Dec 2012 to 2000 Construction ManagerHARLEY MCGATHA CONSTRUCTION, INC. (HMCI)
Oct 2006 to 2000 Full service Commercial General Contractor licensed in Alabama and GeorgiaSOLO PRACTIONER
Oct 2004 to 2000Senior Project Manager May 2006 to Nov 2006AT&T TELECOMMUNICATIONS, INC Atlanta, GA Aug 2005 to May 2006 Senior Project ManagerAT&T TELECOMMUNICATIONS, INC Birmingham, AL Sep 2004 to Aug 2005 Senior Project ManagerAT&T TELECOMMUNICATIONS, INC Birmingham, AL Oct 2000 to Sep 2004Civil Division of the Circuit Court of Jefferson County
Nov 2003 to Jun 2004 HONORABLE JUDGE J. THOMAS KING, JREVAN W. SMITH Centre, AL Oct 2003 to Jun 2004 AttorneyRUSSO AND JOHNSON, P.C Birmingham, AL Feb 2003 to Apr 2003 Legal InternAT&T TELECOMMUNICATIONS, INC Birmingham, AL Mar 1999 to Sep 2000 Provisioning Network ManagerAT&T TELECOMMUNICATIONS, INC Birmingham, AL Apr 1998 to Mar 1999HONEYWELL AEROSPACE, INC Anniston, AL Jun 1996 to Apr 1998
May 2010 to 2000 Small Engine Field MechanicPort Allen City Police Department Port Allen, LA Dec 2006 to Apr 2010 Police OfficerPennington Research Center Baton Rouge, LA Jul 2005 to Sep 2006 Police Officer 3 (Supervisory)Intercontinental Terminals Company Port Allen, LA Feb 2004 to Jul 2005 Security Officer
Education:
Kaplan University Jan 2006 to Jan 2010 AS (Credit Hour Equivalency) in Criminal JusticeUS Army Academy of Health Sciences Ft Sam Houston Houston, TX 1991 Medical Administration TrainingUS Army Ordnance School Fort Dix, NJ 1990 Auto Mechanics TrainingTara High School BTR 1985 to 1989
Isbn (Books And Publications)
Madison Avenue and the Color Line: African Americans in the Advertising Industry
Systems and methods for secure access and utilization of sensitive data such as credit card numbers, Social Security Numbers, personal identifying information, etc. A tokenizing strategy component provides for creating, managing, and storing tokenization strategies on behalf of a plurality of users. A data tokenizing component is operative to (a) receive an input data string of sensitive data from a user, (b) apply a selected tokenization strategy to the input data string to generate a tokenized data string, and (c) provide the tokenized data string for storage in association with the input data string. A secure server including a secure database stores the tokenized data string and the input data string in a corresponding mapped relationship. A security component controls access to and retrieval of the tokenized data string and to the input data string in accordance with predetermined security requirements of the users.
Key Rotation And Selective Re-Encryption For Data Security
Jason Chambers - Dunwoody GA, US Theresa Robison - Sandy Springs GA, US Dameion Dorsner - Atlanta GA, US Sridhar Manickam - Alpharetta GA, US Daniel Konisky - Atlanta GA, US
International Classification:
H04L 9/00
US Classification:
380 44
Abstract:
Systems and methods for maintaining data security through encryption key retirement and selective re-encryption are presented. A method of selectively re-encrypting a subset of encrypted values includes storing each encrypted value together with the key profile number for the encryption key that was used to generate that encrypted value. When a key is compromised, its associated key profile number allows the efficient identification of all the encrypted values that were created using the now-compromised key. Once identified, the encrypted values may be decrypted using the compromised key and re-encrypted using a new key, without changing other related data such as the token associated with the encrypted value.
Systems And Methods For Maintaining Data Security Across Multiple Active Domains
Jason Chambers - Dunwoody GA, US Theresa Robison - Sandy Springs GA, US Dameion Dorsner - Atlanta GA, US Sridhar Manickam - Alpharetta GA, US Daniel Konisky - Atlanta GA, US
International Classification:
H04L 9/28
US Classification:
713168
Abstract:
Systems and methods for maintaining data security across multiple active domains are presented. Each domain includes a token generator that can generate tokens associated with sensitive data such as credit card numbers. The primary domain includes a centralized key manager. In one embodiment, each domain includes its own local data vault and a replica of each data vault associated with every remote domain. Any domain can access the data vaults (local and replica) and retrieve a token created by any other domain. The possibility of token collision is eliminated by a token generation algorithm that embeds a domain designator corresponding to the active domain where the token was created. When multiple tokens represent the same sensitive data, the token manager returns a set of all such tokens found in the data vaults.
Certificate-Based Mutual Authentication For Data Security
Jason Chambers - Dunwoody GA, US Theresa Robison - Sandy Springs GA, US Dameion Dorsner - Atlanta GA, US Sridhar Manickam - Alpharetta GA, US Daniel Konisky - Atlanta GA, US
International Classification:
H04L 9/28
US Classification:
713169
Abstract:
Systems and methods for maintaining data security using client roles, API keys, and certificate-based mutual authentication are presented. A method of protecting sensitive data includes both client authorization techniques and the mutual exchange and verification of certificates between client and server. In one embodiment, access by a client to a server is further limited by temporal constraints, volume constraints, and an end user identity filter.
Luhn Validation And Data Security Across Multiple Active Domains
Jason Chambers - Dunwoody GA, US Theresa Robison - Sandy Springs GA, US Dameion Dorsner - Atlanta GA, US Sridhar Manickam - Alpharetta GA, US Daniel Konisky - Atlanta GA, US
International Classification:
G06F 21/00
US Classification:
726 6
Abstract:
Systems and methods for maintaining data security using Luhn validation in a multiple domain computing environment are presented. Each domain includes a token generator that can generate tokens associated with sensitive data such as credit card numbers. The token generation algorithm includes a Luhn validation routine for producing a tokenized data string that either passes or fails Luhn. The possibility of token collision is eliminated by a token generation algorithm that embeds a domain designator corresponding to the active domain where the token was created. When multiple tokens represent the same sensitive data, the token manager returns a set of all such tokens found.
OklahomaPresident at American Indian Gaming, Inc. University educated real native american with tribal government work experience and many casino contacts and owner of a casino gaming company. Lets work... University educated real native american with tribal government work experience and many casino contacts and owner of a casino gaming company. Lets work together to develop casinos and distribute gaming machines!