Search

Andrei L Osnovich

from San Jose, CA
Age ~67

Andrei Osnovich Phones & Addresses

  • 5902 Mountain Meadow Ct, San Jose, CA 95135 (408) 391-2420
  • 6329 Potrero Dr, Newark, CA 94560
  • Sunnyvale, CA
  • Mountain View, CA
  • 5902 Mountain Meadow Ct, San Jose, CA 95135

Work

Company: Nvidia Jun 1999 Position: Software architect

Skills

Computer Hardware • Software

Industries

Computer Hardware

Resumes

Resumes

Andrei Osnovich Photo 1

Software Architect

View page
Location:
Santa Clara, CA
Industry:
Computer Hardware
Work:
Nvidia
Software Architect
Skills:
Computer Hardware
Software

Publications

Us Patents

Method For Author Verification And Software Authorization

View page
US Patent:
8452981, May 28, 2013
Filed:
Mar 1, 2006
Appl. No.:
11/366843
Inventors:
Jeffrey T. Kiel - Raleigh NC, US
Andrei Leonid Osnovich - San Jose CA, US
Assignee:
Nvidia Corporation - Santa Clara CA
International Classification:
G06F 21/00
US Classification:
713189, 713194, 726 29, 726 30
Abstract:
Embodiments of the present invention are directed to a computer-implemented method for author verification and authorization of object code. In one embodiment, program object code is linked with a plurality of data blocks to create linked object code and a MAP file. Thereafter, author verification is performed by executing a plurality of comparisons between the linked object code and the MAP file. In another embodiment, a digital signing procedure is performed on linked object code by creating a signature data block. The signature data block is then encrypted and written to the linked object code to create digitally-signed object code. In another embodiment, an application program embodied in linked object code generates a data packet. The data packet is then compared to a previously-generated signature data packet from the linked object code to determine if the linked object code is authorized.

Method For Author Verification And Software Authorization

View page
US Patent:
20100169654, Jul 1, 2010
Filed:
Dec 31, 2009
Appl. No.:
12/651085
Inventors:
Jeffrey T. Kiel - Raleigh NC, US
Andrei Leonid Osnovich - San Jose CA, US
Assignee:
NVIDIA CORPORATION - Santa Clara CA
International Classification:
H04L 9/32
G06F 21/22
US Classification:
713176, 726 21
Abstract:
Embodiments of the present invention are directed to a computer-implemented method for author verification and authorization of object code. In one embodiment, program object code is linked with a plurality of data blocks to create linked object code and a MAP file. Thereafter, author verification is performed by executing a plurality of comparisons between the linked object code and the MAP file. In another embodiment, a digital signing procedure is performed on linked object code by creating a signature data block. The signature data block is then encrypted and written to the linked object code to create digitally-signed object code. In another embodiment, an application program embodied in linked object code generates a data packet. The data packet is then compared to a previously-generated signature data packet from the linked object code to determine if the linked object code is authorized.

Method And Computer-Usable Medium For Determining The Authorization Status Of Software

View page
US Patent:
7891012, Feb 15, 2011
Filed:
Mar 1, 2006
Appl. No.:
11/366875
Inventors:
Jeffrey T. Kiel - Raleigh NC, US
Andrei Leonid Osnovich - San Jose CA, US
Assignee:
NVIDIA Corporation - Santa Clara CA
International Classification:
G06F 21/22
H04L 9/32
US Classification:
726 30, 726 21, 713176
Abstract:
Embodiments of the present invention are directed to a method and computer-usable medium for determining the authorization status of object code. In one embodiment, an application program embodied in an executable file is executed to periodically send a first data packet to a driver. A counter is decremented for each periodic interval in which the data packet is not received, and is reset in response to the data packet being received. The authorized status of the executable file is revoked if the counter reaches a predetermined value. In another embodiment, an application program generates a second data packet by creating a signature of the executable file and then encrypting that signature. The second data packet is sent to a driver for comparison with a previously-obtained packet. Thereafter, the authorized status of the executable file is revoked if a portion of the second data packet does not match the previously-obtained packet.
Andrei L Osnovich from San Jose, CA, age ~67 Get Report