Frank P Leighton

age ~44

from Oakland, CA

Also known as:
  • Frances P Leighton
  • David Leighton
  • Leighton Fank

Frank Leighton Phones & Addresses

  • Oakland, CA
  • San Francisco, CA
  • Brooklyn, NY
  • Somerville, MA
  • Allston, MA
  • Windham, ME
  • Brookline, MA
  • Seattle, WA

Work

  • Company:
    Newbury comics - Brighton, MA
    Sep 2002
  • Position:
    Delivery driver / shipping & receiving / general warehouse duties

Education

  • School / High School:
    Portland Arts & Technology High School- Portland, ME
    1997
  • Specialities:
    Graphic Design & Printing

Skills

Experienced Ebay Seller with %100 Feedback

Wikipedia

Frank Leight

view source

Frank Leighton (1908-1962) was an Australian actor best known for two leading roles in films for Ken G. Hall, Thoroughbred (1936) and Tall Timbers (1937). ...

Name / Title
Company / Classification
Phones & Addresses
Frank Leighton
Director Information Technology
Aci Worldwide, Inc.
Prepackaged Software
120 Broadway Ste 3350, New York, NY 10271
Frank Leighton
Owner
Your Place & Ours Pizza
Eating Place
8 Elm Park, Groveland, MA 01834
9783747409
Frank Leighton
Director Information Technology
ACI Worldwide
Computer Software · Software Sales And Service · Professional, Scientific and Techincal Servies · Computer Systems Design and Related Services · Prepackaged Software Services · Prepackaged Software Services Computers/Peripherals · Nonclassifiable Establishments · Prepackaged Software Services Whol Computers/Peripherals
3520 Kraft Rd SUITE 300, Naples, FL 34105
6060 Coventry Dr, Elkhorn, NE 68022
209 W Washington St, Charleston, WV 25302
330 S 108 Ave, Omaha, NE 68154
4023907600, 6463486700, 2393907600, 8007551596

Us Patents

  • Watermarking Process Resilient To Collusion Attacks

    view source
  • US Patent:
    56640188, Sep 2, 1997
  • Filed:
    Mar 12, 1996
  • Appl. No.:
    8/615534
  • Inventors:
    Frank Thomson Leighton - Newtonville MA
  • International Classification:
    G09C 500
    H04L 900
  • US Classification:
    380 54
  • Abstract:
    A watermarking procedure wherein each of a set of copies of the work has a slightly-modified form of a "baseline" watermark that is placed within a critical region of the data. The slight variations in the watermarks, however, are not perceptually visible and do not interfere with the work. If multiple persons collude to attempt to create an "illicit" copy of the work (i. e. , a copy without a watermark), however, at least one of the modified watermarks is present in the copy, thereby identifying both the illicit copy and the copier.
  • Switching Networks With Expansive And/Or Dispersive Logical Clusters For Message Routing

    view source
  • US Patent:
    55215912, May 28, 1996
  • Filed:
    Mar 25, 1994
  • Appl. No.:
    8/218318
  • Inventors:
    Sanjeev Arora - Berkeley CA
    Thomas F. Knight - Belmont MA
    Frank T. Leighton - Newton Center MA
    Bruce M. Maggs - Princeton NJ
    Eliezer Upfal - Palo Alto CA
  • Assignee:
    Massachusetts Institute of Technology - Cambridge MA
  • International Classification:
    H01H 6700
  • US Classification:
    340826
  • Abstract:
    A class of switching networks is comprised of expansive logical clusters and/or dispersive logical clusters. These clusters are of low degree. The class of networks include multibutterfly networks as well as multi-Benes networks. These networks provide for fault tolerance and routing and for efficient routing. Moreover, routing is provided in a non-blocking fashion.
  • Method For Authenticating Objects Identified By Images Or Other Identifying Information

    view source
  • US Patent:
    53513029, Sep 27, 1994
  • Filed:
    May 26, 1993
  • Appl. No.:
    8/067493
  • Inventors:
    Frank T. Leighton - Newtonville MA
    Silvio Micali - Brookline MA
  • International Classification:
    H04L 930
    H04L 932
  • US Classification:
    380 30
  • Abstract:
    The method and system of the present invention utilizes public-key cryptography to create "secure" titles for personal and real property such as vehicles and the like. The title preferably comprises a card in which is stored a digital signature of one or more identifiers such as a vehicle identification number, the vehicle license plate and the owner's name. To effect a transfer of the property, the digital signature on the title must first be shown to have been generated from the one or more identifiers.
  • Method And System For Personal Identification

    view source
  • US Patent:
    48797472, Nov 7, 1989
  • Filed:
    Mar 21, 1988
  • Appl. No.:
    7/170734
  • Inventors:
    Frank T. Leighton - Newton Center MA
    Silvio Micali - Cambridge MA
  • International Classification:
    H04K 100
  • US Classification:
    380 23
  • Abstract:
    The method and system of the invention utilizes a private key of a public-key cryptosystem key pair to encrypt a non-secret password into a digital signature. The password and the digital signature are then encoded and stored on a magnetic stripe or other memory device of the card. To effect a transaction, the digital signature on a received card must be shown to have been generated from the password on the received card. The password preferably includes a digitized photograph of the authorized cardholder which is capable of being displayed at the transaction terminal. This enables the operator of the terminal to verify the identity of the cardholder by visual inspection.
  • Failsafe Key Escrow System

    view source
  • US Patent:
    56470002, Jul 8, 1997
  • Filed:
    Sep 3, 1996
  • Appl. No.:
    8/706975
  • Inventors:
    Frank Thomsen Leighton - Newtonville MA
  • International Classification:
    H04L 930
  • US Classification:
    380 30
  • Abstract:
    A method of generating cryptographic keys to implement a Failsafe Key Escrow system. A prime modulus Q and a generator G for Z. sub. Q are publicly known. The public key P. sub. X that is escrowed for user X is G. sup. SX mod Q, where Sx is the secret key for user X. The user picks a random secret value A from [0, Q-2] and announces the value of G. sup. A mod Q to a set of trustees or a central authority. Next the user "shares" A with the trustees using a verifiable secret sharing scheme. The trustees and/or the central authority selects a random value B from the interval [0, Q-2] and they set the user's public key to be P. sub. X =(G. sup. A)G. sup. B mod Q. The value of B is returned to the user and is escrowed with the public key for X. The value of B is not released to the public. The user's then sets his secret key to be S. sub.
  • Method For Enabling Users Of A Cryptosystem To Generate And Use A Private Pair Key For Enciphering Communications Between The Users

    view source
  • US Patent:
    55197787, May 21, 1996
  • Filed:
    Sep 26, 1994
  • Appl. No.:
    8/312567
  • Inventors:
    Frank T. Leighton - Newtonville MA
    Silvio Micali - Brookline MA
  • International Classification:
    H04L 908
    H04L 930
  • US Classification:
    380 30
  • Abstract:
    The present invention describes a method for enabling users of a cryptosystem to agree on secret keys. In one embodiment, a trusted agent chooses at least one individual key for each user, with at least a portion of such individual key being secret. At least some of the individual keys are then stored in physically secure devices, and the pair of users i and j use their individual keys to compute a common secret key. In another embodiment, each trustee of a group of trustees choose at least one individual key for each user, with at least some portion of such individual key being secret. The keys chosen by a sufficiently small number of such trustees, however, are insufficient for computing the common secret key of the users. Other hardware and software key exchange protocols based on these two techniques are also disclosed.
  • Method And System For Personal Identification Using Proofs Of Legitimacy

    view source
  • US Patent:
    49950819, Feb 19, 1991
  • Filed:
    Nov 6, 1989
  • Appl. No.:
    7/432130
  • Inventors:
    Frank T. Leighton - Newton Center MA
    Silvio Micali - Cambridge MA
  • International Classification:
    H04K 100
  • US Classification:
    380 23
  • Abstract:
    The method and system for the invention utilizes any of a number of "proofs of legitimacy" to generate and verify a personal identification card. A card is generated by computing a digital signature of a non-secret password. The password and the digital signature are then encoded and stored on a magnetic stripe or other memory device of the card. To effect a transaction, the digital signature on a received card must be shown to have been generated from the password on the received card. The password preferably includes a digitized photograph of the authorized cardholder which is capable of being displayed at the transaction terminal. This enables the operator of the terminal to verify the identity of the cardholder by visual inspection.
  • Large Provably Fast And Secure Digital Signature Schemes Based On Secure Hash Functions

    view source
  • US Patent:
    54328527, Jul 11, 1995
  • Filed:
    Sep 29, 1993
  • Appl. No.:
    8/128514
  • Inventors:
    Frank T. Leighton - Newtonville MA
    Silvio Micali - Brookline MA
  • International Classification:
    H04L 900
    H04L 930
  • US Classification:
    380 30
  • Abstract:
    The present invention describes new digital signature schemes that are provably secure against any adaptive chosen-message attack. The scheme, which is based on selection of a hash function from a space of such functions, has a very short public key, fast signing, a reasonable signature length and high security. Several algorithmic techniques are provided for enhancing the efficiency of the signature scheme in terms of time and memory.

Resumes

Frank Leighton Photo 1

Frank Leighton

view source
Frank Leighton Photo 2

Frank Leighton Oakland, CA

view source
Work:
Newbury Comics
Brighton, MA
Sep 2002 to Aug 2012
Delivery Driver / Shipping & Receiving / General Warehouse Duties
Education:
Portland Arts & Technology High School
Portland, ME
1997 to 1999
Graphic Design & Printing
Skills:
Experienced Ebay Seller with %100 Feedback,

Isbn (Books And Publications)

Complexity Issues in VLSI: Optimal Layouts for the Shuffle-Exchange Graph and Other Networks

view source

Author
Frank Thomson Leighton

ISBN #
0262121042

Facebook

Frank Leighton Photo 3

Frank Parker Leighton

view source
Frank Leighton Photo 4

Frank Leighton

view source
Frank Leighton Photo 5

Frank Leighton

view source
Frank Leighton Photo 6

Frank Leighton

view source

Classmates

Frank Leighton Photo 7

Ventura Senior High Schoo...

view source
Graduates:
Frank Leighton (1951-1955),
Marcia McElroy (1952-1956),
Annika Dukes (1987-1991),
Iris Bowman (1959-1963)

Myspace

Frank Leighton Photo 8

Frank Leight (Frank Parke...

view source
Frank Leighton (Frank Parker Leighton)'s profile on Myspace, the leading social entertainment destination powered by the passion of our fans.

Googleplus

Frank Leighton Photo 9

Frank Leighton

Youtube

Tom Leighton

Frank Thomson (Tom) Leighton PhD '81 Professor of Applied Mathematics ...

  • Duration:
    1h 27m 41s

False Teachers: Frank Turek & Leighton Flower...

Dr. Leighton Flowers was named the Director of Evangelism and Apologet...

  • Duration:
    6m 12s

"Calvinism & The Problem With Evil | Frank Tu...

Frank Turek (born November 20, 1961) is an American apologist, author,...

  • Duration:
    5m 57s

Thoroughbred (1936) | Full Movie | Helen Twel...

A plot is planned to kill favored Stormalong before the Melbourne Cup....

  • Duration:
    57m 56s

(WOW)Heretical Teachers; Frank Turek & Leight...

Frank Turek is an American apologist, author, public speaker, and radi...

  • Duration:
    6m 12s

Frank's Files: Iconic Jewels from the Collect...

In this episode of Frank's Files, Mara Leighton, daughter of "jeweler ...

  • Duration:
    4m 14s

Get Report for Frank P Leighton from Oakland, CA, age ~44
Control profile