Search

An N Le

age ~38

from Arlington, VA

Also known as:
  • Ann Marlow
  • Ngoc An

An Le Phones & Addresses

  • Arlington, VA
  • Alexandria, VA
  • Washington, DC

Us Patents

  • Secure Management Of Keys Using Extended Control Vectors

    view source
  • US Patent:
    49245155, May 8, 1990
  • Filed:
    Aug 24, 1989
  • Appl. No.:
    7/398299
  • Inventors:
    Stephen M. Matyas - Manassas VA
    Dennis G. Abraham - Concord NC
    William C. Arnold - Mahopac NY
    Donald B. Johnson - Manassas VA
    Ramesh K. Karne - Herndon VA
    An V. Le - Arlington VA
    Rostislaw Prymak - Dumfries VA
    Steve R. White - New York NY
    John D. Wilkins - Somerville VA
  • Assignee:
    International Business Machines Coprporation - Armonk NY
  • International Classification:
    H04L 902
  • US Classification:
    380 25
  • Abstract:
    A method and apparatus are disclosed for use in a data processing system which executes a program which outputs cryptographic service requests for operations with cryptographic keys which are associated with control vectors defining the functions which each key is allowed by its originator to perform. The improved method and apparatus enable the use of control vectors having an arbitrary length. It includes a control vector register having an arbitrary length, for storing a control vector of arbitrary length associated with an N-bit cryptographic key. It further includes a control vector checking means having an input coupled to the control vector register, for checking that the control vector authorizes the cryptographic function which is requested by the cryptographic service request. It further includes a hash function generator having an input coupled to the control vector register and an N-bit output, for mapping the control vector output from the control vector register, into an N-bit hash value. A key register is included for storing the N-bit cryptographic key.
  • Method To Establish And Enforce A Network Cryptographic Security Policy In A Public Key Cryptosystem

    view source
  • US Patent:
    51649888, Nov 17, 1992
  • Filed:
    Oct 31, 1991
  • Appl. No.:
    7/786227
  • Inventors:
    Stephen M. Matyas - Manassas VA
    Donald B. Johnson - Manassas VA
    An V. Le - Manassas VA
    Rostislaw Prymak - Dumfries VA
    William C. Martin - Concord NC
    William S. Rohland - Charlotte NC
    John D. Wilkins - Somerville VA
  • Assignee:
    International Business Machines Corporation - Armonk NY
  • International Classification:
    H04K 100
  • US Classification:
    380 25
  • Abstract:
    Device A in a public key cryptographic network will be constrained to continue to faithfully practice a security policy dictated by a network certification center, long after device A's public key PUMa has been certified. If device A alters its operations from the limits encoded in its configuration vector, for example by loading a new configuration vector, device A will be denied participation in the network. To accomplish this enforcement of the network security policy dictated by the certification center, it is necessary for the certification center to verify at the time device A requests certification of its public key PUMa, that device A is configured with the currently authorized configuration vector. Device A is required to transmit to the certification center a copy of device A's current configuration vector, in an audit record. the certification center then compares device A's copy of the configuration vector with the authorized configuration vector for device A stored at the certification center.
  • Method For Generating Public And Private Key Pairs Without Using A Passphrase

    view source
  • US Patent:
    52010007, Apr 6, 1993
  • Filed:
    Sep 27, 1991
  • Appl. No.:
    7/766533
  • Inventors:
    Stephen M. Matyas - Manassas VA
    Donald B. Johnson - Manassas VA
    An V. Le - Manassas VA
    Rostislaw Prymak - Dumfries VA
    John D. Wilkins - Somerville VA
  • Assignee:
    International Business Machines Corporation - Armonk NY
  • International Classification:
    H04K 100
  • US Classification:
    380 30
  • Abstract:
    A data processing system, program and method are disclosed for managing a public key cryptographic system which includes a public key, private key pair generator. The method includes the step of generating a first public key, private key pair using a first seed value known to a user, the first seed value being generated from a passphrase. A first random number is generated using the first seed value and applied to generating the first key pair. The method then generates a first control vector defining a first use of the first public key, private key pair. The method then continues with the step of generating a second public key, private key pair using a second seed value unknown to the user, the second seed value being a true random number. The second random number is generated using the second seed value in a pseudorandom number generator and applied to generating the second key pair. The method generates a second control vector defining a second use of the second public key, private key pair.
  • Data Cryptography Operations Using Control Vectors

    view source
  • US Patent:
    49187287, Apr 17, 1990
  • Filed:
    Aug 30, 1989
  • Appl. No.:
    7/401486
  • Inventors:
    Stephen M. Matyas - Manassas VA
    Dennis G. Abraham - Concord NC
    Donald B. Johnson - Manassas VA
    Ramesh K. Karne - Herndon VA
    An V. Le - Arlington VA
    Rostislaw Prymak - Dumfries VA
    Julian Thomas - Lagrange NY
    John D. Wilkins - Somerville VA
    Phil C. Yeh - Poughkeepsie NY
  • Assignee:
    International Business Machines Corporation - Armonk NY
  • International Classification:
    H04L 900
  • US Classification:
    380 21
  • Abstract:
    Data cryptography is achieved in an improved manner by associating with the data cryptography key, a control vector which provides the authorization for the uses of the key intended by the originator of the key. Among the uses specified by the control vector are limitations on encryption, decryption, authentication code generation and verification, translation of the user's data. Complex combinations of data manipulation functions are possible using the control vectors, in accordance with the invention. The system administrator can exercise flexibility in changing the implementation of his security policy by selecting appropriate control vectors in accordance with the invention. Complex scenarios such as encrypted mail box, session protection, file protection, ciphertext translation center, peer-to-peer ciphertext translation, message authentication, message authentication with non-repudiation and many others can be easily implemented by a system designer using the control vectors, in accordance with the invention.
  • Secure Key Management Using Control Vector Translation

    view source
  • US Patent:
    49930699, Feb 12, 1991
  • Filed:
    Nov 29, 1989
  • Appl. No.:
    7/443418
  • Inventors:
    Stephen M. Matyas - Manassas VA
    Dennis G. Abraham - Concord NC
    Donald B. Johnson - Manassas VA
    An V. Le - Arlington VA
    Rostislaw Prymak - Dumfries VA
    John D. Wilkins - Somerville VA
    Phil C. Yeh - Poughkeepsie NY
  • Assignee:
    International Business Machines Corporation - Armonk NY
  • International Classification:
    H04K 100
  • US Classification:
    380 23
  • Abstract:
    A cryptographic system and method is provided which accepts a key K encrypted under a key formed by exclusive-ORing a key-encrypting key KK with a first control vector C5 and outputs the same key K encrypted under a key formed by exclusive-ORing KK with a second control vector C6. The set (C5, C6) represents a mapping of the type and usage of the key K defined by the control vector C5 to the type and usage defined by the control vector C6. The set of allowable control vector mappings, that is from C5 to C6, are defined in a control vector translation table, which is specified in advance by authorized installation personnel.
  • Public Key Cryptosystem Key Management Based On Control Vectors

    view source
  • US Patent:
    52009998, Apr 6, 1993
  • Filed:
    Sep 27, 1991
  • Appl. No.:
    7/766260
  • Inventors:
    Stephen M. Matyas - Manassas VA
    Donald B. Johnson - Manassas VA
    An V. Le - Manassas VA
    Rostislaw Prymak - Dumfries VA
    William C. Martin - Concord NC
    William S. Rohland - Charlotte NC
    John D. Wilkins - Somerville VA
  • Assignee:
    International Business Machines Corporation - Armonk NY
  • International Classification:
    H04K 100
  • US Classification:
    380 25
  • Abstract:
    A data processing system, method and program are disclosed, for managing a public key cryptographic system. The method includes the steps of generating a first public key and a first private key as a first pair in the data processing system, for use with a first public key algorithm and further generating a second public key and a second private key as a second pair in the data processing system, for use with a second public key algorithm. The method then continues by assigning a private control vector for the first private key and the second private key in the data processing system, for defining permitted uses for the first and second private keys. Then the method continues by forming a private key record which includes the first private key and the second private key in the data processing system, and encrypting the private key record under a first master key expression which is a function of the private control vector. The method then forms a private key token which includes the private control vector and the private key record, and stores the private key token in the data processing system. At a later time, the method receives a first key use request in the data processing system, requiring the first public key algorithm.
  • Network Security System And Method Using A Parallel Finite State Machine Adaptive Active Monitor And Responder

    view source
  • US Patent:
    54148332, May 9, 1995
  • Filed:
    Oct 27, 1993
  • Appl. No.:
    8/144161
  • Inventors:
    Paul C. Hershey - Manassas VA
    Donald B. Johnson - Manassas VA
    An V. Le - Manassas VA
    Stephen M. Matyas - Manassas VA
    John G. Waclawsky - Frederick MD
    John D. Wilkins - Somerville VA
  • Assignee:
    International Business Machines Corporation - Armonk NY
  • International Classification:
    H04L 900
  • US Classification:
    395575
  • Abstract:
    A system and method provide a security agent, consisting of a monitor and a responder, that respond to a detected security event in a data communications network, by producing and transmitting a security alert message to a network security manager. The alert is a security administration action which includes setting a flag in an existing transmitted protocol frame to indicate a security event has occurred. The security agent detects the transmission of infected programs and data across a high-speed communications network. The security agent includes an adaptive, active monitor using finite state machines, that can be dynamically reprogrammed in the event it becomes necessary to dynamically reconfigure it to provide real time detection of the presence of a suspected offending virus.
  • Secure Cryptographic Operations Using Control Vectors Generated Inside A Cryptographic Facility

    view source
  • US Patent:
    54328497, Jul 11, 1995
  • Filed:
    Aug 10, 1993
  • Appl. No.:
    8/103953
  • Inventors:
    Donald B. Johnson - Manassas VA
    An V. Le - Manassas VA
    Stephen M. Matyas - Manassas VA
    Rostislaw Prymak - Dumfries VA
    John D. Wilkins - Somerville VA
  • Assignee:
    International Business Machines Corporation - Armonk NY
  • International Classification:
    H04L 900
  • US Classification:
    380 21
  • Abstract:
    The invention described herein suggests methods of cryptographic key management based on control vectors in which the control vectors are generated or derived internal to a cryptographic facility implementing a set of cryptographic operations. The methods of alternate control vector enforcement described in the present application provide a high-integrity facility to ensure that cryptographic keys are used in a manner consistent with the type and usage attributes assigned to the keys by the originator of those keys. Since the control vectors are generated or derived internal to the cryptographic facility on the basis of data contained in each cryptographic service request to the cryptographic facility, control vectors need not be stored or managed outside the cryptographic facility.

Myspace

An Le Photo 1

An Le

view source
Locality:
SAVANNAH, GEORGIA
Gender:
Female
Birthday:
1944
An Le Photo 2

An Le

view source
Locality:
MILPITAS, CALIFORNIA
Gender:
Female
Birthday:
1945
An Le Photo 3

An Le

view source
Locality:
DENVER, Colorado
Gender:
Male
Birthday:
1946

Googleplus

An Le Photo 4

An Le

Work:
IIT - Math TA
IIT - Research
Education:
Illinois Institute of Technology - Biomedical Engineering
Relationship:
Single
About:
Right now I don't have much to say about myself. The best way to know me is TALKING TO ME:)
Tagline:
I like simple, and I try to make things as simple as possible.
Bragging Rights:
I am a small girl in a big big world
An Le Photo 5

An Le

Work:
Tinh uy Gia Lai
Huyen Krong Pa - CBDA 03 (2010)
Education:
University Tay Nguyen - Kinh te Nong Lam
Relationship:
Single
Bragging Rights:
Dang di lam, chua kiem dc anh nao de bat nat huuuuuuuuuuuuu
An Le Photo 6

An Le

Work:
An Le Studio - Photographer (2010)
Education:
SCAD - Photography
Tagline:
The Photographer
An Le Photo 7

An Le

Lived:
Washington, DC
Education:
Marymount University - MA, Human Resource Mgmt, Rutgers University - History
An Le Photo 8

An Le

Education:
Ben Tre High School for the Gifted - Maths
Relationship:
Single
About:
Friendly, humorous, motivated, stubborn, ambitious
Bragging Rights:
A good graduate in Information System, Vietnam National University - Information Technology University, Ho Chi Minh City.
An Le Photo 9

An Le

Work:
S.G - D.L
Education:
Truong che^
An Le Photo 10

An Le

Education:
đại học vinh - Ks xây dựng, Thpt phạm hồng thái (hưng nguyên) - Lớp M
An Le Photo 11

An Le

Work:
360kpop - Timer
Relationship:
Single
About:
Sinh ra và lớn lên ở Nha Trang mới yêu mên biết bao bãi biễn cát vàng và trong xanh. Ngoài ra còn yêu con người và thiên nhiên. Có những lúc trời lụt dân lên cao đến nửa nhà, và cũng có những lúc trời...
Tagline:
Cảm nhận những điều nhỏ nhất để tìm thấy hạnh phúc

Plaxo

An Le Photo 12

An Le

view source
Bedford, TX

Flickr

Youtube

Adele - Chasing Pavements (cover by An Le)

SUBSCRIBE TO AN AND CHECK OUT HER OTHER VIDEOS!! youtube.com/ohhh... ...

  • Category:
    Music
  • Uploaded:
    18 Feb, 2009
  • Duration:
    3m 44s

Knock You Down Cover (Keri HIlson)- An Le, CP...

Loved this song so much had to do it again but this time with the awes...

  • Category:
    Music
  • Uploaded:
    04 Jul, 2009
  • Duration:
    4m 29s

Ida Corr vs Fedde Le Grand Let Me Think About...

Ida Corr vs Fedde Le Grand - Let Me Think About It (VJ Optique Extende...

  • Category:
    Music
  • Uploaded:
    06 Oct, 2007
  • Duration:
    4m 46s

Parkour and FreeRunning

Edited by: Saulo Sampson Chase Armitage, 3Run, David Belle, Sebastien ...

  • Category:
    Sports
  • Uploaded:
    07 Jun, 2006
  • Duration:
    3m 38s

Le Chevalier D'Eon - 19 - Toward A Bloody Red

Now available on DVD! www.funimation.c... The Four Musketeers obtain ...

  • Category:
    Shows
  • Uploaded:
    10 Feb, 2010
  • Duration:
    25m 6s

citroen GT on road exhaust sound

amazing engin sound by citroen GT in le mans 2009

  • Category:
    Autos & Vehicles
  • Uploaded:
    12 Jun, 2009
  • Duration:
    1m 45s

Classmates

An Le Photo 21

An Le

view source
Schools:
San Joaquin Elementary School Laguna Hills CA 1980-1984, La Paz Intermediate School Mission Viejo CA 1985-1986
Community:
Susan Ho
An Le Photo 22

An le

view source
Schools:
Athena H.S Rochester NY 1989-1993
Community:
Sonya Gridley
An Le Photo 23

Lo-an Le | Snowden Intern...

view source
An Le Photo 24

An le, SanJose State Univ...

view source

Facebook

An Le Photo 25

Hg An Le

view source
An Le Photo 26

Quang An Le

view source
An Le Photo 27

An Le

view source
An Le Photo 28

An Le

view source
An Le Photo 29

An Truong Le

view source
An Le Photo 30

An Hoang Le

view source
An Le Photo 31

An Nguyen Le

view source
An Le Photo 32

An Trinh Le

view source

Get Report for An N Le from Arlington, VA, age ~38
Control profile