Search

David P Youatt

from Redmond, WA
Age ~64

David Youatt Phones & Addresses

  • 24539 11Th St, Redmond, WA 98053 (425) 868-1927
  • 24539 NE 11Th St, Sammamish, WA 98074 (425) 868-1927
  • Bruce Twp, MI
  • Holliston, MA
  • Philadelphia, PA

Skills

3D • System Architecture • Engineering • Scalability • Performance Tuning • High Availability • SQL Tuning • Database Design • Hadoop • REST • Distributed Systems • Linux • Software Engineering • C • Agile • Unix • Shell Scripting • Databases • Apache • Architecture • Python • PostgreSQL • C++

Industries

Computer Software

Resumes

Resumes

David Youatt Photo 1

David Youatt

View page
Location:
Greater Seattle Area
Industry:
Computer Software
Skills:
3D
System Architecture
Engineering
Scalability
Performance Tuning
High Availability
SQL Tuning
Database Design
Hadoop
REST
Distributed Systems
Linux
Software Engineering
C
Agile
Unix
Shell Scripting
Databases
Apache
Architecture
Python
PostgreSQL
C++

Publications

Us Patents

System And Method For Data Encryption

View page
US Patent:
2004017, Sep 9, 2004
Filed:
Mar 5, 2003
Appl. No.:
10/384147
Inventors:
David Youatt - Redmond WA,
Jason Smith - Redmond WA,
Assignee:
xSides Corporation - Seattle WA
International Classification:
H04N007/167
US Classification:
380/210000
Abstract:
An encryption technology uses an encryption map and video graphics processing technology to combine an encryption map with the image data. Video image processing using maps, such as texture maps, bump maps and the like are combined with an encryption map to generate and encrypted image data. The image is subsequently decrypted using encryption keys that are combined with the encrypted image data using video graphics processing technologies. The decryption map is combined with the encrypted signal to generate a viewable image. The encryption keys may be on a per pixel basis with a separate encryption key for each pixel. Alternatively, an encryption key may contain active keys that may be used to decrypt more than one pixel as well as decoy keys that do not decrypt the signal and thus confound unauthorized decryption attempts. Using encryption maps, single video frames or portions of video frames may be encrypted. The encryption maps may be used with scaled image data and with two dimensional or three dimensional graphics processors.
David P Youatt from Redmond, WA, age ~64 Get Report