Patents by Inventor Alexey A. Polyakov

Alexey A. Polyakov has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11714659
    Abstract: Disclosed are various examples for device provisioning using a manufacturer boot environment. A management agent can be executed from a manufacturer's boot environment and can install a management application that is executable in the main operating system to provision a client device for management. The management agent can then set a provisioning status BIOS variable to indicate that the client device is provisioned. The client device can then be booted to the main operating system and the management application can be executed.
    Type: Grant
    Filed: July 22, 2021
    Date of Patent: August 1, 2023
    Assignee: VMWARE, INC.
    Inventors: Alexey A. Polyakov, Ondrej Stastny
  • Publication number: 20210349735
    Abstract: Disclosed are various examples for device provisioning using a manufacturer boot environment. A management agent can be executed from a manufacturer's boot environment and can install a management application that is executable in the main operating system to provision a client device for management. The management agent can then set a provisioning status BIOS variable to indicate that the client device is provisioned. The client device can then be booted to the main operating system and the management application can be executed.
    Type: Application
    Filed: July 22, 2021
    Publication date: November 11, 2021
    Inventors: Alexey A. Polyakov, Ondrej Stastny
  • Patent number: 11093260
    Abstract: Disclosed are various examples for persistent device provisioning. In some examples, a management agent is executed from the manufacturer boot environment. The management agent determines that a main operating system of the client device is currently unprovisioned for management by the management service. The management agent installs a management application that is executable in the main operating system. The client device boots to the main operating system and executes the management application. The management application enrolls the client device with the management service by installing an enrollment token received from the management service.
    Type: Grant
    Filed: June 5, 2019
    Date of Patent: August 17, 2021
    Assignee: VMWARE INC.
    Inventors: Alexey A. Polyakov, Ondrej Stastny
  • Publication number: 20200387385
    Abstract: Disclosed are various examples for persistent device provisioning. In some examples, a management agent is executed from the manufacturer boot environment. The management agent determines that a main operating system of the client device is currently unprovisioned for management by the management service. The management agent installs a management application that is executable in the main operating system. The client device boots to the main operating system and executes the management application. The management application enrolls the client device with the management service by installing an enrollment token received from the management service.
    Type: Application
    Filed: June 5, 2019
    Publication date: December 10, 2020
    Inventors: Alexey A. Polyakov, Ondrej Stastny
  • Patent number: 8863284
    Abstract: Disclosed are systems, methods and computer program products for determining a security status of at least one potentially malicious file in a customer network. An example method comprising receiving, by a client computer system, client heuristics information from a server system for determining a security status of client data generated by at least one client application; monitoring and identifying at least one suspicious file of the client data as a potentially malicious file by analyzing metadata associated with the at least one suspicious file using the client heuristics information; collecting threat-identification information of the potentially malicious file to exclude confidential information associated with a content of the potentially malicious file; transmitting the threat-identification information to the server system for determining a security status of the potentially malicious file; and receiving security tools from the server system to block or remove the potentially malicious file.
    Type: Grant
    Filed: May 26, 2014
    Date of Patent: October 14, 2014
    Assignee: Kaspersky Lab ZAO
    Inventors: Alexey A. Polyakov, Konstantin V. Sapronov
  • Patent number: 8739287
    Abstract: A server system that includes one or more processors and memory receives, from a client, metadata for a plurality of suspicious files for which the client was unable to conclusively determine a security status. The server system also analyzes the metadata using threat-identification information to identify potentially malicious files and requests authorization to receive the potentially malicious files from the client. In response to the request, upon authorization for the server system to receive the potentially malicious files, the server system automatically receives one or more potentially malicious files from the client that were authorized based on a confidentiality level of the potentially malicious files.
    Type: Grant
    Filed: October 10, 2013
    Date of Patent: May 27, 2014
    Assignee: Kaspersky Lab ZAO
    Inventors: Alexey A. Polyakov, Konstantin V. Sapronov
  • Patent number: 8719935
    Abstract: An anti-malware system that reduces the likelihood of detecting a false positive. The system is applied in an enterprise network in which a server receives reports of suspected malware from multiple hosts. Files on hosts suspected of containing malware are compared to control versions of those files. A match between a suspected file and a control version is used as an indication that the malware report is a false positive. Such an indication may be used in conjunction with other information, such as whether other hosts similarly report suspect files that match control versions or whether the malware report is generated by a recently changed component of the anti-malware system.
    Type: Grant
    Filed: January 8, 2010
    Date of Patent: May 6, 2014
    Assignee: Microsoft Corporation
    Inventors: Alexey A. Polyakov, Ravi Bikkula
  • Patent number: 8201253
    Abstract: A method and system in a computing device for performing security related functions as part of a process created to execute a software component that may be unrelated to security is provided. The security system provides security code that performs one or more security related functions. When a process is created to execute the code of a software component, the security system causes the security code to be executed before the execution of the code of the software component. One security related function of the security code may be to cause the operating system to maintain information about the process as long as the process exists. If the operating system later reports that the process no longer exists but the information is still being maintained, then the security system can assume that malware is attempting to hide the process.
    Type: Grant
    Filed: July 15, 2005
    Date of Patent: June 12, 2012
    Assignee: Microsoft Corporation
    Inventors: Lee Guang Yan, Alexey A. Polyakov
  • Patent number: 8042186
    Abstract: Disclosed are systems, methods and computer program products for detection of malware with complex infection patterns. The system provides enhanced protection against malware by identifying potentially harmful software objects, monitoring execution of various processes and threads of potentially harmful objects, compiling contexts of events of execution of the monitored processes and threads, and merging contexts of related processes and threads. Based on the analysis of the individual and merged object contexts using malware behavior rules, the system allows detection of malicious objects that have simple and complex behavior patterns.
    Type: Grant
    Filed: April 28, 2011
    Date of Patent: October 18, 2011
    Assignee: Kaspersky Lab ZAO
    Inventors: Alexey A. Polyakov, Vladislav V. Martynenko, Yuri G. Slobodyanuk, Denis A. Nazarov, Mikhail A. Pavlyushchik
  • Publication number: 20110173698
    Abstract: An anti-malware system that reduces the likelihood of detecting a false positive. The system is applied in an enterprise network in which a server receives reports of suspected malware from multiple hosts. Files on hosts suspected of containing malware are compared to control versions of those files. A match between a suspected file and a control version is used as an indication that the malware report is a false positive. Such an indication may be used in conjunction with other information, such as whether other hosts similarly report suspect files that match control versions or whether the malware report is generated by a recently changed component of the anti-malware system.
    Type: Application
    Filed: January 8, 2010
    Publication date: July 14, 2011
    Applicant: Microsoft Corporation
    Inventors: Alexey A. Polyakov, Ravi Bikkula
  • Patent number: 7809670
    Abstract: The present invention is directed to a method and system for automatically classifying an application into an application group which is previously classified in a knowledge base. More specifically, a runtime behavior of an application is captured as a series of events which are monitored and recorded during the execution of the application. The series of events are analyzed to find a proper application group which shares common runtime behavior patterns with the application. The knowledge base of application groups is previously constructed based on a large number of sample applications. The construction of the knowledge base is done in such a manner that each sample application can be classified into application groups based on a set of classification rules in the knowledge base. The set of classification rules are applied to a new application in order to classify the new application into one of the application groups.
    Type: Grant
    Filed: December 8, 2006
    Date of Patent: October 5, 2010
    Assignee: Microsoft Corporation
    Inventors: Tony Lee, Jigar J. Mody, Ying Lena Lin, Adrian M. Marinescu, Alexey A. Polyakov
  • Patent number: 7647636
    Abstract: A generic RootKit detector is disclosed that identifies when a malware, commonly known as RootKit, is resident on a computer. In one embodiment, the generic RootKit detector performs a method that compares the properties of different versions of a library used by the operating system to provide services to an application program. In this regard, when a library is loaded into memory, an aspect of the generic RootKit detector compares two versions of the library; a potentially infected version in memory and a second version stored in a protected state on a storage device. If certain properties of the first version of the library are different from the second version, a determination is made that a RootKit is infection the computer.
    Type: Grant
    Filed: August 24, 2005
    Date of Patent: January 12, 2010
    Assignee: Microsoft Corporation
    Inventors: Alexey A. Polyakov, Neil A. Cowie
  • Patent number: 7636946
    Abstract: Aspects of the subject matter described herein relate to antivirus protection and transactions. In aspects, a filter detects that a file is participating in a transaction and then may cause the file to be scanned together with any changes that have made to the file during the transaction. After a file is scanned, a cache entry may be updated to indicate that the file is clean. The cache entry may be used subsequently for like-type states. For example, if the file was scanned inside a transaction, the cache entry may be used later in the transaction. If the file was scanned outside a transaction, the cache entry may be used later for requests pertaining to files not in a transaction. Cache entries may be discarded when they are invalid or no longer useful.
    Type: Grant
    Filed: March 15, 2006
    Date of Patent: December 22, 2009
    Assignee: Microsoft Corporation
    Inventors: Surendra Verma, Dana D. Groff, Jonathan M. Cargille, Andrew M. Herron, Christian G. Allred, Neal R. Christiansen, Alexey A. Polyakov
  • Patent number: 7571482
    Abstract: Embodiments of a RootKit detector are directed to identifying a RootKit on a computer that is designed to conceal malware. Aspects of the RootKit detector leverage services provided by kernel debugger facilities to automatically obtain data in specified data structures that are maintained by an operating system. Then the data obtained from the kernel debugger facilities is processed with an integrity checker that determines whether the data contains properties sufficient to declare that a RootKit is resident on the computer.
    Type: Grant
    Filed: June 28, 2005
    Date of Patent: August 4, 2009
    Assignee: Microsoft Corporation
    Inventors: Alexey A. Polyakov, Gretchen L. Loihle, Mihai Costea, Robert J. Hensing, Jr., Scott A. Field, Vincent R. Orgovan, Yi-Min Wang, Yun Lin
  • Publication number: 20080005797
    Abstract: Generally described, the present invention is directed at identifying malware. In one embodiment, a method is provided that performs a search for malware during the boot process. More specifically, the method causes a software module configured to scan for malware to be initialized at computer start up. Then, in response to identifying the occurrence of a scanning event, the method causes the software module to search computer memory for data that is characteristic of malware. If data characteristic of malware is identified, the method handles the malware infection.
    Type: Application
    Filed: June 30, 2006
    Publication date: January 3, 2008
    Applicant: Microsoft Corporation
    Inventors: Scott A Field, Rohan R. Phillips, Alexey A. Polyakov