Patents by Inventor Philip J. S. Gladstone
Philip J. S. Gladstone has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9503460Abstract: A method is provided in one example embodiment and includes identifying a network location of an endpoint, which is attempting to initiate an application; identifying whether the endpoint is operating in an enterprise environment; determining whether the application is trusted based on metadata associated with the application; and provisioning a tunnel for data traffic associated with the application. In more detailed implementations, the tunnel can be provisioned if the application is trusted and the endpoint is outside of an enterprise environment. In addition, the tunnel can be provisioned if the application is untrusted and the endpoint is within an enterprise environment.Type: GrantFiled: October 13, 2011Date of Patent: November 22, 2016Assignee: CISCO TECHNOLOGY, INC.Inventors: Philip J. S. Gladstone, Morris J. Katz
-
Patent number: 9148442Abstract: A system inserts at least one notifying identifier in the computer system. The at least one notifying identifier provides execution information associated with the computer system. The system receives execution information from the at least one notifying identifier, the execution information identifies details associated with a traffic flow on the computer system. The system then generates a signature based on a deterministic link provided by the execution information provided by the at least one notifying identifier. The signature is utilized to prevent further damage caused to the computer system by at least one attack.Type: GrantFiled: August 12, 2014Date of Patent: September 29, 2015Assignee: Cisco Technology, Inc.Inventors: Jeffrey A Kraemer, Andrew Zawadowskiy, Philip J. S Gladstone
-
Patent number: 9141812Abstract: A Stateful Reference Monitor can be loaded into an existing commercial operating system, and then can regulate access to many different types of resources. The reference monitor maintains an updateable storage area whose contents can be used to affect access decisions, and access decisions can be based on arbitrary properties of the request.Type: GrantFiled: November 25, 2013Date of Patent: September 22, 2015Assignee: Cisco Technology, Inc.Inventors: Philip J. S. Gladstone, Jeffrey A. Kraemer
-
Publication number: 20140351942Abstract: A system inserts at least one notifying identifier in the computer system. The at least one notifying identifier provides execution information associated with the computer system. The system receives execution information from the at least one notifying identifier, the execution information identifies details associated with a traffic flow on the computer system. The system then generates a signature based on a deterministic link provided by the execution information provided by the at least one notifying identifier. The signature is utilized to prevent further damage caused to the computer system by at least one attack.Type: ApplicationFiled: August 12, 2014Publication date: November 27, 2014Inventors: JEFFREY A. KRAEMER, ANDREW ZAWADOWSKIY, PHILIP J.S GLADSTONE
-
Patent number: 8806650Abstract: A system inserts at least one notifying identifier in the computer system. The at least one notifying identifier provides execution information associated with the computer system. The system receives execution information from the at least one notifying identifier, the execution information identifies details associated with a traffic flow on the computer system. The system then generates a signature based on a deterministic link provided by the execution information provided by the at least one notifying identifier. The signature is utilized to prevent further damage caused to the computer system by at least one attack.Type: GrantFiled: July 23, 2013Date of Patent: August 12, 2014Assignee: Cisco Technology, Inc.Inventors: Jeffrey A. Kraemer, Andrew Zawadowskiy, Philip J. S. Gladstone
-
Publication number: 20140082692Abstract: A Stateful Reference Monitor can be loaded into an existing commercial operating system, and then can regulate access to many different types of resources. The reference monitor maintains an updateable storage area whose contents can be used to affect access decisions, and access decisions can be based on arbitrary properties of the request.Type: ApplicationFiled: November 25, 2013Publication date: March 20, 2014Applicant: Cisco Technology, Inc.Inventors: Philip J.S. Gladstone, Jeffrey A. Kraemer
-
Patent number: 8595170Abstract: A Stateful Reference Monitor can be loaded into an existing commercial operating system, and then can regulate access to many different types of resources. The reference monitor maintains an updateable storage area whose contents can be used to affect access decisions, and access decisions can be based on arbitrary properties of the request.Type: GrantFiled: October 1, 2007Date of Patent: November 26, 2013Assignee: Cisco Technology, Inc.Inventors: Philip J. S. Gladstone, Jeffrey A. Kraemer
-
Publication number: 20130312104Abstract: A system inserts at least one notifying identifier in the computer system. The at least one notifying identifier provides execution information associated with the computer system. The system receives execution information from the at least one notifying identifier, the execution information identifies details associated with a traffic flow on the computer system. The system then generates a signature based on a deterministic link provided by the execution information provided by the at least one notifying identifier. The signature is utilized to prevent further damage caused to the computer system by at least one attack.Type: ApplicationFiled: July 23, 2013Publication date: November 21, 2013Applicant: Cisco Technology Inc.Inventors: Jeffrey A. Kraemer, Andrew Zawadowskiy, Philip J. S. Gladstone
-
Patent number: 8572381Abstract: A method, apparatus and computer program product for providing challenge protected user queries on a local system is presented. A query is presented to a user. A response to the query is received and a determination is made whether the response is administratively less desirable than a threshold. When the response is administratively less desirable than said threshold, then a challenge is provided to the user. The response is accepted when the user responds correctly to the challenge and the response is not accepted when the user fails to correctly respond to the challenge.Type: GrantFiled: February 6, 2006Date of Patent: October 29, 2013Assignee: Cisco Technology, Inc.Inventors: Jeffrey A. Kraemer, Philip J. S. Gladstone
-
Patent number: 8495743Abstract: A system inserts at least one notifying identifier in the computer system. The at least one notifying identifier provides execution information associated with the computer system. The system receives execution information from the at least one notifying identifier, the execution information identifies details associated with a traffic flow on the computer system. The system then generates a signature based on a deterministic link provided by the execution information provided by the at least one notifying identifier. The signature is utilized to prevent further damage caused to the computer system by at least one attack.Type: GrantFiled: May 1, 2006Date of Patent: July 23, 2013Assignee: Cisco Technology, Inc.Inventors: Jeffrey A. Kraemer, Andrew Zawadowskiy, Philip J. S. Gladstone
-
Publication number: 20130097318Abstract: A method is provided in one example embodiment and includes identifying a network location of an endpoint, which is attempting to initiate an application; identifying whether the endpoint is operating in an enterprise environment; determining whether the application is trusted based on metadata associated with the application; and provisioning a tunnel for data traffic associated with the application. In more detailed implementations, the tunnel can be provisioned if the application is trusted and the endpoint is outside of an enterprise environment. In addition, the tunnel can be provisioned if the application is untrusted and the endpoint is within an enterprise environment.Type: ApplicationFiled: October 13, 2011Publication date: April 18, 2013Inventors: Philip J.S. Gladstone, Morris J. Katz
-
Patent number: 8325018Abstract: Methods and apparatus for providing security for mobile devices are disclosed. In one embodiment, a method includes maintaining responsibility for a first item when the first item is in a first range of a first container. Maintaining responsibility for the first item includes monitoring a locator tag associated with the first item when the locator tag is within the first range. The method also includes determining when the first item is in the first range, determining if the first item is in a second range associated with a second container when the first item is not in the first range, and determining if the second container is trusted with respect to the first container if the first item is in the second range. Additionally, the method includes transferring responsibility for the first item to the second container if the second container is trusted with respect to the first container.Type: GrantFiled: March 6, 2009Date of Patent: December 4, 2012Assignee: Cisco Technology, Inc.Inventor: Philip J. S. Gladstone
-
Publication number: 20120066759Abstract: An example method is provided and includes monitoring activity within an endpoint, and identifying a source associated with a particular data segment received by the endpoint. The method also includes monitoring an antivirus mechanism within the endpoint. The antivirus mechanism is configured to identify the particular data segment as being associated with malware. The source associated with the particular data segment can be communicated to any suitable next destination.Type: ApplicationFiled: September 10, 2010Publication date: March 15, 2012Inventors: Yan Chen, Philip J.S. Gladstone
-
Patent number: 7979889Abstract: A system provides security to a computerized device by detecting a sequence of related processing operations within the computerized device and recording the sequence of related processing operations in a security history. The system identifies a security violation when a processing operation performed in the computerized device produces an undesired processing outcome that violates a security policy and subsequently detecting attempted performance of at least one processing operation that attempts to produce the undesired processing outcome that violates the security policy and in response, denies operation of the processing operation(s) within the computerized device to avoid violation of the security policy.Type: GrantFiled: January 7, 2005Date of Patent: July 12, 2011Assignee: Cisco Technology, Inc.Inventors: Philip J. S. Gladstone, Jeffrey A. Kraemer
-
Patent number: 7891000Abstract: A security management system provides rules for monitoring network activity of applications to groups of host, computers, specifically activity indicating that communications mechanisms have been established (i.e. open TCP ports) but are receiving little or no use (i.e., few connection acceptances). Agents on the hosts utilize monitoring software inserted between the applications and the network protocol stacks. The agents store network activity data gathered during the monitoring in local storage, and periodically upload the data to a centralized server in a compressed and optionally encrypted fashion. The server uses the uploaded data from all hosts to update a security management database reflecting the network activity of all the hosts. Reports may be generated to identify activity that may present security risks, such as open but inactive ports, to enable a network administrator to take remedial action such as de-activating or de-installing applications.Type: GrantFiled: August 5, 2005Date of Patent: February 15, 2011Assignee: Cisco Technology, Inc.Inventors: Venkat Raghavan Rangamani, Philip J. S. Gladstone, Brian F. Costello
-
Publication number: 20100225451Abstract: Methods and apparatus for providing security for mobile devices are disclosed. In one embodiment, a method includes maintaining responsibility for a first item when the first item is in a first range of a first container. Maintaining responsibility for the first item includes monitoring a locator tag associated with the first item when the locator tag is within the first range. The method also includes determining when the first item is in the first range, determining if the first item is in a second range associated with a second container when the first item is not in the first range, and determining if the second container is trusted with respect to the first container if the first item is in the second range. Additionally, the method includes transferring responsibility for the first item to the second container if the second container is trusted with respect to the first container.Type: ApplicationFiled: March 6, 2009Publication date: September 9, 2010Applicant: Cisco Technology, Inc.Inventor: Philip J. S. Gladstone
-
Patent number: 7774498Abstract: A security agent extends the trust barrier, or trust point, from network gateway nodes to end user devices. A security agent operable to scrutinize network traffic executes on the user device and compares QoS marking attempts with the established QoS marking policy in effect. The security agent examines network traffic attributes deterministic of connection attempts by user processes. Attempts to apply inappropriate or disallowed QoS markings, as dictated by the QoS marking policy, are detected and disallowed. Therefore, only user connections consistent with the QoS marking policy are permitted into the network. Network admission control (NAC) mechanisms ensure that the security agent is the only access point from the user device to the secure network, and the security agent communicates the establishment of the trusted access point to the network gateway, thus ensuring that the network gateway may trust service level designations emanating from the user device executing the security agent.Type: GrantFiled: November 6, 2006Date of Patent: August 10, 2010Assignee: Cisco Technology, Inc.Inventors: Jeffrey A. Kraemer, David James McCowan, Kerry E. Lynn, Philip J. S. Gladstone
-
Patent number: 7716473Abstract: A computer-implemented system, method and apparatus for operating a reference monitor simulator is operable to recreate the operations performed by a reference monitor on a computer system. In one configuration, the system defines at least one security rule specifying whether to allow or deny a request to access at least one resource under a given set of circumstances and supplies at least one request to access a resource. The system further applies the at least one security rule in response to the at least one request to access a resource to determine whether to allow or prevent the at least one request.Type: GrantFiled: April 9, 2004Date of Patent: May 11, 2010Assignee: Cisco Technology, Inc.Inventors: Jeffrey A. Kraemer, Philip J. S. Gladstone, Alan J. Kirby, Mikhail Cherepov
-
Patent number: 7594267Abstract: The invention provides method and apparatus for maintaining a networked computer system including first and second nodes and an event processing server, the method comprising the first and second nodes detecting changes in state, the event processing server receiving notification of the changes in state from the first and second nodes, the event processing server correlating changes in state detected in the first and second nodes, and the event processing server executing a maintenance decision which affects the first and second nodes. The detecting, transmitting, correlating, and executing occurs without human intervention.Type: GrantFiled: June 14, 2002Date of Patent: September 22, 2009Assignee: Cisco Technology, Inc.Inventors: Philip J. S. Gladstone, Jeffrey A. Kramer
-
Patent number: 7516476Abstract: An automated method and apparatus for creating a security policy for one or more applications is provided. The method includes exercising the features of the one or more applications to generate behavioral data, applying a heuristic to aggregate the behavioral data into a subset of representative actions, and organizing the representative actions according to a structure defined by a template into a security policy for the one or more applications. The security policy may be downloaded to one or more workstations for deployment, and provides a safeguard to protect a computer system against cyber-terrorism.Type: GrantFiled: March 24, 2003Date of Patent: April 7, 2009Assignee: Cisco Technology, Inc.Inventors: Jeffrey A. Kraemer, Brian F. Costello, Dan L. Grecu, Venkat R. Rangamani, Philip J. S. Gladstone, Alan J. Kirby