Kaiser Permanente Medical GroupKaiser Permanente South San Francisco Medical Center 1200 El Camino Real, South San Francisco, CA 94080 6507422000 (phone), 6507422606 (fax)
Education:
Medical School Thomas Jefferson University, Jefferson Medical College Graduated: 1996
Fractures, Dislocations, Derangement, and Sprains Internal Derangement of Knee Cartilage Internal Derangement of Knee Ligaments Osteoarthritis Rotator Cuff Syndrome and Allied Disorders
Languages:
English
Description:
Dr. Lehman graduated from the Thomas Jefferson University, Jefferson Medical College in 1996. He works in South San Francisco, CA and specializes in Orthopaedic Surgery. Dr. Lehman is affiliated with Kaiser Permanente Medical Center and UCSF Medical Center Parnassus.
Isbn (Books And Publications)
Laboratory Hemostasis: A Practical Guide for Pathologists
Trademark, Inc. Trademark Construction Services. Trademark Residential Contractors - General. Property Management. Real Estate. Construction & Remodeling Services
1310 Highway 96 E, Ste 204C, White Bear Lake, MN 55110-3619 6122251820
Christopher Lehman
LEHMAN CONTRACT SERVICES, INC
Christopher A. Lehman Director, Secretary
Pierson Lehman, Inc
2200 NE 26 St, Fort Lauderdale, FL 33305
Us Patents
Secure Electronic Content Distribution On Cds And Dvds
Marco M. Hurtado - Boca Raton FL Kenneth L. Milsted - Boynton Beach FL George G. Gruse - Lighthouse Point FL Edgar Downs - Ft. Lauderdale FL Christopher T. Lehman - Delray Beach FL Richard L. Spagna - Boca Raton FL Jeffrey B. Lotspiech - San Jose CA
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F 1760
US Classification:
705 26, 705 51, 705 76, 705 59, 705 75
Abstract:
A method to delivery encrypted digital content to a end user system for playing the content comprising the steps of: reading from a computer readable medium metadata which has previously associated with the content. A user selects from the metadata associated content to decrypt and the end user system establishes a secure connection with an authorization authority for decrypting the content. The end user system receives a secure container containing the decrypting key for decrypting at least part of the previously encrypted content as permitted. The system creates a secure container using the encrypting key from a clearing house, wherein the secure container has an encrypting key therein from the end user system; transferring the secure container to the clearing house for authentication of permission to decrypt the content. The system receives from the clearing house, a secure container encrypted using the encrypting key of the end user system containing the decrypting key for decrypting at least part of the previously encrypted content stored on the computer readable medium as permitted; and playing at least part of the previously encrypted content by decrypting the secure container using the encrypting key of the end user system to access the decrypting key for decrypting at least part of the encrypted content.
Matching Of Complex Nested Objects By Multilevel Hashing
Ting Zhao - Coral Springs FL, US Kenneth L. Milsted - Boynton Beach FL, US Kenneth Carlin Nelson - Hollister CA, US Christopher T. Lehman - Delray Beach FL, US Qing Lu - Coral Springs FL, US
Assignee:
International Business Machines Corporation - Armonk NY
A computer-based method with multilevel hashing for lookup of a complex nested object (such as access control list) which has a plurality of nesting levels and each level has at least one element. Method stores representatives of a complex nested object in a data structure at locations determined by recursive multilevel hashing of the complex nested object elements. When needed, a match for an inputted complex nested object is determined by applying the same recursive multilevel hashing to the inputted complex nested object, as used during the storing of the complex nested object, and performing integer comparisons with hash values of the stored complex nested object.
Edgar Downs - Fort Lauderdale FL George Gregory Gruse - Lighthouse Point FL Marco M. Hurtado - Boca Raton FL Christopher T. Lehman - Delray Beach FL Kenneth Louis Milsted - Boynton Beach FL Jeffrey B. Lotspiech - San Jose CA
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
H04L 900
US Classification:
705 1
Abstract:
Disclosed is a method and apparatus of securely providing data to a user's system. The data is encrypted so as to only be decryptable by a data decrypting key, the data decrypting key being encrypted using a first public key, and the encrypted data being accessible to the user's system, the method comprising the steps of: transferring the encrypted data decrypting key to a clearing house that possesses a first private key, which corresponds to the first public key; decrypting the data decrypting key using the first private key; re-encrypting the data decrypting key using a second public key; transferring the re-encrypted data decrypting key to the user's system, the user's system possessing a second private key, which corresponds to the second public key; and decrypting the re-encrypted data decrypting key using the second private key.
Data Processing Method And Apparatus For Verifying Adapter Description File Choices
International Business Machines Corporation - Armonk NY
International Classification:
G06F 1310
US Classification:
395500
Abstract:
A data processing system has a microprocessor for executing programs useful in installing adapters having programmable option select (POS) registers. An adapter description file (ADF) stores a list of possible choices which define system resources usable by the adapter. An adapter description program (ADP) verifies certain of the choices. A configuration program then selects a valid choice and stores it in a non-volatile memory from where it can be read upon subsequent system startups into the POS registers.