MRS. BARBARA BECK BRANDENBURG, DPT
Physical Therapy in Columbia, SC

License number
South Carolina 5900
Category
Restorative Service Providers
Type
Physical Therapist
Address
Address
9600 Two Notch Rd Suite #26, Columbia, SC 29223
Phone
(803) 736-5540
(803) 699-0951 (Fax)

Personal information

See more information about BARBARA BECK BRANDENBURG at radaris.com
Name
Address
Phone
Barbara Brandenburg, age 90
108 Sugar Creek Rd, Greer, SC 29650
(864) 244-1414
Barbara H Brandenburg, age 100
625 Hulon Howard Rd, Landrum, SC 29356
(864) 457-4255
Barbara C Brandenburg, age 90
108 Sugar, Greer, SC 29650
(864) 244-1414
Barbara C Brandenburg, age 90
108 Sugar Creek Rd, Greer, SC 29650
(864) 244-1414

Professional information

Barbara B Brandenburg Photo 1

Barbara B Brandenburg, Columbia SC - DPT (Diphtheria, pertussis, tetanus)

Specialties:
Physical Therapy
Address:
9600 Two Notch Rd SUITE 26, Columbia 29223
(803) 736-5540 (Phone), (803) 699-0951 (Fax)
Languages:
English


Barbara Beck Brandenburg Photo 2

Barbara Beck Brandenburg, Columbia SC

Specialties:
Physical Therapist
Address:
9600 Two Notch Rd, Columbia, SC 29223


Barbara Brandenburg Photo 3

Broadcast Software Distribution

US Patent:
5894516, Apr 13, 1999
Filed:
Jul 10, 1996
Appl. No.:
8/679638
Inventors:
Barbara B. Brandenburg - Columbia SC
Assignee:
NCR Corporation - Dayton OH
International Classification:
H04L 900
US Classification:
380 4
Abstract:
A method, apparatus, and article of manufacture for broadcasting encrypted software to a target computer enables simultaneous transmission to a plurality of licensed target computers. An encryption key is generated to encrypt a software package. The encryption key is then itself encrypted using a target computer identification code, and the encrypted encryption key is loaded onto the target computer. The encrypted software is broadcast, for example, via satellite, and received at the target computer. The target computer uses its identification code to decrypt the encrypted encryption key (i. e. , unlock the encryption key). Once the target computer unlocks the encryption key, it uses the encryption key to decrypt the software to be installed on the target computer.