Alan Marshall (2 May 1902, Noorat, Victoria 21 January 1984, Melbourne) was an Australian writer, story teller and social documenter. His best known book, ...
Name / Title
Company / Classification
Phones & Addresses
Alan Marshall Owner
Grand Slam Amusement Parks & Places
9210 Trinity Dr, Lake In The Hls, IL 60156-1664 8478540022, 8478548709
Alan Marshall Board
National Tuberous Sclerosis Association Social Services
Administrative Law (Judicial Review) Administrative Law (Merits Review) Alternative Dispute Resolution/Mediation Commercial Law Criminal Law/Intervention/Compensation Environment Inquests Licensing and Disciplinary Tribunals Planning and Local Government Probate/Wills/TFM Residential/Retail Tenancies Torts
Alan L. Marshall - Kirkland WA, US Kamran Rajabi Zargahi - Seattle WA, US Miller Thomas Abel - Mercer Island WA, US Murali Krishnan - Redmond WA, US Anoop Anantha - Kirkland WA, US
Assignee:
MICROSOFT CORPORATION - Redmond WA
International Classification:
H04L 9/00 H04L 9/08
US Classification:
380255, 380278
Abstract:
Provisioning techniques are described. In implementations, a particular one of a plurality of public keys are located using an identifier included in a request received via a network. The located public key is communicated via the network, the public key configured to encrypt data that is to be decrypted by a secure element of a mobile communication device, the secure element implemented using hardware and including a private key that is configured to decrypt the data that was encrypted using the public key.
Anoop Anantha - Kirkland WA, US Murali R. Krishnan - Clyde Hill WA, US Alan L. Marshall - Kirkland WA, US Kamran Rajabi Zargahi - Seattle WA, US Miller Thomas Abel - Mercer Island WA, US
Assignee:
MICROSOFT CORPORATION - Redmond WA
International Classification:
H04L 9/32
US Classification:
713172, 726 2, 380277, 726 6, 726 9
Abstract:
Secure element authentication techniques are described. In implementations, a confirmation is received that an identity of a user has been physically verified using one or more physical documents. One or more credentials that are usable to authenticate the user are caused to be stored in a secure element of a mobile communication device of the user, the secure element implemented using tamper-resistant hardware.
- Redmond WA, US Murali R. Krishnan - Clyde Hill WA, US Alan L. Marshall - Kirkland WA, US Kamran Rajabi Zargahi - Seattle WA, US Miller Thomas Abel - Mercer Island WA, US
Secure element authentication techniques are described. In implementations, a confirmation is received that an identity of a user has been physically verified using one or more physical documents. One or more credentials that are usable to authenticate the user are caused to be stored in a secure element of a mobile communication device of the user, the secure element implemented using tamper-resistant hardware.
- Redmond WA, US Murali R. Krishnan - Clyde Hill WA, US Alan L. Marshall - Kirkland WA, US Kamran Rajabi Zargahi - Seattle WA, US Miller Thomas Abel - Mercer Island WA, US
Secure element authentication techniques are described. In implementations, a confirmation is received that an identity of a user has been physically verified using one or more physical documents. One or more credentials that are usable to authenticate the user are caused to be stored in a secure element of a mobile communication device of the user, the secure element implemented using tamper-resistant hardware.