1
Ron M Redlich, Martin A Nemzow: Data security system and method for separation of user communities. Digital Doors, Robert C Kain Jr, Fleit Kain, November 21, 2006: US07140044 (764 worldwide citation)

Data is secured in a computer network to transparently establish and manage a separation of user-based communities of interest based upon crypto-graphically separated, need to know, security levels. Data from a source document, data object or data stream is filtered to form subsets of extracted data ...


2
Ron M Redlich, Martin A Nemzow: Data security system and method responsive to electronic attacks. Digital Doors, Robert C Kain Jr, Fleit Kain, December 5, 2006: US07146644 (676 worldwide citation)

An adaptive method, system and program for securing data against a plurality of electronic and environmental events directed at computers utilizes a hacking monitor which generates attack warnings (such as a hacking warning) dependent upon the severity of the attack. Based upon these warnings, data ...


3
Ron M Redlich, Martin A Nemzow: Data security system and method. Digital Doors, Robert C Kain Jr, Fleit Kain, September 5, 2006: US07103915 (654 worldwide citation)

The method for securing data includes establishing a group of security sensitive items, filtering data and extracting and separating the security items from remainder data. The filtered data are separately stored (locally on a PC or on another computer in a LAN or WAN or on the Internet.) A map may ...


4
John Yin: Data security system and method. RedCreek Communications, Gray Cary Ware & Freidenrich, February 22, 2000: US06028939 (126 worldwide citation)

A data security system and method for providing a cryptographic process such as the Data Encryption Standard comprises a microprocessor having a programmable hardware element such as a field programmable gate array interfaced to the processor bus. The predetermined ordered sequence of operations whi ...


5
Ron M Redlich, Martin A Nemzow: Data security system and method adjunct to e-mail, browser or telecom program. Digital Doors, Robert C Kain Jr, Fleit Kain, March 13, 2007: US07191252 (121 worldwide citation)

Data security for e-mail or browser-input data operates on identified security sensitive words, characters or icons which are extracted leaving remainder data. Extracted data, in one system, is stored in a remote, extract store in a distributed computer system. Other methods attach an encrypted vers ...


6
Robert David Thomson, Roger Geiwitz: Data security system and method. MCI Corporation, May 12, 1998: US05751949 (81 worldwide citation)

A security system and method are provided for securing user access to server tables having data arranged in rows and columns. The server table is contained in a server computer which is accessible by a plurality of user terminals joined thereto. The server computer includes relational database softw ...


7
Ron M Redlich, Martin A Nemzow: Data security system and method for portable device. Digital Doors, Robert C Kain Jr, Fleit Kain, December 25, 2007: US07313825 (73 worldwide citation)

The method, used with a portable computing device, secures security sensitive words, icons, etc. by determining device location within or without a predetermined region and then extracting the security data from the file, text, data object or whatever. The extracted data is separated from the remain ...


8
Ron M Redlich, Martin A Nemzow: Data security system and method with adaptive filter. Digital Doors, Robert C Kain Jr, June 9, 2009: US07546334 (72 worldwide citation)

A method, program and information processing system filters and secures data (security sensitive words-characters-data objects) in a source document. The adaptive filter uses a compilation of additional data (typically networked) and identifies the sensitive words/objects in the compilation of addit ...


9
Ron M Redlich, Martin A Nemzow: Data security system and method with multiple independent levels of security. DigitalDoors, Robert C Kain Jr, February 23, 2010: US07669051 (64 worldwide citation)

The method, program and information processing system secures data, and particularly security sensitive words, characters or data objects in the data, in a computer system with multiple independent levels of security (MILS). Each level of MILS has a computer sub-network with networked workstations. ...


10
Phyllis A Schneck, Karsten Schwan, Santosh Chokhani: Adaptive data security system and method. Georgia Tech Research Corporation, Thomas Kayden Horstemeyer & Risley, January 21, 2003: US06510349 (64 worldwide citation)

A system and method for data communication with adaptive security in which a send host transmits a data stream to a receive host in packets which contain an authentication data block with an authentication header and a signature block. The authentication header advantageously contains various fields ...