THOMAS JAMES SHIELDS
Real Estate Appraisers in Washington, DC

License number
Pennsylvania 002823
Category
Certified Real Est. Appraisers
Type
Temporary Authority to Practice
Address
Address 2
Washington, DC 20007
Pennsylvania

Personal information

See more information about THOMAS JAMES SHIELDS at radaris.com
Name
Address
Phone
Thomas Shields, age 74
49 Winding Way, Marcus Hook, PA 19061
(610) 476-5450
Thomas Shields
4720 Richmond St, Erie, PA 16509
(814) 790-5972
Thomas Shields, age 60
518 N Elm St, Lititz, PA 17543
(717) 951-3895
Thomas Shields
5931 Rodgers St, Pittsburgh, PA 15207
(412) 874-9191
Thomas Shields, age 93
604 Torbet Rd, Coatesville, PA 19320
(610) 383-0851

Professional information

Thomas Shields Photo 1

Automated Forensic Document Signatures

US Patent:
8312023, Nov 13, 2012
Filed:
May 12, 2008
Appl. No.:
12/118942
Inventors:
Thomas Clay Shields - Washington DC, US
Ophir Frieder - Chicago IL, US
Marcus A. Maloof - Bethesda MD, US
Assignee:
Georgetown University - Washington DC
International Classification:
G06F 7/00
US Classification:
707742, 707781, 713180, 713186, 705 50, 705 51, 705 64, 705 75, 705 76
Abstract:
Methods and systems are provided for a proactive approach for computer forensic investigations. The invention allows organizations anticipating the need for forensic analysis to prepare in advance. Digital representations are generated proactively for a specified target. A digital representation is a digest of the content of the target. Digital representations of a collection of targets indexed and organized in a data structure, such as an inverted index. The searching and comparison of digital representations of a collection of targets allows quick and accurate identification of targets having identical or similar content. Computational and storage costs are expended in advance, which allows more efficient computer forensic investigations. The present invention can be applied to numerous applications, such as computer forensic evidence gathering, misuse detection, network intrusion detection, and unauthorized network traffic detection and prevention.


Thomas Shields Photo 2

Automated Forensic Document Signatures

US Patent:
8438174, May 7, 2013
Filed:
Jun 24, 2010
Appl. No.:
12/822722
Inventors:
Thomas Clay Shields - Washington DC, US
Ophir Frieder - Chicago IL, US
Marcus A. Maloof - Washington DC, US
Assignee:
Georgetown University - Washington DC
International Classification:
G06F 17/30
US Classification:
707755, 726 26
Abstract:
Methods and systems are provided for a proactive approach for computer forensic investigations. The invention allows organizations anticipating the need for forensic analysis to prepare in advance. Forensic signatures are created including a digital fingerprint and other information associated with a file. In one aspect, informational signatures are created, which may assist in determining what information is included in a file. In another aspect, the digital fingerprint may represent contents of the file and is resistant to minor modification of the file. In another aspect, fingerprints can be compared in parallel on different computers.


Thomas Shields Photo 3

Automated Forensic Document Signatures

US Patent:
8280905, Oct 2, 2012
Filed:
Dec 21, 2007
Appl. No.:
11/963186
Inventors:
Thomas Clay Shields - Washington DC, US
Ophir Frieder - Chicago IL, US
Marcus A. Maloof - Bethesda MD, US
Assignee:
Georgetown University - Washington DC
International Classification:
G06F 7/00, G06F 17/30
US Classification:
707781, 706 46, 713186, 713180
Abstract:
Methods and systems are provided for a proactive approach for computer forensic investigations. The invention allows organizations anticipating the need for forensic analysis to prepare in advance. Digital signatures are generated proactively for a specified target. The digital signature represents a digest of the content of the target, and can be readily stored. Searching and comparing digital signatures allows quick and accurate identification of targets having identical or similar content. Computational and storage costs are expended in advance, which allow more efficient computer forensic investigations. The present invention can be applied to numerous applications, such as computer forensic evidence gathering, misuse detection, network intrusion detection, and unauthorized network traffic detection and prevention.