Search

William Moon Phones & Addresses

  • Lyman, SC
  • Snow Camp, NC
  • Cotopaxi, CO
  • Canon City, CO
  • Bullhead City, AZ
  • Durham, NC
  • Lexington, NC
  • Greer, SC
  • Spartanburg, SC
  • Freeman, CO

Professional Records

Medicine Doctors

William Moon Photo 1

William A Moon

View page
Specialties:
Pediatrics
Pediatric Allergy & Immunology
Preventive Medicine
Infectious Disease
Education:
Washington University at St. Louis (1957)

License Records

William A Moon

Phone:
(321) 442-2147
License #:
7469 - Expired
Category:
Health Care
Issued Date:
Aug 27, 1976
Effective Date:
Mar 14, 2016
Expiration Date:
Feb 28, 2014
Type:
Dental

Business Records

Name / Title
Company / Classification
Phones & Addresses
William A Moon
QUATENUS CORP
William A Moon
DYNA-TECH. PLASTICS, INC
William Moon
Owner, President
Upstate Appraisal, Inc
Real Estate Agent/Manager · Real Estate Appraisal
780 Un St, Spartanburg, SC 29306
PO Box 1863, Spartanburg, SC 29304
(864) 582-1700, (864) 583-1729, (864) 583-1728
William Moon
Director
West Boca Baseball Club, Inc

Publications

Us Patents

Distributed Security In A Secure Peer-To-Peer Data Network Based On Real-Time Guardian Protection Of Network Devices

View page
US Patent:
20220417252, Dec 29, 2022
Filed:
Jun 29, 2021
Appl. No.:
17/361501
Inventors:
- Durham NC, US
WILLIAM VICTOR MOON - Chapel Hill NC, US
Assignee:
WhiteStar Communications, Inc. - Durham NC
International Classification:
H04L 29/06
Abstract:
In one embodiment, a method comprises: securing, by a security agent executed within a network device, first secure data structures for secure storage in the network device and second secure data structures for secure communications in a secure peer-to-peer data network; monitoring, by the security agent, a corresponding mandatory lifecycle policy for each of the first secure data structures; and cryptographically erasing one of the first secure data structures in response to expiration of the corresponding mandatory lifecycle policy.

Secure Keyboard Resource Limiting Access Of User Input To Destination Resource Requesting The User Input

View page
US Patent:
20230111701, Apr 13, 2023
Filed:
Oct 7, 2021
Appl. No.:
17/496164
Inventors:
- Durham NC, US
WILLIAM VICTOR MOON - Chapel Hill NC, US
FABIAN REDDIG - Mebane NC, US
Assignee:
WhiteStar Communications, Inc. - Durham NC
International Classification:
H04L 29/06
G06F 21/60
G06F 9/54
H04L 9/30
Abstract:
A secure keyboard resource executed in a network device detects a user input, and generates a user input data structure representing the user input relative to input options presented to the user, the user input data structure based on the secure keyboard resource identifying a position of the user input relative to the input options. The secure keyboard resource sends the user input data structure to one or more executable destination resources, having requested supply of the user input data structure responsive to a user selection, only via a corresponding data path providing the destination resource with access to the user input data structure, for execution of a service by the one or more executable destination resources based on the user input data structure. The secure keyboard resource thus minimizes spying by limiting access of the user input data structure to the destination resource via the data path.

Secure Device Access Recovery Based On Validating Encrypted Target Password From Secure Recovery Container In Trusted Recovery Device

View page
US Patent:
20230060803, Mar 2, 2023
Filed:
Aug 30, 2021
Appl. No.:
17/461632
Inventors:
- Durham NC, US
WILLIAM VICTOR MOON - Chapel Hill NC, US
AARON DANIEL FLESHNER - Durham NC, US
CHRISTOPHER MICHEAL SCALCUCCI - Raleigh NC, US
Assignee:
WhiteStar Communications, Inc. - Durham NC
International Classification:
H04L 9/08
H04L 9/32
Abstract:
Secure access recovery to a network device includes encrypting a user password into an encrypted target password using a secret regenerative key, and adding a one-time password seed and the encrypted target password into a secure recovery container, which is stored securely in the network device and a trusted recovery device. In response to a recovery request, a one-time password can be generated using the one-time password seed to retrieve the encrypted target password from the recovery device. A decrypted recovery password is generated based on executing decryption on an input string based on the secret regenerative key. The encrypted target password, retrieved from the secure recovery container in the network device, is decrypted into a decrypted target password based on the secret regenerative key. Secure access is recovered in response to determining the decrypted recovery password matches at least a part of the decrypted target password.
William G Moon from Lyman, SC, age ~84 Get Report