Dr. Archer graduated from the University of Colorado School of Medicine at Denver in 1978. He works in Westminster, CO and specializes in Family Medicine. Dr. Archer is affiliated with North Suburban Medical Center and St Anthony North Health Campus.
Kellogg Eye CenterUniversity Of Michigan Kellogg Eye Center 1000 Wall St STE 2051, Ann Arbor, MI 48105 7347638122 (phone), 7349368571 (fax)
Kellogg Eye CenterUniversity Of Michigan Canton Health Center 1051 N Canton Ctr Rd, Canton, MI 48187 7348445400 (phone), 7348445298 (fax)
Education:
Medical School University of Chicago Pritzker School of Medicine Graduated: 1978
Procedures:
Eye Muscle Surgery Lens and Cataract Procedures Ophthalmological Exam
Conditions:
Cataract Glaucoma
Languages:
English
Description:
Dr. Archer graduated from the University of Chicago Pritzker School of Medicine in 1978. He works in Canton, MI and 1 other location and specializes in Ophthalmology and Ophthalmology/pediatrics. Dr. Archer is affiliated with University Of Michigan Hospitals & Health Center and VA Ann Arbor Healthcare System.
Isbn (Books And Publications)
Atlas of Pediatric Ophthalmology and Strabismus Surgery
Steven T. Archer - Dallas TX, US Paul V. Hubner - McKinney TX, US Kristopher A. Pate - Sachse TX, US Francisco A. Dias - Krum TX, US
Assignee:
Verizon Patent and Licensing Inc. - Basking Ridge NJ
International Classification:
G06F 11/00 G06F 7/04
US Classification:
726 22, 726 24, 726 26, 713188, 713189
Abstract:
An exemplary malware detection device includes a data pathway provided between a first data transfer device and a second data transfer device and a processor attached to the data pathway. A memory accessible by the processor contains at least one malware signature and instructions for controlling the processor to interconnect the first and second data transfer devices, direct at least a portion of a data transfer across the data pathway to the processor for analysis, independently analyze the portion of the data transfer using the malware signature, identify malware contained in the portion of the data transfer, and interrupt the data transfer based on the identification of malware.
System And Method For Providing Authentication Continuity
Steven Thomas Archer - Dallas TX, US Lawrence J. Zaykowski - Old Forge PA, US Kristopher Alan Pate - Sachse TX, US Paul V. Hubner - McKinney TX, US Jack Mitchell Farris - Randolph NJ, US
Assignee:
Verizon Patent and Licensing Inc. - Basking Ridge NJ
A computer-implemented method may include receiving first monitored information relating to a user at a time of initial user authentication with a particular application or resource. It may be determined that a second authentication is required at a second time subsequent to the time of initial user authentication. Second monitored information may be captured at the second time. The second monitored information may be compared to the first monitored information to determine whether continued authentication is maintained. Access to the particular application or resource when it is determined that continued authentication is not maintained.
Method And Apparatus For Managing Radio Frequency Identification (Rfid) Tags
An approach is provided for managing network addressable radio frequency identification (RFID) tags. A management agent collects data from a radio frequency identification (RFID) tag that is assigned a network address for visibility within a data network. The agent generates a management message including the data for transmission over the data network to a manager configured to communicate with the agent using a management protocol.
Method And Apparatus For Mapping Radio Frequency Identification (Rfid) Tags To Network Addresses
Francisco A. Dias - Krum TX, US Paul V. Hubner - McKinney TX, US Steven T. Archer - Dallas TX, US Kristopher A. Pate - Sachse TX, US
Assignee:
Verizon Business Network Services Inc. - Ashburn VA MCI Communications Services, Inc. - Ashburn VA
International Classification:
G06F 21/00
US Classification:
726 32
Abstract:
A computing device is configured to receive media content and determine if the received media content includes a stego message. If the media content includes a stego message, then the computing device is further configured to decode at least a portion of the stego message, and perform a task based in part on the decoded portion of the stego message.
Unauthorized Data Transfer Detection And Prevention
Steven T. Archer - Dallas TX, US Paul V. Hubner - McKinney TX, US Kristopher A. Pate - Sachse TX, US Francisco A. Dias - Krum TX, US
Assignee:
Verizon Business Network Services Inc. - Ashburn VA
International Classification:
G06F 21/00 G06F 15/173
US Classification:
726 1, 709224
Abstract:
A method includes receiving a policy via a network connection, wherein the policy includes at least one signature. Receiving a data communication message from a processor of a computing device via a system bus. Identifying a class, and selectively forwarding the data communication message based in part on the received policy and the identified class.
Television Bookmarking With Multiplatform Distribution
Robert A. Clavenna - Lucas TX, US Paul V. Hubner - McKinney TX, US Kristopher A. Pate - Sachse TX, US Steven T. Archer - Dallas TX, US
Assignee:
VERIZON BUSINESS NETWORK SERVICES INC. - Ashburn VA MCI COMMUNICATIONS SERVICES, INC. - Ashburn VA VERIZON CORPORATE RESOURCES GROUP LLC - Basking Ridge NJ
International Classification:
H04N 7/173 H04M 1/00
US Classification:
725109, 725134, 4555561
Abstract:
A system includes a content processing device in communication with a control device, the content processing device is configured to receive multi-media content from a network, and create a bookmark representing at least a portion of the multi-media content upon receiving a signal from the control device.
Method And System For Providing Virtual Credit Card Services
Steven T. Archer - Dallas TX, US Robert A. Clavenna - Lucas TX, US Kristopher A. Pate - Sachse TX, US Paul Hubner - McKinney TX, US
Assignee:
VERIZON PATENT AND LICENSING INC. - Basking Ridge NJ
International Classification:
G06Q 20/00 G06Q 40/00
US Classification:
705 17, 705 39
Abstract:
An approach is provided for virtual credit card services. A request for a limited use transactional account number representing a virtual credit card is generated at a mobile device. The limited use transactional account number is received in response to the request. A point of sale interface is configured with the limited use transactional account number for presentation at a point of sale terminal.