Patents by Inventor Eytan Suchard
Eytan Suchard has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9741085Abstract: A method of encoding content data into a digital image includes determining bit values of a pixel within the digital image, and modifying the bit values within the pixel based on content data to be encoded in order to encode the content data into the digital image. The step of determining the bit values of a pixel within the digital image includes determining a binary representation of the bit values of the pixel. The step of modifying the bit values includes determining a binary representation of the content data to be encoded within the pixel and encoding the content data using a reversible binary operation.Type: GrantFiled: March 14, 2013Date of Patent: August 22, 2017Assignee: Artificial Intelligence Research Group LimitedInventors: Yossi Avni, Eytan Suchard
-
Patent number: 9563926Abstract: A method of verifying the identity of a user at an authentication server that includes receiving user data relating to a signature gesture entered by a user at a computing device, the user data having a plurality of sample points, verifying the user data at the authentication server by comparing to reference signature data, encoding a verification message within a digital image, and notifying the user that their identity has been verified on the basis of the user data received from the computing device.Type: GrantFiled: March 14, 2013Date of Patent: February 7, 2017Assignee: APPLIED MATERIALS TECHNOLOGIES LIMITEDInventors: Yossi Avni, Eytan Suchard
-
Patent number: 9185096Abstract: A method of verifying the identity of a user comprising: initiating (50) a sign-in request from a first computing device to an authentication server; receiving (58) an instruction from the authentication server to provide signature data from a second computing device; entering (64) signature data at the second computing device and sending the signature data to the authentication server; verifying (65) the signature data at the authentication server; notifying (66) the user that their identity has been verified on the basis of the data received from the second computing device.Type: GrantFiled: June 23, 2011Date of Patent: November 10, 2015Assignee: Applied Neural Technologies LimitedInventors: Yossi Avni, Eytan Suchard
-
Publication number: 20150248567Abstract: The present invention discloses a method of verifying the authenticity of a provided signature, comprising the steps of: receiving a set of sampled data points, each sampled data point being associated with a different position along the signature; identifying a set of characterising nodes within the set of sampled data points using a set of predetermined characterising nodes comprised in a pre-stored user profile; determining if each identified characterising node lies within a predetermined threshold range of a corresponding predetermined characterising node; and generating a positive verification when the characterising nodes lie within the predetermined threshold range. A system arranged to carry out the method is also disclosed.Type: ApplicationFiled: April 27, 2015Publication date: September 3, 2015Inventors: Yossi Avni, Eytan Suchard
-
Patent number: 9053309Abstract: The present invention discloses a method of verifying the authenticity of a provided signature, comprising the steps of: receiving a set of sampled data points, each sampled data point being associated with a different position along the signature; identifying a set of characterizing nodes within the set of sampled data points using a set of predetermined characterizing nodes comprised in a pre-stored user profile; determining if each identified characterizing node lies within a predetermined threshold range of a corresponding predetermined characterizing node; and generating a positive verification when the characterizing nodes lie within the predetermined threshold range. A system arranged to carry out the method is also disclosed.Type: GrantFiled: March 14, 2013Date of Patent: June 9, 2015Assignee: Applied Neural Technologies LimitedInventors: Yossi Avni, Eytan Suchard
-
Publication number: 20140283005Abstract: The present invention discloses a method of verifying the authenticity of a provided signature, comprising the steps of: receiving a set of sampled data points, each sampled data point being associated with a different position along the signature; identifying a set of characterising nodes within the set of sampled data points using a set of predetermined characterising nodes comprised in a pre-stored user profile; determining if each identified characterising node lies within a predetermined threshold range of a corresponding predetermined characterising node; and generating a positive verification when the characterising nodes lie within the predetermined threshold range. A system arranged to carry out the method is also disclosed.Type: ApplicationFiled: March 14, 2013Publication date: September 18, 2014Inventors: Yossi Avni, Eytan Suchard
-
Publication number: 20140281946Abstract: A method of verifying the identity of a user at an authentication server that includes receiving user data relating to a signature gesture entered by a user at a computing device, the user data having a plurality of sample points, verifying the user data at the authentication server by comparing to reference signature data, encoding a verification message within a digital image, and notifying the user that their identity has been verified on the basis of the user data received from the computing device.Type: ApplicationFiled: March 14, 2013Publication date: September 18, 2014Inventors: Yossi Avni, Eytan Suchard
-
Publication number: 20140281945Abstract: A method of encoding content data into a digital image that includes determining bit values of a pixel within the digital image, modifying the bit values within the pixel based on content data to be encoded in order to encode the content data into the digital image, wherein determining the bit values of a pixel within the digital image comprises determining a binary representation of the bit values of the pixel and wherein modifying the bit values comprises determining a binary representation of the content data to be encoded within the pixel and encoding the content data using a reversible binary operation.Type: ApplicationFiled: March 14, 2013Publication date: September 18, 2014Inventors: Yossi Avni, Eytan Suchard
-
Publication number: 20130205380Abstract: A method of verifying the identity of a user comprising: initiating (50) a sign-in request from a first computing device to an authentication server; receiving (58) an instruction from the authentication server to provide signature data from a second computing device; entering (64) signature data at the second computing device and sending the signature data to the authentication server; verifying (65) the signature data at the authentication server; notifying (66) the user that their identity has been verified on the basis of the data received from the second computing device.Type: ApplicationFiled: June 23, 2011Publication date: August 8, 2013Applicant: ADAPTIVE NEURAL BIOMETRICS LTDInventors: Yossi Avni, Eytan Suchard
-
Publication number: 20110239306Abstract: A data leak protection method for managing user interaction with a computing device, the computing device comprising a kernel mode of operation and a user mode of operation, the method comprising: monitoring the kernel mode of the computing device in order to detect user-initiated events; determining whether a given user-initiated event has a forbidden status or an allowed status; performing an action in dependence on the status of the given user-initiated event.Type: ApplicationFiled: August 27, 2009Publication date: September 29, 2011Applicant: APPLIED NEURAL TECHNOLOGIES LIMITEDInventors: Yossi Avni, Eytan Suchard
-
Patent number: 7715600Abstract: The present invention includes a system and a method of validating an identity of a user using a pointing device by comparing a sampled mouse signature with an authenticated mouse signature. The method includes presenting a virtual pad including a background graphic image, a plurality of objects positioned on the background graphic image to a user. The user moves the pointing device to manipulate a cursor on the background graphic image. The method includes a step of sampling a plurality of events corresponding to positions of the cursor to provide a sampled mouse signature including a set of position vectors. The present invention includes comparing the sampled mouse signature to a stored mouse signature representing the identity of a user, and validating the identity of a user in response to the comparing step.Type: GrantFiled: October 31, 2003Date of Patent: May 11, 2010Assignee: Applied Neural Technologies LimitedInventors: Yossi Avni, Eytan Suchard
-
Publication number: 20090161912Abstract: In one aspect, the present invention is directed to a method for object detection, the method comprising the steps of: dividing a digital image into a plurality of sub-windows of substantially the same dimensions; processing the image of each of the sub-windows by a cascade of homogeneous classifiers (each of the homogenous classifiers produces a CRV, which is a value relative to the likelihood of a sub-window to comprise an image of the object of interest, and wherein each of the classifiers has an increasing accuracy in identifying features associated with the object of interest); and upon classifying by all of the classifiers of the cascade a sub-window as comprising an image of the object of interest, applying a post-classifier on the cascade CRVS, for evaluating the likelihood of the sub-window to comprise an image of the object of interest, wherein the post-classifier differs from the homogenous classifiers.Type: ApplicationFiled: December 19, 2008Publication date: June 25, 2009Inventors: RAVIV YATOM, Eirad Heller, Eytan Suchard
-
Patent number: 7424462Abstract: A method of comparing an input pattern with a memory pattern includes the steps of loading a representation of said input pattern into cells in an input layer; loading a representation of said memory pattern into cells in a memory layer; loading an initial value into cells in an intermediate layers between said input layer and said memory layer; comparing values of cells in said intermediate layers with values stored in cells of adjacent layers; updating values stored in cells in said intermediate layers based on said step of comparing; and mapping cells in said memory layer to cells in said input layer.Type: GrantFiled: March 29, 2004Date of Patent: September 9, 2008Assignee: Applied Neural Technologies Limited of Woodbourne HallInventors: Yossi Avni, Eytan Suchard
-
Patent number: 6985610Abstract: A method of authenticating a signature including the steps of sampling a signature and storing data representative of the signature, converting the data to high dimensions vectors, feeding the high dimension vectors to an unsupervised neural network, performing a high order principal component extraction process on the high dimensions vectors to thereby identifying clusters of high dimension points, and analyzing the clusters of high dimension points to determine, based on previously stored information, the authenticity of the signature.Type: GrantFiled: September 8, 2003Date of Patent: January 10, 2006Assignee: Computer Associates Think, Inc.Inventors: Eytan Suchard, Yossi Avni
-
Patent number: 6950538Abstract: A method of authenticating a signature including the steps of sampling a signature and storing data representative of the signature, converting the data to high dimensions vectors, feeding the high dimension vectors to an unsupervised neural network, performing a high order principal component extraction process on the high dimensions vectors to thereby identifying clusters of high dimension points, and analyzing the clusters of high dimension points to determine, based on previously stored information, the authenticity of the signature.Type: GrantFiled: September 8, 2003Date of Patent: September 27, 2005Assignee: Computer Associates Think, Inc.Inventors: Eytan Suchard, Yossi Avni
-
Publication number: 20050163384Abstract: A method of comparing an input pattern with a memory pattern includes the steps of loading a representation of said input pattern into cells in an input layer; loading a representation of said memory pattern into cells in a memory layer; loading an initial value into cells in an intermediate layers between said input layer and said memory layer; comparing values of cells in said intermediate layers with values stored in cells of adjacent layers; updating values stored in cells in said intermediate layers based on said step of comparing; and mapping cells in said memory layer to cells in said input layer.Type: ApplicationFiled: March 29, 2004Publication date: July 28, 2005Inventors: Yossi Avni, Eytan Suchard
-
Publication number: 20040095384Abstract: The present invention includes a system and a method of validating an identity of a user using a pointing device by comparing a sampled mouse signature with an authenticated mouse signature. The method includes presenting a virtual pad including a background graphic image, a plurality of objects positioned on the background graphic image to a user. The user moves the pointing device to manipulate a cursor on the background graphic image. The method includes a step of sampling a plurality of events corresponding to positions of the cursor to provide a sampled mouse signature including a set of position vectors. The present invention includes comparing the sampled mouse signature to a stored mouse signature representing the identity of a user, and validating the identity of a user in response to the comparing step.Type: ApplicationFiled: October 31, 2003Publication date: May 20, 2004Applicant: APPLIED NEURAL COMPUTING LTD.Inventors: Yossi Avni, Eytan Suchard
-
Patent number: 6735336Abstract: A method of comparing an input pattern with a memory pattern includes the steps of loading a representation of said input pattern into cells in an input layer; loading a representation of said memory pattern into cells in a memory layer; loading an initial value into cells in an intermediate layers between said input layer and said memory layer; comparing values of cells in said intermediate layers with values stored in cells of adjacent layers; updating values stored in cells in said intermediate layers based on said step of comparing; and mapping cells in said memory layer to cells in said input layer.Type: GrantFiled: May 15, 2002Date of Patent: May 11, 2004Assignee: Applied Neural Computing Ltd.Inventors: Yossi Avni, Eytan Suchard
-
Publication number: 20040049411Abstract: A method of authenticating a signature including the steps of sampling a signature and storing data representative of the signature, converting the data to high dimensions vectors, feeding the high dimension vectors to an unsupervised neural network, performing a high order principal component extraction process on the high dimensions vectors to thereby identifying clusters of high dimension points, and analyzing the clusters of high dimension points to determine, based on previously stored information, the authenticity of the signature.Type: ApplicationFiled: September 8, 2003Publication date: March 11, 2004Applicant: Computer Associates Think, Inc., a Delaware corporationInventors: Eytan Suchard, Yossi Avni
-
Publication number: 20040047495Abstract: A method of authenticating a signature including the steps of sampling a signature and storing data representative of the signature, converting the data to high dimensions vectors, feeding the high dimension vectors to an unsupervised neural network, performing a high order principal component extraction process on the high dimensions vectors to thereby identifying clusters of high dimension points, and analyzing the clusters of high dimension points to determine, based on previously stored information, the authenticity of the signature.Type: ApplicationFiled: September 8, 2003Publication date: March 11, 2004Applicant: Computer Associates Think, Inc., a Delaware corporationInventors: Eytan Suchard, Yossi Avni