Patents Assigned to Security Technologies
-
Publication number: 20090007269Abstract: A device may create a new project that includes criteria, import findings from a group of different network security tools into the new project based on the criteria, normalize the imported findings, and store the normalized findings.Type: ApplicationFiled: June 29, 2007Publication date: January 1, 2009Applicant: Network Security Technologies, Inc.Inventor: Scott V. BIANCO
-
Patent number: 7453364Abstract: The invention relates to a safety device system, comprising a wearable alarm device fastenable to the wrist or elsewhere in the body or an instrument measuring physiological signals or a combination thereof, and a data terminal (6) capable of receiving messages and information from a wearable device (1). The wearable device (1) has a measurement-based identification about the device being attached to a wearer, said identification being processed for status data. The data terminal (6) has a user interface for displaying the measured status data graphically.Type: GrantFiled: July 5, 2005Date of Patent: November 18, 2008Assignee: IST International Security Technology OyInventors: Antti Särelā, Marko Myllymāki
-
Patent number: 7430759Abstract: A method and a computer system for securing communication in networks of data processing units which can be used especially for individually created security units for portable computer systems. In order to secure the communication, the data exchange between a data processing unit to be protected and the network is monitored and/or controlled by means of a computer program which is implemented in a security computer system as embedded software, the security computer system being inserted between the data processing device to be protected and the network. A computer system providing such protection is embodied as a single board computer or as a chip solution and comprises means for exchanging data with the data processing unit to be protected, means for exchanging data with the network, and means for monitoring and/or controlling the communication between the data processing unit to be protected and the network.Type: GrantFiled: July 29, 2002Date of Patent: September 30, 2008Assignee: Innominate Security Technologies AGInventors: Frank Piepiorra, Michael Maechtel, Lutz Jaenicke
-
Patent number: 7359042Abstract: A limited access space inspection system comprising: an imaging device for imaging a region in the limited access space, a mounting for mounting the imaging device to scan about the limited access space and a scanning control unit, associated with the imaging device, for controlling the imaging device to scan about the limited access space. The device is particularly useful for improving by automation, security checks customs checks and safety checks involving such awkward to access spaces.Type: GrantFiled: September 23, 2002Date of Patent: April 15, 2008Assignee: S.T.I. Security Technology Integration LtdInventor: Yuval Ovadia
-
Patent number: 7327447Abstract: A limited access space inspection system comprising: a sensing device for carrying out sensing over a region in the limited access space, a mounting for mounting the sensing device to scan about the limited access space and a scanning control unit, associated with the sensing device, for controlling the sensing device to scan about the limited access space. The device is particularly useful for improving by automation, security checks, customs checks and safety checks involving such awkward to access spaces. The sensing device may be an imaging device, or a sensor for detecting traces of chemical substances.Type: GrantFiled: September 18, 2003Date of Patent: February 5, 2008Assignee: S.T.I. Security Technology Integration Ltd.Inventor: Yuval Ovadia
-
Patent number: 7295321Abstract: The present invention includes an interferometer for VISAR. Optionally, the present VISAR system includes intracavity imaging design with converging beams and field elements to, among other possible purposes, image the array. An optional embodiment of the present VISAR system may also optionally include precision fiber arrays. Optionally, the present system may use non-collimated beams to allow intracavity access to individual channels for one or more additional delay paths.Type: GrantFiled: November 30, 2005Date of Patent: November 13, 2007Assignee: National Security Technologies, LLCInventors: Bruce Russell Marshall, Marcus David Knudson, Elliot Michael Burke, Terrence John Davies, Gerald Daniel Stevens
-
Publication number: 20070169151Abstract: Portable surveillance and monitoring systems are provided for effecting portable video capture, wireless transmission of video data from one or more portable video capture units (VCUs) to a central monitoring station (CMS) and wireless control of the one or more VCUs from the CMS. One or more portable VCUs are equipped with digital cameras and are located to capture video in a region of interest. Each VCU comprises a plurality of directional antennas, each of which provides antenna gain over a particular azimuthal angular range. Each VCU also comprises a controller which is configured to select a particular one of its antennas and a particular channel identifier (CID) signal and associated frequency hopping sequence which are used to implement frequency hopping spread spectrum wireless communication between the VCU and the CMS.Type: ApplicationFiled: January 18, 2006Publication date: July 19, 2007Applicant: Argon Security Technologies Inc.Inventors: T. Vishloff, Justin Todd
-
Patent number: 7228005Abstract: A method and device for restoration of electro-optical image data using an adaptive Wiener filter begins with constructing imaging system Optical Transfer Function, and the Fourier Transformations of the noise and the image. A spatial representation of the imaged object is restored by spatial convolution of the image using a Wiener restoration kernel.Type: GrantFiled: June 16, 2003Date of Patent: June 5, 2007Assignee: National Security Technologies, LLCInventor: Ding Yuan
-
Patent number: 7219152Abstract: Small, optimized sequences of binary 5-tuples, representing filter rules, which achieve space efficient packet filtering. A post-match procedure table allows dynamic and extensible packet processing. Packet filtering is accomplished by processing filter rule statements and procedure statements, entered by a user in a rules file, to generate 5-tuple filtering rules and a procedure table, and loading the filtering rules and procedure table into the filter interpreter. A filter interpreter then applies the resolved filtering rules for each packet received at the network adapter. When a filtered packet matches a rule, a specified function is invoked.Type: GrantFiled: September 1, 2005Date of Patent: May 15, 2007Assignee: Bluefire Security Technologies, Inc.Inventor: Dennie Komisky
-
Publication number: 20060137009Abstract: A method for detecting an attack in a computer network includes monitoring communication traffic transmitted over connections on the network that are associated with a stateful application protocol so as to detect respective states of the connections, and analyzing a distribution of the states so as to detect the attack.Type: ApplicationFiled: December 22, 2004Publication date: June 22, 2006Applicant: V-Secure Technologies, Inc.Inventor: Avi Chesla
-
Publication number: 20060007860Abstract: Small, optimized sequences of binary 5-tuples, representing filter rules, which achieve space efficient packet filtering. A post-match procedure table allows dynamic and extensible packet processing. Packet filtering is accomplished by processing filter rule statements and procedure statements, entered by a user in a rules file, to generate 5-tuple filtering rules and a procedure table, and loading the filtering rules and procedure table into the filter interpreter. A filter interpreter then applies the resolved filtering rules for each packet received at the network adapter. When a filtered packet matches a rule, a specified function is invoked.Type: ApplicationFiled: September 1, 2005Publication date: January 12, 2006Applicant: Bluefire Security Technologies, Inc.Inventor: Dennis Komisky
-
Patent number: 6963913Abstract: Small, optimized sequences of binary 5-tuples, representing filter rules, which achieve space efficient packet filtering. A post-match procedure table allows dynamic and extensible packet processing. Packet filtering is accomplished by processing filter rule statements and procedure statements, entered by a user in a rules file, to generate 5-tuple filtering rules and a procedure table, and loading the filtering rules and procedure table into the filter interpreter. A filter interpreter then applies the resolved filtering rules for each packet received at the network adapter. When a filtered packet matches a rule, a specified function is invoked.Type: GrantFiled: June 11, 2002Date of Patent: November 8, 2005Assignee: Bluefire Security Technologies, Inc.Inventor: Dennis Komisky
-
Publication number: 20040057042Abstract: A limited access space inspection system comprising: an imaging device for imaging a region in the limited access space, a mounting for mounting the imaging device to scan about the limited access space and a scanning control unit, associated with the imaging device, for controlling the imaging device to scan about the limited access space. The device is particularly useful for improving by automation, security checks customs checks and safety checks involving such awkward to access spaces.Type: ApplicationFiled: September 23, 2002Publication date: March 25, 2004Applicant: S.T.I. Security Technology Integration Ltd.Inventor: Yuval Ovadia
-
Publication number: 20030018591Abstract: Small, optimized sequences of binary 5-tuples, representing filter rules, which achieve space efficient packet filtering. A post-match procedure table allows dynamic and extensible packet processing. Packet filtering is accomplished by processing filter rule statements and procedure statements, entered by a user in a rules file, to generate 5-tuple filtering rules and a procedure table, and loading the filtering rules and procedure table into the filter interpreter. A filter interpreter then applies the resolved filtering rules for each packet received at the network adapter. When a filtered packet matches a rule, a specified function is invoked.Type: ApplicationFiled: June 11, 2002Publication date: January 23, 2003Applicant: BlueFire Security TechnologiesInventor: Dennis Komisky
-
Patent number: 6449721Abstract: The invention provides for encrypting electronic information such as a document so that only users with permission may access the document in decrypted form. The process of encrypting the information includes selecting a set of policies as to who may access the information and under what conditions. A remote server stores a unique identifier for the information and associates an encryption/decryption key pair and access policies with the information. Software components residing on the author's computer retrieve the encryption key from the remote server, encrypt the information, and store the encrypted information at a location chosen by the author. A user wishing to access the information acquires the encrypted information electronically.Type: GrantFiled: November 1, 2001Date of Patent: September 10, 2002Assignee: Authentica Security Technologies, Inc.Inventors: David A. Pensak, John J. Cristy, Steven J. Singles
-
Patent number: 6348867Abstract: An automatic control system for actuators and security devices in building automation. A wrist-held sensor and transmitter unit (11) transmits repeatedly, in the form of short telegrams, messages indicating the physiological condition of user to a receiver and control apparatus (12), which is placed in a monitored space either as a separate unit or a part of an appliance to be controlled. The receiver and control apparatus (12), or an information analyzer in data transfer communication therewith, uses the physiological condition of a user as a basis to conduct control selections and to control automatically the actuators and security devices in accordance with the physiological condition of a person who carries the transmitter unit (11). If necessary, the control selections can be influenced also by a piece of information indicating the location of a user. In addition to the automatic control of nearby equipment, the system is also applicable to monitoring the health of a user and to setting off alarms.Type: GrantFiled: November 6, 2000Date of Patent: February 19, 2002Assignee: IST International Security Technology OyInventor: Matti Myllymäki
-
Patent number: 6331816Abstract: An automatic control system for a security apparatus based on the presence of the user and having a portable transmitter for security based information, a receiver for that information and a control unit. The transmitter provides the receiver and control unit with information on the presence of a person. The receiver and control unit is provided with a detector which detects the opening of a door. A processor uses that presence information and the indication of a door being opened to compile information about whether the user is going out or coming in. The receiver and control unit automatically switches on a burglar monitor placed in a monitored space when the receiver and control unit determine that the user has left the monitored space.Type: GrantFiled: November 6, 2000Date of Patent: December 18, 2001Assignee: IST International Security Technology OyInventor: Matti Myllymäki
-
Patent number: 6144740Abstract: Disclosed is a method for designing public key cryptosystems against fault-based attacks in which secret information stored in a tamperfree device is revealed during the encryption/decryption or signature generation processes due to fault-based attacks. A new fault-resistant system which enables any fault existing in modular multiplications and exponential computations to be detected with a very high probability based on a coding approach. This method can be used to implement all cryptosystems whose basic operations are modular multiplications for resisting both memory and computational fault-based attacks with a very low computational overhead.Type: GrantFiled: May 20, 1998Date of Patent: November 7, 2000Assignees: Network Security Technology Co., Lan-Ying ChiangInventors: Chi-Sung Laih, Fu-Kuan Tu, Yung-Chen Lee
-
Patent number: 5661460Abstract: A system has a plurality of transceiver units, including a parent unit and one or more portable and wearable child units, for generating an alarm when a child transceiver unit is more than a predetermined distance away from a parent transceiver unit. The distance is determined by the difference in the phase of a reference signal from the time it is transmitted on an rf signal by a parent unit, received and retransmitted by a child unit, and then received again by the parent unit.Type: GrantFiled: December 12, 1995Date of Patent: August 26, 1997Assignee: Secure Technologies, Inc.Inventors: Roy Sallen, Walter James Budzyna, Charles E. Sawabini, Drew E. Sunstein
-
Patent number: 5619025Abstract: A method and apparatus for document verification exploits a temporally variable physical process to generate a reproducible effect that cannot be copied. A document such as a credit card is provided with a spot or stripe that incorporates at least one, and preferably a large plurality of photorefractive crystals arrayed in a random manner. The document verifying apparatus includes a coherent light source such as a diode laser to illuminate the photorefractive crystals, and a photosensor to receive light scattered from the photorefractive crystals. The random distribution and orientation of photorefractive crystals comprises a unique characteristic for each card or document, and this characteristic is not based on any assigned number or code. The response of photorefractive crystals to the coherent illumination comprises a time-varying characteristic that is dependent upon the intensity and temporal nature of the illumination itself.Type: GrantFiled: May 5, 1994Date of Patent: April 8, 1997Assignee: Network Security TechnologiesInventors: Joel Hickman, Scott Phillips, Colin Brady