Information security – Prevention of unauthorized use of data including prevention... – Access control
Reexamination Certificate
2007-09-12
2010-12-21
Vu, Kimyen (Department: 2435)
Information security
Prevention of unauthorized use of data including prevention...
Access control
C713S182000
Reexamination Certificate
active
07856663
ABSTRACT:
A method, system, and program for security screening of electronic devices by device identifier are provided. A security scanning system detects an identifier from an electronic device. The identifier may be a radio frequency identifier or other type of identifier which is preferably detectable by the security scanning system regardless of the operating status of the electronic device. The security scanning system queries a database with the identifier for information about the electronic device. Responsive to receiving the information about the electronic device from the central database, at least one real-time scanned characteristic of the electronic device is compared with this information. The information includes characteristics of the components of the electronic device and an x-ray overlay of the electronic device. If the real-time scanned characteristics and the information match, then electronic device is designated as secure.
REFERENCES:
patent: 5299116 (1994-03-01), Owens et al.
patent: 5367552 (1994-11-01), Peschmann
patent: 5841350 (1998-11-01), Appalucci et al.
patent: 6097301 (2000-08-01), Tuttle
patent: 6218943 (2001-04-01), Ellenbogen
patent: 6286102 (2001-09-01), Cromer et al.
patent: 6601190 (2003-07-01), Meyer et al.
patent: 6650240 (2003-11-01), Lee et al.
patent: 6707879 (2004-03-01), McClelland et al.
patent: 6721391 (2004-04-01), McClelland et al.
patent: 6826715 (2004-11-01), Meyer et al.
patent: 6952163 (2005-10-01), Huey et al.
patent: 7139406 (2006-11-01), McClelland et al.
patent: 7574608 (2009-08-01), Rodriguez et al.
patent: 2003/0085163 (2003-05-01), Chan et al.
patent: 2003/0225612 (2003-12-01), DeSimone et al.
patent: 2005/0198513 (2005-09-01), Rodriguez et al.
Murray, Charles J., “Network Spec Released For Everyday Products”, Electronic Engineering Times, Sep. 15, 2003, p1, 4 pages.
Cohn, Michael, “Keeping Data Safe: Protecting Data On Handheld Devices Helps Keep Confidential Information From Prying Eyes.”, Internet World, vol. 8, No. 4, Apr. 2002, p46(3), 6 pages.
Rao, Ed, “Application of an Explosive Detection Device Based on Quadrupole Resonanace (QR) Technology in Aviation Security”, IEEE, 2001, p. 282-288, 7 pages.
Luke, Alison, “Protection Without Wires”, Building Services Journal, Nov. 1999, p. 28-29, 2 pages.
Electronic Engineering Times, “Embedded Processing—Atmel E2PROM Allows Users to Embed Security Features”, May 4, 1998, p. PG56, 1 page.
Wagner, Mitch, “IBM Sounds Alarm With Upcoming PCs”, InternetWeek, No. 711, Apr. 20, 1998, p16(1), 2 pages.
Rodriguez Herman
Smith, Jr. Newton James
Spinac Clifford Jay
Dillon Justin M.
International Business Machines - Corporation
Pattillo Amy J.
Shan April Y
Vu Kimyen
LandOfFree
Security screening of electronic devices by device identifier does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Security screening of electronic devices by device identifier, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Security screening of electronic devices by device identifier will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4213600