Search

William G Horne

age ~61

from Lawrenceville, NJ

Also known as:
  • William H Horne
  • Bill G Horne
  • Willia M Horne

William Horne Phones & Addresses

  • Lawrenceville, NJ
  • Albuquerque, NM
  • 186 Spring Beauty Dr, Trenton, NJ 08648 • (609)8950133

Work

  • Position:
    Professional/Technical

Education

  • Degree:
    Associate degree or higher

Specialities

Litigation

Lawyers & Attorneys

William Horne Photo 1

William Horne - Lawyer

view source
Office:
William A. Horne
Specialties:
Litigation
ISLN:
906373413
Admitted:
1973
University:
Brown University, 1964; Brown University, 1964
Law School:
Georgetown University Law Center, J.D., 1972

Wikipedia References

William Horne Photo 2

William Horne (American Politician)

Name / Title
Company / Classification
Phones & Addresses
William Horne
Principal
Home Clamon
Business Services
9 Tennyson St, Edison, NJ 08820
William Horne
Manager
Laser Spine Institute, LLC
Medical Doctor's Office
(813)2899613
William Horne
City Manager
City of Clearwater
Executive Office · City Government Parks and Recreation Department · Library Executive Office · Administrative Social/Manpower Programs · Refuse System · Water Supply Service Executive Office · Legislative Body · Economic Development of Housing
(727)5624040, (727)5624538, (727)5624970, (727)5624060
William Horne
Partner
Horne & Schanck Enterprise LLC
Business Services
40 Oak St, Trenton, NJ 08638

Us Patents

  • Systems And Methods For Conducting Transactions And Communications Using A Trusted Third Party

    view source
  • US Patent:
    7136840, Nov 14, 2006
  • Filed:
    Apr 22, 2002
  • Appl. No.:
    10/128182
  • Inventors:
    Binyamin Pinkas - Jersey City NJ, US
    Tomas Sander - New York NY, US
    William G. Horne - Lawrenceville NJ, US
  • Assignee:
    Intertrust Technologies Corp. - Sunnyvale CA
  • International Classification:
    H04L 9/00
  • US Classification:
    705 75, 713168, 380277
  • Abstract:
    Systems and methods are provided for managing the transfer of electronic files. In one embodiment, a sender transfers an encrypted version of a file (such as a digitally encoded audio track, movie, document, or the like) to someone who wishes to receive it. The receiver computes a hash of the encrypted file, and sends it to a trusted third party. The trusted third party compares the hash that was computed by the receiver with another hash computed by the sender. If the two hashes match, the third party sends the file decryption key to the receiver. In some embodiments, the receiver may also send the third party payment information so that the sender, the content owner, and/or the third party can be paid for their role in the transaction. In a preferred embodiment, the payment information is only sent to, and/or used by, the third party once the third party has confirmed to the satisfaction of the receiver that the encrypted file in the receiver's possession will decrypt correctly. In some embodiments, the sender computes a hash of the encrypted version of the file and sends it directly to the third party.
  • Software Self-Defense Systems And Methods

    view source
  • US Patent:
    7430670, Sep 30, 2008
  • Filed:
    Jul 31, 2000
  • Appl. No.:
    09/629546
  • Inventors:
    James J. Horning - Palo Alto CA, US
    W. Olin Sibert - Lexington MA, US
    Robert E. Tarjan - Princeton NJ, US
    Umesh Maheshwari - San Jose CA, US
    William G. Horne - Lawrenceville NJ, US
    Andrew K. Wright - Monroe Township NJ, US
    Lesley R. Matheson - Campbell CA, US
    Susan K. Owicki - Palo Alto CA, US
  • Assignee:
    Intertrust Technologies Corp. - Sunnyvale CA
  • International Classification:
    G06F 12/14
  • US Classification:
    713190, 713194
  • Abstract:
    Systems and methods are disclosed for protecting a computer program from unauthorized analysis and modification. Obfuscation transformations can be applied to the computer program's local structure, control graph, and/or data structure to render the program more difficult to understand and/or modify. Tamper-resistance mechanisms can be incorporated into the computer program to detect attempts to tamper with the program's operation. Once an attempt to tamper with the computer program is detected, the computer program reports it to an external agent, ceases normal operation, and/or reverses any modifications made by the attempted tampering. The computer program can also be watermarked to facilitate identification of its owner. The obfuscation, tamper-resistance, and watermarking transformations can be applied to the computer program's source code, object code, or executable image.
  • Systems And Methods For Watermarking Software And Other Media

    view source
  • US Patent:
    7739511, Jun 15, 2010
  • Filed:
    Oct 29, 2007
  • Appl. No.:
    11/927220
  • Inventors:
    William G. Horne - Lawrenceville NJ, US
    Umesh Maheshwari - San Jose CA, US
    Robert E. Tarjan - Princeton NJ, US
    James J. Horning - Palo Alto CA, US
    W. Olin Sibert - Lexington MA, US
    Lesley R. Matheson - Campbell CA, US
    Andrew K. Wright - Monroe Township NJ, US
    Susan S. Owicki - Palo Alto CA, US
  • Assignee:
    Intertrust Technologies Corp. - Sunnyvale CA
  • International Classification:
    H04L 9/32
    B42D 15/00
    H04N 1/40
  • US Classification:
    713176, 283113, 358 328
  • Abstract:
    Systems and methods are disclosed for embedding information in software and/or other electronic content such that the information is difficult for an unauthorized party to detect, remove, insert, forge, and/or corrupt. The embedded information can be used to protect electronic content by identifying the content's source, thus enabling unauthorized copies or derivatives to be reliably traced, and thus facilitating effective legal recourse by the content owner. Systems and methods are also disclosed for protecting, detecting, removing, and decoding information embedded in electronic content, and for using the embedded information to protect software or other media from unauthorized analysis, attack, and/or modification.
  • Systems And Methods For Watermarking Software And Other Media

    view source
  • US Patent:
    7770016, Aug 3, 2010
  • Filed:
    Apr 19, 2007
  • Appl. No.:
    11/737428
  • Inventors:
    William G. Horne - Lawrenceville NJ, US
    Umesh Maheshwari - San Jose CA, US
    Robert E. Tarjan - Princeton NJ, US
    James J. Horning - Palo Alto CA, US
    W. Olin Sibert - Lexington MA, US
    Lesley R. Matheson - Campbell CA, US
    Andrew K. Wright - Monroe Township NJ, US
    Susan S. Owicki - Palo Alto CA, US
  • Assignee:
    Intertrust Technologies Corporation - Sunnyvale CA
  • International Classification:
    H04L 9/32
    G06F 11/30
    G06F 12/14
  • US Classification:
    713176, 713189
  • Abstract:
    Systems and methods are disclosed for embedding information in software and/or other electronic content such that the information is difficult for an unauthorized party to detect, remove, insert, forge, and/or corrupt. The embedded information can be used to protect electronic content by identifying the content's source, thus enabling unauthorized copies or derivatives to be reliably traced, and thus facilitating effective legal recourse by the content owner. Systems and methods are also disclosed for protecting, detecting, removing, and decoding information embedded in electronic content, and for using the embedded information to protect software or other media from unauthorized analysis, attack, and/or modification.
  • Software Self-Defense Systems And Methods

    view source
  • US Patent:
    7779270, Aug 17, 2010
  • Filed:
    May 13, 2005
  • Appl. No.:
    11/129106
  • Inventors:
    James J. Horning - Palo Alto CA, US
    W. Olin Sibert - Lexington MA, US
    Robert E. Tarjan - Princeton NJ, US
    Umesh Maheshwari - San Jose CA, US
    William G. Horne - Lawrenceville NJ, US
    Andrew K. Wright - Monroe Township NJ, US
    Lesley R. Matheson - Campbell CA, US
    Susan Owicki - Palo Alto CA, US
  • Assignee:
    Intertrust Technologies Corporation - Sunnyvale CA
  • International Classification:
    G06F 11/30
  • US Classification:
    713187, 713189
  • Abstract:
    Systems and methods are disclosed for protecting a computer program from unauthorized analysis and modification. Obfuscation transformations can be applied to the computer program's local structure, control graph, and/or data structure to render the program more difficult to understand and/or modify. Tamper-resistance mechanisms can be incorporated into the computer program to detect attempts to tamper with the program's operation. Once an attempt to tamper with the computer program is detected, the computer program reports it to an external agent, ceases normal operation, and/or reverses any modifications made by the attempted tampering. The computer program can also be watermarked to facilitate identification of its owner. The obfuscation, tamper-resistance, and watermarking transformations can be applied to the computer program's source code, object code, or executable image.
  • Software Self-Defense Systems And Methods

    view source
  • US Patent:
    7823135, Oct 26, 2010
  • Filed:
    Apr 7, 2005
  • Appl. No.:
    11/102306
  • Inventors:
    James J. Horning - Palo Alto CA, US
    W. Olin Sibert - Lexington MA, US
    Robert E. Tarjan - Princeton NJ, US
    Umesh Maheshwari - San Jose CA, US
    William G. Horne - Lawrenceville NJ, US
    Andrew K. Wright - Monroe Township NJ, US
    Lesley R. Matheson - Campbell CA, US
    Susan Owicki - Palo Alto CA, US
  • Assignee:
    Intertrust Technologies Corporation - Sunnyvale CA
  • International Classification:
    G06F 9/44
  • US Classification:
    717127, 717126, 713187, 713188, 713189, 713190
  • Abstract:
    Systems and methods are disclosed for protecting a computer program from unauthorized analysis and modification. Obfuscation transformations can be applied to the computer program's local structure, control graph, and/or data structure to render the program more difficult to understand and/or modify. Tamper-resistance mechanisms can be incorporated into the computer program to detect attempts to tamper with the program's operation. Once an attempt to tamper with the computer program is detected, the computer program reports it to an external agent, ceases normal operation, and/or reverses any modifications made by the attempted tampering. The computer program can also be watermarked to facilitate identification of its owner. The obfuscation, tamper-resistance, and watermarking transformations can be applied to the computer program's source code, object code, or executable image.
  • Systems And Methods For Conducting Transactions And Communications Using A Trusted Third Party

    view source
  • US Patent:
    7827114, Nov 2, 2010
  • Filed:
    Oct 30, 2006
  • Appl. No.:
    11/590319
  • Inventors:
    Binyamin Pinkas - Jersey City NJ, US
    Tomas Sander - New York NY, US
    William G. Horne - Lawrenceville NJ, US
  • Assignee:
    Intertrust Technologies Corporation - Sunnyvale CA
  • International Classification:
    G06Q 40/00
  • US Classification:
    705 75, 707747, 713168, 380277
  • Abstract:
    Systems and methods are provided for managing the transfer of electronic files. In one embodiment, a sender transfers an encrypted version of a file (such as a digitally encoded audio track, movie, document, or the like) to someone who wishes to receive it. The receiver computes a hash of the encrypted file, and sends it to a trusted third party. The trusted third party compares the hash that was computed by the receiver with another hash computed by the sender. If the two hashes match, the third party sends the file decryption key to the receiver. In some embodiments, the receiver may also send the third party payment information so that the sender, the content owner, and/or the third party can be paid for their role in the transaction. In a preferred embodiment, the payment information is only sent to, and/or used by, the third party once the third party has confirmed to the satisfaction of the receiver that the encrypted file in the receiver's possession will decrypt correctly. In some embodiments, the sender computes a hash of the encrypted version of the file and sends it directly to the third party.
  • Systems And Methods For Watermarking Software And Other Media

    view source
  • US Patent:
    8140850, Mar 20, 2012
  • Filed:
    Dec 8, 2008
  • Appl. No.:
    12/330482
  • Inventors:
    William G. Horne - Lawrenceville NJ, US
    Umesh Maheshwari - San Jose CA, US
    Robert E. Tarjan - Princeton NJ, US
    James J. Horning - Palo Alto CA, US
    W. Olin Sibert - Lexington MA, US
    Lesley R. Matheson - Campbell CA, US
    Andrew K. Wright - Monroe Township NJ, US
    Susan S. Owicki - Palo Alto CA, US
  • Assignee:
    Intertrust Technologies Corporation - Sunnyvale CA
  • International Classification:
    H04L 9/32
    G06F 9/44
    H04N 1/40
    B42D 15/00
  • US Classification:
    713176, 717114, 358 328, 283113
  • Abstract:
    Systems and methods are disclosed for embedding information in software and/or other electronic content such that the information is difficult for an unauthorized party to detect, remove, insert, forge, and/or corrupt. The embedded information can be used to protect electronic content by identifying the content's source, thus enabling unauthorized copies or derivatives to be reliably traced, and thus facilitating effective legal recourse by the content owner. Systems and methods are also disclosed for protecting, detecting, removing, and decoding information embedded in electronic content, and for using the embedded information to protect software or other media from unauthorized analysis, attack, and/or modification.

Medicine Doctors

William Horne Photo 3

William Tucker Horne

view source
Specialties:
Psychiatry
Education:
Baylor College of Medicine (1965)

Resumes

William Horne Photo 4

William Horne

view source
William Horne Photo 5

William Horne

view source
William Horne Photo 6

Master Carpenter

view source
Work:

Master Carpenter
William Horne Photo 7

William Horne

view source
Skills:
Scribe
William Horne Photo 8

William Horne

view source
William Horne Photo 9

William Horne

view source

Facebook

William Horne Photo 10

Jas William Van Horne

view source
Friends:
Rich Appiah, Sook-Yin Lee, Shay Donovan, Kayla Ann, Jewly Wrott
Jason William Van Horne
William Horne Photo 11

Bill van Horne

view source
Friends:
Jeff Whittington, William F. Moore, William Neil Farfour, Gregory Less
William Horne Photo 12

William Van Horne

view source

Classmates

William Horne Photo 13

Sir William Van horne hig...

view source
William Horne Photo 14

Highlands Middle School, ...

view source
Graduates:
Michael Sible (1968-1976),
Van Kniebes (1977-1981),
William Campbell (1967-1976),
William van Horne (1963-1964)

Flickr

Googleplus

William Horne Photo 23

William Horne

Work:
Dell - Account Executive (4)
Education:
University of Oklahoma - Criminal Justice
William Horne Photo 24

William Horne

William Horne Photo 25

William Horne

William Horne Photo 26

William Horne

William Horne Photo 27

William Horne

William Horne Photo 28

William Horne

William Horne Photo 29

William Horne

William Horne Photo 30

William Horne

Youtube

Weve Been Here Before: Insurrections and Whit...

As we remember and assess the damage of the January 6th Insurrection o...

  • Duration:
    3m 52s

William Horne - Sextet: I. Moderato

Chamber Music Michigan Recorded Live October 12, 2017 Merryl Neille, f...

  • Duration:
    8m 48s

William Horne - Sextet: III. Quick

Chamber Music Michigan Recorded Live October 12, 2017 Merryl Neille, f...

  • Duration:
    7m 28s

William Horne - Sextet: II. Sprightly

Chamber Music Michigan Recorded Live October 12, 2017 Merryl Neille, f...

  • Duration:
    6m 26s

William B. Horne II Memorial Service - August...

Comments are not monitored on this platform.

  • Duration:
    2h 18m 31s

In Loving Memory Of William B. Horne II

Comments are not monitored on this platform.

  • Duration:
    30m 34s

Myspace

William Horne Photo 31

William Van Horne

view source
Locality:
WOODBRIDGE, Virginia
Birthday:
1948

Get Report for William G Horne from Lawrenceville, NJ, age ~61
Control profile