Patent application number | Description | Published |
20080222734 | Security System with Extraction, Reconstruction and Secure Recovery and Storage of Data - The method for securing data includes establishing a group of security sensitive items, filtering data and extracting and separating the security items from remainder data. The filtered data are separately stored (locally on a PC or on another computer in a LAN or WAN or on the Internet.) A map may be generated. The filter and/or map may be destroyed or stored. The data input, extracted data and remainder data may be deleted from the originating computer. Encryption may be utilized to enhance security (including transfers of data, filter and map). Reconstruction of the data is permitted only in the presence of a predetermined security clearance. A plurality of security clearances may be used to enable a corresponding plurality of partial, reconstructed views of the plaintext (omitting higher security words). | 09-11-2008 |
20090178144 | Data Security System and with territorial, geographic and triggering event protocol - The method, program and information processing system secures data, and particularly security sensitive words, characters or data objects in the data, in a computer system with territorial, geographic and triggering event protocols. The method and system determines device location within or without a predetermined region and then extracts security data from the file, text, data object or whatever. The extracted data is separated from the remainder data and stored either on media in a local drive or remotely, typically via wireless network, to a remote store. Encryption is used to further enhance security levels. Extraction may be automatic, when the portable device is beyond a predetermined territory, or triggered by an event, such a “save document” or a time-out routine. Reconstruction of the data is permitted only with security clearance and within certain geographic territories. An information processing system for securing data is also described. | 07-09-2009 |
20090254572 | Digital information infrastructure and method - Distributed computer system processes data having select content (SC) represented by one or more predetermined words, characters, etc. The system has a plurality of SC data stores in a server cloud for respective security designated (Sec-D) data and scarcity designated (S-D) data, each with respective access controls thereat. The SC data stores are is operatively coupled on a network. An identification module for identifying SC data stores for the Sec-D data and S-D data in the server cloud. A processor activates an SC data stores in the server cloud thereby permitting access to the SC data stores and respective Sec-D data and S-D data based upon an application of one or more of said access controls thereat. The processor has a reconstruction module operating as a data process employing the respective access controls to combine one or more of the Sec-D data and S-D data. | 10-08-2009 |
20100010968 | System and method to identify, classify and monetize information as an intangible asset and a production model based thereon - The method and system identifies and classifies and monetizes intangible asset (I.A.) unstructured digital data in a computer system by ownership characterizations and intellectual property (I.P.) classifications. Enterprise and non-enterprise data collections are searched based upon an expanded project specification (of descriptive functions, characteristics and objectives). Primary search terms from the project are expanded by content, contextual and taxonomic analysis to generate a plurality of search string parameters employed to search the data collections. The search engine returns data and documents, ownership characteristics are ascertained by comparison of the returns and I.P. classifications are made based upon the returns. This process also handles unstructured enterprise specific data not otherwise located in the data collections or unstructured data from other I.A. programs such as H.R. performance modules, supply chain modules or CRM modules. Unstructured data matching an organized data set from project and the search returns is integrated into the organized data set. | 01-14-2010 |
20100250497 | Electromagnetic pulse (EMP) hardened information infrastructure with extractor, cloud dispersal, secure storage, content analysis and classification and method therefor - A method and system processes data in a distributed computing system to survive an electromagnetic pulse (EMP) attack. The computing system has proximal select content (SC) data stores and geographically distributed distal data stores, all with respective access controls. The data input or put through the computing system is processed to obtain the SC and other associated content. The process then extracts and stores such content in the proximal SC data stores and geographically distributed distal SC data stores. The system further processes data to geographically distribute the data with data processes including: copy, extract, archive, distribute, and a copy-extract-archive and distribute process with a sequential and supplemental data destruction process. In this manner, the data input is distributed or spread out over the geographically distributed distal SC data stores. The system and method permits reconstruction of the processed data only in the presence of a respective access control. | 09-30-2010 |
20130304761 | Digital Information Infrastruture and Method for Security Designated Data and with Granular Data Stores - Distributed computer system processes data having select content (SC) represented by one or more predetermined words, characters, etc. The system has a plurality of SC data stores in a server cloud for respective security designated (Sec-D) data and scarcity designated (S-D) data, each with respective access controls thereat. The SC data stores are is operatively coupled on a network. An identification module for identifying SC data stores for the Sec-D data and S-D data in the server cloud. A processor activates an SC data stores in the server cloud thereby permitting access to the SC data stores and respective Sec-D data and S-D data based upon an application of one or more of said access controls thereat. The processor has a reconstruction module operating as a data process employing the respective access controls to combine one or more of the Sec-D data and S-D data. | 11-14-2013 |
20150149491 | Information Infrastructure Management Data Processing Tools With Tags, Configurable Filters and Output Functions - Method of organizing and storing data in an information infrastructure by either processing data throughput or a method for processing data throughput or data mining in a distributed computing system works using a tagging routine. The system and method operates on sensitive content (e.g., trade secrets) or select content (e.g., critical content) and applies configurable filters (expanding, contracting, hierarchical/orthogonal classifier filters) to separate and store sensitive/select data in designated, distributed data stores or to supplement data collections. Sensitive/select data stores may have security clearance requirements. Data output is controlled to provide one or more of storage in predetermined data stores, data mining, coping, transfer to other storage sites, supplemental data searches, and presentation subject to data inquiry. | 05-28-2015 |
20150156206 | Information Infrastructure Management Tools With Extractor, Storage and Data Release Control Functions and Segmental Data Stores - Method and system of organizing and processing data in a distributed computing system having designated, distributed data stores for sensitive content (e.g., trade secrets) or select content (e.g., critical content). Sensitive/select data is extracted via configurable filters and stored in the designated data stores, sometimes subject to security controls, with limiting distribution functions and controlled release of the sensitive/select data. Distribution is limited due to designated, configurable filters. | 06-04-2015 |