Michael D Mcfall

age ~35

from Phoenix, AZ

Also known as:
  • Michael Denise Bernard

Michael Mcfall Phones & Addresses

  • Phoenix, AZ
  • Las Vegas, NV
  • Reno, NV
  • Winslow, AZ

Us Patents

  • Ephemeral Control Of A Data Resource According To A Use Policy

    view source
  • US Patent:
    20220360609, Nov 10, 2022
  • Filed:
    Jul 26, 2022
  • Appl. No.:
    17/873752
  • Inventors:
    - Miami FL, US
    Michael McFall - Paradise Valley AZ, US
  • International Classification:
    H04L 9/40
    G06F 21/62
    G06F 16/22
  • Abstract:
    Disclosed is a method, a device, and/or a system of ephemeral control of a data resource according to a use policy. In one embodiment, a method for ephemeral control of a data resource includes receiving a request from a device to use a protected resource stored in a non-hierarchical data structure. A use policy defining an authorized context for which the device can use the protected resource based on one or more contextual value is extracted from a data node. A set of use terms is generated and returned to the device. The protected resource is then streamed to the device, where the device includes a process to enforce ephemerality of the protected resource by maintaining a ledger comprising data identifying the protected resource that is in an active use by the device and a corresponding instance of the use terms associated with the authorized use of the protected resource.
  • Ledger Token Transfer Outside Of A Distributed Ledger Network Through Cryptographic Binding To A Transferrable Possession Token

    view source
  • US Patent:
    20230092894, Mar 23, 2023
  • Filed:
    Nov 24, 2022
  • Appl. No.:
    17/993973
  • Inventors:
    - Miami FL, US
    Michael McFall - Paradise Valley AZ, US
  • International Classification:
    G06Q 20/36
    H04L 9/06
    H04L 9/08
  • Abstract:
    Disclosed is a method, a device, and/or a system of ledger token transfer of a distributed ledger network through cryptographic binding to a transferrable possession token. In one embodiment, a method for rapid and secure ledger-less transfer of a ledger token includes generating a public-private key pair, securely storing the private key and utilizing the public key as a public address. The method verifies a ledger transaction on a distributed ledger network associated the asset with the public address. The method generates a possession token having a state indicated by a state indicator. The state evolves upon transfer between two computing devices. The method cryptographically associates the ledger token and the possession token through incorporation of the public address into data generating the state indicator. The possession token is transferred to a computing device over the network while retaining the private key in secure custody.
  • Controlling Permissible Actions A Computing Device Can Perform On A Data Resource Based On A Use Policy Evaluating An Authorized Context Of The Device

    view source
  • US Patent:
    20190342344, Nov 7, 2019
  • Filed:
    Jul 17, 2019
  • Appl. No.:
    16/515000
  • Inventors:
    Dhryl Anton - Paradise Valley AZ, US
    Michael McFall - Paradise Valley AZ, US
  • Assignee:
    Vescel, LLC - Phoenix AZ
  • International Classification:
    H04L 29/06
    G06F 21/62
    G06F 16/22
  • Abstract:
    Disclosed is a method, a device, and/or a system of controlling permissible actions a computing device can perform on a data resource based on a use policy evaluating an authorized context of the device. In one embodiment, a request is received from a device to use a protected resource stored in a non-hierarchical data structure. A use policy defining an authorized context for which the device can use the protected resource based on contextual value(s) is extracted from a data node. A use transaction is initiated that gathers the contextual values to determine whether the use request satisfies the authorized context. A set of use terms is generated and returned to the device. The protected resource is then streamed to the device, where the device includes a process to enforce ephemerality of the protected resource by maintaining the protected resource in association with the set of use terms.
  • Authentication Through Verification Of An Evolving Identity Credential

    view source
  • US Patent:
    20190334724, Oct 31, 2019
  • Filed:
    Jul 10, 2019
  • Appl. No.:
    16/507028
  • Inventors:
    Dhryl Anton - Paradise Valley AZ, US
    Michael McFall - Paradise Valley AZ, US
  • Assignee:
    Vescel, LLC - Phoenix AZ
  • International Classification:
    H04L 9/32
    G06F 21/31
    G06F 21/62
    G06F 16/22
    H04L 29/06
  • Abstract:
    Disclosed is a method, a device, and/or a system of authentication through verification of an evolving identity credential. In one embodiment, an authentication method includes receiving an identity claim from a device that includes a device root hash of a hashed history of the device, referred to as a device hastory. Data of a user profile associated with the device that includes a profile root hash of a profile hastory is retrieved. The device root hash and the profile root hash, each of which may be computed as the output of a hash function with inputs including one or more previous authentication transactions, are compared and determined to be identical to verify an identity of a user and/or a device. Alternatively, a comparison may be determined to be non-identical and the authentication request rejected and/or the user profile suspended.
  • Secure Initiation And Transfer Of A Cryptographic Database And/Or A Cryptographic Unit

    view source
  • US Patent:
    20190318103, Oct 17, 2019
  • Filed:
    Jun 13, 2017
  • Appl. No.:
    16/309588
  • Inventors:
    - Las Vegas NV, US
    Michael McFall - Paradise Valley AZ, US
  • International Classification:
    G06F 21/60
    G06F 21/62
    G06F 12/1018
    H04L 9/06
    H04L 9/32
  • Abstract:
    Disclosed is a method, a device, and/or a system of initiation and transfer of a cryptographic database and/or a cryptographic unit. In one embodiment, an electronic mint generates and mints proofs in an indelible media using a hash function. The proofs and/or an origin hash based on the proofs may be usable to seed a hash chain of a cryptographic bearer database and/or a cryptographic unit with an evolving state hash. The database and/or unit is issued from a treasury server and transferred between user devices as coordinated by a tracking server that utilizes one or more immutable records to track the database and/or unit and retain uniqueness of the bearer database in its most evolved state. Transfers may update user state hash of an evolving user profile usable as an authentication token and/or to show assent to a transaction resulting in a seal hash of acceptance.
  • Efficient Data Query And Utilization Through A Semantic Storage Model

    view source
  • US Patent:
    20190251284, Aug 15, 2019
  • Filed:
    Apr 24, 2019
  • Appl. No.:
    16/393840
  • Inventors:
    Dhryl Anton - Paradise Valley AZ, US
    Michael McFall - Paradise Valley AZ, US
  • Assignee:
    VESCEL, LLC - Phoenix AZ
  • International Classification:
    G06F 21/62
    G06F 16/22
  • Abstract:
    Disclosed is a method, a device, a system and/or a manufacture of efficient data query and utilization through a semantic storage model. In one embodiment, a method includes generating a unique identifier (UID) to uniquely address a domain within a datastore, defining a content element (NT element) storing a primitive data and/or drawing reference(s) to other domains within the datastore according to a directed acyclic graph architecture, an identity entity element (TY element) of the domain storing data that alone or in combination distinguishes the domain from one or more other domains within the datastore, and a context element (XT element) of the domain that further characterizes the domain and/or draws reference(s) to other domains within the datastore which may violate the directed acyclic graph architecture to define a flexible contextual reference. A key may be generated such that the TY element is individually addressable within the datastore.
  • Control Over Data Resource Utilization Through A Security Node Control Policy Evaluated In The Context Of An Authorization Request

    view source
  • US Patent:
    20180198826, Jul 12, 2018
  • Filed:
    Mar 6, 2018
  • Appl. No.:
    15/912667
  • Inventors:
    - Las Vegas NV, US
    Michael McFall - Henderson NV, US
  • International Classification:
    H04L 29/06
  • Abstract:
    Disclosed is a method, a device, and/or a system of control over data resource utilization through a security node control policy evaluated in the context of an authorization request. In one embodiment, a method includes receiving an authorization request from a device to utilize a protected resource within a datastore. A control policy extracted from a security node defines an authorized context for the device to utilize the protected resource. The control policy includes a control algorithm comprising one or more conditionals comparing context values to control ranges. Context values are retrieved to form a context dataset. Utilization of the protected resource is authorized when it is determined by the control algorithm that the context dataset conforms to the authorized context. The security node may organize data into a domain structure that includes a unique identifier, an identity element, a content element, and a context element.
  • Data Resource Control Data Structure And Method

    view source
  • US Patent:
    20170048253, Feb 16, 2017
  • Filed:
    Aug 7, 2016
  • Appl. No.:
    15/230421
  • Inventors:
    - Henderson NV, US
    Michael McFall - Henderson NV, US
  • International Classification:
    H04L 29/06
    G06F 17/30
  • Abstract:
    Disclosed is a method, a device, and/or a system of a data resource control data structure. In one embodiment, a computer-implemented method includes receiving an authorization request from a device to utilize a protected resource within a datastore. A control policy that defines an authorized context in which the device is authorized to utilize the protected resource is extracted from a security node of a non-hierarchical data structure. The control policy includes a control algorithm and optionally a control dataset. Context values specified in the control algorithm are retrieved to form a context dataset. Utilization of the protected resource is authorized when it is determined by the control algorithm that the context dataset conforms to the authorized context. The security node may organize data into a domain structure that includes a unique identifier, an identity element, a content element, and a context element.
Name / Title
Company / Classification
Phones & Addresses
Michael Mcfall
Director
THE EVOGI GROUP, INC. (FN)
20645 N Pima Rd BLDG N #130, Scottsdale, AZ 85255
160 Greentree Dr #101, Dover, DE 19904
Director 20645 N Pima Rd BLDG N #130, Scottsdale, AZ 85255
Michael Mcfall
President
MC PUBLISHING, INC
Misc Publishing · Miscellaneous Publishing, Nsk
PO Box 45243, Phoenix, AZ 85064
5775 W 115 Pl, Broomfield, CO 80020
740 W Elm St #210, Phoenix, AZ 85013
Michael E. Mcfall
Director
Musictray, Inc
Nonclassifiable Establishments
7885 W Flamingo Rd, Las Vegas, NV 89147
Michael Mcfall
Manager
Ivhealthnetworks LLC
10120 W Flamingo Rd, Las Vegas, NV 89147
Michael E. Mcfall
M
Objectstacks LLC
9435 W Tropicana Ave, Las Vegas, NV 89147

Resumes

Michael Mcfall Photo 1

Owner, The Pride Guides Of Arizona, California,Hawaii & New Mexico

view source
Position:
Owner at The Pride Guides Of Arizona, California,Hawaii & New Mexico
Location:
Phoenix, Arizona Area
Industry:
Marketing and Advertising
Work:
The Pride Guides Of Arizona, California,Hawaii & New Mexico since 2006
Owner
Michael Mcfall Photo 2

Michael Mcfall

view source
Location:
Phoenix, Arizona Area
Industry:
Media Production
Michael Mcfall Photo 3

Owner, Arizona Pride Guide

view source
Position:
Owner at Arizona Pride Guide
Location:
Phoenix, Arizona Area
Industry:
Marketing and Advertising
Work:
Arizona Pride Guide
Owner
Michael Mcfall Photo 4

Michael Mcfall

view source
Location:
United States

Googleplus

Michael Mcfall Photo 5

Michael Mcfall

Tagline:
A Christian Country Boy!! And proud of it!!!
Michael Mcfall Photo 6

Michael Mcfall

Michael Mcfall Photo 7

Michael Mcfall

Michael Mcfall Photo 8

Michael Mcfall

Michael Mcfall Photo 9

Michael Mcfall

Michael Mcfall Photo 10

Michael Mcfall

Michael Mcfall Photo 11

Michael Mcfall

Michael Mcfall Photo 12

Michael Mcfall

Youtube

Isolate Russia! -- Michael McFaul, Ex US Amb ...

Michael McFaul is an American diplomat and scholar. In 2009, he joined...

  • Duration:
    2m 43s

Michael McFaul: Designating Moscow As Terrori...

VOA sat down with former US Ambassador to Russia Michael McFaul to dis...

  • Duration:
    24m 39s

"No Fly Zone" Is A Euphemism For A Declaratio...

President Obama's ambassador to Russia, Michael McFaul, visits The Lat...

  • Duration:
    7m 56s

A Journey to Conscious Capitalism | Mike McF...

How Conscious Capitalism led the founders of BIGGBY COFFEE to the comp...

  • Duration:
    14m 9s

Amb. McFaul: Not Optimistic That Griner Will ...

Former U.S. ambassador to Russia Michael McFaul joins Andrea Mitchell ...

  • Duration:
    5m 21s

Amb. Michael McFaul: "There's Now Momentum On...

Former U.S. Ambassador to Russia, Michael McFaul, joins Andrea Mitchel...

  • Duration:
    3m 53s

Myspace

Michael Mcfall Photo 13

Michael McFall

view source
Locality:
Where ever life takes me, Illinois
Gender:
Male
Birthday:
1950
Michael Mcfall Photo 14

michael mcfall

view source
Locality:
Raleigh, North Carolina
Gender:
Male
Birthday:
1947
Michael Mcfall Photo 15

Michael McFall

view source
Locality:
Waxahachie, Texas
Gender:
Male
Birthday:
1947
Michael Mcfall Photo 16

Michael Mcfall

view source
Locality:
Colorado
Gender:
Male
Birthday:
1952
Michael Mcfall Photo 17

Michael McFall

view source
Locality:
United Kingdom
Gender:
Male
Birthday:
1935

Plaxo

Michael Mcfall Photo 18

Michael McFall

view source
Lansing, MIGlobal Orange Development
Michael Mcfall Photo 19

Michael McFall

view source
Maryland

Flickr

Classmates

Michael Mcfall Photo 28

Michael McFall

view source
Schools:
Northern Arizona Academy for Career Development Winslow AZ 2003-2007
Community:
Zack Palfy
Michael Mcfall Photo 29

Michael M. McFall

view source
Schools:
Haverford School Haverford PA 1947-1951
Community:
Carol Moore
Michael Mcfall Photo 30

Michael McFall

view source
Schools:
Scammon Elementary School Chicago IL 1968-1977
Community:
Minerva Correa, Marc Guerrero, Susan Lemieux, Sergio Pacheco
Michael Mcfall Photo 31

Michael McFall

view source
Schools:
Richland-Columbia High School Richland WA 1975-1979
Community:
Stu Osborn, Charla Clark
Michael Mcfall Photo 32

Michael McFall

view source
Schools:
Delaplaine Elementary School Delaplaine AR 1973-1979
Community:
Mary Tweedy, Greg Blount, Connie Pendergrass, Sharon Peoples, Greg King, Candy Weldy, Jim Nobles, Suzie Bailey, Dorothea Wilkins
Michael Mcfall Photo 33

Michael McFall | Springfi...

view source
Michael Mcfall Photo 34

Michael McFall, Milford H...

view source
Michael Mcfall Photo 35

Mike McFall, Willow Glen ...

view source

Facebook

Michael Mcfall Photo 36

Michael McFall

view source
Michael Mcfall Photo 37

Michael McFall

view source
Michael Mcfall Photo 38

Michael Mcfall

view source
Michael Mcfall Photo 39

Michael McFall

view source
Michael Mcfall Photo 40

Michael McFall

view source
Michael Mcfall Photo 41

Michael McFall

view source
Michael Mcfall Photo 42

Michael McFall

view source
Michael Mcfall Photo 43

Michael A. Mcfall

view source

Get Report for Michael D Mcfall from Phoenix, AZ, age ~35
Control profile