Abstract: A system and method of providing identity theft security is provided. The system and method utilizes a computer program that identifies, locates, secures, and/or removes from computers, computer systems and/or computer networks personally identifying and/or other sensitive information in different data formats. The computer program utilizes a multi-tiered escalation model of searching/identifying sensitive information. The computer program of the instant invention utilizes a self-learning process for fine-tuning a level of scrutiny for identifying potentially sensitive information.
Type:
Grant
Filed:
May 7, 2010
Date of Patent:
June 10, 2014
Assignee:
TouchNet Information Systems, Inc.
Inventors:
Withold J. Grzymala-Busse, Dean R. Vermeire, Daniel J. Toughey
Abstract: A system and method of providing identity theft security is provided. The system and method utilizes a computer program that identifies, locates, secures, and/or removes from computers, computer systems and/or computer networks personally identifying and/or other sensitive information in different data formats. The computer program utilizes a multi-tiered escalation model of searching/identifying sensitive information. The computer program of the instant invention utilizes a self-learning process for fine-tuning a level of scrutiny for identifying potentially sensitive information.
Type:
Grant
Filed:
November 9, 2007
Date of Patent:
August 28, 2012
Assignee:
TouchNet Information Systems, Inc.
Inventors:
Witold J Grzymala-Busse, Dean R. Vermeire, Daniel J Toughey
Abstract: A record layout in a legacy application is defined by the record definition in the source code of the language in which the application was written. For each record in a legacy application, the layout of the record is saved in a language-neutral and architecture neutral format in preparation for a runtime invocation. During runtime, for each record, the legacy application can send architecture-specific binary information as it exists in memory on the legacy computer to a component runtime environment that will construct a compatible object-oriented instance of a class to manipulate the information. Once the information is manipulated, the updated information can be represented to the original legacy application in an architecture-specific binary record layout.
Abstract: A method of operating and communicating with a host computer system is provided using mark-up language inputs and outputs directed by an intermediary which has been previously constructed by formulation of the host data and program structures and host machine characteristics into a system of metadata which allows the reconstruction of requests and results into and out of mark-up languages binary data streams.