- Philadelphia PA, US Christopher Zarcone - Marlton NJ, US
International Classification:
H04L 29/06 H04L 9/32
Abstract:
A method and system may allow for authenticating a computing device. A computing device may send an authentication request over a network to an authentication computing device. The authentication request may include a user name and a password. The user name may include a credential and the password may be a digitally signed version of the user name. The authentication computing device may authenticate the requesting computing device by decrypting the password and comparing the received user name to the decrypted password.
- Philadelphia PA, US Christopher Zarcone - Marlton NJ, US
International Classification:
H04L 29/06 H04L 9/32
Abstract:
A method and system may allow for authenticating a computing device. A computing device may send an authentication request over a network to an authentication computing device. The authentication request may include a user name and a password. The user name may include a credential and the password may be a digitally signed version of the user name. The authentication computing device may authenticate the requesting computing device by decrypting the password and comparing the received user name to the decrypted password.
- Philadelphia PA, US Chris Wendt - Exton PA, US Manoj Chaudhari - Marlton NJ, US Christopher Zarcone - Marlton NJ, US
International Classification:
H04L 29/06 H04L 9/32 H04L 29/12
Abstract:
An apparatus, method, system and computer-readable medium are provided for provisioning a user equipment device (UED). The UED may be configured to receive a generic configuration and (dynamically) derive settings specific to the UED that would otherwise have been received in the configuration. The UED may execute one or more applications to derive the settings specific to the UED. A first application may enable the UED to dynamically learn a fully qualified domain name (FQDN) and IP address of a node. A second application may enable the UED to generate authentication credentials for the UED. A third application may enable the UED to determine a port or ports that are authorized for service and a port or ports that are not authorized for service. A fourth application may enable the UED to determine a number associated with the UED.
- Philadelphia PA, US Christopher Zarcone - Marlton NJ, US
International Classification:
H04L 29/06 H04L 9/32
Abstract:
A method and system may allow for authenticating a computing device. A computing device may send an authentication request over a network to an authentication computing device. The authentication request may include a user name and a password. The user name may include a credential and the password may be a digitally signed version of the user name. The authentication computing device may authenticate the requesting computing device by decrypting the password and comparing the received user name to the decrypted password.
- PHILADELPHIA PA, US Christopher Zarcone - Marlton NJ, US
International Classification:
H04L 29/06 H04L 12/26 H04L 12/741 H04L 12/781
Abstract:
Methods and systems for implementing a moving target defense are described. The moving target defense can comprise obfuscating a protocol identifier within a packet. The protocol identifier can be replaced with a faux protocol identifier. Additionally, diversion headers can be inserted into to the packet, thereby creating additional layers of complexity.
- Philadelphia PA, US Chris Wendt - Exton PA, US Manoj Chaudhari - Marlton NJ, US Christopher Zarcone - Marlton NJ, US
International Classification:
H04L 29/06 H04L 29/12 H04L 9/32
Abstract:
An apparatus, method, system and computer-readable medium are provided for provisioning a user equipment device (UED). The UED may be configured to receive a generic configuration and (dynamically) derive settings specific to the UED that would otherwise have been received in the configuration. The UED may execute one or more applications to derive the settings specific to the UED. A first application may enable the UED to dynamically learn a fully qualified domain name (FQDN) and IP address of a node. A second application may enable the UED to generate authentication credentials for the UED. A third application may enable the UED to determine a port or ports that arc authorized for service and a port or ports that are not authorized for service. A fourth application may enable the UED to determine a number associated with the UED.
- Philadelphia PA, US Christopher Zarcone - Marlton NJ, US
International Classification:
G06F 15/167 H04L 29/08
Abstract:
Systems and methods for remote signaling are disclosed. One method can comprise receiving, by a destination node, a data packet having a source address associated with source node comprising an interface identifier of the source node, comparing at least a portion of the source address to one or more memory locations of the destination node, identifying a select memory location of the one or more memory locations based upon the comparing at least the portion of the source address to the one or more memory locations of the destination node, and causing execution of an executable instruction stored at the identified memory location.
- Philadelphia PA, US Christopher Zarcone - Marlton NJ, US
International Classification:
H04L 29/06 H04L 9/32
US Classification:
713156, 713168, 713176
Abstract:
A method and system may allow for authenticating a computing device. A computing device may send an authentication request over a network to an authentication computing device. The authentication request may include a user name and a password. The user name may include a credential and the password may be a digitally signed version of the user name. The authentication computing device may authenticate the requesting computing device by decrypting the password and comparing the received user name to the decrypted password.
Comcast - Greater Philadelphia Area since 2007
Principal Security Architect
Lockheed Martin - Greater Philadelphia Area 2002 - 2007
Lead Member, Engineering Staff
Netigy - Greater Philadelphia Area 1999 - 2001
Principal Consultant
Lockheed Martin - Greater Philadelphia Area 1995 - 1998
Systems Analyst
Education:
Rensselaer Polytechnic Institute 1995 - 1997
M.S., Computer Science
Drexel University 1990 - 1995
B.S., Computer Science
Skills:
Security Information Security Integration Firewalls Networking Cloud Computing Virtualization Network Security System Deployment Enterprise Architecture Architecture Identity Management Security Architecture Design Cissp System Architecture Network Architecture Disaster Recovery Tcp/Ip Data Center Information Assurance It Strategy Network Engineering Vpn Technology Unix Engineering Information Security Management Solaris Cisco Technologies Reverse Engineering Network Design Tablets Computer Forensics Computer Science Ipv6 Enterprise Networking Operating Systems Mobile Computing Helping Clients Succeed Intrusion Detection Juniper Systems Integration Technology Protection Ipv4 Protection Customer Service Penetration Testing Service Provider Networking Tablet Computing Apple
Languages:
English
Awards:
ACM Senior Member Association of Computing Machinery The Senior Member Grade recognizes those ACM members with at least 10 years of professional experience and 5 years of continuous Professional Membership who have demonstrated performance that sets them apart from their peers.
http://awards.acm.org/homepage.cfm?awd=159 Company Awards Executive Leadership Award - 2011, 2012
Inventor Recognition Award - 2011, 2013
Excellence Award - 2009
Certifications:
Certified Information Systems Security Professional Information Systems Security Architecture Professional Cisco Certified Network Associate (Ccna), Network Professional (Ccnp), Design Associate (Ccda), Design Professional (Ccdp)
Christopher Zarcone's Public Profile on Plaxo. Plaxo helps members like Christopher Zarcone keep in touch with the people who really matter, helping them to ...