Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

3511 results about "Security controls" patented technology

Security controls are safeguards or countermeasures to avoid, detect, counteract, or minimize security risks to physical property, information, computer systems, or other assets.

Electrically controlled automated devices to control equipment and machinery with remote control and accountability worldwide

This application describes completely in many unique ways and detail all the devices to reduce a vehicle's speed and / or reduce a machines RPMs and / or stop any piece of equipment's as well as guide it if mobile through automated controls. First to slow it down, and guide it and / or control it if necessary (i.e., other pieces of equipment). Secondly it discusses how to stop any piece of equipment completely. And thirdly, the invention secures it in a safe stationary position either entirely or any number of specific moving parts. Many of these systems are initially here described to slow, reduce speed, steer, stop and / or secure equipment functions. However, they also can be used to increase a piece of equipment's functions. In other words their variations are completely capable to serve any remote or automated controls on a vehicle in the future to provide full robotics systems, e.g., for automated transportation systems, automated manufacturing, etc., either through individually isolated remote control systems and / or interfaced with other off-board systems through communication links, gateway computers, computer networks and the world wide web for inexpensive long distance monitoring and remote control. The invention focuses on the automobile industry but as has always been maintained throughout all these applications these devices and systems are designed to control every piece of equipment. The invention includes various accountable protocols and commercial developments to control speed, brake and steering for an automobile shut down to be performed through automation to a safe controlled secured deactivated state to be considered as a basis for a standard in aggressive vehicle remote control and / or to control and guide a vehicle and / or piece of equipment through many different automated systems.
Owner:KLINE & WALKER

Electrically controlled automated devices to operate, slow, guide, stop and secure, equipment and machinery for the purpose of controlling their unsafe, unattended, unauthorized, unlawful hazardous and/or legal use, with remote control and accountability worldwide

This application describes completely in many unique ways and detail all the devices to reduce a vehicle's speed and/or reduce a machines RPM's and/or stop any piece of equipment's as well as guide it if mobile through automated controls. First to slow it down, and guide it and/or control it if necessary (i.e., other pieces of equipment). Secondly it discusses how to stop any piece of equipment completely. And thirdly, the invention secures it in a safe stationary position either entirely or any number of specific moving parts. Many of these systems are initially here described to slow, reduce speed, steer, stop and/or secure equipment functions. However, they also can be used to increase a piece of equipment's functions. In other words their variations are completely capable to serve any remote or automated controls on a vehicle in the future to provide full robotics systems, e.g., for automated transportation systems, automated manufacturing, etc., either through individually isolated remote control systems and/or interfaced with other off-board systems through communication links, gateway computers, computer networks and the world wide web for inexpensive long distance monitoring and remote control. The invention focuses on the automobile industry but as has always been maintained throughout all these applications these devices and systems are designed to control every piece of equipment. The invention includes various accountable protocols and commercial developments to control speed, brake and steering for an automobile shut down to be performed through automation to a safe controlled secured deactivated state to be considered as a basis for a standard in aggressive vehicle remote control and/or to control and guide a vehicle and/or piece of equipment through many different automated systems.
Owner:KLINE & WALKER

Home security system

The present invention provides a home security system that includes a home security controller for collecting monitor data from various crime prevention and disaster prevention sensors installed in a home via a home network and notifying the portable terminal when a state of emergency occurs. The home security controller also enables devices in the home to be operated through remote control signals via an external network. The home security system further includes a portable terminal capable of connecting to the external network and having fingerprint data inputting means mounted on the body of the portable terminal for inputting fingerprints used for authentication. The fingerprint data inputting means has an assigned ID number. The home security system further includes a security center server having fingerprint authenticating means for receiving fingerprint data from the portable terminal via the external network and authenticating the fingerprint data through comparisons with registered fingerprint data. The fingerprint authenticating means completes authentication by checking the assigned ID number of the fingerprint data inputting means and matching the received fingerprint data with fingerprint data registered in association with the ID number. The security center server allows a connection between the portable terminal and the home security controller and controls bi-directional communications between the two after the security center server has completed authentication, enabling the portable terminal to receive monitor data from and transmit remote control signals to the home security controller via the external network.
Owner:AMERICAN TECH GRP JAPAN

Centralized Dynamic Security Control for a Mobile Device Network

An security system for an enterprise network and data automates the revision, deployment, enforcement, auditing and control of security policies on mobile devices connected to said enterprise network, through automated communication between a security policy server and the mobile device. Control of the security system is centralized through administrative control of security policies stored on the security policy server. Automation of deployment of security policies to mobile devices occurs through transparent background communication and transfer of updated policies either triggered by a change in a security policy within the central repository of security policies or upon the expiration of a certain time period during which no policies were downloaded to the mobile device. When the mobile device is not in compliance with a security policy, a software security agent operating thereon limits access to said enterprise network and enterprise data. To aid in preventing the overwhelming of the enterprise network and the security policy server as a result of to many synchronization communications coming from too many mobile devices, a randomized timer is set by the software security agent upon receipt by the mobile device of a synchronization command from the security policy server.
Owner:SQUARE 1 BANK

Automated accounting system that values, controls, records and bills the uses of equipment/vehicles for society

InactiveUS20060287783A1Fairly and accurately monitor and control the impact of equipment use on the world's environment andVehicle testingTelemetry/telecontrol selection arrangementsSecure communicationEnvironment effect
This invention addresses environmental social and commercial uses and includes a monitoring system which is a network of on, in, out and off-board devices working together with people through software and interfaces to provide services and make accountable humanity's machines and their actions through safe secure communication. Control devices are used to provide accountability for their socio-economic and environmental impact. Along with these systems networked together, additional devices and variations needed to complete these operations nationally and world wide are also provided. Unique ways interface a network of separate devices or IC circuits to create an interactive secure control system or center that can be remotely controlled. A control device for society to fairly and accurately monitor and control the impact of equipment use on the world environment, and a nation's infrastructure while developing commercial companies to fulfill these needs and services for the equipment and the people who own and operate them for today and into the future are also provided. A set of secure devices and systems are also included to analyze society and machine interaction.
Owner:KLINE & WALKER

Security system for video game system with hard disk drive and internet access capability

An existing video game system is modified to include additional communication and storage capability via a modem and hard disk drive. In accordance with one embodiment of the present invention, the primary system security features are incorporated into a video game system expansion device having a hard disk drive. The security system does not rely on the relatively insecure video game system. The present exemplary embodiment focuses security control in a disk drive/mass media controlling engine which is physically disposed within the expansion device housing as close as possible to the hard disk drive and the downloaded video games and other data it is designed to protect. Security features are incorporated into, for example, a disk drive controlling processing engine to provide security features which extend far beyond simplistic password systems which have heretofore been utilized in conjunction with disk drive controllers. In accordance with an exemplary embodiment of the present invention, the disk controller also incorporates an encrypting engine which encrypts in accordance with a highly secure encrypting algorithm. A further level of security is provided in the illustrative embodiments by partitioning the hard drive into various partitions whose security/accessibility is tightly controlled. Each application program, e.g., a video game, has a predetermined number of private partitions, including a read only encrypted partition.
Owner:NINTENDO OF AMERICA

Security control and communication system and method

An integrated security control system and method which integrate the functions of a wireless security system control panel and a radio transceiver in an integrated security control system unit. The integrated control unit includes a first telephone communication system for communicating security system data by wired telephone communications, and a second radio frequency (RF) cellular communication system for communicating security system data by communications through an RF communication network. The cellular communication system is the primary communication network for reporting a security event, thereby leaving the first telephone communication system open for telephone communications during the reporting of a security event. A separate unit of the security system, such as a wireless RF status display or a wireless RF keypad, is provided with a beeper transducer for sounding entry and exit beeps. The separate unit is positioned at a separate location from the integrated security control system unit, such that the entry beeps do not alert an entering person to the location of the integrated security control system unit. When a security event is triggered, the control unit delays activating a security alarm sounder in the control unit until after the second RF communication system has finished transmitting the alarm message.
Owner:ADEMCO INC

Method and apparatus for operating resources under control of a security module or other secure processor

A method and apparatus for operating a set of resources under the control of a secure processor, e.g. security module, having a command authentication means and a command execution means, to achieve secure control of the resources. The secure processor stores a set of command primitives for functional control of the resources. A set of defined commands for invoking command primitives has either a secured command format including a command sequence ID, a command code, and a set of command data items or a non-secured command format including a command code and a set of command data items. The secure processor stores a command set up table including command type flags to designate each command as a secured command or a non-secured command. An application program running in an external device includes a plurality of the defined commands in either secured command format or the non-secured command format and these are sent one at a time to the secure processor for execution. The secure processor looks up each received command in the command set up table, and if the command is a non-secured command it immediately executes associated command primitives. If the command is a secured command, the secure processor tests both its authenticity and regularity and only executes the associated command primitives if the command passes both tests.
Owner:HEWLETT PACKARD DEV CO LP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products