scispace - formally typeset
Search or ask a question

Showing papers on "Guard (information security) published in 2014"


Journal ArticleDOI
TL;DR: This study proposes a new model of firewall called the 'Tree-Rule Firewall', which offers various benefits and is applicable for large networks such as 'cloud' networks, and designs a Tree-Rule firewall model that has none of the five limitations.

52 citations



Journal ArticleDOI
TL;DR: This article responds to Wolery’s critique of the What Works Clearinghouse (WWC) pilot Standards to clarify what the Standards are designed to accomplish and to offer views about future revisions.
Abstract: In this article, we respond to Wolery’s critique of the What Works Clearinghouse (WWC) pilot Standards, which were developed by the current authors. We do so to provide additional information and clarify some points previously summarized in this journal. We also respond to several concerns raised by Maggin, Briesch, and Chafouleas after they applied the Standards to a single-case design synthesis published in this journal. The overall purpose of this response is to clarify what the Standards are designed to accomplish and to offer our views about future revisions.

46 citations


Patent
21 May 2014
TL;DR: In this article, the Zigbee is adopted to be connected with a community local area network and connected with the internet and a mobile communication network, an intelligent control center is arranged, commands and controls community vehicle logistics, a community service platform and a family security comprehensive application system, further sending mobile phone or IPD information to the home owners, sends data information, implements home appliance intelligent control management, further sends information to communities, subdistrict offices and government competent departments, gives an alarm to a local police station 110 alarm center, cooperates with community intelligent security, issues information
Abstract: Provided are an internet of things method and device for community security According to the internet of things method and device for community security, internet of things RFID chest labels are arranged for residents including home owners, the aged and children, and internet of things security RFID sensors are arranged on communities, residential areas, vehicles, safety boxes and family valuables; network cameras, periphery sensing guard modules, theft and robbing detection systems and fire detectors are arranged, and the zigbee is adopted to be connected with a community local area network and connected with the internet and a mobile communication network An intelligent control center is arranged, commands and controls community vehicle logistics, a community service platform and a family security comprehensive application system, further sends mobile phone or IPD information to the home owners, sends data information, implements home appliance intelligent control management, further sends information to the communities, subdistrict offices and government competent departments, gives an alarm to a local police station 110 alarm center, cooperates with community intelligent security, issues information and instructions, transmits the information and the instructions to an execution mechanism and starts an emergency system to achieve internet of things intelligent security of the communities

42 citations


Patent
19 Nov 2014
TL;DR: In this paper, an entrance guard control method consisting of broadcasting a wireless local area network connection invitation signal, a mobile terminal detects the WLAN invitation signal and establishes WLAN connection with the entrance guard terminal according to the signal, the mobile terminal acquires a door opening instruction and sends a first door opening request carrying a user account to the EG terminal through the wireless Local Area Network (LAN) connection.
Abstract: The invention provides an entrance guard control method which comprises the steps that an entrance guard terminal broadcasts a wireless local area network connection invitation signal; a mobile terminal detects the wireless local area network connection invitation signal and establishes wireless local area network connection with the entrance guard terminal according to the signal; the mobile terminal acquires a door opening instruction and sends a first door opening request carrying a user account to the entrance guard terminal through the wireless local area network connection according to the door opening instruction; the entrance guard terminal checks the authority of the user account in response to the received first door opening request, sends an unlocking signal to a door locking device when the user account passes through the authority checking, generates an entrance guard control record, stores the entrance guard control record locally and/or uploads the entrance guard control record to a server in real time. The entrance guard control method provided by the invention is high in safe, low in cost and high in operation convenience. The invention also provides an entrance guard control system.

38 citations


Patent
30 Jul 2014
TL;DR: In this article, a method and a device for identifying a time-varying dynamic two-dimensional code entrance guard are presented, and the method comprises the following steps that the prestored personal identification information and the current time information are encrypted by a smart phone by virtue of a public key, and then the encrypted result is displayed in a 2D code manner.
Abstract: The invention discloses a method and a device for identifying a time-varying dynamic two-dimensional code entrance guard, which belong to the technical field of identifying two-dimensional code entrance guards, and aim at solving the problem of the existence of potential safety hazards in the presently-used method for identifying a static two-dimensional code entrance guard. The method comprises the following steps that the prestored personal identification information and the current time information are encrypted by a smart phone by virtue of a public key, and then the encrypted result is displayed in a two-dimensional code manner; a two-dimensional code identification device reads the displayed two-dimensional code, decrypts the read encryption information by virtue of a private key, the personal identification information and the current time information are separated, the separated information is compared with the information stored in a database and the current time respectively, and if the two parts of information is matched, then an entrance guard controller is controlled to carry out door-opening operation; and the public key and the private key are generated by the two-dimensional code identification device by an asymmetrical secret key algorithm. The method and the device are used for entrance guard identification.

31 citations


Patent
05 Nov 2014
TL;DR: In this article, an entrance guard system and an opening method using a mobile terminal is presented. But the mobile terminal does not have the capability of transmitting data, and it cannot be used for maintenance of personal articles, which cannot be easily lost.
Abstract: The invention provides an entrance guard system and an entrance guard opening method. The entrance guard system includes: a mobile terminal, which is used for emitting a signal for opening an entrance guard device; a control device, which is respectively connected with the mobile terminal and the entrance guard device through wireless communication connection signals of Wi-Fi, after receiving a signal of opening the entrance guard device, judging whether the signal of opening the entrance guard device matches with set information, and when the signal of opening the entrance guard device matches with the set information, controlling opening of the entrance guard device. The entrance guard system and an entrance guard opening method provided by the invention utilize the mobile terminal as the voucher and have no need for additional induction card, and pay more attention to maintenance of personal articles, which cannot be easily lost. The Wi-Fi wireless communication function of the mobile terminal is utilized, the control device adopts an AP mode to establish WLAN hot spots, the influence of SIM cards does not exist, mobile phone outage and other circumstances are unnecessary to consider, and the extra communication fee problem cannot be generated. An independent extensible network module has no need of external network constraints and supports offline operation.

28 citations


01 Feb 2014
TL;DR: This document describes the evasion techniques that affect the aforementioned implementations of RA- Guard and formally updates RFC 6105, such that the aforementioned RA-Guard evasion vectors are eliminated.
Abstract: The IPv6 Router Advertisement Guard (RA-Guard) mechanism is commonly employed to mitigate attack vectors based on forged ICMPv6 Router Advertisement messages. Many existing IPv6 deployments rely on RA- Guard as the first line of defense against the aforementioned attack vectors. However, some implementations of RA-Guard have been found to be prone to circumvention by employing IPv6 Extension Headers. This document describes the evasion techniques that affect the aforementioned implementations and formally updates RFC 6105, such that the aforementioned RA-Guard evasion vectors are eliminated.

27 citations


Patent
26 Feb 2014
TL;DR: In this paper, a method, equipment and a system used for realization of intelligent entrance guard, and belongs to the field of entrance guard technology, is described, which comprises following steps: a 2-dimensional bar code graph carrying entrance guard authority information is received.
Abstract: The invention discloses a method, equipment and a system used for realization of intelligent entrance guard, and belongs to the field of entrance guard technology. The method comprises following steps: a 2-dimensional bar code graph carrying entrance guard authority information is received, wherein the entrance guard authority information comprises identity information and authority information, and the authority information is used for setting an effective date of entrance guard authority; when commands of using entrance guard authority are received, the 2-dimensional bar code graph is displayed, the 2-dimensional bar code graph is scanned by a verification device, and the identity information and the authority information are verified so as to confirm entrance guard authority. According to the method, the equipment and the system, the entrance guard authority information is transferred in a 2-dimensional bar code manner, and it does no need to prepare card for information storage, so that cost of intelligent entrance guard is reduced. In addition, the authority information contained by the entrance guard authority information can be used for setting the effective date of entrance guard authority, so that the method, the equipment and the system are suitable for long-term utilization of entrance guard, and temporary utilization of entrance guard, and application range is more extensive.

26 citations


Proceedings ArticleDOI
08 Jun 2014
TL;DR: A novel method to detect guard rails in highway scenarios using a stereo camera setup that combines geometry information with appearance cues using a state-of-the-art feature encoding method and exploits an efficient bag- of-features representation that relies on randomized clustering forests.
Abstract: In this paper we present a novel method to detect guard rails in highway scenarios using a stereo camera setup. In contrast to previous methods, we combine geometry information with appearance cues using a state-of-the-art feature encoding method. In our system pipeline, we follow a hough-based approach to localize potential guard rails in the image and require each detected line to fulfill linearity in depth as well as certain height expectations. To leverage the appearance information, we exploit an efficient bag-of-features representation that relies on randomized clustering forests. The effectiveness of our approach is demonstrated on a large novel dataset with pixel-level annotations of guard rails in real-world highway scenarios.

19 citations


Patent
15 Oct 2014
TL;DR: In this article, the authors present a system which integrates many of the functions of existing security and security guard systems into a single integrated system, while adding new functions and increased functionality through the centralization of the systems.
Abstract: This disclosure is directed at system which integrates many of the functions of existing security and security guard systems into a single integrated system, while adding new functions and increased functionality through the centralization of the systems. The present system uses a server based system to provide the backbone of a system which takes input and performs its functions through network connection through a web portal, to an application on mobile devices, to CCTV and/or DVR devices, and to any other network enabled device which is connected to the system. One major function of the system disclosed allows CCTV and/or DVR systems to be networked into the server system, allowing the server to store, document, and log the video and photos, along with any video and photos from any mobile devices, such as camera phones, which are networked into the system. Another feature, via an application on a mobile device, is intended to both perform a number of functions essential to guard duty, such as communication, surveillance, incident reporting, and patrol routing function, as well as to allow management to monitor guards by tracking their patrol routes and logging events and recordings. Additionally, the present invention allows a property's management, staff, residents and guests to view selected CCTV camera video and/or images on a mobile device.

Patent
16 Jul 2014
TL;DR: In this paper, a remote entrance guard system consisting of an entrance guard controller, an information acquisition system, a remote visible terminal, and a wireless communication network is described, which is used for household security management of the owner.
Abstract: The invention discloses a remote entrance guard system which comprises an entrance guard controller, an information acquisition system, a remote visible terminal and a wireless communication network, wherein the entrance guard controller is arranged on a door leaf of an owner and is in communication connection with an electrically controlled door lock on the door leaf; the information acquisition system is arranged on the door leaf and is in communication connection with the entrance guard controller; the remote visible terminal is used for receiving personal information, making identity verification of a visitor and transmitting a control signal according to the verified verification information; the wireless communication network is used for receiving the video information, transmitting the video information to the remote visible terminal through an internet protocol (IP) network, verifying the identity of the visitor, then transmitting the control signal to the entrance guard controller and controlling whether the electrically controlled door lock is opened. The remote entrance guard system disclosed by the invention is used for household security management of the owner, can open or close the entrance guard through the remote visible terminal of the owner and has high reliability and safety.

Patent
29 Jan 2014
TL;DR: In this article, an entrance guard authorization method for NFC (near field communication) mobile phones is described, and the problem of obtaining the entrance guard acquiring procedure in an NFC mobile phone in correlative technique is solved.
Abstract: The invention discloses an entrance guard authorization method, an entrance guard authorization device and entrance guard authorization equipment, and belongs to the technical field of computers. The entrance guard authorization method comprises the following steps of certifying a user account number transmitted by a first terminal; receiving an adding request which has a first SE identification and is received by the first terminal after certification is successful; and adding the first SE identification in a white list with entrance guard system opening permission. After the user account number transmitted by the first terminal is certified successfully, the first SE identification of the first terminal is added to the white list; the problem that the entrance guard acquiring procedure in an NFC (near field communication) mobile phone in the correlative technique is complicated is solved; because the terminal can directly transmit the SE identification to the certification server after the user account number transmitted by the terminal is certified successfully, the certification server can automatically add the SE identification in the white list, the process of authorizing the NFC mobile phone can be quickly finished, and an effect of facilitating management on the entrance guard permission of the NFC mobile phone is achieved.

Patent
17 Dec 2014
TL;DR: In this article, an intelligent entrance guard system based on fingerprint and finger vein joint recognition is presented, which consists of a power supply management circuit, an electric control lock, an image collection device and an information processing control section, wherein the information processing controller is used for obtaining data and information of images collected in the image collection devices, carrying out image algorithm processing on the data of the images and carrying out authentication on a fingerprint image and a finger vein image.
Abstract: The invention provides an intelligent entrance guard system based on fingerprint and finger vein joint recognition. The entrance guard system comprises a power supply management circuit, an electric control lock, an image collection device and an information processing control section, wherein the information processing control section is used for obtaining data and information of images collected in the image collection device, carrying out image algorithm processing on the data of the images and carrying out authentication on a fingerprint image and a finger vein image; the power supply management circuit is electrically connected with the image collection device, the information processing control section and the electric control lock respectively; and the image collection device and the electric control lock are respectively connected with the information processing control section via a signal. According to the intelligent entrance guard system, the accuracy rate and the uniqueness of entrance guard system authentication are ensured by bimodal biological characteristics authentication combining a fingerprint identification technology and a finger vein identification technology, thereby improving the safety, the reliability and the anti-counterfeit property of the entrance guard system, and meanwhile, the entrance guard system disclosed by the invention has multifunctionality, thereby achieving intelligentization of the entrance guard system and improving the user experience.

Patent
13 Aug 2014
TL;DR: In this paper, a control method of a home entrance guard is described, which comprises the following steps: collecting information: collecting and storing the height and shoeprints of a user when a door is closed, a door handle is triggered and the user stays in a specific area outside the door, and generating identity information; opening the door and verifying: judging the intention of the user to open the door after the door was closed; and controlling the door to be opened if the identity information is successfully matched with the recognition information, so that not only are the safety, automation
Abstract: The invention discloses a control method of a home entrance guard The control method comprises the following steps: collecting information: collecting and storing the height and shoeprints of a user when a door is closed, a door handle is triggered and the user stays in a specific area outside the door, and generating identity information; opening the door and verifying: judging the intention of the user for opening the door after the door is closed, the door handle is triggered and the user stays in the specific area outside the door for a preset time, collecting the height and shoeprints of the user to generate the recognition information, matching the identity information with the recognition information, and controlling the door to be opened if the identity information is successfully matched with the recognition information According to the control method of the embodiment, the identity information and the recognition information are collected, the identity information is matched with the recognition information, and the door is controlled to be opened when the identity information is successfully matched with the recognition information, so that not only are the safety, automation and intelligentization high, but also simplicity in operation is realized, and the family security is guaranteed The invention also discloses a control system of the home entrance guard


Patent
26 Mar 2014
TL;DR: In this article, a remote entrance guard monitoring device consisting of a detection terminal installed outside a door of a user and an alarm arranged inside a work room of an entrance guard is described.
Abstract: The invention relates to a remote entrance guard monitoring device The remote entrance guard monitoring device comprises a detection terminal installed outside a door of a user and an alarm arranged inside a work room of an entrance guard The detection terminal comprises a timer, an information transmission module and a central monitoring system The timer is used for controlling an image sensor to acquire image information of a visitor when the stay duration of the visitor reaches a set value of the timer The information transmission module is used for transmitting information detected and received by the detection terminal to the central monitoring system The central monitoring system is used for storing and contrasting information of the visitor, sending an alarm signal when the visitor is judged to be unauthorized or visits not more than ten times, and adding one to the visiting frequency of the visitor The alarm is used for buzzing so as to alarm the entrance guard to conduct monitoring when receiving the alarm signal from a monitoring center When a stranger appears at the door of the user, the entrance guard is alarmed by the remote entrance guard monitoring device to monitor the user, and therefore the situation that a thief commits a burglary is prevented


Patent
19 Nov 2014
TL;DR: In this paper, the authors proposed a floating population information management method for rooming house identification and renter identification, which consists of the following steps: receiving a renter authorized registration request carrying both rooming houses identifiers and renters identification information and sent by a first user terminal allowing login through a first account of which the permission level is the house owner; in case of successful verification of the renters authorization, granting a second account corresponding to the entrance guard permissions of the rooming House identifiers and recording the corresponding relation between the second account and the renter ID information, wherein
Abstract: The invention provides a floating population information management method. The floating population information management method comprises the following steps: receiving a renter authorized registration request carrying both rooming house identifiers and renter identification information and sent by a first user terminal allowing login through a first account of which the permission level is the house owner; in case of successful verification of the renter authorized registration request, granting a second account corresponding to the entrance guard permissions of the rooming house identifiers and recording the corresponding relation between the second account and the renter identification information, wherein the permission level of the second account is the renter; after an entrance guard terminal conducts entrance guard permission verification on a door opening request sent by a second user terminal which allows login through the second account and generates an entrance guard control record, receiving and storing the entrance guard control record uploaded by the entrance guard terminal. The floating population information management method improves the efficiency and accuracy in acquiring the information of floating population. The invention also provides a floating population information management system.

Book ChapterDOI
24 Sep 2014
TL;DR: This paper design and implement an authentication framework for Hadoop systems based on Trusted Platform Module (TPM) technologies and shows that the proposed protocol provides better security guarantees with lower optimized overhead.
Abstract: Hadoop is an open source distributed system for data storage and parallel computations that is widely used. It is essential to ensure the security, authenticity, and integrity of all Hadoop’s entities. The current secure implementations of Hadoop rely on Kerberos, which suffers from many security and performance issues including single point of failure, online availability requirement, and concentration of authentication credentials. Most importantly, these solutions do not guard against malicious and privileged insiders. In this paper, we design and implement an authentication framework for Hadoop systems based on Trusted Platform Module (TPM) technologies. The proposed protocol not only overcomes the shortcomings of the state-of-the-art protocols, but also provides additional significant security guarantees that guard against insider threats. We analyze and compare the security features and overhead of our protocol with the state-of-the-art protocols, and show that our protocol provides better security guarantees with lower optimized overhead.


Book ChapterDOI
18 Jul 2014
TL;DR: The proposed approach is able to successfully synthesize guards that closely match hand-written programmer code in a set of real-world C programs and are the simplest and weakest among guards that guarantee memory safety, relative to the inferred loop invariants.
Abstract: This paper presents a new synthesis-based approach for writing low-level memory-safe code. Given a partial program with missing guards, our algorithm synthesizes concrete predicates to plug in for the missing guards such that all buffer accesses in the program are memory safe. Furthermore, guards synthesized by our technique are the simplest and weakest among guards that guarantee memory safety, relative to the inferred loop invariants. Our approach is fully automatic and does not require any hints from the user. We have implemented our algorithm in a prototype synthesis tool for C programs, and we show that the proposed approach is able to successfully synthesize guards that closely match hand-written programmer code in a set of real-world C programs.

Patent
16 Dec 2014
TL;DR: In this article, a hand guard assembly for installation on a standard barrel nut is described, which can securely fasten on the standard nut by accommodating the sprockets of the standard barrel in an internal radial groove, and/or encasing the firearm's gas tube in a longitudinal notch.
Abstract: A hand guard assembly for installation on a standard barrel nut is disclosed In accordance with some embodiments, the hand guard assembly may include a hinged hand guard comprising a left clamshell component and a right clamshell component, which may be mounted on a standard barrel nut The design of the hinged hand guard allows the hand guard to securely fasten on the standard barrel nut by accommodating the sprockets of the standard barrel nut in an internal radial groove, and/or encasing the firearm's gas tube in a longitudinal notch The disclosed configurations may allow a user to attach and remove the hand guard easily and quickly from the firearm without modifying the standard barrel nut or removing the gas block

Patent
16 Jul 2014
TL;DR: In this article, an LED light bar is mounted within a casing which is integrated into a grill guard, with the LED bar protected both by the grill guard and by the casing, and the preferred mounting arrangement allows both pivoting and fore and aft movement of the light bar within the casing.
Abstract: A grill guard has an LED light bar positioned at a central location within the grill guard. The grill guard includes two vertically extending members and two horizontal members. The LED light bar is mounted within a casing which is integrated into the grill guard, with the LED light bar protected both by the grill guard and by the casing. The preferred mounting arrangement allows both pivoting and fore and aft movement of the LED light bar within the casing.

Patent
09 Apr 2014
TL;DR: In this paper, a WLAN-based iris entrance guard system consisting of an iris-entry guard client terminal, an IR server and WLAN network equipment is described.
Abstract: A disclosed WLAN-based iris entrance guard system comprises an iris entrance guard client terminal, an iris entrance guard server and WLAN network equipment; the iris entrance guard client terminal and the iris entrance guard server communicates with each other via WLAN; the iris entrance guard server establishes connection by verifying machine codes transmitted by the iris entrance guard client terminal; and the iris entrance guard server keeps the connection by regularly receiving machine codes transmitted by the iris entrance guard client terminal. Also, the invention provides a communication method of the WLAN-based iris entrance guard system. According to the technical scheme, the tedious wiring process for conventional entrance guard systems is saved, so that iris entrance guards disposed in a WLAN network can employ a same system for controlling, and thus intelligent centralized control and management on multiple entrance guards are realized.

Patent
21 May 2014
TL;DR: In this paper, a visitor centralized management system and method for a plurality of gateways in the same area can be realized by setting the server, which saves manpower resources; and the visitors can share data with an entrance guard system.
Abstract: The invention discloses a visitor centralized management system and method. The management system comprises a server and at least one management terminal disposed at a remote end, and an entrance guard device and a voice conversation device disposed at each gateway; the server is used for sending identity information to the management terminal; the management terminal is used for receiving setting information of temporary enter/exit authority of a visitor set by a manager; the server or corresponding entrance guard device is also used for determining whether the visitor has the enter authority at the corresponding gateway according to the setting information, if yes, the gate is open to let the visitor come in. With the technical scheme of the invention, visitor centralized management of a plurality of gateways in the same area can be realized by setting the server, which saves manpower resources; and the visitor centralized management system can share data with an entrance guard system.


Patent
28 Oct 2014
TL;DR: In this article, the authors present a method, a device and a computer program for configuring a guard period in Half Duplex Frequency Division Duplex, HD-FDD, operation.
Abstract: The present disclosure relates to a method, a device and a computer program for configuring a guard period in Half Duplex Frequency Division Duplex, HD-FDD, operation. According to some aspects, the disclosure relates to a method, performed in a wireless device, of configuring a guard period in HD-FDD operation. The method comprises obtaining a timing advance between the wireless device and an access point; and configuring a guard period in the wireless device based on the obtained timing advance and a radio access capability of the wireless device. The disclosure also relates to a wireless device and to a computer program for executing the methods.


Patent
13 Aug 2014
TL;DR: In this article, a cloud entrance guard barrier gate management method is proposed, which includes: presetting corresponding relation between a character cipher and face biological characteristics; collecting voice information, converting the voice information into character information; collecting face biological characteristic data of a person at present, a geographic position and time information, and sending the character information, the face biological feature data, the geographic position, and the time information to a cloud server; determining whether the character features and the face features are matched with the preset character cipher.
Abstract: The invention provides a cloud entrance guard barrier gate management method. The method includes: presetting corresponding relation between a character cipher and face biological characteristics; collecting voice information, converting the voice information into character information, collecting face biological characteristic data of a person at present, a geographic position and time information, and sending the character information, the face biological characteristic data, the geographic position and the time information to a cloud server; determining whether the character information and the face biological characteristic data of the person at present are matched with the preset character cipher and the preset face biological characteristics, if yes, returning recognition results and entrance guard barrier gate information to a mobile terminal by the cloud server and sending a control instruction to control the entrance guard barrier gate to be opened or closed; and if not, determining whether the number of times of wrong recognition exceeds a preset number, if yes, collecting a face image of a user at present and sending the image to the cloud server, and giving an alarm by the cloud server, and if not, returning to the second step. The invention also relates to a device for implementing the method. Beneficial effects of the device and the method are high safety performance and rapid recognition speed.