Patents by Inventor Andrey P. Doukhvalov
Andrey P. Doukhvalov has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11971996Abstract: The present disclosure provides systems and methods for increasing the cybersecurity of a control subject of an industrial technological system. In an exemplary aspect, the method comprises installing a protected Operating System (OS) on a control subject of the industrial technological system, receiving, by the protected OS, a plurality of log files from the control subject, analyzing, by the protected OS, the plurality of log files to determine if a suspicious action has been applied to the control subject, wherein the control subject is configured to apply a controlling action to the object of control, intercepting, by the protected OS, network packets transmitted by an application launched in a guest OS to the control subject, and preventing, by the protected OS, an interaction between the application and the control subject, in response to determining that the suspicious action has been applied to the control subject.Type: GrantFiled: December 6, 2021Date of Patent: April 30, 2024Assignee: AO Kaspersky LabInventors: Andrey P. Doukhvalov, Pavel V. Dyakin, Dmitry A. Kulagin
-
Publication number: 20220092191Abstract: The present disclosure provides systems and methods for increasing the cybersecurity of a control subject of an industrial technological system. In an exemplary aspect, the method comprises installing a protected Operating System (OS) on a control subject of the industrial technological system, receiving, by the protected OS, a plurality of log files from the control subject, analyzing, by the protected OS, the plurality of log files to determine if a suspicious action has been applied to the control subject, wherein the control subject is configured to apply a controlling action to the object of control, intercepting, by the protected OS, network packets transmitted by an application launched in a guest OS to the control subject, and preventing, by the protected OS, an interaction between the application and the control subject, in response to determining that the suspicious action has been applied to the control subject.Type: ApplicationFiled: December 6, 2021Publication date: March 24, 2022Inventors: Andrey P. Doukhvalov, Pavel V. Dyakin, Dmitry A. Kulagin
-
Patent number: 11259179Abstract: Disclosed are systems and methods for enabling transmission of data and commands between a mobile device and a vehicle. An exemplary method comprises connecting a security device to a vehicle and to a mobile device, the security device having a protected memory, verifying, by the security device, an authenticity of the mobile device, allowing, by the security device, transmission of data and commands between the mobile device and at least one actuating device of the vehicle when the mobile device is verified as being authentic, transmitting, by the security device, results of executions of commands from the at least one actuating device of the vehicle to the mobile device.Type: GrantFiled: November 25, 2019Date of Patent: February 22, 2022Assignee: AO Kaspersky LabInventors: Eugene V. Kaspersky, Andrey P. Doukhvalov, Pavel V. Dyakin, Dmitry A. Kulagin, Sergey V. Konoplev, Anton V. Tikhomirov
-
Patent number: 11222124Abstract: The present disclosure provides systems and methods to stepwise increasing the IT security of elements of a technological system. In an exemplary aspect, the method comprises gathering data on technological systems and a plurality of elements comprising the technological system by intercepting traffic between the plurality of elements using data exchange protocols, identifying vulnerable elements of the technological system by one or more of: detecting suspicious actions on the vulnerable elements and statistical data relating to the elements, analyzing the vulnerable elements to generate a classification of severity of vulnerabilities of the vulnerable elements, identifying most vulnerable portions of the vulnerable elements as compared to other elements in the vulnerable elements, operating the most vulnerable portions of the vulnerable elements in a protected environment.Type: GrantFiled: July 8, 2019Date of Patent: January 11, 2022Assignee: AO Kaspersky LabInventors: Andrey P. Doukhvalov, Pavel V. Dyakin, Dmitry A. Kulagin
-
Patent number: 11030319Abstract: Disclosed herein are methods and systems for automated testing of hardware and software systems. An exemplary method comprises receiving a formalized architecture description describing an architecture of a system being designed, receiving a formalized threat description describing threats to systems similar to the system being designed, building, by a processor, a use model based on the formalized description, building, by a processor, a threat model based on the formalized threat description, determining, by a processor, kinds of use of the system by comparing the threat model to the use model and determining, by a processor, components of the system based on the kinds of use.Type: GrantFiled: September 6, 2018Date of Patent: June 8, 2021Assignee: AO Kaspersky LabInventors: Andrey P. Doukhvalov, Ekaterina A. Rudina, Semen S. Kort, Viacheslav N. Zolotnikov
-
Patent number: 10867051Abstract: The present disclosure is directed to methods and systems for automated design of a system of hardware and software. In an exemplary embodiment, such a method comprises constructing, by a hardware processor, a model of use based on an architecture description of the system, constructing, by the hardware processor, threat model based on a threat description indicating known threats to the system, determining use of the system based on a comparison between the model of use and the threat model and selecting a configuration for realizing the system based on a result of the comparison.Type: GrantFiled: April 9, 2018Date of Patent: December 15, 2020Assignee: AO Kaspersky LabInventors: Andrey P. Doukhvalov, Ekaterina A. Rudina, Semen S. Kort, Viacheslav N. Zolotnikov
-
Publication number: 20200311282Abstract: The present disclosure provides systems and methods to stepwise increasing the IT security of elements of a technological system. In an exemplary aspect, the method comprises gathering data on technological systems and a plurality of elements comprising the technological system by intercepting traffic between the plurality of elements using data exchange protocols, identifying vulnerable elements of the technological system by one or more of: detecting suspicious actions on the vulnerable elements and statistical data relating to the elements, analyzing the vulnerable elements to generate a classification of severity of vulnerabilities of the vulnerable elements, identifying most vulnerable portions of the vulnerable elements as compared to other elements in the vulnerable elements, operating the most vulnerable portions of the vulnerable elements in a protected environment.Type: ApplicationFiled: July 8, 2019Publication date: October 1, 2020Inventors: Andrey P. Doukhvalov, Pavel V. Dyakin, Dmitry A. Kulagin
-
Publication number: 20200089219Abstract: Disclosed are systems and methods for enabling transmission of data and commands between a mobile device and a vehicle. An exemplary method comprises connecting a security device to a vehicle and to a mobile device, the security device having a protected memory, verifying, by the security device, an authenticity of the mobile device, allowing, by the security device, transmission of data and commands between the mobile device and at least one actuating device of the vehicle when the mobile device is verified as being authentic, transmitting, by the security device, results of executions of commands from the at least one actuating device of the vehicle to the mobile device.Type: ApplicationFiled: November 25, 2019Publication date: March 19, 2020Inventors: Eugene V. Kaspersky, Andrey P. Doukhvalov, Pavel V. Dyakin, Dmitry A. Kulagin, Sergey V. Konoplev, Anton V. Tikhomirov
-
Patent number: 10545496Abstract: Disclosed are systems and methods for securely controlling a vehicle using a mobile device. An exemplary method comprises authenticating, by a mobile device, a user attempting to perform commands controlling one or more vehicle systems of a coupled vehicle, retrieving profile information related to the user's preference associated with the coupled vehicle, establishing a connection between the mobile device and a security device of the coupled vehicle, authenticating the mobile device with the security device, forming, by the mobile device, commands to control the one or more vehicle systems based on command forming algorithms, the one or more vehicle systems comprising actuating devices of the vehicle and electronic systems of the vehicle, modifying the formed commands based on the profile information and safety information related to a location of the vehicle and transmitting the formed commands to the one or more vehicle systems via the security device to securely control the vehicle.Type: GrantFiled: September 7, 2018Date of Patent: January 28, 2020Assignee: AO Kaspersky LabInventors: Eugene V. Kaspersky, Andrey P. Doukhvalov, Pavel V. Dyakin, Dmitry A. Kulagin, Sergey V. Konoplev, Anton V. Tikhomirov
-
Patent number: 10469527Abstract: Disclosed are systems and methods for protection of a technological system (TS) from cyber attacks. An exemplary method comprises: obtaining a real state of the TS; initializing a cybernetic control system (CCS) by synchronizing the CCS with the TS; comparing, by the CCS, the real state of the TS with an ideal state of the TS; based on the comparison, identifying a deviation of the real state of the TS from the ideal state of the TS; when the deviation is identified, checking an integrity of at least functional interconnections of the states of one or more elements of the TS; determining whether the ideal state of the TS is a modeling error based on one or more confirmed sustained functional interconnections between elements of the TS; and identifying anomalies in the TS based on one or more disturbed functional interconnections between elements of the TS.Type: GrantFiled: September 2, 2016Date of Patent: November 5, 2019Assignee: AO Kaspersky LabInventors: Sergey V. Gordeychik, Andrey B. Lavrentyev, Andrey P. Doukhvalov
-
Publication number: 20190325144Abstract: Disclosed herein are methods and systems for automated testing of hardware and software systems. An exemplary method comprises receiving a formalized architecture description describing an architecture of a system being designed, receiving a formalized threat description describing threats to systems similar to the system being designed, building, by a processor, a use model based on the formalized description, building, by a processor, a threat model based on the formalized threat description, determining, by a processor, kinds of use of the system by comparing the threat model to the use model and determining, by a processor, components of the system based on the kinds of use.Type: ApplicationFiled: September 6, 2018Publication date: October 24, 2019Inventors: Andrey P. DOUKHVALOV, Ekaterina A. RUDINA, Semen S. KORT, Viacheslav N. ZOLOTNIKOV
-
Patent number: 10361998Abstract: A computer security architecture applies selected rules from among a set of rules defining one or more security policies to a given set of security context parameters to produce security verdicts, each representing whether a certain action requested by a subject entity is permissible. Each security policy is associated with a corresponding communication interface. A plurality of gateway engines are each associated with at least one of the subject entities and dedicated to interfacing with the security server. Each of the gateway engines carries out monitoring of requested actions by the associated subject entity and, for each requested action, identifies a security context. A security policy is determined for the requested action based on a corresponding security context, and a security verdict is obtained via a communication interface corresponding to the applicable security policy.Type: GrantFiled: August 30, 2017Date of Patent: July 23, 2019Assignee: AO KASPERSKY LABInventors: Andrey P. Doukhvalov, Pavel V. Dyakin, Dmitry A. Kulagin, Sergey B. Lungu, Stanislav V. Moiseev
-
Publication number: 20190102561Abstract: The present disclosure is directed to methods and systems for automated design of a system of hardware and software. In an exemplary embodiment, such a method comprises constructing, by a hardware processor, a model of use based on an architecture description of the system, constructing, by the hardware processor, threat model based on a threat description indicating known threats to the system, determining use of the system based on a comparison between the model of use and the threat model and selecting a configuration for realizing the system based on a result of the comparision.Type: ApplicationFiled: April 9, 2018Publication date: April 4, 2019Inventors: Andrey P. DOUKHVALOV, Ekaterina A. RUDINA, Semen S. KORT, Viacheslav N. ZOLOTNIKOV
-
Publication number: 20190018405Abstract: Disclosed are systems and methods for securely controlling a vehicle using a mobile device. An exemplary method comprises authenticating, by a mobile device, a user attempting to perform commands controlling one or more vehicle systems of a coupled vehicle, retrieving profile information related to the user's preference associated with the coupled vehicle, establishing a connection between the mobile device and a security device of the coupled vehicle, authenticating the mobile device with the security device, forming, by the mobile device, commands to control the one or more vehicle systems based on command forming algorithms, the one or more vehicle systems comprising actuating devices of the vehicle and electronic systems of the vehicle, modifying the formed commands based on the profile information and safety information related to a location of the vehicle and transmitting the formed commands to the one or more vehicle systems via the security device to securely control the vehicle.Type: ApplicationFiled: September 7, 2018Publication date: January 17, 2019Inventors: Eugene V. Kaspersky, Andrey P. Doukhvalov, Pavel V. Dyakin, Dmitry A. Kulagin, Sergey V. Konoplev, Anton V. Tikhomirov
-
Patent number: 10101738Abstract: Disclosed are systems and methods for secure control of automotive systems using mobile devices. An exemplary method comprises: connecting a vehicle, as a peripheral device, to a mobile device, which acts as a master device, via a security device of the vehicle, wherein the security device provides secure transmission of data and commands between the vehicle and the mobile device; receiving, by the mobile device, via the security device, from one or more measurement devices of the vehicle, measurement data from one or more automotive systems of the vehicle; based on the received measurement data, forming by the mobile device control commands for actuating devices of the vehicle, wherein the control commands enable and/or regulate operation of the actuating devices of the vehicle; and transmitting, by the mobile device, via the security device, the control commands to the actuating devices of the vehicle.Type: GrantFiled: August 7, 2017Date of Patent: October 16, 2018Assignee: AO KASPERSKY LABInventors: Eugene V. Kaspersky, Andrey P. Doukhvalov, Pavel V. Dyakin, Dmitry A. Kulagin, Sergey V. Konoplev, Anton V. Tikhomirov
-
Publication number: 20180164800Abstract: Disclosed are systems and methods for secure control of automotive systems using mobile devices. An exemplary method comprises: connecting a vehicle, as a peripheral device, to a mobile device, which acts as a master device, via a security device of the vehicle, wherein the security device provides secure transmission of data and commands between the vehicle and the mobile device; receiving, by the mobile device, via the security device, from one or more measurement devices of the vehicle, measurement data from one or more automotive systems of the vehicle; based on the received measurement data, forming by the mobile device control commands for actuating devices of the vehicle, wherein the control commands enable and/or regulate operation of the actuating devices of the vehicle; and transmitting, by the mobile device, via the security device, the control commands to the actuating devices of the vehicle.Type: ApplicationFiled: August 7, 2017Publication date: June 14, 2018Inventors: Eugene V. Kaspersky, Andrey P. Doukhvalov, Pavel V. Dyakin, Dmitry A. Kulagin, Sergey V. Konoplev, Anton V. Tikhomirov
-
Publication number: 20180006999Abstract: A computer security architecture applies selected rules from among a set of rules defining one or more security policies to a given set of security context parameters to produce security verdicts, each representing whether a certain action requested by a subject entity is permissible. Each security policy is associated with a corresponding communication interface. A plurality of gateway engines are each associated with at least one of the subject entities and dedicated to interfacing with the security server. Each of the gateway engines carries out monitoring of requested actions by the associated subject entity and, for each requested action, identifies a security context. A security policy is determined for the requested action based on a corresponding security context, and a security verdict is obtained via a communication interface corresponding to the applicable security policy.Type: ApplicationFiled: August 30, 2017Publication date: January 4, 2018Inventors: Andrey P. Doukhvalov, Pavel V. Dyakin, Dmitry A. Kulagin, Sergey B. Lungu, Stanislav V. Moiseev
-
Patent number: 9774568Abstract: A computer security architecture applies selected rules from among a set of rules defining one or more security policies to a given set of security context parameters to produce security verdicts, each representing whether a certain action requested by a subject entity is permissible. Each security policy is associated with a corresponding communication interface. A plurality of gateway engines are each associated with at least one of the subject entities and dedicated to interfacing with the security server. Each of the gateway engines carries out monitoring of requested actions by the associated subject entity and, for each requested action, identifies a security context. A security policy is determined for the requested action based on a corresponding security context, and a security verdict is obtained via a communication interface corresponding to the applicable security policy.Type: GrantFiled: January 27, 2016Date of Patent: September 26, 2017Assignee: AO KASPERSKY LABInventors: Andrey P. Doukhvalov, Pavel V. Dyakin, Dmitry A. Kulagin, Sergey B. Lungu, Stanislav V. Moiseev
-
Publication number: 20170244752Abstract: Disclosed are systems and methods for protection of a technological system (TS) from cyber attacks. An exemplary method comprises: obtaining a real state of the TS; initializing a cybernetic control system (CCS) by synchronizing the CCS with the TS; comparing, by the CCS, the real state of the TS with an ideal state of the TS; based on the comparison, identifying a deviation of the real state of the TS from the ideal state of the TS; when the deviation is identified, checking an integrity of at least functional interconnections of the states of one or more elements of the TS; determining whether the ideal state of the TS is a modeling error based on one or more confirmed sustained functional interconnections between elements of the TS; and identifying anomalies in the TS based on one or more disturbed functional interconnections between elements of the TS.Type: ApplicationFiled: September 2, 2016Publication date: August 24, 2017Inventors: SERGEY V. GORDEYCHIK, ANDREY B. LAVRENTYEV, ANDREY P. DOUKHVALOV
-
Patent number: 9582335Abstract: In a computer system, processing of security-related tasks is delegated to various agent computers. According to various embodiments, a distributed computing service obtains task requests to be performed for the benefit of beneficiary computers, and delegates those tasks to one or more remote agent computers for processing. The delegation is based on a suitability determination as to whether each of the remote agent computers is suitable to perform the processing. Suitability can be based on an evaluation of such parameters as computing capacity and current availability of the remote agent computers against the various tasks to be performed and their corresponding computing resource requirements. This evaluation can be performed according to various embodiments by the agent computers, the distributed computing service, or by a combination thereof.Type: GrantFiled: March 22, 2012Date of Patent: February 28, 2017Assignee: AO KASPERSKY LABInventors: Andrey P. Doukhvalov, Yury V. Mashevsky, Anton V. Tikhomirov