Patents by Inventor James W. Kasper

James W. Kasper has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240406147
    Abstract: Techniques for augmenting deep packet inspection capabilities of a network security device provisioned in a networked computing environment with inference-based flow selection to focus processing resources on network traffic that is likely to be malicious. The network device(s) may receive decryption policies comprising one or more decrypt and/or do not decrypt rules for applying the decryption policy to the network traffic. The network device may receive network traffic associated with a given connection flow through the network between a client device and a workload application, and the network device may determine whether to decrypt or refrain from decrypting the network traffic associated with the network flow based on a risk score that is generated by the network device using connection fingerprints associated with the client device and the workload application, respectively, based on behavioral characteristics of the client device and the workload, respectively.
    Type: Application
    Filed: December 1, 2023
    Publication date: December 5, 2024
    Inventors: Andrew E. Ossipov, James W. Kasper
  • Publication number: 20240236210
    Abstract: Techniques are described for managing QUIC connections. The techniques include identifying a first QUIC connection between a first and second device. Determining, from the connection, a first IP address and port number of the first device, a second IP address and port number of the second device, and a first CID. Storing an association between the first and second IP addresses, port numbers and first CID. Identifying a second QUIC connection between the first device and another device. Identifying, from the second connection, the first IP address and port number, a second CID, and a third IP address and port number. Determining if two of the following are met: the second IP address corresponds to the third IP address, the second port number corresponds to the third port number, the second CID corresponds to the first CID, if two are met, the first and second QUIC connections are the same.
    Type: Application
    Filed: October 25, 2022
    Publication date: July 11, 2024
    Inventors: Rajvardhan Somraj Deshmukh, Nancy Patricia Cam-Winget, James W. Kasper
  • Publication number: 20240137428
    Abstract: Techniques are described for managing QUIC connections. The techniques include identifying a first QUIC connection between a first and second device. Determining, from the connection, a first IP address and port number of the first device, a second IP address and port number of the second device, and a first CID. Storing an association between the first and second IP addresses, port numbers and first CID. Identifying a second QUIC connection between the first device and another device. Identifying, from the second connection, the first IP address and port number, a second CID, and a third IP address and port number. Determining if two of the following are met: the second IP address corresponds to the third IP address, the second port number corresponds to the third port number, the second CID corresponds to the first CID, if two are met, the first and second QUIC connections are the same.
    Type: Application
    Filed: October 24, 2022
    Publication date: April 25, 2024
    Inventors: Rajvardhan Somraj Deshmukh, Nancy Patricia Cam-Winget, James W. Kasper
  • Patent number: 7320142
    Abstract: According to one embodiment of the invention, a method for use in intrusion detection includes storing a default signature file defining one or more default signatures and storing a customized signature file defining one or more custom signatures. The method also includes automatically generating, for each of the one or more signatures defined in the default signature file, executable code operable to detect intrusions associated with the default signatures. The method also includes automatically generating, for each of the custom signatures, executable code operable to detect intrusions associated with the custom signatures.
    Type: Grant
    Filed: November 9, 2001
    Date of Patent: January 15, 2008
    Assignee: Cisco Technology, Inc.
    Inventors: James W. Kasper, Paul A. Beriswill, Kevin L. Wiley
  • Patent number: 7243371
    Abstract: According to one embodiment of the invention, a method for automatically generating software code operable to detect a defined signature in network traffic comprises providing an inspector shell, generating a plurality of parameter name-value associations from provided configuration data, and automatically generating, by computer, an instance of the inspector shell having a signature defined by the parameter name-value associations.
    Type: Grant
    Filed: November 12, 2001
    Date of Patent: July 10, 2007
    Assignee: Cisco Technology, Inc.
    Inventors: James W. Kasper, Paul A. Beriswill, Kevin L. Wiley