Patents by Inventor Stephen Zizzi

Stephen Zizzi has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20160205079
    Abstract: A system configured to authenticate a user for encryption or decryption includes a user authentication apparatus, a computer-readable medium operable to communicate with the user authentication apparatus, and an encryption and decryption computer communicating with the user authentication apparatus. The computer-readable medium may store user identifying information and encryption and decryption data. The encryption and decryption computer may be configured to receive an application programming interface (API) for interfacing with the user authentication apparatus and receive the user identifying information from the computer-readable medium via the API. A user may be authenticated based on the user identifying information and, once the user is authenticated, the encryption and decryption data may be read.
    Type: Application
    Filed: October 29, 2015
    Publication date: July 14, 2016
    Applicant: MAZ Encryption Technologies LLC
    Inventor: Stephen Zizzi
  • Patent number: 9203626
    Abstract: A system configured to authenticate a user for encryption or decryption includes a user authentication apparatus, a computer-readable medium operable to communicate with the user authentication apparatus, and an encryption and decryption computer communicating with the user authentication apparatus. The computer-readable medium may store user identifying information and encryption and decryption data. The encryption and decryption computer may be configured to receive an application programming interface (API) for interfacing with the user authentication apparatus and receive the user identifying information from the computer-readable medium via the API. A user may be authenticated based on the user identifying information and, once the user is authenticated, the encryption and decryption data may be read.
    Type: Grant
    Filed: May 14, 2014
    Date of Patent: December 1, 2015
    Assignee: MAZ Encryption Technologies LLC
    Inventor: Stephen Zizzi
  • Publication number: 20140250304
    Abstract: A system configured to authenticate a user for encryption or decryption includes a user authentication apparatus, a computer-readable medium operable to communicate with the user authentication apparatus, and an encryption and decryption computer communicating with the user authentication apparatus. The computer-readable medium may store user identifying information and encryption and decryption data. The encryption and decryption computer may be configured to receive an application programming interface (API) for interfacing with the user authentication apparatus and receive the user identifying information from the computer-readable medium via the API. A user may be authenticated based on the user identifying information and, once the user is authenticated, the encryption and decryption data may be read.
    Type: Application
    Filed: May 14, 2014
    Publication date: September 4, 2014
    Applicant: MAZ ENCRYPTION TECHNOLOGIES LLC
    Inventor: Stephen Zizzi
  • Patent number: 8762713
    Abstract: A system configured to authenticate a user for encryption or decryption includes a user authentication apparatus, a computer-readable medium operable to communicate with the user authentication apparatus, and an encryption and decryption computer communicating with the user authentication apparatus. The computer-readable medium may store user identifying information and encryption and decryption data. The encryption and decryption computer may be configured to receive an application programming interface (API) for interfacing with the user authentication apparatus and receive the user identifying information from the computer-readable medium via the API. A user may be authenticated based on the user identifying information and, once the user is authenticated, the encryption and decryption data may be read.
    Type: Grant
    Filed: December 17, 2012
    Date of Patent: June 24, 2014
    Assignee: MAZ Encryption Technologies LLC
    Inventor: Stephen Zizzi
  • Publication number: 20140100893
    Abstract: A real estate disclosure reporting method identifies a subject property, accesses an insurance claim database, determines from the database whether an insurance claim has been filed for the subject property and generates a report regarding the subject property and the insurance claim.
    Type: Application
    Filed: December 12, 2013
    Publication date: April 10, 2014
    Applicant: Empire IP LLC
    Inventor: Stephen Zizzi
  • Patent number: 8359476
    Abstract: A system configured to authenticate a user for encryption or decryption includes a user authentication apparatus, a computer-readable medium operable to communicate with the user authentication apparatus, and an encryption and decryption computer communicating with the user authentication apparatus. The computer-readable medium may store user identifying information and encryption and decryption data. The encryption and decryption computer may be configured to receive an application programming interface (API) for interfacing with the user authentication apparatus and receive the user identifying information from the computer-readable medium via the API. A user may be authenticated based on the user identifying information and, once the user is authenticated, the encryption and decryption data may be read.
    Type: Grant
    Filed: December 1, 2010
    Date of Patent: January 22, 2013
    Assignee: Empire IP LLC
    Inventor: Stephen Zizzi
  • Publication number: 20110078780
    Abstract: A system configured to authenticate a user for encryption or decryption includes a user authentication apparatus, a computer-readable medium operable to communicate with the user authentication apparatus, and an encryption and decryption computer communicating with the user authentication apparatus. The computer-readable medium may store user identifying information and encryption and decryption data. The encryption and decryption computer may be configured to receive an application programming interface (API) for interfacing with the user authentication apparatus and receive the user identifying information from the computer-readable medium via the API. A user may be authenticated based on the user identifying information and, once the user is authenticated, the encryption and decryption data may be read.
    Type: Application
    Filed: December 1, 2010
    Publication date: March 31, 2011
    Applicant: MAZ TECHNOLOGIES, INC.
    Inventor: Stephen Zizzi
  • Patent number: 7865728
    Abstract: Cryptographic methods and systems are disclosed. The cryptographic methods provide transparent encryption and decryption of documents in an electronic document management system. The cryptographic system adds a software module to an electronic document management system which traps file I/O events and performs cryptographic functions on the relevant documents before passing control back to the electronic document management system.
    Type: Grant
    Filed: May 28, 2008
    Date of Patent: January 4, 2011
    Assignee: Maz Technologies, Inc.
    Inventor: Stephen Zizzi
  • Publication number: 20080270803
    Abstract: Cryptographic methods and systems are disclosed. The cryptographic methods provide transparent encryption and decryption of documents in an electronic document management system. The cryptographic system adds a software module to an electronic document management system which traps file I/O events and performs cryptographic functions on the relevant documents before passing control back to the electronic document management system.
    Type: Application
    Filed: May 28, 2008
    Publication date: October 30, 2008
    Inventor: Stephen Zizzi
  • Publication number: 20070118731
    Abstract: A method of decrypting documents is disclosed. A plurality of document may be stored on a file server. A client computer is connected to the file server by a network. A first table contains the names of encrypted documents and, for each document, the name of an associated encryption key. A second table contains an encryption key value associated with an encryption key name. To open an encrypted document, the crypto server retrieves the encryption key name from the first table, retrieves the encryption key value from the second table, and causes the document to be decrypted.
    Type: Application
    Filed: January 26, 2007
    Publication date: May 24, 2007
    Inventor: Stephen Zizzi
  • Patent number: 7096358
    Abstract: An encryption method that is largely transparent to a user is accomplished by intercepting a change document or open document command, carrying out an encryption or decryption process, and then completing the command on an encrypted or decrypted file. The encryption method can be used in a wide variety of environments, such as an individual computer program, a database or electronic messaging over the Internet. The encryption method can select from a plurality of encryption algorithms.
    Type: Grant
    Filed: September 8, 2003
    Date of Patent: August 22, 2006
    Assignee: MAZ Technologies, Inc.
    Inventor: Stephen Zizzi
  • Publication number: 20060184793
    Abstract: An encryption method that is largely transparent to a user is accomplished by intercepting a change document or open document command, carrying out an encryption or decryption process, and then completing the command on an encrypted or decrypted file. The encryption method can be used in a wide variety of environments, such as an individual computer program, a database or electronic messaging over the Internet. The encryption method can select from a plurality of encryption algorithms.
    Type: Application
    Filed: May 10, 2006
    Publication date: August 17, 2006
    Inventor: STEPHEN ZIZZI
  • Publication number: 20040059912
    Abstract: An encryption method that is largely transparent to a user is accomplished by intercepting a change document or open document command, carrying out an encryption or decryption process, and then completing the command on an encrypted or decrypted file. The encryption method can be used in a wide variety of environments, such as an individual computer program, a database or electronic messaging over the Internet. The encryption method can select from a plurality of encryption algorithms.
    Type: Application
    Filed: September 8, 2003
    Publication date: March 25, 2004
    Inventor: Stephen Zizzi
  • Patent number: 6185681
    Abstract: Cryptographic methods and systems are disclosed. The cryptographic methods provide transparent encryption and decryption of documents in an electronic document management system. The cryptographic system adds a software module to an electronic document management system which traps file I/O events and performs cryptographic functions on the relevant documents before passing control back to the electronic document management system.
    Type: Grant
    Filed: May 7, 1998
    Date of Patent: February 6, 2001
    Inventor: Stephen Zizzi