Patents by Inventor Lidror Troyansky
Lidror Troyansky has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 7920298Abstract: According to a first aspect of the present invention, a method for enforcing a distribution policy with respect to information transmitted from a sending fax machine to a recipient fax machine as fax traffic is presented. The method comprising defining an information distribution policy with respect to the fax traffic, then monitoring the fax traffic in accordance with the distribution policy, where the monitoring comprising: (i) de-modulating the fax traffic being monitored into a digital stream; (ii) reconstructing from the digital stream a graphic image representing at least part of the information within the fax traffic; and (iii) analyzing information within the reconstructed image, and then applying the distribution policy with respect to the analyzed fax traffic.Type: GrantFiled: December 7, 2009Date of Patent: April 5, 2011Assignee: PortAuthority Technologies Inc.Inventors: Ariel Peled, Guy Lupo, Lidror Troyansky, Arik Baratz, Ofir Carny, Oren Tirosh
-
Publication number: 20110035805Abstract: The disclosed embodiments provide systems, methods, and apparatus for efficient detection of fingerprinted content and relate generally to the field of information (or data) leak prevention. Particularly, a compact and efficient repository of fingerprint ingredients is used to analyze content and determine the content's similarity to previously fingerprinted content. Some embodiments employ probabilistic indications regarding the existence of fingerprint ingredients in the repository.Type: ApplicationFiled: May 24, 2010Publication date: February 10, 2011Applicant: WEBSENSE, INC.Inventors: Roy Barkan, David Lazarov, Yevgeny Menaker, Lidror Troyansky
-
Patent number: 7859725Abstract: A method for enforcing a distribution policy associated with an electronic document comprising the steps of: sending the document to an output device; determining said distribution policy associated with said document; instructing a marking module to embed a marking indicating at least the existence of said distribution policy on an output form of said electronic document produced by said output device, said marking being readable to enforce said associated marking policy.Type: GrantFiled: December 18, 2007Date of Patent: December 28, 2010Assignee: PortAuthority Technologies Inc.Inventors: Lidror Troyansky, Ofir Carny, Ariel Peled
-
Publication number: 20100085593Abstract: According to a first aspect of the present invention, a method for enforcing a distribution policy with respect to information transmitted from a sending fax machine to a recipient fax machine as fax traffic is presented. The method comprising defining an information distribution policy with respect to the fax traffic, then monitoring the fax traffic in accordance with the distribution policy, where the monitoring comprising: (i) de-modulating the fax traffic being monitored into a digital stream; (ii) reconstructing from the digital stream a graphic image representing at least part of the information within the fax traffic; and (iii) analyzing information within the reconstructed image, and then applying the distribution policy with respect to the analyzed fax traffic.Type: ApplicationFiled: December 7, 2009Publication date: April 8, 2010Applicant: PortAuthority Technologies Inc.Inventors: Ariel PELED, Guy LUPO, Lidror TROYANSKY, Arik BARATZ, Ofir CARNY, Oren TIROSH
-
Patent number: 7681032Abstract: A system for network content monitoring and control, comprising: a transport data monitor, connectable to a point in a network, for monitoring data being transported past said point, a signature extractor, associated with said transport data monitor, for extracting a derivation of said data, said derivation being indicative of content of said payload, a database of preobtained signatures of content whose movements it is desired to monitor, and a comparator for comparing said derivation with said preobtained signatures, thereby to determine whether said payload comprises any of said content whose movements it is desired to monitor. The monitoring result may be used in bandwidth control on the network to restrict transport of the content it is desired to control.Type: GrantFiled: December 6, 2001Date of Patent: March 16, 2010Assignee: PortAuthority Technologies Inc.Inventors: Ariel Peled, Lidror Troyansky, Ofir Carny, Oren Tirosh, Guy Roglit, Gallt Gutman
-
Publication number: 20100057906Abstract: A system for external monitoring of networked digital file sharing to track predetermined data content, the system comprising: at least one surveillance element for deployment over said network, said surveillance elements comprising: surveillance functionality for searching said digital file sharing and identification functionality associated with said search functionality for identification of said predetermined data content, therewith to determine whether a given file sharing system is distributing said predetermined data content.Type: ApplicationFiled: November 10, 2009Publication date: March 4, 2010Applicant: PortAuthority Technologies, Inc.Inventors: Ariel PELED, Ofir CARNY, Arik BARATZ, Oded ARBEL, Lidror TROYANSKY
-
Patent number: 7669225Abstract: A method and apparatus for providing multi-domain control over a digital data item via a first domain security policy assigned to the digital data item at a first domain, the data item being transferred from the first domain to a second domain, the second domain being autonomous from the first domain in respect of security policies. The method comprises assigning the security policy to the digital item within the first domain; transferring the digital items to the second domain together with data defining the first domain security policy; analyzing the first domain security policy within the second domain; and distributing and/or allowing usage of the digital items within the second domain in accordance with analyzed first domain security policy, and/or reporting breaches or attempted breaches of the policy.Type: GrantFiled: May 6, 2004Date of Patent: February 23, 2010Assignee: PortAuthority Technologies Inc.Inventors: Ariel Peled, Guy Lupo, Lidror Troyansky
-
Publication number: 20100023754Abstract: A system for network content monitoring and control, comprising: a transport data monitor, connectable to a point in a network, for monitoring data being transported past said point, a signature extractor, associated with said transport data monitor, for extracting a derivation of said data, said derivation being indicative of content of said payload, a database of preobtained signatures of content whose movements it is desired to monitor, and a comparator for comparing said derivation with said preobtained signatures, thereby to determine whether said payload comprises any of said content whose movements it is desired to monitor. The monitoring result may be used in bandwidth control on the network to restrict transport of the content it is desired to control.Type: ApplicationFiled: October 7, 2009Publication date: January 28, 2010Applicant: PortAuthority Technologies Inc.Inventors: Ariel PELED, Lidror Troyansky, Ofir Carny, Oren Tirosh, Guy Roglit, Galit Gutman
-
Patent number: 7643164Abstract: According to a first aspect of the present invention, a method for enforcing a distribution policy with respect to information transmitted from a sending fax machine to a recipient fax machine as fax traffic is presented. The method comprising defining an information distribution policy with respect to the fax traffic, then monitoring the fax traffic in accordance with the distribution policy, where the monitoring comprising: (i) de-modulating the fax traffic being monitored into a digital stream; (ii) reconstructing from the digital stream a graphic image representing at least part of the information within the fax traffic; and (iii) analyzing information within the reconstructed image, and then applying the distribution policy with respect to the analyzed fax traffic.Type: GrantFiled: February 27, 2004Date of Patent: January 5, 2010Assignee: PortAuthority Technologies Inc.Inventors: Ariel Peled, Guy Lupo, Lidror Troyansky, Arik Baratz, Ofir Carny, Oren Tirosh
-
Patent number: 7636947Abstract: A method for distributed management of phrase-based security policy, the security policy applied with respect to a digital medium, the method comprising: storing at least one phrase together with accompanying security policy; assigning an owner to at least one of the stored phrases; scanning and analyzing the digital medium in order to locate and identify the at least one stored phrase; upon locating the at least one phrase within a digital item in the digital medium: applying the security policy with respect to the digital item, and notifying the owner.Type: GrantFiled: June 3, 2004Date of Patent: December 22, 2009Assignee: PortAuthority Technologies Inc.Inventors: Ariel Peled, Lidror Troyansky, Guy Lupo, Ofir Carny
-
Patent number: 7627897Abstract: A system for external monitoring of networked digital file sharing to track predetermined data content, the system comprising: at least one surveillance element for deployment over said network, said surveillance elements comprising: surveillance functionality for searching said digital file sharing and identification functionality associated with said search functionality for identification of said predetermined data content, therewith to determine whether a given file sharing system is distributing said predetermined data content.Type: GrantFiled: July 3, 2001Date of Patent: December 1, 2009Assignee: PortAuthority Technologies Inc.Inventors: Ariel Peled, Ofir Carny, Arik Baratz, Oded Arbel, Lidror Troyansky
-
Patent number: 7610324Abstract: A method for the detection and estimation of periodicities in noisy signals. First the signal is sampled and preprocessed in a discrete succession of equal periods. Then, short term characteristics vectors are generated for each period. The short term characteristics vectors are then grouped into sets, followed by the obtainment of at least one representative vector for each set. Periodic structures are estimated using the representative vectors. In a preferred embodiment, the short term characteristics are the the short term spectra of the signal. Practically, an autocorrelation matrix is constructed to assess autocorrelation along a diagonal.Type: GrantFiled: July 8, 2004Date of Patent: October 27, 2009Inventors: Lidror Troyansky, Arnon Breuer
-
Publication number: 20090241187Abstract: A system and method for identifying infection of unwanted software on an electronic device is disclosed. A software agent configured to generate a bait and is installed on the electronic device. The bait can simulate a situation in which the user performs a login session and submits personal information or it may just contain artificial sensitive information. Parameters may be inserted into the bait such as the identity of the electronic device that the bait is installed upon. The output of the electronic device is monitored and analyzed for attempts of transmitting the bait. The output is analyzed by correlating the output with the bait and can be done by comparing information about the bait with the traffic over a computer network in order to decide about the existence and the location of unwanted software.Type: ApplicationFiled: March 19, 2008Publication date: September 24, 2009Applicant: Websense, Inc.Inventor: Lidror Troyansky
-
Publication number: 20090241196Abstract: A system and method for identifying infection of unwanted software on an electronic device is disclosed. A software agent configured to generate a bait and is installed on the electronic device. The bait can simulate a situation in which the user performs a login session and submits personal information or it may just contain artificial sensitive information. Parameters may be inserted into the bait such as the identity of the electronic device that the bait is installed upon. The output of the electronic device is monitored and analyzed for attempts of transmitting the bait. The output is analyzed by correlating the output with the bait and can be done by comparing information about the bait with the traffic over a computer network in order to decide about the existence and the location of unwanted software.Type: ApplicationFiled: March 19, 2008Publication date: September 24, 2009Applicant: Websense, Inc.Inventors: Lidror Troyansky, Sharon Bruckner, Daniel Lyle Hubbard
-
Publication number: 20090241197Abstract: A system and method for determining an intent of a sender in transmitting electronic information in order to prevent unauthorized dissemination of electronic information is disclosed. The system and method facilitate cost-effective handling of dissemination events and comprise a traffic analyzer configured to analyze descriptors of the electronic information and parameters of the transmission of the electronic information in order to determine the intent of the sender. By determining the intent of the sender, it is possible to effectively quarantine the electronic information before it is disseminated.Type: ApplicationFiled: March 19, 2008Publication date: September 24, 2009Applicant: Websense, Inc.Inventor: Lidror Troyansky
-
Publication number: 20090241173Abstract: A system and method for identifying infection of unwanted software on an electronic device is disclosed. A software agent configured to generate a bait and is installed on the electronic device. The bait can simulate a situation in which the user performs a login session and submits personal information or it may just contain artificial sensitive information. Parameters may be inserted into the bait such as the identity of the electronic device that the bait is installed upon. The output of the electronic device is monitored and analyzed for attempts of transmitting the bait. The output is analyzed by correlating the output with the bait and can be done by comparing information about the bait with the traffic over a computer network in order to decide about the existence and the location of unwanted software.Type: ApplicationFiled: March 19, 2008Publication date: September 24, 2009Applicant: Websense, Inc.Inventor: Lidror Troyansky
-
Patent number: 7496197Abstract: A method for robust embedding of information into video content, said method comprising of breaking said video content into a series of at least one unit; selecting at least one of said units; selecting at least one parameter for at least one of said units and performing at least one geometric transformation on said selected units according to said parameters selected for said unit, thereby to embed said information in said video content.Type: GrantFiled: June 14, 2002Date of Patent: February 24, 2009Assignee: PortAuthority Technologies Inc.Inventors: Lidror Troyansky, Ofir Carny
-
Patent number: 7493650Abstract: A method for determining compliance with a data distribution or usage policy applied with respect to a digital medium is presented. The method comprising: assigning numerical values to breaches of the policy; assigning a quota of breaches of the policy to at least one user subjected to the policy, the quota being expressed in terms of the numerical value; monitoring information distribution or usage covered by the policy in order to detect breaches of the policy by users; upon detection of an action breaching the policy by a given one of the users: determining whether a numerical value has been assigned to the type of the breach; comparing the numerical value assigned to the type of breach with a respective quota assigned to the given user, and allowing the action to be executed only if the comparing indicates that the respective quota assigned to the given user is sufficient to cover the breach.Type: GrantFiled: July 1, 2004Date of Patent: February 17, 2009Assignee: PortAuthority Technologies Inc.Inventors: Ariel Peled, Lidror Troyansky, Ofir Carny
-
Publication number: 20080094654Abstract: A method for enforcing a distribution policy associated with an electronic document comprising the steps of: sending the document to an output device; determining said distribution policy associated with said document; instructing a marking module to embed a marking indicating at least the existence of said distribution policy on an output form of said electronic document produced by said output device, said marking being readable to enforce said associated marking policy.Type: ApplicationFiled: December 18, 2007Publication date: April 24, 2008Applicant: PortAuthority Technologies Inc.Inventors: Lidror Troyansky, Ofir Carny, Ariel Peled
-
Patent number: 7350228Abstract: A method for secure distribution of digital content to an untrusted environment, comprising the steps of; constructing a relatively trusted environment within the untrusted environment; constructing at least two digital inputs, the digital inputs are operable in order to reproduce the digital content; transferring digital media to the relatively trusted environment such that each of the inputs is transmitted via a different path, and combining the inputs in order to reproduce the digital content.Type: GrantFiled: January 22, 2002Date of Patent: March 25, 2008Assignee: PortAuthority Technologies Inc.Inventors: Ariel Peled, Ofir Carny, Lidror Troyansky, Arik Baratz, Oded Arbel