Patents by Inventor Gregory Vilshansky

Gregory Vilshansky has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10320787
    Abstract: A system and method for facilitating identification of an attacking computer in a network is provided. A user attempting to login to a network application may be presented with a screen prior to the login which lists preconditions of gaining access to the application. If a user concurs with the preconditions, a security module is downloaded to the user's computer and executed which gathers various configuration settings and transmits the gathered information to a predetermined destination. The security module may also attempt to place a call to a predetermined destination over a modem in the computer to cause registration of caller-ID data when answered at the predetermined destination. Once the security check is completed, login may proceed with the network application. Any data gathered by the security module may be stored for later recall and use to identify the computer in the event of an attack.
    Type: Grant
    Filed: December 15, 2017
    Date of Patent: June 11, 2019
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Dmitry Andreev, Galina Grunin, Gregory Vilshansky
  • Publication number: 20180109523
    Abstract: A system and method for facilitating identification of an attacking computer in a network is provided. A user attempting to login to a network application may be presented with a screen prior to the login which lists preconditions of gaining access to the application. If a user concurs with the preconditions, a security module is downloaded to the user's computer and executed which gathers various configuration settings and transmits the gathered information to a predetermined destination. The security module may also attempt to place a call to a predetermined destination over a modem in the computer to cause registration of caller-ID data when answered at the predetermined destination. Once the security check is completed, login may proceed with the network application. Any data gathered by the security module may be stored for later recall and use to identify the computer in the event of an attack.
    Type: Application
    Filed: December 15, 2017
    Publication date: April 19, 2018
    Inventors: Dmitry Andreev, Galina Grunin, Gregory Vilshansky
  • Patent number: 9923894
    Abstract: A system and method for facilitating identification of an attacking computer in a network is provided. A user attempting to login to a network application may be presented with a screen prior to the login which lists preconditions of gaining access to the application. If a user concurs with the preconditions, a security module is downloaded to the user's computer and executed which gathers various configuration settings and transmits the gathered information to a predetermined destination. The security module may also attempt to place a call to a predetermined destination over a modem in the computer to cause registration of caller-ID data when answered at the predetermined destination. Once the security check is completed, login may proceed with the network application. Any data gathered by the security module may be stored for later recall and use to identify the computer in the event of an attack.
    Type: Grant
    Filed: February 7, 2017
    Date of Patent: March 20, 2018
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Dmitry Andreev, Galina Grunin, Gregory Vilshansky
  • Patent number: 9742619
    Abstract: A program product and system that implements a method for adding an Information Technology (IT) structure A to an IT structure X. A first list of all dependencies of elements in a composition of X is received. It is determined that no dependency of any element E in the composition of X in the first list has an exclusion with a class Y to which A belongs. A second list of all dependencies of A is received. It is determined that no dependency of A in the second list has an exclusion with a class Z to which an element E in the composition of X belongs. It is determined that no dependency of any element E in the composition of X in the first list has an exclusion with a class Y to which A belongs and ensuring that A's dependencies are satisfied followed by adding A to X.
    Type: Grant
    Filed: January 6, 2014
    Date of Patent: August 22, 2017
    Assignee: International Business Machines Corporation
    Inventors: Dmitry Andreev, Paul G. Greenstein, Galina Grunin, Gregory Vilshansky
  • Publication number: 20170149779
    Abstract: A system and method for facilitating identification of an attacking computer in a network is provided. A user attempting to login to a network application may be presented with a screen prior to the login which lists preconditions of gaining access to the application. If a user concurs with the preconditions, a security module is downloaded to the user's computer and executed which gathers various configuration settings and transmits the gathered information to a predetermined destination. The security module may also attempt to place a call to a predetermined destination over a modem in the computer to cause registration of caller-ID data when answered at the predetermined destination. Once the security check is completed, login may proceed with the network application. Any data gathered by the security module may be stored for later recall and use to identify the computer in the event of an attack.
    Type: Application
    Filed: February 7, 2017
    Publication date: May 25, 2017
    Inventors: Dmitry Andreev, Galina Grunin, Gregory Vilshansky
  • Patent number: 9602489
    Abstract: A system and method for facilitating identification of an attacking computer in a network is provided. A user attempting to login to a network application may be presented with a screen prior to the login which lists preconditions of gaining access to the application. If a user concurs with the preconditions, a security module is downloaded to the user's computer and executed which gathers various configuration settings and transmits the gathered information to a predetermined destination. The security module may also attempt to place a call to a predetermined destination over a modem in the computer to cause registration of caller-ID data when answered at the predetermined destination. Once the security check is completed, login may proceed with the network application. Any data gathered by the security module may be stored for later recall and use to identify the computer in the event of an attack.
    Type: Grant
    Filed: October 22, 2014
    Date of Patent: March 21, 2017
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Dmitry Andreev, Galina Grunin, Gregory Vilshansky
  • Publication number: 20150040191
    Abstract: A system and method for facilitating identification of an attacking computer in a network is provided. A user attempting to login to a network application may be presented with a screen prior to the login which lists preconditions of gaining access to the application. If a user concurs with the preconditions, a security module is downloaded to the user's computer and executed which gathers various configuration settings and transmits the gathered information to a predetermined destination. The security module may also attempt to place a call to a predetermined destination over a modem in the computer to cause registration of caller-ID data when answered at the predetermined destination. Once the security check is completed, login may proceed with the network application. Any data gathered by the security module may be stored for later recall and use to identify the computer in the event of an attack.
    Type: Application
    Filed: October 22, 2014
    Publication date: February 5, 2015
    Inventors: Dmitry Andreev, Galina Grunin, Gregory Vilshansky
  • Patent number: 8914644
    Abstract: A system and method for facilitating identification of an attacking computer in a network is provided. A user attempting to login to a network application may be presented with a screen prior to the login which lists preconditions of gaining access to the application. If a user concurs with the preconditions, a security module is downloaded to the user's computer and executed which gathers various configuration settings and transmits the gathered information to a predetermined destination. The security module may also attempt to place a call to a predetermined destination over a modem in the computer to cause registration of caller-ID data when answered at the predetermined destination. Once the security check is completed, login may proceed with the network application. Any data gathered by the security module may be stored for later recall and use to identify the computer in the event of an attack.
    Type: Grant
    Filed: September 12, 2013
    Date of Patent: December 16, 2014
    Assignee: International Business Machines Corporation
    Inventors: Dmitry Andreev, Galina Grunin, Gregory Vilshansky
  • Publication number: 20140122686
    Abstract: A program product and system that implements a method for adding an Information Technology (IT) structure A to an IT structure X. A first list of all dependencies of elements in a composition of X is received. It is determined that no dependency of any element E in the composition of X in the first list has an exclusion with a class Y to which A belongs. A second list of all dependencies of A is received. It is determined that no dependency of A in the second list has an exclusion with a class Z to which an element E in the composition of X belongs. It is determined that no dependency of any element E in the composition of X in the first list has an exclusion with a class Y to which A belongs and ensuring that A's dependencies are satisfied followed by adding A to X.
    Type: Application
    Filed: January 6, 2014
    Publication date: May 1, 2014
    Applicant: International Business Machines Corporation
    Inventors: Dmitry Andreev, Paul G. Greenstein, Galina Grunin, Gregory Vilshansky
  • Patent number: 8645513
    Abstract: A method and associated computer program product for developing an Information Technology (IT) system. An abstract IT structure for the IT system is provided. A virtual IT structure for the IT system is generated from the abstract IT structure by a translator. A real IT structure for the IT system is generated from the virtual IT structure.
    Type: Grant
    Filed: December 14, 2004
    Date of Patent: February 4, 2014
    Assignee: International Business Machines Corporation
    Inventors: Dmitry Andreev, Paul G. Greenstein, Galina Grunin, Gregory Vilshansky
  • Publication number: 20140013393
    Abstract: A system and method for facilitating identification of an attacking computer in a network is provided. A user attempting to login to a network application may be presented with a screen prior to the login which lists preconditions of gaining access to the application. If a user concurs with the preconditions, a security module is downloaded to the user's computer and executed which gathers various configuration settings and transmits the gathered information to a predetermined destination. The security module may also attempt to place a call to a predetermined destination over a modem in the computer to cause registration of caller-ID data when answered at the predetermined destination. Once the security check is completed, login may proceed with the network application. Any data gathered by the security module may be stored for later recall and use to identify the computer in the event of an attack.
    Type: Application
    Filed: September 12, 2013
    Publication date: January 9, 2014
    Applicant: International Business Machines Corporation
    Inventors: Dmitry Andreev, Galina Grunin, Gregory Vilshansky
  • Patent number: 8626887
    Abstract: A method and system for porting an abstract Information Technology (IT) structure into an IT delivery environment. An abstract IT structure A that is currently within an IT delivery environment X is translated by generating a virtual IT structure V from the abstract IT structure A through specification of an IT delivery environment Y. Delivery binding the virtual IT structure V to the IT delivery environment Y generates a delivery-bound virtual IT structure D. The delivery-bound virtual IT structure D is deployed in the IT delivery environment Y, resulting in a real IT structure instance R capable of operating in the IT delivery environment Y.
    Type: Grant
    Filed: June 13, 2006
    Date of Patent: January 7, 2014
    Assignee: International Business Machines Corporation
    Inventors: Dmitry Andreev, Paul Gregory Greenstein, Gregory Vilshansky
  • Patent number: 8621229
    Abstract: A system and method for facilitating identification of an attacking computer in a network is provided. A user attempting to login to a network application may be presented with a screen prior to the login which lists preconditions of gaining access to the application. If a user concurs with the preconditions, a security module is downloaded to the user's computer and executed which gathers various configuration settings and transmits the gathered information to a predetermined destination. The security module may also attempt to place a call to a predetermined destination over a modem in the computer to cause registration of caller-ID data when answered at the predetermined destination. Once the security check is completed, login may proceed with the network application. Any data gathered by the security module may be stored for later recall and use to identify the computer in the event of an attack.
    Type: Grant
    Filed: March 2, 2012
    Date of Patent: December 31, 2013
    Assignee: International Business Machines Corporation
    Inventors: Dmitry Andreev, Galina Grunin, Gregory Vilshansky
  • Patent number: 8578470
    Abstract: Computer security processes include displaying information elements on a computer display screen. Some of the information elements are mapped to corresponding parameters. The computer security processes also include receiving a selected information element from the information elements displayed on the computer display screen, and determining a value of a parameter associated with the selected information element based on a condition. The value of the parameter is changeable according to changes in the condition. The computer security processes further include comparing the selected information element with the value of the parameter, and upon determining the value of the parameter matches the selected information element, providing a user with access to a system resource.
    Type: Grant
    Filed: March 16, 2011
    Date of Patent: November 5, 2013
    Assignee: International Business Machines Corporation
    Inventors: Galina Grunin, Dmitry A. Rekesh, Gregory Vilshansky
  • Patent number: 8423613
    Abstract: A messaging system and associated computer program product. The messaging system includes a plurality of browsers connected through a common server. The server includes a message engine for receiving from a first user browser a request to enter chat mode with a second user browser; then receiving asynchronously from the second user browser a request to download any content from the common server or any other intranet or Internet server; and responding to the request from the second user browser with content modified to instantiate a chat session between the first and second user browsers.
    Type: Grant
    Filed: January 15, 2010
    Date of Patent: April 16, 2013
    Assignee: International Business Machines Corporation
    Inventors: Dmitrii Andreev, Gregory Vilshansky
  • Patent number: 8364957
    Abstract: A method and system is provided to provide single sign on (SSO) functionality in a network that avoids storing a user's credentials in persistent storage. A session may be initiated with a portal which sends a session ID derivative as a credential string instead of a user's password to a target application. When the target application attempts to authenticate the user, by sending a request to a LDAP directory, the request is intercepted by a LDAP proxy that instead validates the UserID with the LDAP directory and the password is validated by a credential validator component which verifies with the portal that the credential string presented as the user password has been produced from the active session ID. In an embodiment, the credential string validator validates each short-living credential only once and upon detecting a second validation request for the same string, initiates a security breech process.
    Type: Grant
    Filed: March 2, 2004
    Date of Patent: January 29, 2013
    Assignee: International Business Machines Corporation
    Inventors: Dmitry Andreev, Gregory Vilshansky, Boris Vishnevsky
  • Publication number: 20120240217
    Abstract: Computer security processes include displaying information elements on a computer display screen. Some of the information elements are mapped to corresponding parameters. The computer security processes also include receiving a selected information element from the information elements displayed on the computer display screen, and determining a value of a parameter associated with the selected information element based on a condition. The value of the parameter is changeable according to changes in the condition. The computer security processes further include comparing the selected information element with the value of the parameter, and upon determining the value of the parameter matches the selected information element, providing a user with access to a system resource.
    Type: Application
    Filed: March 16, 2011
    Publication date: September 20, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Galina Grunin, Dmitry A. Rekesh, Gregory Vilshansky
  • Publication number: 20120167215
    Abstract: A system and method for facilitating identification of an attacking computer in a network is provided. A user attempting to login to a network application may be presented with a screen prior to the login which lists preconditions of gaining access to the application. If a user concurs with the preconditions, a security module is downloaded to the user's computer and executed which gathers various configuration settings and transmits the gathered information to a predetermined destination. The security module may also attempt to place a call to a predetermined destination over a modem in the computer to cause registration of caller-ID data when answered at the predetermined destination. Once the security check is completed, login may proceed with the network application. Any data gathered by the security module may be stored for later recall and use to identify the computer in the event of an attack.
    Type: Application
    Filed: March 2, 2012
    Publication date: June 28, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Dmitry Andreev, Galina Grunin, Gregory Vilshansky
  • Patent number: 8209700
    Abstract: The present invention is directed to a method, system, and computer program product for providing local load balancing for high-availability servers. In particular, the present invention is based on the use of an HACMP cluster of servers (for high availability) each running an instance of a TCP splitter (for load balancing). A cluster of servers is provided, wherein a Transport Control Protocol (TCP) splitter runs on each of the servers. Each TCP splitter is configured to split an incoming data stream to a respective server among a plurality of the servers for processing. Each server in the cluster has a different routable Internet Protocol (IP) address. Upon a failure of a server, the IP address of the failed server is reassigned to another server in the cluster.
    Type: Grant
    Filed: December 22, 2005
    Date of Patent: June 26, 2012
    Assignee: International Business Machines Corporation
    Inventors: Dmitry Andreev, Thomas M. Dauffenbach, Galina Grunin, Gregory Vilshansky
  • Patent number: 8195952
    Abstract: A system and method for facilitating identification of an attacking computer in a network is provided. A user attempting to login to a network application may be presented with a screen prior to the login which lists preconditions of gaining access to the application. If a user concurs with the preconditions, a security module is downloaded to the user's computer and executed which gathers various configuration settings and transmits the gathered information to a predetermined destination. The security module may also attempt to place a call to a predetermined destination over a modem in the computer to cause registration of caller-ID data when answered at the predetermined destination. Once the security check is completed, login may proceed with the network application. Any data gathered by the security module may be stored for later recall and use to identify the computer in the event of an attack.
    Type: Grant
    Filed: December 14, 2004
    Date of Patent: June 5, 2012
    Assignee: International Business Machines Corporation
    Inventors: Dmitry Andreev, Galina Grunin, Gregory Vilshansky