Patents by Inventor Kevin Watkins

Kevin Watkins has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8918882
    Abstract: Quantifying the risks of applications (“apps”) for mobile devices is disclosed. In some embodiments, quantifying the risks of apps for mobile devices includes receiving an application for a mobile device; performing an automated analysis of the application based on a risk profile; and generating a risk score based on the automated analysis of the application based on the risk profile.
    Type: Grant
    Filed: March 11, 2014
    Date of Patent: December 23, 2014
    Assignee: Appthority, Inc.
    Inventors: Anthony John Bettini, Kevin Watkins, Domingo J. Guerra, Michael Price
  • Patent number: 8918881
    Abstract: Techniques for off-device anti-malware protection for mobile devices are disclosed. In some embodiments, off-device anti-malware protection for mobile devices includes receiving a software inventory for a mobile device, in which the software inventory identifies a plurality of applications installed on the mobile device; and determining whether one or more of the plurality of applications identified in the software inventory are associated with malware based on a policy. In some embodiments, the off-device anti-malware protection for mobile devices further includes enforcing the policy on the mobile device. In some embodiments, the off-device anti-malware protection for mobile devices is provided as a cloud service.
    Type: Grant
    Filed: January 11, 2013
    Date of Patent: December 23, 2014
    Assignee: Appthority, Inc.
    Inventors: Anthony John Bettini, Kevin Watkins, Domingo J. Guerra, Michael Price
  • Publication number: 20140331281
    Abstract: Techniques for in-line filtering of insecure or unwanted mobile components or communications (e.g., insecure or unwanted behaviors associated with applications for mobile devices (“apps”), updates for apps, communications to/from apps, operating system components/updates for mobile devices, etc.) for mobile devices are disclosed. In some embodiments, in-line filtering of apps for mobile devices includes intercepting a request for downloading an application to a mobile device; and modifying a response to the request for downloading the application to the mobile device. In some embodiments, the response includes a notification that the application cannot be downloaded due to an application risk policy violation.
    Type: Application
    Filed: July 14, 2014
    Publication date: November 6, 2014
    Inventors: Anthony John Bettini, Kevin Watkins, Domingo J. Guerra, Michael Price
  • Patent number: 8819772
    Abstract: Techniques for in-line filtering of insecure or unwanted mobile components or communications (e.g., insecure or unwanted behaviors associated with applications for mobile devices (“apps”), updates for apps, communications to/from apps, operating system components/updates for mobile devices, etc.) for mobile devices are disclosed. In some embodiments, in-line filtering of apps for mobile devices includes intercepting a request for downloading an application to a mobile device; and modifying a response to the request for downloading the application to the mobile device. In some embodiments, the response includes a notification that the application cannot be downloaded due to an application risk policy violation.
    Type: Grant
    Filed: January 11, 2013
    Date of Patent: August 26, 2014
    Assignee: Appthority, Inc.
    Inventors: Anthony John Bettini, Kevin Watkins, Domingo J. Guerra, Michael Price
  • Publication number: 20140196150
    Abstract: Quantifying the risks of applications (“apps”) for mobile devices is disclosed. In some embodiments, quantifying the risks of apps for mobile devices includes receiving an application for a mobile device; performing an automated analysis of the application based on a risk profile; and generating a risk score based on the automated analysis of the application based on the risk profile.
    Type: Application
    Filed: March 11, 2014
    Publication date: July 10, 2014
    Applicant: Appthority, Inc.
    Inventors: Anthony John Bettini, Kevin Watkins, Domingo J. Guerra, Michael Price
  • Patent number: 8713684
    Abstract: Quantifying the risks of applications (“apps”) for mobile devices is disclosed. In some embodiments, quantifying the risks of apps for mobile devices includes receiving an application for a mobile device; performing an automated analysis of the application based on a risk profile; and generating a risk score based on the automated analysis of the application based on the risk profile.
    Type: Grant
    Filed: January 11, 2013
    Date of Patent: April 29, 2014
    Assignee: Appthority, Inc.
    Inventors: Anthony John Bettini, Kevin Watkins, Domingo J. Guerra, Michael Price
  • Publication number: 20130347094
    Abstract: Techniques for in-line filtering of insecure or unwanted mobile components or communications (e.g., insecure or unwanted behaviors associated with applications for mobile devices (“apps”), updates for apps, communications to/from apps, operating system components/updates for mobile devices, etc.) for mobile devices are disclosed. In some embodiments, in-line filtering of apps for mobile devices includes intercepting a request for downloading an application to a mobile device; and modifying a response to the request for downloading the application to the mobile device. In some embodiments, the response includes a notification that the application cannot be downloaded due to an application risk policy violation.
    Type: Application
    Filed: January 11, 2013
    Publication date: December 26, 2013
    Applicant: Appthority, Inc.
    Inventors: Anthony John Bettini, Kevin Watkins, Domingo J. Guerra, Michael Price
  • Publication number: 20070043681
    Abstract: Embodiments of the present invention relate to an online transaction method enacted between a first party and a second party, for example a customer and a bank respectively. The method of the embodiment includes the steps of the first party transmitting a transaction request comprising transaction details and the second party receiving the transaction request and generating, for the first party, an authentication request, comprising transaction details and challenge data. In order to increase the security of the overall transaction, the authentication request is adapted so that it is difficult for an automated process to use or modify information therein to generate a replacement authentication request. Such a method finds application in reducing the potential for a man-in-the-middle attack, wherein an intermediate, subversive process can behave as a legitimate second party in order to steal money from the first party.
    Type: Application
    Filed: August 9, 2006
    Publication date: February 22, 2007
    Inventors: George Morgan, Alexander Mercer, Kevin Watkins
  • Publication number: 20050250477
    Abstract: A method of treating tissue of a body during a surgical procedure is provided comprising providing tissue comprising normal tissue and abnormal tissue; inserting at least one temperature indicating device into the tissue with the temperature indicating device comprising an indicator to provide an indication of when a trigger temperature has been attained and a trigger mechanism configured to operate when heated to the trigger temperature and trigger the activation of the indicator; heating the tissue sufficiently to ablate at least a portion of the abnormal tissue; and transferring heat from the tissue to the trigger mechanism, the heat sufficient to heat the trigger mechanism to the trigger temperature and trigger the activation of the indicator.
    Type: Application
    Filed: May 10, 2004
    Publication date: November 10, 2005
    Inventors: M. Eastwood, N. Espat, Michael McClurken, Kevin Watkins