Patents by Inventor Dmitry Andreev

Dmitry Andreev has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10320787
    Abstract: A system and method for facilitating identification of an attacking computer in a network is provided. A user attempting to login to a network application may be presented with a screen prior to the login which lists preconditions of gaining access to the application. If a user concurs with the preconditions, a security module is downloaded to the user's computer and executed which gathers various configuration settings and transmits the gathered information to a predetermined destination. The security module may also attempt to place a call to a predetermined destination over a modem in the computer to cause registration of caller-ID data when answered at the predetermined destination. Once the security check is completed, login may proceed with the network application. Any data gathered by the security module may be stored for later recall and use to identify the computer in the event of an attack.
    Type: Grant
    Filed: December 15, 2017
    Date of Patent: June 11, 2019
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Dmitry Andreev, Galina Grunin, Gregory Vilshansky
  • Publication number: 20180109523
    Abstract: A system and method for facilitating identification of an attacking computer in a network is provided. A user attempting to login to a network application may be presented with a screen prior to the login which lists preconditions of gaining access to the application. If a user concurs with the preconditions, a security module is downloaded to the user's computer and executed which gathers various configuration settings and transmits the gathered information to a predetermined destination. The security module may also attempt to place a call to a predetermined destination over a modem in the computer to cause registration of caller-ID data when answered at the predetermined destination. Once the security check is completed, login may proceed with the network application. Any data gathered by the security module may be stored for later recall and use to identify the computer in the event of an attack.
    Type: Application
    Filed: December 15, 2017
    Publication date: April 19, 2018
    Inventors: Dmitry Andreev, Galina Grunin, Gregory Vilshansky
  • Patent number: 9923894
    Abstract: A system and method for facilitating identification of an attacking computer in a network is provided. A user attempting to login to a network application may be presented with a screen prior to the login which lists preconditions of gaining access to the application. If a user concurs with the preconditions, a security module is downloaded to the user's computer and executed which gathers various configuration settings and transmits the gathered information to a predetermined destination. The security module may also attempt to place a call to a predetermined destination over a modem in the computer to cause registration of caller-ID data when answered at the predetermined destination. Once the security check is completed, login may proceed with the network application. Any data gathered by the security module may be stored for later recall and use to identify the computer in the event of an attack.
    Type: Grant
    Filed: February 7, 2017
    Date of Patent: March 20, 2018
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Dmitry Andreev, Galina Grunin, Gregory Vilshansky
  • Patent number: 9742619
    Abstract: A program product and system that implements a method for adding an Information Technology (IT) structure A to an IT structure X. A first list of all dependencies of elements in a composition of X is received. It is determined that no dependency of any element E in the composition of X in the first list has an exclusion with a class Y to which A belongs. A second list of all dependencies of A is received. It is determined that no dependency of A in the second list has an exclusion with a class Z to which an element E in the composition of X belongs. It is determined that no dependency of any element E in the composition of X in the first list has an exclusion with a class Y to which A belongs and ensuring that A's dependencies are satisfied followed by adding A to X.
    Type: Grant
    Filed: January 6, 2014
    Date of Patent: August 22, 2017
    Assignee: International Business Machines Corporation
    Inventors: Dmitry Andreev, Paul G. Greenstein, Galina Grunin, Gregory Vilshansky
  • Publication number: 20170149779
    Abstract: A system and method for facilitating identification of an attacking computer in a network is provided. A user attempting to login to a network application may be presented with a screen prior to the login which lists preconditions of gaining access to the application. If a user concurs with the preconditions, a security module is downloaded to the user's computer and executed which gathers various configuration settings and transmits the gathered information to a predetermined destination. The security module may also attempt to place a call to a predetermined destination over a modem in the computer to cause registration of caller-ID data when answered at the predetermined destination. Once the security check is completed, login may proceed with the network application. Any data gathered by the security module may be stored for later recall and use to identify the computer in the event of an attack.
    Type: Application
    Filed: February 7, 2017
    Publication date: May 25, 2017
    Inventors: Dmitry Andreev, Galina Grunin, Gregory Vilshansky
  • Patent number: 9602489
    Abstract: A system and method for facilitating identification of an attacking computer in a network is provided. A user attempting to login to a network application may be presented with a screen prior to the login which lists preconditions of gaining access to the application. If a user concurs with the preconditions, a security module is downloaded to the user's computer and executed which gathers various configuration settings and transmits the gathered information to a predetermined destination. The security module may also attempt to place a call to a predetermined destination over a modem in the computer to cause registration of caller-ID data when answered at the predetermined destination. Once the security check is completed, login may proceed with the network application. Any data gathered by the security module may be stored for later recall and use to identify the computer in the event of an attack.
    Type: Grant
    Filed: October 22, 2014
    Date of Patent: March 21, 2017
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Dmitry Andreev, Galina Grunin, Gregory Vilshansky
  • Publication number: 20150040191
    Abstract: A system and method for facilitating identification of an attacking computer in a network is provided. A user attempting to login to a network application may be presented with a screen prior to the login which lists preconditions of gaining access to the application. If a user concurs with the preconditions, a security module is downloaded to the user's computer and executed which gathers various configuration settings and transmits the gathered information to a predetermined destination. The security module may also attempt to place a call to a predetermined destination over a modem in the computer to cause registration of caller-ID data when answered at the predetermined destination. Once the security check is completed, login may proceed with the network application. Any data gathered by the security module may be stored for later recall and use to identify the computer in the event of an attack.
    Type: Application
    Filed: October 22, 2014
    Publication date: February 5, 2015
    Inventors: Dmitry Andreev, Galina Grunin, Gregory Vilshansky
  • Patent number: 8914644
    Abstract: A system and method for facilitating identification of an attacking computer in a network is provided. A user attempting to login to a network application may be presented with a screen prior to the login which lists preconditions of gaining access to the application. If a user concurs with the preconditions, a security module is downloaded to the user's computer and executed which gathers various configuration settings and transmits the gathered information to a predetermined destination. The security module may also attempt to place a call to a predetermined destination over a modem in the computer to cause registration of caller-ID data when answered at the predetermined destination. Once the security check is completed, login may proceed with the network application. Any data gathered by the security module may be stored for later recall and use to identify the computer in the event of an attack.
    Type: Grant
    Filed: September 12, 2013
    Date of Patent: December 16, 2014
    Assignee: International Business Machines Corporation
    Inventors: Dmitry Andreev, Galina Grunin, Gregory Vilshansky
  • Publication number: 20140122686
    Abstract: A program product and system that implements a method for adding an Information Technology (IT) structure A to an IT structure X. A first list of all dependencies of elements in a composition of X is received. It is determined that no dependency of any element E in the composition of X in the first list has an exclusion with a class Y to which A belongs. A second list of all dependencies of A is received. It is determined that no dependency of A in the second list has an exclusion with a class Z to which an element E in the composition of X belongs. It is determined that no dependency of any element E in the composition of X in the first list has an exclusion with a class Y to which A belongs and ensuring that A's dependencies are satisfied followed by adding A to X.
    Type: Application
    Filed: January 6, 2014
    Publication date: May 1, 2014
    Applicant: International Business Machines Corporation
    Inventors: Dmitry Andreev, Paul G. Greenstein, Galina Grunin, Gregory Vilshansky
  • Patent number: 8645513
    Abstract: A method and associated computer program product for developing an Information Technology (IT) system. An abstract IT structure for the IT system is provided. A virtual IT structure for the IT system is generated from the abstract IT structure by a translator. A real IT structure for the IT system is generated from the virtual IT structure.
    Type: Grant
    Filed: December 14, 2004
    Date of Patent: February 4, 2014
    Assignee: International Business Machines Corporation
    Inventors: Dmitry Andreev, Paul G. Greenstein, Galina Grunin, Gregory Vilshansky
  • Publication number: 20140013393
    Abstract: A system and method for facilitating identification of an attacking computer in a network is provided. A user attempting to login to a network application may be presented with a screen prior to the login which lists preconditions of gaining access to the application. If a user concurs with the preconditions, a security module is downloaded to the user's computer and executed which gathers various configuration settings and transmits the gathered information to a predetermined destination. The security module may also attempt to place a call to a predetermined destination over a modem in the computer to cause registration of caller-ID data when answered at the predetermined destination. Once the security check is completed, login may proceed with the network application. Any data gathered by the security module may be stored for later recall and use to identify the computer in the event of an attack.
    Type: Application
    Filed: September 12, 2013
    Publication date: January 9, 2014
    Applicant: International Business Machines Corporation
    Inventors: Dmitry Andreev, Galina Grunin, Gregory Vilshansky
  • Patent number: 8626887
    Abstract: A method and system for porting an abstract Information Technology (IT) structure into an IT delivery environment. An abstract IT structure A that is currently within an IT delivery environment X is translated by generating a virtual IT structure V from the abstract IT structure A through specification of an IT delivery environment Y. Delivery binding the virtual IT structure V to the IT delivery environment Y generates a delivery-bound virtual IT structure D. The delivery-bound virtual IT structure D is deployed in the IT delivery environment Y, resulting in a real IT structure instance R capable of operating in the IT delivery environment Y.
    Type: Grant
    Filed: June 13, 2006
    Date of Patent: January 7, 2014
    Assignee: International Business Machines Corporation
    Inventors: Dmitry Andreev, Paul Gregory Greenstein, Gregory Vilshansky
  • Patent number: 8621229
    Abstract: A system and method for facilitating identification of an attacking computer in a network is provided. A user attempting to login to a network application may be presented with a screen prior to the login which lists preconditions of gaining access to the application. If a user concurs with the preconditions, a security module is downloaded to the user's computer and executed which gathers various configuration settings and transmits the gathered information to a predetermined destination. The security module may also attempt to place a call to a predetermined destination over a modem in the computer to cause registration of caller-ID data when answered at the predetermined destination. Once the security check is completed, login may proceed with the network application. Any data gathered by the security module may be stored for later recall and use to identify the computer in the event of an attack.
    Type: Grant
    Filed: March 2, 2012
    Date of Patent: December 31, 2013
    Assignee: International Business Machines Corporation
    Inventors: Dmitry Andreev, Galina Grunin, Gregory Vilshansky
  • Patent number: 8619198
    Abstract: A system includes a computing device that includes a memory for storing content of a sequence of frames, and a frame predictor. The frame predictor determines a difference between content of a first frame and content of a second frame, in which the first and second frames are adjacent in the sequence of frames. The difference between the content of the first and second frames is representative of image changes included in the content of first and second frames. The frame predictor is configured to produce an intermediate frame using at least one of the first and second frames, and the determined difference. The frame predictor is further configured to insert the intermediate frame into the frame sequence.
    Type: Grant
    Filed: April 28, 2009
    Date of Patent: December 31, 2013
    Assignee: Lucasfilm Entertainment Company Ltd.
    Inventor: Dmitry Andreev
  • Patent number: 8364957
    Abstract: A method and system is provided to provide single sign on (SSO) functionality in a network that avoids storing a user's credentials in persistent storage. A session may be initiated with a portal which sends a session ID derivative as a credential string instead of a user's password to a target application. When the target application attempts to authenticate the user, by sending a request to a LDAP directory, the request is intercepted by a LDAP proxy that instead validates the UserID with the LDAP directory and the password is validated by a credential validator component which verifies with the portal that the credential string presented as the user password has been produced from the active session ID. In an embodiment, the credential string validator validates each short-living credential only once and upon detecting a second validation request for the same string, initiates a security breech process.
    Type: Grant
    Filed: March 2, 2004
    Date of Patent: January 29, 2013
    Assignee: International Business Machines Corporation
    Inventors: Dmitry Andreev, Gregory Vilshansky, Boris Vishnevsky
  • Publication number: 20120167215
    Abstract: A system and method for facilitating identification of an attacking computer in a network is provided. A user attempting to login to a network application may be presented with a screen prior to the login which lists preconditions of gaining access to the application. If a user concurs with the preconditions, a security module is downloaded to the user's computer and executed which gathers various configuration settings and transmits the gathered information to a predetermined destination. The security module may also attempt to place a call to a predetermined destination over a modem in the computer to cause registration of caller-ID data when answered at the predetermined destination. Once the security check is completed, login may proceed with the network application. Any data gathered by the security module may be stored for later recall and use to identify the computer in the event of an attack.
    Type: Application
    Filed: March 2, 2012
    Publication date: June 28, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Dmitry Andreev, Galina Grunin, Gregory Vilshansky
  • Patent number: 8209700
    Abstract: The present invention is directed to a method, system, and computer program product for providing local load balancing for high-availability servers. In particular, the present invention is based on the use of an HACMP cluster of servers (for high availability) each running an instance of a TCP splitter (for load balancing). A cluster of servers is provided, wherein a Transport Control Protocol (TCP) splitter runs on each of the servers. Each TCP splitter is configured to split an incoming data stream to a respective server among a plurality of the servers for processing. Each server in the cluster has a different routable Internet Protocol (IP) address. Upon a failure of a server, the IP address of the failed server is reassigned to another server in the cluster.
    Type: Grant
    Filed: December 22, 2005
    Date of Patent: June 26, 2012
    Assignee: International Business Machines Corporation
    Inventors: Dmitry Andreev, Thomas M. Dauffenbach, Galina Grunin, Gregory Vilshansky
  • Patent number: 8195952
    Abstract: A system and method for facilitating identification of an attacking computer in a network is provided. A user attempting to login to a network application may be presented with a screen prior to the login which lists preconditions of gaining access to the application. If a user concurs with the preconditions, a security module is downloaded to the user's computer and executed which gathers various configuration settings and transmits the gathered information to a predetermined destination. The security module may also attempt to place a call to a predetermined destination over a modem in the computer to cause registration of caller-ID data when answered at the predetermined destination. Once the security check is completed, login may proceed with the network application. Any data gathered by the security module may be stored for later recall and use to identify the computer in the event of an attack.
    Type: Grant
    Filed: December 14, 2004
    Date of Patent: June 5, 2012
    Assignee: International Business Machines Corporation
    Inventors: Dmitry Andreev, Galina Grunin, Gregory Vilshansky
  • Patent number: 8140609
    Abstract: A method and system for consolidating N elements of an enterprise IT structure that consists of L elements (N?L). All combinations of M elements of the N elements are generated (M<N). M is a specified positive integer of at least 1 and less than N. One or more pairs of combinations selected from all of the combinations are ascertained such that each ascertained pair consists of IT structures S1 and an IT structure S2 which are specifically congruent with respect to each other. Specifically congruent means composition congruent, topologically congruent, interface congruent, composition congruent and topologically congruent, composition congruent and interface congruent, topologically congruent and interface congruent, or fully congruent. At least one pair of combinations selected is consolidated. Consolidating each pair P reduces a goal function G that is a function of a total cost of ownership (TCO) of the enterprise IT structure.
    Type: Grant
    Filed: January 25, 2007
    Date of Patent: March 20, 2012
    Assignee: International Business Machines Corporation
    Inventors: Dmitry Andreev, Paul Gregory Greenstein
  • Patent number: 8126992
    Abstract: A method and system for optimally scheduling a web conference managed by a web application. Date and time ranges are initialized with predefined values. A tentative start date included in the date range and a tentative start time included in the time range are automatically calculated, and are included in a tentative schedule for the web conference. A time period is determined by the tentative schedule and a duration of the web conference. The automatic calculation prevents the time period from overlapping a time interval during which processors utilized by the web application are to experience a peak load. The tentative schedule is presented to the user via the interface, and is recalculated and redisplayed in response to the user updating a load-related parameter. The user selects a final schedule, which is the tentative schedule or a user-specified schedule different from the tentative schedule.
    Type: Grant
    Filed: October 27, 2005
    Date of Patent: February 28, 2012
    Assignee: International Business Machines Corporation
    Inventors: Dmitry Andreev, Paul Gregory Greenstein, Galina Grunin, Gregory Vilshansky