Perspectives on Method and Theory in the Study of Religion: Adjunct Proceedings of the Xviith Congress of the International Associationor the History of Religions, Mexico City, 1995
Leonhard E. Bernold - Cary NC Steven J. Lorenc - Apex NC Scott D. Elliott - Holly Springs NC Michael S. Cobb - Hillsborough NC Anders R. Green - Apex NC
Assignee:
North Carolina State University - Raleigh NC
International Classification:
G06G 776
US Classification:
701 50, 340685, 212276
Abstract:
A crane monitoring system and method is characterized by a plurality of sensors mounted to a crane which communicate data to an on-board control unit. The control unit is characterized by having âblack boxâ functionality. A tip switch is mounted in parallel relation to the vertical portion of a hoist cable below the boom tip. The control unit processes and stores input data from the sensors which will indicate unsafe crane conditions, defined as alarm events such as dragging and extrication events. Each stored event has a time and date stamp. Upon detection of an alarm event, the control unit logs data from the sensors into a non-volatile memory, along with the data from a period of time prior to the alarm event. Data is stored continuously until the alarm event clears. Additional data is stored for a period of time after the conclusion of the alarm event.
Data Processing System And Method For Maintaining Secure User Private Keys In Non-Secure Storage
David Carroll Challener - Raleigh NC, US Daryl Carvis Cromer - Apex NC, US Mark Charles Davis - Durham NC, US Scott Thomas Elliott - Raleigh NC, US Howard Jeffrey Locker - Cary NC, US Andy Lloyd Trotter - Raleigh NC, US James Peter Ward - Raleigh NC, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F011/30 H04L009/00
US Classification:
713194, 380281, 380282, 380284, 380285
Abstract:
A data processing system and method are disclosed for maintaining secure user private keys in a non-secure storage device. A master key pair is established for the system. The master key pair includes a master private key and a master public key. The master key pair is stored in a protected storage device. A unique user key pair is established for each user. The user key pair includes a user private key and a user public key. The user private key is encrypted utilizing the master public key. The encrypted user private key is stored in the non-secure storage device, wherein the encrypted user private key is secure while stored in the non-secure storage device.
Method And System For Securing Enablement Access To A Data Security Device
Daryl Carvis Cromer - Apex NC, US Scott Thomas Elliott - Raleigh NC, US James Patrick Hoff - Wake Forest NC, US Howard Jeffrey Locker - Cary NC, US David Rivera - Durham NC, US Randall Scott Springfield - Chapel Hill NC, US James Peter Ward - Raleigh NC, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
H04L 29/02 H04L 29/18 H04L 9/34
US Classification:
713193, 713167
Abstract:
An embedded security subsystem, and method for implementing the same, which provide secure controllability of a data security device within a data processing system. The embedded security subsystem of the present invention includes a persistent enable flag for providing control access to the data security device, wherein the persistent enable flag is accessible only in response to a power-on reset cycle of the data processing system. The persistent enable flag is read-only accessible to runtime program instructions. A pending state change flag that is write accessible by runtime program instructions is utilized for setting an intended next state of the persistent enable flag such that control access to the data security device is enabled only during a subsequent power-on reset of said data processing system.
Scott Thomas Elliott - Raleigh NC, US James Patrick Hoff - Raleigh NC, US Christopher Scott Long - Chapel Hill NC, US David Rivera - Durham NC, US James Peter Ward - Raleigh NC, US
Assignee:
Lenovo (Singapore) Pte Ltd. - Singapore
International Classification:
H04L 9/00
US Classification:
713164, 713165, 713189, 707204
Abstract:
A method, system and computer program product for securing decrypted files in a shared environment. A filter driver in a kernel space may be configured to control service requests to encrypted files stored in a shared area, e. g. , a shared directory on a disk unit, accessible by multiple users. The filter driver may receive a service request to open an encrypted document in the shared area issued from an authorized user. Upon receiving the encrypted data, the filter driver may decrypt the encrypted data. The filter driver may subsequently store the decrypted data in a file in a non-shared area, e. g. , a non-shared directory. The non-shared area may be accessible only by the authorized user that requested access to the encrypted file. By storing the decrypted data in a file in the non-shared area, a file once decrypted may be protected in a file sharing environment.
Ryan Charles Catherman - Raleigh NC, US David Carroll Challener - Raleigh NC, US Scott Thomas Elliott - Raleigh NC, US James Patrick Hoff - Raleigh NC, US
Assignee:
Lenovo (Singapore) Pte. Ltd. - Singapore
International Classification:
H04L 29/06 G06F 9/00
US Classification:
713155, 713156, 726 10, 726 12
Abstract:
A method and system for remotely storing a user's admin key to gain access to an intranet is presented. The user's admin key and intranet user identification (ID) are encrypted using an enterprise's public key, and together they are concatenated into a single backup admin file, which is stored in the user's client computer. If the user needs his admin file and is unable to access it in a backup client computer, he sends the encrypted backup admin file to a backup server and his unencrypted intranet user ID to an intranet authentication server. The backup server decrypts the user's single backup admin file to obtain the user's admin key and intranet user ID. If the unencrypted intranet user ID in the authentication server matches the decrypted intranet user ID in the backup server, then the backup server sends the backup client computer the decrypted admin key.
Method And Apparatus For Implementing A Consumer-Configurable Modular Electrical System
Susan Banks - Durham NC, US Scott D. Elliott - Holly Springs NC, US Brad Forrest - Cary NC, US
International Classification:
G06F 1/28 G06F 19/00
US Classification:
700 19, 700 20, 700295
Abstract:
A system of electrical modules includes a plurality of modules, including power modules, control modules, and output modules. Power modules provide power for powering one or more control and output modules. Control modules provide control signals to one or more output modules. Output modules perform predefined functions responsive to receiving power from a power module and/or a control signal from a control module. All of the modules have like mating connectors and like connector wiring. This arrangement forms a system bus across any given plurality of modules, when those modules are serially interconnected in a daisy chain. In at least one embodiment, the mating connectors and the connector wiring are standardized across the system such that any module can be coupled to any other module, and the ordering of the modules in the daisy chain is not fixed.
Method And System For Binding A Device To A Planar
Scott T. Elliott - Rolesville NC, US James P. Hoff - Wake Forest NC, US Scott Long - Chapel NC, US James P. Ward - Raleigh NC, US
Assignee:
Lenovo (Singapore) Pte Ltd. - Singapore
International Classification:
G06F 7/04
US Classification:
726 2, 726 34, 726 35, 713194
Abstract:
A method and system for binding a device to a planar is disclosed. According to the preferred embodiment of the method and system of the present invention, a programmable memory chip is provided on the planar and the device is detachably attached to the planar. The method and system further includes using the programmable memory chip to bind the device to the planar. Through the aspects of the present invention, the programmable memory chip transmits a message associated with the planar to the device, which is programmed to receive the message associated with the planar. If the message received by the device is not the message associated with the planar, the device is disabled.
Method And System For Key Usage Control In An Embedded Security System
Scott Elliott - Raleigh NC, US James Hoff - Raleigh NC, US Christopher Long - Chapel Hill NC, US David Rivera - Durham NC, US Andy Trotter - Raleigh NC, US James Ward - Raleigh NC, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
H04K001/00
US Classification:
380/277000
Abstract:
A method and system for control of key pair usage in a computer system is disclosed. The method and system comprise creating key pair material for utilization with an embedded security chip of the computer system. The key pair material includes tag data. The method and system further includes determining whether the key pair material is bound to the embedded security chip based on the tag data. Through the present invention, more flexibility for control over which keys are bound to an embedded security system is achieved. These and other advantages of the aspects of the present invention will be more fully understood in conjunction with the following detailed description and accompanying drawings.
License Records
Scott Douglas Elliott
Address:
310 Raleigh St, Holly Springs, NC 27540
Phone:
9193426899
License #:
14903-L - Active
Category:
Electrican
Issued Date:
May 1, 2016
Expiration Date:
Apr 30, 2017
Type:
Limited Classification
Organization:
Elliott Tech LLC
Name / Title
Company / Classification
Phones & Addresses
Mr. Scott D. Elliott President
Elliott Tech, LLC Computer Software Services. Electronics Research Development Companies
350 Raleigh St, Holly Springs, NC 27540 9193426899, 4802753311
UNC Liver Center 101 Manning Dr Cb 7584, Chapel Hill, NC 27514 9199662516 (phone), 9849743414 (fax)
Languages:
English Spanish
Description:
Mr. Elliott works in Chapel Hill, NC and specializes in Hepatology and Gastroenterology. Mr. Elliott is affiliated with North Carolina Memorial Hospital and Rex Hospital.
Manchester Music Base - Performing Musician 2-3B and Music Higher National Diploma, Brookway High School
Relationship:
Single
About:
I make music and shit. In that order. I play a few instruments, but I'm more of a composer than a performer. Mostly because I'm shit at all my instruments.
Bragging Rights:
I have the smallest penis in the world by literal miles.
Scott Elliott
Work:
TechZecs LLC - Founder & President
Education:
University of California, Santa Barbara - PhD EE, University of California, Berkeley - MS, BS EE
Scott Elliott
Work:
Strong Tower Consulting
Scott Elliott
Tagline:
Web Strategist and Social Media Evangelist for Sprott-Shaw Community College
Scott Elliott
Tagline:
C'est moi!
Bragging Rights:
I have the entire extant catalogue of Kurasawa films on DVD.
Scott Elliott
Tagline:
Administrator | Editor | Web Designer | Reviewer | Chuck Fan | Android Fan | Gamer | Listener of music
Scott Elliott
Tagline:
Owner Oramel Inn www.oramelinn.com
Scott Elliott
About:
It won't let me capitalise the S. Very annoying.
Youtube
scott elliott teaser 2009
scott elliott teaser 2009 some flips and stuff :) member of team sheff...
Category:
Entertainment
Uploaded:
12 Jul, 2009
Duration:
1m 47s
Harry Scott Elliott - ''Kane'd'' Guitarist
Harry Scott Elliott - Guitarist from the band ''Kane'd''
Category:
Music
Uploaded:
10 Jul, 2008
Duration:
1m 6s
Rolling Stones Sway (cover) -Scott Elliott
Song #7 Acoustic cover from CT Film Fest. 2010.
Category:
Music
Uploaded:
09 May, 2010
Duration:
2m 52s
Scott Elliott Walking July 31,2007
Scott Walking July 31
Category:
People & Blogs
Uploaded:
06 Aug, 2007
Duration:
1m 29s
Scott elliott
Scotts stag do Worksop
Category:
Autos & Vehicles
Uploaded:
08 Aug, 2009
Duration:
17s
"Holy, Holy, Holy" danced by Scott Elliott
Scott Elliott dances, Dan Lawrence sings "Holy, Holy, Holy" accompanie...
Group, and with its cast of no less accomplished Shepard veterans it is a Buried Child that captures the symbolism and rich poetic imagery that makes Shepard so unique. Originally written in three acts, this production is played without intermission under Scott Elliott's snappy and smart direction.
Date: Feb 18, 2016
Category: Entertainment
Source: Google
Theater review: New Group's revival of Sam Shepard's 'Buried Child' features stand-out Ed Harris
Cast against type by director Scott Elliott, Mad Man alum Sommer effectively taps his dark side as Bradley. Sparks, as always, is magnetic. Madigan and Farmiga need to dig deeper to make their characters less one-note.
Date: Feb 17, 2016
Category: Entertainment
Source: Google
'The Spoils' review: No victors in mean-streaked play written by and starring ...
s not fascinating. Other characters are more interesting and wonderfully acted under Scott Elliotts direction for this New Group production. Sarahs complicated take on her job teaching kids with criminal pasts and Reshmas jones for working on dead people make you want to know more about them
Date: Jun 02, 2015
Category: Entertainment
Source: Google
First Nighter: Jesse Eisenberg's Spoiled "The Spoils," David Greenspan ...
The only mitigating factors in Eisenberg's play are Scott Elliott's fearless direction and the performances. Eisenberg himself obviously created the part so that he could go as far with it as possible, apparently oblivious to the possibility that spectators would quickly resist going along with him
This play, while intense, feels bald and dated more often than it does bold and razor-sharp. Quirky and committed performances by director Scott Elliotts star-dusted cast offer some compensation.
New Group artistic director Scott Elliott has staged the play with careful attention to the simultaneous unraveling of each character as they attempt to obliterate the sorrow David has brought home. Although the play feels too long, it slowly imprints on the audience, as David experiences repeated r
Scott Elliott's expertly rendered production (which trims the text down just a tad) not only fully honors playwright Rabe's adventurous, uncompromised intentions, but quite possibly makes the prose more relevant than ever thanks to the rise of PTSD. David (wonderfully played by rising star David Sc
All praise to Scott Elliott, the director, and his cast, who get more out of Sticks and Bones than Mr. Rabe put into it. Top honors go to Mr. Pullman, whose scalding performance deserves a better play, and Richard Chamberlain, a TV heartthrob of the 60s who is making his welcome return to the Ame