Search

Duane Violett Phones & Addresses

  • 216 Mainsail Way, Madison, AL 35758 (256) 464-0337
  • Huntsville, AL

Work

Company: Intergraph government solutions Position: Computer scientist

Education

Degree: Graduate or professional degree

Skills

Software Development • Robotics • Public Key Cryptography • Cryptography

Emails

Industries

Defense & Space

Resumes

Resumes

Duane Violett Photo 1

Computer Scientist

View page
Location:
216 Mainsail Way, Madison, AL 35758
Industry:
Defense & Space
Work:
Intergraph Government Solutions
Computer Scientist
Skills:
Software Development
Robotics
Public Key Cryptography
Cryptography

Business Records

Name / Title
Company / Classification
Phones & Addresses
Duane Violett
Principal
Kavik Software
Prepackaged Software Services
216 Mainsail Way, Madison, AL 35758
Duane Violett
incorporator
Kavik Software, Inc
PROVIDE SOFTWARE SERVICES/PRODUCTS
Madison, AL

Publications

Us Patents

System And Method For Transmission Of Files Within A Secured Network

View page
US Patent:
20110162050, Jun 30, 2011
Filed:
Dec 30, 2010
Appl. No.:
12/982232
Inventors:
Thomas G. Krajna - Huntsville AL, US
Duane L. Violett - Madison AL, US
Assignee:
INTERGRAPH TECHNOLOGIES COMPANY - Las Vegas NV
International Classification:
G06F 15/16
G06F 21/00
US Classification:
726 4, 709217
Abstract:
A system and method of distributing a file maintained on a first device in a secured network having at least the first and a second device is disclosed. Embodiments of the present invention provide for file synchronization within a secured network without requiring any alteration to the security of the secured network by opening up ports. Each device is located on a tier of the network. The top tier of the network that includes the first device is accessible to network administrators. Network administrators may add files into the system and the network administrators may generate a file privilege file. The file privilege file can include configuration information for a computer on a tier and may also include information about which files the computer at a specific tier has access to. The network will then propagate the file privilege file down from the first device through any intermediate devices and then onto the second device. Once the file privilege file has filtered through the secured network, the second device may receive a copy of any file authorized from the first device via a connection in the secured network. The second device may also propagate files up to the first device. Thus, on a regular basis the file privilege file and files are transferred up and down the tiers of the secured network.
Duane L Violett from Madison, AL, age ~66 Get Report