1
John P Mansell, William M Riley: Vehicle tracking and security system. Auto Trac, Mason Fenwick & Lawrence, June 29, 1993: US05223844 (1240 worldwide citation)

The present invention provides a vehicle tracking and security system which allows immediate response in case of vehicle theft, an accident, vehicle breakdown, or other emergency. Guardian and tracking functions are provided through Mobile Units installed in hidden locations in vehicles to be monito ...


2
Victor H Shear: Database usage metering and protection system and method. Personal Library Software, Nixon & Vanderhye, May 2, 1989: US04827508 (1001 worldwide citation)

A "return on investment" digital database usage metering, billing, and security system includes a hardware device which is plugged into a computer system bus (or into a serial or other functionally adequate connector) and a software program system resident in the hardware device. One or more databas ...


3
Virupax M Nerlikar: Information management and security system. Texas Instruments Incorporated, Ira S Matsil, James C Kesterson, Richard L Donaldson, May 13, 1997: US05629981 (863 worldwide citation)

A closed loop, (networked) information management and security system which provides a secure, end-to-end fully automated solution for controlling access, transmission, manipulation, and auditability of high value information comprising an RFID transponder badge 302 and an RF reader transceiver 315 ...


4
Victor H Shear: Database usage metering and protection system and method. Electronic Publishing Resources, Nixon & Vanderhye, December 11, 1990: US04977594 (799 worldwide citation)

A "return on investment" digital database usage metering, billing, and security system includes a hardware device which is plugged into a computer system bus (or into a serial or other functionally adequate connector) and a software program system resident in the hardware device. One or more databas ...


5
Ron M Redlich, Martin A Nemzow: Data security system and method for separation of user communities. Digital Doors, Robert C Kain Jr, Fleit Kain, November 21, 2006: US07140044 (764 worldwide citation)

Data is secured in a computer network to transparently establish and manage a separation of user-based communities of interest based upon crypto-graphically separated, need to know, security levels. Data from a source document, data object or data stream is filtered to form subsets of extracted data ...


6
Victor H Shear: Database usage metering and protection system and method. Electronic Publishing Resources, Nixon & Vanderhye, April 25, 1995: US05410598 (704 worldwide citation)

A "return on investment" digital database usage metering, billing, and security system includes a hardware device which is plugged into a computer system bus (or into a serial or other functionally adequate connector) and a software program system resident in the hardware device. One or more databas ...


7
Victor H Shear: Database usage metering and protection system and method. Electronic Publishing Resources, Nixon & Vanderhye, September 17, 1991: US05050213 (683 worldwide citation)

A "return on investment" digital database usage metering, billing, and security system includes a hardware device which is plugged into a computer system bus (or into a serial or other functionally adequate connector) and a software program system resident in the hardware device. One or more data ba ...


8
Ron M Redlich, Martin A Nemzow: Data security system and method responsive to electronic attacks. Digital Doors, Robert C Kain Jr, Fleit Kain, December 5, 2006: US07146644 (676 worldwide citation)

An adaptive method, system and program for securing data against a plurality of electronic and environmental events directed at computers utilizes a hacking monitor which generates attack warnings (such as a hacking warning) dependent upon the severity of the attack. Based upon these warnings, data ...


9
James R Simms, Charles G Simms, Daniel D Moore Jr: Personal security system. Royal W Craig, August 2, 1994: US05334974 (661 worldwide citation)

A fully automatic personal security system which combines the advantages of worldwide LORAN-C or GPS navigation with the substantially worldwide communication capabilities of a cellular telephone or communication satellite. The security system comprises a mobile unit which communicates emergency dat ...


10
Eric M Olden: Security and access management system for web-enabled and non-web-enabled applications and content on a computer network. RSA Security, Testa Hurwitz & Thibeault, October 1, 2002: US06460141 (656 worldwide citation)

A security and access management system provides unified access management to address the specific problems facing the deployment of security for the Web and non-Web environment. Unified access management consists of strategic approaches to unify all key aspects of Web and non-Web security policies, ...