Jul 2011 to 2000 Training Development SpecialistCalifornia State University San Bernardino, CA Sep 2010 to Jun 2011 Aquatics SupervisorSierra Canyon High School Foundation Chatsworth, CA Jun 2008 to Aug 2010 Aquatics Manager/DirectorSierra Canyon High School Foundation
Oct 2009 to May 2010 Research Assistant
Education:
California State University San Bernardino, CA Jun 2011 Masters of Science in Industrial/Organizational PsychologyCalifornia State University Northridge, CA Dec 2008 Bachelor of Arts in Psychology
A recyclable process kit part is provided with a visible mark. After the part undergoes a cleaning process that removes deposited material therefrom, the part can be determined to be within tolerance, based on the marks visibility. More specifically, the recyclable process kit part is made of a material, and has a first surface that has a first elevation. A visual mark is formed in the first surface, and extends to a second elevation, wherein the distance between the first elevation and the second elevation is adapted such that the mark is visible until an amount of the material is removed from the part so as to make the part nearly out of tolerance.
Method Of Extending Process Kit Consumable Recycling Life
One embodiment relates to an apparatus for sputtering material onto a workpiece, the apparatus including a vacuum chamber and a target disposed in the vacuum chamber, the target comprising a material to be deposited onto said workpiece. The apparatus also includes a holder for the workpiece and at least one recyclable process kit component positioned to accumulate material sputtered from the target. The process kit component includes a base metal layer including titanium and an outer layer of titanium nitride. The titanium nitride layer acts as an etch stop during recycling of the process kit component. The process kit component may include a part selected from the group of a shield, pedestal, shutter, coil, collimator, deposition ring, cover ring, and clamp ring.
Multi-Level Cryptographic Transformations For Securing Digital Assets
Steven Toye Crocker - Redwood City CA, US Denis Jacques Paul Garcia - Palo Alto CA, US
International Classification:
G06F 12/14 G06F 21/22 G06F 21/24
US Classification:
726 27, 726 26, 726 28, 726 29, 726 30, 705 57
Abstract:
Enhanced multi-level cryptographic transformations that secure electronic files are disclosed. The secured electronic files contain not only secured data but also security information. The security information includes cryptographic structure information, access rules and secrets (e. g. , keys). The cryptographic structure information explains the multi-level cryptographic transformations associated with securing or unsecuring the electronic files. The access rules and the secrets are used by the cryptographic transformations to secure the electronic files. Since the secured electronic files contain the cryptographic structure information, the particular cryptographic transformations (including their sequencing) can vary with each electronic file, if so desired. Typically, the secured electronic files are secured and managed by a file security system, such as a distributed security system.
Methods And Systems For Providing Access Control To Secured Data
Denis Jacques Paul Garcia - Palo Alto CA, US Michael Michio Ouye - Mountain View CA, US Alain Rossmann - Palo Alto CA, US Steven Toye Crocker - Burlingame CA, US Eric Gilbertson - Menlo Park CA, US Weiqing Huang - Flower Mound TX, US Serge Humpich - Tournan-en-Brie, FR Klimenty Vainstein - San Francisco CA, US Nicholas Michael Ryan - Sunnyvale CA, US
In a system for providing access control management to electronic data, techniques to secure the electronic data and keep the electronic data secured at all times are disclosed. According to one embodiment, a secured file or secured document includes two parts: an attachment, referred to as a header, and an encrypted document or data portion. The header includes security information that points to or includes the access rules and a file key. The access rules facilitate restrictive access to the secured document and essentially determine who/when/how/where the secured document can be accessed. The file key is used to encrypt/decrypt the encrypted data portion. Only those who have the proper access privileges are permitted to retrieve the file key to encrypt/decrypt the encrypted data portion.
Michael Ouye - Portola Valley CA, US Steven Crocker - Redwood City CA, US
Assignee:
SecretSEAL Inc. - Menlo Park CA
International Classification:
G06F017/60
US Classification:
705/051000
Abstract:
To grant or deny access rights to a user attempting to access a protected system or secured electronic data, an access right evaluation process is carried out among all applicable policies including those embedded in the secured electronic data. In a preferred embodiment, the access right evaluation process is invoked only when a system being accessed is protected or a file being accessed is detected to be in a secured format. Further, the access right evaluation process is configured preferably to operate transparently to the user. The access right evaluation may be advantageously used in systems or applications in which devices, mediums or electronic data are secured and can be restrictively accessed by those who are authenticated and have proper access privilege.
Michael Ouye - Los Altos CA, US Alain Rossmann - Palo Alto CA, US Steven Crocker - Redwood City CA, US Eric Gilbertson - Menlo Park CA, US Weiqing Huang - Sunnyvale CA, US Denis Paul Garcia - Palo Alto CA, US Serge Humpich - Tournan-en-Brie, FR Klimenty Vainstein - Cupertino CA, US Nicholas Ryan - Sunnyvale CA, US
Assignee:
Pervasive Security Systems, Inc. - Menlo Park CA
International Classification:
H04K001/00
US Classification:
713/182000
Abstract:
Techniques for managing access to digital assets via a designated place or its sub-places are disclosed. The designated place may be a file folder, a directory, a local or remote store. The designated place is characterized by or associated with a securing module that causes all files stored in the designated place to have substantially similar security. In other words, a file to be secured can be simply dropped into the designated place and the securing module is configured to take actions to secure the file transparently in accordance with the security characteristics of the designated place. Likewise, a designated place can be set up to unsecure the secured files being deposited in the designated place, provided a user of the secured files is permitted to do so.
Methods And Systems For Providing Access Control To Secured Data
Denis Jacques Paul Garcia - Palo Alto CA, US Micheal Michio Ouye - Mountain View CA, US Alain Rossmann - Palo Alto CA, US Steven Toye Crocker - Burlingame CA, US Eric Gilbertson - Menlo Park CA, US Weiqing Huang - Flower Mound TX, US Serge Humpich - Tournan-en-Brie, FR Klimenty Vainstein - San Francisco CA, US Nicholas Micheal Ryan - Sunnyvale CA, US
Assignee:
Intellectual Ventures I LLC - Wilmington DE
International Classification:
G06F 21/60
US Classification:
713193
Abstract:
In a system for providing access control management to electronic data, techniques to secure the electronic data and keep the electronic data secured at all times are disclosed. According to one embodiment, a secured file or secured document includes two parts: an attachment, referred to as a header, and an encrypted document or data portion. The header includes security information that points to or includes the access rules and a file key. The access rules facilitate restrictive access to the secured document and essentially determine who/when/how/where the secured document can be accessed. The file key is used to encrypt/decrypt the encrypted data portion. Only those who have the proper access privileges are permitted to retrieve the file key to encrypt/decrypt the encrypted data portion.
Magnetron With Cooling System For Substrate Processing System
The present invention generally provides a vacuum processing system with a process chamber and a rotating member, such as a magnetron in a PVD chamber, disposed in a cooling cavity of the process chamber, where the rotating member includes a deflection member for deflecting cooling fluid in the cooling cavity toward interior portions of the rotating member. In one embodiment, a base plate of the rotating member defines an upper surface of the rotating member and a magnet retainer defines a lower surface of the rotating member. Magnets are mounted between the base plate and the magnet retainer. The deflection member is mounted between the magnets and can be coupled to the magnets on one or both ends. One end of the deflection member is disposed toward the outer perimeter of the magnetron and the other end of the deflection member is disposed toward the interior portions of the rotating member. As the rotating member rotates, the deflection member deflects the cooling fluid from the side of the rotating member and forces the fluid into the interior portions of the rotating member.