Patents by Inventor George Kurtz

George Kurtz has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10185522
    Abstract: A method and system include digitally imaging a secure portion and a non-secure portion of scratch-off coating protected gaming documents of at least one game, the gaming documents including variable indicia, the gaming documents and the at least one game being associated with at least one overall print run, each print run including (i) a plurality of non-winning gaming documents and (ii) a plurality of winning gaming documents determined by revealing secure variable indicia according to predetermined game programming, and wherein at least the secure portion of digital imaging is hidden under the scratch-off coating. The secure portion can be encrypted into ciphertext with the non-secure portion remaining plaintext or cleartext. This enables digital imaging on demand across a local or distributed network of both secure and non-secure areas of instant lottery tickets or other documents having scratch-off coatings.
    Type: Grant
    Filed: October 21, 2016
    Date of Patent: January 22, 2019
    Assignee: Hydra Management LLC
    Inventors: Kenneth E. Irwin, Jr., Fred W. Finnerty, George Kurtz Peng, Allen Lorne Weil
  • Patent number: 10147283
    Abstract: A computer-implemented method and system are provided for enabling digital imaging of both secure and non-secure areas of instant lottery tickets on demand across a geographically diverse network. Instant lottery tickets produced with this system accommodate smaller volume print runs, process color, and a greater level of customization.
    Type: Grant
    Filed: January 26, 2017
    Date of Patent: December 4, 2018
    Assignee: Hydra Management LLC
    Inventors: Allen Lorne Weil, Fred W. Finnerty, George Kurtz Peng
  • Publication number: 20180314473
    Abstract: A method and system include digitally imaging a secure portion and a non-secure portion of scratch-off coating protected gaming documents of at least one game, the gaming documents including variable indicia, the gaming documents and the at least one game being associated with at least one overall print run, each print run including (i) a plurality of non-winning gaming documents and (ii) a plurality of winning gaming documents determined by revealing secure variable indicia according to predetermined game programming, and wherein at least the secure portion of digital imaging is hidden under the scratch-off coating. The secure portion can be encrypted into ciphertext with the non-secure portion remaining plaintext or cleartext. This enables digital imaging on demand across a local or distributed network of both secure and non-secure areas of instant lottery tickets or other documents having scratch-off coatings.
    Type: Application
    Filed: October 21, 2016
    Publication date: November 1, 2018
    Inventors: Kenneth E. IRWIN JR., Fred W. FINNERTY, George Kurtz PENG, Allen Lorne WEIL
  • Publication number: 20170213425
    Abstract: A computer-implemented method and system are provided for enabling digital imaging of both secure and non-secure areas of instant lottery tickets on demand across a geographically diverse network. Instant lottery tickets produced with this system accommodate smaller volume print runs, process color, and a greater level of customization.
    Type: Application
    Filed: January 26, 2017
    Publication date: July 27, 2017
    Inventors: Allen Lorne WEIL, Fred W. FINNERTY, George Kurtz PENG
  • Patent number: 8621073
    Abstract: A system and method provide comprehensive and highly automated testing of vulnerabilities to intrusion on a target network, including identification of operating system, identification of target network topology and target computers, identification of open target ports, assessment of vulnerabilities on target ports, active assessment of vulnerabilities based on information acquired from target computers, quantitative assessment of target network security and vulnerability, and hierarchical graphical representation of the target network, target computers, and vulnerabilities in a test report. The system and method employ minimally obtrusive techniques to avoid interference with or damage to the target network during or after testing.
    Type: Grant
    Filed: February 15, 2012
    Date of Patent: December 31, 2013
    Assignee: McAfee, Inc.
    Inventors: Stuart C. McClure, George Kurtz, Robin Keir, Marshall A. Beddoe, Michael J. Morton, Christopher M. Prosise, David M. Cole, Christopher Abad
  • Patent number: 8621060
    Abstract: A system and method provide comprehensive and highly automated testing of vulnerabilities to intrusion on a target network, including identification of operating system, identification of target network topology and target computers, identification of open target ports, assessment of vulnerabilities on target ports, active assessment of vulnerabilities based on information acquired from target computers, quantitative assessment of target network security and vulnerability, and hierarchical graphical representation of the target network, target computers, and vulnerabilities in a test report. The system and method employ minimally obtrusive techniques to avoid interference with or damage to the target network during or after testing.
    Type: Grant
    Filed: February 15, 2012
    Date of Patent: December 31, 2013
    Assignee: McAfee, Inc.
    Inventors: Stuart C. McClure, George Kurtz, Robin Keir, Marshall A. Beddoe, Michael J. Morton, Christopher M. Prosise, David M. Cole, Christopher Abad
  • Patent number: 8615582
    Abstract: A system and method provide comprehensive and highly automated testing of vulnerabilities to intrusion on a target network, including identification of operating system, identification of target network topology and target computers, identification of open target ports, assessment of vulnerabilities on target ports, active assessment of vulnerabilities based on information acquired from target computers, quantitative assessment of target network security and vulnerability, and hierarchical graphical representation of the target network, target computers, and vulnerabilities in a test report. The system and method employ minimally obtrusive techniques to avoid interference with or damage to the target network during or after testing.
    Type: Grant
    Filed: February 15, 2012
    Date of Patent: December 24, 2013
    Assignee: McAfee, Inc.
    Inventors: Stuart C. McClure, George Kurtz, Robin Keir, Marshall A. Beddoe, Michael J. Morton, Christopher M. Prosise, David M. Cole, Christopher Abad
  • Publication number: 20120151595
    Abstract: A system and method provide comprehensive and highly automated testing of vulnerabilities to intrusion on a target network, including identification of operating system, identification of target network topology and target computers, identification of open target ports, assessment of vulnerabilities on target ports, active assessment of vulnerabilities based on information acquired from target computers, quantitative assessment of target network security and vulnerability, and hierarchical graphical representation of the target network, target computers, and vulnerabilities in a test report. The system and method employ minimally obtrusive techniques to avoid interference with or damage to the target network during or after testing.
    Type: Application
    Filed: February 15, 2012
    Publication date: June 14, 2012
    Inventors: Stuart C. McClure, George Kurtz, Robin Keir, Marshall A. Beddoe, Michael J. Morton, Christopher M. Prosise, David M. Cole, Christopher Abad
  • Publication number: 20120151596
    Abstract: A system and method provide comprehensive and highly automated testing of vulnerabilities to intrusion on a target network, including identification of operating system, identification of target network topology and target computers, identification of open target ports, assessment of vulnerabilities on target ports, active assessment of vulnerabilities based on information acquired from target computers, quantitative assessment of target network security and vulnerability, and hierarchical graphical representation of the target network, target computers, and vulnerabilities in a test report. The system and method employ minimally obtrusive techniques to avoid interference with or damage to the target network during or after testing.
    Type: Application
    Filed: February 15, 2012
    Publication date: June 14, 2012
    Inventors: Stuart C. McClure, George Kurtz, Robin Keir, Marshall A. Beddoe, Michael J. Morton, Christopher M. Prosise, David M. Cole, Christopher Abad
  • Publication number: 20120151594
    Abstract: A system and method provide comprehensive and highly automated testing of vulnerabilities to intrusion on a target network, including identification of operating system, identification of target network topology and target computers, identification of open target ports, assessment of vulnerabilities on target ports, active assessment of vulnerabilities based on information acquired from target computers, quantitative assessment of target network security and vulnerability, and hierarchical graphical representation of the target network, target computers, and vulnerabilities in a test report. The system and method employ minimally obtrusive techniques to avoid interference with or damage to the target network during or after testing.
    Type: Application
    Filed: February 15, 2012
    Publication date: June 14, 2012
    Inventors: Stuart C. McClure, George Kurtz, Robin Keir, Marshall A. Beddoe, Michael J. Morton, Christopher M. Prosise, David M. Cole, Christopher Abad
  • Publication number: 20120144476
    Abstract: A system and method provide comprehensive and highly automated testing of vulnerabilities to intrusion on a target network, including identification of operating system, identification of target network topology and target computers, identification of open target ports, assessment of vulnerabilities on target ports, active assessment of vulnerabilities based on information acquired from target computers, quantitative assessment of target network security and vulnerability, and hierarchical graphical representation of the target network, target computers, and vulnerabilities in a test report. The system and method employ minimally obtrusive techniques to avoid interference with or damage to the target network during or after testing.
    Type: Application
    Filed: February 15, 2012
    Publication date: June 7, 2012
    Inventors: Stuart C. McClure, George Kurtz, Robin Keir, Marshall A. Beddoe, Michael J. Morton, Christopher M. Prosise, David M. Cole, Christopher Abad
  • Patent number: 8135830
    Abstract: A system and method provide comprehensive and highly automated testing of vulnerabilities to intrusion on a target network, including identification of operating system, identification of target network topology and target computers, identification of open target ports, assessment of vulnerabilities on target ports, active assessment of vulnerabilities based on information acquired from target computers, quantitative assessment of target network security and vulnerability, and hierarchical graphical representation of the target network, target computers, and vulnerabilities in a test report. The system and method employ minimally obtrusive techniques to avoid interference with or damage to the target network during or after testing.
    Type: Grant
    Filed: June 1, 2009
    Date of Patent: March 13, 2012
    Assignee: McAfee, Inc.
    Inventors: Stuart C. McClure, George Kurtz, Robin Keir, Marshall A. Beddoe, Michael J. Morton, Christopher M. Prosise, David M. Cole, Christopher Abad
  • Publication number: 20090259748
    Abstract: A system and method provide comprehensive and highly automated testing of vulnerabilities to intrusion on a target network, including identification of operating system, identification of target network topology and target computers, identification of open target ports, assessment of vulnerabilities on target ports, active assessment of vulnerabilities based on information acquired from target computers, quantitative assessment of target network security and vulnerability, and hierarchical graphical representation of the target network, target computers, and vulnerabilities in a test report. The system and method employ minimally obtrusive techniques to avoid interference with or damage to the target network during or after testing.
    Type: Application
    Filed: June 1, 2009
    Publication date: October 15, 2009
    Inventors: Stuart C. McClure, George Kurtz, Robin Keir, Marshall A. Beddoe, Michael J. Morton, Christopher M. Prosise, David M. Cole, Christopher Abad
  • Patent number: 7543056
    Abstract: A system and method provide comprehensive and highly automated testing of vulnerabilities to intrusion on a target network, including identification of operating system, identification of target network topology and target computers, identification of open target ports, assessment of vulnerabilities on target ports, active assessment of vulnerabilities based on information acquired from target computers, quantitative assessment of target network security and vulnerability, and hierarchical graphical representation of the target network, target computers, and vulnerabilities in a test report The system and method employ minimally obtrusive techniques to avoid interference with or damage to the target network during or after testing.
    Type: Grant
    Filed: September 14, 2006
    Date of Patent: June 2, 2009
    Assignee: McAfee, Inc.
    Inventors: Stuart C. McClure, George Kurtz, Robin Keir, Marshall A. Beddoe, Michael J. Morton, Christopher M. Prosise, David M. Cole, Christopher Abad
  • Publication number: 20070011319
    Abstract: A system and method provide comprehensive and highly automated testing of vulnerabilities to intrusion on a target network, including identification of operating system, identification of target network topology and target computers, identification of open target ports, assessment of vulnerabilities on target ports, active assessment of vulnerabilities based on information acquired from target computers, quantitative assessment of target network security and vulnerability, and hierarchical graphical representation of the target network, target computers, and vulnerabilities in a test report The system and method employ minimally obtrusive techniques to avoid interference with or damage to the target network during or after testing.
    Type: Application
    Filed: September 14, 2006
    Publication date: January 11, 2007
    Inventors: Stuart McClure, George Kurtz, Robin Keir, Marshall Beddoe, Michael Morton, Christopher Prosise, David Cole, Christopher Abad
  • Patent number: 7152105
    Abstract: A system and method provide comprehensive and highly automated testing of vulnerabilities to intrusion on a target network, including identification of operating system, identification of target network topology and target computers, identification of open target ports, assessment of vulnerabilities on target ports, active assessment of vulnerabilities based on information acquired from target computers, quantitative assessment of target network security and vulnerability, and hierarchical graphical representation of the target network, target computers, and vulnerabilities in a test report. The system and method employ minimally obtrusive techniques to avoid interference with or damage to the target network during or after testing.
    Type: Grant
    Filed: January 15, 2002
    Date of Patent: December 19, 2006
    Assignee: McAfee, Inc.
    Inventors: Stuart C. McClure, George Kurtz, Robin Keir, Marshall A. Beddoe, Michael J. Morton, Christopher M. Prosise, David M. Cole, Christopher Abad
  • Publication number: 20030195861
    Abstract: A system and method provide comprehensive and highly automated testing of vulnerabilities to intrusion on a target network, including identification of operating system, identification of target network topology and target computers, identification of open target ports, assessment of vulnerabilities on target ports, active assessment of vulnerabilities based on information acquired from target computers, quantitative assessment of target network security and vulnerability, and hierarchical graphical representation of the target network, target computers, and vulnerabilities in a test report. The system and method employ minimally obtrusive techniques to avoid interference with or damage to the target network during or after testing.
    Type: Application
    Filed: January 15, 2002
    Publication date: October 16, 2003
    Inventors: Stuart C. McClure, George Kurtz, Robin Keir, Marshall A. Beddoe, Michael J. Morton, Christopher M. Prosise, David M. Cole, Christopher Abad