Search

James L Kolouch

age ~79

from Vienna, VA

Also known as:
  • James Lowell Kolouch
Phone and address:
1826 Batten Hollow Rd, Vienna, VA 22182
703 621-3494

James Kolouch Phones & Addresses

  • 1826 Batten Hollow Rd, Vienna, VA 22182 • 703 621-3494
  • Gold Canyon, AZ
  • Cromwell, CT
  • Falls Church, VA
  • Haymarket, VA

Work

  • Position:
    Clerical/White Collar

Education

  • Degree:
    Associate degree or higher

License Records

James L Kolouch

Address:
Vienna, VA 22182
License #:
2859 - Expired
Issued Date:
Jun 30, 1983
Expiration Date:
Jun 30, 2001
Type:
Certified Public Accountant

Us Patents

  • Cryptographic Key Split Binder For Use With Tagged Data Elements

    view source
  • US Patent:
    7095852, Aug 22, 2006
  • Filed:
    Nov 20, 2001
  • Appl. No.:
    09/992529
  • Inventors:
    C. Jay Wack - Clarksburg MD, US
    Edward M. Scheidt - McLean VA, US
    James L. Kolouch - Vienna VA, US
  • Assignee:
    Tecsec, Inc. - Vienna VA
  • International Classification:
    H04L 9/22
  • US Classification:
    380 44, 380280, 380286
  • Abstract:
    A cryptographic key split binder includes key split generators that generate cryptographic key splits from seed data and a key split randomizer for randomizing cryptographic key splits to produce a cryptographic key, and a process for forming cryptographic keys. Key split generators can include a random split generator for generating a random key split based on reference data, a token split generator for generating a token key split based on label data, a console split generator for generating a console key split based on maintenance data or a biometric split generator for generating a biometric key split based on biometric data. Any key split can further be based on static data, which can be updated. Label data can be read from a storage medium, and can include user authorization data. A cryptographic key can be, for example, a stream of symbols, at least one symbol block, or a key matrix.
  • Electronically Signing A Document

    view source
  • US Patent:
    7178030, Feb 13, 2007
  • Filed:
    Oct 25, 2001
  • Appl. No.:
    10/035817
  • Inventors:
    Edward Scheidt - McLean VA, US
    James Kolouch - Vienna VA, US
    Ersin L. Domangue - Woodbine MA, US
    Mark A. Odell - Ashburn VA, US
    Wai Lin Tsang - Falls Church VA, US
  • Assignee:
    TecSec, Inc. - Vienna VA
  • International Classification:
    H04L 9/00
    H04L 9/28
    H04L 9/24
    H04K 1/00
  • US Classification:
    713176, 380277, 380260, 380259, 380280, 380 23, 713185, 713168, 713171
  • Abstract:
    A method of electronically signing a document includes initializing a user, including generating an asymmetric key pair including a private signing key and a public signing key, and storing the private signing key and the public signing key; and providing an electronic signature, including receiving document data corresponding to at least one selected portion of the document, binding the stored private signing key and the document data to create an electronic signature, and providing the electronic signature for a recipient.
  • Electronically Signing A Document

    view source
  • US Patent:
    7490240, Feb 10, 2009
  • Filed:
    Feb 12, 2007
  • Appl. No.:
    11/673755
  • Inventors:
    Edward M. Scheidt - McLean VA, US
    James L. Kolouch - Vienna VA, US
    Ersin L. Domangue - Woodbine MD, US
    Mark A. Odell - Ashburn VA, US
    Wai Lin Tsang - Falls Church VA, US
  • Assignee:
    TecSec, Inc. - McLean VA
  • International Classification:
    H04L 9/00
    H04L 9/28
    H04L 9/24
  • US Classification:
    713176, 713171, 713168, 713185, 380277, 380260, 380259, 380280, 380 30, 380 55, 380243, 380245, 283 17
  • Abstract:
    A method of electronically signing a document includes initializing a user, including generating an asymmetric key pair including a private signing key and a public signing key, and storing the private signing key and the public signing key; and providing an electronic signature, including receiving document data corresponding to at least one selected portion of the document, binding the stored private signing key and the document data to create an electronic signature, and providing the electronic signature for a recipient.
  • Cryptographic Key Split Binder For Use With Tagged Data Elements

    view source
  • US Patent:
    7817800, Oct 19, 2010
  • Filed:
    Jun 22, 2006
  • Appl. No.:
    11/473520
  • Inventors:
    C. Jay Wack - Clarksburg MD, US
    Edward M. Scheidt - McLean VA, US
    James L. Kolouch - Vienna VA, US
  • Assignee:
    TecSec, Inc. - McLean VA
  • International Classification:
    H04L 9/00
    H04N 7/167
  • US Classification:
    380 44, 380277, 380200
  • Abstract:
    A cryptographic key split binder includes key split generators that generate cryptographic key splits from seed data and a key split randomizer for randomizing cryptographic key splits to produce a cryptographic key, and a process for forming cryptographic keys. Key split generators can include a random split generator for generating a random key split based on reference data, a token split generator for generating a token key split based on label data, a console split generator for generating a console key split based on maintenance data or a biometric split generator for generating a biometric key split based on biometric data. Any key split can further be based on static data, which can be updated. Label data can be read from a storage medium, and can include user authorization data. A cryptographic key can be, for example, a stream of symbols, at least one symbol block, or a key matrix.
  • Cryptographic Key Split Binder For Use With Tagged Data Elements

    view source
  • US Patent:
    8077870, Dec 13, 2011
  • Filed:
    Oct 18, 2010
  • Appl. No.:
    12/906906
  • Inventors:
    C. Jay Wack - Grasonville MD, US
    Edward M. Scheidt - McLean VA, US
    James L. Kolouch - Vienna VA, US
  • Assignee:
    TecSec, Inc. - Herndon VA
  • International Classification:
    H04L 9/00
    H04N 7/167
  • US Classification:
    380 44, 380277, 380200
  • Abstract:
    A process of cryptographically securing a data object including one or more respectively tagged data elements includes selecting a tagged data element from among a plurality of tagged data elements, based on an associated data tag. A plurality of cryptographic key splits is generated from seed data. The cryptographic key splits are bound together to produce a first cryptographic key. A second cryptographic key is generated based on security requirements of the data object. The tagged data element is encrypted using the first cryptographic key. The data object encrypting using the second cryptographic key. At least one of the cryptographic key splits is based on the associated data tag.
  • Secure Accounting And Operational Control Reporting System

    view source
  • US Patent:
    20020184511, Dec 5, 2002
  • Filed:
    Jul 12, 2002
  • Appl. No.:
    10/194742
  • Inventors:
    James Kolouch - Vienna VA, US
  • International Classification:
    H04L009/32
  • US Classification:
    713/189000
  • Abstract:
    A secure accounting and operational method, whereby process elements are provided to a process, selected process elements are manipulated, a scheduled condition of the process is sampled at a predetermined point in the process, and the process sample is encrypted to provide an encrypted output. As a result, an authorized recipient has a high level of confidence in the reliability of the scheduled condition samples due to the integrity provided by the encryption process.
  • Process Of Encryption And Operational Control Of Tagged Data Elements

    view source
  • US Patent:
    20080310619, Dec 18, 2008
  • Filed:
    Apr 25, 2006
  • Appl. No.:
    11/912404
  • Inventors:
    Edward M. Scheidt - McLean VA, US
    James L. Kolouch - Vienna VA, US
  • International Classification:
    H04L 9/28
  • US Classification:
    380 28
  • Abstract:
    A process of encrypting an object having an associated object tag includes generating a cryptographic key by binding an organization split, a maintenance split, a random split, and at least one label split (). A cryptographic algorithm is initialized with the cryptographic key, and the object is encrypted using the cryptographic algorithm () according to the object tag, to form an encrypted object. Combiner data is added to the encrypted object (). The combiner data includes reference data, name data, a maintenance split or a maintenance level, and the random split (). Alternatively, key splits are bound to generate a cryptographic key, and a cryptographic algorithm is initialized with the cryptographic key. The initialized cryptographic algorithm is applied to the object according to a cryptographic scheme determined by the object tag, to form an encrypted object. One of the key splits corresponds to a biometric measurement.
  • Encryption Scheme

    view source
  • US Patent:
    20120204036, Aug 9, 2012
  • Filed:
    Jul 22, 2011
  • Appl. No.:
    13/189362
  • Inventors:
    C. Jay Wack - Herndon VA, US
    James L. Kolouch - Herndon VA, US
  • Assignee:
    TECSEC - Herndon VA
  • International Classification:
    G06F 21/24
    G06F 17/00
  • US Classification:
    713189
  • Abstract:
    Cryptographically converting raw data into a structured electronic document can include parsing the raw data to identify at least one raw data object. A target data object is selected from the raw data object(s). For each selected target data object, the target data object is encrypted according to a cryptographic scheme to create an encrypted data object. Each selected target data object is replaced with the respective encrypted data object, and is associated with markup data in a structured format for each respective encrypted data object, resulting in the structured electronic document. The format of the structured electronic document can be compliant with a formatting language, which can be a general-purpose or specific-purpose formatting language.

Resumes

James Kolouch Photo 1

James Kolouch

view source
Location:
Washington D.C. Metro Area
Industry:
Computer & Network Security
James Kolouch Photo 2

James Kolouch

view source

Youtube

Is The Democrat Party Out Of Touch?

Is The Democrat Party Out Of Touch? I ask Californians ahead of the mi...

  • Duration:
    14m 35s

Replying to Kolouch Working vending machine ...

shorts #tiktok Follow The Original Creator On TikTok For Copyright or ...

  • Duration:
    29s

Democrats' Online "Safety Expert" DESTROYED W...

Democrats' Online "Safety Expert" DESTROYED With Her OWN Tweets SUPPOR...

  • Duration:
    15m 31s

Coca-Cola CEO: Results Show North American St...

Jul.23 -- James Quincey, chairman and chief executive officer at Coca-...

  • Duration:
    2m 10s

Let your power fall | James Fortune

Original video , share and subscribe #Christian #music #gospel #Holy...

  • Duration:
    6m 43s

Paul Schrader, Willem Dafoe, Nick Nolte and J...

Director Paul Schrader and a panel of actors discuss their film, "Affl...

  • Duration:
    19m 29s

Has anyone checked on Portland lately?

video from 2020*

  • Duration:
    20s

Watercolour Time Lapse: Blackberry Blossoms

Thanks for watching. Full length tutorial is available on my website W...

  • Duration:
    2m 25s

Facebook

James Kolouch Photo 3

James Kolouch

view source

Get Report for James L Kolouch from Vienna, VA, age ~79
Control profile