Dr. Watkins graduated from the Howard University College of Medicine in 2002. He works in Baltimore, MD and specializes in Internal Medicine. Dr. Watkins is affiliated with Bon Secours Baltimore Hospital, Medstar Union Memorial Hospital and University Of Maryland Medical Center Midtown Campus.
Eric Rescorla - Palo Alto CA, US Adam Cain - Madison WI, US Brian Korver - San Francisco CA, US Tom Kroeger - Santa Cruz CA, US David Kashtan - La Selva Beach CA, US Craig Watkins - State College PA, US
Method and apparatus for clustered Secure Sockets Layer (SSL) acceleration where two or more SSL relays are connected in a cluster. Information is transferred between a first node (typically, the client) and one of the SSL relays where the transferred information is related to communication between the first node and a second node (typically, the server). The state information of an SSL connection between the first node and the one SSL relay is clustered. The clustering includes sharing the state information between the one SSL relay and each of the one or more SSL relays. Any of the SSL relays can take over all connections of another of the clustered SSL relays therefore, providing no interruption in the communication should any of the SSL relays fail.
Method And System For Authentication Using Infrastructureless Certificates
Craig R. Watkins - State College PA, US Jeremey Barrett - Sugar Land TX, US Adam Cain - Madison WI, US
Assignee:
Nokia Siemens Networks Oy - Espoo
International Classification:
H04L 9/32
US Classification:
713156, 713175
Abstract:
Methods and systems are directed to authenticating a client over a network. The client generates a certificate and sends it to a server through a trusted mechanism. The server is configured to store the received certificate. When the client requests authentication over the network, it provides the certificate again, along with a parameter associated with a secure session. The server verifies the parameter associated with the secure session and determines if the certificate is substantially the same as the stored certificate. The server authenticates the client over the network, if the certificate is determined to be stored. In another embodiment, the client transmits the certificate that is generated by a third party Certificate Authority (CA) based, in part, on the client's public key.
Method And Apparatus For Fault Tolerant Tcp Handshaking
Method and apparatus for fault tolerant TCP handshaking that includes a first node and a second node both connected in a network where the second node is one of at least two nodes in a cluster of nodes. The second node receives a first message from the first node where the first message includes a sequence number. The second node generates a fingerprint and replaces a portion of the sequence number with the fingerprint to form a cryptographic sequence number. The cryptographic sequence number is sent from the second node to the first node. A second message that includes the cryptographic sequence number is received from the first node at the second node. Any node in the cluster can verify that the cryptographic sequence number sent by the first node was created by one of the nodes in the cluster thereby providing fault tolerant TCP handshaking.
Apparatus, And Method For Implementing Remote Client Integrity Verification
Craig R. Watkins - State College PA, US Jeremey Barrett - Sugar Land TX, US Adam Cain - Madison WI, US Brian Lichtenwalter - Santa Cruz CA, US Daniel Myers - Fremont CA, US Steven Schall - Ben Lomond CA, US
Assignee:
Nokia Inc. - Irving TX
International Classification:
G06F 21/00
US Classification:
726 24, 726 27
Abstract:
Apparatus, system, method and computer program product for verifying the integrity of remote network devices that request access to network services and resources. Unintended computer programs such as viruses, worms, or Trojan horses, may compromise remote devices. The invention involves downloading verification software over the web into the web browser of a client for the purpose of performing checks to verify the integrity and security of the client's device or system. The results of such checks are returned over the web to be used in security decisions involving authentication and the grant of authorization to access services and resources.
System And Method For Enabling Authorization Of A Network Device Using Attribute Certificates
Methods and devices are directed to authorizing a network device to a resource over a network. An access server determines based, in part, on an attribute of the network device associated with the attribute certificate, whether the network device may be authorized access to the resource over the network. The attribute may be associated with a capability granted to the network device, a condition to be satisfied for the attribute to be valid, and the like. The attribute may belong to a group of network devices, or one or more users accessing the network through the network device. In one embodiment, the attribute certificate may be provided based on an automated security scan of the network device. In another embodiment, the access server may make the attribute available to a network resource associated with the access server.
System And Method For Managing A Proxy Request Over A Secure Network Using Inherited Security Attributes
Jeremey Barrett - Sugar Land TX, US Craig Watkins - State College PA, US Adam Cain - Madison WI, US
Assignee:
Nokia, Inc. - Irving TX
International Classification:
G06F015/173
US Classification:
709223000
Abstract:
Methods, devices, and systems are directed to managing a proxy request over a secure network using inherited security attributes. Proxy traffic, such as HTTP proxy traffic, is tunneled through a secure tunnel such that the proxy request inherits security attributes of the secure tunnel. The secure attributes may be employed to enable proxy access to a server, thereby extending a security property of the secure tunnel to the proxy connection tunneled through it. A secure tunnel service receives a proxy request from a client and modifies the proxy request to include the security attribute. In one embodiment, the security attribute is an identifier that enables a proxy service may employ to determine another security attribute. The proxy service is enabled to employ the security attribute, and the security attribute to determine if the client is authorized access to the server.
Method And System For Enabling Trust-Based Authorization Over A Network
Adam Cain - Madison WI, US Craig Watkins - State College PA, US Jeremey Barrett - Sugar Land TX, US
International Classification:
H04K 1/00
US Classification:
713182000
Abstract:
Method and devices are directed to managing access to a resource over a network. Upon receiving a request for access to the resource over the network, a resource controller determines a parameter associated with the request based on a query of the user and a scan of a client device associated with the request. The controller then applies an access control rule based, in part, on the parameter to determine a level of trust. Depending on the type of request, the resource controller may negotiate access to the resource with a resource server on behalf of the user and act as proxy in establishing the connection, if the request is permitted. A level of access to the resource may be determined based on the level of trust.
Heath Harris, the first assistant district attorney under former Democratic District Attorney Craig Watkins, said the legal community, as colleagues, wanted Hawk to do what she needed to do to take care of her health. He said her absence was likely difficult for the staff overall.
Date: Sep 06, 2016
Category: Health
Source: Google
Susan Hawk owed it Dallas County - and to herself - to step down sooner
Former DA Craig Watkins had garnered widespread acclaim for identifying and reversing wrongful convictions, but his subsequent inexperience and truly awful judgment squandered that capital and cleared the path for Hawk's 2014 election.
Date: Sep 06, 2016
Category: U.S.
Source: Google
Dallas DA Considers Charges Against Foreign Ebola Patient
Were dealing with the issue that he may have knowingly exposed individuals in Dallas County to the ebola virus said Dallas County District Attorney Craig Watkins. Weve prosecuted individuals, for knowingly exposing individuals to HIV which is aggravated assault.
Date: Oct 03, 2014
Category: Health
Source: Google
Dallas County commissioner calls for public discussion of DA's crash settlement
DALLAS -- Craig Watkins is not only the District Attorney. Hes also the attorney for the entity called Dallas County.Late last year, when his office settled an accident claim over a crash involving Watkins himself, he did so without notifying his client, the county, and thats not going over well
Police and prosecutors have long aided some exonerations without having special conviction-review units, and many still do. But since Dallas DA Craig Watkins started such a unit in 2007, it has freed 33 people, reviewed more than 400 cases and inspired other prosecutors. Philadelphia and Cleveland p
Date: Jun 07, 2014
Source: Google
Here is the latest Texas news from The Associated Press
DALLAS (AP) The Dallas County district attorney will appear in court today to defend himself against a contempt-of-court allegation. Craig Watkins was held in contempt earlier this year after he refused to answer questions about his office's prosecution of an oil heir for mortgage fraud.
Date: Jul 15, 2013
Category: U.S.
Source: Google
Latest Texas news, sports, business and entertainment
The Dallas Morning News reports that a subpoena was issued Friday for State District Judge Lena Levario to appear at a hearing Monday to determine whether a contempt citation she issued against Craig Watkins should be upheld.
to a small holding cell a few steps from the Texas death chamber when a Dallas judge moved her execution to April. That timing then was reset for June when Dallas County District Attorney Craig Watkins said he wanted to await the outcome of capital punishment-related bills before lawmakers in Austin.