Patents by Inventor Jeffrey A. Kraemer
Jeffrey A. Kraemer has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11775599Abstract: Systems and methods of presenting search results, in response to a general search query, are provided in a manner intended to improve the efficiency of a user that uses general search queries A given user may be interested in results of a specific type, and may consistently interact with the system in a similar manner following conducting a given search. The system tracks requests from a user following a presentation of search results in response to a general search query. This is stored as tracking information. The tracking information is processed to identify patterns in user behaviour, and search results for further search queries are then presented in a manner that takes into account the tracking information. In a specific embodiment, this is applied in an e-commerce context. The tracking information may be stored in association with commerce object types such as products, orders, returns, customers.Type: GrantFiled: November 10, 2020Date of Patent: October 3, 2023Assignee: SHOPIFY INC.Inventors: Jesse McGinnis, Jovana Mandic, Moya Miller, Jeffrey Kraemer
-
Publication number: 20220148060Abstract: Systems and methods of presenting search results, in response to a general search query, are provided in a manner intended to improve the efficiency of a user that uses general search queries A given user may be interested in results of a specific type, and may consistently interact with the system in a similar manner following conducting a given search. The system tracks requests from a user following a presentation of search results in response to a general search query. This is stored as tracking information. The tracking information is processed to identify patterns in user behaviour, and search results for further search queries are then presented in a manner that takes into account the tracking information. In a specific embodiment, this is applied in an e-commerce context. The tracking information may be stored in association with commerce object types such as products, orders, returns, customers.Type: ApplicationFiled: November 10, 2020Publication date: May 12, 2022Inventors: JESSE MCGINNIS, JOVANA MANDIC, MOYA MILLER, JEFFREY KRAEMER
-
Patent number: 9286469Abstract: A system receives information from at least one security interceptor associated with at least one computer system. The information identifies details associated with a traffic flow in a computer system of the computer networking environment. The system determines a probability that an attack on the computer system is in progress based on a probabilistic link provided by the information. The probabilistic link is determined by attack information associated with previous attacks. Based on the information provided by the at least one security interceptor, the system generates a signature utilized to prevent a similar attack on the computer system.Type: GrantFiled: August 4, 2006Date of Patent: March 15, 2016Assignee: Cisco Technology, Inc.Inventors: Jeffrey A. Kraemer, Andrew Zawadowskiy
-
Patent number: 9148442Abstract: A system inserts at least one notifying identifier in the computer system. The at least one notifying identifier provides execution information associated with the computer system. The system receives execution information from the at least one notifying identifier, the execution information identifies details associated with a traffic flow on the computer system. The system then generates a signature based on a deterministic link provided by the execution information provided by the at least one notifying identifier. The signature is utilized to prevent further damage caused to the computer system by at least one attack.Type: GrantFiled: August 12, 2014Date of Patent: September 29, 2015Assignee: Cisco Technology, Inc.Inventors: Jeffrey A Kraemer, Andrew Zawadowskiy, Philip J. S Gladstone
-
Patent number: 9141812Abstract: A Stateful Reference Monitor can be loaded into an existing commercial operating system, and then can regulate access to many different types of resources. The reference monitor maintains an updateable storage area whose contents can be used to affect access decisions, and access decisions can be based on arbitrary properties of the request.Type: GrantFiled: November 25, 2013Date of Patent: September 22, 2015Assignee: Cisco Technology, Inc.Inventors: Philip J. S. Gladstone, Jeffrey A. Kraemer
-
Publication number: 20140351942Abstract: A system inserts at least one notifying identifier in the computer system. The at least one notifying identifier provides execution information associated with the computer system. The system receives execution information from the at least one notifying identifier, the execution information identifies details associated with a traffic flow on the computer system. The system then generates a signature based on a deterministic link provided by the execution information provided by the at least one notifying identifier. The signature is utilized to prevent further damage caused to the computer system by at least one attack.Type: ApplicationFiled: August 12, 2014Publication date: November 27, 2014Inventors: JEFFREY A. KRAEMER, ANDREW ZAWADOWSKIY, PHILIP J.S GLADSTONE
-
Patent number: 8806650Abstract: A system inserts at least one notifying identifier in the computer system. The at least one notifying identifier provides execution information associated with the computer system. The system receives execution information from the at least one notifying identifier, the execution information identifies details associated with a traffic flow on the computer system. The system then generates a signature based on a deterministic link provided by the execution information provided by the at least one notifying identifier. The signature is utilized to prevent further damage caused to the computer system by at least one attack.Type: GrantFiled: July 23, 2013Date of Patent: August 12, 2014Assignee: Cisco Technology, Inc.Inventors: Jeffrey A. Kraemer, Andrew Zawadowskiy, Philip J. S. Gladstone
-
Publication number: 20140082692Abstract: A Stateful Reference Monitor can be loaded into an existing commercial operating system, and then can regulate access to many different types of resources. The reference monitor maintains an updateable storage area whose contents can be used to affect access decisions, and access decisions can be based on arbitrary properties of the request.Type: ApplicationFiled: November 25, 2013Publication date: March 20, 2014Applicant: Cisco Technology, Inc.Inventors: Philip J.S. Gladstone, Jeffrey A. Kraemer
-
Patent number: 8595170Abstract: A Stateful Reference Monitor can be loaded into an existing commercial operating system, and then can regulate access to many different types of resources. The reference monitor maintains an updateable storage area whose contents can be used to affect access decisions, and access decisions can be based on arbitrary properties of the request.Type: GrantFiled: October 1, 2007Date of Patent: November 26, 2013Assignee: Cisco Technology, Inc.Inventors: Philip J. S. Gladstone, Jeffrey A. Kraemer
-
Publication number: 20130312104Abstract: A system inserts at least one notifying identifier in the computer system. The at least one notifying identifier provides execution information associated with the computer system. The system receives execution information from the at least one notifying identifier, the execution information identifies details associated with a traffic flow on the computer system. The system then generates a signature based on a deterministic link provided by the execution information provided by the at least one notifying identifier. The signature is utilized to prevent further damage caused to the computer system by at least one attack.Type: ApplicationFiled: July 23, 2013Publication date: November 21, 2013Applicant: Cisco Technology Inc.Inventors: Jeffrey A. Kraemer, Andrew Zawadowskiy, Philip J. S. Gladstone
-
Patent number: 8572381Abstract: A method, apparatus and computer program product for providing challenge protected user queries on a local system is presented. A query is presented to a user. A response to the query is received and a determination is made whether the response is administratively less desirable than a threshold. When the response is administratively less desirable than said threshold, then a challenge is provided to the user. The response is accepted when the user responds correctly to the challenge and the response is not accepted when the user fails to correctly respond to the challenge.Type: GrantFiled: February 6, 2006Date of Patent: October 29, 2013Assignee: Cisco Technology, Inc.Inventors: Jeffrey A. Kraemer, Philip J. S. Gladstone
-
Patent number: 8495743Abstract: A system inserts at least one notifying identifier in the computer system. The at least one notifying identifier provides execution information associated with the computer system. The system receives execution information from the at least one notifying identifier, the execution information identifies details associated with a traffic flow on the computer system. The system then generates a signature based on a deterministic link provided by the execution information provided by the at least one notifying identifier. The signature is utilized to prevent further damage caused to the computer system by at least one attack.Type: GrantFiled: May 1, 2006Date of Patent: July 23, 2013Assignee: Cisco Technology, Inc.Inventors: Jeffrey A. Kraemer, Andrew Zawadowskiy, Philip J. S. Gladstone
-
Patent number: 8413245Abstract: A system detects an attack on the computer system. The system identifies the attack as polymorphic, capable of modifying itself for every instance of execution of the attack. The modification of the attack is utilized to defeat detection of the attack. In one embodiment, the system determines generation of an effective signature of the attack has failed. The signature is utilized to prevent execution of the attack. The system then adjusts access to an interface to prevent further damage caused to the computer system by the attack.Type: GrantFiled: May 1, 2006Date of Patent: April 2, 2013Assignee: Cisco Technology, Inc.Inventors: Jeffrey A. Kraemer, Andrew Zawadowskiy
-
Patent number: 8286254Abstract: A system for automatically handling requests to grant or deny access to resources in a network or computer system. In a preferred embodiment of the invention a “learning mode” can be designated so that whenever a permission query is detected the system automatically supplies an answer to the query without requiring the user to make a response or take other action. The automated answer can be set so that the permission is always granted or other criteria can be used for the automated answer such as by categorizing the type of access permission and using a default response according to the category.Type: GrantFiled: November 16, 2005Date of Patent: October 9, 2012Assignee: Cisco Technology, Inc.Inventors: Jeffrey A. Kraemer, Debra Malver
-
Patent number: 8255995Abstract: A system defines at least one key event to be monitored by at least one agent, and creates a graphical model for the at least one key event. The system observes the at least one key event. The system infers a degree of attack on the computer system based on an observation of the at least one key event in conjunction with a result of an effect the at least one key event has on the graphical model. The system then adjusts a security policy based on an output of the graphical model.Type: GrantFiled: May 27, 2010Date of Patent: August 28, 2012Assignee: Cisco Technology, Inc.Inventors: Jeffrey A. Kraemer, Andrew Zawadowskiy
-
Patent number: 8225373Abstract: In one embodiment, local software code present in a computer system enables real-time detection of whether the computer system is properly protected against malicious attacks from harmful software. For example, software code such as one or more agents executing in the computer system support real-time protection validation based upon detection of the behavior of the computer system (as opposed to mere detection of the presence of resources or applications in the computer system). In response to detecting that the computer system or an application accesses or provides a particular type of resource and should be protected via one or more appropriate protection policies, if the computer system is not already protected, an agent of the computer system can provide immediate remediation (e.g., a security measure) to temporarily protect the computer system until the appropriate protection policy can be activated to protect the computer system against malicious software threats.Type: GrantFiled: September 30, 2010Date of Patent: July 17, 2012Assignee: Cisco Technology, Inc.Inventor: Jeffrey A. Kraemer
-
Patent number: 7979889Abstract: A system provides security to a computerized device by detecting a sequence of related processing operations within the computerized device and recording the sequence of related processing operations in a security history. The system identifies a security violation when a processing operation performed in the computerized device produces an undesired processing outcome that violates a security policy and subsequently detecting attempted performance of at least one processing operation that attempts to produce the undesired processing outcome that violates the security policy and in response, denies operation of the processing operation(s) within the computerized device to avoid violation of the security policy.Type: GrantFiled: January 7, 2005Date of Patent: July 12, 2011Assignee: Cisco Technology, Inc.Inventors: Philip J. S. Gladstone, Jeffrey A. Kraemer
-
Patent number: 7882560Abstract: A system defines at least one key event to be monitored by at least one agent, and creates a graphical model for the at least one key event. The system observes the at least one key event. The system infers a degree of attack on the computer system based on an observation of the at least one key event in conjunction with a result of an effect the at least one key event has on the graphical model. The system then adjusts a security policy based on an output of the graphical model.Type: GrantFiled: May 1, 2006Date of Patent: February 1, 2011Assignee: Cisco Technology, Inc.Inventors: Jeffrey A. Kraemer, Andrew Zawadowskiy
-
Publication number: 20110023084Abstract: In one embodiment, local software code present in a computer system enables real-time detection of whether the computer system is properly protected against malicious attacks from harmful software. For example, software code such as one or more agents executing in the computer system support real-time protection validation based upon detection of the behavior of the computer system (as opposed to mere detection of the presence of resources or applications in the computer system). In response to detecting that the computer system or an application accesses or provides a particular type of resource and should be protected via one or more appropriate protection policies, if the computer system is not already protected, an agent of the computer system can provide immediate remediation (e.g., a security measure) to temporarily protect the computer system until the appropriate protection policy can be activated to protect the computer system against malicious software threats.Type: ApplicationFiled: September 30, 2010Publication date: January 27, 2011Inventor: Jeffrey A. KRAEMER
-
Patent number: 7832008Abstract: In one embodiment, local software code present in a computer system enables real-time detection of whether the computer system is properly protected against malicious attacks from harmful software. For example, software code such as one or more agents executing in the computer system support real-time protection validation based upon detection of the behavior of the computer system (as opposed to mere detection of the presence of resources or applications in the computer system). In response to detecting that the computer system or an application accesses or provides a particular type of resource and should be protected via one or more appropriate protection policies, if the computer system is not already protected, an agent of the computer system can provide immediate remediation (e.g., a security measure) to temporarily protect the computer system until the appropriate protection policy can be activated to protect the computer system against malicious software threats.Type: GrantFiled: October 11, 2006Date of Patent: November 9, 2010Assignee: Cisco Technology, Inc.Inventor: Jeffrey A. Kraemer