1
Denis Jacques Paul Garcia: Secured data format for access control. Guardian Data Storage, Sterne Kessler Goldstein & Fox P L L C, May 27, 2008: US07380120 (127 worldwide citation)

In a system for providing access control management to electronic data, techniques to secure the electronic data and keep the electronic data secured at all times are disclosed. According to one embodiment, a secured file or secured document includes two parts: an attachment, referred to as a header ...


2
Alain Rossmann, Patrick Zuili, Michael Michio Ouya, Serge Humpich, Chang Ping Lee, Klimenty Vainstein, Hal Hilderbrand, Denis Jacques Paul Garcia, Senthilvasan Supramaniam, Weiqing Huang, Nicholas Michael Ryan: Method and architecture for providing pervasive security to digital assets. Guardian Data Storage, Sterne Kessler Goldstein & Fox P L L C, August 21, 2007: US07260555 (81 worldwide citation)

Techniques for providing pervasive security to digital assets are disclosed. According to one aspect of the techniques, a server is configured to provide access control (AC) management for a user (e.g., a single user, a group of users, software agents or devices) with a need to access secured data. ...


3
Denis Jacques Paul Garcia: Method and apparatus for securing digital assets. PSS Systems, Carr & Ferrell, February 13, 2007: US07178033 (78 worldwide citation)

Digital assets are in a secured form that only those with granted access rights can access. Even with the proper access privilege, when a secured file is classified, at least a security clearance key is needed to ensure those who have the right security clearance can ultimately access the contents i ...


4
Chang Ping Lee, Denis Jacques Paul Garcia: Method and apparatus for securing electronic data. Sterne Kessler Goldstein & Fox PLLC, March 16, 2010: US07681034 (40 worldwide citation)

Techniques for securing electronic data and keeping the electronic data secured at all times are disclosed. According to one embodiment, a client module in a client machine is configured to provide access control to secured documents that may be located in a local store, another computer machine or ...


5
Rossmann Alain, Patrick Zuili, Michael Michio Ouye, Serge Humpich, Chang Ping Lee, Klimenty Vainstein, Hal Hilderbrand, Denis Jacques Paul Garcia, Senthilvasan Supramaniam, Weiqing Huang, Nicholas Michael Ryan: Managing secured files in designated locations. Sterne Kessler Goldstein & Fox PLLC, June 1, 2010: US07729995 (35 worldwide citation)

Techniques for managing files in a designated location are disclosed. An example of the designated location is a folder, a directory, a repository, a device, or a storage place. A set of access rules is applied to a designated location such that all files in the designated location shall have substa ...


6
Rossmann Alain, Patrick Zuili, Michael Michio Ouye, Serge Humpich, Chang Ping Lee, Klimenty Vainstein, Hal Hilderbrand, Denis Jacques Paul Garcia, Senthilvasan Supramaniam, Weiqing Huang, Nicholas Michael Ryan: Methods and systems for providing access control to electronic data. Sterne Kessler Goldstein & Fox PLLC, March 22, 2011: US07913311 (31 worldwide citation)

Techniques for providing pervasive security to digital assets are disclosed. According to one aspect of the techniques, a server is configured to provide access control (AC) management for a user (e.g., a single user, a group of users, software agents or devices) with a need to access secured data. ...


7
Gary Mark Kinghorn, Denis Jacques Paul Garcia: Method and system for protecting electronic data in enterprise environment. Sterne Kessler Goldstein & Fox PLLC, April 5, 2011: US07921284 (30 worldwide citation)

Even with proper access privilege, when a secured file is classified, at least security clearance (e.g. a clearance key) is needed to ensure those who have the right security clearance can ultimately access the contents in the classified secured file. According to one embodiment, referred to as a tw ...


8
Steven Toye Crocker, Denis Jacques Paul Garcia: Multi-level cryptographic transformations for securing digital assets. Sterne Kessler Goldstein & Fox PLLC, April 19, 2011: US07930756 (22 worldwide citation)

Enhanced multi-level cryptographic transformations that secure electronic files are disclosed. The secured electronic files contain not only secured data but also security information. The security information includes cryptographic structure information, access rules and secrets (e.g., keys). The c ...


9
Hal S Hildebrand, Denis Jacques Paul Garcia: Security system for generating keys from access rules in a decentralized manner and methods therefor. Sterne Kessler Goldstein & Fox PLLC, August 23, 2011: US08006280 (22 worldwide citation)

Improved system and approaches for decentralized key generation are disclosed. The keys that can be generated include both public keys and private keys. The public keys are arbitrary strings that embed or encode access restrictions. The access restrictions are used to enforce access control policies ...


10
Denis Jacques Paul Garcia, Michael Michio Ouye, Alain Rossmann, Steven Toye Crocker, Eric Gilbertson, Weiqing Huang, Serge Humpich, Klimenty Vainstein, Nicholas Michael Ryan: Methods and systems for providing access control to secured data. INTELLECTUAL VENTURES I, Sterne Kessler Goldstein & Fox P L L C, September 8, 2015: US09129120 (6 worldwide citation)

In a system for providing access control management to electronic data, techniques to secure the electronic data and keep the electronic data secured at all times are disclosed. According to one embodiment, a secured file or secured document includes two parts: an attachment, referred to as a header ...