Patent classifications
G06F21/88
SYSTEM AND METHOD FOR ADMINISTERING PHYSICAL SECURITY ACCESS TO COMPONENTS OF A PROCESS CONTROL SYSTEM
A system for restricting physical access to at least one component process control system component has a locking device that is integrated with process control system security administration data. The locking device accesses the process control system security data when authenticating a user. Upon authentication of a user for physical access to the particular process control component, the user may directly access the component for which the user is authorized. The system provides tracking of all authenticated users and attempts to access the various control system components.
ANTI-COPY ELECTRONIC DEVICE
An anti-copy electronic device contains: a wireless signal controller having a sensor, and the wireless signal controller and the sensor are accommodated in a casing. The sensor has humidity detection, pressure detection, lights detection, color temperature detection, ultraviolet (UV) detection, and special gases detection in an interior space of the casing. After the casing is removed, the sensor detects a change of humidity, pressure, lights, color temperature, ultraviolet (UV), and special gases in the interior space and sends an indication signal to the wireless signal controller so that the wireless signal controller destroys a password setting program of the wireless signal controller, thus avoiding copy of the password setting program.
ANTI-COPY ELECTRONIC DEVICE
An anti-copy electronic device contains: a wireless signal controller having a sensor, and the wireless signal controller and the sensor are accommodated in a casing. The sensor has humidity detection, pressure detection, lights detection, color temperature detection, ultraviolet (UV) detection, and special gases detection in an interior space of the casing. After the casing is removed, the sensor detects a change of humidity, pressure, lights, color temperature, ultraviolet (UV), and special gases in the interior space and sends an indication signal to the wireless signal controller so that the wireless signal controller destroys a password setting program of the wireless signal controller, thus avoiding copy of the password setting program.
MOBILE DEVICE SECURITY SYSTEMS AND METHODS
A system and method for securing a mobile device may include providing software for installation on the mobile device where the software is configured for disabling at least some functionality of the device, storing a mobile device identifier identifying the mobile device, and determining an unlock code for unlocking the mobile device, receiving a notification of sale of the mobile device, and providing the unlock code. Systems and methods for receiving and verifying the unlock code are also described.
PROTECTED ARTICLE MANAGEMENT
Tracking, identifying and article management systems and methods for reliably and repeatedly determining one or more physically uncopiable attribute instances (of the same or varying types) from or inherent in an article of manufacture, using the selected physical uncopiable attribute(s) to produce an unforgeable identity for the article, and then integrating that unforgeable identity into computer-based tracking systems in a way that permits the tracking system to track and monitor articles for which identity information is known. Applications include documents, fashion accessories, artwork, and other objects.
PROTECTED ARTICLE MANAGEMENT
Tracking, identifying and article management systems and methods for reliably and repeatedly determining one or more physically uncopiable attribute instances (of the same or varying types) from or inherent in an article of manufacture, using the selected physical uncopiable attribute(s) to produce an unforgeable identity for the article, and then integrating that unforgeable identity into computer-based tracking systems in a way that permits the tracking system to track and monitor articles for which identity information is known. Applications include documents, fashion accessories, artwork, and other objects.
Device deactivation based on behavior patterns
Embodiments are described for a pattern-based control system that learns and applies device usage patterns for identifying and disabling devices exhibiting abnormal usage patterns. The system can learn a user's normal usage pattern or can learn abnormal usage patterns, such as a typical usage pattern for a stolen device. This learning can include human or algorithmic identification of particular sets of usage conditions (e.g., locations, changes in settings, personal data access events, application events, IMU data, etc.) or training a machine learning model to identify usage condition combinations or sequences. Constraints (e.g., particular times or locations) can specify circumstances where abnormal pattern matching is enabled or disabled. Upon identifying an abnormal usage pattern, the system can disable the device, e.g., by permanently destroying a physical component, semi-permanently disabling a component, or through a software lock or data encryption.
Device deactivation based on behavior patterns
Embodiments are described for a pattern-based control system that learns and applies device usage patterns for identifying and disabling devices exhibiting abnormal usage patterns. The system can learn a user's normal usage pattern or can learn abnormal usage patterns, such as a typical usage pattern for a stolen device. This learning can include human or algorithmic identification of particular sets of usage conditions (e.g., locations, changes in settings, personal data access events, application events, IMU data, etc.) or training a machine learning model to identify usage condition combinations or sequences. Constraints (e.g., particular times or locations) can specify circumstances where abnormal pattern matching is enabled or disabled. Upon identifying an abnormal usage pattern, the system can disable the device, e.g., by permanently destroying a physical component, semi-permanently disabling a component, or through a software lock or data encryption.
Theft detector
An end-user computing device can include a theft detector that maintains a registered host device list containing identifiers of at least one registered host device. The theft detector can have root access to operations of the end-user device and the theft detector can provides a secure reboot request in response to detecting a possible theft condition. The end-user computing device can also include a boot loader that executes a secure reboot of the end-user device in response to a secure reboot request from the theft detector. The secure reboot of the end-user device resets the end-user device to prevent access to the end-user device.
Theft detector
An end-user computing device can include a theft detector that maintains a registered host device list containing identifiers of at least one registered host device. The theft detector can have root access to operations of the end-user device and the theft detector can provides a secure reboot request in response to detecting a possible theft condition. The end-user computing device can also include a boot loader that executes a secure reboot of the end-user device in response to a secure reboot request from the theft detector. The secure reboot of the end-user device resets the end-user device to prevent access to the end-user device.