G08B13/128

TAMPER-RESPONDENT ASSEMBLY WITH PROTECTIVE WRAP(S) OVER TAMPER-RESPONDENT SENSOR(S)
20170116830 · 2017-04-27 ·

Tamper-respondent assemblies and methods of fabrication are provided which include an inner enclosure, a tamper-respondent sensor(s), a protective wrap(s) and an outer enclosure. The inner enclosure is sized to receive one or more electronic components to be protected, and the tamper-respondent sensor(s) wraps around the inner enclosure. The protective wrap(s) overlies and wraps around the tamper-respondent sensor(s) and inner enclosure, and together the inner enclosure, tamper-respondent sensor(s), and protective wrap(s) form a tamper-respondent subassembly. The outer enclosure receives and surrounds, at least in part, the tamper-respondent subassembly, with the tamper-respondent sensor(s) and protective wrap(s) disposed between the inner enclosure and the outer enclosure. When operative, the inner enclosure, tamper-respondent sensor(s), protective wrap(s) and outer enclosure are coupled together and facilitate conduction of heat from the electronic component(s) out to the outer enclosure.

Secure jacket

A secured cable system for protecting an inner cable is disclosed. The secured cable system includes a cable security system having a first security tape including a tape portion upon which a plurality of detection lines are arranged. The security system may also include a detection box in electrical or optical communication with each of the detection lines in the first security tape. In one embodiment, the security tape is spiral wrapped about the inner cable in a first direction along a length of the inner cable, the security tape being overlapped upon itself at a predetermined overlap factor. The secured cable system may also include a second security tape including a tape portion upon which a plurality of detection lines are arranged in a pattern wherein the second security tape is wrapped about the first security tape in a second direction opposite the first direction.

Security system
09613522 · 2017-04-04 · ·

A security system includes a central control and a number of security controllers, each of which includes a removable and replaceable security control module. Each module is interchangeable with other modules. Each controller includes a housing within which the module is contained. Cables from security-controlled components extend into the interior of the housing and are removably connected to the module. Each module includes a first connector for connection in a communication system and a second connector for receiving inputs from and providing outputs to a security component controlled by the controller. Each module further includes a third connector for receiving inputs from or providing outputs to an auxiliary device other than the security component. The auxiliary device provides an input to the controller or receives an output from a controller independent of the security component. Each controller also includes an accelerometer for providing a tamper evident feature.

CONTAINER FRAUD DETECTION SYSTEM AND METHOD
20170076568 · 2017-03-16 ·

A container fraud detection system and method using one or more wireless communication tags attached to a container in specific ways to ensure the authenticity of the contents. The tag is affixed to the container in such a way that the tag is destroyed upon opening of the container, thereby indicating fraud upon scanning. The tag may be affixed to the container by an adhesive strip, polymer film or wax composition. The tag may be affixed to an adhesive strip prior to application of the strip to a container. Two tags on the container or strip may be cryptographically linked. The tag information is accessible through a scanning device which communicates with a database that stores information about the container and analyzes the probability of fraud with an algorithm.

Security wrap with breakable conductors

A security wrap (20) for protecting an electronic component includes a substrate (22) having a first side and a second side opposite to each other. A security screen (26) is disposed over the first side of the substrate (22) and includes a pair of screen terminals (48) and a frangible and electrically conductive path (46) between the pair of screen terminals (48). A layer of adhesive (30) is over the first side of the substrate (22) and bonds the first side of the substrate (22) to the electronic component with the security screen (26) sandwiched there between.

Electronic device with tamper resistant enclosure
09576451 · 2017-02-21 · ·

A tampering resistant device has housing, a circuit board fitted with electronic components, and a key pad for command input. A security wrap is disposed between the circuit board and the key pad. The security wrap has a substrate and a security screen formed thereon and connected to a first alarm. The security screen has a conductive trace extending over the substrate between a pair of screen terminals that are electrically connected to respective alarm terminals. An alarm switch is located between the substrate and the circuit board and connected to a second alarm. The alarm switch is held closed by a spigot pressing on the alarm switch through the substrate. The spigot extends from the housing and releases the alarm switch when the housing is opened.

Hybrid through hole for solid state intrusion detection

An information handling system includes a printed circuit board, a screw, and a processor. The printed circuit board includes a through hole via. The through hole via includes top and bottom sections plated with a conductive plating material, and a middle section without any conductive plating material. The screw is in physical communication with the top, middle, and bottom sections of the through hole via in the printed circuit board. The processor determines whether an electrical circuit is formed between the screw, the top section of the through hole via, and the bottom section of the through hole via. Based on the determination of the electrical circuit being formed, the processor provides an indication that no intrusion has been made into the information handling system.

Tamper-respondent assemblies with enclosure-to-board protection

Tamper-respondent assemblies and fabrication methods are provided which incorporate enclosure to circuit board protection. The tamper-respondent assemblies include a circuit board, and an electronic enclosure mounted to the circuit board and facilitating enclosing at least one electronic component within a secure volume. A tamper-respondent electronic circuit structure facilitates defining the secure volume, and the tamper-respondent electronic circuit structure includes a tamper-respondent circuit. An adhesive is provided to secure, in part, the electronic enclosure to the circuit board. The adhesive contacts, at least in part, the tamper-respondent circuit so that an attempted separation of the electronic enclosure from the circuit board causes the adhesive to break the tamper-respondent circuit, facilitating detection of the separation by a monitor circuit of the tamper-respondent electronic circuit structure.

Bottle fraud detection system and method
09536404 · 2017-01-03 ·

A bottle fraud system and method encapsulates a wireless communication tag into a bottle to ensure the authenticity of the bottle. The tag stores information about the bottle. The tag is physically integrated into a bottle stopper through encapsulation by multiple layers of a polymer film and a wax composition. The physical condition to the bottle stopper or the layers serves as an indication of whether tampering has occurred. The information in the tag is accessible through a reading device. The reading device communicates with a database that stores information about the bottle and analyzes the probability of fraud with an algorithm. The algorithm analyzes the information about the bottle, such as shipping history, contents and location, to predict whether fraud is likely. Thus, both the physical condition of the bottle, and the predictive capacity of the algorithm help detect fraud on the bottle.

HARDWARE TAMPERING DETECTION

An information handling system may include at least one processor, a plurality of physical sensors, and a firmware having instructions coded thereon that are executable by the at least one processor for: detecting, based on one or more of the physical sensors, a tampering event associated with the information handling system; and transmitting data regarding the tampering event to a central monitoring system.