Alain Rossmann - Palo Alto CA, US Patrick Zuili - Palo Alto CA, US Michael Michio Ouya - Portola Valley CA, US Serge Humpich - Tournan-en-Brie, FR Chang-Ping Lee - Palo Alto CA, US Klimenty Vainstein - Morgan Hill CA, US Hal Hilderbrand - Moss Beach CA, US Denis Jacques Paul Garcia - Palo Alto CA, US Senthilvasan Supramaniam - San Calros CA, US Weiqing Huang - Sunnyvale CA, US Nicholas Michael Ryan - Sunnyvale CA, US
Techniques for providing pervasive security to digital assets are disclosed. According to one aspect of the techniques, a server is configured to provide access control (AC) management for a user (e. g. , a single user, a group of users, software agents or devices) with a need to access secured data. Within the server module, various access rules for the secured data and/or access privileges for the user can be created, updated and managed so that the user with the proper access privileges can access the secured documents if granted by the corresponding access rules in the secured data.
Rossmann Alain - Palo Alto CA, US Patrick Zuili - Palo Alto CA, US Michael Michio Ouye - Portola Valley CA, US Serge Humpich - Tournan-en-Brie, FR Chang-Ping Lee - Palo Alto CA, US Klimenty Vainstein - Morgan Hill CA, US Hal Hilderbrand - Moss Beach CA, US Denis Jacques Paul Garcia - Palo Alto CA, US Senthilvasan Supramaniam - San Calros CA, US Weiqing Huang - Sunnyvale CA, US Nicholas Michael Ryan - Sunnyvale CA, US
International Classification:
G06F 17/60
US Classification:
705 71, 705 64, 705 67
Abstract:
Techniques for managing files in a designated location are disclosed. An example of the designated location is a folder, a directory, a repository, a device, or a storage place. A set of access rules is applied to a designated location such that all files in the designated location shall have substantially similar security. As a result, secured files can be easily created and managed with respect to the designated location and users with access privilege to the designated location can access most of the files, in not all, in the designated location.
Methods And Systems For Providing Access Control To Electronic Data
Rossmann Alain - Palo Alto CA, US Patrick Zuili - Palo Alto CA, US Michael Michio Ouye - Portola Valley CA, US Serge Humpich - Tournan-en-Brie, FR Chang-Ping Lee - Palo Alto CA, US Klimenty Vainstein - Morgan Hill CA, US Hal Hilderbrand - Moss Beach CA, US Denis Jacques Paul Garcia - Palo Alto CA, US Senthilvasan Supramaniam - San Carlos CA, US Weiqing Huang - Sunnyvale CA, US Nicholas Michael Ryan - Sunnyvale CA, US
Techniques for providing pervasive security to digital assets are disclosed. According to one aspect of the techniques, a server is configured to provide access control (AC) management for a user (e. g. , a single user, a group of users, software agents or devices) with a need to access secured data. Within the server module, various access rules for the secured data and/or access privileges for the user can be created, updated, and managed so that the user with the proper access privileges can access the secured documents if granted by the corresponding access rules in the secured data.
Enforcing Restrictions Related To A Virtualized Computer Environment
Matthew Ginzton - San Francisco CA, US Matthew Eccleston - San Francisco CA, US Srinivas Krishnamurti - San Carlos CA, US Gerald C. Chen - Palo Alto CA, US Nicholas Ryan - Sunnyvale CA, US
Assignee:
VMware, Inc. - Palo Alto CA
International Classification:
G06F 11/30 G06F 12/14 G06F 9/455
US Classification:
726 29, 726 17, 726 22, 713193, 718 1
Abstract:
An administrator may set restrictions related to the operation of a virtual machine (VM), and virtualization software enforces such restrictions. There may be restrictions related to the general use of the VM, such as who may use the VM, when the VM may be used, and on what physical computers the VM may be used. There may be similar restrictions related to a general ability to modify a VM, such as who may modify the VM. There may also be restrictions related to what modifications may be made to a VM, such as whether the VM may be modified to enable access to various devices or other resources. There may also be restrictions related to how the VM may be used and what may be done with the VM. Information related to the VM and any restrictions placed on the operation of the VM may be encrypted to inhibit a user from circumventing the restrictions.
Methods And Systems For Providing Access Control To Secured Data
Denis Jacques Paul Garcia - Palo Alto CA, US Michael Michio Ouye - Mountain View CA, US Alain Rossmann - Palo Alto CA, US Steven Toye Crocker - Burlingame CA, US Eric Gilbertson - Menlo Park CA, US Weiqing Huang - Flower Mound TX, US Serge Humpich - Tournan-en-Brie, FR Klimenty Vainstein - San Francisco CA, US Nicholas Michael Ryan - Sunnyvale CA, US
In a system for providing access control management to electronic data, techniques to secure the electronic data and keep the electronic data secured at all times are disclosed. According to one embodiment, a secured file or secured document includes two parts: an attachment, referred to as a header, and an encrypted document or data portion. The header includes security information that points to or includes the access rules and a file key. The access rules facilitate restrictive access to the secured document and essentially determine who/when/how/where the secured document can be accessed. The file key is used to encrypt/decrypt the encrypted data portion. Only those who have the proper access privileges are permitted to retrieve the file key to encrypt/decrypt the encrypted data portion.
Methods And Systems For Providing Access Control To Secured Data
Denis Jacques Paul Garcia - Palo Alto CA, US Micheal Michio Ouye - Mountain View CA, US Alain Rossmann - Palo Alto CA, US Steven Toye Crocker - Burlingame CA, US Eric Gilbertson - Menlo Park CA, US Weiqing Huang - Flower Mound TX, US Serge Humpich - Tournan-en-Brie, FR Klimenty Vainstein - San Francisco CA, US Nicholas Micheal Ryan - Sunnyvale CA, US
Assignee:
Intellectual Ventures I LLC - Wilmington DE
International Classification:
G06F 21/60
US Classification:
713193
Abstract:
In a system for providing access control management to electronic data, techniques to secure the electronic data and keep the electronic data secured at all times are disclosed. According to one embodiment, a secured file or secured document includes two parts: an attachment, referred to as a header, and an encrypted document or data portion. The header includes security information that points to or includes the access rules and a file key. The access rules facilitate restrictive access to the secured document and essentially determine who/when/how/where the secured document can be accessed. The file key is used to encrypt/decrypt the encrypted data portion. Only those who have the proper access privileges are permitted to retrieve the file key to encrypt/decrypt the encrypted data portion.
Alexander's Greek Kitchen Vernon, CA May 2014 to Sep 2014 Assistant ManagerProgressive Power Group Garden Grove, CA Feb 2014 to Jun 2014 Site Auditor for Solar Panel InstallationKasa Indian Eatery San Francisco, CA Oct 2011 to Aug 2013 Food Truck ManagerBooker T Community Center San Francisco, CA 2010 to 2011 InternSt Juliana Rectory Fullerton, CA 2006 to 2008 Office Assistant
Education:
University of San Francisco San Francisco, CA Sep 2008 to May 2012 B.A. in Environmental Studies
Jan 2015 to 2000 Line chefCrowne Plaza hotel westchester White Plains, NY Jul 2013 to Dec 2014 Head breakfast and Lunch line ChefWykagyl country club New Rochelle, NY Mar 2013 to Jul 2013 Head Line CookThe Merrion hotel Dublin Feb 2012 to Feb 2013 Demi Chef de PartieEvent by Bobby Flay and Grey Goose Louisville, KY Sous ChefScarsdale golf club Scarsdale, NY Line ChefScarsdale fairway LLC
Painter/Laborer
Education:
Johnson and wales university Providence, RI 2009 to 2011 Associates degree in Culinary arts and food science
Skills:
Organization, very passionate, multi tasking, cleanliness, versatile, management skills, great under pressure and following instructions
Washington, DCChair, High School Art Department at Georgetown Da... Artist and teacher working and living in Washington, DC. I grew up in Connecticut and still spend my summers in New England, mostly in Provincetown... Artist and teacher working and living in Washington, DC. I grew up in Connecticut and still spend my summers in New England, mostly in Provincetown, Massachusetts.
nicholas ryan (1996-2000), robert lansaw (1963-1967), Debbie Brate (1977-1981), Robert Tracy (1977-1981), Beth Barker (1970-1974), Donelle Crow (1990-1994)