Authentication (e.g., Identity) Patents (Class 340/5.8)
-
Patent number: 8717141Abstract: A medical device, with an operating element for triggering the medical device, includes a safety system for preventing an erroneous triggering of the device. The present invention encompasses a method for controlling the medical device including determining if an operating command is given by a person prior to the device's carrying out the command.Type: GrantFiled: December 2, 2005Date of Patent: May 6, 2014Assignee: Roche Diagnostics International AGInventors: Andreas Eberhart, Hanspeter Heiniger, Erich Imhof, Thomas Rufer
-
Publication number: 20140118106Abstract: A system and method are provided for reading and identifying molded products based on detecting intentionally introduced defects in the molded products that were included to identify and authenticate the molded products, or to confirm compatibility of the molded products in devices in which the molded products are installed for use. Process conditions in the fabrication or formation of melt processed parts are modified to deliberately introduce surface, detectable defects into the melt processed parts. A Quality Review (QR) code that specifies a compilation of at least some of the actual defects that are present in the molded part is provided, potentially encrypted, for comparison purposes.Type: ApplicationFiled: October 31, 2012Publication date: May 1, 2014Applicant: Palo Alto Research Center IncorporatedInventor: David JOHNSON
-
Patent number: 8710990Abstract: A pedigree tag for tracking and validating authenticity of contents in a container includes: a radio frequency modem operable at a low radio frequency, not exceeding one megahertz, and including a full duplex transmitter and receiver; an antenna operatively coupled with the radio frequency modem; a programmable microprocessor operatively coupled with the radio frequency modem; a memory operatively coupled with the programmable microprocessor; a clock; and a connector for connecting a power source for providing power to the microprocessor; wherein the pedigree tag is in a form factor conformable to the container to which it is affixed.Type: GrantFiled: December 30, 2010Date of Patent: April 29, 2014Assignee: Visible Assets, Inc.Inventors: M. Jason August, John K. Stevens, Paul Waterhouse
-
Patent number: 8710956Abstract: An apparatus, system and method for surreptitious biometric acquisition are disclosed. In one embodiment, a sensor is configured to produce an electrical signal corresponding to a biometric signature of a subject. The sensor is configured to be surreptitiously mounted to a surface. Various sensors are disclosed as being operative with the surreptitious biometric acquisition apparatus. A vehicle with a surreptitiously mounted biometric acquisition apparatus is disclosed. A method for surreptitious identification of suspects is also disclosed.Type: GrantFiled: June 6, 2011Date of Patent: April 29, 2014Inventor: Leonard P. Longo
-
Publication number: 20140111305Abstract: This invention discloses a verifying system and method thereof. The verifying system comprises a plurality of objects to be verified and a verifying end. Each of the objects to be verified respectively comprises an identifying code. The verifying end has a database, and the database stores a plurality records of information of the objects respectively corresponding to each of the indentifying codes. When a user utilizes an electronic device to read one of the indentifying codes for making the electronic device connect to the verifying end, the verifying end compares the identifying code with the plurality records of information of the objects to generate an information of verification results which is then transmitted back to the electronic device. Herewith the effect of the present invention being verifying authenticity of the object by the indentifying code is achieved.Type: ApplicationFiled: April 30, 2013Publication date: April 24, 2014Applicants: CeraMicro Technology Corp, DADNY INCInventors: MING-HUANG TSENG, CHING-YI WU, DANIEL SHIH
-
Patent number: 8704958Abstract: An image display device and method may be provided for pairing with a remote control device for transmitting a command to the image display device. Upon power-on, the image display device may be paired with the remote control device. When the image display device is power-on, a guide screen may be displayed to indicate how to pair the image display device with the remote control device. A user may easily pair the remote control device with the image display device through the pairing guide screen.Type: GrantFiled: December 24, 2009Date of Patent: April 22, 2014Assignee: LG Electronics Inc.Inventors: Young Wan Lim, Gyu Seung Kim, Jae kyung Lee, Si Jin Kim, Kun Sik Lee
-
Patent number: 8704636Abstract: An information processing apparatus includes: a storage block configured to store a first region as part of a layer structure; an execution block which, in response to a designation command transmitted by a communication apparatus to designate the creation of a second region as a lower layer of the first region, performs a region creation process for creating the second region as the lower layer of the first region; and a transmission block which, if the region creation process is stopped, then transmits first information indicating whether or not the second region is already created to the communication apparatus, in response to a request from the communication apparatus.Type: GrantFiled: October 8, 2010Date of Patent: April 22, 2014Assignee: Sony CorporationInventors: Toshiharu Takemura, Tadashi Morita, Mitsuhiro Nakamura
-
Patent number: 8704408Abstract: A method that includes identifying a desired signal connectivity through a switch matrix, where the switch matrix includes a plurality of switching elements, and where the switching elements are selectively operable in a plurality of states to provide a plurality of signal paths for routing signals through the switch matrix. The method also includes identifying a sorting network model that corresponds to a topology of the switch matrix, applying a sorting algorithm to the sorting network model, and determining, based on the results of applying the sorting algorithm, operational states of the plurality of switching elements to provide signal paths corresponding to the desired signal connectivity.Type: GrantFiled: April 14, 2011Date of Patent: April 22, 2014Assignee: National Instruments CorporationInventors: Alvin G. Becker, James A. Reimund, Naji S. Norder, James E. Nicholson, Kyle R. Bryson
-
Patent number: 8698594Abstract: A novel system, device and method of validation is provided for sensing a biometric such as a fingerprint, where biometric data corresponding to the biometric entity such as a fingerprint is then transmitted to a host configured to perform a plurality of authentication processes to authenticate the biometric data. At least one, but not all, of the plurality of authentication steps is then validated by the sensor, utilizing a portion, but not all, of the biometric data. Alternatively, a portion of the biometric data may be retained, where biometric data corresponding to the biometric is then transmitted to a host configured to perform a plurality of authentication steps to authenticate the biometric data. At least one but not all of the plurality of authentication steps is then validated by the sensor, utilizing a portion, but not all, of the biometric data.Type: GrantFiled: July 22, 2009Date of Patent: April 15, 2014Assignee: Synaptics IncorporatedInventors: Richard Alex Erhart, Frank Schwab
-
System and method for associating an electronic device with a remote device having a voice interface
Patent number: 8698597Abstract: The disclosure provides a system and method for associating an electronic device with a remote electronic device. In the method at the remote device, an authentication process is initiated to authenticate the remote device to the electronic device. The authentication process includes: generating a pass key according to an authentication protocol followed by the remote device; and providing the pass key to a user through an output device on the remote device. The method also includes: waiting for the user to provide the pass key to the electronic device; and if the remote device receives a timely message from the electronic device indicating that the remote device has been authenticated, activating additional applications on the remote device to allow it to communicate with the electronic device.Type: GrantFiled: June 27, 2008Date of Patent: April 15, 2014Assignee: BlackBerry LimitedInventors: Sanathan Kassiedass, Sean Taylor -
Patent number: 8692650Abstract: In an access control device including a lock (2) with a locking element, an actuating element (3) for the locking element, an electronic key (5), an electrical circuit including a receiver unit for receiving key identification data and an evaluation circuit for determining access authorization based on the received identification data, the evaluation circuit cooperates with the actuating element (3) and/or the locking element for selectively locking or unlocking the lock (2). The electronic key (5) comprises means for generating a capacitive near field via which the identification data is emitted.Type: GrantFiled: March 22, 2007Date of Patent: April 8, 2014Assignee: EVVA-WERK Spezialerzeugung von Zylinder- und Sicherheitsschlossern Gesellschaft m.b.H. & Co. KGInventor: Reinhard Pöllabauer
-
Patent number: 8692652Abstract: In an antitheft system for preventing an equipment comprising moving objects such as electric vehicles or operating machine such as lawnmower from theft, an electronic key is prepared to be carried by an operator of the equipment and stores authenticating data for identifying the operator who carries the electronic key. An authenticator is installed at the equipment and performs authentication check as to whether the electronic key is an authorized key using stored key-checking data, when the authenticating data is outputted from the electronic key, whereas an electronic key copier is provided separately from the equipment and copies the electronic key, thereby enabling to make a copy of the electronic key without activating equipment, while ensuring to prevent the equipment from theft.Type: GrantFiled: January 4, 2013Date of Patent: April 8, 2014Assignee: Honda Motor Co., Ltd.Inventors: Masato Takeda, Yoshihisa Shinogi, Kosei Yamashita, Kenji Kuroiwa, Masashi Manita, Yoshinori Maekawa, Makoto Yamamura
-
Publication number: 20140091902Abstract: A system for verifying a communication device, the system comprising at least a one communication device comprising a transmitter for performing communication, and a storage for holding first information, the first information comprising ID information of the communication device, at least a one security communication device comprising a transmitter for performing communication, and a storage for holding second information, the second information comprising ID information of the security communication device, a verification element, and a communication element for receiving the ID information from one or more of the communication devices and one or more of the security communication devices, transmitting the received ID information to the verification element, wherein the verification element is adapted to verify each of the one or more communication devices only if the received ID information of the pertaining communication device can be verified and the received ID information of at least one of the one orType: ApplicationFiled: May 29, 2012Publication date: April 3, 2014Applicant: COPY STOP SYSTEMS APSInventors: Rune Domsten, Finn Nielsen, Nils Østbirk
-
Patent number: 8686831Abstract: A mobile tool facility is provided having a container configured to be moved to a plurality of locations. A portal system is positioned in an interior of the container and spaced from a container end allowing access to the portal system. The portal system is operable to control access into and out of the container. A radio frequency shield wall is positioned in the interior of the container and spaced from the portal system allowing access between the portal system and the shield wall. The shield wall is configured to reduce an amount of electromagnetic energy entering the interior of the container. An auxiliary power unit associated with the container is operable to provide power to the portal system. A plurality of items stored in the interior of the container in a controlled space is available to be removed from the container through the portal system by an authorized individual.Type: GrantFiled: April 29, 2009Date of Patent: April 1, 2014Assignee: Job Site Resources, LLCInventors: Michael Green, Kevin Hall
-
Patent number: 8680995Abstract: A method and apparatus for detecting behavioral changes in a security system is provided. The method includes the steps of providing a secured area having a plurality of security zones where access to each is controlled by an access controller, detecting entrances to at least some of the plurality of security zones by an authorized person through respective access controllers of the plurality of zones over a predetermined previous time period, forming a probability model of entry into each of the plurality of security zones from the detected entrances over the previous time period, detecting access requests for the authorized user from the access controllers during a current time period, and generating a security alert upon determining that an access request of the current access requests exceeds a probability threshold value associated with the probability model.Type: GrantFiled: January 28, 2010Date of Patent: March 25, 2014Assignee: Honeywell International Inc.Inventors: Ashwin G, Santhanakrishnan Ponnambalam, Sriram Subramanian, Sivakumar Balakrishnan, Valerie Guralnik, Walt Heimerdinger
-
Patent number: 8680967Abstract: A server computer includes a receiving part for receiving a content and apparatus identification information of an apparatus that existed in a vicinity when the content was generated; an extracting part for extracting identification information corresponding to the apparatus identification information received by the receiving part by referring to a database in which the identification information is stored in association with the apparatus identification information; a storing part for storing the content and apparatus identification information received by the receiving part and the identification information extracted by the extracting part in an associated manner in the storage unit; and a first sending part for sending the content stored in the storage unit to another information processor corresponding to identification information received from outside when the identification information received from the outside matches the identification information stored in the storage unit.Type: GrantFiled: March 17, 2009Date of Patent: March 25, 2014Assignee: Fujitsu LimitedInventors: Shigeki Fukuta, Tatsuro Matsumoto
-
Patent number: 8682385Abstract: Methods and arrangements for managing mobile transactions. A mobile number of a customer is registered with a mobile telephone network operator. An alternate mobile number is assigned to the customer, and the mobile number is associated with the alternate mobile number. The alternate mobile number is employed in communication between the customer and a service provider.Type: GrantFiled: May 11, 2012Date of Patent: March 25, 2014Assignee: International Business Machines CorporationInventors: Apurva Kumar, Sougata Mukherjea, Venkatraman Ramakrishna
-
Publication number: 20140077928Abstract: A system for detecting tampering in a product having a tamper-detector seal, including a secure element configured to store a digital signature and a data associated with the digital signature, transmit the digital signature and the data associated with the digital signature in response to a request, detect tampering of the tamper-detector seal, and modify the data associated with the digital signature if tampering is detected. The system further includes a seal validation device configured to receive a public key associated with the product, request the digital signature and the data associated with the digital signature from the secure element, and validate the digital signature utilizing the data associated with the digital signature and the public key associated with the product.Type: ApplicationFiled: December 26, 2012Publication date: March 20, 2014Applicant: Broadcom CorporationInventors: Shlomo Markel, Jacob Mendel
-
Patent number: 8674804Abstract: A wireless deadman system for controlling operation of equipment from a portable device includes a base station with an equipment control system, the base station wirelessly transmitting operational parameters for the equipment. A portable display unit has a housing, an electronic display, an electronic circuit, and a data receiver. A portable authorization device includes a liveness sensor and transmits an authorization signal when the sensor detects a liveness input. The display unit receives an authorization status for operation of the equipment from the portable authorization device and receives the operational parameters from the base station, the display displaying the authorization status and the operational parameters of the equipment on the electronic display. The equipment control system allows the equipment to operate when the authorization signal is provided and prevents the equipment from operating after the authorization signal is no longer provided.Type: GrantFiled: January 29, 2013Date of Patent: March 18, 2014Assignee: Deadman Technologies, LLCInventors: Brian Scott Miller, Jack Vaughan, Oscar Allen LaDriere, Gino DiSimone
-
Patent number: 8670862Abstract: A document discarding apparatus includes: a metal detector that detects presence or absence of a metal embedded in a document; a code reader that reads a code; an instruction accept portion that accepts an instruction to discard the document; a document discarding portion that discards the document; a first determining unit that, according to the presence or absence of the metal, determines whether the document may be discarded in the document discarding portion; a second determining unit that, according to the code, determines whether the document may be discarded in the document discarding portion; and a document discarding control unit that, when the instruction accept portion accepts an instruction to discard the document, on condition that the first determining unit and the second determining unit both determine that the document can be discarded in the document discarding portion, controls the document discarding portion to discard the document.Type: GrantFiled: December 14, 2011Date of Patent: March 11, 2014Assignee: Fuji Xerox Co., Ltd.Inventor: Hiroyoshi Uejo
-
Publication number: 20140062652Abstract: Mechanisms for validating the authenticity of an item. A reader device records authentication data that is obscured in a label. The authentication data is provided to a remote authentication server via a network. The reader device receives, from the remote authentication server, an authentication response based on the authentication data. Based at least in part on the authentication response, the reader device displays an indication that identifies whether the item is authentic.Type: ApplicationFiled: August 30, 2013Publication date: March 6, 2014Applicant: Lockheed Martin CorporationInventors: Scott L. Roberson, Edward J. Miesak, Allen Vaughn, David R. Twede, Christian Adams
-
SYSTEM AND METHOD FOR FACILITATING COMPATIBILITY BETWEEN MULTIPLE IMAGE DETECTORS AND IMAGING DEVICE
Publication number: 20140055233Abstract: A system for facilitating compatibility between multiple image detectors and a medical imaging device is disclosed. The system comprises a memory for storing a detector identifier comprising a hardware ID associated with an image detector and firmware ID associated with a software application in the medical imaging device. The firmware ID comprises a plurality of strings. A processor receives a firmware identifier from the image detector and establishes a compatibility of the image detector with the medical imaging device based on the firmware identifier and the detector identifier.Type: ApplicationFiled: August 23, 2013Publication date: February 27, 2014Applicant: General Electric CompanyInventors: Vikram Vetrivel, Ankur Shah, Asha Mary Mohan, Ashwini Singh, Parvathi Patil, Nishant Rahul, Sumit Pandey -
Patent number: 8659389Abstract: Embodiments of the present invention include methods and systems for tracking and monitoring high-value goods by scanning RFID tags associated with the goods. A central monitoring service verifies both the RFID tags and the devices used to scan the tags against a database of known and trusted tags and scanning devices. Local and centralized security protocols provide improved security and data integrity.Type: GrantFiled: December 17, 2008Date of Patent: February 25, 2014Assignee: The Jewellery StoreInventor: Gabriel G. Nasser
-
Patent number: 8653938Abstract: A method of protection of a near-field contactless communication system against malicious attacks. The method includes exchange of information between a reader and a contactless card of duration T, measured with respect to a starting instant t0 seen from the reader, decoding of this information by the card, sending by the card a return signal temporally set with respect to an instant t?0+T, where t?0 is the starting instant as seen by the card taking into account delays in propagation or processing of signals received from the reader, detection of the return signal by the reader, determination of the temporal setting of the return signal with respect to the starting instant t0, and interruption of communication by the reader if the temporal setting of the return signal detected is not equal to the instant t0+T with a predetermined margin of error. The return signal is a pseudo-random sequence.Type: GrantFiled: December 15, 2010Date of Patent: February 18, 2014Assignee: Commissariat a l'energie Atomique et aux Energies AlternativesInventors: Olivier Savry, Pierre-Henri Thevenon
-
Patent number: 8651376Abstract: A near field communication (NFC) device, an authentication system using the NFC device and an authentication method thereof are provided. The NFC device includes a RFID tag, a loop antenna, a flexible fabric packaging material and an EMI shielding material. The device can be easily adhered to objects including most handsets for mobile phone services. By adopting the authentication system and the authentication method, the device can be paired with a typical mobile phone and used to authenticate the user, thereby enabling mobile payment and mobile banking activities using mobile phones.Type: GrantFiled: September 14, 2011Date of Patent: February 18, 2014Inventor: Minsky Luo
-
Patent number: 8653940Abstract: This invention provides a system and apparatus that is able to authenticate and prevent illegal manufacturing and unauthorized operation of disposable bioprocess components. This invention utilizes a ferro-electric random access memory chip (FRAM) chip to store error-correctable information on a RFID tag attached to the disposable bioprocess components, where the error-correctable information is written in sequence into the memory chip, so that the redundant information can remain in the chip when the RFID tag and disposable bioprocess component is gamma-sterilized. Also, this invention includes a method for authenticating the disposable bioprocess component that reduces liability in that a counterfeit poor quality disposable component is not used on the hardware so the user will not file an unjustified complaint.Type: GrantFiled: August 20, 2008Date of Patent: February 18, 2014Assignee: GE Healthcare Bio-Sciences Corp.Inventors: Manuel Nyffeler, Radislav A. Potyrailo, Vincent F. Pizzi, William G. Morris, Gerard J. Gach, Vijay Singh
-
Patent number: 8648692Abstract: Accessing an automobile with a transponder is disclosed. A processor may determine if the transponder is within range and receive a signal with an identification code from the transponder. If the identification code is valid, user information for the automobile based on the identification code are retrieved. The processor may also process spoken commands if the identification code is valid.Type: GrantFiled: August 17, 2005Date of Patent: February 11, 2014Assignee: Seong Sang Investments LLCInventor: Richard B. Himmelstein
-
Patent number: 8648696Abstract: An image processing device includes an operation panel on which a plurality of operation keys is arranged, and a storage part that stores key information allocated to a predetermined operation key of a plurality of operation keys, and with which an user authentication information for authenticating a user authorized to use a function corresponding to the predetermined operation key and an authentication activation information in which conditions for user authentication to be executed when the predetermined operation key is operated are defined are associated. An authentication part reads the user authentication information and the authentication activation information based on the key information when the predetermined operation key is operated, and executes user authentication based on the user authentication information if conditions defined in the authentication activation information are met.Type: GrantFiled: December 1, 2009Date of Patent: February 11, 2014Assignee: Konica Minolta Business Technologies, Inc.Inventor: Eiichi Yoshida
-
Patent number: 8643489Abstract: A history management apparatus includes: a storage unit that stores history information of image processing which contains set-membership information containing pieces of document identification information of an input document and an output document, and an image of at least one of the input document and the output document as history information; and a notification unit that, when history information in which a surveillance target element is contained in an image of an input document or an image of an output document is detected from the storage unit, notifies a notified party of such as the detected history information. When the surveillance target element is not contained in both of the images in the history information, and it is identified that at least one of ancestral documents of the input document has the surveillance target element, the notification unit notifies the notified party of the history information.Type: GrantFiled: September 15, 2009Date of Patent: February 4, 2014Assignee: Fuji Xerox Co., Ltd.Inventor: Takashi Ohsawa
-
Patent number: 8639951Abstract: Mobile network services are performed in a mobile data network in a way that is transparent to most of the existing equipment in the mobile data network. The mobile data network includes a radio access network and a core network. A breakout appliance in the radio access network breaks out data coming from a basestation, and performs one or more mobile network services at the edge of the mobile data network based on the broken out data. The breakout appliance includes multiple states that support manufacturing, testing, production, tamper detection and end of life, and the functions of the breakout appliance vary according to its state.Type: GrantFiled: December 19, 2011Date of Patent: January 28, 2014Assignee: International Business Machines CorporationInventors: Vincenzo V. Di Luoffo, Philip E. Grady, Scott A. Liebl, George W. Van Leeuwen
-
Patent number: 8633801Abstract: A battery authentication system according to the present invention includes a battery and an electronic device. The battery includes a battery authentication portion that includes battery identification information and performs authentication between the battery and the electronic device. The electronic device includes: a power source that supplies electric power from the battery to respective portions in the electronic device; a storage portion that stores the battery identification information of usable batteries; a device authentication portion that performs authentication of the battery; and a control portion that compares the battery identification information of the battery with the battery identification information stored in the storage portion.Type: GrantFiled: April 7, 2009Date of Patent: January 21, 2014Assignee: Panasonic CorporationInventor: Toshio Iwai
-
Patent number: 8633798Abstract: A computer system includes a computer, a fingerprint reader, and a security apparatus to apply complete security for the benefit of an authorized user. The computer includes a first interface, a second interface, an account storage unit, and a fingerprint storage unit. The fingerprint reader can connect with the computer through the first interface for inputting fingerprint information. The security apparatus can connect with the computer through the second interface, and includes a password storage module, a first use module, a password modification module, and a normal use module.Type: GrantFiled: October 12, 2011Date of Patent: January 21, 2014Assignee: Hon Hai Precision Industry Co., Ltd.Inventor: Yu-Sheng Lin
-
Patent number: 8634808Abstract: Collected information is analyzed by the mobile device to determine whether the device is displaced from the owner. The mobile device monitors and detects a reduction of ambient light to automatically enter into protection mode without manual activation. If an increase of ambient light and movement of the mobile device are both detected, then the device enters into authentication mode. Various techniques to verify the user's identity may be implemented in authentication mode. The user must correctly match an input key code, button combination, or an image recognition photograph against the stored information according to the method of verification chosen in each respective process. An alarm is activated if the device determines authentication is not received but may be disabled when the user's identity is verified after another authentication attempt.Type: GrantFiled: November 21, 2012Date of Patent: January 21, 2014Assignee: Trend Micro Inc.Inventors: Anthony Zhong, Jing Cao, Hunk Shi
-
Patent number: 8628019Abstract: A portable authentication system includes a security module, that may be a smart card, SIM (Subscriber Identity Module), USB controller with a secure chip, or similar module capable of storing one or more credentials, and an interface module such as a digital badge holder that is able to communicate with the security module, for instance by providing a smart card communication interface. The portable authentication system may be either a single integrated system or a dual system where the security module can be removed or disconnected from the interface system.Type: GrantFiled: January 3, 2008Date of Patent: January 14, 2014Assignee: ActivIdentity, Inc.Inventors: Yves Louis Gabriel Audebert, Eric Fernand Le Saint, Jason Hart, Dominique Fedronic
-
Patent number: 8630584Abstract: A radio frequency (RF) device includes an RF transceiver, an RF antenna, and a magnetic signal detector. The RF is selected to be in the very high frequency (VHF), ultrahigh frequency (UHF), or super high frequency (SHF) bands such that the shielding effect is reduced and the RF device can be configured as a SIM card disposed inside a cellular phone with an increased RF communication range. The magnetic signal detector is used to sense a magnetic field signal from an RF reader, which includes an RF transceiver, an RF antenna, and a magnetic signal transmitter. The longer communication range afforded by the VHF, UHF, or SHF bands is reduced by the sensing of the magnetic field, thereby providing a communication range control, while the RF device and the RF reader exchange information through the RF channel with improved security as a result of the range control.Type: GrantFiled: January 21, 2011Date of Patent: January 14, 2014Assignee: Nationz Technologies Inc.Inventors: Yunbo Yu, Aimin Shen, Shan Zhu, Li Ouyang, Meixiang Li, Weixi Luo
-
Publication number: 20140009258Abstract: Articles of clothing or pieces of athletic equipment include modules, e.g., for sensing physical and/or physiological characteristics associated with use of the clothing or athletic equipment or for performing other functions. Such systems and methods may use physical or other interaction(s) between the module and the article of clothing or piece of athletic equipment for activating and/or deactivating the module and/or sensing devices included with the module, for confirming whether the module and clothing or piece of athletic equipment are authorized for use with one another, and/or for automatic data algorithm selection methods. Additionally, such systems and methods also may use the activation and/or authentication systems for data input to the module. Some examples of such systems and methods may utilize magnets and magnetic sensing systems and/or light (or other radiation) sources and sensing systems for activation, authentication, data input, and/or algorithm selection.Type: ApplicationFiled: September 9, 2013Publication date: January 9, 2014Applicant: NIKE, Inc.Inventor: Charles W. Case, JR.
-
Publication number: 20140009259Abstract: The invention discloses devices and methods for analyzing inbound and outbound ships for illegal or dangerous cargo or persons. An arch is generally placed several kilometers from shore, the arch including a plurality of distinct analytical and diagnostic equipment. A ship passing through the arch is analyzed by photographic, thermal and other means for presence of explosives, nuclear, chemical, or biological agents, terrorists, contraband, illegal passengers and/or other potential threats. Results from scanning are sent to appropriate security officials as are data of ships that attempt to circumvent the security arch.Type: ApplicationFiled: June 13, 2012Publication date: January 9, 2014Inventor: BENJAMIN BLUMENTHAL
-
Publication number: 20140009260Abstract: A system and method for querying vehicle status at a checkpoint using identity information is disclosed herein. In one embodiment, a method of querying vehicle status can comprise storing identity information in a data store, receiving from a checkpoint computer data from a visitor, querying the profiles using the data to locate the first profile, querying a motor vehicle database using the vehicle information, obtaining a vehicle status from the motor vehicle database, and sending the vehicle status to the chekpoint computer. First profile can be one of a plurality of profiles in the data store. Further, the data used for querying the profiles can comprise at least a portion of the identity information.Type: ApplicationFiled: July 9, 2012Publication date: January 9, 2014Inventor: Jeremy Keith MATTERN
-
Patent number: 8620487Abstract: A vehicle screening method and system. A vehicle occupant can be identified utilizing one or more biometric identifiers input by or obtained from the vehicle occupant via a biometric input device. A barcode can also be provided by the vehicle occupant from a scanned card or other structure upon which the barcode is maintained. Additionally, a unique identification number can be provided by the user in order to match the unique identification number against a database of identification numbers, thereby permitting the vehicle occupant to be remotely screened and verified for entry into a secure facility based on the biometric identifier(s), the barcode and the unique identification number.Type: GrantFiled: December 15, 2006Date of Patent: December 31, 2013Assignee: Honeywell International Inc.Inventors: Edward L. Cochran, Bruce W. Anderson, Thomas R. Markham
-
Patent number: 8618905Abstract: The present invention provides an apparatus for verifying the authority of an owner, in terms of an identifier of a product, the first verification information for verifying the authority held at a terminal for an owner with the authority involving the product, and the second verification information for verifying the authority concerning the identifier of the product stored in a product database. The apparatus comprises means for receiving the identifier and the first verification information, means for acquiring the second verification information from the product DB, and means for determining whether or not there is the authority from the first verification information and the second verification information. A hash value acquired from a one-way hash function is employed as a verification key of the verification information.Type: GrantFiled: July 8, 2008Date of Patent: December 31, 2013Assignee: International Business Machines CorporationInventors: Masayuki Numao, Yoshinobu Ishigaki, Yuji Watanabe
-
Publication number: 20130342311Abstract: The exemplary embodiments of the invention realize an efficient prevention of massive infiltration of cloned RFID transponders into existing and new RFID systems. Furthermore, reader devices used for authentication of RFID transponders do not need to be on-line and do not need to be equipped with a Security Authentication Module (SAM). This simplifies authentication procedures and reduces costs. According to an exemplary embodiment of the invention a transponder-specific originality signature is stored by a transponder manufacturer on the transponder. The transponder-specific originality signature may, for example, be stored in the non-volatile memory (EEPROM) of the transponder during the fabrication of the transponder. This transponder-specific originality signature can be checked at any time in a convenient way, which provides an indication of originality of said transponder.Type: ApplicationFiled: June 21, 2013Publication date: December 26, 2013Inventors: Tvrtko Barbaric, Hans de Jong, Ad Arts, Peter Bukovjan
-
Patent number: 8614624Abstract: A method for transferring energy between first and second units with first and second meters and subscriptions to first and second backend platforms, as well as a first unit for supporting such energy transfer, where the backend platforms execute an authentication procedure and a switch is unbarred by the first control box upon successful execution of the authentication procedure. A second control box sends an amount of the transferred energy measured by the second meter to the first control box energy consumption data is sent to the backend platforms, and a consumption clearing procedure is executed between the first and the second units at the backend platforms by means of the received energy consumption data.Type: GrantFiled: September 5, 2012Date of Patent: December 24, 2013Assignee: Alcatel LucentInventors: Klaus Stocker, Dieter Kopp
-
Patent number: 8613049Abstract: The invention provides a network system which can prevent an illegal access to a network or the like set in a specific area and improve security of the network. The network system permits the entering of the user into a security area in accordance with security information (user ID) read out of a contactless IC in a carrying ID card by an entering/leaving room managing apparatus and registers an MAC address of a notebook computer carried by the user when he enters the security area to a managing server as ID information corresponding to the user ID. When a leaving request of the user is received through the entering/leaving room managing apparatus, the network system deletes the registered ID information and restricts connection between the notebook computer and the network on the basis of a registration situation of the ID information to the managing server.Type: GrantFiled: October 27, 2005Date of Patent: December 17, 2013Assignee: Canon Kabushiki KaishaInventor: Masataka Yasuda
-
Patent number: 8607074Abstract: Mobile network services are performed in a mobile data network in a way that is transparent to most of the existing equipment in the mobile data network. The mobile data network includes a radio access network and a core network. A breakout appliance in the radio access network breaks out data coming from a basestation, and performs one or more mobile network services at the edge of the mobile data network based on the broken out data. The breakout appliance includes multiple states that support manufacturing, testing, production, tamper detection and end of life, and the functions of the breakout appliance vary according to its state.Type: GrantFiled: November 20, 2012Date of Patent: December 10, 2013Assignee: International Business Machines CorporationInventors: Vincenzo V. Di Luoffo, Philip E. Grady, Scott A. Liebl, George W. Van Leeuwen
-
Patent number: 8606589Abstract: Systems and methods are disclosed for maintaining security and data gathering for a number of vehicles. The systems include a vehicle activity module for each of the vehicles. The vehicle activity module has a wireless transmitter, a storage device, at least one sensor for receiving event information from identification devices, such as RFID cards, keypads, magnetic ID cards, and the like, a releasable key container, and a processor for accessing and analyzing information. The VAMs are wirelessly connected to a computer system. The VAMs control access to the keys, monitor information relating to access, and store and transmit information relating to sales events, non-sales events, and intrusion events. The VAMs are capable of autonomous operation, without the need to access the computer system to verify event information. The VAMs further include signal attenuating mechanisms to facilitate use of “smart keys.Type: GrantFiled: December 19, 2012Date of Patent: December 10, 2013Assignee: SentriLock, LLCInventors: Dennis McGinn, Suman Cherukuri
-
Patent number: 8604901Abstract: The provenance of passengers intending to depart on a vehicle from a transportation facility, is ensured by providing biometric reading devices at both a check-in station and a departure area station of the facility. The name and/or other information concerning a passenger arriving at the facility is also entered for assessment into a background check system. A biometric template of the passenger is acquired by the reading device at the check-in station and forwarded to the departure area station. When the passenger appears at the latter station, a second biometric template is acquired by the reading device there. The second template is compared with each of a number of templates that were forwarded from the check-in station. If no match exists, or if the background check system returns an unsatisfactory assessment, the passenger is refused boarding onto the vehicle.Type: GrantFiled: June 27, 2007Date of Patent: December 10, 2013Assignee: EyeLock, Inc.Inventors: Hector T. Hoyos, Keith J. Hanna
-
Patent number: 8598980Abstract: Methods and systems for determining whether a particular individual is to be granted, among other things, access to information, access to a particular room or other space, or permission to perform a given act or transaction are disclosed. For example, disclosed is an exemplary method that includes performing multiple biometrics tests on the individual to retrieve multiple biometrics test results, performing at least a first data fusion operation on the multiple biometrics test results to determine an identity result, performing at least one biological state test to determine one or more biological state test results of the individual, and conditionally granting authority to the individual based on the identity result and the one or more biological state results.Type: GrantFiled: July 19, 2010Date of Patent: December 3, 2013Assignee: Lockheed Martin CorporationInventors: Scott Charles Evans, Rebecca Brown, Michael Tin-Lung Chan, Rahul Bhotika, Srinivas Chukka, David W. Hagan, Ken R. Turner
-
Patent number: 8600119Abstract: At least two biometric measurements of a person are collected, then a statistical measure based on the measurements is computed. The statistical measure is abounded estimate of the discriminative power of a test based on the measurements. While the discriminative power is less than a target value, additional biometric measurements are collected. When enough measurements have been collected, a biometric template is constructed from the measurements and stored for use in future identifications. Systems and software to implement similar methods are also described and claimed.Type: GrantFiled: May 19, 2011Date of Patent: December 3, 2013Assignee: Louisiana Tech University Foundation, Inc.Inventor: Vir V. Phoha
-
Publication number: 20130314206Abstract: A method of verifying the identification of fluids to be supplied successively through a fluid-supply hose that selectively connects to successive movable, RFID-tagged fluid containers includes providing an RFID reading unit including an antenna. A sequence of reference container identification codes is received. A container-present indication indicating one of the containers is positioned so that its RFID tag is in the antenna range is received. In response, the RFID tag of that container is read using the RFID reading unit to determine an identification code of the container. A controller automatically verifies the determined container identification code against the first reference identification code in the sequence using a controller. The starting through verifying steps are repeated, using successive values from the sequence in the verifying step, until all values in the sequence have been verified against container identification codes read using the RFID reading unit.Type: ApplicationFiled: May 23, 2012Publication date: November 28, 2013Inventors: James Alan Katerberg, Edward Zogg, Mark P. Hinman
-
Publication number: 20130314207Abstract: A license detector system enables a person such as a police officer to monitor vehicles on the road to ensure drivers have valid licenses. Within each valid license is an RFID tag which contains specific information and each RFID tag is able to send that information to a detector when requested. To use the system, the police officer aims the detector at a vehicle, initiates the signal to be received by the RFID tag within the license and waits to receive a signal back from the RFID tag. If a signal is received, then a valid license has been detected within the vehicle. However, if no signal or an invalid signal is received by the detector, then no one, specifically the driver of the car, has a valid license. Upon discovering such information, the police officer should be justified in stopping the vehicle and taking the necessary police action.Type: ApplicationFiled: July 30, 2013Publication date: November 28, 2013Inventors: George Sunsumu Yonekura, Duane Yamasaki, Michael Cao