Patents by Inventor Alex Nayshtut

Alex Nayshtut has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10158914
    Abstract: A system and method for real-time alteration of media content based on stress monitoring is disclosed. A computer system present a single media content item in two distinct content streams to a first and second user. Using sensor generated data the computer system measures at least one user response indicator for the first and second user and estimates a stress level for the first and second users. The computer system determines whether the estimated stress level for the first user exceeds a first predetermined stress threshold. In accordance with a determination that the estimated stress level for the first user exceeds a first predetermined stress threshold the computer system alters the first stream of the presented media content item to modify the particular portion of the media content item associated with the estimated stress level for the first user.
    Type: Grant
    Filed: March 30, 2017
    Date of Patent: December 18, 2018
    Assignee: Intel Corporation
    Inventors: Lenitra M. Durham, Tamir Damian Munafo, Rita H. Wouhaybi, Adi Shaliv, Giuseppe Raffa, Oleg Pogorelik, Sangita Ravi Sharma, Alex Nayshtut
  • Patent number: 10148624
    Abstract: In an example, there is disclosed a computing apparatus having one or more logic elements forming a non-encrypted flow processor engine; and one or more logic elements forming a service selection engine, wherein the one or more logic elements include a trusted execution environment (TEE), and wherein the service selection engine is operable to; receive from the flow processor engine an encrypted payload; determine that the encrypted payload satisfies at least one selection criterion; and provide a notification of satisfaction to the flow engine. There is further disclosed a method of performing the operations disclosed, and one or more computer-readable mediums having stored thereon executable instructions to perform the method.
    Type: Grant
    Filed: September 25, 2015
    Date of Patent: December 4, 2018
    Assignee: McAfee, LLC
    Inventors: Alex Nayshtut, Oleg Pogorelik, Omer Ben-Shalom, Igor Muttik
  • Patent number: 10148135
    Abstract: In one embodiment, a computing device includes: a power receiving unit to receive energy wirelessly from a power transmitting unit via a receive coil; a load modulation logic to modulate a load coupled to the receive coil to cause a message to be transmitted to the power transmitting unit via a first channel coupled to the receive coil; and a wireless communication circuit to communicate with the power transmitting unit via a second channel. Other embodiments are described and claimed.
    Type: Grant
    Filed: February 16, 2016
    Date of Patent: December 4, 2018
    Assignee: Intel IP Corporation
    Inventors: Yuval Elad, Shahar Porat, Alex Nayshtut
  • Patent number: 10116451
    Abstract: A storage device is divided into a trusted storage region (TSR) and a standard storage region (SSR). A backup and recovery tool (BRT) is used to generate a public/private key pair and provide the public key to the storage device. The BRT detects a trigger to back up a file from the SSR to the TSR and sends a write instruction to the storage device to perform the backup. The BRT signs the write instruction with the private key. The storage device uses the public key to verify the write instruction and performs the backup based on the verification. The TSR cannot be accessed without the private key, therefore if a malware attack is detected in the storage device, the device may be formatted to delete infected files. A fresh operating system may be installed on the formatted storage device and the file may be recovered from the TSR.
    Type: Grant
    Filed: November 11, 2016
    Date of Patent: October 30, 2018
    Assignee: Intel Corporation
    Inventors: Akshay Ramesh Kadam, Vishnuvarthanan Balraj, Alex Nayshtut
  • Publication number: 20180288478
    Abstract: A system and method for real-time alteration of media content based on stress monitoring is disclosed. A computer system present a single media content item in two distinct content streams to a first and second user. Using sensor generated data the computer system measures at least one user response indicator for the first and second user and estimates a stress level for the first and second users. The computer system determines whether the estimated stress level for the first user exceeds a first predetermined stress threshold. In accordance with a determination that the estimated stress level for the first user exceeds a first predetermined stress threshold the computer system alters the first stream of the presented media content item to modify the particular portion of the media content item associated with the estimated stress level for the first user.
    Type: Application
    Filed: March 30, 2017
    Publication date: October 4, 2018
    Inventors: Lenitra M. Durham, Tamir Damian Munafo, Rita H. Wouhaybi, Adi Shaliv, Giuseppe Raffa, Oleg Pogorelik, Sangita Ravi Sharma, Alex Nayshtut
  • Patent number: 10083332
    Abstract: In embodiments, apparatuses, methods, and storage media may be described for identifying a quick response (QR) image. A QR control code (QRCC) may be identified in the QR image based on a QR tag in the image. Based on the QRCC, a control command of an apparatus may be identified. Other embodiments may be described and/or claimed.
    Type: Grant
    Filed: August 8, 2014
    Date of Patent: September 25, 2018
    Assignee: Intel Corporation
    Inventors: Oleg Pogorelik, Alex Nayshtut, Hong Li, Justin Lipman
  • Patent number: 10055562
    Abstract: Various embodiments are generally directed to an apparatus, method and other techniques for detecting an input comprising an object contacting a surface of an apparatus, determining object characteristics based on the detected input and selecting a user profile based on the determined object characteristics.
    Type: Grant
    Filed: October 23, 2013
    Date of Patent: August 21, 2018
    Assignee: INTEL CORPORATION
    Inventors: Anna Lerner, Alex Nayshtut, Tomer Rider
  • Publication number: 20180205783
    Abstract: Measurement exchange networks and protocols to exchange measurements of a parameter amongst devices (e.g., IoT devices), select the best measurement(s), accuracy/precision-wise, and determine a process variable for a control system based on the selected best measurement(s). A device may select a peer-provided best measurement to output as the process variable in place of a local measurement, and/or compute the process variable from multiple best measurements (e.g., local and/or peer-provided measurements). Metadata may be used to select a measurement(s) and/or to increase reliability/trust of exchanged data. In this way, each device of an exchange group/network may obtain the highest measurement accuracy of all available collocated sensors with little or no additional processing or cloud connectivity.
    Type: Application
    Filed: December 18, 2017
    Publication date: July 19, 2018
    Inventors: Oleg POGORELIK, Alex NAYSHTUT, Igor TATOURIAN, Omer BEN-SHALOM
  • Patent number: 10027717
    Abstract: Providing peer-to-peer network security includes collecting, by a local trusted network device, local trust data related to behavior of the local trusted network device, receiving, by one or more remote trusted network devices, additional trust data for the local trusted network device, calculating a combined trust score for the local trusted network device based on the local trust data and additional trust data, and modifying activity of the local trusted network device based on the combined trust score.
    Type: Grant
    Filed: June 26, 2015
    Date of Patent: July 17, 2018
    Assignee: McAfee, LLC
    Inventors: Omer Ben-Shalom, Alex Nayshtut, Oleg Pogorelik, Igor Muttik
  • Publication number: 20180181747
    Abstract: A predetermined standard set of detection algorithms and content and a selected set of enhanced detection algorithms and content provide an improved technique for detecting security exploits. The detection algorithms and content are executed on a Platform Exploit Detection Module. Standard detection algorithms and content are deployed across all endpoints. Enhanced detection algorithms and content are selected from an available set of enhanced detection algorithms and content to improve detection capability without the performance impacts of deploying every enhanced detection algorithm and content on every endpoint. A network of endpoints may deploy an entire set of detection algorithms and content across all endpoints, with individual endpoints configured to with different subsets of the enhanced detection algorithms and content.
    Type: Application
    Filed: December 27, 2016
    Publication date: June 28, 2018
    Inventors: Alex Nayshtut, Igor Muttik, Oleksandr Bazhaniuk, Yuriy Bulygin, Andrew A. Furtak
  • Patent number: 9998483
    Abstract: Providing detection of computing application malfunctions by performing at least the following: collecting a plurality of computing events that correspond to a computing application and a plurality of addresses associated with the plurality of computing events, generating an event trace that comprises the plurality of computing events and the plurality of addresses, constructing at least one sample fingerprint that represents a current behavior of the computing application using at least the event trace, comparing the at least one sample fingerprint with a behavior model that represents an expected operation of the computing application; and determining whether the computing application is malfunctioning based upon the comparison of the at least one sample fingerprint and the behavioral model.
    Type: Grant
    Filed: December 22, 2015
    Date of Patent: June 12, 2018
    Assignee: McAfee, LLC
    Inventors: Vadim Sukhomlinov, Kshitij A. Doshi, Alex Nayshtut, Igor Muttik
  • Publication number: 20180139053
    Abstract: A storage device is divided into a trusted storage region (TSR) and a standard storage region (SSR). A backup and recovery tool (BRT) is used to generate a public/private key pair and provide the public key to the storage device. The BRT detects a trigger to back up a file from the SSR to the TSR and sends a write instruction to the storage device to perform the backup. The BRT signs the write instruction with the private key. The storage device uses the public key to verify the write instruction and performs the backup based on the verification. The TSR cannot be accessed without the private key, therefore if a malware attack is detected in the storage device, the device may be formatted to delete infected files. A fresh operating system may be installed on the formatted storage device and the file may be recovered from the TSR.
    Type: Application
    Filed: November 11, 2016
    Publication date: May 17, 2018
    Inventors: Akshay Ramesh Kadam, Vishnuvarthanan Balraj, Alex Nayshtut
  • Publication number: 20180130168
    Abstract: Providing optical watermark signals for a visual authentication session by performing at least the following: receive, at an anti-spoof engine, an instruction to perform visual authentication operations for a visual authentication session, generate, with the anti-spoof engine, an optical watermark signal based on receiving the instruction, wherein the optical watermark signal includes at least one optical identifier to authenticate images captured during the visual authentication session, obtain, with the anti-spoof engine, an image source that includes captured images of the visual authentication session, determine, with the anti-spoof engine, whether the image source includes a reflected optical watermark signal, and compare, with the anti-spoof engine, whether the reflected optical watermark signal matches the generated optical watermark signal based on the determination that the image source includes the reflected optical watermark signal.
    Type: Application
    Filed: November 10, 2016
    Publication date: May 10, 2018
    Inventors: Alex Nayshtut, Igor Muttik, Oleg Pogorelik, Adam Marek
  • Patent number: 9948468
    Abstract: In an example, a DHN (DHN) is provided for enabling grantees to access digitally-controlled assets of a principal. The principal (level 0) establishes a digital testament (DT), identifying one or more grantees on levels 1-n. Each grantee receives a digital heritage certificate (DHC), which may be based on the PKI certificate definition. The DHC includes a “PREDECESSORS” field, identifying one or more predecessor certificates that must be revoked before the DHC is valid. All grantee DHCs have the principal's level 0, DHC as a predecessor certificate. Level n certificates may also be valid only if all certificates at level n?1, have been revoked. In practice, a DHC may be revoked when a user of the certificate passes away, so that nth generation grantees inherit only when generation n?1, has passed away.
    Type: Grant
    Filed: December 23, 2014
    Date of Patent: April 17, 2018
    Assignee: McAfee, LLC
    Inventors: Alex Nayshtut, Oleg Pogorelik, Avishay Sharaga, Ned M. Smith, Igor Muttik
  • Publication number: 20180096147
    Abstract: In one embodiment, a binary translator to perform binary translation of code is to: perform a first binary analysis of a first code block to determine whether a second control transfer instruction is included in the first code block, where the first code block includes a return target of a first control transfer instruction; perform a second binary analysis of a second code block to determine whether the second code block includes the first control transfer instruction, where the second code block includes a call target of the second control transfer instruction; and store an address pair associated with the first control transfer instruction in a whitelist if the second control transfer instruction is included in the first code block and the first control transfer instruction is included in the second code block. Other embodiments are described and claimed.
    Type: Application
    Filed: September 30, 2016
    Publication date: April 5, 2018
    Inventors: Tugrul Ince, Koichi Yamada, Ajay Harikumar, Alex Nayshtut
  • Patent number: 9936239
    Abstract: System and techniques for multiple stream tuning are described herein. A plurality of content streams may be received. The plurality of content streams may be ranked. A user attention level may be scored as the user observes at least one content stream of the plurality of content streams. The user attention level and a rank for the at least one content stream may be compared to remaining ranks of the plurality of content streams to produce a difference. A stream action may be performed on a set of content streams from the plurality of content streams based on the difference.
    Type: Grant
    Filed: June 28, 2016
    Date of Patent: April 3, 2018
    Assignee: Intel Corporation
    Inventors: Oleg Pogorelik, Rita H Wouhaybi, Alex Nayshtut
  • Publication number: 20180089519
    Abstract: Various systems and methods for providing a mechanism for multi-modal user authentication are described herein. An authentication system for multi-modal user authentication includes a memory including image data captured by a camera array, the image data including a hand of a user; and an image processor to: determine a hand geometry of the hand based on the image data; determine a palm print of the hand based on the image data; determine a gesture performed by the hand based on the image data; and determine a bio-behavioral movement sequence performed by the hand based on the image data; and an authentication module to construct a user biometric template using the hand geometry, palm print, gesture, and bio-behavioral movement sequence.
    Type: Application
    Filed: September 26, 2016
    Publication date: March 29, 2018
    Inventors: Michael Raziel, Alex Nayshtut, Oleg Pogorelik, Amit Bleiweiss, Eliyahu Elhadad
  • Patent number: 9912645
    Abstract: Methods and apparatus to securely share data are disclosed. An example includes retrieving, by executing an instruction with a processor at a first computing device associated with a first user of a cloud service, an encrypted archive file and a wrapped encryption key from a second computing device associated with a second user of the cloud service, the wrapped encryption key wrapped with key data associated with the first user of the cloud service at the second computing device, unwrapping the wrapped encryption key with the key data to obtain an unwrapped encryption key, and decrypting the encrypted archive file with the unwrapped encryption key to obtain a decrypted archive file.
    Type: Grant
    Filed: June 30, 2016
    Date of Patent: March 6, 2018
    Assignee: Intel Corporation
    Inventors: Ned M. Smith, Omer Ben-Shalom, Alex Nayshtut
  • Publication number: 20180048643
    Abstract: Technologies are provided in embodiments to establish trust between a trusted execution environment (TEE) and a peripheral device. Embodiments are configured to communicate with an attestation server to generate an encryption key, and to establish, using the encryption key, a secure connection with an authentication server to enable communication between the authentication server and the peripheral device. Embodiments are also configured to receive a pairwise master key if the peripheral device is authenticated and to receive a trusted communication from the peripheral device based, at least in part, on the pairwise master key. Embodiments may also be configured to identify a connection to the peripheral device before the peripheral device is authenticated to the authentication server, receive an identifier from the peripheral device, and establish a connection to an attestation server based on at least a portion of the identifier.
    Type: Application
    Filed: June 21, 2017
    Publication date: February 15, 2018
    Applicant: McAfee, Inc.
    Inventors: Avishay Sharaga, Alex Nayshtut, Oleg Pogorelik, Igor Muttik, Ned M. Smith
  • Publication number: 20180019976
    Abstract: In one embodiment, a hub logic is to provision a plurality of group private keys for a dynamic multipoint virtual private network (DMVPN) group associated with a function of a plurality of devices, provide a group public key for the DMVPN group to the plurality of devices and provision each of the plurality of group private keys to one of the plurality of devices, to enable one or more subsets of the plurality of devices to negotiate a traffic encryption key without interaction with a system having the hub logic. Other embodiments are described and claimed.
    Type: Application
    Filed: July 14, 2016
    Publication date: January 18, 2018
    Inventors: Omer BEN-SHALOM, Alex NAYSHTUT, Ned M. Smith