Eric M Rossman, Age 4133 Barker Ave APT 3G, White Plains, NY 10601

Eric Rossman Phones & Addresses

33 Barker Ave APT 3G, White Plains, NY 10601 (845) 548-4604

4 Bradley Dr, New City, NY 10956 (845) 784-6499

Binghamton, NY

4 Bradley Dr, New City, NY 10956

Work

Company: Rossman Law Group, PLLC Address:

Mentions for Eric M Rossman

Career records & work history

Lawyers & Attorneys

Eric Rossman Photo 1

Eric Rossman - Lawyer

Office:
Rossman Law Group, PLLC
Specialties:
Medical Malpractice, Personal Injury, Cerebral Palsy, Civil Rights, Class Actions, Deep Vein Thrombosis, Erbs Palsy, Gastric Bypass Surgery Malpractice, Health Care, Helicopter Crash Litigation, Insurance Bad Faith, Life and Health Insurance, Automobile Insurance, Commercial Insurance, Labor and Employment, Lasik Surgery Malpractice, Liposuction Malpractice, Lung Cancer, Premises Liability, Products Liability, Whiplash, Workers Compensation
ISLN:
900927049
Admitted:
1992
University:
Boise State University, B.B.A., 1989
Law School:
University of Idaho College of Law, J.D., 1992

Eric Rossman resumes & CV records

Resumes

Eric Rossman Photo 40

Senior Portfolio Analyst

Location:
33 Barker Ave, White Plains, NY 10601
Industry:
Financial Services
Work:
Gary Goldberg Financial Services
Senior Portfolio Analyst
1879 Advisors Jun 2006 - Jan 2010
Portfolio Analyst
Education:
Binghamton University 2002 - 2006
Clarkstown High School North 2002
Binghamton University
Skills:
Mutual Funds, Series 7, Investment Strategies, Finance, Wealth Management, Equities, Financial Services, Financial Analysis, Series 63, Investments, Strategic Financial Planning, Etfs, Investment Advisory, Data Analysis, Asset Management, Portfolio Management
Eric Rossman Photo 41

Eric Rossman

Eric Rossman Photo 42

Eric Rossman

Eric Rossman Photo 43

Eric Rossman

Eric Rossman Photo 44

Eric Rossman

Location:
Greater New York City Area
Industry:
Telecommunications

Publications & IP owners

Us Patents

Secure Key Management

US Patent:
2013003, Feb 14, 2013
Filed:
Oct 15, 2012
Appl. No.:
13/652022
Inventors:
INTERNATIONAL BUSINESS MACHINES CORPORATION - Armonk NY, US
Elizabeth A. Dames - Concord NC, US
Carsten D. Frehr - Farum, DK
Michael J. Kelly - Staatsburg NY, US
Kenneth B. Kerr - New Paltz NY, US
Richard V. Kisley - Charlotte NC, US
Eric D. Rossman - Concord NC, US
Eric B. Smith - Concord NC, US
Assignee:
INTERNATIONAL BUSINESS MACHINES CORPORATION - Armonk NY
International Classification:
H04L 9/00
US Classification:
380277
Abstract:
According to one embodiment, a method for implementing secure key management is provided. The method includes populating a section of information associated with a key, the section being populated with information relating to how the key was created. The method also includes populating the section with information relating to how the key was acquired by a secure module; and binding the section to the key, wherein the key is encrypted.

Secure Key Management

US Patent:
2013003, Feb 14, 2013
Filed:
Oct 15, 2012
Appl. No.:
13/652027
Inventors:
International Business Machines Corporation - Armonk NY, US
Elizabeth A. Dames - Concord NC, US
Thomas J. Dewkett - Staatsburg NY, US
Carsten D. Frehr - Farum, DK
Michael J. Kelly - Staatsburg NY, US
Kenneth B. Kerr - New Paltz NY, US
Richard V. Kisley - Charlotte NC, US
Eric D. Rossman - Wappingers Falls NY, US
Eric B. Smith - Concord NC, US
Assignee:
INTERNATIONAL BUSINESS MACHINES CORPORATION - Armonk NY
International Classification:
H04L 9/00
US Classification:
380277
Abstract:
According to one embodiment, a method for implementing computer security is provided. The method includes creating a token and populating a payload section of the token with key material and selecting a wrapping method that specifies how the key material is securely bound to key control information, wherein a structure of the key control information in the token is independent of the wrapping method. The method also includes wrapping the key material and binding key control information to the key material in the token, wherein the key control information includes information relating to usage and management of the key material.

Secure Key Management

US Patent:
2013004, Feb 21, 2013
Filed:
Oct 15, 2012
Appl. No.:
13/652032
Inventors:
International Business Machines Corporation - Armonk NY, US
Elizabeth A. Dames - Concord NC, US
Carsten D. Frehr - Farum, DK
Michael J. Kelly - Staatsburg NY, US
Kenneth B. Kerr - New Paltz NY, US
Richard V. Kisley - Charlotte NC, US
Eric D. Rossman - Concord NC, US
Eric B. Smith - Concord NC, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
H04L 9/00
US Classification:
380277
Abstract:
Secure key management includes populating a section of information associated with a key, the section of information being populated with information relating to a level of protection of the key accumulated over time. Secure key management further includes securely binding the section of information to the key, wherein the key is encrypted.

Key Management Policies For Cryptographic Keys

US Patent:
2013004, Feb 21, 2013
Filed:
Oct 17, 2012
Appl. No.:
13/653929
Inventors:
International Business Machines Corporation - Armonk NY, US
Elizabeth A. Dames - Concord NC, US
Carsten D. Frehr - Farum DE, US
Michael J. Kelly - Wappingers Falls NY, US
Kenneth B. Kerr - New Paltz NY, US
Richard V. Kisley - Charlotte NC, US
Eric D. Rossman - Wappingers Falls NY, US
Eric B. Smith - Concord NC, US
Assignee:
INTERNATIONAL BUSINESS MACHINES CORPORATION - Armonk NY
International Classification:
H04L 9/00
US Classification:
380277
Abstract:
A computer program product for secure key management is provided. The computer program product includes a tangible storage medium readable by a processing circuit and storing instructions for execution by the processing circuit for performing a method. The method includes creating a token and populating the token with key material, and binding key control information to the key material. The key control information includes information relating to management of the key material populating one or more key management fields that define attributes that limit distribution of the key material.

Key Usage Policies For Cryptographic Keys

US Patent:
2013010, Apr 25, 2013
Filed:
Oct 19, 2012
Appl. No.:
13/656101
Inventors:
International Business Machines Corporation - Armonk NY, US
Elizabeth A. Dames - Concord NC, US
Carsten D. Frehr - Farum, DE
Michael J. Kelly - Wappingers Falls NY, US
Kenneth B. Kerr - New Paltz NY, US
Richard V. Kisley - Charlotte NC, US
Eric D. Rossman - Wappingers Falls NY, US
Eric B. Smith - Concord NC, US
Assignee:
INTERNATIONAL BUSINESS MACHINES CORPORATION - Armonk NY
International Classification:
G06F 21/60
US Classification:
713189
Abstract:
A computer program product for secure key management is provided. The computer program product includes a tangible storage medium readable by a processing circuit and storing instructions for execution by the processing circuit for performing a method. The method includes creating a token and populating the token with key material, and binding key control information to the key material. The key control information includes information relating to usage of the key material populating one or more key usage fields that define attributes that limit actions that may be performed with the key material.

Adjunct Processor Extended Message Limit Facility

US Patent:
2023008, Mar 23, 2023
Filed:
Sep 23, 2021
Appl. No.:
17/483344
Inventors:
- Armonk NY, US
Damian Osisek - Vestal NY, US
Harald Freudenberger - Fellbach, DE
Richard John Moore - Waterlooville, GB
Volker Urban - Boeblingen, DE
Michael D. Hocker - Staatsburg NY, US
Eric David Rossman - Wappingers Falls NY, US
Richard Victor Kisley - Charlotte NC, US
International Classification:
G06F 9/54
G06F 11/07
Abstract:
A message limit value to be used in enqueuing one or more messages on a queue of a device of the computing environment is obtained. The message limit value indicates whether an extended maximum message length is supported by the device. The extended maximum message length is different from a default maximum message length supported by the device. Based on determining that the extended maximum message length is supported and that the obtained message limit value has a defined relationship with a select value, at least one message of an extended length is enqueued on the queue of the device.

NOTICE: You may not use PeopleBackgroundCheck or the information it provides to make decisions about employment, credit, housing or any other purpose that would require Fair Credit Reporting Act (FCRA) compliance. PeopleBackgroundCheck is not a Consumer Reporting Agency (CRA) as defined by the FCRA and does not provide consumer reports.