Patents Assigned to Security Technologies
  • Publication number: 20090007269
    Abstract: A device may create a new project that includes criteria, import findings from a group of different network security tools into the new project based on the criteria, normalize the imported findings, and store the normalized findings.
    Type: Application
    Filed: June 29, 2007
    Publication date: January 1, 2009
    Applicant: Network Security Technologies, Inc.
    Inventor: Scott V. BIANCO
  • Patent number: 7453364
    Abstract: The invention relates to a safety device system, comprising a wearable alarm device fastenable to the wrist or elsewhere in the body or an instrument measuring physiological signals or a combination thereof, and a data terminal (6) capable of receiving messages and information from a wearable device (1). The wearable device (1) has a measurement-based identification about the device being attached to a wearer, said identification being processed for status data. The data terminal (6) has a user interface for displaying the measured status data graphically.
    Type: Grant
    Filed: July 5, 2005
    Date of Patent: November 18, 2008
    Assignee: IST International Security Technology Oy
    Inventors: Antti Särelā, Marko Myllymāki
  • Patent number: 7430759
    Abstract: A method and a computer system for securing communication in networks of data processing units which can be used especially for individually created security units for portable computer systems. In order to secure the communication, the data exchange between a data processing unit to be protected and the network is monitored and/or controlled by means of a computer program which is implemented in a security computer system as embedded software, the security computer system being inserted between the data processing device to be protected and the network. A computer system providing such protection is embodied as a single board computer or as a chip solution and comprises means for exchanging data with the data processing unit to be protected, means for exchanging data with the network, and means for monitoring and/or controlling the communication between the data processing unit to be protected and the network.
    Type: Grant
    Filed: July 29, 2002
    Date of Patent: September 30, 2008
    Assignee: Innominate Security Technologies AG
    Inventors: Frank Piepiorra, Michael Maechtel, Lutz Jaenicke
  • Patent number: 7359042
    Abstract: A limited access space inspection system comprising: an imaging device for imaging a region in the limited access space, a mounting for mounting the imaging device to scan about the limited access space and a scanning control unit, associated with the imaging device, for controlling the imaging device to scan about the limited access space. The device is particularly useful for improving by automation, security checks customs checks and safety checks involving such awkward to access spaces.
    Type: Grant
    Filed: September 23, 2002
    Date of Patent: April 15, 2008
    Assignee: S.T.I. Security Technology Integration Ltd
    Inventor: Yuval Ovadia
  • Patent number: 7327447
    Abstract: A limited access space inspection system comprising: a sensing device for carrying out sensing over a region in the limited access space, a mounting for mounting the sensing device to scan about the limited access space and a scanning control unit, associated with the sensing device, for controlling the sensing device to scan about the limited access space. The device is particularly useful for improving by automation, security checks, customs checks and safety checks involving such awkward to access spaces. The sensing device may be an imaging device, or a sensor for detecting traces of chemical substances.
    Type: Grant
    Filed: September 18, 2003
    Date of Patent: February 5, 2008
    Assignee: S.T.I. Security Technology Integration Ltd.
    Inventor: Yuval Ovadia
  • Patent number: 7295321
    Abstract: The present invention includes an interferometer for VISAR. Optionally, the present VISAR system includes intracavity imaging design with converging beams and field elements to, among other possible purposes, image the array. An optional embodiment of the present VISAR system may also optionally include precision fiber arrays. Optionally, the present system may use non-collimated beams to allow intracavity access to individual channels for one or more additional delay paths.
    Type: Grant
    Filed: November 30, 2005
    Date of Patent: November 13, 2007
    Assignee: National Security Technologies, LLC
    Inventors: Bruce Russell Marshall, Marcus David Knudson, Elliot Michael Burke, Terrence John Davies, Gerald Daniel Stevens
  • Publication number: 20070169151
    Abstract: Portable surveillance and monitoring systems are provided for effecting portable video capture, wireless transmission of video data from one or more portable video capture units (VCUs) to a central monitoring station (CMS) and wireless control of the one or more VCUs from the CMS. One or more portable VCUs are equipped with digital cameras and are located to capture video in a region of interest. Each VCU comprises a plurality of directional antennas, each of which provides antenna gain over a particular azimuthal angular range. Each VCU also comprises a controller which is configured to select a particular one of its antennas and a particular channel identifier (CID) signal and associated frequency hopping sequence which are used to implement frequency hopping spread spectrum wireless communication between the VCU and the CMS.
    Type: Application
    Filed: January 18, 2006
    Publication date: July 19, 2007
    Applicant: Argon Security Technologies Inc.
    Inventors: T. Vishloff, Justin Todd
  • Patent number: 7228005
    Abstract: A method and device for restoration of electro-optical image data using an adaptive Wiener filter begins with constructing imaging system Optical Transfer Function, and the Fourier Transformations of the noise and the image. A spatial representation of the imaged object is restored by spatial convolution of the image using a Wiener restoration kernel.
    Type: Grant
    Filed: June 16, 2003
    Date of Patent: June 5, 2007
    Assignee: National Security Technologies, LLC
    Inventor: Ding Yuan
  • Patent number: 7219152
    Abstract: Small, optimized sequences of binary 5-tuples, representing filter rules, which achieve space efficient packet filtering. A post-match procedure table allows dynamic and extensible packet processing. Packet filtering is accomplished by processing filter rule statements and procedure statements, entered by a user in a rules file, to generate 5-tuple filtering rules and a procedure table, and loading the filtering rules and procedure table into the filter interpreter. A filter interpreter then applies the resolved filtering rules for each packet received at the network adapter. When a filtered packet matches a rule, a specified function is invoked.
    Type: Grant
    Filed: September 1, 2005
    Date of Patent: May 15, 2007
    Assignee: Bluefire Security Technologies, Inc.
    Inventor: Dennie Komisky
  • Publication number: 20060137009
    Abstract: A method for detecting an attack in a computer network includes monitoring communication traffic transmitted over connections on the network that are associated with a stateful application protocol so as to detect respective states of the connections, and analyzing a distribution of the states so as to detect the attack.
    Type: Application
    Filed: December 22, 2004
    Publication date: June 22, 2006
    Applicant: V-Secure Technologies, Inc.
    Inventor: Avi Chesla
  • Publication number: 20060007860
    Abstract: Small, optimized sequences of binary 5-tuples, representing filter rules, which achieve space efficient packet filtering. A post-match procedure table allows dynamic and extensible packet processing. Packet filtering is accomplished by processing filter rule statements and procedure statements, entered by a user in a rules file, to generate 5-tuple filtering rules and a procedure table, and loading the filtering rules and procedure table into the filter interpreter. A filter interpreter then applies the resolved filtering rules for each packet received at the network adapter. When a filtered packet matches a rule, a specified function is invoked.
    Type: Application
    Filed: September 1, 2005
    Publication date: January 12, 2006
    Applicant: Bluefire Security Technologies, Inc.
    Inventor: Dennis Komisky
  • Patent number: 6963913
    Abstract: Small, optimized sequences of binary 5-tuples, representing filter rules, which achieve space efficient packet filtering. A post-match procedure table allows dynamic and extensible packet processing. Packet filtering is accomplished by processing filter rule statements and procedure statements, entered by a user in a rules file, to generate 5-tuple filtering rules and a procedure table, and loading the filtering rules and procedure table into the filter interpreter. A filter interpreter then applies the resolved filtering rules for each packet received at the network adapter. When a filtered packet matches a rule, a specified function is invoked.
    Type: Grant
    Filed: June 11, 2002
    Date of Patent: November 8, 2005
    Assignee: Bluefire Security Technologies, Inc.
    Inventor: Dennis Komisky
  • Publication number: 20040057042
    Abstract: A limited access space inspection system comprising: an imaging device for imaging a region in the limited access space, a mounting for mounting the imaging device to scan about the limited access space and a scanning control unit, associated with the imaging device, for controlling the imaging device to scan about the limited access space. The device is particularly useful for improving by automation, security checks customs checks and safety checks involving such awkward to access spaces.
    Type: Application
    Filed: September 23, 2002
    Publication date: March 25, 2004
    Applicant: S.T.I. Security Technology Integration Ltd.
    Inventor: Yuval Ovadia
  • Publication number: 20030018591
    Abstract: Small, optimized sequences of binary 5-tuples, representing filter rules, which achieve space efficient packet filtering. A post-match procedure table allows dynamic and extensible packet processing. Packet filtering is accomplished by processing filter rule statements and procedure statements, entered by a user in a rules file, to generate 5-tuple filtering rules and a procedure table, and loading the filtering rules and procedure table into the filter interpreter. A filter interpreter then applies the resolved filtering rules for each packet received at the network adapter. When a filtered packet matches a rule, a specified function is invoked.
    Type: Application
    Filed: June 11, 2002
    Publication date: January 23, 2003
    Applicant: BlueFire Security Technologies
    Inventor: Dennis Komisky
  • Patent number: 6449721
    Abstract: The invention provides for encrypting electronic information such as a document so that only users with permission may access the document in decrypted form. The process of encrypting the information includes selecting a set of policies as to who may access the information and under what conditions. A remote server stores a unique identifier for the information and associates an encryption/decryption key pair and access policies with the information. Software components residing on the author's computer retrieve the encryption key from the remote server, encrypt the information, and store the encrypted information at a location chosen by the author. A user wishing to access the information acquires the encrypted information electronically.
    Type: Grant
    Filed: November 1, 2001
    Date of Patent: September 10, 2002
    Assignee: Authentica Security Technologies, Inc.
    Inventors: David A. Pensak, John J. Cristy, Steven J. Singles
  • Patent number: 6348867
    Abstract: An automatic control system for actuators and security devices in building automation. A wrist-held sensor and transmitter unit (11) transmits repeatedly, in the form of short telegrams, messages indicating the physiological condition of user to a receiver and control apparatus (12), which is placed in a monitored space either as a separate unit or a part of an appliance to be controlled. The receiver and control apparatus (12), or an information analyzer in data transfer communication therewith, uses the physiological condition of a user as a basis to conduct control selections and to control automatically the actuators and security devices in accordance with the physiological condition of a person who carries the transmitter unit (11). If necessary, the control selections can be influenced also by a piece of information indicating the location of a user. In addition to the automatic control of nearby equipment, the system is also applicable to monitoring the health of a user and to setting off alarms.
    Type: Grant
    Filed: November 6, 2000
    Date of Patent: February 19, 2002
    Assignee: IST International Security Technology Oy
    Inventor: Matti Myllymäki
  • Patent number: 6331816
    Abstract: An automatic control system for a security apparatus based on the presence of the user and having a portable transmitter for security based information, a receiver for that information and a control unit. The transmitter provides the receiver and control unit with information on the presence of a person. The receiver and control unit is provided with a detector which detects the opening of a door. A processor uses that presence information and the indication of a door being opened to compile information about whether the user is going out or coming in. The receiver and control unit automatically switches on a burglar monitor placed in a monitored space when the receiver and control unit determine that the user has left the monitored space.
    Type: Grant
    Filed: November 6, 2000
    Date of Patent: December 18, 2001
    Assignee: IST International Security Technology Oy
    Inventor: Matti Myllymäki
  • Patent number: 6144740
    Abstract: Disclosed is a method for designing public key cryptosystems against fault-based attacks in which secret information stored in a tamperfree device is revealed during the encryption/decryption or signature generation processes due to fault-based attacks. A new fault-resistant system which enables any fault existing in modular multiplications and exponential computations to be detected with a very high probability based on a coding approach. This method can be used to implement all cryptosystems whose basic operations are modular multiplications for resisting both memory and computational fault-based attacks with a very low computational overhead.
    Type: Grant
    Filed: May 20, 1998
    Date of Patent: November 7, 2000
    Assignees: Network Security Technology Co., Lan-Ying Chiang
    Inventors: Chi-Sung Laih, Fu-Kuan Tu, Yung-Chen Lee
  • Patent number: 5661460
    Abstract: A system has a plurality of transceiver units, including a parent unit and one or more portable and wearable child units, for generating an alarm when a child transceiver unit is more than a predetermined distance away from a parent transceiver unit. The distance is determined by the difference in the phase of a reference signal from the time it is transmitted on an rf signal by a parent unit, received and retransmitted by a child unit, and then received again by the parent unit.
    Type: Grant
    Filed: December 12, 1995
    Date of Patent: August 26, 1997
    Assignee: Secure Technologies, Inc.
    Inventors: Roy Sallen, Walter James Budzyna, Charles E. Sawabini, Drew E. Sunstein
  • Patent number: 5619025
    Abstract: A method and apparatus for document verification exploits a temporally variable physical process to generate a reproducible effect that cannot be copied. A document such as a credit card is provided with a spot or stripe that incorporates at least one, and preferably a large plurality of photorefractive crystals arrayed in a random manner. The document verifying apparatus includes a coherent light source such as a diode laser to illuminate the photorefractive crystals, and a photosensor to receive light scattered from the photorefractive crystals. The random distribution and orientation of photorefractive crystals comprises a unique characteristic for each card or document, and this characteristic is not based on any assigned number or code. The response of photorefractive crystals to the coherent illumination comprises a time-varying characteristic that is dependent upon the intensity and temporal nature of the illumination itself.
    Type: Grant
    Filed: May 5, 1994
    Date of Patent: April 8, 1997
    Assignee: Network Security Technologies
    Inventors: Joel Hickman, Scott Phillips, Colin Brady