WO2008027626A3 - Logical and physical security - Google Patents

Logical and physical security Download PDF

Info

Publication number
WO2008027626A3
WO2008027626A3 PCT/US2007/067404 US2007067404W WO2008027626A3 WO 2008027626 A3 WO2008027626 A3 WO 2008027626A3 US 2007067404 W US2007067404 W US 2007067404W WO 2008027626 A3 WO2008027626 A3 WO 2008027626A3
Authority
WO
WIPO (PCT)
Prior art keywords
information
management
security
aspects
personnel
Prior art date
Application number
PCT/US2007/067404
Other languages
French (fr)
Other versions
WO2008027626A9 (en
WO2008027626A2 (en
Inventor
Melani S Hernoud
Elizabeth J Pierce
Gregory Reith
Original Assignee
Secure Network Systems Llc
Melani S Hernoud
Elizabeth J Pierce
Gregory Reith
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Secure Network Systems Llc, Melani S Hernoud, Elizabeth J Pierce, Gregory Reith filed Critical Secure Network Systems Llc
Priority to AU2007290309A priority Critical patent/AU2007290309B2/en
Priority to CA002650014A priority patent/CA2650014A1/en
Priority to EP07840154A priority patent/EP2013810A4/en
Priority to JP2009507941A priority patent/JP2009535711A/en
Publication of WO2008027626A2 publication Critical patent/WO2008027626A2/en
Publication of WO2008027626A3 publication Critical patent/WO2008027626A3/en
Priority to IL194713A priority patent/IL194713A/en
Priority to ZA2008/08976A priority patent/ZA200808976B/en
Publication of WO2008027626A9 publication Critical patent/WO2008027626A9/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/29Geographical information databases
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • G06F21/35User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/06009Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
    • G06K19/06018Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking one-dimensional coding
    • G06K19/06028Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking one-dimensional coding using bar codes
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/22Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/22Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
    • G07C9/25Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
    • G07C9/257Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition electronically
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/28Individual registration on entry or exit involving the use of a pass the pass enabling tracking or indicating presence
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/22Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
    • G07C9/25Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
    • G07C9/26Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition using a biometric sensor integrated in the pass

Abstract

A security management system that includes a hierarchical security platform, converged IT and physical security management, unified credentialing, credential issuance and incident(s) management. An exemplary aspect of the invention also relates to physical and logical security management and information technology/network security management, with a credential issuance and integrity checking system as well as associated readers and printers of the credential. Still further aspects of the invention relate to obtaining, assembling and analyzing one or more of data, video information, image information, biometric information, sensor information, terrorist information, profile information, and/or other types of information to provide a comprehensive platform for all aspects of security management. A toolkit is also provided that allows complete management, integration, scalability, interoperability and centralized control of all aspects of security including personnel credentialing, personnel management, personnel tracking, task management, security system integration, security information exchange and scalability.
PCT/US2007/067404 2006-04-25 2007-04-25 Logical and physical security WO2008027626A2 (en)

Priority Applications (6)

Application Number Priority Date Filing Date Title
AU2007290309A AU2007290309B2 (en) 2006-04-25 2007-04-25 Logical and physical security
CA002650014A CA2650014A1 (en) 2006-04-25 2007-04-25 Logical and physical security
EP07840154A EP2013810A4 (en) 2006-04-25 2007-04-25 Logical and physical security
JP2009507941A JP2009535711A (en) 2006-04-25 2007-04-25 Application data related to logical and physical security
IL194713A IL194713A (en) 2006-04-25 2008-10-12 Logical and physical security
ZA2008/08976A ZA200808976B (en) 2006-04-25 2008-10-20 Logical and physical security

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US79452906P 2006-04-25 2006-04-25
US60/794,529 2006-04-25

Publications (3)

Publication Number Publication Date
WO2008027626A2 WO2008027626A2 (en) 2008-03-06
WO2008027626A3 true WO2008027626A3 (en) 2008-05-02
WO2008027626A9 WO2008027626A9 (en) 2008-12-24

Family

ID=39136664

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2007/067404 WO2008027626A2 (en) 2006-04-25 2007-04-25 Logical and physical security

Country Status (9)

Country Link
US (9) US8108914B2 (en)
EP (1) EP2013810A4 (en)
JP (2) JP2009535711A (en)
AU (1) AU2007290309B2 (en)
CA (1) CA2650014A1 (en)
IL (1) IL194713A (en)
NZ (1) NZ595899A (en)
WO (1) WO2008027626A2 (en)
ZA (1) ZA200808976B (en)

Families Citing this family (84)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
NZ595899A (en) 2006-04-25 2012-07-27 Vetrix Llc Logical and physical security
US7843348B2 (en) * 2007-01-19 2010-11-30 Alliance Coal, Llc System and method for tracking personnel and equipment
US20080221965A1 (en) * 2007-02-09 2008-09-11 Chris Riddle System and method for disaster training, simulation, and response
WO2009064558A1 (en) * 2007-11-14 2009-05-22 Analogics, Inc. Systems and methods for remote access to incident data
US8353016B1 (en) 2008-02-29 2013-01-08 Adobe Systems Incorporated Secure portable store for security skins and authentication information
US8555078B2 (en) 2008-02-29 2013-10-08 Adobe Systems Incorporated Relying party specifiable format for assertion provider token
US8220035B1 (en) 2008-02-29 2012-07-10 Adobe Systems Incorporated System and method for trusted embedded user interface for authentication
US8234502B2 (en) 2008-08-29 2012-07-31 International Business Machines Corporation Automated password authentication
CA2785611A1 (en) * 2009-01-06 2010-07-15 Vetrix, Llc Integrated physical and logical security management via a portable device
WO2010102176A1 (en) 2009-03-06 2010-09-10 Vetrix, Llc Systems and methods for mobile tracking, communications and alerting
US9218589B2 (en) * 2009-04-30 2015-12-22 Arthur F. Register, Jr. Issuance, conveyance and management of endorsements
US7690032B1 (en) 2009-05-22 2010-03-30 Daon Holdings Limited Method and system for confirming the identity of a user
US8255507B2 (en) * 2009-08-21 2012-08-28 Verizon Patent And Licensing, Inc. Active directory object management methods and systems
SE0950910A1 (en) * 2009-11-27 2011-08-31 Britta Bergstedt Systems comprising database and security device
US8266356B2 (en) * 2009-12-10 2012-09-11 Hewlett-Packard Development Company, L.P. Interconnecting computing modules to form an integrated system
US8401875B2 (en) * 2010-03-12 2013-03-19 Os - New Horizons Personal Computing Solutions Ltd. Secured personal data handling and management system
EP2457444B1 (en) * 2010-11-29 2018-04-25 Albert Handtmann Maschinenfabrik GmbH & Co. KG Scalable machine and method for its operation
EP2646941A4 (en) * 2010-12-01 2017-04-19 HID Global Corporation Biometric terminals
US8854177B2 (en) 2010-12-02 2014-10-07 Viscount Security Systems Inc. System, method and database for managing permissions to use physical devices and logical assets
US20120169457A1 (en) * 2010-12-31 2012-07-05 Schneider Electric Buildings Ab Method and system for dynamically assigning access rights
US9117090B2 (en) * 2011-01-21 2015-08-25 Software Ag, Inc. System and method for a secure data collection system
US20120240220A1 (en) * 2011-03-15 2012-09-20 Raytheon Company Method and system for controlling data access on user interfaces
US20120317507A1 (en) * 2011-06-13 2012-12-13 Adt Security Services Inc. Method and database to provide a security technology and management portal
US8970349B2 (en) 2011-06-13 2015-03-03 Tyco Integrated Security, LLC System to provide a security technology and management portal
KR101543712B1 (en) 2011-08-25 2015-08-12 한국전자통신연구원 Method and apparatus for security monitoring using augmented reality
US20130086685A1 (en) * 2011-09-29 2013-04-04 Stephen Ricky Haynes Secure integrated cyberspace security and situational awareness system
US8856936B2 (en) 2011-10-14 2014-10-07 Albeado Inc. Pervasive, domain and situational-aware, adaptive, automated, and coordinated analysis and control of enterprise-wide computers, networks, and applications for mitigation of business and operational risks and enhancement of cyber security
JP2015502622A (en) * 2011-12-23 2015-01-22 ロプスタッド ハンセン インゲル Alarm tracking system and method with improved confidentiality
US20130284812A1 (en) * 2012-04-25 2013-10-31 Ronald Steven Cok Electronic storage system with environmentally-alterable conductor
US20140006273A1 (en) * 2012-06-29 2014-01-02 Infosys Limited System and method for bank-hosted payments
WO2014018532A1 (en) * 2012-07-25 2014-01-30 Rallypoint Networks, Inc. Interactive computer user interface for visualizing and interacting with a social network within a hierarchical organization
US9380048B2 (en) * 2012-10-15 2016-06-28 Saife, Inc. Certificate authority server protection
US9357382B2 (en) * 2012-10-31 2016-05-31 Intellisist, Inc. Computer-implemented system and method for validating call connections
US9230072B1 (en) * 2012-12-17 2016-01-05 Creative Information Technology, Inc. Dynamic identity program templates
US8719908B1 (en) * 2012-12-21 2014-05-06 Disney Enterprises, Inc. Digital certificate management
US9967524B2 (en) 2013-01-10 2018-05-08 Tyco Safety Products Canada Ltd. Security system and method with scrolling feeds watchlist
US10726160B2 (en) * 2013-03-06 2020-07-28 Assa Abloy Ab Localized pin management with reader verification and no disclosure
US11030579B1 (en) 2013-07-15 2021-06-08 Jpmorgan Chase Bank, N.A. Method and system for incident communication
US10489772B2 (en) 2013-11-27 2019-11-26 At&T Intellectual Property I, L.P. Out-of-band device verification of transactions
US9552684B2 (en) 2014-02-04 2017-01-24 Secure Gravity Inc. Methods and systems configured to detect and guarantee identity for the purpose of data protection and access control
CA2938980A1 (en) * 2014-02-07 2015-08-13 Printer Tailored, Llc Customized, wearable 3d printed articles and methods of manufacturing same
WO2016145168A1 (en) * 2015-03-10 2016-09-15 Abb Technology Ag System and method for administering physical security access to components of a process control system
US20160378268A1 (en) * 2015-06-23 2016-12-29 Honeywell International Inc. System and method of smart incident analysis in control system using floor maps
US9922476B2 (en) * 2015-08-11 2018-03-20 Schweitzer Engineering Laboratories, Inc. Local access control system management using domain information updates
US9773363B2 (en) 2015-08-11 2017-09-26 Schweitzer Engineering Laboratories, Inc. Transient asset management systems and methods
US9779566B2 (en) 2015-08-11 2017-10-03 Schweitzer Engineering Laboratories, Inc. Resource management based on physical authentication and authorization
US10404714B1 (en) 2015-08-11 2019-09-03 Schweitzer Engineering Laboratories, Inc. Policy-managed physical access authentication
US10747895B2 (en) 2015-09-25 2020-08-18 T-Mobile Usa, Inc. Distribute big data security architecture
US10432642B2 (en) 2015-09-25 2019-10-01 T-Mobile Usa, Inc. Secure data corridors for data feeds
US10432641B2 (en) * 2015-09-25 2019-10-01 T-Mobile Usa, Inc. Secure data corridors
CN105183491A (en) * 2015-10-21 2015-12-23 北京超图软件股份有限公司 Cross-platform desktop GIS and starting method thereof
CN108701176B (en) * 2016-02-17 2022-10-14 开利公司 Authorized time lapse view of system and credential data
US10630694B1 (en) 2016-09-20 2020-04-21 Express Scripts Strategic Development, Inc. Systems and methods for data access control
GB2556893A (en) * 2016-11-23 2018-06-13 Siemens Rail Automation Holdings Ltd Input of data into an on-board computer of a train
CN106778190A (en) * 2016-11-29 2017-05-31 艾体威尔电子技术(北京)有限公司 A kind of system and method for strengthening Android system application installation and operation safety
WO2018160689A1 (en) * 2017-03-01 2018-09-07 Carrier Corporation Spatio-temporal topology learning for detection of suspicious access behavior
WO2018160407A1 (en) 2017-03-01 2018-09-07 Carrier Corporation Compact encoding of static permissions for real-time access control
US11687810B2 (en) 2017-03-01 2023-06-27 Carrier Corporation Access control request manager based on learning profile-based access pathways
US10134207B2 (en) 2017-04-20 2018-11-20 Saudi Arabian Oil Company Securing SCADA network access from a remote terminal unit
CA3071616A1 (en) 2017-08-01 2019-02-07 The Chamberlain Group, Inc. System for facilitating access to a secured area
US11055942B2 (en) 2017-08-01 2021-07-06 The Chamberlain Group, Inc. System and method for facilitating access to a secured area
US11140174B2 (en) * 2017-12-13 2021-10-05 Jpmorgan Chase Bank, N.A. Time and location controlled centralized access management system
CN108447157A (en) * 2018-03-14 2018-08-24 合肥光万信息科技有限公司 A kind of passageway secure identification system and its application method
US11288385B2 (en) * 2018-04-13 2022-03-29 Sophos Limited Chain of custody for enterprise documents
CN109102599A (en) * 2018-07-17 2018-12-28 黄月英 Novel access control method based on GIS
CN109033844A (en) * 2018-09-10 2018-12-18 四川长虹电器股份有限公司 Automation vulnerability detection system and method based on port identification
JP7458763B2 (en) * 2018-12-13 2024-04-01 ソニーセミコンダクタソリューションズ株式会社 Flash translation layer with layered security
US10897398B2 (en) 2019-02-04 2021-01-19 Saudi Arabian Oil Company Embedded dynamic configuration assignment for unprotected remote terminal unit (RTU)
US11288378B2 (en) 2019-02-20 2022-03-29 Saudi Arabian Oil Company Embedded data protection and forensics for physically unsecure remote terminal unit (RTU)
EP3726432B1 (en) * 2019-04-18 2023-06-07 MK Smart JSC Patterned smart card module
US10878119B2 (en) 2019-04-22 2020-12-29 Cyberark Software Ltd. Secure and temporary access to sensitive assets by virtual execution instances
US11222123B2 (en) 2019-04-22 2022-01-11 Cyberark Software Ltd. Securing privileged virtualized execution instances from penetrating a virtual host environment
CN110175444B (en) * 2019-05-28 2022-07-22 吉林无罔生物识别科技有限公司 Iris encoding and verifying method, system and computer readable storage medium
US11165777B2 (en) 2019-05-30 2021-11-02 Bank Of America Corporation Controlling access to secure information resources using rotational datasets and dynamically configurable data containers
US11138328B2 (en) 2019-05-30 2021-10-05 Bank Of America Corporation Controlling access to secure information resources using rotational datasets and dynamically configurable data containers
US11153315B2 (en) 2019-05-30 2021-10-19 Bank Of America Corporation Controlling access to secure information resources using rotational datasets and dynamically configurable data containers
US10834731B1 (en) * 2019-07-11 2020-11-10 The Boeing Company Crowd sourced resource management system
CN110313828A (en) * 2019-07-18 2019-10-11 上海水花智能科技有限公司 Intelligent health drinking-water system
US11886605B2 (en) * 2019-09-30 2024-01-30 Red Hat, Inc. Differentiated file permissions for container users
US20210125084A1 (en) * 2019-10-23 2021-04-29 Honeywell International Inc. Predicting identity-of-interest data structures based on indicent-identification data
CN111127706B (en) * 2019-11-28 2022-04-22 深圳指芯物联技术有限公司 Intelligent lock control method, intelligent lock, cloud server and computing equipment
CN111882473A (en) * 2020-07-23 2020-11-03 南京财经大学 Zero-direct-emission tracing method for rain and sewage pipe network
US11341830B2 (en) 2020-08-06 2022-05-24 Saudi Arabian Oil Company Infrastructure construction digital integrated twin (ICDIT)
US11687053B2 (en) 2021-03-08 2023-06-27 Saudi Arabian Oil Company Intelligent safety motor control center (ISMCC)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030105725A1 (en) * 1994-11-28 2003-06-05 Ned Hoffman Tokenless identification system for authorization of electronic transactions and electronic transmissions
US20050038741A1 (en) * 2001-07-10 2005-02-17 American Express Travel Related Services Company, Inc. Method and system for a travel-related multi-function fob
US20050075116A1 (en) * 2003-10-01 2005-04-07 Laird Mark D. Wireless virtual campus escort system
US20050138380A1 (en) * 2003-12-22 2005-06-23 Fedronic Dominique L.J. Entry control system
US20050171787A1 (en) * 2002-12-10 2005-08-04 Anthony Zagami Information-based access control system for sea port terminals

Family Cites Families (60)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2528813B2 (en) 1985-05-10 1996-08-28 株式会社日立製作所 Control device
US5402521A (en) * 1990-02-28 1995-03-28 Chiyoda Corporation Method for recognition of abnormal conditions using neural networks
US5793882A (en) 1995-03-23 1998-08-11 Portable Data Technologies, Inc. System and method for accounting for personnel at a site and system and method for providing personnel with information about an emergency site
US5596652A (en) 1995-03-23 1997-01-21 Portable Data Technologies, Inc. System and method for accounting for personnel at a site and system and method for providing personnel with information about an emergency site
US7822989B2 (en) 1995-10-02 2010-10-26 Corestreet, Ltd. Controlling access to an area
CN1169032C (en) 1996-11-29 2004-09-29 松下电工株式会社 Building automation system
US5987611A (en) 1996-12-31 1999-11-16 Zone Labs, Inc. System and methodology for managing internet access on a per application basis for client computers connected to the internet
US6154843A (en) 1997-03-21 2000-11-28 Microsoft Corporation Secure remote access computing system
WO2000004483A2 (en) 1998-07-15 2000-01-27 Imation Corp. Hierarchical data storage management
US7062489B1 (en) 1998-11-09 2006-06-13 Unisys Corporation Data management system having remote terminal access utilizing security management by table profiling
US7130831B2 (en) 1999-02-08 2006-10-31 Copyright Clearance Center, Inc. Limited-use browser and security system
US6609128B1 (en) 1999-07-30 2003-08-19 Accenture Llp Codes table framework design in an E-commerce architecture
US6761312B2 (en) 1999-07-30 2004-07-13 Salamander Technologies, Inc. System and method for tracking victims of a mass casualty incident
US6862708B1 (en) 2000-01-31 2005-03-01 Harris-Exigent, Inc. Extensible device command commutation engine for formatting device commands for the controls of devices
JP2002007346A (en) * 2000-06-21 2002-01-11 Hewlett Packard Japan Ltd Communication system
JP4654497B2 (en) * 2000-08-31 2011-03-23 ソニー株式会社 Personal authentication system, personal authentication method, information processing apparatus, and program providing medium
US6924727B2 (en) 2000-09-27 2005-08-02 Ntt Docomo, Inc. Method for remote control of home-located electronic devices and a management facility
US6640144B1 (en) 2000-11-20 2003-10-28 Universal Electronics Inc. System and method for creating a controlling device
US6867683B2 (en) 2000-12-28 2005-03-15 Unisys Corporation High security identification system for entry to multiple zones
US20030005326A1 (en) 2001-06-29 2003-01-02 Todd Flemming Method and system for implementing a security application services provider
US7380279B2 (en) 2001-07-16 2008-05-27 Lenel Systems International, Inc. System for integrating security and access for facilities and information systems
US7152105B2 (en) 2002-01-15 2006-12-19 Mcafee, Inc. System and method for network vulnerability detection and reporting
US7249379B2 (en) 2002-02-01 2007-07-24 Systems Advisory Group Enterprises, Inc. Method and apparatus for implementing process-based security in a computer system
US7171467B2 (en) 2002-06-13 2007-01-30 Engedi Technologies, Inc. Out-of-band remote management station
US6721652B1 (en) 2002-11-22 2004-04-13 Electronic Data Systems Corporation (EDS) Implementing geo-fencing on mobile devices
US7231218B2 (en) 2003-03-18 2007-06-12 Openwave Systems Inc. Lawful intercept service
US20040199768A1 (en) 2003-04-04 2004-10-07 Nail Robert A. System and method for enabling enterprise application security
US20040233983A1 (en) 2003-05-20 2004-11-25 Marconi Communications, Inc. Security system
JP4431112B2 (en) 2003-07-09 2010-03-10 株式会社日立コミュニケーションテクノロジー Terminal and communication system
US7191934B2 (en) 2003-07-21 2007-03-20 Salamander Technologies, Inc. Technique for creating incident-specific credentials at the scene of a large-scale incident or WMD event
US8200775B2 (en) 2005-02-01 2012-06-12 Newsilike Media Group, Inc Enhanced syndication
US7579961B2 (en) 2003-09-26 2009-08-25 Openpeak Inc. Device control system, method, and apparatus
KR100502068B1 (en) 2003-09-29 2005-07-25 한국전자통신연구원 Security engine management apparatus and method in network nodes
US7327258B2 (en) 2004-02-04 2008-02-05 Guardian Mobile Monitoring Systems System for, and method of, monitoring the movements of mobile items
US20050219044A1 (en) * 2004-03-16 2005-10-06 Science Traveller International Inc Emergency, contingency and incident management system and method
US7634764B2 (en) 2004-06-04 2009-12-15 Broadcom Corporation Method and system for flexible/extendable at command interpreter
US7292159B2 (en) 2004-07-14 2007-11-06 Spectrum Tracking Systems, Inc. Method and system for providing tracking services to locate an asset
US7277018B2 (en) 2004-09-17 2007-10-02 Incident Alert Systems, Llc Computer-enabled, networked, facility emergency notification, management and alarm system
JP2006191540A (en) 2004-12-09 2006-07-20 Ntt Docomo Inc Service providing system, and portable terminal and control program of same
US20060187060A1 (en) * 2005-02-07 2006-08-24 Colby Steven M Identity devices including radio frequency shielding
US20060200658A1 (en) 2005-03-07 2006-09-07 Bitfone Corporation Agent framework for mobile devices
US7934102B2 (en) * 2005-03-25 2011-04-26 Northrop Grumman Systems Corporation Method and system for efficient exception handling of the production process of personal identification verification (PIV) smartcards
US7748046B2 (en) * 2005-04-29 2010-06-29 Microsoft Corporation Security claim transformation with intermediate claims
US20060276200A1 (en) 2005-05-17 2006-12-07 Sridhar Radhakrishnan Mobile and wireless network architecture for law enforcement
US7848765B2 (en) 2005-05-27 2010-12-07 Where, Inc. Location-based services
US8145241B2 (en) 2005-06-30 2012-03-27 Armstrong, Quinton Co. LLC Methods, systems, and computer program products for role- and locale-based mobile user device feature control
US7669054B2 (en) 2005-08-17 2010-02-23 Common Credential Systems, L.L.C. Legacy access control security system modernization apparatus
US20070089163A1 (en) 2005-10-18 2007-04-19 International Business Machines Corporation System and method for controlling security of a remote network power device
US7437755B2 (en) * 2005-10-26 2008-10-14 Cisco Technology, Inc. Unified network and physical premises access control server
US9118656B2 (en) * 2006-01-26 2015-08-25 Imprivata, Inc. Systems and methods for multi-factor authentication
JP4789653B2 (en) 2006-02-28 2011-10-12 キヤノン株式会社 Information processing apparatus, device management method, and program
NZ595899A (en) 2006-04-25 2012-07-27 Vetrix Llc Logical and physical security
US7696872B2 (en) 2006-09-19 2010-04-13 Surveillance Specialties, Ltd. Rack mounted access/security control panel
US9111234B2 (en) 2006-10-05 2015-08-18 Trimble Navigation Limited Enabling notifications pertaining to an asset
US7921221B2 (en) 2007-01-22 2011-04-05 Minborg Invent I Goteborg Ab Method and apparatus for obtaining digital objects in a communication network
US8380988B2 (en) 2007-08-08 2013-02-19 Imation Corp. Embedded self-contained security commands
CA2785611A1 (en) 2009-01-06 2010-07-15 Vetrix, Llc Integrated physical and logical security management via a portable device
WO2010102176A1 (en) 2009-03-06 2010-09-10 Vetrix, Llc Systems and methods for mobile tracking, communications and alerting
US8937658B2 (en) 2009-10-15 2015-01-20 At&T Intellectual Property I, L.P. Methods, systems, and products for security services
US8854177B2 (en) 2010-12-02 2014-10-07 Viscount Security Systems Inc. System, method and database for managing permissions to use physical devices and logical assets

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030105725A1 (en) * 1994-11-28 2003-06-05 Ned Hoffman Tokenless identification system for authorization of electronic transactions and electronic transmissions
US20050038741A1 (en) * 2001-07-10 2005-02-17 American Express Travel Related Services Company, Inc. Method and system for a travel-related multi-function fob
US20050171787A1 (en) * 2002-12-10 2005-08-04 Anthony Zagami Information-based access control system for sea port terminals
US20050075116A1 (en) * 2003-10-01 2005-04-07 Laird Mark D. Wireless virtual campus escort system
US20050138380A1 (en) * 2003-12-22 2005-06-23 Fedronic Dominique L.J. Entry control system

Also Published As

Publication number Publication date
US9400881B2 (en) 2016-07-26
US8108914B2 (en) 2012-01-31
IL194713A0 (en) 2009-08-03
JP2013242886A (en) 2013-12-05
NZ595899A (en) 2012-07-27
US20190075135A1 (en) 2019-03-07
US20160292459A1 (en) 2016-10-06
AU2007290309A1 (en) 2008-03-06
US20150324571A1 (en) 2015-11-12
US20230142058A1 (en) 2023-05-11
US20170374105A1 (en) 2017-12-28
ZA200808976B (en) 2009-12-30
WO2008027626A9 (en) 2008-12-24
US20120084843A1 (en) 2012-04-05
CA2650014A1 (en) 2007-04-25
IL194713A (en) 2013-12-31
EP2013810A4 (en) 2012-03-28
US20200153868A1 (en) 2020-05-14
US20170126744A1 (en) 2017-05-04
AU2007290309B2 (en) 2012-05-31
US20080109883A1 (en) 2008-05-08
JP2009535711A (en) 2009-10-01
EP2013810A2 (en) 2009-01-14
WO2008027626A2 (en) 2008-03-06

Similar Documents

Publication Publication Date Title
WO2008027626A3 (en) Logical and physical security
WO2007058889A3 (en) Operating system independent data management
CN107491680A (en) Computing device is signed in based on face recognition
EP3042338B1 (en) World-driven access control
US11764991B2 (en) Building management system with identity management
JP2007286912A (en) Attendance management terminal and attendance management program
Kattouw et al. The organisation of community nursing services may impact negatively on safety and the quality of care
ITMI20120246A1 (en) SYSTEM AND METHOD OF CERTIFICATION, PARTICULARLY FOR THE CERTIFICATION OF MODERN VEHICLES, MOTOR VEHICLES AND MOTORCYCLES AND OF HISTORICAL INTEREST.
Batty Planning for sustainable development in Britain: A pragmatic approach
Mott et al. Facing the future of respiratory virus surveillance:“The mosaic surveillance framework”
Snow et al. Crowds (gatherings) and collective behavior (action)
Seo et al. Internet of Things Adoption Challenges in Enterprise Asset Management Organisations
CN208063239U (en) Seal system with biological identification device
Bayley Public participation
Lyu et al. A Study on Priorities of Cyber Security Policy and Governance
Timan Policy, design and use of police-worn bodycameras in the Netherlands
Nichols Documentary film
MacDonald et al. Signal detection theory
Miller et al. 2 D‐to‐3 D Face Recognition Systems
Hou et al. Conceptual framework design of coastal environment management information system based on GIS/RS technologies
TO et al. ANSI/NIST-ITL Mobile ID Working Group
Smith III et al. Military sociology
Montiel Nonviolent Democratic Transitions
Thaddeus The relevance of district planning in conflict management in Ghana-a study of Bawku East District Assembly of the Upper East Region
Su et al. Data fusion of multiple signals from the sensor network

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 07840154

Country of ref document: EP

Kind code of ref document: A2

WWE Wipo information: entry into national phase

Ref document number: 194713

Country of ref document: IL

WWE Wipo information: entry into national phase

Ref document number: 12008502291

Country of ref document: PH

WWE Wipo information: entry into national phase

Ref document number: 2007840154

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 2007290309

Country of ref document: AU

WWE Wipo information: entry into national phase

Ref document number: 2650014

Country of ref document: CA

Ref document number: 4254/KOLNP/2008

Country of ref document: IN

WWE Wipo information: entry into national phase

Ref document number: 572230

Country of ref document: NZ

WWE Wipo information: entry into national phase

Ref document number: 2009507941

Country of ref document: JP

NENP Non-entry into the national phase

Ref country code: DE

ENP Entry into the national phase

Ref document number: 2007290309

Country of ref document: AU

Date of ref document: 20070425

Kind code of ref document: A