BackgroundCheck.run
Search For

Todd Michael Arnold, 54516 Mountain Meadows Dr, Bessemer City, NC 28016

Todd Arnold Phones & Addresses

516 Mountain Meadows Dr, Bessemer City, NC 28016    704-9220794    704-9227420   

Dallas, NC   

29233 Heckleman St, Brooksville, FL 34602   

Irvine, CA   

San Diego, CA   

Nevada City, CA   

Cherryville, NC   

Charlotte, NC   

Fort Bragg, NC   

Hernando, FL   

Work

Company: Bridgewater Capital Address: 2108 South Blvd., Suite 209, Charlotte, NC 28202 Phones: 704-3334500 (Office)

Education

School / High School: University of North Carolina at Charlotte- Charlotte, NC Dec 2009 Specialities: Master of Business Administration

Images

Mentions for Todd Michael Arnold

Career records & work history

Real Estate Brokers

Todd Arnold Photo 1

President

Work:
Bridgewater Capital
2108 South Blvd., Suite 209, Charlotte, NC 28202
704-3334500 (Office)
Experience:
16 years
Links:
Site

Medicine Doctors

Todd W. Arnold

Specialties:
Orthopedic Sports Medicine
Work:
St Vincent Sports Performance
14455 Clay Ter Blvd STE B, Carmel, IN 46032
317-4155885 (phone) 317-4155886 (fax)
St Vincents Sports Performance
8227 Northwest Blvd STE 160, Indianapolis, IN 46278
317-4155795 (phone) 317-4155799 (fax)
St Vincent Physical Therapy
8227 Northwest Blvd STE 160, Indianapolis, IN 46278
317-4155700 (phone) 317-4155710 (fax)
Education:
Medical School
University of Colorado School of Medicine at Denver
Graduated: 1995
Languages:
English
Description:
Dr. Arnold graduated from the University of Colorado School of Medicine at Denver in 1995. He works in Indianapolis, IN and 2 other locations and specializes in Orthopedic Sports Medicine. Dr. Arnold is affiliated with St Vincent Indianapolis Hospital & Heart Center.

Todd Arnold resumes & CV records

Resumes

Todd Arnold Photo 51

Wireless Sales Engineering Professional

Location:
Charlotte, North Carolina Area
Industry:
Wireless
Todd Arnold Photo 52

Chief Executive Officer

Work:
Keeping It Real
Chief Executive Officer
Education:
Washington State University
Bachelors, Bachelor of Arts, Business Administration
Skills:
Microsoft Excel, Microsoft Office
Todd Arnold Photo 53

Todd Arnold

Location:
516 Mountain Meadows Dr, Bessemer City, NC 28016
Industry:
Wireless
Work:
Superconductor Technologies 1999 - 2009
Sales Engineer
Superconductor Technologies Dec 1999 - Dec 2008
Sales Application Engineer
Verizon Wireless Jan 1997 - Dec 1999
Facilities Engineer
Skills:
Cdma, Lte, Wireless, Rf, Telecommunications, Gsm, Wireless Networking, Networking, Cross Functional Team Leadership, Integration, Rf Engineering
Todd Arnold Photo 54

Todd Arnold

Todd Arnold Photo 55

Todd Arnold

Todd Arnold Photo 56

Todd Arnold

Todd Arnold Photo 57

Todd Arnold

Todd Arnold Photo 58

Todd Arnold

Publications & IP owners

Us Patents

Method And System For Providing Limited-Life Machine-Specific Passwords For Data Processing Systems

US Patent:
6601175, Jul 29, 2003
Filed:
Mar 16, 1999
Appl. No.:
09/270418
Inventors:
Todd Weston Arnold - Charlotte NC
David Carroll Challener - Raleigh NC
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F 15177
US Classification:
713202, 713 1, 713 2, 713100, 713200, 713201, 713182, 713183, 713184, 709229
Abstract:
Features of a data processing system, such as its configuration, are protected utilizing a machine-specific limited-life password. The data processing system includes execution resources for executing a watchdog program, a limited-life value generator, and non-volatile storage that stores a machine-specific value at least partially derived from relatively unique information associated with the data processing system (and preferably also derived from a secret control password). In response to each attempted access to the protected features of the data processing system, the watchdog program generates at least one machine-specific limited-life password from the machine-specific value and a limited-life value generated by the limited-life value generator. The watchdog program allows access to the protected features in response to entry of the machine-specific limited-life password and otherwise denies access. Depending upon implementation, the limited-life value can represent a timestamp that limits the duration that the machine-specific limited-life value is valid or a nonce that limits the number of times that the machine-specific limited-life value can be used.

Method For Controlling Security Function Execution With A Flexible, Extendable, And Non-Forgable Block

US Patent:
7779258, Aug 17, 2010
Filed:
Sep 22, 2006
Appl. No.:
11/534236
Inventors:
Todd W. Arnold - Charlotte NC, US
Elizabeth A. Dames - Harrisburg NC, US
Carsten D. Frehr - Farum, DK
Kurt S. Jacobsen - Roskilde, DK
Michael J. Kelly - Staatsburg NY, US
Mark D. Marik - Denver NC, US
Jesper Wiese - Lyngby, DK
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
H04N 7/16
H04L 9/00
H04L 9/32
G06F 17/30
G06F 7/04
G06K 9/00
H03M 1/68
H04K 1/00
US Classification:
713169, 713171, 713172, 713181, 726 26
Abstract:
A method, article, and system for providing an effective implementation of data structures, and application programming interface (API) functions that allow secure execution of functions behind a secure boundary. The controlling mechanism is a flexible, extendable, and non-forgeable block that details how values and parameters behind the secure boundary can be changed. The invention allows for one entity to execute a security function that will normally require extensive authorizations or dual or multiple control. The method and system comprise instructions that are cryptographically protected against alteration or misuse, wherein the instructions further comprise a trusted block that defines security policies that are permitted when an application program employs the trusted block in APIs. The trusted block has a number of fields containing rules that provide an ability to limit how the trusted block is used, thereby reducing the risk of the trusted block being employed in unintended ways.

Method For Improved Key Management For Atms And Other Remote Devices

US Patent:
7908474, Mar 15, 2011
Filed:
Sep 22, 2006
Appl. No.:
11/534232
Inventors:
Todd W. Arnold - Charlotte NC, US
Elizabeth A. Dames - Harrisburg NC, US
Carsten D. Frehr - Farum, DK
Kurt S. Jacobsen - Roskilde, DK
Michael J. Kelly - Staatsburg NY, US
Mark D. Marik - Denver NC, US
Jesper Wiese - Lyngby, DK
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
H04L 9/00
G06F 21/00
US Classification:
713155, 713190
Abstract:
A method, article, and system for providing an effective implementation of a data structure comprising instructions that are cryptographically protected against alteration or misuse, wherein the instructions further comprise a trusted block that defines specific key management policies that are permitted when an application program employs the trusted block in application programming interface (API) functions to generate or export symmetric cryptographic keys. The trusted block has a number of fields containing rules that provide an ability to limit how the trusted block is used, thereby reducing the risk of the trusted block being employed in unintended ways or with unintended keys.

Parsing Optional Block Data

US Patent:
8538939, Sep 17, 2013
Filed:
May 31, 2011
Appl. No.:
13/118925
Inventors:
Todd W. Arnold - Charlotte NC, US
Carsten D. Frehr - Farum, DK
Richard V. Kisley - Charlotte NC, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F 7/00
US Classification:
707700
Abstract:
A computer program product is provided and includes a tangible storage medium readable by a processing circuit and on which instructions are stored for execution by the processing circuit for initially verifying a presence of parameters passed to a parameter database and that a selected group of the parameters are greater than or equal to zero, parsing optional block data to validate the optional block data, determine a length thereof and a number of optional blocks contained therein and proceeding with one of a secondary info-parsing and a secondary data-parsing operation with respect to the optional block data in accordance with content of the parameters passed to the parameter database.

Secure Key Management

US Patent:
8566913, Oct 22, 2013
Filed:
May 4, 2011
Appl. No.:
13/100357
Inventors:
Todd W. Arnold - Charlotte NC, US
Elizabeth A. Dames - Concord NC, US
Carsten D. Frehr - Farum, DK
Kenneth B. Kerr - New Paltz NY, US
Richard V. Kisley - Charlotte NC, US
Michael J. Kelly - Staatsburg NY, US
Eric D. Rossman - Wappingers Falls NY, US
Eric B. Smith - Concord NC, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
H04L 29/06
US Classification:
726 5, 713193
Abstract:
A system for secure key management is provided. The system includes a computer processor and an application configured to execute on the computer processor, the application implementing a method. The method includes populating a section of information associated with a key, the section of information being populated with information relating to a level of protection of the key accumulated over time. Secure key management further includes securely binding the section of information to the key, wherein the key is encrypted.

Secure Key Creation

US Patent:
8615081, Dec 24, 2013
Filed:
Jun 1, 2011
Appl. No.:
13/150592
Inventors:
Todd W. Arnold - Charlotte NC, US
Elizabeth A. Dames - Concord NC, US
Richard V. Kisley - Charlotte NC, US
Michael J. Miele - Concord NC, US
James W. Sweeny - Millbrook NY, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
H04L 9/00
US Classification:
380 44
Abstract:
Key creation includes sending a first public key part from a first system to a second system, receiving a second public key part sent by the second system to the first system and establishing a first secret material in the first system using the first and second public key parts, wherein the first secret material is identical to a second secret material established on the second system using the first and second key parts. Key creation also includes binding key control information to the first secret material in the first system, wherein the key control information includes information relating to key type and key management and deriving a first key material from the combination of the key control information and the first secret material, wherein the first key material is identical to a second key material derived by the second system.

Secure Key Creation

US Patent:
8619990, Dec 31, 2013
Filed:
Apr 27, 2011
Appl. No.:
13/095226
Inventors:
Todd W. Arnold - Charlotte NC, US
Elizabeth A. Dames - Concord NC, US
Carsten D. Frehr - Farum, DK
Kenneth B. Kerr - New Paltz NY, US
Richard V. Kisley - Charlotte NC, US
Eric D. Rossman - Wappingers Falls NY, US
Eric B. Smith - Concord NC, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
H04L 9/08
H04L 9/30
US Classification:
380277
Abstract:
A system for creating a secure key is provided that includes a computer processor and an application configured to execute on the computer processor, the application implementing a method that includes creating a token and populating a key control information section of the token with a value to indicate a minimum number of key parts used to form a key. Creating the secure key also includes populating a payload section of the token with a first key part, binding the key control information section to the payload section, adding a second key part to the first key part and iterating the value and binding the key control information section to the payload section after the second key part has been added. Creating the secure key further includes indicating the key is complete, wherein the key comprises a combination of the first and second key parts.

Secure Key Management

US Patent:
8634561, Jan 21, 2014
Filed:
May 4, 2011
Appl. No.:
13/100354
Inventors:
Todd W. Arnold - Charlotte NC, US
Elizabeth A. Dames - Concord NC, US
Carsten D. Frehr - Farum, DK
Kenneth B. Kerr - New Paltz NY, US
Richard V. Kisley - Charlotte NC, US
Michael J. Kelly - Staatsburg NY, US
Eric D. Rossman - Wappingers Falls NY, US
Eric B. Smith - Concord NC, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F 21/00
US Classification:
380280, 380277, 380278, 380279
Abstract:
A system for implementing secure key management is provided. The system includes a computer processor and an application configured to execute on the computer processor, the application implementing a method. The method includes populating a section of information associated with a key, the section being populated with information relating to how the key was created. The method also includes populating the section with information relating to how the key was acquired by a secure module; and binding the section to the key, wherein the key is encrypted.

NOTICE: You may not use BackgroundCheck or the information it provides to make decisions about employment, credit, housing or any other purpose that would require Fair Credit Reporting Act (FCRA) compliance. BackgroundCheck is not a Consumer Reporting Agency (CRA) as defined by the FCRA and does not provide consumer reports.