Binyamin Pinkas - Jersey City NJ, US Tomas Sander - New York NY, US William G. Horne - Lawrenceville NJ, US
Assignee:
Intertrust Technologies Corp. - Sunnyvale CA
International Classification:
H04L 9/00
US Classification:
705 75, 713168, 380277
Abstract:
Systems and methods are provided for managing the transfer of electronic files. In one embodiment, a sender transfers an encrypted version of a file (such as a digitally encoded audio track, movie, document, or the like) to someone who wishes to receive it. The receiver computes a hash of the encrypted file, and sends it to a trusted third party. The trusted third party compares the hash that was computed by the receiver with another hash computed by the sender. If the two hashes match, the third party sends the file decryption key to the receiver. In some embodiments, the receiver may also send the third party payment information so that the sender, the content owner, and/or the third party can be paid for their role in the transaction. In a preferred embodiment, the payment information is only sent to, and/or used by, the third party once the third party has confirmed to the satisfaction of the receiver that the encrypted file in the receiver's possession will decrypt correctly. In some embodiments, the sender computes a hash of the encrypted version of the file and sends it directly to the third party.
Systems And Methods For Conducting Transactions And Communications Using A Trusted Third Party
Binyamin Pinkas - Jersey City NJ, US Tomas Sander - New York NY, US William G. Horne - Lawrenceville NJ, US
Assignee:
Intertrust Technologies Corporation - Sunnyvale CA
International Classification:
G06Q 40/00
US Classification:
705 75, 707747, 713168, 380277
Abstract:
Systems and methods are provided for managing the transfer of electronic files. In one embodiment, a sender transfers an encrypted version of a file (such as a digitally encoded audio track, movie, document, or the like) to someone who wishes to receive it. The receiver computes a hash of the encrypted file, and sends it to a trusted third party. The trusted third party compares the hash that was computed by the receiver with another hash computed by the sender. If the two hashes match, the third party sends the file decryption key to the receiver. In some embodiments, the receiver may also send the third party payment information so that the sender, the content owner, and/or the third party can be paid for their role in the transaction. In a preferred embodiment, the payment information is only sent to, and/or used by, the third party once the third party has confirmed to the satisfaction of the receiver that the encrypted file in the receiver's possession will decrypt correctly. In some embodiments, the sender computes a hash of the encrypted version of the file and sends it directly to the third party.
Stuart Haber - New York NY, US William G. Horne - Lawrenceville NJ, US Tomas Sander - New York NY, US Danfeng Yao - West Lafayette IN, US
Assignee:
Hewlett-Packard Development Company, L.P. - Houston TX
International Classification:
H04L 9/32 H04L 29/06
US Classification:
713176, 713150, 713168, 713175, 713177
Abstract:
One or more methods of generating a pseudonymizable document are described. A method comprises receiving a set of subdocuments and generating a first set of random values wherein each subdocument in the document corresponds to a first set random value. A second set of values is generated based on a subdocument and a corresponding value of the first set random value. A set of pseudonyms is generated wherein each subdocument in the document corresponds to at least one pseudonym of the pseudonym set. A third set of values is generated based on the second set of values and the pseudonym set and a summary value is generated based on the third set of values.
Systems And Methods For Conducting Transactions And Communications Using A Trusted Third Party
Binyamin Pinkas - Jersey City NJ, US Tomas Sander - New York NY, US William G. Horne - Lawrenceville NJ, US
Assignee:
Intertrust Technologies Corporation - Sunnyvale CA
International Classification:
G06Q 40/00
US Classification:
705 75, 707747, 713168, 380277
Abstract:
Systems and methods are provided for performing transactions and managing communications using a trusted third party. In one embodiment, a sender transfers an encrypted version of a file (such as a digitally encoded audio track, movie, document, or the like) to someone who wishes to receive it. The receiver computes a first hash of at least a portion of the encrypted data content, and sends the first hash to a third party configured to compare at least a portion of the first hash to at least a portion of a second hash. The receiver receives a file decryption key from the third party, and decrypts at least the portion of the received encrypted data content with the decryption key. In some cases, multiple hashes of the encrypted data content may be computed, each using a different portion of the encrypted data content.
Sandeep Bhatt - Madison NJ, US William Horne - Lawrenceville NJ, US Joseph Pato - Lexington MA, US Siva Rajagopalan - Morris Plans NJ, US Prasad Rao - Edison NJ, US
International Classification:
G06F 9/44
US Classification:
703020000, 703023000
Abstract:
Embodiments of the present disclosure provide systems and methods for analyzing an enterprise environment. Briefly described, one embodiment of the system for analyzing an enterprise environment comprises a modeling module that determines possible accesses to enterprise network services from a plurality of entities; and a validation module that determines whether a possible access to an enterprise service by a particular entity violates an enterprise policy, the enterprise policy governing which entities are authorized to access one or more enterprise services.
Yolanta Beresnevichiene - Bristol, GB Sandeep N. Bhatt - Madison NJ, US William G. Horne - Lawrenceville NJ, US Tari Schreider - Duluth GA, US
International Classification:
G06F 11/00
US Classification:
726 25
Abstract:
A method for analyzing risk to a system, the method being carried out by a computer having a processor and system memory, includes the steps of inputting data representing multiple threat objectives that comprise the risk, calculating a residual risk for each threat objective in view of a plurality of control mechanisms, and generating output representing an overall residual risk to the system that is a combination of the residual risks.
Systems And Methods For Conducting Transactions And Communications Using A Trusted Third Party
Tomas SANDER - New York NY, US William G. HORNE - Lawrenceville NJ, US
Assignee:
Intertrust Technologies Corporation - Sunnyvale CA
International Classification:
G06Q 20/38 G06Q 20/02
US Classification:
705 71
Abstract:
Systems and methods are provided for performing transactions and managing communications using a trusted third party. In one embodiment, a sender transfers an encrypted version of a file (such as a digitally encoded audio track, movie, document, or the like) to someone who wishes to receive it. The receiver computes a first hash of at least a portion of the encrypted data content, and sends the first hash to a third party configured to compare at least a portion of the first hash to at least a portion of a second hash. The receiver receives a file decryption key from the third party, and decrypts at least the portion of the received encrypted data content with the decryption key. In some cases, multiple hashes of the encrypted data content may be computed, each using a different portion of the encrypted data content.
Systems And Methods For Conducting Transactions And Communications Using A Trusted Third Party
- Sunnyvale CA, US Tomas SANDER - New York NY, US William G. HORNE - Lawrenceville NJ, US
International Classification:
G06Q 20/38 G06Q 20/02
Abstract:
Systems and methods are provided for performing transactions and managing communications using a trusted third party. In one embodiment, a sender transfers an encrypted version of a file (such as a digitally encoded audio track, movie, document, or the like) to someone who wishes to receive it. The receiver computes a first hash of at least a portion of the encrypted data content, and sends the first hash to a third party configured to compare at least a portion of the first hash to at least a portion of a second hash. The receiver receives a file decryption key from the third party, and decrypts at least the portion of the received encrypted data content with the decryption key. In some cases, multiple hashes of the encrypted data content may be computed, each using a different portion of the encrypted data content.
Richard Best Custom Homes
Construction Superintendent
Tmx Finance Jul 2013 - Jul 2014
Design and Planning Project Manager Ii
Efacec Feb 2009 - Jul 2013
Core Design Team Leader - Cad Engineer and Mechanical Designer
Best Custom Homes 2008 - 2009
Construction Superintendent
Maxwell - Reddick and Associates, Inc. 2007 - 2008
Construction Administrator
Education:
Georgia Southern University 1995 - 2003
Bachelors, Bachelor of Science, Construction
Statesboro High School 1991 - 1994
Ogeechee Technical College 1905 - 1906
Skills:
Autocad Construction Cad Project Management Engineering Construction Management Electricians Project Engineering Microsoft Office Manufacturing Contract Management Microsoft Excel Inspection Microsoft Word Energy Electrical Engineering Procurement Automation Power Generation Ms Project Materials Purchasing Engineering Management Powerpoint Transformer Inventor Lean Manufacturing Power Distribution Power Systems Solidworks Electronics High Voltage Substation Architecture Photoshop Drawing Switchgear Power Plants Excel Windows Word Six Sigma Plc Architectures Microsoft Project Electrical
Interests:
Self Defense and Firearms Training Spending Time With My Family Gardening
Languages:
Spanish Portuguese
Certifications:
Residential/Commercial Building Inspector Emergency First Responder Confined Space Rescue 30 Hour Osha Safety Training - Construction Safety & Health Certified Level 2 Defensive Options Trainer Residential Builder License License 53155958 -B1,B2 Certified Level 1 Krav Maga Trainer International Code Council, License 53155958 -B1,B2 Osha Fit To Fight®
Northwestern Mutual since 2009
Financial Representative
Virtus Hospitality 2007 - 2009
Consultant
CBRE Hotels Mar 2005 - Sep 2006
Vice President
The Carlyle Hotel 1999 - 2001
Director of Food and Beverage
The Paramount Hotel, Ian Schrager 1998 - 1999
Director of Food and Beverage
Education:
London Business School 2002 - 2003
MSc, Sloan Masters in Advanced Business Management
Dowling College 1986 - 1988
Skills:
Business Development Strategic Planning Investments Finance Strategy Management Leadership Financial Planning Financial Analysis Financial Services
Interests:
Outdoor Activities Including Golf Wine Cycling Tennis Cinema