BackgroundCheck.run
Search For

Thomas H Probert Deceased93 Cranbrook Dr, Holden, MA 01520

Thomas Probert Phones & Addresses

93 Cranbrook Dr, Holden, MA 01520    508-8297683   

Ashburn, VA   

226 Pond St, Hopkinton, MA 01748    508-4356691   

Marlborough, MA   

Orono, ME   

93 Cranbrook Dr, Holden, MA 01520    508-2804985   

Work

Company: Software sentinel, inc. Address: 93 Cranbrook Dr, Holden, MA 01520 Phones: 508-2890107 Position: Principal Industries: Computer Programming Services

Education

Degree: High school graduate or higher

Emails

Mentions for Thomas H Probert

Thomas Probert resumes & CV records

Resumes

Thomas Probert Photo 19

Thomas Probert

Thomas Probert Photo 20

Thomas Probert

Thomas Probert Photo 21

Thomas Probert

Thomas Probert Photo 22

Thomas Probert

Thomas Probert Photo 23

Thomas Probert

Publications & IP owners

Us Patents

Registry For Management Of Intellectual Property Rights, Properties And Constraints

US Patent:
2003022, Nov 27, 2003
Filed:
Feb 26, 2003
Appl. No.:
10/374255
Inventors:
Thomas Probert - Holden MA, US
Assignee:
Thomas Probert - Holden MA
International Classification:
G06F017/60
US Classification:
705/001000, 705/026000
Abstract:
An invention comprising a method and system for the identification and management on a computer network of rights, properties and constraints associated with creative works is described. One specific embodiment of the invention, relating to the online management of intellectual property rights, properties and constraints associated with learning materials which may be utilized in the development of Internet-based training, is described, but the invention is not limited to that application.

Techniques For Encoding Information In Computer Code

US Patent:
6782478, Aug 24, 2004
Filed:
Apr 28, 1999
Appl. No.:
09/301209
Inventors:
Thomas Probert - Hopkinton MA, 01748
International Classification:
G06F 1130
US Classification:
713191, 713190, 713194, 713200, 713201
Abstract:
Techniques used in coding software are described. An encoder encodes a machine executable program or portions of a machine executable program. The encoding process uses a cipher table, a unique key for encoding, and an agreement between the encoder and decoder as to what portions of a machine executable will be encoded. By using the decoder on a computer system which may execute the encoded machine executable, the decoder may serve as a recognizer to only execute those machine executable programs which have been encoded and are recognized by the recognizer. If a machine executable is not recognized or rejected, appropriate actions may be taken other than the machine executable.

Steganographic Embedding Of Hidden Payload

US Patent:
2017016, Jun 15, 2017
Filed:
Feb 1, 2017
Appl. No.:
15/421624
Inventors:
- Holliston MA, US
Thomas H. Probert - Holden MA, US
International Classification:
G09C 5/00
G06F 21/12
Abstract:
A method for digital immunity includes identifying a call graph of an executable entity, and mapping nodes of the call graph to a cipher table of obscured information, such that each node based on invariants in the executable entity. A cipher table maintains associations between the invariants and the obscured information. Construction of an obscured information item, such as a executable set of instructions or a program, involves extracting, from the cipher table, ordered portions of the obscured information, in which the ordered portions have a sequence based on the ordering of the invariants, and ensuring that the obscured information matches a predetermined ordering corresponding to acceptable operation, such as by execution of the instructions represented by the obscured information, or steganographic target program (to distinguish from the executable entity being evaluated). The unmodified nature of the executable entity is assured by successful execution of the steganographic target program.

Steganographic Embedding Of Executable Code

US Patent:
2016009, Mar 31, 2016
Filed:
Nov 25, 2015
Appl. No.:
14/951707
Inventors:
- Holliston MA, US
Thomas H. Probert - Holden MA, US
International Classification:
H04L 9/32
G06F 21/12
Abstract:
A method for digital immunity includes identifying a call graph of an executable entity, and mapping nodes of the call graph to a cipher table of obscured information, such that each node based on invariants in the executable entity. A cipher table maintains associations between the invariants and the obscured information. Construction of an obscured information item, such as a executable set of instructions or a program, involves extracting, from the cipher table, ordered portions of the obscured information, in which the ordered portions have a sequence based on the ordering of the invariants, and ensuring that the obscured information matches a predetermined ordering corresponding to acceptable operation, such as by execution of the instructions represented by the obscured information, or steganographic target program (to distinguish from the executable entity being evaluated). The unmodified nature of the executable entity is assured by successful execution of the steganographic target program.

Steganographic Embedding Of Executable Code

US Patent:
2014033, Nov 13, 2014
Filed:
Jun 9, 2014
Appl. No.:
14/299408
Inventors:
Thomas H. Probert - Holden MA, US
International Classification:
G06F 21/60
US Classification:
713189
Abstract:
A method for digital immunity includes identifying a call graph of an executable entity, and mapping nodes of the call graph to a cipher table of obscured information, such that each node based on invariants in the executable entity. A cipher table maintains associations between the invariants and the obscured information. Construction of an obscured information item, such as a executable set of instructions or a program, involves extracting, from the cipher table, ordered portions of the obscured information, in which the ordered portions have a sequence based on the ordering of the invariants, and ensuring that the obscured information matches a predetermined ordering corresponding to acceptable operation, such as by execution of the instructions represented by the obscured information, or steganographic target program (to distinguish from the executable entity being evaluated). The unmodified nature of the executable entity is assured by successful execution of the steganographic target program.

Steganographic Messaging System Using Code Invariants

US Patent:
2014010, Apr 17, 2014
Filed:
Dec 10, 2010
Appl. No.:
12/965067
Inventors:
Thomas H. Probert - Holden MA, US
International Classification:
H04L 9/32
US Classification:
713170
Abstract:
A steganographic method to prevent the execution of malicious code and mitigate software piracy. The method uses invariant portions of machine instructions to create an executable watermark within unmodified code. This watermark can be verified at any stage of the software lifecycle, including dynamically and continuously during execution, to detect foreign code by verifying the integrity of the watermark prior to execution. In addition, the watermark may serve as a steganographic covert channel concealing additional information. Code invariants are not altered by binding operations such as loading and linking on different machines, and thus may be employed to consistently and repeatedly identify an unmodified instantiation of a particular program. The use of opcodes and register references as invariants avoids trivial register substitution as a means of program differentiation that eludes detection. The split key structure of the resulting cipher implies that knowledge of only the code (first key) or the cipher table (second key) alone is insufficient to derive the message.

Isbn (Books And Publications)

Lost Mines And Buried Treasures Of The West

Author:
Thomas Probert
ISBN #:
0520033272

NOTICE: You may not use BackgroundCheck or the information it provides to make decisions about employment, credit, housing or any other purpose that would require Fair Credit Reporting Act (FCRA) compliance. BackgroundCheck is not a Consumer Reporting Agency (CRA) as defined by the FCRA and does not provide consumer reports.