Patents by Inventor Gregory Vilshansky
Gregory Vilshansky has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10320787Abstract: A system and method for facilitating identification of an attacking computer in a network is provided. A user attempting to login to a network application may be presented with a screen prior to the login which lists preconditions of gaining access to the application. If a user concurs with the preconditions, a security module is downloaded to the user's computer and executed which gathers various configuration settings and transmits the gathered information to a predetermined destination. The security module may also attempt to place a call to a predetermined destination over a modem in the computer to cause registration of caller-ID data when answered at the predetermined destination. Once the security check is completed, login may proceed with the network application. Any data gathered by the security module may be stored for later recall and use to identify the computer in the event of an attack.Type: GrantFiled: December 15, 2017Date of Patent: June 11, 2019Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Dmitry Andreev, Galina Grunin, Gregory Vilshansky
-
Publication number: 20180109523Abstract: A system and method for facilitating identification of an attacking computer in a network is provided. A user attempting to login to a network application may be presented with a screen prior to the login which lists preconditions of gaining access to the application. If a user concurs with the preconditions, a security module is downloaded to the user's computer and executed which gathers various configuration settings and transmits the gathered information to a predetermined destination. The security module may also attempt to place a call to a predetermined destination over a modem in the computer to cause registration of caller-ID data when answered at the predetermined destination. Once the security check is completed, login may proceed with the network application. Any data gathered by the security module may be stored for later recall and use to identify the computer in the event of an attack.Type: ApplicationFiled: December 15, 2017Publication date: April 19, 2018Inventors: Dmitry Andreev, Galina Grunin, Gregory Vilshansky
-
Patent number: 9923894Abstract: A system and method for facilitating identification of an attacking computer in a network is provided. A user attempting to login to a network application may be presented with a screen prior to the login which lists preconditions of gaining access to the application. If a user concurs with the preconditions, a security module is downloaded to the user's computer and executed which gathers various configuration settings and transmits the gathered information to a predetermined destination. The security module may also attempt to place a call to a predetermined destination over a modem in the computer to cause registration of caller-ID data when answered at the predetermined destination. Once the security check is completed, login may proceed with the network application. Any data gathered by the security module may be stored for later recall and use to identify the computer in the event of an attack.Type: GrantFiled: February 7, 2017Date of Patent: March 20, 2018Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Dmitry Andreev, Galina Grunin, Gregory Vilshansky
-
Patent number: 9742619Abstract: A program product and system that implements a method for adding an Information Technology (IT) structure A to an IT structure X. A first list of all dependencies of elements in a composition of X is received. It is determined that no dependency of any element E in the composition of X in the first list has an exclusion with a class Y to which A belongs. A second list of all dependencies of A is received. It is determined that no dependency of A in the second list has an exclusion with a class Z to which an element E in the composition of X belongs. It is determined that no dependency of any element E in the composition of X in the first list has an exclusion with a class Y to which A belongs and ensuring that A's dependencies are satisfied followed by adding A to X.Type: GrantFiled: January 6, 2014Date of Patent: August 22, 2017Assignee: International Business Machines CorporationInventors: Dmitry Andreev, Paul G. Greenstein, Galina Grunin, Gregory Vilshansky
-
Publication number: 20170149779Abstract: A system and method for facilitating identification of an attacking computer in a network is provided. A user attempting to login to a network application may be presented with a screen prior to the login which lists preconditions of gaining access to the application. If a user concurs with the preconditions, a security module is downloaded to the user's computer and executed which gathers various configuration settings and transmits the gathered information to a predetermined destination. The security module may also attempt to place a call to a predetermined destination over a modem in the computer to cause registration of caller-ID data when answered at the predetermined destination. Once the security check is completed, login may proceed with the network application. Any data gathered by the security module may be stored for later recall and use to identify the computer in the event of an attack.Type: ApplicationFiled: February 7, 2017Publication date: May 25, 2017Inventors: Dmitry Andreev, Galina Grunin, Gregory Vilshansky
-
Patent number: 9602489Abstract: A system and method for facilitating identification of an attacking computer in a network is provided. A user attempting to login to a network application may be presented with a screen prior to the login which lists preconditions of gaining access to the application. If a user concurs with the preconditions, a security module is downloaded to the user's computer and executed which gathers various configuration settings and transmits the gathered information to a predetermined destination. The security module may also attempt to place a call to a predetermined destination over a modem in the computer to cause registration of caller-ID data when answered at the predetermined destination. Once the security check is completed, login may proceed with the network application. Any data gathered by the security module may be stored for later recall and use to identify the computer in the event of an attack.Type: GrantFiled: October 22, 2014Date of Patent: March 21, 2017Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Dmitry Andreev, Galina Grunin, Gregory Vilshansky
-
Publication number: 20150040191Abstract: A system and method for facilitating identification of an attacking computer in a network is provided. A user attempting to login to a network application may be presented with a screen prior to the login which lists preconditions of gaining access to the application. If a user concurs with the preconditions, a security module is downloaded to the user's computer and executed which gathers various configuration settings and transmits the gathered information to a predetermined destination. The security module may also attempt to place a call to a predetermined destination over a modem in the computer to cause registration of caller-ID data when answered at the predetermined destination. Once the security check is completed, login may proceed with the network application. Any data gathered by the security module may be stored for later recall and use to identify the computer in the event of an attack.Type: ApplicationFiled: October 22, 2014Publication date: February 5, 2015Inventors: Dmitry Andreev, Galina Grunin, Gregory Vilshansky
-
Patent number: 8914644Abstract: A system and method for facilitating identification of an attacking computer in a network is provided. A user attempting to login to a network application may be presented with a screen prior to the login which lists preconditions of gaining access to the application. If a user concurs with the preconditions, a security module is downloaded to the user's computer and executed which gathers various configuration settings and transmits the gathered information to a predetermined destination. The security module may also attempt to place a call to a predetermined destination over a modem in the computer to cause registration of caller-ID data when answered at the predetermined destination. Once the security check is completed, login may proceed with the network application. Any data gathered by the security module may be stored for later recall and use to identify the computer in the event of an attack.Type: GrantFiled: September 12, 2013Date of Patent: December 16, 2014Assignee: International Business Machines CorporationInventors: Dmitry Andreev, Galina Grunin, Gregory Vilshansky
-
Publication number: 20140122686Abstract: A program product and system that implements a method for adding an Information Technology (IT) structure A to an IT structure X. A first list of all dependencies of elements in a composition of X is received. It is determined that no dependency of any element E in the composition of X in the first list has an exclusion with a class Y to which A belongs. A second list of all dependencies of A is received. It is determined that no dependency of A in the second list has an exclusion with a class Z to which an element E in the composition of X belongs. It is determined that no dependency of any element E in the composition of X in the first list has an exclusion with a class Y to which A belongs and ensuring that A's dependencies are satisfied followed by adding A to X.Type: ApplicationFiled: January 6, 2014Publication date: May 1, 2014Applicant: International Business Machines CorporationInventors: Dmitry Andreev, Paul G. Greenstein, Galina Grunin, Gregory Vilshansky
-
Patent number: 8645513Abstract: A method and associated computer program product for developing an Information Technology (IT) system. An abstract IT structure for the IT system is provided. A virtual IT structure for the IT system is generated from the abstract IT structure by a translator. A real IT structure for the IT system is generated from the virtual IT structure.Type: GrantFiled: December 14, 2004Date of Patent: February 4, 2014Assignee: International Business Machines CorporationInventors: Dmitry Andreev, Paul G. Greenstein, Galina Grunin, Gregory Vilshansky
-
Publication number: 20140013393Abstract: A system and method for facilitating identification of an attacking computer in a network is provided. A user attempting to login to a network application may be presented with a screen prior to the login which lists preconditions of gaining access to the application. If a user concurs with the preconditions, a security module is downloaded to the user's computer and executed which gathers various configuration settings and transmits the gathered information to a predetermined destination. The security module may also attempt to place a call to a predetermined destination over a modem in the computer to cause registration of caller-ID data when answered at the predetermined destination. Once the security check is completed, login may proceed with the network application. Any data gathered by the security module may be stored for later recall and use to identify the computer in the event of an attack.Type: ApplicationFiled: September 12, 2013Publication date: January 9, 2014Applicant: International Business Machines CorporationInventors: Dmitry Andreev, Galina Grunin, Gregory Vilshansky
-
Patent number: 8626887Abstract: A method and system for porting an abstract Information Technology (IT) structure into an IT delivery environment. An abstract IT structure A that is currently within an IT delivery environment X is translated by generating a virtual IT structure V from the abstract IT structure A through specification of an IT delivery environment Y. Delivery binding the virtual IT structure V to the IT delivery environment Y generates a delivery-bound virtual IT structure D. The delivery-bound virtual IT structure D is deployed in the IT delivery environment Y, resulting in a real IT structure instance R capable of operating in the IT delivery environment Y.Type: GrantFiled: June 13, 2006Date of Patent: January 7, 2014Assignee: International Business Machines CorporationInventors: Dmitry Andreev, Paul Gregory Greenstein, Gregory Vilshansky
-
Patent number: 8621229Abstract: A system and method for facilitating identification of an attacking computer in a network is provided. A user attempting to login to a network application may be presented with a screen prior to the login which lists preconditions of gaining access to the application. If a user concurs with the preconditions, a security module is downloaded to the user's computer and executed which gathers various configuration settings and transmits the gathered information to a predetermined destination. The security module may also attempt to place a call to a predetermined destination over a modem in the computer to cause registration of caller-ID data when answered at the predetermined destination. Once the security check is completed, login may proceed with the network application. Any data gathered by the security module may be stored for later recall and use to identify the computer in the event of an attack.Type: GrantFiled: March 2, 2012Date of Patent: December 31, 2013Assignee: International Business Machines CorporationInventors: Dmitry Andreev, Galina Grunin, Gregory Vilshansky
-
Patent number: 8578470Abstract: Computer security processes include displaying information elements on a computer display screen. Some of the information elements are mapped to corresponding parameters. The computer security processes also include receiving a selected information element from the information elements displayed on the computer display screen, and determining a value of a parameter associated with the selected information element based on a condition. The value of the parameter is changeable according to changes in the condition. The computer security processes further include comparing the selected information element with the value of the parameter, and upon determining the value of the parameter matches the selected information element, providing a user with access to a system resource.Type: GrantFiled: March 16, 2011Date of Patent: November 5, 2013Assignee: International Business Machines CorporationInventors: Galina Grunin, Dmitry A. Rekesh, Gregory Vilshansky
-
Patent number: 8423613Abstract: A messaging system and associated computer program product. The messaging system includes a plurality of browsers connected through a common server. The server includes a message engine for receiving from a first user browser a request to enter chat mode with a second user browser; then receiving asynchronously from the second user browser a request to download any content from the common server or any other intranet or Internet server; and responding to the request from the second user browser with content modified to instantiate a chat session between the first and second user browsers.Type: GrantFiled: January 15, 2010Date of Patent: April 16, 2013Assignee: International Business Machines CorporationInventors: Dmitrii Andreev, Gregory Vilshansky
-
Patent number: 8364957Abstract: A method and system is provided to provide single sign on (SSO) functionality in a network that avoids storing a user's credentials in persistent storage. A session may be initiated with a portal which sends a session ID derivative as a credential string instead of a user's password to a target application. When the target application attempts to authenticate the user, by sending a request to a LDAP directory, the request is intercepted by a LDAP proxy that instead validates the UserID with the LDAP directory and the password is validated by a credential validator component which verifies with the portal that the credential string presented as the user password has been produced from the active session ID. In an embodiment, the credential string validator validates each short-living credential only once and upon detecting a second validation request for the same string, initiates a security breech process.Type: GrantFiled: March 2, 2004Date of Patent: January 29, 2013Assignee: International Business Machines CorporationInventors: Dmitry Andreev, Gregory Vilshansky, Boris Vishnevsky
-
Publication number: 20120240217Abstract: Computer security processes include displaying information elements on a computer display screen. Some of the information elements are mapped to corresponding parameters. The computer security processes also include receiving a selected information element from the information elements displayed on the computer display screen, and determining a value of a parameter associated with the selected information element based on a condition. The value of the parameter is changeable according to changes in the condition. The computer security processes further include comparing the selected information element with the value of the parameter, and upon determining the value of the parameter matches the selected information element, providing a user with access to a system resource.Type: ApplicationFiled: March 16, 2011Publication date: September 20, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Galina Grunin, Dmitry A. Rekesh, Gregory Vilshansky
-
Publication number: 20120167215Abstract: A system and method for facilitating identification of an attacking computer in a network is provided. A user attempting to login to a network application may be presented with a screen prior to the login which lists preconditions of gaining access to the application. If a user concurs with the preconditions, a security module is downloaded to the user's computer and executed which gathers various configuration settings and transmits the gathered information to a predetermined destination. The security module may also attempt to place a call to a predetermined destination over a modem in the computer to cause registration of caller-ID data when answered at the predetermined destination. Once the security check is completed, login may proceed with the network application. Any data gathered by the security module may be stored for later recall and use to identify the computer in the event of an attack.Type: ApplicationFiled: March 2, 2012Publication date: June 28, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Dmitry Andreev, Galina Grunin, Gregory Vilshansky
-
System, method, and program product for providing local load balancing for high-availability servers
Patent number: 8209700Abstract: The present invention is directed to a method, system, and computer program product for providing local load balancing for high-availability servers. In particular, the present invention is based on the use of an HACMP cluster of servers (for high availability) each running an instance of a TCP splitter (for load balancing). A cluster of servers is provided, wherein a Transport Control Protocol (TCP) splitter runs on each of the servers. Each TCP splitter is configured to split an incoming data stream to a respective server among a plurality of the servers for processing. Each server in the cluster has a different routable Internet Protocol (IP) address. Upon a failure of a server, the IP address of the failed server is reassigned to another server in the cluster.Type: GrantFiled: December 22, 2005Date of Patent: June 26, 2012Assignee: International Business Machines CorporationInventors: Dmitry Andreev, Thomas M. Dauffenbach, Galina Grunin, Gregory Vilshansky -
Patent number: 8195952Abstract: A system and method for facilitating identification of an attacking computer in a network is provided. A user attempting to login to a network application may be presented with a screen prior to the login which lists preconditions of gaining access to the application. If a user concurs with the preconditions, a security module is downloaded to the user's computer and executed which gathers various configuration settings and transmits the gathered information to a predetermined destination. The security module may also attempt to place a call to a predetermined destination over a modem in the computer to cause registration of caller-ID data when answered at the predetermined destination. Once the security check is completed, login may proceed with the network application. Any data gathered by the security module may be stored for later recall and use to identify the computer in the event of an attack.Type: GrantFiled: December 14, 2004Date of Patent: June 5, 2012Assignee: International Business Machines CorporationInventors: Dmitry Andreev, Galina Grunin, Gregory Vilshansky