Eliseev
Andrei Aleksandrovich Eliseev, Perm RU
Patent application number | Description | Published |
---|---|---|
20150097804 | Method for manipulating the touchscreen of a mobile computer - A device for manipulating a mobile computer is proposed. The device includes a case, a number of buttons mounted thereon having switchable contacts, electrical contact elements attached to the computer's touch screen, a metal capacitive plate attached to the case while electrically connected with the switchable contacts, and electric circuits each connected to one corresponding contact element and to the switchable contacts. The switchable contacts are normally disconnected, while, when the respective button is pressed upon by a user, they are connected thereby connecting the contact elements with the metal plate. Preferable parameters and materials of the device's components are also disclosed. Thus, the device allows for manipulating the touch screen without producing mechanical stress thereon. At the same time, the reliability of detection of control signals inputted into the computer is increased. | 04-09-2015 |
Andrey Anatolevich Eliseev, Moscow RU
Patent application number | Description | Published |
---|---|---|
20130141773 | METHOD OF AMPLIFYING MAGNETO-OPTICAL KERR EFFECT BY USING PHOTON CRYSTAL STRUCTURES, AND PHOTON CRYSTAL HAVING AMPLIFIED MAGNETO-OPTICAL KERR EFFECT, METHOD OF FABRICATING PHOTON CRYSTAL - A method of amplifying a magneto-optical Kerr effect by using photon crystal structures, and a photon crystal having an amplified magneto-optical Kerr effect, and a method of fabricating the photon crystal. The method of amplifying a magneto-optical Kerr effect by using photon crystal structures includes amplifying the magneto-optical Kerr effect by fabricating a magnetic photon crystal including a crystal magnet and using a periodically-structured surface of the crystal magnet. | 06-06-2013 |
Evgeny Y. Eliseev, Moscow RU
Patent application number | Description | Published |
---|---|---|
20140181896 | System and Method for Protecting Computer Resources from Unauthorized Access Using Isolated Environment - Disclosed system and methods for protecting computer resources from unauthorized access. The system provides a library of handler functions that control access of applications to protected resources on a computer device. The system associates a security policy with the library to handler functions. The security policy specifies access rules for accessing protected resources by the applications. The system also modifies applications to access the library of handler functions instead of corresponding application program interface (API) functions of the computer device. When a handler function receives an API function call from a modified application, it may determine if the received API function call complies with the access rules. When the API function call complies with the access rules, the handler function performs the API function call from the application to the protected resources. When the API function call violates the access rules, the handler function block that API function call. | 06-26-2014 |
20140181974 | System and Method for Detecting Malware Using Isolated Environment - Disclosed system and methods for detecting malicious applications. The system provides a library of handler functions. The handlers functions control access of one or more applications to protected resources on a user device The system also modifies the one or more applications to access the library of handler functions instead of corresponding application program interface (API) functions of the user device. The handler functions receive API function calls from a modified application. The system analyzes the received API function calls for malicious behavior characteristics. When the. API function calls do not exhibit malicious behavior characteristics, the handier functions perform the API function calls to the protected resources. When the API function calls exhibit malicious behavior characteristics, the system prevents access of the modified application to the protected resources. | 06-26-2014 |
20150143521 | SYSTEM AND METHOD FOR DETECTING MALICIOUS SOFTWARE USING MALWARE TRIGGER SCENARIOS IN A MODIFIED COMPUTER ENVIRONMENT - Disclosed system and methods for malware testing of software programs. An example method includes storing a plurality of malware trigger scenarios specifying different sets of malware trigger events known to trigger malicious behaviour in software programs; in response to obtaining a software program, modifying a computer environment for operating the software program by creating malware trigger events associated with a selected one of the plurality of malware trigger scenarios; analyzing an execution of the software program in the modified computer environment in response to the malware trigger events; upon detecting that the software program exhibits malicious behaviour, performing remedial actions on the software program; and upon detecting that the software program exhibits no malicious behaviour, selecting a different malware trigger scenario from the plurality of malware trigger scenarios for malware testing of the software program. | 05-21-2015 |
20150341484 | SYSTEM AND METHOD CONTROLLING ACCESS TO APPLICATIONS ON A MOBILE DEVICE - Disclosed are systems and methods for controlling access to applications of a mobile device. An example method includes collecting, by a controlled shell of an OS of the mobile device, information about an application of the user device; determining a category designation of the application based on the collected information; determining, by the controlled shell, whether the category designation of the application complies with one or more rules of a usage policy of the mobile device; blocking user access to the application if it is determined that a rule exists prohibiting use of applications in the designated category or if no rule exists permitting use of the applications in the designated category; and permitting user access to the application if it is determined that a rule exists allowing use of applications in the designated category or if no rule exists prohibiting use of the applications in the designated category. | 11-26-2015 |
Petr G. Eliseev, Albuquerque, NM US
Patent application number | Description | Published |
---|---|---|
20150260521 | ROTATION-SENSITIVE SEMICONDUCTOR RING LASER DEVICE USING THE NONLINEAR SAGNAC EFFECT - Method and apparatus embody a rotation sensor including one or more ring lasers designed to utilize a nonlinear Sagnac effect, a passive waveguide arrangement, and a photodetector arrangement to receive the outcoupled light and to detect rotation of the sensor; wherein these components are arranged into a monolithically integrated optoelectronic integrated circuit on a single substrate. The method and apparatus can include seeding a stable, rotation-insensitive, strong (driving) wave using a single-frequency edge emitting laser monolithically integrated on the same substrate. | 09-17-2015 |
Roman A. Eliseev, Rochester, NY US
Patent application number | Description | Published |
---|---|---|
20150320828 | USE OF CYCLOPHILIN D INHIBITORS TO TREAT OR PREVENT BONE DISORDERS - Provided herein are methods of treating or preventing a bone disorder in a subject. | 11-12-2015 |
Vasily Eliseev, Richmond, TX US
Patent application number | Description | Published |
---|---|---|
20150267518 | ISOLATION PACKER WITH AUTOMATICALLY CLOSING ALTERNATE PATH PASSAGES - An isolation method is described for gravel packed zones separated by at least one packer and having an auxiliary conduit passing through the packer into adjacent zones. The conduit includes at least one each of a shunt tube, flow housing, annular space, and isolation valve housing. The flow housing, the annular space, and the isolation valve housing are all annular and formed between two concentric pipes. The method includes running in an assembly of screens isolated by at least one packer with at least one auxiliary conduit extending into adjacent zones defined by the packer when the packer is subsequently set. The method also includes closing flow in said conduit to prevent flow into shunt tubes during production based on creating a flow barrier in the annular space, the flow housing, or the isolation valve housing, the shunt tubes supplying slurry through the auxiliary conduit prior to the production. | 09-24-2015 |
Vasily G. Eliseev, Richmond, TX US
Patent application number | Description | Published |
---|---|---|
20160003013 | MULTI-ZONE SINGLE TREATMENT GRAVEL PACK SYSTEM - A gravel pack system includes a tool string having an inner string member, an outer string member, and a passage arranged between the outer string member and the inner string member. A packing element is provided on the outer string member. A first valve is coupled to one of the outer string member and the inner string member outwardly of the packing element in a downhole direction. The first valve fluidically connects the passage and the open hole wellbore. The first valve is configured and disposed to shift from a closed position to an open position. A second valve is coupled to one of the outer string member and the inner string member outwardly of the packing element in an uphole direction. The second valve selectively fluidically connects the passage and the open hole wellbore. The second valve shifts from an open position to a closed position. | 01-07-2016 |