Patents by Inventor Stephen Zizzi
Stephen Zizzi has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20160205079Abstract: A system configured to authenticate a user for encryption or decryption includes a user authentication apparatus, a computer-readable medium operable to communicate with the user authentication apparatus, and an encryption and decryption computer communicating with the user authentication apparatus. The computer-readable medium may store user identifying information and encryption and decryption data. The encryption and decryption computer may be configured to receive an application programming interface (API) for interfacing with the user authentication apparatus and receive the user identifying information from the computer-readable medium via the API. A user may be authenticated based on the user identifying information and, once the user is authenticated, the encryption and decryption data may be read.Type: ApplicationFiled: October 29, 2015Publication date: July 14, 2016Applicant: MAZ Encryption Technologies LLCInventor: Stephen Zizzi
-
Patent number: 9203626Abstract: A system configured to authenticate a user for encryption or decryption includes a user authentication apparatus, a computer-readable medium operable to communicate with the user authentication apparatus, and an encryption and decryption computer communicating with the user authentication apparatus. The computer-readable medium may store user identifying information and encryption and decryption data. The encryption and decryption computer may be configured to receive an application programming interface (API) for interfacing with the user authentication apparatus and receive the user identifying information from the computer-readable medium via the API. A user may be authenticated based on the user identifying information and, once the user is authenticated, the encryption and decryption data may be read.Type: GrantFiled: May 14, 2014Date of Patent: December 1, 2015Assignee: MAZ Encryption Technologies LLCInventor: Stephen Zizzi
-
Publication number: 20140250304Abstract: A system configured to authenticate a user for encryption or decryption includes a user authentication apparatus, a computer-readable medium operable to communicate with the user authentication apparatus, and an encryption and decryption computer communicating with the user authentication apparatus. The computer-readable medium may store user identifying information and encryption and decryption data. The encryption and decryption computer may be configured to receive an application programming interface (API) for interfacing with the user authentication apparatus and receive the user identifying information from the computer-readable medium via the API. A user may be authenticated based on the user identifying information and, once the user is authenticated, the encryption and decryption data may be read.Type: ApplicationFiled: May 14, 2014Publication date: September 4, 2014Applicant: MAZ ENCRYPTION TECHNOLOGIES LLCInventor: Stephen Zizzi
-
Patent number: 8762713Abstract: A system configured to authenticate a user for encryption or decryption includes a user authentication apparatus, a computer-readable medium operable to communicate with the user authentication apparatus, and an encryption and decryption computer communicating with the user authentication apparatus. The computer-readable medium may store user identifying information and encryption and decryption data. The encryption and decryption computer may be configured to receive an application programming interface (API) for interfacing with the user authentication apparatus and receive the user identifying information from the computer-readable medium via the API. A user may be authenticated based on the user identifying information and, once the user is authenticated, the encryption and decryption data may be read.Type: GrantFiled: December 17, 2012Date of Patent: June 24, 2014Assignee: MAZ Encryption Technologies LLCInventor: Stephen Zizzi
-
Publication number: 20140100893Abstract: A real estate disclosure reporting method identifies a subject property, accesses an insurance claim database, determines from the database whether an insurance claim has been filed for the subject property and generates a report regarding the subject property and the insurance claim.Type: ApplicationFiled: December 12, 2013Publication date: April 10, 2014Applicant: Empire IP LLCInventor: Stephen Zizzi
-
Patent number: 8359476Abstract: A system configured to authenticate a user for encryption or decryption includes a user authentication apparatus, a computer-readable medium operable to communicate with the user authentication apparatus, and an encryption and decryption computer communicating with the user authentication apparatus. The computer-readable medium may store user identifying information and encryption and decryption data. The encryption and decryption computer may be configured to receive an application programming interface (API) for interfacing with the user authentication apparatus and receive the user identifying information from the computer-readable medium via the API. A user may be authenticated based on the user identifying information and, once the user is authenticated, the encryption and decryption data may be read.Type: GrantFiled: December 1, 2010Date of Patent: January 22, 2013Assignee: Empire IP LLCInventor: Stephen Zizzi
-
Publication number: 20110078780Abstract: A system configured to authenticate a user for encryption or decryption includes a user authentication apparatus, a computer-readable medium operable to communicate with the user authentication apparatus, and an encryption and decryption computer communicating with the user authentication apparatus. The computer-readable medium may store user identifying information and encryption and decryption data. The encryption and decryption computer may be configured to receive an application programming interface (API) for interfacing with the user authentication apparatus and receive the user identifying information from the computer-readable medium via the API. A user may be authenticated based on the user identifying information and, once the user is authenticated, the encryption and decryption data may be read.Type: ApplicationFiled: December 1, 2010Publication date: March 31, 2011Applicant: MAZ TECHNOLOGIES, INC.Inventor: Stephen Zizzi
-
Patent number: 7865728Abstract: Cryptographic methods and systems are disclosed. The cryptographic methods provide transparent encryption and decryption of documents in an electronic document management system. The cryptographic system adds a software module to an electronic document management system which traps file I/O events and performs cryptographic functions on the relevant documents before passing control back to the electronic document management system.Type: GrantFiled: May 28, 2008Date of Patent: January 4, 2011Assignee: Maz Technologies, Inc.Inventor: Stephen Zizzi
-
Publication number: 20080270803Abstract: Cryptographic methods and systems are disclosed. The cryptographic methods provide transparent encryption and decryption of documents in an electronic document management system. The cryptographic system adds a software module to an electronic document management system which traps file I/O events and performs cryptographic functions on the relevant documents before passing control back to the electronic document management system.Type: ApplicationFiled: May 28, 2008Publication date: October 30, 2008Inventor: Stephen Zizzi
-
Publication number: 20070118731Abstract: A method of decrypting documents is disclosed. A plurality of document may be stored on a file server. A client computer is connected to the file server by a network. A first table contains the names of encrypted documents and, for each document, the name of an associated encryption key. A second table contains an encryption key value associated with an encryption key name. To open an encrypted document, the crypto server retrieves the encryption key name from the first table, retrieves the encryption key value from the second table, and causes the document to be decrypted.Type: ApplicationFiled: January 26, 2007Publication date: May 24, 2007Inventor: Stephen Zizzi
-
Patent number: 7096358Abstract: An encryption method that is largely transparent to a user is accomplished by intercepting a change document or open document command, carrying out an encryption or decryption process, and then completing the command on an encrypted or decrypted file. The encryption method can be used in a wide variety of environments, such as an individual computer program, a database or electronic messaging over the Internet. The encryption method can select from a plurality of encryption algorithms.Type: GrantFiled: September 8, 2003Date of Patent: August 22, 2006Assignee: MAZ Technologies, Inc.Inventor: Stephen Zizzi
-
Publication number: 20060184793Abstract: An encryption method that is largely transparent to a user is accomplished by intercepting a change document or open document command, carrying out an encryption or decryption process, and then completing the command on an encrypted or decrypted file. The encryption method can be used in a wide variety of environments, such as an individual computer program, a database or electronic messaging over the Internet. The encryption method can select from a plurality of encryption algorithms.Type: ApplicationFiled: May 10, 2006Publication date: August 17, 2006Inventor: STEPHEN ZIZZI
-
Publication number: 20040059912Abstract: An encryption method that is largely transparent to a user is accomplished by intercepting a change document or open document command, carrying out an encryption or decryption process, and then completing the command on an encrypted or decrypted file. The encryption method can be used in a wide variety of environments, such as an individual computer program, a database or electronic messaging over the Internet. The encryption method can select from a plurality of encryption algorithms.Type: ApplicationFiled: September 8, 2003Publication date: March 25, 2004Inventor: Stephen Zizzi
-
Patent number: 6185681Abstract: Cryptographic methods and systems are disclosed. The cryptographic methods provide transparent encryption and decryption of documents in an electronic document management system. The cryptographic system adds a software module to an electronic document management system which traps file I/O events and performs cryptographic functions on the relevant documents before passing control back to the electronic document management system.Type: GrantFiled: May 7, 1998Date of Patent: February 6, 2001Inventor: Stephen Zizzi