Feb 2014 to 2000 Mannequin StylistPatrick Michael Accessories Philadelphia, PA Jul 2013 to Sep 2013 Marketing Assitant InternForever 21 Columbia, MD Dec 2008 to Oct 2009 Sales AssociateCharlotte Russe Hanover, MD Apr 2008 to Aug 2008 Sales Associate
Education:
The Art Institute Of Philadelphia Philadelphia, PA 2009 to 2013 Bachelor of Science in Marketing
Skills:
Excellent communicator and people skils, Writing and research, Microsoft Office, Website development, Time management and multitasking, Adobe Illustrator/Photoshop, Marketing, Graphics and Social Media, Great Listener, Problem solving,
Isbn (Books And Publications)
Natural Language Processing for Prolog Programmers
Michael J. Covington - Hillsboro OR, US Manoj R. Sastry - Portland OR, US Farid Adrangi - Lake Oswego OR, US Deepak J. Manohar - Redmond WA, US Shao-Cheng Wang - Los Angeles CA, US
Assignee:
Intel Corporation - Santa Clara CA
International Classification:
H04L 12/66 G06F 7/04 G06F 9/455
US Classification:
370352, 726 27, 718 1
Abstract:
A machine, such as a mobile device having telephony features, such as a voice over Internet Protocol (VoIP) telephony application, is configured with a secure environment in which a location provider within (more reliable) or external to (less reliable) the machine may determine location data for the machine and securely provide it to a telephony application program for incorporation into a call setup for calling a callee. The secure environment may be created through use of one or more of Intel's LaGrande Technology™ (LT), Vanderpool Technology (VT), or a Trusted Platform Module (TPM). The LT and VT allow defining secure independent components within the machine, such as by instantiating them as Virtual Machines, and the TPM allows components to cryptographically sign data, such as to facilitate ensuring the location data is not tampered with. A recipient of a telephone call setup including cryptographically secured location data may validate the location data and accept the call. Other embodiments may be described.
Method For Enabling Authentication Without Requiring User Identity Information
Michael Covington - Hillsboro OR, US Manoj Sastry - Portland OR, US
International Classification:
H04L 9/00
US Classification:
726001000
Abstract:
Authentication based on contextual attributes of a client device may be accomplished by receiving, by a service provider, a request for access from the client device to available content; determining whether access to the content is restricted by a policy; challenging the client device to provide contextual attributes required by the policy, when the policy restricts access to the content; receiving contextual attributes from the client device; determining if the received contextual attributes meet requirements of the policy; and enabling access to the content by the client device when the contextual attributes meet the requirements.
Method, Apparatus And System For Enforcing Access Control Policies Using Contextual Attributes
Michael Covington - Hillsboro OR, US Manoj Sastry - Portland OR, US
International Classification:
H04L 9/00
US Classification:
726001000
Abstract:
A method, apparatus and system provide access control utilizing contextual attributes. An access control module may receive a client request for access to a protected resource. The access control module may examine the contextual attributes associated with the request and compare the attributes against a policy database. If the attributes are valid according to a policy in the policy database, access may be granted to the protected resource. Otherwise, access may be denied.
Method, Apparatus And System For Providing Stronger Authentication By Extending Physical Presence To A Remote Entity
Manoj Sastry - Portland OR, US Michael Covington - Hillsboro OR, US Deepak Manohar - Hillsboro OR, US
International Classification:
H04L 9/32
US Classification:
726002000
Abstract:
A method, apparatus and system enable secure remote authentication. According to embodiments of the present invention, a remote administrator may be authenticated by accessing an approved secure location, transmitting location information with an access request and providing proof of physical presence in the access request. Additionally, in one embodiment, the location information and/or proof of presence may be signed by a security key to further tamper-proof the remote administrator's identity.
Method, Apparatus, And System For Biometric Authentication Of User Identity
Deepak Manohar - Hillsboro OR, US Michael Covington - Hillsboro OR, US Manoj Sastry - Portland OR, US Farid Adrangi - Lake Oswego OR, US Shao-Cheng Wang - Los Angeles CA, US
International Classification:
H04M 1/66
US Classification:
455411000, 380247000, 455410000
Abstract:
Various methods and apparatuses are described for a portable computing device cooperating with a wireless phone handset. The portable computing device has a first wireless communication module that causes the portable computing device to act as a wireless base station. The portable computing device also has a biometric authentication module to authenticate access rights to applications and data files on the portable computing device based on one or more biometric features of the user of a wireless phone. The wireless phone may be a handset separate from the portable computing device. The wireless phone has a second wireless communication module configured to act as a wireless access device. The wireless phone also has a biometric sensor to convey the biometric features of the user of the wireless phone to the portable computing device.
Method And System For Providing Security And Reliability To Collaborative Applications
Manoj Sastry - Portland OR, US Deepak Manohar - Hillsboro OR, US Michael Covington - Hillsboro OR, US Farid Adrangi - Lake Oswego OR, US Shao-Cheng Wang - Los Angeles CA, US
International Classification:
G06F 21/00
US Classification:
713170000
Abstract:
Some embodiments of a method and system for providing secure and reliable collaborative applications are described. In some embodiments, a collaborative application may be separated into critical and non-critical components. The critical components may be run on a secure domain on a virtual machine, apart from the non-critical components, according to some embodiments. Other embodiments are described.
Methods And Apparatuses For Privacy In Location-Aware Systems
Manoj R. Sastry - Portland OR, US Michael J. Covington - Hillsboro OR, US Ram Krishnan - Beaverton OR, US
International Classification:
G06F 21/24
US Classification:
726 28, 726 30, 726 26
Abstract:
In one embodiment a method is disclosed for accepting and enforcing user selectable privacy settings for context awareness including location awareness data on a computing platform. The method may identify a requestor, assign a privacy setting to the requester then detect a request for location information from the requestor. The method may transmit location information to the requester based on the user selected privacy setting. The user selected privacy setting may have a granularity assigned to each requestor based on a privacy preference and the method may entirely block the location information from being disclosed or the method may modify the granularity/accuracy of the location information based on the privacy setting to report context of an appropriate level of granularity according to the privacy setting configured by the user. Other embodiments are also disclosed.
Michael J. Covington - Hillsboro OR, US Manoj R. Sastry - Portland OR, US Farid Adrangi - Lake Oswego OR, US Deepak J. Manohar - Hillsboro OR, US Shao-Cheng Wang - Los Angeles CA, US
International Classification:
G06F 21/00
US Classification:
726 1, 726 27
Abstract:
A machine, such as a mobile device having telephony features, such as a voice over Internet Protocol (VoIP) telephony application, is configured with a secure environment in which a location provider within (more reliable) or external to (less reliable) the machine may determine location data for the machine and securely provide it to a telephony application program for incorporation into a call setup for calling a callee. The secure environment may be created through use of one or more of Intel's LaGrande Technology™ (LT), Vanderpool Technology (VT), or a Trusted Platform Module (TPM). The LT and VT allow defining secure independent components within the machine, such as by instantiating them as Virtual Machines, and the TPM allows components to cryptographically sign data, such as to facilitate ensuring the location data is not tampered with. A recipient of a telephone call setup including cryptographically secured location data may validate the location data and accept the call. Other embodiments may be described.
As the Daily Mail reported, attackers are out there. Michael Covington, VP of Strategy at Jamf, explained, These latest OS updates show that attackers continue to focus on exploiting the framework that downloads and presents web-based content. Covington went on to say not only that they could lead
The battle with the bugs could jeopardize Apple's reputation for delivering products that "just work," said Michael Covington, vice president of product at Wandera, a mobile security firm supporting companies such as Deloitte & Touche LLP and Mazda Motor Corp. It could lead people to "question w
Date: Jun 04, 2018
Category: Headlines
Source: Google
Dee-fense! CBS Sports' app and mobile site get a fix after leaving users unprotected
But its vulnerability indicates a larger issue: Companies don't always give security its due when it comes to mobile services, said Michael Covington, a threat researcher with Wandera. "That's where it starts to fall apart," he said.
Date: Apr 13, 2016
Category: Sports
Source: Google
Gas prices could soar past $4 this spring, experts say
Michael Covington, of Athens, said he's mostly protected himself from pain at the pump: "I've known for decades that gasoline prices are volatile," he said via email. "I live four miles from work, and my lifestyle is not built around any assumptions about gasoline prices."