Search

Christopher C Zarcone

age ~52

from Marlton, NJ

Also known as:
  • Christopher Etal Zarcone
  • Christophe C Zarcone
  • Chris C Zarcone
  • Christopher E
Phone and address:
60 Weaver Dr, Marlton, NJ 08053
610 812-6200

Christopher Zarcone Phones & Addresses

  • 60 Weaver Dr, Marlton, NJ 08053 • 610 812-6200
  • Evesham, NJ
  • Wayne, PA
  • Philadelphia, PA
  • 2605 Eland Downe, Phoenixville, PA 19460 • 610 917-1109 • 610 917-1176
  • Devon, PA

Us Patents

  • Identity Authentication Using Credentials

    view source
  • US Patent:
    20210377251, Dec 2, 2021
  • Filed:
    Aug 16, 2021
  • Appl. No.:
    17/403396
  • Inventors:
    - Philadelphia PA, US
    Christopher Zarcone - Marlton NJ, US
  • International Classification:
    H04L 29/06
    H04L 9/32
  • Abstract:
    A method and system may allow for authenticating a computing device. A computing device may send an authentication request over a network to an authentication computing device. The authentication request may include a user name and a password. The user name may include a credential and the password may be a digitally signed version of the user name. The authentication computing device may authenticate the requesting computing device by decrypting the password and comparing the received user name to the decrypted password.
  • Identity Authentication Using Credentials

    view source
  • US Patent:
    20200145401, May 7, 2020
  • Filed:
    Sep 5, 2019
  • Appl. No.:
    16/562066
  • Inventors:
    - Philadelphia PA, US
    Christopher Zarcone - Marlton NJ, US
  • International Classification:
    H04L 29/06
    H04L 9/32
  • Abstract:
    A method and system may allow for authenticating a computing device. A computing device may send an authentication request over a network to an authentication computing device. The authentication request may include a user name and a password. The user name may include a credential and the password may be a digitally signed version of the user name. The authentication computing device may authenticate the requesting computing device by decrypting the password and comparing the received user name to the decrypted password.
  • Provisioning Using A Generic Configuration

    view source
  • US Patent:
    20200021562, Jan 16, 2020
  • Filed:
    Jun 26, 2019
  • Appl. No.:
    16/453053
  • Inventors:
    - Philadelphia PA, US
    Chris Wendt - Exton PA, US
    Manoj Chaudhari - Marlton NJ, US
    Christopher Zarcone - Marlton NJ, US
  • International Classification:
    H04L 29/06
    H04L 9/32
    H04L 29/12
  • Abstract:
    An apparatus, method, system and computer-readable medium are provided for provisioning a user equipment device (UED). The UED may be configured to receive a generic configuration and (dynamically) derive settings specific to the UED that would otherwise have been received in the configuration. The UED may execute one or more applications to derive the settings specific to the UED. A first application may enable the UED to dynamically learn a fully qualified domain name (FQDN) and IP address of a node. A second application may enable the UED to generate authentication credentials for the UED. A third application may enable the UED to determine a port or ports that are authorized for service and a port or ports that are not authorized for service. A fourth application may enable the UED to determine a number associated with the UED.
  • Identity Authentication Using Credentials

    view source
  • US Patent:
    20180234408, Aug 16, 2018
  • Filed:
    Sep 1, 2017
  • Appl. No.:
    15/693549
  • Inventors:
    - Philadelphia PA, US
    Christopher Zarcone - Marlton NJ, US
  • International Classification:
    H04L 29/06
    H04L 9/32
  • Abstract:
    A method and system may allow for authenticating a computing device. A computing device may send an authentication request over a network to an authentication computing device. The authentication request may include a user name and a password. The user name may include a credential and the password may be a digitally signed version of the user name. The authentication computing device may authenticate the requesting computing device by decrypting the password and comparing the received user name to the decrypted password.
  • Protocol Obfuscation In Moving Target Defense

    view source
  • US Patent:
    20180167365, Jun 14, 2018
  • Filed:
    Dec 8, 2016
  • Appl. No.:
    15/373163
  • Inventors:
    - PHILADELPHIA PA, US
    Christopher Zarcone - Marlton NJ, US
  • International Classification:
    H04L 29/06
    H04L 12/26
    H04L 12/741
    H04L 12/781
  • Abstract:
    Methods and systems for implementing a moving target defense are described. The moving target defense can comprise obfuscating a protocol identifier within a packet. The protocol identifier can be replaced with a faux protocol identifier. Additionally, diversion headers can be inserted into to the packet, thereby creating additional layers of complexity.
  • Provisioning Using A Generic Configuration

    view source
  • US Patent:
    20170171160, Jun 15, 2017
  • Filed:
    Oct 20, 2016
  • Appl. No.:
    15/298877
  • Inventors:
    - Philadelphia PA, US
    Chris Wendt - Exton PA, US
    Manoj Chaudhari - Marlton NJ, US
    Christopher Zarcone - Marlton NJ, US
  • International Classification:
    H04L 29/06
    H04L 29/12
    H04L 9/32
  • Abstract:
    An apparatus, method, system and computer-readable medium are provided for provisioning a user equipment device (UED). The UED may be configured to receive a generic configuration and (dynamically) derive settings specific to the UED that would otherwise have been received in the configuration. The UED may execute one or more applications to derive the settings specific to the UED. A first application may enable the UED to dynamically learn a fully qualified domain name (FQDN) and IP address of a node. A second application may enable the UED to generate authentication credentials for the UED. A third application may enable the UED to determine a port or ports that arc authorized for service and a port or ports that are not authorized for service. A fourth application may enable the UED to determine a number associated with the UED.
  • Remote Messaging Using Target Memory Location

    view source
  • US Patent:
    20160321211, Nov 3, 2016
  • Filed:
    Apr 28, 2015
  • Appl. No.:
    14/697845
  • Inventors:
    - Philadelphia PA, US
    Christopher Zarcone - Marlton NJ, US
  • International Classification:
    G06F 15/167
    H04L 29/08
  • Abstract:
    Systems and methods for remote signaling are disclosed. One method can comprise receiving, by a destination node, a data packet having a source address associated with source node comprising an interface identifier of the source node, comparing at least a portion of the source address to one or more memory locations of the destination node, identifying a select memory location of the one or more memory locations based upon the comparing at least the portion of the source address to the one or more memory locations of the destination node, and causing execution of an executable instruction stored at the identified memory location.
  • Identity Authentication Using Credentials

    view source
  • US Patent:
    20140281498, Sep 18, 2014
  • Filed:
    Mar 14, 2013
  • Appl. No.:
    13/826777
  • Inventors:
    - Philadelphia PA, US
    Christopher Zarcone - Marlton NJ, US
  • International Classification:
    H04L 29/06
    H04L 9/32
  • US Classification:
    713156, 713168, 713176
  • Abstract:
    A method and system may allow for authenticating a computing device. A computing device may send an authentication request over a network to an authentication computing device. The authentication request may include a user name and a password. The user name may include a credential and the password may be a digitally signed version of the user name. The authentication computing device may authenticate the requesting computing device by decrypting the password and comparing the received user name to the decrypted password.

Resumes

Christopher Zarcone Photo 1

Principal Security Architect

view source
Location:
Mantua, NJ
Industry:
Telecommunications
Work:
Comcast - Greater Philadelphia Area since 2007
Principal Security Architect

Lockheed Martin - Greater Philadelphia Area 2002 - 2007
Lead Member, Engineering Staff

Netigy - Greater Philadelphia Area 1999 - 2001
Principal Consultant

Lockheed Martin - Greater Philadelphia Area 1995 - 1998
Systems Analyst
Education:
Rensselaer Polytechnic Institute 1995 - 1997
M.S., Computer Science
Drexel University 1990 - 1995
B.S., Computer Science
Skills:
Security
Information Security
Integration
Firewalls
Networking
Cloud Computing
Virtualization
Network Security
System Deployment
Enterprise Architecture
Architecture
Identity Management
Security Architecture Design
Cissp
System Architecture
Network Architecture
Disaster Recovery
Tcp/Ip
Data Center
Information Assurance
It Strategy
Network Engineering
Vpn
Technology
Unix
Engineering
Information Security Management
Solaris
Cisco Technologies
Reverse Engineering
Network Design
Tablets
Computer Forensics
Computer Science
Ipv6
Enterprise Networking
Operating Systems
Mobile Computing
Helping Clients Succeed
Intrusion Detection
Juniper
Systems Integration
Technology Protection
Ipv4
Protection
Customer Service
Penetration Testing
Service Provider Networking
Tablet Computing
Apple
Languages:
English
Awards:
ACM Senior Member
Association of Computing Machinery
The Senior Member Grade recognizes those ACM members with at least 10 years of professional experience and 5 years of continuous Professional Membership who have demonstrated performance that sets them apart from their peers. http://awards.acm.org/homepage.cfm?awd=159
Company Awards
Executive Leadership Award - 2011, 2012 Inventor Recognition Award - 2011, 2013 Excellence Award - 2009
Certifications:
Certified Information Systems Security Professional
Information Systems Security Architecture Professional
Cisco Certified Network Associate (Ccna), Network Professional (Ccnp), Design Associate (Ccda), Design Professional (Ccdp)
Christopher Zarcone Photo 2

Enterprise Security Architect At Comcast

view source
Location:
Greater Philadelphia Area
Industry:
Computer & Network Security

Youtube

Portraits Chris Zarcone

I shot and edited this video for one of my film classes. The audio was...

  • Duration:
    2m 12s

Zarcone - Look, Listen, Stop, Drop

Zarcone - Look, Listen, Stop, Drop Chris Zarcone 2010.

  • Duration:
    2m 42s

WEABOOS FIGHT TO THE DEATH

What happens when you take a high school anime club and fuel them up o...

  • Duration:
    4m 27s

MLG FLOWERS

  • Duration:
    32s

Half-assed loop

Drum&Bass loop via iPhone app.

  • Duration:
    1m 8s

I'm proud of this

Made on my phone in an afternoon, hope you enjoy this one.

  • Duration:
    3m 45s

Plaxo

Christopher Zarcone Photo 3

Christopher Zarce's Public

view source
Christopher Zarcone's Public Profile on Plaxo. Plaxo helps members like Christopher Zarcone keep in touch with the people who really matter, helping them to ...

Classmates

Christopher Zarcone Photo 4

Farmingdale High School, ...

view source
Graduates:
Chris Zarcone (1980-1984),
Chris Norton (1990-1994),
Mike Reilly (1970-1974),
Daniel Schwartzman (1969-1973)

Get Report for Christopher C Zarcone from Marlton, NJ, age ~52
Control profile