Search

David Bryon Mcgrew

age ~63

from Taylorsville, KY

Also known as:
  • David B Mcgrew
  • David B Mc
Phone and address:
1126 Pin Oak Dr, Taylorsville, KY 40071
(502)2315729

David Mcgrew Phones & Addresses

  • 1126 Pin Oak Dr, Taylorsville, KY 40071 • (502)2315729
  • Louisville, KY
  • Columbia, MD

Medicine Doctors

David Mcgrew Photo 1

David R. Mcgrew

view source
Specialties:
Ophthalmology
Work:
David R Mcgrew MD Inc
6377 Riverside Ave STE 170, Riverside, CA 92506
(951)2484381 (phone), (951)2484389 (fax)
Education:
Medical School
Loma Linda University School of Medicine
Graduated: 1976
Procedures:
Lens and Cataract Procedures
Ophthalmological Exam
Conditions:
Acute Conjunctivitis
Cataract
Glaucoma
Keratitis
Macular Degeneration
Languages:
English
Spanish
Description:
Dr. McGrew graduated from the Loma Linda University School of Medicine in 1976. He works in Riverside, CA and specializes in Ophthalmology.
David Mcgrew Photo 2

David Mcgrew

view source
Specialties:
General Practice, Internal Medicine
Work:
Community Medical Associates
5176 William Sullivan Cir, Brooksville, FL 34604
(352)2932833 (phone), (352)2932834 (fax)
Education:
Medical School
University of South Florida College of Medicine at Tampa
Graduated: 1982
Languages:
English
Description:
Dr. Mcgrew graduated from the University of South Florida College of Medicine at Tampa in 1982. He works in Brooksville, FL and specializes in General Practice and Internal Medicine.
David Mcgrew Photo 3

David Richar McGrew

view source
Specialties:
Ophthalmology
Education:
Loma Linda University (1976)
Name / Title
Company / Classification
Phones & Addresses
David Mcgrew
Principal
David F McGrew
Business Services at Non-Commercial Site
3358 Martha Custis Dr, Alexandria, VA 22302
David C. Mcgrew
OXFORD VETERINARY HOSPITAL, LLC
David C. Mcgrew
5131 DVM COMPANY, LTD
David M. Mcgrew
ALUMNI PARTNERS, LC
David W. Mcgrew
Organizer
DJ REAL ESTATE INVESTMENT, LLC
1024 Springside Way, Louisville, KY 40223
David M. Mcgrew
MAGELLAN COMMUNICATION SERVICES, INC

Us Patents

  • Encryption Method And Apparatus With Forward Secrecy And Random-Access Key Updating Method

    view source
  • US Patent:
    7095850, Aug 22, 2006
  • Filed:
    Oct 17, 2001
  • Appl. No.:
    09/982375
  • Inventors:
    David McGrew - Poolesville MD, US
  • Assignee:
    Cisco Technology, Inc. - San Jose CA
  • International Classification:
    H04L 9/00
  • US Classification:
    380 42, 380 37, 380 43, 380 44, 380 45, 380 46, 380 47
  • Abstract:
    An encryption method and apparatus that provides forward secrecy, by updating the key using a one-way function after each encryption. By providing forward secrecy within a cipher, rather than through a key management system, forward secrecy may be added to cryptographic systems and protocols by using the cipher within an existing framework. A random-access key updating method can efficiently generate one or more future keys in any order. Embodiments are applicable to forward secret ciphers that are used to protect protocols with unreliable transport, to ciphers that are used in multicast or other group settings, and to protection of packets using the IPSec protocols.
  • Method And Apparatus For Cryptographic Protection From Denial Of Service Attacks

    view source
  • US Patent:
    7139679, Nov 21, 2006
  • Filed:
    Jun 27, 2002
  • Appl. No.:
    10/185159
  • Inventors:
    David McGrew - Poolesville MD, US
  • Assignee:
    Cisco Technology, Inc. - San Jose CA
  • International Classification:
    G06F 15/00
  • US Classification:
    702186, 709227
  • Abstract:
    A method and apparatus for protecting, from denial of service attacks, a device that provides particular services that consume substantial computational resources. A data packet is received that includes data for the particular services and a cryptographic tag. It is determined whether the data packet is legitimate based on the cryptographic tag without using the data for the particular services. If it is determined that the data packet is not legitimate, then the data is diverted from input to the particular services that process the data. These techniques use the cryptographic tag to provide strong data origin authentication without the heavy computational costs associated with providing full data integrity authentication in typical cryptographic services. Further, denial of service protection is conveniently implemented as a cryptographic service.
  • Method And Apparatus For Cryptographically Blocking Network Denial Of Service Attacks Based On Payload Size

    view source
  • US Patent:
    7290281, Oct 30, 2007
  • Filed:
    Aug 8, 2002
  • Appl. No.:
    10/215544
  • Inventors:
    David McGrew - Poolesville MD, US
  • Assignee:
    Cisco Technology, Inc. - San Jose CA
  • International Classification:
    G06F 21/00
  • US Classification:
    726 23, 726 13, 713160
  • Abstract:
    A method and apparatus for protecting, from denial of service attacks, a device that provides particular services that consume substantial computational resources. A data packet includes data for the particular services and a cryptographic tag. It is determined whether the data packet is legitimate based on the cryptographic tag and a size of the data for the particular services without otherwise using the data for the particular services. If the data packet is not legitimate, then the data is diverted from input to the particular services that process the data. These techniques use the cryptographic tag to provide strong data origin authentication without the heavy computational costs associated with providing full data integrity authentication in typical cryptographic services. Further, denial of service protection is conveniently implemented as a cryptographic service.
  • Cryptographic Peer Discovery, Authentication, And Authorization For On-Path Signaling

    view source
  • US Patent:
    7350227, Mar 25, 2008
  • Filed:
    Apr 26, 2005
  • Appl. No.:
    11/115542
  • Inventors:
    David A. McGrew - Poolesville MD, US
    Melinda L. Shore - Ithaca NY, US
  • Assignee:
    Cisco Technology, Inc. - San Jose CA
  • International Classification:
    H04L 9/00
    G06F 17/00
    G06F 15/16
    H04K 1/00
    G06F 9/00
  • US Classification:
    726 1, 726 12, 713153, 713168
  • Abstract:
    A method is disclosed for cryptographic peer discovery, authentication, and authorization. According to one embodiment, a data packet, which is addressed to a destination device other than an intermediary network device, is intercepted at the intermediary network device. The data packet contains a request and a group identifier. A shared secret cryptographic key, which is mapped to the group identifier, is selected. A challenge is sent toward an upstream device from whence the data packet came. A response is received. A verification value is generated based on the cryptographic key and the challenge. It is determined whether the response matches the verification value. If the response matches the verification value, then it is determined whether the request is allowed by an authorization set that is mapped to the group identifier. If the request is allowed, then a policy of the intermediary network device is configured based on the request.
  • Avoiding Server Storage Of Client State

    view source
  • US Patent:
    7373502, May 13, 2008
  • Filed:
    Jan 12, 2004
  • Appl. No.:
    10/756633
  • Inventors:
    David A. McGrew - Poolesville MD, US
  • Assignee:
    Cisco Technology, Inc. - San Jose CA
  • International Classification:
    H04L 9/00
  • US Classification:
    713155, 713150, 713153
  • Abstract:
    A method is disclosed for avoiding the storage of client state on a server. Based on a local key that is not known to a client, a server encrypts the client's state information. The client's state information may include, for example, the client's authentication credentials, the client's authorization characteristics, and a shared secret key that the server can use to encrypt and authenticate communication to and from the client. By any of a variety of mechanisms, the encrypted client state information is provided to the client. The server may free memory that stored the client's state information. When the server needs the client's state information, the client sends, to the server, the encrypted state information that the client stored. The server decrypts the client state information using the local key. Because each client stores that client's own state information in encrypted form, the server does not need to store any client's state information permanently.
  • Enciphering Method

    view source
  • US Patent:
    7418100, Aug 26, 2008
  • Filed:
    Aug 10, 2005
  • Appl. No.:
    11/201626
  • Inventors:
    David A. McGrew - Poolesville MD, US
    Scott Fluhrer - San Jose CA, US
  • Assignee:
    Cisco Technology, Inc. - San Jose CA
  • International Classification:
    H04K 1/06
    H04L 9/28
  • US Classification:
    380 37, 380 28
  • Abstract:
    A block cipher mode of operation implements a block cipher with an arbitrary block length and provides output ciphertext that is always the same size as the input plaintext. The mode can provide the best possible security in systems that cannot allow data expansion, such as disk-block encryption and some network protocols. The mode accepts an additional input, which can be used to protect against attacks that manipulate the ciphertext by rearranging the ciphertext blocks. The universal hash function from Galois/Counter Mode of operation for block ciphers may be used in an embodiment for hardware and software efficiency.
  • Compact Secure Data Communication Method

    view source
  • US Patent:
    7426636, Sep 16, 2008
  • Filed:
    Jun 2, 2003
  • Appl. No.:
    10/453237
  • Inventors:
    David A. McGrew - Poolesville MD, US
    Jan Vilhuber - Santa Cruz CA, US
  • Assignee:
    Cisco Technology, Inc. - San Jose CA
  • International Classification:
    H04L 9/00
  • US Classification:
    713160
  • Abstract:
    A compact secure data communication method is disclosed. In one embodiment, a compact security protocol provides cryptographic services on IP, UDP, and TCP packets with minimal bandwidth degradation due to encapsulation overhead. The disclosed protocol may be used, for example, in converged networks that carry both voice-over-IP and data traffic in and wireless networks, in which it is imperative to minimize per-packet overhead. The disclosed protocol provides as much security as possible, by authenticating the uncompressed headers rather than the compressed headers.
  • Avoiding Server Storage Of Client State

    view source
  • US Patent:
    7493331, Feb 17, 2009
  • Filed:
    Mar 21, 2007
  • Appl. No.:
    11/726671
  • Inventors:
    David A. McGrew - Poolesville MD, US
  • Assignee:
    Cisco Technology, Inc. - San Jose CA
  • International Classification:
    G06F 7/00
  • US Classification:
    707101, 707 10, 707102
  • Abstract:
    A method is disclosed for avoiding the storage of client state on a server. Based on a local key that is not known to a client, a server encrypts the client's state information. The client's state information may include, for example, the client's authentication credentials, the client's authorization characteristics, and a shared secret key that the server can use to encrypt and authenticate communication to and from the client. By any of a variety of mechanisms, the encrypted client state information is provided to the client. The server may free memory that stored the client's state information. When the server needs the client's state information, the client sends, to the server, the encrypted state information that the client stored. The server decrypts the client state information using the local key. Because each client stores that client's own state information in encrypted form, the server does not need to store any client's state information permanently.

Resumes

David Mcgrew Photo 4

David Mcgrew

view source
David Mcgrew Photo 5

David Mcgrew

view source
David Mcgrew Photo 6

David Mcgrew

view source
David Mcgrew Photo 7

David Mcgrew

view source
David Mcgrew Photo 8

David Mcgrew

view source
David Mcgrew Photo 9

David Mcgrew

view source
David Mcgrew Photo 10

David Mcgrew

view source
David Mcgrew Photo 11

David Mcgrew

view source

Youtube

Pastor David McGrew & Church On Fire Praise T...

  • Duration:
    1h 44m 2s

AAHPM Past President David McGrew

Past President David McGrew, MD FAAHPM speaks with Executive Vice Pres...

  • Duration:
    12m 56s

David McGrew Sunday Night

JOIN US SUNDAY AT 10:30AM @ 458 35TH AVE NW CALGARY ALBERTA * * SUBSCR...

  • Duration:
    49m 7s

David McGrew - 2017 AAHPM Gerald H. Holman Di...

Recognizes outstanding and dedicated service to the American Academy o...

  • Duration:
    6m 12s

David McGrew

JOIN US SUNDAY AT 10:30AM @ 458 35TH AVE NW CALGARY ALBERTA * * SUBSCR...

  • Duration:
    46m 55s

David McGrew RWC 2017

Technical talks from the Real World Crypto conference series.

  • Duration:
    26m 38s

Myspace

David Mcgrew Photo 12

David McGrew

view source
Locality:
MARSHALL, Missouri
Gender:
Male
Birthday:
1938
David Mcgrew Photo 13

David McGrew

view source
Locality:
HAMPTON, Virginia
Gender:
Male
Birthday:
1938
David Mcgrew Photo 14

david mcgrew

view source
Locality:
LOUISVILLE, Colorado
Gender:
Male
Birthday:
1927
David Mcgrew Photo 15

David McGrew

view source
Locality:
CONYERS, Georgia
Gender:
Male
Birthday:
1927
David Mcgrew Photo 16

David Mcgrew

view source
Locality:
hattiesburg
Gender:
Male
Birthday:
1936

Plaxo

David Mcgrew Photo 17

David McGrew

view source
City of Lake Worth

Flickr

Facebook

David Mcgrew Photo 26

David Mcgrew

view source
David Mcgrew Photo 27

David McGrew

view source
David Mcgrew Photo 28

David McGrew

view source
David Mcgrew Photo 29

David McGrew Sr.

view source
David Mcgrew Photo 30

David McGrew

view source
David Mcgrew Photo 31

David McGrew

view source
David Mcgrew Photo 32

David Mcgrew

view source
David Mcgrew Photo 33

David McGrew

view source

Googleplus

David Mcgrew Photo 34

David Mcgrew

Education:
Western International Univ - MBA - Management, Tyndale Theological Seminary - MA - Biblical Studies, Dallas Baptist University - BBA - MIS
David Mcgrew Photo 35

David Mcgrew

David Mcgrew Photo 36

David Mcgrew

David Mcgrew Photo 37

David Mcgrew

Work:
David R. McGrew, M.D., Inc. - Ophthalmologist
David Mcgrew Photo 38

David Mcgrew

Classmates

David Mcgrew Photo 39

David McGrew

view source
Schools:
Collins High School College Park GA 1975-1979
Community:
Chris Allison, Kenneth Hodges, James Meerten, Beth Fugate
David Mcgrew Photo 40

David McGrew

view source
Schools:
Nappanee High School Nappanee IN 1960-1964
Community:
Bryce Slabaugh, Annetta Cain, Larry Dumph, Donna Hess, Leslie Howell
David Mcgrew Photo 41

David McGrew

view source
Schools:
Waldron High School Waldron IN 1956-1960
Community:
Karen Gahimer, Sherri Harker, Michael Platt, Jeri Riley
David Mcgrew Photo 42

David McGrew

view source
Schools:
Evans 9th Grade Center Orlando FL 1978-1982
Community:
Larry Kinney
David Mcgrew Photo 43

David McGrew

view source
Schools:
New Buffalo High School New Buffalo MI 1994-1998
Community:
Christine Palmer
David Mcgrew Photo 44

David McGrew

view source
Schools:
Hastings Middle School Upper Arlington OH 1965-1968
Community:
Kenny Golightly, Rob Eagle
David Mcgrew Photo 45

David McGrew

view source
Schools:
Southwest Chicago Christian School Oak Lawn IL 1990-1994, Chicago Christian High School Palos Heights IL 1994-1998
Community:
Kimberly Robinson, Tamra Hooker, Amanda Hiskes, Luke Jousma, Lyn Martin, Dao Khemthongsengsay
David Mcgrew Photo 46

David B McGrew

view source
Schools:
Goliad High School Goliad TX 1993-1997
Community:
Traci Mitchell

Get Report for David Bryon Mcgrew from Taylorsville, KY, age ~63
Control profile