Search

Ronald Glen Feigen

from Scottsdale, AZ
Age ~67

Ronald Feigen Phones & Addresses

  • Scottsdale, AZ
  • Tempe, AZ
  • Chandler, AZ
  • Mesa, AZ
  • Chicago, IL
  • Maricopa, AZ
  • Miami Shores, FL

Business Records

Name / Title
Company / Classification
Phones & Addresses
Ronald Feigen
Manager
ROCAR II INVESTMENTS, LLC
23027 N 94 St, Scottsdale, AZ 85255
Ronald Feigen
Manager
HOMES AT THE PEAK, LLC
#200, Scottsdale, AZ 85255
23027 N 94 St, Scottsdale, AZ 85255
Ronald Feigen
Manager, Principal
ROCAR IV INVESTMENTS, LLC
Investor
23027 N 94 St, Scottsdale, AZ 85255

Publications

Us Patents

Remote System Integrity Verification

View page
US Patent:
6925566, Aug 2, 2005
Filed:
Jul 7, 2000
Appl. No.:
09/612142
Inventors:
Ronald Glen Feigen - Tempe AZ, US
Richard Allen Perona - Gilbert AZ, US
James T. Lynn - Mesa AZ, US
Erwin Perry Comer - Queen Creek AZ, US
Assignee:
Motorola, Inc. - Schaumburg IL
International Classification:
G06F011/30
US Classification:
713187, 713189
Abstract:
The integrity of a remote communication unit () in a communication system is verified by comparing a hash value generated within the remote unit () to a hash value generated within a local unit (). An interrogation message is generated within an interrogating entity () that includes a random seed value, memory range information identifying a memory range within the remote unit that is to be hashed, and position information identifying a position at which the random seed value is to be located within a data stream generated within the remote unit (). The interrogation message is then delivered to the remote unit () which then performs a hashing operation based upon the parameters within the interrogation message to generate a hash value. The hash value is then returned to the interrogating entity () for comparison with a control value.

Method For Remotely Verifying Software Integrity

View page
US Patent:
20020138554, Sep 26, 2002
Filed:
Mar 26, 2001
Appl. No.:
09/816191
Inventors:
Ronald Feigen - Tempe AZ, US
Richard Perona - Gilbert AZ, US
James Lynn - Issaquah WA, US
Erwin Comer - Queen Creek AZ, US
Assignee:
Motorola, Inc.
International Classification:
G06F015/177
G06F015/16
US Classification:
709/203000, 709/220000
Abstract:
A method of verifying the integrity of software resident on a remote network appliance is disclosed. The method includes providing a secure hash algorithm coupled with a seed value that may be employed by a network host to verify the integrity of the software associated with one or more network appliances.

Call Drop And Call Block Reduction During Bts And Cbsc Planned Outage Or Upgrade

View page
US Patent:
20080119191, May 22, 2008
Filed:
Nov 16, 2006
Appl. No.:
11/560626
Inventors:
Ronald G. Feigen - Scottsdale AZ, US
Jesse M. Keeler - Tempe AZ, US
Assignee:
MOTOROLA, INC. - Schaumburg IL
International Classification:
H04Q 7/36
US Classification:
455437
Abstract:
A network device for causing a wireless device to hand off Base Transceiver Stations (BTSs) includes a processor for determining at least one BTS that is a neighbor of a candidate BTS, a power level controller for increasing a communication power level of the at least one neighbor BTS so as to provide service to a larger coverage area, and a switch, in communication with the power level controller, and further for taking the candidate BTS off-line in response to increasing the communication power level of the at least one neighbor BTS. A related method is also provided.

Intelligent Selection Of Network Elements For Upgrades

View page
US Patent:
20080152104, Jun 26, 2008
Filed:
Dec 20, 2006
Appl. No.:
11/613255
Inventors:
Jesse M. Keeler - Tempe AZ, US
Juan D. Deaton - Menan ID, US
Ronald G. Feigen - Scottsdale AZ, US
Assignee:
MOTOROLA, INC. - Schaumburg IL
International Classification:
H04M 3/22
US Classification:
37911201
Abstract:
A system () for taking network elements () off-line includes a memory () for storing a record () of a number of calls being handled by a first network element () over a period of time and a processor () communicatively coupled to the memory (), where the processor () is used for setting a threshold value based on the record (), monitoring in substantially real-time, a number of calls being handled by the first network element (), and comparing the number of substantially real-time monitored calls being handled by the first network element () to the threshold value. The system also includes a switch () communicatively coupled to the processor, where the switch () is used to take the first network element () off-line if the number of substantially real-time monitored calls being handled by the first network element is below the threshold value.

Method For Secure Network Access Via Message Intercept

View page
US Patent:
56995130, Dec 16, 1997
Filed:
Mar 31, 1995
Appl. No.:
8/414823
Inventors:
Ronald Glen Feigen - Mesa AZ
Paul Aerick Lambert - Scottsdale AZ
Assignee:
Motorola, Inc. - Schaumburg IL
International Classification:
G06F 1100
US Classification:
39518701
Abstract:
Security is provided for an inside network (14) by a security host (26). Connection request messages sent from source hosts (22) in an outside network (12) are intercepted (94) in the security host (26) and prevented from being transmitted on the inside network (14). The user of the source host (22) then establishes a connection (78) to the security host (26) where a dialog session (80, 98, 100) occurs to confirm the user's authenticity and authorization. After the user is confirmed, the intercepted connection request message is released (116) for transmission on the inside network (14) where the intended application service will respond and a communication session will commence.
Ronald Glen Feigen from Scottsdale, AZ, age ~67 Get Report