Patents by Inventor George Kurtz
George Kurtz has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10185522Abstract: A method and system include digitally imaging a secure portion and a non-secure portion of scratch-off coating protected gaming documents of at least one game, the gaming documents including variable indicia, the gaming documents and the at least one game being associated with at least one overall print run, each print run including (i) a plurality of non-winning gaming documents and (ii) a plurality of winning gaming documents determined by revealing secure variable indicia according to predetermined game programming, and wherein at least the secure portion of digital imaging is hidden under the scratch-off coating. The secure portion can be encrypted into ciphertext with the non-secure portion remaining plaintext or cleartext. This enables digital imaging on demand across a local or distributed network of both secure and non-secure areas of instant lottery tickets or other documents having scratch-off coatings.Type: GrantFiled: October 21, 2016Date of Patent: January 22, 2019Assignee: Hydra Management LLCInventors: Kenneth E. Irwin, Jr., Fred W. Finnerty, George Kurtz Peng, Allen Lorne Weil
-
Patent number: 10147283Abstract: A computer-implemented method and system are provided for enabling digital imaging of both secure and non-secure areas of instant lottery tickets on demand across a geographically diverse network. Instant lottery tickets produced with this system accommodate smaller volume print runs, process color, and a greater level of customization.Type: GrantFiled: January 26, 2017Date of Patent: December 4, 2018Assignee: Hydra Management LLCInventors: Allen Lorne Weil, Fred W. Finnerty, George Kurtz Peng
-
Publication number: 20180314473Abstract: A method and system include digitally imaging a secure portion and a non-secure portion of scratch-off coating protected gaming documents of at least one game, the gaming documents including variable indicia, the gaming documents and the at least one game being associated with at least one overall print run, each print run including (i) a plurality of non-winning gaming documents and (ii) a plurality of winning gaming documents determined by revealing secure variable indicia according to predetermined game programming, and wherein at least the secure portion of digital imaging is hidden under the scratch-off coating. The secure portion can be encrypted into ciphertext with the non-secure portion remaining plaintext or cleartext. This enables digital imaging on demand across a local or distributed network of both secure and non-secure areas of instant lottery tickets or other documents having scratch-off coatings.Type: ApplicationFiled: October 21, 2016Publication date: November 1, 2018Inventors: Kenneth E. IRWIN JR., Fred W. FINNERTY, George Kurtz PENG, Allen Lorne WEIL
-
Publication number: 20170213425Abstract: A computer-implemented method and system are provided for enabling digital imaging of both secure and non-secure areas of instant lottery tickets on demand across a geographically diverse network. Instant lottery tickets produced with this system accommodate smaller volume print runs, process color, and a greater level of customization.Type: ApplicationFiled: January 26, 2017Publication date: July 27, 2017Inventors: Allen Lorne WEIL, Fred W. FINNERTY, George Kurtz PENG
-
Patent number: 8621073Abstract: A system and method provide comprehensive and highly automated testing of vulnerabilities to intrusion on a target network, including identification of operating system, identification of target network topology and target computers, identification of open target ports, assessment of vulnerabilities on target ports, active assessment of vulnerabilities based on information acquired from target computers, quantitative assessment of target network security and vulnerability, and hierarchical graphical representation of the target network, target computers, and vulnerabilities in a test report. The system and method employ minimally obtrusive techniques to avoid interference with or damage to the target network during or after testing.Type: GrantFiled: February 15, 2012Date of Patent: December 31, 2013Assignee: McAfee, Inc.Inventors: Stuart C. McClure, George Kurtz, Robin Keir, Marshall A. Beddoe, Michael J. Morton, Christopher M. Prosise, David M. Cole, Christopher Abad
-
Patent number: 8621060Abstract: A system and method provide comprehensive and highly automated testing of vulnerabilities to intrusion on a target network, including identification of operating system, identification of target network topology and target computers, identification of open target ports, assessment of vulnerabilities on target ports, active assessment of vulnerabilities based on information acquired from target computers, quantitative assessment of target network security and vulnerability, and hierarchical graphical representation of the target network, target computers, and vulnerabilities in a test report. The system and method employ minimally obtrusive techniques to avoid interference with or damage to the target network during or after testing.Type: GrantFiled: February 15, 2012Date of Patent: December 31, 2013Assignee: McAfee, Inc.Inventors: Stuart C. McClure, George Kurtz, Robin Keir, Marshall A. Beddoe, Michael J. Morton, Christopher M. Prosise, David M. Cole, Christopher Abad
-
Patent number: 8615582Abstract: A system and method provide comprehensive and highly automated testing of vulnerabilities to intrusion on a target network, including identification of operating system, identification of target network topology and target computers, identification of open target ports, assessment of vulnerabilities on target ports, active assessment of vulnerabilities based on information acquired from target computers, quantitative assessment of target network security and vulnerability, and hierarchical graphical representation of the target network, target computers, and vulnerabilities in a test report. The system and method employ minimally obtrusive techniques to avoid interference with or damage to the target network during or after testing.Type: GrantFiled: February 15, 2012Date of Patent: December 24, 2013Assignee: McAfee, Inc.Inventors: Stuart C. McClure, George Kurtz, Robin Keir, Marshall A. Beddoe, Michael J. Morton, Christopher M. Prosise, David M. Cole, Christopher Abad
-
Publication number: 20120151595Abstract: A system and method provide comprehensive and highly automated testing of vulnerabilities to intrusion on a target network, including identification of operating system, identification of target network topology and target computers, identification of open target ports, assessment of vulnerabilities on target ports, active assessment of vulnerabilities based on information acquired from target computers, quantitative assessment of target network security and vulnerability, and hierarchical graphical representation of the target network, target computers, and vulnerabilities in a test report. The system and method employ minimally obtrusive techniques to avoid interference with or damage to the target network during or after testing.Type: ApplicationFiled: February 15, 2012Publication date: June 14, 2012Inventors: Stuart C. McClure, George Kurtz, Robin Keir, Marshall A. Beddoe, Michael J. Morton, Christopher M. Prosise, David M. Cole, Christopher Abad
-
Publication number: 20120151596Abstract: A system and method provide comprehensive and highly automated testing of vulnerabilities to intrusion on a target network, including identification of operating system, identification of target network topology and target computers, identification of open target ports, assessment of vulnerabilities on target ports, active assessment of vulnerabilities based on information acquired from target computers, quantitative assessment of target network security and vulnerability, and hierarchical graphical representation of the target network, target computers, and vulnerabilities in a test report. The system and method employ minimally obtrusive techniques to avoid interference with or damage to the target network during or after testing.Type: ApplicationFiled: February 15, 2012Publication date: June 14, 2012Inventors: Stuart C. McClure, George Kurtz, Robin Keir, Marshall A. Beddoe, Michael J. Morton, Christopher M. Prosise, David M. Cole, Christopher Abad
-
Publication number: 20120151594Abstract: A system and method provide comprehensive and highly automated testing of vulnerabilities to intrusion on a target network, including identification of operating system, identification of target network topology and target computers, identification of open target ports, assessment of vulnerabilities on target ports, active assessment of vulnerabilities based on information acquired from target computers, quantitative assessment of target network security and vulnerability, and hierarchical graphical representation of the target network, target computers, and vulnerabilities in a test report. The system and method employ minimally obtrusive techniques to avoid interference with or damage to the target network during or after testing.Type: ApplicationFiled: February 15, 2012Publication date: June 14, 2012Inventors: Stuart C. McClure, George Kurtz, Robin Keir, Marshall A. Beddoe, Michael J. Morton, Christopher M. Prosise, David M. Cole, Christopher Abad
-
Publication number: 20120144476Abstract: A system and method provide comprehensive and highly automated testing of vulnerabilities to intrusion on a target network, including identification of operating system, identification of target network topology and target computers, identification of open target ports, assessment of vulnerabilities on target ports, active assessment of vulnerabilities based on information acquired from target computers, quantitative assessment of target network security and vulnerability, and hierarchical graphical representation of the target network, target computers, and vulnerabilities in a test report. The system and method employ minimally obtrusive techniques to avoid interference with or damage to the target network during or after testing.Type: ApplicationFiled: February 15, 2012Publication date: June 7, 2012Inventors: Stuart C. McClure, George Kurtz, Robin Keir, Marshall A. Beddoe, Michael J. Morton, Christopher M. Prosise, David M. Cole, Christopher Abad
-
Patent number: 8135830Abstract: A system and method provide comprehensive and highly automated testing of vulnerabilities to intrusion on a target network, including identification of operating system, identification of target network topology and target computers, identification of open target ports, assessment of vulnerabilities on target ports, active assessment of vulnerabilities based on information acquired from target computers, quantitative assessment of target network security and vulnerability, and hierarchical graphical representation of the target network, target computers, and vulnerabilities in a test report. The system and method employ minimally obtrusive techniques to avoid interference with or damage to the target network during or after testing.Type: GrantFiled: June 1, 2009Date of Patent: March 13, 2012Assignee: McAfee, Inc.Inventors: Stuart C. McClure, George Kurtz, Robin Keir, Marshall A. Beddoe, Michael J. Morton, Christopher M. Prosise, David M. Cole, Christopher Abad
-
Publication number: 20090259748Abstract: A system and method provide comprehensive and highly automated testing of vulnerabilities to intrusion on a target network, including identification of operating system, identification of target network topology and target computers, identification of open target ports, assessment of vulnerabilities on target ports, active assessment of vulnerabilities based on information acquired from target computers, quantitative assessment of target network security and vulnerability, and hierarchical graphical representation of the target network, target computers, and vulnerabilities in a test report. The system and method employ minimally obtrusive techniques to avoid interference with or damage to the target network during or after testing.Type: ApplicationFiled: June 1, 2009Publication date: October 15, 2009Inventors: Stuart C. McClure, George Kurtz, Robin Keir, Marshall A. Beddoe, Michael J. Morton, Christopher M. Prosise, David M. Cole, Christopher Abad
-
Patent number: 7543056Abstract: A system and method provide comprehensive and highly automated testing of vulnerabilities to intrusion on a target network, including identification of operating system, identification of target network topology and target computers, identification of open target ports, assessment of vulnerabilities on target ports, active assessment of vulnerabilities based on information acquired from target computers, quantitative assessment of target network security and vulnerability, and hierarchical graphical representation of the target network, target computers, and vulnerabilities in a test report The system and method employ minimally obtrusive techniques to avoid interference with or damage to the target network during or after testing.Type: GrantFiled: September 14, 2006Date of Patent: June 2, 2009Assignee: McAfee, Inc.Inventors: Stuart C. McClure, George Kurtz, Robin Keir, Marshall A. Beddoe, Michael J. Morton, Christopher M. Prosise, David M. Cole, Christopher Abad
-
Publication number: 20070011319Abstract: A system and method provide comprehensive and highly automated testing of vulnerabilities to intrusion on a target network, including identification of operating system, identification of target network topology and target computers, identification of open target ports, assessment of vulnerabilities on target ports, active assessment of vulnerabilities based on information acquired from target computers, quantitative assessment of target network security and vulnerability, and hierarchical graphical representation of the target network, target computers, and vulnerabilities in a test report The system and method employ minimally obtrusive techniques to avoid interference with or damage to the target network during or after testing.Type: ApplicationFiled: September 14, 2006Publication date: January 11, 2007Inventors: Stuart McClure, George Kurtz, Robin Keir, Marshall Beddoe, Michael Morton, Christopher Prosise, David Cole, Christopher Abad
-
Patent number: 7152105Abstract: A system and method provide comprehensive and highly automated testing of vulnerabilities to intrusion on a target network, including identification of operating system, identification of target network topology and target computers, identification of open target ports, assessment of vulnerabilities on target ports, active assessment of vulnerabilities based on information acquired from target computers, quantitative assessment of target network security and vulnerability, and hierarchical graphical representation of the target network, target computers, and vulnerabilities in a test report. The system and method employ minimally obtrusive techniques to avoid interference with or damage to the target network during or after testing.Type: GrantFiled: January 15, 2002Date of Patent: December 19, 2006Assignee: McAfee, Inc.Inventors: Stuart C. McClure, George Kurtz, Robin Keir, Marshall A. Beddoe, Michael J. Morton, Christopher M. Prosise, David M. Cole, Christopher Abad
-
Publication number: 20030195861Abstract: A system and method provide comprehensive and highly automated testing of vulnerabilities to intrusion on a target network, including identification of operating system, identification of target network topology and target computers, identification of open target ports, assessment of vulnerabilities on target ports, active assessment of vulnerabilities based on information acquired from target computers, quantitative assessment of target network security and vulnerability, and hierarchical graphical representation of the target network, target computers, and vulnerabilities in a test report. The system and method employ minimally obtrusive techniques to avoid interference with or damage to the target network during or after testing.Type: ApplicationFiled: January 15, 2002Publication date: October 16, 2003Inventors: Stuart C. McClure, George Kurtz, Robin Keir, Marshall A. Beddoe, Michael J. Morton, Christopher M. Prosise, David M. Cole, Christopher Abad