanyard; and an alarm, in communication with the circuitry, triggered by an undisarmed breach of the locked state.Type: ApplicationFiled: September 27, 2021Publication date: January 13, 2022Applicant: Hangzhou Timing Security Technologies Co., Ltd.Inventors: Lin Wang, Peter Morello, SR., Peter A. Morello, JR.
-
Patent number: 11153331Abstract: The disclosed teachings include a computer-implemented method a computer-implemented method for identifying a data breach. The method includes monitoring movement of data over a computer network in real-time or near real-time relative to at least one of a user, a device, or a software application, comparing the monitored movement of the data to a baseline movement of the data over the computer network in real-time or near real-time relative to at least one of the user, the device, or the software application, and identifying an ongoing data breach in real-time or near real-time based on the comparison. The identified ongoing data breach indicates a relationship between the data and at least one of the user, the device, and the software application.Type: GrantFiled: April 24, 2018Date of Patent: October 19, 2021Assignee: HeFei HoloNet Security Technology Co.. Ltd.Inventors: Feng Zou, Chunqing Cheng, Sheng Li
-
Patent number: 11138849Abstract: A security tag including: a housing and circuitry which detects a locked state, the circuitry configured to execute a signal transfer function responsive to interchanging a pin and a lanyard in the circuitry, and/or the housing including a replaceable battery compartment locked by inserting either the pin or the lanyard into a lock mechanism which differently secures the pin and the lanyard; and an alarm, in communication with the circuitry, triggered by an undisarmed breach of the locked state.Type: GrantFiled: January 8, 2018Date of Patent: October 5, 2021Assignee: Hangzhou Timing Security Technologies Co., LtdInventors: Lin Wang, Peter Morello, Sr., Peter A. Morello, Jr.
-
Publication number: 20210293052Abstract: A first portion of a security device, the first portion configured to have a separate state with respect to a second portion and a combined state with respect to the second portion, such that when in the combined state, the first portion is mated, interlocked, and/or locked with the second portion to collectively form the security device.Type: ApplicationFiled: April 27, 2018Publication date: September 23, 2021Applicant: Hangzhou Timing Security Technologies Co., Ltd.Inventors: Lin Wang, Hexiao Wang, Peter Morello, Sr., Peter A. Morello, Jr.
-
Patent number: D998749Type: GrantFiled: April 29, 2022Date of Patent: September 12, 2023Assignee: Guangdong Meizhongkai Security Technology Co., Ltd.Inventor: Zhongyan He