Ear Nose & Throat Associates Of South FloridaEar Nose & Throat Associates Of South Florida PA 210 Jupiter Lk Blvd STE 105, Jupiter, FL 33458 (561)7484445 (phone), (561)7484449 (fax)
Education:
Medical School Thomas Jefferson University, Jefferson Medical College Graduated: 1987
Procedures:
Allergy Testing Hearing Evaluation Inner Ear Tests Myringotomy and Tympanotomy Rhinoplasty Sinus Surgery Thyroid Biopsy Thyroid Gland Removal Tonsillectomy or Adenoidectomy Tracheostomy Tympanoplasty
Dr. Li graduated from the Thomas Jefferson University, Jefferson Medical College in 1987. He works in Jupiter, FL and specializes in Otolaryngology. Dr. Li is affiliated with Jupiter Medical Center and Palm Beach Gardens Medical Center.
West Valley Infectious DisWest Valley Infectious Disease 7230 Medical Ctr Dr STE 203, West Hills, CA 91307 (818)2266811 (phone), (818)2266810 (fax)
Education:
Medical School University of California, Irvine School of Medicine Graduated: 2007
Languages:
English Spanish
Description:
Dr. Li graduated from the University of California, Irvine School of Medicine in 2007. He works in West Hills, CA and specializes in Infectious Disease. Dr. Li is affiliated with Northridge Hospital Medical Center and West Hills Hospital & Medical Center.
Medical School University of Texas Medical School at San Antonio Graduated: 2001
Languages:
English
Description:
Dr. Li graduated from the University of Texas Medical School at San Antonio in 2001. He works in Summit, NJ and specializes in Anesthesiology. Dr. Li is affiliated with Overlook Medical Center.
Camil Fayad - Poughkeepsie NY, US John K. Li - Woodstock NY, US Siegfried Sutter - Elsendorf, DE Tamas Visegrady - Zurich, CH
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F 9/44 G06F 7/38
US Classification:
712221, 708491
Abstract:
The partitioning of large arrays in the hardware structure, for multiplication and addition, into smaller structures results in a multiplier design which includes a series of nearly identical processing elements linked together in a chained fashion. As a result of simultaneous operation in two subphases per processing element and the chaining together of processing elements, the overall structure is operable in a pipelined fashion to improve throughput and speed. The chained processing elements are constructed so as to provide a pardonable chain with separate parts for processing factors of the modulus.
System And Method For Providing Dynamically Authorized Access To Functionality Present On An Integrated Circuit Chip
A mechanism is provided in which access to the functionality present on an integrated circuit chip is controllable via an encrypted certificate of authority which includes time information indicating allowable periods of operation or allowable duration of operation. The chip includes at least one cryptographic engine and at least one processor. The chip also contains hard coded cryptographic keys including a chip private key, a chip public key and a third party's public key. The chip is also provided with a battery backed up volatile memory which contains information which is used to verify authority for operation. The certificate of authority is also used to control not only the temporal aspects of operation but is also usable to control access to certain functionality that may be present on the chip, such as access to some or all of the cryptographic features provided in conjunction with the presence of the cryptographic engine, such as key size.
Load Balancing For A System Of Cryptographic Processors
Thomas J. Dewkett - Staatsburg NY, US Camil Fayad - Poughkeepsie NY, US John K. Li - Woodstock NY, US Siegfried K. H. Sutter - Elsendorf, DE Phil C. Yeh - Poughkeepsie NY, US
Assignee:
International Business Machines Corporation - Armonk NY
In an array of groups of cryptographic processors, the processors in each group operate together but are securely connected through an external shared memory. The processors in each group include cryptographic engines capable of operating in a pipelined fashion. Instructions in the form of request blocks are supplied to the array in a balanced fashion to assure that the processors are occupied processing instructions.
Methods For Coordinating Access To Memory From At Least Two Cryptography Secure Processing Units
Electronic circuit chips which include cryptography functions are arranged in multichip configurations through the utilization of a shared external memory. Security of the chips is preserved via a handshaking protocol which permits each chip to access limited portions of the memory as defined in a way that preserves the same high security level as the tamper proof chips themselves. The chips may be operated to work on different tasks or to work on the same task thus providing a mechanism for trading off speed versus redundancy where desired.
Forward Shifting Of Processor Element Processing For Load Balancing
Camil Fayad - Poughkeepsie NY, US John K. Li - Woodstock NY, US Siegfried K. H. Sutter - Elsendorf, DE Tamas Visegrady - Zurich, CH
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F 17/00
US Classification:
708233
Abstract:
A data processing system, which is particularly useful for carrying out modular multiplication, especially for cryptographic purposes, comprises a plurality of independent, serially connected processing elements which are provided with data in a cyclical fashion via a control mechanism that is capable of transferring data from a set of registers to earlier ones in the series of the serially connected processing elements, at the end of a predetermined number of cycles.
Selectively Isolating Processor Elements Into Subsets Of Processor Elements
A cryptographic engine for modulo N multiplication, which is structured as a plurality of almost identical, serially connected Processing Elements, is controlled so as to accept input in blocks that are smaller than the maximum capability of the engine in terms of bits multiplied at one time. The serially connected hardware is thus partitioned on the fly to process a variety of cryptographic key sizes while still maintaining all of the hardware in an active processing state.
System And Method For Processing By Distinct Entities Securely Configurable Circuit Chips
Camil Fayad - Poughkeepsie NY, US John Li - Woodstock NY, US Siegfried Sutter - Boeblingen, DE
Assignee:
INTERNATIONAL BUSINESS MACHINES CORPORATION - ARMONK NY
International Classification:
H04L 9/00 G06F 12/14 H04L 9/32 G06F 11/30
US Classification:
713189000, 713172000
Abstract:
A system and method are provided in which a third party chip vendor is enabled to securely program an electronic circuit chip supplied from a chip manufacturer. The chip vendor supplies a vendor's public cryptography key to the chip manufacturer who hard codes it on the chip along with a chip private key and a chip public key. One or more cryptographic engines on the chip, which preferably has a tamper resistant/detecting boundary, are used to decrypt program instructions supplied to the chip after having been encrypted with the vendor's private key and the chip public key. The chip includes a processor and an associated memory which receives a version of the instructions decrypted with the chip private key and the vendor's public key. The chip also preferably includes programmable hardware which is also securely programmable by the downstream chip vendor. The chip, as processed by the chip vendor is shipped with a battery in place to provide power for maintaining data held in volatile memory portions of the chip.
Circuit Chip For Cryptographic Processing Having A Secure Interface To An External Memory
Camil Fayad - Poughkeepsie NY, US John Li - Woodstock NY, US Siegfried Sutter - Boeblingen, DE
Assignee:
INTERNATIONAL BUSINESS MACHINES CORPORATION - ARMONK NY
International Classification:
G06F 12/14 H04L 9/32 G06F 11/30
US Classification:
713189000, 713190000
Abstract:
A mechanism is provided in which a secure chip for performing cryptographic and/or other functions is able to securely access a separate random access memory externally disposed with respect to a secure chip boundary. Addressing of the external memory is controlled so as to define certain regions therein which receive and store only encrypted information from the chip. Other regions of the external memory are set aside for the receipt and storage of unencrypted information. Access to the external memory is provided through a controlled interface which communicates with internal chip hardware which operates to control the flow of communication between various internal components such as cryptographic engines, data processors, internal memory of both the volatile and the nonvolatile variety and an external interface which provides the only other access to the chip. The internal chip hardware with which the external memory interface communicates is implemented as a combined ASIC and programmable hardware circuit, wherein the programmable hardware circuit is also securely configurable.
Feb 2013 to 2000 Sr. SharePoint ArchitectGlobal Business Travel Association Alexandria, VA Jan 2011 to Jan 2013 Director of Application DevelopmentCACI -US DOJ
Dec 2009 to Jan 2011 Principal System AnalystCAS Severn, Inc Laurel, MD Nov 2008 to Nov 2009 Sr Enterprise ArchitectOST, Inc Washington, DC Aug 2006 to Nov 2008 Infrastructure leadISS - CACI Gaithersburg, MD May 2005 to Aug 2006 Lead Systems AdministratorAronson & Company Rockville, MD Aug 1998 to Mar 2005 Network ManagerMDL, National Weather Service Silver Spring, MD Jan 1995 to Aug 1996 System Analyst
Education:
Georgetown University Washington, DC 2010 MBAStrayer University Arlington, VA 1999 MS in Information Technology SystemsBeijing University 1984 BS in Physics
May 2014 to 2000 Accounting InternVOTENET SOLUTIONS Washington, DC Oct 2013 to Apr 2014 Accounting InternSUMITOMO MITSUI BANKING CORPORATION (SMBC)
May 2012 to Aug 2012 Accounting/Tax InternVITA Aberdeen, SD Jan 2012 to Apr 2012 IRS VOLUNTEER FOR INCOME TAX ASSISTANCEKPMG LLP
Jun 2011 to Jul 2011 Audit Intern
Education:
THE GEORGE WASHINGTON UNIVERSITY, School of Business Washington, DC 2013 to 2015 Master of Accountancy in AccountingSHANGHAI UNIVERSITY 2009 to 2013 Bachelor of Management in AccountingNORTHERN STATE UNIVERSITY Aberdeen, SD 2011 to 2012 BA in Accounting
Skills:
Excel, QuickBooks; SAS; C/C++; Great Plains
Youtube
Li john - Boyilo (Official Video)
Boyilo Official music Video Performed by Li John Boyilo Lyrics : [ Ver...
Duration:
3m 1s
No me rendire - John Eli
Duration:
9m 28s
Lil Jon & The East Side Boyz - What U Gon' Do...
Official music video for Lil Jon & The East Side Boyz - What U Gon' Do...
Duration:
4m 50s
Me Elegiste (VIDEO OFICIAL) | John Eli | Ador...
Tema: ME ELEGISTE. L&M: John Eli Si fue de bendicin a tu vida pon "me ...
Duration:
4m 58s
1 Una Hora de Adoracin Con John Eli
musica cristiana suscribete .
Duration:
1h 7m 34s
John Lee Hooker, Carlos Santana and Etta Jame...
John Lee Hooker, Carlos Santana and Etta James - Blues Boogie Jam Reco...
Self-Employed - Piano Instructor (2011) University of Michigan - Linguistic Researcher (2011-2011)
Education:
University of Michigan, Ann Arbor - Econ and Informatics, De La Salle Collegiate High School - High School Diploma
About:
DLS '10UMAA '14Marching Pilot 2007-2010 -- Alto SaxI love playing the piano.4th Hinsdale is family.
Tagline:
HP7P2 is less than a week! so psyched!
Bragging Rights:
Maize and Blue
John Li
Work:
Jireh Development Corporation - President
Education:
Asian Theological Seminary - Master in Christian Leadershipo, Mapúa Institute of Technology
About:
I was born in Naga City, went to Naga Hope Christian School and Anglo Chinese High School and proceed to study at Hope Christian High School in Manila, Studied Electrical Engineering at Mapua Institut...
Tagline:
I Love Jesus Christ
Bragging Rights:
I am a sinner saved by grace because of Jesus Christ.
John Li
Education:
University of Illinois at Urbana-Champaign - Mechanical Engineering, University of Illinois at Urbana-Champaign - MBA
Tagline:
I drive my Miata, go dancing, take pictures, and occasionally write terrible novels.