Patents by Inventor Dmitry G. Ivanov
Dmitry G. Ivanov has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12184760Abstract: Disclosed herein are systems and methods for granting a user data processor access to a cryptocontainer of user data. In one aspect, an exemplary method comprises, creating a cryptocontainer for user's data, wherein the cryptocontainer receives at least one element of the user's data and encrypts the element; for the user data processor, establishing rights for accessing the element using a first key, and forming at least one access structure, the forming including, placing the first key in the access structure based on the established rights, receiving, from the user data processor, a second key linked to the user data processor which is to be used for accessing the first key, and encrypting the first key with the second key; and when a request for access to the cryptocontainer is received, granting, to the user data processor, access to the cryptocontainer based on the formed at least one access structure.Type: GrantFiled: June 1, 2021Date of Patent: December 31, 2024Assignee: AO Kaspersky LabInventors: Sergey V. Kozlov, Andrey A. Efremov, Dmitry V. Shmoylov, Pavel V. Filonov, Dmitry G. Ivanov
-
Patent number: 11556670Abstract: Disclosed herein are systems and methods for granting access to data of a user. In one aspect, an exemplary method comprises, blocking the processing of data of a user, transferring the data of the user to a storage device, receiving a request for data processing from a collected data processor of a device, redirecting the received request to the storage device, determining, by the storage device, data access rights for the collected data processor of the device from which the request for data processing is received in accordance with data access rights established by a data access rights manager, and providing access to the data in accordance with the determined data access rights.Type: GrantFiled: March 17, 2021Date of Patent: January 17, 2023Assignee: AO Kaspersky LabInventors: Andrey A. Efremov, Dmitry V. Shmoylov, Pavel V. Filonov, Dmitry G. Ivanov
-
Patent number: 11522916Abstract: A method for defending a network of electronic devices from cyberattacks includes obtaining information about a plurality of devices and information about communication links between the plurality of devices and surrounding environment and determining types of the communication links using heuristic rules. The types of communication links are compared using corresponding link profiles. One or more similar communication links are identified based on the comparison. A cluster of devices is generated by combining a subset of the plurality of devices. The cluster includes one or more devices having one or more similar communication links. A surrounding environment profile is generated for the generated cluster of devices. When a cyberattack is detected on one of the devices in the cluster, the surrounding environment profile is modified for the cluster of devices in order to defend all devices in the cluster from the cyberattack.Type: GrantFiled: June 2, 2020Date of Patent: December 6, 2022Assignee: AO Kaspersky LabInventors: Dmitry G. Ivanov, Andrey V. Ladikov, Pavel V. Filonov
-
Patent number: 11388196Abstract: A method for analyzing relationships between clusters of devices includes selecting a first device from a first cluster of devices and selecting a second device from a second cluster of devices. Information related to a first communication link associated with the first device and information related to a second communication link associated with the second device is obtained. A similarity metric is computed based on the obtained information. The similarity metric represents a similarity between the first communication link and the second communication link associated with the second device. A relationship between the first and second clusters is determined using the computed similarity metric. When a cyberattack is detected on the devices in the first cluster or the second cluster, protection of all devices in the first cluster and the second cluster is modified based on the determined relationship in order to defend the respective clusters from the cyberattack.Type: GrantFiled: June 1, 2020Date of Patent: July 12, 2022Assignee: AO Kaspersky LabInventors: Dmitry G. Ivanov, Andrey V. Ladikov, Pavel V. Filonov
-
Publication number: 20220094531Abstract: Disclosed herein are systems and methods for granting a user data processor access to a cryptocontainer of user data. In one aspect, an exemplary method comprises, creating a cryptocontainer for user's data, wherein the cryptocontainer receives at least one element of the user's data and encrypts the element; for the user data processor, establishing rights for accessing the element using a first key, and forming at least one access structure, the forming including, placing the first key in the access structure based on the established rights, receiving, from the user data processor, a second key linked to the user data processor which is to be used for accessing the first key, and encrypting the first key with the second key; and when a request for access to the cryptocontainer is received, granting, to the user data processor, access to the cryptocontainer based on the formed at least one access structure.Type: ApplicationFiled: June 1, 2021Publication date: March 24, 2022Inventors: Sergey V. Kozlov, Andrey A. Efremov, Dmitry V. Shmoylov, Pavel V. Filonov, Dmitry G. Ivanov
-
Publication number: 20220092218Abstract: Disclosed herein are systems and methods for granting access to data of a user. In one aspect, an exemplary method comprises, blocking the processing of data of a user, transferring the data of the user to a storage device, receiving a request for data processing from a collected data processor of a device, redirecting the received request to the storage device, determining, by the storage device, data access rights for the collected data processor of the device from which the request for data processing is received in accordance with data access rights established by a data access rights manager, and providing access to the data in accordance with the determined data access rights.Type: ApplicationFiled: March 17, 2021Publication date: March 24, 2022Inventors: Andrey A. Efremov, Dmitry V. Shmoylov, Pavel V. Filonov, Dmitry G. Ivanov
-
Publication number: 20210099489Abstract: A method for defending a network of electronic devices from cyberattacks includes obtaining information about a plurality of devices and information about communication links between the plurality of devices and surrounding environment and determining types of the communication links using heuristic rules. The types of communication links are compared using corresponding link profiles. One or more similar communication links are identified based on the comparison. A cluster of devices is generated by combining a subset of the plurality of devices. The cluster includes one or more devices having one or more similar communication links. A surrounding environment profile is generated for the generated cluster of devices. When a cyberattack is detected on one of the devices in the cluster, the surrounding environment profile is modified for the cluster of devices in order to defend all devices in the cluster from the cyberattack.Type: ApplicationFiled: June 2, 2020Publication date: April 1, 2021Inventors: Dmitry G. Ivanov, Andrey V. Ladikov, Pavel V. Filonov
-
Publication number: 20210099480Abstract: A method for analyzing relationships between clusters of devices includes selecting a first device from a first cluster of devices and selecting a second device from a second cluster of devices. Information related to a first communication link associated with the first device and information related to a second communication link associated with the second device is obtained. A similarity metric is computed based on the obtained information. The similarity metric represents a similarity between the first communication link and the second communication link associated with the second device. A relationship between the first and second clusters is determined using the computed similarity metric. When a cyberattack is detected on the devices in the first cluster or the second cluster, protection of all devices in the first cluster and the second cluster is modified based on the determined relationship in order to defend the respective clusters from the cyberattack.Type: ApplicationFiled: June 1, 2020Publication date: April 1, 2021Inventors: Dmitry G. Ivanov, Andrey V. Ladikov, Pavel V. Filonov
-
Publication number: 20160292450Abstract: Disclosed is a system and method for controlling access of a native image of a machine code to resources of an operating system of a device. An example method includes obtaining the native image of the machine code; identifying a parent assembly from which the native image was created; determining and forming a correspondence between the native image and the parent assembly based at least upon a template; in response to detecting an update to the native image, generating an updated image of the native image; determining whether there is a correspondence between the updated image of the native image and the parent assembly based at least upon the template; and in response to detecting no correspondence between the updated image of the native image and the parent assembly, restricting an access of the updated image of the native image to the resources of the operating system of the device.Type: ApplicationFiled: May 25, 2016Publication date: October 6, 2016Inventors: Dmitry G. Ivanov, Nikita A. Pavlov, Dmitry V. Shvetsov, Mikhail A. Gorshenin
-
Patent number: 9460306Abstract: Disclosed is a system and method for controlling access of a native image of a machine code to resources of an operating system of a device. An example method includes obtaining the native image of the machine code; identifying a parent assembly from which the native image was created; determining and forming a correspondence between the native image and the parent assembly based at least upon a template; in response to detecting an update to the native image, generating an updated image of the native image; determining whether there is a correspondence between the updated image of the native image and the parent assembly based at least upon the template; and in response to detecting no correspondence between the updated image of the native image and the parent assembly, restricting an access of the updated image of the native image to the resources of the operating system of the device.Type: GrantFiled: May 25, 2016Date of Patent: October 4, 2016Assignee: AO Kaspersky LabInventors: Dmitry G. Ivanov, Nikita A. Pavlov, Dmitry V. Shvetsov, Mikhail A. Gorshenin
-
Patent number: 9384364Abstract: Disclosed is a system and method for controlling access of a native image of a machine code to resources of an operating system of a device. An example method includes obtaining the native image of the machine code; identifying a parent assembly from which the native image was created; determining a category of trust of the parent assembly; determining a category of trust of the native image based on the category of trust of the parent assembly; and restricting access of the native image that has an untrusted category of trust to the resources of the operating system of the device.Type: GrantFiled: July 28, 2015Date of Patent: July 5, 2016Assignee: AO Kaspersky LabInventors: Dmitry G. Ivanov, Nikita A. Pavlov, Dmitry V. Shvetsov, Mikhail A. Gorshenin