US 7,322,047 B2 | ||
Data security system and method associated with data mining | ||
Ron M. Redlich, Miami Beach, Fla. (US); and Martin A. Nemzow, Miami Beach, Fla. (US) | ||
Assigned to Digital Doors, Inc., Miami Beach, Fla. (US) | ||
Filed on Dec. 31, 2002, as Appl. No. 10/277,196. | ||
Application 10/277196 is a continuation in part of application No. 10/155192, filed on May 23, 2002. | ||
Application 10/155192 is a continuation in part of application No. 10/155525, filed on May 23, 2002, granted, now 7,191,252. | ||
Application 10/155525 is a continuation in part of application No. 10/008209, filed on Dec. 06, 2001, granted, now 7,140,044. | ||
Application 10/008209 is a continuation in part of application No. 10/008218, filed on Dec. 06, 2001, granted, now 7,146,644. | ||
Application 10/008218 is a continuation in part of application No. 09/916397, filed on Jul. 27, 2001, granted, now 7,103,915. | ||
Claims priority of provisional application 60/400062, filed on Aug. 02, 2002. | ||
Claims priority of provisional application 60/400112, filed on Aug. 02, 2002. | ||
Claims priority of provisional application 60/400406, filed on Aug. 02, 2002. | ||
Claims priority of provisional application 60/400407, filed on Aug. 02, 2002. | ||
Claims priority of provisional application 60/260398, filed on Jan. 09, 2001. | ||
Claims priority of provisional application 60/287813, filed on May 02, 2001. | ||
Claims priority of provisional application 60/267944, filed on Feb. 12, 2001. | ||
Claims priority of provisional application 60/247242, filed on Nov. 13, 2000. | ||
Claims priority of provisional application 60/247232, filed on Nov. 13, 2000. | ||
Prior Publication US 2003/0120949 A1, Jun. 26, 2003 | ||
This patent is subject to a terminal disclaimer. | ||
Int. Cl. G06F 7/00 (2006.01); G06F 17/00 (2006.01); H04L 9/14 (2006.01) |
U.S. Cl. 726—27 [713/166; 713/193; 715/530; 715/540] | 90 Claims |
1. A method of securing data based upon a plurality of security levels, each with a predetermined security clearance, in a
computer system having a plurality of computers therein and a plurality of memories designated as a remainder store and a
plurality of extract stores for respective ones of said plurality of security levels operatively coupled over a communications
network, said data having security sensitive content represented by one or more security sensitive words, data objects, characters,
images, data elements or icons, comprising:
extracting said security sensitive content from said data to obtain (a) subsets of extracted data and (b) remainder data;
storing said extracted data and said remainder data in respective extract stores, corresponding to the respective security
level of the extracted data, and said remainder store, respectively; and,
permitting reconstruction of some or all of said data via one or more of said subsets of extracted data from respective extract
stores and remainder data only in the presence of predetermined security clearance for said respective security level corresponding
to said respective extract stores.
|