Search

Nancy Davoust Phones & Addresses

  • Louisville, CO
  • 5275 Holmes Pl, Boulder, CO 80303 (303) 444-9850 (303) 664-0231
  • 1535 48Th St, Boulder, CO 80303 (303) 444-9850
  • Mountain View, CA
  • Santa Cruz, CA
  • 1003 Turnberry Cir, Louisville, CO 80027 (303) 444-9850 (303) 664-0231 (303) 664-9289

Work

Company: Comcast Mar 2020 Position: Vice president ii, security architecture, identity and access

Education

Degree: Bachelors, Bachelor of Science School / High School: University of Colorado Denver Specialities: Computer Engineering

Skills

Voip • Telecommunications • Docsis • System Architecture • Iptv • Networking • Broadband • Ip • Security • Cable Television • Set Top Box • Cisco Technologies • Integration • Ethernet • System Deployment • Wireless • Tcp/Ip • Cissp • Vod • Network Security • Snmp • Product Management • Vendor Management • Conditional Access • Network Engineering • Testing • Internet Protocol • Voice Over Ip • Mpeg • Strategic Partnerships • Project Management • Leadership • Architecture • Wireless Technologies • Internet Protocol Suite • Communication Skills • Telephony • Wifi • Internet Security • Management • Network Design • Mobile Devices • Program Management • Iot • Video Networking • Dlna • Hardware • Strategy • Troubleshooting • Linux • System Administration • Sip • Erp • Mpls • Budgets • Software Documentation

Languages

English

Interests

Collecting Antiques • Exercise • Home Improvement • Shooting • Reading • Gourmet Cooking • Sports • The Arts • Home Decoration • Cooking • Gardening • Outdoors • Electronics • Music • Family Values • Movies • Collecting • Christianity • Kids • Automobiles • Travel • Career • Boating • Traveling

Industries

Telecommunications

Resumes

Resumes

Nancy Davoust Photo 1

Vice President Ii, Security Architecture, Identity And Access

View page
Location:
1003 Turnberry Cir, Louisville, CO
Industry:
Telecommunications
Work:
Comcast
Vice President Ii, Security Architecture, Identity and Access

Various Cable Clients Dec 2000 - Aug 2007
Independent Contractor

Cablelabs Jun 1, 1999 - Nov 1, 2000
Technical Lead
Education:
University of Colorado Denver
Bachelors, Bachelor of Science, Computer Engineering
Skills:
Voip
Telecommunications
Docsis
System Architecture
Iptv
Networking
Broadband
Ip
Security
Cable Television
Set Top Box
Cisco Technologies
Integration
Ethernet
System Deployment
Wireless
Tcp/Ip
Cissp
Vod
Network Security
Snmp
Product Management
Vendor Management
Conditional Access
Network Engineering
Testing
Internet Protocol
Voice Over Ip
Mpeg
Strategic Partnerships
Project Management
Leadership
Architecture
Wireless Technologies
Internet Protocol Suite
Communication Skills
Telephony
Wifi
Internet Security
Management
Network Design
Mobile Devices
Program Management
Iot
Video Networking
Dlna
Hardware
Strategy
Troubleshooting
Linux
System Administration
Sip
Erp
Mpls
Budgets
Software Documentation
Interests:
Collecting Antiques
Exercise
Home Improvement
Shooting
Reading
Gourmet Cooking
Sports
The Arts
Home Decoration
Cooking
Gardening
Outdoors
Electronics
Music
Family Values
Movies
Collecting
Christianity
Kids
Automobiles
Travel
Career
Boating
Traveling
Languages:
English

Publications

Us Patents

Configurable Access Kernel

View page
US Patent:
8307199, Nov 6, 2012
Filed:
Mar 4, 2011
Appl. No.:
13/040353
Inventors:
Kevin Norman Taylor - Parker CO, US
James Fahrny - Parker CO, US
William Lynn Helms - Longmont CO, US
Azita Miahnahri Manson - Mountain View CA, US
Andrew T. Twigger - Reading, GB
Nancy Louise Davoust - Louisville CO, US
Assignee:
Comcast Cable Holdings, LLC - Philadelphia PA
International Classification:
G06F 9/24
G06F 15/177
G06F 12/14
US Classification:
713 1, 713 2, 713191, 713192, 705901, 348725, 380203
Abstract:
A highly configurable kernel supports a wide variety of content protection systems. The kernel may reside in a host that interacts with a secure processor maintaining content protection clients. After establishing communication with the secure processor, the host receives messages from content protection clients requesting rules for message handling operations to support client operations. This flexible configuration allows for dynamic reconfiguration of host and secure processor operation.

Configurable Access Kernal

View page
US Patent:
20090077362, Mar 19, 2009
Filed:
Sep 14, 2007
Appl. No.:
11/855735
Inventors:
Kevin Norman Taylor - Parker CO, US
James Fahrny - Parker CO, US
William Lynn Helms - Longmont CO, US
Azita Miahnahri Manson - Mountain View CA, US
Andrew T. Twigger - Reading, GB
Nancy Louise Davoust - Louisville CO, US
Assignee:
COMCAST CABLE HOLDINGS, LLC - Philadelphia PA
International Classification:
G06F 15/177
US Classification:
713 1
Abstract:
A highly configurable kernel supports a wide variety of content protection systems. The kernel may reside in a host that interacts with a secure processor maintaining content protection clients. After establishing communication with the secure processor, the host receives messages from content protection clients requesting rules for message handling operations to support client operations. This flexible configuration allows for dynamic reconfiguration of host and secure processor operation.

Authenticated Communication Between Security Devices

View page
US Patent:
20100217985, Aug 26, 2010
Filed:
Feb 20, 2009
Appl. No.:
12/389718
Inventors:
James W. Fahrny - Parker CO, US
Nancy L. Davoust - Louisville CO, US
Assignee:
Comcast Cable Holdings, LLC - Philadelphia PA
International Classification:
H04L 9/32
US Classification:
713169
Abstract:
Apparatuses, computer readable media, and methods establishing and maintaining trust between security devices for distributing media content are provided. Two security devices bind to establish an initial trust so that security information can be exchanged. Subsequently, trust is refreshed to verify the source of a message is valid. In an embodiment, the security devices may comprise a security processor and a system on a chip (SoC) in a downloadable conditional access system. Trust may be refreshed by a security device inserting authentication information in a message to another security device, where authentication information may assume different forms, including a digital signature (asymmetric key) or a hash message authentication code (HMAC). Trust may also be refreshed by extracting header information from the message, determining state information from at least one parameter contained in the header information, and acting on message content only when the state information is valid.

Key Derivation For Secure Communications

View page
US Patent:
20120084806, Apr 5, 2012
Filed:
Sep 30, 2010
Appl. No.:
12/895121
Inventors:
James W. Fahrny - Parker CO, US
Pete Kuykendall - Centennial CO, US
Nancy Davoust - Louisville CO, US
Assignee:
COMCAST CABLE COMMUNICATIONS, LLC - Philadelphia PA
International Classification:
H04N 7/167
H04N 7/16
US Classification:
725 31, 725 25
Abstract:
A security system is disclosed in which a device-specific key value is provided to a security processing device, and then used to derive additional derived keys for use in secured communications. In response to identifying a compromise of the derived keys, the system can be instructed to derive new or replacement derived keys for use in the secured communications. In some embodiments, the security system can be used in a video reception device, to decrypt encrypted video content.

Reoccuring Keying System

View page
US Patent:
20130054967, Feb 28, 2013
Filed:
Aug 30, 2011
Appl. No.:
13/221035
Inventors:
Nancy Davoust - Louisville CO, US
James Fahrny - Louisville CO, US
Kevin Taylor - Parker CO, US
Assignee:
COMCAST CABLE COMMUNICATIONS, LLC - Philadelphia PA
International Classification:
H04L 9/32
US Classification:
713168
Abstract:
A secure communication system or method are disclosed that may employ a constant level of trust between participants and a security management entity. As part of the constant level of trust, a communication policy may cause participants to request key validation every time the participant wishes to take an action that requires use of a key. In this manner, the participant may regularly communicate with the security management, and this regular communication can be further used to implement key renewal and/or rollover procedures.

Blockchain Folding

View page
US Patent:
20200344234, Oct 29, 2020
Filed:
Apr 25, 2019
Appl. No.:
16/395003
Inventors:
- Philadelphia PA, US
Nancy Davoust - Louisville CO, US
International Classification:
H04L 29/06
H04L 9/06
G06F 21/60
Abstract:
An active distributed ledger may comprise an indication of an inactive permission associated with a user device. An entry comprising such indication added to another distributed ledger that is supplemental to the active distributed ledger. An updated active distributed ledger may be generated that does not comprise the indication of the inactive permission. The updated active distributed ledger may comprise an indication of a new permission associated with the user device. The updated active distributed ledger may be stored on the user device or any other device on a network.

Key Derivation For Secure Communications

View page
US Patent:
20190260720, Aug 22, 2019
Filed:
Dec 6, 2018
Appl. No.:
16/212054
Inventors:
- Philadelphia PA, US
Pete Kuykendall - Centennial CO, US
Nancy Davoust - Louisville CO, US
International Classification:
H04L 29/06
Abstract:
A security system is disclosed in which a device-specific key value is provided to a security processing device, and then used to derive additional derived keys for use in secured communications. In response to identifying a compromise of the derived keys, the system can be instructed to derive new or replacement derived keys for use in the secured communications. In some embodiments, the security system can be used in a video reception device, to decrypt encrypted video content.

Authenticated Communication Between Security Devices

View page
US Patent:
20160323294, Nov 3, 2016
Filed:
Jan 27, 2016
Appl. No.:
15/008060
Inventors:
- Philadelphia PA, US
Nancy Davoust - Louisville CO, US
International Classification:
H04L 29/06
H04L 9/32
H04N 21/443
H04N 21/4627
H04N 21/4367
H04N 21/81
G06F 21/10
H04N 21/254
Abstract:
Apparatuses, computer readable media, and methods establishing and maintaining trust between security devices for distributing media content are provided. Two security devices bind to establish an initial trust so that security information can be exchanged. Subsequently, trust is refreshed to verify the source of a message is valid. In an embodiment, the security devices may comprise a security processor and a system on a chip (SoC) in a downloadable conditional access system. Trust may be refreshed by a security device inserting authentication information in a message to another security device, where authentication information may assume different forms, including a digital signature (asymmetric key) or a hash message authentication code (HMAC). Trust may also be refreshed by extracting header information from the message, determining state information from at least one parameter contained in the header information, and acting on message content only when the state information is valid.
Nancy L Davoust from Louisville, CO, age ~59 Get Report