Patent classifications
G06F2221/2121
MOBILE RFID CONTAINER AND DISTRIBUTION METHOD
A transportable container is enabled with radio frequency identification (“RFID”) technologies to maintain automated inventory levels of those items that are inside the container. The inventory data is communicated via wireless methods, such as cellular or Wi-Fi, to a remote device such as enterprise resource planning (“ERP”) system. The ERP system may use the inventory data received from the remote device to automatically update appropriately and generate appropriate records (e.g., container inventory, restocking, invoicing, etc.). In some embodiments, automated RFID scans are triggered when the container is opened and subsequently closed. The container may include RF containment/screening to prevent inadvertent scanning of RFID tags outside of the container. The container may also include a location device to allow the location of the container to be readily determined.
DISTRIBUTED and AUTONOMOUS DATA SECURITY AGENT
The present invention is a distributed and autonomous digital data security agent that secures stored data and the storage device itself, from remote manipulation. The present system is an “agent” in that it acts independently in the accomplishment of its objects and is distributed in that its functionality is resides on firmware resident at disparate hardware locations. The agent is autonomous in that it cannot be remotely compromised. The system includes server having a dedicated Private link with a Chip Administrator, and a Data Link between a first-Chip, a second: Chip of said security agent. The first-Chip is resident and operable to control Write/Read calls and data transfers between the server and the second: Chips of the data storage. The Chip Administrator, first-Chip and second-Chip in combination with their associated Firmwares provide said distributed and autonomous data security agent.
REMOTELY VERIFYING AN IDENTITY OF A PERSON
A computer-implemented method for remotely verifying an identity of a user is presented. The method comprises a first data processing device (120) receiving a live video stream (102) of the user from a second data processing device (140) via a video data connection (108) having a video bandwidth. Establishing a separate data connection (110) between the first (120) and second (140) data processing devices, the data connection (110) having a data bandwidth. The first data processing device (120) receiving, via the data connection (110), identifying data (104) captured from an identifying means from the second data processing device (140), or another data processing device. The first data processing device (120) determining first biometric data based on the identifying data (104) and comparing to second biometric data based on the live video stream (102). The first data processing device (120) then verifying an identity of the user based on a correspondence between the first biometric data and the second biometric data.
Mobile RFID container and distribution method
A transportable container is enabled with radio frequency identification (“RFID”) technologies to maintain automated inventory levels of those items that are inside the container. The inventory data is communicated via wireless methods, such as cellular or Wi-Fi, to a remote device such as enterprise resource planning (“ERP”) system. The ERP system may use the inventory data received from the remote device to automatically update appropriately and generate appropriate records (e.g., container inventory, restocking, invoicing, etc.). In some embodiments, automated RFID scans are triggered when the container is opened and subsequently closed. The container may include RF containment/screening to prevent inadvertent scanning of RFID tags outside of the container. The container may also include a location device to allow the location of the container to be readily determined.
Distributed and autonomous data security agent
The present invention is a distributed and autonomous digital data security agent that secures stored data and the storage device itself, from remote manipulation. The present system is an “agent” in that it acts independently in the accomplishment of its objects and is distributed in that its functionality is resides on firmware resident at disparate hardware locations. The agent is autonomous in that it cannot be remotely compromised. The system includes server having a dedicated Private link with a Chip Administrator, and a Data Link between a first-Chip, a second-Chip of said security agent. The first-Chip is resident and operable to control Write/Read calls and data transfers between the server and the second-Chips of the data storage. The Chip Administrator, first-Chip and second-Chip in combination with their associated Firmwares provide said distributed and autonomous data security agent.
Circuit and method for using capacitive touch to further secure information in RFID documents
A system for limiting access to confidential information including storage circuitry for storing the confidential information. An access enabling circuit allows access to the storage circuitry in response to a first level of an enabling signal. A processor generates the enabling signal for a predetermined amount of time in response to sensing of a change of a predetermined value that is produced in response to an act by a person responsible for the confidentiality of the confidential information. The enabling signal assumes a second level after the predetermined amount of time to block access to the storage circuitry.
Detecting physical penetration of secure device
An example device in accordance with an aspect of the present disclosure includes an interleaved connector including a plurality of layers of conducting material interspersed with insulating material. A plurality of electrodes are to identify a change in capacitance of the interleaved connector to indicate a penetration of the device.
Key-ladder protected personalization data transcription for provisioning
A method and system is provided that simplifies the key management by allowing personalization data protected for one chip model to be used to provision device with another chip model with different global hardware root keys. The solution minimizes the changes needed to be performed on the device during provisioning and remains secure.
DISTRIBUTED and AUTONOMOUS DATA SECURITY AGENT
The present invention is a distributed and autonomous digital data security agent that secures stored data and the storage device itself, from remote manipulation. The present system is an agent in that it acts independently in the accomplishment of its objects and is distributed in that its functionality is resides on firmware resident at disparate hardware locations. The agent is autonomous in that it cannot be remotely compromised. The system includes server having a dedicated Private link with a Chip Administrator, and a Data Link between a Chip-A, a Chip-B of said security agent. The Chip-A is resident and operable to control Write/Read calls and data transfers between the server and the Chip-Bs of the data storage. The Chip Administrator, Chip-A and Chip-B in combination with their associated Firmwares provide said distributed and autonomous data security agent.
CIRCUIT AND METHOD FOR USING CAPACITIVE TOUCH TO FURTHER SECURE INFORMATION IN RFID DOCUMENTS
A system for limiting access to confidential information including storage circuitry for storing the confidential information. An access enabling circuit allows access to the storage circuitry in response to a first level of an enabling signal. A processor generates the enabling signal for a predetermined amount of time in response to sensing of a change of a predetermined value that is produced in response to an act by a person responsible for the confidentiality of the confidential information. The enabling signal assumes a second level after the predetermined amount of time to block access to the storage circuitry.