Patents by Inventor Peter Tippett

Peter Tippett has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9553872
    Abstract: An approach for receiving a request for an authentication code for presentation in an authentication user interface, wherein the request is from a relying party and wherein the authentication user interface is presented by the relying party at a first device. The approach further involves transmitting the authentication code to the relying party. The approach also involves authenticating a user with respect to the relying party by determining that a second device associated with the user has read the authentication code from the authentication user interface of the first device, wherein the second device is a previously authenticated device.
    Type: Grant
    Filed: September 20, 2013
    Date of Patent: January 24, 2017
    Assignee: Verizon Patent and Licensing Inc.
    Inventors: Peter Tippett, Steven T. Archer, Tracy L. Hulver, Paul V. Hubner
  • Patent number: 9098708
    Abstract: The security or other attributes of mobile applications may be assessed and assigned a security score. In one implementation, a device may obtain information relating to the mobile applications, and may determine, for each of the mobile applications, a number of security scores. Each of the security scores may define a level of risk for a security category relating to a mobile application. The device may further combine the security scores, for each of the mobile applications, to obtain, for each of the mobile applications, a final security score.
    Type: Grant
    Filed: June 6, 2014
    Date of Patent: August 4, 2015
    Assignee: Verizon Patent and Licensing Inc.
    Inventors: Steven T. Archer, Peter Tippett, Wade Baker, Gina M. Ganley, Alex Guazzelli
  • Patent number: 9100392
    Abstract: An approach is provided for authenticating and/or identifying a user through machine-transferrable one-time password codes. A user device sends to an authentication platform a request for a one-time password for authenticating a user at a relying party device. A machine readable form of the one-time password deliverable to the relying party device over an air gap between the user device and the relying party device is determined and transmitted. The relying party device reverts the machine readable form back to the one-time password, and transmits the one-time password to the authentication platform to authenticate the user device.
    Type: Grant
    Filed: September 20, 2013
    Date of Patent: August 4, 2015
    Assignee: Verizon Patent and Licensing Inc.
    Inventors: Paul V Hubner, Robert A Clavenna, II, Steven T. Archer, Peter Tippett
  • Publication number: 20150089613
    Abstract: An approach for receiving a request for an authentication code for presentation in an authentication user interface, wherein the request is from a relying party and wherein the authentication user interface is presented by the relying party at a first device. The approach further involves transmitting the authentication code to the relying party. The approach also involves authenticating a user with respect to the relying party by determining that a second device associated with the user has read the authentication code from the authentication user interface of the first device, wherein the second device is a previously authenticated device.
    Type: Application
    Filed: September 20, 2013
    Publication date: March 26, 2015
    Applicant: Verizon Patent and Licensing Inc.
    Inventors: Peter TIPPETT, Steven T. ARCHER, Tracy L. HULVER, Paul V. HUBNER
  • Publication number: 20150089607
    Abstract: An approach is provided for authenticating and/or identifying a user through machine-transferrable one-time password codes. A user device sends to an authentication platform a request for a one-time password for authenticating a user at a relying party device. A machine readable form of the one-time password deliverable to the relying party device over an air gap between the user device and the relying party device is determined and transmitted. The relying party device reverts the machine readable form back to the one-time password, and transmits the one-time password to the authentication platform to authenticate the user device.
    Type: Application
    Filed: September 20, 2013
    Publication date: March 26, 2015
    Applicant: Verizon Patent and Licensing Inc.
    Inventors: Paul V HUBNER, Robert A CLAVENNA, II, Steven T. ARCHER, Peter TIPPETT
  • Publication number: 20140310764
    Abstract: An approach is provided for authenticating and/or identifying a user through gestures. A plurality of media data sets of a user performing a sequence of gestures are captured. The media data sets are analyzed to determine the sequence of gestures. Authentication of the user is performed based on the sequence of gestures.
    Type: Application
    Filed: April 12, 2013
    Publication date: October 16, 2014
    Applicant: Verizon Patent and Licensing Inc.
    Inventors: Peter Tippett, Steven T. Archer, Paul V. Hubner, Paul A. Donfried, Scott N. Kern
  • Patent number: 8849770
    Abstract: Various embodiments of systems and methods for event auditing framework are described herein. The auditing framework includes one or more auditees, an auditor, and a memory associated with the auditor. Each auditee is associated with a digitally signed file including metadata of one or more events authorized for the auditee. The auditor validates digital signature of the file when the auditee is registered with the auditor. After validation of the digital signature, the metadata of the authorized events is stored with respect to the auditee to enable the auditee perform the authorized events. The auditing framework is expandable in that new event types can be added or updated dynamically. The auditing framework also ensures consistency of events.
    Type: Grant
    Filed: May 16, 2011
    Date of Patent: September 30, 2014
    Assignee: Business Objects Software Limited
    Inventors: Radim Bacinschi, Greg McClement, Peter Tippett
  • Publication number: 20140289859
    Abstract: The security or other attributes of mobile applications may be assessed and assigned a security score. In one implementation, a device may obtain information relating to the mobile applications, and may determine, for each of the mobile applications, a number of security scores. Each of the security scores may define a level of risk for a security category relating to a mobile application. The device may further combine the security scores, for each of the mobile applications, to obtain, for each of the mobile applications, a final security score.
    Type: Application
    Filed: June 6, 2014
    Publication date: September 25, 2014
    Inventors: Steven T. Archer, Peter Tippett, Wade Baker, Gina M. Ganley, Alex Guazzelli
  • Publication number: 20120296876
    Abstract: Various embodiments of systems and methods for event auditing framework are described herein. The auditing framework includes one or more auditees, an auditor, and a memory associated with the auditor. Each auditee is associated with a digitally signed file including metadata of one or more events authorized for the auditee. The auditor validates digital signature of the file when the auditee is registered with the auditor. After validation of the digital signature, the metadata of the authorized events is stored with respect to the auditee to enable the auditee perform the authorized events. The auditing framework is expandable in that new event types can be added or updated dynamically. The auditing framework also ensures consistency of events.
    Type: Application
    Filed: May 16, 2011
    Publication date: November 22, 2012
    Inventors: RADIM BACINSCHI, Greg McClement, Peter Tippett
  • Publication number: 20050278786
    Abstract: A system and method for assessing the risk to information resources that may include the generation and/or use of a security risk index. The security risk index may represent the security of information resources. The security risk index may be based on at least one factor. The at least one factor may be individually quantified. The at least one factor may include a threat factor associated with a rate or frequency of security events that threaten the security of the information resources, a vulnerability factor associated with a likelihood of a security event breaching the security of the information resources, an impact factor associated with an expected cost of a breach of the security of the information resources, or another type of factor. The security risk index of a subset of information resources including at least one resource may enable various comparisons and observations with respect to the security of the subset of information resources.
    Type: Application
    Filed: June 9, 2004
    Publication date: December 15, 2005
    Inventors: Peter Tippett, Samuel Migues, Paul Robertson