Patents by Inventor Evgeny Y. Eliseev
Evgeny Y. Eliseev has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10172004Abstract: Disclosed are systems and methods for selecting means for intercepting network transmissions. An exemplary method includes determining one or more rules associated with transmission of data by a device; determining one or more network transmission intercepting means that satisfy the one or more determined rules; selecting a network transmission intercepting means based on the determined one or more network transmission intercepting means; and causing transmissions by the device to be processed by the selected network transmission intercepting means.Type: GrantFiled: April 27, 2016Date of Patent: January 1, 2019Assignee: AO Kaspersky LabInventors: Konstantin M. Filatov, Evgeny Y. Eliseev, Victor V. Yablokov
-
Patent number: 9509833Abstract: Disclosed are systems and methods for controlling access to applications of a mobile device. An example method includes collecting, by a controlled shell of an OS of the mobile device, information about an application of the user device; determining a category designation of the application based on the collected information; determining, by the controlled shell, whether the category designation of the application complies with one or more rules of a usage policy of the mobile device; blocking user access to the application if it is determined that a rule exists prohibiting use of applications in the designated category or if no rule exists permitting use of the applications in the designated category; and permitting user access to the application if it is determined that a rule exists allowing use of applications in the designated category or if no rule exists prohibiting use of the applications in the designated category.Type: GrantFiled: June 24, 2014Date of Patent: November 29, 2016Assignee: AO Kaspersky LabInventors: Victor V. Yablokov, Evgeny Y. Eliseev
-
Publication number: 20160242037Abstract: Disclosed are systems and methods for selecting means for intercepting network transmissions. An exemplary method includes determining one or more rules associated with transmission of data by a device; determining one or more network transmission intercepting means that satisfy the one or more determined rules; selecting a network transmission intercepting means based on the determined one or more network transmission intercepting means; and causing transmissions by the device to be processed by the selected network transmission intercepting means.Type: ApplicationFiled: April 27, 2016Publication date: August 18, 2016Inventors: Konstantin M. Filatov, Evgeny Y. Eliseev, Victor V. Yablokov
-
Publication number: 20160183094Abstract: Disclosed are systems and methods for selecting means for intercepting network transmissions. An example system includes a data collection module configured to determine one or more parameters of a network transmission and one or more parameters of a user device that receives the transmission; a data analysis module configured to determine characteristics of a plurality of network transmission intercepting means that provide different levels of security to intercepted network transmissions based on the determined transmission and user device parameters; a selection module configured to select out of the plurality of network transmission interception means one whose characteristics match to the parameters of the network transmission, parameters of the user device, and a required security level for the network transmission; and an installation module configured to install on the user device the selected network transmission interception means.Type: ApplicationFiled: March 31, 2015Publication date: June 23, 2016Inventors: Konstantin M. Filatov, Evgeny Y. Eliseev, Victor V. Yablokov
-
Patent number: 9357394Abstract: Disclosed are systems and methods for selecting means for intercepting network transmissions. An example system includes a data collection module configured to determine one or more parameters of a network transmission and one or more parameters of a user device that receives the transmission; a data analysis module configured to determine characteristics of a plurality of network transmission intercepting means that provide different levels of security to intercepted network transmissions based on the determined transmission and user device parameters; a selection module configured to select out of the plurality of network transmission interception means one whose characteristics match to the parameters of the network transmission, parameters of the user device, and a required security level for the network transmission; and an installation module configured to install on the user device the selected network transmission interception means.Type: GrantFiled: March 31, 2015Date of Patent: May 31, 2016Assignee: AO Kaspersky LabInventors: Konstantin M. Filatov, Evgeny Y. Eliseev, Victor V. Yablokov
-
Patent number: 9230106Abstract: Disclosed system and methods for malware testing of software programs. An example method includes storing a plurality of malware trigger scenarios specifying different sets of malware trigger events known to trigger malicious behavior in software programs; in response to obtaining a software program, modifying a computer environment for operating the software program by creating malware trigger events associated with a selected one of the plurality of malware trigger scenarios; analyzing an execution of the software program in the modified computer environment in response to the malware trigger events; upon detecting that the software program exhibits malicious behavior, performing remedial actions on the software program; and upon detecting that the software program exhibits no malicious behavior, selecting a different malware trigger scenario from the plurality of malware trigger scenarios for malware testing of the software program.Type: GrantFiled: January 28, 2015Date of Patent: January 5, 2016Assignee: Kaspersky Lab AOInventors: Evgeny Y. Eliseev, Victor V. Yablokov
-
Publication number: 20150341484Abstract: Disclosed are systems and methods for controlling access to applications of a mobile device. An example method includes collecting, by a controlled shell of an OS of the mobile device, information about an application of the user device; determining a category designation of the application based on the collected information; determining, by the controlled shell, whether the category designation of the application complies with one or more rules of a usage policy of the mobile device; blocking user access to the application if it is determined that a rule exists prohibiting use of applications in the designated category or if no rule exists permitting use of the applications in the designated category; and permitting user access to the application if it is determined that a rule exists allowing use of applications in the designated category or if no rule exists prohibiting use of the applications in the designated category.Type: ApplicationFiled: June 24, 2014Publication date: November 26, 2015Inventors: Victor V. Yablokov, Evgeny Y. Eliseev
-
Patent number: 9183383Abstract: Disclosed are systems and methods for limiting the operation of trusted applications in presence of suspicious programs. An example method includes: identifying one or more trusted applications installed on a computer; collecting data about applications and programs installed on the computer; checking for the presence of one or more suspicious programs using suspicious program detection rules, wherein a program is considered to be suspicious when it can access protected information of a trusted application without authorization; and when at least one suspicious program is found, limiting the operation of the trusted application until the suspicious program is terminated or removed from the computer.Type: GrantFiled: February 17, 2015Date of Patent: November 10, 2015Assignee: AO Kaspersky LabInventors: Victor V. Yablokov, Konstantin M. Filatov, Evgeny Y. Eliseev, Roman S. Unuchek
-
Patent number: 9147069Abstract: Disclosed system and methods for protecting computer resources from unauthorized access. The system provides a library of handler functions that control access of applications to protected resources on a computer device. The system associates a security policy with the library to handler functions. The security policy specifies access rules for accessing protected resources by the applications. The system also modifies applications to access the library of handler functions instead of corresponding application program interface (API) functions of the computer device. When a handler function receives an API function call from a modified application, it may determine if the received API function call complies with the access rules. When the API function call complies with the access rules, the handler function performs the API function call from the application to the protected resources. When the API function call violates the access rules, the handler function block that API function call.Type: GrantFiled: September 27, 2013Date of Patent: September 29, 2015Assignee: AO Kaspersky LabInventors: Victor V. Yablokov, Evgeny Y. Eliseev
-
Patent number: 9098697Abstract: Disclosed system and methods for detecting malicious applications. The system provides a library of handler functions. The handlers functions control access of one or more applications to protected resources on a user device. The system also modifies the one or more applications to access the library of handler functions instead of corresponding application program interface (API) functions of the user device. The handler functions receive API function calls from a modified application. The system analyzes the received API function calls for malicious behavior characteristics. When the API function calls do not exhibit malicious behavior characteristics, the handler functions perform the API function calls to the protected resources. When the API function calls exhibit malicious behavior characteristics, the system prevents access of the modified application to the protected resources.Type: GrantFiled: September 27, 2013Date of Patent: August 4, 2015Assignee: Kaspersky Lab ZAOInventors: Victor V. Yablokov, Evgeny Y. Eliseev
-
Publication number: 20150143521Abstract: Disclosed system and methods for malware testing of software programs. An example method includes storing a plurality of malware trigger scenarios specifying different sets of malware trigger events known to trigger malicious behaviour in software programs; in response to obtaining a software program, modifying a computer environment for operating the software program by creating malware trigger events associated with a selected one of the plurality of malware trigger scenarios; analyzing an execution of the software program in the modified computer environment in response to the malware trigger events; upon detecting that the software program exhibits malicious behaviour, performing remedial actions on the software program; and upon detecting that the software program exhibits no malicious behaviour, selecting a different malware trigger scenario from the plurality of malware trigger scenarios for malware testing of the software program.Type: ApplicationFiled: January 28, 2015Publication date: May 21, 2015Inventors: Evgeny Y. Eliseev, Victor V. Yablokov
-
Patent number: 8978141Abstract: Disclosed system and methods for detecting malware by performing behavioral malware analysis using malware trigger scenarios. In one aspect, a method for malware detection includes providing a plurality of malware trigger scenarios specifying different sets of malware trigger events known to trigger malicious behavior in malicious software. The method further includes executing a software program in a computer environment and creating one more malware trigger events as specified in the malware trigger scenarios. The method further includes monitoring execution events of the software program in the computer environment and determining based on the analysis of the monitored execution events whether the software program exhibits malicious behavior. When the software program exhibits malicious behavior, performing remedial actions on the software program.Type: GrantFiled: October 12, 2013Date of Patent: March 10, 2015Assignee: Kaspersky Lab ZAOInventors: Evgeny Y. Eliseev, Victor V. Yablokov
-
Patent number: 8966049Abstract: System and methods for the association of one or more devices over a computer network. A management agent module running on a device coupled to the network is configured to communicate with a server agent module running on a management server. An association linking the management agent with the server agent is created by the management server. Associations with device users and the agents managing the devices can also be made. Associations allow network administration commands and policy controls to be issued at a user, rather than device, level.Type: GrantFiled: April 10, 2014Date of Patent: February 24, 2015Assignee: Kaspersky Lab ZAOInventors: Evgeny Y. Eliseev, Denis A. Minchenko, Andrey A. Pravdivy, Konstantin M. Filatov, Victor V. Yablokov
-
Publication number: 20150007325Abstract: Disclosed system and methods for detecting malware by performing behavioral malware analysis using malware trigger scenarios. In one aspect, a method for malware detection includes providing a plurality of malware trigger scenarios specifying different sets of malware trigger events known to trigger malicious behaviour in malicious software. The method further includes executing a software program in a computer environment and creating one more malware trigger events as specified in the malware trigger scenarios. The method further includes monitoring execution events of the software program in the computer environment and determining based on the analysis of the monitored execution events whether the software program exhibits malicious behaviour. When the software program exhibits malicious behaviour, performing remedial actions on the software program.Type: ApplicationFiled: October 12, 2013Publication date: January 1, 2015Applicant: Kaspersky Lab ZAOInventors: Evgeny Y. Eliseev, Victor V. Yablokov
-
Publication number: 20140181974Abstract: Disclosed system and methods for detecting malicious applications. The system provides a library of handler functions. The handlers functions control access of one or more applications to protected resources on a user device The system also modifies the one or more applications to access the library of handler functions instead of corresponding application program interface (API) functions of the user device. The handler functions receive API function calls from a modified application. The system analyzes the received API function calls for malicious behavior characteristics. When the. API function calls do not exhibit malicious behavior characteristics, the handier functions perform the API function calls to the protected resources. When the API function calls exhibit malicious behavior characteristics, the system prevents access of the modified application to the protected resources.Type: ApplicationFiled: September 27, 2013Publication date: June 26, 2014Applicant: Kaspersky Lab ZAOInventors: Victor V. Yablokov, Evgeny Y. Eliseev
-
Publication number: 20140181896Abstract: Disclosed system and methods for protecting computer resources from unauthorized access. The system provides a library of handler functions that control access of applications to protected resources on a computer device. The system associates a security policy with the library to handler functions. The security policy specifies access rules for accessing protected resources by the applications. The system also modifies applications to access the library of handler functions instead of corresponding application program interface (API) functions of the computer device. When a handler function receives an API function call from a modified application, it may determine if the received API function call complies with the access rules. When the API function call complies with the access rules, the handler function performs the API function call from the application to the protected resources. When the API function call violates the access rules, the handler function block that API function call.Type: ApplicationFiled: September 27, 2013Publication date: June 26, 2014Applicant: Kaspersky Lab ZAOInventors: Victor V. Yablokov, Evgeny Y. Eliseev