Daryl Carvis Cromer - Apex NC, US Scott Thomas Elliott - Raleigh NC, US James Patrick Hoff - Wake Forest NC, US Howard Jeffrey Locker - Cary NC, US David Rivera - Durham NC, US Randall Scott Springfield - Chapel Hill NC, US James Peter Ward - Raleigh NC, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
H04L 29/02 H04L 29/18 H04L 9/34
US Classification:
713193, 713167
Abstract:
An embedded security subsystem, and method for implementing the same, which provide secure controllability of a data security device within a data processing system. The embedded security subsystem of the present invention includes a persistent enable flag for providing control access to the data security device, wherein the persistent enable flag is accessible only in response to a power-on reset cycle of the data processing system. The persistent enable flag is read-only accessible to runtime program instructions. A pending state change flag that is write accessible by runtime program instructions is utilized for setting an intended next state of the persistent enable flag such that control access to the data security device is enabled only during a subsequent power-on reset of said data processing system.
Scott Thomas Elliott - Raleigh NC, US James Patrick Hoff - Raleigh NC, US Christopher Scott Long - Chapel Hill NC, US David Rivera - Durham NC, US James Peter Ward - Raleigh NC, US
Assignee:
Lenovo (Singapore) Pte Ltd. - Singapore
International Classification:
H04L 9/00
US Classification:
713164, 713165, 713189, 707204
Abstract:
A method, system and computer program product for securing decrypted files in a shared environment. A filter driver in a kernel space may be configured to control service requests to encrypted files stored in a shared area, e. g. , a shared directory on a disk unit, accessible by multiple users. The filter driver may receive a service request to open an encrypted document in the shared area issued from an authorized user. Upon receiving the encrypted data, the filter driver may decrypt the encrypted data. The filter driver may subsequently store the decrypted data in a file in a non-shared area, e. g. , a non-shared directory. The non-shared area may be accessible only by the authorized user that requested access to the encrypted file. By storing the decrypted data in a file in the non-shared area, a file once decrypted may be protected in a file sharing environment.
Secure Single Sign-On To Operating System Via Power-On Password
David Carroll Challener - Raleigh NC, US Steven Dale Goodman - Raleigh NC, US James Patrick Hoff - Raleigh NC, US David Rivera - Durham NC, US Randall Scott Springfield - Chapell Hill NC, US
Assignee:
Lenovo (Singapore) Pte. Ltd. - Singapore
International Classification:
G06F 7/04 H04L 9/32
US Classification:
726 5, 713193
Abstract:
Methods and arrangements are disclosed for secure single sign on to an operating system using only a power-on password. In many embodiments modified BIOS code prompts for, receives and verifies the power-on password. The power-on password is hashed and stored in a Platform Configuration Register of the Trusted Platform Module. In a setup mode, the trusted platform module encrypts the operating system password using the hashed power-on password. In a logon mode, the trusted platform module decrypts the operating system password using the hashed power-on password.
Apparatus, Method And Program Product For Policy Synchronization
Philip Lee Childs - Raleigh NC, US Charles Burnham Oxrieder - Wake Forerst NC, US David Rivera - Durham NC, US
Assignee:
Lenovo (Singapore) Pte. Ltd. - Singapore
International Classification:
G06F 15/177
US Classification:
713 1, 713100
Abstract:
Applications which function under a first operating system also function when it becomes necessary to call into action a second operating system due to provision having been made for configuration and other settings necessary to the execution of such applications (here generically called policy settings or policy source data) to be made available to the second operating system.
Method For Protecting Security Accounts Manager (Sam) Files Within Windows Operating Systems
Rod D. Waltermann - Rougemont NC, US David C. Challener - Raleigh NC, US Philip L. Childs - Raleigh NC, US James Hunt - Chapel Hill NC, US Nathan J. Peterson - Raleigh NC, US David Rivera - Durham NC, US Randall S. Springfield - Chapel Hill NC, US Arnold S. Weksler - Raleigh NC, US
Assignee:
Lenovo (Singapore) Pte. Ltd. - Singapore
International Classification:
H04L 29/06
US Classification:
713165
Abstract:
A method for protecting Security Accounts Manager (SAM) files within a Windows operating system is disclosed. A SAM file encryption key is generated by encrypting a SAM file via a syskey utility provided within the Windows operating system. The SAM file encryption key is then stored in a virtual floppy disk by selecting an option to store SAM file encryption key to a floppy disk under the syskey utility. A blob is generated by performing a Trusted Platform Module (TPM) Seal command against the SAM file encryption key along with a value stored in a Performance Control Register and a TPM Storage Root Key. The blob is stored in a non-volatile storage area of a computer.
Nebulize With Pressure-Based Fluidic Control And Related Methods
David A. Rivera - Yorba Linda CA, US Steven M. Harrington - Cardiff by the Sea CA, US Bruce K. Bridges - Cardiff CA, US Neil A. Korneff - Diamond Bar CA, US
Assignee:
CareFusion 2200, Inc. - San Diego CA
International Classification:
A61M 11/00
US Classification:
12820021, 12820018, 12820014
Abstract:
Various embodiments of a breath-activated nebulizer with fluidic control and related methods of using such a nebulizer are disclosed. The nebulizer may include a body comprising a reservoir for holding medication, a nozzle for emitting a jet of pressurized gas, and a fluid conduit in communication with the reservoir for delivery of the medication proximate the jet to produce an aerosol of medication. The nebulizer may also include a nebulizer outlet in communication with an interior of the body for delivery of the aerosol to a patient, a control conduit in fluid communication with the fluid conduit for delivery of a control gas to the fluid conduit to prevent the delivery of the medication proximate the jet, and a fluidic amplifier configured to control the delivery of the control gas to the control conduit.
Method And Apparatus For Providing A Secure Single Sign-On To A Computer System
David Rivera - Durham NC, US David C. Challener - Raleigh NC, US Joseph M. Pennisi - Apex NC, US Randall S. Springfield - Chapel Hill NC, US
Assignee:
Lenovo (Singapore) Pte. Ltd. - Singapore
International Classification:
G06F 7/04
US Classification:
726 20, 726 8, 726 9
Abstract:
A method for providing a secure single sign-on to a computer system is disclosed. Pre-boot passwords are initially stored in a secure storage area of a smart card. The operating system password, which has been encrypted to a blob, is stored in a non-secure area of the smart card. After the smart card has been inserted in a computer system, a user is prompted for a Personal Identification Number (PIN) of the smart card. In response to a correct smart card PIN entry, the blob stored in the non-secure storage area of the smart card is decrypted to provide the operating system password, and the operating system password along with the pre-boot passwords stored in the secure storage area of the smart card are then utilized to log on to the computer system.
A trusted platform module (TPM) is a silicon chip that constitutes a secure encryption key-pair generator and key management device. A TPM provides a hardware-based root-of-trust contingent on the generation of the first key-pair that the device creates: the SRK (storage root key). Each SRK is unique, making each TPM unique, and an SRK is never exported from a TPM. Broadly contemplated herein is an arrangement for determining automatically whether a TPM has been replaced or cleared via loading a TPM blob into the TPM prior to the first time it is to be used (e. g. when a security-related software application runs). If the TPM blob loads successfully, then it can be concluded that the TPM is the same TPM that was used previously. If the TPM blob cannot be loaded, then corrective action will preferably take place automatically to configure the new TPM.
13367 Benson Ave, Chino, CA 91710 2390 E Camelback Rd, Phoenix, AZ 85016 5747 Mccully St, Chino, CA 91710 Director 13367 Benson Ave, Chino, CA 91710 (909)5912274
David Mauricio Rivera (born September 16, 1965) is the U.S. Representative for Florida's 25th congressional district. He is a member of the Republican Party ...
Jun 2007 to 2000 Technical Sales EngineerDME Incorporated Santa Fe Springs, CA Jun 2005 to Jun 2007 Metal Hose SpecialistAdecco Staffing Anaheim, CA Apr 2004 to Jun 2005 Shipping Supervisor assistant
Education:
CYBERTEK Corona, CA 2011 to 2011 Certified Drafter in AutoCADICDC College Huntington Park, CA 2008 to 2009 Vocational Degree in Computerized AccountingBecquer College Salvador, CA 1995 to 1998 BS in Computer ScienceBecquer College Salvador, CA 1995 to 1998 BA in Business Administration, Accounting
Skills:
Bilingual Spanish, Reverse engineering, Technical training, AutoCAD, EJMA, ASME, R&D new products, mathematics, multitasking, Microsoft Office, Exact JobBOSS MRP system, manufacturing, metal fabrication
U.S. Army Fort Riley, KS Dec 2011 to Dec 2012 Corporate Human Resources Assistant ManagerU.S. Army, Camp Walker
Jul 2008 to Dec 2011 Primary Mail ClerkU.S. Army, Camp Walker
Jul 2008 to Dec 2011 Regional Human Resources SupervisorWal-Mart Beaumont, CA Jan 2008 to Jul 2008 StockerWal-Mart Yucca Valley, CA Jul 2007 to Jan 2008 UnloaderMCOE Salinas, CA Jun 2006 to Jul 2007 Substitute TeacherMobile Estates Maintenance King City, CA Jun 2005 to Jun 2006 Maintenance Worker
Education:
University of Phoenix Tempe, AZ 2012 to 2014 BSB in Human Resource ManagementFort Jackson Academy Fort Jackson, SC 2008 to 2008 Certificate in Human Resource Specialist
Roaring Fork Transportation Authority Aspen, CO Oct 2011 to May 2014 Facilities Maintenance Tech 2Roaring Fork Transportation Authority Aspen, CO Feb 2009 to Oct 2011 Bus Service Worker
Education:
Arlington High School Riverside, CA 2004 to 2008 General Study
Skills:
Class B CDL, 3 years skid loader/bobcat/boom lift, completed CNG fueling & maintenance training, bilingual - fluent in written & verbal Spanish communication, detail oriented, strong work ethic, electrical and plumbing skills, HVAC skills, fork lift operator, heavy equipment operator, carpentry, experience with hand tools, general maintenance, leadership qualities, CPR certified, landscaping, groundskeeper
Pro Clean Altamonte Springs, FL 2012 to Jan 2012 Office CleanerThe Point Lake and Golf Club Mooresville, NC Apr 2011 to Dec 2011 DishwasherThe Point Lake and Golf Club Cornelius, NC Apr 2011 to Dec 2011 TechnicianNAPA Charlotte, NC Oct 2010 to Apr 2011 Parts RunnerPizza Hut Durham, NC Feb 2010 to Jun 2010 Driver/Cook
Education:
NASCAR Technical Institute Mooresville, NC Dec 2011 Diploma in Automotive Technology / NASCAR Technology / Ford Training Program
Dr. Rivera graduated from the Georgetown University School of Medicine in 1987. He works in Westerly, RI and specializes in Ophthalmology. Dr. Rivera is affiliated with VA Medical Center-Providence and Westerly Hospital.
Defense attorneys Rusty Hardin, David Rivera, Ben Vernia and Jonathan Cooper sought this week to persuade the jury that their clients either didn't approve or support rebate ripoffs or only took part because they thought what they were doing was justified.
Date: Feb 07, 2018
Category: Business
Source: Google
Defense closing arguments presented in Pilot rebate case
On Tuesday, attorney David Rivera said former Pilot Flying J Vice President Scott Scooter Wombold was an honest supervisor. Rivera said Wombold didnt realize Mosher wasnt telling his customers that he was reducing their fuel discounts.
When hes done eating (45 minutes later) he asks his brother, Ryan, Jesus and another friend, David Rivera, to take a walk with him through the golf course in the dark. They disappear into the night, the hulking NFL player, his towering older brother and his diminutive-by-comparison pals.
Date: May 04, 2017
Category: Sports
Source: Google
6 soldiers, 2 civilians charged in theft of Army equipment
rmy Special Forces. The military equipment was sold to customers both in the U.S. and abroad, U.S. Attorney David Rivera said. The items, the indictment says, were sold to eBay customers around the globe, including in Russia, China, Hong Kong, Ukraine, Lithuania, Moldova, Malaysia, Romania and Mexico.
Date: Oct 06, 2016
Category: U.S.
Source: Google
Conversation on Cuba leaves out Miami's once-mighty political guard
se to prominence. In New Jersey, it was a Democrat, now-Sen. Bob Menendez (who was succeeded in the House by a fellow Cuban-American Democrat, Rep. Albio Sires). In Florida, it was Republicans. Ros-Lehtinen. Diaz-Balart. Lincoln Diaz-Balart. Mel Martinez. Marco Rubio. David Rivera. Carlos Curbelo.
Date: Apr 11, 2016
Category: World
Source: Google
Can Marco Rubio save his campaign, and his career, in Florida?
s past. He reimbursed the Florida GOP after improperly using a party charge card to cover personal expenses. He purchased a Tallahassee home with former Rep. David Rivera and they sold it for far less than they bought it. His worst-in-the-Senate attendance record is also a familiar line of attack.
Date: Mar 02, 2016
Source: Google
Who Let Marco Rubios Slimy Pal Into the GOP Debate?
Now, not everyone can gain admission into these debates. The tickets tend to be handed out by sponsors, soin theoryit should be easy to figure out who gave out individual tickets. Unless your guest is David Rivera.
Seated in the ballroom at the DoubleTree by Hilton Miami Airport & Convention Center were longtime Rubio friends he praised by name, including political godmother Rebeca Sosa, a county commissioner, and David Rivera, a former congressman. Rubios wife, Jeanette, and their four children were al