Jan 2000 to 2000 Child care directorKids n Care Mandan, ND May 2007 to Apr 2008 Teachers aidWal-Mart Brooklyn Park, MN May 2003 to Apr 2007 Layaway AssociateDairy Queen Springfield, IL Mar 1999 to Feb 2003 Shift Manager
Education:
Pawnee High School Pawnee, IL 1991 to 1995 Diploma in General
Skills:
Management<br/>Filing<br/>Repo... Preparation<br/>Organization<b... Skills<br/>Customer Service Skills<br/>Cash Handling<br/>Cashier<br/>Stock...
Us Patents
Systems And Methods For Maintaining Data Security Across Multiple Active Domains
Jason Chambers - Dunwoody GA, US Theresa Robison - Sandy Springs GA, US Dameion Dorsner - Atlanta GA, US Sridhar Manickam - Alpharetta GA, US Daniel Konisky - Atlanta GA, US
International Classification:
H04L 9/28
US Classification:
713168
Abstract:
Systems and methods for maintaining data security across multiple active domains are presented. Each domain includes a token generator that can generate tokens associated with sensitive data such as credit card numbers. The primary domain includes a centralized key manager. In one embodiment, each domain includes its own local data vault and a replica of each data vault associated with every remote domain. Any domain can access the data vaults (local and replica) and retrieve a token created by any other domain. The possibility of token collision is eliminated by a token generation algorithm that embeds a domain designator corresponding to the active domain where the token was created. When multiple tokens represent the same sensitive data, the token manager returns a set of all such tokens found in the data vaults.
Certificate-Based Mutual Authentication For Data Security
Jason Chambers - Dunwoody GA, US Theresa Robison - Sandy Springs GA, US Dameion Dorsner - Atlanta GA, US Sridhar Manickam - Alpharetta GA, US Daniel Konisky - Atlanta GA, US
International Classification:
H04L 9/28
US Classification:
713169
Abstract:
Systems and methods for maintaining data security using client roles, API keys, and certificate-based mutual authentication are presented. A method of protecting sensitive data includes both client authorization techniques and the mutual exchange and verification of certificates between client and server. In one embodiment, access by a client to a server is further limited by temporal constraints, volume constraints, and an end user identity filter.
Luhn Validation And Data Security Across Multiple Active Domains
Jason Chambers - Dunwoody GA, US Theresa Robison - Sandy Springs GA, US Dameion Dorsner - Atlanta GA, US Sridhar Manickam - Alpharetta GA, US Daniel Konisky - Atlanta GA, US
International Classification:
G06F 21/00
US Classification:
726 6
Abstract:
Systems and methods for maintaining data security using Luhn validation in a multiple domain computing environment are presented. Each domain includes a token generator that can generate tokens associated with sensitive data such as credit card numbers. The token generation algorithm includes a Luhn validation routine for producing a tokenized data string that either passes or fails Luhn. The possibility of token collision is eliminated by a token generation algorithm that embeds a domain designator corresponding to the active domain where the token was created. When multiple tokens represent the same sensitive data, the token manager returns a set of all such tokens found.
Key Rotation And Selective Re-Encryption For Data Security
Jason Chambers - Dunwoody GA, US Theresa Robison - Sandy Springs GA, US Dameion Dorsner - Atlanta GA, US Sridhar Manickam - Alpharetta GA, US Daniel Konisky - Atlanta GA, US
International Classification:
H04L 9/00
US Classification:
380 44
Abstract:
Systems and methods for maintaining data security through encryption key retirement and selective re-encryption are presented. A method of selectively re-encrypting a subset of encrypted values includes storing each encrypted value together with the key profile number for the encryption key that was used to generate that encrypted value. When a key is compromised, its associated key profile number allows the efficient identification of all the encrypted values that were created using the now-compromised key. Once identified, the encrypted values may be decrypted using the compromised key and re-encrypted using a new key, without changing other related data such as the token associated with the encrypted value.
Googleplus
Theresa Robison
Lived:
Atlanta, GA
Work:
Liaison Technologies - Software Architect
Education:
Virginia Polytechnic Institute and State University
Sandymount Elementary School Marlow Heights MD 1968-1973, Benjamin Stoddert Middle School Temple Hills MD 1974-1976, Potomac High School Oxon Hill MD 1975-1979