Patents by Inventor Martin A. Nemzow

Martin A. Nemzow has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10250640
    Abstract: Method of organizing and storing data in an information infrastructure by either processing data throughput or a method for processing data throughput or data mining in a distributed computing system works using a tagging routine. The system and method operates on sensitive content (e.g., trade secrets) or select content (e.g., critical content) and applies configurable filters (expanding, contracting, hierarchical/orthogonal classifier filters) to separate and store sensitive/select data in designated, distributed data stores or to supplement data collections. Sensitive/select data stores may have security clearance requirements. Data output is controlled to provide one or more of storage in predetermined data stores, data mining, coping, transfer to other storage sites, supplemental data searches, and presentation subject to data inquiry.
    Type: Grant
    Filed: January 15, 2015
    Date of Patent: April 2, 2019
    Inventors: Ron M. Redlich, Martin A. Nemzow
  • Patent number: 10250639
    Abstract: Method of processing and organizing (sometimes sanitizing) data throughput in an information infrastructure of a distributed computing system with configurable filters. Data stores are created with the data throughput. Filters operate on data to locate, extract, separate and store sensitive content (e.g., trade secrets) or select content (e.g., critical content) in designated, distributed data stores. Configurable filters expand sensitive/select data throughput, contract throughput, inferencing throughput, and hierarchical/orthogonal classifier filters reorganize the sensitive/select data, all to segment and store sensitive/select data in designated stores. Data output enables (a) sanitation; (b) data storage organization; (c) classification; (d) application of data processing (copying, distribution, archiving, etc.).
    Type: Grant
    Filed: January 15, 2015
    Date of Patent: April 2, 2019
    Inventors: Ron M. Redlich, Martin A. Nemzow
  • Patent number: 10182073
    Abstract: Method of creating an information infrastructure for processing data throughput or a method for processing data throughput in a distributed computing system works on sensitive content (e.g., trade secrets) or select content (e.g., critical content) and generates or reduces sensitive/select data with configurable filters (expanding, contracting, hierarchical/orthogonal classifier filters) to separate and store sensitive/select data in designated, distributed data stores. Sensitive/select data stores may have security clearance requirements.
    Type: Grant
    Filed: January 15, 2015
    Date of Patent: January 15, 2019
    Inventors: Ron M. Redlich, Martin A. Nemzow
  • Patent number: 9734169
    Abstract: Distributed computer system processes data having select content (SC) represented by one or more predetermined words, characters, etc. The system has a plurality of SC data stores in a server cloud for respective security designated (Sec-D) data and granular data, each with respective access controls thereat. The data stores are operatively coupled on a network. An identification module identifies SC and granular data stores for the respective data in the server cloud. A processor activates data stores in the server cloud thereby permitting access to the SC data and granular stores based upon an application of one or more access controls thereat. The processor has a reconstruction module operating as a data process employing the respective access controls to combine one or more of the Sec-D data and granular data.
    Type: Grant
    Filed: May 23, 2013
    Date of Patent: August 15, 2017
    Assignee: Digital Doors, Inc.
    Inventors: Ron M. Redlich, Martin A. Nemzow
  • Patent number: 9311499
    Abstract: The method, program and information processing system secures data, and particularly security sensitive words, characters or data objects in the data, in a computer system with territorial, geographic and triggering event protocols. The method and system determines device location within or without a predetermined region and then extracts security data from the file, text, data object or whatever. The extracted data is separated from the remainder data and stored either on media in a local drive or remotely, typically via wireless network, to a remote store. Encryption is used to further enhance security levels. Extraction may be automatic, when the portable device is beyond a predetermined territory, or triggered by an event, such a “save document” or a time-out routine. Reconstruction of the data is permitted only with security clearance and within certain geographic territories. An information processing system for securing data is also described.
    Type: Grant
    Filed: March 13, 2009
    Date of Patent: April 12, 2016
    Inventors: Ron M. Redlich, Martin A. Nemzow
  • Publication number: 20150199410
    Abstract: Method of creating data stores by either processing data throughput or a method for processing data throughput or data mining in a distributed computing system works. The system and method operates on sensitive content (e.g., trade secrets) or select content (e.g., critical content) and applies configurable filters (expanding, contracting, hierarchical/orthogonal classifier filters) to separate and store sensitive/select data in designated, distributed data stores or to supplement data collections. Sensitive/select data stores may have security clearance requirements.
    Type: Application
    Filed: January 15, 2015
    Publication date: July 16, 2015
    Inventors: Ron M. Redlich, Martin A. Nemzow
  • Publication number: 20150200967
    Abstract: Method of creating an information infrastructure for processing data throughput or a method for processing data throughput in a distributed computing system works on sensitive content (e.g., trade secrets) or select content (e.g., critical content) and generates or reduces sensitive/select data with configurable filters (expanding, contracting, hierarchical/orthogonal classifier filters) to separate and store sensitive/select data in designated, distributed data stores. Sensitive/select data stores may have security clearance requirements.
    Type: Application
    Filed: January 15, 2015
    Publication date: July 16, 2015
    Inventors: Ron M. Redlich, Martin A. Nemzow
  • Publication number: 20150199405
    Abstract: Method of processing and organizing (sometimes sanitizing) data throughput in an information infrastructure of a distributed computing system with configurable filters. Data stores are created with the data throughput. Filters operate on data to locate, extract, separate and store sensitive content (e.g., trade secrets) or select content (e.g., critical content) in designated, distributed data stores. Configurable filters expand sensitive/select data throughput, contract throughput, inferencing throughput, and hierarchical/orthogonal classifier filters reorganize the sensitive/select data, all to segment and store sensitive/select data in designated stores. Data output enables (a) sanitation; (b) data storage organization; (c) classification; (d) application of data processing (copying, distribution, archiving, etc.).
    Type: Application
    Filed: January 15, 2015
    Publication date: July 16, 2015
    Inventors: Ron M. Redlich, Martin A. Nemzow
  • Publication number: 20150156206
    Abstract: Method and system of organizing and processing data in a distributed computing system having designated, distributed data stores for sensitive content (e.g., trade secrets) or select content (e.g., critical content). Sensitive/select data is extracted via configurable filters and stored in the designated data stores, sometimes subject to security controls, with limiting distribution functions and controlled release of the sensitive/select data. Distribution is limited due to designated, configurable filters.
    Type: Application
    Filed: January 15, 2015
    Publication date: June 4, 2015
    Inventors: Ron M. Redlich, Martin A. Nemzow
  • Publication number: 20150149491
    Abstract: Method of organizing and storing data in an information infrastructure by either processing data throughput or a method for processing data throughput or data mining in a distributed computing system works using a tagging routine. The system and method operates on sensitive content (e.g., trade secrets) or select content (e.g., critical content) and applies configurable filters (expanding, contracting, hierarchical/orthogonal classifier filters) to separate and store sensitive/select data in designated, distributed data stores or to supplement data collections. Sensitive/select data stores may have security clearance requirements. Data output is controlled to provide one or more of storage in predetermined data stores, data mining, coping, transfer to other storage sites, supplemental data searches, and presentation subject to data inquiry.
    Type: Application
    Filed: January 15, 2015
    Publication date: May 28, 2015
    Inventors: Ron M. Redlich, Martin A. Nemzow
  • Patent number: 9015301
    Abstract: The present invention is a method of organizing and processing data in a distributed computing system. The invention is also implemented as a computer program on a computer medium and as a distributed computer system. Software modules can be configured as hardware. The method and system organizes select content which is important to an enterprise operating said distributed computing system. The select content is represented by one or more predetermined words, characters, images, data elements or data objects. The computing system has a plurality of select content data stores for respective ones of a plurality of enterprise designated categorical filters which include content-based filters, contextual filters and taxonomic classification filters, all operatively coupled over a communications network.
    Type: Grant
    Filed: May 9, 2007
    Date of Patent: April 21, 2015
    Assignee: Digital Doors, Inc.
    Inventors: Ron M. Redlich, Martin A. Nemzow
  • Patent number: 8677505
    Abstract: The method for securing data includes establishing a group of security sensitive items, filtering data and extracting and separating the security items from remainder data. The filtered data are separately stored (locally on a PC or on another computer in a LAN or WAN or on the Internet.) A map may be generated. The filter and/or map may be destroyed or stored. The data input, extracted data and remainder data may be deleted from the originating computer. Encryption may be utilized to enhance security (including transfers of data, filter and map). Reconstruction of the data is permitted only in the presence of a predetermined security clearance. A plurality of security clearances may be used to enable a corresponding plurality of partial, reconstructed views of the plaintext (omitting higher security words).
    Type: Grant
    Filed: September 6, 2007
    Date of Patent: March 18, 2014
    Assignee: Digital Doors, Inc.
    Inventors: Ron M. Redlich, Martin A. Nemzow
  • Patent number: 8655939
    Abstract: A method and system processes data in a distributed computing system to survive an electromagnetic pulse (EMP) attack. The computing system has proximal select content (SC) data stores and geographically distributed distal data stores, all with respective access controls. The data input or put through the computing system is processed to obtain the SC and other associated content. The process then extracts and stores such content in the proximal SC data stores and geographically distributed distal SC data stores. The system further processes data to geographically distribute the data with data processes including: copy, extract, archive, distribute, and a copy-extract-archive and distribute process with a sequential and supplemental data destruction process. In this manner, the data input is distributed or spread out over the geographically distributed distal SC data stores. The system and method permits reconstruction of the processed data only in the presence of a respective access control.
    Type: Grant
    Filed: September 8, 2009
    Date of Patent: February 18, 2014
    Assignee: Digital Doors, Inc.
    Inventors: Ron M. Redlich, Martin A. Nemzow
  • Publication number: 20130304761
    Abstract: Distributed computer system processes data having select content (SC) represented by one or more predetermined words, characters, etc. The system has a plurality of SC data stores in a server cloud for respective security designated (Sec-D) data and scarcity designated (S-D) data, each with respective access controls thereat. The SC data stores are is operatively coupled on a network. An identification module for identifying SC data stores for the Sec-D data and S-D data in the server cloud. A processor activates an SC data stores in the server cloud thereby permitting access to the SC data stores and respective Sec-D data and S-D data based upon an application of one or more of said access controls thereat. The processor has a reconstruction module operating as a data process employing the respective access controls to combine one or more of the Sec-D data and S-D data.
    Type: Application
    Filed: May 23, 2013
    Publication date: November 14, 2013
    Inventors: Ron M. Redlich, Martin A. Nemzow
  • Patent number: 8533840
    Abstract: The method of quantifying risk, implemented as a computerized program, quantifies the risk of releasing security sensitive words, data objects, characters or icons which may be part of data subject to analysis (target data). Security words, etc. are categorized, pre-existing data for each category is obtained and the categories (and subsumed pre-existing data) are ranked by risk. The target data is compared to the compiled pre-existing data and a risk output is generated. For unknown or undefined words, an indeterminable category is created and is ranked. The method may include inference engines, and contextual routines to add semantic equivalents and opposites to the critical list. Search engines may be employed to add to the list. A differential rank quantifier is assigned to the security words, etc. which has a different rank than the associated category. Frequency analysis, source analysis and stochastic analysis is also used. The risk output is altered.
    Type: Grant
    Filed: March 25, 2003
    Date of Patent: September 10, 2013
    Assignee: DigitalDoors, Inc.
    Inventors: Ron M. Redlich, Martin A. Nemzow
  • Patent number: 8468244
    Abstract: Distributed computer system processes data having select content (SC) represented by one or more predetermined words, characters, etc. The system has a plurality of SC data stores in a server cloud for respective security designated (Sec-D) data and granular data, each with respective access controls thereat. The data stores are operatively coupled over a network. An identification module identifies SC data and granular data stores for in the server cloud. A processor activates data stores in the server cloud thereby permitting access to the SC data and granular data stores based upon an application of access controls thereat. The processor has a reconstruction module operating as a data process employing the respective access controls to combine one or more of the Sec-D data and granular data.
    Type: Grant
    Filed: April 29, 2009
    Date of Patent: June 18, 2013
    Assignee: Digital Doors, Inc.
    Inventors: Ron M. Redlich, Martin A. Nemzow
  • Patent number: 8423565
    Abstract: Search engine process operates on data collections to expand a user's knowledge about select content (SC) words, data objects, etc. A prioritized hierarchical taxonomic system (H-tax-sys) encompasses some SC is set, input data is classified thereto, and non-matching data (non-SC) is identified. The non-SC are used as a search terms. Additionally-optionally, the process identifies input data as SC per n priority H-tax, and uses these as search terms. Additionally-optionally, input data matching SC is added as search terms. Additionally-optionally, search terms are extracted from the input based upon H-tax. Supplemental documents are gathered, H-tax classified, mapped and represented with and without mapped search terms.
    Type: Grant
    Filed: December 21, 2006
    Date of Patent: April 16, 2013
    Assignee: Digital Doors, Inc.
    Inventors: Ron M. Redlich, Martin A. Nemzow
  • Patent number: 8176563
    Abstract: The method, program and system secures sensitive data/objects found in a data source document with an editor. The simple editor identifies and displays, in situ, the sensitive words/objects per each security level. Level tags are inserted and adjunctive words/objects are marked/displayed per the level's protocol. The precursor document is processed to extract sensitive and adjunctive words/objects. The stripped data is either separately stored or partial versions of the secured document are stored per protocol. A comprehensive editor secures content data and meta data contained in a data document object model (DOM). The editor maps the source document root, branch and leaf components as binary files populated with content data and meta data. Security introns, earlier identified based upon the level's informational attributes, are excluded. Security exons are copied from the source content and meta data binary files into a security safe document (template). Filtration, extraction, dispersal and storage follow.
    Type: Grant
    Filed: November 26, 2004
    Date of Patent: May 8, 2012
    Assignee: DigitalDoors, Inc.
    Inventors: Ron M. Redlich, Martin A. Nemzow
  • Patent number: 7958268
    Abstract: Data security for processing data or securing browser-input data operates on security sensitive content which is extracted, then either encrypted or stored in remote extract stores, and processed separate from remainder data. Extracted data, in one system, is remotely stored. Other methods attach, append, add or insert an encrypted version of the extract content to the document. The browser system operates with an extract store. Remainder data is sent to the addressee or designated client by the web server. The addressee is permitted to retrieve the extracted data from said extract store only with a security clearance and hence, reconstruct the source input data with the extract data. In other systems, the addressee reconstructs the input by decryption and integration. The browser method extracts data, facilitates the storage, forwards the remainder data to a target. Financial data or credit card scrubber may use pop-up windows for enablement.
    Type: Grant
    Filed: March 7, 2007
    Date of Patent: June 7, 2011
    Assignee: Digital Doors, Inc.
    Inventors: Ron M. Redlich, Martin A. Nemzow
  • Publication number: 20100250497
    Abstract: A method and system processes data in a distributed computing system to survive an electromagnetic pulse (EMP) attack. The computing system has proximal select content (SC) data stores and geographically distributed distal data stores, all with respective access controls. The data input or put through the computing system is processed to obtain the SC and other associated content. The process then extracts and stores such content in the proximal SC data stores and geographically distributed distal SC data stores. The system further processes data to geographically distribute the data with data processes including: copy, extract, archive, distribute, and a copy-extract-archive and distribute process with a sequential and supplemental data destruction process. In this manner, the data input is distributed or spread out over the geographically distributed distal SC data stores. The system and method permits reconstruction of the processed data only in the presence of a respective access control.
    Type: Application
    Filed: September 8, 2009
    Publication date: September 30, 2010
    Inventors: Ron M. Redlich, Martin A. Nemzow