Patents by Inventor Ron Redlich

Ron Redlich has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20070150965
    Abstract: Data security for processing data or securing browser-input data operates on security sensitive content which is extracted, then either encrypted or stored in remote extract stores, and processed separate from remainder data. Extracted data, in one system, is remotely stored. Other methods attach, append, add or insert an encrypted version of the extract content to the document. The browser system operates with an extract store. Remainder data is sent to the addressee or designated client by the web server. The addressee is permitted to retrieve the extracted data from said extract store only with a security clearance and hence, reconstruct the source input data with the extract data. In other systems, the addressee reconstructs the input by decryption and integration. The browser method extracts data, facilitates the storage, forwards the remainder data to a target. Financial data or credit card scrubber may use pop-up windows for enablement.
    Type: Application
    Filed: March 7, 2007
    Publication date: June 28, 2007
    Inventors: Ron Redlich, Martin Nemzow
  • Publication number: 20070101436
    Abstract: The method for securing data in a distributed computer system for security sensitive content includes granularly extracting sensitive content, per security level, from remainder data. The security sensitive content is classified into security levels, each having a security clearance. The extracted data is remotely stored in extract stores. The controlled release of extracted data occurs with the appropriate security clearances. Maps of storage sites and filters for repetitive extraction may be employed, stored and then sometimes destroyed. The data input, extracted data and remainder data may be deleted from the originating source. Encryption, unique to each security level, enhances security (preferably during transfers, storage and retrieval). Full or partial reconstruction of the data is permitted with security clearances. An information processing system is encompassed.
    Type: Application
    Filed: August 17, 2006
    Publication date: May 3, 2007
    Inventors: Ron Redlich, Martin Nemzow
  • Publication number: 20070006326
    Abstract: The method for securing data in a server-client computer system for security sensitive content includes extracting sensitive content and separating the security sensitive content from remainder data. The security sensitive content is grouped into security levels, each with a security clearance. The extracted data, for each security level, is remotely stored in extract stores. A map of storage sites may be generated. The filter and/or map may be destroyed or stored. The data input, extracted data and remainder data may be deleted from the originating computer. Encryption may be utilized to enhance security (including transfers of data, filter and map). Full or partial reconstruction of the data is permitted only in the presence of predetermined security clearances. The extraction and storage can be done on the input client computer or the web-based server. A computer readable medium containing programming instructions and an information processing system is encompassed.
    Type: Application
    Filed: August 17, 2006
    Publication date: January 4, 2007
    Inventors: Ron Redlich, Martin Nemzow
  • Publication number: 20060288425
    Abstract: The method for securing data on a personal computer having security sensitive content grouped into security levels, each with a clearance code, includes filtering and extracting sensitive content by security level and separately storing the security content in remote extract stores. Remainder data is stored locally or remotely. A map for selected extract stores may be generated. The filter and/or map may be destroyed or stored. The data input, extracted data and remainder data may be deleted from the originating computer. Encryption may be utilized to enhance security (including transfers of data, filter and map). Reconstruction of the data is permitted only in the presence of a predetermined security clearance. Full or partial reconstruction is possible, based upon the security clearances. A computer readable medium containing programming instructions and an information processing system is encompassed.
    Type: Application
    Filed: August 17, 2006
    Publication date: December 21, 2006
    Inventors: Ron Redlich, Martin Nemzow
  • Publication number: 20050138110
    Abstract: The method, program and information processing system secures data, and particularly security sensitive words, characters or data objects in the data, in a computer system with multiple independent levels of security (MILS). Each level of MILS has a computer sub-network with networked workstations. The MILS sub-networks are connected together via security guard computer(s) and each guard computer has separate memories for each level (TS, S, C, UC(or remainder)). The method extracts the security sensitive words/data (a granular action), from the source document for each MILS level, stores the extracted data in a corresponding extract store for each level and permits reconstruction/reassembly of the dispersed data via said extracted data at each said level of said multiple security levels and remainder data only in the presence of a predetermined security clearance commensurate with each MILS level.
    Type: Application
    Filed: November 26, 2004
    Publication date: June 23, 2005
    Inventors: Ron Redlich, Martin Nemzow
  • Publication number: 20050138109
    Abstract: The method, program and information processing system involves filtering and securing data (security sensitive words-characters-data objects) in a source document. The adaptive filter uses a compilation of additional data (typically networked) and identifies the sensitive words/objects in the compilation of additional data, retrieves contextual, semiotic and taxonomic words/objects from the additional data compilation that are related to the sensitive words/objects. A filter is compiled with the retrieved data and the filter is used to extract sensitive words/objects and the retrieved data (words/objects) from the source document to obtain extracted data and remainder data therefrom. Contextual words related to the security sensitive words/objects are obtained based upon statistical analysis of the additional data compilation.
    Type: Application
    Filed: November 26, 2004
    Publication date: June 23, 2005
    Inventors: Ron Redlich, Martin Nemzow
  • Publication number: 20050132070
    Abstract: The method, program and system secures sensitive data/objects found in a data source document with an editor. The simple editor identifies and displays, in situ, the sensitive words/objects per each security level. Level tags are inserted and adjunctive words/objects are marked/displayed per the level's protocol. The precursor document is processed to extract sensitive and adjunctive words/objects. The stripped data is either separately stored or partial versions of the secured document are stored per protocol. A comprehensive editor secures content data and meta data contained in a data document object model (DOM). The editor maps the source document root, branch and leaf components as binary files populated with content data and meta data. Security introns, earlier identified based upon the level's informational attributes, are excluded. Security exons are copied from the source content and meta data binary files into a security safe document (template). Filtration, extraction, dispersal and storage follow.
    Type: Application
    Filed: November 26, 2004
    Publication date: June 16, 2005
    Inventors: Ron Redlich, Martin Nemzow