Kenneth W. Conley - Mountain View CA, US Dirk Balfanz - Menlo Park CA, US Bryan A. Pendleton - Menlo Park CA, US Diana K. Smetters - San Francisco CA, US Glenn E. Durfee - San Francisco CA, US
Assignee:
Palo Alto Research Center Incorporated - Palo Alto CA
International Classification:
H04K 1/00 H04L 9/00
US Classification:
380 33, 380270, 713150, 713168
Abstract:
A method for establishing a secondary communication channel between at least two computing devices over a network medium through use of a primary channel connects a first computing device with a first telephonic unit and a second computing device with a second telephonic unit. If the two telephonic units are in communication with each other over a primary channel, and communication channels are established between the computing devices and their respective telephonic units, then the first computing device transmits its location information to the second computing device over the primary channel. A connection is then established between the second computing device and the first computing device over a secondary communication channel.
System And Method For Establishing Secondary Channels
Kenneth W. Conley - Mountain View CA, US Dirk Balfanz - Menlo Park CA, US Bryan A. Pendleton - Menlo Park CA, US Diana K. Smetters - San Francisco CA, US Glenn E. Durfee - San Francisco CA, US
Assignee:
Palo Alto Research Center Incorporated - Palo Alto CA
International Classification:
H04L 9/32
US Classification:
380 33, 713168, 713169, 709227, 709228
Abstract:
A method for establishing a secondary communication channel between at least two computing devices over a network medium through use of a primary channel connects a first computing device with a first telephonic unit and a second computing device with a second telephonic unit. If the two telephonic units are in communication with each other over a primary channel, and communication channels are established between the computing devices and their respective telephonic units, then the first computing device transmits its location information to the second computing device over the primary channel. A connection is then established between the second computing device and the first computing device over a secondary communication channel.
Systems And Methods For Authenticating Communications In A Network Medium
Dirk Balfanz - Redwood City CA, US Diana Smetters - Belmont CA, US Kenneth Conley - Mountain View CA, US Bryan Pendleton - Menlo Park CA, US Steve Cousins - San Jose CA, US
Assignee:
Palo Alto Research Center Incorporated - Palo Alto CA
A system and method for sharing files securely includes server software on a first device configured to communicate with server software operating on one or more other preauthorized devices, such as a second device. The servers communicate with each other securely using cryptographic information exchanged during a preauthorization phase using a range-limited communication channel. The server on the first device obtains file information from the other preauthorized device(s) and combines the information with local file information from the first device. This combined file information is sent to client software operating on the machine, which presents the combined file information to users.
Systems And Methods For Authenticating Communications In A Network Medium
Diana Smetters - San Francisco CA, US Kenneth Conley - Mountain View CA, US Bryan Pendleton - Menlo Park CA, US Glenn Durfee - San Francisco CA, US Steve Cousins - San Jose CA, US Dirk Balfanz - Menlo Park CA, US Hadar Shemtov - Palo Alto CA, US
Assignee:
PARC INC. - Palo Alto CA
International Classification:
H04L009/00 G06F011/30
US Classification:
380277000, 713163000, 713201000
Abstract:
A location-limited channel is implemented using physical exchanges of physical tokens. The physical tokens are implemented using writeable or re-writeable storage media. Location-limited channels, when used to implement pre-authentication protocols, provide demonstrative identification and authenticity. A group originator loads pre-authentication information and a network location from a communication device onto the location-limited physical token channel. The location-limited physical token channel is passed to another participant, who copies the originator's pre-authentication information and location onto that participant's communication device. That participant then adds that participant's own pre-authentication information and network location onto the location-limited physical token channel. This is repeated until the last participant passes the location-limited physical token channel back to the group originator. The originator thus has pre-authentication information and network locations for all other participants. The originator establishes secure communications with each participant based on the originator' and that participant's shared information.
A computer-implemented method includes determining interesting moments in a video. The method further includes generating video segments based on the interesting moments, wherein each of the video segments includes at least one of the interesting moments from the video. The method further includes generating a collage from the video segments, where the collage includes at least two windows and wherein each window includes one of the video segments.
- Mountain View CA, US Matthias GRUNDMANN - San Jose CA, US Kenneth CONLEY - Mountain View CA, US
Assignee:
Google Inc. - Mountain View CA
International Classification:
G11B 27/034 G11B 27/34 G11B 27/28
Abstract:
A computer-implemented method includes determining interesting moments in a video. The method further includes generating video segments based on the interesting moments, wherein each of the video segments includes at least one of the interesting moments from the video. The method further includes generating a collage from the video segments, where the collage includes at least two windows and wherein each window includes one of the video segments.
The FBI says surveillance footage from a camera nearby shows Kenneth Conley and Joseph Banks getting into a cab at around 2:45 a.m. Tuesday. That's about four hours before workers spotted the rope dangling from the federal jail.
The FBI said surveillance footage from a camera near the Metropolitan Correction Center shows Kenneth Conley and Joseph Banks getting into a cab at about 2:45 a.m. Thursday about two hours after guards were supposed to do a bed check and four hours before workers spotted the rope dangling from the
Date: Dec 19, 2012
Category: U.S.
Source: Google
Two bank robbers escape Chicago jail by scaling 15 stories down a rope ...
m. on Tuesday, staff at the Metropolitan Correctional Center in downtown Chicago realized that cellmates Joseph Jose Banks, 37, and Kenneth Conley, 38, were missing. After searching the premises, authorities noticed that a long knotted rope, reportedly made out of bed sheets, was dangling from the
Date: Dec 19, 2012
Category: U.S.
Source: Google
Wanted Tinley Park man once threatened to shoot teller during bank robbery
Kenneth Conley was awaiting his sentencing at the Metropolitan Correctional Center for robbing the Homewood bank on May 13, 2011. He stole $3,969 from an MB Financial Bank branch inside the Walts Food Center at 2345 W. 183rd St.
Two convicted bank robbers, 37-year-old Jose Banks and 38-year-old Kenneth Conley, were discovered missing. According to the complaint affidavit, Banks and Conley were cellmates and were present during a physical head count at 10 p.m. Monday.
Banks and another man, Kenneth Conley, were last seen during a head count of prisoners at 10 p.m. Monday. FBIofficials said surveillance video showed them getting into a cab on Michigan Avenue nearly five hours later.
Police helicopters and canine units swarmed the area, but not until more than three hours after Joseph "Jose" Banks and Kenneth Conley went unaccounted for during a 5 a.m. headcount, U.S. Marshal's Service spokeswoman Belkis Cantor said.
Date: Dec 19, 2012
Category: U.S.
Source: Google
SWAT teams burst into Tinley Park home in search for prison escapees
The inmates, who shared the same cell, are Jose Banks, the so-called Secondhand Bandit who was convicted last week of four bank heists, and Kenneth Conley, a former strip club floor host who pleaded guilty in October to robbing about $4,000 from a bank in Homewood.
Date: Dec 18, 2012
Category: U.S.
Source: Google
Youtube
Kenneth Conley makes his way into court. Conl...
Kenneth Conley makes his way into court. Conley faces invol. manslaugh...
Duration:
18s
Kenneth Conley's Highlight Tape
Basketball.
Duration:
2m 33s
Kenneth Conley - appearance
Name Look - Kenneth Conley - appearance. In this video we present "Ken...
Duration:
2m 2s
Two Chicago inmates escape from high-rise jail
The inmates, Joseph "Jose" Banks and Kenneth Conley, were both convict...
Duration:
52s
Into the SpiderVerse - Kenny Conley
Kenny Conley and Mission Community Church on July 21, 2019.
Duration:
58m 3s
Two Chicago inmates escape from high-rise jai...
Joseph "Jose" Banks, 37, and Kenneth Conley, 38, shared a cell at the ...
Eugene Cross Elementary School Marion NC 1970-1974
Community:
Goddard Arrowood, Gary Cox, Kathy Early, David Raffield, Addie Smith, Della Waycaster, Marianne Bradburn, Louane Coward, Joseph Davis, Glenn Wilson, Thomas Mcgalliard