Patents by Inventor Vadim Draluk
Vadim Draluk has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10353858Abstract: A system for controlling a subsystem of a vehicle includes a memory, a first processor, and a second processor. The first processor allocates a portion of the memory upon booting to perform operations to control the subsystem and generates an indication when an amount of memory used from the allocated portion of the memory is greater than or equal to a threshold. The first processor monitors times when the vehicle is turned on and off and determines a time period during which the vehicle remains turned off. After the vehicle is turned off, the first processor enters a power save mode. The memory and the second processor continue to receive power. During the time period, on receiving the indication, the second processor wakes up the first processor, which performs a reboot operation, reallocates the memory, and reenters the power save mode. The memory continues to receive power.Type: GrantFiled: December 18, 2017Date of Patent: July 16, 2019Assignee: GM GLOBAL TECHNOLOGY OPERATIONS LLCInventors: Scott A. Rush, Vadim Draluk
-
Publication number: 20190188039Abstract: A system for controlling a subsystem of a vehicle includes a memory, a first processor, and a second processor. The first processor allocates a portion of the memory upon booting to perform operations to control the subsystem and generates an indication when an amount of memory used from the allocated portion of the memory is greater than or equal to a threshold. The first processor monitors times when the vehicle is turned on and off and determines a time period during which the vehicle remains turned off. After the vehicle is turned off, the first processor enters a power save mode. The memory and the second processor continue to receive power. During the time period, on receiving the indication, the second processor wakes up the first processor, which performs a reboot operation, reallocates the memory, and reenters the power save mode. The memory continues to receive power.Type: ApplicationFiled: December 18, 2017Publication date: June 20, 2019Applicant: GM Global Technology Operations LLCInventors: Scott A. RUSH, Vadim Draluk
-
Patent number: 10200360Abstract: User physical interaction characteristics information or the way a user physically interacts with a device is analyzed to aid in authenticating a user of a device. User physical interaction characteristics information such as swipe speed, finger area, finger conductivity, finger angle, device angle, movement patterns, acceleration, etc., provide signatures that are distinctive for particular individuals and possibly unique if measured to a sufficiently high level of precision. In some examples, a device measures finger positions, finger pad sizes, moisture level, acceleration, displacement, and changes in finger pad size for a particular user and compares the measurements to physical interaction characteristics measured during subsequent usage of the device to verify that a user is an authorized user.Type: GrantFiled: February 8, 2016Date of Patent: February 5, 2019Assignee: Dell Products L.P.Inventors: Vadim Draluk, Francois Goldfain, Avery Audrey Kwan, Jan-Willem Maarse
-
Patent number: 9772875Abstract: Mechanisms are provided to allow devices to support multiple modes, such as work, personal, and family modes. Conventional mobile solutions provide only for mode distinctions at the application level, e.g. one work application may prevent access to certain data, but a different application may want to allow access to that same data. Existing computer system solutions rely on multiple operating system instances or multiple virtual machines. Framework level modes are provided that do not require different, mutually exclusive, or possibly conflicting applications or platforms. A device and associated applications may have access to different data and capabilities based on a current mode.Type: GrantFiled: November 29, 2011Date of Patent: September 26, 2017Assignee: Dell Products L.P.Inventors: Vadim Draluk, Francois Goldfain, Jan-Willem Marse, Geng Chen
-
Patent number: 9571284Abstract: A system and a method are disclosed providing user information in a vehicle. The method includes the steps of: providing over a vehicle network a cryptographic key in response to receiving a wireless signal from a wireless transmitter at a first electronic control unit (ECU); receiving at a second ECU the cryptographic key; authenticating the cryptographic key at the second ECU; and providing user information via the second ECU based on the authentication.Type: GrantFiled: March 13, 2014Date of Patent: February 14, 2017Assignee: GM Global Technology Operations LLCInventors: Karl B. Leboeuf, William E. Mazzara, Jr., Thomas M. Forest, Vadim Draluk
-
Patent number: 9515819Abstract: Mechanisms are provided for allowing pluggable encryption in an operating system. Modules such as proprietary cipher modules connect to a kernel cryptographic framework using cryptographic cipher adapters. Supported cryptographic ciphers as well as proprietary cryptographic ciphers can be used in a transparent manner during file system access, key management, and metadata maintenance operations. Proprietary cipher modules interact with the cryptographic cipher adapters as though the cryptographic cipher adapters are the kernel cryptographic framework. The kernel cryptographic framework interacts with the cryptographic cipher adapters as though the cryptographic cipher adapters are proprietary cipher modules.Type: GrantFiled: September 3, 2015Date of Patent: December 6, 2016Assignee: Dell Products L.P.Inventors: Geng Chen, Vadim Draluk, Francois Goldfain
-
Patent number: 9509592Abstract: Mechanisms are provided to implement framework level mode specific file access operations. In a mode such as a work or enterprise mode, read and write accesses are directed to one or more secured locations. File data and metadata may be secured with encryption and/or authentication mechanisms. Conventional mobile solutions provide only for mode encryption distinctions at the application level, e.g. one work application may prevent access to certain data, but a different application may want to allow access to that same data. Various embodiments provide framework level mode sensitive encryption that does not require different, mutually exclusive, or possibly conflicting applications or platforms. A device and associated applications may have access to different data based on a current mode.Type: GrantFiled: February 8, 2016Date of Patent: November 29, 2016Assignee: Dell Products L.P.Inventors: Vadim Draluk, Francois Goldfain, Jan-Willem Maarse, Geng Chen
-
Publication number: 20160156618Abstract: User physical interaction characteristics information or the way a user physically interacts with a device is analyzed to aid in authenticating a user of a device. User physical interaction characteristics information such as swipe speed, finger area, finger conductivity, finger angle, device angle, movement patterns, acceleration, etc., provide signatures that are distinctive for particular individuals and possibly unique if measured to a sufficiently high level of precision. In some examples, a device measures finger positions, finger pad sizes, moisture level, acceleration, displacement, and changes in finger pad size for a particular user and compares the measurements to physical interaction characteristics measured during subsequent usage of the device to verify that a user is an authorized user.Type: ApplicationFiled: February 8, 2016Publication date: June 2, 2016Applicant: Dell Products L.P.Inventors: Vadim Draluk, Francois Goldfain, Avery Audrey Kwan, Jan-Willem Maarse
-
Publication number: 20160156547Abstract: Mechanisms are provided to implement framework level mode specific file access operations. In a mode such as a work or enterprise mode, read and write accesses are directed to one or more secured locations. File data and metadata may be secured with encryption and/or authentication mechanisms. Conventional mobile solutions provide only for mode encryption distinctions at the application level, e.g. one work application may prevent access to certain data, but a different application may want to allow access to that same data. Various embodiments provide framework level mode sensitive encryption that does not require different, mutually exclusive, or possibly conflicting applications or platforms. A device and associated applications may have access to different data based on a current mode.Type: ApplicationFiled: February 8, 2016Publication date: June 2, 2016Applicant: Dell Products L.P.Inventors: Vadim Draluk, Francois Goldfain, Jan-Willem Maarse, Geng Chen
-
Patent number: 9256758Abstract: Mechanisms are provided to implement framework level mode specific file access operations. In a mode such as a work or enterprise mode, read and write accesses are directed to one or more secured locations. File data and metadata may be secured with encryption and/or authentication mechanisms. Conventional mobile solutions provide only for mode encryption distinctions at the application level, e.g. one work application may prevent access to certain data, but a different application may want to allow access to that same data. Various embodiments provide framework level mode sensitive encryption that does not require different, mutually exclusive, or possibly conflicting applications or platforms. A device and associated applications may have access to different data based on a current mode.Type: GrantFiled: November 29, 2011Date of Patent: February 9, 2016Assignee: DELL PRODUCTS L.P.Inventors: Vadim Draluk, Francois Goldfain, Jan-Willem Maarse, Geng Chen
-
Patent number: 9256715Abstract: User physical interaction characteristics information or the way a user physically interacts with a device is analyzed to aid in authenticating a user of a device. User physical interaction characteristics information such as swipe speed, finger area, finger conductivity, finger angle, device angle, movement patterns, acceleration, etc., provide signatures that are distinctive for particular individuals and possibly unique if measured to a sufficiently high level of precision. In some examples, a device measures finger positions, finger pad sizes, moisture level, acceleration, displacement, and changes in finger pad size for a particular user and compares the measurements to physical interaction characteristics measured during subsequent usage of the device to verify that a user is an authorized user.Type: GrantFiled: March 9, 2012Date of Patent: February 9, 2016Assignee: Dell Products L.P.Inventors: Vadim Draluk, Francois Goldfain, Avery Audrey Kwan, Jan-Willem Maarse
-
Publication number: 20150381353Abstract: Mechanisms are provided for allowing pluggable encryption in an operating system. Modules such as proprietary cipher modules connect to a kernel cryptographic framework using cryptographic cipher adapters. Supported cryptographic ciphers as well as proprietary cryptographic ciphers can be used in a transparent manner during file system access, key management, and metadata maintenance operations. Proprietary cipher modules interact with the cryptographic cipher adapters as though the cryptographic cipher adapters are the kernel cryptographic framework. The kernel cryptographic framework interacts with the cryptographic cipher adapters as though the cryptographic cipher adapters are proprietary cipher modules.Type: ApplicationFiled: September 3, 2015Publication date: December 31, 2015Applicant: Dell Products L.P.Inventors: Geng Chen, Vadim Draluk, Francois Goldfain
-
Patent number: 9152800Abstract: Mechanisms are provided for allowing pluggable encryption in an operating system. Modules such as proprietary cipher modules connect to a kernel cryptographic framework using cryptographic cipher adapters. Supported cryptographic ciphers as well as proprietary cryptographic ciphers can be used in a transparent manner during file system access, key management, and metadata maintenance operations. Proprietary cipher modules interact with the cryptographic cipher adapters as though the cryptographic cipher adapters are the kernel cryptographic framework. The kernel cryptographic framework interacts with the cryptographic cipher adapters as though the cryptographic cipher adapters are proprietary cipher modules.Type: GrantFiled: May 3, 2012Date of Patent: October 6, 2015Assignee: Dell Products L.P.Inventors: Geng Chen, Vadim Draluk, Francois Goldfain
-
Patent number: 9143943Abstract: Mode sensitive networking is provided to allow mode specific communications using a mobile device. If a device has an established secured connection and an application is running in work mode, packets are routed through the secure connection. If the device has an established secured connection but an application is running in personal mode, packets are routed through an alternate connection. Secured connections may be established by using privileged applications. A device and associated applications may have access to different servers, sites, and destinations based on a current mode.Type: GrantFiled: November 29, 2011Date of Patent: September 22, 2015Assignee: Dell Products L.P.Inventors: Vadim Draluk, Francois Goldfain, Jan-Willem Maarse, Geng Chen, Sean Xiao
-
Publication number: 20150263860Abstract: A system and a method are disclosed providing user information in a vehicle. The method includes the steps of: providing over a vehicle network a cryptographic key in response to receiving a wireless signal from a wireless transmitter at a first electronic control unit (ECU); receiving at a second ECU the cryptographic key; authenticating the cryptographic key at the second ECU; and providing user information via the second ECU based on the authentication.Type: ApplicationFiled: March 13, 2014Publication date: September 17, 2015Applicant: GM GLOBAL TECHNOLOGY OPERATIONS LLCInventors: Karl B. Leboeuf, William E. Mazzara, JR., Thomas M. Forest, Vadim Draluk
-
Patent number: 9009856Abstract: Mechanisms are provided to allow particular parties and applications access to protected application programming interfaces (APIs) without the use of security domains. Trusted parties and applications may have access to protected APIs while unfrosted parties and applications may be restricted to a more limited set of APIs. Public keys associated with individual applications that are used to enforce licensing policies can be repurposed for use in a verification process to prevent unauthorized access to APIs. A credential storage manager can be used to maintain permission and certificate information. An application authorization manager may access credential storage and maintain trusted application information.Type: GrantFiled: December 16, 2011Date of Patent: April 14, 2015Assignee: Dell Products L.P.Inventors: Vadim Draluk, Francois Goldfain, Jan-Willem Maarse, Helen Bragg, Sean Xiao
-
Patent number: 8806610Abstract: Mechanisms are provided to efficiently and effectively authenticate a user of a device. Passcode information such as passwords, pins, and access codes are obtained along with biometric information to periodically authenticate a user of a device. A user identity confidence score may be generated and continually modified by using data such as passcode information, biometric information, and/or user physical interaction characteristics information. If the user identify confidence score falls beneath a particular threshold, additional user authentication information may be requested.Type: GrantFiled: January 31, 2012Date of Patent: August 12, 2014Assignee: Dell Products L.P.Inventors: Vadim Draluk, Francois Goldfain, Jan-Willem Maarse
-
Publication number: 20130294599Abstract: Mechanisms are provided for allowing pluggable encryption in an operating system. Modules such as proprietary cipher modules connect to a kernel cryptographic framework using cryptographic cipher adapters. Supported cryptographic ciphers as well as proprietary cryptographic ciphers can be used in a transparent manner during file system access, key management, and metadata maintenance operations. Proprietary cipher modules interact with the cryptographic cipher adapters as though the cryptographic cipher adapters are the kernel cryptographic framework. The kernel cryptographic framework interacts with the cryptographic cipher adapters as though the cryptographic cipher adapters are proprietary cipher modules.Type: ApplicationFiled: May 3, 2012Publication date: November 7, 2013Applicant: DELL Products L.P.Inventors: Geng Chen, Vadim Draluk, Francois Goldfain
-
Publication number: 20130239206Abstract: User physical interaction characteristics information or the way a user physically interacts with a device is analyzed to aid in authenticating a user of a device. User physical interaction characteristics information such as swipe speed, finger area, finger conductivity, finger angle, device angle, movement patterns, acceleration, etc., provide signatures that are distinctive for particular individuals and possibly unique if measured to a sufficiently high level of precision. In some examples, a device measures finger positions, finger pad sizes, moisture level, acceleration, displacement, and changes in finger pad size for a particular user and compares the measurements to physical interaction characteristics measured during subsequent usage of the device to verify that a user is an authorized user.Type: ApplicationFiled: March 9, 2012Publication date: September 12, 2013Applicant: DELL Products L.P.Inventors: Vadim Draluk, Francois Goldfain, Avery Audrey Kwan, Jan-Willem Maarse
-
Publication number: 20130198832Abstract: Mechanisms are provided to efficiently and effectively authenticate a user of a device. Passcode information such as passwords, pins, and access codes are obtained along with biometric information to periodically authenticate a user of a device. A user identity confidence score may be generated and continually modified by using data such as passcode information, biometric information, and/or user physical interaction characteristics information. If the user identify confidence score falls beneath a particular threshold, additional user authentication information may be requested.Type: ApplicationFiled: January 31, 2012Publication date: August 1, 2013Applicant: DELL Products L.P.Inventors: Vadim Draluk, Francois Goldfain, Jan-Willem Maarse