Search

Selim S Aissi

from Dublin, CA
Age ~60

Selim Aissi Phones & Addresses

  • Dublin, CA
  • Menlo Park, CA
  • Beaverton, OR
  • Ypsilanti, MI
  • Ann Arbor, MI
  • Rochester Hills, MI
  • 600 Sharon Park Dr APT B202, Menlo Park, CA 94025

Work

Position: Professional/Technical

Education

Degree: High school graduate or higher

Resumes

Resumes

Selim Aissi Photo 1

Co-Chairman, Financial Services Information Sharing And Analysis Center's Mrc

View page
Location:
Menlo Park, CA
Industry:
Financial Services
Work:
OneID since Feb 2013
Advisory Board Member

Visa - Foster City, CA since Jan 2012
Senior Business Leader, Head of Global Enterprise Security Architecture, GIS, Technology Group

Visa - Foster Cisty, CA Aug 2011 - Jan 2012
Global Chief Enterprise Security Architect, Technology Group

Intel Aug 2008 - Sep 2011
Sr. Strategic Planner - Mobile eCommerce, Security, DRM, Enterprise and Virtualization

Intel Corporation Jan 2004 - Aug 2008
Chief Security Architect, Mobile Platform Architecture
Education:
University of Michigan 1983 - 1992
PhD, Engineering
Skills:
Security
Cloud Computing
Enterprise Software
Information Security
Mobile Devices
Strategy
Product Management
Computer Security
Integration
Management
System Architecture
It Strategy
Virtualization
Leadership
Cross Functional Team Leadership
Enterprise Architecture
Networking
Network Security
Saas
Wireless
Software Engineering
Cryptography
Architecture
Data Center
Vendor Management
Program Management
Executive Management
Risk Management
Strategic Partnerships
Information Technology
Software Development
Mobile Applications
Security Architecture Design
Mobile Security
Solution Architecture
Start Ups
Information Security Management
Pci Dss
Identity Management
Disaster Recovery
Go To Market Strategy
Pki
Governance
Business Continuity
Mobile Communications
It Audit
Mobile Technology
Business Alliances
Big Data
Application Security
Selim Aissi Photo 2

Selim Aissi

View page

Publications

Us Patents

Multi-Authentication For A Computing Device Connecting To A Network

View page
US Patent:
7373509, May 13, 2008
Filed:
Dec 31, 2003
Appl. No.:
10/750340
Inventors:
Selim Aissi - Beaverton OR, US
David Wheeler - Gilbert AZ, US
Krishnamurthy Srinivasan - Chandler AZ, US
Randy E Hall - Gilbert AZ, US
Ned M. Smith - Beaverton OR, US
Assignee:
Intel Corporation - Santa Clara CA
International Classification:
H04L 9/00
US Classification:
713168, 713169, 713170, 713182
Abstract:
In an embodiment, a method includes authenticating a computing device and a different entity for a session of communication between the computing device and the different entity. The authenticating includes generating a hash of a value selected from the group consisting of an encrypted attribute associated with computing device stored in the computing device and the identification of the session stored in a protected storage within the computing device. The authenticating also includes encrypting a random number based on the hash. The authenticating includes transmitting the encrypted random number to the different entity.

Secured And Selective Runtime Auditing Services Using A Trusted Computing Device

View page
US Patent:
7409370, Aug 5, 2008
Filed:
Jun 30, 2003
Appl. No.:
10/612292
Inventors:
Selim Aissi - Beaverton OR, US
Assignee:
Intel Corporation - Santa Clara CA
International Classification:
G06Q 99/00
US Classification:
705 50, 713157, 700222, 235383
Abstract:
In an embodiment, an apparatus includes a control logic to selectively audit transactions between the apparatus and a separate entity based on a type for the transactions. The apparatus also includes an encryption logic to encrypt an audit log that includes at least one attribute of one of the selectively audited transactions.

Hardware-Assisted Credential Validation

View page
US Patent:
7512975, Mar 31, 2009
Filed:
Aug 16, 2002
Appl. No.:
10/222111
Inventors:
Selim Aissi - Beaverton OR, US
Assignee:
Intel Corporation - Santa Clara CA
International Classification:
H04L 9/32
H04L 9/00
US Classification:
726 19, 713175, 713176, 713182, 713181, 713172, 713173, 713174, 709226, 709229
Abstract:
A system and method to validate security credentials using hardware is provided. The system includes a credential validation module to recalculate security credentials received in a datagram and to determine if the security credentials are valid. The system also includes a parser to extract the security credentials from the payload data of the received datagram, and a memory to store validated credentials for further use.

Hardware-Based Credential Management

View page
US Patent:
7546452, Jun 9, 2009
Filed:
Aug 20, 2002
Appl. No.:
10/225504
Inventors:
Selim Aissi - Beaverton OR, US
Ned McArthur Smith - Beaverton OR, US
Willard M. Wiseman - Vernonia OR, US
Assignee:
Intel Corporation - Santa Clara CA
International Classification:
H04L 9/00
G06F 7/04
US Classification:
713156, 713170, 726 18
Abstract:
A credential management device has a protected domain and a credential manager to perform credential transactions. A credential transaction may comprise determining if a platform is operating in a trusted mode and releasing an operation credential if the platform is operating in a trusted mode. A credential transaction may comprise validating incoming credentials from other platforms.

Apparatus And Method For Platform-Independent Identity Manageability

View page
US Patent:
7624428, Nov 24, 2009
Filed:
Jun 30, 2005
Appl. No.:
11/171080
Inventors:
Sameer Abhinkar - Beaverton OR, US
Selim Aissi - Beaverton OR, US
Jane Dashevsky - Beaverton OR, US
Abhay Dharmadhikari - Beaverton OR, US
Benjamin J. Matasar - Portland OR, US
Mrudula Yelamanchi - Portland OR, US
Scott Blum - Beaverton OR, US
Shelagh Ann Callahan - Portland OR, US
Assignee:
Intel Corporation - Santa Clara CA
International Classification:
H04L 9/32
H04L 9/00
G06F 7/04
US Classification:
726 2, 726 27, 726 28, 726 29, 726 30, 713151, 713152, 713153, 709225, 709226, 709227, 709228, 709229
Abstract:
An apparatus and method for platform and device independent identity manageability. In one embodiment, the method includes validation of a manageable identity (MID) held within trusted storage of a user platform according to a user request to move the MID to a target platform. Once the MID is validated, available resources of the target platform are verified according to resource requirements of the MID. Once verified, the MID may be moved from the user platform to trusted storage provided by the target platform. In one embodiment, a platform-independent MID may be established that may be moved from a user platform to a non-compatible target platform, such that the platform-independent MID is not constrained to just one single platform. Other embodiments are described and claimed.

Link Key Injection Mechanism For Personal Area Networks

View page
US Patent:
7788494, Aug 31, 2010
Filed:
Jun 28, 2005
Appl. No.:
11/168603
Inventors:
Selim Aissi - Beaverton OR, US
Uma M. Gadamsetty - Chandler AZ, US
Assignee:
Intel Corporation - Santa Clara CA
International Classification:
H04L 9/32
US Classification:
713171, 380283
Abstract:
According to one embodiment, a method is disclosed. The method includes generating a link key at a secure component within a first personal area network device and injecting the link key into a protocol stack component database within the first device. The link key may further be transmitted to a second device. Other embodiments are described and claimed.

Using A Trusted-Platform-Based Shared-Secret Derivation And Wwan Infrastructure-Based Enrollment To Establish A Secure Local Channel

View page
US Patent:
8027472, Sep 27, 2011
Filed:
Dec 30, 2005
Appl. No.:
11/322941
Inventors:
Selim Aissi - Beaverton OR, US
Sundeep Bajikar - Santa Clara CA, US
Sameer Abhinkar - Beaverton OR, US
Scott Blum - Beaverton OR, US
Jane Dashevsky - Beaverton OR, US
Abhay Dharmadhikari - Beaverton OR, US
Benjamin Matasar - Portland OR, US
Mrudula Yelamanchi - Portland OR, US
International Classification:
H04K 1/00
H01R 24/00
H04L 9/32
H04M 11/00
G06F 15/00
US Classification:
380249, 380270, 713168, 439633
Abstract:
A system and method for establishing a connection on a mobile computing device. A secret is generated on a trusted platform of the mobile computing device. The secret is transported to a secure channel application. The secure channel application establishes a trusted local communication channel between the trusted platform and a SIM (subscriber identity module)/Smartcard. The secret is received by the SIM/Smartcard. The secret, after being received by the SIM/Smartcard, is provided to a secure channel applet on the SIM/Smartcard. The secure channel applet establishes the trusted local communication channel between the SIM/Smartcard and the trusted platform, wherein the secret is shared by the trusted platform and the SIM/Smartcard.

Techniques To Manage Wireless Connections

View page
US Patent:
8102901, Jan 24, 2012
Filed:
Mar 1, 2005
Appl. No.:
11/070489
Inventors:
Selim Aissi - Beaverton OR, US
Uma Gadamsetty - Chandler AZ, US
Assignee:
Intel Corporation - Santa Clara CA
International Classification:
H04B 1/38
US Classification:
375219, 375220, 375222, 375356, 375260
Abstract:
A system, apparatus, method and article to manage wireless connections are described. The apparatus may include a connection management module to automatically form a first connection between a first mobile device and a second mobile device, and a second connection between the second mobile device and a fixed device, wherein the first mobile device is to communicate information with the fixed device using the first and second connections. Other embodiments are described and claimed.
Selim S Aissi from Dublin, CA, age ~60 Get Report