Composite anti-tamper container with embedded devices
    1.
    发明授权
    Composite anti-tamper container with embedded devices 有权
    具有嵌入式装置的复合防篡改容器

    公开(公告)号:US08531292B2

    公开(公告)日:2013-09-10

    申请号:US11181429

    申请日:2005-07-14

    IPC分类号: G08B13/00

    摘要: A design and manufacturing methods for reusable, stackable shipping containers made from composite materials is described. The composite material is embedded with optical fibers, data and electrical paths, and various types of components. These embedded devices are capable of detecting intrusions through the container walls, securely storing and processing information, and securely communicating information to other containers and to remote devices.

    摘要翻译: 描述了由复合材料制成的可重复使用的可堆叠运输集装箱的设计和制造方法。 复合材料嵌入光纤,数据和电气路径以及各种类型的组件。 这些嵌入式设备能够检测通过容器壁的入侵,安全地存储和处理信息,以及将信息安全地传送到其他容器和远程设备。

    Secure processing module and method for making the same
    3.
    发明授权
    Secure processing module and method for making the same 有权
    安全处理模块及其制作方法

    公开(公告)号:US08930717B2

    公开(公告)日:2015-01-06

    申请号:US13410204

    申请日:2012-03-01

    申请人: Fred Hewitt Smith

    发明人: Fred Hewitt Smith

    摘要: Described herein are devices and techniques related to implementation of a trustworthy electronic processing module. During fabrication, a manufacturer is provided with partial technical specifications that intentionally exclude at least one critical design feature. Fabrication of the electronic processing module is monitored from a trusted remote location; wherefrom, the intentionally excluded at least one critical design feature is implemented, thereby completing manufacture of the trustworthy electronic processing module. At least one of the acts of monitoring and implementing can be accomplished by instantiating executable software remotely from a trusted remote location and immediately prior to execution. It is the executable software that enables at least one of the acts of monitoring and implementing. Further, the instantiated executable software is removed or otherwise rendered inoperable immediately subsequent to execution. In some embodiments the critical design feature can be implemented within a configurable element, such as a field programmable gate array (FPGA).

    摘要翻译: 这里描述的是与可靠的电子处理模块的实现有关的设备和技术。 在制造过程中,向制造商提供有意排除至少一个关键设计特征的部分技术规范。 从可信赖的远程位置监测电子处理模块的制造; 从而有意地排除了至少一个关键设计特征,从而完成可信赖的电子处理模块的制造。 监控和实施中的至少一个可以通过从可信赖的远程位置远程实施可执行软件并在执行之前立即完成。 它是可执行的软件,可以实现至少一个监视和实现的行为。 此外,实例化的可执行软件在执行后立即被移除或以其他方式呈现为不可操作的。 在一些实施例中,关键设计特征可以在诸如现场可编程门阵列(FPGA)的可配置元件内实现。

    PROTECTING INFORMATION IN AN UNTETHERED ASSET
    4.
    发明申请
    PROTECTING INFORMATION IN AN UNTETHERED ASSET 审中-公开
    保护信息在未来的资产

    公开(公告)号:US20120070002A1

    公开(公告)日:2012-03-22

    申请号:US12837540

    申请日:2010-07-16

    申请人: Fred Hewitt Smith

    发明人: Fred Hewitt Smith

    IPC分类号: G06F12/14 G06F21/06 H04L9/06

    摘要: The technology described herein for protecting secure information includes a method. The method includes storing, by a plurality of data store devices, the secure information. Each of the data store devices stores at least one part of the secure information. The method further includes receiving, by at least one of a plurality of embedded sensors, a notification associated with a compromise of at least one part of the secure information. The method further includes destroying one or more parts of the secure information based on the notification. The method further includes processing, by a plurality of intelligent agent modules, one or more parts of the secure information received from one or more of the data store devices if no parts of the one or more parts of the secure information are destroyed.

    摘要翻译: 本文所述的用于保护安全信息的技术包括一种方法。 该方法包括由多个数据存储设备存储安全信息。 每个数据存储设备存储安全信息的至少一部分。 所述方法还包括由多个嵌入式传感器中的至少一个接收与所述安全信息的至少一部分的妥协相关联的通知。 该方法还包括基于通知来销毁安全信息的一个或多个部分。 该方法还包括如果没有安全信息的一个或多个部分的任何部分被销毁,则由多个智能代理模块处理从一个或多个数据存储设备接收的安全信息的一个或多个部分。

    System for installing information related to a software application to a
remote computer over a network
    5.
    发明授权
    System for installing information related to a software application to a remote computer over a network 失效
    用于通过网络将与软件应用相关的信息安装到远程计算机的系统

    公开(公告)号:US6067582A

    公开(公告)日:2000-05-23

    申请号:US689767

    申请日:1996-08-13

    摘要: A system and method is disclosed for distributing, registering and purchasing software application and other digital information over a network. Each software application is embedded with an agent module which communicates with a remote server module in a server attached to the network. The server module interacts with the user that is requesting installation of the software application and upon verification of billing or other constraints, the server module enables the agent module to proceed with installation. Subsequent to installation, the agent module monitors the server module and informs the user if an update to the software application is available.

    摘要翻译: 公开了一种用于通过网络分发,注册和购买软件应用程序和其他数字信息的系统和方法。 每个软件应用程序都嵌入一个与连接到网络的服务器中的远程服务器模块通信的代理模块。 服务器模块与正在请求安装软件应用程序的用户交互,并且在验证计费或其他限制时,服务器模块使代理模块能够进行安装。 在安装之后,代理模块监视服务器模块,并通知用户软件应用程序的更新是否可用。

    Controlling user access to electronic resources without password
    6.
    发明授权
    Controlling user access to electronic resources without password 有权
    控制用户无密码访问电子资源

    公开(公告)号:US09058482B2

    公开(公告)日:2015-06-16

    申请号:US13410287

    申请日:2012-03-01

    申请人: Fred Hewitt Smith

    发明人: Fred Hewitt Smith

    摘要: Described herein are devices and techniques for remotely controlling user access to a restricted computer resource. The process includes pre-determining an association of the restricted computer resource and computer-resource-proximal environmental information. Indicia of user-proximal environmental information are received from a user requesting access to the restricted computer resource. Received indicia of user-proximal environmental information are compared to associated computer-resource-proximal environmental information. User access to the restricted computer resource is selectively granted responsive to a favorable comparison in which the user-proximal environmental information is sufficiently similar to the computer-resource proximal environmental information. In at least some embodiments, the process further includes comparing user-supplied biometric measure and comparing it with a predetermined association of at least one biometric measure of an authorized user. Access to the restricted computer resource is granted in response to a favorable comparison.

    摘要翻译: 这里描述了用于远程控制用户对受限计算机资源的访问的设备和技术。 该过程包括预先确定受限计算机资源和计算机资源近端环境信息的关联。 从用户请求访问受限计算机资源的用户接收到用户近端环境信息的标记。 将用户近端环境信息的接收标记与相关的计算机资源近端环境信息进行比较。 选择性地授予对受限计算机资源的用户访问,这有利于用户近端环境信息与计算机资源近端环境信息充分相似的有利比较。 在至少一些实施例中,该过程还包括比较用户提供的生物测量测量并将其与授权用户的至少一个生物测量度量的预定关联进行比较。 对有限的计算机资源进行访问是为了有利的比较。

    Container security devices, systems, and method
    7.
    发明授权
    Container security devices, systems, and method 有权
    集装箱安全装置,系统和方法

    公开(公告)号:US08537009B2

    公开(公告)日:2013-09-17

    申请号:US12596967

    申请日:2008-02-01

    IPC分类号: G08B13/00

    摘要: A dosimeter is disclosed for use in container including outer walls defining an interior volume, the dosimeter including: a radon detection element adapted to detect a radon level for the interior volume; a neutron detection element adapted detect a neutron level for the interior volume. The dosimeter is adapted to measure the radon level and neutron level for a period of time, compare the measured radon level to a first threshold, compare the measured neutron level to a second threshold, and determine information indicative of the presence or absence of fissile material within the interior volume based on the comparisons.

    摘要翻译: 公开了一种用于容器的剂量计,包括限定内部容积的外壁,所述剂量计包括:适于检测内部容积的氡气水平的氡探测元件; 中子检测元件适用于检测内部体积的中子水平。 剂量计适于测量一段时间内的氡气水平和中子水平,将测量的氡气水平与第一阈值进行比较,将测得的中子水平与第二阈值进行比较,并确定指示易裂变材料是否存在的信息 在内部体积内基于比较。

    Secure panel with remotely controlled embedded devices
    8.
    发明授权
    Secure panel with remotely controlled embedded devices 有权
    具有遥控嵌入式设备的安全面板

    公开(公告)号:US07576653B2

    公开(公告)日:2009-08-18

    申请号:US11724879

    申请日:2007-03-15

    申请人: Fred Hewitt Smith

    发明人: Fred Hewitt Smith

    IPC分类号: G08B13/14

    摘要: Devices and methods for securing an asset include providing a plurality of dispersed, interconnected electronic components integrally attached to a structural member of the secured asset. Each electronic component of the plurality of components is in communication with a remotely accessible interface and includes a memory for storing a respective sub-division of at least one numeric value. The numeric values can be inserted, altered, or deleted remotely through the remotely accessible interface. Upon detection of an attempted breach of the secured asset or tamper with the structural member, one or more of the stored sub-divisions are selectively destroyed. Detection of an attempted breach or tamper is remotely observable upon inspection of a previously stored numeric value, subsequently altered in response to detection of a breach of the secured asset.

    摘要翻译: 用于确保资产的设备和方法包括提供整体连接到担保资产的结构构件的多个分散的,互连的电子部件。 多个组件中的每个电子部件与可远程访问的接口通信,并且包括用于存储至少一个数值的相应子划分的存储器。 可以通过可远程访问的界面远程插入,更改或删除数字值。 一旦检测到试图违反有担保资产或篡改结构性成员,则一个或多个存储的分部被选择性地销毁。 在检查先前存储的数值后,可以远程观察到尝试违规或篡改的检测,随后响应于检测到有担保资产的违约而被改变。

    System and method for installing an auditable secure network
    9.
    发明授权
    System and method for installing an auditable secure network 失效
    用于安装可审核安全网络的系统和方法

    公开(公告)号:US06918038B1

    公开(公告)日:2005-07-12

    申请号:US09441403

    申请日:1999-11-16

    摘要: A system and method for generating and remotely installing a private secure and auditable network is provided. Node identification, link, and application information is input into a template. A generator generates components using the information in the template and the components are remotely installed using an installation server. The components include agent modules which are each installed at predetermined target site and establish communication with the installation server to facilitate the download of other components, including application software and configuration files. Each node can only be installed once and is specific to a predetermined target site. For each link, a unique pair of keys is generated in a form which is not human readable, each key corresponds to a different direction of communication over the link. Data transmitted between nodes is encrypted using public-private key pairs. At least one monitor node manages the security of the network, strobes keys, and may take nodes out of the network in the event of a security violation. In such a case, one or more nodes, or the entire network, may be regenerated and installed anew. Throughout the generation and installation a plurality of verifications, authorizations, and password entries may be required by independent groups to arrive at the network. Preferably, the installation is audited by several groups, and the overall operation may be audited by a second monitor node to detect the presence of an interposed “pirate” node.

    摘要翻译: 提供了一种用于生成和远程安装专用安全可审计网络的系统和方法。 节点标识,链接和应用信息被输入到模板中。 生成器使用模板中的信息生成组件,并使用安装服务器远程安装组件。 组件包括代理模块,每个代理模块都安装在预定的目标站点,并建立与安装服务器的通信,以便于下载包括应用软件和配置文件在内的其他组件。 每个节点只能安装一次,并且特定于预定的目标站点。 对于每个链接,唯一的一对密钥以不是人类可读的形式生成,每个密钥对应于链路上不同的通信方向。 在节点之间传输的数据使用公私密钥对进行加密。 至少一个监视器节点管理网络的安全性,选通密钥,并且可能在出现安全违规的情况下将节点从网络中取出。 在这种情况下,可以重新生成并安装一个或多个节点或整个网络。 在整个生成和安装过程中,独立组可能需要多个验证,授权和密码输入到达网络。 优选地,安装被多个组审核,并且整体操作可以由第二监视器节点审核以检测插入的“盗版”节点的存在。

    SECURE PROCESSING MODULE AND METHOD FOR MAKING THE SAME
    10.
    发明申请
    SECURE PROCESSING MODULE AND METHOD FOR MAKING THE SAME 有权
    安全处理模块及其制造方法

    公开(公告)号:US20120227117A1

    公开(公告)日:2012-09-06

    申请号:US13410204

    申请日:2012-03-01

    申请人: Fred Hewitt Smith

    发明人: Fred Hewitt Smith

    IPC分类号: G06F21/00

    摘要: Described herein are devices and techniques related to implementation of a trustworthy electronic processing module. During fabrication, a manufacturer is provided with partial technical specifications that intentionally exclude at least one critical design feature. Fabrication of the electronic processing module is monitored from a trusted remote location; wherefrom, the intentionally excluded at least one critical design feature is implemented, thereby completing manufacture of the trustworthy electronic processing module. At least one of the acts of monitoring and implementing can be accomplished by instantiating executable software remotely from a trusted remote location and immediately prior to execution. It is the executable software that enables at least one of the acts of monitoring and implementing. Further, the instantiated executable software is removed or otherwise rendered inoperable immediately subsequent to execution. In some embodiments the critical design feature can be implemented within a configurable element, such as a field programmable gate array (FPGA).

    摘要翻译: 这里描述的是与可靠的电子处理模块的实现有关的设备和技术。 在制造过程中,向制造商提供有意排除至少一个关键设计特征的部分技术规范。 从可信赖的远程位置监测电子处理模块的制造; 从而有意地排除了至少一个关键设计特征,从而完成可信赖的电子处理模块的制造。 监控和实施中的至少一个可以通过从可信赖的远程位置远程实施可执行软件并在执行之前立即完成。 它是可执行的软件,可以实现至少一个监视和实现的行为。 此外,实例化的可执行软件在执行后立即被移除或以其他方式呈现为不可操作的。 在一些实施例中,关键设计特征可以在诸如现场可编程门阵列(FPGA)的可配置元件内实现。