Claims
- 1. A method of securing data having one or more security sensitive words, characters, data objects or icons in a computer system with memories designated as a remainder store and an extract store, said computer system having at least one portable computing device locatable with substantially current location data, comprising:
determining when said portable computing device is beyond a predetermined region based upon said current location data; when said portable computing device is beyond said predetermined region, permitting extraction of said security sensitive words, characters, data objects or icons from said data to obtain extracted data and remainder data therefrom and storing said extracted data and said remainder data in said extract store and said remainder store, respectively; permitting full or partial reconstruction of said data via said extracted data and remainder data only in the presence of a predetermined security clearance and only when said portable computing device is not beyond said predetermined region.
- 2. A method for securing data as claimed in claim 1 wherein said substantially current location data is generated with the acquisition of a global positioning signal.
- 3. A method for securing data as claimed in claim 1 including acquiring said substantially current location data with one of the acquisition of a global positioning signal or the acquisition of triangulation data.
- 4. A method for securing data as claimed in claim 1 wherein said extract store is operable in a local data drive on said portable computing device and said storing occurs on said local data drive.
- 5. A method for securing data as claimed in claim 4 wherein said local data drive is one drive from the group of a floppy drive, a hard drive, a removable hard drive, a tape drive and a read-write CD-ROM drive.
- 6. A method for securing data as claimed in claim 1 wherein said extract store is a remote memory and the method includes transmitting said extracted data to the remote extract store.
- 7. A method for securing data as claimed in claim 6 wherein said transmitting occurs as a wireless data transmission.
- 8. A method for securing data as claimed in claim 7 including encrypting said extracted data prior to transmitting.
- 9. A method for securing data as claimed in claim 6 including receiving said extracted data as necessary during reconstruction.
- 10. A method for securing data as claimed in claim 1 wherein said predetermined security clearance is one of a plurality of security clearances and said predetermined region is one a plurality of regions, said plurality of security clearances associated with respective ones of said plurality of regions, the step of determining determines when said portable computing device is beyond said respective ones of said plurality of regions, said extraction and storage occurs based upon the location of said portable computing device beyond said respective ones of said plurality of regions, and said reconstruction is permitted based upon respective security clearances and based upon the location of said portable computing device not being beyond predetermined respective ones of regions of said plurality of regions.
- 11. A method for securing data as claimed in claim 1 wherein said predetermined region is a mobile predetermined region and the method includes obtaining data representing said mobile predetermined region.
- 12. A method for securing data as claimed in claim 11 wherein the step of obtaining occurs before the step of determining.
- 13. A method for securing data as claimed in claim 1 wherein said data is a map with security sensitive icons associated therewith, said security sensitive icons being extracted from said map when said portable computing device is beyond said predetermined region.
- 14. A method for securing data as claimed in claim 1 wherein said data is a document file with security sensitive credit card data characters associated therewith, said security sensitive credit card data characters being extracted from said document file when said portable computing device is beyond said predetermined region.
- 15. A method for securing data as claimed in claim 1 including encrypting said extracted data before or during said storage and decrypting said extracted data as necessary during reconstruction.
- 16. A method of securing data as claimed in claim 1 wherein said predetermined security level is one of a plurality of security levels, said extracting extracts said security sensitive words, data objects, characters or icons from said data to obtain (a) subsets of extracted data and (b) remainder data, said subsets of extracted data associated with said plurality of security levels, and during the reconstruction, some or all of said subsets of extracted data are utilized only in the presence of a respective predetermined security level of said plurality of security levels.
- 17. A method of securing data as claimed in claim 16 wherein said plurality of security levels is associated with corresponding degrees of encryption as are said subsets of extracted data, the method including encrypting said subsets of extracted data with corresponding degrees of encryption associated with said plurality of security levels, and including decrypting, during the reconstruction, of some or all of said subsets of extracted data only in the presence of said predetermined security level of said plurality of security levels.
- 18. A method of securing data as claimed in claim 17 including encrypting said subsets of extracted data and remainder data prior to storing.
- 19. A method as claimed in claim 16 wherein the step of reconstruction includes the step of permitting a plurality of partial reconstructions of said data in the presence of respective ones of said plurality of security clearance levels.
- 20. A method of securing data as claimed in claim 1 operating over a plurality of computers interconnected together.
- 21. A method for securing data as claimed in claim 1 wherein said determining, extracting and storing occurs either automatically or upon power up of said at least one portable computing device.
- 22. A method of securing data as claimed in claim 1 wherein the step of extracting utilizes one of an inference engine, neural network and artificial intelligence process.
- 23. A method as claimed in claim 1 wherein said portable computing device is a computer which includes a display fed from video memory having a plurality of frame memory segments, the reconstruction step including interleaving extracted data and remainder data into respective ones of said plurality of frame memory segments.
- 24. A method as claimed in claim 1 wherein said portable computing device is a computer which includes a data display system with at least two separate but visually overlaid displays, the step of reconstruction including displaying said extracted data on one of said at least two displays and displaying said remainder data on another of said at least two displays.
- 25. A method for securing data as claimed in claim 1 including acquiring said substantially current location data with one of the acquisition of a global positioning signal or the acquisition of triangulation data.
- 26. A method for securing data as claimed in claim 25 wherein said extract store is operable in a local data drive on said portable computing device and said storing occurs on said local data drive.
- 27. A method for securing data as claimed in claim 26 wherein said local data drive is one drive from the group of a floppy drive, a hard drive, a removable hard drive, a tape drive and a read-write CD-ROM drive.
- 28. A method for securing data as claimed in claim 27 wherein said extract store is a remote memory and the method includes transmitting said extracted data to the remote extract store.
- 29. A method for securing data as claimed in claim 28 wherein said transmitting occurs as a wireless data transmission.
- 30. A method for securing data as claimed in claim 29 including encrypting said extracted data prior to transmitting.
- 31. A method for securing data as claimed in claim 30 including receiving said extracted data as necessary during reconstruction.
- 32. A method for securing data as claimed in claim 31 wherein said predetermined security clearance is one of a plurality of security clearances and said predetermined region is one a plurality of regions, said plurality of security clearances associated with respective ones of said plurality of regions, the step of determining determines when said portable computing device is beyond said respective ones of said plurality of regions, said extraction and storage occurs based upon the location of said portable computing device beyond said respective ones of said plurality of regions, and said reconstruction is permitted based upon respective security clearances and based upon the location of said portable computing device not being beyond predetermined respective ones of regions of said plurality of regions.
- 33. A method for securing data as claimed in claim 31 wherein said predetermined region is a mobile predetermined region and the method includes obtaining data representing said mobile predetermined region.
- 34. A method for securing data as claimed in claim 33 wherein the step of obtaining occurs before the step of determining.
- 35. A method for securing data as claimed in claim 34 wherein said data is a map with security sensitive icons associated therewith, said security sensitive icons being extracted from said map when said portable computing device is beyond said predetermined region.
- 36. A method for securing data as claimed in claim 34 wherein said data is a document file with security sensitive credit card data characters associated therewith, said security sensitive credit card data characters being extracted from said document file when said portable computing device is beyond said predetermined region.
- 37. A method for securing data as claimed in claim 36 including encrypting said extracted data before or during said storage and decrypting said extracted data as necessary during reconstruction.
- 38. A method of securing data as claimed in claim 37 wherein said predetermined security level is one of a plurality of security levels, said extracting extracts said security sensitive words, data objects, characters or icons from said data to obtain (a) subsets of extracted data and (b) remainder data, said subsets of extracted data associated with said plurality of security levels, and during the reconstruction, some or all of said subsets of extracted data are utilized only in the presence of a respective predetermined security level of said plurality of security levels.
- 39. A method of securing data as claimed in claim 38 wherein said plurality of security levels is associated with corresponding degrees of encryption as are said subsets of extracted data, the method including encrypting said subsets of extracted data with corresponding degrees of encryption associated with said plurality of security levels, and including decrypting, during the reconstruction, of some or all of said subsets of extracted data only in the presence of said predetermined security level of said plurality of security levels.
- 40. A method of securing data as claimed in claim 39 including encrypting said subsets of extracted data and remainder data prior to storing.
- 41. A method as claimed in claim 40 wherein the step of reconstruction includes the step of permitting a plurality of partial reconstructions of said data in the presence of respective ones of said plurality of security clearance levels.
- 42. A method of securing data as claimed in claim 41 operating over a plurality of computers interconnected together.
- 43. A method for securing data as claimed in claim 42 wherein said determining, extracting and storing occurs either automatically or upon power up of said at least one portable computing device.
- 44. A method of securing data as claimed in claim 43 wherein the step of extracting utilizes one of an inference engine, neural network and artificial intelligence process.
- 45. A method as claimed in claim 44 wherein said portable computing device is a computer which includes a display fed from video memory having a plurality of frame memory segments, the reconstruction step including interleaving extracted data and remainder data into respective ones of said plurality of frame memory segments.
- 46. A method as claimed in claim 44 wherein said portable computing device is a computer which includes a data display system with at least two separate but visually overlaid displays, the step of reconstruction including displaying said extracted data on one of said at least two displays and displaying said remainder data on another of said at least two displays.
- 47. A method of securing data having one or more security sensitive words, characters, data objects or icons in a computer system with memories designated as a remainder store and an extract store, said computer system having at least one portable computing device locatable with substantially current location data, comprising:
determining when said portable computing device is beyond a predetermined region based upon said current location data; when said portable computing device is beyond said predetermined region, permitting extraction of said security sensitive words, characters, data objects or icons from said data to obtain extracted data and remainder data therefrom and storing said extracted data and said remainder data in said extract store and said remainder store, respectively; when said portable computing device is not beyond said predetermined region, permitting full or partial reconstruction of said data via said extracted data and remainder data in the presence of a predetermined security clearance.
- 48. A method of securing data having one or more security sensitive words, characters, data objects or icons in a computer system with memories designated as a remainder store and an extract store, said computer system having at least one portable computing device locatable with substantially current location data, comprising:
determining when said portable computing device is beyond a predetermined region based upon said current location data; when said portable computing device is beyond said predetermined region, extracting said security sensitive words, characters, data objects or icons from said data to obtain extracted data and remainder data therefrom and storing said extracted data and said remainder data in said extract store and said remainder store.
- 49. A method for securing data as claimed in claim 48 including acquiring said substantially current location data with one of the acquisition of a global positioning signal or the acquisition of triangulation data.
- 50. A method for securing data as claimed in claim 48 wherein said extract store is operable in a local data drive on said portable computing device and said storing occurs on said local data drive.
- 51. A method for securing data as claimed in claim 50 wherein said local data drive is one drive from the group of a floppy drive, a hard drive, a removable hard drive, a tape drive and a read-write CD-ROM drive.
- 52. A method for securing data as claimed in claim 48 wherein said extract store is a remote memory and the method includes transmitting said extracted data to the remote extract store.
- 53. A method for securing data as claimed in claim 52 wherein said transmitting occurs as a wireless data transmission.
- 54. A method for securing data as claimed in claim 53 including encrypting said extracted data prior to transmitting.
- 55. A method for securing data as claimed in claim 48 wherein said predetermined region is one a plurality of regions, the step of determining determines when said portable computing device is beyond said respective ones of said plurality of regions, said extraction and storage occurs based upon the location of said portable computing device beyond said respective ones of said plurality of regions.
- 56. A method for securing data as claimed in claim 48 wherein said predetermined region is a mobile predetermined region and the method includes obtaining data representing said mobile predetermined region.
- 57. A method for securing data as claimed in claim 56 wherein the step of obtaining occurs before the step of determining.
- 58. A method for securing data as claimed in claim 48 wherein said data is a map with security sensitive icons associated therewith, said security sensitive icons being extracted from said map when said portable computing device is beyond said predetermined region.
- 59. A method for securing data as claimed in claim 48 wherein said data is a document file with security sensitive credit card data characters associated therewith, said security sensitive credit card data characters being extracted from said document file when said portable computing device is beyond said predetermined region.
- 60. A method for securing data as claimed in claim 48 including encrypting said extracted data before or during said storage and decrypting said extracted data as necessary during reconstruction.
- 61. A method of securing data as claimed in claim 48 wherein said extracting extracts said security sensitive words, data objects, characters or icons from said data to obtain (a) subsets of extracted data and (b) remainder data, said subsets of extracted data associated with a plurality of security levels.
- 62. A method of securing data as claimed in claim 61 wherein said plurality of security levels is associated with corresponding degrees of encryption as are said subsets of extracted data, the method including encrypting said subsets of extracted data with corresponding degrees of encryption associated with said plurality of security levels.
- 63. A method of securing data as claimed in claim 62 including encrypting said subsets of extracted data and remainder data prior to storing.
- 64. A method of securing data as claimed in claim 48 operating over a plurality of computers interconnected together.
- 65. A method for securing data as claimed in claim 48 wherein said determining, extracting and storing occurs either automatically or upon power up of said at least one portable computing device.
- 66. A method of securing data as claimed in claim 48 wherein the step of extracting utilizes one of an inference engine, neural network and artificial intelligence process.
- 67. A method for securing data as claimed in claim 49 wherein said extract store is operable in a local data drive on said portable computing device and said storing occurs on said local data drive.
- 68. A method for securing data as claimed in claim 67 wherein said local data drive is one drive from the group of a floppy drive, a hard drive, a removable hard drive, a tape drive and a read-write CD-ROM drive.
- 69. A method for securing data as claimed in claim 49 wherein said extract store is a remote memory and the method includes transmitting said extracted data to the remote extract store.
- 70. A method for securing data as claimed in claim 69 wherein said transmitting occurs as a wireless data transmission.
- 71. A method for securing data as claimed in claim 70 including encrypting said extracted data prior to transmitting.
- 72. A method for securing data as claimed in claim 71 wherein said predetermined region is one a plurality of regions, the step of determining determines when said portable computing device is beyond said respective ones of said plurality of regions, said extraction and storage occurs based upon the location of said portable computing device beyond said respective ones of said plurality of regions.
- 73. A method for securing data as claimed in claim 72 wherein said plurality of predetermined regions is a plurality of mobile predetermined region and the method includes obtaining data representing said plurality of mobile predetermined region.
- 74. A method for securing data as claimed in claim 73 wherein the step of obtaining occurs before the step of determining.
- 75. A method for securing data as claimed in claim 74 wherein said data is a map with security sensitive icons associated therewith, said security sensitive icons being extracted from said map when said portable computing device is beyond said predetermined region.
- 76. A method for securing data as claimed in claim 74 wherein said data is a document file with security sensitive credit card data characters associated therewith, said security sensitive credit card data characters being extracted from said document file when said portable computing device is beyond said predetermined region.
- 77. A method for securing data as claimed in claim 74 including encrypting said extracted data before or during said storage and decrypting said extracted data as necessary during reconstruction.
- 78. A method of securing data as claimed in claim 77 wherein said extracting extracts said security sensitive words, data objects, characters or icons from said data to obtain (a) subsets of extracted data and (b) remainder data, said subsets of extracted data associated with a plurality of security levels.
- 79. A method of securing data as claimed in claim 78 wherein said plurality of security levels is associated with corresponding degrees of encryption as are said subsets of extracted data, the method including encrypting said subsets of extracted data with corresponding degrees of encryption associated with said plurality of security levels.
- 80. A method of securing data as claimed in claim 79 including encrypting said subsets of extracted data and remainder data prior to storing.
- 81. A method of securing data as claimed in claim 80 operating over a plurality of computers interconnected together.
- 82. A method for securing data as claimed in claim 81 wherein said determining, extracting and storing occurs either automatically or upon power up of said at least one portable computing device.
- 83. A method of securing data as claimed in claim 82 wherein the step of extracting utilizes one of an inference engine, neural network and artificial intelligence process.
- 84. A method of securing data having one or more security sensitive words, characters, data objects or icons in a computer system with memories designated as a remainder store and an extract store, said security sensitive words, characters, data objects or icons extracted from said data to obtain extracted data and remainder data which is stored in said extract store and said remainder store, respectively, said computer system having at least one portable computing device locatable with substantially current location data, comprising:
determining when said portable computing device is within a predetermined region based upon said current location data; permitting full or partial reconstruction of said data via said extracted data and remainder data only in the presence of a predetermined security clearance and only when said portable computing device is not beyond said predetermined region.
- 85. A computer readable medium containing programming instructions for securing data having one or more security sensitive words, characters, data objects or icons in a computer system with memories designated as a remainder store and an extract store, said computer system having at least one portable computing device locatable with substantially current location data, the programming instructions comprising:
determining when said portable computing device is beyond a predetermined region based upon said current location data; when said portable computing device is beyond said predetermined region, permitting extraction of said security sensitive words, characters, data objects or icons from said data to obtain extracted data and remainder data therefrom and storing said extracted data and said remainder data in said extract store and said remainder store, respectively; permitting full or partial reconstruction of said data via said extracted data and remainder data only in the presence of a predetermined security clearance and only when said portable computing device is not beyond said predetermined region.
- 86. A computer readable medium with programming steps as claimed in claim 85 wherein said substantially current location data is generated with the acquisition of a global positioning signal.
- 87. A computer readable medium with programming steps as claimed in claim 85 including acquiring said substantially current location data with one of the acquisition of a global positioning signal or the acquisition of triangulation data.
- 88. A computer readable medium with programming steps as claimed in claim 85 wherein said extract store is operable in a local data drive on said portable computing device and said storing occurs on said local data drive.
- 89. A computer readable medium with programming steps as claimed in claim 88 wherein said local data drive is one drive from the group of a floppy drive, a hard drive, a removable hard drive, a tape drive and a read-write CD-ROM drive.
- 90. A computer readable medium with programming steps as claimed in claim 85 wherein said extract store is a remote memory and the steps include transmitting said extracted data to the remote extract store.
- 91. A computer readable medium with programming steps as claimed in claim 90 wherein said transmitting occurs as a wireless data transmission.
- 92. A computer readable medium with programming steps as claimed in claim 91 including encrypting said extracted data prior to transmitting.
- 93. A computer readable medium with programming steps as claimed in claim 90 including receiving said extracted data as necessary during reconstruction.
- 94. A computer readable medium with programming steps as claimed in claim 85 wherein said predetermined security clearance is one of a plurality of security clearances and said predetermined region is one a plurality of regions, said plurality of security clearances associated with respective ones of said plurality of regions, the step of determining determines when said portable computing device is beyond said respective ones of said plurality of regions, said extraction and storage occurs based upon the location of said portable computing device beyond said respective ones of said plurality of regions, and said reconstruction is permitted based upon respective security clearances and based upon the location of said portable computing device not being beyond predetermined respective ones of regions of said plurality of regions.
- 95. A computer readable medium with programming steps as claimed in claim 85 wherein said predetermined region is a mobile predetermined region and the method includes obtaining data representing said mobile predetermined region.
- 96. A computer readable medium with programming steps as claimed in claim 95 wherein the step of obtaining occurs before the step of determining.
- 97. A computer readable medium with programming steps as claimed in claim 85 wherein said data is a map with security sensitive icons associated therewith, said security sensitive icons being extracted from said map when said portable computing device is beyond said predetermined region.
- 98. A computer readable medium with programming steps as claimed in claim 85 wherein said data is a document file with security sensitive credit card data characters associated therewith, said security sensitive credit card data characters being extracted from said document file when said portable computing device is beyond said predetermined region.
- 99. A computer readable medium with programming steps as claimed in claim 85 including encrypting said extracted data before or during said storage and decrypting said extracted data as necessary during reconstruction.
- 100. A computer readable medium with programming steps as claimed in claim 85 wherein said predetermined security level is one of a plurality of security levels, said extracting extracts said security sensitive words, data objects, characters or icons from said data to obtain (a) subsets of extracted data and (b) remainder data, said subsets of extracted data associated with said plurality of security levels, and during the reconstruction, some or all of said subsets of extracted data are utilized only in the presence of a respective predetermined security level of said plurality of security levels.
- 101. A computer readable medium with programming steps as claimed in claim 100 wherein said plurality of security levels is associated with corresponding degrees of encryption as are said subsets of extracted data, the method including encrypting said subsets of extracted data with corresponding degrees of encryption associated with said plurality of security levels, and including decrypting, during the reconstruction, of some or all of said subsets of extracted data only in the presence of said predetermined security level of said plurality of security levels.
- 102. A computer readable medium with programming steps as claimed in claim 101 including encrypting said subsets of extracted data and remainder data prior to storing.
- 103. A computer readable medium with programming steps as claimed in claim 100 wherein the step of reconstruction includes the step of permitting a plurality of partial reconstructions of said data in the presence of respective ones of said plurality of security clearance levels.
- 104. A computer readable medium with programming steps as claimed in claim 85 configured to operate over a plurality of computers interconnected together.
- 105. A computer readable medium with programming steps as claimed in claim 85 wherein said determining, extracting and storing occurs either automatically or upon power up of said at least one portable computing device.
- 106. A computer readable medium with programming steps as claimed in claim 85 wherein the step of extracting utilizes one of an inference engine, neural network and artificial intelligence process.
- 107. A computer readable medium with programming steps as claimed in claim 85 wherein said portable computing device is a computer which includes a display fed from video memory having a plurality of frame memory segments, the reconstruction step including interleaving extracted data and remainder data into respective ones of said plurality of frame memory segments.
- 108. A computer readable medium with programming steps as claimed in claim 85 wherein said portable computing device is a computer which includes a data display system with at least two separate but visually overlaid displays, the step of reconstruction including displaying said extracted data on one of said at least two displays and displaying said remainder data on another of said at least two displays.
- 109. A computer readable medium with programming steps for securing data having one or more security sensitive words, characters, data objects or icons in a computer system with memories designated as a remainder store and an extract store, said computer system having at least one portable computing device locatable with substantially current location data, the programming steps comprising:
determining when said portable computing device is beyond a predetermined region based upon said current location data; when said portable computing device is beyond said predetermined region, extracting said security sensitive words, characters, data objects or icons from said data to obtain extracted data and remainder data therefrom and storing said extracted data and said remainder data in said extract store and said remainder store.
- 110. A computer readable medium with programming steps as claimed in claim 109 including acquiring said substantially current location data with one of the acquisition of a global positioning signal or the acquisition of triangulation data.
- 111. A computer readable medium with programming steps as claimed in claim 109 wherein said extract store is operable in a local data drive on said portable computing device and said storing occurs on said local data drive.
- 112. A computer readable medium with programming steps as claimed in claim 111 wherein said local data drive is one drive from the group of a floppy drive, a hard drive, a removable hard drive, a tape drive and a read-write CD-ROM drive.
- 113. A computer readable medium with programming steps as claimed in claim 109 wherein said extract store is a remote memory and the method includes transmitting said extracted data to the remote extract store.
- 114. A computer readable medium with programming steps as claimed in claim 113 including encrypting said extracted data prior to transmitting.
- 115. A computer readable medium with programming steps as claimed in claim 109 wherein said predetermined region is one a plurality of regions, the step of determining determines when said portable computing device is beyond said respective ones of said plurality of regions, said extraction and storage occurs based upon the location of said portable computing device beyond said respective ones of said plurality of regions.
- 116. A computer readable medium with programming steps as claimed in claim 109 wherein said predetermined region is a mobile predetermined region and the method includes obtaining data representing said mobile predetermined region.
- 117. A computer readable medium with programming steps as claimed in claim 109 wherein said data is a map with security sensitive icons associated therewith, said security sensitive icons being extracted from said map when said portable computing device is beyond said predetermined region.
- 118. A computer readable medium with programming steps as claimed in claim 109 wherein said data is a document file with security sensitive credit card data characters associated therewith, said security sensitive credit card data characters being extracted from said document file when said portable computing device is beyond said predetermined region.
- 119. A computer readable medium with programming steps as claimed in claim 109 including encrypting said extracted data before or during said storage and decrypting said extracted data as necessary during reconstruction.
- 120. A computer readable medium with programming steps as claimed in claim 109 wherein said extracting extracts said security sensitive words, data objects, characters or icons from said data to obtain (a) subsets of extracted data and (b) remainder data, said subsets of extracted data associated with a plurality of security levels.
- 121. A computer readable medium with programming steps as claimed in claim 120 wherein said plurality of security levels is associated with corresponding degrees of encryption as are said subsets of extracted data, the method including encrypting said subsets of extracted data with corresponding degrees of encryption associated with said plurality of security levels.
- 122. A computer readable medium with programming steps as claimed in claim 121 including encrypting said subsets of extracted data and remainder data prior to storing.
- 123. A computer readable medium with programming steps as claimed in claim 109 wherein said determining, extracting and storing occurs either automatically or upon power up of said at least one portable computing device.
- 124. An information processing system for securing data having one or more security sensitive words, characters, data objects or icons in a computer system with memories designated as a remainder store and an extract store, said computer system having at least one portable computing device locatable with substantially current location data, comprising:
means for determining when said portable computing device is beyond a predetermined region based upon said current location data; means for extracting, coupled to said means for determining, said security sensitive words, characters, data objects or icons from said data to obtain extracted data and remainder data therefrom and storing said extracted data and said remainder data in said extract store and said remainder store, respectively; means for permitting full or partial reconstruction of said data via said extracted data and remainder data only in the presence of a predetermined security clearance and only when said portable computing device is not beyond said predetermined region.
- 125. An information processing system as claimed in claim 124 including a global positioning signal generator, said substantially current location data being generated by said global positioning signal generator and applied to said means for determining.
- 126. An information processing system as claimed in claim 124 including means for acquiring said substantially current location data with one of the acquisition of a global positioning signal or the acquisition of triangulation data.
- 127. An information processing system as claimed in claim 124 wherein said portable computing device includes a local data drive and local drive media, said means for extracting storing said security sensitive words, characters, data objects or icons on said media in said local data drive.
- 128. An information processing system as claimed in claim 127 wherein said local data drive is one drive from the group of a floppy drive, a hard drive, a removable hard drive, a tape drive and a read-write CD-ROM drive.
- 129. An information processing system as claimed in claim 124 including a remote memory in said computer system, said portable computing device including a data transmitter, said means for extracting storing said security sensitive words, characters, data objects or icons in said remote memory via said data transmitter.
- 130. An information processing system as claimed in claim 129 wherein said data transmitter transmits data via a wireless communications channel.
- 131. An information processing system as claimed in claim 130 including means for encrypting said extracted data prior to transmitting.
- 132. An information processing system as claimed in claim 129 including means for receiving said extracted data as necessary during reconstruction.
- 133. An information processing system as claimed in claim 124 wherein said predetermined security clearance is one of a plurality of security clearances and said predetermined region is one a plurality of regions, said plurality of security clearances associated with respective ones of said plurality of regions, the means for determining determines when said portable computing device is beyond said respective ones of said plurality of regions, said means for extracting and storing being triggered based upon the location of said portable computing device beyond said respective ones of said plurality of regions, and said means for reconstructing being activated based upon respective security clearances and based upon the location of said portable computing device not being beyond predetermined respective ones of regions of said plurality of regions.
- 134. An information processing system as claimed in claim 124 wherein said predetermined region is a mobile predetermined region and the system includes means for obtaining data representing said mobile predetermined region.
- 135. An information processing system as claimed in claim 124 wherein said data is a map with security sensitive icons associated therewith, said means for extracting acting upon said map and extracting said security sensitive icons from said map when said portable computing device is beyond said predetermined region.
- 136. An information processing system as claimed in claim 124 wherein said data is a document file with security sensitive credit card data characters associated therewith, said means for extracting acting upon said security sensitive credit card data characters and extracting the same from said document file when said portable computing device is beyond said predetermined region.
- 137. An information processing system as claimed in claim 124 including means for encrypting said extracted data before or during said storage and means for decrypting said extracted data as necessary during reconstruction by said means for reconstructing.
- 138. An information processing system as claimed in claim 124 wherein said predetermined security level is one of a plurality of security levels, said means for extracting extracts said security sensitive words, data objects, characters or icons from said data to obtain (a) subsets of extracted data and (b) remainder data, said subsets of extracted data associated with said plurality of security levels, and said means for reconstructing acts upon some or all of said subsets of extracted data only in the presence of a respective predetermined security level of said plurality of security levels.
- 139. An information processing system as claimed in claim 138 wherein said plurality of security levels is associated with corresponding degrees of encryption as are said subsets of extracted data, the system including means for encrypting said subsets of extracted data with corresponding degrees of encryption associated with said plurality of security levels, and including means for decrypting, during reconstruction with said means for reconstructing, of some or all of said subsets of extracted data only in the presence of said predetermined security level of said plurality of security levels.
- 140. An information processing system as claimed in claim 139 including means for encrypting said subsets of extracted data and remainder data prior to storing.
- 141. An information processing system as claimed in claim 138 wherein said means for reconstructing permits a plurality of partial reconstructions of said data in the presence of respective ones of said plurality of security clearance levels.
- 142. An information processing system as claimed in claim 124 utilizing a plurality of computers interconnected together.
- 143. An information processing system as claimed in claim 124 including an automatic means for determining and means for extracting and storing actuated upon power up or geographic location of said at least one portable computing device.
- 144. An information processing system as claimed in claim 124 wherein said portable computing device is a computer which includes a display fed from video memory having a plurality of frame memory segments, the means for reconstructing interleaving extracted data and remainder data into respective ones of said plurality of frame memory segments.
- 145. An information processing system as claimed in claim 124 wherein said portable computing device is a computer which includes a data display system with at least two separate but visually overlaid displays, the means for reconstructing including displaying said extracted data on one of said at least two displays and displaying said remainder data on another of said at least two displays.
- 146. An information processing system for securing data having one or more security sensitive words, characters, data objects or icons in a computer system with memories designated as a remainder store and an extract store, said computer system having at least one portable computing device locatable with substantially current location data, comprising:
means for determining when said portable computing device is beyond a predetermined region based upon said current location data and generating a trigger; means for extracting, upon said trigger when said portable computing device is beyond said predetermined region, said security sensitive words, characters, data objects or icons from said data to obtain extracted data and remainder data therefrom and storing said extracted data and said remainder data in said extract store and said remainder store.
Parent Case Info
[0001] This is a continuation-in-part of patent application Ser. No. 10/277,196 filed on Jan. 2, 2003 and patent application Ser. No. 10/115,192 filed on May 23, 2002 and Ser. No. 10/155,525 filed on May 23, 2002, and is a regular patent application claiming the benefit of provisional patent applications 60/400,062 filed on Aug. 2, 2002, 60/400,112 filed on Aug. 2, 2002, 60/400,406 filed on Aug. 2, 2002, and 60/400,407 filed on Aug. 2, 2002, and is a continuation-in-part of patent application Ser. No. 10/008,209 filed on Dec. 6, 2001 and Ser. No. 10/008,218 filed on Dec. 6, 2001, and is a continuation-in-part of patent application Ser. No. 09/916,397 filed Jul. 27, 2001 which is a regular patent application is based upon provisional patent application No. 60/260,398, filed Jun. 5, 2001; application No. 60/287,813, filed on May, 2, 2001; application No. 60/267,944, filed Feb. 12, 2001; application No. 60/247,242, filed Nov. 13, 2000 and application No. 60/247,232, filed Nov. 13, 2000.
Provisional Applications (9)
|
Number |
Date |
Country |
|
60400062 |
Aug 2002 |
US |
|
60400112 |
Aug 2002 |
US |
|
60400406 |
Aug 2002 |
US |
|
60400407 |
Aug 2002 |
US |
|
60260398 |
Jan 2001 |
US |
|
60287813 |
May 2001 |
US |
|
60267944 |
Feb 2001 |
US |
|
60247242 |
Nov 2000 |
US |
|
60247232 |
Nov 2000 |
US |
Continuation in Parts (6)
|
Number |
Date |
Country |
Parent |
10277196 |
Dec 2002 |
US |
Child |
10390807 |
Mar 2003 |
US |
Parent |
10115192 |
Apr 2002 |
US |
Child |
10390807 |
Mar 2003 |
US |
Parent |
10155525 |
May 2002 |
US |
Child |
10390807 |
Mar 2003 |
US |
Parent |
10008209 |
Dec 2001 |
US |
Child |
10390807 |
Mar 2003 |
US |
Parent |
10008218 |
Dec 2001 |
US |
Child |
10390807 |
Mar 2003 |
US |
Parent |
09916397 |
Jul 2001 |
US |
Child |
10390807 |
Mar 2003 |
US |