Systems and methods for policy-based program configuration
    1.
    发明授权
    Systems and methods for policy-based program configuration 有权
    基于策略的程序配置的系统和方法

    公开(公告)号:US08079060B1

    公开(公告)日:2011-12-13

    申请号:US13034257

    申请日:2011-02-24

    申请人: Oleg V. Zaitsev

    发明人: Oleg V. Zaitsev

    IPC分类号: G06F17/00 H04L29/06

    摘要: Disclosed are systems, methods and computer program products for adaptive policy-based configuration of programs. An example method comprises collecting from computer system configuration and performance information and rating system performance based on the collected information. The method further includes selecting based on the performance rating an operational policy for a computer program. The policy specifies program settings and limits of system resource utilization by the program. The method further includes monitoring system resource utilization during program execution on the computer system to determine whether system resource utilization exceeds the limit specified in the operational policy. If the system resource utilization exceeds the specified limit, the method selects another policy specifying different program settings and a different limit of system resource utilization.

    摘要翻译: 公开了用于基于策略的程序配置的系统,方法和计算机程序产品。 一种示例性方法包括基于所收集的信息从计算机系统配置和性能信息和评级系统性能中收集。 该方法还包括基于对计算机程序的操作策略的性能等级进行选择。 该策略指定程序设置和程序对系统资源利用的限制。 该方法还包括在计算机系统上的程序执行期间监视系统资源利用,以确定系统资源利用是否超过操作策略中指定的限制。 如果系统资源利用率超过规定的限制,则该方法会选择另一个指定不同程序设置和系统资源利用限制的策略。

    Adaptive configuration of conflicting applications
    2.
    发明授权
    Adaptive configuration of conflicting applications 有权
    冲突应用程序的自适应配置

    公开(公告)号:US07925874B1

    公开(公告)日:2011-04-12

    申请号:US12892997

    申请日:2010-09-29

    申请人: Oleg V. Zaitsev

    发明人: Oleg V. Zaitsev

    IPC分类号: G06F9/00

    摘要: Disclosed are systems, methods and computer program products for adaptive configuration of conflicting applications. An example method comprises collecting system configuration information from a computer system, including system hardware and software information. The method further comprises monitoring system resource utilization during execution of a first program and one or more second programs. The method further comprises determining one or more critical levels of system resource utilization by applying fuzzy logic rules to the collected system configuration information. When the monitored system resource utilization exceeds the determined critical level for a predetermined period of time, determining, based on the collected software information, if the first program conflicts with execution of one or more second programs. Determining whether conflicting second programs are harmful to the computer system and changing configuration settings of the first program to resolve conflicts with the conflicting second programs that are harmless.

    摘要翻译: 公开了用于自适应配置冲突应用的系统,方法和计算机程序产品。 示例性方法包括从计算机系统收集系统配置信息,包括系统硬件和软件信息。 该方法还包括在执行第一程序和一个或多个第二程序期间监视系统资源利用。 该方法还包括通过对所收集的系统配置信息应用模糊逻辑规则来确定系统资源利用的一个或多个关键级别。 当所监视的系统资源利用率超过确定的临界水平达预定时间段时,基于收集的软件信息确定第一程序是否与一个或多个第二程序的执行冲突。 确定冲突的第二个程序是否有害于计算机系统和改变第一个程序的配置设置,以解决与无害的冲突的第二个程序的冲突。

    System for permanent file deletion
    3.
    发明授权
    System for permanent file deletion 有权
    永久删除文件的系统

    公开(公告)号:US08812563B2

    公开(公告)日:2014-08-19

    申请号:US12906768

    申请日:2010-10-18

    申请人: Oleg V. Zaitsev

    发明人: Oleg V. Zaitsev

    IPC分类号: G06F17/30 G06F21/62 G06F3/06

    摘要: A system for permanent data deletion is provided. The file deletion system consists of a permanent deletion unit, an analysis module, a database of rules for forming deletion algorithm and an algorithm forming unit. A file to be deleted is passed into the system and the system permanently deletes the file. The system dynamically forms the deletion algorithm based on algorithm forming rules. The rules are selected from the database according to file parameters and user criteria. The file parameters are determined by the analysis module. A user has an access to algorithm forming rules and can edit the rules. Algorithm forming rules can be based on an arbitrary number of complex conditions.

    摘要翻译: 提供了永久性数据删除的系统。 文件删除系统由永久删除单元,分析模块,用于形成删除算法的规则数据库和算法形成单元组成。 要删除的文件被传递到系统中,系统会永久删除该文件。 系统基于算法形成规则动态形成删除算法。 根据文件参数和用户标准从数据库中选择规则。 文件参数由分析模块决定。 用户可以访问算法形成规则并且可以编辑规则。 算法形成规则可以基于任意数量的复杂条件。

    System and method for controlling user's access to protected resources using multi-level authentication
    4.
    发明授权
    System and method for controlling user's access to protected resources using multi-level authentication 有权
    使用多级认证控制用户对受保护资源的访问的系统和方法

    公开(公告)号:US08769657B2

    公开(公告)日:2014-07-01

    申请号:US13620770

    申请日:2012-09-15

    申请人: Oleg V. Zaitsev

    发明人: Oleg V. Zaitsev

    摘要: Disclosed are systems, methods and computer program products for multi-level user authentication. In one example, method includes detecting a plug-in token connected to a device that controls user access to a protected resource; identifying one or more authorized users associated with the detected token who are authorized to access the protected resource; authenticating whether a first user requesting accessing the protected resource is associated with the detected token and authorized to access the protected resource; detecting presence of one or more wireless transponders of one or more authorized users associated with the token, including at least a transponder of the first user; and providing access to the protected resource to the first user when the first user is authenticated as an authorized user associated with the detected token and the transponder of at least the first user is detected.

    摘要翻译: 公开了用于多级用户认证的系统,方法和计算机程序产品。 在一个示例中,方法包括检测连接到控制用户对受保护资源的访问的设备的插件令牌; 识别与被检测的令牌相关联的被授权访问受保护的资源的一个或多个授权用户; 认证请求访问受保护资源的第一用户是否与检测到的令牌相关联并被授权访问受保护的资源; 检测与令牌相关联的一个或多个授权用户的一个或多个无线应答器的存在,包括至少第一用户的应答器; 以及当所述第一用户被认证为与所检测到的令牌相关联的授权用户并且至少检测到所述第一用户的应答器时,向所述第一用户提供对所述受保护资源的访问。

    Efficient management of computer resources
    5.
    发明授权
    Efficient management of computer resources 有权
    有效管理电脑资源

    公开(公告)号:US08505021B2

    公开(公告)日:2013-08-06

    申请号:US13220189

    申请日:2011-08-29

    申请人: Oleg V. Zaitsev

    发明人: Oleg V. Zaitsev

    IPC分类号: G06F9/46

    CPC分类号: G06F9/5022 G06F12/0253

    摘要: System, method, and computer-readable medium for managing removal of unused objects on a subject computer system that includes a plurality of computing resources. Current configuration and operational state information of a subject computer system are analyzed to detect a presence of unused objects on the subject computer system. An estimated degree of impact that unused objects have on the workload of at least one computing resource of the plurality of computing resources is obtained. A measure of the exigency of taking action to remove the unused objects is determined based on the estimated degree of impact and on the current degree of workload of the at least one computing resource. Instructions are generated for removing specific ones of the unused objects for which the exigency of taking action is sufficiently great.

    摘要翻译: 用于管理在包括多个计算资源的主题计算机系统上的未使用对象的移除的系统,方法和计算机可读介质。 分析主题计算机系统的当前配置和操作状态信息,以检测主题计算机系统上未使用的对象的存在。 获得了未使用对象对多个计算资源中的至少一个计算资源的工作负载的估计的影响程度。 基于所估计的影响程度和所述至少一个计算资源的当前工作程度来确定采取行动去除未使用对象的紧急程度的度量。 生成用于去除特定的未使用对象的指令,其中采取动作的紧急性足够大。

    Portable Security Device and Methods for Detection and Treatment of Malware
    6.
    发明申请
    Portable Security Device and Methods for Detection and Treatment of Malware 有权
    便携式安全设备和恶意软件检测和处理方法

    公开(公告)号:US20130007883A1

    公开(公告)日:2013-01-03

    申请号:US13482490

    申请日:2012-05-29

    申请人: Oleg V. Zaitsev

    发明人: Oleg V. Zaitsev

    IPC分类号: G06F21/00

    摘要: Disclosed is a portable security device and method for detection and treatment of computer malware. The security device includes a communication interface for connecting to a computer, a memory for storing a set of data for use in malware detection experiments, and an antivirus engine configured to perform one or more malware detection experiments on the computer. A malware detection experiment includes simulating a connection to the computer of a data storage device containing a predefined set of data. The antivirus engine further configured to identify modifications in the set of data contained in the data storage device after termination of one or more malware detection experiments, analyze a modified set of data for presences of computer malware, determine a treatment mechanism for the detected malware, perform treatment of the detected malware on the computer, and generate user reports.

    摘要翻译: 公开了用于检测和处理计算机恶意软件的便携式安全装置和方法。 安全装置包括用于连接到计算机的通信接口,用于存储用于恶意软件检测实验的一组数据的存储器,以及被配置为在计算机上执行一个或多个恶意软件检测实验的防病毒引擎。 恶意软件检测实验包括模拟与包含预定义数据集的数据存储设备的计算机的连接。 防病毒引擎还被配置为在终止一个或多个恶意软件检测实验之后识别包含在数据存储设备中的数据集合中的修改,分析用于计算机恶意软件存在的修改的数据集,确定检测到的恶意软件的处理机制, 对计算机上检测到的恶意软件执行处理,并生成用户报告。

    Systems and Methods for Policy-Based Program Configuration
    7.
    发明申请
    Systems and Methods for Policy-Based Program Configuration 有权
    基于策略的程序配置的系统和方法

    公开(公告)号:US20110289585A1

    公开(公告)日:2011-11-24

    申请号:US13034257

    申请日:2011-02-24

    申请人: Oleg V. Zaitsev

    发明人: Oleg V. Zaitsev

    IPC分类号: G06F9/00 G06F21/00

    摘要: Disclosed are systems, methods and computer program products for adaptive policy-based configuration of programs. An example method comprises collecting from computer system configuration and performance information and rating system performance based on the collected information. The method further includes selecting based on the performance rating an operational policy for a computer program. The policy specifies program settings and limits of system resource utilization by the program. The method further includes monitoring system resource utilization during program execution on the computer system to determine whether system resource utilization exceeds the limit specified in the operational policy. If the system resource utilization exceeds the specified limit, the method selects another policy specifying different program settings and a different limit of system resource utilization.

    摘要翻译: 公开了用于基于策略的程序配置的系统,方法和计算机程序产品。 一种示例性方法包括基于所收集的信息从计算机系统配置和性能信息和评级系统性能中收集。 该方法还包括基于对计算机程序的操作策略的性能等级进行选择。 该策略指定程序设置和程序对系统资源利用的限制。 该方法还包括在计算机系统上的程序执行期间监视系统资源利用,以确定系统资源利用是否超过操作策略中指定的限制。 如果系统资源利用率超过规定的限制,则该方法会选择另一个指定不同程序设置和系统资源利用限制的策略。

    Systems and methods for policy-based program configuration
    8.
    发明授权
    Systems and methods for policy-based program configuration 有权
    基于策略的程序配置的系统和方法

    公开(公告)号:US07917954B1

    公开(公告)日:2011-03-29

    申请号:US12892678

    申请日:2010-09-28

    申请人: Oleg V. Zaitsev

    发明人: Oleg V. Zaitsev

    摘要: Disclosed are systems, methods and computer program products for adaptive polity-based configuration of programs. An example method comprises collecting from a computer system configuration and performance information, rating system performance based on the collected information and classifying the computer system based on its performance rating. The method further includes selecting based on the system classification an operational policy for a computer program. Each policy specifies different program settings and different limits of system resource utilization by the program for each class of computer systems. The method further includes monitoring system resource utilization during program execution to determine whether system resource utilization exceeds the limit specified in the selected operational policy. If the system resource utilization exceeds the specified limit, the method selects another policy specifying different program settings and a different limit of system resource utilization.

    摘要翻译: 公开了用于基于自适应政策的程序配置的系统,方法和计算机程序产品。 示例性方法包括从计算机系统配置和性能信息收集基于所收集的信息的评级系统性能,并且基于其性能等级对计算机系统进行分类。 该方法还包括基于系统分类来选择计算机程序的操作策略。 每个策略通过程序为每类计算机系统指定不同的程序设置和系统资源利用的不同限制。 该方法还包括在程序执行期间监视系统资源利用以确定系统资源利用是否超过所选择的操作策略中指定的限制。 如果系统资源利用率超过规定的限制,则该方法会选择另一个指定不同程序设置和系统资源利用限制的策略。

    System and method for automatic generation of heuristic algorithms for malicious object identification
    9.
    发明授权
    System and method for automatic generation of heuristic algorithms for malicious object identification 有权
    用于自动生成用于恶意对象识别的启发式算法的系统和方法

    公开(公告)号:US09147073B2

    公开(公告)日:2015-09-29

    申请号:US13756685

    申请日:2013-02-01

    申请人: Oleg V. Zaitsev

    发明人: Oleg V. Zaitsev

    IPC分类号: G06F21/00 G06F21/56

    CPC分类号: G06F21/567 G06F2221/2101

    摘要: A server-based system for generation of heuristic scripts for malware detection includes an automatic heuristics generation system for generating heuristic scripts for curing malware infections; a log database containing logs of events from user computers, including detection of known malicious objects and detection of suspicious objects; a safe objects database accessible containing signatures of known safe objects; a malicious objects database containing signatures of known malicious objects. The system retrieves suspect object metadata from the log database and generates the heuristic script based on data from the safe and malicious objects databases. For multiple computers having the same configuration and having the same logs, only one log common to all the multiple computers is transmitted and only one heuristic script is distributed to the multiple computers. A different and specific heuristic script is distributed to those computers that have a different log than the common log.

    摘要翻译: 用于生成用于恶意软件检测的启发式脚本的基于服务器的系统包括用于生成用于治疗恶意软件感染的启发式脚本的自动启发式生成系统; 日志数据库,其中包含来自用户计算机的事件日志,包括已知恶意对象的检测和可疑对象的检测; 可访问的安全对象数据库,包含已知安全对象的签名; 恶意对象数据库包含已知恶意对象的签名。 系统从日志数据库中检索可疑对象元数据,并根据安全和恶意对象数据库中的数据生成启发式脚本。 对于具有相同配置并具有相同日志的多台计算机,只传输所有多台计算机通用的一个日志,并且只有一个启发式脚本被分发到多台计算机。 不同的特定的启发式脚本被分发到与普通日志不同的那些计算机上。

    System and Method for Detection and Treatment of Malware on Data Storage Devices
    10.
    发明申请
    System and Method for Detection and Treatment of Malware on Data Storage Devices 有权
    用于数据存储设备上恶意软件检测和处理的系统和方法

    公开(公告)号:US20130318610A1

    公开(公告)日:2013-11-28

    申请号:US13477283

    申请日:2012-05-22

    申请人: Oleg V. Zaitsev

    发明人: Oleg V. Zaitsev

    IPC分类号: G06F21/00

    摘要: Disclosed are systems and methods for detection and repair of malware on data storage devices. The system includes a controller, a communication interface for connecting an external data storage device, and a memory for storing antivirus software. The antivirus software is configured to scan the data contained in the data storage device, perform repair or removal of malicious files or programs found on the data storage device, identify suspicious files or programs on the data storage device and malicious files or programs that cannot be repaired or removed from the data storage device, send information about these files or programs to the antivirus software provider, receive updates for the antivirus software from the antivirus software provider, and rescan the suspicious files or programs and malicious files or programs that cannot be repaired or removed using updated antivirus software.

    摘要翻译: 公开了用于在数据存储设备上检测和修复恶意软件的系统和方法。 该系统包括控制器,用于连接外部数据存储设备的通信接口和用于存储防病毒软件的存储器。 防病毒软件被配置为扫描数据存储设备中包含的数据,执行修复或删除数据存储设备上发现的恶意文件或程序,识别数据存储设备上的可疑文件或程序以及不可能存在的恶意文件或程序 从数据存储设备修复或删除,将有关这些文件或程序的信息发送到防病毒软件提供商,从防病毒软件提供商接收防病毒软件的更新,并重新扫描可疑文件或程序以及无法修复的恶意文件或程序 或使用更新的防病毒软件删除。