Patents by Inventor Debra Malver

Debra Malver has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8286254
    Abstract: A system for automatically handling requests to grant or deny access to resources in a network or computer system. In a preferred embodiment of the invention a “learning mode” can be designated so that whenever a permission query is detected the system automatically supplies an answer to the query without requiring the user to make a response or take other action. The automated answer can be set so that the permission is always granted or other criteria can be used for the automated answer such as by categorizing the type of access permission and using a default response according to the category.
    Type: Grant
    Filed: November 16, 2005
    Date of Patent: October 9, 2012
    Assignee: Cisco Technology, Inc.
    Inventors: Jeffrey A. Kraemer, Debra Malver
  • Publication number: 20070113270
    Abstract: A system for automatically handling requests to grant or deny access to resources in a network or computer system. In a preferred embodiment of the invention a “learning mode” can be designated so that whenever a permission query is detected the system automatically supplies an answer to the query without requiring the user to make a response or take other action. The automated answer can be set so that the permission is always granted or other criteria can be used for the automated answer such as by categorizing the type of access permission and using a default response according to the category.
    Type: Application
    Filed: November 16, 2005
    Publication date: May 17, 2007
    Applicant: Cisco Technology, Inc.
    Inventors: Jeffrey Kraemer, Debra Malver
  • Publication number: 20060174319
    Abstract: A system controls security during operation of a computerized device by enforcing a first security policy during first operational state of the computerized device. Enforcement of the first security policy provides a first level access to resources within the computerized device by processes operating in the computerized device. The system detects a transition operation of the computerized device that occurs during enforcement of the first security policy indicating that operation of the computerized device is transitioning from the first operational state to a second operational state and in response, enforces a second security policy corresponding to the second operational state to provide a level of access to the resources within the computerized device that corresponds to the second operational state during operation of the second operational state. This can be repeated for many different states including boot time, normal runtime, installation, shutdown, and a compromised state.
    Type: Application
    Filed: January 28, 2005
    Publication date: August 3, 2006
    Inventors: Jeffrey Kraemer, Debra Malver