MidCap Financial Trust

United States of America

Back to Profile

1-100 of 123 for MidCap Financial Trust Sort by
Query
Aggregations
IP Type
        Patent 120
        Trademark 3
Jurisdiction
        United States 120
        Europe 3
Date
2022 3
2021 12
2020 19
Before 2020 89
IPC Class
G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result 35
H04L 29/06 - Communication control; Communication processing characterised by a protocol 24
G06F 12/00 - Accessing, addressing or allocating within memory systems or architectures 20
G06F 3/06 - Digital input from, or digital output to, record carriers 17
G06F 11/00 - Error detectionError correctionMonitoring 15
See more
NICE Class
09 - Scientific and electric apparatus and instruments 3
35 - Advertising and business services 3
41 - Education, entertainment, sporting and cultural services 3
42 - Scientific, technological and industrial services, research and design 3
16 - Paper, cardboard and goods made from these materials 2
See more
Status
Pending 5
Registered / In Force 118
  1     2        Next Page

1.

Miscellaneous Design

      
Application Number 018769021
Status Registered
Filing Date 2022-09-27
Registration Date 2023-02-18
Owner MidCap Financial Trust (USA)
NICE Classes  ?
  • 09 - Scientific and electric apparatus and instruments
  • 16 - Paper, cardboard and goods made from these materials
  • 21 - HouseHold or kitchen utensils, containers and materials; glassware; porcelain; earthenware
  • 25 - Clothing; footwear; headgear
  • 35 - Advertising and business services
  • 38 - Telecommunications services
  • 41 - Education, entertainment, sporting and cultural services
  • 42 - Scientific, technological and industrial services, research and design

Goods & Services

Recorded content; Computer databases; Media content; Software; Electronic publications, downloadable; Podcasts; Information technology and audio-visual, multimedia and photographic devices; Downloadable electronic books; Videocasts; Animated cartoons; Downloadable computer graphics; Virtual and augmented reality software; Computer programmes for interactive television and for interactive games and/or quizzes. Printed matter, stationery and educational supplies; Printed books, magazines, newspapers, and other paper-based media; Teaching materials [except apparatus]; Gift cards; Posters made of paper. Tableware, cookware and containers; Glasses, drinking vessels and barware; Drinking bottles; Cups. Clothing, footwear, headgear. Advertising, marketing and promotional services. telecommunication servies; Broadcasting services; Computer communication and Internet access; Access to content, websites and portals; Providing access to platforms on the Internet; Telecommunication services provided via Internet platforms and portals; Providing internet chatrooms. Publishing, reporting, and writing of texts; Providing online electronic publications, not downloadable; Online publication of electronic books and journals; Online publication of electronic newspapers; Training, education, entertainment and sporting activities; Audio, video and multimedia production, and photography; Education; Providing of training; Entertainment; Sporting and cultural activities; Arranging of training courses; Conducting of courses; Conducting of classes; Arranging of classes; Arranging and conducting of tutorials; Provision of online tutorials; Arranging and conducting of lectures; Coaching; Organisation of quizzes, games and competitions; Television show production. IT services; Software development, programming and implementation; Hosting services and software as a service and rental of software; IT consultancy, advisory and information services.

2.

SYSTEMS AND METHODS FOR SYNTHETIC FILE SCANNING

      
Application Number 17393774
Status Pending
Filing Date 2021-08-04
First Publication Date 2022-02-17
Owner MIDCAP FINANCIAL TRUST (USA)
Inventor
  • Tormasov, Alexander
  • Beloussov, Serguei
  • Protasov, Stanislav

Abstract

Disclosed herein are systems and method for synthetic file scanning. In one exemplary aspect, a method may comprise, for each respective file in a plurality of files on a storage device, determining a respective likelihood of the respective file being targeted by the malicious activity, and including, in a subset of files, each respective file in the plurality of files with a respective likelihood that is greater than a threshold likelihood. The method may comprise for each respective file in the subset of files, identifying at least one fragment of the respective file that is susceptible to the malicious activity. The method may comprise extracting and storing at least one fragment from each respective file in a synthetic file, and scanning the synthetic file periodically instead of the plurality of files.

IPC Classes  ?

  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result

3.

Granular recovery using hot-plug virtual disks

      
Application Number 17032705
Grant Number 11243696
Status In Force
Filing Date 2020-09-25
First Publication Date 2022-02-08
Grant Date 2022-02-08
Owner MIDCAP FINANCIAL TRUST (USA)
Inventor
  • Ruslyakov, Alexey A.
  • Lyadvinsky, Maxim V.
  • Manukyan, Emil
  • Beloussov, Serguei M.

Abstract

A method, computer program product, computing system, and system for using hot-plug virtual disks in granular recovery are described. The method may include receiving, at a cloud computing site, a backup configuration including a list of protected resources associated with a cloud computing tenant. The method may further include mounting a hot-plug virtual disk to a virtual machine including the protected resources associated with the cloud computing tenant. The method may also include collecting metadata corresponding to the protected resources associated with the cloud computing tenant. The method may additionally include generating, at the cloud computing site, a backup of the virtual machine including the protected resources associated with the cloud computing tenant. Moreover, the method may include storing the metadata corresponding to the protected resources associated with the cloud computing tenant and storing the backup of the virtual machine including the protected resources associated with the cloud computing tenant.

IPC Classes  ?

  • G06F 11/00 - Error detectionError correctionMonitoring
  • G06F 3/06 - Digital input from, or digital output to, record carriers
  • G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
  • G06F 11/07 - Responding to the occurrence of a fault, e.g. fault tolerance

4.

Systems and methods for generating tokens using secure multiparty computation engines

      
Application Number 16878201
Grant Number 11201737
Status In Force
Filing Date 2020-05-19
First Publication Date 2021-11-25
Grant Date 2021-12-14
Owner MIDCAP FINANCIAL TRUST (USA)
Inventor
  • Will, Mark A.
  • Solanki, Sanjeev
  • Sivanesan, Kailash
  • Beloussov, Serguei
  • Protasov, Stanislav

Abstract

Disclosed herein are systems and methods for generating tokens using SMPC compute engines. In one aspect, a method may hash, by a node, a data input with a salt value. The method may split, by the node, the hashed data input into a plurality of secret shares, wherein each respective secret share of the plurality of secret shares is assigned to a respective SMPC compute engine of a plurality of SMPC compute engines. The respective SMPC compute engines may be configured to collectively hash the respective secret share with a secret salt value, unknown to the plurality of SMPC compute engines. The respective SMPC compute engine may further receive a plurality of hashed secret shares from remaining SMPC compute engines of the plurality of SMPC compute engines, and generate a token, wherein the token is a combination of the hashed respective secret share and the plurality of hashed secret shares.

IPC Classes  ?

  • H04L 9/08 - Key distribution
  • H04L 9/06 - Arrangements for secret or secure communicationsNetwork security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

5.

Remote private key security

      
Application Number 15165303
Grant Number 11184335
Status In Force
Filing Date 2016-05-26
First Publication Date 2021-11-23
Grant Date 2021-11-23
Owner MIDCAP FINANCIAL TRUST (USA)
Inventor
  • Beloussov, Serguei M.
  • Tormasov, Alexander
  • Protasov, Stanislav

Abstract

A method for remote private key security is described. The method may include generating a private key and may further include generating encrypted data by encrypting data using an encryption algorithm, wherein the data is stored at a first location and the private key is for the encrypted data. The method may also include transmitting the private key to a remote private key deposit at a second location. The method may additionally include transmitting the encrypted data to a remote data center at a third location. Moreover, the method may include permitting access to the private key at the remote private key deposit to an individual at the second location in response to confirming an identity of the individual present at the second location.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

6.

SYSTEMS AND METHODS FOR PROVIDING DATA ACCESS BASED ON PHYSICAL PROXIMITY TO DEVICE

      
Application Number 17111588
Status Pending
Filing Date 2020-12-04
First Publication Date 2021-08-05
Owner MIDCAP FINANCIAL TRUST (USA)
Inventor
  • Tormasov, Alexander
  • Beloussov, Serguei
  • Protasov, Stanislav

Abstract

Disclosed herein are systems and method for providing data access based on physical proximity between a user and a device. In one aspect, the method may comprise receiving, at the device, a request to access protected data, wherein the request comprises an authentication key for accessing the protected data. In response to verifying both that the authentication key is valid and that the device is being accessed by a proximate user based on the initial biometrics data, the method may comprise retrieving a presence profile that comprises historic biometric attributes of the authorized user. Simultaneous to collecting new biometric attributes of the proximate user, the method may comprise generating and comparing the temporary presence profile with the presence profile of the authorized user. While the temporary presence profile matches the presence profile, the method may comprise enabling access to the protected data.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

7.

Recovery of virtual machine files using disk attachment

      
Application Number 14320510
Grant Number 11042309
Status In Force
Filing Date 2014-06-30
First Publication Date 2021-06-22
Grant Date 2021-06-22
Owner MIDCAP FINANCIAL TRUST (USA)
Inventor
  • Per, Yuri
  • Lyadvinsky, Maxim V.
  • Beloussov, Serguei M.
  • Egorov, Dmitry
  • Kandaurov, Sergey

Abstract

A method, computer program product, computing system, and system for recovery of virtual machine files are described. The method may include creating a backup archive file, the backup archive file including a backup of a first virtual disk corresponding to a virtual machine hosted by a virtualization host device. The method may further include storing the backup archive file including the backup. The method may also include creating a second virtual disk that emulates the first virtual disk using data from the backup archive file. The method may additionally include communicatively attaching the second virtual disk to the virtual machine hosted by the virtualization host device. Moreover, the method may include transferring data from the second virtual disk to the first virtual disk corresponding to the virtual machine hosted by the virtualization host device.

IPC Classes  ?

  • G06F 12/00 - Accessing, addressing or allocating within memory systems or architectures
  • G06F 12/08 - Addressing or allocationRelocation in hierarchically structured memory systems, e.g. virtual memory systems
  • G06F 13/00 - Interconnection of, or transfer of information or other signals between, memories, input/output devices or central processing units
  • G06F 3/06 - Digital input from, or digital output to, record carriers
  • G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result

8.

SYSTEMS AND METHODS FOR TRAINING PLAYERS IN A SPORTS CONTEST USING ARTIFICIAL INTELLIGENCE

      
Application Number 17066528
Status Pending
Filing Date 2020-10-09
First Publication Date 2021-06-10
Owner MIDCAP FINANCIAL TRUST (USA)
Inventor
  • Tormasov, Alexander
  • Beloussov, Serguei
  • Protasov, Stanisiav

Abstract

Disclosed herein are systems and method for training a player in a sports contest. In an exemplary aspect, a method may comprise receiving a strategy to be implemented in a sports contest by at least one player. The method may comprise determining a success rate of the strategy based on historical data of the at least one player. In response to determining that the success rate is less than a threshold success rate, the method may comprise identifying game obstacles in instances where the strategy was implemented by the at least one player and did not achieve the goal. The method may comprise determining a modified strategy that minimizes encounters of the at least one player with the game obstacles and achieves the goal of the strategy. The method may comprise outputting a training procedure for implementing the modified strategy for presentation to the at least one player.

IPC Classes  ?

  • A63B 24/00 - Electric or electronic controls for exercising apparatus of groups
  • G06T 5/50 - Image enhancement or restoration using two or more images, e.g. averaging or subtraction
  • G06N 20/00 - Machine learning
  • G06T 7/55 - Depth or shape recovery from multiple images

9.

Systems and methods for the recovery of virtual machines

      
Application Number 14019040
Grant Number 11023329
Status In Force
Filing Date 2013-09-05
First Publication Date 2021-06-01
Grant Date 2021-06-01
Owner MIDCAP FINANCIAL TRUST (USA)
Inventor
  • Per, Yuri
  • Egorov, Dmitry
  • Semyonov, Vasily
  • Gentilhomme, Alain Marie Patrice
  • Beloussov, Serguei M.

Abstract

A method, computer program product, and computing system for recovery of virtual machines are described. A method may include creating, via a computing device, an image of at least a portion of a virtual machine disk. The method may further include comparing, via the computing device, the image of the portion of the virtual machine disk with the portion of the virtual machine disk that currently exists to determine changed sectors of the portion of the virtual machine disk. The method may additionally include restoring, via the computing device, the changed sectors of the portion of the virtual machine disk.

IPC Classes  ?

  • G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result

10.

Automated disaster recovery and data redundancy management systems and methods

      
Application Number 14867705
Grant Number 10970179
Status In Force
Filing Date 2015-09-28
First Publication Date 2021-04-06
Grant Date 2021-04-06
Owner MIDCAP FINANCIAL TRUST (USA)
Inventor
  • Ruslyakov, Alexey
  • Beloussov, Serguei M.
  • Protasov, Stanislav
  • Lyadvinsky, Maxim V.

Abstract

A method, computer program product, computing system, and system for automated disaster recovery are described. The method may include creating, using a backup engine running at a computing device, a backup of a server at a primary computing site; storing the created backup at a storage device at a secondary computing site; monitoring, using a monitoring component, an operating status of the server at the primary computing site; in response to determining, via the monitoring component, that the server at the primary computing site is unavailable based on the operating status, initiating a disaster recovery process at the secondary computing site; and running a copy of the server from the created backup at the secondary computing site.

IPC Classes  ?

  • G06F 11/00 - Error detectionError correctionMonitoring
  • G06F 11/20 - Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure

11.

Systems and methods for backup of computing systems

      
Application Number 14984159
Grant Number 10936433
Status In Force
Filing Date 2015-12-30
First Publication Date 2021-03-02
Grant Date 2021-03-02
Owner MIDCAP FINANCIAL TRUST (USA)
Inventor
  • Tsvetkov, Anton
  • Protasov, Stanislav
  • Beloussov, Serguei

Abstract

Systems and methods for monitoring backup performance of a computing device are described. In one aspect, the disclosure relates to automatic transparent load-balancing such that there is no or substantially no user involvement and resource usage is optimized. In one aspect, the disclosure relates to customization of backup destination by user using scripting such that backups can be distributed by a rule to different locations or it can use local for agent configuration to resolve backup performance degradation issues.

IPC Classes  ?

  • G06F 16/00 - Information retrievalDatabase structures thereforFile system structures therefor
  • G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result

12.

System and method of determining boot status of recovery servers

      
Application Number 16939115
Grant Number 11288151
Status In Force
Filing Date 2020-07-27
First Publication Date 2021-02-18
Grant Date 2022-03-29
Owner MIDCAP FINANCIAL TRUST (USA)
Inventor
  • Yakushkin, Alexey
  • Gomenyuk, Georgy
  • Enakiev, Anton
  • Ulasen, Sergey
  • Protasov, Stanislav
  • Beloussov, Serguei

Abstract

Disclosed herein are systems and method for determining a boot status of a failover server. In an exemplary aspect, a method may receive a failover test request for a failover server that provides disaster recovery for a production server, wherein the failover test request queries a successful boot status of the failover server. The method may determine whether a login into the failover server can be performed to execute the failover test request. In response to determining that the login cannot be performed, the method may retrieve server metrics for a failover server from a metric store and may determine a probability of the successful boot status based on both the retrieved server metrics and historic server metrics. In response to determining that the probability is greater than a threshold probability, the method may mark a recovery point of the failover server as validated.

IPC Classes  ?

  • G06F 11/26 - Functional testing
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06N 20/00 - Machine learning
  • G06F 11/22 - Detection or location of defective computer hardware by testing during standby operation or during idle time, e.g. start-up testing

13.

SYSTEM AND METHOD OF TRANSFERRING OF DATA BETWEEN DATA CENTERS BASED ON USER BEHAVIOR

      
Application Number 16939299
Status Pending
Filing Date 2020-07-27
First Publication Date 2021-02-11
Owner MIDCAP FINANCIAL TRUST (USA)
Inventor
  • Migga-Vierke, Hannes
  • Beloussov, Serguei
  • Protasov, Stanislav

Abstract

Disclosed herein are systems and methods for fast recovery of backup data. In one aspect, an exemplary method comprises, identifying information related to a computing device performing a backup, identifying a data center where the backup is stored based on the information, identifying patterns of movement of the computing device over a period of time, scheduling a transfer of the backup to a target data center of a plurality of data centers based on the patterns of movement, and transferring the backup to the data center using a secure reliable transport protocol in accordance with the scheduled transfer.

IPC Classes  ?

  • G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

14.

System and method for platform-independent migration and replication of computer systems

      
Application Number 14502060
Grant Number 10915347
Status In Force
Filing Date 2014-09-30
First Publication Date 2021-02-09
Grant Date 2021-02-09
Owner MIDCAP FINANCIAL TRUST (USA)
Inventor
  • Per, Yuri
  • Beloussov, Serguei M.
  • Miroshkin, Vladimir
  • Protasov, Stanislav
  • Lyadvinsky, Maxim V.

Abstract

Systems and methods for migrating and/or replicating computer systems are disclosed. Computer systems may be migrated and/or replicated from physical systems or virtual systems to physical or virtual systems. Migrating/replicating computer systems comprises determining the structure of the source computer system, generating instructions for migrating/replicating the structure of the computer system, and packaging the instructions in an executable package. The instructions may be formatted as a template, such as an OVF template, and be packaged with an executable agent and task list. The executable agent may be received and executed by a destination computer system. Executing the executable package may cause the instructions to be executed, as well as the optional agent, there configuring the destination computer system, possibly copying data present on the source computer system, and possibly rebooting the destination computer system.

IPC Classes  ?

  • G06F 9/445 - Program loading or initiating
  • G06F 9/455 - EmulationInterpretationSoftware simulation, e.g. virtualisation or emulation of application or operating system execution engines

15.

Increasing speed of synchronization and restore

      
Application Number 14986164
Grant Number 10911537
Status In Force
Filing Date 2015-12-31
First Publication Date 2021-02-02
Grant Date 2021-02-02
Owner MIDCAP FINANCIAL TRUST (USA)
Inventor
  • Chepel, Dmitry
  • Protasov, Stanislav
  • Beloussov, Serguei M.

Abstract

A method, computer program product, computing system, and system for increasing speed during synchronization or restore are described. The method may include acquiring list of items to be synchronized or restored. The method may further include defining a set of storage sources available to a client computer. The method may also include mounting the available storage sources to the client computer. The method may additionally include determining a storage intersection of items in the list based on the items being available in more than one mounted storage device. Moreover, the method may include, in response to determining a set of items that has a storage intersection, synchronizing or restoring the items based on at least one of a speed of download and a network latency.

IPC Classes  ?

  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure

16.

Method and system for storing and managing states of a computer

      
Application Number 16455870
Grant Number 11068194
Status In Force
Filing Date 2019-06-28
First Publication Date 2020-12-31
Grant Date 2021-07-20
Owner MIDCAP FINANCIAL TRUST (USA)
Inventor
  • Melnikov, Oleg
  • Strogov, Vladimir
  • Sergeev, Alexey
  • Beloussov, Serguei
  • Dod, Alexey
  • Protasov, Stanislav

Abstract

Disclosed herein are systems and method for storing and managing states of a computing device. In one aspect, an exemplary method comprises determining an initial state of the computing device, wherein the initial state includes states of all storage sectors associated with the computing device, storing the determined initial state in an initial blocks storage, for each new state that corresponds to a respective point in time subsequent to a time at which the initial state was determined, creating a snapshot, where the created snapshot includes a difference between the initial state and the new state, for each created snapshot, identifying a set of changed blocks that are in storage, and storing the changed blocks of data to a changed blocks storage, and creating a snap-map for any number of consecutive changes based on the sets of changed blocks corresponding to the respective consecutive changes.

IPC Classes  ?

  • G06F 3/06 - Digital input from, or digital output to, record carriers
  • G06F 16/22 - IndexingData structures thereforStorage structures

17.

System and method of selectively restoring a computer system to an operational state

      
Application Number 16863233
Grant Number 11249791
Status In Force
Filing Date 2020-04-30
First Publication Date 2020-11-05
Grant Date 2022-02-15
Owner MIDCAP FINANCIAL TRUST (USA)
Inventor
  • Sergeev, Alexey
  • Enakiev, Anton
  • Strogov, Vladimir
  • Beloussov, Serguei
  • Protasov, Stanislav

Abstract

Disclosed herein are systems and method for selectively restoring a computer system to an operational state. In an exemplary aspect, the method may create a backup image of the computer system comprising a set of data blocks and may store the backup image of the computer system in an archive storage database. The method may determine a subset of the data blocks of the backup image that are required to keep the computer system operational. In response to determining that the computer system should be restored, the method may restore the subset of the data blocks such that the computer system is operational during startup, and may restore a remaining set of the data blocks from the backup image after the startup of the computer system.

IPC Classes  ?

  • G06F 12/00 - Accessing, addressing or allocating within memory systems or architectures
  • G06F 9/455 - EmulationInterpretationSoftware simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • G06F 3/06 - Digital input from, or digital output to, record carriers
  • G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
  • G06F 11/30 - Monitoring

18.

Methods and systems for performing a dynamic analysis of applications for protecting devices from malwares

      
Application Number 16369166
Grant Number 11106792
Status In Force
Filing Date 2019-03-29
First Publication Date 2020-10-01
Grant Date 2021-08-31
Owner MIDCAP FINANCIAL TRUST (USA)
Inventor
  • Kostyushko, Alexey
  • Pereberina, Anastasia
  • Beloussov, Serguei
  • Protasov, Stanislav

Abstract

Disclosed herein are systems and method for deep dynamic analysis for protecting endpoint devices from malware. In one aspect, an exemplary method comprises launching a deep analysis process, by a deep analysis tool, the launching including: injecting a dynamically loaded component into an address space of an application code and initializing, by the dynamically loaded component, to allow an execution activity, by the injected dynamically loaded component, parsing dependencies of run-time linkages, hooking system functions, creating an application memory map with separate application and system code areas, transferring control back to the application code, and performing on-sample-execution activity, obtaining control of exception handler and monitoring attempts to use the exception handler, changing an available area, logging accesses, inspecting exception reasons and applying policies, determining whether or not the application of the sample is a malware, and sending a final verdict.

IPC Classes  ?

  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 21/52 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure
  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities

19.

Granular recovery using hot-plug virtual disks

      
Application Number 14320422
Grant Number 10789136
Status In Force
Filing Date 2014-06-30
First Publication Date 2020-09-29
Grant Date 2020-09-29
Owner MIDCAP FINANCIAL TRUST (USA)
Inventor
  • Ruslyakov, Alexey A.
  • Lyadvinsky, Maxim V.
  • Manukyan, Emil
  • Beloussov, Serguei M.

Abstract

A method, computer program product, computing system, and system for using hot-plug virtual disks in granular recovery are described. The method may include receiving, at a cloud computing site, a backup configuration including a list of protected resources associated with a cloud computing tenant. The method may further include mounting a hot-plug virtual disk to a virtual machine including the protected resources associated with the cloud computing tenant. The method may also include collecting metadata corresponding to the protected resources associated with the cloud computing tenant. The method may additionally include generating, at the cloud computing site, a backup of the virtual machine including the protected resources associated with the cloud computing tenant. Moreover, the method may include storing the metadata corresponding to the protected resources associated with the cloud computing tenant and storing the backup of the virtual machine including the protected resources associated with the cloud computing tenant.

IPC Classes  ?

  • G06F 11/00 - Error detectionError correctionMonitoring
  • G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure

20.

System and method of blockchain wallet recovery

      
Application Number 16051571
Grant Number 10790976
Status In Force
Filing Date 2018-08-01
First Publication Date 2020-09-29
Grant Date 2020-09-29
Owner MIDCAP FINANCIAL TRUST (USA)
Inventor
  • Raevsky, Alexey
  • Lyadvinsky, Max

Abstract

Disclosed are systems and methods for recovering cryptocurrency assets which may be tied to a lost personal private encryption key. The disclosed system deploys a multi-signature wallet formed from a set of keys including the user's personal key, the key of an organization provides blockchain service for the user, and a reserve key stored by third-party escrow organization. To recover a lost user private key, the system generates and digitally signs with the appropriate private keys a blockchain transaction that includes a script configured, when executed by a node in a blockchain network, to replace the user key with a replacement key.

IPC Classes  ?

  • H04L 9/08 - Key distribution
  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06Q 20/06 - Private payment circuits, e.g. involving electronic currency used only among participants of a common payment scheme
  • G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
  • G06Q 20/22 - Payment schemes or models
  • H04W 4/14 - Short messaging services, e.g. short message service [SMS] or unstructured supplementary service data [USSD]

21.

Changed blocks tracking methods and systems for writable snapshots

      
Application Number 14985323
Grant Number 10761941
Status In Force
Filing Date 2015-12-30
First Publication Date 2020-09-01
Grant Date 2020-09-01
Owner MIDCAP FINANCIAL TRUST (USA)
Inventor
  • Redko, Andrei
  • Protasov, Stanislav
  • Beloussov, Serguei M.

Abstract

Various examples are directed to systems and methods for backing up data. A tracking utility may receive a start request and then enter a holding mode until a first modifiable or writable snapshot is created. The tracking utility can track such a first snapshot and determine if any modifications such as writes have been made to the first snapshot. If the first snapshot has not been modified it can be backed up using a read only snapshot scheme. If the first snapshot has been modified, a record of the modifications thereto are used to update the frozen changes and the current changes. The resulting or finalized snapshot is generated and includes all of the modifications, modifications 1 to N made to the first snapshot. This process can be repeated for one or more or all of the modifiable or writable snapshots.

IPC Classes  ?

  • G06F 12/00 - Accessing, addressing or allocating within memory systems or architectures
  • G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
  • G06F 16/11 - File system administration, e.g. details of archiving or snapshots
  • G06F 3/06 - Digital input from, or digital output to, record carriers

22.

Instruments, modules, and methods for improved detection of edited sequences in live cells

      
Application Number 16823269
Grant Number 10760043
Status In Force
Filing Date 2020-03-18
First Publication Date 2020-07-09
Grant Date 2020-09-01
Owner MIDCAP FINANCIAL TRUST (USA)
Inventor
  • Garst, Andrew
  • Fox, Richard
  • Belgrader, Phillip
  • Masquelier, Don

Abstract

The present disclosure provides instruments, modules and methods for improved detection of edited cells following nucleic acid-guided nuclease genome editing. The disclosure provides improved automated instruments that perform methods—including high throughput methods—for screening cells that have been subjected to editing and identifying cells that have been properly edited.

IPC Classes  ?

  • C12M 1/00 - Apparatus for enzymology or microbiology
  • C12M 1/26 - Inoculator or sampler
  • C12N 15/87 - Introduction of foreign genetic material using processes not otherwise provided for, e.g. co-transformation
  • C12M 3/00 - Tissue, human, animal or plant cell, or virus culture apparatus
  • B01D 63/08 - Flat membrane modules
  • B01D 69/06 - Flat membranes
  • B01D 71/02 - Inorganic material

23.

Systems and methods for preventive ransomware detection using file honeypots

      
Application Number 16132639
Grant Number 10938854
Status In Force
Filing Date 2018-09-17
First Publication Date 2020-06-25
Grant Date 2021-03-02
Owner MIDCAP FINANCIAL TRUST (USA)
Inventor
  • Strogov, Vladimir
  • Dod, Alexey
  • Kostyushko, Alexey
  • Chernyakovsky, Valeriy
  • Beloussov, Serguei
  • Ulasen, Sergey
  • Protasov, Stanislav

Abstract

A system and method is provided for detecting ransomware and malicious programs. An exemplary method comprises generating, by a hardware processor, a file honeypot in a directory in a filesystem, wherein the file honeypot is included on a file list of contents of the directory, receiving a directory enumeration request from a process executing in an operating system environment, determining whether the process is identified in a list of trusted processes based on one or more of a certificate, fingerprint, name, and process identifier, when the process is not found in the list of trusted processes, providing, by the filesystem, the file list including the file honeypot to the process responsive to receiving the directory enumeration request and otherwise, providing the file list excluding the file honeypot to the process, intercepting, by a filesystem filter driver, a file modification request for the file honeypot from the process when the file honeypot is included in the file list and identifying the process as a suspicious object responsive to intercepting the file modification request from the process.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06N 20/00 - Machine learning
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures

24.

System and method for data packing into blobs for efficient storage

      
Application Number 16700433
Grant Number 11263090
Status In Force
Filing Date 2019-12-02
First Publication Date 2020-06-04
Grant Date 2022-03-01
Owner MIDCAP FINANCIAL TRUST (USA)
Inventor
  • Tormasov, Alexander
  • Beloussov, Serguei
  • Protasov, Stanislav

Abstract

Disclosed herein are systems and method storing data. In an exemplary aspect, a method comprises determining a threshold data size for objects in a target data system; generating a data blob that has an allocated size of at least the threshold data size, wherein the data blob comprises at least one data set; identifying a data set stored in a source data system for backup to the target data system; determining whether a size of the data set is less than the threshold data size; and responsive to determining that the size of the data set is less than the threshold data size, inserting the data set into the data blob; and writing the data blob to the target data system.

IPC Classes  ?

  • G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
  • G06F 16/182 - Distributed file systems
  • G06F 16/13 - File access structures, e.g. distributed indices

25.

Proactive disaster recovery based on external event monitoring

      
Application Number 16196099
Grant Number 10795758
Status In Force
Filing Date 2018-11-20
First Publication Date 2020-05-21
Grant Date 2020-10-06
Owner MIDCAP FINANCIAL TRUST (USA)
Inventor
  • Korotaev, Kirill
  • Beloussov, Serguei
  • Tormasov, Alexander
  • Melnikov, Oleg
  • Shaikhatarov, Oleg
  • Protasov, Stanislav

Abstract

Disclosed are systems and methods for proactive disaster recovery. The described technique monitors for events raised by a system of interconnected external sensors and other devices for obtaining data on the external environment of servers. The system uses these events as a chain of triggers according to which preventative or preparatory actions for disaster recovery are performed.

IPC Classes  ?

  • G06F 11/07 - Responding to the occurrence of a fault, e.g. fault tolerance

26.

Methods and cloud-based systems for correlating malware detections by endpoint devices and servers

      
Application Number 16290009
Grant Number 11070570
Status In Force
Filing Date 2019-03-01
First Publication Date 2020-04-30
Grant Date 2021-07-20
Owner MIDCAP FINANCIAL TRUST (USA)
Inventor
  • Kostyushko, Alexey
  • Strogov, Vladimir
  • Beloussov, Serguei
  • Protasov, Stanislav
  • Pereberina, Anastasia
  • Grebennikov, Nikolay

Abstract

Disclosed herein are systems and method for correlating malware detections by endpoint devices and servers. In one aspect, an exemplary method comprises receiving, by a correlator, from one or more servers, one or more events collected without invasive techniques, one or more events collected using one or more invasive techniques, and one or more final verdicts, correlating the one or more events collected without invasive techniques with one or more events collected using the one or more invasive techniques, creating a suspicious pattern when an event of the one or more events collected without invasive techniques is correlated with an event of the one or more events collected using the one or more invasive techniques, and the event of the one or more events collected using one or more invasive techniques is used to detect a malware, and updating databases of one or more endpoint devices with created suspicious patterns.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine

27.

Methods and cloud-based systems for detecting malwares by servers

      
Application Number 16289851
Grant Number 11012449
Status In Force
Filing Date 2019-03-01
First Publication Date 2020-04-30
Grant Date 2021-05-18
Owner MIDCAP FINANCIAL TRUST (USA)
Inventor
  • Kostyushko, Alexey
  • Strogov, Vladimir
  • Beloussov, Serguei
  • Protasov, Stanislav
  • Pereberina, Anastasia
  • Grebennikov, Nikolay

Abstract

Disclosed herein are systems and method for detecting malwares by a server of a sandbox. In one aspect, an exemplary method comprises receiving, by a deep dynamic analysis tool of the server, a sample of a process from an endpoint device with a request for a final verdict indicative of whether the process is a malware or clean based on a deep dynamic analysis, collecting events for the sample, the collected events including events collected using at least one invasive technique, analyzing the collected events using one or more detection models of the deep dynamic analysis tool to detect malwares and issue the final verdict, and sending final verdict to the endpoint device from which the sample is received.

IPC Classes  ?

  • G06F 11/00 - Error detectionError correctionMonitoring
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine
  • G06F 12/14 - Protection against unauthorised use of memory

28.

Methods and cloud-based systems for protecting devices from malwares

      
Application Number 16173405
Grant Number 10826919
Status In Force
Filing Date 2018-10-29
First Publication Date 2020-04-30
Grant Date 2020-11-03
Owner MIDCAP FINANCIAL TRUST (USA)
Inventor
  • Kostyushko, Alexey
  • Strogov, Vladimir
  • Beloussov, Serguei
  • Protasov, Stanislav
  • Pereberina, Anastasia
  • Grebennikov, Nikolay

Abstract

Disclosed herein are systems and method for protecting an endpoint device from malware. In one aspect, an exemplary method comprises performing, by a light analysis tool of the endpoint, a light static analysis of a sample, terminating the process and notifying the user when the process is malware, performing light dynamic analysis when the process is not malware based on the light static analysis, when the process is clean based on the light dynamic analysis, enabling the process to execute, when the process is malware, terminating the process and notifying the user, and when the process is suspicious pattern, suspending the process, setting a level of trust, sending the sample to a sandbox, terminating the process and notifying the user when the process is a malware based on received final verdict, enabling the process to resume executing when the process is determined as being clean based on the final verdict.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine

29.

Miscellaneous Design

      
Application Number 018227141
Status Registered
Filing Date 2020-04-17
Registration Date 2020-11-26
Owner MidCap Financial Trust (USA)
NICE Classes  ?
  • 09 - Scientific and electric apparatus and instruments
  • 35 - Advertising and business services
  • 38 - Telecommunications services
  • 41 - Education, entertainment, sporting and cultural services
  • 42 - Scientific, technological and industrial services, research and design

Goods & Services

Software; Software, Namely software for creating or facilitating an online presence where users can download information in compressed form, reading and Learning, drawing up and uploading own offers and also involving one another in discussions; Computer software, namely computer game software, Facilitating access to the compilation and organisation of information in compressed form to the users of computers and mobile apparatus; Software for use in connection with mobile wireless devices, mobile and cellular phones, and other portable computers or communications apparatus, Namely recorded programs for computers, Downloadable image files, Computer programs, downloadable; Computer application software for streaming audio-visual media content via the internet; Databases (electronic); Electronic publications, downloadable, Featuring already published works in significantly shortened form; Downloadable audio files; Downloadable music files; Podcasts; Talking books; Audio books. Online advertisements; Promoting the goods and services of others via a website; Sales promotion of goods and services of others via a website featuring images, advertisements and other contents and featuring links to the websites of others; Promoting the goods and services of others by providing a community-driven web site featuring images, information and content of general interest; Commercial administration of the licensing of the goods and services of others; Arranging subscriptions to telecommunication services for others; Collection of goods, for others, for presentation purposes; The bringing together of goods, for the benefit of others, for sales purposes, Namely retailing relating to sound recording carriers, audio files, podcasts, Audiobooks, Audiobooks, Music files, Including all the aforesaid provided via the internet (downloadable and non-downloadable); Compilation of information into computer databases; Providing of directories on the internet about audio, visual and and audiovisual media content retrievable on the internet [sales promotion for the goods of others]; Compilation of directories on the internet about audio, visual and and audiovisual media content retrievable on the internet. Telecommunication services; Computer communication and Internet access; Provision of access to content, websites and portals; Audio broadcasting; Providing user access to global computer networks; Providing telecommunications connections to a global computer network; Providing access to information on the Internet; Providing telecommunications connections to the internet or databases; Provision of electronic data links; Providing of access to hyperlinks for audio files; Streaming of audio, visual and audiovisual material via a global computer network; Electronic bulletin board services [telecommunications services]; Rental of access time to global computer networks; Providing access to platforms on the Internet; Transmission of digital files; Providing access to databases; Audio and video broadcasting services provided via the Internet; Information and advisory services relating to telecommunication services; Providing of access to an internet platform for the retrieval of audio, visual and audiovisual media content; Sending and transmission of podcasts. Publishing, in particular online publication of electronic texts, books and magazines, Featuring already published works in significantly shortened form; Writing of texts; Providing online electronic publications, not downloadable; Entertainment services; Provision of entertainment via podcast; Entertainment by means of audio books; Entertainment by means of audio and video content; Rental of audio books; Music composition services. IT services; Software development, programming and implementation; Computer hardware development; Hosting services, software as a service, and rental of software; Preparation of data processing programmes, In particular for establishing and providing a website and mobile software applications for users for searching, downloading, reading, discussion, storing, Learning and relating to own drawing up of compressed information units; Providing search engines for the internet; Platform as a service [PaaS] featuring software platforms for transmission of images and audio content; Designing and creating homepages and Internet pages; Programming of software for information platforms on the Internet; Hosting of podcasts; Hosting of audio and video content; Hosting of digital content on the Internet.

30.

Systems and methods for analyzing process chains to detect malicious behavior

      
Application Number 16581952
Grant Number 11250126
Status In Force
Filing Date 2019-09-25
First Publication Date 2020-04-02
Grant Date 2022-02-15
Owner MIDCAP FINANCIAL TRUST (USA)
Inventor
  • Strogov, Vladimir
  • Levchenko, Vyacheslav
  • Beloussov, Serguei
  • Ulasen, Sergey
  • Protasov, Stanislav

Abstract

Disclosed herein are systems and method for malicious behavior detection in processing chains comprising identifying a chain of related processes executing on a computing device; for each respective process in the chain of related processes: monitoring events generated by the respective process; storing snapshots of data modified by any of the events; determining a level of suspicion for the respective process by applying an artificial intelligence (AI) model to the snapshots of data; determining whether the chain of related processes is trusted based on the determined levels of suspicion; and in response to determining that the chain of related processes is not trusted, restoring objects affected by the chain from the snapshots.

IPC Classes  ?

  • G06F 21/55 - Detecting local intrusion or implementing counter-measures

31.

System and method for crash-consistent incremental backup of cluster storage

      
Application Number 16589188
Grant Number 11210177
Status In Force
Filing Date 2019-10-01
First Publication Date 2020-04-02
Grant Date 2021-12-28
Owner MIDCAP FINANCIAL TRUST (USA)
Inventor
  • Stupak, Anatoly
  • Kogtev, Dmitry
  • Beloussov, Serguei
  • Protasov, Stanislav

Abstract

Disclosed herein are systems and method for backing up data in a clustered environment. A clustered resource to be backed up is selected, wherein the clustered resource is stored on a common storage system and operated on by a cluster-aware application executing on two or more nodes of a computing cluster. A first backup agent executing on a first node of the computing cluster may determine a list of changes to the clustered resource and may receive at least one list of changes to the clustered resource that are tracked by peer backup agents executing on other nodes of the computing cluster. The first backup agent may merge the lists of changes to the clustered resource, and may generate a consistent incremental backup using data retrieved from the common storage system according to the merged lists of changes to the clustered resource.

IPC Classes  ?

  • G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
  • G06F 11/20 - Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements

32.

System and method for personal privacy controls

      
Application Number 16571661
Grant Number 11210419
Status In Force
Filing Date 2019-09-16
First Publication Date 2020-03-26
Grant Date 2021-12-28
Owner MIDCAP FINANCIAL TRUST (USA)
Inventor
  • Beloussov, Serguei
  • Melnikov, Oleg
  • Tormasov, Alexander
  • Protasov, Stanislav

Abstract

Disclosed herein are systems and methods for protecting user data. In one aspect, an exemplary method comprises, by a hardware processor, detecting user files created by a first user and stored on a user device, the user files containing personal information associated with the first user, generating user transactional data associated with one or more detected network-based interactions with a service provider, generating user behavior data based on one or more user interactions with a graphical user interface of the user device, applying a machine learning model to user data to generate a classification of the first user, the user data comprising the user files, the user transactional data, and the user behavior data, and when the user is identifiable based on the generated classification, modifying at least one of (i) user files stored on the user device and (ii) user behavior during an operation of the user device.

IPC Classes  ?

  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
  • G06N 20/00 - Machine learning
  • G06F 9/451 - Execution arrangements for user interfaces

33.

System and method for utility ranking and funding for cloud storage

      
Application Number 16548376
Grant Number 10904022
Status In Force
Filing Date 2019-08-22
First Publication Date 2020-03-05
Grant Date 2021-01-26
Owner MIDCAP FINANCIAL TRUST (USA)
Inventor
  • Beloussov, Serguei
  • Melnikov, Oleg
  • Protasov, Stanislav

Abstract

Disclosed herein are systems and methods for managing access to data objects in cloud storage. In one aspect, an exemplary method comprises, by a hardware processor, storing a first data object in a cloud storage service, wherein the first data object is uploaded by a first user, modifying a data access policy associated with the first data object to permit access by user accounts other than the first user, determining a utility ranking of the first data object based on a degree of access of the first data object using the cloud storage service, and modifying a data retention policy associated with the first data object based on the determined utility ranking.

IPC Classes  ?

  • H04L 12/14 - Charging arrangements
  • G06Q 20/08 - Payment architectures
  • H04L 12/24 - Arrangements for maintenance or administration
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure

34.

Systems and methods for predictive data protection

      
Application Number 16533103
Grant Number 11126506
Status In Force
Filing Date 2019-08-06
First Publication Date 2020-02-06
Grant Date 2021-09-21
Owner MIDCAP FINANCIAL TRUST (USA)
Inventor
  • Martynov, Dmitry
  • Protasov, Stanislav
  • Beloussov, Serguei

Abstract

Disclosed herein are systems and method for method for predictive data protection. In one aspect, an exemplary method comprises selecting data stored on a computing device for backing up, according to a predetermined schedule for performing a backup; collecting features associated with the computing device where the data for the backup is stored, the features comprising device information for the computing device, user information for a user of the data, and external information associated with a locale of the computing device; analyzing the features to determine a set of backup parameters for the backup, wherein the backup parameters comprise scheduling parameters and destination storage parameters; generating a backup plan based on the set of parameters for performing the backup; and performing the backup of the data according to the backup plan.

IPC Classes  ?

  • G06F 12/00 - Accessing, addressing or allocating within memory systems or architectures
  • G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
  • G06N 20/00 - Machine learning

35.

System and method for scheduling and allocating data storage

      
Application Number 15983245
Grant Number 10725819
Status In Force
Filing Date 2018-05-18
First Publication Date 2019-11-21
Grant Date 2020-07-28
Owner MIDCAP FINANCIAL TRUST (USA)
Inventor
  • Bykov, Sergey
  • Aseev, Eugene
  • Solanki, Sanjeev
  • Beloussov, Serguei
  • Protasov, Stanislav

Abstract

A system and method is disclosed for scheduling and allocating data storage. An example method comprises generating a scheduling problem based at least on states of each of the plurality of storage nodes, a received plurality of storage tasks and received constraints, wherein the scheduling problem is a constraint satisfaction problem, selecting one or more approaches to solving the scheduling problem based on metadata associated with the storage tasks and constraints, solving the scheduling problem to generate a scheduling solution based on the one or more approaches, determining whether the given constraints are satisfied by the scheduling solution, executing, by the processor, the scheduling solution by assigning storage of data to each of the plurality of storage nodes when the constraints are satisfied by the scheduling solution and determining another scheduling solution based on the one or more approaches when the constraints are not satisfied by the scheduling solution.

IPC Classes  ?

  • G06F 9/46 - Multiprogramming arrangements
  • G06F 9/48 - Program initiatingProgram switching, e.g. by interrupt
  • G06F 3/06 - Digital input from, or digital output to, record carriers
  • G06Q 10/04 - Forecasting or optimisation specially adapted for administrative or management purposes, e.g. linear programming or "cutting stock problem"
  • G06N 20/00 - Machine learning
  • G06F 16/16 - File or folder operations, e.g. details of user interfaces specifically adapted to file systems

36.

System and method for protection against ransomware attacks

      
Application Number 16406568
Grant Number 11055411
Status In Force
Filing Date 2019-05-08
First Publication Date 2019-11-14
Grant Date 2021-07-06
Owner MIDCAP FINANCIAL TRUST (USA)
Inventor
  • Strogov, Vladimir
  • Levchenko, Vyacheslav
  • Dod, Alexey
  • Beloussov, Serguei
  • Protasov, Stanislav
  • Stupak, Anatoly
  • Chernyakovsky, Valery

Abstract

A method is provided for protecting a file server from a ransomware attack. An exemplary method comprises assigning a session identifier to a remote session initiated with the file server, monitoring operations associated with the session identifier, determining whether the operations are suspicious according to a policy, creating a volume-level snapshot of files on the file server, determining that encryption of the data is occurring when entropy of the monitored data is growing faster than the predetermined threshold rate, classifying the remote session as having a calculated degree of danger when the operations match operations contained in previously observed suspicious behavior patterns, interrupting the remote session when a combination of the degree of danger and the entropy is greater than a predetermined threshold value and restoring the data on the file server using the volume-level snapshot to a state prior to the encryption and dangerous activity.

IPC Classes  ?

  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06N 20/00 - Machine learning
  • G06F 16/11 - File system administration, e.g. details of archiving or snapshots

37.

System and method for restoration of MICROSOFT exchange server mail

      
Application Number 14969114
Grant Number 10467187
Status In Force
Filing Date 2015-12-15
First Publication Date 2019-11-05
Grant Date 2019-11-05
Owner MIDCAP FINANCIAL TRUST (USA)
Inventor
  • Korshunov, Igor E.
  • Lyadvinsky, Maxim V.
  • Beloussov, Serguei M.
  • Sergeev, Alexey

Abstract

A system, method and computer program product for restoration of MICROSOFT Exchange Server mail. MICROSOFT Exchange Server mail is retrieved from a virtual copy of the MICROSOFT Exchange database. Virtualization is implemented by a system filter. Logs are applied to a virtualized DB in order to synchronize it with a real DB of the MICROSOFT Exchange. The data located in the remote archive does not need to be copied into the real folder, because the data is made available by virtualization means. After the logs are applied, the virtualized DB is opened (without being mounted) from files from the virtual folder. From this point on, the DB of MICROSOFT Exchange can be viewed and the data can be queried and retrieved from the virtualized DB. Thus, a single message or a mailbox can be retrieved very fast, as if it were being retrieved from a real MICROSOFT Exchange DB.

IPC Classes  ?

  • G06F 16/11 - File system administration, e.g. details of archiving or snapshots
  • H04L 12/58 - Message switching systems

38.

System and method for data classification during file backup

      
Application Number 15964334
Grant Number 11237913
Status In Force
Filing Date 2018-04-27
First Publication Date 2019-10-31
Grant Date 2022-02-01
Owner MIDCAP FINANCIAL TRUST (USA)
Inventor
  • Aseev, Eugene
  • Protasov, Stanislav S.
  • Beloussov, Serguei M.
  • Solanki, Sanjeev

Abstract

A system and method is provided for data classification to control file backup operations. An exemplary method includes sampling metadata of one or more files on a computer at a predetermined time interval, determining whether the metadata has changed over time after a predetermined amount of metadata is collected, deriving a model of the change of the metadata over time when the metadata has changed over time, wherein the model of change is a snapshot of dynamically sampled attributes of the one or more files and reflects a state of the computer, performing an analysis of the model of change by determining features of the one or more files comprising at least file usage dynamics of the computer and a user associated with the one or more files based on the model; and selecting a backup plan for the one or more files according to the file usage dynamics.

IPC Classes  ?

  • G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
  • G06F 16/182 - Distributed file systems
  • G06F 16/28 - Databases characterised by their database models, e.g. relational or object models
  • G06F 16/907 - Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually

39.

User clustering based on metadata analysis

      
Application Number 15907735
Grant Number 10817542
Status In Force
Filing Date 2018-02-28
First Publication Date 2019-08-29
Grant Date 2020-10-27
Owner MIDCAP FINANCIAL TRUST (USA)
Inventor
  • Aseev, Evgeny A.
  • Solanki, Sanjeev
  • Protasov, Stanislav
  • Beloussov, Serguei M.

Abstract

A systems and methods of managing user data using clustering patterns based on metadata analysis. The described technique includes receiving file metadata from multiple user devices, where the file metadata is associated with data stored on the plurality of user devices associated with a plurality of users. The technique generates a user metadata fingerprint based on a plurality of user metadata record attributes contained in the file metadata, and determines clustering of the plurality of users based on the generated user metadata fingerprint. The data for the plurality of users may be stored based on the determined clustering.

IPC Classes  ?

  • G06F 16/215 - Improving data qualityData cleansing, e.g. de-duplication, removing invalid entries or correcting typographical errors
  • G06F 16/28 - Databases characterised by their database models, e.g. relational or object models
  • G06F 21/60 - Protecting data
  • G06F 16/11 - File system administration, e.g. details of archiving or snapshots

40.

System and method for fast disaster recovery

      
Application Number 15892958
Grant Number 10990485
Status In Force
Filing Date 2018-02-09
First Publication Date 2019-08-15
Grant Date 2021-04-27
Owner MIDCAP FINANCIAL TRUST (USA)
Inventor
  • Karasev, Vadim
  • Semyonov, Vasily
  • Protasov, Stanislav
  • Shaikhatarov, Oleg
  • Beloussov, Serguei

Abstract

Disclosed are systems and methods restoring a computing system. The described method includes receiving a delta disk that was generated based on a backup of a computing device executing a protected application. The delta disk comprises one or more configurations for executing the protected application on a different device than the computing device. In response to a request to perform recovery of the computing device, a recovery virtual machine (VM) is created having a base virtual disk emulated from the backup. The recovery VM is modified by attaching the delta disk having the one or more configurations for executing the protected application. Execution of the protected application on the recovery VM is resumed.

IPC Classes  ?

  • G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
  • G06F 9/455 - EmulationInterpretationSoftware simulation, e.g. virtualisation or emulation of application or operating system execution engines

41.

Fast incremental backup method and system

      
Application Number 14870452
Grant Number 10380141
Status In Force
Filing Date 2015-09-30
First Publication Date 2019-08-13
Grant Date 2019-08-13
Owner MIDCAP FINANCIAL TRUST (USA)
Inventor
  • Chepel, Dmitry
  • Per, Yuri
  • Beloussov, Serguei M.
  • Protasov, Stanislav
  • Lyadvinsky, Maxim V.

Abstract

Various embodiments are directed to systems and methods for creating an archive of a set of logical storage units stored on at least one storage medium. A first plurality of LSU descriptors may be generated. Each LSU descriptor may describe a current version of one of the set of LSUs at about the time of the generating. A first archive may be read to produce a first archive plurality of LSU descriptors. Each of the first archive plurality of LSU descriptors may describe a version of one of the set of LSUs when the first archive was created. The first archive plurality of LSU descriptors may be compared with the first plurality of LSU descriptors to identify a first LSU from the set of LSUs that has an associated LSU descriptor that does not match a corresponding LSU descriptor from the first archive plurality of LSU descriptors.

IPC Classes  ?

  • G06F 16/27 - Replication, distribution or synchronisation of data between databases or within a distributed database systemDistributed database system architectures therefor
  • G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result

42.

Blockchain-based verification of machine learning

      
Application Number 16248986
Grant Number 11249982
Status In Force
Filing Date 2019-01-16
First Publication Date 2019-07-25
Grant Date 2022-02-15
Owner MIDCAP FINANCIAL TRUST (USA)
Inventor
  • Tormasov, Alexander
  • Beloussov, Serguei
  • Protasov, Stanislav

Abstract

Disclosed are systems and method for machine learning and blockchain-based anti-discrimination validation. The described techniques uses a machine learning model to generate a numerical determination associated with a first person based on an input data set associated with the first person. The numerical determination is further based on a corrective module configured to compensate for prohibited discrimination by the machine learning model. The technique generates a blockchain transaction data structure comprising a state of the machine learning model at the time of generating the numerical determination, a copy of the input data set associated with the person, and an indication of a correction by the machine learning model. The blockchain transaction data structure is recorded or published in a blockchain network.

IPC Classes  ?

  • G06F 16/23 - Updating
  • G06N 20/00 - Machine learning
  • G06F 16/22 - IndexingData structures thereforStorage structures
  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system

43.

Snapshotless backup

      
Application Number 14320496
Grant Number 10359951
Status In Force
Filing Date 2014-06-30
First Publication Date 2019-07-23
Grant Date 2019-07-23
Owner MIDCAP FINANCIAL TRUST (USA)
Inventor
  • Per, Yuri
  • Lyadvinsky, Maxim V.
  • Beloussov, Serguei M.
  • Egorov, Dmitry
  • Borodin, Alexey

Abstract

A method, computer program product, computing system, and system for snapshotless backup are described. The method may include receiving, via a backup agent, an indication of a virtual machine to be backed up in a backup archive file. The backup agent may run outside of the virtual machine. The virtual machine may be hosted by a virtualization host device. The method may further include identifying, via the backup agent, a virtual disk associated with the virtual machine indicated to be backed up. The method may also include tracking, via a virtualization host agent running on the virtualization host device outside the virtual machine, changes to the virtual disk associated with the virtual machine on a sector level basis. The method may additionally include reading the virtual disk and transmitting sectors from the virtual disk to the backup archive file on a first pass.

IPC Classes  ?

  • G06F 9/45 - Compilation or interpretation of high level programme languages
  • G06F 12/08 - Addressing or allocationRelocation in hierarchically structured memory systems, e.g. virtual memory systems
  • G06F 12/0808 - Multiuser, multiprocessor or multiprocessing cache systems with cache invalidating means
  • G06F 12/0815 - Cache consistency protocols
  • G06F 3/06 - Digital input from, or digital output to, record carriers

44.

Tape head having sensors proximate to an edge

      
Application Number 16297376
Grant Number 10679651
Status In Force
Filing Date 2019-03-08
First Publication Date 2019-07-04
Grant Date 2020-06-09
Owner MIDCAP FINANCIAL TRUST (USA)
Inventor Biskeborn, Robert G.

Abstract

An apparatus includes a module having a tape bearing surface, a first edge, and a second edge, where a first tape tenting region of the tape bearing surface extends from the first edge along the tape bearing surface toward the second edge. A guide is positioned relative to the first edge for inducing tenting of a moving magnetic recording tape and to create a point of inflection of the moving magnetic recording tape at a location above the tape bearing surface that is about midway between a peak of the tenting and a point of closest approach of the moving magnetic recording tape to the tape bearing surface. A sensor is located in a thin film region of the module. The sensor has a free layer. The location of the point of inflection of the moving magnetic recording tape is between the free layer and the second edge.

IPC Classes  ?

  • G11B 5/40 - Protective measures on heads, e.g. against excessive temperature
  • G11B 5/255 - Structure or manufacture of the surface of the head in physical contact with, or immediately adjacent to, the recording mediumPole piecesGap features comprising means for protection against wear
  • G11B 5/187 - Structure or manufacture of the surface of the head in physical contact with, or immediately adjacent to, the recording mediumPole piecesGap features
  • G11B 5/39 - Structure or manufacture of flux-sensitive heads using magneto-resistive devices
  • G11B 15/60 - Guiding record carriers
  • G11B 5/58 - Disposition or mounting of heads relative to record carriers with provision for moving the head for the purpose of maintaining alignment of the head relative to the record carrier during transducing operation, e.g. to compensate for surface irregularities of the latter or for track following
  • G11B 15/62 - Maintaining desired spacing between record carrier and head
  • G11B 15/43 - Control or regulation of mechanical tension of record carrier, e.g. tape tension
  • G11B 5/008 - Recording on, or reproducing or erasing from, magnetic tapes or wires
  • G11B 5/31 - Structure or manufacture of heads, e.g. inductive using thin film
  • G11B 5/48 - Disposition or mounting of heads relative to record carriers

45.

Blockchain-based media content authentication methods and systems

      
Application Number 16194731
Grant Number 11075744
Status In Force
Filing Date 2018-11-19
First Publication Date 2019-05-23
Grant Date 2021-07-27
Owner MIDCAP FINANCIAL TRUST (USA)
Inventor
  • Tormasov, Alexander
  • Beloussov, Serguei
  • Protasov, Stanislav

Abstract

Disclosed herein are systems and method for storing media authentication data using a distributed ledger. In one aspect, an exemplary method comprises, receiving, by a processor of a computing node of a plurality of computing nodes, one or more hashes associated with a media content and a timestamp, the computing nodes being communicatively linked, generating a data block that contains at least one of the received hashes, the data block being generated by hashing a hash corresponding to a previous data block of the distributed ledger together with the at least one hash, the at least one hash corresponding to the media content of the data block being generated, transmitting to the plurality of computing nodes, a message reporting an addition of the generated data block, wherein at least some of the plurality of computing nodes maintain at least a partial copy of the distributed ledger.

IPC Classes  ?

  • H04L 9/06 - Arrangements for secret or secure communicationsNetwork security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06N 20/00 - Machine learning
  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system

46.

System and method for automating formation and execution of a backup strategy using machine learning

      
Application Number 16195915
Grant Number 11204842
Status In Force
Filing Date 2018-11-20
First Publication Date 2019-05-23
Grant Date 2021-12-21
Owner MIDCAP FINANCIAL TRUST (USA)
Inventor
  • Protasov, Stanislav
  • Beloussov, Serguei
  • Martynov, Dmitry
  • Ulasen, Sergey

Abstract

Disclosed herein are systems and method for forming and executing a backup strategy. In one aspect, an exemplary method comprises, for each file of files from one or more data sources that is being evaluated to form the backup strategy for the file, updating a frequency database, evaluating a uniqueness for the file stored at a data source of the one or more data sources by comparing at least a portion of data of the file to the frequency database, categorizing the file into a hierarchy of logical types according to properties of the file, and forming the backup strategy for the file according to the uniqueness and categorization of the file.

IPC Classes  ?

  • G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
  • G06F 16/11 - File system administration, e.g. details of archiving or snapshots
  • G06F 3/06 - Digital input from, or digital output to, record carriers
  • G06F 3/08 - Digital input from, or digital output to, record carriers from or to individual record carriers, e.g. punched card
  • G06N 20/00 - Machine learning
  • G06N 3/08 - Learning methods

47.

System and method for publication of private data using a blockchain network

      
Application Number 15998403
Grant Number 10951394
Status In Force
Filing Date 2018-08-15
First Publication Date 2019-02-21
Grant Date 2021-03-16
Owner MIDCAP FINANCIAL TRUST (USA)
Inventor
  • Tormasov, Alexander
  • Protasov, Stanislav
  • Beloussov, Serguei

Abstract

A system and method for encrypting and publishing data using blockchain technology is provided. An exemplary method includes receiving, by one or more nodes of a distributed network that maintains a blockchain, a message requesting publication of private information within the blockchain subsequent to a specified time interval. Moreover, the method includes recording a sequence of transactions in the blockchain based on the time interval, wherein each transaction in the sequence of transactions includes a payload calculated using a first homomorphic operation; and extracting the private information from a final payload of a final transaction in the sequence of transactions from the blockchain.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 9/06 - Arrangements for secret or secure communicationsNetwork security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
  • H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
  • G06F 9/46 - Multiprogramming arrangements
  • G06F 16/182 - Distributed file systems
  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system

48.

Cloud AI engine for malware analysis and attack prediction

      
Application Number 15998856
Grant Number 10917435
Status In Force
Filing Date 2018-08-17
First Publication Date 2019-02-21
Grant Date 2021-02-09
Owner MIDCAP FINANCIAL TRUST (USA)
Inventor
  • Stupak, Anatoly
  • Strogov, Vladimir
  • Dod, Alexey
  • Beloussov, Serguei
  • Chernyakovskiy, Valeriy
  • Kostyushko, Alexey
  • Protasov, Stanislav

Abstract

Methods and systems are disclosed herein for detecting malicious software executing on a plurality of computing devices. In an exemplary aspect, a method comprises collecting, from a plurality of agents executing on a respective computing device, analysis data corresponding to executables on the respective computing device, determining a suspicious activity pattern based on the received analysis data, determining that at least one executable on a computing device is malware based on the determined suspicious activity pattern, generating a plurality of remedial actions for protecting respective computing devices of the plurality of agents based on the suspicious activity pattern, and distributing, to the plurality of agents, the plurality of remedial actions to protect the respective computing device from the malware.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06N 5/02 - Knowledge representationSymbolic representation

49.

Reducing data transmitted during backup

      
Application Number 14952232
Grant Number 10185504
Status In Force
Filing Date 2015-11-25
First Publication Date 2019-01-22
Grant Date 2019-01-22
Owner MIDCAP FINANCIAL TRUST (USA)
Inventor
  • Pogosyan, Vitaliy
  • Yusupov, Ramil
  • Tsvetkov, Anton
  • Protasov, Stanislav
  • Beloussov, Serguei M.

Abstract

A method for reducing an amount of data transmitted during a backup process is described. The method may include receiving input data to insert into a rating hash table during the backup process. The method may further include selecting, based on a hash function, a bucket of the rating hash table in which the input data will be inserted, the bucket including a plurality of blocks. The method may also include, in response to determining that the input data has already been inserted in one of the plurality of blocks, increasing a rating corresponding to the one of the plurality of blocks by a popularity rating increment. The method may additionally include, in response to determining that the input data has not already been inserted in one of the plurality of blocks, determining a first block with a smallest rating from the plurality of blocks.

IPC Classes  ?

  • G06F 3/06 - Digital input from, or digital output to, record carriers
  • G06F 12/1018 - Address translation using page tables, e.g. page table structures involving hashing techniques, e.g. inverted page tables

50.

Method for decrypting data encrypted by ransomware

      
Application Number 16033588
Grant Number 11126718
Status In Force
Filing Date 2018-07-12
First Publication Date 2019-01-17
Grant Date 2021-09-21
Owner MIDCAP FINANCIAL TRUST (USA)
Inventor
  • Kostyushko, Alexey
  • Protasov, Stanislav
  • Beloussov, Serguei

Abstract

A technique is described for protecting file data from malicious programs, in particularly, by decrypting data that has been maliciously encrypted by software such as ransomware. The described technique generates a copy of a first block of a plurality of files stored on a computing device, and also intercepts request(s) from a process executing on the computing device to obtain certain types of random data and system entropy, which are recorded. When the system detects that the plurality of files have been encrypted by a malicious program, the described system determines a cryptographic key determined based on the generated copies of the first blocks of the plurality of files and on the recorded random data, and uses that key to decrypt the plurality of files.

IPC Classes  ?

  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06F 7/58 - Random or pseudo-random number generators
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 9/08 - Key distribution
  • G06F 21/60 - Protecting data
  • H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols

51.

Authentication and control of encryption keys

      
Application Number 16133625
Grant Number 10713351
Status In Force
Filing Date 2018-09-17
First Publication Date 2019-01-17
Grant Date 2020-07-14
Owner MIDCAP FINANCIAL TRUST (USA)
Inventor
  • Paaske, Timothy R.
  • Mao, Weihua
  • Yu, Shu-Yi

Abstract

An apparatus, a method, and a system are presented in which the apparatus includes an interface control circuit that may be configured to receive a message including a cryptographic keyword and a policy value. The policy value may include one or more data bits indicative of one or more policies that define allowable usage of the cryptographic keyword. The apparatus also includes a security circuit that may be configured to extract the cryptographic keyword and the policy value from the message, and to apply at least one policy of the one or more policies to usage of the cryptographic keyword in response to a determination that an authentication of the message succeeded.

IPC Classes  ?

  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
  • G06F 21/46 - Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
  • G06F 21/60 - Protecting data
  • G06F 21/44 - Program or device authentication
  • G06F 21/85 - Protecting input, output or interconnection devices interconnection devices, e.g. bus-connected or in-line devices
  • H04L 9/08 - Key distribution

52.

SYSTEM AND METHOD FOR DATA CLASSIFICATION USING MACHINE LEARNING DURING ARCHIVING

      
Application Number 16018172
Status Pending
Filing Date 2018-06-26
First Publication Date 2018-12-27
Owner MIDCAP FINANCIAL TRUST (USA)
Inventor
  • Ulasen, Sergey
  • Shmulevich, Mark
  • Protasov, Stanislav
  • Beloussov, Serguei

Abstract

Disclosed are systems and methods for data archiving using machine learning techniques. The system collects statistical information and event data and processes them using machine learning techniques to classify data and/or predict data access demands. The system receives statistical information related to user access of a plurality of files, which can effectively “train” the system to archive data that is not needed at a certain moment and extract it at other moments. The system identifies, using a machine learning module, a pattern of access in the plurality of files based on the received statistical information. The system modifies, using the identified pattern of access, a threshold value related to file access, and assigns a set of files from the plurality of files an access classification based on the modified threshold value. The system migrates the set of files between hot and cold data areas based on the assigned access classification.

IPC Classes  ?

  • G06F 17/30 - Information retrieval; Database structures therefor
  • G06N 99/00 - Subject matter not provided for in other groups of this subclass

53.

Increasing speed of file restore

      
Application Number 14457767
Grant Number 10152390
Status In Force
Filing Date 2014-08-12
First Publication Date 2018-12-11
Grant Date 2018-12-11
Owner MIDCAP FINANCIAL TRUST (USA)
Inventor
  • Chepel, Dmitry
  • Beloussov, Serguei M.
  • Lyadvinsky, Maxim V.
  • Protasov, Stanislav

Abstract

A method, computer program product, computing system, and system for increasing speed of a file restore from an archive storage device are described. The method may include receiving, at a computing device, a list of files to be restored from the archive storage device and file location data associated with one or more files from the list of files to be restored. The method may further include determining, at the computing device, a file restoration sequence for the one or more files from the list of files to be restored based upon, at least in part, the file location data. The method may also include restoring, from the archive storage device, the one or more files from the list of files to be restored based upon, at least in part, the file restoration sequence.

IPC Classes  ?

  • G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result

54.

Optimized lock detection in a change block tracker

      
Application Number 14985211
Grant Number 10078641
Status In Force
Filing Date 2015-12-30
First Publication Date 2018-09-18
Grant Date 2018-09-18
Owner MIDCAP FINANCIAL TRUST (USA)
Inventor
  • Redko, Andrey
  • Protassov, Stanislav S.
  • Beloussov, Serguei M.
  • Shmulevich, Mark

Abstract

A method for optimizing lock detection in a change block tracker (CBT). A volume subject to the backup constantly receives writes. Therefore, it is important to divide writes that occurred before the lock and the write that occurred after the lock. The CBT is installed into kernel at the installation of the backup agent (application). The detection of changes is started at the completion of a previous snapshot. Snapshot creation request (SCR) is generated. Lock request is received by the CBT. Once the lock request is intercepted, the current changes are moved to frozen changes. The CBT processes the SCR and creates a collection of changes—i.e., snapshot with a Name. The CBT moves the current changes to the snapshot Name.

IPC Classes  ?

  • G06F 17/30 - Information retrieval; Database structures therefor
  • G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result

55.

System and method of using encryption algorithms in P2P encryption mode to restore integrity of data

      
Application Number 15429269
Grant Number 10409688
Status In Force
Filing Date 2017-02-10
First Publication Date 2018-08-16
Grant Date 2019-09-10
Owner MIDCAP FINANCIAL TRUST (USA)
Inventor Tormasov, Alexander G.

Abstract

A system and method is disclosed for using encryption algorithms in peer-to-peer encryption mode to restore the integrity of data. An example method is provided for generating a new derivative for a file that has a plurality of existing derivatives that have been stored on servers using an (n,k) algorithm, where the (n,k) algorithm provides that a minimum number k of the derivatives required to restore the file. The method includes accessing, on a server, a first derivative of the existing derivatives and forming a blob for the new derivative based on a modification operation that uses the first derivative. Moreover, the method includes determining a number of times the modification operation has been performed, and if the number of times the modification operation has been performed is equal to the minimum number k, uploading the blob to a server for storage thereon.

IPC Classes  ?

  • G06F 12/14 - Protection against unauthorised use of memory
  • G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
  • G06F 11/00 - Error detectionError correctionMonitoring
  • H04L 9/08 - Key distribution

56.

Backup of user data with validity check

      
Application Number 14948868
Grant Number 10044801
Status In Force
Filing Date 2015-11-23
First Publication Date 2018-08-07
Grant Date 2018-08-07
Owner MIDCAP FINANCIAL TRUST (USA)
Inventor
  • Tyurumov, Alexey
  • Protassov, Stanislav S.
  • Beloussov, Serguei M.
  • Shmulevich, Mark

Abstract

A data backup application checks validity of data being backed up during an incremental or a full backup. In case of the file backup, the full backup checks the validity of data during the backup, because in case of data corruption the user will not have any original data since no data has been backed up yet. In case of the incremental backup, only the new files or the files that have changed compared to the last backup are now backed up. All new and modified files can be checked for validity by comparing internal format of the user files against a corresponding file format standard. If corrupted files are detected among the modified files, the user is notified.

IPC Classes  ?

  • G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure

57.

Method for sending secret messages between mobile devices

      
Application Number 15081850
Grant Number 10003964
Status In Force
Filing Date 2016-03-26
First Publication Date 2018-06-19
Grant Date 2018-06-19
Owner MIDCAP FINANCIAL TRUST (USA)
Inventor
  • Blintsov, Sergey
  • Halenchyk, Vitaly
  • Protasov, Stanislav S.
  • Beloussov, Serguei M.
  • Davydov, Kirill

Abstract

A method for exchanging hidden secret messages includes generating a masking message comprising a quick phrase on a sender's mobile device; receiving a secret message and associating it with the masking message; encrypting the masking message; encoding the secret message using invisible symbols and embedding it into the masking message; sending the masking message to a recipient; receiving a response masking message from a recipient's mobile device; copying the response masking message and detecting the secret message by checking a clipboard content; decrypting the response masking message; and decoding the secret message and rendering it on a sender's keyboard screen. The secret message contains an invisible marker inserted after a first symbol of the masking message for detection and decoding.

IPC Classes  ?

  • H04W 12/02 - Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
  • H04M 1/673 - Preventing unauthorised calls from a telephone set by electronic means the user being required to key in a code
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 9/08 - Key distribution
  • H04W 12/04 - Key management, e.g. using generic bootstrapping architecture [GBA]

58.

Systems, methods, and computer products for replication of disk sectors of a target machine

      
Application Number 14320540
Grant Number 10002052
Status In Force
Filing Date 2014-06-30
First Publication Date 2018-06-19
Grant Date 2018-06-19
Owner MIDCAP FINANCIAL TRUST (USA)
Inventor
  • Lyadvinsky, Maxim V.
  • Manukyan, Emil
  • Beloussov, Serguei M.
  • Dragnev, Andrey

Abstract

A method, computer program product, computing system, and system for machine replication are described. The method may include creating a crash-consistent replica of a source machine by replicating sectors from a source drive on the source machine to a target drive on a target machine wherein the sectors on the target drive have the same offset as the sectors on the source drive. The method may further include, in response to determining that a sector replicated from the source drive to the target drive has changed on the source drive, replicating the sector that changed on the source drive to the target drive on the target machine out-of-order. The method may also include creating an application-consistent replica version of the source machine by creating a snapshot of the source machine and replicating sectors from the snapshot to the target drive on the target machine.

IPC Classes  ?

  • G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
  • G06F 11/07 - Responding to the occurrence of a fault, e.g. fault tolerance

59.

Data storage system performance management

      
Application Number 14959474
Grant Number 09990252
Status In Force
Filing Date 2015-12-04
First Publication Date 2018-06-05
Grant Date 2018-06-05
Owner MIDCAP FINANCIAL TRUST (USA)
Inventor
  • Morlang, Alexey
  • Andreev, Alexey
  • Neporada, Andrey
  • Beloussov, Serguei

Abstract

In part, the disclosure relates to a computer-implemented system for managing a data storage system comprising a plurality of data storage nodes. The system includes at least one processor and an operatively associated storage device. The at least one processor is programmed to: monitor utilization of at least one data object stored at the data storage system as a coded data object comprising a first total number of data blocks, wherein each of the first number of data blocks is stored at a separate data storage node, and wherein an original data object is re-creatable from a first base number of data blocks selected from the first total number of data blocks; determine that the utilization of the at least one data object has changed; and modify a number of the plurality of data storage nodes that store data blocks of the coded data object.

IPC Classes  ?

  • G06F 11/10 - Adding special bits or symbols to the coded information, e.g. parity check, casting out nines or elevens
  • H03M 13/15 - Cyclic codes, i.e. cyclic shifts of codewords produce other codewords, e.g. codes defined by a generator polynomial, Bose-Chaudhuri-Hocquenghem [BCH] codes

60.

Anonymous cloud data storage and anonymizing non-anonymous storage

      
Application Number 15047219
Grant Number 09973339
Status In Force
Filing Date 2016-02-18
First Publication Date 2018-05-15
Grant Date 2018-05-15
Owner MIDCAP FINANCIAL TRUST (USA)
Inventor Lyadvinsky, Maxim V.

Abstract

A process of writing to a non-anonymous cloud storage is provided. On a client side, a write request to block X is received. A block key for the block numbers X is calculates as a function, which uses an Anonymous Key and X as its arguments. A hash function value of the block key is calculated. The content and the hash value are transferred to a Virtual Cloud Service. Then, on the Virtual Cloud Service, public cloud accounts are selected based on part of the hash value. A file name is generated from the calculated hash value. The content of block X is stored to the file with the generated name within the selected cloud account. Thus, there is no data reflecting the ownership of the user files on the cloud storage that is revealed.

IPC Classes  ?

  • H04L 9/08 - Key distribution
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 17/30 - Information retrieval; Database structures therefor

61.

Systems and methods for authenticating video using watermarks

      
Application Number 15797043
Grant Number 10176309
Status In Force
Filing Date 2017-10-30
First Publication Date 2018-05-03
Grant Date 2019-01-08
Owner MIDCAP FINANCIAL TRUST (USA)
Inventor
  • Tormasov, Alexander
  • Lysenko, Victor
  • Shmulevich, Mark
  • Protasov, Stanislav
  • Beloussov, Serguei M.

Abstract

Disclosed are blockchain-based methods and systems for watermarking digital content. In an exemplary aspect, a method for watermarking digital content is provided, by receiving, by a processor, a data stream comprising audio and/or video content; receiving watermark data, by a processor, from a computing node communicatively linked to a blockchain-based distributed ledger; and applying at least one watermark to the data stream based upon the watermark data, wherein the watermark comprises at least one hash based on one or more data blocks stored in the blockchain-based distributed ledger.

IPC Classes  ?

  • G06F 21/16 - Program or content traceability, e.g. by watermarking
  • G06F 21/64 - Protecting data integrity, e.g. using checksums, certificates or signatures
  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system

62.

System and method of using data blocks to optimize file storage

      
Application Number 15846308
Grant Number 10747724
Status In Force
Filing Date 2017-12-19
First Publication Date 2018-05-03
Grant Date 2020-08-18
Owner MIDCAP FINANCIAL TRUST (USA)
Inventor
  • Sergeev, Alexei
  • Khalyapin, Alexander
  • Shmulevich, Mark
  • Protasov, Stanislav
  • Beloussov, Serguei M.

Abstract

A system and method is disclosed for using data blocks to optimize file storage in electronic data storage. An example method includes storing data objects in a storage service that correspond to a main block and multiple secondary blocks. The main block is stored in a first bucket and the secondary blocks are stored in one or more second buckets, with the main block including metadata indicating a unique identifier of the second bucket. The method further includes receiving a request to delete the data file to free storage; marking the main block of the data file for deletion that prevents a reading operation or a writing operation of additional data to the data file; deleting the secondary blocks of the data file; and after the secondary blocks are deleted, deleting the marked main block of the data file.

IPC Classes  ?

  • G06F 17/00 - Digital computing or data processing equipment or methods, specially adapted for specific functions
  • G06F 16/174 - Redundancy elimination performed by the file system
  • G06F 16/22 - IndexingData structures thereforStorage structures
  • G06F 16/16 - File or folder operations, e.g. details of user interfaces specifically adapted to file systems

63.

System and method for verification of data transferred among several data storages

      
Application Number 15790140
Grant Number 10938571
Status In Force
Filing Date 2017-10-23
First Publication Date 2018-04-26
Grant Date 2021-03-02
Owner MIDCAP FINANCIAL TRUST (USA)
Inventor
  • Lysenko, Victor
  • Protasov, Stanislav
  • Shmulevich, Mark
  • Beloussov, Serguei M

Abstract

Disclosed are system and method for verification of data transferred among several data storages. An exemplary method includes: calculating first hash-sums of the data during an initial placement in a data storage; transmitting the first hash-sums to at least one blockchain network; detecting a transfer of the data to a new data storage; calculating second hash-sums of the data after a placement of the data in the new data storage; transmitting the second hash-sums to the at least one blockchain network; comparing the first and second hash-sums of the data; and determining data immutability after the transfer of the data from the data storage to the new data storage based at least on results of the comparing.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
  • H04L 9/06 - Arrangements for secret or secure communicationsNetwork security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems

64.

Consistent backup of blocks through block tracking

      
Application Number 14869338
Grant Number 09946608
Status In Force
Filing Date 2015-09-29
First Publication Date 2018-04-17
Grant Date 2018-04-17
Owner MIDCAP FINANCIAL TRUST (USA)
Inventor
  • Per, Yuri
  • Beloussov, Serguei M.
  • Protasov, Stanislav
  • Lyadvinsky, Maxim V.
  • Tyuryumov, Alexey
  • Morlang, Alexey

Abstract

A method for creating an inconsistent backup and then a consistent backup is described. The method may include creating an inconsistent, full backup of a storage device. The method may further include creating a first snapshot of the storage device. The method may also include creating a consistent backup increment of the storage device based on the first snapshot. Additionally, the method may include adding the consistent backup increment to the inconsistent, full backup.

IPC Classes  ?

  • G06F 12/00 - Accessing, addressing or allocating within memory systems or architectures
  • G06F 13/00 - Interconnection of, or transfer of information or other signals between, memories, input/output devices or central processing units
  • G06F 13/28 - Handling requests for interconnection or transfer for access to input/output bus using burst mode transfer, e.g. direct memory access, cycle steal
  • G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
  • G06F 3/06 - Digital input from, or digital output to, record carriers

65.

System and method for file authenticity certification using blockchain network

      
Application Number 15726605
Grant Number 10157295
Status In Force
Filing Date 2017-10-06
First Publication Date 2018-04-12
Grant Date 2018-12-18
Owner MIDCAP FINANCIAL TRUST (USA)
Inventor
  • Barinov, Igor
  • Lysenko, Victor
  • Beloussov, Serguei
  • Shmulevich, Mark
  • Protasov, Stanislav

Abstract

A system and method for authenticating data files using a block chain network. An exemplary method includes identifying data files in electronic data storage, computing hash values for files, adding pairs of the hash values and computing hash values for each resulting pair, continuing this process to a root level of a hash tree, and sending the root hash to a blockchain network in which one or more nodes in the blockchain network adds the hash value as one or more blocks in a blockchain.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 21/64 - Protecting data integrity, e.g. using checksums, certificates or signatures
  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system

66.

System and method for backing up social network data

      
Application Number 15696612
Grant Number 10712951
Status In Force
Filing Date 2017-09-06
First Publication Date 2018-03-08
Grant Date 2020-07-14
Owner MIDCAP FINANCIAL TRUST (USA)
Inventor
  • Denischenko, Nikolay
  • Grebennikov, Nikolay
  • Shmulevich, Mark
  • Protasov, Stanislav
  • Beloussov, Serguei M.

Abstract

Disclosed are methods, systems and computer program products for backing up user data from a social network account. An exemplary general method includes the steps of obtaining access to a user account on a social network, by a social network application; determining, by the social network application, one or more restrictions on external requests for data imposed by the social network; generating, by a backup agent in communication with the social network application, an algorithm for requesting data from the user account based upon the one or more restrictions on external requests for data; requesting user data from the user account, by the social network application, using the algorithm; receiving the user data from the user account, by the social network application; transmitting the received user data from the social network application to the backup agent; and archiving the received user data, by the backup agent.

IPC Classes  ?

  • G06F 3/06 - Digital input from, or digital output to, record carriers
  • G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result

67.

Waste heat recovery and conversion

      
Application Number 15547767
Grant Number 10544753
Status In Force
Filing Date 2016-02-01
First Publication Date 2018-02-22
Grant Date 2020-01-28
Owner MIDCAP FINANCIAL TRUST (USA)
Inventor Filippone, Claudio

Abstract

Embodiments in accordance with the present disclosure provide systems and methods for a waste heat recovery and conversion. The waste heat recovery and conversion system includes a housing non-invasively mountable onto an engine. The waste heat recovery and conversion system also includes a power conversion unit (PCU) entirely within the housing. The PCU includes heat exchangers, an expander, an electrical power generator, and a fluid pump. The heat exchangers, the expander, the fluid pump, and the fluid reservoir form a thermodynamic loop that drives the electrical power generator using thermal energy from waste heat. Under various configurations the waste heat recovery and conversion system offer pollutant reduction features all together with fuel savings.

IPC Classes  ?

  • F02G 5/02 - Profiting from waste heat of exhaust gases
  • F01K 23/10 - Plants characterised by more than one engine delivering power external to the plant, the engines being driven by different fluids the engine cycles being thermally coupled combustion heat from one cycle heating the fluid in another cycle with exhaust fluid of one cycle heating the fluid in another cycle
  • F01N 5/02 - Exhaust or silencing apparatus combined or associated with devices profiting by exhaust energy the devices using heat

68.

Event-based data backup and recovery for mobile devices

      
Application Number 15204294
Grant Number 09894510
Status In Force
Filing Date 2016-07-07
First Publication Date 2018-02-13
Grant Date 2018-02-13
Owner MIDCAP FINANCIAL TRUST (USA)
Inventor
  • Kortunov, Denis
  • Protassov, Stanislav S.
  • Beloussov, Serguei M.

Abstract

A mobile application that allows for backup and restore of user data on a mobile device is provided. The data backup application records a history of all user actions performed with mobile device data. The backup application monitors all of the user actions or applications that affect the mobile device data and reflects it into history, which can be viewed by the user. If the data is affected—it is backed up on a cloud. This works best within a framework of a continuous backup. A user can undo any of his destructive actions and the backup application can restore the affected data from the cloud storage. A history list serves as a filter to user data already located on the cloud.

IPC Classes  ?

  • H04M 3/00 - Automatic or semi-automatic exchanges
  • H04W 8/18 - Processing of user or subscriber data, e.g. subscribed services, user preferences or user profilesTransfer of user or subscriber data
  • H04W 8/20 - Transfer of user or subscriber data
  • H04M 1/725 - Cordless telephones

69.

System and method for verifying data integrity using a blockchain network

      
Application Number 15215775
Grant Number 10114980
Status In Force
Filing Date 2016-07-21
First Publication Date 2018-01-25
Grant Date 2018-10-30
Owner MIDCAP FINANCIAL TRUST (USA)
Inventor
  • Barinov, Igor
  • Lysenko, Victor
  • Beloussov, Serguei
  • Shmulevich, Mark
  • Protasov, Stanislav

Abstract

A system and method provided for verifying data integrity for large volumes of critical data using blockchain technology. An exemplary method includes storing data files in electronic storage; creating a hash values for of each of the files; and transmitting the hash values to a blockchain network in which one or more nodes in the blockchain network adds the first hash values as blocks to the blockchain. Moreover, an API is provided to monitor data operations performed on the data files and transmit metadata of any operations performed to a transaction log. In turn, hash values relating to the data operations are also created and transmitted to the blockchain network to be added as additional blocks in the blockchain, such that the blockchain can be used to verify the accuracy of the data files stored on the electronic storage.

IPC Classes  ?

  • G06F 17/30 - Information retrieval; Database structures therefor
  • G06F 21/64 - Protecting data integrity, e.g. using checksums, certificates or signatures
  • G06F 21/78 - Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data

70.

Synchronized change tracking in data storage volumes

      
Application Number 14502959
Grant Number 09875041
Status In Force
Filing Date 2014-09-30
First Publication Date 2018-01-23
Grant Date 2018-01-23
Owner MIDCAP FINANCIAL TRUST (USA)
Inventor
  • Redko, Andrei
  • Protasov, Stanislav
  • Beloussov, Serguei M.
  • Lyadvinsky, Maxim V.

Abstract

Various examples are directed to systems and methods for backing up data. A tracking utility may receive a start request and then receive a write request directed towards the first volume. An address of the block of the volume to be modified by the write request may be recorded to a current changes list. The tracking utility may also receive a first lock request, wherein the lock request comprises an instruction to place the volume in a read-only mode. Upon receiving the first lock request, the tracking utility may copy the current changes list to a frozen changes list and clear the current changes list. Upon receiving a second lock request, the tracking utility may merge the current changes list and the frozen changes list.

IPC Classes  ?

  • G06F 12/00 - Accessing, addressing or allocating within memory systems or architectures
  • G06F 3/06 - Digital input from, or digital output to, record carriers

71.

System and method for dynamic online backup optimization

      
Application Number 15644902
Grant Number 10826805
Status In Force
Filing Date 2017-07-10
First Publication Date 2018-01-11
Grant Date 2020-11-03
Owner MIDCAP FINANCIAL TRUST (USA)
Inventor
  • Korotaev, Kirill
  • Shmulevich, Mark
  • Protasov, Stanislav
  • Beloussov, Serguei M.

Abstract

Methods of optimizing transmission of data from a client to a remote data center are disclosed, as well as systems and computer program products related to the same. An exemplary method comprises: receiving data, at a first intervening data center, transmitted from a client and addressed to a terminal data center, wherein the first intervening data center and the terminal data center are selected from a plurality of connected data centers; and transferring the data, from the first intervening data center through one or more additional intervening data centers selected from the plurality of connected data centers, until the data reaches the terminal data center; wherein each data center in the plurality of data centers independently selects a connected data center to transfer the data to based upon the amount of latency and/or bandwidth available at the connected data center.

IPC Classes  ?

  • H04L 12/26 - Monitoring arrangements; Testing arrangements
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 12/911 - Network admission control and resource allocation, e.g. bandwidth allocation or in-call renegotiation
  • H04L 12/851 - Traffic type related actions, e.g. QoS or priority

72.

Agentless file backup of a virtual machine

      
Application Number 14320526
Grant Number 09858154
Status In Force
Filing Date 2014-06-30
First Publication Date 2018-01-02
Grant Date 2018-01-02
Owner MIDCAP FINANCIAL TRUST (USA)
Inventor
  • Lyadvinsky, Maxim V.
  • Beloussov, Serguei M.
  • Miroshkin, Vladimir
  • Shulga, Victor

Abstract

A method, computer program product, computing system, and system for virtual machine backup are described. In part, the disclosure relates to methods and systems for performing backup of virtual machine files on a block level that include features that allow a user to select and backup specific files or folders of file systems of a VM. The specificity and selectivity features by which certain files or folders are backup from a file system of a VM can be implemented by processing one or more partition structures of a virtual disk of a virtual machine. Once the partition structures have been processed and analyzed using a backup up software application, it is then possible to detect and process guest file systems of the VM.

IPC Classes  ?

  • G06F 17/30 - Information retrieval; Database structures therefor
  • G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result

73.

Methods of preserving and protecting user data from modification or loss due to malware

      
Application Number 15629008
Grant Number 10303877
Status In Force
Filing Date 2017-06-21
First Publication Date 2017-12-21
Grant Date 2019-05-28
Owner MIDCAP FINANCIAL TRUST (USA)
Inventor
  • Roguine, Stanislav
  • Aseev, Eugene
  • Beloussov, Serguei
  • Protasov, Stanislav
  • Shmulevich, Mark
  • Grebennikov, Nikolay

Abstract

Methods of preserving and protecting user data from modification or loss due to malware are disclosed, as well as systems and computer program products related to the same.

IPC Classes  ?

  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules

74.

Parallel computer system recovery

      
Application Number 14986184
Grant Number 09846622
Status In Force
Filing Date 2015-12-31
First Publication Date 2017-12-19
Grant Date 2017-12-19
Owner MIDCAP FINANCIAL TRUST (USA)
Inventor
  • Roguine, Stanislav
  • Protasov, Stanislav
  • Shmulevich, Mark
  • Beloussov, Serguei M.

Abstract

Systems and methods for parallel computer system recovery are described. The method may include receiving requests for backup data at a storage server from a plurality of computer systems to be recovered. The method may further include determining a next data fragment of the backup data to be transmitted from the storage server to the plurality of computer systems based on an order of priority. The method may also include transmitting the next data fragment from the storage server to the plurality of computer systems via a data fragment multicast stream.

IPC Classes  ?

  • G06F 11/07 - Responding to the occurrence of a fault, e.g. fault tolerance
  • G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result

75.

System and method for file time-stamping using a blockchain network

      
Application Number 15591294
Grant Number 10432411
Status In Force
Filing Date 2017-05-10
First Publication Date 2017-11-16
Grant Date 2019-10-01
Owner MIDCAP FINANCIAL TRUST (USA)
Inventor
  • Barinov, Igor
  • Lysenko, Victor
  • Beloussov, Serguei M.
  • Protasov, Stanislav
  • Schmulevich, Mark

Abstract

A system and method is provided for storing data and ensuring integrity and reliability of the data using blockchain technology. An exemplary method is provided for time-stamping a file to be added to a blockchain network. The method includes generating a data file; identifying a hash value from a first block previously recorded in the blockchain network; embedding a beacon relating to the hash value in the data file; and recording the data file with the embedded beacon as a transaction in a second block in the blockchain network.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
  • H04L 9/06 - Arrangements for secret or secure communicationsNetwork security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems

76.

System and method of validating data for incremental format of backup archive

      
Application Number 15137407
Grant Number 09977706
Status In Force
Filing Date 2016-04-25
First Publication Date 2017-10-26
Grant Date 2018-05-22
Owner MIDCAP FINANCIAL TRUST (USA)
Inventor
  • Korotaev, Kirill
  • Protasov, Stanislav
  • Beloussov, Serguei
  • Smulevich, Mark

Abstract

A system and method is provided for partially validating data archive for an incremental data backup scheme. According to one aspect, the method includes generating the backup data file of electronic data stored electronic memory by transferring the electronic data to a data storage, generating initial incremental backup data of the electronic data where the incremental backup data includes changes made to the electronic data after the backup data file is generated, and comparing a first portion of the backup data file with a corresponding first portion of the electronic data during the generating of the incremental backup data. Furthermore, the method includes determining whether the first portion of the backup data file is valid based on the comparison and, if the first portion of the backup data file is invalid, generating another backup of the first portion of the electronic data.

IPC Classes  ?

  • G06F 11/00 - Error detectionError correctionMonitoring
  • G06F 11/07 - Responding to the occurrence of a fault, e.g. fault tolerance
  • G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result

77.

System and method for agentless backup of virtual machines

      
Application Number 15131872
Grant Number 09996425
Status In Force
Filing Date 2016-04-18
First Publication Date 2017-10-19
Grant Date 2018-06-12
Owner MIDCAP FINANCIAL TRUST (USA)
Inventor
  • Shulga, Victor
  • Semyonov, Vasily
  • Protasov, Stanislav
  • Shumlevich, Mark
  • Beloussov, Serguei

Abstract

A system and method is disclosed for performing agentless backup of a virtual machine using a temporary attached virtual disk. An example method includes creating a virtual machine disk in a datastore, loading a software application in the virtual machine disk, the software application being configured to collect metadata relating to at least one application executing in an operating system of the virtual machine, communicatively coupling the datastore to the virtual machine, collecting the metadata relating to the at least one application executing in the operating system of the virtual machine, generating a snapshot of the virtual machine, and storing a backup of the virtual machine in a backup archive based on the snapshot.

IPC Classes  ?

  • G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
  • G06F 9/455 - EmulationInterpretationSoftware simulation, e.g. virtualisation or emulation of application or operating system execution engines

78.

System and method for live virtual incremental restoring of data from cloud storage

      
Application Number 15086356
Grant Number 10296423
Status In Force
Filing Date 2016-03-31
First Publication Date 2017-10-05
Grant Date 2019-05-21
Owner MIDCAP FINANCIAL TRUST (USA)
Inventor
  • Shulga, Victor
  • Semyonov, Vasily
  • Beloussov, Serguei
  • Protasov, Stanislav
  • Smulevich, Mark
  • Redko, Andrey

Abstract

A system and method is disclosed for live virtual incremental restoring of data from a cloud storage. An example method includes, in response to detecting a data backup, collecting information by a hardware processor of a computing device for configuring a list of changed sectors (LCS) of a storage medium of the computing device as a result of the data backup. The method further includes virtually restoring at least a portion of electronic data saved in the storage medium of the computing device from the cloud storage, the selected electronic data being previously saved in the cloud storage. The method also includes rebooting the computing device and applying changes to the storage medium of the computing device based on the LCS during a subsequent data backup.

IPC Classes  ?

  • G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
  • G06F 9/4401 - Bootstrapping

79.

System and method for data protection during full data backup

      
Application Number 15084815
Grant Number 10956270
Status In Force
Filing Date 2016-03-30
First Publication Date 2017-10-05
Grant Date 2021-03-23
Owner MIDCAP FINANCIAL TRUST (USA)
Inventor
  • Redko, Andrey
  • Protasov, Stanislav
  • Beloussov, Serguei
  • Shmulevich, Mark

Abstract

A system and method is provided for performing a full data backup of user data with data protection. An example method includes generating a snapshot of the electronic data stored in memory, initiating a transfer of the electronic data to a data storage facility; detecting requests to modify a file of the electronic data, saving an initial version of the file based on the snapshot of the electronic data, continuing the transfer of the data to the data storage facility, and transferring the modified file using the initial version of the file based on the snapshot of the electronic data.

IPC Classes  ?

  • G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
  • G06F 11/30 - Monitoring
  • G06F 16/11 - File system administration, e.g. details of archiving or snapshots

80.

Hot recovery of virtual machines

      
Application Number 14320450
Grant Number 09760448
Status In Force
Filing Date 2014-06-30
First Publication Date 2017-09-12
Grant Date 2017-09-12
Owner MIDCAP FINANCIAL TRUST (USA)
Inventor
  • Per, Yuri
  • Lyadvinsky, Maxim V.
  • Beloussov, Serguei M.
  • Egorov, Dmitry
  • Borodin, Alexey
  • Semyonov, Vasily

Abstract

A method, computer program product, and computing system for hot recovery of virtual machines are described. The method may include initiating a recovery process to transfer data, from a backup archive of a virtual machine to be restored, to a virtual disk at the virtual machine host computer. The method may further include booting the virtual machine to be restored. The method may also include intercepting a read request from the virtual machine to the virtual disk at the virtual machine host computer. The method may additionally include determining if the read request from the virtual machine requested data from the virtual disk which has not yet been restored from the backup archive to the virtual disk by the recovery process. Moreover, the method may include, in response to determining that the requested data has not been restored from the backup archive to the virtual disk, returning the requested data.

IPC Classes  ?

  • G06F 11/00 - Error detectionError correctionMonitoring
  • G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result

81.

System and method for synchronization of large amounts of data while maintaining control over access rights to such data

      
Application Number 15383315
Grant Number 10387666
Status In Force
Filing Date 2016-12-19
First Publication Date 2017-07-20
Grant Date 2019-08-20
Owner MIDCAP FINANCIAL TRUST (USA)
Inventor
  • Beloussov, Serguei
  • Tormasov, Alexander
  • Protasov, Stanislav
  • Shmulevich, Mark

Abstract

Disclosed are system and method for synchronization of large amounts of data while maintaining control over access rights to such data in electronic data storage. An exemplary method comprises: partitioning a volume of data into a plurality of data blocks; assigning a synchronization status to at least one data block in the plurality of data blocks; determining access rights to the data contained in the at least one data block, based upon at least one of information identifying an owner or administrator associated with the at least one data block, or a set of allowed or prohibited operations that may be performed on the at least one data block; controlling access to the data contained in the at least one data block based upon the determination of access rights; and updating the synchronization status of the at least one data block.

IPC Classes  ?

  • G06F 17/00 - Digital computing or data processing equipment or methods, specially adapted for specific functions
  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
  • G06F 21/60 - Protecting data
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 21/64 - Protecting data integrity, e.g. using checksums, certificates or signatures
  • G06F 16/27 - Replication, distribution or synchronisation of data between databases or within a distributed database systemDistributed database system architectures therefor
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure

82.

Method and system for secure private communications

      
Application Number 15404395
Grant Number 10439995
Status In Force
Filing Date 2017-01-12
First Publication Date 2017-07-13
Grant Date 2019-10-08
Owner MIDCAP FINANCIAL TRUST (USA)
Inventor
  • Tormasov, Alexander G.
  • Protasov, Stanislav S.
  • Beloussov, Serguei M.
  • Shmulevich, Mark

Abstract

A system and method for providing secure private electronic communications. An exemplary method includes encrypting a hidden message using an encryption scheme; encoding the encrypted hidden message in a source message; providing the source message having the encoded hidden message by a first electronic device; and transmitting a decryption key to a second electronic device. Moreover, the second electronic device can capture the encoded hidden message provided by the first electronic device, decode the hidden message, and extract the hidden message using the decryption key so that the hidden message can be rendered by the second electronic device.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 12/58 - Message switching systems
  • H04W 12/00 - Security arrangementsAuthenticationProtecting privacy or anonymity
  • G06T 1/00 - General purpose image data processing
  • H04N 21/8358 - Generation of protective data, e.g. certificates involving watermark
  • H04N 1/32 - Circuits or arrangements for control or supervision between transmitter and receiver
  • G06F 21/36 - User authentication by graphic or iconic representation

83.

System and method for providing comprehensive backup of modular mobile devices

      
Application Number 15405659
Grant Number 10394659
Status In Force
Filing Date 2017-01-13
First Publication Date 2017-07-13
Grant Date 2019-08-27
Owner MIDCAP FINANCIAL TRUST (USA)
Inventor
  • Tormasov, Alexander G.
  • Protassov, Stanislav S.
  • Beloussov, Serguei M.
  • Shmulevich, Mark

Abstract

A system and method for backup and recovery of user mobile device modules, settings and configurations. An example system includes a modular mobile device and a number of interconnected modules that can be connected to the mobile device. The device includes memory that stores configuration and setting parameters associated with each of the modules. In operation, a backup software utility monitors the configuration and setting parameters to detect additions and modifications and the transmits the detected additions and modifications to remote data storage to generate a data backup indicating a current state of the configuration and setting parameters. As a result, the modular mobile device can always return to a previous state for each module if it is replaced or the software is reinstalled, for example.

IPC Classes  ?

  • G06F 9/44 - Arrangements for executing specific programs
  • G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
  • H04W 8/30 - Network data restoration

84.

System and method of using performance-maintaining commands for generating a backup of unsupported file systems

      
Application Number 14987868
Grant Number 10360108
Status In Force
Filing Date 2016-01-05
First Publication Date 2017-07-06
Grant Date 2019-07-23
Owner MIDCAP FINANCIAL TRUST (USA)
Inventor
  • Per, Yuri
  • Protasov, Stanislav
  • Shmulevich, Mark
  • Beloussov, Serguei

Abstract

A system and method is disclosed for using performance-maintaining commands for generating backup data of an unsupported file system. An example method includes intercepting a plurality of data storage commands transmitted from the file system to a storage device, where the plurality of data storage commands indicating sectors of the memory of the computer that do not contain valid data. The method further includes analyzing the plurality of data storage commands to determine sectors of the memory that contains valid data, generating a data structure that indicates the sectors of the memory that contain valid data and the sector of the memory that do not contain valid data, and subsequently generating the backup data copy of the memory of the computer based on the data structure.

IPC Classes  ?

  • G06F 17/30 - Information retrieval; Database structures therefor
  • G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
  • G06F 16/11 - File system administration, e.g. details of archiving or snapshots

85.

System and method for incrementally performing full data backup

      
Application Number 15183014
Grant Number 10203905
Status In Force
Filing Date 2016-06-15
First Publication Date 2017-07-06
Grant Date 2019-02-12
Owner MIDCAP FINANCIAL TRUST (USA)
Inventor
  • Neporada, Andrei
  • Simonov, Vladimir
  • Protasov, Stanislav
  • Shmulevich, Mark
  • Beloussov, Serguei

Abstract

A system and method is disclosed for performing a backup of electronic data. An example method includes storing a first incremental data backup of a dataset that is less than a complete backup of the dataset and includes unmodified and modified portions of the dataset. Then, a second incremental data backup of the dataset is stored that includes a second unmodified portion of the dataset different than the first unmodified portion. The method then determines whether the first and second incremental data backups together form the complete backup of the dataset. If they do not, the method further stores a subsequent incremental data backup of the dataset in the electronic memory that includes an additional unmodified portion of the dataset and/or an additional modified portion of the dataset.

IPC Classes  ?

  • G06F 12/00 - Accessing, addressing or allocating within memory systems or architectures
  • G06F 3/06 - Digital input from, or digital output to, record carriers
  • G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
  • G06F 11/00 - Error detectionError correctionMonitoring

86.

System and method of using data blocks to optimize file storage

      
Application Number 14987159
Grant Number 09870367
Status In Force
Filing Date 2016-01-04
First Publication Date 2017-07-06
Grant Date 2018-01-16
Owner MIDCAP FINANCIAL TRUST (USA)
Inventor
  • Sergeev, Alexei
  • Khalyapin, Alexander
  • Protasov, Stanislav
  • Shmulevich, Mark
  • Beloussov, Serguei

Abstract

A system and method is disclosed for using data blocks to optimize file storage in electronic data storage. An example method includes storing a data file in electronic memory, where the data file includes a main block and a plurality of secondary blocks, with the main block including metadata that indicates respective locations of the secondary blocks relative to the main block. The method further includes performing a sparse operation of a data file to determine regions of the data file that contains unused space, determining blocks that are overlapped by the regions of the data file that contains unused space, removing the overlapped blocks, and storing the updated data file in an electronic database.

IPC Classes  ?

  • G06F 17/30 - Information retrieval; Database structures therefor

87.

System and method of removing unused regions of a data file

      
Application Number 14988923
Grant Number 10108631
Status In Force
Filing Date 2016-01-06
First Publication Date 2017-07-06
Grant Date 2018-10-23
Owner MIDCAP FINANCIAL TRUST (USA)
Inventor
  • Sergeev, Alexei
  • Protasov, Stanislav
  • Shmulevich, Mark
  • Beloussov, Serguei
  • Per, Yuri

Abstract

A system and method is disclosed for reducing a physical size of a data file that includes a plurality of blocks in sequence with each block having a defined size with a starting position and an end position. According to one aspect, the method includes obtaining information relating to an occupied physical region of the data file, where the occupied physical region contains unused space and/or unused data, and determining positions of first and second boundaries of the occupied physical region of the data file relative to the plurality of blocks in the data file. Furthermore, the method includes equalizing the occupied physical region by adjusting the first and second boundaries of the occupied physical region of the data file and removing data between the start and end of the removal region to reduce the physical size of the data file.

IPC Classes  ?

  • G06F 17/30 - Information retrieval; Database structures therefor
  • G06F 3/06 - Digital input from, or digital output to, record carriers

88.

System and method for prioritization of data backup and recovery traffic using QoS tagging

      
Application Number 15260510
Grant Number 10069911
Status In Force
Filing Date 2016-09-09
First Publication Date 2017-03-16
Grant Date 2018-09-04
Owner MIDCAP FINANCIAL TRUST (USA)
Inventor
  • Panin, Andrey
  • Beloussov, Serguei
  • Protasov, Stanislav

Abstract

Disclosed are systems, methods and computer program products for prioritization of data backup and recovery traffic using quality of service (QoS) tagging. An example method includes specifying Quality of Service (QoS) requirements for different types of network traffic, including QoS requirements for one or more data backup or recovery tasks, wherein the QoS requirements correspond to a network transmission priority level of the network traffic; receiving a data backup or recovery task, by a backup application; analyzing the data backup or recovery task, by the backup application, to determine its QoS requirements, based on the specified QoS requirements for data backup or recovery tasks; applying one or more QoS tags to data packets associated with the data backup or recovery task, by the backup application, based on the determined QoS requirements; and assigning a network transmission priority level to the data packets, based on its QoS tags.

IPC Classes  ?

  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
  • H04L 12/851 - Traffic type related actions, e.g. QoS or priority

89.

System and method for generating backup of personalized user data

      
Application Number 15260558
Grant Number 10437507
Status In Force
Filing Date 2016-09-09
First Publication Date 2017-03-16
Grant Date 2019-10-08
Owner MIDCAP FINANCIAL TRUST (USA)
Inventor
  • Tormasov, Alexander G.
  • Shmulevich, Mark
  • Beloussov, Serguei S.
  • Protasov, Stanislav

Abstract

A system and method that provides for the backup and recovery of personalized user data. An exemplary method includes storing user data files in electronic memory of a user device, continuously tracking user actions by one or more user devices to detect interact with at least one external resource; determining whether the tracked user actions have modified one or more of the plurality of user data files; and if the processor determines that the tracked user actions have modified a user data file, storing the modified user data file in a data storage system.

IPC Classes  ?

  • G06F 12/00 - Accessing, addressing or allocating within memory systems or architectures
  • G06F 3/06 - Digital input from, or digital output to, record carriers
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure

90.

System and method for optimization of operating system restore

      
Application Number 15176556
Grant Number 10095589
Status In Force
Filing Date 2016-06-08
First Publication Date 2016-12-15
Grant Date 2018-10-09
Owner MIDCAP FINANCIAL TRUST (USA)
Inventor
  • Lyadvinsky, Maxim V.
  • Redko, Andrey
  • Kukhta, Ivan
  • Stupak, Anatoly
  • Beloussov, Serguei
  • Protassov, Stanislav M.
  • Shmulevich, Mark

Abstract

A method and system is provided for optimization of restoration and loading of an operating system of a computer. An exemplary method includes initiating a loading of the operating system of the computer and intercepting a read request of data of a data volume from the operating system. Furthermore, the method includes determining whether the data has previously been restored during the loading of the operating system, and, if the data has previously been restored, performing the read request and returning to the loading of the operating system of the computer. Alternatively, if the data has not previously been restored, determining whether the data is stored in cache of the computer. If the data is not be stored in the cache, the method includes reading the data from a data archive and storing the data read from the data archive to the cache.

IPC Classes  ?

  • G06F 9/44 - Arrangements for executing specific programs
  • G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
  • G06F 9/4401 - Bootstrapping
  • G06F 9/46 - Multiprogramming arrangements

91.

System and method for incrementally performing full data backup

      
Application Number 14987128
Grant Number 09501234
Status In Force
Filing Date 2016-01-04
First Publication Date 2016-11-22
Grant Date 2016-11-22
Owner MIDCAP FINANCIAL TRUST (USA)
Inventor
  • Neporada, Andrei
  • Simonov, Vladimir
  • Protasov, Stanislav
  • Shmulevich, Mark
  • Beloussov, Serguei

Abstract

A system and method is disclosed for performing a backup of electronic data. An example method includes storing a first incremental data backup portion of a dataset in an electronic memory where the first incremental data backup includes both modified and unmodified portions of the dataset. Once stored, the method includes determining whether the first incremental data backup is a complete backup of the dataset. If the first incremental data backup is not a complete backup of the dataset, the method stores one or more additional incremental data backups of the dataset in the electronic memory that include additional modified and unmodified portions of the dataset until a full backup of the dataset is created.

IPC Classes  ?

  • G06F 12/00 - Accessing, addressing or allocating within memory systems or architectures
  • G06F 3/06 - Digital input from, or digital output to, record carriers

92.

Systems and methods for backup of virtual machines

      
Application Number 14320555
Grant Number 09471441
Status In Force
Filing Date 2014-06-30
First Publication Date 2016-10-18
Grant Date 2016-10-18
Owner MIDCAP FINANCIAL TRUST (USA)
Inventor
  • Lyadvinsky, Maxim V.
  • Beloussov, Serguei M.
  • Miroshkin, Vladimir
  • Ruslyakov, Alexey

Abstract

Various embodiments are directed to systems and methods for backing up a plurality of virtual machines, the method comprising. A computer system may initiate creation of a snapshot for each of the plurality of virtual machines. The computer system may select a first virtual machine from the plurality of virtual machines based on the input/output loads for each of the plurality of virtual machines and generate a backup archive of the first virtual machine.

IPC Classes  ?

  • G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result

93.

System and method for fast backup and restoring using sorted hashes

      
Application Number 12974753
Grant Number 09436558
Status In Force
Filing Date 2010-12-21
First Publication Date 2016-09-06
Grant Date 2016-09-06
Owner MIDCAP FINANCIAL TRUST (USA)
Inventor
  • Per, Yuri S.
  • Lyadvinsky, Maxim V.
  • Beloussov, Serguei M.

Abstract

A method, system and computer program product for backup and restoration of data. Hash values for data blocks subject to backup are generated. After a number of hashes are accumulated, e.g., on a backup server, these hashes are sorted. Then, the hashes are compared against the hash values in the hash table corresponding to data blocks that have already been backed up. If a hash matches the hash from the hash table, a pointer to the block in the archive is written to the table of pointers to the redundant blocks. Then, this hash value is deleted from a set of the hash values. A check is made if a hash is the last in the group. If the hash is the last in the group, the remaining unique hash values are written into the hash table. Otherwise, the next hash is selected from the group. The redundant data blocks are discarded and only unique data is backed up.

IPC Classes  ?

  • G06F 12/02 - Addressing or allocationRelocation
  • G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result

94.

Method for teleconferencing using 3-D avatar

      
Application Number 13968489
Grant Number 09424678
Status In Force
Filing Date 2013-08-16
First Publication Date 2016-08-23
Grant Date 2016-08-23
Owner MIDCAP FINANCIAL TRUST (USA)
Inventor
  • Enakiev, Anton
  • Tormasov, Alexander G.
  • Beloussov, Serguei M.
  • Tsibrovski, Juri V.
  • Protassov, Stanislav S.

Abstract

A method for implementing teleconferences when at least one participant receives 3-D data. A data rendering device presents data in a 3-D format or in pseudo 3-D format. A 3-D image is formed on a user computer system. The 3-D presentation is calculated by a local computer system. A block of user avatars is formed on the local computer system for all teleconference participants (including a local participant). The participant avatar includes a kinetic model (joints, muscles, body parts, etc.). The avatar includes a participant's behavior model (gestures, fingers, mimics, etc). The avatar also includes an avatar skin. The avatar skin includes a stable (unchangeable) part of the participant containing face and visible body parts, as well as modifiable parts (e.g., clothes, shoes, accessories, etc.).

IPC Classes  ?

  • G06T 13/40 - 3D [Three Dimensional] animation of characters, e.g. humans, animals or virtual beings
  • H04N 7/15 - Conference systems
  • G06T 13/20 - 3D [Three Dimensional] animation

95.

System and method for efficient backup using hashes

      
Application Number 13917950
Grant Number 08996830
Status In Force
Filing Date 2013-06-14
First Publication Date 2015-03-31
Grant Date 2015-03-31
Owner MIDCAP FINANCIAL TRUST (USA)
Inventor
  • Goldobin, Maxim V.
  • Lyadvinsky, Maxim V.
  • Beloussov, Serguei M.
  • Tormasov, Alexander G.
  • Per, Yuri S.

Abstract

Methods, systems, and apparatus, including computer programs encoded on computer storage media, for efficient backup using hashes One of the methods includes forming an image of a storage device, wherein contents of blocks of the storage device are restorable from the contents of blocks of the image. The method includes generating a first plurality of hash values, each hash value generated from contents of a block of the image. The method includes selecting a block of the storage device. The method includes generating a hash value from the contents of the selected block. The method includes determining whether the hash value occurs in the plurality of hash values. The method also includes generating an entry in the image in response to the determination.

IPC Classes  ?

  • G06F 12/00 - Accessing, addressing or allocating within memory systems or architectures
  • G06F 3/06 - Digital input from, or digital output to, record carriers

96.

Method and system for backup to a hidden backup storage

      
Application Number 13087541
Grant Number 08732121
Status In Force
Filing Date 2011-04-15
First Publication Date 2014-05-20
Grant Date 2014-05-20
Owner MIDCAP FINANCIAL TRUST (USA)
Inventor
  • Zorin, Andrey A.
  • Beloussov, Serguei M.
  • Lyadvinsky, Maxim V.
  • Goldobin, Maxim V.

Abstract

A system for data backup and recovery. A backup storage in a form of a file or a directory is created on a storage media. The backup storage is “hidden” from the file system, form user processes, form an operating system and from a data storage driver. The backup file is visible to only backup/restore application. The data is backed up into the “hidden” backup storage. The files system, the user processes, the operating system and the data storage driver do not know about the backup file and the areas of the storage media occupied by the backup file. When a write request for writing a data block to the space within the storage media occupied by the files of the “hidden” backup is received the write request is redirected to a free space on the storage media.

IPC Classes  ?

  • G06F 17/30 - Information retrieval; Database structures therefor

97.

System and method for bare metal restore of a computer over a network

      
Application Number 13726571
Grant Number 08645748
Status In Force
Filing Date 2012-12-25
First Publication Date 2014-02-04
Grant Date 2014-02-04
Owner MIDCAP FINANCIAL TRUST (USA)
Inventor
  • Chepel, Dmitry M.
  • Beloussov, Serguei M.
  • Lyadvinsky, Maxim V.
  • Goldobin, Maxim V.

Abstract

A system, method and computer program product for providing “bare metal” computer hardware with full operating system capabilities, including: (a) executing software contained in computer hardware read-only memory; (b) transferring software control to a location of a start-up program; (c) performing initialization of devices of the computer hardware; (d) selecting an origin storage device for restoration of an operating system to a destination storage device of the computer hardware; (e) establishing a connection with an origin for restoration of an operating system to the computer hardware; (f) initiating a transfer of the operating system data from selected origin to the computer hardware; (g) performing optional substitution of the computer hardware drivers; (h) performing optional structural modifications to the restored operating system; and (i) restoring the operating system to the computer hardware from a data storage device located either locally or remotely, from full or incremental operating system backup.

IPC Classes  ?

  • G06F 11/00 - Error detectionError correctionMonitoring

98.

System and method for efficient backup using hashes

      
Application Number 13021818
Grant Number 08484427
Status In Force
Filing Date 2011-02-07
First Publication Date 2013-07-09
Grant Date 2013-07-09
Owner MIDCAP FINANCIAL TRUST (USA)
Inventor
  • Goldobin, Maxim V.
  • Lyadvinsky, Maxim V.
  • Beloussov, Serguei M.
  • Tormasov, Alexander G.
  • Per, Yuri S.

Abstract

A method for data backup including (a) forming an image of the storage device; (b) for each block to be backed up to the image, generating a hash; (c) for each block stored in the image, storing a hash in a hash table; (c) for each additional block of the storage device to be backed up, generating a hash; (d) sorting all the generated hashes and deleting duplicate hashes; (e) comparing the hashes to identify candidate blocks that might have identical contents with contents of blocks stored in the image; (f) if the hashes are not coincident, then backing up, to the image, contents of unidentified blocks and blocks that do not have identical hashes, and (g) otherwise, storing links in the image instead of the contents of the blocks, (h) after checking all the hashes for those blocks that need to be backed up, writing only unique hashes to the hash table; (h) links for multiple blocks with identical contents point to a single block in the image, (i) the image contains a bitmap of the backup; (j) the bitmap contains indicators for the links that define if a block contains the content or if the block points to another block, (k) also indicators that reflect used and unused blocks such that an indicator whether contents are shared with another block vs. contents are unique to every other block in the image.

IPC Classes  ?

  • G06F 12/00 - Accessing, addressing or allocating within memory systems or architectures

99.

Blinkist

      
Application Number 011735768
Status Registered
Filing Date 2013-04-12
Registration Date 2014-03-08
Owner MidCap Financial Trust (USA)
NICE Classes  ?
  • 09 - Scientific and electric apparatus and instruments
  • 16 - Paper, cardboard and goods made from these materials
  • 35 - Advertising and business services
  • 41 - Education, entertainment, sporting and cultural services
  • 42 - Scientific, technological and industrial services, research and design

Goods & Services

Electronic publications, downloadable; Computer programmes [programs], recorded; Computer software, recorded; Downloadable image files; Computer programs [downloadable software]. Printed matter; Books; Bookbinding material; Teaching materials [except apparatus]. On-line advertising on a computer network; Dissemination of advertising for others via the Internet; Rental of advertising space on the Internet; Advertising via electronic media and specifically the internet; Online advertising of goods and services on websites; Rental of advertising space on web sites. Publishing, in particular online publication of electronic texts, books and magazines; Providing on-line electronic publications, not downloadable; Publication of texts, books, magazines, webzines and other printed matter. Software as a service [SaaS]; Computer software design; Updating of computer software; Rental of computer software; Computer programming.

100.

System and method for bare metal restore of a computer over a network

      
Application Number 12565525
Grant Number 08347137
Status In Force
Filing Date 2009-09-23
First Publication Date 2013-01-01
Grant Date 2013-01-01
Owner MIDCAP FINANCIAL TRUST (USA)
Inventor
  • Chepel, Dmitry M.
  • Beloussov, Serguei M.
  • Lyadvinsky, Maxim V.
  • Goldobin, Maxim V.

Abstract

A system, method and computer program product for providing “bare metal” computer hardware with full operating system capabilities, including: (a) executing software contained in computer hardware read-only memory; (b) transferring software control to a location of a start-up program; (c) performing initialization of devices of the computer hardware; (d) selecting an origin storage device for restoration of an operating system to a destination storage device of the computer hardware; (e) establishing a connection with an origin for restoration of an operating system to the computer hardware; (f) initiating a transfer of the operating system data from selected origin to the computer hardware; (g) performing optional substitution of the computer hardware drivers; (h) performing optional structural modifications to the restored operating system; and (i) restoring the operating system to the computer hardware from a data storage device located either locally or remotely, from full or incremental operating system backup.

IPC Classes  ?

  • G06F 11/00 - Error detectionError correctionMonitoring
  1     2        Next Page