JK

Jeffrey A. Kraemer

CI Cisco: 22 patents #522 of 13,007Top 5%
CB Carbon Black: 11 patents #1 of 19Top 6%
SH Shopify: 1 patents #168 of 343Top 50%
Broadcom: 1 patents #5,847 of 9,346Top 65%
📍 Wellesley, MA: #25 of 837 inventorsTop 3%
🗺 Massachusetts: #1,873 of 88,656 inventorsTop 3%
Overall (All Time): #79,112 of 4,157,543Top 2%
40
Patents All Time

Issued Patents All Time

Showing 26–40 of 40 patents

Patent #TitleCo-InventorsDate
8255995 Methods and apparatus providing computer and network security utilizing probabilistic policy reposturing Andrew Zawadowskiy 2012-08-28
8225373 Protection of computer resources 2012-07-17
7979889 Methods and apparatus providing security to computer systems and networks Philip J. S. Gladstone 2011-07-12
7882560 Methods and apparatus providing computer and network security utilizing probabilistic policy reposturing Andrew Zawadowskiy 2011-02-01
7832008 Protection of computer resources 2010-11-09
7774498 Methods and apparatus for trusted application centric QoS provisioning David J. McCowan, Kerry E. Lynn, Philip J. S. Gladstone 2010-08-10
7716473 Methods and apparatus providing a reference monitor simulator Philip J. S. Gladstone, Alan J. Kirby, Mikhail Cherepov 2010-05-11
7681226 Methods and apparatus providing security for multiple operational states of a computerized device Debra Malver 2010-03-16
7607041 Methods and apparatus providing recovery from computer and network security attacks Andrew Zawadowskiy, Boris Ruchansky 2009-10-20
7596097 Methods and apparatus to prevent network mapping David J. McCowan 2009-09-29
7516476 Methods and apparatus for automated creation of security policy Brian Costello, Dan L. Grecu, Venkat Rangamani, Philip J. S. Gladstone, Alan J. Kirby 2009-04-07
7290266 Access control by a real-time stateful reference monitor with a state collection training mode and a lockdown mode for detecting predetermined patterns of events indicative of requests for operating system resources resulting in a decision to allow or block activity identified in a sequence of events based on a rule set defining a processing policy Philip J. S. Gladstone 2007-10-30
5898784 Transferring encrypted packets over a public network Alan J. Kirby, Ashok P. Nadkarni 1999-04-27
5825891 Key management for network communication Roger Levesque, Ashok P. Nadkarni 1998-10-20
5798706 Detecting unauthorized network communication Alan J. Kirby, David C. Waterman 1998-08-25