Search

Michael Ouye Phones & Addresses

  • 2203 Stonewall Ct, Anthem, AZ 85086 (623) 551-8278
  • 2203 Stonewall Dr, Anthem, AZ 85086 (623) 551-8278
  • 931 La Mesa Dr, Portola Valley, CA 94028
  • Menlo Park, CA
  • 9582 Redwood Ct, Carmel, CA 93923
  • 400 Ortega Ave, Mountain View, CA 94040
  • Palo Alto, CA
  • Sacramento, CA
  • Los Altos, CA

Public records

Vehicle Records

Michael Ouye

View page
Address:
2203 W Stonewall Dr, Anthem, AZ 85086
Phone:
(623) 551-8278
VIN:
JTHFE2C23A2502526
Make:
LEXUS
Model:
IS 350C
Year:
2010

Resumes

Resumes

Michael Ouye Photo 1

Web And Php And Javascript Consultant

View page
Location:
Phoenix, AZ
Industry:
Computer Software
Work:
Worldatwork Dec 2006 - Dec 2013
Web and Java Consultant

Gee Whiz Labs Dec 2006 - Dec 2013
Web and Php and Javascript Consultant

Honeywell Mar 2006 - Oct 2006
Java Consultant and Contract

Laszlo Systems Jan 2005 - Jul 2005
Vice President Engineering

Pss Systems 2001 - 2004
Vice President Engineering
Education:
Santa Clara University 1978 - 1982
Master of Science, Masters, Computer Science
California State University - Sacramento 1974 - 1977
Bachelors, Bachelor of Science, Computer Science
Michael Ouye Photo 2

Vice President, Monetization At Crowdstar

View page
Location:
San Francisco Bay Area
Industry:
Marketing and Advertising

Business Records

Name / Title
Company / Classification
Phones & Addresses
Michael Ouye
Manager, Principal
SHOOTING LIGHT, LLC
Business Services at Non-Commercial Site
2203 W Stonewall Dr, Phoenix, AZ 85086

Publications

Us Patents

Method And System For Securing Digital Assets Using Process-Driven Security Policies

View page
US Patent:
7703140, Apr 20, 2010
Filed:
Sep 30, 2003
Appl. No.:
10/677049
Inventors:
Satyajit Nath - Cupertino CA, US
Klimenty Vainstein - Cupertino CA, US
Michael Michio Ouye - Los Altos CA, US
Assignee:
Guardian Data Storage, LLC - Wilmington DE
International Classification:
G06F 21/24
US Classification:
726 26, 713165, 713167
Abstract:
Techniques for dynamically altering security criteria used in a file security system are disclosed. The security criteria pertains to keys (or ciphers) used by the file security system to encrypt electronic files to be secured or to decrypt electronic files already secured. The security criteria can, among other things, include keys that are required to gain access to electronic files. Here, the keys can be changed automatically as electronic files transition between different states of a process-driven security policy. The dynamic alteration of security criteria enhances the flexibility and robustness of the security system. In other words, access restrictions on electronic files can be dependent on the state of the process-driven security policy.

Managing Secured Files In Designated Locations

View page
US Patent:
7729995, Jun 1, 2010
Filed:
Jul 22, 2002
Appl. No.:
10/201756
Inventors:
Rossmann Alain - Palo Alto CA, US
Patrick Zuili - Palo Alto CA, US
Michael Michio Ouye - Portola Valley CA, US
Serge Humpich - Tournan-en-Brie, FR
Chang-Ping Lee - Palo Alto CA, US
Klimenty Vainstein - Morgan Hill CA, US
Hal Hilderbrand - Moss Beach CA, US
Denis Jacques Paul Garcia - Palo Alto CA, US
Senthilvasan Supramaniam - San Calros CA, US
Weiqing Huang - Sunnyvale CA, US
Nicholas Michael Ryan - Sunnyvale CA, US
International Classification:
G06F 17/60
US Classification:
705 71, 705 64, 705 67
Abstract:
Techniques for managing files in a designated location are disclosed. An example of the designated location is a folder, a directory, a repository, a device, or a storage place. A set of access rules is applied to a designated location such that all files in the designated location shall have substantially similar security. As a result, secured files can be easily created and managed with respect to the designated location and users with access privilege to the designated location can access most of the files, in not all, in the designated location.

Security System With Staging Capabilities

View page
US Patent:
7890990, Feb 15, 2011
Filed:
Dec 20, 2002
Appl. No.:
10/327320
Inventors:
Klimenty Vainstein - Cupertino CA, US
Michael Michio Ouye - Los Altos CA, US
International Classification:
H04L 29/06
US Classification:
726 1, 717176
Abstract:
An improved system and method for providing a security system with the capability to stage a modification to its operation is disclosed. Staging the modification before actually modifying normal operation of the security system allows the impact of the modification on the security system to be examined prior to deployment. If the staging of the modification to the security system is deemed successful, the modification can be fully deployed with reduced risk of unexpected security lapses or other detrimental consequences.

Methods And Systems For Providing Access Control To Electronic Data

View page
US Patent:
7913311, Mar 22, 2011
Filed:
Aug 10, 2007
Appl. No.:
11/889310
Inventors:
Rossmann Alain - Palo Alto CA, US
Patrick Zuili - Palo Alto CA, US
Michael Michio Ouye - Portola Valley CA, US
Serge Humpich - Tournan-en-Brie, FR
Chang-Ping Lee - Palo Alto CA, US
Klimenty Vainstein - Morgan Hill CA, US
Hal Hilderbrand - Moss Beach CA, US
Denis Jacques Paul Garcia - Palo Alto CA, US
Senthilvasan Supramaniam - San Carlos CA, US
Weiqing Huang - Sunnyvale CA, US
Nicholas Michael Ryan - Sunnyvale CA, US
International Classification:
G06F 12/14
G06F 21/00
US Classification:
726 28, 705 51, 705 52, 726 26, 726 27, 726 29, 713182
Abstract:
Techniques for providing pervasive security to digital assets are disclosed. According to one aspect of the techniques, a server is configured to provide access control (AC) management for a user (e. g. , a single user, a group of users, software agents or devices) with a need to access secured data. Within the server module, various access rules for the secured data and/or access privileges for the user can be created, updated, and managed so that the user with the proper access privileges can access the secured documents if granted by the corresponding access rules in the secured data.

Method And Apparatus For Transitioning Between States Of Security Policies Used To Secure Electronic Documents

View page
US Patent:
8127366, Feb 28, 2012
Filed:
Sep 30, 2003
Appl. No.:
10/676474
Inventors:
Klimenty Vainstein - Cupertino CA, US
Satyajit Nath - Cupertino CA, US
Michael Michio Ouye - Mountain View CA, US
Assignee:
Guardian Data Storage, LLC - Wilmington DE
International Classification:
G06F 17/30
US Classification:
726 27, 726 1
Abstract:
Techniques for dynamically altering security criteria used in a file security system are disclosed. The security criteria pertains to keys (or ciphers) used by the file security system to encrypt electronic files to be secured or to decrypt electronic files already secured. The security criteria can, among other things, include keys that are required to gain access to electronic files. Here, the keys can be changed automatically as electronic files transition between different states of a process-driven security policy. The dynamic alteration of security criteria enhances the flexibility and robustness of the security system. In other words, access restrictions on electronic files can be dependent on the state of the process-driven security policy and enforced in conjunction with one or more cryptographic methods.

Method And System For Securing Digital Assets Using Process-Driven Security Policies

View page
US Patent:
8327138, Dec 4, 2012
Filed:
Apr 16, 2010
Appl. No.:
12/762028
Inventors:
Satyajit Nath - Cupertino CA, US
Klimenty Vainstein - Cupertino CA, US
Michael Michio Ouye - Mountain View CA, US
Assignee:
Guardian Data Storage LLC - Wilmington DE
International Classification:
H04L 29/06
US Classification:
713165, 713167, 713193, 726 27, 726 28, 726 30
Abstract:
Techniques for dynamically altering security criteria used in a file security system are disclosed. The security criteria pertains to keys (or ciphers) used by the file security system to encrypt electronic files to be secured or to decrypt electronic files already secured. The security criteria can, among other things, include keys that are required to gain access to electronic files. Here, the keys can be changed automatically as electronic files transition between different states of a process-driven security policy. The dynamic alteration of security criteria enhances the flexibility and robustness of the security system. In other words, access restrictions on electronic files can be dependent on the state of the process-driven security policy.

Methods And Systems For Providing Access Control To Secured Data

View page
US Patent:
8543827, Sep 24, 2013
Filed:
Mar 27, 2008
Appl. No.:
12/057015
Inventors:
Denis Jacques Paul Garcia - Palo Alto CA, US
Michael Michio Ouye - Mountain View CA, US
Alain Rossmann - Palo Alto CA, US
Steven Toye Crocker - Burlingame CA, US
Eric Gilbertson - Menlo Park CA, US
Weiqing Huang - Flower Mound TX, US
Serge Humpich - Tournan-en-Brie, FR
Klimenty Vainstein - San Francisco CA, US
Nicholas Michael Ryan - Sunnyvale CA, US
Assignee:
Intellectual Ventures I LLC - Wilmington DE
International Classification:
G06F 7/04
US Classification:
713184, 713166, 713167, 713168, 713169, 713170, 726 26, 726 27, 726 28, 726 29, 726 30
Abstract:
In a system for providing access control management to electronic data, techniques to secure the electronic data and keep the electronic data secured at all times are disclosed. According to one embodiment, a secured file or secured document includes two parts: an attachment, referred to as a header, and an encrypted document or data portion. The header includes security information that points to or includes the access rules and a file key. The access rules facilitate restrictive access to the secured document and essentially determine who/when/how/where the secured document can be accessed. The file key is used to encrypt/decrypt the encrypted data portion. Only those who have the proper access privileges are permitted to retrieve the file key to encrypt/decrypt the encrypted data portion.

Method And Architecture For Providing Pervasive Security To Digital Assets

View page
US Patent:
20030110131, Jun 12, 2003
Filed:
Feb 12, 2002
Appl. No.:
10/076254
Inventors:
Rossmann Alain - Palo Alto CA, US
Patrick Zuili - Palo Alto CA, US
Michael Ouye - Portola Valley CA, US
Serge Humpich - Tournan-en-Brie, FR
Chang-Ping Lee - Palo Alto CA, US
Klimenty Vainstein - Morgan Hill CA, US
Hal Hilderbrand - Moss Beach CA, US
Denis Garcia - Palo Alto CA, US
Senthilvasan Supramaniam - San Calros CA, US
Weiqing Huang - Sunnyvale CA, US
Nicholas Ryan - Sunnyvale CA, US
Assignee:
SecretSEAL Inc. - Menlo Park CA
International Classification:
G06F017/60
US Classification:
705/051000
Abstract:
Techniques for providing pervasive security to digital assets are disclosed. According to one aspect of the techniques, a server is configured to provide access control (AC) management for a user (e.g., a single user, a group of users, software agents or devices) with a need to access secured data. Within the server module, various access rules for the secured data and/or access privileges for the user can be created, updated and managed so that the user with the proper access privileges can access the secured documents if granted by the corresponding access rules in the secured data.
Michael M Ouye from Anthem, AZ, age ~71 Get Report