Search

James Hormuzdiar Phones & Addresses

  • New York, NY
  • San Jose, CA
  • 6 Admiral Dr, Emeryville, CA 94608 (510) 595-8324
  • 6 Admiral Dr #A376, Emeryville, CA 94608
  • Oakland, CA
  • 3809 Aqua Vista Ct, Hayward, CA 94542 (510) 582-1485 (510) 690-0000
  • 12 Crestdale Rd, Danbury, CT 06811 (203) 743-3938
  • New Haven, CT
  • Berkeley, CA
  • Palo Alto, CA

Business Records

Name / Title
Company / Classification
Phones & Addresses
James Hormuzdiar
Manager
The Education Trust Inc
Business Consulting
1814 Franklin St, Oakland, CA 94612
(510) 465-6444
James N. Hormuzdiar
President
Robot Genius, Inc
1504 Franklin St, Oakland, CA 94612

Publications

Us Patents

Method And Apparatus For Encrypted Communications To A Secure Server

View page
US Patent:
7673329, Mar 2, 2010
Filed:
Feb 22, 2001
Appl. No.:
09/792226
Inventors:
Stephen Dao Hui Hsu - Eugene OR, US
James Noshir Hormuzdiar - Danbury CT, US
Assignee:
Symantec Corporation - Mountain View CA
International Classification:
G06F 17/30
H04L 29/06
H04L 9/32
G06F 15/16
G06F 15/173
US Classification:
726 6, 726 4, 726 7, 726 10, 713154, 713161, 713162, 713168, 709219, 709225, 709246
Abstract:
Encrypted communications to a secure server. A user at a terminal, communicatively coupled to the secure server by a secure link, can obtain web pages from web sites in a network, in encrypted form, via the secure link. Addresses associated with the web pages are altered to make it appear as if the web pages come from the secure server rather than from the web sites. Spoofing units may be used as alternative access points to the secure server, with the secure server sending the requested web pages directly to the terminal.

Intelligent Secure Data Manipulation Apparatus And Method

View page
US Patent:
7730528, Jun 1, 2010
Filed:
Sep 19, 2001
Appl. No.:
09/956730
Inventors:
Jon Andre Chun - Emeryville CA, US
Stephen Dao Hui Hsu - Eugene OR, US
James Noshir Hormuzdiar - Danbury CT, US
Assignee:
Symantec Corporation - Mountain View CA
International Classification:
H04L 29/02
US Classification:
726 12, 726 3
Abstract:
A data manipulation appliance can be installed or plugged into a computer network between business partners, and can perform many of the difficult and tedious data manipulation operations in a substantially automated manner. Examples of operations that can be performed by an embodiment of the apparatus include, but are not limited to, encryption, authentication, auditing, shaping data to a common intermediate format for exchange between partners, other auditing of data exchanges in transaction logs, filtering data for privacy compliance and risk management, error detection and correction, mapping internal non-standard data elements to external standard code sets, proxy and protocol re-writing, and so on. The appliance can be embedded with various tools to perform these operations, and therefore appears to be “intelligent. ”.

Method And Apparatus For Encrypted Communications To A Secure Server

View page
US Patent:
8065520, Nov 22, 2011
Filed:
Feb 27, 2009
Appl. No.:
12/395561
Inventors:
Stephen Dao Hui Hsu - Eugene OR, US
James Noshir Hormuzdiar - Danbury CT, US
Jon A Chun - Palo Alto CA, US
Assignee:
Symantec Corporation - Cupertino CA
International Classification:
H04L 29/00
US Classification:
713162, 713150, 713153, 713155, 713160, 713169, 705 74, 705 78
Abstract:
An embodiment of the invention includes a secure server. A user at a terminal, communicatively coupled to the secure server by a secure link, can obtain web pages from web sites in a network, in encrypted form, via the secure link. Addresses associated with the web pages are altered to make it appear as if the web pages come from the secure server rather than from the web sites. Spoofing units may be used as alternative access points to the secure server, with the secure server sending the requested web pages directly to the terminal. In general, address rewriting and other manipulation can be performed on the requested web pages, such that the true sources of the web pages are disguised and such that subsequent communications from the terminal are directed to the secure server and/or spoofing unit, rather than to the true source of the web pages. Components of the user's privacy may be sold, or advertisements may be provided, in exchange for protection of the user's identity.

Methods For Combating Malicious Software

View page
US Patent:
8528087, Sep 3, 2013
Filed:
Apr 27, 2006
Appl. No.:
11/414741
Inventors:
Stephen Dao Hui Hsu - Eugene OR, US
James Noshir Hormuzdiar - Hayward CA, US
Assignee:
Robot Genius, Inc. - Oakland CA
International Classification:
G06F 21/00
US Classification:
726 23, 711163, 726 25, 726 26
Abstract:
A method for combating malware monitors all attempts by any software executing on a computer to write data to the computer's digital storage medium and records details of the attempts in a system database having a causal tree structure. The method also intercepts unauthorized attempts by executing objects to modify the memory allocated to other executing objects or to modify a selected set of protected objects stored on the digital storage medium, and may also intercept write attempts by executing objects that have a buffer overflow or that are executing in a data segment of memory. The method may include a procedure for switching the computer into a quasi-safe mode that disables all non-essential processes. Preferably, the database is automatically organized into software packages classified by malware threat level. Entire or packages or portions thereof may be easily selected and neutralized by a local or remote user.

Method And Apparatus For Encrypted Communications To A Secure Server

View page
US Patent:
7509490, Mar 24, 2009
Filed:
May 26, 2000
Appl. No.:
09/580365
Inventors:
Stephen Dao Hui Hsu - Eugene OR, US
James Noshir Hormuzdiar - Danbury CT, US
Jon A Chun - Palo Alto CA, US
Assignee:
Symantec Corporation - Cupertino CA
International Classification:
H04L 29/00
US Classification:
713162, 713150, 713153, 713155, 713160, 713169, 705 74, 705 78
Abstract:
An embodiment of the invention includes a secure server. A user at a terminal, communicatively coupled to the secure server by a secure link, can obtain web pages from web sites in a network, in encrypted form, via the secure link. Addresses associated with the web pages are altered to make it appear as if the web pages come from the secure server rather than from the web sites. Spoofing units may be used as alternative access points to the secure server, with the secure server sending the requested web pages directly to the terminal. In general, address rewriting and other manipulation can be performed on the requested web pages, such that the true sources of the web pages are disguised and such that subsequent communications from the terminal are directed to the secure server and/or spoofing unit, rather than to the true source of the web pages. Components of the user's privacy may be sold, or advertisements may be provided, in exchange for protection of the user's identity.
James N Hormuzdiar from New York, NY, age ~55 Get Report