Data processing: database and file management or data structures – Database design – Data structure types
Reexamination Certificate
2007-10-09
2007-10-09
Wassum, Luke S (Department: 2167)
Data processing: database and file management or data structures
Database design
Data structure types
Reexamination Certificate
active
10317815
ABSTRACT:
Computerized methods and systems are presented for facilitating identification, management and/or protection of proprietary information. Data can be received that is descriptive of proprietary information, entities involved in creating, conveying, receiving or accessing the proprietary information as well as any information that will be created, conveyed, received or accessed. The system receives data and generates suggested actions and artifacts to aid in the identification, management and/or protection of proprietary information that may result from the circumstances described by the data received. Embodiments can also include receiving data descriptive of a process and determining potential proprietary information that may be involved. Relevant suggested actions and artifacts can also be generated.
REFERENCES:
patent: 5850516 (1998-12-01), Schneier
patent: 5991709 (1999-11-01), Schoen
patent: 6374358 (2002-04-01), Townsend
patent: 6408391 (2002-06-01), Huff et al.
patent: 6535227 (2003-03-01), Fox et al.
patent: 6631473 (2003-10-01), Townsend
patent: 6735701 (2004-05-01), Jacobson
patent: 6925443 (2005-08-01), Baggett et al.
patent: 2003/0065942 (2003-04-01), Lineman et al.
patent: 2003/0154393 (2003-08-01), Young
patent: 2004/0006532 (2004-01-01), Lawrence et al.
patent: 2004/0024693 (2004-02-01), Lawrence
patent: 2004/0024694 (2004-02-01), Lawrence et al.
patent: 2005/0166259 (2005-07-01), Neupart
patent: 0999489 (2000-05-01), None
patent: 1039401 (2000-09-01), None
patent: WO 01/59989 (2001-08-01), None
Tanzer, M. “Keep Spies Out of Your Company”, Personnel Journal, vol. 72, No. 5, May 1993, pp. 44-50.
Tanzer, M. “The Spying Game”, Sales & Marketing Management, vol. 145, No. 6, Jun. 1993, pp. 60-65.
Ubois, J. “Keeping Secrets”, Midrange Systems, vol. 6, No. 18, Sep. 28, 1993, pp. 56-57.
Englman, S. “Securing the Virtual Corporation”, Security Management, vol. 37, No. 11, Nov. 1993, pp. 28-30.
United States Congress “18 USC 90—The Economic Espionage Act of 1996”, 1996.
Farnham, A. “How Safe are Your Secrets?”, Fortune, vol. 136, No. 5, Sep. 8, 1997, pp. 114-120.
Fine, N. “The Economic Espionage Act: Turning Fear into Compliance”, Competitive Intelligence Review, vol. 8, No. 3, Fall 1997.
Fine, N. “Information Loss: Reducing Your Biggest Risk”, downloaded from www.pro-tecdata.com, 1997.
Fine, N. “Competitive Intelligence: An External Threat and an Internal Requirement”, downloaded from www.pro-tecdata.com, 1997.
Pro-Tec Data “Economic Espionage Act Compliance Programs”, downloaded from www.pro-tecdata.com, May 5, 1998.
Pro-Tec Data “Proven Solutions That Work for You”, downloaded from www.pro-tecdata.com, May 5, 1998.
Pagell, R. “Economic Espionage”, Database, vol. 21, No. 4, Aug./Sep. 1998, pp. 23-30.
Power, R. and R. Farrow “Crime and Punishment in Cyberspace”, Network, vol. 13, No. 12, Nov. 1998, p. 84.
Fraumann, E. and J. Koletar “Trade Secret Safeguards”, Security Management, vol. 43, No. 3, Mar. 1999, pp. 63-66.
Bentley, T. “Be Paranoid”, Georgia Trand, vol. 14, No. 12, Aug. 1999, p. 52.
Horowitz, R. “Competitive Intelligence and the Economic Espionage Act”, Society of Competitive Intelligence Professionals, www.scip.org, 1999.
Korzeniowski, P. “Audit and Assessment”, Information Security, Aug. 2000.
Pro-Tec Data “Information Protection Consulting Services”, downloaded from www.pro-tecdata.com, Sep. 14, 2000.
Penttila, C. “Put a Lid on It: Protecting Company Secrets”, Entrepreneur, vol. 28, No. 12, Dec. 2000, p. 110.
Helms, M.M., L.P. Ettkin and D.J. Morris “Shielding Your Company Against Information Compromise”, Information Management & Computer Security, vol. 8, No. 3, 2000, pp. 117-130.
Morris, D.J., L.P. Ettkin and M.M. Helms “Issues in the Illegal Transference of US Information Technologies”, Information Management & Computer Security, vol. 8, No. 4, 2000, pp. 164-172.
Carr, C., J. Morton and J. Furniss “The Economic Espionage Act: Bear Trap or Mousetrap?”, Texas Intellectual Property Law Journal, vol. 8, No. 2, Winter 2000, pp. 159-209.
Barth, S. “Protecting the Knowledge Enterprise”, Knowledge Management, Mar. 2001, pp. 44-52.
Xacta “Xacta Web C&A™ 2001 User Guide”, Aug. 27, 2001.
Rothke, B. “Corporate Espionage and What Can Be Done to Prevent It”, Information Systems Security, Nov./Dec. 2001.
Briney, A. “Automating Policies”, Information Security, Oct. 2002.
Erickson, G.S., H.N. Rothberg and C.A. Carr “Knowledge-Sharing in Value-Chain Networks: Certifying Collaborators for Effective Protection Processes”, Advances in Competitiveness Research, vol. 11, No. 1, 2003, pp. 152-164.
Robinson, R.L. “Securing the Corporation: Integrating CI and Security for Proprietary Information Protection”, Competitive Intelligence, vol. 7, No. 2, Mar.-Apr. 2004, pp. 24-28.
Brown Jr., A., T. Osborn, J.M. Chan and V. Jaganathan “Managing Intellectual Capital”, Research Technology Management, vol. 48, No. 6, Nov./Dec. 2005, pp. 34-41.
Atluri, V. and W-K Huang “An Authorization Model for Workflows”, Proceedings of the 4thEuropean Symposium on Research in Computer Security, Sep. 25-27, 1996.
Government of Japan, IT Security Promotion Committee “Guidelines for IT Security Policy”, downloaded from www.kantei.go.jp/foreign/it/security/2001/policy—guidelines.pdf, Jul. 18, 2000.
Varrassi, P.J. “Security Policies in the Workplace”, transcript of a webcast, downloaded from searchsecurity.techtarget.com, Mar. 29, 2001.
Palmer, M.E., C. Robinson, J.C. Patilla and E.P. Moser “Information Security Policy Framework: Best Practices for Security Policy in the E-Commerce Age”, Information Systems Security, vol. 10, Issue 2, May/Jun. 2001, pp. 13-27.
NetVision “NetVision Unveils Policy Management Suite”, press release, Aug. 13, 2001.
PentaSafe “Using People Assets to Protect Information Assets: Understanding the “Human Factor” of Information Security”, white paper, downloaded from www.pentasafe.com, 2001.
Marcinkowski, S.J. and J.M. Stanton “Motivational Aspects of Information Security Policies”, Proceedings of the IEEE International Conference on Systems, Man and Cybernetics, Oct. 5-8, 2003, pp. 2527-2532.
Lacey, D. “Taking the Pain Out of IT Regulatory Compliance”, white paper, downloaded from www.brabeion. com, May 2006.
Brabeion “Easing the Audit—Part II”, white paper, downloaded from www.brabeion.com, 2006.
Brabeion “Enterprise Security Architecture System”, white paper, downloaded from www.brabeion.com, undated.
Wood, C.C. “Information Security Policies Made Easy”, Version 6, Baseline Software, Inc., pp. 1-32, 156-158, 163-168, 198-204, 345-346, 386-464, 1997. ISBN 1-881585-04-2. QA76.9.A25 W664 1997.
Kincart Joseph P.
Wassum Luke S
LandOfFree
Proprietary information identification, management and... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Proprietary information identification, management and..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Proprietary information identification, management and... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3886183