Horne Carpentry Inc Single-Family Home Remodeling Multi-Family Dwelling Remodeling and Industrial Building Remodeling · Woodworking · Decks · Bathroom & Kitchen Remodeling · Replacement Windows
36 E 39 St, Bergen Point, NJ 07002 195 Broadway, Bayonne, NJ 07002 (201)8588787
William Horne Principal
Home Clamon Business Services
9 Tennyson St, Edison, NJ 08820
William Horne Principal
Horne Service Co Services-Misc
390 Stoney Mtn Rd, Rougemont, NC 27572
William D. Horne Manager
Mongo Films LLC Motion Picture Services
2307 Mangrum Dr, Dunedin, FL 34698 2840 W Edison Pl, Dunnellon, FL 34433 8575 Woodlake Dr, Richmond, VA 23294
William T. Horne
A C M P Foundation Inc Personal Interest Organzation
1123 Broadway, New York, NY 10010
William Horne Manager
Laser Spine Institute, LLC Medical Doctor's Office
(813)2899613
William Horne City Manager
City of Clearwater Executive Office · City Government Parks and Recreation Department · Library Executive Office · Administrative Social/Manpower Programs · Refuse System · Water Supply Service Executive Office · Legislative Body · Economic Development of Housing
William A. Horne - Cary NC Tilman Oltersdorf - Cardiff CA
Assignee:
IDUN Pharmaceuticals, Inc. - San Diego CA
International Classification:
C12N 1512
US Classification:
536 235, 435 691, 4353201, 530350
Abstract:
The invention provides an isolated gene and an isolated nucleic acid sequence encoding human Bad and functional fragments thereof. Also provided is an isolated human Bad polypeptide and functional fragments thereof. Methods of identifying human Bad binding partners and methods of screening for compounds which interfere with the association of human Bad interacting polypeptides with human Bad are also provided. Finally, methods for decreasing or increasing the viability of a cell are provided as well.
Human Bad Polypeptides, Encoding Nucleic Acids And Methods Of Use
William A. Horne - Cary NC Tilman Oltersdorf - Cardiff CA
Assignee:
IDUN Pharmaceuticals Inc. - San Diego CA
International Classification:
G01N 3368
US Classification:
435 71
Abstract:
The invention provides an isolated gene and an isolated nucleic acid sequence encoding human Bad and functional fragments thereof. Also provided is an isolated human Bad polypeptide and functional fragments thereof. Methods of identifying human Bad binding partners and methods of screening for compounds which interfere with the association of human Bad interacting polypeptides with human Bad are also provided. Finally, methods for decreasing or increasing the viability of a cell are provided as well.
Systems And Methods For Conducting Transactions And Communications Using A Trusted Third Party
Binyamin Pinkas - Jersey City NJ, US Tomas Sander - New York NY, US William G. Horne - Lawrenceville NJ, US
Assignee:
Intertrust Technologies Corp. - Sunnyvale CA
International Classification:
H04L 9/00
US Classification:
705 75, 713168, 380277
Abstract:
Systems and methods are provided for managing the transfer of electronic files. In one embodiment, a sender transfers an encrypted version of a file (such as a digitally encoded audio track, movie, document, or the like) to someone who wishes to receive it. The receiver computes a hash of the encrypted file, and sends it to a trusted third party. The trusted third party compares the hash that was computed by the receiver with another hash computed by the sender. If the two hashes match, the third party sends the file decryption key to the receiver. In some embodiments, the receiver may also send the third party payment information so that the sender, the content owner, and/or the third party can be paid for their role in the transaction. In a preferred embodiment, the payment information is only sent to, and/or used by, the third party once the third party has confirmed to the satisfaction of the receiver that the encrypted file in the receiver's possession will decrypt correctly. In some embodiments, the sender computes a hash of the encrypted version of the file and sends it directly to the third party.
Systems And Methods For Conducting Transactions And Communications Using A Trusted Third Party
Binyamin Pinkas - Jersey City NJ, US Tomas Sander - New York NY, US William G. Horne - Lawrenceville NJ, US
Assignee:
Intertrust Technologies Corporation - Sunnyvale CA
International Classification:
G06Q 40/00
US Classification:
705 75, 707747, 713168, 380277
Abstract:
Systems and methods are provided for managing the transfer of electronic files. In one embodiment, a sender transfers an encrypted version of a file (such as a digitally encoded audio track, movie, document, or the like) to someone who wishes to receive it. The receiver computes a hash of the encrypted file, and sends it to a trusted third party. The trusted third party compares the hash that was computed by the receiver with another hash computed by the sender. If the two hashes match, the third party sends the file decryption key to the receiver. In some embodiments, the receiver may also send the third party payment information so that the sender, the content owner, and/or the third party can be paid for their role in the transaction. In a preferred embodiment, the payment information is only sent to, and/or used by, the third party once the third party has confirmed to the satisfaction of the receiver that the encrypted file in the receiver's possession will decrypt correctly. In some embodiments, the sender computes a hash of the encrypted version of the file and sends it directly to the third party.
Stuart Haber - New York NY, US William G. Horne - Lawrenceville NJ, US Tomas Sander - New York NY, US Danfeng Yao - West Lafayette IN, US
Assignee:
Hewlett-Packard Development Company, L.P. - Houston TX
International Classification:
H04L 9/32 H04L 29/06
US Classification:
713176, 713150, 713168, 713175, 713177
Abstract:
One or more methods of generating a pseudonymizable document are described. A method comprises receiving a set of subdocuments and generating a first set of random values wherein each subdocument in the document corresponds to a first set random value. A second set of values is generated based on a subdocument and a corresponding value of the first set random value. A set of pseudonyms is generated wherein each subdocument in the document corresponds to at least one pseudonym of the pseudonym set. A third set of values is generated based on the second set of values and the pseudonym set and a summary value is generated based on the third set of values.
Systems And Methods For Conducting Transactions And Communications Using A Trusted Third Party
Binyamin Pinkas - Jersey City NJ, US Tomas Sander - New York NY, US William G. Horne - Lawrenceville NJ, US
Assignee:
Intertrust Technologies Corporation - Sunnyvale CA
International Classification:
G06Q 40/00
US Classification:
705 75, 707747, 713168, 380277
Abstract:
Systems and methods are provided for performing transactions and managing communications using a trusted third party. In one embodiment, a sender transfers an encrypted version of a file (such as a digitally encoded audio track, movie, document, or the like) to someone who wishes to receive it. The receiver computes a first hash of at least a portion of the encrypted data content, and sends the first hash to a third party configured to compare at least a portion of the first hash to at least a portion of a second hash. The receiver receives a file decryption key from the third party, and decrypts at least the portion of the received encrypted data content with the decryption key. In some cases, multiple hashes of the encrypted data content may be computed, each using a different portion of the encrypted data content.
Human Bad Polypeptides, Encoding Nucleic Acids And Methods Of Use
The invention provides an isolated gene and an isolated nucleic acid sequence encoding human Bad and functional fragments thereof. Also provided is an isolated human Bad polypeptide and functional fragments thereof. Methods of identifying human Bad binding partners and methods of screening for compounds which interfere with the association of human Bad interacting polypeptides with human Bad are also provided. Finally, methods for decreasing or increasing the viability of a cell are provided as well.
Systems And Methods For Conducting Transactions And Communications Using A Trusted Third Party
Tomas SANDER - New York NY, US William G. HORNE - Lawrenceville NJ, US
Assignee:
Intertrust Technologies Corporation - Sunnyvale CA
International Classification:
G06Q 20/38 G06Q 20/02
US Classification:
705 71
Abstract:
Systems and methods are provided for performing transactions and managing communications using a trusted third party. In one embodiment, a sender transfers an encrypted version of a file (such as a digitally encoded audio track, movie, document, or the like) to someone who wishes to receive it. The receiver computes a first hash of at least a portion of the encrypted data content, and sends the first hash to a third party configured to compare at least a portion of the first hash to at least a portion of a second hash. The receiver receives a file decryption key from the third party, and decrypts at least the portion of the received encrypted data content with the decryption key. In some cases, multiple hashes of the encrypted data content may be computed, each using a different portion of the encrypted data content.
Durham Operation Building which houses the Durham Data Center
2009 to 2000 Lead EngineerMy first year at SunTrust Banks, Inc
2007 to 2000 Regional Safety Representative for NorthSunTrust Bank, Inc
2005 to 2009 Facilities AdministratorPDU and STS
1994 to 2007 MemberComfort Engineers, Inc Durham, NC 1982 to 2005 Service TechnicianTiny's Shop on Wheels Durham, NC 1978 to 1982 Auto MechanicShannon Manor Apts Durham, NC 1976 to 1978 Maintenance Supervisor