Patents by Inventor Serg Bell
Serg Bell has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240177386Abstract: The present disclosure relates to an avatar generator to generate an audio-visual avatar specific to an application, such as tutoring. The avatar generator includes a general synthesizer to receive a training dataset. The general synthesizer includes a voice synthesis module and a video synthesis module trained by the training dataset. The avatar generator includes a customized synthesizer consisting of a voice custom synthesis module and a video custom synthesis module trained on the audio-video samples of the target person. The avatar generator further includes a video generator to create an audio-visual avatar and is configured to synthesize a voice clone using an input text, process the voice clone, synthesize a video clone based on the video synthesis module and the video custom synthesis module, and apply the voice clone to the video clone.Type: ApplicationFiled: November 28, 2022Publication date: May 30, 2024Inventors: Dmitriy Obukhov, Marcel de Korte, Denis Parkhomenko, Ivan Kirillov, Alexey Rybak, Laurent Dedenis, Serg Bell, Stanislav Protasov
-
Publication number: 20240177283Abstract: The present disclosure relates to a system to evaluate an avatar generated by an avatar generator. The system comprises an evaluation module including an audio evaluation module for evaluating audio features and a video evaluation module for evaluating video features. Evaluation of the avatar includes extracting audio and video features from the avatar and applying a set of evaluation metrics for generating audio and video evaluation scores. The scores are combined to generate a final score. For avatar generator evaluation, audio clip and video clip are provided to the audio evaluation module and video evaluation module, respectively. A set of evaluation metrics is applied for evaluation. Each metric can generate a score. All scores are combined to generate a final evaluation score.Type: ApplicationFiled: November 28, 2022Publication date: May 30, 2024Inventors: Ilya Baimetov, Denis Parkhomenko, Marcel de Korte, Ivan Kirillov, Dmitriy Obukhov, Alexey Rybak, Laurent Dedenis, Serg Bell, Stanislav Protasov
-
Patent number: 11997162Abstract: The present disclosure relates to a system and method for exposing data from blockchain nodes and orchestrating requests to blockchain nodes. The system mainly includes a client application, a load balancer, and blockchain nodes connected to the blockchain network. The system receives a request from the client application. The load balancer is configured with an upstream selection logic and configured with custom metadata specific to blockchain nodes. Based upon the upstream selection logic, the load balancer generates a proxy request to the selected blockchain node. The load balancer of the system is a general-purpose load balancer having built-in plugins, such as an authentication service unit and a tracking unit. Based on the selection logic and the upstream metadata, the general-purpose load balancer is extended with custom plugins.Type: GrantFiled: November 11, 2022Date of Patent: May 28, 2024Assignee: Chainstack Pte. LtdInventors: Evgeny Aseev, Laurent Dedenis, Dmitry Chepurovskiy, Anton Zaslavskii, Serg Bell, Stanislav Protasov
-
Publication number: 20240160729Abstract: System and method for administration of remote user activities interacting with critical data are used to detect violations of user activities, generate hints in response to each violation or a group of violations, that includes video-based violations, audio-based violation, and display-control-based violations, and to display hints to the administrator in a prioritized manner helping the administrator to react to most critical violations in a proper way. The invention solves a problem of simultaneous monitoring of multiple user interactions with critical data by ranking each violation, each session of interaction and each user.Type: ApplicationFiled: November 13, 2022Publication date: May 16, 2024Inventors: Svetlana Dergacheva, Serg Bell, Stanislav Protasov, Alexey Rybak, Laurent Dedenis
-
Publication number: 20240160640Abstract: The present disclosure relates to a system and method for synchronizing nodes and snapshot data, independent of cloud infrastructure. The system includes a blockchain node management server, a node synchronization automation module, and a cluster of synchronized blockchain nodes implemented on the cloud. The blockchain node management server generates a new node, and the node synchronization automation module, using an automation engine, configures the node, deploys the node onto the blockchain network, and synchronizes the node with other blockchain nodes. A blockchain node synchronizes with the node of the blockchain network, reflects change in data in a chain data disk, and a snapshot of the chain data disk is created. Snapshots of different nodes are synchronized, independent of the infrastructure environment.Type: ApplicationFiled: November 13, 2022Publication date: May 16, 2024Inventors: Evgeny Aseev, Laurent Dedenis, Aleksandr Brilliantov, Serg Bell, Stanislav Protasov
-
Publication number: 20240163327Abstract: The present disclosure relates to a system and method for exposing data from blockchain nodes and orchestrating requests to blockchain nodes. The system mainly includes a client application, a load balancer, and blockchain nodes connected to the blockchain network. The system receives a request from the client application. The load balancer is configured with an upstream selection logic and configured with custom metadata specific to blockchain nodes. Based upon the upstream selection logic, the load balancer generates a proxy request to the selected blockchain node. The load balancer of the system is a general-purpose load balancer having built-in plugins, such as an authentication service unit and a tracking unit. Based on the selection logic and the upstream metadata, the general-purpose load balancer is extended with custom plugins.Type: ApplicationFiled: November 11, 2022Publication date: May 16, 2024Inventors: Evgeny Aseev, Laurent Dedenis, Dmitry Chepurovskiy, Anton Zaslavskii, Serg Bell, Stanislav Protasov
-
Publication number: 20240139645Abstract: A system and method for regulating a motorsport racing event are disclosed. The system comprises sensor modules for sensing a plurality of race parameters to generate a plurality of input signals. A data analysis module receives the input signals for analysis. A decision-making module receives the analyzed signal and computes a recommendation or a decision corresponding to the level of violation. A penalty and recommendation module receives information associated with the recommendation or the decision and presents the recommendation or the decision.Type: ApplicationFiled: October 29, 2022Publication date: May 2, 2024Inventors: Ilya Shimchik, Maksim Filipenko, Aleksandr Buival, Ruslan Mustafin, Serg Bell, Stanislav Protasov, Nikolay Dobrovolskiy
-
Patent number: 11971986Abstract: Described herein are systems and methods for controlling access to a protected resource based on various criteria. In one exemplary aspect, a method comprises designating a plurality of program data installed on a computing system as protected program data; intercepting, by a kernel mode driver, a request from an untrusted application executing on the computing system to alter at least one of the protected program data; classifying, by a self-defense service, the untrusted application as a malicious application based on the intercepted request and information related to the untrusted application; and responsive to classifying the untrusted application as a malicious application, denying, by the kernel mode driver, access to the at least one of the protected program data.Type: GrantFiled: March 1, 2023Date of Patent: April 30, 2024Assignee: Acronis International GmbHInventors: Vladimir Strogov, Aliaksei Dodz, Nikolay Grebennikov, Stanislav Protasov, Serg Bell
-
Publication number: 20240116492Abstract: A system and method for optimizing the performance of an autonomous race car in real-time during a race event are disclosed. An autonomous race car controller unit is pre-fed with a first set of initial parameter values and a second set of initial parameter values. A set of sensors is configured for measuring a first and a second set of real-time parameter values after the starting of the race event. A performance optimization module is configured to generate a corrective course by receiving the first and second sets of real-time parameters and detecting the presence of errors between a control command given by the controller unit and its execution.Type: ApplicationFiled: October 9, 2022Publication date: April 11, 2024Inventors: Maksim Filipenko, Aleksandr Buival, Ruslan Mustafin, Ilya Shimchik, Stanislav Protasov, Serg Bell, Nikolay Dobrovolskiy
-
Publication number: 20240111723Abstract: The present disclosure relates to pre-processing of files to better prepare them for the process of comparing fingerprints of fragments of fixed size N from these files to other files that contain similar information but may be structured differently. The pre-processing method and system are applied to files with known protected data before fingerprints of some of the N-fragments from these files are added to the digital fingerprint library and to the unknown files before the fingerprints of some of their N-fragments are compared to the fingerprints of other N-fragments of data stored in the digital fingerprint library.Type: ApplicationFiled: September 29, 2022Publication date: April 4, 2024Inventors: Ivan Klimov, Serg Bell, Stanislav Protasov
-
Publication number: 20240114034Abstract: A system and method for adding a fingerprint of a fragment of fixed size and hierarchical classification level to a digital fingerprint library containing information about fingerprints of fragments of fixed size and their hierarchical classification levels and used to identify files that contain known fragments of data in an environment with hierarchical information security classification.Type: ApplicationFiled: September 29, 2022Publication date: April 4, 2024Inventors: Nickolay Berko, Serg Bell, Stanislav Protasov
-
Publication number: 20240111882Abstract: A system and a method for automatically assigning a hierarchical security level to a source of data, e.g., a file or a database, that can be used as a source to generate, e.g., to calculate or to extract, fingerprints of fragments of a fixed size N using a digital fingerprint library that contains fingerprints of known fragments fixed size and their hierarchical security levels are disclosed herein. The method comprises assignment of an initial hierarchical security level to a source of data and further comparison of fingerprints of its fragments of fixed size to the fingerprints of fingerprints of fixed size and their related hierarchical security levels stored in the digital fingerprint library.Type: ApplicationFiled: September 29, 2022Publication date: April 4, 2024Inventors: Nickolay Berko, Serg Bell, Stanislav Protasov
-
Publication number: 20240111901Abstract: The present disclosure relates to a system and method implemented for lowering the number of fingerprints of fragments of a file added to the digital fingerprint library using a winnowing window method. The digital fingerprint library stores fingerprints of fragments of files matching certain criteria, e.g., containing protected information. When an unknown file is examined, that library is used to compare fingerprints of fragments of size N from the unknown file to the fingerprints stored in the library. The method automatically determines criteria for adding fingerprints to the digital fingerprint library or skipping them.Type: ApplicationFiled: September 29, 2022Publication date: April 4, 2024Inventors: Ivan Klimov, Serg Bell, Stanislav Protasov
-
Publication number: 20240111887Abstract: The invention relates to a system and method that relates to creation of a digital fingerprint library for storing information of a document containing protected information. The system mainly includes a fragment generator, a fingerprint value generator, and the digital fingerprint library. The fragment generator generates fragments of the document using a sliding window method. Fragment length is determined heuristically, can be hardcoded in the program or be a parameter in GUI. The fingerprint value generator generates a fingerprint value, e.g., its hash, for each fragment. The fingerprint value represents the information related to respective fragments. The digital fingerprint library then stores the fingerprint value. Fingerprint values of individual fragments serve as key values to provide a mechanism for comparing fragments of unknown files to the digital fingerprint library.Type: ApplicationFiled: September 29, 2022Publication date: April 4, 2024Inventors: Nickolay Berko, Serg Bell, Stanislav Protasov
-
Publication number: 20240111860Abstract: System and method for detecting and curing a hollowing attack is disclosed herein. The method comprises monitoring real-time process memory parameters of a target process; retrieving real-time process memory parameters of the target process; comparing the real-time process memory parameters of the target process with reference process parameters of the target process stored in a system storage of the computing system and parameters of the process creation call-back notification; detecting a hollowing attack based on the comparison in previous step; in response to detecting the hollowing attack, determining a threat source file of malicious code; determining address space of the hollowed process on the computing system based on system log data; and curing the computing system by blocking execution of the threat source file and deleting threat resources associated therewith from the computing system.Type: ApplicationFiled: September 29, 2022Publication date: April 4, 2024Inventors: Vladimir Strogov, Aliaksei Dodz, Serg Bell, Stanislav Protasov
-
Publication number: 20240095384Abstract: Disclosed herein are systems and method for generating file systems of data sources incompatible with anti-virus scanners. In one exemplary aspect, the method includes: receiving, from an AV scanner, a request to scan a data source for malicious activity, wherein the data source includes a plurality of files, and wherein the AV scanner has a plurality of compatible file types that the AV scanner is capable of scanning; determining that the plurality of files are inaccessible to the AV scanner; generating a file system corresponding to the data source by parsing contents of the data source; generating a virtual volume including a plurality of sparse files corresponding to the plurality of files in the data source; populating at least one sparse file in the virtual volume with respective parsed content of a corresponding file in the data source; and instructing the AV scanner to scan the virtual volume.Type: ApplicationFiled: September 21, 2022Publication date: March 21, 2024Inventors: Vladimir Strogov, Serg Bell, Stanislav Protasov
-
Publication number: 20240062221Abstract: Disclosed herein are systems and method for managing software item access. A method may include: monitoring usage of a plurality of software items distributed over a network of computing devices; identifying a first software item that is being actively used on a first computing device; identifying a contract for the network governing the usage of the plurality of software items, wherein the contract includes at least one usage condition that the first computing device has to comply with to access the first software item of the plurality of software items; determining whether a discrepancy between the at least one usage condition in the contract and the active usage of the first software item exists; and in response to determining that the discrepancy exists, adjusting parameters of the active usage of the first software item on the first computing device to comply with the at least one usage condition.Type: ApplicationFiled: August 22, 2022Publication date: February 22, 2024Inventors: Martijn Van der Schaaf, Serg Bell, Stanislav Protasov
-
Publication number: 20240045791Abstract: A method for verifying a set of computer-executable instructions using at least one failing test generated by a test-case generator is disclosed herein. The method comprises verifying the set of computer-executable instructions by a verification module using a plurality of predefined verification conditions; determining if the verification is successful; in response to successful verification, label the set of computer-executable instructions as successful; and in response to unsuccessful verification, generate at least one counterexample, with respect to a proof failure and corresponding to at least one failed verification condition of the plurality of the predefined verification conditions, and generate a failing test, by a test-case generator, based on at least one counterexample. A program verification tool for testing the set of computer-executable instructions is also disclosed.Type: ApplicationFiled: August 8, 2022Publication date: February 8, 2024Inventors: Huang Li, Bertrand Meyer, Serg Bell, Stanislav Protasov, Nikolay Dobrovolskiy
-
Publication number: 20230418626Abstract: Disclosed herein are systems and method for providing nested frontend applications in a user interface of a management application. An exemplary method may include: generating a graphical user interface (GUI) for the management application, wherein the GUI includes a first extension point that includes a plurality of extensions, wherein each extension of the plurality of extensions is a standalone frontend application; injecting, during runtime of the management application, a first extension into the first extension point based on a personal configuration file, wherein the first extension is included in the plurality of extensions after injection; in response to receiving, via the GUI, a selection of the first extension, generating, on the GUI, a second extension point corresponding to the first extension, wherein the second extension point includes an additional plurality of extensions; and injecting, during the runtime, a second extension into the second extension point.Type: ApplicationFiled: June 22, 2022Publication date: December 28, 2023Inventors: German Bartenev, Alexander Andreev, Serg Bell, Stanislav Protasov
-
Patent number: 11853775Abstract: Disclosed herein are systems and method for providing nested frontend applications in a user interface of a management application. An exemplary method may include: generating a graphical user interface (GUI) for the management application, wherein the GUI includes a first extension point that includes a plurality of extensions, wherein each extension of the plurality of extensions is a standalone frontend application; injecting, during runtime of the management application, a first extension into the first extension point based on a personal configuration file, wherein the first extension is included in the plurality of extensions after injection; in response to receiving, via the GUI, a selection of the first extension, generating, on the GUI, a second extension point corresponding to the first extension, wherein the second extension point includes an additional plurality of extensions; and injecting, during the runtime, a second extension into the second extension point.Type: GrantFiled: June 22, 2022Date of Patent: December 26, 2023Assignee: Acronis International GmbHInventors: German Bartenev, Alexander Andreev, Serg Bell, Stanislav Protasov