Information security – Prevention of unauthorized use of data including prevention... – Access control
Reexamination Certificate
2008-01-22
2008-01-22
Moise, Emmanuel L. (Department: 2137)
Information security
Prevention of unauthorized use of data including prevention...
Access control
C713S166000, C713S193000, C715S252000, C715S252000
Reexamination Certificate
active
07322047
ABSTRACT:
The data security method, system and associated data mining enables multiple users, each having a respective security clearance level to access security sensitive words, data objects, characters or icons. The method extracts security sensitive words, data objects, characters or icons from plaintext or other source documents to obtain (a) subsets of extracted data and (b) remainder data. The extracted data is, in one embodiment, stored in a multilevel security system (MLS) which separates extract data of different security levels with MLS guards. Some or all of the original data is reconstructed via one or more of the subsets of extracted data and remainder data only in the presence of a predetermined security level. In this manner, an inquiring party, with the proper security clearance, can data mine the data in the MLS secured storage.
REFERENCES:
patent: 5036315 (1991-07-01), Gurley
patent: 5423032 (1995-06-01), Byrd et al.
patent: 5485474 (1996-01-01), Rabin
patent: 5532950 (1996-07-01), Moses
patent: 5581682 (1996-12-01), Anderson et al.
patent: 5715399 (1998-02-01), Bezos
patent: 5757916 (1998-05-01), MacDoran et al.
patent: 5778304 (1998-07-01), Grube et al.
patent: 5832212 (1998-11-01), Cragun et al.
patent: 5842023 (1998-11-01), Tsumura
patent: 5871398 (1999-02-01), Schneier et al.
patent: 5887269 (1999-03-01), Brunts et al.
patent: 5892908 (1999-04-01), Hughes et al.
patent: 5905980 (1999-05-01), Masuichi et al.
patent: 5933498 (1999-08-01), Schneck et al.
patent: 5960080 (1999-09-01), Fahlman et al.
patent: 5982897 (1999-11-01), Clark
patent: 5996011 (1999-11-01), Humes
patent: 6044375 (2000-03-01), Shmueli et al.
patent: 6055544 (2000-04-01), DeRose et al.
patent: 6073165 (2000-06-01), Narasimhan et al.
patent: 6078907 (2000-06-01), Lamm
patent: 6094483 (2000-07-01), Fridrich et al.
patent: 6148342 (2000-11-01), Ho
patent: 6154172 (2000-11-01), Piccionelli et al.
patent: 6192472 (2001-02-01), Garay et al.
patent: 6253203 (2001-06-01), O'Flaherty et al.
patent: 6301668 (2001-10-01), Glėichauf
patent: 6370629 (2002-04-01), Hastings et al.
patent: 6389542 (2002-05-01), Flyntz
patent: 6487538 (2002-11-01), Gupta
patent: 6598161 (2003-07-01), Kluttz et al.
patent: 6602298 (2003-08-01), Kirshenbaum
patent: 6662189 (2003-12-01), Oyanagi et al.
patent: 6714977 (2004-03-01), Fowler
patent: 6771290 (2004-08-01), Hoyle
patent: 2002/0073311 (2002-06-01), Brown et al.
patent: 2002/0073313 (2002-06-01), Brown et al.
patent: 2002/0116641 (2002-08-01), Mastrianni
patent: 2004/0054630 (2004-03-01), Ginter
patent: WO 9953624 (1999-10-01), None
patent: WO 00/75779 (2000-12-01), None
patent: WO 00/75779 (2000-12-01), None
patent: WO 00/75779 (2000-12-01), None
Ingram i100, Content Security Appliance (2 pages), printed Jun. 24, 2001.
Element-Wise XML Encryption, Hiroshi Maruyama and Takeshi Imamura, IBM Research, Tokyo Research Laboratory (4 pages), Apr. 20, 2000.
Survival Information Storage Systems by Jay J. Wylie, Michael W. Bigrigg, John D. Strunk, Gregory R. Ganger, Han Kiliccote Pradeep K. Khosla (8 pages), Aug. 2000.
ZD Net Interactive iWeek—IBS, SAP: XML to Boost Security Integration ( 1 page), May 3, 1999.
Myers, A.C. “Mostly-Static Decentralized Information Flow Control” M.I.T. Doctoral Thesis Jan. 1999.
Cisco Systems' Intrusion Detection System (IDS) Host Sensor 2.0 product data sheet and technical overview, 10 pgs., Jul. 3, 2000, www.cisco.com.
“Protecting Privacy using the Decentralized Label Model” A. Myers, Cornell Univ. Jan. 1, 2000.
Mimesweeper Product Data sheet, Resoft Int'l LLC., Nov. 12, 2001 re-soft.com/product/mimeswep.
Complete Content Security for Internet Gateways and Mail Servers, Aladdin, Jul. 2000.
Aladdin Product announcement for e-Safe Appliance, Aladdin Knowledge Sys., Ltd., Nov. 8, 2001, Aks.com
ews/2001/e-safe.
Mail Attender 4.1x product white paper by Sherpa Software, Oct. 2001.
MIMEsweeper-Content Security for E-mail, Web Browsing & Webmail, Nov. 12, 2001.
Cisco IDS Host Sensor Product, Oct. 16, 2001.
Ingrian i100, Content Security Appliance (1 pages), printed Jun. 24, 2001.
Element-Wise XML Encryption, Hiroshi Maruyama and Takeshi Imamura, IBM Research, Tokyo Research Laboratory (4 pages), Apr. 20, 2000.
Survival Information Storage Systems by Jay J. Wylie, Michael W. Brigrigg, John D. Strunk, Gregory R. Ganger, Han Kiloccote Pradeep K. Khosla (8 pages), Aug. 2000.
ZD Net Interactive Week—IBS—SAP: XML to Boost Security Integration (1 page), May 3, 1999.
Myers, A.C. “Mostly-Static Decentralized Information Flow Control” M.I.T. Doctoral Thesis Jan. 1999.
The 1996 book, Applied Cryptography, by Schneier.
The Uniform Resource Locator article “Fold OC”, Feb. 17, 2000.
Microsoft Word “Learning Microsoft Word 7.0”, Jul. 9, 1997.
Intelligence Community System for Information Sharing (ICSIS) Relationship to the Global Information Grid (GIG), White Paper, Mar. 27, 2001.
Nemzow Martin A.
Redlich Ron M.
Digital Doors, Inc.
Kain Fleit
Kain, Jr. Robert C.
Moise Emmanuel L.
Pyzocha Michael
LandOfFree
Data security system and method associated with data mining does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Data security system and method associated with data mining, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Data security system and method associated with data mining will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2753823