Patents by Inventor Arthur Zavalkovsky

Arthur Zavalkovsky has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11636213
    Abstract: Systems, apparatuses, and methods for more effectively preparing for and responding to cybersecurity threats directed at people or at groups of people. A segmentation process is described that evaluates multiple characteristics of a person that may make them a potential target or that may make a cybersecurity attack on that person more likely to be successful. Based on the segmentation, a security analyst can apply an appropriate risk reduction or security protocol to each person or group of similarly situated people to reduce the likelihood of an attack and/or the likelihood of a successful attack.
    Type: Grant
    Filed: July 22, 2020
    Date of Patent: April 25, 2023
    Assignee: Proofpoint, Inc.
    Inventors: Doron Asher Elgressy, David Robert Knight, Arthur Zavalkovsky
  • Patent number: 9560068
    Abstract: A network security system employing multiple levels of processing to identify security threats. Multiple host machines may each contain an agent that detects possibilities of security threats based on raw data sensed locally at that host. The hosts may share information obtained from local analysis and each host may use information generated at one or more other hosts, in combination with information generated locally, to identify a security concern, indicating with greater certainty that a security threat exists. Based on security concerns generated by multiple hosts, a security threat may be to indicated and protective action may be taken.
    Type: Grant
    Filed: July 12, 2013
    Date of Patent: January 31, 2017
    Assignee: MICROSOFT TECHNOLOGY LICENSING LLC.
    Inventors: Igal Figlin, Arthur Zavalkovsky, Lior Arzi, Efim Hudis, Jennifer R. Lemond, Robert Eric Fitzgerald, Khaja E. Ahmed, Jeffrey S. Williams, Edward W. Hardy
  • Patent number: 9344432
    Abstract: Embodiments of the invention provide techniques for basing access control decisions at the network layer at least in part on information provided in claims, which may describe attributes of a computer requesting access, one or more resources to which access is requested, the user, the circumstances surrounding the requested access, and/or other information. The information may be evaluated based on one or more access control policies, which may be pre-set or dynamically generated, and used in making a decision whether to grant or deny the computer access to the specified resource(s).
    Type: Grant
    Filed: June 24, 2010
    Date of Patent: May 17, 2016
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Yair Tor, Daniel Rose, Eugene (John) Neystadt, Patrik Schnell, Moshe Sapir, Oleg Ananiev, Arthur Zavalkovsky, Anat Eyal
  • Patent number: 8918856
    Abstract: Embodiments of the invention provide a trusted intermediary for use in a system in which access control decisions may be based at least in part on information provided in claims. The intermediary may request claims on behalf of a network resource to which access is requested, and submit the claims for a decision whether to grant or deny access. The decision may be based at least in part on one or more access control policies, which may be pre-set or dynamically generated. Because the intermediary requests the claims and submits the claims for an access control decision, the network resource (e.g., a server application) need not be configured to process claims information.
    Type: Grant
    Filed: June 24, 2010
    Date of Patent: December 23, 2014
    Assignee: Microsoft Corporation
    Inventors: Yair Tor, Eugene (John) Neystadt, Patrik Schnell, Oleg Ananiev, Arthur Zavalkovsky, Daniel Rose
  • Publication number: 20130305371
    Abstract: A network security system employing multiple levels of processing to identify security threats. Multiple host machines may each contain an agent that detects possibilities of security threats based on raw data sensed locally at that host. The hosts may share information obtained from local analysis and each host may use information generated at one or more other hosts, in combination with information generated locally, to identify a security concern, indicating with greater certainty that a security threat exists. Based on security concerns generated by multiple hosts, a security threat may be to indicated and protective action may be taken.
    Type: Application
    Filed: July 12, 2013
    Publication date: November 14, 2013
    Applicant: MICROSOFT CORPORATION
    Inventors: Igal Figlin, Arthur Zavalkovsky, Lior Arzi, Efim Hudis, Jennifer R. Lemond, Robert Eric Fitzgerald, Khaja E. Ahmed, Jeffrey S. Williams, Edward W. Hardy
  • Patent number: 8578018
    Abstract: An improved user experience at a local client computer that is coupled to one or more remote servers over a WAN is provided by an arrangement in which data and files that are likely to be needed by a user during a work session are identified through the application of one or more heuristics and then pre-fetched to be made available in advance of the session's start. The pre-fetching of the data and files may be performed as the client computer goes through its startup or boot process. When the startup is completed and the desktop applications become ready for use, the data and files that the user needs to immediately begin work are already available at the local client computer.
    Type: Grant
    Filed: June 29, 2008
    Date of Patent: November 5, 2013
    Assignee: Microsoft Corporation
    Inventors: Arthur Zavalkovsky, Itai Almog
  • Patent number: 8516576
    Abstract: A network security system employing multiple levels of processing to identify security threats. Multiple host machines may each contain an agent that detects possibilities of security threats based on raw data sensed locally at that host. The hosts may share information obtained from local analysis and each host may use information generated at one or more other hosts, in combination with information generated locally, to identify a security concern, indicating with greater certainty that a security threat exists. Based on security concerns generated by multiple hosts, a security threat may be indicated and protective action may be taken.
    Type: Grant
    Filed: January 13, 2010
    Date of Patent: August 20, 2013
    Assignee: Microsoft Corporation
    Inventors: Igal Figlin, Arthur Zavalkovsky, Lior Arzi, Efim Hudis, Jennifer R. LeMond, Robert Eric Fitzgerald, Khaja E. Ahmed, Jeffrey S. Williams, Edward W. Hardy
  • Patent number: 8151338
    Abstract: A method and system for continuously serving the authentication requests of networked computers is disclosed. The authentication requests of computers are served and the services for the computers are reserved for a predefined time interval. The authentication service for a computer is reserved by an authentication server, which receives authentication requests of the computer.
    Type: Grant
    Filed: September 29, 2005
    Date of Patent: April 3, 2012
    Assignee: Cisco Technology, Inc.
    Inventors: Ilan Frenkel, Arthur Zavalkovsky, Alexey Kobozev, Ilan Bronshtein
  • Publication number: 20110321152
    Abstract: Embodiments of the invention provide a trusted intermediary for use in a system in which access control decisions may be based at least in part on information provided in claims. The intermediary may request claims on behalf of a network resource to which access is requested, and submit the claims for a decision whether to grant or deny access. The decision may be based at least in part on one or more access control policies, which may be pre-set or dynamically generated. Because the intermediary requests the claims and submits the claims for an access control decision, the network resource (e.g., a server application) need not be configured to process claims information.
    Type: Application
    Filed: June 24, 2010
    Publication date: December 29, 2011
    Applicant: Microsoft Corporation
    Inventors: Yair Tor, Eugene (John) Neystadt, Patrik Schnell, Oleg Ananiev, Arthur Zavalkovsky, Daniel Rose
  • Publication number: 20110321130
    Abstract: Embodiments of the invention provide techniques for basing access control decisions at the network layer at least in part on information provided in claims, which may describe attributes of a computer requesting access, one or more resources to which access is requested, the user, the circumstances surrounding the requested access, and/or other information. The information may be evaluated based on one or more access control policies, which may be pre-set or dynamically generated, and used in making a decision whether to grant or deny the computer access to the specified resource(s).
    Type: Application
    Filed: June 24, 2010
    Publication date: December 29, 2011
    Applicant: Microsoft Corporation
    Inventors: Yair Tor, Daniel Rose, Eugene (John) Neystadt, Patrik Schnell, Moshe Sapir, Oleg Ananiev, Arthur Zavalkovsky, Anat Eyal
  • Patent number: 7992193
    Abstract: A method and an apparatus are disclosed for securing authentication, authorization and accounting (AAA) protocol messages. An encryption key, a device identifier value, and verification data are received and stored at a network device. The verification data comprises in part a copy the encryption key and the device identifier value, and has been encrypted using a private key of a server. A shared secret is generated by applying a computational function to the encryption key and the device identifier value. Based on the shared secret, a first message integrity check value for a message is generated. The message, the first integrity check value, and the verification data are sent to the server. The server decrypts the verification data using the private key, extracts the encryption key and the device identifier value, and generates the same shared secret by applying the same computational function to the extracted encryption key and device identifier value.
    Type: Grant
    Filed: March 17, 2005
    Date of Patent: August 2, 2011
    Assignee: Cisco Technology, Inc.
    Inventors: Fabio Maino, Michael Fine, Irene Kuffel, Arthur Zavalkovsky
  • Publication number: 20110173699
    Abstract: A network security system employing multiple levels of processing to identify security threats. Multiple host machines may each contain an agent that detects possibilities of security threats based on raw data sensed locally at that host. The hosts may share information obtained from local analysis and each host may use information generated at one or more other hosts, in combination with information generated locally, to identify a security concern, indicating with greater certainty that a security threat exists. Based on security concerns generated by multiple hosts, a security threat may be indicated and protective action may be taken.
    Type: Application
    Filed: January 13, 2010
    Publication date: July 14, 2011
    Inventors: Igal Figlin, Arthur Zavalkovsky, Lior Arzi, Efim Hudis, Jennifer R. LeMond, Robert Eric Fitzgerald, Khaja E. Ahmed, Jeffrey S. Williams, Edward W. Hardy
  • Patent number: 7962954
    Abstract: A method is disclosed for authenticating multiple network elements that access a network through a single network switch port. Certain authentication protocols, such as EAPoE, leave a port of a network switch indefinitely opened when one particular host is authenticated and authorized to transmit network frames through the port. In one embodiment of the invention, a network frame from a second host that is received by the open port is not automatically transmitted to the network. Instead, techniques are employed locally by the network switch to grant or deny transmission of the network frame received from the second host. An authentication server is contacted only when the network switch cannot locally employ techniques to authorize the transmission of the network frame received from the second host.
    Type: Grant
    Filed: December 20, 2007
    Date of Patent: June 14, 2011
    Assignee: Cisco Technology, Inc.
    Inventors: Arthur Zavalkovsky, John Zamick, Yoram Ramberg
  • Patent number: 7930734
    Abstract: A method and system is disclosed for creating and tracking network sessions. A request to access a network is received from an entity. The entity is authenticated after the request is received. Authenticated identity information associated with the entity, network address information associated with the entity, and network location information associated with the entity is collected. An information set is created. The information set comprises and binds together the authenticated identity information, the network address information, and the network location information. The information set indicates a present association among the authenticated identity information, the network address information, and the network location information. The information set is stored in a session record in a centralized database. The session record represents a session in which the entity accesses the network. The session record is one of a plurality of session records that are stored in the centralized database.
    Type: Grant
    Filed: April 28, 2006
    Date of Patent: April 19, 2011
    Assignee: Cisco Technology, Inc.
    Inventors: Ian Foo, Jeremy Stieglitz, Arthur Zavalkovsky, Jeevan S. Patil, Partha Bhattacharya, Jason Frazier, Ellis Roland Dobbins
  • Patent number: 7929973
    Abstract: A method and apparatus for managing and balancing wireless access based on centralized information is provided. A request to provide service to a wireless client is received from a first access node in a plurality of access node. An access policy, applicable to the first access node, is selected from a plurality of stored policies. The stored policies may include a variety of rules, such as how many or which wireless clients may be serviced by an access node. A centralized manager, such as an AAA server, may perform the selection of the access policy. A determination is made as to whether to allow the first access node to provide service to the wireless client based on the selected access policy. A message that instructs the first access node whether to provide or deny service to the wireless client is transmitted to the first access node.
    Type: Grant
    Filed: December 31, 2007
    Date of Patent: April 19, 2011
    Assignee: Cisco Technology, Inc.
    Inventors: Arthur Zavalkovsky, Jeremy Stieglitz, Ami Schieber
  • Patent number: 7716721
    Abstract: Automatically re-authenticating a computing device seeking access to a network or a resource. A method comprises forwarding a request received from the computing device to an authentication device to enable the authentication device to authenticate the computing device using a full-authentication mechanism. State information related to authenticating the computing device is created from authenticating the computing device. The state information is received and stored. For example, an authenticator device that forwarded the initial authentication request from the computing device to the authentication device receives and stores the state information. The computing device is re-authenticated using the stored state information without again contacting the authentication device.
    Type: Grant
    Filed: October 18, 2005
    Date of Patent: May 11, 2010
    Assignee: Cisco Technology, Inc.
    Inventors: Arthur Zavalkovsky, Alexey Kobozev, Joseph Salowey, Ilan Frenkel
  • Patent number: 7702899
    Abstract: Verifying revocation status of a digital certificate is provided in part by a receiver verifying a security certificate for a sender. In an embodiment, an approach comprises receiving a first security certificate associated with the sender and storing the security certificate in a location accessible to the receiver; updating the first security certificate in the location accessible to the receiver if the first security certificate is changed or revoked; receiving a second security certificate from the sender when identity of the sender needs to be verified; comparing the second security certificate to the first security certificate; and confirming the sender's identity only if the second security certificate matches the first security certificate for the sender.
    Type: Grant
    Filed: January 21, 2009
    Date of Patent: April 20, 2010
    Assignee: Cisco Technology, Inc.
    Inventors: Alexey Kobozev, Arthur Zavalkovsky, Ilan Frenkel
  • Publication number: 20090327479
    Abstract: An improved user experience at a local client computer that is coupled to one or more remote servers over a WAN is provided by an arrangement in which data and files that are likely to be needed by a user during a work session are identified through the application of one or more heuristics and then pre-fetched to be made available in advance of the session's start. The pre-fetching of the data and files may be performed as the client computer goes through its startup or boot process. When the startup is completed and the desktop applications become ready for use, the data and files that the user needs to immediately begin work are already available at the local client computer.
    Type: Application
    Filed: June 29, 2008
    Publication date: December 31, 2009
    Applicant: MICROSOFT CORPORATION
    Inventors: Arthur Zavalkovsky, Itai Almog
  • Publication number: 20090132812
    Abstract: Verifying revocation status of a digital certificate is provided in part by a receiver verifying a security certificate for a sender. In an embodiment, an approach comprises receiving a first security certificate associated with the sender and storing the security certificate in a location accessible to the receiver; updating the first security certificate in the location accessible to the receiver if the first security certificate is changed or revoked; receiving a second security certificate from the sender when identity of the sender needs to be verified; comparing the second security certificate to the first security certificate; and confirming the sender's identity only if the second security certificate matches the first security certificate for the sender.
    Type: Application
    Filed: January 21, 2009
    Publication date: May 21, 2009
    Inventors: Alexey Kobozev, Arthur Zavalkovsky, Ilan Frenkel
  • Patent number: 7500100
    Abstract: A method and apparatus for verifying revocation status of a digital certificate is provided. The invention operates in part by a receiver verifying a security certificate for a sender. In various embodiments the steps to accomplish this include receiving a first security certificate associated with the sender and storing the security certificate in a location accessible to the receiver; updating the first security certificate in the location accessible to the receiver if the first security certificate is changed or revoked; receiving a second security certificate from the sender when identity of the sender needs to be verified; comparing the second security certificate to the first security certificate; and confirming the sender's identity only if the second security certificate matches the first security certificate for the sender.
    Type: Grant
    Filed: September 10, 2003
    Date of Patent: March 3, 2009
    Assignee: Cisco Technology, Inc.
    Inventors: Alexey Kobozev, Arthur Zavalkovsky, Ilan Frenkel