Denis Jacques Paul Garcia - Palo Alto CA, US Michael Michio Ouye - Mountain View CA, US Alain Rossmann - Palo Alto CA, US Steven Toye Crocker - Burlingame CA, US Eric Gilbertson - Menlo Park CA, US Weiqing Huang - Flower Mound TX, US Serge Humpich - Tournan-en-Brie, FR Klimenty Vainstein - San Francisco CA, US Nicholas Michael Ryan - Sunnyvale CA, US
In a system for providing access control management to electronic data, techniques to secure the electronic data and keep the electronic data secured at all times are disclosed. According to one embodiment, a secured file or secured document includes two parts: an attachment, referred to as a header, and an encrypted document or data portion. The header includes security information that points to or includes the access rules and a file key. The access rules facilitate restrictive access to the secured document and essentially determine who/when/how/where the secured document can be accessed. The file key is used to encrypt/decrypt the encrypted data portion. Only those who have the proper access privileges are permitted to retrieve the file key to encrypt/decrypt the encrypted data portion.
Michael Ouye - Los Altos CA, US Alain Rossmann - Palo Alto CA, US Steven Crocker - Redwood City CA, US Eric Gilbertson - Menlo Park CA, US Weiqing Huang - Sunnyvale CA, US Denis Paul Garcia - Palo Alto CA, US Serge Humpich - Tournan-en-Brie, FR Klimenty Vainstein - Cupertino CA, US Nicholas Ryan - Sunnyvale CA, US
Assignee:
Pervasive Security Systems, Inc. - Menlo Park CA
International Classification:
H04K001/00
US Classification:
713/182000
Abstract:
Techniques for managing access to digital assets via a designated place or its sub-places are disclosed. The designated place may be a file folder, a directory, a local or remote store. The designated place is characterized by or associated with a securing module that causes all files stored in the designated place to have substantially similar security. In other words, a file to be secured can be simply dropped into the designated place and the securing module is configured to take actions to secure the file transparently in accordance with the security characteristics of the designated place. Likewise, a designated place can be set up to unsecure the secured files being deposited in the designated place, provided a user of the secured files is permitted to do so.
Methods And Systems For Providing Access Control To Secured Data
Denis Jacques Paul Garcia - Palo Alto CA, US Micheal Michio Ouye - Mountain View CA, US Alain Rossmann - Palo Alto CA, US Steven Toye Crocker - Burlingame CA, US Eric Gilbertson - Menlo Park CA, US Weiqing Huang - Flower Mound TX, US Serge Humpich - Tournan-en-Brie, FR Klimenty Vainstein - San Francisco CA, US Nicholas Micheal Ryan - Sunnyvale CA, US
Assignee:
Intellectual Ventures I LLC - Wilmington DE
International Classification:
G06F 21/60
US Classification:
713193
Abstract:
In a system for providing access control management to electronic data, techniques to secure the electronic data and keep the electronic data secured at all times are disclosed. According to one embodiment, a secured file or secured document includes two parts: an attachment, referred to as a header, and an encrypted document or data portion. The header includes security information that points to or includes the access rules and a file key. The access rules facilitate restrictive access to the secured document and essentially determine who/when/how/where the secured document can be accessed. The file key is used to encrypt/decrypt the encrypted data portion. Only those who have the proper access privileges are permitted to retrieve the file key to encrypt/decrypt the encrypted data portion.
System For Building A User-Determined Database Of Solution Documents From Queries That Fail Within It And From The Search Steps That Do Provide A Solution
Eric J. Gilbertson - Menlo Park CA Sarah L. Nunke - Sunnyvale CA
Assignee:
Answer Computer, Inc. - Sunnyvale CA
International Classification:
G06F 15403 G06F 1540
US Classification:
395600
Abstract:
A computer system and method are disclosed for integrating call management to the retrieval of documents in response to user inquiries. The system consists of a processor connected to an incident table register, a user table register and a document tree data base. The incident table register records and stores information related to the user inquiry, the user table stores information related to the user's identity and the document tree data base stores a plurality of documents, useful in addressing user inquiries. Various linkages connect information stored in the various tables and registers, thereby making the system integrated with respect to the user's identity, the user's inquiry and the identity of the document which ultimately resolves the inquiry.
Methods And Systems For Providing Access Control To Secured Data
- Wilmington DE, US Michael Michio OUYE - Mountain View CA, US Alain ROSSMANN - Palo Alto CA, US Steven Toye CROCKER - Burlingame CA, US Eric GILBERTSON - Menlo Park CA, US Weiqing HUANG - Flower Mound TX, US Serge HUMPICH - Tournan-en-Brie, FR Klimenty VAINSTEIN - San Francisco CA, US Nicholas Michael RYAN - Sunnyvale CA, US
Assignee:
INTELLECTUAL VENTURES I LLC - Wilmington DE
International Classification:
G06F 21/62 H04L 29/06 G06F 21/60 H04L 9/08
Abstract:
In a system for providing access control management to electronic data, techniques to secure the electronic data and keep the electronic data secured at all times are disclosed. According to one embodiment, a secured file or secured document includes two parts: an attachment, referred to as a header, and an encrypted document or data portion. The header includes security information that points to or includes the access rules and a file key. The access rules facilitate restrictive access to the secured document and essentially determine who/when/how/where the secured document can be accessed. The file key is used to encrypt/decrypt the encrypted data portion. Only those who have the proper access privileges are permitted to retrieve the file key to encrypt/decrypt the encrypted data portion.
Methods And Systems For Providing Access Control To Secured Data
- Wilmington DE, US Michael Michio OUYE - Mountain View CA, US Alain ROSSMANN - Palo Alto CA, US Steven Toye CROCKER - Burlingame CA, US Eric GILBERTSON - Menlo Park CA, US Weiqing HUANG - Flower Mound TX, US Serge HUMPICH - Tournan-en-Brie, FR Klimenty VAINSTEIN - San Francisco CA, US Nicholas Michael RYAN - Sunnyvale CA, US
Assignee:
INTELLECTUAL VENTURES I LLC - Wilmington DE
International Classification:
G06F 21/62 H04L 9/08 H04L 29/06
Abstract:
In a system for providing access control management to electronic data, techniques to secure the electronic data and keep the electronic data secured at all times are disclosed. According to one embodiment, a secured file or secured document includes two parts: an attachment, referred to as a header, and an encrypted document or data portion. The header includes security information that points to or includes the access rules and a file key. The access rules facilitate restrictive access to the secured document and essentially determine who/when/how/where the secured document can be accessed. The file key is used to encrypt/decrypt the encrypted data portion. Only those who have the proper access privileges are permitted to retrieve the file key to encrypt/decrypt the encrypted data portion.
Methods And Systems For Providing Access Control To Secured Data
- Wilmington DE, US Michael Michio Ouye - Mountain View CA, US Alain Rossmann - Palo Alto CA, US Steven Toye Crocker - Burlingame CA, US Eric Gilbertson - Menlo Park CA, US Weiqing Huang - Flower Mound TX, US Serge Humpich - Tournan-en-Brie, FR Klimenty Vainstein - San Francisco CA, US Nicholas Michael Ryan - Sunnyvale CA, US
Assignee:
INTELLECTUAL VENTURES I LLC - Wilmington DE
International Classification:
G06F 21/62
US Classification:
726 28
Abstract:
In a system for providing access control management to electronic data, techniques to secure the electronic data and keep the electronic data secured at all times are disclosed. According to one embodiment, a secured file or secured document includes two parts: an attachment, referred to as a header, and an encrypted document or data portion. The header includes security information that points to or includes the access rules and a file key. The access rules facilitate restrictive access to the secured document and essentially determine who/when/how/where the secured document can be accessed. The file key is used to encrypt/decrypt the encrypted data portion. Only those who have the proper access privileges are permitted to retrieve the file key to encrypt/decrypt the encrypted data portion.
Peloton Technology
Web Development Lead
Totvs Labs
Lead Front End Engineer
Intransa Nov 2009 - Jun 2012
Staff Engineer
Pss Systems Jan 2002 - Jul 2009
Engineer
Valicert 1999 - 2001
Server Group Leader
Education:
University of Utah
Bachelors, Bachelor of Science, Electrical Engineering
Skills:
Java Web Applications Agile Methodologies Software Design Enterprise Software Distributed Systems Software Development Software Engineering Kernel Linux Debugging Test Automation Cloud Computing Unix Tcp/Ip Embedded Systems C++ C Operating Systems Shell Scripting Scalability Rest Xml Perl Internet Protocol Suite
The Preservation Trust found about a fifth of the buildings they surveyed had actual structural damage to the foundation or elsewhere. Eric Gilbertson, who assessed damaged properties for the survey, thinks most of the buildings he saw can be saved. But he is worried that homeowners with limited res