Patents by Inventor Evgeny Y. Eliseev

Evgeny Y. Eliseev has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10172004
    Abstract: Disclosed are systems and methods for selecting means for intercepting network transmissions. An exemplary method includes determining one or more rules associated with transmission of data by a device; determining one or more network transmission intercepting means that satisfy the one or more determined rules; selecting a network transmission intercepting means based on the determined one or more network transmission intercepting means; and causing transmissions by the device to be processed by the selected network transmission intercepting means.
    Type: Grant
    Filed: April 27, 2016
    Date of Patent: January 1, 2019
    Assignee: AO Kaspersky Lab
    Inventors: Konstantin M. Filatov, Evgeny Y. Eliseev, Victor V. Yablokov
  • Patent number: 9509833
    Abstract: Disclosed are systems and methods for controlling access to applications of a mobile device. An example method includes collecting, by a controlled shell of an OS of the mobile device, information about an application of the user device; determining a category designation of the application based on the collected information; determining, by the controlled shell, whether the category designation of the application complies with one or more rules of a usage policy of the mobile device; blocking user access to the application if it is determined that a rule exists prohibiting use of applications in the designated category or if no rule exists permitting use of the applications in the designated category; and permitting user access to the application if it is determined that a rule exists allowing use of applications in the designated category or if no rule exists prohibiting use of the applications in the designated category.
    Type: Grant
    Filed: June 24, 2014
    Date of Patent: November 29, 2016
    Assignee: AO Kaspersky Lab
    Inventors: Victor V. Yablokov, Evgeny Y. Eliseev
  • Publication number: 20160242037
    Abstract: Disclosed are systems and methods for selecting means for intercepting network transmissions. An exemplary method includes determining one or more rules associated with transmission of data by a device; determining one or more network transmission intercepting means that satisfy the one or more determined rules; selecting a network transmission intercepting means based on the determined one or more network transmission intercepting means; and causing transmissions by the device to be processed by the selected network transmission intercepting means.
    Type: Application
    Filed: April 27, 2016
    Publication date: August 18, 2016
    Inventors: Konstantin M. Filatov, Evgeny Y. Eliseev, Victor V. Yablokov
  • Publication number: 20160183094
    Abstract: Disclosed are systems and methods for selecting means for intercepting network transmissions. An example system includes a data collection module configured to determine one or more parameters of a network transmission and one or more parameters of a user device that receives the transmission; a data analysis module configured to determine characteristics of a plurality of network transmission intercepting means that provide different levels of security to intercepted network transmissions based on the determined transmission and user device parameters; a selection module configured to select out of the plurality of network transmission interception means one whose characteristics match to the parameters of the network transmission, parameters of the user device, and a required security level for the network transmission; and an installation module configured to install on the user device the selected network transmission interception means.
    Type: Application
    Filed: March 31, 2015
    Publication date: June 23, 2016
    Inventors: Konstantin M. Filatov, Evgeny Y. Eliseev, Victor V. Yablokov
  • Patent number: 9357394
    Abstract: Disclosed are systems and methods for selecting means for intercepting network transmissions. An example system includes a data collection module configured to determine one or more parameters of a network transmission and one or more parameters of a user device that receives the transmission; a data analysis module configured to determine characteristics of a plurality of network transmission intercepting means that provide different levels of security to intercepted network transmissions based on the determined transmission and user device parameters; a selection module configured to select out of the plurality of network transmission interception means one whose characteristics match to the parameters of the network transmission, parameters of the user device, and a required security level for the network transmission; and an installation module configured to install on the user device the selected network transmission interception means.
    Type: Grant
    Filed: March 31, 2015
    Date of Patent: May 31, 2016
    Assignee: AO Kaspersky Lab
    Inventors: Konstantin M. Filatov, Evgeny Y. Eliseev, Victor V. Yablokov
  • Patent number: 9230106
    Abstract: Disclosed system and methods for malware testing of software programs. An example method includes storing a plurality of malware trigger scenarios specifying different sets of malware trigger events known to trigger malicious behavior in software programs; in response to obtaining a software program, modifying a computer environment for operating the software program by creating malware trigger events associated with a selected one of the plurality of malware trigger scenarios; analyzing an execution of the software program in the modified computer environment in response to the malware trigger events; upon detecting that the software program exhibits malicious behavior, performing remedial actions on the software program; and upon detecting that the software program exhibits no malicious behavior, selecting a different malware trigger scenario from the plurality of malware trigger scenarios for malware testing of the software program.
    Type: Grant
    Filed: January 28, 2015
    Date of Patent: January 5, 2016
    Assignee: Kaspersky Lab AO
    Inventors: Evgeny Y. Eliseev, Victor V. Yablokov
  • Publication number: 20150341484
    Abstract: Disclosed are systems and methods for controlling access to applications of a mobile device. An example method includes collecting, by a controlled shell of an OS of the mobile device, information about an application of the user device; determining a category designation of the application based on the collected information; determining, by the controlled shell, whether the category designation of the application complies with one or more rules of a usage policy of the mobile device; blocking user access to the application if it is determined that a rule exists prohibiting use of applications in the designated category or if no rule exists permitting use of the applications in the designated category; and permitting user access to the application if it is determined that a rule exists allowing use of applications in the designated category or if no rule exists prohibiting use of the applications in the designated category.
    Type: Application
    Filed: June 24, 2014
    Publication date: November 26, 2015
    Inventors: Victor V. Yablokov, Evgeny Y. Eliseev
  • Patent number: 9183383
    Abstract: Disclosed are systems and methods for limiting the operation of trusted applications in presence of suspicious programs. An example method includes: identifying one or more trusted applications installed on a computer; collecting data about applications and programs installed on the computer; checking for the presence of one or more suspicious programs using suspicious program detection rules, wherein a program is considered to be suspicious when it can access protected information of a trusted application without authorization; and when at least one suspicious program is found, limiting the operation of the trusted application until the suspicious program is terminated or removed from the computer.
    Type: Grant
    Filed: February 17, 2015
    Date of Patent: November 10, 2015
    Assignee: AO Kaspersky Lab
    Inventors: Victor V. Yablokov, Konstantin M. Filatov, Evgeny Y. Eliseev, Roman S. Unuchek
  • Patent number: 9147069
    Abstract: Disclosed system and methods for protecting computer resources from unauthorized access. The system provides a library of handler functions that control access of applications to protected resources on a computer device. The system associates a security policy with the library to handler functions. The security policy specifies access rules for accessing protected resources by the applications. The system also modifies applications to access the library of handler functions instead of corresponding application program interface (API) functions of the computer device. When a handler function receives an API function call from a modified application, it may determine if the received API function call complies with the access rules. When the API function call complies with the access rules, the handler function performs the API function call from the application to the protected resources. When the API function call violates the access rules, the handler function block that API function call.
    Type: Grant
    Filed: September 27, 2013
    Date of Patent: September 29, 2015
    Assignee: AO Kaspersky Lab
    Inventors: Victor V. Yablokov, Evgeny Y. Eliseev
  • Patent number: 9098697
    Abstract: Disclosed system and methods for detecting malicious applications. The system provides a library of handler functions. The handlers functions control access of one or more applications to protected resources on a user device. The system also modifies the one or more applications to access the library of handler functions instead of corresponding application program interface (API) functions of the user device. The handler functions receive API function calls from a modified application. The system analyzes the received API function calls for malicious behavior characteristics. When the API function calls do not exhibit malicious behavior characteristics, the handler functions perform the API function calls to the protected resources. When the API function calls exhibit malicious behavior characteristics, the system prevents access of the modified application to the protected resources.
    Type: Grant
    Filed: September 27, 2013
    Date of Patent: August 4, 2015
    Assignee: Kaspersky Lab ZAO
    Inventors: Victor V. Yablokov, Evgeny Y. Eliseev
  • Publication number: 20150143521
    Abstract: Disclosed system and methods for malware testing of software programs. An example method includes storing a plurality of malware trigger scenarios specifying different sets of malware trigger events known to trigger malicious behaviour in software programs; in response to obtaining a software program, modifying a computer environment for operating the software program by creating malware trigger events associated with a selected one of the plurality of malware trigger scenarios; analyzing an execution of the software program in the modified computer environment in response to the malware trigger events; upon detecting that the software program exhibits malicious behaviour, performing remedial actions on the software program; and upon detecting that the software program exhibits no malicious behaviour, selecting a different malware trigger scenario from the plurality of malware trigger scenarios for malware testing of the software program.
    Type: Application
    Filed: January 28, 2015
    Publication date: May 21, 2015
    Inventors: Evgeny Y. Eliseev, Victor V. Yablokov
  • Patent number: 8978141
    Abstract: Disclosed system and methods for detecting malware by performing behavioral malware analysis using malware trigger scenarios. In one aspect, a method for malware detection includes providing a plurality of malware trigger scenarios specifying different sets of malware trigger events known to trigger malicious behavior in malicious software. The method further includes executing a software program in a computer environment and creating one more malware trigger events as specified in the malware trigger scenarios. The method further includes monitoring execution events of the software program in the computer environment and determining based on the analysis of the monitored execution events whether the software program exhibits malicious behavior. When the software program exhibits malicious behavior, performing remedial actions on the software program.
    Type: Grant
    Filed: October 12, 2013
    Date of Patent: March 10, 2015
    Assignee: Kaspersky Lab ZAO
    Inventors: Evgeny Y. Eliseev, Victor V. Yablokov
  • Patent number: 8966049
    Abstract: System and methods for the association of one or more devices over a computer network. A management agent module running on a device coupled to the network is configured to communicate with a server agent module running on a management server. An association linking the management agent with the server agent is created by the management server. Associations with device users and the agents managing the devices can also be made. Associations allow network administration commands and policy controls to be issued at a user, rather than device, level.
    Type: Grant
    Filed: April 10, 2014
    Date of Patent: February 24, 2015
    Assignee: Kaspersky Lab ZAO
    Inventors: Evgeny Y. Eliseev, Denis A. Minchenko, Andrey A. Pravdivy, Konstantin M. Filatov, Victor V. Yablokov
  • Publication number: 20150007325
    Abstract: Disclosed system and methods for detecting malware by performing behavioral malware analysis using malware trigger scenarios. In one aspect, a method for malware detection includes providing a plurality of malware trigger scenarios specifying different sets of malware trigger events known to trigger malicious behaviour in malicious software. The method further includes executing a software program in a computer environment and creating one more malware trigger events as specified in the malware trigger scenarios. The method further includes monitoring execution events of the software program in the computer environment and determining based on the analysis of the monitored execution events whether the software program exhibits malicious behaviour. When the software program exhibits malicious behaviour, performing remedial actions on the software program.
    Type: Application
    Filed: October 12, 2013
    Publication date: January 1, 2015
    Applicant: Kaspersky Lab ZAO
    Inventors: Evgeny Y. Eliseev, Victor V. Yablokov
  • Publication number: 20140181974
    Abstract: Disclosed system and methods for detecting malicious applications. The system provides a library of handler functions. The handlers functions control access of one or more applications to protected resources on a user device The system also modifies the one or more applications to access the library of handler functions instead of corresponding application program interface (API) functions of the user device. The handler functions receive API function calls from a modified application. The system analyzes the received API function calls for malicious behavior characteristics. When the. API function calls do not exhibit malicious behavior characteristics, the handier functions perform the API function calls to the protected resources. When the API function calls exhibit malicious behavior characteristics, the system prevents access of the modified application to the protected resources.
    Type: Application
    Filed: September 27, 2013
    Publication date: June 26, 2014
    Applicant: Kaspersky Lab ZAO
    Inventors: Victor V. Yablokov, Evgeny Y. Eliseev
  • Publication number: 20140181896
    Abstract: Disclosed system and methods for protecting computer resources from unauthorized access. The system provides a library of handler functions that control access of applications to protected resources on a computer device. The system associates a security policy with the library to handler functions. The security policy specifies access rules for accessing protected resources by the applications. The system also modifies applications to access the library of handler functions instead of corresponding application program interface (API) functions of the computer device. When a handler function receives an API function call from a modified application, it may determine if the received API function call complies with the access rules. When the API function call complies with the access rules, the handler function performs the API function call from the application to the protected resources. When the API function call violates the access rules, the handler function block that API function call.
    Type: Application
    Filed: September 27, 2013
    Publication date: June 26, 2014
    Applicant: Kaspersky Lab ZAO
    Inventors: Victor V. Yablokov, Evgeny Y. Eliseev