Patents by Inventor Serg Bell

Serg Bell has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240177386
    Abstract: The present disclosure relates to an avatar generator to generate an audio-visual avatar specific to an application, such as tutoring. The avatar generator includes a general synthesizer to receive a training dataset. The general synthesizer includes a voice synthesis module and a video synthesis module trained by the training dataset. The avatar generator includes a customized synthesizer consisting of a voice custom synthesis module and a video custom synthesis module trained on the audio-video samples of the target person. The avatar generator further includes a video generator to create an audio-visual avatar and is configured to synthesize a voice clone using an input text, process the voice clone, synthesize a video clone based on the video synthesis module and the video custom synthesis module, and apply the voice clone to the video clone.
    Type: Application
    Filed: November 28, 2022
    Publication date: May 30, 2024
    Inventors: Dmitriy Obukhov, Marcel de Korte, Denis Parkhomenko, Ivan Kirillov, Alexey Rybak, Laurent Dedenis, Serg Bell, Stanislav Protasov
  • Publication number: 20240177283
    Abstract: The present disclosure relates to a system to evaluate an avatar generated by an avatar generator. The system comprises an evaluation module including an audio evaluation module for evaluating audio features and a video evaluation module for evaluating video features. Evaluation of the avatar includes extracting audio and video features from the avatar and applying a set of evaluation metrics for generating audio and video evaluation scores. The scores are combined to generate a final score. For avatar generator evaluation, audio clip and video clip are provided to the audio evaluation module and video evaluation module, respectively. A set of evaluation metrics is applied for evaluation. Each metric can generate a score. All scores are combined to generate a final evaluation score.
    Type: Application
    Filed: November 28, 2022
    Publication date: May 30, 2024
    Inventors: Ilya Baimetov, Denis Parkhomenko, Marcel de Korte, Ivan Kirillov, Dmitriy Obukhov, Alexey Rybak, Laurent Dedenis, Serg Bell, Stanislav Protasov
  • Patent number: 11997162
    Abstract: The present disclosure relates to a system and method for exposing data from blockchain nodes and orchestrating requests to blockchain nodes. The system mainly includes a client application, a load balancer, and blockchain nodes connected to the blockchain network. The system receives a request from the client application. The load balancer is configured with an upstream selection logic and configured with custom metadata specific to blockchain nodes. Based upon the upstream selection logic, the load balancer generates a proxy request to the selected blockchain node. The load balancer of the system is a general-purpose load balancer having built-in plugins, such as an authentication service unit and a tracking unit. Based on the selection logic and the upstream metadata, the general-purpose load balancer is extended with custom plugins.
    Type: Grant
    Filed: November 11, 2022
    Date of Patent: May 28, 2024
    Assignee: Chainstack Pte. Ltd
    Inventors: Evgeny Aseev, Laurent Dedenis, Dmitry Chepurovskiy, Anton Zaslavskii, Serg Bell, Stanislav Protasov
  • Publication number: 20240160729
    Abstract: System and method for administration of remote user activities interacting with critical data are used to detect violations of user activities, generate hints in response to each violation or a group of violations, that includes video-based violations, audio-based violation, and display-control-based violations, and to display hints to the administrator in a prioritized manner helping the administrator to react to most critical violations in a proper way. The invention solves a problem of simultaneous monitoring of multiple user interactions with critical data by ranking each violation, each session of interaction and each user.
    Type: Application
    Filed: November 13, 2022
    Publication date: May 16, 2024
    Inventors: Svetlana Dergacheva, Serg Bell, Stanislav Protasov, Alexey Rybak, Laurent Dedenis
  • Publication number: 20240160640
    Abstract: The present disclosure relates to a system and method for synchronizing nodes and snapshot data, independent of cloud infrastructure. The system includes a blockchain node management server, a node synchronization automation module, and a cluster of synchronized blockchain nodes implemented on the cloud. The blockchain node management server generates a new node, and the node synchronization automation module, using an automation engine, configures the node, deploys the node onto the blockchain network, and synchronizes the node with other blockchain nodes. A blockchain node synchronizes with the node of the blockchain network, reflects change in data in a chain data disk, and a snapshot of the chain data disk is created. Snapshots of different nodes are synchronized, independent of the infrastructure environment.
    Type: Application
    Filed: November 13, 2022
    Publication date: May 16, 2024
    Inventors: Evgeny Aseev, Laurent Dedenis, Aleksandr Brilliantov, Serg Bell, Stanislav Protasov
  • Publication number: 20240163327
    Abstract: The present disclosure relates to a system and method for exposing data from blockchain nodes and orchestrating requests to blockchain nodes. The system mainly includes a client application, a load balancer, and blockchain nodes connected to the blockchain network. The system receives a request from the client application. The load balancer is configured with an upstream selection logic and configured with custom metadata specific to blockchain nodes. Based upon the upstream selection logic, the load balancer generates a proxy request to the selected blockchain node. The load balancer of the system is a general-purpose load balancer having built-in plugins, such as an authentication service unit and a tracking unit. Based on the selection logic and the upstream metadata, the general-purpose load balancer is extended with custom plugins.
    Type: Application
    Filed: November 11, 2022
    Publication date: May 16, 2024
    Inventors: Evgeny Aseev, Laurent Dedenis, Dmitry Chepurovskiy, Anton Zaslavskii, Serg Bell, Stanislav Protasov
  • Publication number: 20240139645
    Abstract: A system and method for regulating a motorsport racing event are disclosed. The system comprises sensor modules for sensing a plurality of race parameters to generate a plurality of input signals. A data analysis module receives the input signals for analysis. A decision-making module receives the analyzed signal and computes a recommendation or a decision corresponding to the level of violation. A penalty and recommendation module receives information associated with the recommendation or the decision and presents the recommendation or the decision.
    Type: Application
    Filed: October 29, 2022
    Publication date: May 2, 2024
    Inventors: Ilya Shimchik, Maksim Filipenko, Aleksandr Buival, Ruslan Mustafin, Serg Bell, Stanislav Protasov, Nikolay Dobrovolskiy
  • Patent number: 11971986
    Abstract: Described herein are systems and methods for controlling access to a protected resource based on various criteria. In one exemplary aspect, a method comprises designating a plurality of program data installed on a computing system as protected program data; intercepting, by a kernel mode driver, a request from an untrusted application executing on the computing system to alter at least one of the protected program data; classifying, by a self-defense service, the untrusted application as a malicious application based on the intercepted request and information related to the untrusted application; and responsive to classifying the untrusted application as a malicious application, denying, by the kernel mode driver, access to the at least one of the protected program data.
    Type: Grant
    Filed: March 1, 2023
    Date of Patent: April 30, 2024
    Assignee: Acronis International GmbH
    Inventors: Vladimir Strogov, Aliaksei Dodz, Nikolay Grebennikov, Stanislav Protasov, Serg Bell
  • Publication number: 20240116492
    Abstract: A system and method for optimizing the performance of an autonomous race car in real-time during a race event are disclosed. An autonomous race car controller unit is pre-fed with a first set of initial parameter values and a second set of initial parameter values. A set of sensors is configured for measuring a first and a second set of real-time parameter values after the starting of the race event. A performance optimization module is configured to generate a corrective course by receiving the first and second sets of real-time parameters and detecting the presence of errors between a control command given by the controller unit and its execution.
    Type: Application
    Filed: October 9, 2022
    Publication date: April 11, 2024
    Inventors: Maksim Filipenko, Aleksandr Buival, Ruslan Mustafin, Ilya Shimchik, Stanislav Protasov, Serg Bell, Nikolay Dobrovolskiy
  • Publication number: 20240111723
    Abstract: The present disclosure relates to pre-processing of files to better prepare them for the process of comparing fingerprints of fragments of fixed size N from these files to other files that contain similar information but may be structured differently. The pre-processing method and system are applied to files with known protected data before fingerprints of some of the N-fragments from these files are added to the digital fingerprint library and to the unknown files before the fingerprints of some of their N-fragments are compared to the fingerprints of other N-fragments of data stored in the digital fingerprint library.
    Type: Application
    Filed: September 29, 2022
    Publication date: April 4, 2024
    Inventors: Ivan Klimov, Serg Bell, Stanislav Protasov
  • Publication number: 20240114034
    Abstract: A system and method for adding a fingerprint of a fragment of fixed size and hierarchical classification level to a digital fingerprint library containing information about fingerprints of fragments of fixed size and their hierarchical classification levels and used to identify files that contain known fragments of data in an environment with hierarchical information security classification.
    Type: Application
    Filed: September 29, 2022
    Publication date: April 4, 2024
    Inventors: Nickolay Berko, Serg Bell, Stanislav Protasov
  • Publication number: 20240111882
    Abstract: A system and a method for automatically assigning a hierarchical security level to a source of data, e.g., a file or a database, that can be used as a source to generate, e.g., to calculate or to extract, fingerprints of fragments of a fixed size N using a digital fingerprint library that contains fingerprints of known fragments fixed size and their hierarchical security levels are disclosed herein. The method comprises assignment of an initial hierarchical security level to a source of data and further comparison of fingerprints of its fragments of fixed size to the fingerprints of fingerprints of fixed size and their related hierarchical security levels stored in the digital fingerprint library.
    Type: Application
    Filed: September 29, 2022
    Publication date: April 4, 2024
    Inventors: Nickolay Berko, Serg Bell, Stanislav Protasov
  • Publication number: 20240111901
    Abstract: The present disclosure relates to a system and method implemented for lowering the number of fingerprints of fragments of a file added to the digital fingerprint library using a winnowing window method. The digital fingerprint library stores fingerprints of fragments of files matching certain criteria, e.g., containing protected information. When an unknown file is examined, that library is used to compare fingerprints of fragments of size N from the unknown file to the fingerprints stored in the library. The method automatically determines criteria for adding fingerprints to the digital fingerprint library or skipping them.
    Type: Application
    Filed: September 29, 2022
    Publication date: April 4, 2024
    Inventors: Ivan Klimov, Serg Bell, Stanislav Protasov
  • Publication number: 20240111887
    Abstract: The invention relates to a system and method that relates to creation of a digital fingerprint library for storing information of a document containing protected information. The system mainly includes a fragment generator, a fingerprint value generator, and the digital fingerprint library. The fragment generator generates fragments of the document using a sliding window method. Fragment length is determined heuristically, can be hardcoded in the program or be a parameter in GUI. The fingerprint value generator generates a fingerprint value, e.g., its hash, for each fragment. The fingerprint value represents the information related to respective fragments. The digital fingerprint library then stores the fingerprint value. Fingerprint values of individual fragments serve as key values to provide a mechanism for comparing fragments of unknown files to the digital fingerprint library.
    Type: Application
    Filed: September 29, 2022
    Publication date: April 4, 2024
    Inventors: Nickolay Berko, Serg Bell, Stanislav Protasov
  • Publication number: 20240111860
    Abstract: System and method for detecting and curing a hollowing attack is disclosed herein. The method comprises monitoring real-time process memory parameters of a target process; retrieving real-time process memory parameters of the target process; comparing the real-time process memory parameters of the target process with reference process parameters of the target process stored in a system storage of the computing system and parameters of the process creation call-back notification; detecting a hollowing attack based on the comparison in previous step; in response to detecting the hollowing attack, determining a threat source file of malicious code; determining address space of the hollowed process on the computing system based on system log data; and curing the computing system by blocking execution of the threat source file and deleting threat resources associated therewith from the computing system.
    Type: Application
    Filed: September 29, 2022
    Publication date: April 4, 2024
    Inventors: Vladimir Strogov, Aliaksei Dodz, Serg Bell, Stanislav Protasov
  • Publication number: 20240095384
    Abstract: Disclosed herein are systems and method for generating file systems of data sources incompatible with anti-virus scanners. In one exemplary aspect, the method includes: receiving, from an AV scanner, a request to scan a data source for malicious activity, wherein the data source includes a plurality of files, and wherein the AV scanner has a plurality of compatible file types that the AV scanner is capable of scanning; determining that the plurality of files are inaccessible to the AV scanner; generating a file system corresponding to the data source by parsing contents of the data source; generating a virtual volume including a plurality of sparse files corresponding to the plurality of files in the data source; populating at least one sparse file in the virtual volume with respective parsed content of a corresponding file in the data source; and instructing the AV scanner to scan the virtual volume.
    Type: Application
    Filed: September 21, 2022
    Publication date: March 21, 2024
    Inventors: Vladimir Strogov, Serg Bell, Stanislav Protasov
  • Publication number: 20240062221
    Abstract: Disclosed herein are systems and method for managing software item access. A method may include: monitoring usage of a plurality of software items distributed over a network of computing devices; identifying a first software item that is being actively used on a first computing device; identifying a contract for the network governing the usage of the plurality of software items, wherein the contract includes at least one usage condition that the first computing device has to comply with to access the first software item of the plurality of software items; determining whether a discrepancy between the at least one usage condition in the contract and the active usage of the first software item exists; and in response to determining that the discrepancy exists, adjusting parameters of the active usage of the first software item on the first computing device to comply with the at least one usage condition.
    Type: Application
    Filed: August 22, 2022
    Publication date: February 22, 2024
    Inventors: Martijn Van der Schaaf, Serg Bell, Stanislav Protasov
  • Publication number: 20240045791
    Abstract: A method for verifying a set of computer-executable instructions using at least one failing test generated by a test-case generator is disclosed herein. The method comprises verifying the set of computer-executable instructions by a verification module using a plurality of predefined verification conditions; determining if the verification is successful; in response to successful verification, label the set of computer-executable instructions as successful; and in response to unsuccessful verification, generate at least one counterexample, with respect to a proof failure and corresponding to at least one failed verification condition of the plurality of the predefined verification conditions, and generate a failing test, by a test-case generator, based on at least one counterexample. A program verification tool for testing the set of computer-executable instructions is also disclosed.
    Type: Application
    Filed: August 8, 2022
    Publication date: February 8, 2024
    Inventors: Huang Li, Bertrand Meyer, Serg Bell, Stanislav Protasov, Nikolay Dobrovolskiy
  • Publication number: 20230418626
    Abstract: Disclosed herein are systems and method for providing nested frontend applications in a user interface of a management application. An exemplary method may include: generating a graphical user interface (GUI) for the management application, wherein the GUI includes a first extension point that includes a plurality of extensions, wherein each extension of the plurality of extensions is a standalone frontend application; injecting, during runtime of the management application, a first extension into the first extension point based on a personal configuration file, wherein the first extension is included in the plurality of extensions after injection; in response to receiving, via the GUI, a selection of the first extension, generating, on the GUI, a second extension point corresponding to the first extension, wherein the second extension point includes an additional plurality of extensions; and injecting, during the runtime, a second extension into the second extension point.
    Type: Application
    Filed: June 22, 2022
    Publication date: December 28, 2023
    Inventors: German Bartenev, Alexander Andreev, Serg Bell, Stanislav Protasov
  • Patent number: 11853775
    Abstract: Disclosed herein are systems and method for providing nested frontend applications in a user interface of a management application. An exemplary method may include: generating a graphical user interface (GUI) for the management application, wherein the GUI includes a first extension point that includes a plurality of extensions, wherein each extension of the plurality of extensions is a standalone frontend application; injecting, during runtime of the management application, a first extension into the first extension point based on a personal configuration file, wherein the first extension is included in the plurality of extensions after injection; in response to receiving, via the GUI, a selection of the first extension, generating, on the GUI, a second extension point corresponding to the first extension, wherein the second extension point includes an additional plurality of extensions; and injecting, during the runtime, a second extension into the second extension point.
    Type: Grant
    Filed: June 22, 2022
    Date of Patent: December 26, 2023
    Assignee: Acronis International GmbH
    Inventors: German Bartenev, Alexander Andreev, Serg Bell, Stanislav Protasov