Search

Avery P Kadison

from Austin, TX
Age ~51

Avery Kadison Phones & Addresses

  • 10924 Roy Butler Dr, Austin, TX 78717
  • Cedar Park, TX
  • 10775 Willowbrook Way, Cupertino, CA 95014 (408) 446-0927
  • 440 Galleria Dr, San Jose, CA 95134 (408) 383-9378
  • San Francisco, CA
  • Redwood City, CA
  • Sunnyvale, CA
  • Wichita, KS
  • Jersey City, NJ
  • Belmont, CA
  • 440 Galleria Dr, San Jose, CA 95134 (650) 369-3398

Work

Company: Lightminer systems May 2013 Position: Chief strategy officer, acting cfo, and head janitor

Education

Degree: BS School / High School: Stanford University Sep 1991 to Jun 1995 Specialities: Computer Science

Skills

Product Management • Start Ups • E Commerce • Mobile Devices • Payments • Analytics • Mobile Payments • Strategic Partnerships • Business Development • Management • Risk Management • Integration • Business Strategy • Leadership • Saas • E Payments • Mobile Commerce • Big Data • Consulting • Cross Functional Team Leadership • Cloud Computing • Software Development • Team Management • Project Management • Agile Methodologies • Scalability • Web Analytics • Go To Market Strategy • Financial Services • Enterprise Software • Fraud • User Experience • Mobile Technology • Team Leadership • Business Intelligence • Online Payments • Product Marketing • Analysis • Mobile Applications • Credit Cards • People Management • Mobile • Innovation • Payment Systems • Competitive Analysis • Executive Management • Electronic Payments • Distributed Systems • Monetization • Business Alliances

Emails

Industries

Computer Hardware

Resumes

Resumes

Avery Kadison Photo 1

Senior Director, Product And Risk

View page
Location:
10924 Roy Butler Dr, Austin, TX 78717
Industry:
Computer Hardware
Work:
LightMiner Systems since May 2013
Chief Strategy Officer, Acting CFO, and Head Janitor

PayPal Mar 2011 - May 2013
Director, New Ventures Risk Strategy

PayPal Mar 2009 - Mar 2011
Director, Consumer Risk Management

PayPal Dec 2007 - Mar 2009
Principal Consultant, Strategy & Special Projects

eHealth, Inc. Mar 2007 - Dec 2007
Director, Consumer Research
Education:
Stanford University Sep 1991 - Jun 1995
BS, Computer Science
Wichita Southeast High School 1988 - 1991
Diploma, 1991
Rounds Montessori 1979 - 1982
Skills:
Product Management
Start Ups
E Commerce
Mobile Devices
Payments
Analytics
Mobile Payments
Strategic Partnerships
Business Development
Management
Risk Management
Integration
Business Strategy
Leadership
Saas
E Payments
Mobile Commerce
Big Data
Consulting
Cross Functional Team Leadership
Cloud Computing
Software Development
Team Management
Project Management
Agile Methodologies
Scalability
Web Analytics
Go To Market Strategy
Financial Services
Enterprise Software
Fraud
User Experience
Mobile Technology
Team Leadership
Business Intelligence
Online Payments
Product Marketing
Analysis
Mobile Applications
Credit Cards
People Management
Mobile
Innovation
Payment Systems
Competitive Analysis
Executive Management
Electronic Payments
Distributed Systems
Monetization
Business Alliances

Publications

Us Patents

Computer System Authentication Using Security Indicator

View page
US Patent:
20070300292, Dec 27, 2007
Filed:
Jun 21, 2006
Appl. No.:
11/471904
Inventors:
German Scipioni - San Jose CA, US
Avery Kadison - Cupertino CA, US
Naseem Hakim - Palo Alto CA, US
International Classification:
H04L 9/32
US Classification:
726 5
Abstract:
A method to authenticate a first computer system over a network to a second computer system is disclosed. A login user interface (UI) is presented to a user of the first computer system while disconnected from the second computer system. The login UI presents at least one input field to receive login input from the user and a security indicator that has been previously selected by the user and that is local to the first computer system. Login input is selectively received from the user based on a determination that the user recognizes the security indicator as having been previously selected by the user. A connection is established between the first computer system and the second computer system over the network. The received user input is transmitted using the established connection to the second computer system for authentication of the first computer system.

Information Protection System

View page
US Patent:
20070244761, Oct 18, 2007
Filed:
Feb 28, 2006
Appl. No.:
11/365644
Inventors:
German Scipioni - San Jose CA, US
Avery Kadison - Cupertino CA, US
International Classification:
H04L 9/32
US Classification:
705018000, 726003000, 715507000
Abstract:
A method and a system to protect information are provided. For example, a system comprises a parser to parse user interface information to be included within a user interface to be displayed to a user by an information display application. The parser also identifies at least one field, within the user interface, to receive user information from a user. A detection module is provided to determine whether the user interface information is associated with fraudulent activity. A form fill module, in response to determining that the user interface is associated with fraudulent activity, provides a warning indicia in or over the at least one field, when the user interface is presented to a user by the display application. The form fill module may also disable the functionality of a user display application to automatically form fill the identified fields.

Computer System Authentication Using Security Indicator

View page
US Patent:
20200145398, May 7, 2020
Filed:
Oct 24, 2019
Appl. No.:
16/662694
Inventors:
- San Jose CA, US
Avery Kadison - Cupertino CA, US
Naseem Hakim - Palo Alto CA, US
International Classification:
H04L 29/06
G06F 21/31
G06F 21/44
Abstract:
A method to authenticate a first computer system over a network to a second computer system is disclosed. A login user interface (UI) is presented to a user of the first computer system while disconnected from the second computer system. The login UI presents at least one input field to receive login input from the user and a security indicator that has been previously selected by the user and that is local to the first computer system. Login input is selectively received from the user based on a determination that the user recognizes the security indicator as having been previously selected by the user. A connection is established between the first computer system and the second computer system over the network. The received user input is transmitted using the established connection to the second computer system for authentication of the first computer system.

Computer System Authentication Using Security Indicator

View page
US Patent:
20170289123, Oct 5, 2017
Filed:
Jun 19, 2017
Appl. No.:
15/626850
Inventors:
- San Jose CA, US
Avery Kadison - Cupertino CA, US
Naseem Hakim - Palo Alto CA, US
International Classification:
H04L 29/06
G06F 21/44
G06F 21/31
Abstract:
A method to authenticate an application on a first computer system at a second computer system is disclosed. The first computer system receives an authentication bitmap from a second computer system identifying locations in an application. The first computer system extracts portions of the application based on the identified locations in the bitmap. A hashing algorithm is applied by the first computer system to the extracted portions producing a resultant hash. The resultant hash is transmitted to the second computer system for authentication of the application.

Information Protection System

View page
US Patent:
20150339766, Nov 26, 2015
Filed:
Aug 6, 2015
Appl. No.:
14/820205
Inventors:
- San Jose CA, US
Avery Kadison - Austin TX, US
International Classification:
G06Q 40/00
Abstract:
A method and a system to protect information are provided. For example, a system comprises a parser to parse user interface information to be included within a user interface to be displayed to a user by an information display application. The parser also identifies at least one field, within the user interface, to receive user information from a user. A detection module is provided to determine whether the user interface information is associated with fraudulent activity. A form fill module, in response to determining that the user interface is associated with fraudulent activity, provides a warning indicia in or over the at least one field, when the user interface is presented to a user by the display application. The form fill module may also disable the functionality of a user display application to automatically form fill the identified fields.

Computer System Authentication Using Security Indicator

View page
US Patent:
20140165174, Jun 12, 2014
Filed:
Feb 13, 2014
Appl. No.:
14/180186
Inventors:
- SAN JOSE CA, US
Avery Kadison - Cupertino CA, US
Naseem Hakim - Palo Alto CA, US
Assignee:
EBAY INC. - SAN JOSE CA
International Classification:
H04L 29/06
US Classification:
726 7
Abstract:
A method to authenticate a first computer system over a network to a second computer system is disclosed. A login user interface (UI) is presented to a user of the first computer system while disconnected from the second computer system. The login UI presents at least one input field to receive login input from the user and a security indicator that has been previously selected by the user and that is local to the first computer system. Login input is selectively received from the user based on a determination that the user recognizes the security indicator as having been previously selected by the user. A connection is established between the first computer system and the second computer system over the network. The received user input is transmitted using the established connection to the second computer system for authentication of the first computer system.
Avery P Kadison from Austin, TX, age ~51 Get Report