security High Security Requirements is the Top Issue for Half of All Industrial IoT Developers By www.24-7pressrelease.com Published On :: Wed, 04 Jan 2017 07:00:00 GMT Security is an issue for most software developers but the high security requirements needed for industrial Internet of Things is the number one challenge. Full Article
security E911 Enterprise Security Summit Comes to Grand Rapids Area Wednesday, August 7th By www.24-7pressrelease.com Published On :: Tue, 09 Jul 2019 07:00:00 GMT Effective January 1, 2020 all business and government locations in Michigan will be required to implement "Enhanced 911" service in their Multi Line Telephone Systems (MLTS). Full Article
security i.b.s.® Receives Official Permit from Ministry of Interior of Latvia to Carry Out Armed Security Services for Military Forces and Clients from the Civil Logistic Industry By www.24-7pressrelease.com Published On :: Mon, 09 Dec 2019 07:00:00 GMT i.b.s.® as a first foreign security company now approved in Latvia and Lithuania (Baltics) Full Article
security The Cybersecurity Tool Kit They Call Smart Keeper By www.24-7pressrelease.com Published On :: Sat, 01 Sep 2018 07:00:00 GMT The network security protection devices offered by The Connectivity Center take a systems approach, working together to provide enhanced defense against purposeful intrusions and unintentional network contamination. Full Article
security Boring Now Offers Expanded Solutions for Cybersecurity By www.24-7pressrelease.com Published On :: Thu, 25 Jul 2019 07:00:00 GMT Boring Business Systems is helping businesses make up-to-date decisions about their IT infrastructure and improve their data protection and cybersecurity. Full Article
security 3Fun Users' Data Is Not Hacked or Disclosed – The Security Update Was Made On July 2nd By www.24-7pressrelease.com Published On :: Sat, 10 Aug 2019 07:00:00 GMT Security updates to 3Fun's API, servers and mobile application were made on July 2nd and a new, secure version of the app was released on July 8th. Users' data is not hacked or disclosed. Full Article
security DIGITALSPEC Strengthens Ties with the U.S. Department of Education with Award of 8(a) IT Security Support Services Multi-Year Prime Contract By www.24-7pressrelease.com Published On :: Wed, 08 Aug 2018 07:00:00 GMT Positioned to Deliver Experienced, Seasoned and Well-practiced Physical and IT Security Specialists and Communications Experts to Support Agency Mission. Full Article
security DIGITALSPEC Awarded New 5-Year Contract with the Transportation Security Administration (TSA) Intelligence and Analysis (I&A) Division to Enhance Communications and Correspondence By www.24-7pressrelease.com Published On :: Tue, 29 Jan 2019 07:00:00 GMT DIGITALSPEC will continue to support TSA I&A with communications and correspondence services, acting as the Executive Secretariat for I&A. Full Article
security Hundreds Expected at First New York City Rally for Age Justice and Economic Security for Older Adults ─ Thursday May 23, 4:30 PM, Union Square Park North Side By www.24-7pressrelease.com Published On :: Mon, 20 May 2019 07:00:00 GMT New York City Council Member Margaret S. Chin, Chair, Aging Committee Featured Speaker...Organized By The Radical Age Movement and 32 Sponsors and Partners Full Article
security Cybersecurity Expert: "Cyber Crimes Will Increase With Shift to Teleworking" By www.24-7pressrelease.com Published On :: Thu, 02 Apr 2020 07:00:00 GMT Companies Can Take Steps to Protect Their Operations from Cyber Criminals in the New Business Landscape Full Article
security Houses of Worship—Re-opening to the Community - DHS to Houses of Worship: Start Planning Now for Life after COVID-19 Crisis - The Federal Agency Also Warned That Security Plans Should Be Reviewed By www.24-7pressrelease.com Published On :: Thu, 23 Apr 2020 07:00:00 GMT The K Street Group has announced that is it prepared to assist its house of worship clients with a phased in re-opening of their facilities, once the COVid pandemic restrictions are relaxed. Full Article
security Czech, US to Cooperate on Security of 5G Networks By feedproxy.google.com Published On :: Thu, 07 May 2020 11:03:54 +0000 The Czech Republic and the United States have signed a joint declaration Wednesday for cooperating on security of 5G technology. read more Full Article Mobile Security NEWS & INDUSTRY Privacy Wireless Security Compliance Risk Management Mobile & Wireless Privacy & Compliance Management & Strategy
security Three Tips to Help CISOs Close the IT-OT Security Gap, Part 2 By feedproxy.google.com Published On :: Thu, 07 May 2020 18:38:42 +0000 Thinking of Your OT Network as an Extension of Your IT Network Will Give You a Consolidated Picture of Your Technology Infrastructure read more Full Article INDUSTRY INSIGHTS SCADA / ICS
security Cisco Patches High Severity Vulnerabilities in Security Products By feedproxy.google.com Published On :: Thu, 07 May 2020 18:56:42 +0000 Cisco Patches High Severity Vulnerabilities in Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) Cisco this week released security updates to address more than 30 vulnerabilities in various products, including 12 high severity flaws impacting Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD). read more Full Article Network Security NEWS & INDUSTRY Vulnerabilities
security Zoom Agrees to Step Up Security After New York Probe By feedproxy.google.com Published On :: Fri, 08 May 2020 03:54:42 +0000 New York state's top prosecutor on Thursday announced that the company Zoom would improve security measures, after flaws were detected as the video conferencing platform soared in popularity amid the coronavirus pandemic. read more Full Article NEWS & INDUSTRY Privacy Incident Response Compliance Privacy & Compliance Management & Strategy
security Cloud Security Company Ermetic Emerges From Stealth Mode By feedproxy.google.com Published On :: Fri, 08 May 2020 15:49:39 +0000 Cloud security company Ermetic emerged from stealth mode this week with a platform that automates detection and remediation of identity and access-based risks. read more Full Article NEWS & INDUSTRY Identity & Access Cloud Security Management & Strategy
security New And Notable: Cities For People, Transportation Infrastructure Security, Railway Noise And Vibration By metrotransportationlibrary.blogspot.com Published On :: Tue, 21 Sep 2010 00:34:00 +0000 For more than forty years Jan Gehl has helped to transform urban environments around the world based on his research into the ways people actually use — or could use — the spaces where they live and work.In Cities For People (Washington : Island Press, 2010), his revolutionary new book, Gehl presents his latest work creating (or recreating) cityscapes on a human scale. He clearly explains the methods and tools he uses to reconfigure unworkable cityscapes into the landscapes he believes they should be: cities for people. Taking into account changing demographics and changing lifestyles, Gehl explains how to develop cities that are lively, safe, sustainable, and healthy. “Jan Gehl is our greatest observer of urban quality and an indispensable philosopher of cities as solutions to the environmental and health crises that we face. With over half the world’s population now in urban areas, the entire planet needs to learn the lessons he offers in Cities for People.” --Janette Sadik-Khan, Commissioner of the New York City Department of Transportation The book is extensively illustrated with over 700 photos and drawings of examples from Gehl’s work around the globe. Jan Gehl is based in Copenhagen.Intelligent Transportation Systems, or ITS, integrates different computing, control, and communication technologies to help monitor and manage traffic management that helps reduce congestion while saving lives, time, and money.While mobility and safety are the primary objectives of any good transportation system, security has also become an equally important consideration in their design and operation.This new work, Transportation Infrastructure Security Utilizing Intelligent Transportation Systems (Hoboken, NJ : Wiley, 2008), provides a comprehensive treatment of techniques to leverage ITS in support of security and safety for surface transportation infrastructure.Through the book's multidisciplinary approach, readers gain a comprehensive introduction to the diverse aspects of transportation infrastructure security as well as how ITS can reduce risks and be protected from threats with such topics as computer systems, risk analysis, and multi-modal transportation systems.This book, which will serve as a textbook and guide, provides: Current ITS approaches to security issues such as freight security, disaster and evacuation response, HAZMAT incidents, rail security, and ITS Wide Area Alerts Guidance on the development of a regional transportation security plan Securing ITS itself and privacy issues involved in any collection and use of personally identifiable tracking data Exercises, question-and-answer sections, and other helpful review tools for the reader Filling a gap in the practical application of security, this book offers both students and transportation professionals valuable insights into the new security challenges encountered and how to manage these challenges with the use of computerized transportation systems. Railways are an environmentally friendly means of transport well suited to modern society.However, noise and vibration are key obstacles to further development of the railway networks for high-speed intercity traffic, for freight and for suburban metros and light-rail.Railway Noise And Vibration: Mechanisms, Modelling And Means Of Control (Amsterdam : Elsevier, 2009) brings together coverage of the theory of railway noise and vibration with practical applications of noise control technology at source to solve noise and vibration problems from railways.Each source of noise and vibration is described in a systematic way: rolling noise, curve squeal, bridge noise, aerodynamic noise, ground vibration and ground-borne noise, and vehicle interior noise.This work also discusses in full the theoretical background and practical workings of railway noise, including the latest research findings, and forms an extended case study in the application of noise control techniques.Author David Thompson is Professor of Railway Noise and Vibration at the Institute of Sound and Vibration Research, University of Southampton (U.K.). Full Article
security Bill Clinton and James Patterson on Collaboration and Cybersecurity By hbr.org Published On :: Tue, 05 Jun 2018 10:51:15 -0500 Former U.S. President Bill Clinton and author James Patterson discuss their new novel, The President is Missing, in which a fictional president fights a cybersecurity attack amid intense political dysfunction. The coauthors share their lessons for collaborating across disparate skillsets — “clarity on the objective” and “don’t be afraid to admit what you don’t know.” They also talk about their research into cybersecurity threats and how realistic their thriller scenario could be. Full Article
security Why Cybersecurity Isn’t Only a Tech Problem By hbr.org Published On :: Tue, 03 Dec 2019 09:30:57 -0500 Thomas Parenty and Jack Domet, cofounders of the cybersecurity firm Archefact Group, say that most organizations are approaching cybersecurity all wrong. Whether they're running small companies or working in multinational corporations, leaders have to think beyond their IT department and technology systems to instead focus on protecting their businesses' most important assets from attack. They need to work across functions and geographies to identify key risks, imagine potential threats and adversaries, and develop a plan for combating them. Parenty and Domet are the authors of the HBR article “Sizing up your Cyber Risks,” as well as the HBR Press book "A Leader’s Guide to Cybersecurity." Full Article
security David Hartley Speaking on Cybersecurity Panel at CIO Executive Leadership Summit By anderscpa.com Published On :: Thu, 05 Sep 2019 15:03:27 +0000 David E. Hartley, CPA, CISA, partner and Director + Advisory Services, is speaking on a cybersecurity panel at the 2019 St. Louis CIO Executive Leadership Summit on Thursday, October 3. The summit, Future State 2025 – Driving the Digital Roadmap… Read More The post David Hartley Speaking on Cybersecurity Panel at CIO Executive Leadership Summit appeared first on Anders CPAs. Full Article Events Technology
security Trick or Treat: Cybersecurity Awareness Month Brings Light to Cyberattacks By anderscpa.com Published On :: Tue, 01 Oct 2019 13:08:45 +0000 October typically brings Halloween ghost stories, pranks and trick or treating, but scary stories about cyberattacks and trickery around data breaches run rampant all year long. Aside from Halloween, October is also National Cybersecurity Awareness Month (NCSAM), bringing awareness to… Read More The post Trick or Treat: Cybersecurity Awareness Month Brings Light to Cyberattacks appeared first on Anders CPAs. Full Article Technology cybersecurity IT Cyber Security
security Cybersecurity for Startups: A 5 Step Plan for Preventing Costly Data Breaches By anderscpa.com Published On :: Tue, 22 Oct 2019 14:27:25 +0000 All startups have one thing in common when it comes to cybersecurity: they all are at some level of risk of a costly data breach. Startup business owners may not even be aware of certain vulnerabilities including ransomware, phishing, data… Read More The post Cybersecurity for Startups: A 5 Step Plan for Preventing Costly Data Breaches appeared first on Anders CPAs. Full Article Startups Technology cybersecurity
security Active Navigation helps strengthen Equifax?s cybersecurity footprint By www.kmworld.com Published On :: Thu, 05 Mar 2020 09:00:00 EST Investments in new technologies help Equifax protect sensitive data? Full Article
security Data Breaches in Hospitals are on the Rise – How Health Care Organizations Can Prevent Cybersecurity Attacks By anderscpa.com Published On :: Thu, 31 Oct 2019 13:25:37 +0000 The health care industry is one of the biggest targets for cybersecurity attacks. In 2018 alone, nearly 300 data breaches affected 11.5 million patients, according to a Bitglass report. Cybercriminals see health care organizations as the perfect victim due to… Read More The post Data Breaches in Hospitals are on the Rise – How Health Care Organizations Can Prevent Cybersecurity Attacks appeared first on Anders CPAs. Full Article Health Care Technology cybersecurity provider enrollment
security Panzura Mobile receives enhancements that include security for remote work By www.kmworld.com Published On :: Thu, 07 May 2020 10:40:25 EST Delivers unprecedented scale for large enterprises, advanced security and IP protection, and real-time access to Panzura's global cloud file system from any device Full Article
security Can I Transfer My Social Security Benefits to Children or Heirs? By anderscpa.com Published On :: Tue, 28 Jan 2020 14:51:35 +0000 When planning for social security distributions, a common question we hear from retirees is, can I provide a portion of my social security benefits to my child or grandchild? The answer is yes, but there are stipulations. Below are a… Read More The post Can I Transfer My Social Security Benefits to Children or Heirs? appeared first on Anders CPAs. Full Article Anders Family Wealth and Estate Planning social security social security benefits
security From pay cuts to job security, answers to six questions you have about covid and your career By economictimes.indiatimes.com Published On :: 2020-05-04T06:30:00+05:30 If the company is planning lay-offs, start circulating your resume and talking to people in the industry without discussing it with colleagues. It is also a good idea to build a contingency fund to help you sail through in case you don’t find a job immediately. Full Article
security Road link to Line of Actual Control achieved, faster route for Kailash-Mansarovar pilgrims and security forces By economictimes.indiatimes.com Published On :: 2020-05-08T14:30:47+05:30 Defence Minister Rajnath Singh on Friday inaugurated the road link from Dharchula, a town in Uttarakhand's Pithoragarh district, to the Lipulekh pass, which is located at an altitude of 17,060 feet at the border between India and China. Full Article
security Assistant Attorney General John P. Carlin Delivers Opening Remarks at the National Security Division 10 Year Anniversary Conference By www.justice.gov Published On :: Wed, 14 Sep 2016 00:00:00 -0400 Thank you, Sean, for your kind introduction. And thank you to CSIS for partnering with us in this conference and for your leadership and innovative thinking on critical policy issues that affect us all. I would like to take a few moments now to reflect on how the National Security Division (NSD) came to be and how, in our first decade, we have strived to achieve our twin aims: protecting the United States against national security threats while safeguarding our core freedoms. Full Article
security Former Acting Inspector General for the U.S. Department of Homeland Security Indicted on Theft of Government Property and Scheme to Defraud the United States Government By www.justice.gov Published On :: Fri, 06 Mar 2020 00:00:00 -0500 A federal grand jury in the District of Columbia returned a 16-count indictment against a former Acting Inspector General for the U.S. Department of Homeland Security (DHS) and a former subordinate for their alleged theft of proprietary software and confidential databases from the U.S. government as part of a scheme to defraud the U.S. government. Full Article
security OPDAT-Created Courtroom Security Manual Presented in Malaysia By www.justice.gov Published On :: Wed, 04 Mar 2020 00:00:00 -0500 On March 4, in Kuala Lumpur, Malaysia, the country’s first Manual on Courtroom Security in Terrorism Cases was presented to the Chair of Malaysia’s National Judicial Security Committee (NJSC) for consideration and adoption. Full Article
security Distancing and diversity enhance Iowa’s food security By feedproxy.google.com Published On :: Fri, 08 May 2020 09:47:21 PDT Coronavirus provides a chilling lesson about crowding. The disease originated in a densely packed Chinese City. As it moved worldwide it struck most heavily in crowded places where people live and... Full Article Guest Columnist
security Distancing and diversity enhance Iowa’s food security By www.thegazette.com Published On :: Fri, 8 May 2020 12:47:21 -0400 Coronavirus provides a chilling lesson about crowding. The disease originated in a densely packed Chinese City. As it moved worldwide it struck most heavily in crowded places where people live and work in proximity. Medical experts advise us to stay home and keep fellow humans at a distance. Isolation works. If a pathogen can’t reach us it can’t cause harm. The same holds true for food. Years ago farmers planted diverse crops in relatively small fields, and raised modest numbers of chickens, pigs, and cattle. One cornfield or chicken coop was, essentially, isolated from the next closest counterpart, making it hard for a disease to jump from one farm to the next. Modern Agriculture, in contrast, raises hundreds of thousands of chickens and turkeys crowded together in single buildings. Hogs and cattle are also crammed together, as are crops. Essentially the Midwest is one continuous cornfield stretching from Ohio to Nebraska. Once a pathogen mutates a new disease can easily sweep across vast fields or through crowded growing buildings, leaving a path of death and food shortages in its wake. Modern mass agriculture is efficient, providing consumers with inexpensive eggs, milk, vegetables and meat, but it is vulnerable. Today’s farmers recognize disease potential and practice scrupulous biosecurity to keep pathogens away from their crops and animals. Still, all it takes is one mutation or introduction of a foreign microbe and a high percentage of American food is lost. Families can reduce their vulnerability to mass food production by growing some at home. During The Second World War the government encouraged families to plant victory gardens and keep one to two hens per family member. Many households were able to grow up to 40% of their annual dietary needs, even in small yards. It freed commercially produced food for the military. Yards remain capable of growing significant quantities of nutritious food using three techniques. Gardening: An amazing quantity of nutritious food can be grown in even a small sunny backyard, especially when intensive gardening techniques are used. Foraging: Delicious wild foods grow in unsprayed yards and are free for the picking. Our family, for example, enjoys nettles, lambsquarters, purslane, acorns and dandelions. Learning to identify, harvest, and process them is not difficult. Ironically spraying a yard kills plants people can eat to favor inedible grass. Chickens: A six hen backyard flock will produce two dozen eggs a week. They need some commercial feed but recycle kitchen scraps and garden weeds into eggs. Cedar Rapids and other towns allow families to keep chickens with a few restrictions. Families unable or unwilling to grow backyard food can boost food security by buying vegetables, meat and eggs from small local producers. Coronavirus has taught us about contagion and helps clarify the threat that mass production poses. Raising backyard food enhances resilience. It’s satisfying and helps ensure there will be something to eat. Rich Patterson of Cedar Rapids is a writer, former nature center director and ecological consultant who co-owns Winding Pathways LLC with his wife, Marion. Full Article Guest Columnist
security There is no longer any such thing as Computer Security By blog.codinghorror.com Published On :: Fri, 21 Sep 2018 09:50:53 GMT Remember "cybersecurity"? Mysterious hooded computer guys doing mysterious hooded computer guy .. things! Who knows what kind of naughty digital mischief they might be up to? Unfortunately, we now live in a world where this kind of digital mischief is literally rewriting the world's history. For proof of that, Full Article
security GraCIAS: Grassmannian of Corrupted Images for Adversarial Security. (arXiv:2005.02936v2 [cs.CV] UPDATED) By arxiv.org Published On :: Input transformation based defense strategies fall short in defending against strong adversarial attacks. Some successful defenses adopt approaches that either increase the randomness within the applied transformations, or make the defense computationally intensive, making it substantially more challenging for the attacker. However, it limits the applicability of such defenses as a pre-processing step, similar to computationally heavy approaches that use retraining and network modifications to achieve robustness to perturbations. In this work, we propose a defense strategy that applies random image corruptions to the input image alone, constructs a self-correlation based subspace followed by a projection operation to suppress the adversarial perturbation. Due to its simplicity, the proposed defense is computationally efficient as compared to the state-of-the-art, and yet can withstand huge perturbations. Further, we develop proximity relationships between the projection operator of a clean image and of its adversarially perturbed version, via bounds relating geodesic distance on the Grassmannian to matrix Frobenius norms. We empirically show that our strategy is complementary to other weak defenses like JPEG compression and can be seamlessly integrated with them to create a stronger defense. We present extensive experiments on the ImageNet dataset across four different models namely InceptionV3, ResNet50, VGG16 and MobileNet models with perturbation magnitude set to {epsilon} = 16. Unlike state-of-the-art approaches, even without any retraining, the proposed strategy achieves an absolute improvement of ~ 4.5% in defense accuracy on ImageNet. Full Article
security A Review of Computer Vision Methods in Network Security. (arXiv:2005.03318v1 [cs.NI]) By arxiv.org Published On :: Network security has become an area of significant importance more than ever as highlighted by the eye-opening numbers of data breaches, attacks on critical infrastructure, and malware/ransomware/cryptojacker attacks that are reported almost every day. Increasingly, we are relying on networked infrastructure and with the advent of IoT, billions of devices will be connected to the internet, providing attackers with more opportunities to exploit. Traditional machine learning methods have been frequently used in the context of network security. However, such methods are more based on statistical features extracted from sources such as binaries, emails, and packet flows. On the other hand, recent years witnessed a phenomenal growth in computer vision mainly driven by the advances in the area of convolutional neural networks. At a glance, it is not trivial to see how computer vision methods are related to network security. Nonetheless, there is a significant amount of work that highlighted how methods from computer vision can be applied in network security for detecting attacks or building security solutions. In this paper, we provide a comprehensive survey of such work under three topics; i) phishing attempt detection, ii) malware detection, and iii) traffic anomaly detection. Next, we review a set of such commercial products for which public information is available and explore how computer vision methods are effectively used in those products. Finally, we discuss existing research gaps and future research directions, especially focusing on how network security research community and the industry can leverage the exponential growth of computer vision methods to build much secure networked systems. Full Article
security Scalable network security with fast response protocol By www.freepatentsonline.com Published On :: Tue, 19 May 2015 08:00:00 EDT This disclosure provides a network security architecture that permits installation of different software security products as virtual machines (VMs). By relying on a standardized data format and communication structure, a general architecture can be created and used to dynamically build and reconfigure interaction between both similar and dissimilar security products. Use of an integration scheme having defined message types and specified query response framework provides for real-time response and easy adaptation for cross-vendor communication. Examples are provided where an intrusion detection system (IDS) can be used to detect network threats based on distributed threat analytics, passing detected threats to other security products (e.g., products with different capabilities from different vendors) to trigger automatic, dynamically configured communication and reaction. A network security provider using this infrastructure can provide hosted or managed boundary security to a diverse set of clients, each on a customized basis. Full Article
security Clock security device By www.freepatentsonline.com Published On :: Tue, 11 Dec 1990 08:00:00 EST A clock security device to be hung on a wall of a facility such as, for example, a store. The clock face has a convex mirrored surface which provides reflected panoramic view of the facility. The clock security device also includes a mounting bracket which provides for the mounting of the clock security device on the wall with the concave mirrored surface at different positions from parallel to the wall to tilted downwardly at different selected angles to the wall. Full Article
security Electronic postage meter system having plural clock system providing enhanced security By www.freepatentsonline.com Published On :: Tue, 07 Dec 1999 08:00:00 EST A system includes a system time counter associated with a micro controller and a secure clock module having a real time clock and an elapsed time counter. The system synchronizes operation between the secure clock module and the system time counter. The synchronized time entered into the system time counter is utilized in the operation of the system. The real time clock time can be caused to be entered into the elapsed time counter at certain point in the operation of the system. The relationship of the time provide enhanced systems security. Full Article
security Implementing security measures for authorized tokens used in mobile transactions By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT Security measures for tokens comprise storing security rules associated with a generated token in a memory. A processor, communicatively coupled to the memory, accesses the security rules associated with the generated token and determines whether to encrypt the generated token by applying at least a portion of the security rules to the generated token. The processor encrypts the generated token. An interface, communicatively coupled to the processor, communicates the encrypted token to a mobile device associated with a user. Full Article
security Systems and methods for data security By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A system comprises a basic-input-output-system (“BIOS”), a disk drive, and a security system configured to prevent unauthenticated access to the disk drive. For each of at least two users out of a plurality of users, the BIOS authenticates the user based on the user's token. The BIOS also accesses secured data based on the authentication, and provides the secured data to the security system without input from the user. Full Article
security Security enclave processor power control By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT An SOC implements a security enclave processor (SEP). The SEP may include a processor and one or more security peripherals. The SEP may be isolated from the rest of the SOC (e.g. one or more central processing units (CPUs) in the SOC, or application processors (APs) in the SOC). Access to the SEP may be strictly controlled by hardware. For example, a mechanism in which the CPUs/APs can only access a mailbox location in the SEP is described. The CPU/AP may write a message to the mailbox, which the SEP may read and respond to. The SEP may include one or more of the following in some embodiments: secure key management using wrapping keys, SEP control of boot and/or power management, and separate trust zones in memory. Full Article
security Network security appliance By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT Methods, devices, and systems that may be used to secure networked devices are provided. One method includes receiving, at a security device, encrypted configuration data from a management server connected to a data network, from packets addressed to a networked device. The method further includes managing, by the security device, packets between the networked device and other devices accessible through a network based upon the configuration data. The method further includes sending, by the security device, a plurality of encrypted heartbeat messages to the management server utilizing an address associated with the networked device as the originating address for packets in which the encrypted heartbeat messages are transmitted. Full Article
security Variable domain resource data security for data processing systems By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT The variable domain data access control system and method described herein use the same variable domain to describe a data security model and a variable domain data model, such as a product configuration model. A variable domain is a set of resource data that can be described using a logical relationship data structure. The variable domain utilizes logical relationship expressions, such as a Boolean logic language, to define resource data in terms of parts, rules and/or attributes, and any other property that can be accessed for viewing, manipulation, or other purposes. The data security model represents an access control list (ACL) that includes security attributes as resource data and uses the same data structure and logical relationship expressions as an associated variable domain data model. An application, such as a configuration engine, can be used to create controlled access to the variable domain data model using the data security model. Full Article
security Colour laser marking of articles and security document precursors By www.freepatentsonline.com Published On :: Tue, 16 Dec 2014 08:00:00 EST A method of color laser marking an article having a polymeric foil with at least one colorless layer containing an infrared absorber, a polymeric binder and a color forming compound; including the steps of:—laser marking the colorless layer with an infrared laser using a first laser operation mode to generate a blue or cyan color; and—laser marking the same colorless layer with an infrared laser using a second laser operation mode to generate a black color, wherein the first laser operation mode applies less energy to the colorless layer than the second laser operation mode. Also disclosed is an article, such as a security document, including a polymeric foil and a colorless layer containing laser marked graphical data having a blue or cyan color and laser marked information having a black color. Full Article
security Colour laser marking methods of security documents By www.freepatentsonline.com Published On :: Tue, 30 Dec 2014 08:00:00 EST A security document precursor including, in order: a) at least one transparent biaxially stretched polyester foil; b) one colorless color forming layer containing at least an infrared absorber, a colorless dye-precursor and a polymeric binder; and c) a polymeric support; wherein the polymeric binder is copolymer including at least 90 wt % of a chlorinated ethylene and 1 wt % to 10 wt % of vinyl acetate both based on the total weight of the binder. Methods for making the security document precursor are also disclosed. Full Article
security Colour laser marking of articles and security documents By www.freepatentsonline.com Published On :: Tue, 30 Dec 2014 08:00:00 EST A method for preparing a color laser marked article comprising the steps of: a) infrared laser marking a security element including a polymeric support and a color forming layer comprising a color forming compound, an infrared dye and a polymeric binder comprising vinyl acetate and at least 85 wt % of vinyl chloride based on the total weight of the binder; and b) exposing the laser marked security element with light having a wavelength higher than 440 nm. The light exposure of step b) hinders the falsification of an issued security document without significant increase of background density. Full Article
security Security documents and colour laser marking methods for securing them By www.freepatentsonline.com Published On :: Tue, 10 Mar 2015 08:00:00 EDT A security document precursor including, in order, at least: a) a transparent biaxially stretched polyethylene terephthalate foil; b) a colorless color forming layer containing at least an infrared absorber, a color forming component and a polymeric binder; and c) a polymeric support; wherein the colorless color forming layer contains at least one component forming a compound having a melting temperature of less than 20° C. upon laser marking the colorless color forming layer with an infrared laser. Methods for securing a security document using the security document precursor are also disclosed. Full Article
security Optical network terminal management control interface-based passive optical network security enhancement By www.freepatentsonline.com Published On :: Tue, 12 May 2015 08:00:00 EDT A network component comprising at least one processor coupled to a memory and configured to exchange security information using a plurality of attributes in a management entity (ME) in an optical network unit (ONU) via an ONU management control interface (OMCI) channel, wherein the attributes provide security features for the ONU and an optical line terminal (OLT). Also included is an apparatus comprising an ONU configured to couple to an OLT and comprising an OMCI ME, wherein the OMCI ME comprises a plurality of attributes that support a plurality of security features for transmissions between the ONU and the OLT, and wherein the attributes are communicated via an OMCI channel between the ONU and the OLT and provide the security features for the ONU and the OLT. Full Article
security Document security method utilizing microdrop combinatorics, ink set and ink composition used therein, and product formed By www.freepatentsonline.com Published On :: Tue, 07 Sep 2004 08:00:00 EDT Disclosed are sets of ink components, and ink compositions, useful for printing markings, on security documents, that are relatively resistant to counterfeiting. Also disclosed are the security documents formed, a method of printing and a method of authenticating the printed material. The markings, formed of the ink compositions have a spectral response that deviates from a predicted spectral response when linearly additively combining spectral responses of components of the ink composition, so that it becomes difficult to reverse-engineer the ink composition from the markings. Use of plural different markings, with each marking being a microdot, increases difficulty in counterfeiting. By forming a template of spectral responses of the original pattern, spectral responses of a pattern on an unknown document can be compared to the spectral responses on the template for determining whether the unknown document is authentic. Formation of the markings is facilitated using an inkjet printer. Full Article