Patents by Inventor Gábor Takács

Gábor Takács has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240115717
    Abstract: Chlorotoxin derivatives containing amino acid sequence X0X1CMPCXS1XS2XS3DHXS4XS5ARRCX2X3CCGGYGX4CFGYQC LCX5X6X7X8 wherein (i) the N-terminal X0X1 cluster is AM, 0M, or 00; (ii) the solubility XS1XS2XS3XS4XS5 cluster is FTTQT, FTTES, SSSQT, SSSES, FSSQT, FSSES, or FSSQS; (iii) the internal X2X3X4 cluster is DKR, RDK, KDR, IKY, HKW, DRK, LKQ, KKK; and (iv) the C-terminal X5X6X7X8 cluster is N000, R000, NR00, NRG0, NRGY, NRRR, or RRRR; 0 denotes a position where no amino acid is present; the chlorotoxin derivative has a relative human MMP-2 binding that is at least 1.62 times higher than the wild-type chlorotoxin of SEQ ID NO: 1.
    Type: Application
    Filed: December 28, 2021
    Publication date: April 11, 2024
    Applicant: VRG THERAPEUTICS KFT.
    Inventors: Sándor FARKAS, Zoltán TAKÁCS, János NACSA, Gábor RÁCZ, Péter HORNYÁK, Zoltán HUJBER, Daniel CIOCA
  • Patent number: 11411842
    Abstract: A method includes receiving network traffic data relating to one or more devices of a plurality of home networks, wherein each home network of the plurality of home networks relates to a respective household. The method further includes determining one or more household related features by feature engineering the network traffic data, wherein the one or more household related features are related to one or more of: a device property, a security threat event, and an application usage, associating, in a database, the one or more household related features with identification data assigned to each household, identifying household clusters that represent groups of households comprising a predetermined number of common household related features, and providing a targeted service to a customer based on a household cluster associated with a household of the customer.
    Type: Grant
    Filed: June 1, 2021
    Date of Patent: August 9, 2022
    Assignee: CUJO LLC
    Inventors: Barry Delahunt, Gabor Takacs
  • Patent number: 11303656
    Abstract: The behavior analysis engine can identify malicious entities based on connections between the entity and other entities. The behavior analysis engine receives an entity from the network traffic hub and identifies entities that are connected to the entity within a threshold degree of separation. The behavior analysis engine applies a recursive process to the entity whereby the behavior analysis engine determines whether an entity is malicious based on whether its connections within a threshold degree of separation are malicious. The behavior analysis engine uses the maliciousness of the entities' connections to determine whether the entity is malicious and, if the entity is malicious, the behavior analysis engine may instruct the network traffic hub to block network communications associated with the malicious entity.
    Type: Grant
    Filed: March 1, 2018
    Date of Patent: April 12, 2022
    Assignee: Cujo LLC
    Inventors: Leonid Kuperman, Yuri Frayman, Einaras von Gravrock, Gabor Takacs
  • Patent number: 11303657
    Abstract: The behavior analysis engine can condense stored machine-learned models and transmit the condensed versions of the machine-learned models to the network traffic hub to be applied in the local networks. When the behavior analysis engine receives new data that can be used to further train a machine-learned model, the behavior analysis engine updates the machine-learned model and generates a condensed-version of the machine-learned model. The condensed-version of the machine-learned model may be more resource efficient than the machine-learned model while capable of making similar or the same decisions as the machine-learned model. The behavior analysis engine transmits the condensed version of the machine-learned model to the network traffic hub and the network traffic hub uses the condensed-version of the machine-learned model to identify malicious behavior in the local network.
    Type: Grant
    Filed: March 1, 2018
    Date of Patent: April 12, 2022
    Assignee: Cujo LLC
    Inventors: Leonid Kuperman, Yuri Frayman, Einaras von Gravrock, Gabor Takacs
  • Patent number: 11277422
    Abstract: The behavior analysis engine can also detect malicious network addresses that are sent to networked devices in the local network. The network traffic hub identifies network communications that are transmitted through the local network that contain network addresses. The network traffic hub transmits (or sends) the network address to the behavior analysis engine and the behavior analysis engine extracts network address features from the network address. The behavior analysis engine then applies an execution model to the execution features to determine a confidence score for the network address that represents the execution model's certainty that the network address is malicious. The behavior analysis engine uses the confidence score to provide instructions to the network traffic hub as to whether to allow the networked device to receive the network address.
    Type: Grant
    Filed: March 1, 2018
    Date of Patent: March 15, 2022
    Assignee: Cujo LLC
    Inventors: Leonid Kuperman, Yuri Frayman, Einaras von Gravrock, Gabor Takacs
  • Patent number: 11176459
    Abstract: A network traffic hub extracts encryption metadata from messages establishing an encrypted connection between a smart appliance and a remote server and determines whether malicious behavior is present in the messages. For example, the network traffic hub can extract an encryption cipher suite, identified encryption algorithms, or a public certificate. The network traffic hub detects malicious behavior or security threats based on the encryption metadata. These security threats may include a man-in-the-middle attacker or a Padding Oracle On Downgraded Legacy Encryption attack. Upon detecting malicious behavior or security threats, the network traffic hub blocks the encrypted traffic or notifies a user.
    Type: Grant
    Filed: September 12, 2019
    Date of Patent: November 16, 2021
    Assignee: Cujo LLC
    Inventors: Yuri Frayman, Robert Beatty, Leonid Kuperman, Gabor Takacs
  • Patent number: 11165798
    Abstract: The behavior analysis engine can also detect malicious network addresses that are sent to networked devices in the local network. The network traffic hub identifies network communications that are transmitted through the local network that contain network addresses. The network traffic hub transmits (or sends) the network address to the behavior analysis engine and the behavior analysis engine extracts network address features from the network address. The behavior analysis engine then applies an execution model to the execution features to determine a confidence score for the network address that represents the execution model's certainty that the network address is malicious. The behavior analysis engine uses the confidence score to provide instructions to the network traffic hub as to whether to allow the networked device to receive the network address.
    Type: Grant
    Filed: March 1, 2018
    Date of Patent: November 2, 2021
    Assignee: Cujo LLC
    Inventors: Leonid Kuperman, Yuri Frayman, Einaras von Gravrock, Gabor Takacs
  • Patent number: 10931768
    Abstract: A network traffic hub receives network traffic from a user device running an application. The network traffic hub aggregates the network traffic into augmented netflows. Based on netflow parameters extracted by the network traffic hub, one or more augmented netflows are associated with the application. The network traffic hub determines whether an augmented netflow is a result of the application being in an active state or a passive state based on, for example, the quantity of data within the netflow. If the quantity of data within the augmented netflow is larger than a data threshold, the augmented netflow can be classified as an active usage, and if the data is less than the data threshold, the augmented netflow can be classified as a passive usage. Thus, by classifying network traffic of an application as active or passive, a record of a user's active usage of the application can be recorded.
    Type: Grant
    Filed: June 14, 2019
    Date of Patent: February 23, 2021
    Assignee: Cujo LLC
    Inventors: Leonid Kuperman, Attila Egri, Gabor Takacs, Paulius Ulozas
  • Patent number: 10924567
    Abstract: A network traffic hub receives network traffic from a user device running an application. The network traffic hub aggregates the network traffic into augmented netflows. Based on netflow parameters extracted by the network traffic hub, one or more augmented netflows are associated with the application. The network traffic hub determines whether an augmented netflow is a result of the application being in an active state or a passive state based on, for example, the quantity of data within the netflow. If the quantity of data within the augmented netflow is larger than a data threshold, the augmented netflow can be classified as an active usage, and if the data is less than the data threshold, the augmented netflow can be classified as a passive usage. Thus, by classifying network traffic of an application as active or passive, a record of a user's active usage of the application can be recorded.
    Type: Grant
    Filed: June 14, 2019
    Date of Patent: February 16, 2021
    Assignee: Cujo LLC
    Inventors: Leonid Kuperman, Attila Egri, Gabor Takacs, Paulius Ulozas
  • Publication number: 20200076910
    Abstract: A network traffic hub receives network traffic from a user device running an application. The network traffic hub aggregates the network traffic into augmented netflows. Based on netflow parameters extracted by the network traffic hub, one or more augmented netflows are associated with the application. The network traffic hub determines whether an augmented netflow is a result of the application being in an active state or a passive state based on, for example, the quantity of data within the netflow. If the quantity of data within the augmented netflow is larger than a data threshold, the augmented netflow can be classified as an active usage, and if the data is less than the data threshold, the augmented netflow can be classified as a passive usage. Thus, by classifying network traffic of an application as active or passive, a record of a user's active usage of the application can be recorded.
    Type: Application
    Filed: June 14, 2019
    Publication date: March 5, 2020
    Inventors: Leonid Kuperman, Attila Egri, Gabor Takacs, Paulius Ulozas
  • Publication number: 20200076909
    Abstract: A network traffic hub receives network traffic from a user device running an application. The network traffic hub aggregates the network traffic into augmented netflows. Based on netflow parameters extracted by the network traffic hub, one or more augmented netflows are associated with the application. The network traffic hub determines whether an augmented netflow is a result of the application being in an active state or a passive state based on, for example, the quantity of data within the netflow. If the quantity of data within the augmented netflow is larger than a data threshold, the augmented netflow can be classified as an active usage, and if the data is less than the data threshold, the augmented netflow can be classified as a passive usage. Thus, by classifying network traffic of an application as active or passive, a record of a user's active usage of the application can be recorded.
    Type: Application
    Filed: June 14, 2019
    Publication date: March 5, 2020
    Inventors: Leonid Kuperman, Attila Egri, Gabor Takacs, Paulius Ulozas
  • Patent number: 10567410
    Abstract: The behavior analysis engine detects malicious executable files that are being downloaded by networked devices in the local network by executing the executable files in a sandboxing environment operating on the behavior analysis engine. The network traffic hub identifies network communications that are transmitted through the local network that contain executable files. The network traffic hub sends the executable file to the behavior analysis engine and the behavior analysis engine executes the executable file in a sandboxing environment that replicates the networked device that was downloading the executable. The behavior analysis engine extracts execution features from the execution of the executable file and applies an execution model to the execution features to determine a confidence score for the executable file. The behavior analysis engine uses the confidence score to provide instructions to the network traffic hub as to whether to allow the networked device to download the executable.
    Type: Grant
    Filed: March 1, 2018
    Date of Patent: February 18, 2020
    Assignee: CUJO LLC
    Inventors: Leonid Kuperman, Yuri Frayman, Einaras von Gravrock, Gabor Takacs
  • Publication number: 20200007568
    Abstract: A network traffic hub extracts encryption metadata from messages establishing an encrypted connection between a smart appliance and a remote server and determines whether malicious behavior is present in the messages. For example, the network traffic hub can extract an encryption cipher suite, identified encryption algorithms, or a public certificate. The network traffic hub detects malicious behavior or security threats based on the encryption metadata. These security threats may include a man-in-the-middle attacker or a Padding Oracle On Downgraded Legacy Encryption attack. Upon detecting malicious behavior or security threats, the network traffic hub blocks the encrypted traffic or notifies a user.
    Type: Application
    Filed: September 12, 2019
    Publication date: January 2, 2020
    Inventors: Yuri Frayman, Robert Beatty, Leonid Kuperman, Gabor Takacs
  • Patent number: 10454961
    Abstract: A network traffic hub extracts encryption metadata from messages establishing an encrypted connection between a smart appliance and a remote server and determines whether malicious behavior is present in the messages. For example, the network traffic hub can extract an encryption cipher suite, identified encryption algorithms, or a public certificate. The network traffic hub detects malicious behavior or security threats based on the encryption metadata. These security threats may include a man-in-the-middle attacker or a Padding Oracle On Downgraded Legacy Encryption attack. Upon detecting malicious behavior or security threats, the network traffic hub blocks the encrypted traffic or notifies a user.
    Type: Grant
    Filed: October 31, 2017
    Date of Patent: October 22, 2019
    Assignee: Cujo LLC
    Inventors: Yuri Frayman, Robert Beatty, Leonid Kuperman, Gabor Takacs
  • Publication number: 20180255086
    Abstract: The behavior analysis engine can condense stored machine-learned models and transmit the condensed versions of the machine-learned models to the network traffic hub to be applied in the local networks. When the behavior analysis engine receives new data that can be used to further train a machine-learned model, the behavior analysis engine updates the machine-learned model and generates a condensed-version of the machine-learned model. The condensed-version of the machine-learned model may be more resource efficient than the machine-learned model while capable of making similar or the same decisions as the machine-learned model. The behavior analysis engine transmits the condensed version of the machine-learned model to the network traffic hub and the network traffic hub uses the condensed-version of the machine-learned model to identify malicious behavior in the local network.
    Type: Application
    Filed: March 1, 2018
    Publication date: September 6, 2018
    Inventors: Leonid Kuperman, Yuri Frayman, Einaras von Gravrock, Gabor Takacs
  • Publication number: 20180253550
    Abstract: The behavior analysis engine detects malicious executable files that are being downloaded by networked devices in the local network by executing the executable files in a sandboxing environment operating on the behavior analysis engine. The network traffic hub identifies network communications that are transmitted through the local network that contain executable files. The network traffic hub sends the executable file to the behavior analysis engine and the behavior analysis engine executes the executable file in a sandboxing environment that replicates the networked device that was downloading the executable. The behavior analysis engine extracts execution features from the execution of the executable file and applies an execution model to the execution features to determine a confidence score for the executable file. The behavior analysis engine uses the confidence score to provide instructions to the network traffic hub as to whether to allow the networked device to download the executable.
    Type: Application
    Filed: March 1, 2018
    Publication date: September 6, 2018
    Inventors: Leonid Kuperman, Yuri Frayman, Einaras von Gravrock, Gabor Takacs
  • Publication number: 20180255022
    Abstract: The behavior analysis engine can also detect malicious network addresses that are sent to networked devices in the local network. The network traffic hub identifies network communications that are transmitted through the local network that contain network addresses. The network traffic hub transmits (or sends) the network address to the behavior analysis engine and the behavior analysis engine extracts network address features from the network address. The behavior analysis engine then applies an execution model to the execution features to determine a confidence score for the network address that represents the execution model's certainty that the network address is malicious. The behavior analysis engine uses the confidence score to provide instructions to the network traffic hub as to whether to allow the networked device to receive the network address.
    Type: Application
    Filed: March 1, 2018
    Publication date: September 6, 2018
    Inventors: Leonid Kuperman, Yuri Frayman, Einaras von Gravrock, Gabor Takacs
  • Publication number: 20180255085
    Abstract: The behavior analysis engine can identify malicious entities based on connections between the entity and other entities. The behavior analysis engine receives an entity from the network traffic hub and identifies entities that are connected to the entity within a threshold degree of separation. The behavior analysis engine applies a recursive process to the entity whereby the behavior analysis engine determines whether an entity is malicious based on whether its connections within a threshold degree of separation are malicious. The behavior analysis engine uses the maliciousness of the entities' connections to determine whether the entity is malicious and, if the entity is malicious, the behavior analysis engine may instruct the network traffic hub to block network communications associated with the malicious entity.
    Type: Application
    Filed: March 1, 2018
    Publication date: September 6, 2018
    Inventors: Leonid Kuperman, Yuri Frayman, Einaras von Gravrock, Gabor Takacs
  • Publication number: 20180124085
    Abstract: A network traffic hub extracts encryption metadata from messages establishing an encrypted connection between a smart appliance and a remote server and determines whether malicious behavior is present in the messages. For example, the network traffic hub can extract an encryption cipher suite, identified encryption algorithms, or a public certificate. The network traffic hub detects malicious behavior or security threats based on the encryption metadata. These security threats may include a man-in-the-middle attacker or a Padding Oracle On Downgraded Legacy Encryption attack. Upon detecting malicious behavior or security threats, the network traffic hub blocks the encrypted traffic or notifies a user.
    Type: Application
    Filed: October 31, 2017
    Publication date: May 3, 2018
    Inventors: Yuri Frayman, Robert Beatty, Leon Kuperman, Gabor Takacs
  • Patent number: 8676736
    Abstract: A system and method of providing personalized item recommendations in a communication system comprising a server and a plurality of client devices. At the server, a plurality of user rating vectors are received from a plurality of client devices and aggregated into a rating matrix that is factorized into a user feature matrix and an item feature matrix, with the product of the user feature and item feature matrixes approximating the user rating matrix. The factorization comprises the steps of the ALS1 or the IALS1 algorithm including: initializing the user feature matrix and the item feature matrix with predefined initial values; alternately optimizing the user feature matrix and the item feature matrix until a termination condition is met. The item feature matrix is transmitted from the server to at least one client device, and a predictive rating vector is generated as the product of the associated user feature vector and the item feature matrix.
    Type: Grant
    Filed: July 29, 2011
    Date of Patent: March 18, 2014
    Assignee: Gravity Research and Development Kft.
    Inventors: István Pilászy, Domonkos Tikk, Gábor Takács, András Németh Bottyán, Dávid Zibriczky