Search

Francisco G Corella

from Sacramento, CA
Age ~72

Francisco Corella Phones & Addresses

  • 4040 U St, Sacramento, CA 95817 (916) 453-1256
  • 1921 Kincaid Way, Sacramento, CA 95825
  • Hayward, CA
  • 5120 Marconi Ave APT 26, Carmichael, CA 95608
  • Gilroy, CA
  • San Jose, CA
  • San Diego, CA
  • Portland, OR
  • Danville, PA
  • Roseville, CA

Resumes

Resumes

Francisco Corella Photo 1

Co-Founder And Chief Technology Officer

View page
Location:
1026 Folsom Ranch Dr, Folsom, CA 95630
Industry:
Internet
Work:
Pomcor since Jan 2003
Co-Founder and CEO, then CTO

HP Jul 1995 - Dec 2000
Engineer-Scientist

IBM Dec 1987 - Jun 1995
Research Staff Member

Schlumberger May 1984 - Nov 1987
Member of Technical Staff, Palo Alto Research Center

Symantec Mar 1982 - May 1984
Program Manager, Database Management Systems
Education:
University of Cambridge 1986 - 1990
PhD, Computer Science
Stanford University 1980 - 1982
MS, Computer Engineering
Ecole nationale supérieure des Mines de Paris 1973 - 1977
Ingénieur Civil des Mines, Engineering
Skills:
Cryptography
Flex
Formal Methods
Java
Javascript
Patent Prosecution
Perl
Php
Prolog
Security
Software Development
Algorithms
Machine Learning
Enterprise Software
Software Engineering
Python
Web Applications
Linux
Computer Security
Strategy
Unix
Mobile Devices
It Strategy
Agile Application Development
Enterprise Mobility
It Solutions
Ai
Languages:
Spanish
French
Italian
German
Francisco Corella Photo 2

Associate Project Manager And Geologist I

View page
Location:
12201 Sunrise Valley Dr, Reston, VA 20191
Industry:
Research
Work:
Arcadis
Associate Project Manager and Geologist I

U.s. Geological Survey (Usgs)
Hydrologic Technician at U.s Geological Survey
Education:
California State University - Sacramento
Francisco Corella Photo 3

Scientific Aid

View page
Location:
Sacramento, CA
Industry:
Government Administration
Work:
State of California Water Resources Control Board
Scientific Aid

Business Records

Name / Title
Company / Classification
Phones & Addresses
Francisco Corella
Principal
Pomian & Corella, LLC
Web Services · Business Services at Non-Commercial Site · Business Services at Non-Commercial Site Commercial Physical Research Computer Related Services · Telephone Communications Commercial Physical Research Computer Related Services
111 N Market St, San Jose, CA 95113
2977 Barnard St, San Diego, CA 92110
(619) 255-7486

Publications

Us Patents

Lightweight Public Key Infrastructure Employing Disposable Certificates

View page
US Patent:
6763459, Jul 13, 2004
Filed:
Jan 14, 2000
Appl. No.:
09/483356
Inventors:
Francisco Corella - Hayward CA
Assignee:
Hewlett-Packard Company, L.P. - Houston TX
International Classification:
G06F 124
US Classification:
713156, 713175, 713182, 713200, 713201
Abstract:
A PKI includes an off-line registration authority that issues a first unsigned certificate to a subject that binds a public key of the subject to long-term identification information related to the subject and maintains a certificate database of unsigned certificates in which it stores the first unsigned certificate An on-line credentials server issues a short-term disposable certificate to the subject that binds the public key of the subject from the first unsigned certificate to the long-term identification information related to the subject from the first unsigned certificate. The credentials server maintains a table that contains entries corresponding to valid unsigned certificates stored in the certificate database. The subject presents the short-term disposable certificate to a verifier for authentication and demonstrates that the subject has knowledge of a private key corresponding to the public key in the short-term disposable certificate.

Method And Apparatus For Providing Field Confidentiality In Digital Certificates

View page
US Patent:
6802002, Oct 5, 2004
Filed:
Jan 14, 2000
Appl. No.:
09/483189
Inventors:
Francisco Corella - Hayward CA
Assignee:
Hewlett-Packard Development Company, L.P. - Houston TX
International Classification:
H04L 900
US Classification:
713175, 713155, 713156, 713157, 713158, 713159
Abstract:
A structured digital certificate is adapted to be certified by a digital signature of a certificate authority in an unprotected form, a first protected form, and a second protected form of the digital certificate. The digital certificate includes a first type field of authorization information relevant to a first recipient and being readable in the unprotected form and the first protected form of the digital certificate, and a first cryptographic folder containing a second type field of authorization information relevant to a second recipient and being readable in the unprotected form and the second protected form of the digital certificate, but not readable in the first protected form of the digital certificate. The digital certificate is configured to permit the subject to convert the structured digital certificate from the unprotected form to at least one of the first protected form and the second protected form. The digital certificate is convertible into the first protected form to permit the first recipient to authorize the subject of the structured digital certificate, into the second protected form to permit the second recipient to authorize the subject of the structured digital certificate.

Authorization Infrastructure Based On Public Key Cryptography

View page
US Patent:
7340600, Mar 4, 2008
Filed:
Jan 14, 2000
Appl. No.:
09/483185
Inventors:
Francisco Corella - Hayward CA, US
Assignee:
Hewlett-Packard Development Company, L.P. - Houston TX
International Classification:
H04L 9/00
G06F 7/04
G06F 7/58
G06F 15/16
US Classification:
713155, 713156, 713158, 726 5, 726 10, 726 18
Abstract:
A public key authorization infrastructure includes a client program accessible by a user and an application program. A certificate authority issues a long-term certificate that binds a public key of the user to long-term identification information related to the user. A directory stores the issued long-term certificate and short-term authorization information related to the user. A credentials server issues a short-term certificate to the client. The short-term certificate binds the public key to the long-term identification information and to the short-term authorization information. The client presents the short-term certificate to the application program for authorization and demonstrates that the user has knowledge of a private key corresponding to the public key in the short-term certificate. The short-term certificate includes an expiration date, and is not subject to revocation.

Lightweight Public Key Infrastructure Employing Unsigned Certificates

View page
US Patent:
7269726, Sep 11, 2007
Filed:
Jan 14, 2000
Appl. No.:
09/483186
Inventors:
Francisco Corella - Hayward CA, US
Assignee:
Hewlett-Packard Development Company, L.P. - Houston TX
International Classification:
H04L 9/00
G06F 7/04
G06F 7/58
US Classification:
713156, 726 18
Abstract:
A public key infrastructure (PKI) includes a subject, a verifier, and certificate authority that issues a first unsigned certificate to the subject that binds a public key of the subject to long-term identification information related to the subject and maintains a certificate database of unsigned certificates in which it stores the first unsigned certificate. The verifier maintains a hash table containing cryptographic hashes of valid unsigned certificates corresponding to the unsigned certificates stored in the certificate database and including a cryptographic hash of the first unsigned certificate. The subject presents the issued first unsigned certificate to the verifier for authentication and demonstrates that the subject has knowledge of a private key corresponding to the public key in the unsigned certificate.

Encapsulating The Complexity Of Cryptographic Authentication In Black-Boxes

View page
US Patent:
20140006781, Jan 2, 2014
Filed:
Jun 24, 2013
Appl. No.:
13/925824
Inventors:
Francisco Corella - San Jose CA, US
Karen Pomian Lewison - San Jose CA, US
Assignee:
Pomian & Corella, LLC - San Jose CA
International Classification:
H04L 29/06
US Classification:
713168
Abstract:
A method of authenticating a computing device to a back-end subsystem. In one embodiment a prover black-box in the computing device authenticates cryptographically to a verifier black-box in the back-end subsystem by proving possession of a cryptographic credential. The verifier black-box sends an authentication token to the prover black-box as verifiable confirmation of the cryptographic authentication. The prover black-box sends the authentication token to an application front-end in the computing device. The application front-end sends the authentication token to an application back-end in the back-end subsystem, and the application back-end verifies the authentication token.

Effective Data Protection For Mobile Devices

View page
US Patent:
20140006806, Jan 2, 2014
Filed:
Aug 30, 2013
Appl. No.:
14/016022
Inventors:
Francisco Corella - San Jose CA, US
Karen Pomian Lewison - San Jose CA, US
Assignee:
POMIAN & CORELLA, LLC - San Jose CA
International Classification:
G06F 21/62
US Classification:
713193
Abstract:
A method of protecting confidential data stored in a computing device. In one embodiment, data items are encrypted using content-encryption keys that are not present in the device while the device is locked. When a user unlocks the device, the content- encryption keys are computed using at least one externally stored key that is retrieved from a key storage service using a credential regenerated from a protocredential stored in the device and one or more secrets supplied by a user.

Cryptographic Authentication Techniques For Mobile Devices

View page
US Patent:
20140032906, Jan 30, 2014
Filed:
Jul 30, 2013
Appl. No.:
13/954973
Inventors:
Francisco Corella - San Jose CA, US
Karen Pomian Lewison - San Jose CA, US
Assignee:
POMIAN & CORELLA, LLC - San Jose CA
International Classification:
H04L 29/06
US Classification:
713168
Abstract:
A method of authenticating a computing device to a back-end subsystem. In one embodiment a prover black-box in the computing device regenerates a credential containing a key pair from a PIN and a protocredential, and authenticates cryptographically to a verifier black-box in the back-end subsystem; then the verifier black-box sends an authentication token to the prover black-box as verifiable confirmation of the cryptographic authentication, the prover black-box sends the authentication token to an application front-end in the computing device, the application front-end sends the authentication token to an application back-end in the back-end subsystem, and the application back-end verifies the authentication token.

Bus Bridge And Method For Ordering Read And Write Operations In A Write Posting System

View page
US Patent:
61579777, Dec 5, 2000
Filed:
Nov 24, 1998
Appl. No.:
9/198833
Inventors:
Derek A Sherlock - Ft Collins CO
Thomas V Spencer - Ft Collins CO
Francisco Corella - Sacramento CA
Assignee:
Hewlett Packard Company - Palo Alto CA
International Classification:
G06F 1300
G06F 1200
US Classification:
710129
Abstract:
A bus bridge is disclosed that provides an interface between two computer buses and guarantees the proper ordering of write operations mastered from one bus relative to read operations mastered from the other bus where the presence of write posting storage in the bus bridge could cause ordering violations. The bus bridge includes a first mechanism for counting the number of write operations that are received by the bus bridge and queued in the write posting storage. In addition, the bus bridge includes a second mechanism for counting the number of write operations completed on the second bus. A mechanism for measuring the age of data held in each cache line of a coherent cache is also included as part of the bus bridge. Finally, the bus bridge includes a mechanism for delaying the completion of a read operation from the cache until all writes that were accepted by the bus bridge on the first bus before the cache data was fetched have been completed on the second bus. This is determined by comparing the age of the data held in a cache line to be read with the difference between the number of write operations received by the bus bridge and the number of write operations that have completed on the second bus.
Francisco G Corella from Sacramento, CA, age ~72 Get Report