Taher Elgamal - Palo Alto CA, US Jeff Weinstein - Los Gatos CA, US Nelson Bolyard - Milpitas CA, US
Assignee:
Netscape Communications Corporation - Mountain View CA
International Classification:
G06F 9/00
US Classification:
726 11, 726 1, 726 2
Abstract:
Method, apparatus, system, and a file for integrated dynamic encryption and/or decryption for use in an application includes, for example, storage means or unit for storing a plurality of predetermined attributes and corresponding values, and a digital signature, a controller or control means for controlling selective retrieval of a plurality of attributes and values, and the digital signature from the storage unit, processing means or processor for selectively processing the predetermined attributes and values, and the digital signature and in accordance thereto, providing a supportable encryption and/or decryption level to the application, a compressor or compression means for compressing the attributes and values and in accordance thereto generating compressed attributes and values for storing in the storage unit, and decompressing means or decompressor for decompressing the compressed attributes and values in accordance with the controller retrieving the compressed attributes and values.
Physically Secured Authorization For Utility Applications
Raj VASWANI - Portola Valley CA, US Wilson Chuen Yew Yeung - Campbell CA, US Cristina Seibert - Mountain View CA, US Nelson Bruce Bolyard - Milpitas CA, US Benjamin N. Damm - San Francisco CA, US Michael C. StJohns - Germantown MD, US
Assignee:
Silver Spring Networks, Inc. - Redwood City CA
International Classification:
G06F 1/26 G06F 17/00
US Classification:
700295, 700 90
Abstract:
To provide overall security to a utility management system, critical command and control messages that are issued to components of the system are explicitly approved by a secure authority. The explicit approval authenticates the requested action and authorizes the performance of the specific action indicated in a message. Key components of the utility management and control system that are associated with access control are placed in a physical bunker. With this approach, it only becomes necessary to bunker those subsystems that are responsible for approving network actions. Other management modules can remain outside the bunker, thereby avoiding the need to partition them into bunkered and non-bunkered components. Access to critical components of each of the non-bunkered subsystems is controlled through the bunkered approval system.
Cryptographic Policy Filters And Policy Control Method And Apparatus
Taher Elgamal - Palo Alto CA 94306 Jeff Weinstein - Los Gatos CA 95032 Nelson Bolyard - Milpitas CA 95035
International Classification:
H04L 900
US Classification:
713164, 713166, 713172, 713189
Abstract:
Method, apparatus, system, and a file for integrated dynamic encryption and/or decryption for use in an application includes, for example, storage means or unit for storing a plurality of predetermined attributes and corresponding values, and a digital signature, a controller or control means for controlling selective retrieval of a plurality of attributes and values, and the digital signature from the storage unit, processing means or processor for selectively processing the predetermined attributes and values, and the digital signature and in accordance thereto, providing a supportable encryption and/or decryption level to the application, a compressor or compression means for compressing the attributes and values and in accordance thereto generating compressed attributes and values for storing in the storage unit, and decompressing means or decompressor for decompressing the compressed attributes and values in accordance with the controller retrieving the compressed attributes and values.
Automatic Closing Of Non-Secure Ports In A Remote Network Communications Device
- San Jose CA, US Nelson Bolyard - San Jose CA, US Winston Lew - San Jose CA, US
Assignee:
ITRON NETWORKED SOLUSTIONS, INC. - San Jose CA
International Classification:
G06F 21/74 G01D 4/00 G06F 21/82
Abstract:
A communications device has a first communications port via which secure messages are received, and a second communications port via which non-secure messages are received. In response to detecting that a secure message has been received, the device determines whether the second communications port is in a state that enables non-secure messages to be received. If the second communications port is in the enabled state, the device autonomously disables the second communications port to preclude non-secure messages received at that port from being processed.
Physically Secured Authorization For Utility Applications
- Redwood City CA, US Wilson Chuen Yew YEUNG - Campbell CA, US Cristina SEIBERT - Mountain View CA, US Nelson Bruce BOLYARD - Milpitas CA, US Benjamin N. DAMM - San Francisco CA, US Michael C. STJOHNS - Germantown MD, US
To provide overall security to a utility management system, critical command and control messages that are issued to components of the system are explicitly approved by a secure authority. The explicit approval authenticates the requested action and authorizes the performance of the specific action indicated in a message. Key components of the utility management and control system that are associated with access control are placed in a physical bunker. With this approach, it only becomes necessary to bunker those subsystems that are responsible for approving network actions. Other management modules can remain outside the bunker, thereby avoiding the need to partition them into bunkered and non-bunkered components. Access to critical components of each of the non-bunkered subsystems is controlled through the bunkered approval system.
Name / Title
Company / Classification
Phones & Addresses
Nelson B. Bolyard Principal
Mozilla Corp Business Services at Non-Commercial Site · Nonclassifiable Establishments
Silver Spring Networks
Senior Engineer - Embedded Security Software
Sun Microsystems Nov 2004 - Jan 2010
Senior Staff Engineer
Aol Mar 2000 - Oct 2004
Lead Software Design Engineer
Netscape Sep 1996 - Oct 2004
Principal Crypto S and W Engineer
Sgi 1990 - 1996
Software Engineer
Education:
Michigan State University Sep 1974 - Dec 1979
Bachelors, Bachelor of Science, Computer Science
Skills:
Unix Tcp/Ip Security Network Security C Operating Systems Computer Security Software Design Cryptography Networking Open Source Ssl Solaris Linux Servers Pki Open Source Software Secure Sockets Layer Internet Protocol Suite
Principal Sw Engineer Specializing In Cryptography