Patents by Inventor Dmitry G. Ivanov

Dmitry G. Ivanov has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11556670
    Abstract: Disclosed herein are systems and methods for granting access to data of a user. In one aspect, an exemplary method comprises, blocking the processing of data of a user, transferring the data of the user to a storage device, receiving a request for data processing from a collected data processor of a device, redirecting the received request to the storage device, determining, by the storage device, data access rights for the collected data processor of the device from which the request for data processing is received in accordance with data access rights established by a data access rights manager, and providing access to the data in accordance with the determined data access rights.
    Type: Grant
    Filed: March 17, 2021
    Date of Patent: January 17, 2023
    Assignee: AO Kaspersky Lab
    Inventors: Andrey A. Efremov, Dmitry V. Shmoylov, Pavel V. Filonov, Dmitry G. Ivanov
  • Patent number: 11522916
    Abstract: A method for defending a network of electronic devices from cyberattacks includes obtaining information about a plurality of devices and information about communication links between the plurality of devices and surrounding environment and determining types of the communication links using heuristic rules. The types of communication links are compared using corresponding link profiles. One or more similar communication links are identified based on the comparison. A cluster of devices is generated by combining a subset of the plurality of devices. The cluster includes one or more devices having one or more similar communication links. A surrounding environment profile is generated for the generated cluster of devices. When a cyberattack is detected on one of the devices in the cluster, the surrounding environment profile is modified for the cluster of devices in order to defend all devices in the cluster from the cyberattack.
    Type: Grant
    Filed: June 2, 2020
    Date of Patent: December 6, 2022
    Assignee: AO Kaspersky Lab
    Inventors: Dmitry G. Ivanov, Andrey V. Ladikov, Pavel V. Filonov
  • Patent number: 11388196
    Abstract: A method for analyzing relationships between clusters of devices includes selecting a first device from a first cluster of devices and selecting a second device from a second cluster of devices. Information related to a first communication link associated with the first device and information related to a second communication link associated with the second device is obtained. A similarity metric is computed based on the obtained information. The similarity metric represents a similarity between the first communication link and the second communication link associated with the second device. A relationship between the first and second clusters is determined using the computed similarity metric. When a cyberattack is detected on the devices in the first cluster or the second cluster, protection of all devices in the first cluster and the second cluster is modified based on the determined relationship in order to defend the respective clusters from the cyberattack.
    Type: Grant
    Filed: June 1, 2020
    Date of Patent: July 12, 2022
    Assignee: AO Kaspersky Lab
    Inventors: Dmitry G. Ivanov, Andrey V. Ladikov, Pavel V. Filonov
  • Publication number: 20220094531
    Abstract: Disclosed herein are systems and methods for granting a user data processor access to a cryptocontainer of user data. In one aspect, an exemplary method comprises, creating a cryptocontainer for user's data, wherein the cryptocontainer receives at least one element of the user's data and encrypts the element; for the user data processor, establishing rights for accessing the element using a first key, and forming at least one access structure, the forming including, placing the first key in the access structure based on the established rights, receiving, from the user data processor, a second key linked to the user data processor which is to be used for accessing the first key, and encrypting the first key with the second key; and when a request for access to the cryptocontainer is received, granting, to the user data processor, access to the cryptocontainer based on the formed at least one access structure.
    Type: Application
    Filed: June 1, 2021
    Publication date: March 24, 2022
    Inventors: Sergey V. Kozlov, Andrey A. Efremov, Dmitry V. Shmoylov, Pavel V. Filonov, Dmitry G. Ivanov
  • Publication number: 20220092218
    Abstract: Disclosed herein are systems and methods for granting access to data of a user. In one aspect, an exemplary method comprises, blocking the processing of data of a user, transferring the data of the user to a storage device, receiving a request for data processing from a collected data processor of a device, redirecting the received request to the storage device, determining, by the storage device, data access rights for the collected data processor of the device from which the request for data processing is received in accordance with data access rights established by a data access rights manager, and providing access to the data in accordance with the determined data access rights.
    Type: Application
    Filed: March 17, 2021
    Publication date: March 24, 2022
    Inventors: Andrey A. Efremov, Dmitry V. Shmoylov, Pavel V. Filonov, Dmitry G. Ivanov
  • Publication number: 20210099480
    Abstract: A method for analyzing relationships between clusters of devices includes selecting a first device from a first cluster of devices and selecting a second device from a second cluster of devices. Information related to a first communication link associated with the first device and information related to a second communication link associated with the second device is obtained. A similarity metric is computed based on the obtained information. The similarity metric represents a similarity between the first communication link and the second communication link associated with the second device. A relationship between the first and second clusters is determined using the computed similarity metric. When a cyberattack is detected on the devices in the first cluster or the second cluster, protection of all devices in the first cluster and the second cluster is modified based on the determined relationship in order to defend the respective clusters from the cyberattack.
    Type: Application
    Filed: June 1, 2020
    Publication date: April 1, 2021
    Inventors: Dmitry G. Ivanov, Andrey V. Ladikov, Pavel V. Filonov
  • Publication number: 20210099489
    Abstract: A method for defending a network of electronic devices from cyberattacks includes obtaining information about a plurality of devices and information about communication links between the plurality of devices and surrounding environment and determining types of the communication links using heuristic rules. The types of communication links are compared using corresponding link profiles. One or more similar communication links are identified based on the comparison. A cluster of devices is generated by combining a subset of the plurality of devices. The cluster includes one or more devices having one or more similar communication links. A surrounding environment profile is generated for the generated cluster of devices. When a cyberattack is detected on one of the devices in the cluster, the surrounding environment profile is modified for the cluster of devices in order to defend all devices in the cluster from the cyberattack.
    Type: Application
    Filed: June 2, 2020
    Publication date: April 1, 2021
    Inventors: Dmitry G. Ivanov, Andrey V. Ladikov, Pavel V. Filonov
  • Publication number: 20160292450
    Abstract: Disclosed is a system and method for controlling access of a native image of a machine code to resources of an operating system of a device. An example method includes obtaining the native image of the machine code; identifying a parent assembly from which the native image was created; determining and forming a correspondence between the native image and the parent assembly based at least upon a template; in response to detecting an update to the native image, generating an updated image of the native image; determining whether there is a correspondence between the updated image of the native image and the parent assembly based at least upon the template; and in response to detecting no correspondence between the updated image of the native image and the parent assembly, restricting an access of the updated image of the native image to the resources of the operating system of the device.
    Type: Application
    Filed: May 25, 2016
    Publication date: October 6, 2016
    Inventors: Dmitry G. Ivanov, Nikita A. Pavlov, Dmitry V. Shvetsov, Mikhail A. Gorshenin
  • Patent number: 9460306
    Abstract: Disclosed is a system and method for controlling access of a native image of a machine code to resources of an operating system of a device. An example method includes obtaining the native image of the machine code; identifying a parent assembly from which the native image was created; determining and forming a correspondence between the native image and the parent assembly based at least upon a template; in response to detecting an update to the native image, generating an updated image of the native image; determining whether there is a correspondence between the updated image of the native image and the parent assembly based at least upon the template; and in response to detecting no correspondence between the updated image of the native image and the parent assembly, restricting an access of the updated image of the native image to the resources of the operating system of the device.
    Type: Grant
    Filed: May 25, 2016
    Date of Patent: October 4, 2016
    Assignee: AO Kaspersky Lab
    Inventors: Dmitry G. Ivanov, Nikita A. Pavlov, Dmitry V. Shvetsov, Mikhail A. Gorshenin
  • Patent number: 9384364
    Abstract: Disclosed is a system and method for controlling access of a native image of a machine code to resources of an operating system of a device. An example method includes obtaining the native image of the machine code; identifying a parent assembly from which the native image was created; determining a category of trust of the parent assembly; determining a category of trust of the native image based on the category of trust of the parent assembly; and restricting access of the native image that has an untrusted category of trust to the resources of the operating system of the device.
    Type: Grant
    Filed: July 28, 2015
    Date of Patent: July 5, 2016
    Assignee: AO Kaspersky Lab
    Inventors: Dmitry G. Ivanov, Nikita A. Pavlov, Dmitry V. Shvetsov, Mikhail A. Gorshenin