James C Tosh

age ~83

from Beaver, PA

Also known as:
  • James Atty Tosh
  • James B Tosh
Phone and address:
348 Lincoln Ave, Beaver, PA 15009
7247755389

James Tosh Phones & Addresses

  • 348 Lincoln Ave, Beaver, PA 15009 • 7247755389
  • 804 Turnpike St, Beaver, PA 15009
  • 1244 Bellevue Ave APT 2, Burlingame, CA 94010 • 7245134919
  • 2 Wimbledon Ct, Hilton Head Island, SC 29928
  • Aliquippa, PA
  • Hayti, MO
  • 348 Lincoln Ave, Beaver, PA 15009

Work

  • Company:
    Reed, Tosh, Wolford & Douglass
  • Address:
    999 3Rd St Reed Tosh Wolford &Amp; Douglass, Beaver, PA 15009

Ranks

  • Licence:
    Pennsylvania - Active
  • Date:
    1968

Specialities

Probate • Estate Planning and Administration • Fiduciary Law • Real Estate Law • Commercial Law • Corporate Law

Us Patents

  • Network Proxy With Asymmetric Connection Connectivity

    view source
  • US Patent:
    7965637, Jun 21, 2011
  • Filed:
    Feb 23, 2010
  • Appl. No.:
    12/711069
  • Inventors:
    Atul N. Trivedi - San Jose CA, US
    James K. Tosh - Fremont CA, US
  • Assignee:
    Juniper Networks, Inc. - Sunnyvale CA
  • International Classification:
    H04L 12/26
    G06F 15/16
  • US Classification:
    370235, 370252, 709228
  • Abstract:
    Techniques are described in which a network device waits differing amounts of time for different network sockets before beginning processes to determine whether respective network connections from the network sockets have failed. An intermediate device may create a network socket for a network connection having a keep-alive wait time option set to a keep-alive wait time associated with a class of the network connection. If an amount of time specified by the keep-alive option of the socket passes after a last successful communication on the network connection, the socket may begin a process to determine whether the network connection has failed. If the intermediate device determines that the network connection has failed, the intermediate device may terminate the connection to free resources on the intermediate device allocated to the network connection.
  • Disposable Browsers And Authentication Techniques For A Secure Online User Environment

    view source
  • US Patent:
    20110247045, Oct 6, 2011
  • Filed:
    Mar 30, 2011
  • Appl. No.:
    13/076421
  • Inventors:
    Ramesh Rajagopal - Los Altos CA, US
    James K. Tosh - Fremont CA, US
    Fredric L. Cox - San Jose CA, US
    Perry F. Nguyen - Santa Clara CA, US
    Jason T. Champion - Mountain View CA, US
  • Assignee:
    AUTHENTIC8, INC. - LOS ALTOS CA
  • International Classification:
    H04L 9/32
    G06F 21/00
  • US Classification:
    726 1, 726 7
  • Abstract:
    Disclosed herein are systems and methods that allow for secure access to websites and web-based applications and other resources available through the browser. Also described are systems and methods for secure use and retention of user credentials, as well as methods for dynamic authentication of users and integrity checking of service providers in online environments. Thus, described in the present specification are systems and methods for constructing and destroying private, secure, browsing environments (a secure disposable browser), insulating the user from the threats associated with being online for the purposes of providing secure, policy-based interaction with online services.User PCs and other user computers can often be vulnerable to identity theft and other malicious computer attacks due to keyloggers, malware, phishing attacks, untrustworthy internet sites and the like. In particular, such user computers often store credentials on local memory and transmit credentials across the internet. Disclosed in the present application are systems and methods for implementing a secure service environment by which users can access online services without exposing their client machines directly to the internet or storing or transmitting their credentials or other attributes. Also disclosed are methods for authenticating users and validating downstream sites that the users visit and for securely and under stored policies maintaining user credentials and attributes.
  • Network Proxy With Asymmetric Connection Connectivity

    view source
  • US Patent:
    7768939, Aug 3, 2010
  • Filed:
    Jan 2, 2007
  • Appl. No.:
    11/619084
  • Inventors:
    Atul N. Trivedi - San Jose CA, US
    James K. Tosh - Fremont CA, US
  • Assignee:
    Juniper Networks, Inc. - Sunnyvale CA
  • International Classification:
    H04L 12/26
  • US Classification:
    370252, 709224
  • Abstract:
    Techniques are described in which a network device waits differing amounts of time for different network sockets before beginning processes to determine whether respective network connections from the network sockets have failed. An intermediate device may create a network socket for a network connection having a keep-alive wait time option set to a keep-alive wait time associated with a class of the network connection. If an amount of time specified by the keep-alive option of the socket passes after a last successful communication on the network connection, the socket may begin a process to determine whether the network connection has failed. If the intermediate device determines that the network connection has failed, the intermediate device may terminate the connection to free resources on the intermediate device allocated to the network connection.
  • Secure Web Container For A Secure Online User Environment

    view source
  • US Patent:
    20210314367, Oct 7, 2021
  • Filed:
    Jun 21, 2021
  • Appl. No.:
    17/353196
  • Inventors:
    - Redwood City CA, US
    Scott M. Petry - Portola Valley CA, US
    James K. Tosh - Fremont CA, US
    Peter K. Lund - San Francisco CA, US
    Fredric L. Cox - San Jose CA, US
    Adam P. Moore - San Francisco CA, US
  • International Classification:
    H04L 29/06
    G06F 21/36
    G06F 21/44
    G06F 21/53
  • Abstract:
    Disclosed herein are systems and methods that allow for secure access to websites and web-based applications and other resources available through the browser. Also described are systems and methods for invocation of a secure web container which may display data representative of a requesting party's application at a user's machine. The secure web container is invoked upon receipt of an API call from the requesting party. Thus, described in the present specification are systems and methods for constructing and destroying private, secure, browsing environments (a secure disposable web container), insulating the user and requesting parties from the threats associated with being online for the purposes of providing secure, policy-based interaction with a requesting party's online services.
  • Disposable Browsers And Authentication Techniques For A Secure Online User Environment

    view source
  • US Patent:
    20210067498, Mar 4, 2021
  • Filed:
    Oct 26, 2020
  • Appl. No.:
    17/080833
  • Inventors:
    - Redwood City CA, US
    James K. Tosh - Fremont CA, US
    Fredric L. Cox - San Jose CA, US
    Perry F. Nguyen - Santa Clara CA, US
    Jason T. Champion - Mountain View CA, US
  • International Classification:
    H04L 29/06
    G06F 21/31
    G06F 21/35
    G06F 21/36
    G06F 21/43
    G06F 21/53
  • Abstract:
    Disclosed herein are systems and methods that allow for secure access to websites and web-based applications and other resources available through the browser. Also described are systems and methods for secure use and retention of user credentials, as well as methods for dynamic authentication of users and integrity checking of service providers in online environments. Thus, described in the present specification are systems and methods for constructing and destroying private, secure, browsing environments (a secure disposable browser), insulating the user from the threats associated with being online for the purposes of providing secure, policy-based interaction with online services.
  • Secure Web Container For A Secure Online User Environment

    view source
  • US Patent:
    20200204594, Jun 25, 2020
  • Filed:
    Mar 2, 2020
  • Appl. No.:
    16/807157
  • Inventors:
    - Redwood City CA, US
    Scott M. Petry - Portola Valley CA, US
    James K. Tosh - Fremont CA, US
    Peter K. Lund - San Francisco CA, US
    Fredric L. Cox - San Jose CA, US
    Adam P. Moore - San Francisco CA, US
  • International Classification:
    H04L 29/06
    G06F 21/53
    G06F 21/44
    G06F 21/36
  • Abstract:
    Disclosed herein are systems and methods that allow for secure access to websites and web-based applications and other resources available through the browser. Also described are systems and methods for invocation of a secure web container which may display data representative of a requesting party's application at a user's machine. The secure web container is invoked upon receipt of an API call from the requesting party. Thus, described in the present specification are systems and methods for constructing and destroying private, secure, browsing environments (a secure disposable web container), insulating the user and requesting parties from the threats associated with being online for the purposes of providing secure, policy-based interaction with a requesting party's online services.
  • Disposable Browsers And Authentication Techniques For A Secure Online User Environment

    view source
  • US Patent:
    20190319936, Oct 17, 2019
  • Filed:
    Jun 24, 2019
  • Appl. No.:
    16/450866
  • Inventors:
    - Redwood City CA, US
    James K. Tosh - Fremont CA, US
    Fredric L. Cox - San Jose CA, US
    Perry F. Nguyen - Santa Clara CA, US
    Jason T. Champion - Mountain View CA, US
  • International Classification:
    H04L 29/06
    G06F 21/31
    G06F 21/53
    G06F 21/43
    G06F 21/36
    G06F 21/35
  • Abstract:
    Disclosed herein are systems and methods that allow for secure access to websites and web-based applications and other resources available through the browser. Also described are systems and methods for secure use and retention of user credentials, as well as methods for dynamic authentication of users and integrity checking of service providers in online environments. Thus, described in the present specification are systems and methods for constructing and destroying private, secure, browsing environments (a secure disposable browser), insulating the user from the threats associated with being online for the purposes of providing secure, policy-based interaction with online services.
  • Secure Web Container For A Secure Online User Environment

    view source
  • US Patent:
    20180332080, Nov 15, 2018
  • Filed:
    Jul 16, 2018
  • Appl. No.:
    16/036813
  • Inventors:
    - Mountain View CA, US
    Scott M. Petry - Portola Valley CA, US
    James K. Tosh - Fremont CA, US
    Peter K. Lund - San Francisco CA, US
    Fredric L. Cox - San Jose CA, US
    Adam P. Moore - San Francisco CA, US
  • International Classification:
    H04L 29/06
    G06F 21/36
    G06F 21/53
    G06F 21/44
  • Abstract:
    Disclosed herein are systems and methods that allow for secure access to websites and web-based applications and other resources available through the browser. Also described are systems and methods for invocation of a secure web container which may display data representative of a requesting party's application at a user's machine. The secure web container is invoked upon receipt of an API call from the requesting party. Thus, described in the present specification are systems and methods for constructing and destroying private, secure, browsing environments (a secure disposable web container), insulating the user and requesting parties from the threats associated with being online for the purposes of providing secure, policy-based interaction with a requesting party's online services.
Name / Title
Company / Classification
Phones & Addresses
James C. Tosh
Sq
McGuire Memorial Home Foundation
Fund Raising Service
709 3 Ave, New Brighton, PA 15066
7248430365

Resumes

James Tosh Photo 1

Attorney At Reed, Luce, Tosh, Wolford & Douglass

view source
Location:
Greater Pittsburgh Area
Industry:
Law Practice
James Tosh Photo 2

James Tosh

view source
James Tosh Photo 3

James Tosh

view source
James Tosh Photo 4

Senior Technology Leader

view source
Location:
San Francisco Bay Area
Industry:
Computer Software

Lawyers & Attorneys

James Tosh Photo 5

James C. Tosh, Beaver PA - Lawyer

view source
Address:
Reed, Tosh, Wolford & Douglass
999 3Rd St Reed Tosh Wolford &Amp; Douglass, Beaver, PA 15009
7247749220 (Office)
Licenses:
Pennsylvania - Active 1968
James Tosh Photo 6

James C. Tosh, Beaver PA - Lawyer

view source
Office:
Reed, Tosh, Wolford & Douglass, PC Attorneys at Law
999 Third Street, Beaver, PA 15009
Phone:
7249874566 (Phone)
Specialties:
Probate
Estate Planning and Administration
Fiduciary Law
Real Estate Law
Commercial Law
Corporate Law
Memberships:
Beaver County, Pennsylvania and American Bar Associations.
ISLN:
903102429
Admitted:
1967, Pennsylvania
University:
Bowling Green State University, B.S., 1964
Law School:
University of Pittsburgh, J.D., Beta Gamma Sigma, 1967
Links:
Site
Biography:
<br /><br />James C. Tosh has practiced law in Beaver County for over 40 years, concentrating his practice in the areas of Probate, Estate Planning and Administration, Fiduciary Law, Real Estate Law, ...
James Tosh Photo 7

James Tosh - Lawyer

License Records

James C Tosh

License #:
AB027024A - Expired
Category:
Real Estate Commission
Type:
Associate Broker (AB)-Standard

Googleplus

James Tosh Photo 8

James Tosh

James Tosh Photo 9

James Tosh

James Tosh Photo 10

James Tosh

Relationship:
In_a_relationship
James Tosh Photo 11

James Tosh

Youtube

How Do 90% of Americans Have Jobs? - Daniel T...

Daniel Tosh wonders why Americans still think they live in the greates...

  • Duration:
    9m 49s

daniel tosh

  • Duration:
    50m 51s

Daniel Tosh FULL Stand Up - Completely Seriou...

Comedy's chosen one, Daniel Tosh, has been healing the sick, stopping ...

  • Duration:
    49m 30s

Peter Tosh - Captured Live AT THE GREEK THEAT...

Peter Tosh captured live VO emulovore com] Filmed AT THE GREEK THEATER...

  • Duration:
    59m 36s

PETER TOSH Greatest Hits (Full Album)

PETER TOSH Greatest Hits (Full Album) PETER TOSH Greatest Hits (Full A...

  • Duration:
    1h 13m 30s

The Dumbest World Record Attempts - Tosh.0

Daniel highlights a selection of world record hopefuls, each one stran...

  • Duration:
    7m 57s

Flickr

Classmates

James Tosh Photo 20

James Tosh

view source
Schools:
Henry High School Henry TN 1963-1967
Community:
Jessie Albano
James Tosh Photo 21

James Tosh

view source
Schools:
Central High School Aberdeen SD 1968-1972
Community:
Julie Fillbach, Timothy Papstein, Bonnie Reisenweber, Walter Bauer, Dwane Herzog, David Brewer, Cheryl Phillips, June Hobus, Doug Stern
James Tosh Photo 22

Henry High School, Henry,...

view source
Graduates:
James Tosh (1963-1967),
Norma Cannon (1955-1959),
Millicent Miller (1990-1994),
Kimberly Searcy (1974-1978)

Facebook

James Tosh Photo 23

James Tosh

view source
James Tosh Photo 24

James Tosh

view source
James Tosh Photo 25

James Tosh

view source
James Tosh Photo 26

James Tosh

view source
James Tosh Photo 27

Tosh James

view source
James Tosh Photo 28

James Tosh

view source
James Tosh Photo 29

James Tosh

view source
James Tosh Photo 30

James Tosh

view source

Get Report for James C Tosh from Beaver, PA, age ~83
Control profile