Patents by Inventor Peter S. Tippett
Peter S. Tippett has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9384330Abstract: A first server device receives a request for attributes, of a user, from a second server device associated with a receiving entity. The first server device determines whether the receiving entity is entitled to receive the attributes, and authenticates an identity of the user. The first server device also identifies the attributes based on the identity when the receiving entity is entitled to receive the attributes, and transmits the identified attributes to the second server device.Type: GrantFiled: December 9, 2011Date of Patent: July 5, 2016Assignee: VERIZON PATENT AND LICENSING INC.Inventors: Paul A. Donfried, Peter S. Tippett, Guy S. Tallent, Jr., Ashley Evans
-
Patent number: 9264445Abstract: The security of mobile applications may be assessed and used to enhance the security of mobile devices. In one example, a method may include determining security scores of one or more mobile applications, the security scores defining a level of security risk corresponding to the one or more mobile applications. The method may further include receiving a policy relating to mobile applications that are permitted to be used by the mobile device, the policy including a threshold security score value; and receiving the requested security scores. The method may further include restricting use of selected ones of the one or more mobile applications when a security score corresponding to the one or more mobile applications is below the threshold security score value.Type: GrantFiled: September 8, 2014Date of Patent: February 16, 2016Assignee: Verizon Patent and Licensing Inc.Inventors: Steven T. Archer, Peter S. Tippett, Gregory P. Crawford, Paul Hubbard, Gina M. Ganley, Jo Ann Joels
-
Publication number: 20150161345Abstract: A device receives, from a first user device associated with a user, a request to access a secure messaging service provide by the device, authenticates the user based on credentials provided in the request, and receives a search request for users of the secure messaging service. The device identifies authentic users of the secure messaging service based on the search request; provides, to the first user device, information associated with the authentic users; receives a message addressed to a particular user of the authentic users; analyzes the message to determine whether the message includes information for identifying the user or the particular user; stores the information for identifying the user or the particular user; formats the message into a format that is understood by a second user device associated with the particular user; encrypts the formatted message; and provides the encrypted and formatted message to the second user device.Type: ApplicationFiled: December 9, 2013Publication date: June 11, 2015Applicant: Verizon Patent and Licensing Inc.Inventor: Peter S. TIPPETT
-
Publication number: 20140380413Abstract: The security of mobile applications may be assessed and used to enhance the security of mobile devices. In one example, a method may include determining security scores of one or more mobile applications, the security scores defining a level of security risk corresponding to the one or more mobile applications. The method may further include receiving a policy relating to mobile applications that are permitted to be used by the mobile device, the policy including a threshold security score value; and receiving the requested security scores. The method may further include restricting use of selected ones of the one or more mobile applications when a security score corresponding to the one or more mobile applications is below the threshold security score value.Type: ApplicationFiled: September 8, 2014Publication date: December 25, 2014Inventors: Steven T. ARCHER, Peter S. TIPPETT, Gregory P. CRAWFORD, Paul HUBBARD, Gina M. GANLEY, Jo Ann JOELS
-
Patent number: 8832841Abstract: The security of mobile applications may be assessed and used to enhance the security of mobile devices. In one example, a method may include determining security scores of one or more mobile applications, the security scores defining a level of security risk corresponding to the one or more mobile applications. The method may further include receiving a policy relating to mobile applications that are permitted to be used by the mobile device, the policy including a threshold security score value; and receiving the requested security scores. The method may further include restricting use of selected ones of the one or more mobile applications when a security score corresponding to the one or more mobile applications is below the threshold security score value.Type: GrantFiled: May 22, 2012Date of Patent: September 9, 2014Assignee: Verizon Patent and Licensing Inc.Inventors: Steven T. Archer, Peter S. Tippett, Gregory T. Crawford, Paul Hubbard, Gina M. Ganley, Jo Ann Joels
-
Patent number: 8763131Abstract: The security or other attributes of mobile applications may be assessed and assigned a security score. In one implementation, a device may obtain information relating to the mobile applications, and may determine, for each of the mobile applications, a number of security scores. Each of the security scores may define a level of risk for a security category relating to a mobile application. The device may further combine the security scores, for each of the mobile applications, to obtain, for each of the mobile applications, a final security score.Type: GrantFiled: May 22, 2012Date of Patent: June 24, 2014Assignee: Verizon Patent and Licensing Inc.Inventors: Steven T. Archer, Peter S. Tippett, Wade Baker, Alex Guazzelli, Gina M. Ganley
-
Publication number: 20130318613Abstract: The security or other attributes of mobile applications may be assessed and assigned a security score. In one implementation, a device may obtain information relating to the mobile applications, and may determine, for each of the mobile applications, a number of security scores. Each of the security scores may define a level of risk for a security category relating to a mobile application. The device may further combine the security scores, for each of the mobile applications, to obtain, for each of the mobile applications, a final security score.Type: ApplicationFiled: May 22, 2012Publication date: November 28, 2013Applicant: VERIZON PATENT AND LICENSING INC.Inventors: Steven T. ARCHER, Peter S. TIPPETT, Wade BAKER, Alex GUAZZELLI, Gina M. GANLEY
-
Publication number: 20130318614Abstract: The security of mobile applications may be assessed and used to enhance the security of mobile devices. In one example, a method may include determining security scores of one or more mobile applications, the security scores defining a level of security risk corresponding to the one or more mobile applications. The method may further include receiving a policy relating to mobile applications that are permitted to be used by the mobile device, the policy including a threshold security score value; and receiving the requested security scores. The method may further include restricting use of selected ones of the one or more mobile applications when a security score corresponding to the one or more mobile applications is below the threshold security score value.Type: ApplicationFiled: May 22, 2012Publication date: November 28, 2013Applicant: VERIZON PATENT AND LICENSING INC.Inventors: Steven T. ARCHER, Peter S. TIPPETT, Gregory P. CRAWFORD, Paul HUBBARD, Gina M. GANLEY, Jo Ann JOELS
-
Patent number: 8595857Abstract: A method, performed by a computer device, may include receiving personal data from a user device associated with personas, where each of the personas corresponds to at least one classification of requesters, associating the received personal data with at least one of the personas, and identifying any of the classifications that correspond to the personas associated with received personal data. The method may further include receiving, from a data requester, a query including a request for the personal data; associating the data requester with a classification; and comparing the classification associated with the data requester to the classifications associated with personal data. The method may further include sending, to the data requester, a message containing the personal data in response to the classification of the data requester corresponding to the classifications of the personal data.Type: GrantFiled: December 28, 2010Date of Patent: November 26, 2013Assignee: Verizon Patent and Licensing Inc.Inventors: Paul Andrew Donfried, Steven T. Archer, Guy S. Tallent, Jr., Ashley Evans, Peter S. Tippett
-
Publication number: 20130291099Abstract: A system is configure to monitor financial and/or identification inquiries for anomalous behavior; identify anomalous behavior by comparing the financial and/or identification inquiries to historical financial transactions and/or identification information; send a notification to a mobile device when anomalous behavior is identified for a user of the mobile device; and receive a signal from the mobile device approving, denying, or requesting more information about the anomalous behavior.Type: ApplicationFiled: April 25, 2012Publication date: October 31, 2013Applicant: VERIZON PATENT AND LICENSING, INC.Inventors: Paul A. DONFRIED, Peter S. TIPPETT, Scott N. KERN, Vidhyaprakash RAMACHANDRAN
-
Publication number: 20130152155Abstract: A first server device receives a request for attributes, of a user, from a second server device associated with a receiving entity. The first server device determines whether the receiving entity is entitled to receive the attributes, and authenticates an identity of the user. The first server device also identifies the attributes based on the identity when the receiving entity is entitled to receive the attributes, and transmits the identified attributes to the second server device.Type: ApplicationFiled: December 9, 2011Publication date: June 13, 2013Applicant: VERIZON PATENT AND LICENSING INC.Inventors: Paul A. DONFRIED, Peter S. TIPPETT, Guy S. TALLENT, JR., Ashley EVANS
-
Publication number: 20120167234Abstract: A method, performed by a computer device, may include receiving personal data from a user device associated with personas, where each of the personas corresponds to at least one classification of requesters, associating the received personal data with at least one of the personas, and identifying any of the classifications that correspond to the personas associated with received personal data. The method may further include receiving, from a data requester, a query including a request for the personal data; associating the data requester with a classification; and comparing the classification associated with the data requester to the classifications associated with personal data. The method may further include sending, to the data requester, a message containing the personal data in response to the classification of the data requester corresponding to the classifications of the personal data.Type: ApplicationFiled: December 28, 2010Publication date: June 28, 2012Applicant: VERIZON PATENT AND LICENSING, INC.Inventors: Paul Andrew DONFRIED, Steven T. ARCHER, Guy S. TALLENT, JR., Ashley EVANS, Peter S. TIPPETT
-
Patent number: 8020210Abstract: A system and method for assessing the risk to information resources that may include the generation and/or use of a security risk index. The security risk index may represent the security of information resources. The security risk index may be based on at least one factor. The at least one factor may be individually quantified. The at least one factor may include a threat factor associated with a rate or frequency of security events that threaten the security of the information resources, a vulnerability factor associated with a likelihood of a security event breaching the security of the information resources, an impact factor associated with an expected cost of a breach of the security of the information resources, or another type of factor. The security risk index of a subset of information resources including at least one resource may enable various comparisons and observations with respect to the security of the subset of information resources.Type: GrantFiled: June 9, 2004Date of Patent: September 13, 2011Assignee: Verizon Patent and Licensing Inc.Inventors: Peter S. Tippett, Samuel Migues, Paul David Robertson
-
Patent number: 7818249Abstract: A method, system, and medium for assessing and/or managing risks for an organization is described. The method, for example, comprises the steps of inventorying a number of assets of the organization, identifying at least one criterion defining a security objective of the organization, and identifying one or more inventoried assets that relate to the identified criterion. The assets may include one or more computers, networking equipment therefor and physical locations where the computers and networking equipment are located. The method may also include the step of formulating one or more metric equations, each metric equation being defined, in part, by the one or more identified assets. Each metric equation yields an outcome value when one or more measurements are made relating to the identified assets. The method may also include the step of assessing the risk to the organization based on the measured values of the one or more metric equations. Corresponding system, medium and means are also described.Type: GrantFiled: January 2, 2002Date of Patent: October 19, 2010Assignee: Verizon Patent and Licensing Inc.Inventors: Kristin Gallina Lovejoy, Patrick Ivo Cross, Peter S. Tippett
-
Publication number: 20020138416Abstract: A method, system, and medium for assessing and/or managing risks for an organization is described. The method, for example, comprises the steps of inventorying a number of assets of the organization, identifying at least one criterion defining a security objective of the organization, and identifying one or more inventoried assets that relate to the identified criterion. The assets may include one or more computers, networking equipment therefor and physical locations where the computers and networking equipment are located. The method may also include the step of formulating one or more metric equations, each metric equation being defined, in part, by the one or more identified assets. Each metric equation yields an outcome value when one or more measurements are made relating to the identified assets. The method may also include the step of assessing the risk to the organization based on the measured values of the one or more metric equations. Corresponding system, medium and means are also described.Type: ApplicationFiled: January 2, 2002Publication date: September 26, 2002Inventors: Kristin Gallina Lovejoy, Patrick Ivo Cross, Peter S. Tippett