Search

William P Bialick

from Clarksville, MD
Age ~62

William Bialick Phones & Addresses

  • 7150 Moorland Dr, Clarksville, MD 21029 (410) 531-5831
  • 608 Kearney Ct SW, Vienna, VA 22180 (703) 938-4898
  • Friendswood, TX
  • 20545 Annondell Dr, Lewes, DE 19958 (301) 964-1726
  • 11746 Lone Tree Ct, Columbia, MD 21044 (301) 964-1726
  • Fairfax, VA
  • Athens, GA
  • Churchville, MD
  • 7150 Moorland Dr, Clarksville, MD 21029 (410) 726-3797

Work

Position: Professional/Technical

Education

Degree: Associate degree or higher

Business Records

Name / Title
Company / Classification
Phones & Addresses
William Bialick
President
Akayla Inc
Computer Security Consulting
7150 Moorland Dr, Clarksville, MD 21029
(443) 745-5316

Publications

Us Patents

Method And System For Enforcing Access To A Computing Resource Using A Licensing Attribute Certificate

View page
US Patent:
6904523, Jun 7, 2005
Filed:
Jul 11, 2002
Appl. No.:
10/195059
Inventors:
William P. Bialick - Clarksville MD, US
Russell D. Housley - Herndon VA, US
Charles R. J. Moore - Brisbane, AU
Duane J. Linsenbardt - San Jose CA, US
Assignee:
Spyrus, Inc. - San Jose CA
International Classification:
H04L009/00
US Classification:
713156, 705 59
Abstract:
A licensing attribute certificate enables a trusted computing base to enforce access to a computing resource by a computer application. The licensing attribute certificate can contain enforcement data which limits the use of the computing resource. The licensing attribute certificate can also contain information allowing for the tracking of licensing data about the use of the computing resource. The use of a licensing attribute certificate to enforce access to a computing resource can allow products to be fielded which have their capability limited to a specific subset of functions. The enforcement data, the licensing data, and the data limiting the application to a specific subset of functions are cryptographically bound to the computing resource using a licensing attribute certificate according to the invention. Prior to allowing access to the computing resource by the computer application, a trusted computing base strongly authenticates that usage via the licensing attribute certificate.

Method And System For Enforcing Access To A Computing Resource Using A Licensing Attribute Certificate

View page
US Patent:
7356692, Apr 8, 2008
Filed:
Mar 15, 2005
Appl. No.:
11/081792
Inventors:
William P. Bialick - Clarksville MD, US
Russell D. Housley - Herndon VA, US
Charles R. J. Moore - Brisbane, AU
Duane J. Linsenbardt - San Jose CA, US
Assignee:
Spyrus, Inc. - San Jose CA
International Classification:
H04L 9/00
US Classification:
713156, 705 59
Abstract:
A licensing attribute certificate enables a trusted computing base to enforce access to a computing resource by a computer application. The licensing attribute certificate can contain enforcement data which limits the use of the computing resource. The licensing attribute certificate can also contain information allowing for the tracking of licensing data about the use of the computing resource. The use of a licensing attribute certificate to enforce access to a computing resource can allow products to be fielded which have their capability limited to a specific subset of functions. The enforcement data, the licensing data, and the data limiting the application to a specific subset of functions are cryptographically bound to the computing resource using a licensing attribute certificate according to the invention. Prior to allowing access to the computing resource by the computer application, a trusted computing base strongly authenticates that usage via the licensing attribute certificate.

Modular Security Device

View page
US Patent:
60031352, Dec 14, 1999
Filed:
Jun 4, 1997
Appl. No.:
8/869120
Inventors:
William P. Bialick - Clarksville MD
Mark J. Sutherland - Milpitas CA
Thomas K. Rowland - Los Gatos CA
Kirk W. Skeba - Fremont CA
Russell D. Housley - Herndon VA
Assignee:
Spyrus, Inc. - Santa Clara CA
International Classification:
G06F 1214
US Classification:
713201
Abstract:
The invention enables a modular, typically portable, device to communicate with a host computing device to enable one or more security operations to be performed by the modular device on data stored within the host computing device, data provided from the host computing device to the modular device (which can then be, for example, stored in the modular device or transmitted to yet another device), or data retrieved by the host computing device from the modular device (e. g. , data that has been stored in the modular device, transmitted to the modular device from another device or input to the modular device by a person). In particular, the modular device can include a security module that is adapted to enable performance of one or more security operations on data, and a target module that is adapted to enable a defined interaction with a host computing device. The target module can be embodied by any of a variety of modules having different types of functionality (e. g. , data storage, data communication, data input and output, user identification).

Peripheral Device With Integrated Security Functionality

View page
US Patent:
60888024, Jul 11, 2000
Filed:
Jun 4, 1997
Appl. No.:
8/869305
Inventors:
William P. Bialick - Clarksville MD
Mark J. Sutherland - Milpitas CA
Thomas K. Rowland - Los Gatos CA
Kirk W. Skeba - Fremont CA
Russell D. Housley - Herndon VA
Assignee:
Spyrus, Inc. - Santa Clara CA
International Classification:
G06K 1467
US Classification:
713200
Abstract:
The invention enables a peripheral device to communicate with a host computing device to enable one or more security operations to be performed by the peripheral device on data stored within the host computing device, data provided from the host computing device to the peripheral device (which can then be, for example, stored in the peripheral device or transmitted to yet another device), or data retrieved by the host computing device from the peripheral device (e. g. , data that has been stored in the peripheral device, transmitted to the peripheral device from another device or input to the peripheral device by a person). In particular, the peripheral device can be adapted to enable, in a single integral peripheral device, performance of one or more security operations on data, and a defined interaction with a host computing device that has not previously been integrated with security operations in a single integral device. The defined interactions can provide a variety of types of functionality (e. g. , data storage, data communication, data input and output, user identification).
William P Bialick from Clarksville, MD, age ~62 Get Report