scispace - formally typeset
Search or ask a question

Showing papers on "Guard (information security) published in 2012"


Proceedings ArticleDOI
15 Oct 2012
TL;DR: This work designs and implements Changing of the Guards (COGS), a simulation-based research framework to study Tor's entry guard design, and empirically demonstrates that natural, short-term entry guard churn and explicit time-based entry guard rotation contribute to clients using more entry guards than they should, and thus increase the likelihood of profiling attacks.
Abstract: Tor is the most popular low-latency anonymity overlay network for the Internet, protecting the privacy of hundreds of thousands of people every day. To ensure a high level of security against certain attacks, Tor currently utilizes special nodes called entry guards as each client's long-term entry point into the anonymity network. While the use of entry guards provides clear and well-studied security benefits, it is unclear how well the current entry guard design achieves its security goals in practice.We design and implement Changing of the Guards (COGS), a simulation-based research framework to study Tor's entry guard design. Using COGS, we empirically demonstrate that natural, short-term entry guard churn and explicit time-based entry guard rotation contribute to clients using more entry guards than they should, and thus increase the likelihood of profiling attacks. This churn significantly degrades Tor clients' anonymity. To understand the security and performance implications of current and alternative entry guard selection algorithms, we simulate tens of thousands of Tor clients using COGS based on Tor's entry guard selection and rotation algorithms, with real entry guard data collected over the course of eight months from the live Tor network.

96 citations


Journal ArticleDOI

91 citations


Journal ArticleDOI
TL;DR: Although no single tool or technique can guard against the host of possible attacks, a defense-in-depth approach, with overlapping protections, can help secure Web applications.
Abstract: Although no single tool or technique can guard against the host of possible attacks, a defense-in-depth approach, with overlapping protections, can help secure Web applications.

55 citations


Proceedings ArticleDOI
17 Apr 2012
TL;DR: This work replaces the intersection operation by a nonlinear mapping onto the guard, which is not only numerically stable, but also scalable, making it possible to verify systems which were previously out of reach.
Abstract: Although a growing number of dynamical systems studied in various fields are hybrid in nature, the verification of properties, such as stability, safety, etc., is still a challenging problem. Reachability analysis is one of the promising methods for hybrid system verification, which together with all other verification techniques faces the challenge of making the analysis scale with respect to the number of continuous state variables. The bottleneck of many reachability analysis techniques for hybrid systems is the geometrically computed intersection with guard sets. In this work, we replace the intersection operation by a nonlinear mapping onto the guard, which is not only numerically stable, but also scalable, making it possible to verify systems which were previously out of reach. The approach can be applied to the fairly common class of hybrid systems with piecewise continuous solutions, guard sets modeled as halfspaces, and urgent semantics, i.e. discrete transitions are immediately taken when enabled by guard sets. We demonstrate the usefulness of the new approach by a mechanical system with backlash which has 101 continuous state variables.

48 citations


01 Jan 2012
TL;DR: The technical issues and challenges faced by biometric technologies within the physical and logical access control applications of information security and the challenges in interoperability as well as needs for reliable testing and reporting are discussed.
Abstract: Recent advances in biometric technologies coupled with the increased threats in information security has proliferated the applications of biometric systems to safe- guard information and its supporting processes, systems and infrastructures. This paper discusses the technical issues and challenges faced by biometric technologies within the physical and logical access control applications of information security. The discussion includes concerns on the system performances with regard to robustness to the actual operating environment and recognition capability of different biometric traits. It also ad- dresses various security threats which include spoong and replay attacks. In addition, this paper highlights the challenges in interoperability as well as needs for reliable testing and reporting. The overall discussions provide imperative insights for an effective trade- off and risk management analyses in information security policy and decision making.

41 citations


Book
Xuezhi Guo1
29 Aug 2012
TL;DR: Zhang et al. as mentioned in this paper studied the historical evolution of public security organizations from the social affairs department to the ministry of Public Security and the leading central security agency: Central Guard Bureau.
Abstract: 1. Historical evolution of public security organizations 2. From the social affairs department to the ministry of public security 3. Leading central security agency: Central Guard Bureau 4. Elite security corps: Central Guard Regiment 5. Armed police and its historical role in the CCP politics 6. People's armed police in the reform era 7. Garrison commands 8. CCP intelligence agencies and services in the revolutionary era 9. The intelligence apparatus and services under PRC 10. The PLA, security services, and the elite politics.

36 citations


Patent
23 May 2012
TL;DR: In this paper, a system and methods for location based service for people interaction are disclosed, where direct and intrinsic users' interests can be discovered, categorized and aggregated during daily lives of users and used to improve users' social lives.
Abstract: System and methods for location based service for people interaction are disclosed. The system and methods allow people not only to connect to their known friends and contacts but also to meet those people unknown or unfamiliar. Direct and intrinsic users' interests can be discovered, categorized and aggregated during daily lives of users and used to improve users' social lives. Additional methods to guard and protect user privacies are also disclosed.

25 citations


Patent
30 May 2012
TL;DR: In this article, the utility model relates to an intelligentized safety monitoring system for a residential area, which is characterized by comprising a video safety monitor, a visible building talkback system, a parking lot management system, circumference guard system, night patrol system and the like.
Abstract: The utility model relates to an intelligentized safety monitoring system for a residential area. The intelligentized safety monitoring system is characterized by comprising a video safety monitoring system, a visible building talkback system, a parking lot management system, a circumference guard system, a night patrol system and the like, wherein the video safety monitoring system comprises a video camera, an audio monitoring device, a network video server, a switchboard, a storage server, a monitoring platform and the like; the visible building talkback system comprises a visible unit gate machine, an indoor submachine, an electrically controlled lock, a door closer, a communication transmission unit and a management center host machine; and the parking lot management system comprises a charging management computer, an entrance control machine, an exist control machine, an entrance road barrier, an exist road barrier, image comparison equipment, an entrance video camera, an exist video camera and a vehicle detector. A whole strict and scientific public security system is supplied to a user; and the conventional passive and unit-type guard is changed into active and networked intelligentized guard, so that a crime can be found and stopped accurately and quickly.

25 citations


Patent
19 Oct 2012
TL;DR: In this article, the delta ring is refracted away from the barrel nut, and an annular groove formed between a forward plate and a rear plate associated with each hand guard member is mated with a portion of a flange of the barrel.
Abstract: Embodiments of the disclosure can include systems, methods, and apparatuses for installing a hand guard on a firearm. In some embodiments, a method of installing a hand guard on a firearm can be provided. The firearm includes a barrel, a barrel nut, and a delta ring. The delta ring is refracted away from the barrel nut. A number of hand guard members are positioned about the barrel. An annular groove formed between a forward plate and a rear plate associated with each hand guard member is mated with a portion of a flange of the barrel nut. The flange is secured within the annular groove of at least one hand guard member. The delta ring is advanced over a portion of some or all the hand guard members.

23 citations


Patent
28 Nov 2012
TL;DR: In this article, a secure access module (SAM)-card safety module which is connected with an intelligent lock control system signal in an Intelligent Lock is added, which can be embedded into the intelligent lock and be separated from the intelligent locks, and is used for storing a secret key and performing encryption/decryption operation.
Abstract: The invention provides an entrance guard controlling method and system based on bidirectional authentication. The core of the entrance guard controlling method and system is that a secure access module (SAM)-card safety module which is connected with an intelligent lock control system signal in an intelligent lock is added, can be embedded into the intelligent lock and be separated from the intelligent lock, and is used for storing a secret key and performing encryption/decryption operation. The SAM-card safety module is taken as a medium to realize the bidirectional authentication between a subscriber card and the intelligent lock, therefore, the safe authentication problem between a locket and the subscriber card in the entrance guard system is solved, the safety of the lockset is improved, the lockset or the subscriber card is prevented from being decrypted and cloned, the safety of data storage and data transmission is guaranteed, and further, the safety of the entrance guard system is guaranteed.

22 citations


Patent
06 Aug 2012
TL;DR: In this article, a method of communicating data in a wireless telecommunications system between a plurality of base stations and a plurality OFDM sub-carriers spanning a first frequency bandwidth is described.
Abstract: A method of communicating data in a wireless telecommunications system between a plurality of base stations and a plurality of terminal devices using a plurality of Orthogonal Frequency Division Multiplex, OFDM, sub-carriers spanning a first frequency bandwidth is described. The method comprises communicating data between a first base station and a first terminal device using a first group of the OFDM sub-carriers distributed across the first frequency bandwidth, communicating data between a second base station, which is geographically separated from the first base station, and a second terminal device using a second group of the OFDM sub-carriers distributed across a second frequency bandwidth, wherein the second frequency bandwidth is smaller than and within the first frequency bandwidth; and communicating control-plane data between the first base station and the first terminal device using a combination of the first and second groups of the OFDM sub-carriers. Guard regions may be provided in the frequency domain between frequencies of transmissions associated with the first base station and frequencies of transmissions associated with the second base station. This can help reduce unintended overlaps in transmissions from the two base stations if there is a frequency mismatch between them.

Patent
16 Apr 2012
TL;DR: A forward hand guard assembly for a rifle includes an upper metal hand guard which is secured to the receiver by a clamp, and a lower grip which is releasably secured to both the upper guard and the clamp by a latching pin this paper.
Abstract: A forward hand guard assembly for a rifle includes an upper metal hand guard which is secured to the receiver rifle by a clamp, and a lower grip which is releasably secured to the upper guard and the clamp by a latching pin The clamp has a locking mechanism which can be released without tools The grip is a molded plastic body designed to rest comfortably in the hand

Patent
13 Jun 2012
TL;DR: In this paper, an anti-disassembling wrist-strap type radio frequency identification (RFID) electronic tag, monitoring equipment and a positioning server are used for dividing a prison area, identifying people and guarding.
Abstract: The invention relates to an electronic guard system, in particular to a prison electronic wall system for dividing a prison area, identifying people and guarding. The prison electronic wall system comprises an anti-disassembling wrist-strap type radio frequency identification (RFID) electronic tag, monitoring equipment and a positioning server, wherein the monitoring equipment comprises an RFID reader-writer; and the RFID reader-writer is connected with the positioning server through middle equipment. By adoption of the prison electronic wall system, a prison manager masters the detailed information and number of prisoners in each controlled area in a prison in real time, the prisoners can be effectively prevented from escaping, the probability that the prisoners make trouble together is reduced, and the personal safety of managers and the prisoners is guaranteed to the largest extent.

Patent
23 May 2012
TL;DR: In this paper, the authors propose a method and device for carrying a demodulation reference signal in a long-term evolution of time division duplex LTE TDD, with configuration parameters for given special subframes.
Abstract: The invention offers a method and device for carrying a demodulation reference signal. The method includes: in a long term evolution of time division duplex LTE TDD, with configuration parameters for given special subframes, selecting one or two orthogonal frequency division multiplexing OFDM symbols to carry a demodulation reference signal in a time domain corresponding to the scheduling of a physical resource block by each special subframe, wherein the configuration parameters for the given special subframes include: the ratio configuration of numbers of OFDM symbols occupied by a downside of pilot time send DwPTS, a guard period GP and UpPTS in the special subframe parameter configuration of a normal cyclic prefix being 6:6:2 or 6:7:1; and/or the ratio configuration of numbers of OFDM symbols occupied by DwPTS, GP and UpPTS in the special subframe parameter configuration of an extended cyclic prefix being 5:5:2 or 5:7:1. The present invention can reduce the complexity of UE, adapting an increased configuration of the special subframe.


Patent
11 Jun 2012
TL;DR: In this article, a modular hand guard assembly is presented, which serves both as a hand guard system and as an integrated interface system for mounting various weapon accessories and attachments and can be removed from the forward portion of the hand guard to provide for the installation of additional weapon accessories.
Abstract: A modular hand guard assembly serves both as a hand guard system and as an integrated interface system for mounting various weapon accessories and attachments thereto. The modular hand guard assembly includes a removable forward rail section that can be removed from the forward portion of the hand guard to provide for the installation of additional weapon accessories such as lights, optics or lasers in highly a desirable forward location adjacent to the barrel of the weapon. The modular hand guard assembly further includes an integrated modular switching and control system for use in connection with the various powered accessories mounted thereto.

Book
07 Dec 2012
TL;DR: In this paper, a web-based questionnaire was administered to Air National Guard and Air Force Reservists from various units and locations, and data from 581 participants was applied to an adapted version of an unfolding model of voluntary turnover originally developed by Lee, Mitchell, Holtom, McDaniel, and Hill in 1999.
Abstract: : Retention is an important issue for every organization due to the high costs of replacing members. This issue is becoming increasing important as the role of guard and reserves has continually increased over the past several years, and so research needs to be conducted on the retention of these groups. Therefore, a web-based questionnaire was administered to Air National Guard and Air Force Reservists from various units and locations. The data from 581 participants was applied to an adapted version of an unfolding model of voluntary turnover originally developed by Lee, Mitchell, Holtom, McDaniel, and Hill in 1999. Data collected indicated that very few people actually have a script to leave the service at the completion of their present obligation. Therefore, many people can still be influenced to remain in the service and so the leaders need to understand what will retain these members and what will cause them to leave. Hopefully leaders will gain a better understanding about the psychological process members go through when deciding to separate, and be able to make recommendations on what issues should be addressed. Recommendations on retention issues and future research are discussed.

Patent
27 Feb 2012
TL;DR: In this article, a compound archery bow consisting of a riser, first and second limbs, and a power cable is biased in a direction away from the riser by a cable guard comprising a mounting portion attached to the risers, a flexible portion and a cable engaging portion.
Abstract: In some embodiments, a compound archery bow comprises a riser, first and second limbs and first and second rotatable members A bowstring extends between the first rotatable member and the second rotatable member A power cable is biased in a direction away from the riser by a cable guard comprising a mounting portion attached to the riser, a flexible portion and a cable engaging portion In some embodiments, the cable guard comprises a roller

Patent
18 Jun 2012
TL;DR: The installation for transport by overhead cable includes an embarking station (1) and a disembarking station for passengers; and a plurality of vehicles (3) mounted on a hauling cable (4) between the embarking stations and the disembarking stations as discussed by the authors.
Abstract: The installation for transport by overhead cable includes an embarking station (1) and a disembarking station (2) for passengers; and a plurality of vehicles (3) mounted on a hauling cable (4) between the embarking station (1) and the disembarking station (2), said vehicles being intended to move along a loop that passes through the embarking station (1) and the disembarking station (2), each vehicle (3) including a seat (5) and a guard rail (6) designed to take up an open position in which access to the seat (5) is enabled, and a closed position for protecting a passenger seated on said seat (5). It also comprises electronic means (7, 8, 9, 7', 8', 9') for detecting the presence of a passenger seated in the seat (5) and the position of the guard rail (6).

Patent
21 Mar 2012
TL;DR: In this paper, a high-place worktable for agricultural machinery is provided to minimize the width of a main table by employing folding stages and folding safety guards on auxiliary tables that sliding-extend from both ends of the main table.
Abstract: PURPOSE: A high-place worktable for agricultural machinery is provided to minimize the width of a main table by employing folding stages and folding safety guards on auxiliary tables that sliding-extend from both ends of the main table. CONSTITUTION: A high-place worktable for agricultural machinery comprises a main table(10), a right/left auxiliary table(20B), and an actuating unit. A folding stage(24) is provided on the end of the auxiliary table and unfolded around a first hinge. A folding safety guard is provided on the front and rear edges of the auxiliary table. Two handrail posts(41,42) are provided on the top of the folding safety guard and an upper safety guard(43) is connected from the top of the front handrail post to the rear handrail post. The handrail posts and the upper safety guard are connected with a second hinge so that the safety guard is rotated around the second hinge to extend outward and return to the original position.

Patent
24 Feb 2012
TL;DR: In this paper, a method of writing data to a distributed file system including a file system client, a server and a storage resource target, including generating a write request including a byte stream to be written to the storage resources target, includes formatting, on the client, the byte stream into sectors in accordance with the T10 protocol.
Abstract: A method of writing data to a distributed file system including a file system client, a server and a storage resource target, includes generating, on the client, a write request including a byte stream to be written to the storage resource target; formatting, on the client, the byte stream into sectors in accordance with the T10 protocol, the sectors including a data field and a protection information field, the protection information field including a guard field, an application field and a reference field; computing, on the client, checksum data for the guard field; sending, across a network, the data and the protection information to the server; verifying, in T10-capable hardware on the server, the checksum data for the guard field; verifying, on the storage resource target, the checksum data for the guard field; and storing the data on the storage resource target.

Patent
11 Jul 2012
TL;DR: In this paper, a guard system that aids ostomy pouching systems in preventing the leakage of waste material, guards the user's stoma from blunt force trauma, aids in stabilizing the peristomal region, and helps the stoma to protrude is disclosed.
Abstract: An guard system that aids ostomy pouching systems in preventing the leakage of waste material, guards the user's stoma from blunt force trauma, aids in stabilizing the peristomal region, and helps the user's stoma to protrude is disclosed. The guard system comprises a substantially rigid body having an annular base ring and a cupped area extending generally outwardly from the annular base ring. The cupped area has a top portion and a bottom portion, and the bottom portion and the annular base ring together define an opening dimensioned to permit a waste collection bag employed by the user to be inserted therethrough during use. The guard further may comprise a connecting means to attach to a belt. The guard system may further comprise an adapter that allows the guard to be used in conjunction with a variety of faceplate flange sizes of user's ostomy appliance and provides other beneficial functions.

Patent
Yoshitaka Higashikawa1
02 Feb 2012

Patent
07 Nov 2012
TL;DR: In this paper, a photon entrance guard system based on voice control is presented, which consists of a mobile terminal and a light control door lock, wherein the mobile terminal comprises a voce identification module, a control module and a sending module.
Abstract: The invention discloses a photon entrance guard system based on voice control. The photon entrance guard system comprises a mobile terminal and a light control door lock, wherein the mobile terminal comprises a voce identification module, a control module and a sending module, the voice identification module is used for identifying voice information, the control module is used for controlling the sending module according to the identification results of the voice identification module, the sending module is used for sending password information through visible light signals, and the light control door lock is used for executing a door opening or door closing actions according to the visible light signals. Compared with an entrance guard system adopting fixed equipment for fingerprint collection or adopting direct voice identification opening, the photon entrance guard system based on the voice control has the advantages that the password information is sent through the visible light signals. Because the light signals adopt linear transmission, the password information cannot be easily leaked out, the camouflage cheating cannot easily occur, the safety is improved. The voice identification control has the characteristics of non-contact performance, non-invasive performance and easy use, so the voice identification control easily becomes popular by mass consumers, and the photon entrance guard system can fast occupy the markets.

Patent
26 Apr 2012
TL;DR: In this article, a safety guard for a vehicle, such as a school or transit bus, includes a skirt extending below a side body portion of the vehicle and between front and rear wheels along a side of vehicle.
Abstract: A safety guard for a vehicle, such as a school or transit bus, includes a skirt extending below a side body portion of the vehicle and between front and rear wheels along a side of the vehicle. The skirt functions to push individuals and other animate objects out of the path of the wheels for safety purposes, while being mounted for separate linear and arcuate movements relative to the body of the vehicle to protect the guard from damage upon abutting an inanimate object during operation of the vehicle.


Patent
24 Oct 2012

Patent
20 Jun 2012
TL;DR: In this paper, a biological RF fingerprint module is used for collecting fingerprint information; the camera module was used to collect external image information, the voice module used for voice talking; the network module was also used for transmitting each information to a monitor terminal; the display and the touch screen module was both used for displaying and inputting information; and the microprocessor was used for processing and transmitting information, and the embedded intelligent entrance guard system is flexible, efficient, safe and intelligent.
Abstract: The invention relates to a system designed for realizing intelligent entrance guard. The intelligent entrance guard system comprises a biological RF fingerprint module, a camera module, a voice module, a network module, a display, a touch screen module and a microprocessor. The biological RF fingerprint module is used for collecting fingerprint information; the camera module is used for collecting external image information; the voice module is used for voice talking; the network module is used for transmitting each information to a monitor terminal; the display and the touch screen module is used for displaying and inputting information; and the microprocessor is used for processing and transmitting information. The embedded intelligent entrance guard system is flexible, efficient, safe and intelligent.

Patent
05 Sep 2012
TL;DR: A China mobile entrance guard security system and a corresponding entrance guard system security method is described in this paper, where the system comprises an entrance guard control center, entrance guard devices arranged at different places and a mobile phone of each unlocking user.
Abstract: The invention discloses a China mobile entrance guard security system and a corresponding entrance guard system security method. The system comprises an entrance guard control center (1), entrance guard devices (2) arranged at different places and a mobile phone (3) of each unlocking user, wherein a mobile phone module is arranged in each entrance guard device (2) to communicate with the entrance guard control center (1); the entrance guard control center (1) controls the working state of each entrance guard device (2); an entrance guard account of each entrance guard device (2) is set in the entrance guard control center (1); each entrance guard account records the phone number of each mobile phone (3) of each entrance guard device (2) capable of operating the entrance guard account; the entrance guard control center (1) authenticates the identity according to the information source phone number of the unlocking request information sent by the mobile phone (3) of the unlocking user; and if the identity is correct according to the authentication, the entrance guard control center (1) controls the working state of each entrance guard device (2) according to the information content by the steps of allowing the user operation in a designated time period and enabling the user to unlock or lock the entrance guard device (2) in the period.

Patent
Tsung-Yuan Yu1, Hsien-Wei Chen1
13 Mar 2012
TL;DR: In this paper, a method of forming a semiconductor device includes forming a passivation layer on top of a guard ring and an active area of a circuit device, forming a contact within the passivation contact, the contact being over and electrically connected to the guard ring, and forming a post-passivation interconnect (PPI) guard ring over the polysilicon passivation and the polymer layer extending along a sidewall of the PPI guard ring.
Abstract: A method of forming a semiconductor device includes forming a passivation layer on top of a guard ring and an active area of a circuit device, forming a passivation contact within the passivation layer, the passivation contact being over and electrically connected to the guard ring, forming a post-passivation interconnect (PPI) guard ring over the passivation layer and electrically connected to the passivation contact, and forming a first polymer layer over the PPI guard ring, the first polymer layer extending along a sidewall of the PPI guard ring.