Patents by Inventor Jeffrey A. Kraemer

Jeffrey A. Kraemer has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10332286
    Abstract: Systems and methods are described that provide a dynamic reporting functionality that can identify important information and dynamically present a report about the important information that highlights important findings to the user. The described systems and methods are generally described in the field of diabetes management, but are applicable to other medical reports as well. In one implementation, the dynamic reports are based on available data and devices. For example, useless sections of the report, such as those with no populated data, may be removed, minimized in importance, assigned a lower priority, or the like.
    Type: Grant
    Filed: October 2, 2015
    Date of Patent: June 25, 2019
    Assignee: DexCom, Inc.
    Inventors: Georgios Zamanakos, Daniel Justin Wiedeback, Jeffrey Grant Stewart, Eli Reihman, David Price, Lauren C. Miller, Keri Leone, Dan Kraemer, Katherine Eng Kirby, Greg Kida, Apurv Ullas Kamath, Adam R. Greene, Rebecca Gimenez, Sarah Paige Elli, Rian Draeger, Shane Philip Delmore, Leif N. Bowman
  • Patent number: 9286469
    Abstract: A system receives information from at least one security interceptor associated with at least one computer system. The information identifies details associated with a traffic flow in a computer system of the computer networking environment. The system determines a probability that an attack on the computer system is in progress based on a probabilistic link provided by the information. The probabilistic link is determined by attack information associated with previous attacks. Based on the information provided by the at least one security interceptor, the system generates a signature utilized to prevent a similar attack on the computer system.
    Type: Grant
    Filed: August 4, 2006
    Date of Patent: March 15, 2016
    Assignee: Cisco Technology, Inc.
    Inventors: Jeffrey A. Kraemer, Andrew Zawadowskiy
  • Patent number: 9148442
    Abstract: A system inserts at least one notifying identifier in the computer system. The at least one notifying identifier provides execution information associated with the computer system. The system receives execution information from the at least one notifying identifier, the execution information identifies details associated with a traffic flow on the computer system. The system then generates a signature based on a deterministic link provided by the execution information provided by the at least one notifying identifier. The signature is utilized to prevent further damage caused to the computer system by at least one attack.
    Type: Grant
    Filed: August 12, 2014
    Date of Patent: September 29, 2015
    Assignee: Cisco Technology, Inc.
    Inventors: Jeffrey A Kraemer, Andrew Zawadowskiy, Philip J. S Gladstone
  • Patent number: 9141812
    Abstract: A Stateful Reference Monitor can be loaded into an existing commercial operating system, and then can regulate access to many different types of resources. The reference monitor maintains an updateable storage area whose contents can be used to affect access decisions, and access decisions can be based on arbitrary properties of the request.
    Type: Grant
    Filed: November 25, 2013
    Date of Patent: September 22, 2015
    Assignee: Cisco Technology, Inc.
    Inventors: Philip J. S. Gladstone, Jeffrey A. Kraemer
  • Publication number: 20140351942
    Abstract: A system inserts at least one notifying identifier in the computer system. The at least one notifying identifier provides execution information associated with the computer system. The system receives execution information from the at least one notifying identifier, the execution information identifies details associated with a traffic flow on the computer system. The system then generates a signature based on a deterministic link provided by the execution information provided by the at least one notifying identifier. The signature is utilized to prevent further damage caused to the computer system by at least one attack.
    Type: Application
    Filed: August 12, 2014
    Publication date: November 27, 2014
    Inventors: JEFFREY A. KRAEMER, ANDREW ZAWADOWSKIY, PHILIP J.S GLADSTONE
  • Patent number: 8806650
    Abstract: A system inserts at least one notifying identifier in the computer system. The at least one notifying identifier provides execution information associated with the computer system. The system receives execution information from the at least one notifying identifier, the execution information identifies details associated with a traffic flow on the computer system. The system then generates a signature based on a deterministic link provided by the execution information provided by the at least one notifying identifier. The signature is utilized to prevent further damage caused to the computer system by at least one attack.
    Type: Grant
    Filed: July 23, 2013
    Date of Patent: August 12, 2014
    Assignee: Cisco Technology, Inc.
    Inventors: Jeffrey A. Kraemer, Andrew Zawadowskiy, Philip J. S. Gladstone
  • Publication number: 20140082692
    Abstract: A Stateful Reference Monitor can be loaded into an existing commercial operating system, and then can regulate access to many different types of resources. The reference monitor maintains an updateable storage area whose contents can be used to affect access decisions, and access decisions can be based on arbitrary properties of the request.
    Type: Application
    Filed: November 25, 2013
    Publication date: March 20, 2014
    Applicant: Cisco Technology, Inc.
    Inventors: Philip J.S. Gladstone, Jeffrey A. Kraemer
  • Patent number: 8595170
    Abstract: A Stateful Reference Monitor can be loaded into an existing commercial operating system, and then can regulate access to many different types of resources. The reference monitor maintains an updateable storage area whose contents can be used to affect access decisions, and access decisions can be based on arbitrary properties of the request.
    Type: Grant
    Filed: October 1, 2007
    Date of Patent: November 26, 2013
    Assignee: Cisco Technology, Inc.
    Inventors: Philip J. S. Gladstone, Jeffrey A. Kraemer
  • Publication number: 20130312104
    Abstract: A system inserts at least one notifying identifier in the computer system. The at least one notifying identifier provides execution information associated with the computer system. The system receives execution information from the at least one notifying identifier, the execution information identifies details associated with a traffic flow on the computer system. The system then generates a signature based on a deterministic link provided by the execution information provided by the at least one notifying identifier. The signature is utilized to prevent further damage caused to the computer system by at least one attack.
    Type: Application
    Filed: July 23, 2013
    Publication date: November 21, 2013
    Applicant: Cisco Technology Inc.
    Inventors: Jeffrey A. Kraemer, Andrew Zawadowskiy, Philip J. S. Gladstone
  • Patent number: 8572381
    Abstract: A method, apparatus and computer program product for providing challenge protected user queries on a local system is presented. A query is presented to a user. A response to the query is received and a determination is made whether the response is administratively less desirable than a threshold. When the response is administratively less desirable than said threshold, then a challenge is provided to the user. The response is accepted when the user responds correctly to the challenge and the response is not accepted when the user fails to correctly respond to the challenge.
    Type: Grant
    Filed: February 6, 2006
    Date of Patent: October 29, 2013
    Assignee: Cisco Technology, Inc.
    Inventors: Jeffrey A. Kraemer, Philip J. S. Gladstone
  • Patent number: 8495743
    Abstract: A system inserts at least one notifying identifier in the computer system. The at least one notifying identifier provides execution information associated with the computer system. The system receives execution information from the at least one notifying identifier, the execution information identifies details associated with a traffic flow on the computer system. The system then generates a signature based on a deterministic link provided by the execution information provided by the at least one notifying identifier. The signature is utilized to prevent further damage caused to the computer system by at least one attack.
    Type: Grant
    Filed: May 1, 2006
    Date of Patent: July 23, 2013
    Assignee: Cisco Technology, Inc.
    Inventors: Jeffrey A. Kraemer, Andrew Zawadowskiy, Philip J. S. Gladstone
  • Patent number: 8413245
    Abstract: A system detects an attack on the computer system. The system identifies the attack as polymorphic, capable of modifying itself for every instance of execution of the attack. The modification of the attack is utilized to defeat detection of the attack. In one embodiment, the system determines generation of an effective signature of the attack has failed. The signature is utilized to prevent execution of the attack. The system then adjusts access to an interface to prevent further damage caused to the computer system by the attack.
    Type: Grant
    Filed: May 1, 2006
    Date of Patent: April 2, 2013
    Assignee: Cisco Technology, Inc.
    Inventors: Jeffrey A. Kraemer, Andrew Zawadowskiy
  • Patent number: 8286254
    Abstract: A system for automatically handling requests to grant or deny access to resources in a network or computer system. In a preferred embodiment of the invention a “learning mode” can be designated so that whenever a permission query is detected the system automatically supplies an answer to the query without requiring the user to make a response or take other action. The automated answer can be set so that the permission is always granted or other criteria can be used for the automated answer such as by categorizing the type of access permission and using a default response according to the category.
    Type: Grant
    Filed: November 16, 2005
    Date of Patent: October 9, 2012
    Assignee: Cisco Technology, Inc.
    Inventors: Jeffrey A. Kraemer, Debra Malver
  • Patent number: 8255995
    Abstract: A system defines at least one key event to be monitored by at least one agent, and creates a graphical model for the at least one key event. The system observes the at least one key event. The system infers a degree of attack on the computer system based on an observation of the at least one key event in conjunction with a result of an effect the at least one key event has on the graphical model. The system then adjusts a security policy based on an output of the graphical model.
    Type: Grant
    Filed: May 27, 2010
    Date of Patent: August 28, 2012
    Assignee: Cisco Technology, Inc.
    Inventors: Jeffrey A. Kraemer, Andrew Zawadowskiy
  • Patent number: 8225373
    Abstract: In one embodiment, local software code present in a computer system enables real-time detection of whether the computer system is properly protected against malicious attacks from harmful software. For example, software code such as one or more agents executing in the computer system support real-time protection validation based upon detection of the behavior of the computer system (as opposed to mere detection of the presence of resources or applications in the computer system). In response to detecting that the computer system or an application accesses or provides a particular type of resource and should be protected via one or more appropriate protection policies, if the computer system is not already protected, an agent of the computer system can provide immediate remediation (e.g., a security measure) to temporarily protect the computer system until the appropriate protection policy can be activated to protect the computer system against malicious software threats.
    Type: Grant
    Filed: September 30, 2010
    Date of Patent: July 17, 2012
    Assignee: Cisco Technology, Inc.
    Inventor: Jeffrey A. Kraemer
  • Patent number: 7979889
    Abstract: A system provides security to a computerized device by detecting a sequence of related processing operations within the computerized device and recording the sequence of related processing operations in a security history. The system identifies a security violation when a processing operation performed in the computerized device produces an undesired processing outcome that violates a security policy and subsequently detecting attempted performance of at least one processing operation that attempts to produce the undesired processing outcome that violates the security policy and in response, denies operation of the processing operation(s) within the computerized device to avoid violation of the security policy.
    Type: Grant
    Filed: January 7, 2005
    Date of Patent: July 12, 2011
    Assignee: Cisco Technology, Inc.
    Inventors: Philip J. S. Gladstone, Jeffrey A. Kraemer
  • Patent number: 7882560
    Abstract: A system defines at least one key event to be monitored by at least one agent, and creates a graphical model for the at least one key event. The system observes the at least one key event. The system infers a degree of attack on the computer system based on an observation of the at least one key event in conjunction with a result of an effect the at least one key event has on the graphical model. The system then adjusts a security policy based on an output of the graphical model.
    Type: Grant
    Filed: May 1, 2006
    Date of Patent: February 1, 2011
    Assignee: Cisco Technology, Inc.
    Inventors: Jeffrey A. Kraemer, Andrew Zawadowskiy
  • Publication number: 20110023084
    Abstract: In one embodiment, local software code present in a computer system enables real-time detection of whether the computer system is properly protected against malicious attacks from harmful software. For example, software code such as one or more agents executing in the computer system support real-time protection validation based upon detection of the behavior of the computer system (as opposed to mere detection of the presence of resources or applications in the computer system). In response to detecting that the computer system or an application accesses or provides a particular type of resource and should be protected via one or more appropriate protection policies, if the computer system is not already protected, an agent of the computer system can provide immediate remediation (e.g., a security measure) to temporarily protect the computer system until the appropriate protection policy can be activated to protect the computer system against malicious software threats.
    Type: Application
    Filed: September 30, 2010
    Publication date: January 27, 2011
    Inventor: Jeffrey A. KRAEMER
  • Patent number: 7832008
    Abstract: In one embodiment, local software code present in a computer system enables real-time detection of whether the computer system is properly protected against malicious attacks from harmful software. For example, software code such as one or more agents executing in the computer system support real-time protection validation based upon detection of the behavior of the computer system (as opposed to mere detection of the presence of resources or applications in the computer system). In response to detecting that the computer system or an application accesses or provides a particular type of resource and should be protected via one or more appropriate protection policies, if the computer system is not already protected, an agent of the computer system can provide immediate remediation (e.g., a security measure) to temporarily protect the computer system until the appropriate protection policy can be activated to protect the computer system against malicious software threats.
    Type: Grant
    Filed: October 11, 2006
    Date of Patent: November 9, 2010
    Assignee: Cisco Technology, Inc.
    Inventor: Jeffrey A. Kraemer
  • Publication number: 20100242111
    Abstract: A system defines at least one key event to be monitored by at least one agent, and creates a graphical model for the at least one key event. The system observes the at least one key event. The system infers a degree of attack on the computer system based on an observation of the at least one key event in conjunction with a result of an effect the at least one key event has on the graphical model. The system then adjusts a security policy based on an output of the graphical model.
    Type: Application
    Filed: May 27, 2010
    Publication date: September 23, 2010
    Inventors: Jeffrey A. Kraemer, Andrew Zawadowskiy