Secure detection network system
First Claim
1. A secure detection network system having a plurality of nodes, each node comprising a processor and storage means, the system comprising:
- A. a plurality of remote nodes, each remote node comprising a set of detector interfaces configured to couple to a set of detectors disposed to detect the presence of an illegal asset within a shipping container;
B. at least one server node configured to initialize and install each remote node in the plurality of remote nodes, including delivering to each remote node an agent module, said agent module for each remote node comprising a node specific configuration file defining a set of nodes with which the remote node can communicate and a different encryption means corresponding to each node in the set of nodes; and
C. a communication path coupling the plurality of remote nodes and the at least one server node.
1 Assignment
0 Petitions
Accused Products
Abstract
A secure detection network system includes plurality of remote nodes, each remote node comprising a set of detector interfaces configured to couple to a set of detectors disposed to detect the presence of an illegal asset within a shipping container; at least one server node configured to initialize, install, and authenticate each remote node in the plurality of remote nodes, including delivering to each remote node an agent module, said agent module for each remote node comprising a node specific configuration file defining a set of nodes with which the remote node can communicate and a different encryption means corresponding to each node in the set of nodes; and a communication path coupling the plurality of remote nodes and the at least one server node.
89 Citations
41 Claims
-
1. A secure detection network system having a plurality of nodes, each node comprising a processor and storage means, the system comprising:
-
A. a plurality of remote nodes, each remote node comprising a set of detector interfaces configured to couple to a set of detectors disposed to detect the presence of an illegal asset within a shipping container;
B. at least one server node configured to initialize and install each remote node in the plurality of remote nodes, including delivering to each remote node an agent module, said agent module for each remote node comprising a node specific configuration file defining a set of nodes with which the remote node can communicate and a different encryption means corresponding to each node in the set of nodes; and
C. a communication path coupling the plurality of remote nodes and the at least one server node. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A secure detection node comprising:
-
A. a secure network interface, configured to receive an agent module and configuration files via a secure network;
B. a processor and a memory, the processor configured to execute the agent module, the agent module configured to implement the configuration files to establish a different encryption means for each node from a set of nodes with which the secure detection node is to communicate; and
C. a detector interface, configured to receive data from a set of detectors disposed to detect the presence of an illegal condition. - View Dependent Claims (18, 19, 20)
-
-
21. A method of providing a secure detection network system having a plurality of nodes, each node comprising a processor and storage means, the method comprising:
-
A. providing a plurality of remote nodes, each remote node comprising a set of detector interfaces configured for coupling to a set of detectors disposed for detecting the presence of an illegal condition within a shipping container;
D. generating by at least one server node an intelligent agent module and a set of node specific configuration files for each remote node in the plurality of remote nodes, including defining for each remote node a set of other nodes with which the remote node can communicate, including providing a different encryption means corresponding to each node in the set other nodes;
E. downloading to each remote node via a communication path a corresponding intelligent agent module and a corresponding set of node specific configuration files; and
F. installing each remote node in the plurality of remote nodes, including executing the corresponding intelligent agent module with the corresponding node specific configuration files. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33)
-
-
34. A secure identification control system comprising:
-
A. at least one body sensor configured to sense biometric information from a body;
B. a handheld node comprising an interface to the at least one body sensor and an interface to a secure network, wherein the handheld node is configured to record biometric information, including information indicating removal of the body sensor from the body;
C. the secure network including at least one server node configured to deliver to the handheld node an agent module, said agent module comprising a node specific configuration file defining a set of nodes with which the handheld node can communicate and a different encryption means corresponding to each node in the set of nodes;
D. a set of detectors configured to sense a handheld node location; and
E. an identification controller coupled to the secure network and configured to generate an identification indication as a function of the handheld node location and an authentication of the body from the handheld node, wherein such authentication is a function of an indication from the handheld device that the at least one body sensor had not been removed from the body. - View Dependent Claims (35, 36, 37, 38)
-
-
39. An orthogonal authentication system, comprising:
-
A. a computer system having a user interface and access to a network;
B. a user authentication subsystem comprising user specific authentication data for a plurality of users, and configured to authenticate a user as a function of authentication information input at the computer system;
C. a biometric database, comprising user specific biometric data for a plurality of users;
D. a facility access control system having access to the network and the biometric database, and including at least one biometric sensor and an access controller configured to grant access to a facility as a function of biometric data received from the at least one biometric sensor corresponding to a set of user specific biometric data in the biometric database; and
E. a computer network access controller configured to grant the user access to the network as a function of an authentication of the user by the user authentication subsystem and an identification of the user from the facility access control system. - View Dependent Claims (40)
-
-
41. A method of providing orthogonal authentication for access to a computer network, the method comprising the steps:
-
A. granting access to a facility having a computer system therein as a function of sensing biometric data of a user that corresponds with stored user specific biometric data;
B. entering user authentication data at the computer subsystem;
C. authenticating the user by one or more of;
1. comparing the entered user authentication data with stored user specific authentication data;
or2. confirming the identity of the user employee by visual inspection;
D. granting the user access to the computer network if the user was granted access to the facility in step A and authenticated in step C, else refusing access to the network by the user.
-
Specification