Patents by Inventor Denis Knjazihhin

Denis Knjazihhin has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10666683
    Abstract: In one embodiment, a system includes a processor, and a memory to store data used by the processor, the processor being operative to prepare a first user interface including a security policy selection section, interpret user input data to include performing at least one security policy selection action in the security policy selection section yielding selection of a first security policy for a first device, and update the first user interface yielding an updated first user interface including the first security policy, and a first security policy activation key for inputting into a second user interface to be generated when the first device is installed, the first security policy activation key being associated with providing authentication for downloading the first security policy to the first device.
    Type: Grant
    Filed: July 30, 2017
    Date of Patent: May 26, 2020
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: David Sward, Denis Knjazihhin, Keying Bi, David Sounthiraraj, Ashok Javvaji, Jared Smith, Yedidya Dotan
  • Patent number: 10182055
    Abstract: A management entity communicates over a network with devices on which security rules are configured to control network access. Data that indicates a hit count for each security rule across the devices is repeatedly collected from the devices. The indicated hit counts for each security rule are aggregated over different repeating time intervals to produce repeatedly aggregated hit counts for respective ones of the different repeating time intervals. The security rules are generated for display on a user interface screen as selectable options. Responsive to a selection of one of the security rules, a selected security rule and most recently aggregated hit counts for the different repeating time intervals for the selected security rule are generated for concurrent display on the user interface screen. The display of the most recently aggregated hit counts for the selected security rule is updated as time progresses.
    Type: Grant
    Filed: February 7, 2017
    Date of Patent: January 15, 2019
    Assignee: Cisco Technology, Inc.
    Inventors: Joe Lawrence, Jason M. Perry, Yedidya Dotan, Denis Knjazihhin, Umesh Kumar Miglani
  • Patent number: 10116702
    Abstract: A management entity generates for display multiple icons, each icon representing an actor or a resource in a networking environment, and defines a generic security policy by receiving user input in the form of a line drawn between a first icon representing an actor and a second icon representing a resource to control abilities between the actor and the resource. The management entity translates the generic security policy to multiple native security policies each of which is based on a corresponding one of multiple native policy models associated with corresponding ones of multiple security devices, and supply data descriptive of the multiple native security policies to the corresponding ones of the security devices to configure the corresponding ones of the security devices to implement the native security policies.
    Type: Grant
    Filed: April 27, 2017
    Date of Patent: October 30, 2018
    Assignee: Cisco Technology, Inc.
    Inventors: Denis Knjazihhin, Yedidya Dotan, Burak Say, Robin Martherus, Sachin Vasant
  • Patent number: 10075439
    Abstract: A method is provided in which a development environment sends commands to an on-premises device that are signed by both (a) development environment and by (b) an execution environment (trusted source), and account for versioning. In so doing, the on-premises device that receives the command is able to authenticate both the sending entity, i.e., a production server, and the source of the command files to determine that the command is a valid configuration/upgrade package that may be safely installed and executed.
    Type: Grant
    Filed: May 19, 2016
    Date of Patent: September 11, 2018
    Assignee: Cisco Technology, Inc.
    Inventors: Ryan J. Mullens, Sachin Vasant, Raphael Luckom, Denis Knjazihhin, Yedidya Dotan
  • Patent number: 10038697
    Abstract: First and second security rules are accessed in a configuration file. Comparison points for comparing the first and second security rules are determined. Each comparison point identifies respective rule parameters of the first and second security rules. Respective weights are assigned to the comparison points. For each comparison point, the respective rule parameters are compared against each other to produce a corresponding comparison score indicative of a level similarity. Each comparison score is weighted by the weight assigned to the comparison point corresponding to the comparison score. The weighted comparison scores are combined into a total score indicative of an overall level of similarity between the first and second security rules.
    Type: Grant
    Filed: July 23, 2015
    Date of Patent: July 31, 2018
    Assignee: Cisco Technology, Inc.
    Inventors: Yedidya Dotan, Christopher Duane, Daniel Hollingshead, Denis Knjazihhin
  • Publication number: 20180159899
    Abstract: In one embodiment, a system includes a processor, and a memory to store data used by the processor, the processor being operative to prepare a first user interface including a security policy selection section, interpret user input data to include performing at least one security policy selection action in the security policy selection section yielding selection of a first security policy for a first device, and update the first user interface yielding an updated first user interface including the first security policy, and a first security policy activation key for inputting into a second user interface to be generated when the first device is installed, the first security policy activation key being associated with providing authentication for downloading the first security policy to the first device.
    Type: Application
    Filed: July 30, 2017
    Publication date: June 7, 2018
    Inventors: David SWARD, Denis KNJAZIHHIN, Keying BI, David SOUNTHIRARAJ, Ashok JAVVAJI, Jared SMITH, Yedidya DOTAN
  • Patent number: 9992232
    Abstract: Presented herein are techniques for creating a policy block comprised of a group of lines of rules/statements across configuration files for network devices. An algorithm is provided that determines when multiple policies are to be merged together into one policy. In one embodiment, data is uploaded from a network that includes a plurality of network devices. The data represents policy rules configured on the plurality of network devices. The data representing the policy rules is compared for similarities in order to group together policy rules based on their similarities. Data is stored representing a plurality of clusters, each cluster representing a group of policy rules that have been grouped together. One or more configuration policies are generated to be applied across the plurality of network devices using the data representing each of the plurality of clusters, while maintaining context of policy rule processing.
    Type: Grant
    Filed: April 18, 2016
    Date of Patent: June 5, 2018
    Assignee: Cisco Technology, Inc.
    Inventors: Daniel Hollingshead, Sachin Vasant, Yedidya Dotan, Umesh Kumar Miglani, Denis Knjazihhin
  • Patent number: 9948679
    Abstract: In a computer implemented method, selectable device icons that represent respective network security devices are generated for display. Responsive to a selection of one of the device icons, selectable interface icons that represent respective network interfaces used by the network security device represented by the selected device icon are generated for display. Responsive to a selection of one of the interface icons, selectable policy icons that represent respective security polices applied to the network interface represented by the selected interface icon are generated for display. Responsive to a selection of one of the policy icons, selectable object group icons that represent respective groups of security rule objects used in the network security policy represented by the selected policy icon are generated for display.
    Type: Grant
    Filed: December 21, 2015
    Date of Patent: April 17, 2018
    Assignee: Cisco Technology, Inc.
    Inventors: Zachary D Siswick, Umesh Kumar Miglani, Daniel Hollingshead, Karyll Catubig, Yedidya Dotan, Denis Knjazihhin
  • Patent number: 9866375
    Abstract: A key manager provides a way to separate out the management of encryption keys and policies from application domains. The key manager may create cipher objects that may be used by the domains to perform encryption or decryption, without exposing the keys or encryption/decryption algorithms to the domains. A master key managed by the key manager may be used to encrypt and decrypt the domain keys that are stored under the control of the key manager. The key manager supports the rekeying of both the master key and the domain keys based on policy. Multiple versions of domain keys may be supported, allowing domains to access data encrypted with a previous version of a domain key after a rekeying.
    Type: Grant
    Filed: March 2, 2015
    Date of Patent: January 9, 2018
    Assignee: BladeLogic, Inc.
    Inventors: Paul A. Reilly, Chet Birger, Denis Knjazihhin
  • Publication number: 20170353459
    Abstract: A management entity communicates over a network with devices on which security rules are configured to control network access. Data that indicates a hit count for each security rule across the devices is repeatedly collected from the devices. The indicated hit counts for each security rule are aggregated over different repeating time intervals to produce repeatedly aggregated hit counts for respective ones of the different repeating time intervals. The security rules are generated for display on a user interface screen as selectable options. Responsive to a selection of one of the security rules, a selected security rule and most recently aggregated hit counts for the different repeating time intervals for the selected security rule are generated for concurrent display on the user interface screen. The display of the most recently aggregated hit counts for the selected security rule is updated as time progresses.
    Type: Application
    Filed: February 7, 2017
    Publication date: December 7, 2017
    Inventors: Joe Lawrence, Jason M. Perry, Yedidya Dotan, Denis Knjazihhin, Umesh Kumar Miglani
  • Publication number: 20170317999
    Abstract: Presented herein are techniques for remotely releasing bootstrap credentials to a cloud management proxy device. In particular, a cloud management proxy device that is associated with a cloud system commences a boot operation. The cloud management proxy device then initiates a remote credential release process to obtain the bootstrap credentials, which are useable by the cloud management proxy device to complete the boot operation. Upon completion of the remote credential release process, the bootstrap credentials are received from a remote credential manager system.
    Type: Application
    Filed: April 27, 2016
    Publication date: November 2, 2017
    Inventors: Denis Knjazihhin, Yedidya Dotan, Christopher Duane, Jason M. Perry
  • Patent number: 9787722
    Abstract: An integrated development environment (IDE) preprocesses a configuration file including security rules. The preprocessing maps object names in the security rules to associated object values based on object definitions for the object names. Responsive to the configuration file being opened in an editor, the IDE provides the editor with access to preprocessing results. Each security rule in the opened configuration file is searched for object names. The IDE links each object name found in the search to an associated object value mapped thereto by the mapping performed during the preprocessing. The IDE receives a selection of an object name in a security rule of the opened configuration file and generates for display the associated object value linked to the selected object name.
    Type: Grant
    Filed: June 30, 2015
    Date of Patent: October 10, 2017
    Assignee: Cisco Technology, Inc.
    Inventors: Denis Knjazihhin, Yedidya Dotan, Zachary D. Siswick, Christopher Duane, Daniel Hollingshead
  • Patent number: 9781102
    Abstract: An improved technique involves setting an administrator password in a server to a temporary password upon receipt of a request for administrator access to the server. Along these lines, when a support engineer receives a support ticket from a customer, the support engineer sends a request to obtain administrator access to the customer's server to an access control computer. The access control computer, upon receipt of the request, generates a temporary password that grants the support engineer a one-time administrator access to the server. The access control computer then changes the administrator password on the server to the temporary password and reveals the temporary password to the support engineer. At some time either after the engineer obtains administrator access to the server or after some specified time has passed, the access control computer invalidates the temporary password by changing the administrator password to a different password.
    Type: Grant
    Filed: March 7, 2014
    Date of Patent: October 3, 2017
    Assignee: EMC IP Holding Company LLC
    Inventors: Denis Knjazihhin, Joseph Xavier Lawrence, Jr., David Shapiro, Dan Uwe Zehme
  • Publication number: 20170230425
    Abstract: A management entity generates for display multiple icons, each icon representing an actor or a resource in a networking environment, and defines a generic security policy by receiving user input in the form of a line drawn between a first icon representing an actor and a second icon representing a resource to control abilities between the actor and the resource. The management entity translates the generic security policy to multiple native security policies each of which is based on a corresponding one of multiple native policy models associated with corresponding ones of multiple security devices, and supply data descriptive of the multiple native security policies to the corresponding ones of the security devices to configure the corresponding ones of the security devices to implement the native security policies.
    Type: Application
    Filed: April 27, 2017
    Publication date: August 10, 2017
    Inventors: Denis Knjazihhin, Yedidya Dotan, Burak Say, Robin Martherus, Sachin Vasant
  • Publication number: 20170208094
    Abstract: Presented herein are techniques for creating a policy block comprised of a group of lines of rules/statements across configuration files for network devices. An algorithm is provided that determines when multiple policies are to be merged together into one policy. In one embodiment, data is uploaded from a network that includes a plurality of network devices. The data represents policy rules configured on the plurality of network devices. The data representing the policy rules is compared for similarities in order to group together policy rules based on their similarities. Data is stored representing a plurality of clusters, each cluster representing a group of policy rules that have been grouped together. One or more configuration policies are generated to be applied across the plurality of network devices using the data representing each of the plurality of clusters, while maintaining context of policy rule processing.
    Type: Application
    Filed: April 18, 2016
    Publication date: July 20, 2017
    Inventors: Daniel Hollingshead, Sachin Vasant, Yedidya Dotan, Umesh Kumar Miglani, Denis Knjazihhin
  • Patent number: 9680875
    Abstract: A management entity receives from multiple security devices corresponding native security policies each based on a native policy model associated with the corresponding security device. Each security device controls access to resources by devices associated with the security device according to the corresponding native security policy. The management entity normalizes the received native security policies across the security devices based on a generic policy model, to produce a normalized security policy that is based on the generic policy model and representative of the native security polices.
    Type: Grant
    Filed: January 20, 2015
    Date of Patent: June 13, 2017
    Assignee: Cisco Technology, Inc.
    Inventors: Denis Knjazihhin, Yedidya Dotan, Burak Say, Robin Martherus, Sachin Vasant
  • Patent number: 9641540
    Abstract: A method is performed at a management device to manage multiple network security devices over a network. The security devices are configured to control access to network accessible resources. A query is received. In response to the received query, a respective native security rule that references the specific resource is collected from each security device, where each native security rule is based on a respective native rule model associated with the security device from which the native security rule is collected. Each native security rule is translated into a respective normalized rule that is based on a generic rule model. The respective normalized rules are compared to each other to generate compare results. Based on the compare results, an indication of whether each security device allows or blocks access to the specific resource is generated.
    Type: Grant
    Filed: May 29, 2015
    Date of Patent: May 2, 2017
    Assignee: Cisco Technology, Inc.
    Inventors: Yedidya Dotan, Jason M. Perry, Denis Knjazihhin, Zachary D. Siswick, Sachin Vasant
  • Publication number: 20170054757
    Abstract: In a computer implemented method, selectable device icons that represent respective network security devices are generated for display. Responsive to a selection of one of the device icons, selectable interface icons that represent respective network interfaces used by the network security device represented by the selected device icon are generated for display. Responsive to a selection of one of the interface icons, selectable policy icons that represent respective security polices applied to the network interface represented by the selected interface icon are generated for display. Responsive to a selection of one of the policy icons, selectable object group icons that represent respective groups of security rule objects used in the network security policy represented by the selected policy icon are generated for display.
    Type: Application
    Filed: December 21, 2015
    Publication date: February 23, 2017
    Inventors: Zachary D. Siswick, Umesh Kumar Miglani, Daniel Hollingshead, Karyll Catubig, Yedidya Dotan, Denis Knjazihhin
  • Patent number: 9571524
    Abstract: A management entity generates selectable security policy classifications each identifying security policies that share common security rules. Each of the security policies is applied by a corresponding one of different security devices to control access to a resource. The management entity creates a new policy template that includes all of the security policies identified by selected ones of the policy classification selections and then creates a new security policy based on the new policy template. The management entity applies the new security policy to a security device over a network.
    Type: Grant
    Filed: January 20, 2015
    Date of Patent: February 14, 2017
    Assignee: Cisco Technology, Inc.
    Inventors: Yedidya Dotan, Christopher Duane, Denis Knjazihhin
  • Patent number: 9521167
    Abstract: A management entity displays a plurality of icons, each icon representing an actor or a resource in a networking environment. The management entity defines security policy by receiving user input in the form of lines drawn between icons representing actors and resources to control abilities between actors and resources.
    Type: Grant
    Filed: January 20, 2015
    Date of Patent: December 13, 2016
    Assignee: Cisco Technology, Inc.
    Inventors: Robin Martherus, Guy Telner, Yedidya Dotan, Denis Knjazihhin