scispace - formally typeset
Search or ask a question

Showing papers on "Guard (information security) published in 2001"


Patent
22 Jan 2001
TL;DR: In this paper, a system and method for maintaining security in a distributed computing environment comprises a policy manager located on a server for managing and distributing a security policy, and an application guard located on client for managing access to securable components as specified by the security policy.
Abstract: A system and method for maintaining security in a distributed computing environment comprises a policy manager located on a server for managing and distributing a security policy, and an application guard located on a client for managing access to securable components as specified by the security policy. In the preferred embodiment, a global policy specifies access privileges of the user to securable components. The policy manager may then preferably distribute a local client policy based on the global policy to the client. An application guard located on the client then manages access to the securable components as specified by the local policy.

680 citations


Book
01 Jan 2001
TL;DR: In this paper, the authors describe the practice of environmental security for people and discuss the role of the military in environmental security, and present an alternative security strategy for people to defend themselves against environmental degradation and conflict.
Abstract: * 1. Locating Environmental Security * 2. Environmental Insecurity: Ecological Exacerbations of Underdevelopment * 3. Security: From What and For Whom? 4. New Security Issues: The Old Guard Looks for new Targets * 5. Environmental Degradation and Conflict: Conscripting the Voice of Dissent * 6. Policies for Pollution and The Pollution of Policy * 7. The Biggest of Institutional Challenges: The Military * 8. Ecological Security: An Alternative Security Strategy * 9. Environmental Security for People * 10. The Practice of Environmental Security

250 citations


Patent
29 Jun 2001
TL;DR: An automatic data sanitizer module sanitizes formatted data from an external source system according to stored sanitization rules for release to an external destination system so that the destination system receives only that data for which it is authorized as mentioned in this paper.
Abstract: An automatic data sanitizer module sanitizes formatted data from an external source system according to stored sanitization rules for release to an external destination system so that the destination system receives only that data for which it is authorized. The module generally includes an Input Comms module, a Message Processor, an Output Guard a Downgrader and an Output Comms module. The Input Comms module supports the communications protocol dictated by the external source system. The Processor sanitizes the message according to the rules written for the specific external system under consideration. The Guard verifies the modifications performed by the Processor. The Downgrader moves the resulting file to the Output Comms working directory and the Output Comms makes the resulting message available to the destination system. The system supports a variety of different formats and greatly facilitates the timely dissemination of information within a multi-level secure environment while protecting security interests.

107 citations


Book
01 Sep 2001
TL;DR: The rate at which vulnerabilities are discovered and exploited far surpasses Moore's Law for computing power advances and the security community should develop their own law that says: "Attackers on the Internet will eventually find and exploit every vulnerability."
Abstract: From the Book: FOREWORD vul.ner-a-ble adj. 1. Susceptible to physical or emotional injury. 2. Susceptible to attack: "We are vulnerable both by water and land, without either fleet or army" (Alexander Hamilton). 3. Open to censure or criticism; assailable. 4. Liable to succumb, as to persuasion or temptation. Whether we recognize it or not, when connected to the Internet in our home or office, we are all vulnerable. In fact, connecting to the Internet makes you a member (either willing or unwilling) of a community in which everyone becomes part of an enormous system-one much larger than any individual and where time and distance are almost eliminated. The interconnectivity of the Internet brings all participants in close proximity to each other. Your "neighbor next door" is now a hacker in a foreign country with intent to harm or a young talented kid searching out your vulnerabilities just for kicks. As with every community, not all of its citizens are upstanding members. You can't open a newspaper these days without coming across another sleepy, quiet community that has been rocked by violence or scandal. The same is true for the cyber community of the Internet. In the high-speed, highly connected worldwide Internet community, it's easy to see why some of the most significant negative events happen there and happen with great speed. Even more distressing is the fact that within the Internet community live some very smart people with extraordinary talent and free time who insist on using that talent for evil instead of good. You don't have to look back very far into Internet history to see incredible advances in computer exploitation. Actually, I believe the rate at which vulnerabilities are discovered and exploited far surpasses Moore's Law for computing power advances. Maybe the security community should develop our own law that says: "Attackers on the Internet will eventually find and exploit every vulnerability. The more interesting the target, the faster this will occur." Unfortunately, most people on the Internet believe that they are not interesting targets. This is simply not true. Anyone running a firewall on his or her home PC can see that. It's much faster for me to count the number of countries in the world that have not tried to attach to my home PC than count the ones that have. Every day there are at least a dozen individuals out there that want to know if my computer will talk to them using one of several well known Trojan Horses or vulnerable software applications. Why do these people keep coming back day after day? Simple, they often have success finding and compromising vulnerable computers. Hacking and exploitation used to be the work of relatively few highly skilled experts. Today, ready-made point and click, load and run, compile and execute tools put destructive capability in the hands of almost anyone looking to cause trouble. It wasn't long ago that we were learning about basic p ping and SYN floods as the primary method for denial of service attacks. Soon after, denial of service took a great step forward with distributed attacks co-opting "innocent" UNIX computers. This technique was quickly morphed to work on another platform even more easily exploited, the Windows platforms used by thousands of cable and DSL customers. A great example of accelerated development is in the worm techniques that propagate Trojan Horses without human intervention. Fall 2000 through summer 2001 brought us the Bymer worm, Linux Ramen worm, Lion worm, SADMIND, the Leave worm, and Code Red. Code Red is possibly the most costly automated attack to date with current estimates of damage and clean up exceeding several billion dollars. This "hacking on autopilot" is a huge force multiplier and greatly leverages the attackers available time, increasing the chances of success. For all of the different techniques employed by worms, they all have one thing in common: closing the vulnerabilities that they exploit would have prevented all of the damage done. The vulnerabilities exploited by these worms, and countermeasures for them, are described in the book you are now reading. Security as Market Differentiator Competition within industry is fierce, and increasingly, security is being viewed not only as an enabler of service, but also as a market differentiator. As this trend matures, visible security incidents could significantly impact stock prices as well as spin up the corporate public relations staff. Clearly, threats from Internet attacks will continue to increase, and companies are going to persist in turning to the Internet channel for some or all of their transaction flow. Despite security threats increasing everyday on the Internet, companies continue to expand their use and presence. Why? Because the Internet is a vital business enabler. Consequently, all of these companies must be on guard and ready to deal with the attention they will receive from individuals with malicious intent. While there are many risks to doing business on the Internet, the biggest one is to your company's reputation. Reputation damage from a security breach is one of the fastest ways to erode customer and trading partner trust. A security breach that exposes confidential information, yours or your customers, can be catastrophic to your business. No industry is exempt from its wrath. Even the most security savvy companies will have vulnerabilities on their network and, because of this, must remain diligent to minimize risk. The first step is knowledge and with knowledge comes the opportunity to mature and improve. In your hands, you hold one of the most powerful tools available in the security business to help increase your knowledge. Read it, heed it, and use it. I hold great respect for the authors of this book. I have sought and received excellent advice from them over the years. In Hacking Exposed, they have written "The Book" on vulnerabilities and countermeasures. My hope is that you will use the information here to make your company a safer and more secure place. In the future, companies that have the fewest reputation issues from security problems will be the companies that invest in passionate and talented people, flexible technology to meet constantly changing security threats, and processes that ensure continuous improvement. The companies that don't will most likely make The Wall Street Journal headlines-and not in a positive way. Pete Murphy, 8/4/2001 SVP, Vulnerability and Response Management Bank of America Peter F. Murphy is responsible for the Vulnerability and Response Management team at Bank of America. These responsibilities include the Bank of America Computer Incident Response Team (BACIRT), Intrusion Detection, Vulnerability Assessments, Threat Management, Forensic Investigations, Regional Workarea Recovery Centers, and Network Computing Group Contingency Planning and Testing. Pete has seventeen years experience in systems development, technology auditing, and information security in the banking and finance industry. Pete is a member of the Information Systems Audit and Control Association, holds a Certified Information Systems Auditor certification, participates in the Vulnerability Assessment working group as part of the President's Commission on Critical Infrastructure Protection, and participates in the Network Security Information Exchange (NSIE) as part of the President's National Security Telecommunications Advisory Council (NSTAC).

73 citations


Patent
28 Nov 2001
TL;DR: In this article, a spreading modulator (1) spreads the spectrum of a signal series and an adder (3) combines the subcarriers modulated by spreading modulators.
Abstract: A spreading modulator (1) spreads the spectrum of a signal series. A subcarrier modulator (2) modulates the frequencies of a plurality of subcarriers having frequencies different from one another by using the output of the spreading modulator (1). An adder (3) combines the subcarriers modulated. A guard section control unit (23) determines the length of a guard section in accordance with the maximum transmission delay difference of a line between a transmission device and a reception device. A guard section inserter (21) is controlled by the guard section control unit (23) to insert the guard section into the signal series for every symbol period. A gain adjustor (22) multiplies the transmission signal by a gain coefficient corresponding to the guard section inserted.

58 citations


Patent
16 Jan 2001
TL;DR: In this paper, a composite gutter guard is adapted for being positioned at an opening of a longitudinally extending, generally U-shaped gutter used for collecting and distributing rainwater runoff from the roofs of residential homes and other buildings.
Abstract: A composite gutter guard is adapted for being positioned at an opening of a longitudinally extending, generally U-shaped gutter used for collecting and distributing rainwater runoff from the roofs of residential homes and other buildings. The gutter guard includes an elongate polymer guard panel defining a plurality of spaced filter openings. The guard panel is adapted to extend laterally across the opening of the gutter and longitudinally along the length of the gutter. A polymer-coated mesh layer overlies the guard panel in an area of the filter openings and cooperates with the guard panel to capture and separate debris from rainwater runoff entering the gutter. A heat weld connects the mesh layer to the guard panel.

45 citations


Patent
07 Dec 2001
TL;DR: In this paper, a movable guard is provided that moves between locked open and locked closed positions, including a grip and an opening to provide access for cleaning, for surgical instruments having a body with an instrument at one end.
Abstract: A protection system for surgical instruments having a body with an instrument at one end. A movable guard is provided that moves between locked open and locked closed positions. The guard includes a grip and an opening to provide access for cleaning.

36 citations


Journal ArticleDOI
TL;DR: In this article, the performance of the unbiased guard ring structure is measured and the effects of high current, emitter area, and layout of unbiased guard rings are reported and explained, while also avoiding the cross talk and power consumption of biased rings.
Abstract: The performance of the unbiased guard ring structure is measured and the effects of high current, emitter area, and layout of unbiased guard rings are reported and explained. Measurements show a reduction in parasitic gain by up to six orders of magnitude, while also avoiding the cross talk and power consumption of biased rings. A comparative analysis of unbiased guard ring with biased guard ring shows up to 100 times better performance at low current levels. A modification to the unbiased guard ring is also implemented and successfully tested which shows an increase in the current handling capability of the structure by an order of magnitude.

34 citations


Patent
24 Jul 2001
TL;DR: In this article, the guard elements are integrally molded with at least one or more of a blade support, spacer element(s), forward guard member and cap member.
Abstract: Razor heads comprising at least one blade and a plurality of guard elements over the leading edge at a plurality of intermediate portions. According to preferred embodiments, the guard elements are integrally molded with at least one or more of a blade support, spacer element(s), forward guard member and cap member. The use of integrally molded guard elements facilitate efficient, quicker and less expensive manufacturing, provide greater design flexibility, and provide greater blade stability. Additionally, in preferred embodiments, when the molded guard elements are aligned with spacers, these guard elements do not interfere with the rinsability of the razor head. The intermediate guard elements also provide additional sites for the placement of shaving aids and other skin flow control materials such as materials having a relatively high coefficient of friction.

33 citations


Patent
20 Jul 2001
TL;DR: In this paper, a removable insert is adapted to fit between the knee portion of the leg guard and the knee when a leg guard is worn, which cooperates with the knee to maintain the knee in alignment on the front leg.
Abstract: A protective leg guard having a removable insert for orienting the leg guard on a leg. The protective leg guard includes a protective knee portion having an inner surface generally contoured to substantially overlay the knee. A removable insert is adapted to fit between the knee portion of the leg guard and the knee when the leg guard is worn. The removable insert may be placed in a plurality positions on the inner surface of the knee portion and cooperates with the knee to maintain the leg guard in alignment on the front of the leg.

30 citations


Patent
28 Nov 2001
TL;DR: In this article, a guard rail system fabricated from standard-sized components, preferably extruded, comprises balusters fastened to a lower rail and to an upper retainer at fixed intervals.
Abstract: A guard rail system fabricated from standard-sized components, preferably extruded, comprises balusters fastened to a lower rail and to an upper retainer at fixed intervals. The balusters are provided with central bores for receiving fasteners such as screws through predrilled holes in the upper retainer and lower rail. A hand rail is slip-fitted over the upper retainer in locking relation, to provide integrated guard rail sections. Guard rail sections so assembled are fastened to end posts, preferably using mounting brackets having a flanged arm which nests in grooves or recesses in the upper retainer and lower rail to provide a safe, secure and aesthetically appealing guard rail.

Patent
29 Jun 2001
TL;DR: A securing device for a catheter that preferably includes a guard that covers a patient's upper or lower teeth and a latch mounted on the guard for releasably immobilizing the catheter with respect to the guard is presented in this paper.
Abstract: A securing device for a catheter that preferably includes a guard that covers a patient's upper or lower teeth and a latch mounted on the guard for releasably immobilizing a catheter with respect to the guard. The guard preferably includes (or is attached to) a wedge, which contacts the patient's molars to prevent the guard from shifting in the patient's mouth and assists in keeping the patients teeth apart.


Patent
10 Oct 2001
TL;DR: In this paper, the authors proposed a novel computer security system for the Internet, which includes both software and hardware features that guard against security breaches, depending on the level of security desired.
Abstract: A variety of security levels are provided with the novel computer security system, depending on the use and connectivity of the system. On individual computer systems, the primary functions are to control user access to the computer (password, biometric scanning, etc.) and to maintain data security and integrity (embedded encryption and maintaining data and copies encrypted). Computers that are configured into networks utilize not only the features of an individual computer but can be further enhanced by adding communications security. When the communication is effected through the Internet, another level of security is added that allows normal non-encrypted communications with computers or servers that do not utilize the novel security system. Within the novel system there are both software and hardware features that guard against security breaches, depending on the level of security desired.

Patent
24 Jan 2001
TL;DR: A compound archery bow having a cable guard comprising a cable saver adjustably mounted on the cable guard for movement to and from the bow string is described in this paper, where the cable is adjusted by a cable-saver.
Abstract: A compound archery bow having a cable guard comprising a cable saver adjustably mounted on the cable guard for movement to and from the bow string.

Patent
23 Aug 2001
TL;DR: In this article, a power integrated circuit with multiple guard rings and field plates overlying regions between each of the guard rings is presented, where each field plate forms overlying a dielectric layer also between each guard ring.
Abstract: A power integrated circuit device with multiple guard rings and field plates overlying regions between each of the guard rings. Each of the field plates form overlying a dielectric layer also between each of the guard rings. Multiple field plates can exist between each of such guard rings. At least one field plate couples to a main junction region, and another field plate couples to a peripheral region, typically a scribe line. The present power device structure with multiple guard rings and field plates provides a resulting guard ring structure which allows for such device to achieve higher voltage applications.

Patent
19 Jul 2001
TL;DR: The multi-colored corner guard as discussed by the authors provides an aesthetically improved corner guard that may be used in a wide range of interior designs and can be used as a part of a system of color-coding the hallways of a large hospital or other institutional facility.
Abstract: A corner guard assembly for protecting the corner of a building wall particularly in institutional type facilities from damage due to impacts with wheeled vehicles includes an elongated vinyl corner guard member angled to fit over the corner formed by the intersection of two wall surfaces, the corner member being comprised of two different colors of vinyl plastic material that have been co-extruded to form a single, integrated product. The multi-colored corner guard provides an aesthetically improved corner guard that may be used in a wide range of interior designs. Additionally, the improved corner guard disclosed herein may be used a part of a system of color-coding the hallways of a large hospital or other institutional facility. The corner guard of the present invention may be constructed as either a tape-on corner guard that is mounted by an adhesive directly to the wall surfaces, or constructed as an assembly comprised of a base plate and cover guard.

Patent
27 Sep 2001
TL;DR: A bed safety guard provides additional guarding protection lengthwise of the bed as mentioned in this paper, where the side support or guard rail is secured against the side of the mattress by a plurality of slats extending transversely across substantially the entire width of the box spring.
Abstract: A bed safety guard provides additional guarding protection lengthwise of the bed. The side support or guard rail is secured against the side of the mattress by a plurality of slats extending transversely across substantially the entire width of the box spring. Each of the slats is bent at a terminal end thereof to form a fixed substantially right angle. The terminal ends cooperate with the side of the box spring to reliably secure the guard rail in position, to prevent it from being dislodged or pushed out and away from the bed by an occupant.

Posted Content
01 Jan 2001
TL;DR: This paper assess the role various strategies can play in augmenting global food supplies and combating hunger and suggest a cautious approach that would encourage innovation but respect sound scientific procedures that guard against risks to humans and the environment.
Abstract: The authors assess the role various strategies can play in augmenting global food supplies and combating hunger. They attempt to defuse the contentious debate surrounding the development and spread of genetically modified (GM) foods, which, they argue,can help meet the needs of the poor. The authors recommend a cautious approach that would encourage innovation but respect sound scientific procedures that guard against risks to humans and the environment.

Patent
29 Jun 2001
TL;DR: A multipurpose site guard for use at all peripheral and central venipuncture infusion sites, sensitive areas, and for pediatric and adult patients is presented in this paper, which is a hollow plastic member with a base and a sidewall curved upwardly and inwardly to form a cover which is form fitted to the infusion site under finger pressure and which can be taped in place.
Abstract: A multipurpose site guard for use at all peripheral and central venipuncture infusion sites, sensitive areas, and for pediatric and adult patients. The guard is a hollow plastic member with a base and a sidewall curved upwardly and inwardly to form a cover which is form fitted to the infusion site under finger pressure and which can be taped in place. Improvements to this invention include holding the guard in place with a fabric connector and cushioning the guard's base with a soft material.

Patent
Van Woudenberg Roel1
07 Dec 2001
TL;DR: In this article, a multilayer record carrier and method of manufacturing thereof and recording thereon is presented, wherein data is written in units of blocks on tracks of at least two information layers.
Abstract: The present invention relates to a multilayer record carrier and method of manufacturing thereof and recording thereon, wherein data is written in units of blocks on tracks of at least two information layers. A first guard field is written at the start of a data block and a second guard field is written at the end of the data block. The power in the focussed spot in the deepest of said at least two information layers is maintained substantially at an optimal value, by setting the length of the first and second guard fields such that the end position of the second guard field of a preceding data block is located within the area of the first guard field of the succeeding data block. Thereby, gap portions between the first and second guard fields can be prevented. Alternatively, the length of the first and second guard fields is set to be approximately equal to the sum of half the diameter of a recording beam in the upper one of the at least two information layers when focussed on the lowest one of the at least two information layers and a maximum allowed misalignment between the two layers. Thereby, the area through which the beam passes in the information layer is of a uniform nature, when user data is being read or written. The at least two information layers are aligned by optically measuring and aligning alignment marks, such as header spokes, at predetermined measuring points.


Patent
16 May 2001
TL;DR: In this article, a guard device for machines such as pressbrakes, guillotines, stamping machines and the like, in the case of which a first machine part performs working movements toward a second machine part, is adapted to arrest the working movement on interruption of the light beam.
Abstract: A guard device for machines such as pressbrakes, guillotines, stamping machines and the like, in the case of which a first machine part performs working movements toward a second machine part. At least one photoelectric detector, more especially a laser photoelectric detector, has its light beam extending perpendicularly to the direction of working movement and is able to be so positioned between the two machine parts at one thereof that its light beam is at a safety distance from such machine part, such safety distance being able to be set by means of a guard device arranged adjustably on this one machine part, such guard device bearing the at least one photoelectric detector. A halting mechanism is adapted to arrest the working movement on interruption of the light beam and a switching off mechanism serves for switching off the halting mechanism directly prior to interruption of the light beam. Furthermore there are mechanisms for the performance of a first movement of the guard device as far as interruption of the light beam by the machine part bearing the guard device and the performance of a second movement of the guard device in the opposite direction, the displacement or distance traveled, which sets the safety distance, in the second movement being able to be predetermined by an electrical measuring and/or control device. Accordingly for such adjustment no additional adjustment photoelectric detector is required and the adjustment may be performed in a simple manner by a single operator.

Patent
30 May 2001
TL;DR: A ventilative joint guard is composed of a neoprene outer portion and an elastic fiber textile inner portion as discussed by the authors, however, variation in the texture of the elastic fiber yarn of the inner portion makes the joint guard have excellent ventilation and makes users still feel comfortable after having worn the joint guards for a period of time.
Abstract: A ventilative joint guard is composed of a neoprene outer portion ( 10 ) and an elastic fiber textile inner portion ( 20 ). The joint guard provides a physical heating treatment, however, variation in the texture of the elastic fiber textile of the inner portion ( 20 ) makes the joint guard have excellent ventilation and makes users still feel comfortable after having worn the joint guard for a period of time.

Patent
26 Oct 2001
TL;DR: In this article, a hollow pre-molded impact resistant plastic component which conforms to the shape of the crash bar or saddlebag protector is used to protect the chrome finish.
Abstract: The disclosure relates to an inexpensive plastic protective guard that is securely attached to the crash bars and/or saddlebag protectors of a motorcycle or motorbike to protect the chrome finish thereon. The protective guard is comprised of a hollow pre-molded impact resistant plastic component which conforms to the shape of the crash bar or protective bar. The protective guard includes a longitudinal slit through its wall to allow opening of the guard and placed thereover where it securely snaps into place and serves to protect the chrome finish on these components in the event of a crash, dropping or scrape when these components come into contact with the pavement.


Patent
Antonio Bogat1
10 Dec 2001
TL;DR: In this article, a self-checkout lane in a store comprises an incoming goods path for receiving goods, first and second goods collection zones, and a segregation device operable under control of a computer processor.
Abstract: A self-checkout lane in a store comprises an incoming goods path for receiving goods, first and second goods collection zones, and a segregation device operable under control of a computer processor to divert goods from the incoming goods path into one or the other of the two goods collection zones. The incoming goods path includes a product scanner electrically coupled to the computer processor and operable to evaluate the total retail price of a plurality of goods. The goods of a first customer are diverted to the first goods collection zone. After receiving payment for the goods, the computer processor operates the segregation device to allow the first customer to access their goods, and to meanwhile divert subsequent goods of a second customer to the second goods collection zone, thereby facilitating the swift and efficient use of the self-checkout terminals by customers. The invention also includes security means to help guard against misappropriation of goods.

Patent
14 Dec 2001
TL;DR: In this article, a safety and anti-theft door guard for a server provides an improved door guard opening and closing structure for servers of 1U, 2U and 2U up specifications.
Abstract: A safety and anti-theft door guard for a server provides an improved door guard opening and closing structure for servers of 1U, 2U and 2U up specifications. The door guard of the invention offers a two-stage turning mechanism to allow hard disk drives retrievable from the server freely with interference, and also has a lock means installable on any type of models to provide theft protection function, thereby to resolve the problem of conventional single shaft door opening that might otherwise impede the retrieval of hard disk drives from the server.

Patent
11 Sep 2001
TL;DR: An auto rack sidewall bumper guard device for auto rack railroad cars eliminates contact between a vehicle door and the sidewalls as mentioned in this paper, which includes a mounting plate and a plurality of horizontally extending vertically spaced-apart relatively low profile bumpers extending from the mounting plate.
Abstract: An auto rack sidewall bumper guard device for auto rack railroad cars eliminates contact between a vehicle door and the sidewalls. The bumper guard device includes a mounting plate and a plurality of horizontally extending vertically spaced-apart relatively low profile bumpers extending from the mounting plate. The mounting plate is adapted to cover the sidewall panel and part of each adjacent vertical posts to prevent the vehicle doors from contacting the sidewall panels and vertical posts.

Patent
18 Oct 2001
TL;DR: In this paper, a temporary and removable car bumper impact absorber protection device with adjustable straps for securing on or inside (the trunk, for example) of an automobile with the cushioning material resting on the bumper to be protected.
Abstract: A temporary and removable car bumper impact absorber protection device with adjustable straps for securing on or inside (the trunk, for example) of an automobile with the cushioning material resting on the bumper to be protected.