Patents by Inventor Andrey P. Doukhvalov

Andrey P. Doukhvalov has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11971996
    Abstract: The present disclosure provides systems and methods for increasing the cybersecurity of a control subject of an industrial technological system. In an exemplary aspect, the method comprises installing a protected Operating System (OS) on a control subject of the industrial technological system, receiving, by the protected OS, a plurality of log files from the control subject, analyzing, by the protected OS, the plurality of log files to determine if a suspicious action has been applied to the control subject, wherein the control subject is configured to apply a controlling action to the object of control, intercepting, by the protected OS, network packets transmitted by an application launched in a guest OS to the control subject, and preventing, by the protected OS, an interaction between the application and the control subject, in response to determining that the suspicious action has been applied to the control subject.
    Type: Grant
    Filed: December 6, 2021
    Date of Patent: April 30, 2024
    Assignee: AO Kaspersky Lab
    Inventors: Andrey P. Doukhvalov, Pavel V. Dyakin, Dmitry A. Kulagin
  • Publication number: 20220092191
    Abstract: The present disclosure provides systems and methods for increasing the cybersecurity of a control subject of an industrial technological system. In an exemplary aspect, the method comprises installing a protected Operating System (OS) on a control subject of the industrial technological system, receiving, by the protected OS, a plurality of log files from the control subject, analyzing, by the protected OS, the plurality of log files to determine if a suspicious action has been applied to the control subject, wherein the control subject is configured to apply a controlling action to the object of control, intercepting, by the protected OS, network packets transmitted by an application launched in a guest OS to the control subject, and preventing, by the protected OS, an interaction between the application and the control subject, in response to determining that the suspicious action has been applied to the control subject.
    Type: Application
    Filed: December 6, 2021
    Publication date: March 24, 2022
    Inventors: Andrey P. Doukhvalov, Pavel V. Dyakin, Dmitry A. Kulagin
  • Patent number: 11259179
    Abstract: Disclosed are systems and methods for enabling transmission of data and commands between a mobile device and a vehicle. An exemplary method comprises connecting a security device to a vehicle and to a mobile device, the security device having a protected memory, verifying, by the security device, an authenticity of the mobile device, allowing, by the security device, transmission of data and commands between the mobile device and at least one actuating device of the vehicle when the mobile device is verified as being authentic, transmitting, by the security device, results of executions of commands from the at least one actuating device of the vehicle to the mobile device.
    Type: Grant
    Filed: November 25, 2019
    Date of Patent: February 22, 2022
    Assignee: AO Kaspersky Lab
    Inventors: Eugene V. Kaspersky, Andrey P. Doukhvalov, Pavel V. Dyakin, Dmitry A. Kulagin, Sergey V. Konoplev, Anton V. Tikhomirov
  • Patent number: 11222124
    Abstract: The present disclosure provides systems and methods to stepwise increasing the IT security of elements of a technological system. In an exemplary aspect, the method comprises gathering data on technological systems and a plurality of elements comprising the technological system by intercepting traffic between the plurality of elements using data exchange protocols, identifying vulnerable elements of the technological system by one or more of: detecting suspicious actions on the vulnerable elements and statistical data relating to the elements, analyzing the vulnerable elements to generate a classification of severity of vulnerabilities of the vulnerable elements, identifying most vulnerable portions of the vulnerable elements as compared to other elements in the vulnerable elements, operating the most vulnerable portions of the vulnerable elements in a protected environment.
    Type: Grant
    Filed: July 8, 2019
    Date of Patent: January 11, 2022
    Assignee: AO Kaspersky Lab
    Inventors: Andrey P. Doukhvalov, Pavel V. Dyakin, Dmitry A. Kulagin
  • Patent number: 11030319
    Abstract: Disclosed herein are methods and systems for automated testing of hardware and software systems. An exemplary method comprises receiving a formalized architecture description describing an architecture of a system being designed, receiving a formalized threat description describing threats to systems similar to the system being designed, building, by a processor, a use model based on the formalized description, building, by a processor, a threat model based on the formalized threat description, determining, by a processor, kinds of use of the system by comparing the threat model to the use model and determining, by a processor, components of the system based on the kinds of use.
    Type: Grant
    Filed: September 6, 2018
    Date of Patent: June 8, 2021
    Assignee: AO Kaspersky Lab
    Inventors: Andrey P. Doukhvalov, Ekaterina A. Rudina, Semen S. Kort, Viacheslav N. Zolotnikov
  • Patent number: 10867051
    Abstract: The present disclosure is directed to methods and systems for automated design of a system of hardware and software. In an exemplary embodiment, such a method comprises constructing, by a hardware processor, a model of use based on an architecture description of the system, constructing, by the hardware processor, threat model based on a threat description indicating known threats to the system, determining use of the system based on a comparison between the model of use and the threat model and selecting a configuration for realizing the system based on a result of the comparison.
    Type: Grant
    Filed: April 9, 2018
    Date of Patent: December 15, 2020
    Assignee: AO Kaspersky Lab
    Inventors: Andrey P. Doukhvalov, Ekaterina A. Rudina, Semen S. Kort, Viacheslav N. Zolotnikov
  • Publication number: 20200311282
    Abstract: The present disclosure provides systems and methods to stepwise increasing the IT security of elements of a technological system. In an exemplary aspect, the method comprises gathering data on technological systems and a plurality of elements comprising the technological system by intercepting traffic between the plurality of elements using data exchange protocols, identifying vulnerable elements of the technological system by one or more of: detecting suspicious actions on the vulnerable elements and statistical data relating to the elements, analyzing the vulnerable elements to generate a classification of severity of vulnerabilities of the vulnerable elements, identifying most vulnerable portions of the vulnerable elements as compared to other elements in the vulnerable elements, operating the most vulnerable portions of the vulnerable elements in a protected environment.
    Type: Application
    Filed: July 8, 2019
    Publication date: October 1, 2020
    Inventors: Andrey P. Doukhvalov, Pavel V. Dyakin, Dmitry A. Kulagin
  • Publication number: 20200089219
    Abstract: Disclosed are systems and methods for enabling transmission of data and commands between a mobile device and a vehicle. An exemplary method comprises connecting a security device to a vehicle and to a mobile device, the security device having a protected memory, verifying, by the security device, an authenticity of the mobile device, allowing, by the security device, transmission of data and commands between the mobile device and at least one actuating device of the vehicle when the mobile device is verified as being authentic, transmitting, by the security device, results of executions of commands from the at least one actuating device of the vehicle to the mobile device.
    Type: Application
    Filed: November 25, 2019
    Publication date: March 19, 2020
    Inventors: Eugene V. Kaspersky, Andrey P. Doukhvalov, Pavel V. Dyakin, Dmitry A. Kulagin, Sergey V. Konoplev, Anton V. Tikhomirov
  • Patent number: 10545496
    Abstract: Disclosed are systems and methods for securely controlling a vehicle using a mobile device. An exemplary method comprises authenticating, by a mobile device, a user attempting to perform commands controlling one or more vehicle systems of a coupled vehicle, retrieving profile information related to the user's preference associated with the coupled vehicle, establishing a connection between the mobile device and a security device of the coupled vehicle, authenticating the mobile device with the security device, forming, by the mobile device, commands to control the one or more vehicle systems based on command forming algorithms, the one or more vehicle systems comprising actuating devices of the vehicle and electronic systems of the vehicle, modifying the formed commands based on the profile information and safety information related to a location of the vehicle and transmitting the formed commands to the one or more vehicle systems via the security device to securely control the vehicle.
    Type: Grant
    Filed: September 7, 2018
    Date of Patent: January 28, 2020
    Assignee: AO Kaspersky Lab
    Inventors: Eugene V. Kaspersky, Andrey P. Doukhvalov, Pavel V. Dyakin, Dmitry A. Kulagin, Sergey V. Konoplev, Anton V. Tikhomirov
  • Patent number: 10469527
    Abstract: Disclosed are systems and methods for protection of a technological system (TS) from cyber attacks. An exemplary method comprises: obtaining a real state of the TS; initializing a cybernetic control system (CCS) by synchronizing the CCS with the TS; comparing, by the CCS, the real state of the TS with an ideal state of the TS; based on the comparison, identifying a deviation of the real state of the TS from the ideal state of the TS; when the deviation is identified, checking an integrity of at least functional interconnections of the states of one or more elements of the TS; determining whether the ideal state of the TS is a modeling error based on one or more confirmed sustained functional interconnections between elements of the TS; and identifying anomalies in the TS based on one or more disturbed functional interconnections between elements of the TS.
    Type: Grant
    Filed: September 2, 2016
    Date of Patent: November 5, 2019
    Assignee: AO Kaspersky Lab
    Inventors: Sergey V. Gordeychik, Andrey B. Lavrentyev, Andrey P. Doukhvalov
  • Publication number: 20190325144
    Abstract: Disclosed herein are methods and systems for automated testing of hardware and software systems. An exemplary method comprises receiving a formalized architecture description describing an architecture of a system being designed, receiving a formalized threat description describing threats to systems similar to the system being designed, building, by a processor, a use model based on the formalized description, building, by a processor, a threat model based on the formalized threat description, determining, by a processor, kinds of use of the system by comparing the threat model to the use model and determining, by a processor, components of the system based on the kinds of use.
    Type: Application
    Filed: September 6, 2018
    Publication date: October 24, 2019
    Inventors: Andrey P. DOUKHVALOV, Ekaterina A. RUDINA, Semen S. KORT, Viacheslav N. ZOLOTNIKOV
  • Patent number: 10361998
    Abstract: A computer security architecture applies selected rules from among a set of rules defining one or more security policies to a given set of security context parameters to produce security verdicts, each representing whether a certain action requested by a subject entity is permissible. Each security policy is associated with a corresponding communication interface. A plurality of gateway engines are each associated with at least one of the subject entities and dedicated to interfacing with the security server. Each of the gateway engines carries out monitoring of requested actions by the associated subject entity and, for each requested action, identifies a security context. A security policy is determined for the requested action based on a corresponding security context, and a security verdict is obtained via a communication interface corresponding to the applicable security policy.
    Type: Grant
    Filed: August 30, 2017
    Date of Patent: July 23, 2019
    Assignee: AO KASPERSKY LAB
    Inventors: Andrey P. Doukhvalov, Pavel V. Dyakin, Dmitry A. Kulagin, Sergey B. Lungu, Stanislav V. Moiseev
  • Publication number: 20190102561
    Abstract: The present disclosure is directed to methods and systems for automated design of a system of hardware and software. In an exemplary embodiment, such a method comprises constructing, by a hardware processor, a model of use based on an architecture description of the system, constructing, by the hardware processor, threat model based on a threat description indicating known threats to the system, determining use of the system based on a comparison between the model of use and the threat model and selecting a configuration for realizing the system based on a result of the comparision.
    Type: Application
    Filed: April 9, 2018
    Publication date: April 4, 2019
    Inventors: Andrey P. DOUKHVALOV, Ekaterina A. RUDINA, Semen S. KORT, Viacheslav N. ZOLOTNIKOV
  • Publication number: 20190018405
    Abstract: Disclosed are systems and methods for securely controlling a vehicle using a mobile device. An exemplary method comprises authenticating, by a mobile device, a user attempting to perform commands controlling one or more vehicle systems of a coupled vehicle, retrieving profile information related to the user's preference associated with the coupled vehicle, establishing a connection between the mobile device and a security device of the coupled vehicle, authenticating the mobile device with the security device, forming, by the mobile device, commands to control the one or more vehicle systems based on command forming algorithms, the one or more vehicle systems comprising actuating devices of the vehicle and electronic systems of the vehicle, modifying the formed commands based on the profile information and safety information related to a location of the vehicle and transmitting the formed commands to the one or more vehicle systems via the security device to securely control the vehicle.
    Type: Application
    Filed: September 7, 2018
    Publication date: January 17, 2019
    Inventors: Eugene V. Kaspersky, Andrey P. Doukhvalov, Pavel V. Dyakin, Dmitry A. Kulagin, Sergey V. Konoplev, Anton V. Tikhomirov
  • Patent number: 10101738
    Abstract: Disclosed are systems and methods for secure control of automotive systems using mobile devices. An exemplary method comprises: connecting a vehicle, as a peripheral device, to a mobile device, which acts as a master device, via a security device of the vehicle, wherein the security device provides secure transmission of data and commands between the vehicle and the mobile device; receiving, by the mobile device, via the security device, from one or more measurement devices of the vehicle, measurement data from one or more automotive systems of the vehicle; based on the received measurement data, forming by the mobile device control commands for actuating devices of the vehicle, wherein the control commands enable and/or regulate operation of the actuating devices of the vehicle; and transmitting, by the mobile device, via the security device, the control commands to the actuating devices of the vehicle.
    Type: Grant
    Filed: August 7, 2017
    Date of Patent: October 16, 2018
    Assignee: AO KASPERSKY LAB
    Inventors: Eugene V. Kaspersky, Andrey P. Doukhvalov, Pavel V. Dyakin, Dmitry A. Kulagin, Sergey V. Konoplev, Anton V. Tikhomirov
  • Publication number: 20180164800
    Abstract: Disclosed are systems and methods for secure control of automotive systems using mobile devices. An exemplary method comprises: connecting a vehicle, as a peripheral device, to a mobile device, which acts as a master device, via a security device of the vehicle, wherein the security device provides secure transmission of data and commands between the vehicle and the mobile device; receiving, by the mobile device, via the security device, from one or more measurement devices of the vehicle, measurement data from one or more automotive systems of the vehicle; based on the received measurement data, forming by the mobile device control commands for actuating devices of the vehicle, wherein the control commands enable and/or regulate operation of the actuating devices of the vehicle; and transmitting, by the mobile device, via the security device, the control commands to the actuating devices of the vehicle.
    Type: Application
    Filed: August 7, 2017
    Publication date: June 14, 2018
    Inventors: Eugene V. Kaspersky, Andrey P. Doukhvalov, Pavel V. Dyakin, Dmitry A. Kulagin, Sergey V. Konoplev, Anton V. Tikhomirov
  • Publication number: 20180006999
    Abstract: A computer security architecture applies selected rules from among a set of rules defining one or more security policies to a given set of security context parameters to produce security verdicts, each representing whether a certain action requested by a subject entity is permissible. Each security policy is associated with a corresponding communication interface. A plurality of gateway engines are each associated with at least one of the subject entities and dedicated to interfacing with the security server. Each of the gateway engines carries out monitoring of requested actions by the associated subject entity and, for each requested action, identifies a security context. A security policy is determined for the requested action based on a corresponding security context, and a security verdict is obtained via a communication interface corresponding to the applicable security policy.
    Type: Application
    Filed: August 30, 2017
    Publication date: January 4, 2018
    Inventors: Andrey P. Doukhvalov, Pavel V. Dyakin, Dmitry A. Kulagin, Sergey B. Lungu, Stanislav V. Moiseev
  • Patent number: 9774568
    Abstract: A computer security architecture applies selected rules from among a set of rules defining one or more security policies to a given set of security context parameters to produce security verdicts, each representing whether a certain action requested by a subject entity is permissible. Each security policy is associated with a corresponding communication interface. A plurality of gateway engines are each associated with at least one of the subject entities and dedicated to interfacing with the security server. Each of the gateway engines carries out monitoring of requested actions by the associated subject entity and, for each requested action, identifies a security context. A security policy is determined for the requested action based on a corresponding security context, and a security verdict is obtained via a communication interface corresponding to the applicable security policy.
    Type: Grant
    Filed: January 27, 2016
    Date of Patent: September 26, 2017
    Assignee: AO KASPERSKY LAB
    Inventors: Andrey P. Doukhvalov, Pavel V. Dyakin, Dmitry A. Kulagin, Sergey B. Lungu, Stanislav V. Moiseev
  • Publication number: 20170244752
    Abstract: Disclosed are systems and methods for protection of a technological system (TS) from cyber attacks. An exemplary method comprises: obtaining a real state of the TS; initializing a cybernetic control system (CCS) by synchronizing the CCS with the TS; comparing, by the CCS, the real state of the TS with an ideal state of the TS; based on the comparison, identifying a deviation of the real state of the TS from the ideal state of the TS; when the deviation is identified, checking an integrity of at least functional interconnections of the states of one or more elements of the TS; determining whether the ideal state of the TS is a modeling error based on one or more confirmed sustained functional interconnections between elements of the TS; and identifying anomalies in the TS based on one or more disturbed functional interconnections between elements of the TS.
    Type: Application
    Filed: September 2, 2016
    Publication date: August 24, 2017
    Inventors: SERGEY V. GORDEYCHIK, ANDREY B. LAVRENTYEV, ANDREY P. DOUKHVALOV
  • Patent number: 9582335
    Abstract: In a computer system, processing of security-related tasks is delegated to various agent computers. According to various embodiments, a distributed computing service obtains task requests to be performed for the benefit of beneficiary computers, and delegates those tasks to one or more remote agent computers for processing. The delegation is based on a suitability determination as to whether each of the remote agent computers is suitable to perform the processing. Suitability can be based on an evaluation of such parameters as computing capacity and current availability of the remote agent computers against the various tasks to be performed and their corresponding computing resource requirements. This evaluation can be performed according to various embodiments by the agent computers, the distributed computing service, or by a combination thereof.
    Type: Grant
    Filed: March 22, 2012
    Date of Patent: February 28, 2017
    Assignee: AO KASPERSKY LAB
    Inventors: Andrey P. Doukhvalov, Yury V. Mashevsky, Anton V. Tikhomirov