1
Fred Thomas Fred Thomas
Thomas Fred C Iii, Watson Brent, Fowler Steven M, Bero James M, Taylor Wilhelm: Distributed cryptography technique for protecting removable data storage media. Iomega, September 5, 2001: EP1130494-A2 (3 worldwide citation)

An apparatus, system and technique for cryptographically securing data in a secure computing environment are provided. Different components of a computer system have associated cryptographic data that is either common to the enterprise or unique to the system component for a given file transfer. In ...


2
Fred Thomas Fred Thomas
Thomas Fred C Iii, Bero James M, Watson Brent, Taylor Wilhelm, Fowler Steven M: Detachable data storage system protected with encryption. Iomega, September 7, 2001: JP2001-243105 (1 worldwide citation)

PROBLEM TO BE SOLVED: To provide a distributed encryption method for a portable storage system.SOLUTION: A computer system has a common cipher data component (C) for an enterprise system to transfer files and a unique cipher data component (U). One or more users (300), a host (90), a data storage (5 ...


3
Fred Thomas Fred Thomas
Fred C Thomas III: Method and apparatus for secure transmission of identifier for removable storage media. Jerry W Mills Esq, Baker Botts, October 24, 2002: US20020157011-A1

A media serial number (MS#) for a removable data storage cartridge (22) is asymmetrically encrypted using a private key (106) from a key list (103) which never leaves the factory. This factory encrypted value (FEMS#) is stored in a secure memory device (46) in the cartridge, along with an identifier ...


4
James Kraemer Ph.D.
Robert R Friedlander, Richard A Hennessy, James R Kraemer: System and method for deriving a hierarchical event based database optimized for analysis of criminal and security information. International Business Machines Corporation, Yee & Associates P C, John R Pivnichny, July 6, 2010: US07752154 (61 worldwide citation)

A computer implemented method, apparatus, and computer usable program code for inferring a probability of a first inference absent from a database at which a query regarding the inference is received. Each datum of the database is conformed to the dimensions of the database. Each datum of the plural ...


5
James Kraemer Ph.D.
Robert R Friedlander, James R Kraemer: Inference of anomalous behavior of members of cohorts and associate actors related to the anomalous behavior. International Business Machines Corporation, Yee & Associates P C, September 28, 2010: US07805391 (54 worldwide citation)

Inferring a probability of a first inference absent from a database at which a query regarding the inference is received. The first inference relates to identifying anomalous behavior of cohorts members, which identification can be used to identify crimes that are particularly difficult to detect, s ...


6
James Kraemer Ph.D.
Robert R Friedlander, Richard A Hennessy, James R Kraemer: System and method for deriving a hierarchical event based database optimized for analysis of biological systems. International Business Machines Corporation, Yee & Associates P C, John R Pivnichny, August 24, 2010: US07783586 (50 worldwide citation)

A computer implemented method, apparatus, and computer usable program code for inferring a probability of a first inference absent from a database at which a query regarding the inference is received. Each datum of the database is conformed to the dimensions of the database. Each datum of the plural ...


7
James Kraemer Ph.D.
Robert R Friedlander, Richard A Hennessy, James R Kraemer: System and method for deriving a hierarchical event based database optimized for analysis of chaotic events. International Business Machines Corporation, Yee & Associates P C, John R Pivnichny, September 7, 2010: US07792774 (47 worldwide citation)

A computer implemented method, apparatus, and computer usable program code for inferring a probability of a first inference absent from a database at which a query regarding the inference is received. Each datum of the database is conformed to the dimensions of the database. Each datum of the plural ...


8
James Kraemer Ph.D.
Robert R Friedlander, Richard A Hennessy, James R Kraemer: System and method for deriving a hierarchical event based database optimized for privacy and security filtering. International Business Machines Corporation, Yee & Associates P C, John R Pivnichny, April 20, 2010: US07702605 (45 worldwide citation)

Inferring a probability of a first inference absent from a database. Each datum of the database is conformed to the dimensions of the database. Each datum of the plurality of data has associated metadata and an associated key. The associated metadata includes data regarding cohorts associated with t ...


9
James Kraemer Ph.D.
Robert R Friedlander, Richard A Hennessy, James R Kraemer: System and method for deriving a hierarchical event based database optimized for clinical applications. International Business Machines Corporation, Yee & Associates P C, John R Pivnichny, August 31, 2010: US07788202 (43 worldwide citation)

A computer implemented method, apparatus, and computer usable program code for inferring a probability of a first inference absent from a database at which a query regarding the inference is received. Each datum of the database is conformed to the dimensions of the database. Each datum of the plural ...


10
James Kraemer Ph.D.
Robert R Friedlander, Richard A Hennessy, James R Kraemer: System and method of accident investigation for complex situations involving numerous known and unknown factors along with their probabilistic weightings. International Business Machines Corporation, Yee & Associates P C, John R Pivnichny, August 31, 2010: US07788203 (41 worldwide citation)

A computer implemented method, apparatus, and computer usable program code for inferring a probability of a first inference related to a chaotic event. Each datum of the database is conformed to the dimensions of the database. Each datum of the plurality of data has associated metadata and an associ ...