Duluth ClinicEssentia Health Duluth Clinic 420 E 1 St, Duluth, MN 55805 2187863337 (phone), 2187863730 (fax)
Education:
Medical School Northwestern University Feinberg School of Medicine Graduated: 1981
Procedures:
Arthrocentesis Destruction of Benign/Premalignant Skin Lesions Hearing Evaluation Vaccine Administration Electrocardiogram (EKG or ECG)
Conditions:
Atrial Fibrillation and Atrial Flutter Disorders of Lipoid Metabolism Heart Failure Hypertension (HTN) Hypothyroidism
Languages:
English
Description:
Dr. Whitcomb graduated from the Northwestern University Feinberg School of Medicine in 1981. He works in Duluth, MN and specializes in Internal Medicine. Dr. Whitcomb is affiliated with Essentia Health Saint Marys Medical Center.
A Proxy Authentication Network includes a server that stores credentials for subscribers, along with combinations of devices and locations from which individual subscribers want to be authenticated. Data is stored in storage: the storage can be selected by the subscriber. The data stored in the storage, which can be personally identifiable information, can be stored in an encrypted form. The key used to encrypt such data can be divided between the storage and server. In addition, third parties can store portions of the encrypting key. Subscribers can be authenticated using their credentials from recognized device/location combinations; out-of-band authentication supports authenticating subscribers from other locations. Once authenticated, a party can request that the encrypted data be released. The portions of the key are then assembled at the storage. The storage then decrypts the data, generates a new key, and re-encrypts the data for transmission to the requester.
- Portland OR, US Michael J. Whitcomb - Portland OR, US
Assignee:
iamSecureOnline, Inc. - Portland OR
International Classification:
H04L 29/06
US Classification:
726 9
Abstract:
A Proxy Authentication Network includes a server that stores credentials for subscribers, along with combinations of devices and locations from which individual subscribers want to be authenticated. Data is stored in storage: the storage can be selected by the subscriber. The data stored in the storage, which can be personally identifiable information, can be stored in an encrypted form. The key used to encrypt such data can be divided between the storage and server. In addition, third parties can store portions of the encrypting key. Subscribers can be authenticated using their credentials from recognized device/location combinations; out-of-band authentication supports authenticating subscribers from other locations. Once authenticated, a party can request that the encrypted data be released. The portions of the key are then assembled at the storage. The storage then decrypts the data, generates a new key, and re-encrypts the data for transmission to the requester.