Partners Healthcare Jan 2013 - Jul 2013
Project Coordinator
Jan 2013 - Jul 2013
Oregon Health and Science University
Education:
Boston University 2013 - 2017
Doctor of Medical Dentistry, Doctorates, Medicine
Dartmouth College 2007 - 2011
Bachelors, Bachelor of Arts, Political Science and Government, Political Science, Government
Oregon Health & Science University
Iamsecure Online
Founder and Chief Technology Officer
Whitcomb Consulting
Principal
Education:
Preble High School 1974 - 1977
Skills:
Mergers Saas New Business Development Start Ups Strategic Planning Security Cloud Computing Networking Venture Capital Business Development Entrepreneurship Enterprise Software Mobile Devices Product Management Team Building Marketing Strategy
Duluth ClinicEssentia Health Duluth Clinic 420 E 1 St, Duluth, MN 55805 2187863337 (phone), 2187863730 (fax)
Education:
Medical School Northwestern University Feinberg School of Medicine Graduated: 1981
Procedures:
Arthrocentesis Destruction of Benign/Premalignant Skin Lesions Hearing Evaluation Vaccine Administration Electrocardiogram (EKG or ECG)
Conditions:
Atrial Fibrillation and Atrial Flutter Disorders of Lipoid Metabolism Heart Failure Hypertension (HTN) Hypothyroidism
Languages:
English
Description:
Dr. Whitcomb graduated from the Northwestern University Feinberg School of Medicine in 1981. He works in Duluth, MN and specializes in Internal Medicine. Dr. Whitcomb is affiliated with Essentia Health Saint Marys Medical Center.
A Proxy Authentication Network includes a server that stores credentials for subscribers, along with combinations of devices and locations from which individual subscribers want to be authenticated. Data is stored in storage: the storage can be selected by the subscriber. The data stored in the storage, which can be personally identifiable information, can be stored in an encrypted form. The key used to encrypt such data can be divided between the storage and server. In addition, third parties can store portions of the encrypting key. Subscribers can be authenticated using their credentials from recognized device/location combinations; out-of-band authentication supports authenticating subscribers from other locations. Once authenticated, a party can request that the encrypted data be released. The portions of the key are then assembled at the storage.
A Proxy Authentication Network includes a server that stores credentials for subscribers, along with combinations of devices and locations from which individual subscribers want to be authenticated. Data is stored in storage: the storage can be selected by the subscriber. The data stored in the storage, which can be personally identifiable information, can be stored in an encrypted form. The key used to encrypt such data can be divided between the storage and server. In addition, third parties can store portions of the encrypting key. Subscribers can be authenticated using their credentials from recognized device/location combinations; out-of-band authentication supports authenticating subscribers from other locations. Once authenticated, a party can request that the encrypted data be released. The portions of the key are then assembled at the storage. The storage then decrypts the data, generates a new key, and re-encrypts the data for transmission to the requester.
- Portland OR, US Michael J. Whitcomb - Portland OR, US
Assignee:
iamSecureOnline, Inc. - Portland OR
International Classification:
H04L 29/06
US Classification:
726 9
Abstract:
A Proxy Authentication Network includes a server that stores credentials for subscribers, along with combinations of devices and locations from which individual subscribers want to be authenticated. Data is stored in storage: the storage can be selected by the subscriber. The data stored in the storage, which can be personally identifiable information, can be stored in an encrypted form. The key used to encrypt such data can be divided between the storage and server. In addition, third parties can store portions of the encrypting key. Subscribers can be authenticated using their credentials from recognized device/location combinations; out-of-band authentication supports authenticating subscribers from other locations. Once authenticated, a party can request that the encrypted data be released. The portions of the key are then assembled at the storage. The storage then decrypts the data, generates a new key, and re-encrypts the data for transmission to the requester.