Patents by Inventor Poh Beng Tan

Poh Beng Tan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20200386843
    Abstract: This document describes a system and method for determining a location of a mobile device within an enclosed space using audio localization techniques. In particular, the system and method utilizes audio localization techniques to identify the location of a mobile device within a multi-storey multi-room structure or an enclosure with multiple rooms.
    Type: Application
    Filed: June 17, 2018
    Publication date: December 10, 2020
    Applicant: Certis Cisco Security Pte Ltd
    Inventors: Poh Beng TAN, Keen Hon WONG, Meng Kwang TAN
  • Patent number: 9848288
    Abstract: The system provides secure controlled access to multiple Bluetooth devices issued to users. For example an officer may be issued a weapon. To enable monitoring of weapon status, a Bluetooth sensor may be fitted to a holster and the Officer issued with a Bluetooth enabled mobile phone. In order to establish a secure Bluetooth connection between the devices, sensor contains a restored link key and the mobile phone stores a partial link key. The supervisor enters their username and password, and a secret key into the phone which is then used with the partial link key to generate a copy of the link key stored in the first device, so that a secure connection can be established with the first device. The officer enters their username and password into the sensor, and once the secure connection is established it is sent over the secure connection to the mobile phone which then sends both user names and passwords to a verification authority.
    Type: Grant
    Filed: September 14, 2016
    Date of Patent: December 19, 2017
    Assignee: Certis Cisco Security PTE LTD
    Inventors: Poh Beng Tan, Martin James Baptist, Keen Hon Wong, Honching Lui, Xiang Li
  • Patent number: 9609677
    Abstract: The system provides secure controlled access to multiple Bluetooth devices issued to users. For example an officer may be issued a weapon. To enable monitoring of weapon status, a Bluetooth sensor may be fitted to a holster and the Officer issued with a Bluetooth enabled mobile phone. In order to establish a secure Bluetooth connection between the devices, sensor contains a restored link key and the mobile phone stores a partial link key. The supervisor enters their username and password, and a secret key into the phone which is then used with the partial link key to generate a copy of the link key stored in the first device, so that a secure connection can be established with the first device. The officer enters their username and password into the sensor, and once the secure connection is established it is sent over the secure connection to the mobile phone which then sends both user names and passwords to a verification authority.
    Type: Grant
    Filed: September 4, 2012
    Date of Patent: March 28, 2017
    Assignee: CERTIS CISCO SECURITY PTE LTD
    Inventors: Poh Beng Tan, Martin James Baptist, Keen Hon Wong, Honching Lui, Xiang Li
  • Publication number: 20170006416
    Abstract: The system provides secure controlled access to multiple Bluetooth devices issued to users. For example an officer may be issued a weapon. To enable monitoring of weapon status, a Bluetooth sensor may be fitted to a holster and the Officer issued with a Bluetooth enabled mobile phone. In order to establish a secure Bluetooth connection between the devices, sensor contains a restored link key and the mobile phone stores a partial link key. The supervisor enters their username and password, and a secret key into the phone which is then used with the partial link key to generate a copy of the link key stored in the first device, so that a secure connection can be established with the first device. The officer enters their username and password into the sensor, and once the secure connection is established it is sent over the secure connection to the mobile phone which then sends both user names and passwords to a verification authority.
    Type: Application
    Filed: September 14, 2016
    Publication date: January 5, 2017
    Inventors: Poh Beng Tan, Martin James Baptist, Keen Hon Wong, Honching Lui, Xiang Li
  • Patent number: 9479514
    Abstract: A system for securely controlling access between two wireless (i.e. Bluetooth-enabled) apparatuses, also comprising a supervisor apparatus. The first apparatus is paired to the second by establishing a secure wireless (i.e. Bluetooth) link. The first apparatus includes a stored partial link key and a link key generator: The first apparatus receives a first secret key from the apparatus user, and may also receive a second secret key from the supervisor apparatus. The link key generator generates either a first link key based upon a stored first partial link key, the first secret key and the second secret key or a second link key based upon the stored first partial link key and the first secret key. An access control module in the second apparatus determines the level of access that the first apparatus is granted based upon the link key used to establish the secure connection—full/restricted access.
    Type: Grant
    Filed: March 18, 2014
    Date of Patent: October 25, 2016
    Assignee: Certis Cisco Security PTE LTD.
    Inventors: Poh Beng Tan, Martin James Baptist, Keen Hon Wong, Honching Lui, Xiang Li
  • Publication number: 20160156636
    Abstract: A system for securely controlling access between two wireless (i.e. Bluetooth-enabled) apparatuses, also comprising a supervisor apparatus. The first apparatus is paired to the second by establishing a secure wireless (i.e. Bluetooth) link The first apparatus includes a stored partial link key and a link key generator: The first apparatus receives a first secret key from the apparatus user, and may also receive a second secret key from the supervisor apparatus. The link key generator generates either a first link key based upon a stored first partial link key, the first secret key and the second secret key or a second link key based upon the stored first partial link key and the first secret key. An access control module in the second apparatus determines the level of access that the first apparatus is granted based upon the link key used to establish the secure connection—full/restricted access.
    Type: Application
    Filed: March 18, 2014
    Publication date: June 2, 2016
    Applicant: CERTIS CISCO SECURITY PTE LTD.
    Inventors: Poh Beng TAN, Martin James BAPTIST, Keen Hon WONG, Honching LUI, Xiang LI
  • Publication number: 20150356847
    Abstract: A security monitoring device for recording security footage at a location, the device comprising: a controller to control the device; a camera for obtaining security footage of the device surroundings; a location information device adapted to provide location information to the controller; storage for storing the security footage along with other information, the other information including at least time and location and being stored separately to the security footage but being associated by time; and communication means for the controller to communicate with a central monitoring system; wherein the device is configured to analyse the other information at the device prior to communication of information and/or security footage to the central monitoring system.
    Type: Application
    Filed: May 15, 2013
    Publication date: December 10, 2015
    Inventors: Poh Beng Tan, Tye San Yap, Keen Hon Wong, Meng Kwang Tan
  • Publication number: 20150147970
    Abstract: The system provides secure controlled access to multiple Bluetooth devices issued to users. For example an officer may be issued a weapon. To enable monitoring of weapon status, a Bluetooth sensor may be fitted to a holster and the Officer issued with a Bluetooth enabled mobile phone. In order to establish a secure Bluetooth connection between the devices, sensor contains a restored link key and the mobile phone stores a partial link key. The supervisor enters their username and password, and a secret key into the phone which is then used with the partial link key to generate a copy of the link key stored in the first device, so that a secure connection can be established with the first device. The officer enters their username and password into the sensor, and once the secure connection is established it is sent over the secure connection to the mobile phone which then sends both user names and passwords to a verification authority.
    Type: Application
    Filed: September 4, 2012
    Publication date: May 28, 2015
    Inventors: Poh Beng Tan, Martin James Baptist, Keen Hon Wong, Honching Lui, Xiang Li