Patents by Inventor Elan Pavlov
Elan Pavlov has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12198066Abstract: A method for detection of misinformation without the need to analyze any articles (HINTS) includes forming a mixed graph containing at least two different node types, such as users and articles, with edges between users and articles, and with user weights for user nodes and article weights for article nodes. Seed nodes are planted for at least one user node and at least one article node. User weights and article weights are manually assigned to the seed nodes, then neighborhoods are defined for the seed nodes. A HITS-like algorithm is then run for a predetermined number of rounds updating both people and articles, while keeping the weights of the seed nodes constant to converge the graph for the weights of articles and users. Finally, a set of highest weights for users and/or articles is outputted and possible remedial action can be taken.Type: GrantFiled: May 14, 2021Date of Patent: January 14, 2025Inventor: Elan Pavlov
-
Publication number: 20230328095Abstract: A computing system identifies an evidence set associated with a detected cybersecurity attack. The evidence set includes logs representing security alerts associated with the detected cybersecurity attack. The computing system analyzes the evidence set to predict actions taken by a malicious actor, the actions comprising historical actions and future actions. The computing system analyzes the predicted actions to classify the historical actions and future actions taken by the malicious actor. The computing system generates a query for analyzing the evidence set based on the classified historical actions and future actions.Type: ApplicationFiled: March 31, 2023Publication date: October 12, 2023Applicant: Cybereason Inc.Inventors: Avi Chesla, Elan Pavlov
-
Publication number: 20220342943Abstract: A method for detection of misinformation (HINTS) without the need to analyze any articles that includes forming a mixed graph containing at least two different node types, such as users and articles with edges between users and articles with user weights for user nodes and article weights for article nodes. Seed nodes are planted at least one user node and at least one article node. User weights and article weights are manually assigned to the seed nodes, then neighborhoods are defined for the seed nodes. A HITS-like algorithm is then run for a predetermined number of rounds updating both people and articles while keeping the weights of the seed nodes constant to converge the graph for the weights of articles and users. Finally, a set of highest weights for users and/or articles is outputted and possible remedial action can be taken.Type: ApplicationFiled: November 14, 2019Publication date: October 27, 2022Inventor: Elan Pavlov
-
Publication number: 20210342704Abstract: A method for detection of misinformation without the need to analyze any articles (HINTS) includes forming a mixed graph containing at least two different node types, such as users and articles, with edges between users and articles, and with user weights for user nodes and article weights for article nodes. Seed nodes are planted for at least one user node and at least one article node. User weights and article weights are manually assigned to the seed nodes, then neighborhoods are defined for the seed nodes. A HITS-like algorithm is then run for a predetermined number of rounds updating both people and articles, while keeping the weights of the seed nodes constant to converge the graph for the weights of articles and users. Finally, a set of highest weights for users and/or articles is outputted and possible remedial action can be taken.Type: ApplicationFiled: May 14, 2021Publication date: November 4, 2021Inventor: Elan Pavlov
-
Patent number: 10536167Abstract: A distributed data storage system breaks data into n slices and k checksums using at least one matrix-based erasure code based on matrices with invertible submatrices, stores the slices and checksums on a plurality of storage elements, retrieves the slices from the storage elements, and, when slices have been lost or corrupted, retrieves the checksums from the storage elements and restores the data using the at least one matrix-based erasure code and the checksums. In a method for ensuring restoration and integrity of data in computer-related applications, data is broken into n pieces, k checksums are calculated using at least one matrix-based erasure code based on matrices with invertible submatrices, and the n data pieces and k checksums are stored on n+k storage elements or transmitted over a network.Type: GrantFiled: November 28, 2016Date of Patent: January 14, 2020Assignee: File System Labs LLCInventors: Elan Pavlov, Stephen Ness, Roger Critchlow, Robert Swartz, Timothy S. Murphy, Ronald Lachman
-
Patent number: 9830482Abstract: Methods and an apparatus for implementing a read cycle for identifying RFID tags among a plurality of RFID tags is disclosed. The read cycle comprises of selecting a group of items for reading and receiving identifiers from one or more items of the group, determining an aggregate data of the received identifiers, and comparing the aggregate data of the received identifiers with the aggregate data for the group from a previous read cycle. Further, where the aggregate data compared is equal, the read cycle is terminated, or where the aggregate data compared is not equal, the read cycle is repeated by forming at least one new group or by dividing the group into at least two subgroups and running the read cycle for each subgroup. The read cycle is performed in a time proportional to the number of tags that have changed and logarithmic in the total number of tags.Type: GrantFiled: September 14, 2015Date of Patent: November 28, 2017Assignee: Deductomix, Inc.Inventor: Elan Pavlov
-
Patent number: 9832214Abstract: A method and apparatus for classifying and combining computer attack information identifying as malicious events, events in a network that cause organizationally or functionally distant entities to become closer to each other, the method comprising identifying as malicious events, events in a network that cause organizationally or functionally distant entities to become closer to each other.Type: GrantFiled: August 8, 2016Date of Patent: November 28, 2017Assignee: Cybereason Inc.Inventors: Yonatan Striem Amit, Elan Pavlov
-
Publication number: 20170076117Abstract: Methods and an apparatus for implementing a read cycle for identifying RFID tags among a plurality of RFID tags is disclosed. The read cycle comprises of selecting a group of items for reading and receiving identifiers from one or more items of the group, determining an aggregate data of the received identifiers, and comparing the aggregate data of the received identifiers with the aggregate data for the group from a previous read cycle. Further, where the aggregate data compared is equal, the read cycle is terminated, or where the aggregate data compared is not equal, the read cycle is repeated by forming at least one new group or by dividing the group into at least two subgroups and running the read cycle for each subgroup. The read cycle is performed in a time proportional to the number of tags that have changed and logarithmic in the total number of tags.Type: ApplicationFiled: September 14, 2015Publication date: March 16, 2017Inventor: Elan Pavlov
-
Publication number: 20170077950Abstract: A distributed data storage system breaks data into n slices and k checksums using at least one matrix-based erasure code based on matrices with invertible submatrices, stores the slices and checksums on a plurality of storage elements, retrieves the slices from the storage elements, and, when slices have been lost or corrupted, retrieves the checksums from the storage elements and restores the data using the at least one matrix-based erasure code and the checksums. In a method for ensuring restoration and integrity of data in computer-related applications, data is broken into n pieces, k checksums are calculated using at least one matrix-based erasure code based on matrices with invertible submatrices, and the n data pieces and k checksums are stored on n+k storage elements or transmitted over a network.Type: ApplicationFiled: November 28, 2016Publication date: March 16, 2017Inventors: Elan Pavlov, Stephen Ness, Roger Critchlow, Robert Swartz, Timothy S. Murphy, Ronald Lachman
-
Publication number: 20160359884Abstract: A method and apparatus for classifying and combining computer attack information identifying as malicious events, events in a network that cause organizationally or functionally distant entities to become closer to each other, the method comprising identifying as malicious events, events in a network that cause organizationally or functionally distant entities to become closer to each other.Type: ApplicationFiled: August 8, 2016Publication date: December 8, 2016Inventors: Yonatan Striem Amit, Elan Pavlov
-
Patent number: 9507788Abstract: A distributed heterogeneous or homogeneous file storage system divides logical responsibility for data from actual control of the data by using separate file and storage managers. Each file manager provides access to stored files and stores metadata associated with each of the files for which it is responsible. A file manager control component allocates responsibilities among file managers, assigns management responsibilities for individual files, and maintains a record of which files are assigned to each manager. Each storage manager is responsible for managing storage of files on data storage devices and maintains a record of the location of each stored file. A storage manager control component allocates responsibilities among storage managers, assigns responsibilities for individual files, and maintains a record of which files and storage devices are assigned to each manager.Type: GrantFiled: August 2, 2015Date of Patent: November 29, 2016Assignee: Impossible Objects, LLCInventors: Elan Pavlov, Stephen Ness, Roger Critchlow, Robert Swartz, Timothy S. Murphy, Ronald Lachman
-
Patent number: 9413773Abstract: A method and apparatus for classifying and combining computer attack information identifying as malicious events, events in a network that cause organizationally or functionally distant entities to become closer to each other, the method comprising identifying as malicious events, events in a network that cause organizationally or functionally distant entities to become closer to each other.Type: GrantFiled: March 14, 2013Date of Patent: August 9, 2016Assignee: Cybereason Inc.Inventors: Yonatan Striem Amit, Elan Pavlov
-
Publication number: 20150347435Abstract: A distributed heterogeneous or homogeneous file storage system divides logical responsibility for data from actual control of the data by using separate file and storage managers. Each file manager provides access to stored files and stores metadata associated with each of the files for which it is responsible. A file manager control component allocates responsibilities among file managers, assigns management responsibilities for individual files, and maintains a record of which files are assigned to each manager. Each storage manager is responsible for managing storage of files on data storage devices and maintains a record of the location of each stored file. A storage manager control component allocates responsibilities among storage managers, assigns responsibilities for individual files, and maintains a record of which files and storage devices are assigned to each manager.Type: ApplicationFiled: August 2, 2015Publication date: December 3, 2015Inventors: Elan Pavlov, Stephen Ness, Roger Critchlow, Robert Swartz, Timothy S. Murphy, Ronald Lachman
-
Patent number: 9098519Abstract: A distributed heterogeneous or homogeneous file storage system divides logical responsibility for data from actual control of the data by using separate file and storage managers. Each file manager provides access to stored files and stores metadata associated with each of the files for which it is responsible. A file manager control component allocates responsibilities among file managers, assigns management responsibilities for individual files, and maintains a record of which files are assigned to each manager. Each storage manager is responsible for managing storage of files on data storage devices and maintains a record of the location of each stored file. A storage manager control component allocates responsibilities among storage managers, assigns responsibilities for individual files, and maintains a record of which files and storage devices are assigned to each manager.Type: GrantFiled: November 15, 2011Date of Patent: August 4, 2015Assignee: File System Labs LLCInventors: Elan Pavlov, Stephen Ness, Roger Critchlow, Robert Swartz, Timothy S. Murphy, Ronald Lachman
-
Publication number: 20140283026Abstract: A method and apparatus for classifying and combining computer attack information identifying as malicious events, events in a network that cause organizationally or functionally distant entities to become closer to each other, the method comprising identifying as malicious events, events in a network that cause organizationally or functionally distant entities to become closer to each other.Type: ApplicationFiled: March 14, 2013Publication date: September 18, 2014Applicant: CYBEREASON INCInventors: Yonatan Striem Amit, Elan Pavlov
-
Publication number: 20120185437Abstract: A distributed heterogeneous or homogeneous file storage system divides logical responsibility for data from actual control of the data by using separate file and storage managers. Each file manager provides access to stored files and stores metadata associated with each of the files for which it is responsible. A file manager control component allocates responsibilities among file managers, assigns management responsibilities for individual files, and maintains a record of which files are assigned to each manager. Each storage manager is responsible for managing storage of files on data storage devices and maintains a record of the location of each stored file. A storage manager control component allocates responsibilities among storage managers, assigns responsibilities for individual files, and maintains a record of which files and storage devices are assigned to each manager.Type: ApplicationFiled: November 15, 2011Publication date: July 19, 2012Inventors: Elan Pavlov, Stephen Ness, Roger Critchlow, Robert Swartz, Timothy S. Murphy, Ronald Lachman
-
Patent number: 8203999Abstract: There is disclosed a method of operating a communications network having a plurality of selfish users. Each selfish user may send messages to a destination node with the messages being forwarded through intermediate nodes of a mesh network. Each selfish user may accumulate a debt equal to the power saved by having messages forwarded through other nodes in the mesh network less the power consumed forwarding messages for other nodes in the mesh network. Each selfish user having greater than zero accumulated debt may be required to forward messages for other nodes.Type: GrantFiled: May 29, 2009Date of Patent: June 19, 2012Assignee: Massachusetts Institute of TechnologyInventor: Elan Pavlov
-
Publication number: 20100304750Abstract: There is disclosed a method of operating a communications network having a plurality of selfish users. Each selfish user may send messages to a destination node with the messages being forwarded through intermediate nodes of a mesh network. Each selfish user may accumulate a debt equal to the power saved by having messages forwarded through other nodes in the mesh network less the power consumed forwarding messages for other nodes in the mesh network. Each selfish user having greater than zero accumulated debt may be required to forward messages for other nodes.Type: ApplicationFiled: May 29, 2009Publication date: December 2, 2010Inventor: Elan Pavlov
-
Publication number: 20100306006Abstract: There is disclosed a method for auctioning a set of keywords. Bids may be received from a plurality of advertisers. Each bid may include a value of a click-through and a budget expressed as a maximum number of click-throughs. A flow graph may be created that relates the set of keywords to the bids received from the plurality of advertisers. A minimum cost flow solution may be determined for the flow graph, and the keywords may be allocated to the advertisers based on the minimum cost flow solution.Type: ApplicationFiled: May 29, 2009Publication date: December 2, 2010Inventor: Elan Pavlov