Unity Electric Redding, CA May 2014 to Nov 2014 5th year electrical apprenticeFoley Electric Redwood City, CA Dec 2013 to Mar 2014 5th year electrical apprenticeOtis Elevator San Francisco, CA Aug 2013 to Sep 2013 Helper/ApprenticeSausal Corporation San Leandro, CA Jun 2013 to Aug 2013 4th year electrical apprenticeKadena Pacific Inc San Bernardino, CA Mar 2011 to Jun 2013 2rd/3rd year electrical apprenticeDan Gillies Construction Service Kentfield, CA Sep 2010 to Feb 2011 Plumber/Electrical/CarpenterTitan Electrical Construction San Francisco, CA Jun 2009 to Sep 2010ColorMatch/Paragraphics Inc San Rafael, CA Jun 1991 to May 2009 Scanner Operator
Education:
Associate Builders and Contractors Inc. Livermore, CA 2009 to 2015 Electrical Apprentice ProgramCity College of San Francisco Livermore, CA 2008 to 2010 Construction
Skills:
Graphice Design, Photoshop, Apple OS, Microsoft Word/Execel
Name / Title
Company / Classification
Phones & Addresses
Richard Chow Owner
Civic Family Apartments Apartment Building Operator
1001 Sandlewood Ave, La Habra, CA 90631
Richard Chow Principal
Ortho Design Dental Laboratory
1891 Rancho Hl Dr, Chino Hills, CA 91709
Richard Chow Systems Analyst
City of Compton Treasurers Office · Executive Office · Membership Organization · Nonclassifiable Establishments
205 S Willowbrook Ave, Compton, CA 90220 310 605-5515, 310 605-5500
Techniques for ensuring privacy of users are provided. In one approach, a Web server receives a request from a Web browser. The Web browser generates an encryption key and sends the encryption key to the Web browser in a cookie. The Web server later encrypts the request (or any portion thereof) using the encryption key and deletes the encryption key so that the Web server is unable to determine the actual contents of the encrypted data. If the user does not delete the cookie (which would delete the encryption key), then a later request from the Web browser includes the cookie and the encryption key. The Web server is then able to decrypt the previously encrypted data and perform substantive analysis on the decrypted data.
Inbound Content Filtering Via Automated Inference Detection
A system is provided to detect email spam. During operation, the system receives an email, extracts a set of keywords from the email body, and constructs a first search query based a keyword extracted from the email body. The system further constructs a second search query based on the keyword in the first query and one additional word which pertains to a known spam word or to the subject of the email. Next, the system receives a first number of hits and a second number of hits in response to the first and second search queries, respectively. The system then determines whether the email is spam based on the first number and the second number. The system can also perform Website filtering using inference detection which is based on search results received in response to search queries formulated with keywords extracted from Websites.
Adjusting Security Level Of Mobile Device Based On Presence Or Absence Of Other Mobile Devices Nearby
Richard Chow - Sunnyvale CA, US Philippe J. P. Golle - San Francisco CA, US Jessica N. Staddon - Redwood City CA, US
Assignee:
Palo Alto Research Center Incorporated - Palo Alto CA
International Classification:
H04M 1/66
US Classification:
455410, 455411, 726 2
Abstract:
One embodiment of the present invention provides a method for adjusting security status on a mobile device, the method comprising: collecting security-related contextual information which includes information of nearby mobile devices and/or the geographic location of the intelligent mobile device; evaluating a threat level based on the collected security-related contextual information; invoking a security policy; and adjusting the security status of the mobile device based on the threat level and the security policy.
Privacy Through Artificial Contextual Data Generation
Richard Chow - Sunnyvale CA, US Philippe J. P. Golle - San Francisco CA, US Runting Shi - Sunnyvale CA, US
Assignee:
Palo Alto Research Center Incorporated - Palo Alto CA
International Classification:
G06F 7/04
US Classification:
726 28
Abstract:
Embodiments of the present disclosure provide a method and system for protecting privacy by generating artificial contextual data. The system collects real contextual data related to a user. The system then generates artificial contextual data, based on the collected real contextual data. The system also groups the generated contextual data into one or more groups. Each group of contextual data corresponds to a persona that can be presented as the user's persona. Subsequently, the system transmits the generated contextual data to an entity, thereby allowing the user to obscure the real contextual data related to the user.
Method And Apparatus For Detecting Sensitive Content In A Document
Jessica N. Staddon - Redwood City CA, US Richard Chow - Sunnyvale CA, US Valeria de Paiva - Cupertino CA, US Philippe J. P. Golle - San Francisco CA, US Ji Fang - Mountain View CA, US Tracy Holloway King - Mountain View CA, US
Assignee:
Palo Alto Research Center Incorporated - Palo Alto CA
International Classification:
G06F 17/30
US Classification:
707730, 707706, 707707, 707727, 707728, 707736
Abstract:
One embodiment of the present invention provides a system that detects sensitive content in a document. In doing so, the system receives a document, identifies a set of terms in the document that are candidate sensitive terms, and generates a combination of terms based on the identified terms that is associated with a semantic meaning. Next, the system performs searches through a corpus based on the combination of terms and determines hit counts returned for each term in the combination and for the combination. The system then determines whether the combination of terms is sensitive based on the hit count for the combination and the hit counts for the individual terms in the combination, and generates a result that indicates portions of the document which contain sensitive combinations.
Bjorn Markus Jakobsson - Palo Alto CA, US Philippe J. P. Golle - San Francisco CA, US Richard Chow - Sunnyvale CA, US
Assignee:
Palo Alto Research Center Incorporated - Palo Alto CA
International Classification:
G06F 7/04 G06F 17/30
US Classification:
726 2, 726 7, 726 17, 713170, 713182
Abstract:
A system for displaying a set of selectable CAPTCHAs produces a first set of CAPTCHAs whose images are based at least partially on an alphanumeric sequence, where a respective CAPTCHA in the first set is associated with a CAPTCHA property. The system also produces a second set of CAPTCHAs whose images are based at least partially on an alphanumeric sequence, where a respective CAPTCHA in the second set is not associated with a CAPTCHA property. Next, the system displays the first and second sets of CAPTCHAs. Finally, the system makes respective CAPTCHAs in the first and second sets of CAPTCHAs selectable, thereby allowing a user to pass a CAPTCHA challenge by distinguishing the first set of CAPTCHAs from the second set of CAPTCHAs without typing the words associated with the images.
Bjorn Markus Jakobsson - Mountain View CA, US Mark J. Grandcolas - Burlingame CA, US Philippe J. P. Golle - San Francisco CA, US Richard Chow - Sunnyvale CA, US Runting Shi - Sunnyvale CA, US
Assignee:
Palo Alto Research Center Incorporated - Palo Alto CA
Embodiments of the present disclosure provide a method and system for implicitly authenticating a user to access controlled resources. The system receives a request to access the controlled resources. The system then determines a user behavior score based on a user behavior model, and recent contextual data about the user. The user behavior score facilitates identifying a level of consistency between one or more recent user events and a past user behavior pattern. The recent contextual data, which comprise a plurality of data streams, are collected from one or more user devices without prompting the user to perform an action explicitly associated with authentication. The plurality of data streams provide basis for determining the user behavior score, but a data stream alone provides insufficient basis for the determination of the user behavior score. The system also provides the user behavior score to an access controller of the controlled resource.
Augmenting Privacy Policies With Inference Detection
Richard Chow - Sunnyvale CA, US Phillippe J. P. Golle - San Francisco CA, US Jessica N. Staddon - Redwood City CA, US
Assignee:
Palo Alto Research Center Incorporated - Palo Alto CA
International Classification:
G06F 7/00 G06F 17/30 G06F 12/00
US Classification:
707737, 707754, 707765, 707783
Abstract:
A system is provided for augmenting a privacy policy. During operation, the system obtains a set of training documents and at least one seed keyword associated with the privacy policy. The system extracts a number of candidate keywords from the training documents and formulates at least one query based on the candidate keywords. The system then issues the query to a corpus. In response to the query, the system receives a set of result documents. The system further determines whether a respective keyword extracted from the result documents matches at least one seed keyword. The system then augments the privacy policy by associating the candidate keyword corresponding to the respective keyword with the privacy policy based on the determination. In addition, the system applies the augmented privacy policy to a subject document and produces a result to indicate whether the subject document is in violation of the privacy policy.