Horne Carpentry Inc Single-Family Home Remodeling Multi-Family Dwelling Remodeling and Industrial Building Remodeling · Woodworking · Decks · Bathroom & Kitchen Remodeling · Replacement Windows
36 E 39 St, Bergen Point, NJ 07002 195 Broadway, Bayonne, NJ 07002 (201)8588787
William Horne Principal
Home Clamon Business Services
9 Tennyson St, Edison, NJ 08820
William Horne Principal, Manager
J&B Streetrods & Welding LLC Welding Repair · Auto Body Repair
2468 Us Hwy 441/27, Fruitland Park, FL 34731 2468 Hwy 441 Park, Fruitland Park, FL 34731 752 Carpenter Ave, Leesburg, FL 34748 748 Carpenter Ave, Leesburg, FL 34748 (352)3140155
William Horne Manager
Laser Spine Institute, LLC Medical Doctor's Office
(813)2899613
William Horne General Manager
Southern Company Services Inc Electric Services · Management Services · Nonclassifiable Establishments
PO Box 2641, Birmingham, AL 35291 600 18 St N, Birmingham, AL 35203 (205)2577162, (205)2571000
William Horne City Manager
City of Clearwater Executive Office · City Government Parks and Recreation Department · Library Executive Office · Administrative Social/Manpower Programs · Refuse System · Water Supply Service Executive Office · Legislative Body · Economic Development of Housing
William G. Horne - Lawrenceville NJ, US Umesh Maheshwari - San Jose CA, US Robert E. Tarjan - Princeton NJ, US James J. Horning - Palo Alto CA, US W. Olin Sibert - Lexington MA, US Lesley R. Matheson - Campbell CA, US Andrew K. Wright - Monroe Township NJ, US Susan S. Owicki - Palo Alto CA, US
Assignee:
Intertrust Technologies Corp. - Sunnyvale CA
International Classification:
H04L 9/32 B42D 15/00 H04N 1/40
US Classification:
713176, 283113, 358 328
Abstract:
Systems and methods are disclosed for embedding information in software and/or other electronic content such that the information is difficult for an unauthorized party to detect, remove, insert, forge, and/or corrupt. The embedded information can be used to protect electronic content by identifying the content's source, thus enabling unauthorized copies or derivatives to be reliably traced, and thus facilitating effective legal recourse by the content owner. Systems and methods are also disclosed for protecting, detecting, removing, and decoding information embedded in electronic content, and for using the embedded information to protect software or other media from unauthorized analysis, attack, and/or modification.
Systems And Methods For Watermarking Software And Other Media
William G. Horne - Lawrenceville NJ, US Umesh Maheshwari - San Jose CA, US Robert E. Tarjan - Princeton NJ, US James J. Horning - Palo Alto CA, US W. Olin Sibert - Lexington MA, US Lesley R. Matheson - Campbell CA, US Andrew K. Wright - Monroe Township NJ, US Susan S. Owicki - Palo Alto CA, US
Assignee:
Intertrust Technologies Corporation - Sunnyvale CA
International Classification:
H04L 9/32 G06F 11/30 G06F 12/14
US Classification:
713176, 713189
Abstract:
Systems and methods are disclosed for embedding information in software and/or other electronic content such that the information is difficult for an unauthorized party to detect, remove, insert, forge, and/or corrupt. The embedded information can be used to protect electronic content by identifying the content's source, thus enabling unauthorized copies or derivatives to be reliably traced, and thus facilitating effective legal recourse by the content owner. Systems and methods are also disclosed for protecting, detecting, removing, and decoding information embedded in electronic content, and for using the embedded information to protect software or other media from unauthorized analysis, attack, and/or modification.
Systems And Methods For Watermarking Software And Other Media
William G. Horne - Lawrenceville NJ, US Umesh Maheshwari - San Jose CA, US Robert E. Tarjan - Princeton NJ, US James J. Horning - Palo Alto CA, US W. Olin Sibert - Lexington MA, US Lesley R. Matheson - Campbell CA, US Andrew K. Wright - Monroe Township NJ, US Susan S. Owicki - Palo Alto CA, US
Assignee:
Intertrust Technologies Corporation - Sunnyvale CA
International Classification:
H04L 9/32 G06F 9/44 H04N 1/40 B42D 15/00
US Classification:
713176, 717114, 358 328, 283113
Abstract:
Systems and methods are disclosed for embedding information in software and/or other electronic content such that the information is difficult for an unauthorized party to detect, remove, insert, forge, and/or corrupt. The embedded information can be used to protect electronic content by identifying the content's source, thus enabling unauthorized copies or derivatives to be reliably traced, and thus facilitating effective legal recourse by the content owner. Systems and methods are also disclosed for protecting, detecting, removing, and decoding information embedded in electronic content, and for using the embedded information to protect software or other media from unauthorized analysis, attack, and/or modification.
William G. Horne - Lawrenceville NJ, US Lesley R. Matheson - Discovery Bay CA, US Casey Sheehan - Hollister CA, US Robert E. Tarjan - Princeton NJ, US
Assignee:
Intertrust Technologies Corporation - Sunnyvale CA
International Classification:
H04L 9/32
US Classification:
713187, 713176, 726 26
Abstract:
Software self-checking mechanisms are described for improving software tamper resistance and/or reliability. Redundant tests are performed to detect modifications to a program while it is running. Modifications are recorded or reported. Embodiments of the software self-checking mechanisms can be implemented such that they are relatively stealthy and robust, and so that they are compatible with copy-specific static watermarking and other tamper-resistance techniques.
Systems And Methods For Watermarking Software And Other Media
William G. Horne - Lawrenceville NJ, US Umesh Maheshwari - San Jose CA, US Robert E. Tarjan - Princeton NJ, US James J. Homing - Palo Alto CA, US W. Olin Sibert - Lexington MA, US Lesley R. Matheson - Campbell CA, US Andrew K. Wright - Monroe Township NJ, US Susan Owicki - Palo Alto CA, US
Assignee:
Intertrust Technologies Corp. - Sunnyvale CA
International Classification:
H04L 9/32
US Classification:
713176
Abstract:
Systems and methods are disclosed for embedding information in software and/or other electronic content such that the information is difficult for an unauthorized party to detect, remove, insert, forge, and/or corrupt. The embedded information can be used to protect electronic content by identifying the content's source, thus enabling unauthorized copies or derivatives to be reliably traced, and thus facilitating effective legal recourse by the content owner. Systems and methods are also disclosed for protecting, detecting, removing, and decoding information embedded in electronic content, and for using the embedded information to protect software or other media from unauthorized analysis, attack, and/or modification.
William Horne - Lawrenceville NJ, US Lesley Matheson - Berwyn PA, US Casey Sheehan - Hollister CA, US Robert Tarjan - Princeton NJ, US
Assignee:
InterTrust Technologies Corporation - Santa Clara CA
International Classification:
G06F011/30
US Classification:
713/187000, 713/200000
Abstract:
Software self-checking mechanisms are described for improving software tamper resistance and/or reliability. Redundant tests are performed to detect modifications to a program while it is running. Modifications are recorded or reported. Embodiments of the software self-checking mechanisms can be implemented such that they are relatively stealthy and robust, and so that it they are compatible with copy-specific static watermarking and other tamper-resistance techniques.
Sandeep Bhatt - Madison NJ, US William Horne - Lawrenceville NJ, US Joseph Pato - Lexington MA, US Siva Rajagopalan - Morris Plans NJ, US Prasad Rao - Edison NJ, US
International Classification:
G06F 9/44
US Classification:
703020000, 703023000
Abstract:
Embodiments of the present disclosure provide systems and methods for analyzing an enterprise environment. Briefly described, one embodiment of the system for analyzing an enterprise environment comprises a modeling module that determines possible accesses to enterprise network services from a plurality of entities; and a validation module that determines whether a possible access to an enterprise service by a particular entity violates an enterprise policy, the enterprise policy governing which entities are authorized to access one or more enterprise services.
William Horne - Lawrenceville NJ, US Stuart Haber - New York NY, US Tomas Sander - New York NY, US
Assignee:
HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P. - Houston TX
International Classification:
H04L 9/00
US Classification:
713178
Abstract:
A method of establishing the integrity of an audit record set is described. The method comprises receiving a set of audit records and generating a first set of random values wherein each audit record in the set corresponds to at least one value of the first set. The method further comprises generating a second set of values based on an audit record and a corresponding value of the first set for each audit record in the set and generating a summary value based on the second set of values. The method further comprises certifying the summary value to generate an integrity certificate enabling verification of the integrity of the audit record set and storing the audit record set and at least one of the first set of values and the generated digital signature.
1st Source Servall Birmingham, AL Apr 2011 to Jul 2011 Distribution Center ManagerUSA Security Birmingham, AL Feb 2011 to Apr 2011 Security SupervisorWalmart Calera, AL Apr 2010 to Feb 2011 Part Time Photo Center/Wireless Connect Center Sales AssociateEastman Kodak Company Rochester, NY 2002 to 2007 Logistics SupervisorTransportation Supervisor 1993 to 2002
Education:
Commerce High School Yonkers, NY Jan 1966 to Jan 1969 High School in BookkeepingMonroe Community College Rochester, NY N/A in Inc
Military:
Rank: Corporal (Non-Commissoned Officer) Jul 1970 to Jul 1972 Branch: United States Marine CorpsL.i.location.original