scispace - formally typeset
Search or ask a question

Showing papers on "Guard (information security) published in 2004"


Patent
26 Nov 2004
TL;DR: In this article, the authors propose a method to extract the security sensitive words/data from the source document for each MILS level, stores the extracted data in a corresponding extract store for each level and permits reconstruction/reassembly of the dispersed data via said extracted data at each said level of said multiple security levels and remainder data only in the presence of a predetermined security clearance commensurate with each level.
Abstract: The method, program and information processing system secures data, and particularly security sensitive words, characters or data objects in the data, in a computer system with multiple independent levels of security (MILS). Each level of MILS has a computer sub-network with networked workstations. The MILS sub-networks are connected together via security guard computer(s) and each guard computer has separate memories for each level (TS, S, C, UC (or remainder)). The method extracts the security sensitive words/data (a granular action), from the source document for each MILS level, stores the extracted data in a corresponding extract store for each level and permits reconstruction/reassembly of the dispersed data via said extracted data at each said level of said multiple security levels and remainder data only in the presence of a predetermined security clearance commensurate with each MILS level.

291 citations


Journal ArticleDOI
TL;DR: In this paper, the authors examined psychological, demographic, and physical predictors of job satisfaction among military personnel across the Armed Forces and found that the perception of a relatively high level of job pressure experienced by military personnel and the belief that the biggest problem in one's life was the result of job-related issues (such as a supervisor) rather than health or family.
Abstract: In this study, we examined psychological, demographic, and physical predictors of job satisfaction among military personnel across the Armed Forces. Data were collected from 24,881 members of the Active Duty and Reserve/Guard components. Overall, military job satisfaction was higher among Reserve/Guard personnel than among those on Active Duty. Separate regression models for the 2 components revealed generally similar predictors of job satisfaction. The 2 strongest predictors were the perception of a relatively high level of job pressure experienced by military personnel and the belief that the biggest problem in one's life was the result of job-related issues (such as a supervisor) rather than nonjob issues (such as health or family). Findings suggest areas in which the military can intervene to increase the satisfaction of personnel and presumably their likelihood of remaining in the military. Because considerable job pressure may be inherent in the nature of the military mission, attention should be gi...

61 citations


Patent
22 Jun 2004
TL;DR: An improved riving knife/guard assembly for a table saw allows the guard to be removed and attached without the use of any tools, provides a clear view of the work zone, blade and workpiece, and is easily adjustable to accommodate different size workpieces and cutting angle.
Abstract: An improved riving knife/guard assembly for a table saw allows the guard to be removed and attached without the use of any tools, provides a clear view of the work zone, blade and workpiece, and is easily adjustable to accommodate different size workpieces and cutting angle.

57 citations


Patent
05 Aug 2004
TL;DR: In this paper, a portable phone for an unmanned guard system and a method of preventing crimes using the same for conducting unmanned watch in real time in a protection space such as an apartment, an office, etc., using the portable phone, automatically warning when an intrusion is occurred, and preventing an illegal intrusion from the outside by setting watch function by remote control irrespective of distance.
Abstract: Disclosed is a portable phone for an unmanned guard system and a method of preventing crimes using the same for conducting unmanned watch in real time in a protection space such as an apartment, an office, etc., using the portable phone, automatically warning when an intrusion is occurred, and preventing an illegal intrusion from the outside by setting watch function by remote control irrespective of distance. The inventive portable phone comprises an infrared rays receiver, an input port part, an output port part, a base band processor, a mobile communications chip having a function of conducting communications with a mobile radio communication network to transmit a signal outputted from the output port part to the relevant unmanned guard device, a LCD for displaying alarm message; a TTS for converting the alarm message into a voice signal, and a microprocessor for controlling whole operations of the system.

46 citations


Patent
Valentine J. Rhodes1
16 Jun 2004
TL;DR: In this paper, a dynamic guard interval adaptation is provided for devices having differing delay spreads in an OFDM communication system to reduce the guard intervals, with adaptation controlled by either the wireless communications device or the network.
Abstract: Dynamic guard interval adaptation is provided for devices having differing delay spreads in an OFDM communication system to reduce the guard intervals, with adaptation controlled by either the wireless communications device or the network.

45 citations


Patent
21 Apr 2004
TL;DR: In this article, a surgical knife safety device has a handle, a blade connected to the handle, and a guard carried by the handle for sliding movement between a retracted position in which the blade is exposed for use, and an extended position for covering the sharp cutting edge of the blade.
Abstract: A surgical knife safety device having a handle, a blade connected to the handle, and a guard carried by the handle for sliding movement between a retracted position in which the blade is exposed for use, and an extended position for covering the sharp cutting edge of the blade. In the retracted position, an enlarged guard radius is provided at the distal end of the handle to allow improved handle control and blade orientation. The enlarged guard radius is positioned to allow the user to firmly grip a large distal handle portion which is preferably molded as a single piece with the blade holder, preventing unwanted blade or handle movement due to guard mechanism tolerances. A spring, such as leaf spring, and a pair of detents or slots are provided to fix the guard in the extended or retracted position, and provide resistance during movement between the two positions. Additionally, an antitravel mechanism is incorporated in the guard to prevent accidental retraction from the fully extended position.

44 citations


Patent
02 Feb 2004
TL;DR: A hand guard is disclosed having impermeable protection features and allowing skin contact on the pads of the fingers and thumb on a sensing hand as discussed by the authors, where each digit guard is shaped like an elongated, hemispherical, cupped foil with contours to fit in overlying position for covering the dorsal and lateral portions of the thumb extending over a portion of both phalanges.
Abstract: A hand guard is disclosed having impermeable protection features and allowing skin contact on the pads of the fingers and thumb on a sensing hand. The first foil is a metacarpal guard shaped to cover the metacarpals and wrap around to cover a portion of the palm and thenar web space and having a fastener to fasten the first foil to itself. The digit guards include a thumb guard. Each digit guard is shaped like an elongated, hemispherical, cupped foil with contours to fit in overlying position for covering the dorsal and lateral portions of the thumb extending over a portion of both phalanges of the thumb. The digit guards are linked to the metacarpal guard, and each contain fasteners to retain the digits against the digit guards.

39 citations


Patent
23 Nov 2004
TL;DR: In this paper, the trigger guard is configured to mount to a first arm and a second arm of the receiver and is further configured to extend below the first and second arms to accommodate the user's finger in the enclosure surrounding the trigger.
Abstract: A firearm includes a receiver further including a trigger and a trigger guard. The trigger guard comprises a first end and a second end. The first end is configured to mount to a first arm and a second arm of the receiver and is further configured so that a portion of the trigger guard extends below the first and second arm. The second end is configured to mount to a third and forth arm of the receiver. The first end and the second end extend at angles so as to provide additional room for the user's finger in the enclosure surrounding the trigger.

38 citations


Book ChapterDOI
01 Sep 2004
TL;DR: In this paper, the point guard fails to pass the ball to the center who is wide open under the opposing team's basket, which is considered a poor or bad point guard and is likely to lose her position.
Abstract: 1. On sports teams, say basketball, people have assigned roles appropriate to their various talents. A point guard is, among other things, in charge of running the offense, doing most of the ball handling, setting up plays, and getting the ball to people in scoring position. A center, usually the tallest player on the team, is responsible for dominating the area under the basket, rebounding, blocking shots, and scoring from inside. Suppose that on a specific occasion, the point guard fails to pass the ball to the center who is wide open under the opposing team’s basket. What might one say? That the point guard made a mistake, did something wrong or incorrect, did not do what she was supposed to, failed to do her job, messed up, or fouled up. If, for whatever reason, she regularly misses such opportunities, she can be regarded as a poor or bad point guard and is likely to lose her position. Other members of the team can legitimately complain about her incompetence, lack of court sense, or selfishness, although in the name of team spirit they should not be too quick to criticize. What we have in basketball or any similar game is a practice – to use Alasdair MacIntyre’s term1 – in which participants have roles and responsibilities, criteria of good and bad performances within the context of the game, and an array of critical responses. In such practices people have

30 citations


Proceedings ArticleDOI
08 Oct 2004
TL;DR: The paper presents laws, applicable to the computer related crime, highlights the U.S. Department of Homeland Security involvement, and investigates on the fact why businesses do not report hackers' attacks and why is it important.
Abstract: This paper explores the fast growing Cyberworld and its components. It starts with definitions of who is the hacker, and what is a cybercrime. Types and offenses of cybercrime are addressed as well. The paper concentrates on the possibilities to protect ourselves from the cybercrime, and guard Cyberworld from us. Therefore, it emphasizes the importance of users' education, starting from the early age, creation and enforcement of policies, and awareness training. The paper presents laws, applicable to the computer related crime, highlights the U.S. Department of Homeland Security involvement, and investigates on the fact why businesses do not report hackers' attacks and why is it important.

30 citations


12 Nov 2004
TL;DR: The Bush Administration's 2003 National Strategy for the Physical Protection of Critical Infrastructures and Key Assets indicates that security guards are an important source of protection for critical facilities.
Abstract: : The Bush Administration's 2003 National Strategy for the Physical Protection of Critical Infrastructures and Key Assets indicates that security guards are an important source of protection for critical facilities. In 2003, approximately one million security guards (including airport screeners) were employed in the United States. Of these guards, analysis indicates that up to 5% protected what have been defined as critical infrastructure and assets. The effectiveness of critical infrastructure guards in countering a terrorist attack depends on the number of guards on duty, their qualifications, pay and training. Security guard employment may have increased in certain critical infrastructure sectors since September 11, 2001, although overall employment of U.S. security guards has declined in the last five years. Contract guard salaries averaged $19,400 per year in 2003, less than half of the average salary for police and well below the average U.S. salary for all occupations. There are no U.S. federal requirements for training of critical infrastructure guards other than airport screeners and nuclear guards. Twenty-two states do require basic training for licensed security guards, but few specifically require counter-terrorism training. State regulations regarding criminal background checks for security guards vary. Sixteen states have no background check regulations.

Patent
08 Sep 2004
TL;DR: In this article, a utility knife has a pawl that cooperates with a stop to reduce movement of the guard while the guard is in a locked position, and a simple latching mechanism that allows the pawl to bypass the stop.
Abstract: A utility knife has a protective guard that moves from a locked position to an unlocked position. Preferred mechanisms utilize a pawl that cooperates with a stop to reduce movement of the guard while the guard is in a locked position, and a simple latching mechanism that allows the pawl to bypass the stop. The pawl is disposed with respect to other elements of the mechanism such that the blade guard can only pulled back to a retracted position after operation of a trigger or other actuator, and then only for a single use. Both the stop and the catch can advantageously be carried in a fixed special relation to one another by operation of a trigger or other actuator.

Patent
16 Nov 2004
TL;DR: In this article, a leak-proof guard is used to prevent leaks in the front and back of the diaper, especially around the waist of the wearer, and the guard can prevent leaks that could occur without the guard.
Abstract: The present invention provides diapers with improved leak prevention, especially around the waist of the wearer. Diapers according to the invention may have a guard, for example, a leak-proof guard, to contain what is inside the diaper and thus prevent leaks that could occur without the guard. Diapers according to the invention provide added leak protection particularly on the front and backside of the baby.

Patent
01 Jul 2004

Book
17 Mar 2004
TL;DR: In this paper, the authors examined how effectively CENTAF adjusted air operations against the Republican Guards to the changing realities of combat. And they identified tactical innovations developed during the operation, the main elements of adaptive process, those factors that helped and hindered the process, and the sources of CENTAF's innovations.
Abstract: : In January and February 1991, Central Command Air Forces (CENTAF) conducted an air-to-ground onslaught against Iraq's Republican Guard. The requirements of this operation conflicted with several aspects of the U.S. Air Force's preparations for a European battleground. The low-altitude tactics CENTAF crews had practiced for the previous decade and a half were unsuitable for the task at hand. This study examines how effectively CENTAF adjusted air operations against the Republican Guards to the changing realities of combat. The extent to which existing USAF doctrine prepared CENTAF for this operation provides a baseline for the amount of adaptation required. The subsequent narrative identifies tactical innovations developed during the operation, the main elements of adaptive process, those factors that helped and hindered the process, and the sources of CENTAF's innovations. Initial F-16 and B-52 attacks on the Republican Guard registered little success. In response, CENTAF launched six significant tactical innovations in one week: A-10 deep interdiction, A-10 reconnaissance, F- 16 Killer Scout operations, F-16 forward basing, F-111 and F-15E "Tank Plinking," and the use of cockpit videotape as a bomb damage assessment (BDA) source. These innovations required CENTAF aviators to create new tactics as they conducted operations. CENTAF's effectiveness against the Guard divisions improved, resulting in greater destruction of Iraqi forces. Critically weakened by air attack, the two Guard divisions that stood and fought were annihilated during the campaign's ground phase. CENTAF's adaptation to the realities of war in the Gull, accomplished with impressive speed, was facilitated by four conditions.

Patent
26 Apr 2004
TL;DR: In this article, a method and system for remote surveillance information processing by an end user to ensure the safety of personnel, facilities and property is presented, where the user remotely accesses video streams from one or more cameras at each of a set of stores, facilities or other locations.
Abstract: A method and system for remote surveillance information processing by an end user to ensure the safety of personnel, facilities and property. The user remotely accesses video streams from one or more cameras at each of a set of stores, facilities or other locations. After reviewing video streams for a specific audit item or guard tour stop, the user can input into the computer a classification of the audited video stream according to a set of predefined criteria. The user then generates a report summarizing the reviewed items and their classifications, which is transmitted to designated recipients. The present invention also includes a networked computer system for generating, performing and modifying audits and guard tours, creating guard audit reports, and providing access to the images that support the conclusions contained in the reports.

Patent
Mike Voigt1, Albert Kleider1, Kurt Neef1
30 Jul 2004
TL;DR: In this paper, a guard for an electric machine tool comprising a rotationally driven insertion tool was proposed, with which the insertion tool (14) can be covered at least in areas.
Abstract: The invention relates to a guard for an electric machine tool comprising a rotationally driven insertion tool (14), with which the insertion tool (14) can be covered at least in areas. According to the invention, at least one blocking means (32, 40) is provided that at least prevents a turning about a rotation axis (18) of the insertion tool (14).


Patent
05 Feb 2004
TL;DR: A parking guide having both visual and auditory indicators to show a driver when a vehicle is properly positioned in a parking space is presented in this paper, where the driver is asked to check if the vehicle is in a proper position.
Abstract: A parking guide having both visual and auditory indicators to show a driver when a vehicle is properly positioned in a parking space.

Patent
26 Nov 2004
TL;DR: A trigger guard holster comprising a combination clip holster and trigger guard assembly that mounts upon an existing accessory rail of a firearm is proposed in this article, which is able to prevent the accidental firing of the firearm when the firearm is worn with the clip holster in a person's waistband.
Abstract: A trigger guard holster comprising a combination clip holster and trigger guard assembly that mounts upon an existing accessory rail of a firearm. The trigger guard assembly has guard walls to prevent the accidental firing of a firearm when the firearm is worn with the clip holster in a person's waistband. The trigger guard assembly also protects the person by preventing the trigger from unintended contact with objects, which would cause unintentional or accidental firing of the firearm when carried or used.

Patent
13 Jul 2004
TL;DR: In this article, a fan guard is presented which utilizes an associated electric motor body for increased support and rigidity, and the fan guard includes an inner housing member which mounts to an electric motor and a plurality of circumferentially spaced reinforcing ribs.
Abstract: The present invention relates to a fan guard which utilizes an associated electric motor body for increased support and rigidity. The fan guard includes an inner housing member which mounts to an electric motor body. A plurality of circumferentially spaced reinforcing ribs is each connected at an inner end to the inner housing member. Each reinforcing rib extends radially outward therefrom. A plurality of spaced fan guard ribs is connected at an inner end to the inner housing member and extends radially outward therefrom. A rim extends circumferentially around the plurality of fan guard ribs and is connected to an outer end of each of the fan guard ribs.

Patent
15 Jan 2004
TL;DR: In this article, a vacuum pickup assembly is used with a blade guard, and the vacuum assembly may include separate and/or different vacuum pickup configurations, and a vacuum bar is included on the carriage.
Abstract: Abrading and cutting devices such as saws include waste containment systems and methods to improve removal of slurry or other contaminants from a work area during operations, and separation of slurry from a carrying medium such as air. A blade guard includes fluid channels, and may be removable from a blade guard carriage. The carriage may be used to minimize any need to readjust the blade guard position when the blade guard is returned to the carriage for further use. A vacuum bar may be included on the carriage. A vacuum pickup assembly may be used with a blade guard, and the vacuum assembly may include separate and/or different vacuum pickup configurations.

Patent
13 Aug 2004
TL;DR: A wildlife guard placement tool for installing a wildlife protection guard on an insulator of an elevated, electrical power distribution system has been provided in this paper that includes a first end, a second end, an opening, a near side, and a far side with a slot formed therein.
Abstract: A wildlife guard placement tool for installing a wildlife protection guard on an insulator of an elevated, electrical power distribution system has been provided that includes a first end, a second end, an opening, a near side, and a far side with a slot formed therein. The opening and the slot are positioned such that a placement tab of the wildlife protection guard can be received into the opening and out through the slot. Additionally, a method for placement of a wildlife protection guard on an insulator of an elevated electrical power distribution system has been provided.

Patent
14 Dec 2004
TL;DR: In this paper, an insect screen and a security barrier contained within a removable frame installable to replace a conventional screen or storm window was used to deter an intruder from entering the building through the window or door.
Abstract: The present invention comprises an insect screen and a security barrier contained within a removable frame installable to replace a conventional screen or storm window, the assembly functioning both as a barrier to insect penetration, and as a security barrier to deter an intruder from entering the building through the window or door. The main components of the window guard insert comprise a frame assembly, a security barrier, an insect screen, a spline, and a weather strip. The assembled frame includes a security barrier channel to retain the security barrier, a weather strip channel to retain the weather strip and an insect screen channel, partially formed by the security barrier to retain the insect screen. An optional clip retaining channel is used to increase the window guard insert's ability to withstand an unauthorized entry attempt.

Patent
29 Sep 2004
TL;DR: In this paper, a radio short message threshold system and its management method based on a mobile communication network is proposed, where a management person can set up relationship with a spot threshold system, and a central control system by mobile terminals like cell phones.
Abstract: A radio short message threshold system and its management method based on a mobile communication network is that a management person can set up relationship with a spot threshold system and a central control system by mobile terminals like cell phones to realize system design, spot consult and alarm operation solving the problem of operation and management to the threshold systems at far distance or unable to lay cables. It's possible for frontier posts, mobile base stations and unmanned machine rooms to use the threshold system to realize remote monitor.

Patent
28 Oct 2004
TL;DR: In this article, a face guard for a sports helmet having at least two ear holes is presented, which includes a main body having an arrangement of elongated members, and a pair of quadrilateral projections for securing the face guard to the helmet.
Abstract: The present invention provides a face guard for a sports helmet having at least two ear holes. The face guard includes a main body having an arrangement of elongated members. The face guard also includes a pair of quadrilateral projections for securing the face guard to the helmet, wherein the projections are integral with and extend from the main body. The projections are positioned below the ear holes in the helmet when the face guard is secured to the helmet. Also, the projections are positioned adjacent a lower edge of the helmet when the face guard is secured to the helmet. The projections are positioned below a rear lower edge of the helmet when the face guard is secured to the helmet. Each projection has first and second vertical members that are configured to engage a connector that secures the face guard to the helmet. Furthermore, each projection includes a first and second substantially horizontal members that, when combined with the first and second vertical members, define a rectangle or a trapezoid.

29 Apr 2004
TL;DR: More than 51 percent of Army and 31 percent of Air Guard members have been activated to meet new homeland and overseas demands since the attacks of September 11, 2001 as discussed by the authors, and the number of activated Air Guard personnel has decreased over the past year, some personnel were activated outside their normal rotational schedules and tour lengths have been extended.
Abstract: : With the high pace of operations since September 11, more than 51 percent of Army Guard members and 31 percent of Air Guard members have been activated to meet new homeland and overseas demands. The Army Guard has experienced significant difficulties in responding to these extensive and ongoing requirements because much of it was funded and equipped as a later-deploying reserve force rather than an operational force designed for continued overseas deployments. Moreover, units with certain specialties military police, transportation, and combat arms have been in high demand, resulting in lengthy and repeated deployments. To ease critical shortages, 27 Army Guard units were retrained as military police from other specialties such as field artillery. The Air Guard, although less affected by the high pace because it is funded to deploy quickly, has also seen significant use for Iraq combat operations and homeland security missions. While the number of activated Air Guard personnel has decreased over the past year, some personnel were activated outside their normal rotational schedules and tour lengths have been extended. In addition, some units have been assigned new homeland missions such as flying combat air patrols and providing radar coverage over the United States.

Patent
07 Apr 2004
TL;DR: In this paper, a Y-shaped strap system for a leg guard is described, where two legs are attached to one edge of a shell of the leg guard and a third leg is detachably connectable to an opposed edge of the shell.
Abstract: A Y-shaped strap system is provided for a leg guard wherein two legs of the Y-shaped strap system are attached to one edge of a shell of the leg guard and a third leg is detachably connectable to an opposed edge of the shell of the leg guard. A V-shaped connector is provided to attach the first and second legs to the third leg.

Proceedings ArticleDOI
Ehab Al-Shaer1
23 Apr 2004
TL;DR: This work comprehensibly identifies all types of anomaly that could exist in single- or multi-firewall environments and presents a set of techniques/tools that automatically discover and rectify policy anomalies in centralized and distributed legacy firewalls.
Abstract: Summary form only given. Firewalls are core elements in network security. However, managing firewall rules, particularly in multi-firewall enterprise networks, has become a complex and error-prone task. Firewall filtering rules have to be written, ordered and distributed carefully in order to avoid firewall policy conflicts (or anomalies) and network vulnerability. Therefore, in order to produce anomaly-free firewall policies when adding or modifying rules in any firewall, a thorough intra- and inter-firewall analysis is required to determine the rule location (which firewall) and position (what order in the firewall policy) in the network. We comprehensibly identify all types of anomaly that could exist in single- or multi-firewall environments. We then present a set of techniques/tools that automatically discover and rectify policy anomalies in centralized and distributed legacy firewalls.

Patent
01 Jul 2004
TL;DR: In this article, a flexible transmitter such as a belt or chain extends through a portion of the master sprocket and the slave sprocket guard but does not make more than incidental contact with the guards.
Abstract: A guard assembly for exercise bikes has a master sprocket guard and a slave sprocket guard that are separate from each other and that are positioned between a master sprocket and a slave sprocket. A flexible transmitter such as a belt or chain extends through a portion of the master sprocket guard and the slave sprocket guard but does not make more than incidental contact with the guards.