Patents by Inventor Stephen Ritter

Stephen Ritter has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11019222
    Abstract: A process for handling wireless service and wireless device transaction and information requests includes storing in a database wireless service information responses, wireless service transaction responses, wireless device information responses, and wireless device transaction responses. The process including receiving and analyzing a keyword, obtaining a response, based at least on the keyword, and transmitting the response.
    Type: Grant
    Filed: January 7, 2020
    Date of Patent: May 25, 2021
    Assignee: TracFone Wireless, Inc.
    Inventors: James Zimmerman, Ricky Ramon, Stephen Ritter
  • Publication number: 20200334430
    Abstract: Self-sovereign identity systems and methods for identification documents are disclosed herein. An example method includes transmitting data obtained from a near-field communications (NFC) chip of an object to the service provider. The data can include identifying information for an owner of the object. The method can include receiving a user identity packet from the service provider that is generated by the service provider based on verification of an identity of the owner and validity of the NFC chip, storing the user identity packet on a computing device, receiving a request from a first requesting device or service for the data stored on the NFC chip of the object and transmitting the user identity packet from the computing device to the first requesting device or service instead of the data.
    Type: Application
    Filed: June 30, 2020
    Publication date: October 22, 2020
    Inventors: Sanjay Gupta, Michael Ramsbacker, Stephen Ritter, James Treitler, Ashok Singal, Jason L. Gray, Michael Hagen
  • Publication number: 20200145537
    Abstract: A process for handling wireless service and wireless device transaction and information requests includes storing in a database wireless service information responses, wireless service transaction responses, wireless device information responses, and wireless device transaction responses. The process including receiving and analyzing a keyword, obtaining a response, based at least on the keyword, and transmitting the response.
    Type: Application
    Filed: January 7, 2020
    Publication date: May 7, 2020
    Inventors: James Zimmerman, Ricky Ramon, Stephen Ritter
  • Patent number: 10530937
    Abstract: A process for handling wireless service and wireless device transaction and information requests includes storing in a database wireless service information responses, wireless service transaction responses, wireless device information responses, and wireless device transaction responses. The process including receiving and analyzing a keyword, obtaining a response, based at least on the keyword, and transmitting the response.
    Type: Grant
    Filed: May 1, 2018
    Date of Patent: January 7, 2020
    Assignee: TracFone Wireless, Inc.
    Inventors: James Zimmerman, Ricky Ramon, Stephen Ritter
  • Publication number: 20180316800
    Abstract: A process for handling wireless service and wireless device transaction and information requests includes storing in a database wireless service information responses, wireless service transaction responses, wireless device information responses, and wireless device transaction responses. The process including receiving and analyzing a keyword, obtaining a response, based at least on the keyword, and transmitting the response.
    Type: Application
    Filed: May 1, 2018
    Publication date: November 1, 2018
    Inventors: James Zimmerman, Ricky Ramon, Stephen Ritter
  • Patent number: 9021595
    Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for asset risk analysis. One method includes receiving threat definition data for threats, vulnerability detection data for assets, and countermeasure detection data for assets. The method further includes determining a respective risk metric for each of the assets for each of the threats. This includes analyzing the vulnerability detection data for an asset to determine whether the asset is vulnerable to a threat, determining from the threat definition data and the countermeasure detection data whether the asset is protected by one of the countermeasures identified for the threat, and determining the risk metric for the asset for the threat according to whether the asset is vulnerable to the threat and whether the asset is protected by one of the countermeasures identified for the threat.
    Type: Grant
    Filed: July 23, 2013
    Date of Patent: April 28, 2015
    Assignee: McAfee, Inc.
    Inventors: Sven Schrecker, Stephen Ritter, Ryan Nakawatase
  • Patent number: 8806645
    Abstract: A security metrics system receives security information data for a network system of computers and metric definitions from metric sources. Each metric definition defines a heuristic for calculating a score for the network system from one or more security signal values at a time in the plurality of times, wherein the score quantifies a security metric for the network system. The system calculates each metric definition for a plurality of times and selecting metric definitions that are related to the performance of and are indicative of one or more other metric definitions as candidates to be key performance indicators.
    Type: Grant
    Filed: April 1, 2011
    Date of Patent: August 12, 2014
    Assignee: McAfee, Inc.
    Inventors: Ryan Nakawatase, Stephen Ritter, Sven Schrecker
  • Publication number: 20140172495
    Abstract: Brand threat information is identified relating to potential threats to one or more brands of one or more organizations. A characteristic of one or more operating environments is identified and a relation is determined between a particular one of the potential threats and the characteristic. The determined relation is used to determine risk associated with a particular brand of an organization.
    Type: Application
    Filed: December 16, 2012
    Publication date: June 19, 2014
    Applicant: McAfee, Inc.
    Inventors: Phyllis Schneck, Stephen Ritter, Sven Schrecker, Ryan Nakawatase
  • Publication number: 20130340084
    Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for asset risk analysis. One method includes receiving threat definition data for threats, vulnerability detection data for assets, and countermeasure detection data for assets. The method further includes determining a respective risk metric for each of the assets for each of the threats. This includes analyzing the vulnerability detection data for an asset to determine whether the asset is vulnerable to a threat, determining from the threat definition data and the countermeasure detection data whether the asset is protected by one of the countermeasures identified for the threat, and determining the risk metric for the asset for the threat according to whether the asset is vulnerable to the threat and whether the asset is protected by one of the countermeasures identified for the threat.
    Type: Application
    Filed: July 23, 2013
    Publication date: December 19, 2013
    Inventors: Sven Schrecker, Stephen Ritter, Ryan Nakawatase
  • Publication number: 20130247205
    Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for generating quantitative risk metrics for assets and threats. Risk metrics are generated for individual assets and individual threats. These individual metrics can then be analyzed to generate aggregate risk metrics for assets, groups of assets, and threats. Assets and threats can be ordered according to their aggregate risk metrics.
    Type: Application
    Filed: July 14, 2011
    Publication date: September 19, 2013
    Applicant: McAfee, Inc.
    Inventors: Sven Schrecker, Stephen Ritter, Ryan Nakawatase
  • Patent number: 8495745
    Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for asset risk analysis. One method includes receiving threat definition data for threats, vulnerability detection data for assets, and countermeasure detection data for assets. The method further includes determining a respective risk metric for each of the assets for each of the threats. This includes analyzing the vulnerability detection data for an asset to determine whether the asset is vulnerable to a threat, determining from the threat definition data and the countermeasure detection data whether the asset is protected by one of the countermeasures identified for the threat, and determining the risk metric for the asset for the threat according to whether the asset is vulnerable to the threat and whether the asset is protected by one of the countermeasures identified for the threat.
    Type: Grant
    Filed: November 30, 2009
    Date of Patent: July 23, 2013
    Assignee: McAfee, Inc.
    Inventors: Sven Schrecker, Stephen Ritter, Ryan Nakawatase
  • Patent number: 8495747
    Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for prioritizing asset remediations. One method includes generating a risk metric for an asset and a threat, generating a remediation availability metric for the asset and the threat, and determining a remediation prioritization metric for the asset and the threat according to the risk metric and the remediation availability metric. The remediation prioritization metric specifies a priority of applying the remediation to the asset.
    Type: Grant
    Filed: March 31, 2010
    Date of Patent: July 23, 2013
    Assignee: McAfee, Inc.
    Inventors: Ryan Nakawatase, Sven Schrecker, Stephen Ritter
  • Publication number: 20050257267
    Abstract: A prevention-based network auditing system includes a central compliance server generating network policies and configuring audits of the data communications network. The compliance server presents a graphical user interface (GUI) to describe the specific data gathering parameters, policies to be analyzed, and the schedule of analysis. One or more audit servers strategically deployed around the network employ heterogeneous data-gathering tools to gather information about the network in response to the configured audits, and transmit the gathered information to the compliance server. An audit repository stores the gathered information for use by the compliance server for security and regulatory policy assessment, network vulnerability analysis, report generation, and security improvement recommendations.
    Type: Application
    Filed: February 13, 2004
    Publication date: November 17, 2005
    Inventors: John Williams, Brian Costello, John Ravenel, John Payne, Ryan Nakawatase, Thomas Walpole, Stephen Ritter, John Pelly, M. Rutherford
  • Publication number: 20050015622
    Abstract: A prevention-based network auditing system includes a central compliance server providing a user interface allowing a user to schedule and configure a network audit. The configured audit is stored in an audit repository until its scheduled time. At such a time, the compliance server automatically invokes one or more audit servers to gather information about the network. The compliance server receives the gathered information and electronically applies a network policy to the information for determining compliance with the policy. A remediation task may be generated if the policy has been violated, and the task monitored until its completion.
    Type: Application
    Filed: February 13, 2004
    Publication date: January 20, 2005
    Inventors: John Williams, Brian Costello, John Ravenel, Stephen Ritter, John Pelly, M. Rutherford, John Payne
  • Publication number: 20050010819
    Abstract: A prevention-based network auditing system includes a central compliance server storing both natural language policy documents and machine-processable policy rules in an audit repository. The compliance server provides a client-side user interface allowing a user to easily generate a machine-auditable policy by selecting/generating a natural language policy source document, and linking the applicable machine-processable policy rules to the applicable portions of the source document. The selected machine-processable policy rules are then applied to information gathered about the network during a scheduled network audit session for efficiently and systematically determining whether policy violations and/or vulnerabilities exist.
    Type: Application
    Filed: February 13, 2004
    Publication date: January 13, 2005
    Inventors: John Williams, Brian Costello, John Ravenel, John Payne, Stephen Ritter, Ryan Nakawatase, John Pelly, M. Rutherford