Patents by Inventor Serguei Beloussov
Serguei Beloussov has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11995167Abstract: Disclosed herein are systems and method for authenticating user identity based on supplemental environment data. When a structured approach to acquiring user identifiers (e.g., facial images, voice clips, biometric data, etc.) of authorized user is inconclusive (e.g., a matching face is similar, but not a direct match) the systems and methods describe retrieving supplemental environment data that indirectly verifies a presence of the user in an environment. The systems and methods further comprise determining whether the supplemental environment data indicates that a respective identifier belongs to the user, and in response to determining that the supplemental environment data indicates that the respective identifier belongs to the user, authenticating the respective identifier as belonging to the user and storing the respective identifier in a database of identifiers.Type: GrantFiled: September 28, 2021Date of Patent: May 28, 2024Assignee: Acronis International GmbHInventors: Alexander Tormasov, Noam Herold, Yury Averkiev, Serguei Beloussov, Stanislav Protasov
-
Patent number: 11997132Abstract: The present disclosure includes methods and systems for protecting network resources. A method may start, by a processor, copy-on-write snapshotting for modifications to a plurality of files stored on electronic storage. A method may monitor, by the processor, access to objects within a file system associated with the electronic storage for a set of operations. A method may intercept, by the processor, one or more operation of the set of operations for modifying a region of a file in the file system. A method may capture, by the processor, one or more of original contents, modified contents and written contents of the region. A method may end, by the processor, copy-on-write snapshotting. A method may perform malware and/or ransomware analysis on a process performing the modification to the region of the file in the file system.Type: GrantFiled: October 26, 2022Date of Patent: May 28, 2024Assignee: Acronis International GmbHInventors: Vladimir Strogov, Alexey Dod, Valery Chernyakovskiy, Serguei Beloussov, Stanislav Protasov
-
Patent number: 11984105Abstract: Disclosed herein are systems and method for minimizing fan noise during a data backup. In one exemplary aspect, a method may comprise initiating, at a computing device, a data backup at a first backup rate, wherein the computing device comprises a fan that regulates an internal temperature of the computing device. The method may comprise calculating a noise level of the fan. The method may comprise comparing the noise level to a threshold noise level. In response to determining that the noise level exceeds the threshold noise level based on the comparison, the method may comprise reducing a backup rate of the data backup to a second backup rate, such that the noise level equals the threshold noise level. The method may comprise performing the data backup at the second backup rate.Type: GrantFiled: June 3, 2021Date of Patent: May 14, 2024Assignee: Acronis International GmbHInventors: Vladimir Simonov, Serguei Beloussov, Stanislav Protasov
-
Patent number: 11977633Abstract: A system and method for malware detection uses static and dynamic analysis to augment a machine learning model. At the training step, static and dynamic features are extracted from training datasets and used to train a malware classification model. The malware classification model is used to classify unknown files based on verdicts from both static and dynamic models.Type: GrantFiled: December 27, 2021Date of Patent: May 7, 2024Assignee: Acronis International GmbHInventors: Sergey Ulasen, Vladimir Strogov, Serguei Beloussov, Stanislav Protasov
-
Patent number: 11979230Abstract: Disclosed herein are systems and method for transmitting data from a sending device to a receiving device. In one aspect, an exemplary method comprises, receiving, by a first logical object created for the sending device, a request for a connection to the receiving device from an application, establishing, by a second logical object created for the sending device, a bidirectional connection between each pair of a third logical object created for the sending device and a third logical object created for the receiving device, pre-processing, by the first logical object created for the sending device, data received from the application, selecting, by the second logical object created for the sending device, one or more established bidirectional connections for transmitting the pre-processed data, and sending, by the first logical object created for the sending device, the pre-processed data, to the receiving device via the selected connections.Type: GrantFiled: September 30, 2020Date of Patent: May 7, 2024Assignee: Parallels International GmbHInventors: Sergey Pachkov, Lyubov Kulakova, Serguei Beloussov, Nikolay Dobrovolskiy
-
Patent number: 11966500Abstract: Disclosed herein are systems and method for isolating private information in streamed data. In an exemplary aspect, a method may comprise receiving a stream of data, for storage in a first storage device, and an indication of how the stream will be utilized by an end user. The method may comprise comparing the indication against a plurality of rules, wherein each rule indicates a type of private information that should be isolated from a given input stream based on a respective indication of usage for the given input stream. The method may comprise identifying and extracting a first type of private information that should be isolated from the stream, modifying the stream by removing the first type of private information from the stream, storing the modified stream in the first storage device, and storing the extracted first type of private information in a different location from the modified stream.Type: GrantFiled: August 6, 2021Date of Patent: April 23, 2024Assignee: Acronis International GmbHInventors: Alexander Tormasov, Serguei Beloussov, Stanislav Protasov
-
Patent number: 11968220Abstract: Disclosed herein are systems and method for performing failover during a cyberattack. In one exemplary aspect, a method comprises monitoring a computing device for the cyberattack and detecting that the cyberattack is in progress. While the cyberattack is in progress, the method comprises identifying a failover device that corresponds to the computing device, hardening the failover device to prevent the cyberattack from affecting the failover device, and performing failover by switching from the computing device to the failover device.Type: GrantFiled: November 8, 2021Date of Patent: April 23, 2024Assignee: Acronis International GmbHInventors: Nikolay Grebennikov, Candid Wüest, Serguei Beloussov, Stanislav Protasov
-
Patent number: 11941431Abstract: Disclosed are systems and methods for managing software applications. The system receives, via a graphical user interface, a request to generate a chain application with a sequence of execution comprising a first application and a second application. In response to determining that an output type of the first application is not compatible with an input type of the second application, the system updates, without further user input, the sequence of execution such that the second application precedes the first application. The system generates the chain application configured to execute the first application and the second application in the updated sequence of execution.Type: GrantFiled: May 17, 2021Date of Patent: March 26, 2024Assignee: Parallels International GmbHInventors: Sergey Kontsov, Nikolay Dobrovolskiy, Serguei Beloussov
-
Patent number: 11936513Abstract: An anomaly detection system uses an AI engine to analyze configurations and backups to identify and assess anomalies. Backup data and configurations are used to characterize events as either secure or insecure.Type: GrantFiled: March 30, 2021Date of Patent: March 19, 2024Assignee: Acronis International GmbHInventors: Alexander Tormasov, Anatoly Stupak, Serguei Beloussov, Stanislav Protasov
-
Patent number: 11921854Abstract: A method of continuous development of an internal threat scan engine based on an iterative quality assessment includes iteratively performing a dynamic assessment of a quality of a threat detection with a frequency defined for each of objects in an object collection, wherein a result of the dynamic assessment includes internal and external scan results of the objects and a consistency verdict of the internal and external scan results of the objects, changing a frequency of scanning iteration of the objects based on the consistency verdict of the external and internal scan results of the objects, classifying the objects based on the result of the dynamic assessment, and creating a development task including the internal and external scan results of the objects, meta-data of the objects, and automated test results to provide details for developing a software to fix inconsistency of the internal and external scan results.Type: GrantFiled: June 29, 2021Date of Patent: March 5, 2024Assignee: Acronis International GmbHInventors: Andrey Kulaga, Nikolay Balakin, Nikolay Grebennikov, Serguei Beloussov, Stanislav Protasov
-
Patent number: 11921850Abstract: A system and method of anti-malware analysis including iterative techniques that combine static and dynamic analysis of untrusted programs or files. These techniques are used to identify malicious files by iteratively collecting new data for static analysis through dynamic run-time analysis.Type: GrantFiled: June 23, 2021Date of Patent: March 5, 2024Assignee: Acronis International GmbHInventors: Vladimir Strogov, Alexey Malanov, Sergey Ulasen, Vyacheslav Levchenko, Serguei Beloussov, Stanislav Protasov
-
Patent number: 11916930Abstract: A system and method are disclosed for performing non-invasive scan of a target device. The system is configured for: i) loading an endpoint protection agent to a target device; ii) providing a remote direct memory access of the target device to the remote security server for reading a memory of the target device; iii) scanning, by a second memory scan engine of the remote security server, the memory of the target device upon the violation of the security policy; iv) identifying, by the second memory scan engine of the remote security server, a threat on the target device; and v) sending, by the remote security server, a security response action to the endpoint protection agent on the target device in accordance with the security policy.Type: GrantFiled: June 29, 2021Date of Patent: February 27, 2024Assignee: Acronis International GmbHInventors: Alexander Tormasov, Serguei Beloussov, Stanislav Protasov
-
Patent number: 11914724Abstract: Disclosed herein are systems and method for adjusting data protection levels based on system metadata. A method may include monitoring a computing device for a cyberattack, wherein a kernel driver of the computing device is configured to allow access to kernel control paths and hash tables in accordance with a first protection level, and detecting that the cyberattack is in progress. While the cyberattack is in progress, the method may include identifying kernel control paths and hashes of software objects that will be affected by the cyberattack, and configuring the kernel driver to disable access to the identified kernel control paths and hashes of the software objects in accordance with a second protection level, wherein the second protection level includes greater access restrictions to the computing device than the first protection level.Type: GrantFiled: December 19, 2021Date of Patent: February 27, 2024Assignee: Acronis International GmbHInventors: Nikolay Grebennikov, Candid Wüest, Serguei Beloussov, Stanislav Protasov
-
Patent number: 11893127Abstract: Disclosed herein are systems and methods for indexing and searching an encrypted archive. In one exemplary aspect, a method comprises generating, by a hardware processor, an encrypted data archive based on a user backup performed using a backup plan with an encryption flag enabled and a user key; generating, by the hardware processor, an index key for the encrypted data archive; encrypting, by the hardware processor, the index key using the user key; storing, by the hardware processor, the index key in a secure data storage; creating and mounting, by the hardware processor, an encrypted file system folder for the encrypted data archive using the index key; decrypting, by the hardware processor, data in the encrypted data archive using the user key; and indexing, by the hardware processor, the decrypted data.Type: GrantFiled: December 20, 2019Date of Patent: February 6, 2024Assignee: Acronis International GmbHInventors: Hiten Gajjar, Dian Bakti, Prabhuraj Reddy, Stanislav Protasov, Serguei Beloussov
-
Patent number: 11882044Abstract: Disclosed are systems and methods for managing computing resources for a remote session that has been established between a client and a remote server via a communication channel. Such a remote session is configured to automatically adapt image quality of the remote session based on a network status of the communication channel. The described technique includes detecting an inactive state of the remote session, and in turn, modifying at least one network setting of the client using a network shaping rule specified to artificially reduce a network quality of the communication channel used by the client for traffic of the remote session, so as to cause the client to reduce image quality of the remote session and reduce an amount of data exchanged between the remote server and the client.Type: GrantFiled: July 23, 2021Date of Patent: January 23, 2024Assignee: Parallels International GmbHInventors: Ivan Korobov, Nikolay Dobrovolskiy, Serguei Beloussov
-
Patent number: 11874745Abstract: Disclosed herein are systems and method for determining a backup schedule on a computer system. In one exemplary aspect, a method may comprise collecting user behavior data on the computer system. The method may comprise analyzing the user behavior data to determine an optimal time of a backup session to create backup copies of modified data stored on a volume of the computer system and determining an optimal duration of the backup session based on the analyzed user behavior. The method may comprise determining a portion of the modified data that can be saved during the backup session within the optimal duration at the optimal time of backup, and performing the backup session comprising the portion.Type: GrantFiled: May 16, 2022Date of Patent: January 16, 2024Assignee: Acronis International GmbHInventors: Alexander Tormasov, Serguei Beloussov, Stanislav Protasov
-
Patent number: 11874920Abstract: Disclosed herein are systems and methods for preventing malicious injections. In one aspect, a method includes monitoring active processes that are running in suspended mode. For each active process being monitored, the method includes injecting a dynamic link library (DLL) into the active process to hook an application programming interface (API) of an application corresponding to the active process, wherein the DLL is injected for tracking commands for suspension and resumption of the active process. The method includes monitoring file inputs and outputs of the application for anomalies while the active process is in the suspended mode, and when a command for resuming the active process is detected using the DLL, determining, based on the monitoring, whether a malicious process is inserted into the active process. The method includes allowing the suspended process to resume execution in response to determining that no malicious process is inserted in the active process.Type: GrantFiled: December 6, 2021Date of Patent: January 16, 2024Assignee: Acronis International GmbHInventors: Vladimir Strogov, Serguei Beloussov, Stanislav Protasov
-
Patent number: 11861390Abstract: A processing device in a host computer system receives an instruction to write data to a storage device coupled to the host computer system and store a copy of the data in a cache of the host computer system. The processing device initiates a write operation to write the data from the cache to the storage device and detects that the storage device is disconnected from the host computer system during execution of the write operation. In response to detecting that the storage device is disconnected, the processing device may suspend execution of at least one of a virtual machine or a process that issued the first instruction. After determining that the storage device is reconnected to the host computer system, the processing device can resume the write operation to continue writing the data from the cache to the storage device.Type: GrantFiled: January 20, 2022Date of Patent: January 2, 2024Assignee: Parallels International GmbHInventors: Alexander Grechishkin, Konstantin Ozerkov, Alexey Koryakin, Nikolay Dobrovolskiy, Serguei Beloussov
-
Patent number: 11836252Abstract: A system and method of anti-malware analysis including iterative techniques. These techniques are used to create a file attribute tree used by a machine learning analyzer to identify malicious files.Type: GrantFiled: June 23, 2021Date of Patent: December 5, 2023Assignee: Acronis International GmbHInventors: Vladimir Strogov, Alexey Malanov, Sergey Ulasen, Vyacheslav Levchenko, Serguei Beloussov, Stanislav Protasov
-
Patent number: 11822659Abstract: Disclosed herein are systems and method for anti-malware scanning, including identifying a plurality of objects in a backup archive that is connected to a first network comprising a plurality of computing devices; scanning the plurality of objects in the backup archive to generate a whitelist indicating a subset of the plurality of objects that do not need to be scanned at a subsequent time; performing, using the whitelist, a first malware scan in a computing device of the plurality of computing devices; detecting that the computing device has left the first network to join a second network; and performing a second malware scan on the computing device, wherein the second malware scan uses a different whitelist of the second network, and wherein the second malware scan comprises scanning a first object that is not in the different whitelist and was not scanned in the first malware scan.Type: GrantFiled: January 5, 2023Date of Patent: November 21, 2023Assignee: Acronis International GmbhInventors: Dmitry Gryaznov, Oleg Ishanov, Vladimir Strogov, Andrey Kulaga, Igor Kornachev, Stanislav Protasov, Serguei Beloussov