Debra Lee Cook - Tinton Falls NJ, US Gerald Joseph Kersus - Wall NJ, US
Assignee:
AT&T Intellectual Property, II, L.P. - Bedminster NJ
International Classification:
H04L 12/66 H04M 3/42
US Classification:
370352, 370353, 370354, 379 9315
Abstract:
At least one exemplary embodiment of the present invention includes a method comprising receiving a call setup request, and automatically providing an indication that the call setup request is being processed. At least one exemplary embodiment of the present invention includes a method comprising providing a call setup request to a network, and receiving an indication that the call setup request is being processed. It is emphasized that this abstract is provided to comply with the rules requiring an abstract that will allow a searcher or other reader to quickly ascertain the subject matter of the technical disclosure. This abstract is submitted with the understanding that it will not be used to interpret or limit the scope.
Debra Lee Cook - Tinton Falls NJ, US Gerald Joseph Kersus - Wall NJ, US
Assignee:
AT&T Intellectual Property II, LP - Atlanta GA
International Classification:
H04M 7/00
US Classification:
37922114, 370352, 370 9315
Abstract:
At least one exemplary embodiment of the present invention includes a method comprising receiving a call setup request, and automatically providing an indication that the call setup request is being processed. At least one exemplary embodiment of the present invention includes a method comprising providing a call setup request to a network, and receiving an indication that the call setup request is being processed. It is emphasized that this abstract is provided to comply with the rules requiring an abstract that will allow a searcher or other reader to quickly ascertain the subject matter of the technical disclosure. This abstract is submitted with the understanding that it will not be used to interpret or limit the scope.
Methods For Selectively Capturing And Replicating One-Time Password Generator Functionality From Device To Device
Debra L. Cook - Tinton Falls NJ, US Vijay K. Gurbani - Lisle IL, US Thomas B. Reddington - Mountain Lakes NJ, US
International Classification:
H04L 9/32 G06F 17/00
US Classification:
726 6, 726 9
Abstract:
Structures and methods are disclosed for selectively capturing (“peeling”) and replicating (“cloning”) OTP tokens from one device to another while maintaining OTP state. Embodiments described herein provide for sending, from a first device to a second device, state information including for example, a key, a current OTP sequence value and a time to expiry value corresponding to selected tokens to be cloned. The second device thereafter uses the state information to generate OTP sequences corresponding to the selected tokens in time-synchronization with corresponding authentication entities. Additionally, embodiments described herein provide for restoring the OTP sequence corresponding to the selected tokens on the first device following a loss of synchronization of the selected tokens on the first device.
Method And Apparatus For Detecting Phishing Attempts Solicited By Electronic Mail
Debra L. Cook - Tinton Falls NJ, US Michael Alexander Daniluk - Woodside NY, US Vijay K. Gurbani - Lisle IL, US
International Classification:
H04L 9/32
US Classification:
726 3
Abstract:
A phishing filter employs a plurality of heuristics or rules (in one embodiment, 12 rules) to detect and filter phishing attempts solicited by electronic mail. Generally, the rules fall within the following categories: (1) identification and analysis of the login URL (i.e., the “actual” URL) in the email, (2) analysis of the email headers, (3) analysis across URLs and images in the email other than the login URL, and (4) determining if the URL is accessible. The phishing filter does not need to be trained, does not rely on black or white lists and does not perform keyword analysis. The filter may be implemented as an alternative or supplemental to prior art spam detection filters.
Network Node With One-Time-Password Generator Functionality
Structures and methods are disclosed for facilitating secure connectivity of a remote client to an enterprise network using OTP-enabled nodes of a remote access platform. Embodiments described herein include an OTP device associated with a client device (for example and without limitation, an OTP device residing within a PC card associated with a laptop or desktop computer) defining a first node of a remote access platform; and an OTP server defining a second node of a remote access platform that generates and maintains the same OTP as the OTP device at the first node, for purposes of authenticating the client device and/or user of the client device.
Method And Apparatus For Generating One-Time Passwords
Debra L. Cook - Tinton Falls NJ, US Vijay K. Gurbani - Lisle IL, US Maarten Wegdam - Borne, NL
International Classification:
G06F 7/04
US Classification:
726 6
Abstract:
A method and apparatus are provided to allow a user of a communications device to utilize one-time password generators for two-way authentication of users and servers, i.e., proving to users that servers are genuine and proving to servers that users are genuine. The present invention removes the need for a user to have a separate physical device, e.g., token, per company or service, reduces the cost burden on the companies and allows for two-way authentication via multiple access methods, e.g., telephone, web interfaces, automatic teller machines (ATMs), etc. Also, the present invention may be utilized in consumer and enterprise applications.
Method And Apparatus For Secure Data Representation Allowing Efficient Collection, Search And Retrieval
A system and method for secure representation of data is presented. The method comprises setting a number of components, dividing original data into the set number of components using a function, storing the set number of components of divided data, determining a number of retrieved components, and using the function to retrieve the data from the retrieved components and to determine retrieved data. In one aspect, the function is XOR. In one aspect, when the number of retrieved components is less than the set number of components, the retrieved data is redacted data, and when the number of retrieved components is equal to the set number of components, the retrieved data is the original data.
Peter Blackburn - New York NY Beth P. Goldstein - Tarrytown NY Debra J. Cook - New York NY
Assignee:
AMBI Inc. - Tarrytown NY
International Classification:
A61K 3800 A61K 3122
US Classification:
514 2
Abstract:
Disclosed are compositions of nisin and GML as active ingredients for the killing of Helicobacter, as well as methods for eradicating Helicobacter colonization and treatment of Helicobacter infection which employ the GML/nisin compositions.
Burnett Elementary School Douglasville GA 1970-1974, Stewart Middle School Douglasville GA 1973-1976, Turner Middle School Lithia Springs GA 1973-1976, Chapel Hill Middle School Douglasville GA 1973-1976
To me, being an Orthodontist is the most rewarding career! It is great to create a connection with my patients - it makes it so much fun! I am very personable and compassionate professional, and I l...
Tagline:
Orthodontist and owner of Cook Orthodontics in Rancho Santa Margarita, CA.
Bragging Rights:
Recipient of the California Dental Association Scholarship Award and as one of only a handful to be selected to Omicron Kappa Upsilon (Phi Beta Kappa). Certified in the use and placement of Temporary Anchorage Devices (TADS): 2009. Certified in Diode Soft Tissue Laser: 2004. Invisalign Premier Provider Certification: 2003. Member of American Association of Orthodontists (AAO), Pacific Coast Society of Orthodontists (PCSO), California Association of Orthodontists (CAO), Orange County Dental Society (OCDS), California Dental Association (CDA), American Dental Association (ADA), Academy of Laser Dentistry (ALD) and the Academy for Orthodontic Excellence (AOE) study club in Orange County.
Debra Cook
Debra Cook
Debra Cook
Debra Cook
Debra Cook
Debra Cook
Debra Cook
Youtube
SO4EO18 | Everybody Loves Raymond | Debra Mak...
Clip Description : Debra throws the Barone family into turmoil when sh...
Duration:
3m 29s
First Sight, from "Jilted to Perfection," by ...
This is a selection from "Jilted to Perfection," by Debra Cook (book, ...
Duration:
4m 42s
"Jilted to Perfection" with Debra Cook
Debra Cook discusses her musical, "Jilted to Perfection," with host Sh...
Duration:
7m 19s
Debra Cook, Elastic Block Ciphers (February 9...
Debra Cook Elastic Block Ciphers February 9, 2006 at the Naval Postgra...
Duration:
56m 6s
Jilted Kiss, from "Jilted to Perfection" by ...
One of the songs in the musical by Debra Cook (book, lyrics, and music...
Duration:
2m 54s
Debra Cook with "Jilted To Perfection" (Origi...
Upcoming performance with Metropolitan Opera Company February 20th, 20...
Xavers victims included customer Cynthia Watson, 65, who had been married less than a month; bank teller coordinator Marisol Lopez, 55, who was a mother of two; banker trainee Ana Pinon-Williams, a 38-year-old mother of seven; bank teller Debra Cook, a 54-year-old mother of two and a grandmother; a
Date: Jun 26, 2024
Category: U.S.
Source: Google
FBI used hidden camera to watch Alabama kidnapper in bunker: reports
"If I could, I would do cartwheels all the way down the road," Debra Cook, identified as the boy's great aunt, said on ABC's "Good Morning America." "I was just ecstatic. Everything just seemed like it was so much clearer. You know, we had all been walking around in a fog, and everybody was excited.
Date: Feb 05, 2013
Category: U.S.
Source: Google
Grandmother: Ala. boy physically OK after standoff
Debra Cook, Ransbottom's sister, said the family was grateful for the community's prayers and support. Fliers around town asked people to pray for the boy, and others gathered at nightly vigils to pray for his safe return.