Patents by Inventor George R. Kurtz

George R. Kurtz has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240168247
    Abstract: An optical connector assembly (OCA) includes a connector housing to maintain alignment between optical components housed within the OCA and photoelectric converters on an optoelectronic substrate (OES) assembly. The optical components include a ferrule and an optical cable. The ferrule is optically coupled to the optical cable. The OCA includes a ferrule holder to hold the ferrule within the OCA, and a spring located between the connector housing and the ferrule holder. The spring is to apply a separating force between the ferrule holder and the connector housing. The OCA includes a gasket coupled to the connector housing. The coupling of the connector housing to a socket compresses the gasket to provide a seal between the connector housing and the socket.
    Type: Application
    Filed: December 26, 2023
    Publication date: May 23, 2024
    Inventors: Paul Kessler Rosenberg, George Panotopoulos, Kent Devenport, Darrell R. Childers, Daniel D. Kurtz, Cecil D. Hastings, JR.
  • Publication number: 20120185945
    Abstract: A security risk management system comprises a vulnerability database, an asset database, a local threat intelligence database and a threat correlation module. The vulnerability database comprises data about security vulnerabilities of assets on a network gathered using active or passive vulnerability assessment techniques. The asset database comprises data concerning attributes of each asset. The threat correlation module receives threat intelligence alerts that identify attributes and vulnerabilities associated with security threats that affect classes of assets. The threat correlation module compares asset attributes and vulnerabilities with threat attributes and vulnerabilities and displays a list of assets that are affected by a particular threat. The list can be sorted according to a calculated risk score, allowing an administrator to prioritize preventive action and respond first to threats that affect higher risk assets.
    Type: Application
    Filed: March 28, 2012
    Publication date: July 19, 2012
    Inventors: Steven G. Andres, David M. Cole, Thomas Gregory Cummings, Roberto Ramon Garcia, Brian Michael Kenyon, George R. Kurtz, Stuart Cartier McClure, Christopher William Moore, Michael J. O'Dea, Ken D. Saruwatari
  • Patent number: 8201257
    Abstract: A security risk management system comprises a vulnerability database, an asset database, a local threat intelligence database and a threat correlation module. The vulnerability database comprises data about security vulnerabilities of assets on a network gathered using active or passive vulnerability assessment techniques. The asset database comprises data concerning attributes of each asset. The threat correlation module receives threat intelligence alerts that identify attributes and vulnerabilities associated with security threats that affect classes of assets. The threat correlation module compares asset attributes and vulnerabilities with threat attributes and vulnerabilities and displays a list of assets that are affected by a particular threat. The list can be sorted according to a calculated risk score, allowing an administrator to prioritize preventive action and respond first to threats that affect higher risk assets.
    Type: Grant
    Filed: March 31, 2004
    Date of Patent: June 12, 2012
    Assignee: McAfee, Inc.
    Inventors: Steven G. Andres, David M. Cole, Thomas Gregory Cummings, Roberto Ramon Garcia, Brian Michael Kenyon, George R. Kurtz, Stuart Cartier McClure, Christopher William Moore, Michael J. O'Dea, Ken D. Saruwatari
  • Patent number: 7664845
    Abstract: A system and method provide comprehensive and highly automated testing of vulnerabilities to intrusion on a target network, including identification of operating system, identification of target network topology and target computers, identification of open target ports, assessment of vulnerabilities on target ports, active assessment of vulnerabilities based on information acquired from target computers, quantitative assessment of target network security and vulnerability, and hierarchical graphical representation of the target network, target computers, and vulnerabilities in a test report. The system and method employ minimally obtrusive techniques to avoid interference with or damage to the target network during or after testing.
    Type: Grant
    Filed: March 10, 2003
    Date of Patent: February 16, 2010
    Assignee: McAfee, Inc.
    Inventors: George R. Kurtz, David M. Cole, Erik Caso, Dan Kuykendall
  • Publication number: 20030217039
    Abstract: A system and method provide comprehensive and highly automated testing of vulnerabilities to intrusion on a target network, including identification of operating system, identification of target network topology and target computers, identification of open target ports, assessment of vulnerabilities on target ports, active assessment of vulnerabilities based on information acquired from target computers, quantitative assessment of target network security and vulnerability, and hierarchical graphical representation of the target network, target computers, and vulnerabilities in a test report. The system and method employ minimally obtrusive techniques to avoid interference with or damage to the target network during or after testing.
    Type: Application
    Filed: March 10, 2003
    Publication date: November 20, 2003
    Inventors: George R. Kurtz, David M. Cole