International Business Machines Corporation (IBM) Computer Storage Devices
6300 N Diag Hwy, Boulder, CO 80301
Michael Wise Information Technology Manager
Char Hamilton Campbell & Yoshida, Attorneys At Law, A Law Corporation Hospital and Medical Service Plans
737 Bishop St Ste 2100, Manassas, VA 20109
Michael Wise Mineralogist
Smithsonian Institution Museums and Art Galleries
1000 Jefferson Dr Sw, Washington, DC 20560
Michael Wise Finance Manager
Capital Hill Suites Inc General Medical and Surgical Hospitals
200 C St Se, Washington, DC 20057
Michael Wise President
OAKS REALTY, INC
3285 Old Conejo Rd, Newbury Park, CA 91320 11100 Santa Monica Blvd, Los Angeles, CA 90025
Michael W. Wise Director, Secretary, Treasurer
Corvesta Life Insurance Company Life Insurance Carrier
4818 Starkey Rd, Roanoke, VA 24018 9 Executive Cir, Irvine, CA 92614 2999 N 44 St, Phoenix, AZ 85018 680 Newport Ctr Dr, Newport Beach, CA 92660 9497201568
Michael Wise Finance Manager
Capital Hill Suites Inc Hotel/Motel Operation
200 C St SE, Washington, DC 20003 2025436000, 2026870100, 2026875084
Science Application International Corporation (SAIC) Falls Church, VA May 2008 to Nov 2009 Project Control SpecialistThe Kel Hodge Company Falls Church, VA Aug 2004 to Apr 2008 Project Control SpecialistPresearch Incorporated, Software Engineering Group Fairfax, VA Nov 1999 to Jul 2004 Staff Systems AnalystAlternative House Vienna, VA Jun 1998 to Oct 1999 Adolescent CounselorU.S. Navy Career
Jul 1978 to Oct 1994 Senior Chief Petty Officer
Education:
Marymount University Arlington, VA Nov 1994 to May 1998 B.A. in Human Services Psychology
Military:
Rank: Senior Chief Petty Officer Jul 1978 to Oct 1994 Branch: U.S. NavyL.i.location.original
Science Application International Corporation Falls Church, VA May 2008 to Nov 2009 Project Control SpecialistThe Kel Hodge Company Falls Church, VA Aug 2004 to Apr 2008 Project Control SpecialistPresearch Incorporated, Software Engineering Group Fairfax, VA Nov 1999 to Jul 2004 Staff Systems AnalystAlternative House Vienna, VA Jun 1998 to Oct 1999 Adolescent CounselorUnited States Navy
Jul 1978 to Oct 1994 Senior Chief Petty Officer
Education:
Marymount University Arlington, VA 1998 Bachelor of Arts in Human Services Psychology
David F Pare - San Francisco CA, US David L. Biderman - San Francisco CA, US Stephen Loomis - Leesburg VA, US Scott K. Brown - Ashburn VA, US Michael Wise - Washington DC, US David Wexelblat - Vienna VA, US Conor P. Cahill - Waterford VA, US David S. Bill - San Francisco CA, US
An initialization vector (IV) is employed to decrypt a block of a stream that has been encrypted with Cypher Block Chaining (CBC) encryption, without requiring decryption of previous blocks within the stream. For example, a listener who accesses a distribution point to retrieve encrypted content authenticates himself to an application server that regulates access to encrypted content on the distribution point, and responsively receives a key. The listener then requests access to a reference point within the encrypted content stream somewhere after its beginning (e. g. , using preview clips). The distribution point relates the reference point to a corresponding block of the encrypted stream, and identifies an IV previously used for encryption of that block. The distribution point provides the associated encrypted block of content and the IV to the listener to enable mid-stream rendering of the encrypted content, without requiring the listener to decrypt previous blocks within the encrypted stream.
David F. Pare - San Francisco CA, US David L. Biderman - San Francisco CA, US Stephen E. Loomis - Leesburg VA, US Scott K. Brown - Ashburn VA, US Michael Wise - Washington DC, US David Wexelblat - Vienna VA, US Conor P. Cahill - Waterford VA, US David S. Bill - San Francisco CA, US
Assignee:
AOL Inc. - Dulles VA
International Classification:
H04K 1/00 H04L 9/00 H04N 7/167
US Classification:
380 37, 380 28, 380 44, 380201
Abstract:
An initialization vector (IV) is employed to decrypt a block of a stream that has been encrypted with Cypher Block Chaining (CBC) encryption, without requiring decryption of previous blocks within the stream. For example, a listener who accesses a distribution point to retrieve encrypted content authenticates himself to an application server that regulates access to encrypted content on the distribution point, and responsively receives a key. The listener then requests access to a reference point within the encrypted content stream somewhere after its beginning (e. g. , using preview clips). The distribution point relates the reference point to a corresponding block of the encrypted stream, and identifies an IV previously used for encryption of that block. The distribution point provides the associated encrypted block of content and the IV to the listener to enable mid-stream rendering of the encrypted content, without requiring the listener to decrypt previous blocks within the encrypted stream.
Apparatus, Method And System To Implement An Integrated Data Security Layer
Michael Wise - Washington DC, US Howard M. Singer - Morganville NJ, US
International Classification:
G06F 17/30 G06F 17/40
US Classification:
707694, 707661, 707758, 707781, 707822
Abstract:
The disclosure details the implementation of an apparatus, method, and system for an integrated data security layer (IDSL). In one aspect, the IDSL enables entities wishing to control users' data access, whether they are content owners, corporate system administrators, or concerned parents wishing to prevent ill-gotten data to work across their systems, to manage the access of content. The IDSL provides the ability to curb such unwanted access of data. The IDSL has the ability to obtain content information, policy rules regarding the content, and unique identifiers for the content from content providers and/or their proxies. Further, the IDSL has the ability to provide such information to IDSL clients. Such clients employ the obtained information to analyze and control access to the content. Additionally, the IDSL may act as a lookup facility to create, maintain, and update associations between a content information, policy rules, and unique identifiers of content, and any other associated information as detailed throughout.
David F. Pare - San Francisco CA, US David L. Biderman - San Francisco CA, US Stephen E. Loomis - Leesburg VA, US Scott K. Brown - Ashburn VA, US Michael Wise - Washington DC, US David Wexelblat - Vienna VA, US Conor P. Cahill - Waterford VA, US David S. Bill - San Francisco CA, US
Assignee:
Facebook, Inc. - Menlo Park CA
International Classification:
H04K 1/00 H04L 9/00 H04N 7/167
US Classification:
380 37, 380 28, 380 44, 380201
Abstract:
An initialization vector (IV) is employed to decrypt a block of a stream that has been encrypted with Cypher Block Chaining (CBC) encryption, without requiring decryption of previous blocks within the stream. For example, a listener who accesses a distribution point to retrieve encrypted content authenticates himself to an application server that regulates access to encrypted content on the distribution point, and responsively receives a key. The listener then requests access to a reference point within the encrypted content stream somewhere after its beginning (e. g. , using preview clips). The distribution point relates the reference point to a corresponding block of the encrypted stream, and identifies an IV previously used for encryption of that block. The distribution point provides the associated encrypted block of content and the IV to the listener to enable mid-stream rendering of the encrypted content, without requiring the listener to decrypt previous blocks within the encrypted stream.
David F. Pare - San Francisco CA, US David L. Biderman - San Jose CA, US Stephen Loomis - Leesburg VA, US Scott K. Brown - Marietta GA, US Michael Wise - Washington DC, US David Wexelblat - Vienna VA, US Conor P. Cahill - Waterford VA, US David S. Bill - San Francisco CA, US
Assignee:
AOL Inc. - Dulles VA
International Classification:
H04K 1/04 H04L 9/00 H04N 7/169
US Classification:
380 37, 380 42, 380210, 380239
Abstract:
An initialization vector (IV) is employed to decrypt a block of a stream that has been encrypted with Cypher Block Chaining (CBC) encryption, without requiring decryption of previous blocks within the stream. For example, a listener who accesses a distribution point to retrieve encrypted content authenticates himself to an application server that regulates access to encrypted content on the distribution point, and responsively receives a key. The listener then requests access to a reference point within the encrypted content stream somewhere after its beginning (e. g. , using preview clips). The distribution point relates the reference point to a corresponding block of the encrypted stream, and identifies an IV previously used for encryption of that block. The distribution point provides the associated encrypted block of content and the IV to the listener to enable mid-stream rendering of the encrypted content, without requiring the listener to decrypt previous blocks within the encrypted stream.
DAVID F. PARE - San Francisco CA, US DAVID L. BIDERMAN - San Francisco CA, US STEPHEN E. LOOMIS - Leesburg VA, US SCOTT K. BROWN - Ashburn VA, US MICHAEL WISE - Washington DC, US DAVID WEXELBLAT - Vienna VA, US CONOR P. CAHILL - Waterford VA, US DAVID S. BILL - San Francisco CA, US
International Classification:
H04L 9/08
US Classification:
713168
Abstract:
An initialization vector (IV) is employed to decrypt a block of a stream that has been encrypted with Cypher Block Chaining (CBC) encryption, without requiring decryption of previous blocks within the stream. For example, a listener who accesses a distribution point to retrieve encrypted content authenticates himself to an application server that regulates access to encrypted content on the distribution point, and responsively receives a key. The listener then requests access to a reference point within the encrypted content stream somewhere after its beginning (e.g., using preview clips). The distribution point relates the reference point to a corresponding block of the encrypted stream, and identifies an IV previously used for encryption of that block. The distribution point provides the associated encrypted block of content and the IV to the listener to enable mid-stream rendering of the encrypted content, without requiring the listener to decrypt previous blocks within the encrypted stream.
- Dulles VA, US David L. BIDERMAN - San Jose CA, US Stephen LOOMIS - San Jose CA, US Scott K. Brown - Marietta GA, US Michael WISE - Washington DC, US David WEXELBLAT - Vienna VA, US Conor P. CAHILL - Waterford VA, US David S. BILL - San Francisco CA, US
International Classification:
H04L 29/06 H04L 29/08
Abstract:
An initialization vector (IV) is employed to decrypt a block of a stream that has been encrypted with Cypher Block Chaining (CBC) encryption, without requiring decryption of previous blocks within the stream. For example, a listener who accesses a distribution point to retrieve encrypted content authenticates himself to an application server that regulates access to encrypted content on the distribution point, and responsively receives a key. The listener then requests access to a reference point within the encrypted content stream somewhere after its beginning (e.g., using preview clips). The distribution point relates the reference point to a corresponding block of the encrypted stream, and identifies an IV previously used for encryption of that block. The distribution point provides the associated encrypted block of content and the IV to the listener to enable mid-stream rendering of the encrypted content, without requiring the listener to decrypt previous blocks within the encrypted stream.
Concepts For Providing An Enhanced Media Presentation
- Atlanta GA, US Marisa Gallagher - Atlanta GA, US Don Loheide - Atlanta GA, US Michael Wise - Ketchum ID, US Rajin Persaud - Atlanta GA, US Michael Koetter - Decatur GA, US KC Estenson - Atlanta GA, US Dave Ehlers - Atlanta GA, US Chris Hinton - Decatur GA, US Michael Quigley - Atlanta GA, US Jeremy Legg - Atlanta GA, US Scott Teissler - Atlanta GA, US
International Classification:
G06F 17/30 H04L 29/08
Abstract:
Computer program products, methods, systems, apparatus, and computing entities are provided for providing an enhanced media presentation. In one embodiment, an enhanced media presentation is provided. To provide the enhanced media presentation, one or more content items associated with subject matter associated with a segment of an enhanced media presentation are identified. Each content item may be associated with at least one uniform resource identifier. Then, a content object based at least in part on at least one content item is created. The content object is an abstract representation of the content item. The content object can be associated with the segment and provided for simultaneous displayed simultaneously with at least a portion of the segment.
Paul Hastings LLP 875 15Th Street Nw, Washington, DC 20005 2025511777 (Office)
Licenses:
Dist. of Columbia - Active 2008 Virginia - Authorized to practice law 2007
Experience:
Associate at Paul Hastings LLP - 2011-present Associate at Howrey - 2007-2011
Education:
George Washington University National Law Center Degree - JD - Juris Doctor - Law Graduated - 2007 Washington University in St. Louis Degree - BA - Bachelor of Arts - History Graduated - 2004
Perkins Coie 1888 Century Park E Ste 1700 Ste 1700, Los Angeles, CA 90067 3107883210 (Office), 3107883399 (Fax)
Licenses:
California - Active 1989
Education:
Loyola Law School Degree - JD - Juris Doctor - Law Graduated - 1989 University of California - Los Angeles Degree - BS - Bachelor of Science - Biology Graduated - 1985
Specialties:
Intellectual Property - 25% Litigation - 25% Environmental / Natural Resources - 25% International Law - 25%
Criminal Law Civil Litigation DUI/DWI Criminal Defense Driving While Intoxicated Expungements Federal Criminal Law Felonies Forgery Misdemeanors Manslaughter Money Laundering Murder Parole and Probation Post-Conviction Remedies Search and Seizure Sex Crimes Sexual Assault Shoplifting Theft Weapons Charges Drug Crimes Drug Trafficking Business Law Business Development Business Enterprises Business Formation Business Organization Business Crimes Business Fraud Business Reorganization Business Start-Ups Business Succession Planning Business Successions Business Torts Business Transfers Business Transactions Buy-Sell Agreements Buying and Selling of Businesses Breach of Contract Commercial Contracts Contract Fraud Contract Litigation
ISLN:
912423201
Admitted:
1994
University:
California State University, Sacramento, B.A., 1991
Law School:
McGeorge School of Law of University of the Pacific, J.D., 1994
Michael Wise, a history professor at the University of North Texas and the author of a forthcoming book on wolves on the Canadian border, saysthat The challenge of wolf recovery is reintegrating the animals within a region that was transformed by industrial agriculture during the carnivores sixt
Too late. George Mason coach Jim Larranaga made an intriguing comment to Michael Wise of the Washington Post on Sunday. In 2006, Larranaga coached his Colonial Athletic Association team into the Final Four.
William C. Bryant Elementary School Philadelphia PA 1971-1977, George W. Pepper Middle School Philadelphia PA 1977-1980, Penn Center Academy Philadelphia PA 1980-1981