Denis Jacques Paul Garcia - Palo Alto CA, US Michael Michio Ouye - Mountain View CA, US Alain Rossmann - Palo Alto CA, US Steven Toye Crocker - Burlingame CA, US Eric Gilbertson - Menlo Park CA, US Weiqing Huang - Flower Mound TX, US Serge Humpich - Tournan-en-Brie, FR Klimenty Vainstein - San Francisco CA, US Nicholas Michael Ryan - Sunnyvale CA, US
In a system for providing access control management to electronic data, techniques to secure the electronic data and keep the electronic data secured at all times are disclosed. According to one embodiment, a secured file or secured document includes two parts: an attachment, referred to as a header, and an encrypted document or data portion. The header includes security information that points to or includes the access rules and a file key. The access rules facilitate restrictive access to the secured document and essentially determine who/when/how/where the secured document can be accessed. The file key is used to encrypt/decrypt the encrypted data portion. Only those who have the proper access privileges are permitted to retrieve the file key to encrypt/decrypt the encrypted data portion.
Methods And Systems For Providing Access Control To Secured Data
Denis Jacques Paul Garcia - Palo Alto CA, US Micheal Michio Ouye - Mountain View CA, US Alain Rossmann - Palo Alto CA, US Steven Toye Crocker - Burlingame CA, US Eric Gilbertson - Menlo Park CA, US Weiqing Huang - Flower Mound TX, US Serge Humpich - Tournan-en-Brie, FR Klimenty Vainstein - San Francisco CA, US Nicholas Micheal Ryan - Sunnyvale CA, US
Assignee:
Intellectual Ventures I LLC - Wilmington DE
International Classification:
G06F 21/60
US Classification:
713193
Abstract:
In a system for providing access control management to electronic data, techniques to secure the electronic data and keep the electronic data secured at all times are disclosed. According to one embodiment, a secured file or secured document includes two parts: an attachment, referred to as a header, and an encrypted document or data portion. The header includes security information that points to or includes the access rules and a file key. The access rules facilitate restrictive access to the secured document and essentially determine who/when/how/where the secured document can be accessed. The file key is used to encrypt/decrypt the encrypted data portion. Only those who have the proper access privileges are permitted to retrieve the file key to encrypt/decrypt the encrypted data portion.
System For Building A User-Determined Database Of Solution Documents From Queries That Fail Within It And From The Search Steps That Do Provide A Solution
Eric J. Gilbertson - Menlo Park CA Sarah L. Nunke - Sunnyvale CA
Assignee:
Answer Computer, Inc. - Sunnyvale CA
International Classification:
G06F 15403 G06F 1540
US Classification:
395600
Abstract:
A computer system and method are disclosed for integrating call management to the retrieval of documents in response to user inquiries. The system consists of a processor connected to an incident table register, a user table register and a document tree data base. The incident table register records and stores information related to the user inquiry, the user table stores information related to the user's identity and the document tree data base stores a plurality of documents, useful in addressing user inquiries. Various linkages connect information stored in the various tables and registers, thereby making the system integrated with respect to the user's identity, the user's inquiry and the identity of the document which ultimately resolves the inquiry.
Methods And Systems For Providing Access Control To Secured Data
- Wilmington DE, US Michael Michio OUYE - Mountain View CA, US Alain ROSSMANN - Palo Alto CA, US Steven Toye CROCKER - Burlingame CA, US Eric GILBERTSON - Menlo Park CA, US Weiqing HUANG - Flower Mound TX, US Serge HUMPICH - Tournan-en-Brie, FR Klimenty VAINSTEIN - San Francisco CA, US Nicholas Michael RYAN - Sunnyvale CA, US
Assignee:
INTELLECTUAL VENTURES I LLC - Wilmington DE
International Classification:
G06F 21/62 H04L 29/06 G06F 21/60 H04L 9/08
Abstract:
In a system for providing access control management to electronic data, techniques to secure the electronic data and keep the electronic data secured at all times are disclosed. According to one embodiment, a secured file or secured document includes two parts: an attachment, referred to as a header, and an encrypted document or data portion. The header includes security information that points to or includes the access rules and a file key. The access rules facilitate restrictive access to the secured document and essentially determine who/when/how/where the secured document can be accessed. The file key is used to encrypt/decrypt the encrypted data portion. Only those who have the proper access privileges are permitted to retrieve the file key to encrypt/decrypt the encrypted data portion.
Methods And Systems For Providing Access Control To Secured Data
- Wilmington DE, US Michael Michio OUYE - Mountain View CA, US Alain ROSSMANN - Palo Alto CA, US Steven Toye CROCKER - Burlingame CA, US Eric GILBERTSON - Menlo Park CA, US Weiqing HUANG - Flower Mound TX, US Serge HUMPICH - Tournan-en-Brie, FR Klimenty VAINSTEIN - San Francisco CA, US Nicholas Michael RYAN - Sunnyvale CA, US
Assignee:
INTELLECTUAL VENTURES I LLC - Wilmington DE
International Classification:
G06F 21/62 H04L 9/08 H04L 29/06
Abstract:
In a system for providing access control management to electronic data, techniques to secure the electronic data and keep the electronic data secured at all times are disclosed. According to one embodiment, a secured file or secured document includes two parts: an attachment, referred to as a header, and an encrypted document or data portion. The header includes security information that points to or includes the access rules and a file key. The access rules facilitate restrictive access to the secured document and essentially determine who/when/how/where the secured document can be accessed. The file key is used to encrypt/decrypt the encrypted data portion. Only those who have the proper access privileges are permitted to retrieve the file key to encrypt/decrypt the encrypted data portion.
Methods And Systems For Providing Access Control To Secured Data
- Wilmington DE, US Michael Michio Ouye - Mountain View CA, US Alain Rossmann - Palo Alto CA, US Steven Toye Crocker - Burlingame CA, US Eric Gilbertson - Menlo Park CA, US Weiqing Huang - Flower Mound TX, US Serge Humpich - Tournan-en-Brie, FR Klimenty Vainstein - San Francisco CA, US Nicholas Michael Ryan - Sunnyvale CA, US
Assignee:
INTELLECTUAL VENTURES I LLC - Wilmington DE
International Classification:
G06F 21/62
US Classification:
726 28
Abstract:
In a system for providing access control management to electronic data, techniques to secure the electronic data and keep the electronic data secured at all times are disclosed. According to one embodiment, a secured file or secured document includes two parts: an attachment, referred to as a header, and an encrypted document or data portion. The header includes security information that points to or includes the access rules and a file key. The access rules facilitate restrictive access to the secured document and essentially determine who/when/how/where the secured document can be accessed. The file key is used to encrypt/decrypt the encrypted data portion. Only those who have the proper access privileges are permitted to retrieve the file key to encrypt/decrypt the encrypted data portion.
The Preservation Trust found about a fifth of the buildings they surveyed had actual structural damage to the foundation or elsewhere. Eric Gilbertson, who assessed damaged properties for the survey, thinks most of the buildings he saw can be saved. But he is worried that homeowners with limited res