Patent application number | Description | Published |
20100138342 | SYSTEM AND METHOD FOR EXECUTING CASH PAYMENT VIA A COMPUTER NETWORK - The invention presented comprises a system and method for executing a cash payment via a computer network. A payor computing device communicates over a computer network with payee computing devices via a P2P server. The P2P server is operative to receive a payment request from the payor computing device and process the payment by debiting a financial instrument specified by a payor utilizing the payor computing device. The payment request is transmitted from the P2P server to a cash payment server operative to receive the payment request and translate the request into the native format of an ATM control server, the native format of the P2P server and ATM control server not being interoperable. The ATM control server is operative to generate a PIN code, which is transmitted along with the received payment instructions to an ATM. The ATM receives the payment instructions and dispenses the payment upon receipt of the PIN code. Receipt data is also generated by the ATM control server, translated into the native format of the P2P server by the cash payment server, and delivered to the payor and payee via the P2P sever. | 06-03-2010 |
20110071943 | SYSTEM AND METHOD FOR EXECUTING CASH PAYMENTS VIA A COMPUTER NETWORK - The invention presented comprises a system and method for executing a cash payment via a computer network. A payor computing device communicates over a computer network with payee computing devices via a P2P server. The P2P server is operative to receive a payment request from the payor computing device and process the payment by debiting a financial instrument specified by a payor utilizing the payor computing device. The payment request is transmitted from the P2P server to a cash payment server operative to receive the payment request and translate the request into the native format of an ATM control server, the native format of the P2P server and ATM control server not being interoperable. The ATM control server is operative to generate a PIN code, which is transmitted along with the received payment instructions to an ATM. The ATM receives the payment instructions and dispenses the payment upon receipt of the PIN code. Receipt data is also generated by the ATM control server, translated into the native format of the P2P server by the cash payment server, and delivered to the payor and payee via the P2P sever. | 03-24-2011 |
20130198073 | SYSTEM AND METHOD FOR EXECUTING CASH PAYMENTS VIA A COMPUTER NETWORK - The invention presented comprises a system and method for executing a cash payment via a computer network. A payor computing device communicates over a computer network with payee computing devices via a P2P server. The P2P server is operative to receive a payment request from the payor computing device and process the payment by debiting a financial instrument specified by a payor utilizing the payor computing device. The payment request is transmitted from the P2P server to a cash payment server operative to receive the payment request and translate the request into the native format of an ATM control server, the native format of the P2P server and ATM control server not being interoperable. The ATM control server is operative to generate a PIN code, which is transmitted along with the received payment instructions to an ATM. | 08-01-2013 |
Patent application number | Description | Published |
20100250689 | METHOD AND APPARATUS FOR GENERATING A FIGURE OF MERIT FOR USE IN TRANSMISSION OF MESSAGES IN A MULTI-LEVEL SECURE ENVIRONMENT - A method and apparatus that generate a figure of merit for use in transmission of messages in a multi-level secure environment. The method may include receiving a message having a data provenance wrapper, examining each data provenance record of the message and any attachments for discrepancies, identifying any discrepancies in the examination of each data provenance record of the message and any attachments, generating a figure of merit based on objective and subjective information, substituting the figure of merit for the data provenance information, and transmitting the figure of merit with the message across the security domain. | 09-30-2010 |
20100250932 | METHOD AND APPARATUS FOR SIMULATING A WORKFLOW AND ANALYZING THE BEHAVIOR OF INFORMATION ASSURANCE ATTRIBUTES THROUGH A DATA PROVIDENCE ARCHITECTURE - A method and apparatus that simulates a workflow and analyzes the behavior of information assurance attributes through a data providence architecture is disclosed. The method may include injecting one or more faults into a simulated workflow, receiving a message in the simulated workflow having a data provenance wrapper, examining each data provenance record of the message and any attachments for discrepancies, identifying any discrepancies in the examination of each data provenance record of the message and any attachments; calculating a degree of trust based on any discrepancies identified in the examination of each data provenance record of the message and any attachments, analyzing the calculated degree of trust with respect to the one or more injected faults and the information assurance attributes, and outputting the analysis to a user. | 09-30-2010 |
20100251367 | METHOD AND APPARATUS FOR PROVIDING INFORMATION ASSURANCE ATTRIBUTES THROUGH A DATA PROVIDENCE ARCHITECTURE - A method and apparatus that provides information assurance attributes through a data providence architecture is disclosed. The method may include receiving a message having a data provenance wrapper, examining each data provenance record of the message and any attachments for discrepancies, identifying any discrepancies in the examination of each data provenance record of the message and any attachments; calculating a degree of trust based on any discrepancies identified in the examination of each data provenance record of the message and any attachments, and outputting the degree of trust to the user. | 09-30-2010 |
20100251374 | METHOD AND APPARATUS FOR MONITORING AND ANALYZING DEGREE OF TRUST AND INFORMATION ASSURANCE ATTRIBUTES INFORMATION IN A DATA PROVIDENCE ARCHITECTURE WORKFLOW - A method and apparatus that monitors and analyzes degree of trust and information assurance attributes information in a data providence architecture workflow is disclosed. The method may include receiving a message having a data provenance wrapper, examining each data provenance record of the message and any attachments for discrepancies, identifying any discrepancies in the examination of each data provenance record of the message and any attachments; calculating a degree of trust based on any discrepancies identified in the examination of each data provenance record of the message and any attachments, and presenting the degree of trust and information assurance attributes information to the user on a display. | 09-30-2010 |
20100280955 | SYSTEMS AND METHODS FOR VERIFYING IDENTITY - Systems and methods of verifying identity through the use of a plurality of identifying devices is provided. The identity information may be acquired electronically from a plurality of identity devices, which may include credit cards, cell phones, or other personal items fitted with wireless communicators such as RFID tags, for example. In various embodiments, the transaction may be approved or denied based on a number of factors, including the number identity devices, the types of identity information provided by the identity devices, and the level of security specified for the requested transaction. | 11-04-2010 |
20120284793 | INTRUSION DETECTION USING MDL CLUSTERING - An intrusion detection method, system and computer-readable media are disclosed. The system can include a processor programmed to perform computer network intrusion detection. The intrusion detection can include an identification module and a detection module. The identification module can be adapted to perform semi-supervised machine learning to identify key components of a network attack and develop MDL models representing those attack components. The detection module can cluster the MDL models and use the clustered MDL models to classify network activity and detect polymorphic or zero-day attacks. | 11-08-2012 |
20130167191 | SECURITY POLICY FLOW DOWN SYSTEM - A system and method are provided that distill an organization's information security plan into a detailed and unambiguous security object model. The developed security object model provides a visualization of complex relationships between individual elements and levels that is usable to carry into effect the organization's information security plan. Configuration control and a verifiable level of security compliance are provided through implementation of the organization's information security plan by the developed security object model. The developed security object model is hosted on a computing platform in communication with at least the organization's network to provide information security plan compliance, configuration control and gap analysis in a usable form to the organization. | 06-27-2013 |
Patent application number | Description | Published |
20150137703 | POWERLINE LUMINAIRE COMMUNICATIONS - A system and method for a lighting control system to control street lighting fixtures using modified geometric harmonic modulation for communications over a powerline. At least some of the lighting fixtures have another communications capability that enables RF communications. The communications may by messages be sent to the lighting fixtures to read RF enabled meters. | 05-21-2015 |
20150138000 | EMERGENCY VEHICLE ALERT SYSTEM - A method and system for the control and signaling of traffic signal lights by emergency vehicles in the vicinity. Emergency vehicles can be detected by traffic signal lights allowing the emergency vehicle to have a prioritized, rapid, unimpeded, and safe emergency vehicle transit. | 05-21-2015 |
20150141044 | GEOLOCATION AID AND SYSTEM - A method and system for geolocation using a street light system having transponding technology. A predetermined band of radio frequencies employing spread spectrum technology is used to identify locations relative to an individual street light. | 05-21-2015 |
20150142359 | LUMINAIRE ASSOCIATE STATUS TRANSPONDER - Monitoring street lighting infrastructure using special signaling devices and techniques for locating key components of the infrastructure and assessing their status. The integrity of common powerline connections may also be assessed. | 05-21-2015 |
Patent application number | Description | Published |
20080263647 | System and Method For Providing Network Device Authentication - A secure framework for wireless sensor networks. The framework provides a system and method for providing network device authentication. The system and method comprises installing a unique device key in a network device and creating a chain of keys, wherein each subsequent key is encrypted using the previous key. The method executes an authentication process for storing and issuing keys, wherein the authentication process uses a unique device key to install a device site key in the network device and uses the device site key and the unique device key to authenticate the network device for communicating with a wireless network router, wherein the wireless network router creates a unique network-device-router key. The unique network-device-router key is used to authenticate the network device for communicating over the wireless network using an encrypted network session key and allows secure encrypted link-layer communications over the wireless network. | 10-23-2008 |
20090196182 | Method and system for congestion control - Aspects of the disclosure provide a method for congestion control by implementing congestion aware applications. The congestion aware applications can adjust an occupancy of network resource according to a network congestion status. The method for congestion control can include transmitting data from an application to a transport protocol at a first data rate, transmitting the data over a channel, receiving a feedback signal from the transport protocol that is indicative of a congestion status of the channel, communicating the congestion status of the channel from the transport protocol to the application, and transmitting data from the application to the transport protocol at a second data rate based on the congestion status. | 08-06-2009 |
20090316565 | METHOD AND SYSTEM FOR ACTIVATION OF AN OPTICAL ARTICLE - A method for activating an optical article includes providing an optical article, wherein at least one mark is disposed on the optical article, wherein the mark comprises an optical-state change material in an initial state, the initial state preventing the optical article from being read by a player; deriving an unlock code by cryptographic operations on an optical article operatively coupled with a POS equipment and a data input from a medium encrypted with a cryptographic algorithm; deriving a toggling signal from an unlock code, and applying the toggling signal to the at least one mark resulting in changing the optical-state change material to a final state, the final state allowing the optical article to be read by the player; wherein the toggling signal comprises a set of values corresponding to the respective states of each of a plurality of marks on the surface of the optical article, and wherein applying the toggling signal results in setting each of the marks to either one of an initial state or a final state, corresponding to the value for the mark in the toggling signal. | 12-24-2009 |
20110062226 | SECURITY SYSTEM, MOBILE SECURITY DEVICE, AND METHODS OF OPERATING - System, device and methods that provide proximate environmental and security intelligence to a guard making a security tour or round in an installation, as well as that provide for certifying that the guard has visited designated and known checkpoints on or about the times at which the guard is expected at those checkpoints. | 03-17-2011 |
20110208849 | METHOD AND SYSTEM FOR SECURITY MAINTENANCE IN A NETWORK - A system and method for monitoring a network and detecting network vulnerabilities is provided. A communication associated with one or more programs is issued to one or more devices in a network and the response from the devices is detected and analyzed. Based on the analysis, a device response is identified as a threat response if it represents at least an alert, an unexpected response or a response time-out indicating that the device did not response to the communication. The vulnerability of the network is determined based on the threat responses of the devices. | 08-25-2011 |
20110299399 | METHOD AND APPARATUS FOR CONGESTION CONTROL - Aspects of the disclosure provide a method of congestion control. The method includes transmitting by a first apparatus to a second apparatus a packet stream corresponding to stream data generated by a variable data rate application, determining a round-trip-time of a packet in the packet stream, updating a congestion measure based on the round-trip-time, and informing the variable data rate application based on the congestion measure to adjust a data rate for generating the stream data. | 12-08-2011 |
20130086635 | SYSTEM AND METHOD FOR COMMUNICATION IN A NETWORK - A method for providing secure communication in an electrical power distribution network includes detecting an enhanced threat level in the electrical power distribution network. A plurality of configuration command messages including information related to a common configuration command are received. The common configuration commands are certified if the plurality of configuration command messages have originated from a threshold number of command sites. The method further includes executing the certified configuration command. | 04-04-2013 |
20130086680 | SYSTEM AND METHOD FOR COMMUNICATION IN A NETWORK - A method for providing secure communication in an electrical power distribution network includes detecting an enhanced threat level in the electrical power distribution network. A threshold number of different configuration command shadows are received and processed to generate a configuration command data. A verified configuration command data is generated by comparing the configuration command data with a stored configuration commands and a verified configuration command related to the verified configuration command data is executed. | 04-04-2013 |
20150137684 | SYSTEM AND METHOD FOR MONITORING STREET LIGHTING LUMINAIRES - A system for identifying a fault in a light source is presented. The system includes at least one luminaire that includes the light source configured to emit light. Also, the at least one luminaire includes a monitoring device disposed proximate to the light source. The monitoring device includes a sensing unit configured to measure an amount of light emitted by the light source, and a squawk unit configured to generate a squawk signal based on the amount of light emitted from the light source, where the squawk signal is indicative of the fault in the light source. Further, the system includes a diagnostic unit communicatively coupled to the at least one luminaire and configured to determine the fault in the light source based on the squawk signal, and transmit a termination signal to the squawk unit to decouple an electrical power supply from the light source. | 05-21-2015 |