BackgroundCheck.run
Search For

Michael T Mcfall, 53PO Box 45243, Phoenix, AZ 85064

Michael Mcfall Phones & Addresses

1421 W Medlock Dr, Phoenix, AZ 85013    602-8700546   

16635 32Nd St, Phoenix, AZ 85032    602-7656232   

Denver, CO   

Thornton, CO   

Mentions for Michael T Mcfall

Michael Mcfall resumes & CV records

Resumes

Michael Mcfall Photo 46

Owner, The Pride Guides Of Arizona, California,Hawaii & New Mexico

Position:
Owner at The Pride Guides Of Arizona, California,Hawaii & New Mexico
Location:
Phoenix, Arizona Area
Industry:
Marketing and Advertising
Work:
The Pride Guides Of Arizona, California,Hawaii & New Mexico since 2006
Owner
Michael Mcfall Photo 47

Michael Mcfall

Location:
Phoenix, Arizona Area
Industry:
Media Production
Michael Mcfall Photo 48

Owner, Arizona Pride Guide

Position:
Owner at Arizona Pride Guide
Location:
Phoenix, Arizona Area
Industry:
Marketing and Advertising
Work:
Arizona Pride Guide
Owner
Michael Mcfall Photo 49

Michael Mcfall

Location:
United States

Publications & IP owners

Us Patents

Ephemeral Control Of A Data Resource According To A Use Policy

US Patent:
2022036, Nov 10, 2022
Filed:
Jul 26, 2022
Appl. No.:
17/873752
Inventors:
- Miami FL, US
Michael McFall - Paradise Valley AZ, US
International Classification:
H04L 9/40
G06F 21/62
G06F 16/22
Abstract:
Disclosed is a method, a device, and/or a system of ephemeral control of a data resource according to a use policy. In one embodiment, a method for ephemeral control of a data resource includes receiving a request from a device to use a protected resource stored in a non-hierarchical data structure. A use policy defining an authorized context for which the device can use the protected resource based on one or more contextual value is extracted from a data node. A set of use terms is generated and returned to the device. The protected resource is then streamed to the device, where the device includes a process to enforce ephemerality of the protected resource by maintaining a ledger comprising data identifying the protected resource that is in an active use by the device and a corresponding instance of the use terms associated with the authorized use of the protected resource.

Ledger Token Transfer Outside Of A Distributed Ledger Network Through Cryptographic Binding To A Transferrable Possession Token

US Patent:
2023009, Mar 23, 2023
Filed:
Nov 24, 2022
Appl. No.:
17/993973
Inventors:
- Miami FL, US
Michael McFall - Paradise Valley AZ, US
International Classification:
G06Q 20/36
H04L 9/06
H04L 9/08
Abstract:
Disclosed is a method, a device, and/or a system of ledger token transfer of a distributed ledger network through cryptographic binding to a transferrable possession token. In one embodiment, a method for rapid and secure ledger-less transfer of a ledger token includes generating a public-private key pair, securely storing the private key and utilizing the public key as a public address. The method verifies a ledger transaction on a distributed ledger network associated the asset with the public address. The method generates a possession token having a state indicated by a state indicator. The state evolves upon transfer between two computing devices. The method cryptographically associates the ledger token and the possession token through incorporation of the public address into data generating the state indicator. The possession token is transferred to a computing device over the network while retaining the private key in secure custody.

Controlling Permissible Actions A Computing Device Can Perform On A Data Resource Based On A Use Policy Evaluating An Authorized Context Of The Device

US Patent:
2019034, Nov 7, 2019
Filed:
Jul 17, 2019
Appl. No.:
16/515000
Inventors:
Dhryl Anton - Paradise Valley AZ, US
Michael McFall - Paradise Valley AZ, US
Assignee:
Vescel, LLC - Phoenix AZ
International Classification:
H04L 29/06
G06F 21/62
G06F 16/22
Abstract:
Disclosed is a method, a device, and/or a system of controlling permissible actions a computing device can perform on a data resource based on a use policy evaluating an authorized context of the device. In one embodiment, a request is received from a device to use a protected resource stored in a non-hierarchical data structure. A use policy defining an authorized context for which the device can use the protected resource based on contextual value(s) is extracted from a data node. A use transaction is initiated that gathers the contextual values to determine whether the use request satisfies the authorized context. A set of use terms is generated and returned to the device. The protected resource is then streamed to the device, where the device includes a process to enforce ephemerality of the protected resource by maintaining the protected resource in association with the set of use terms.

Authentication Through Verification Of An Evolving Identity Credential

US Patent:
2019033, Oct 31, 2019
Filed:
Jul 10, 2019
Appl. No.:
16/507028
Inventors:
Dhryl Anton - Paradise Valley AZ, US
Michael McFall - Paradise Valley AZ, US
Assignee:
Vescel, LLC - Phoenix AZ
International Classification:
H04L 9/32
G06F 21/31
G06F 21/62
G06F 16/22
H04L 29/06
Abstract:
Disclosed is a method, a device, and/or a system of authentication through verification of an evolving identity credential. In one embodiment, an authentication method includes receiving an identity claim from a device that includes a device root hash of a hashed history of the device, referred to as a device hastory. Data of a user profile associated with the device that includes a profile root hash of a profile hastory is retrieved. The device root hash and the profile root hash, each of which may be computed as the output of a hash function with inputs including one or more previous authentication transactions, are compared and determined to be identical to verify an identity of a user and/or a device. Alternatively, a comparison may be determined to be non-identical and the authentication request rejected and/or the user profile suspended.

Secure Initiation And Transfer Of A Cryptographic Database And/Or A Cryptographic Unit

US Patent:
2019031, Oct 17, 2019
Filed:
Jun 13, 2017
Appl. No.:
16/309588
Inventors:
- Las Vegas NV, US
Michael McFall - Paradise Valley AZ, US
International Classification:
G06F 21/60
G06F 21/62
G06F 12/1018
H04L 9/06
H04L 9/32
Abstract:
Disclosed is a method, a device, and/or a system of initiation and transfer of a cryptographic database and/or a cryptographic unit. In one embodiment, an electronic mint generates and mints proofs in an indelible media using a hash function. The proofs and/or an origin hash based on the proofs may be usable to seed a hash chain of a cryptographic bearer database and/or a cryptographic unit with an evolving state hash. The database and/or unit is issued from a treasury server and transferred between user devices as coordinated by a tracking server that utilizes one or more immutable records to track the database and/or unit and retain uniqueness of the bearer database in its most evolved state. Transfers may update user state hash of an evolving user profile usable as an authentication token and/or to show assent to a transaction resulting in a seal hash of acceptance.

Efficient Data Query And Utilization Through A Semantic Storage Model

US Patent:
2019025, Aug 15, 2019
Filed:
Apr 24, 2019
Appl. No.:
16/393840
Inventors:
Dhryl Anton - Paradise Valley AZ, US
Michael McFall - Paradise Valley AZ, US
Assignee:
VESCEL, LLC - Phoenix AZ
International Classification:
G06F 21/62
G06F 16/22
Abstract:
Disclosed is a method, a device, a system and/or a manufacture of efficient data query and utilization through a semantic storage model. In one embodiment, a method includes generating a unique identifier (UID) to uniquely address a domain within a datastore, defining a content element (NT element) storing a primitive data and/or drawing reference(s) to other domains within the datastore according to a directed acyclic graph architecture, an identity entity element (TY element) of the domain storing data that alone or in combination distinguishes the domain from one or more other domains within the datastore, and a context element (XT element) of the domain that further characterizes the domain and/or draws reference(s) to other domains within the datastore which may violate the directed acyclic graph architecture to define a flexible contextual reference. A key may be generated such that the TY element is individually addressable within the datastore.

NOTICE: You may not use BackgroundCheck or the information it provides to make decisions about employment, credit, housing or any other purpose that would require Fair Credit Reporting Act (FCRA) compliance. BackgroundCheck is not a Consumer Reporting Agency (CRA) as defined by the FCRA and does not provide consumer reports.