Patents by Inventor Vyacheslav E. Rusakov
Vyacheslav E. Rusakov has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10484416Abstract: Disclosed are systems and methods for repairing vulnerabilities of objects connected to a data network. An example method includes transmitting a request throughout the data network, obtaining responses from a plurality of accessible objects in the data network, attempting to obtain access to the plurality of accessible objects using a plurality of access methods, when access to an object is obtained, obtaining a list of resources of the accessed object, comparing the list of resources with a database of vulnerabilities to determine to identify one or more resources from the list of resources that have a similar vulnerable status as a vulnerable resource in the database of vulnerabilities and repairing vulnerabilities associated with the accessed object by applying repairs associated with the vulnerable resource to the accessed object.Type: GrantFiled: August 22, 2018Date of Patent: November 19, 2019Assignee: AO Kaspersky LabInventors: Vyacheslav E. Rusakov, Marta Anna Janus
-
Patent number: 10419472Abstract: Disclosed are systems and methods for repairing vulnerabilities of smart devices connected to a data network. An example method includes accessing, by a hardware processor, a smart device communicatively coupled to a data network, accessing a configuration of the smart device, the configuration containing settings of the smart device, comparing each of the settings of the smart device with settings of known vulnerabilities from a database of vulnerabilities to identify a network vulnerability of the smart device that can be exploited, retrieving one or more setting correcting the network vulnerability from the database, determining a repair action for repairing the at least one network vulnerability, the repair action comprising the one or more settings and transmitting, by the processor, instructions to the smart device to perform the repair action.Type: GrantFiled: August 22, 2018Date of Patent: September 17, 2019Assignee: AO Kaspersky LabInventors: Vyacheslav E. Rusakov, Marta Anna Janus
-
Publication number: 20190007445Abstract: Disclosed are systems and methods for repairing vulnerabilities of objects connected to a data network. An example method includes transmitting a request throughout the data network, obtaining responses from a plurality of accessible objects in the data network, attempting to obtain access to the plurality of accessible objects using a plurality of access methods, when access to an object is obtained, obtaining a list of resources of the accessed object, comparing the list of resources with a database of vulnerabilities to determine to identify one or more resources from the list of resources that have a similar vulnerable status as a vulnerable resource in the database of vulnerabilities and repairing vulnerabilities associated with the accessed object by applying repairs associated with the vulnerable resource to the accessed object.Type: ApplicationFiled: August 22, 2018Publication date: January 3, 2019Inventors: Vyacheslav E. RUSAKOV, Marta Anna JANUS
-
Publication number: 20180359278Abstract: Disclosed are systems and methods for repairing vulnerabilities of smart devices connected to a data network. An example method includes accessing, by a hardware processor, a smart device communicatively coupled to a data network, accessing a configuration of the smart device, the configuration containing settings of the smart device, comparing each of the settings of the smart device with settings of known vulnerabilities from a database of vulnerabilities to identify a network vulnerability of the smart device that can be exploited, retrieving one or more setting correcting the network vulnerability from the database, determining a repair action for repairing the at least one network vulnerability, the repair action comprising the one or more settings and transmitting, by the processor, instructions to the smart device to perform the repair action.Type: ApplicationFiled: August 22, 2018Publication date: December 13, 2018Inventors: Vyacheslav E. RUSAKOV, Marta Anna JANUS
-
Patent number: 10084812Abstract: Disclosed are systems and methods for repairing vulnerabilities of smart devices connected to a data network. An example method includes: transmitting a request through the network to obtain access to a smart device; obtaining settings of the smart device by accessing a configuration file containing settings of the smart device; comparing each of the settings of the device with known vulnerabilities to identify a vulnerability of the smart device that can be exploited; determining a repair action for repairing the at least one network vulnerability associated with at least one setting of the smart device based on the setting with the similar vulnerable status in the database; and transmitting instructions to the smart device to perform the repair action wherein the repair action comprises adjusting the setting of the smart device by making changes in the configuration file.Type: GrantFiled: November 21, 2017Date of Patent: September 25, 2018Assignee: AO Kaspersky LabInventors: Vyacheslav E. Rusakov, Marta Anna Janus
-
Publication number: 20180077194Abstract: Disclosed are systems and methods for repairing vulnerabilities of smart devices connected to a data network. An example method includes: transmitting a request through the network to obtain access to a smart device; obtaining settings of the smart device by accessing a configuration file containing settings of the smart device; comparing each of the settings of the device with known vulnerabilities to identify a vulnerability of the smart device that can be exploited; determining a repair action for repairing the at least one network vulnerability associated with at least one setting of the smart device based on the setting with the similar vulnerable status in the database; and transmitting instructions to the smart device to perform the repair action wherein the repair action comprises adjusting the setting of the smart device by making changes in the configuration file.Type: ApplicationFiled: November 21, 2017Publication date: March 15, 2018Inventors: Vyacheslav E Rusakov, Marta Anna Janus
-
Patent number: 9898739Abstract: Online transaction security is improved by detecting a start of an online financial transaction between a user-controlled online transaction application and a remote payment service. A protected data input module, a protected environment module, and a safe data transfer module each provides a corresponding set of protection operations. A risk level of conducting the financial transaction is assessed based on a vulnerability assessment and on present condition of the local computing system. An initial degree of protection for each of the modules is set, and subsequently adjusted based on the risk level.Type: GrantFiled: January 28, 2014Date of Patent: February 20, 2018Assignee: AO KASPERSKY LABInventors: Alexey V. Monastyrsky, Sergey Y. Golovanov, Vladislav V. Martynenko, Vyacheslav E. Rusakov
-
Patent number: 9860267Abstract: Disclosed are systems and methods for eliminating vulnerabilities of smart devices connected to a data network. An example method includes: identifying a router providing access to the data network, obtaining access to the network and transmitting a request through the data network to obtain access to a smart device on the network. Furthermore, the method includes accessing the smart device to obtain its settings, comparing the settings with known vulnerabilities, determining an action for repairing the a network vulnerability associated with the settings of the device, and transmitting instructions to the smart device to perform the action to repair network vulnerability associated with the setting.Type: GrantFiled: August 11, 2016Date of Patent: January 2, 2018Assignee: AO KASPERSKY LABInventors: Vyacheslav E. Rusakov, Marta Anna Janus
-
Patent number: 9787710Abstract: A method and system is provided for eliminating vulnerabilities on a data network including a router for directing data in the data network. An example method includes transmitting a request through the data network to obtain access to a device coupled to the data network; accessing the device to obtain a list of available resources of the device; comparing each of the available resources of the device with resource rules in a database to identify network vulnerabilities associated with the available resources and determining an action for repairing the network vulnerabilities associated with the available resources of the device. Furthermore, according to the method, instructions can be transmitted to the device to perform the action for repairing the network vulnerabilities associated with the available resources.Type: GrantFiled: May 6, 2016Date of Patent: October 10, 2017Assignee: AO Kaspersky LabInventors: Vyacheslav E. Rusakov, Marta Anna Janus
-
Publication number: 20170272459Abstract: A method and system is provided for eliminating vulnerabilities on a data network including a router for directing data in the data network. An example method includes transmitting a request through the data network to obtain access to a device coupled to the data network; accessing the device to obtain a list of available resources of the device; comparing each of the available resources of the device with resource rules in a database to identify network vulnerabilities associated with the available resources and determining an action for repairing the network vulnerabilities associated with the available resources of the device. Furthermore, according to the method, instructions can be transmitted to the device to perform the action for repairing the network vulnerabilities associated with the available resources.Type: ApplicationFiled: May 6, 2016Publication date: September 21, 2017Inventors: Vyacheslav E. Rusakov, Marta Anna Janus
-
Publication number: 20170272460Abstract: Disclosed are systems and methods for eliminating vulnerabilities of smart devices connected to a data network. An example method includes: identifying a router providing access to the data network, obtaining access to the network and transmitting a request through the data network to obtain access to a smart device on the network. Furthermore, the method includes accessing the smart device to obtain its settings, comparing the settings with known vulnerabilities, determining an action for repairing the a network vulnerability associated with the settings of the device, and transmitting instructions to the smart device to perform the action to repair network vulnerability associated with the setting.Type: ApplicationFiled: August 11, 2016Publication date: September 21, 2017Inventors: Vyacheslav E. Rusakov, Marta Anna Janus
-
Patent number: 9195832Abstract: Disclosed are systems and methods for detecting access of boot driver routines by malware. An example method includes identifying, by the driver interceptor, the one or more boot drivers that have been loaded into memory but not yet initialized; installing, by the driver interceptor, an interceptor handler operable to intercept calls of initialization routines of the one or more identified boot drivers; intercepting, by the driver interceptor, program calls to the initialization routines of the one or more identified boot drivers; storing, by intercept handler, information about the boot driver that is provided by the driver in the course of its initialization, wherein information contains at least address of the entry point for one or more routines of the boot driver; and providing access, by driver interceptor, to the routines of the boot driver by previously stored addresses of the entry points.Type: GrantFiled: January 28, 2015Date of Patent: November 24, 2015Inventors: Vyacheslav E. Rusakov, Andrey L. Kirzhemanov, Yury G. Parshin
-
Patent number: 9122872Abstract: Disclosed are systems, methods and computer program products for treatment of malware using an antivirus driver. In one aspect, an example method includes performing, by an antivirus software, an antivirus scan of the computer; detecting, by the antivirus software, a malicious object on the computer; formulating at least one task for treatment of the detected malicious object; configuring and activating on the computer an antivirus driver of the antivirus software to execute the at least one formulated task for treatment of the detected malicious object; and rebooting the computer by the antivirus software, whereby upon rebooting of the computer the antivirus driver is loaded by the operating system of the computer to execute the at least one task for treatment of the detected malicious object.Type: GrantFiled: September 8, 2014Date of Patent: September 1, 2015Assignee: AO Kaspersky LabInventors: Vyacheslav E. Rusakov, Oleg V. Zaitsev
-
Publication number: 20150088733Abstract: Online transaction security is improved by detecting a start of an online financial transaction between a user-controlled online transaction application and a remote payment service. A protected data input module, a protected environment module, and a safe data transfer module each provides a corresponding set of protection operations. A risk level of conducting the financial transaction is assessed based on a vulnerability assessment and on present condition of the local computing system. An initial degree of protection for each of the modules is set, and subsequently adjusted based on the risk level.Type: ApplicationFiled: January 28, 2014Publication date: March 26, 2015Applicant: Kaspersky Lab ZAOInventors: Alexey V. Monastyrsky, Sergey Y. Golovanov, Vladislav V. Martynenko, Vyacheslav E. Rusakov
-
Patent number: 8677492Abstract: System and method for detecting a security compromise of a service module of an operating system running on a computer. At least one native service module returns a first set of requested information relating to at least one object in the computer system in response to a request made by at least one process or thread. A secondary service module generates and returns a second set of requested information relating to the at least one object in the computer system in response to a request made by at least one authorized process or thread, bypassing the at least one native service module. Access of threads is limited to the secondary service module such that only predetermined threads generated by a trusted security application are permitted to access the secondary service module.Type: GrantFiled: November 29, 2010Date of Patent: March 18, 2014Assignee: Kaspersky Lab ZaoInventor: Vyacheslav E. Rusakov
-
Patent number: 8099596Abstract: Disclosed are systems, methods and computer program products for protecting applications deployed on a host computer from malware using virtualization. An exemplary malware protection system may include a kernel-level driver configured to intercept system calls addressed to an object of a protected application. The system also includes an analysis engine configured to determine if there are security rules associated with one or more of the intercepted system call, the object of the protected application, and the actions allowed on the object of the protected application. The security rules indicate whether the system call is allowed or not allowed to be executed on the host computer. If there is no security rule associated with the system call, the system call is executed in a secure execution environment of the host computer using a virtual copy of the object of the protected application.Type: GrantFiled: June 30, 2011Date of Patent: January 17, 2012Assignee: Kaspersky Lab ZaoInventors: Vyacheslav E. Rusakov, Alexander V. Shiryaev
-
Publication number: 20110289600Abstract: System and method for detecting a security compromise of a service module of an operating system running on a computer. At least one native service module returns a first set of requested information relating to at least one object in the computer system in response to a request made by at least one process or thread. A secondary service module generates and returns a second set of requested information relating to the at least one object in the computer system in response to a request made by at least one authorized process or thread, bypassing the at least one native service module. Access of threads is limited to the secondary service module such that only predetermined threads generated by a trusted security application are permitted to access the secondary service module.Type: ApplicationFiled: November 29, 2010Publication date: November 24, 2011Inventor: Vyacheslav E. Rusakov