Patents by Inventor Dzmitry Konanka

Dzmitry Konanka has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8769268
    Abstract: System and methods providing secure workspace sessions is described. In one embodiment a method for providing multiple workspace sessions for securely running applications comprises steps of: initiating a first workspace session on an existing operating system instance running on the computer system, the first workspace session having a first set of privileges for running applications under that session; while the first workspace session remains active, initiating a second workspace session on the existing operating system instance running on the computer system, the second workspace session having a second set of privileges for running applications under the second workplace session; and securing the second workspace session so that applications running under the second workplace session are protected from applications running outside the second workspace session.
    Type: Grant
    Filed: July 20, 2007
    Date of Patent: July 1, 2014
    Assignee: Check Point Software Technologies, Inc.
    Inventors: Artiom Morozov, Dzmitry Konanka
  • Patent number: 7725737
    Abstract: System and methodology providing a secure workspace environment is described. In one embodiment, for example, in a computer system, a method is described for creating a secured workspace within an existing operating system for allowing users to run applications in a secured manner, the method comprises steps of: creating a policy for configuring the secured workspace, the policy specifying how information created during operation of the applications may be accessed; hooking particular functions of the operating system in order to obtain control over the information created during operation of the applications; during operation of the applications, encrypting the information to prevent unauthorized access; in response to a request for access to the information, determining whether the request complies with the policy; and if the request complies with the policy, satisfying the request by providing access to a decrypted copy of the information.
    Type: Grant
    Filed: October 14, 2005
    Date of Patent: May 25, 2010
    Assignee: Check Point Software Technologies, Inc.
    Inventors: Dzmitry Konanka, Andrei Liahuski
  • Publication number: 20100024036
    Abstract: System and methods providing secure workspace sessions is described. In one embodiment a method for providing multiple workspace sessions for securely running applications comprises steps of: initiating a first workspace session on an existing operating system instance running on the computer system, the first workspace session having a first set of privileges for running applications under that session; while the first workspace session remains active, initiating a second workspace session on the existing operating system instance running on the computer system, the second workspace session having a second set of privileges for running applications under the second workplace session; and securing the second workspace session so that applications running under the second workplace session are protected from applications running outside the second workspace session.
    Type: Application
    Filed: July 20, 2007
    Publication date: January 28, 2010
    Applicant: CHECK POINT SOFTWARE TECHNOLOGIES, INC.
    Inventors: Artiom Morozov, Dzmitry Konanka
  • Publication number: 20070101435
    Abstract: System and methodology providing a secure workspace environment is described. In one embodiment, for example, in a computer system, a method is described for creating a secured workspace within an existing operating system for allowing users to run applications in a secured manner, the method comprises steps of: creating a policy for configuring the secured workspace, the policy specifying how information created during operation of the applications may be accessed; hooking particular functions of the operating system in order to obtain control over the information created during operation of the applications; during operation of the applications, encrypting the information to prevent unauthorized access; in response to a request for access to the information, determining whether the request complies with the policy; and if the request complies with the policy, satisfying the request by providing access to a decrypted copy of the information.
    Type: Application
    Filed: October 14, 2005
    Publication date: May 3, 2007
    Applicant: CHECK POINT SOFTWARE TECHNOLOGIES, INC.
    Inventors: Dzmitry Konanka, Andrei Liahuski