Patents by Inventor Alexander Tormasov

Alexander Tormasov has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11210419
    Abstract: Disclosed herein are systems and methods for protecting user data. In one aspect, an exemplary method comprises, by a hardware processor, detecting user files created by a first user and stored on a user device, the user files containing personal information associated with the first user, generating user transactional data associated with one or more detected network-based interactions with a service provider, generating user behavior data based on one or more user interactions with a graphical user interface of the user device, applying a machine learning model to user data to generate a classification of the first user, the user data comprising the user files, the user transactional data, and the user behavior data, and when the user is identifiable based on the generated classification, modifying at least one of (i) user files stored on the user device and (ii) user behavior during an operation of the user device.
    Type: Grant
    Filed: September 16, 2019
    Date of Patent: December 28, 2021
    Assignee: Acronis International GmbH
    Inventors: Serguei Beloussov, Oleg Melnikov, Alexander Tormasov, Stanislav Protasov
  • Patent number: 11184335
    Abstract: A method for remote private key security is described. The method may include generating a private key and may further include generating encrypted data by encrypting data using an encryption algorithm, wherein the data is stored at a first location and the private key is for the encrypted data. The method may also include transmitting the private key to a remote private key deposit at a second location. The method may additionally include transmitting the encrypted data to a remote data center at a third location. Moreover, the method may include permitting access to the private key at the remote private key deposit to an individual at the second location in response to confirming an identity of the individual present at the second location.
    Type: Grant
    Filed: May 26, 2016
    Date of Patent: November 23, 2021
    Inventors: Serguei M. Beloussov, Alexander Tormasov, Stanislav Protasov
  • Publication number: 20210349764
    Abstract: Disclosed herein are systems and method efficiently executing a program operation on a cloud-based service. In an exemplary aspect, a method comprises receiving a request to perform a program operation on a cloud-based service and at least one user constraint for performing the program operation, and determining a plurality of sub-operations that are comprised in the program operation. The method comprises identifying a plurality of service component combinations offered by the service provider that can execute the program operation, and identifying, based on a status of each service component, at least one processing constraint of each service component. The method comprises determining, by a machine learning algorithm, a service component combination from the plurality of service component combinations for executing the program operation based on the at least one user constraint and processing constraints. The method comprises executing the program operation by the determined service component combination.
    Type: Application
    Filed: May 4, 2021
    Publication date: November 11, 2021
    Inventors: Alexander Tormasov, Serguei Beloussov, Stanislav Protasov
  • Publication number: 20210258230
    Abstract: Disclosed herein are systems and methods for pattern-based QoS violation prediction. In one exemplary aspect, a method may comprise identifying a service on a computing device that is connected to a plurality of client devices and determining a plurality of micro-services comprised in the identified service. The method may comprise parsing access information to detect that a first client device is accessing a micro-service. The method may comprise determining, for a first period of time, QoS evaluation parameters for the access between the micro-service and the first client device. The method may comprise identifying changes in the QoS evaluation parameters within the first period of time, detecting a predetermined QoS violation pattern, and executing a QoS action based on the predetermined QoS violation pattern.
    Type: Application
    Filed: December 14, 2020
    Publication date: August 19, 2021
    Inventors: Alexander Tormasov, Serguei Beloussov, Stanislav Protasov
  • Publication number: 20210243186
    Abstract: Disclosed herein are systems and method for providing data access based on physical proximity between a user and a device. In one aspect, the method may comprise receiving, at the device, a request to access protected data, wherein the request comprises an authentication key for accessing the protected data. In response to verifying both that the authentication key is valid and that the device is being accessed by a proximate user based on the initial biometrics data, the method may comprise retrieving a presence profile that comprises historic biometric attributes of the authorized user. Simultaneous to collecting new biometric attributes of the proximate user, the method may comprise generating and comparing the temporary presence profile with the presence profile of the authorized user. While the temporary presence profile matches the presence profile, the method may comprise enabling access to the protected data.
    Type: Application
    Filed: December 4, 2020
    Publication date: August 5, 2021
    Inventors: Alexander Tormasov, Serguei Beloussov, Stanislav Protasov
  • Patent number: 11075744
    Abstract: Disclosed herein are systems and method for storing media authentication data using a distributed ledger. In one aspect, an exemplary method comprises, receiving, by a processor of a computing node of a plurality of computing nodes, one or more hashes associated with a media content and a timestamp, the computing nodes being communicatively linked, generating a data block that contains at least one of the received hashes, the data block being generated by hashing a hash corresponding to a previous data block of the distributed ledger together with the at least one hash, the at least one hash corresponding to the media content of the data block being generated, transmitting to the plurality of computing nodes, a message reporting an addition of the generated data block, wherein at least some of the plurality of computing nodes maintain at least a partial copy of the distributed ledger.
    Type: Grant
    Filed: November 19, 2018
    Date of Patent: July 27, 2021
    Assignee: Acronis International GmbH
    Inventors: Alexander Tormasov, Serguei Beloussov, Stanislav Protasov
  • Publication number: 20210216624
    Abstract: Disclosed herein are systems and method for protecting files indirectly related to user activity. In one exemplary aspect, a method may comprise identifying, on a computing device, a file that is directly accessed by a user of the computing device. The method may comprise determining an application that provides access to the file. The method may comprise identifying a plurality of program files that the application utilizes during execution. For each respective program file of the plurality of program files, the method may comprise determining whether the respective program file is required by the application to provide access to the file and in response to determining that the respective program file is required, determining a type of threat that can target the respective program file. The method may further comprise performing a data protection action on the respective program file based on the type of threat.
    Type: Application
    Filed: November 19, 2020
    Publication date: July 15, 2021
    Inventors: Alexander Tormasov, Serguei Beloussov, Stanislav Protasov
  • Publication number: 20210182370
    Abstract: Disclosed herein are systems and methods for continuous user authentication during access of a digital service. In an exemplary aspect, a continuous authentication module may receive, at a computing device, initial authentication credentials of the user. The initial authentication credentials enable access to a service via the computing device. While the service is being accessed, the continuous authentication module may continuously monitor whether an unauthorized user has replaced the user in accessing the service by comparing usage attributes of the service with historic usage attributes associated with the user. In response to determining that the unauthorized user has replaced the user, the continuous authentication module may cease the access to the service via the computing device.
    Type: Application
    Filed: December 17, 2019
    Publication date: June 17, 2021
    Inventors: Oleg Melnikov, Alexander Tormasov, Serguei Beloussov, Stanislav Protasov
  • Publication number: 20210170230
    Abstract: Disclosed herein are systems and method for training a player in a sports contest. In an exemplary aspect, a method may comprise receiving a strategy to be implemented in a sports contest by at least one player. The method may comprise determining a success rate of the strategy based on historical data of the at least one player. In response to determining that the success rate is less than a threshold success rate, the method may comprise identifying game obstacles in instances where the strategy was implemented by the at least one player and did not achieve the goal. The method may comprise determining a modified strategy that minimizes encounters of the at least one player with the game obstacles and achieves the goal of the strategy. The method may comprise outputting a training procedure for implementing the modified strategy for presentation to the at least one player.
    Type: Application
    Filed: October 9, 2020
    Publication date: June 10, 2021
    Inventors: Alexander Tormasov, Serguei Beloussov, Stanisiav Protasov
  • Publication number: 20210170229
    Abstract: Disclosed herein are systems and method for providing a strategic game recommendation in a sports contest using A.I. In one exemplary aspect, a method may comprise receiving, over a period of time, images and depth information from a plurality of sensors distributed in an environment of a sports contest, and generating a unified visual representation of the sports contest. The method may comprise identifying at least one player in the unified visual representation and receiving a strategy associated with the at least one player, wherein the strategy comprises player movement information during a game event. In response to determining, based on positional data of the at least one player over the period of time, that the game event is occurring, the method may comprise generating a strategic game recommendation for the at least one player to implement the strategy and minimize encounters with game obstacles.
    Type: Application
    Filed: September 21, 2020
    Publication date: June 10, 2021
    Inventors: Alexander Tormasov, Serguei Beloussov, Stanislav Protasov
  • Patent number: 10951394
    Abstract: A system and method for encrypting and publishing data using blockchain technology is provided. An exemplary method includes receiving, by one or more nodes of a distributed network that maintains a blockchain, a message requesting publication of private information within the blockchain subsequent to a specified time interval. Moreover, the method includes recording a sequence of transactions in the blockchain based on the time interval, wherein each transaction in the sequence of transactions includes a payload calculated using a first homomorphic operation; and extracting the private information from a final payload of a final transaction in the sequence of transactions from the blockchain.
    Type: Grant
    Filed: August 15, 2018
    Date of Patent: March 16, 2021
    Assignee: Acronis International GmbH
    Inventors: Alexander Tormasov, Stanislav Protasov, Serguei Beloussov
  • Publication number: 20200401473
    Abstract: Disclosed are systems and methods for proactive disaster recovery. The described technique monitors for events raised by a system of interconnected external sensors and other devices for obtaining data on the external environment of servers. The system uses these events as a chain of triggers according to which preventative or preparatory actions for disaster recovery are performed.
    Type: Application
    Filed: September 1, 2020
    Publication date: December 24, 2020
    Inventors: Kirill Korotaev, Serguei Beloussov, Alexander Tormasov, Oleg Melnikov, Oleg Shaikhatarov, Stanistav Protasov
  • Publication number: 20200364113
    Abstract: Disclosed herein are systems and method for determining a backup schedule on a computer system. In one exemplary aspect, a method may comprise collecting user behavior data on the computer system and analyzing the user behavior data to determine an optimal time of a backup session to create backup copies of modified data stored on a volume of the computer system. The method may comprise determining an optimal duration of the backup session based on the analyzed user behavior and prioritizing portions of the modified data based on priority rules. The method may comprise determining a prioritized portion of the modified data that can be saved during the backup session based on the duration, computer system hardware and network bandwidth at the optimal time of backup, and performing the backup session comprising the prioritized portion.
    Type: Application
    Filed: May 18, 2020
    Publication date: November 19, 2020
    Inventors: Alexander Tormasov, Serguei Beloussov, Stanislav Protasov
  • Patent number: 10795758
    Abstract: Disclosed are systems and methods for proactive disaster recovery. The described technique monitors for events raised by a system of interconnected external sensors and other devices for obtaining data on the external environment of servers. The system uses these events as a chain of triggers according to which preventative or preparatory actions for disaster recovery are performed.
    Type: Grant
    Filed: November 20, 2018
    Date of Patent: October 6, 2020
    Assignee: Acronis International GmbH
    Inventors: Kirill Korotaev, Serguei Beloussov, Alexander Tormasov, Oleg Melnikov, Oleg Shaikhatarov, Stanislav Protasov
  • Publication number: 20200184741
    Abstract: Disclosed herein are system and method for driving organization and subsequent analysis of an autonomous vehicle. In an exemplary aspect, the system and method comprise dividing a path of a vehicle into a plurality of segments based on predetermined conditions; monitoring both behavior of the vehicle and driving conditions during each of the plurality of segments; storing the behavior and the driving conditions in a plurality of records of an immutable storage; determining whether an accident has occurred involving the vehicle; in response to determining that the accident has occurred, retrieving for the plurality of segments the behavior and the driving conditions from the immutable storage; reconstructing the path using the retrieved behavior and the driving conditions and the plurality of segments; and analyzing the reconstructed path to determine a cause of the accident.
    Type: Application
    Filed: December 4, 2019
    Publication date: June 11, 2020
    Inventors: Alexander Tormasov, Serguei Beloussov, Stanislav Protasov
  • Publication number: 20200174893
    Abstract: Disclosed herein are systems and method storing data. In an exemplary aspect, a method comprises determining a threshold data size for objects in a target data system; generating a data blob that has an allocated size of at least the threshold data size, wherein the data blob comprises at least one data set; identifying a data set stored in a source data system for backup to the target data system; determining whether a size of the data set is less than the threshold data size; and responsive to determining that the size of the data set is less than the threshold data size, inserting the data set into the data blob; and writing the data blob to the target data system.
    Type: Application
    Filed: December 2, 2019
    Publication date: June 4, 2020
    Inventors: Alexander Tormasov, Serguei Beloussov, Stanislav Protasov
  • Publication number: 20200159609
    Abstract: Disclosed are systems and methods for proactive disaster recovery. The described technique monitors for events raised by a system of interconnected external sensors and other devices for obtaining data on the external environment of servers. The system uses these events as a chain of triggers according to which preventative or preparatory actions for disaster recovery are performed.
    Type: Application
    Filed: November 20, 2018
    Publication date: May 21, 2020
    Inventors: Kirill Korotaev, Serguei Beloussov, Alexander Tormasov, Oleg Melnikov, Oleg Shaikhatarov
  • Publication number: 20200128075
    Abstract: A system and method is provided for service level agreement (SLA) based data storage and verification. According to one exemplary aspect, a method includes receiving, from a client device, a request to perform data verification of data relating to a file stored on a remote storage computer; accessing, by a processor, at least one SLA to determine a fault tolerance for the file stored on the remote storage computer; sending, by the processor to the remote storage computer, a request to store k derivatives of the file in the remote storage computer; and transmitting, to the client device, an indication of a location of the k derivatives of the file in the remote storage computer.
    Type: Application
    Filed: December 18, 2019
    Publication date: April 23, 2020
    Inventors: Alexander Tormasov, Stanislav S. Protasov, Serguei M. Beloussov
  • Publication number: 20200097678
    Abstract: Disclosed herein are systems and methods for protecting user data. In one aspect, an exemplary method comprises, by a hardware processor, detecting user files created by a first user and stored on a user device, the user files containing personal information associated with the first user, generating user transactional data associated with one or more detected network-based interactions with a service provider, generating user behavior data based on one or more user interactions with a graphical user interface of the user device, applying a machine learning model to user data to generate a classification of the first user, the user data comprising the user files, the user transactional data, and the user behavior data, and when the user is identifiable based on the generated classification, modifying at least one of (i) user files stored on the user device and (ii) user behavior during an operation of the user device.
    Type: Application
    Filed: September 16, 2019
    Publication date: March 26, 2020
    Inventors: Serguei Beloussov, Oleg Melnikov, Alexander Tormasov, Stanislav Protasov
  • Patent number: 10600417
    Abstract: The present disclosure generally relates to the field of wearable human interface devices. In one aspect, a human interface device may comprise at least one housing configured to be worn by a user, comprising a transmitter configured to generate a wireless signal and a sensor configured to detect the wireless signal generated by the transmitter, a processing unit, communicatively linked to the sensor and configured to analyze the wireless signal detected by the sensor and calculate the position of a portion of the user wearing the at least one housing based on the wireless signal and a control unit, configured to perform an operation based upon the position of the portion of the user wearing the at least one housing.
    Type: Grant
    Filed: February 14, 2018
    Date of Patent: March 24, 2020
    Assignee: Acronis International GmbH
    Inventors: Alexander Tormasov, Serguei Beloussov, Stanislav Protasov