2425 Ric Dr, Gilroy, CA 95020 • (408)8485924 • (408)8486284
1014 13Th St, Huntington, WV 25701
Work
Company:
Cityteam ministries
Address:
2304 Zanker Rd, San Jose, CA 95131
Phones:
(408)2325600
Position:
Vice president
Industries:
Individual and Family Social Services
Name / Title
Company / Classification
Phones & Addresses
Dale Hopkins General Manager
R V City Div Of G B Business Enterprises Ltd Recreational Vehicles - Dealers. Recreational Vehicles - Repair & Service. Recreational Vehicles - Rent & Lease. Recreational Vehicles - Equipment. Parts. Supplies
8704 100 St, Morinville, AB T8R 1K6 (780)9392900
Dale Hopkins Vice President
Cityteam Ministries Individual and Family Social Services
2304 Zanker Rd, San Jose, CA 95131
Dale Hopkins General Manager
R V City Recreational Vehicles - Dealers · Recreational Vehicles - Repair & Service · Recreational Vehicles - Rent & Lease · Recreational Vehicles - Equipment · Parts · Supplies
(780)9392900
Us Patents
Group Signature Generation System Using Multiple Primes
Dale W. Hopkins - Georgetown KY, US Thomas W. Collins - Saratoga CA, US Steven W. Wierenga - Sunnyvale CA, US
Assignee:
Hewlett-Packard Development Company, L.P. - Houston TX
International Classification:
G06F 11/30
US Classification:
713176, 713186
Abstract:
A method is provided for generating a group digital signature wherein each of a group of individuals may sign a message M to create a group digital signature S, wherein M corresponds to a number representative of a message, 0≦M≦n−1, n is a composite number formed from the product of a number k of distinct random prime factors pp. . . p, k is an integer greater than 2, and S≡M(mod n). The method may include: performing a first partial digital signature subtask on a message M using a first individual private key to produce a first partial digital signature S; performing at least a second partial digital signature subtask on the message M using a second individual private key to produce a second partial digital signature S; and combining the partial digital signature results to produce a group digital signature S.
Thomas Collins - Saratoga CA, US Dale Hopkins - Gilroy CA, US Susan Langford - Sunnyvale CA, US Michael Sabin - Sunnyvale CA, US
Assignee:
Hewlett-Packard Development Company, L.P. - Houston TX
International Classification:
H04K 1/00 H04L 9/00
US Classification:
380 28, 713200
Abstract:
A method and apparatus are disclosed for improving public key encryption and decryption schemes that employ a composite number formed from three or more distinct primes. The encryption or decryption tasks may be broken down into sub-tasks to obtain encrypted or decrypted sub-parts that are then combined using a form of the Chinese Remainder Theorem to obtain the encrypted or decrypted value. A parallel encryption/decryption architecture is disclosed to take advantage of the inventive method.
Cryptographic Key Setup In Queued Cryptographic Systems
Dale W. Hopkins - Georgetown KY, US Thomas W. Collins - Saratoga CA, US Steven W. Wierenga - Sunnyvale CA, US
Assignee:
Hewlett-Packard Development Company, L.P. - Houston TX
International Classification:
H04L 9/00 H04K 1/00
US Classification:
713189, 380 28
Abstract:
A method is disclosed for performing cryptographic tasks, that include key setup tasks and work data processing tasks. This method comprises the steps of processing the key data in a first cryptographic engine and processing the work data in a second cryptographic engine. The processing of the key data comprises the steps of receiving key data, processing the key data, and generating processed key data. The processing of the work data comprises the steps of receiving the processed key data, receiving work data, processing the work data, and outputting the processed work data. In this method of the invention, the first cryptographic engine performs its tasks independently of the second cryptographic engine. A method for allocating cryptographic engines in a cryptographic system is also disclosed comprising monitoring a queue of cryptographic tasks, monitoring activity levels of a first allocation of a plurality of cryptographic engines, and dynamically adjusting the first allocation.
Method And System For Secure Storage, Transmission And Control Of Cryptographic Keys
A system and method are described supporting secure implementations of 3DES and other strong cryptographic algorithms. A secure key block having control, key, and MAC fields safely stores or transmits keys in insecure or hostile environments. The control field provides attribute information such as the manner of using a key, the algorithm to be implemented, the mode of use, and the exportability of the key. A MAC algorithm is applied across the key and control for generating a MAC field that cryptographically ties the control and key fields together. Improved security is provided because tampering with any portion of the key block results in an invalid key block. The work factor associated with any manner of attack is sufficient to maintain a high level of security consistent with the large keys and strong cryptographic algorithms supported.
Thomas Collins - Saratoga CA, US Dale Hopkins - Gilroy CA, US Susan Langford - Sunnyvale CA, US Michael Sabin - Sunnyvale CA, US
Assignee:
Hewlett-Packard Development Company, L.P. - Houston TX
International Classification:
H04L 9/30 H04L 9/00
US Classification:
380 30, 380 29
Abstract:
A method and apparatus are disclosed for improving public key encryption and decryption schemes that employ a composite number formed from three or more distinct primes. The encryption or decryption tasks may be broken down into sub-tasks to obtain encrypted or decrypted sub-parts that are then combined using a form of the Chinese Remainder Theorem to obtain the encrypted or decrypted value. A parallel encryption/decryption architecture is disclosed to take advantage of the inventive method. REEXAMINATION RESULTS.
Method And System For Secure Storage, Transmission And Control Of Cryptographic Keys
A system and method are described supporting secure implementations of 3DES and other strong cryptographic algorithms. A secure key block having control, key, and hash fields safely stores or transmits keys in insecure or hostile environments. The control field provides attribute information such as the manner of using a key, the algorithm to be implemented, the mode of use, and the exportability of the key. A hash algorithm is applied across the key and control for generating a hash field that cryptographically ties the control and key fields together. Improved security is provided because tampering with any portion of the key block results in an invalid key block. The work factor associated with any manner of attack is sufficient to maintain a high level of security consistent with the large keys and strong cryptographic algorithms supported.
Method And System For Secure Storage, Transmission And Control Of Cryptographic Keys
A system and method are described supporting secure implementations of 3DES and other strong cryptographic algorithms. A secure key block having control, key, and hash fields safely stores or transmits keys in insecure or hostile environments. The control field provides attribute information such as the manner of using a key, the algorithm to be implemented, the mode of use, and the exportability of the key. A hash algorithm is applied across the key and control for generating a hash field that cryptographically ties the control and key fields together. Improved security is provided because tampering with any portion of the key block results in an invalid key block. The work factor associated with any manner of attack is sufficient to maintain a high level of security consistent with the large keys and strong cryptographic algorithms supported.
Method For Selecting Optimal Number Of Prime Factors Of A Modulus For Use In A Cryptographic System
Dale Hopkins - Gilroy CA, US Tom Collins - Saratoga CA, US
International Classification:
H04K001/00
US Classification:
380/028000
Abstract:
A method provided for determining an optimal number k of prime factors p, p, . . . pfor developing a modulus N for use in a cryptographic system providing computational performance that increases as the number of constituent prime factors of the modulus increases, wherein use of the optimal number k of prime factors enables the system to provide optimal computational performance while maintaining a determined level of security.
Glenshaw Elementary School Glenshaw PA 1967-1968, Shaler Area Junior High School Glenshaw PA 1968-1971, Shaler Area Intermediate School Glenshaw PA 1970-1974
Donna Burry, Diana Copsey, Ruben Magdaleno, James Herrera, Shirley Schneider, Waynetta Allen, Monte Mowry, G N, Jeanne Moss, Darlene Hall, Lynn Allen, Monty Copsey
Brenda Shaw, Edwin Akers, Dewanah Elgin, John Wheeler, Marilyn Joann, John Sitton, Doris Jensen, Troy Underwood, Lea Mannahan, Barbara Crank, Annette Magee
News
NASA Licenses 3D-Printable Superalloy to Benefit US Economy
Adoption of this alloy will lead to more sustainable aviation and space exploration, said Dale Hopkins, deputy project manager of NASAs Transformational Tools and Technologies project. This is because jet engine and rocket components made from GRX-810 will lower operating costs by lasting longer
Date: May 09, 2024
Category: Science
Source: Google
Youtube
Dale Hopkins Cowboy Magician
Magic for the students of Class 2.3 at Michael Strembitsky School in E...
Duration:
3m 36s
Dale Hopkins Magician Second Story Theatre
Duration:
12m 3s
Dale Hopkins and Finding Strength in Star War...
Jordan Hembrough goes to Cleveland, Ohio, to meet Dale Hopkins, a canc...
Duration:
8m 45s
Computer Science with Dale Hopkins
Vendasta's Chief Technology Officer Dale Hopkins talks about his journ...
Duration:
4m 42s
The Cowboy Magician, Dale Hopkins
Dale Hopkins Magic, The Magic Cowboy.
Duration:
42s
Googleplus
Dale Hopkins
Dale Hopkins
Dale Hopkins
Dale Hopkins
About:
Still amazing
Tagline:
I'm amazing
Bragging Rights:
I went on Disney channel.com without my parents permission