Data security system and method responsive to electronic...

Information security – Prevention of unauthorized use of data including prevention... – Access control

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S166000, C715S252000, C715S751000

Reexamination Certificate

active

07146644

ABSTRACT:
An adaptive method, system and program for securing data against a plurality of electronic and environmental events directed at computers utilizes a hacking monitor which generates attack warnings (such as a hacking warning) dependent upon the severity of the attack. Based upon these warnings, data is filtered to extract security sensitive words etc. and the extract and remainder data (if necessary) is stored in assigned memory. Full or partial reconstruction is permitted, manually or automatically, with a security clearance. Encryption is typically used dependent upon the warning. The information processing system includes a filter which is adjusted based upon the degree of attack warning to extract security sensitive words. A storage system stores extracted data and remainder data (if necessary) based upon the level of the warning and a compiler is used to reconstruct the data in the presence of the appropriate security clearance level.

REFERENCES:
patent: 5036315 (1991-07-01), Gurley
patent: 5485474 (1996-01-01), Rabin
patent: 5532950 (1996-07-01), Moses et al.
patent: 5581682 (1996-12-01), Anderson et al.
patent: 5832212 (1998-11-01), Cragun et al.
patent: 5903646 (1999-05-01), Rackman
patent: 5905980 (1999-05-01), Masuichi et al.
patent: 5933498 (1999-08-01), Schneck et al.
patent: 5960080 (1999-09-01), Fahlman et al.
patent: 5996011 (1999-11-01), Humes
patent: 6055544 (2000-04-01), DeRose et al.
patent: 6078907 (2000-06-01), Lamm
patent: 6094483 (2000-07-01), Fridrich et al.
patent: 6148342 (2000-11-01), Ho
patent: 6192472 (2001-02-01), Garay et al.
patent: 6301668 (2001-10-01), Gleichauf et al.
patent: 6389542 (2002-05-01), Flyntz
patent: 6487538 (2002-11-01), Gupta
patent: 6493752 (2002-12-01), Lee et al.
patent: 6598161 (2003-07-01), Kluttz
patent: 6602298 (2003-08-01), Kirshenbaum
patent: 6714977 (2004-03-01), Fowler et al.
patent: 6725377 (2004-04-01), Kouznetsov
patent: 6771290 (2004-08-01), Hoyle
patent: 2002/0059425 (2002-05-01), Belfiore et al.
patent: 2002/0073311 (2002-06-01), Brown et al.
patent: 2002/0116641 (2002-08-01), Mastrianni
patent: 2004/0054630 (2004-03-01), Ginter
patent: WO 00/75779 (2000-12-01), None
Schneier, Bruce, Applied Cryptography, 1996, pp. 220, 228-229.
Foldoc, “URL,” Feb. 17, 2000, pp. 1-2.
Element-Wise XML Encryption, Hiroshi Maruyama and Takeshi Imamura, IBM Research, Tokyo Research Laboratory (4 pages).
Survival Information Storage Systems by Jay J. Wylie, Michael W. Bigrigg, John D. Strunk, Gregory R. Ganger, Han Kiliccote Pradeep K. Khosla (8 pages).
ZD Net Interactive iWeek—IBS, SAP: XML to Boost Security Integration (1 page).
Myers, A.C. “Mostly-Static Decentralized Information Flow Control” M.I.T. Doctoral Thesis Jan., 1999.
Cisco Systems' Intrusion Detection System (IDS) Host Sensor 2.0 product data sheet and technical overview, 10 pgs., Jul. 3, 2000, www.cisco.com.
The 1996 book, Applied Cryptography, by Schneier.
The Uniform Resource Locator article “FOLD OC”.
Wylie “Survival Information Storage Systems”.
Microsoft Word “Learning Microsoft Word 7.0”.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Data security system and method responsive to electronic... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Data security system and method responsive to electronic..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Data security system and method responsive to electronic... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3654935

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.