IBM Jun 2007 - Feb 2009
Software Engineer
Virginia Tech Aug 2006 - May 2008
Graduate Research Assistant
IBM May 2006 - Aug 2006
Software Engineer (intern)
Virginia Tech May 2004 - Dec 2005
Undergraduate Researcher
Education:
Virginia Polytechnic Institute and State University 2006 - 2008
Masters, Computer Engineering, Networks & Network Security
Virginia Polytechnic Institute and State University 2002 - 2006
BS, Computer EngineeringTorgerson Leadership Award
ECE Senior of the Year
Skills:
Cloud Computing Security Enterprise Software Linux Network Security Saas Integration Java Testing Agile Methodologies Information Security Unix Software Development Xml Computer Security Perl Enterprise Architecture Scrum Software Documentation Software Design Software As A Service Python Eclipse Groovy Architecture Architectures
Jason Chambers - Dunwoody GA, US Theresa Robison - Sandy Springs GA, US Dameion Dorsner - Atlanta GA, US Sridhar Manickam - Alpharetta GA, US Daniel Konisky - Atlanta GA, US
International Classification:
H04L 9/28
US Classification:
713168
Abstract:
Systems and methods for maintaining data security across multiple active domains are presented. Each domain includes a token generator that can generate tokens associated with sensitive data such as credit card numbers. The primary domain includes a centralized key manager. In one embodiment, each domain includes its own local data vault and a replica of each data vault associated with every remote domain. Any domain can access the data vaults (local and replica) and retrieve a token created by any other domain. The possibility of token collision is eliminated by a token generation algorithm that embeds a domain designator corresponding to the active domain where the token was created. When multiple tokens represent the same sensitive data, the token manager returns a set of all such tokens found in the data vaults.
Certificate-Based Mutual Authentication For Data Security
Jason Chambers - Dunwoody GA, US Theresa Robison - Sandy Springs GA, US Dameion Dorsner - Atlanta GA, US Sridhar Manickam - Alpharetta GA, US Daniel Konisky - Atlanta GA, US
International Classification:
H04L 9/28
US Classification:
713169
Abstract:
Systems and methods for maintaining data security using client roles, API keys, and certificate-based mutual authentication are presented. A method of protecting sensitive data includes both client authorization techniques and the mutual exchange and verification of certificates between client and server. In one embodiment, access by a client to a server is further limited by temporal constraints, volume constraints, and an end user identity filter.
Luhn Validation And Data Security Across Multiple Active Domains
Jason Chambers - Dunwoody GA, US Theresa Robison - Sandy Springs GA, US Dameion Dorsner - Atlanta GA, US Sridhar Manickam - Alpharetta GA, US Daniel Konisky - Atlanta GA, US
International Classification:
G06F 21/00
US Classification:
726 6
Abstract:
Systems and methods for maintaining data security using Luhn validation in a multiple domain computing environment are presented. Each domain includes a token generator that can generate tokens associated with sensitive data such as credit card numbers. The token generation algorithm includes a Luhn validation routine for producing a tokenized data string that either passes or fails Luhn. The possibility of token collision is eliminated by a token generation algorithm that embeds a domain designator corresponding to the active domain where the token was created. When multiple tokens represent the same sensitive data, the token manager returns a set of all such tokens found.
Key Rotation And Selective Re-Encryption For Data Security
Jason Chambers - Dunwoody GA, US Theresa Robison - Sandy Springs GA, US Dameion Dorsner - Atlanta GA, US Sridhar Manickam - Alpharetta GA, US Daniel Konisky - Atlanta GA, US
International Classification:
H04L 9/00
US Classification:
380 44
Abstract:
Systems and methods for maintaining data security through encryption key retirement and selective re-encryption are presented. A method of selectively re-encrypting a subset of encrypted values includes storing each encrypted value together with the key profile number for the encryption key that was used to generate that encrypted value. When a key is compromised, its associated key profile number allows the efficient identification of all the encrypted values that were created using the now-compromised key. Once identified, the encrypted values may be decrypted using the compromised key and re-encrypted using a new key, without changing other related data such as the token associated with the encrypted value.
Googleplus
Theresa Robison
Lived:
Atlanta, GA
Work:
Liaison Technologies - Software Architect
Education:
Virginia Polytechnic Institute and State University
Sandymount Elementary School Marlow Heights MD 1968-1973, Benjamin Stoddert Middle School Temple Hills MD 1974-1976, Potomac High School Oxon Hill MD 1975-1979