Alain Rossmann - Palo Alto CA, US Patrick Zuili - Palo Alto CA, US Michael Michio Ouya - Portola Valley CA, US Serge Humpich - Tournan-en-Brie, FR Chang-Ping Lee - Palo Alto CA, US Klimenty Vainstein - Morgan Hill CA, US Hal Hilderbrand - Moss Beach CA, US Denis Jacques Paul Garcia - Palo Alto CA, US Senthilvasan Supramaniam - San Calros CA, US Weiqing Huang - Sunnyvale CA, US Nicholas Michael Ryan - Sunnyvale CA, US
Techniques for providing pervasive security to digital assets are disclosed. According to one aspect of the techniques, a server is configured to provide access control (AC) management for a user (e. g. , a single user, a group of users, software agents or devices) with a need to access secured data. Within the server module, various access rules for the secured data and/or access privileges for the user can be created, updated and managed so that the user with the proper access privileges can access the secured documents if granted by the corresponding access rules in the secured data.
Method And System For Protecting Encrypted Files Transmitted Over A Network
An improved system and approaches for protecting secured files when being used by an application (e. g. , network browser) that potentially transmits the files over a network to unknown external locations are disclosed. According to one aspect, access to secured files is restricted so that unsecured versions of the secured files are not able to be transmitted over a network (e. g. , the Internet) to unauthorized destinations. In one embodiment, in opening a file for use by a network browser, the network browser receives a secured (e. g. , encrypted) version of the secured file when the destination location (e. g. , destination address) for the network browser is not trusted, but receives an unsecured (e. g. , unencrypted) version of the secured file when the destination location for the network browser is trusted. According to another aspect, processes operating on a computer system are monitored to determine destination locations, if any, of said processes, and then using such destination locations to determine whether to permit the processes to open files in a secure or unsecured manner.
System And Method For Imposing Security On Copies Of Secured Items
Improved approaches for securing files that are derived from secured files are disclosed. In general, a secured file can only be accessed by authenticated users with appropriate access rights or privileges. Each secured file is provided with a header portion and a data portion, where the header portion contains, or points to, security information. The security information is used to determine whether access to associated data portions of secured files is permitted. These improved approaches can thus impose security on files that are derived from secured files. In one embodiment, files that are deemed derived from a secured file include files that are copies of the secured file. In another embodiment, files that are deemed derived from a secured file include files having content substantially similar to the content of the secured file.
Rossmann Alain - Palo Alto CA, US Patrick Zuili - Palo Alto CA, US Michael Michio Ouye - Portola Valley CA, US Serge Humpich - Tournan-en-Brie, FR Chang-Ping Lee - Palo Alto CA, US Klimenty Vainstein - Morgan Hill CA, US Hal Hilderbrand - Moss Beach CA, US Denis Jacques Paul Garcia - Palo Alto CA, US Senthilvasan Supramaniam - San Calros CA, US Weiqing Huang - Sunnyvale CA, US Nicholas Michael Ryan - Sunnyvale CA, US
International Classification:
G06F 17/60
US Classification:
705 71, 705 64, 705 67
Abstract:
Techniques for managing files in a designated location are disclosed. An example of the designated location is a folder, a directory, a repository, a device, or a storage place. A set of access rules is applied to a designated location such that all files in the designated location shall have substantially similar security. As a result, secured files can be easily created and managed with respect to the designated location and users with access privilege to the designated location can access most of the files, in not all, in the designated location.
Methods And Systems For Providing Access Control To Electronic Data
Rossmann Alain - Palo Alto CA, US Patrick Zuili - Palo Alto CA, US Michael Michio Ouye - Portola Valley CA, US Serge Humpich - Tournan-en-Brie, FR Chang-Ping Lee - Palo Alto CA, US Klimenty Vainstein - Morgan Hill CA, US Hal Hilderbrand - Moss Beach CA, US Denis Jacques Paul Garcia - Palo Alto CA, US Senthilvasan Supramaniam - San Carlos CA, US Weiqing Huang - Sunnyvale CA, US Nicholas Michael Ryan - Sunnyvale CA, US
Techniques for providing pervasive security to digital assets are disclosed. According to one aspect of the techniques, a server is configured to provide access control (AC) management for a user (e. g. , a single user, a group of users, software agents or devices) with a need to access secured data. Within the server module, various access rules for the secured data and/or access privileges for the user can be created, updated, and managed so that the user with the proper access privileges can access the secured documents if granted by the corresponding access rules in the secured data.
Protecting Encrypted Files Transmitted Over A Network
An improved system and approaches for protecting secured files when being used by an application (e. g. , network browser) that potentially transmits the files over a network to unknown external locations are disclosed. According to one aspect, access to secured files is restricted so that unsecured versions of the secured files are not able to be transmitted over a network (e. g. , the Internet) to unauthorized destinations. In one embodiment, processes operating on a computer system are monitored to determine destination locations, if any, of said processes, and then using such destination locations to determine whether to permit the processes to open files in a secure or unsecured manner.
Enforcing Restrictions Related To A Virtualized Computer Environment
Matthew Ginzton - San Francisco CA, US Matthew Eccleston - San Francisco CA, US Srinivas Krishnamurti - San Carlos CA, US Gerald C. Chen - Palo Alto CA, US Nicholas Ryan - Sunnyvale CA, US
Assignee:
VMware, Inc. - Palo Alto CA
International Classification:
G06F 11/30 G06F 12/14 G06F 9/455
US Classification:
726 29, 726 17, 726 22, 713193, 718 1
Abstract:
An administrator may set restrictions related to the operation of a virtual machine (VM), and virtualization software enforces such restrictions. There may be restrictions related to the general use of the VM, such as who may use the VM, when the VM may be used, and on what physical computers the VM may be used. There may be similar restrictions related to a general ability to modify a VM, such as who may modify the VM. There may also be restrictions related to what modifications may be made to a VM, such as whether the VM may be modified to enable access to various devices or other resources. There may also be restrictions related to how the VM may be used and what may be done with the VM. Information related to the VM and any restrictions placed on the operation of the VM may be encrypted to inhibit a user from circumventing the restrictions.
Methods And Systems For Providing Access Control To Secured Data
Denis Jacques Paul Garcia - Palo Alto CA, US Michael Michio Ouye - Mountain View CA, US Alain Rossmann - Palo Alto CA, US Steven Toye Crocker - Burlingame CA, US Eric Gilbertson - Menlo Park CA, US Weiqing Huang - Flower Mound TX, US Serge Humpich - Tournan-en-Brie, FR Klimenty Vainstein - San Francisco CA, US Nicholas Michael Ryan - Sunnyvale CA, US
In a system for providing access control management to electronic data, techniques to secure the electronic data and keep the electronic data secured at all times are disclosed. According to one embodiment, a secured file or secured document includes two parts: an attachment, referred to as a header, and an encrypted document or data portion. The header includes security information that points to or includes the access rules and a file key. The access rules facilitate restrictive access to the secured document and essentially determine who/when/how/where the secured document can be accessed. The file key is used to encrypt/decrypt the encrypted data portion. Only those who have the proper access privileges are permitted to retrieve the file key to encrypt/decrypt the encrypted data portion.
Kforce Inc
Client Relationship Manager
Signature Consultants Jan 2016 - Aug 2018
Account Manager
Brookfield Residential Apr 2012 - Aug 2015
Intern
Education:
Arizona State University 2011 - 2015
Bachelors, Business, Communications
Skills:
Customer Service Microsoft Excel Microsoft Office Leadership Management Microsoft Word Team Leadership Powerpoint Recruiting Team Building Public Speaking Sales Time Management Real Estate Transactions Research Project Management Sales Management Real Estate Marketing
Squar Milner since Jan 2013
Help Desk Specialist
Freight Capital May 2012 - Dec 2012
Helpdesk Technician
Freight Capital Jul 2011 - May 2012
New Business Coordinator
Dick’s Sporting Goods Sep 2009 - Jul 2011
Lead and Technician
Dick's Sporting Goods Sep 2009 - Jul 2011
Certified Fitness Trainer
Education:
MiraCosta College 2012 - 2015
University of Colorado at Boulder 2007 - 2008
Honor & Awards:
Highest Rank of Eagle Scout from The Boy Scouts of America in 2006
Washington, DCChair, High School Art Department at Georgetown Da... Artist and teacher working and living in Washington, DC. I grew up in Connecticut and still spend my summers in New England, mostly in Provincetown... Artist and teacher working and living in Washington, DC. I grew up in Connecticut and still spend my summers in New England, mostly in Provincetown, Massachusetts.
nicholas ryan (1996-2000), robert lansaw (1963-1967), Debbie Brate (1977-1981), Robert Tracy (1977-1981), Beth Barker (1970-1974), Donelle Crow (1990-1994)