Patent classifications
G06F21/86
Substrate for a tamper sensor
A substrate for a tamper sensor includes a plurality of walls and a tab. The walls define a protective volume with an open side. The walls have a plurality of open edges adjacent the open side and a plurality of interior edges different from the open edges. The tab extends from one of the interior edges of one of the walls and is disposed within the protective volume.
Providing system resources with secure containment units
A system for providing resources to customers includes racks, sub-rack level secure containment units in the racks, and a provisioning control system. The sub-rack level secure containment units each enclose system resources. The racks hold two or more of the sub-rack level secure containment units. For each customer, the provisioning control system may provision a set of sub-rack level secure containment units to the customer. The provisioning control system may monitor, and create a record of, events of physical access to the system resources in each customer's set of sub-rack level secure containment units.
Providing system resources with secure containment units
A system for providing resources to customers includes racks, sub-rack level secure containment units in the racks, and a provisioning control system. The sub-rack level secure containment units each enclose system resources. The racks hold two or more of the sub-rack level secure containment units. For each customer, the provisioning control system may provision a set of sub-rack level secure containment units to the customer. The provisioning control system may monitor, and create a record of, events of physical access to the system resources in each customer's set of sub-rack level secure containment units.
SYSTEM AND METHOD FOR DETECTING APPLIANCE TAMPERING
An appliance includes an external communication port, such as an RJ45 port, and a wireless communication module in wireless communication with a remote server through an external network. A controller is configured to detect port activity at the external communication port, e.g., by detecting a plug-in or data transfer, transmit a notification of the port activity to the remote server using the wireless communication module, receive an activity assessment, e.g., such as an activity approval or disapproval, from the remote server, and adjust at least one operating parameter of the appliance in response to the activity assessment.
SYSTEM AND METHOD FOR DETECTING APPLIANCE TAMPERING
An appliance includes an external communication port, such as an RJ45 port, and a wireless communication module in wireless communication with a remote server through an external network. A controller is configured to detect port activity at the external communication port, e.g., by detecting a plug-in or data transfer, transmit a notification of the port activity to the remote server using the wireless communication module, receive an activity assessment, e.g., such as an activity approval or disapproval, from the remote server, and adjust at least one operating parameter of the appliance in response to the activity assessment.
MULTIPLE REDUNDANT DISCIPLINED OSCILLATOR SYSTEMS IN A SPOOFING RESISTANT REFERENCE TIME SOURCE SYSTEM AND METHODS THEREOF
A system wherein when a normal state is entered: discipline only one of at least three oscillators to an external reference; output frequency and time based on the other oscillators not being disciplined to the external reference; and monitor the output frequency difference of the one of the oscillators being disciplined and a composite value of the output frequency difference among the other oscillators. A spoofing state is identified when the monitored difference is more than a difference threshold. When the spoofing state is identified: reset the frequency and time of the oscillator in the spoofing state to match the composite value of the other oscillators; resume disciplining the oscillator in the spoofing state from the external reference after expiration of a time period; and clear the spoofing state and return to the normal state when the oscillators have the output frequency differences among the oscillators below the difference threshold.
Point of sale device power management and undervoltage protection
A point-of-sale (POS) device includes a processor, a battery, a transaction object reader, a printer with a printer controller, and optionally a temperature sensor. The processor determines a present power discharge capability rate of the battery, optionally based on a temperature measured by the temperature sensor. The processor also calculates a first estimated power draw rate based on a first setting value for at least one of the components of the POS device, such as the printer. If the first estimated power draw rate is dangerously close to the present power discharge capability rate of the battery, a second estimated power draw rate is calculated based on a second setting value for the one or more components. If the second estimated power draw rate is no longer dangerously close to the present power discharge capability rate of the battery, the components are set to the second settings value.
Point of sale device power management and undervoltage protection
A point-of-sale (POS) device includes a processor, a battery, a transaction object reader, a printer with a printer controller, and optionally a temperature sensor. The processor determines a present power discharge capability rate of the battery, optionally based on a temperature measured by the temperature sensor. The processor also calculates a first estimated power draw rate based on a first setting value for at least one of the components of the POS device, such as the printer. If the first estimated power draw rate is dangerously close to the present power discharge capability rate of the battery, a second estimated power draw rate is calculated based on a second setting value for the one or more components. If the second estimated power draw rate is no longer dangerously close to the present power discharge capability rate of the battery, the components are set to the second settings value.
SYSTEM AND METHOD FOR PHYSICAL SECURITY OF DISTRIBUTED SYSTEMS
Methods, systems, and devices for providing computer implemented services using managed systems are disclosed. To provide the computer implemented services, the managed systems may be deployed to a location and operate in a predetermined manner conducive to, for example, execution of applications that provide the computer implemented services. When deployed to a location, the managed systems may be housed in a managed system frame. The managed system frames may include systems to guide placement of managed system in preferred frame units, remotely identify occupancy of the frame units, and/or the frame units against unexpected removals of or insertion of devices in the frame units.
SYSTEM AND METHOD FOR PHYSICAL SECURITY OF DISTRIBUTED SYSTEMS
Methods, systems, and devices for providing computer implemented services using managed systems are disclosed. To provide the computer implemented services, the managed systems may be deployed to a location and operate in a predetermined manner conducive to, for example, execution of applications that provide the computer implemented services. When deployed to a location, the managed systems may be housed in a managed system frame. The managed system frames may include systems to guide placement of managed system in preferred frame units, remotely identify occupancy of the frame units, and/or the frame units against unexpected removals of or insertion of devices in the frame units.