Patents by Inventor Ryan Speer

Ryan Speer has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240115961
    Abstract: A chair sled attachment assembly includes a base structure, a support bracket, and a base access panel. The base structure is connected to a gaming machine cabinet in a base position projecting in a front direction from a front side of the cabinet and defines a base volume separate from a secure volume of the cabinet. The base structure also defines a base access opening to provide access to the base volume. The support bracket is located within the base volume adjacent to the base access opening and includes a support bracket connecting arrangement to which a chair sled receiver is connectable in a chair sled receiver operating position. The base access panel is removably secured to the base structure in a cover position substantially covering the base access opening.
    Type: Application
    Filed: October 9, 2022
    Publication date: April 11, 2024
    Applicant: Everi Games Inc.
    Inventors: Daniel Gibson, Ryan Greene, Craig Gallagher, Steven Speer, Travis Bussey
  • Patent number: 11841959
    Abstract: Systems and methods for permitting software presence/configurations to function as a factor in a multi-factor authentication scheme so that a user's access to a different software program/application is conditioned on the presence of certain pre-specified software or software configurations that would otherwise not be necessary for access and/or operation of the different software program/application. Generally, by confirming the presence/configuration of the pre-specified software on a computing device, the system ensures that a user, in one embodiment, may only access the different software program/application with the proper configuration of the pre-specified software.
    Type: Grant
    Filed: November 18, 2021
    Date of Patent: December 12, 2023
    Assignee: Ionic Security Inc.
    Inventors: Adam Ghetti, Ryan Speers, Jeffrey Howard, Robert McColl, Taylor Jay Centers, William Monte LeBlanc
  • Patent number: 11822680
    Abstract: Systems and methods for intercepting an operation requested by a user (e.g., print a document, cut text, copy an image, paste a hyperlink, embed an audio clip, save as a document in a new location, etc.) and performing one or more actions based on the level of security associated with the originating program, originating file, intended program, and/or intended file for that operation. As such, the disclosed systems and methods may enable consistent data security to be applied to a particular data item regardless of the location of that data item or the operations performed on the same.
    Type: Grant
    Filed: March 26, 2019
    Date of Patent: November 21, 2023
    Assignee: IONIC SECURITY INC.
    Inventors: Ryan Speers, Adam Ghetti, Farzon Lotfi, David Askew, Kent Rollins
  • Patent number: 11387986
    Abstract: Systems and methods are discussed for performing multi-key cryptographic operations. Policies can be received that define whether to perform a cryptographic operation with respect to various data items generated by one or more computing devices. The data items can be identified and compared to the policies to determine whether to perform the cryptographic operation on subsets of data items. The cryptographic operation can be performed with respect to a first subset of the data items using a first key, while the cryptographic operation can be performed with respect to a second subset of the data items using a second key.
    Type: Grant
    Filed: January 13, 2020
    Date of Patent: July 12, 2022
    Assignee: Ionic Security Inc.
    Inventors: Adam Ghetti, Jeffrey Howard, James Jordan, Nicholas Smith, Jeremy Eckman, Ryan Speers, Sohaib Bhatti
  • Patent number: 11210412
    Abstract: Systems and methods for permitting software presence/configurations to function as a factor in a multi-factor authentication scheme so that a user's access to a different software program/application is conditioned on the presence of certain pre-specified software or software configurations that would otherwise not be necessary for access and/or operation of the different software program/application. Generally, by confirming the presence/configuration of the pre-specified software on a computing device, the system ensures that a user, in one embodiment, may only access the different software program/application with the proper configuration of the pre-specified software.
    Type: Grant
    Filed: February 1, 2018
    Date of Patent: December 28, 2021
    Assignee: Ionic Security Inc.
    Inventors: Adam Ghetti, Ryan Speers, Jeffrey Howard, Robert McColl, Taylor Jay Centers, William Monte LeBlanc
  • Patent number: 11138275
    Abstract: Systems and methods are disclosed for, without access to the original set of data elements from which the online filter was originally constructed, converting online filters to other types of filters. To convert a particular type of online filter to either an offline filter or a different type of online filter, the system, in various embodiments, first determines the types/formats of each of the relevant filters. Then, in various embodiments, the system extracts the appropriate data representations from the original online filter. In various embodiments, the system converts the extracted data representations into the data representation format of the new filter. The system, in various embodiments, then constructs the new filter from the converted data representations.
    Type: Grant
    Filed: May 7, 2018
    Date of Patent: October 5, 2021
    Assignee: Ionic Security Inc.
    Inventors: Jonathan Thomas Burns, Ryan Speers
  • Patent number: 10567167
    Abstract: Systems and methods for securing or encrypting data or other information arising from a user's interaction with software and/or hardware, resulting in transformation of original data into ciphertext. Generally, the ciphertext is generated using context-based keys that depend on the environment in which the original data originated and/or was accessed. The ciphertext can be stored in a user's storage device or in an enterprise database (e.g., at-rest encryption) or shared with other users (e.g., cryptographic communication). The system generally allows for secure federation across organizations, including mechanisms to ensure that the system itself and any other actor with pervasive access to the network cannot compromise the confidentially of the protected data.
    Type: Grant
    Filed: July 9, 2018
    Date of Patent: February 18, 2020
    Assignee: IONIC SECURITY INC.
    Inventors: Adam Ghetti, Jeffrey Howard, James Jordan, Nicholas Smith, Jeremy Eckman, Ryan Speers, Sohaib Bhatti
  • Patent number: 10270592
    Abstract: Systems and methods for securing or encrypting data or other information arising from a user's interaction with software and/or hardware, resulting in transformation of original data into ciphertext. Generally, the ciphertext is generated using context-based keys that depend on the environment in which the original data originated and/or was accessed. The ciphertext can be stored in a user's storage device or in an enterprise database (e.g., at-rest encryption) or shared with other users (e.g., cryptographic communication). The system generally allows for secure federation across organizations, including mechanisms to ensure that the system itself and any other actor with pervasive access to the network cannot compromise the confidentially of the protected data.
    Type: Grant
    Filed: March 27, 2017
    Date of Patent: April 23, 2019
    Assignee: Ionic Security Inc.
    Inventors: Adam Ghetti, Ken Green, Kenneth Silva, Michael Rollins, Nathaniel Tinkler, Jeremy Eckman, Ryan Speers
  • Patent number: 10020935
    Abstract: Systems and methods for securing or encrypting data or other information arising from a user's interaction with software and/or hardware, resulting in transformation of original data into ciphertext. Generally, the ciphertext is generated using context-based keys that depend on the environment in which the original data originated and/or was accessed. The ciphertext can be stored in a user's storage device or in an enterprise database (e.g., at-rest encryption) or shared with other users (e.g., cryptographic communication). The system generally allows for secure federation across organizations, including mechanisms to ensure that the system itself and any other actor with pervasive access to the network cannot compromise the confidentially of the protected data.
    Type: Grant
    Filed: March 27, 2017
    Date of Patent: July 10, 2018
    Assignee: Ionic Security Inc.
    Inventors: Adam Ghetti, Jeffrey Howard, James Jordan, Nicholas Smith, Jeremy Eckman, Ryan Speers, Sohaib Bhatti
  • Patent number: 10020936
    Abstract: Systems and methods for securing or encrypting data or other information arising from a user's interaction with software and/or hardware, resulting in transformation of original data into ciphertext. Generally, the ciphertext is generated using context-based keys that depend on the environment in which the original data originated and/or was accessed. The ciphertext can be stored in a user's storage device or in an enterprise database (e.g., at-rest encryption) or shared with other users (e.g., cryptographic communication). The system generally allows for secure federation across organizations, including mechanisms to ensure that the system itself and any other actor with pervasive access to the network cannot compromise the confidentially of the protected data.
    Type: Grant
    Filed: April 3, 2017
    Date of Patent: July 10, 2018
    Assignee: Ionic Security Inc.
    Inventors: Adam Ghetti, James Jordan, Kenneth Silva, Jeremy Eckman, Robert McColl, Ryan Speers
  • Patent number: 9786170
    Abstract: Embodiments are disclosed for scheduling and presenting notifications, via an in-vehicle computing system, to a driver of a vehicle. In some embodiments, a method for an in-vehicle computing system includes receiving data regarding a notification for presentation to a driver of a vehicle. The method further includes, based on a driver profile, adjusting a timing of presenting the notification to the driver via the in-vehicle computing system, wherein the driver profile is generated based on past driving behavior associated with the driver.
    Type: Grant
    Filed: January 6, 2015
    Date of Patent: October 10, 2017
    Assignee: Harman International Industries, Incorporated
    Inventors: Tirtha Roy, William Taranowski, Ilya Pautov, Ryan Speer
  • Patent number: 9614670
    Abstract: Systems and methods for securing or encrypting data or other information arising from a user's interaction with software and/or hardware, resulting in transformation of original data into ciphertext. Generally, the ciphertext is generated using context-based keys that depend on the environment in which the original data originated and/or was accessed. The ciphertext can be stored in a user's storage device or in an enterprise database (e.g., at-rest encryption) or shared with other users (e.g., cryptographic communication). The system generally allows for secure federation across organizations, including mechanisms to ensure that the system itself and any other actor with pervasive access to the network cannot compromise the confidentially of the protected data.
    Type: Grant
    Filed: February 5, 2016
    Date of Patent: April 4, 2017
    Assignee: Ionic Security Inc.
    Inventors: Adam Ghetti, James Jordan, Kenneth Silva, Jeremy Eckman, Robert McColl, Ryan Speers
  • Patent number: 9608809
    Abstract: Systems and methods for securing or encrypting data or other information arising from a user's interaction with software and/or hardware, resulting in transformation of original data into ciphertext. Generally, the ciphertext is generated using context-based keys that depend on the environment in which the original data originated and/or was accessed. The ciphertext can be stored in a user's storage device or in an enterprise database (e.g., at-rest encryption) or shared with other users (e.g., cryptographic communication). The system generally allows for secure federation across organizations, including mechanisms to ensure that the system itself and any other actor with pervasive access to the network cannot compromise the confidentially of the protected data.
    Type: Grant
    Filed: February 5, 2016
    Date of Patent: March 28, 2017
    Assignee: Ionic Security Inc.
    Inventors: Adam Ghetti, Jeffrey Howard, James Jordan, Nicholas Smith, Jeremy Eckman, Ryan Speers, Sohaib Bhatti
  • Patent number: 9608810
    Abstract: Systems and methods for securing or encrypting data or other information arising from a user's interaction with software and/or hardware, resulting in transformation of original data into ciphertext. Generally, the ciphertext is generated using context-based keys that depend on the environment in which the original data originated and/or was accessed. The ciphertext can be stored in a user's storage device or in an enterprise database (e.g., at-rest encryption) or shared with other users (e.g., cryptographic communication). The system generally allows for secure federation across organizations, including mechanisms to ensure that the system itself and any other actor with pervasive access to the network cannot compromise the confidentially of the protected data.
    Type: Grant
    Filed: February 5, 2016
    Date of Patent: March 28, 2017
    Assignee: Ionic Security Inc.
    Inventors: Adam Ghetti, Ken Green, Kenneth Silva, Michael Rollins, Nathaniel Tinkler, Jeremy Eckman, Ryan Speers
  • Publication number: 20150191178
    Abstract: Embodiments are disclosed for a method for an in-vehicle computing system including detecting a request to perform a driver-dependent function, and inferring an identity of the driver based on current driving data/behavior relative to one or more driver profiles, each of the one or more driver profiles generated using driver-specific past driving data/behavior. The method may further include selectively enabling performance of the driver-dependent function of the in-vehicle computing system based on the inferred driver identity.
    Type: Application
    Filed: January 6, 2015
    Publication date: July 9, 2015
    Inventors: Tirtha Roy, William Taranowski, Ilya Pautov, Ryan Speer
  • Publication number: 20150191122
    Abstract: Embodiments are disclosed for scheduling and presenting notifications, via an in-vehicle computing system, to a driver of a vehicle. In some embodiments, a method for an in-vehicle computing system includes receiving data regarding a notification for presentation to a driver of a vehicle. The method further includes, based on a driver profile, adjusting a timing of presenting the notification to the driver via the in-vehicle computing system, wherein the driver profile is generated based on past driving behavior associated with the driver.
    Type: Application
    Filed: January 6, 2015
    Publication date: July 9, 2015
    Inventors: Tirtha Roy, William Taranowski, Ilya Pautov, Ryan Speer