Patents by Inventor Serguei An
Serguei An has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11607134Abstract: An electromagnetic tomography system for gathering measurement data pertaining to a human head includes an image chamber unit, a control system, and a housing. The image chamber unit includes an antenna assembly defining a horizontally-oriented imaging chamber and including an array of antennas arranged around the imaging chamber. The antennas include at least some transmitting antennas and some receiving antennas. The control system causes the transmitting antennas to transmit a low power electromagnetic field that is received by the receiving antennas after passing through a patient's head in the imaging chamber. A data tensor is produced that may be inversed to reconstruct a 3D distribution of dielectric properties within the head and to create an image. The housing at least partially contains the antenna assembly and has a front entry opening into the imaging chamber. The head is inserted horizontally through the front entry opening and into the imaging chamber.Type: GrantFiled: April 15, 2021Date of Patent: March 21, 2023Assignee: EMTensor GmbHInventor: Serguei Y. Semenov
-
Patent number: 11604753Abstract: The present disclosure relates to techniques for facilitating communication and memory transfer between PCIe devices that permit access to an entire address space even though a limited address space is exposed and/or visible via the PCIe BAR registers. To this end, the present disclosure aims to permit memory transfer of large blocks of memory from one device to another including memory invisible to the system (i.e. not exposed via PCIe BAR registers). For example, in some embodiments, a data packet may be received at a port associated with a processor interconnect. The data packet includes a header which contains a first address associated with the port. In response to identifying the first address from the first data packet at the port, the data packet is decoded. During the decoding process, a second address is identified in a payload of the data packet.Type: GrantFiled: December 14, 2020Date of Patent: March 14, 2023Assignee: ATI TECHNOLOGIES ULCInventors: Serguei Sagalovitch, Ilya Panfilov
-
Patent number: 11601443Abstract: Disclosed herein are systems and method for generating and storing forensics-specific metadata. In one aspect, a digital forensics module is configured to generate a backup of user data stored on a computing device in accordance with a backup schedule. The digital forensics module identifies, from a plurality of system metadata of the computing device, forensics-specific metadata of the computing device based on predetermined rules, wherein the forensics-specific metadata is utilized for detecting suspicious digital activity. The digital forensics module generates a backup of the forensics-specific metadata in accordance with the backup schedule and analyzes the forensics-specific metadata for an indication of the suspicious digital activity on the computing device. In response to detecting the suspicious digital activity based on the analysis, generates a security event indicating that the suspicious digital activity has occurred.Type: GrantFiled: September 25, 2019Date of Patent: March 7, 2023Assignee: Acronis International GmbHInventors: Vladimir Strogov, Oleg Ishanov, Alexey Dod, Serguei Beloussov, Stanislav Protasov
-
Patent number: 11593130Abstract: Disclosed herein are systems and method for customizing a user workspace environment using user action sequence analysis. In one exemplary aspect, a method may comprise detecting user actions in a user workspace environment that provides access to a plurality of workspace elements further comprising a plurality of files and a plurality of applications and identifying a plurality of user action sequences based on each timestamp of a respective user action. The method may comprise generating action sequence groups, each comprising a unique subset of the user action sequences and sequence trigger. In response to detecting a particular sequence trigger, the method may comprise executing a corresponding customization action that alters the user workspace environment such that an amount of steps and/or processing time to perform in the user workspace environment to access workspace elements associated with the associated action sequence group is reduced.Type: GrantFiled: May 18, 2021Date of Patent: February 28, 2023Assignee: Acronis International GmbHInventors: Alexander Tormasov, Serguei Beloussov, Stanislav Protasov
-
Patent number: 11595355Abstract: A system and method is provided that enables the recovery of data packets transmitted over an unreliable network. The system and method utilize an algorithm for transmitting the data packets with restoration of lost data during data transfer over UDP Protocol encrypted with DTLS Protocol. Advantageously, the algorithm does not require changes to data for either UDP or DTLS packets, but rather a separate, specifically designed packet is transmitted to the recipient to facilitate and ensure the recovery of any lost data packets over the unreliable network.Type: GrantFiled: July 23, 2021Date of Patent: February 28, 2023Assignee: Parallels International GmbHInventors: Sergey Pachkov, Nikolay Dobrovolskiy, Serguei M. Beloussov
-
Patent number: 11595238Abstract: This application proposes multi-beam antenna systems using spherical lens are proposed, with high isolation between antenna ports and compatible to 2×2, 4×4, 8×8 MIMO transceivers. Several compact multi-band multi-beam solutions (with wideband operation, 40%+, in each band) are achieved by creating dual-band radiators movable on the track around spherical lens and by placing of lower band radiators between spherical lenses. By using of secondary lens for high band radiators, coupling between low band and high band radiators is reduced. Beam tilt range and side lobe suppression are improved by special selection of phase shift and rotational angle of radiators. Resultantly, a wide beam tilt range (0-40 degree) is realized in proposed multi-beam antenna systems. Each beam can be individually tilted. Based on proposed single- and multi-lens antenna solutions, cell coverage improvements and stadium tribune coverage optimization are also achieved, together with interference reduction.Type: GrantFiled: May 6, 2021Date of Patent: February 28, 2023Assignee: Matsing, Inc.Inventors: Serguei Matitsine, Igor Timofeev, Leonid Matytsine, Anthony DeMarco
-
Patent number: 11594453Abstract: A method of forming a device on a substrate with recessed first/third areas relative to a second area by forming a fin in the second area, forming first source/drain regions (with first channel region therebetween) by first/second implantations, forming second source/drain regions in the third area (defining second channel region therebetween) by the second implantation, forming third source/drain regions in the fin (defining third channel region therebetween) by third implantation, forming a floating gate over a first portion of the first channel region by first polysilicon deposition, forming a control gate over the floating gate by second polysilicon deposition, forming an erase gate over the first source region and a device gate over the second channel region by third polysilicon deposition, and forming a word line gate over a second portion of the first channel region and a logic gate over the third channel region by metal deposition.Type: GrantFiled: April 8, 2022Date of Patent: February 28, 2023Assignee: Silicon Storage Technology, Inc.Inventors: Serguei Jourba, Catherine Decobert, Feng Zhou, Jinho Kim, Xian Liu, Nhan Do
-
Patent number: 11587960Abstract: A photodetector device comprising n-type and p-type light absorbing regions arranged to form a pn-junction and n+ and p+ contact regions connected to respective contacts. The light absorbing regions and the contact regions are arranged in a sequence n+ p n p+ so that, after a voltage applied between the n+ and p+ contacts is switched from a reverse bias to a forward bias, electrons and holes which are generated in the light absorbing regions in response to photon absorption drift towards the p+ and n+ contact regions respectively, which causes current to start to flow between the contacts after a time delay which is inversely proportional to the incident light intensity.Type: GrantFiled: November 20, 2020Date of Patent: February 21, 2023Assignee: Actlight SAInventors: Serguei Okhonin, Maxim Gureev, Denis Sallin
-
Patent number: 11586736Abstract: Disclosed are systems and methods for detecting malicious applications. An exemplary method may comprise detecting that a first process has been launched on a computing device. The method may comprise receiving, from the first process, an execution stack associated with one or more control points of the first process. The method may comprise applying a machine learning classifier on the execution stack, wherein the machine learning classifier is configured to classify whether a process is malicious based on activity on control points captured on a given execution stack, and wherein a feature of a malicious process is detection of a system call to create a remote thread that runs in a virtual address space of a shared-service process configured to import third-party processes to be embedded as separate threads. The method may comprise generating an indication that the execution of the first process is malicious/non-malicious.Type: GrantFiled: July 6, 2022Date of Patent: February 21, 2023Assignee: Acronis International GmbHInventors: Vladimir Strogov, Serguei Beloussov, Alexey Dod, Valery Chernyakovsky, Anatoly Stupak, Sergey Ulasen, Nikolay Grebennikov, Vyacheslav Levchenko, Stanislav Protasov
-
Patent number: 11586686Abstract: The Messaging Search and Management Apparatuses, Methods and Systems (“MSM”) transforms message, ranking request inputs via MSM components into work graphs, ML structure input data, ML structure, ranking response outputs. A work graph generation request that includes group level access control data may be obtained. A set of metadata access control carrying messages, a set of users, a set of channels, and a set of topics with access control data corresponding to the group level access control data may be determined. A user priority score for each of the other users, a channel priority score for each of the channels, and a topic priority score for each of the topics, from the perspective of each user, may be calculated. A work graph data structure may be generated that includes, for each user, data regarding the calculated user priority scores, channel priority scores, and topic priority scores.Type: GrantFiled: October 14, 2020Date of Patent: February 21, 2023Assignee: Slack Technologies, LLCInventors: Myles Grant, Serguei Mourachov, Renaud Bourassa-Denis, Jason Liszka, John Gallagher, Isabella Tromba, Noah Weiss, Daniel Stewart Butterfield, Callum Henderson-Begg
-
Publication number: 20230052193Abstract: The present disclosure is directed to an ion funnel and associated systems, where the ion funnel includes a plurality of electrodes each define an opening having an associated inner dimension and receive a RF voltage. The associated inner dimensions progressively reduce in size from approximately a first inner dimension to approximately a second inner dimension. The electrodes define a slope parameter with respect to adjacent electrodes, which is less than 0.04 for at least a majority of the electrodes. Additional systems and methods are provided for transferring ions from an ion funnel to an ion mobility device having a pressure greater than that of the ion funnel, for selectively transferring ions from the ion funnel to the ion mobility device, and for stripping ions of certain molecules adducted thereto during transfer.Type: ApplicationFiled: October 10, 2022Publication date: February 16, 2023Applicant: MOBILion Systems, Inc.Inventors: Serguei Krioutchkov, John Daniel DeBord, Liulin Deng, Sidney E. Buttrill, JR., Myles Elliott Levine, Nathan Paul Roehr
-
Patent number: 11579985Abstract: Disclosed herein are systems and method for preventing malware reoccurrence when restoring a computing device using a backup image. In one exemplary aspect, a method may identify, from a plurality of backup images for a computing device, a backup image that was created most recently before the computing device was compromised. The method may mount the backup image as a disk and scanning the disk for malicious software. The method may disable all ports and services on the computing device to prevent unauthorized network connections and service launches. The method may restore data to the computing device from the mounted disk. The method may update software on the computing device and applying latest patches, and reopen the ports and restart the services on the computing device subsequent to updating the software and applying the latest patches.Type: GrantFiled: June 1, 2020Date of Patent: February 14, 2023Assignee: Acronis International GmbHInventors: Serguei Beloussov, Oleg Ishanov, Vladimir Strogov, Andrey Kulaga, Igor Kornachev, Alexey Sergeev, Anton Enakiev, Stanislav Protasov
-
Patent number: 11580061Abstract: Methods for file archiving using machine learning are disclosed herein. An exemplary method comprises archiving a first file of a plurality of files from a storage server to a tiered storage system, training a machine learning module based on file access operations for the plurality of files, determining one or more rules for predicting access to the archived files using the machine learning module, determining a prediction of access of the archived file based on the one or more rules and retrieving the archived file from the tiered storage system into a file cache in the storage server based on the prediction of access.Type: GrantFiled: June 7, 2018Date of Patent: February 14, 2023Assignee: Acronis International GmbHInventors: Vladimir Strogov, Vyacheslav Levchenko, Stanislav Protasov, Serguei Beloussov, Sergey Ulasen
-
Patent number: 11582500Abstract: Updating object subscriptions based on trigger events is described. An indication of a trigger event, associated with an object, can be received from a client of a user. The object can be associated with current object data that is stored in a storage area of a subscription management system. The storage area can maintain the current object data for at least the object and a subscription list for client(s), wherein the subscription list for each of the client(s) comprises object identifiers corresponding to subscribed objects for each of the client(s). Based at least partly on receiving the indication of the trigger event and determining that the trigger event is associated with a modification to a subscription, the subscription list can be updated to generate an updated subscription list for the client and current object data for the subscribed objects identified within the updated subscription list can be provided thereto.Type: GrantFiled: March 24, 2021Date of Patent: February 14, 2023Assignee: Salesforce, Inc.Inventors: Raissa Largman, Jason Klym, Danil Glinenko, Neil Walker, Mark Christian, Serguei Mourachov
-
Patent number: 11576908Abstract: The present invention relates to compositions and methods for the treatment of the Charcot-Marie-Tooth disease and related disorders.Type: GrantFiled: February 10, 2020Date of Patent: February 14, 2023Assignee: PHARNEXTInventors: Daniel Cohen, Ilya Chumakov, Serguei Nabirochkin
-
Publication number: 20230045094Abstract: The present disclosure includes methods and systems for protecting network resources. A method may start, by a processor, copy-on-write snapshotting for modifications to a plurality of files stored on electronic storage. A method may monitor, by the processor, access to objects within a file system associated with the electronic storage for a set of operations. A method may intercept, by the processor, one or more operation of the set of operations for modifying a region of a file in the file system. A method may capture, by the processor, one or more of original contents, modified contents and written contents of the region. A method may end, by the processor, copy-on-write snapshotting. A method may perform malware and/or ransomware analysis on a process performing the modification to the region of the file in the file system.Type: ApplicationFiled: October 26, 2022Publication date: February 9, 2023Inventors: Vladimir Strogov, Alexey Dod, Valery Chemyakovskiy, Serguei Beloussov, Stanislav Protasov
-
Publication number: 20230036599Abstract: A system and method for implementing management of a system context database is disclosed herein. The system context from a target computing system is collected. The system context is set in accordance with the configuration status of a context consumer. The context consumer includes one or more data security components. A system context database is initialized in response to the configuration status. The collected system context is restored in a cache. The attributes from the cache are provided to the context consumer where the attributes are compared with predefined attributes of the known malware threats. Each data security component of the context consumer is configured to access the cache in a synchronized manner to avoid duplication of the scanning process. The comparison result indicates the presence of a malware threat.Type: ApplicationFiled: July 30, 2021Publication date: February 2, 2023Inventors: Andrey Kulaga, Danil Cherepanov, Nikolay Grebennikov, Serguei Beloussov, Stanislav Protasov
-
Patent number: 11570232Abstract: Disclosed are systems and methods for determining an execution location for a utility component. In an exemplary aspect, the systems and methods comprise receiving, at a client device, a request to execute the utility component that performs an action on a target component; determining the execution location of the utility component; determining whether the execution location is on the client device or on a remote application server; and responsive to determining the execution location is on the remote application server, transmitting the request to be executed within a remote session between the client device and the remote application server.Type: GrantFiled: April 25, 2022Date of Patent: January 31, 2023Assignee: Parallels International GmbHInventors: Aleksandr Suslov, Ivan Korobov, Nikolay Dobrovolskiy, Serguei M. Beloussov
-
Patent number: 11562067Abstract: Disclosed herein are systems and method for inspecting archived slices for malware using empty spare files. In one exemplary aspect, the method comprises generating a backup slice and a virtual volume comprising a list of files in the backup slice and associated file information. The method comprises mounting the virtual volume to a disk. The method comprises creating, in the virtual volume, empty sparse files that are placeholders of the files reference in the list of files. The method comprises detecting a change between a respective empty sparse file and a corresponding file in a previous backup slice and accordingly storing the actual content of the file in the virtual volume in place of the respective empty sparse file. The method comprises scanning the virtual volume for malicious software and generating a cured slice that replaces the backup slice in the backup archive upon detection.Type: GrantFiled: March 15, 2021Date of Patent: January 24, 2023Assignee: Acronis International GmbHInventors: Vladimir Strogov, Anatoly Stupak, Andrey Kulaga, Alexey Sergeev, Serguei Beloussov, Stanislav Protasov
-
Patent number: 11563584Abstract: Zero round trip secure communications are implemented based on noisy secrets with a polynomial secret sharing scheme. A sender identifies two negotiated noisy secrets associated with an encrypted message to send to a receiver system. The sender utilizes a first negotiated noisy secret for sub-key selection, and generates a secret polynomial using Shamir's polynomial-based secret sharing scheme with N positive integer points and a message key as a secret. The sender divides the first negotiated noisy secret into a plurality of sub-keys, and divides a second negotiated noisy secret into test blocks of a length equivalent to a length of a sub-key. The sender utilizes each of the plurality sub-keys for encrypting a corresponding test block along with one unique point of the secret polynomial. Moreover, the sender sends all encrypted test blocks and corresponding encrypted points of the secret polynomial to the receiver with the encrypted message.Type: GrantFiled: February 10, 2021Date of Patent: January 24, 2023Assignee: DIGITAL 14 LLCInventors: Serguei Velikevitch, Alexander Sherkin