1
James Kraemer Ph.D.
Samuel S Adams, Robert R Friedlander, James R Kraemer, Jeb R Linton: Context-based security screening for accessing data. International Business Machines Corporation, John R Pivnichny, Law Office of Jim Boice, January 6, 2015: US08931109 (2 worldwide citation)

A processor-implemented method, system, and/or computer program product securely accesses a specific data store. A non-contextual data object is associated with a context object to define a first synthetic context-based object. The non-contextual data object ambiguously describes multiple types of p ...


2
Samuel S Adams, Robert R Friedlander, James R Kraemer, Jeb R Linton: Context-based security screening for accessing data. International Business Machines Corporation, John R Pivnichny, Law Office of Jim Boice, November 7, 2017: US09811683 (1 worldwide citation)

A computer system securely accesses a specific data store. A non-contextual data object is associated with a context object to define a first synthetic context-based object. The non-contextual data object ambiguously describes multiple types of persons, and the context object provides a circumstanti ...


3
Samuel S Adams, Robert R Friedlander, James R Kraemer, Jeb R Linton: Context-based security screening for accessing data. International Business Machines Corporation, John R Pivnichny, Law Office of Jim Boice, October 25, 2016: US09477844

A processor-implemented method, system, and/or computer program product securely accesses a specific data store. A non-contextual data object is associated with a context object to define a first synthetic context-based object. The non-contextual data object ambiguously describes multiple types of p ...


4
CONTEXT-BASED SECURITY SCREENING FOR ACCESSING DATA. INTERNATIONAL BUSINESS MACHINES CORPORATION, May 22, 2014: US20140143891-A1

A processor-implemented method, system, and/or computer program product securely accesses a specific data store. A non-contextual data object is associated with a context object to define a first synthetic context-based object. The non-contextual data object ambiguously describes multiple types of p ...


5
CONTEXT-BASED SECURITY SCREENING FOR ACCESSING DATA. February 12, 2015: US20150047057-A1

A processor-implemented method, system, and/or computer program product securely accesses a specific data store. A non-contextual data object is associated with a context object to define a first synthetic context-based object. The non-contextual data object ambiguously describes multiple types of p ...


6
CONTEXT-BASED SECURITY SCREENING FOR ACCESSING DATA. November 17, 2016: US20160335449-A1

A computer system securely accesses a specific data store. A non-contextual data object is associated with a context object to define a first synthetic context-based object. The non-contextual data object ambiguously describes multiple types of persons, and the context object provides a circumstanti ...