Patents by Inventor Arthur Zavalkovsky
Arthur Zavalkovsky has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11636213Abstract: Systems, apparatuses, and methods for more effectively preparing for and responding to cybersecurity threats directed at people or at groups of people. A segmentation process is described that evaluates multiple characteristics of a person that may make them a potential target or that may make a cybersecurity attack on that person more likely to be successful. Based on the segmentation, a security analyst can apply an appropriate risk reduction or security protocol to each person or group of similarly situated people to reduce the likelihood of an attack and/or the likelihood of a successful attack.Type: GrantFiled: July 22, 2020Date of Patent: April 25, 2023Assignee: Proofpoint, Inc.Inventors: Doron Asher Elgressy, David Robert Knight, Arthur Zavalkovsky
-
Patent number: 9560068Abstract: A network security system employing multiple levels of processing to identify security threats. Multiple host machines may each contain an agent that detects possibilities of security threats based on raw data sensed locally at that host. The hosts may share information obtained from local analysis and each host may use information generated at one or more other hosts, in combination with information generated locally, to identify a security concern, indicating with greater certainty that a security threat exists. Based on security concerns generated by multiple hosts, a security threat may be to indicated and protective action may be taken.Type: GrantFiled: July 12, 2013Date of Patent: January 31, 2017Assignee: MICROSOFT TECHNOLOGY LICENSING LLC.Inventors: Igal Figlin, Arthur Zavalkovsky, Lior Arzi, Efim Hudis, Jennifer R. Lemond, Robert Eric Fitzgerald, Khaja E. Ahmed, Jeffrey S. Williams, Edward W. Hardy
-
Patent number: 9344432Abstract: Embodiments of the invention provide techniques for basing access control decisions at the network layer at least in part on information provided in claims, which may describe attributes of a computer requesting access, one or more resources to which access is requested, the user, the circumstances surrounding the requested access, and/or other information. The information may be evaluated based on one or more access control policies, which may be pre-set or dynamically generated, and used in making a decision whether to grant or deny the computer access to the specified resource(s).Type: GrantFiled: June 24, 2010Date of Patent: May 17, 2016Assignee: Microsoft Technology Licensing, LLCInventors: Yair Tor, Daniel Rose, Eugene (John) Neystadt, Patrik Schnell, Moshe Sapir, Oleg Ananiev, Arthur Zavalkovsky, Anat Eyal
-
Patent number: 8918856Abstract: Embodiments of the invention provide a trusted intermediary for use in a system in which access control decisions may be based at least in part on information provided in claims. The intermediary may request claims on behalf of a network resource to which access is requested, and submit the claims for a decision whether to grant or deny access. The decision may be based at least in part on one or more access control policies, which may be pre-set or dynamically generated. Because the intermediary requests the claims and submits the claims for an access control decision, the network resource (e.g., a server application) need not be configured to process claims information.Type: GrantFiled: June 24, 2010Date of Patent: December 23, 2014Assignee: Microsoft CorporationInventors: Yair Tor, Eugene (John) Neystadt, Patrik Schnell, Oleg Ananiev, Arthur Zavalkovsky, Daniel Rose
-
Publication number: 20130305371Abstract: A network security system employing multiple levels of processing to identify security threats. Multiple host machines may each contain an agent that detects possibilities of security threats based on raw data sensed locally at that host. The hosts may share information obtained from local analysis and each host may use information generated at one or more other hosts, in combination with information generated locally, to identify a security concern, indicating with greater certainty that a security threat exists. Based on security concerns generated by multiple hosts, a security threat may be to indicated and protective action may be taken.Type: ApplicationFiled: July 12, 2013Publication date: November 14, 2013Applicant: MICROSOFT CORPORATIONInventors: Igal Figlin, Arthur Zavalkovsky, Lior Arzi, Efim Hudis, Jennifer R. Lemond, Robert Eric Fitzgerald, Khaja E. Ahmed, Jeffrey S. Williams, Edward W. Hardy
-
Patent number: 8578018Abstract: An improved user experience at a local client computer that is coupled to one or more remote servers over a WAN is provided by an arrangement in which data and files that are likely to be needed by a user during a work session are identified through the application of one or more heuristics and then pre-fetched to be made available in advance of the session's start. The pre-fetching of the data and files may be performed as the client computer goes through its startup or boot process. When the startup is completed and the desktop applications become ready for use, the data and files that the user needs to immediately begin work are already available at the local client computer.Type: GrantFiled: June 29, 2008Date of Patent: November 5, 2013Assignee: Microsoft CorporationInventors: Arthur Zavalkovsky, Itai Almog
-
Patent number: 8516576Abstract: A network security system employing multiple levels of processing to identify security threats. Multiple host machines may each contain an agent that detects possibilities of security threats based on raw data sensed locally at that host. The hosts may share information obtained from local analysis and each host may use information generated at one or more other hosts, in combination with information generated locally, to identify a security concern, indicating with greater certainty that a security threat exists. Based on security concerns generated by multiple hosts, a security threat may be indicated and protective action may be taken.Type: GrantFiled: January 13, 2010Date of Patent: August 20, 2013Assignee: Microsoft CorporationInventors: Igal Figlin, Arthur Zavalkovsky, Lior Arzi, Efim Hudis, Jennifer R. LeMond, Robert Eric Fitzgerald, Khaja E. Ahmed, Jeffrey S. Williams, Edward W. Hardy
-
Patent number: 8151338Abstract: A method and system for continuously serving the authentication requests of networked computers is disclosed. The authentication requests of computers are served and the services for the computers are reserved for a predefined time interval. The authentication service for a computer is reserved by an authentication server, which receives authentication requests of the computer.Type: GrantFiled: September 29, 2005Date of Patent: April 3, 2012Assignee: Cisco Technology, Inc.Inventors: Ilan Frenkel, Arthur Zavalkovsky, Alexey Kobozev, Ilan Bronshtein
-
Publication number: 20110321130Abstract: Embodiments of the invention provide techniques for basing access control decisions at the network layer at least in part on information provided in claims, which may describe attributes of a computer requesting access, one or more resources to which access is requested, the user, the circumstances surrounding the requested access, and/or other information. The information may be evaluated based on one or more access control policies, which may be pre-set or dynamically generated, and used in making a decision whether to grant or deny the computer access to the specified resource(s).Type: ApplicationFiled: June 24, 2010Publication date: December 29, 2011Applicant: Microsoft CorporationInventors: Yair Tor, Daniel Rose, Eugene (John) Neystadt, Patrik Schnell, Moshe Sapir, Oleg Ananiev, Arthur Zavalkovsky, Anat Eyal
-
Publication number: 20110321152Abstract: Embodiments of the invention provide a trusted intermediary for use in a system in which access control decisions may be based at least in part on information provided in claims. The intermediary may request claims on behalf of a network resource to which access is requested, and submit the claims for a decision whether to grant or deny access. The decision may be based at least in part on one or more access control policies, which may be pre-set or dynamically generated. Because the intermediary requests the claims and submits the claims for an access control decision, the network resource (e.g., a server application) need not be configured to process claims information.Type: ApplicationFiled: June 24, 2010Publication date: December 29, 2011Applicant: Microsoft CorporationInventors: Yair Tor, Eugene (John) Neystadt, Patrik Schnell, Oleg Ananiev, Arthur Zavalkovsky, Daniel Rose
-
Patent number: 7992193Abstract: A method and an apparatus are disclosed for securing authentication, authorization and accounting (AAA) protocol messages. An encryption key, a device identifier value, and verification data are received and stored at a network device. The verification data comprises in part a copy the encryption key and the device identifier value, and has been encrypted using a private key of a server. A shared secret is generated by applying a computational function to the encryption key and the device identifier value. Based on the shared secret, a first message integrity check value for a message is generated. The message, the first integrity check value, and the verification data are sent to the server. The server decrypts the verification data using the private key, extracts the encryption key and the device identifier value, and generates the same shared secret by applying the same computational function to the extracted encryption key and device identifier value.Type: GrantFiled: March 17, 2005Date of Patent: August 2, 2011Assignee: Cisco Technology, Inc.Inventors: Fabio Maino, Michael Fine, Irene Kuffel, Arthur Zavalkovsky
-
Publication number: 20110173699Abstract: A network security system employing multiple levels of processing to identify security threats. Multiple host machines may each contain an agent that detects possibilities of security threats based on raw data sensed locally at that host. The hosts may share information obtained from local analysis and each host may use information generated at one or more other hosts, in combination with information generated locally, to identify a security concern, indicating with greater certainty that a security threat exists. Based on security concerns generated by multiple hosts, a security threat may be indicated and protective action may be taken.Type: ApplicationFiled: January 13, 2010Publication date: July 14, 2011Inventors: Igal Figlin, Arthur Zavalkovsky, Lior Arzi, Efim Hudis, Jennifer R. LeMond, Robert Eric Fitzgerald, Khaja E. Ahmed, Jeffrey S. Williams, Edward W. Hardy
-
Patent number: 7962954Abstract: A method is disclosed for authenticating multiple network elements that access a network through a single network switch port. Certain authentication protocols, such as EAPoE, leave a port of a network switch indefinitely opened when one particular host is authenticated and authorized to transmit network frames through the port. In one embodiment of the invention, a network frame from a second host that is received by the open port is not automatically transmitted to the network. Instead, techniques are employed locally by the network switch to grant or deny transmission of the network frame received from the second host. An authentication server is contacted only when the network switch cannot locally employ techniques to authorize the transmission of the network frame received from the second host.Type: GrantFiled: December 20, 2007Date of Patent: June 14, 2011Assignee: Cisco Technology, Inc.Inventors: Arthur Zavalkovsky, John Zamick, Yoram Ramberg
-
Patent number: 7930734Abstract: A method and system is disclosed for creating and tracking network sessions. A request to access a network is received from an entity. The entity is authenticated after the request is received. Authenticated identity information associated with the entity, network address information associated with the entity, and network location information associated with the entity is collected. An information set is created. The information set comprises and binds together the authenticated identity information, the network address information, and the network location information. The information set indicates a present association among the authenticated identity information, the network address information, and the network location information. The information set is stored in a session record in a centralized database. The session record represents a session in which the entity accesses the network. The session record is one of a plurality of session records that are stored in the centralized database.Type: GrantFiled: April 28, 2006Date of Patent: April 19, 2011Assignee: Cisco Technology, Inc.Inventors: Ian Foo, Jeremy Stieglitz, Arthur Zavalkovsky, Jeevan S. Patil, Partha Bhattacharya, Jason Frazier, Ellis Roland Dobbins
-
Patent number: 7929973Abstract: A method and apparatus for managing and balancing wireless access based on centralized information is provided. A request to provide service to a wireless client is received from a first access node in a plurality of access node. An access policy, applicable to the first access node, is selected from a plurality of stored policies. The stored policies may include a variety of rules, such as how many or which wireless clients may be serviced by an access node. A centralized manager, such as an AAA server, may perform the selection of the access policy. A determination is made as to whether to allow the first access node to provide service to the wireless client based on the selected access policy. A message that instructs the first access node whether to provide or deny service to the wireless client is transmitted to the first access node.Type: GrantFiled: December 31, 2007Date of Patent: April 19, 2011Assignee: Cisco Technology, Inc.Inventors: Arthur Zavalkovsky, Jeremy Stieglitz, Ami Schieber
-
Patent number: 7716721Abstract: Automatically re-authenticating a computing device seeking access to a network or a resource. A method comprises forwarding a request received from the computing device to an authentication device to enable the authentication device to authenticate the computing device using a full-authentication mechanism. State information related to authenticating the computing device is created from authenticating the computing device. The state information is received and stored. For example, an authenticator device that forwarded the initial authentication request from the computing device to the authentication device receives and stores the state information. The computing device is re-authenticated using the stored state information without again contacting the authentication device.Type: GrantFiled: October 18, 2005Date of Patent: May 11, 2010Assignee: Cisco Technology, Inc.Inventors: Arthur Zavalkovsky, Alexey Kobozev, Joseph Salowey, Ilan Frenkel
-
Patent number: 7702899Abstract: Verifying revocation status of a digital certificate is provided in part by a receiver verifying a security certificate for a sender. In an embodiment, an approach comprises receiving a first security certificate associated with the sender and storing the security certificate in a location accessible to the receiver; updating the first security certificate in the location accessible to the receiver if the first security certificate is changed or revoked; receiving a second security certificate from the sender when identity of the sender needs to be verified; comparing the second security certificate to the first security certificate; and confirming the sender's identity only if the second security certificate matches the first security certificate for the sender.Type: GrantFiled: January 21, 2009Date of Patent: April 20, 2010Assignee: Cisco Technology, Inc.Inventors: Alexey Kobozev, Arthur Zavalkovsky, Ilan Frenkel
-
Publication number: 20090327479Abstract: An improved user experience at a local client computer that is coupled to one or more remote servers over a WAN is provided by an arrangement in which data and files that are likely to be needed by a user during a work session are identified through the application of one or more heuristics and then pre-fetched to be made available in advance of the session's start. The pre-fetching of the data and files may be performed as the client computer goes through its startup or boot process. When the startup is completed and the desktop applications become ready for use, the data and files that the user needs to immediately begin work are already available at the local client computer.Type: ApplicationFiled: June 29, 2008Publication date: December 31, 2009Applicant: MICROSOFT CORPORATIONInventors: Arthur Zavalkovsky, Itai Almog
-
Publication number: 20090132812Abstract: Verifying revocation status of a digital certificate is provided in part by a receiver verifying a security certificate for a sender. In an embodiment, an approach comprises receiving a first security certificate associated with the sender and storing the security certificate in a location accessible to the receiver; updating the first security certificate in the location accessible to the receiver if the first security certificate is changed or revoked; receiving a second security certificate from the sender when identity of the sender needs to be verified; comparing the second security certificate to the first security certificate; and confirming the sender's identity only if the second security certificate matches the first security certificate for the sender.Type: ApplicationFiled: January 21, 2009Publication date: May 21, 2009Inventors: Alexey Kobozev, Arthur Zavalkovsky, Ilan Frenkel
-
Patent number: 7500100Abstract: A method and apparatus for verifying revocation status of a digital certificate is provided. The invention operates in part by a receiver verifying a security certificate for a sender. In various embodiments the steps to accomplish this include receiving a first security certificate associated with the sender and storing the security certificate in a location accessible to the receiver; updating the first security certificate in the location accessible to the receiver if the first security certificate is changed or revoked; receiving a second security certificate from the sender when identity of the sender needs to be verified; comparing the second security certificate to the first security certificate; and confirming the sender's identity only if the second security certificate matches the first security certificate for the sender.Type: GrantFiled: September 10, 2003Date of Patent: March 3, 2009Assignee: Cisco Technology, Inc.Inventors: Alexey Kobozev, Arthur Zavalkovsky, Ilan Frenkel