BackgroundCheck.run
Search For

Stephen Paxton Rudy, 539095 Jill Dr, Conifer, CO 80433

Stephen Rudy Phones & Addresses

9095 Jill Dr, Conifer, CO 80433    303-6703181   

Scottsdale, AZ   

8525 Hampden Ave, Denver, CO 80231    303-8737357   

Aurora, CO   

San Jose, CA   

Santa Clara, CA   

Naperville, IL   

Work

Company: Fluid medical inc Address: 1931 Old Middlefield Way, Mountain View, CA 94043 Phones: 650-9385300 Position: President Industries: Nonclassifiable Establishments

Mentions for Stephen Paxton Rudy

Career records & work history

License Records

Stephen Edward Rudy

Address:
2044 Fraser St, Aurora, CO 80011
Licenses:
License #: 63635 - Active
Issued Date: Apr 1, 1979
Renew Date: Oct 1, 2015
Expiration Date: Sep 30, 2017
Type: Registered Nurse

Stephen Rudy resumes & CV records

Resumes

Stephen Rudy Photo 32

Network Engineer

Location:
Conifer, CO
Industry:
Financial Services
Work:
Cu Direct Connect
Network Engineer
Education:
University of Phoenix 2004 - 2005
Masters
The University of Kansas 1989 - 1994
Bachelors, Bachelor of Arts, Environmental Studies
Stephen Rudy Photo 33

Network Engineer

Location:
Conifer, CO
Industry:
Financial Services
Work:
Cu Direct Connect
Network Engineer
Skills:
Microsoft Office
Stephen Rudy Photo 34

Picture Framer, Mirriors

Work:

Picture Framer, Mirriors

Publications & IP owners

Us Patents

Managing The Transfer Of E-Mail Attachments To Rendering Devices Other Than An Original E-Mail Recipient

US Patent:
6360252, Mar 19, 2002
Filed:
Aug 31, 2000
Appl. No.:
09/652761
Inventors:
Stephen M. Rudy - Palo Alto CA
Herbert D. Jellinek - Aptos CA
Assignee:
fusionOne, Inc. - San Jose CA
International Classification:
G06F 1516
US Classification:
709206, 709207, 709217
Abstract:
A server machine transfers a version of an e-mail for presentation by a client machine. The version includes a user-understandable descriptor of an attachment to the e-mail but does not include the attachment. The server receives a request from the client to transfer the attachment for rendering. In response, the server obtains an output version of the attachment and transfers the output version to a rendering device, causing the rendering device to produce a rendered version of the attachment. The client machine can have a display, and the user-understandable descriptor can be visible on the display. The descriptor can be a selectable item; in response to selection of the descriptor, the server can transfer options to the client, including options that involve rendering an attachment. For an image attachment, the rendering options can include printing, sending to a copy shop, and sending to a fax machine. For a text attachment, the rendering options can include, in addition to the options for an image attachment, converting to audio.

Secure Authentication Of Users Via Intermediate Parties

US Patent:
7003668, Feb 21, 2006
Filed:
Nov 2, 2001
Appl. No.:
10/003693
Inventors:
Thomas A. Berson - Palo Alto CA, US
Stephen M. Rudy - Palo Alto CA, US
Assignee:
Fusionone, Inc. - San Jose CA
International Classification:
H04L 9/32
US Classification:
713182, 713155, 705 67, 705 72, 726 28, 726 29
Abstract:
An intermediate system provides remote clients with access to a primary system, such as a server. The intermediate system creates and stores a log-in record for each client. The log-in record contains an encrypted primary system client identifier (PSCI). The PSCI contains authentication information for verifying a client's right to access the primary system. Storing an encrypted version of the PSCI enhances the security of the authentication information on the intermediate system. In some implementations of the present invention, the PSCI itself is an encrypted value. When a client attempts to log into the primary system, the intermediate system initially verifies the client's intermediate system access rights. The intermediate system makes this determination using the log-in record and data provided by the client. Next, the intermediate system sends the PSCI to the client's primary system for further authentication.

Performing Server Actions Using Template With Field That Can Be Completed Without Obtaining Information From A User

US Patent:
7293074, Nov 6, 2007
Filed:
Sep 19, 2000
Appl. No.:
09/665315
Inventors:
Herbert D. Jellinek - Aptos CA, US
Stephen M. Rudy - Palo Alto CA, US
Assignee:
fusionOne, Inc. - San Jose CA
International Classification:
G06F 15/16
US Classification:
709218, 709227, 709217
Abstract:
A server machine has a first user interface for interactively producing templates and a second user interface provided through a client machine, such as a wireless telephone, for performing server actions using templates. In response to signals received through the first user interface, the server produces a template for use in performing server actions, such as creating e-mail messages, scheduling appointments, or submitting database queries. The template includes a field and a attribute data indicating whether it is necessary to obtain information through the second user interface to complete the field. The server receives a request from the client machine for performance of a server action using the template. In response, the server performs the server action, determining from the attribute data whether it is necessary to obtain information to complete the field. If not, the server performs the server action without obtaining information through the second user interface to complete the field.

Updating Security Schemes For Remote Client Access

US Patent:
2002008, Jun 27, 2002
Filed:
Nov 2, 2001
Appl. No.:
10/003027
Inventors:
Bharat Mediratta - Menlo Park CA, US
Thomas Berson - Palo Alto CA, US
Stephen Rudy - Palo Alto CA, US
International Classification:
H04K001/00
US Classification:
713/182000
Abstract:
An intermediate system provides remote clients with access to a primary system. The intermediate system creates and stores a log-in record for each client. The log-in record contains an encrypted primary system client identifier (PSCI) and a security scheme identifier (Security ID). The PSCI contains authentication information for verifying a client's right to access the primary system. The Security ID identifies the security scheme employed to secure information for a client's log-in process. The intermediate system initially verifies a client's access rights using the security scheme identified by the Security ID and data provided by the client. Next, the intermediate system sends the PSCI to the client's primary system, which uses the PSCI to verify the client's access rights. When necessary, a security scheme update modifies values in the client log-in record. The update modifies values that depend on log-in data provided by the client, including modifications to the encrypted PSCI. Using the client's log-in data eliminates the need to separately request data from the client for security scheme updates.

Isbn (Books And Publications)

Language In Literature

Author:
Stephen Rudy
ISBN #:
0674510275

Language In Literature

Author:
Stephen Rudy
ISBN #:
0674510283

Verbal Art, Verbal Sign, Verbal Time

Author:
Stephen Rudy
ISBN #:
0816613613

Dostoevsky &Amp; Gogol: Texts And Criticism

Author:
Stephen Rudy
ISBN #:
0882333151

Myth In Literature

Author:
Stephen Rudy
ISBN #:
0893571377

Russian Formalism: A Retrospective Glance A Festschrift In Honor Of Victor Erlich

Author:
Stephen Rudy
ISBN #:
0936586060

New Vistas In Grammar: Invariance And Variation

Author:
Stephen Rudy
ISBN #:
9027235430

Selected Writings: Early Slavic Paths And Crossroads

Author:
Stephen Rudy
ISBN #:
9027931887

NOTICE: You may not use BackgroundCheck or the information it provides to make decisions about employment, credit, housing or any other purpose that would require Fair Credit Reporting Act (FCRA) compliance. BackgroundCheck is not a Consumer Reporting Agency (CRA) as defined by the FCRA and does not provide consumer reports.