Patents by Inventor Igor Korsunsky
Igor Korsunsky has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11403024Abstract: A technique for restoring content is described. The technique includes receiving a specification of content to be restored to a target storage from a data source. The technique also includes determining task units to be performed to restore the specified content. Each task unit is associated with a corresponding assigned weight value. Based on the corresponding assigned weight values, the task units are distributed to different task groups. The task groups are processed in parallel with each other to concurrently perform at least a portion of the distributed task units.Type: GrantFiled: July 30, 2020Date of Patent: August 2, 2022Assignee: Cohesity, Inc.Inventors: Rupesh Bajaj, Prajakta Ayachit, Apurv Gupta, Janga Varun, Markose Thomas, Zheng Cai, Igor Korsunsky
-
Publication number: 20220035919Abstract: Methods and apparatus consistent with the present disclosure may use instrumentation code that remains transparent to an application program that the instrumentation code has been injected into. In certain instances, data sets that include executable code may be received via packetized communications or be received via other means, such as, receiving a file from a data store. The present technique allows a processor executing instrumentation code to monitor actions performed by the program code included in a received data set. Malware may be detected by scanning suspect program code with a malware scanner, malware may be detected by identifying suspicious actions performed by a set of program code, or malware may be detected by a combination of such techniques.Type: ApplicationFiled: October 19, 2021Publication date: February 3, 2022Inventors: Soumyadipta Das, Alex Dubrovsky, Igor Korsunsky
-
Patent number: 11151252Abstract: Methods and apparatus consistent with the present disclosure may use instrumentation code that remains transparent to an application program that the instrumentation code has been injected into. In certain instances, data sets that include executable code may be received via packetized communications or be received via other means, such as, receiving a file from a data store. The present technique allows a processor executing instrumentation code to monitor actions performed by the program code included in a received data set. Malware may be detected by scanning suspect program code with a malware scanner, malware may be detected by identifying suspicious actions performed by a set of program code, or malware may be detected by a combination of such techniques.Type: GrantFiled: October 13, 2017Date of Patent: October 19, 2021Assignee: SONICWALL INC.Inventors: Soumyadipta Das, Alex Dubrovsky, Igor Korsunsky
-
Publication number: 20210064264Abstract: A technique for restoring content is described. The technique includes receiving a specification of content to be restored to a target storage from a data source. The technique also includes determining task units to be performed to restore the specified content. Each task unit is associated with a corresponding assigned weight value. Based on the corresponding assigned weight values, the task units are distributed to different task groups. The task groups are processed in parallel with each other to concurrently perform at least a portion of the distributed task units.Type: ApplicationFiled: July 30, 2020Publication date: March 4, 2021Inventors: Rupesh Bajaj, Prajakta Ayachit, Apurv Gupta, Janga Varun, Markose Thomas, Zheng Cai, Igor Korsunsky
-
Patent number: 10902122Abstract: Methods and apparatus consistent with the present disclosure may use instrumentation code that remains transparent to an application program that the instrumentation code has been injected into. In certain instances, data sets that include executable code may be received via packetized communications or be received via other means, such as, receiving a file from a data store. The present technique allows one or more processors executing instrumentation code to monitor actions performed by the program code included in a received data set. Malware can be detected using exception handling to track memory allocations of the program code included in the received data set.Type: GrantFiled: February 6, 2018Date of Patent: January 26, 2021Assignee: SonicWALL Inc.Inventors: Soumyadipta Das, Aleksandr Dubrovsky, Igor Korsunsky, Atul Dhablania, John E. Gmuender
-
Patent number: 10686808Abstract: Techniques for notification of reassembly-free file scanning are described herein. According to one embodiment, a first request for accessing a document provided by a remote node is received from a client. In response to the first request, it is determined whether a second request previously for accessing the document of the remote node indicates that the requested document from the remote node contains offensive data. If the requested document contains offensive data, a message is returned to the client, without accessing the requested document of the remote node, indicating that the requested document is not delivered to the client.Type: GrantFiled: July 10, 2018Date of Patent: June 16, 2020Assignee: SONICWALL INC.Inventors: Aleksandr Dubrovsky, Igor Korsunsky, Roman Yanovsky, Boris Yanovsky
-
Publication number: 20190236275Abstract: Methods and apparatus consistent with the present disclosure may use instrumentation code that remains transparent to an application program that the instrumentation code has been injected into. In certain instances, data sets that include executable code may be received via packetized communications or be received via other means, such as, receiving a file from a data store. The present technique allows one or more processors executing instrumentation code to monitor actions performed by the program code included in a received data set. Malware can be detected using exception handling to track memory allocations of the program code included in the received data set.Type: ApplicationFiled: February 6, 2018Publication date: August 1, 2019Inventors: Soumyadipta Das, Aleksandr E. Dubrovsky, Igor Korsunsky, Atul Dhablania, John E. Gmuender
-
Publication number: 20190114421Abstract: Methods and apparatus consistent with the present disclosure may use instrumentation code that remains transparent to an application program that the instrumentation code has been injected into. In certain instances, data sets that include executable code may be received via packetized communications or be received via other means, such as, receiving a file from a data store. The present technique allows a processor executing instrumentation code to monitor actions performed by the program code included in a received data set. Malware may be detected by scanning suspect program code with a malware scanner, malware may be detected by identifying suspicious actions performed by a set of program code, or malware may be detected by a combination of such techniques.Type: ApplicationFiled: October 13, 2017Publication date: April 18, 2019Inventors: Soumyadipta Das, Alex Dubrovsky, Igor Korsunsky
-
Publication number: 20190014135Abstract: Techniques for notification of reassembly-free file scanning are described herein. According to one embodiment, a first request for accessing a document provided by a remote node is received from a client. In response to the first request, it is determined whether a second request previously for accessing the document of the remote node indicates that the requested document from the remote node contains offensive data. If the requested document contains offensive data, a message is returned to the client, without accessing the requested document of the remote node, indicating that the requested document is not delivered to the client.Type: ApplicationFiled: July 10, 2018Publication date: January 10, 2019Inventors: Aleksandr Dubrovsky, Igor Korsunsky, Roman Yanovsky, Boris Yanovsky
-
Patent number: 10021121Abstract: Techniques for notification of reassembly-free file scanning are described herein. According to one embodiment, a first request for accessing a document provided by a remote node is received from a client. In response to the first request, it is determined whether a second request previously for accessing the document of the remote node indicates that the requested document from the remote node contains offensive data. If the requested document contains offensive data, a message is returned to the client, without accessing the requested document of the remote node, indicating that the requested document is not delivered to the client.Type: GrantFiled: October 4, 2016Date of Patent: July 10, 2018Assignee: SonicWALL Inc.Inventors: Aleksandr Dubrovsky, Igor Korsunsky, Roman Yanovsky, Boris Yanovsky
-
Publication number: 20170093894Abstract: Techniques for notification of reassembly-free file scanning are described herein. According to one embodiment, a first request for accessing a document provided by a remote node is received from a client. In response to the first request, it is determined whether a second request previously for accessing the document of the remote node indicates that the requested document from the remote node contains offensive data. If the requested document contains offensive data, a message is returned to the client, without accessing the requested document of the remote node, indicating that the requested document is not delivered to the client.Type: ApplicationFiled: October 4, 2016Publication date: March 30, 2017Inventors: Aleksandr Dubrovsky, Igor Korsunsky, Roman Yanovsky, Boris Yanovsky
-
Patent number: 9462012Abstract: Techniques for notification of reassembly-free file scanning are described herein. According to one embodiment, a first request for accessing a document provided by a remote node is received from a client. In response to the first request, it is determined whether a second request previously for accessing the document of the remote node indicates that the requested document from the remote node contains offensive data. If the requested document contains offensive data, a message is returned to the client, without accessing the requested document of the remote node, indicating that the requested document is not delivered to the client.Type: GrantFiled: September 2, 2014Date of Patent: October 4, 2016Assignee: DELL SOFTWARE INC.Inventors: Aleksandr Dubrovsky, Igor Korsunsky, Roman Yanovsky, Boris Yanovsky
-
Publication number: 20160182597Abstract: Method and apparatus for multimedia content filtering are described herein. In one embodiment, an example of a network access device, in response to multimedia content transmitted from a source over a first network and destined to a destination over a second network, opens the multimedia content within the network access device interfacing the first and second networks. A content rating operation is performed on the opened multimedia content to determine whether the multimedia content should be transmitted to the destination over the second network. Other methods and apparatuses are also described.Type: ApplicationFiled: March 1, 2016Publication date: June 23, 2016Inventors: Roman Yanovsky, Igor Korsunsky, John Gmuender, Boris Yanovsky
-
Patent number: 9275047Abstract: Method and apparatus for multimedia content filtering are described herein. In one embodiment, an example of a network access device, in response to multimedia content transmitted from a source over a first network and destined to a destination over a second network, opens the multimedia content within the network access device interfacing the first and second networks. A content rating operation is performed on the opened multimedia content to determine whether the multimedia content should be transmitted to the destination over the second network. Other methods and apparatuses are also described.Type: GrantFiled: September 26, 2005Date of Patent: March 1, 2016Assignee: DELL SOFTWARE INC.Inventors: Roman Yanovsky, Igor Korsunsky, John Gmuender, Boris Yanovsky
-
Publication number: 20140373156Abstract: Techniques for notification of reassembly-free file scanning are described herein. According to one embodiment, a first request for accessing a document provided by a remote node is received from a client. In response to the first request, it is determined whether a second request previously for accessing the document of the remote node indicates that the requested document from the remote node contains offensive data. If the requested document contains offensive data, a message is returned to the client, without accessing the requested document of the remote node, indicating that the requested document is not delivered to the client.Type: ApplicationFiled: September 2, 2014Publication date: December 18, 2014Inventors: Aleksandr Dubrovsky, Igor Korsunsky, Roman Yanovsky, Boris Yanovsky
-
Patent number: 8914684Abstract: A software module capable of simultaneously supporting multiple services provides log message throttling for each service with a separate “per service” log message buffer. When the software module is a device driver, for example, each device controlled by the device driver is allocated a message buffer to store descriptive log messages. Upon generation of a warning log message, descriptive log messages in the message buffer are flushed to a log file for review by an administrator. Furthermore, log message throttling may be implemented by only flushing the message buffer upon certain occurrences of warning log messages, such as in accordance with an exponential back-off algorithm.Type: GrantFiled: May 26, 2009Date of Patent: December 16, 2014Assignee: VMware, Inc.Inventors: Erik Cota-Robles, Igor Korsunsky
-
Patent number: 8863286Abstract: Techniques for notification of reassembly-free file scanning are described herein. According to one embodiment, a first request for accessing a document provided by a remote node is received from a client. In response to the first request, it is determined whether a second request previously for accessing the document of the remote node indicates that the requested document from the remote node contains offensive data. If the requested document contains offensive data, a message is returned to the client, without accessing the requested document of the remote node, indicating that the requested document is not delivered to the client.Type: GrantFiled: August 13, 2007Date of Patent: October 14, 2014Assignee: SonicWALL, Inc.Inventors: Aleksandr Dubrovsky, Igor Korsunsky, Roman Yanovsky, Boris Yanovsky
-
Patent number: 8296472Abstract: System and methods for safely sharing universal serial bus (USB) devices are provided. A request is received to switch from a state in which user mode drivers are not enabled to a state in which user mode drivers are enabled. For each kernel mode USB driver in the system, an I/O control (IOCTL) is called in each kernel mode USB driver. The IOCTL requests that the kernel mode USB driver yield devices on which it has a claim. Also, for each kernel mode USB driver in the system, it is determined if the kernel mode USB driver will yield one or more devices on which it has a claim. For each kernel mode USB driver that will yield and for each device claimed by the kernel mode USB driver for which the kernel mode USB driver respects a request to unclaim the device, a process is executed as if there had been a hot unplug event on the device.Type: GrantFiled: April 12, 2012Date of Patent: October 23, 2012Assignee: VMware, Inc.Inventors: Erik Cota-Robles, Igor Korsunsky
-
Publication number: 20120198097Abstract: System and methods for safely sharing universal serial bus (USB) devices are provided. A request is received to switch from a state in which user mode drivers are not enabled to a state in which user mode drivers are enabled. For each kernel mode USB driver in the system, an I/O control (IOCTL) is called in each kernel mode USB driver. The IOCTL requests that the kernel mode USB driver yield devices on which it has a claim. Also, for each kernel mode USB driver in the system, it is determined if the kernel mode USB driver will yield one or more devices on which it has a claim. For each kernel mode USB driver that will yield and for each device claimed by the kernel mode USB driver for which the kernel mode USB driver respects a request to unclaim the device, a process is executed as if there had been a hot unplug event on the device.Type: ApplicationFiled: April 12, 2012Publication date: August 2, 2012Applicant: VMWARE, INC.Inventors: Erik Cota-Robles, Igor Korsunsky
-
Patent number: 8166211Abstract: Described herein are systems and methods for preventing a user mode USB driver from performing IOCTL operations other than read-safe IOCTLs on a USB device that has been claimed by a kernel mode driver or is in use by another user mode USB driver. In one method, it is determined whether a kernel mode USB driver will claim a device or whether the device will be available to be claimed by user mode USB drivers. In the event the device is claimed by a kernel mode USB driver, user mode USB drivers will be prevented from claiming the device. In the event the device is available for use by user mode USB drivers, but has been opened for write by one user mode USB driver, all other user mode USB drivers will be prevented from claiming the device. All IOCTL operations other than read-safe IOCTLs will be prevented from being performed by a user mode USB driver unless that USB driver has claimed the device.Type: GrantFiled: June 7, 2010Date of Patent: April 24, 2012Assignee: VMware, Inc.Inventors: Erik Cota-Robles, Igor Korsunsky