Patents by Inventor Steven Thomas Archer

Steven Thomas Archer has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8789175
    Abstract: A computer-implemented method may include identifying a security event condition associated with a device. One or more security rules may be identified for execution based on the device and the identified security event condition, wherein the one or more security rules define security related actions to be performed upon occurrence of the security event condition. The security related actions may be initiated by at least one processor on the device to secure the device from unauthorized use.
    Type: Grant
    Filed: September 30, 2010
    Date of Patent: July 22, 2014
    Assignee: Verizon Patent and Licensing Inc.
    Inventors: Paul V. Hubner, Robert Angelo Clavenna, II, Kristopher Alan Pate, Steven Thomas Archer, Adam E. Steczko
  • Patent number: 8464320
    Abstract: A computer-implemented method may include receiving first monitored information relating to a user at a time of initial user authentication with a particular application or resource. It may be determined that a second authentication is required at a second time subsequent to the time of initial user authentication. Second monitored information may be captured at the second time. The second monitored information may be compared to the first monitored information to determine whether continued authentication is maintained. Access to the particular application or resource when it is determined that continued authentication is not maintained.
    Type: Grant
    Filed: May 24, 2010
    Date of Patent: June 11, 2013
    Assignee: Verizon Patent and Licensing Inc.
    Inventors: Steven Thomas Archer, Lawrence J. Zaykowski, Kristopher Alan Pate, Robert Angelo Clavenna, II, Paul V. Hubner, Jack Mitchell Farris
  • Publication number: 20120084857
    Abstract: A computer-implemented method may include identifying a security event condition associated with a device. One or more security rules may be identified for execution based on the device and the identified security event condition, wherein the one or more security rules define security related actions to be performed upon occurrence of the security event condition. The security related actions may be initiated by at least one processor on the device to secure the device from unauthorized use.
    Type: Application
    Filed: September 30, 2010
    Publication date: April 5, 2012
    Applicant: VERIZON PATENT AND LICENSING INC.
    Inventors: Paul V. Hubner, Robert Angelo Clavenna, II, Kristopher Alan Pate, Steven Thomas Archer, Adam E. Steczko
  • Publication number: 20110289564
    Abstract: A computer-implemented method may include receiving first monitored information relating to a user at a time of initial user authentication with a particular application or resource. It may be determined that a second authentication is required at a second time subsequent to the time of initial user authentication. Second monitored information may be captured at the second time. The second monitored information may be compared to the first monitored information to determine whether continued authentication is maintained. Access to the particular application or resource when it is determined that continued authentication is not maintained.
    Type: Application
    Filed: May 24, 2010
    Publication date: November 24, 2011
    Applicant: Verizon Patent and Licensing Inc.
    Inventors: Steven Thomas Archer, Lawrence J. Zaykowski, Kristopher Alan Pate, Robert Angelo Clavenna, II, Paul V. Hubner, Jack Mitchell Farris