Patents by Inventor Peter S. Tippett

Peter S. Tippett has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9384330
    Abstract: A first server device receives a request for attributes, of a user, from a second server device associated with a receiving entity. The first server device determines whether the receiving entity is entitled to receive the attributes, and authenticates an identity of the user. The first server device also identifies the attributes based on the identity when the receiving entity is entitled to receive the attributes, and transmits the identified attributes to the second server device.
    Type: Grant
    Filed: December 9, 2011
    Date of Patent: July 5, 2016
    Assignee: VERIZON PATENT AND LICENSING INC.
    Inventors: Paul A. Donfried, Peter S. Tippett, Guy S. Tallent, Jr., Ashley Evans
  • Patent number: 9264445
    Abstract: The security of mobile applications may be assessed and used to enhance the security of mobile devices. In one example, a method may include determining security scores of one or more mobile applications, the security scores defining a level of security risk corresponding to the one or more mobile applications. The method may further include receiving a policy relating to mobile applications that are permitted to be used by the mobile device, the policy including a threshold security score value; and receiving the requested security scores. The method may further include restricting use of selected ones of the one or more mobile applications when a security score corresponding to the one or more mobile applications is below the threshold security score value.
    Type: Grant
    Filed: September 8, 2014
    Date of Patent: February 16, 2016
    Assignee: Verizon Patent and Licensing Inc.
    Inventors: Steven T. Archer, Peter S. Tippett, Gregory P. Crawford, Paul Hubbard, Gina M. Ganley, Jo Ann Joels
  • Publication number: 20150161345
    Abstract: A device receives, from a first user device associated with a user, a request to access a secure messaging service provide by the device, authenticates the user based on credentials provided in the request, and receives a search request for users of the secure messaging service. The device identifies authentic users of the secure messaging service based on the search request; provides, to the first user device, information associated with the authentic users; receives a message addressed to a particular user of the authentic users; analyzes the message to determine whether the message includes information for identifying the user or the particular user; stores the information for identifying the user or the particular user; formats the message into a format that is understood by a second user device associated with the particular user; encrypts the formatted message; and provides the encrypted and formatted message to the second user device.
    Type: Application
    Filed: December 9, 2013
    Publication date: June 11, 2015
    Applicant: Verizon Patent and Licensing Inc.
    Inventor: Peter S. TIPPETT
  • Publication number: 20140380413
    Abstract: The security of mobile applications may be assessed and used to enhance the security of mobile devices. In one example, a method may include determining security scores of one or more mobile applications, the security scores defining a level of security risk corresponding to the one or more mobile applications. The method may further include receiving a policy relating to mobile applications that are permitted to be used by the mobile device, the policy including a threshold security score value; and receiving the requested security scores. The method may further include restricting use of selected ones of the one or more mobile applications when a security score corresponding to the one or more mobile applications is below the threshold security score value.
    Type: Application
    Filed: September 8, 2014
    Publication date: December 25, 2014
    Inventors: Steven T. ARCHER, Peter S. TIPPETT, Gregory P. CRAWFORD, Paul HUBBARD, Gina M. GANLEY, Jo Ann JOELS
  • Patent number: 8832841
    Abstract: The security of mobile applications may be assessed and used to enhance the security of mobile devices. In one example, a method may include determining security scores of one or more mobile applications, the security scores defining a level of security risk corresponding to the one or more mobile applications. The method may further include receiving a policy relating to mobile applications that are permitted to be used by the mobile device, the policy including a threshold security score value; and receiving the requested security scores. The method may further include restricting use of selected ones of the one or more mobile applications when a security score corresponding to the one or more mobile applications is below the threshold security score value.
    Type: Grant
    Filed: May 22, 2012
    Date of Patent: September 9, 2014
    Assignee: Verizon Patent and Licensing Inc.
    Inventors: Steven T. Archer, Peter S. Tippett, Gregory T. Crawford, Paul Hubbard, Gina M. Ganley, Jo Ann Joels
  • Patent number: 8763131
    Abstract: The security or other attributes of mobile applications may be assessed and assigned a security score. In one implementation, a device may obtain information relating to the mobile applications, and may determine, for each of the mobile applications, a number of security scores. Each of the security scores may define a level of risk for a security category relating to a mobile application. The device may further combine the security scores, for each of the mobile applications, to obtain, for each of the mobile applications, a final security score.
    Type: Grant
    Filed: May 22, 2012
    Date of Patent: June 24, 2014
    Assignee: Verizon Patent and Licensing Inc.
    Inventors: Steven T. Archer, Peter S. Tippett, Wade Baker, Alex Guazzelli, Gina M. Ganley
  • Publication number: 20130318613
    Abstract: The security or other attributes of mobile applications may be assessed and assigned a security score. In one implementation, a device may obtain information relating to the mobile applications, and may determine, for each of the mobile applications, a number of security scores. Each of the security scores may define a level of risk for a security category relating to a mobile application. The device may further combine the security scores, for each of the mobile applications, to obtain, for each of the mobile applications, a final security score.
    Type: Application
    Filed: May 22, 2012
    Publication date: November 28, 2013
    Applicant: VERIZON PATENT AND LICENSING INC.
    Inventors: Steven T. ARCHER, Peter S. TIPPETT, Wade BAKER, Alex GUAZZELLI, Gina M. GANLEY
  • Publication number: 20130318614
    Abstract: The security of mobile applications may be assessed and used to enhance the security of mobile devices. In one example, a method may include determining security scores of one or more mobile applications, the security scores defining a level of security risk corresponding to the one or more mobile applications. The method may further include receiving a policy relating to mobile applications that are permitted to be used by the mobile device, the policy including a threshold security score value; and receiving the requested security scores. The method may further include restricting use of selected ones of the one or more mobile applications when a security score corresponding to the one or more mobile applications is below the threshold security score value.
    Type: Application
    Filed: May 22, 2012
    Publication date: November 28, 2013
    Applicant: VERIZON PATENT AND LICENSING INC.
    Inventors: Steven T. ARCHER, Peter S. TIPPETT, Gregory P. CRAWFORD, Paul HUBBARD, Gina M. GANLEY, Jo Ann JOELS
  • Patent number: 8595857
    Abstract: A method, performed by a computer device, may include receiving personal data from a user device associated with personas, where each of the personas corresponds to at least one classification of requesters, associating the received personal data with at least one of the personas, and identifying any of the classifications that correspond to the personas associated with received personal data. The method may further include receiving, from a data requester, a query including a request for the personal data; associating the data requester with a classification; and comparing the classification associated with the data requester to the classifications associated with personal data. The method may further include sending, to the data requester, a message containing the personal data in response to the classification of the data requester corresponding to the classifications of the personal data.
    Type: Grant
    Filed: December 28, 2010
    Date of Patent: November 26, 2013
    Assignee: Verizon Patent and Licensing Inc.
    Inventors: Paul Andrew Donfried, Steven T. Archer, Guy S. Tallent, Jr., Ashley Evans, Peter S. Tippett
  • Publication number: 20130291099
    Abstract: A system is configure to monitor financial and/or identification inquiries for anomalous behavior; identify anomalous behavior by comparing the financial and/or identification inquiries to historical financial transactions and/or identification information; send a notification to a mobile device when anomalous behavior is identified for a user of the mobile device; and receive a signal from the mobile device approving, denying, or requesting more information about the anomalous behavior.
    Type: Application
    Filed: April 25, 2012
    Publication date: October 31, 2013
    Applicant: VERIZON PATENT AND LICENSING, INC.
    Inventors: Paul A. DONFRIED, Peter S. TIPPETT, Scott N. KERN, Vidhyaprakash RAMACHANDRAN
  • Publication number: 20130152155
    Abstract: A first server device receives a request for attributes, of a user, from a second server device associated with a receiving entity. The first server device determines whether the receiving entity is entitled to receive the attributes, and authenticates an identity of the user. The first server device also identifies the attributes based on the identity when the receiving entity is entitled to receive the attributes, and transmits the identified attributes to the second server device.
    Type: Application
    Filed: December 9, 2011
    Publication date: June 13, 2013
    Applicant: VERIZON PATENT AND LICENSING INC.
    Inventors: Paul A. DONFRIED, Peter S. TIPPETT, Guy S. TALLENT, JR., Ashley EVANS
  • Publication number: 20120167234
    Abstract: A method, performed by a computer device, may include receiving personal data from a user device associated with personas, where each of the personas corresponds to at least one classification of requesters, associating the received personal data with at least one of the personas, and identifying any of the classifications that correspond to the personas associated with received personal data. The method may further include receiving, from a data requester, a query including a request for the personal data; associating the data requester with a classification; and comparing the classification associated with the data requester to the classifications associated with personal data. The method may further include sending, to the data requester, a message containing the personal data in response to the classification of the data requester corresponding to the classifications of the personal data.
    Type: Application
    Filed: December 28, 2010
    Publication date: June 28, 2012
    Applicant: VERIZON PATENT AND LICENSING, INC.
    Inventors: Paul Andrew DONFRIED, Steven T. ARCHER, Guy S. TALLENT, JR., Ashley EVANS, Peter S. TIPPETT
  • Patent number: 8020210
    Abstract: A system and method for assessing the risk to information resources that may include the generation and/or use of a security risk index. The security risk index may represent the security of information resources. The security risk index may be based on at least one factor. The at least one factor may be individually quantified. The at least one factor may include a threat factor associated with a rate or frequency of security events that threaten the security of the information resources, a vulnerability factor associated with a likelihood of a security event breaching the security of the information resources, an impact factor associated with an expected cost of a breach of the security of the information resources, or another type of factor. The security risk index of a subset of information resources including at least one resource may enable various comparisons and observations with respect to the security of the subset of information resources.
    Type: Grant
    Filed: June 9, 2004
    Date of Patent: September 13, 2011
    Assignee: Verizon Patent and Licensing Inc.
    Inventors: Peter S. Tippett, Samuel Migues, Paul David Robertson
  • Patent number: 7818249
    Abstract: A method, system, and medium for assessing and/or managing risks for an organization is described. The method, for example, comprises the steps of inventorying a number of assets of the organization, identifying at least one criterion defining a security objective of the organization, and identifying one or more inventoried assets that relate to the identified criterion. The assets may include one or more computers, networking equipment therefor and physical locations where the computers and networking equipment are located. The method may also include the step of formulating one or more metric equations, each metric equation being defined, in part, by the one or more identified assets. Each metric equation yields an outcome value when one or more measurements are made relating to the identified assets. The method may also include the step of assessing the risk to the organization based on the measured values of the one or more metric equations. Corresponding system, medium and means are also described.
    Type: Grant
    Filed: January 2, 2002
    Date of Patent: October 19, 2010
    Assignee: Verizon Patent and Licensing Inc.
    Inventors: Kristin Gallina Lovejoy, Patrick Ivo Cross, Peter S. Tippett
  • Publication number: 20020138416
    Abstract: A method, system, and medium for assessing and/or managing risks for an organization is described. The method, for example, comprises the steps of inventorying a number of assets of the organization, identifying at least one criterion defining a security objective of the organization, and identifying one or more inventoried assets that relate to the identified criterion. The assets may include one or more computers, networking equipment therefor and physical locations where the computers and networking equipment are located. The method may also include the step of formulating one or more metric equations, each metric equation being defined, in part, by the one or more identified assets. Each metric equation yields an outcome value when one or more measurements are made relating to the identified assets. The method may also include the step of assessing the risk to the organization based on the measured values of the one or more metric equations. Corresponding system, medium and means are also described.
    Type: Application
    Filed: January 2, 2002
    Publication date: September 26, 2002
    Inventors: Kristin Gallina Lovejoy, Patrick Ivo Cross, Peter S. Tippett