×

Security Enhanced Data Platform

  • US 20100189251A1
  • Filed: 01/23/2009
  • Published: 07/29/2010
  • Est. Priority Date: 01/23/2009
  • Status: Active Grant
First Claim
Patent Images

1. A security enhanced data platform method recorded on computer-readable medium and capable of execution by a computer, said method comprising the steps of:

  • providing a main computer operating system;

    customizing the computer operating system'"'"'s kernel;

    replacing the computer operating system'"'"'s kernel and core utilities with a multi-level access control system;

    providing an email and messaging server as the host for sending and receiving messages;

    allowing automation of email retention in compliance with a document retention policy;

    providing a primary subsystem;

    said primary subsystem is a document management system;

    providing a set of client side tools to specify classifications and compartments for selected areas of a document;

    separating document data from document metadata;

    allowing encrypted documents to be stored and the information about those documents to be stored in a database;

    allowing for quick look up and access of secured documents;

    providing a way to save the document in the format required by the system in order to allow the system to enforce the rules and privileges dictated to the system;

    monitoring and recording all activity within the primary subsystem;

    recording all changes to a document and making said document available for audit;

    providing one or more supporting subsystems;

    a first second subsystem is a security enhanced database management system;

    integrating said security enhanced database management system with the multi-level access control system.securing data in the database as a whole, the tables in the database, the columns in the table, the rows in a table, or the individual cells of a database table;

    a second subsystem is a user authentication and authorization system;

    offering native enhanced security by enforcing privileges specified by the user authentication and authorization system;

    a third subsystem is a workflow engine;

    providing a runtime workflow engine used to route documents and data through a user defined approval process for actions on the documents or data;

    a fourth subsystem is a secure two-factor authentication system;

    providing a secure two-factor authentication sub-system adding an additional authentication mechanism;

    a fifth subsystem is a cryptographic engine; and

    providing data protection, data authentication, user authentication and vetting, and communications protection and authentication.

View all claims
  • 0 Assignments
Timeline View
Assignment View
    ×
    ×