Information security – Prevention of unauthorized use of data including prevention... – Access control
Reexamination Certificate
2006-09-05
2006-09-05
Moise, Emmanuel L. (Department: 2137)
Information security
Prevention of unauthorized use of data including prevention...
Access control
C713S166000, C713S193000, C715S252000, C715S252000
Reexamination Certificate
active
07103915
ABSTRACT:
The method for securing data includes establishing a group of security sensitive items, filtering data and extracting and separating the security items from remainder data. The filtered data are separately stored (locally on a PC or on another computer in a LAN or WAN or on the Internet.) A map may be generated. The filter and/or map may be destroyed or stored. The data input, extracted data and remainder data may be deleted from the originating computer. Encryption may be utilized to enhance security (including transfers of data, filter and map). Reconstruction of the data is permitted only in the presence of a predetermined security clearance. A plurality of security clearances may be used to enable a corresponding plurality of partial, reconstructed views of the plaintext (omitting higher security words). A computer readable medium containing programming instructions and an information processing system is encompassed.
REFERENCES:
patent: 5036315 (1991-07-01), Gurley
patent: 5485474 (1996-01-01), Rabin
patent: 5532950 (1996-07-01), Moses
patent: 5581682 (1996-12-01), Anderson et al.
patent: 5832212 (1998-11-01), Cragun et al.
patent: 5903646 (1999-05-01), Rackman
patent: 5905980 (1999-05-01), Masuichi et al.
patent: 5933498 (1999-08-01), Schneck et al.
patent: 5960080 (1999-09-01), Fahlman
patent: 5996011 (1999-11-01), Humes
patent: 6055544 (2000-04-01), DeRose et al.
patent: 6078907 (2000-06-01), Lamm
patent: 6094483 (2000-07-01), Fridrich et al.
patent: 6148342 (2000-11-01), Ho
patent: 6192472 (2001-02-01), Garay et al.
patent: 6253203 (2001-06-01), O'Flaherty et al.
patent: 6301668 (2001-10-01), Gleichauf
patent: 6389542 (2002-05-01), Flyntz
patent: 6487538 (2002-11-01), Gupta
patent: 6598161 (2003-07-01), Kluttz
patent: 6602298 (2003-08-01), Kirshenbaum
patent: 6714977 (2004-03-01), Fowler
patent: 6771290 (2004-08-01), Hoyle
patent: 2002/0116641 (2002-08-01), Mastrianni
patent: 2004/0054630 (2004-03-01), Ginter
Schneier, Bruce, Applied Cryptography, 1996, pp. 220, 228-229.
FOLDOC, “URL,”Feb. 17, 2000, pp. 1-2.
Ingram i100, Content Security Appliance (2 pages).
Element-Wise XML Encryption, Hiroshi Maruyama and Takeshi Imamura, IBM Research, Tokyo Research Laboratory (4 pages).
Survival Information Storage Systems by Jay J. Wylie, Michael W. Bigrigg, John D. Strunk, Gregory R. Ganger, Han Kiliccote Pradeep K. Khosla (8 pages).
ZD Net Interactive iWeek—IBS, SAP: XML to Boost Security Integration ( 1 page).
Myers, A.C. “Mostly-Static Decentralized Information Flow Control” M.I.T. Doctoral Thesis Jan. 1999.
The 1996 book, Applied Cryptography, by Schneier.
The Uniform Resource Locator article “FOLD OC”.
Wylie “Survival Information Storage Systems”.
Microsoft Word “Learning Microsoft Word 7.0”.
Nemzow Martin A.
Redlich Ron M.
Digital Doors, Inc.
Fleit Kain
Kain, Jr. Robert C.
Moise Emmanuel L.
Pyzocha Michael
LandOfFree
Data security system and method does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Data security system and method, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Data security system and method will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3588758