Patents by Inventor Gideon Littwin
Gideon Littwin has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12380193Abstract: In an embodiment, a computer-implemented method for decoding neural activity is provided. In the method, at least one machine learning model is trained using a training data set of EEG data and concurrently collected environmental data collected from data collection participants. Once the at least one machine learning model is trained, EEG data measured from sensors attached to or near a user's head is received. Environmental data describing stimulus the user is exposed to concurrently with the measurement of the EEG data is also received. The EEG data and the environmental data is input into the at least one machine learning model to determine an inference related to the neural activity. Based on the inference, an operation of a computer program is altered.Type: GrantFiled: December 27, 2024Date of Patent: August 5, 2025Assignee: COGNTIV NEUROSYSTEMS LTD.Inventors: Gideon Littwin, Hagai Lalazar, Nizan Klinghoffer, Jonathan Berrebi, Ilay Gordon
-
Publication number: 20250217464Abstract: In an embodiment, a computer-implemented method for decoding neural activity is provided. In the method, at least one machine learning model is trained using a training data set of EEG data and concurrently collected environmental data collected from data collection participants. Once the at least one machine learning model is trained, EEG data measured from sensors attached to or near a user's head is received. Environmental data describing stimulus the user is exposed to concurrently with the measurement of the EEG data is also received. The EEG data and the environmental data is input into the at least one machine learning model to determine an inference related to the neural activity. Based on the inference, an operation of a computer program is altered.Type: ApplicationFiled: December 27, 2024Publication date: July 3, 2025Applicant: COGNTIV Neurosystems Ltd.Inventors: Gideon LITTWIN, Hagai LALAZAR, Nizan KLINGHOFFER, Jonathan BERREBI, Ilay GORDON
-
Publication number: 20250213170Abstract: In an embodiment, a computer-implemented method for decoding neural activity is provided. In the method, at least one machine learning model is trained using a training data set of EEG data and concurrently collected environmental data collected from data collection participants. Once the at least one machine learning model is trained, EEG data measured from sensors attached to or near a user's head is received. Environmental data describing stimulus the user is exposed to concurrently with the measurement of the EEG data is also received. The EEG data and the environmental data is input into the at least one machine learning model to determine an inference related to the neural activity. Based on the inference, an operation of a computer program is altered.Type: ApplicationFiled: December 27, 2024Publication date: July 3, 2025Applicant: COGNTIV Neurosystems Ltd.Inventors: Hagai LALAZAR, Gideon LITTWIN, Nizan KLINGHOFFER, Jonathan BERREBI, Ilay GORDON
-
Publication number: 20250213171Abstract: In an embodiment, a computer-implemented method for decoding neural activity is provided. In the method, at least one machine learning model is trained using a training data set of EEG data and concurrently collected environmental data collected from data collection participants. Once the at least one machine learning model is trained, EEG data measured from sensors attached to or near a user's head is received. Environmental data describing stimulus the user is exposed to concurrently with the measurement of the EEG data is also received. The EEG data and the environmental data is input into the at least one machine learning model to determine an inference related to the neural activity. Based on the inference, an operation of a computer program is altered.Type: ApplicationFiled: December 27, 2024Publication date: July 3, 2025Applicant: COGNTIV Neurosystems Ltd.Inventors: Hagai LALAZAR, Gideon LITTWIN, Nizan KLINGHOFFER, Jonathan BERREBI, Ilay GORDON
-
Publication number: 20250217676Abstract: In an embodiment, a computer-implemented method for decoding neural activity is provided. In the method, at least one machine learning model is trained using a training data set of EEG data and concurrently collected environmental data collected from data collection participants. Once the at least one machine learning model is trained, EEG data measured from sensors attached to or near a user's head is received. Environmental data describing stimulus the user is exposed to concurrently with the measurement of the EEG data is also received. The EEG data and the environmental data is input into the at least one machine learning model to determine an inference related to the neural activity. Based on the inference, an operation of a computer program is altered.Type: ApplicationFiled: December 27, 2024Publication date: July 3, 2025Applicant: COGNTIV Neurosystems Ltd.Inventors: Gideon LITTWIN, Hagai LALAZAR, Nizan KLINGHOFFER, Jonathan BERREBI, Ilay GORDON
-
Publication number: 20250217465Abstract: In an embodiment, a computer-implemented method for decoding neural activity is provided. In the method, at least one machine learning model is trained using a training data set of EEG data and concurrently collected environmental data collected from data collection participants. Once the at least one machine learning model is trained, EEG data measured from sensors attached to or near a user's head is received. Environmental data describing stimulus the user is exposed to concurrently with the measurement of the EEG data is also received. The EEG data and the environmental data is input into the at least one machine learning model to determine an inference related to the neural activity. Based on the inference, an operation of a computer program is altered.Type: ApplicationFiled: December 27, 2024Publication date: July 3, 2025Applicant: COGNTIV Neurosystems Ltd.Inventors: Gideon LITTWIN, Hagai LALAZAR, Nizan KLINGHOFFER, Jonathan BERREBI, Ilay GORDON
-
Publication number: 20240169046Abstract: Techniques are disclosed relating to biometric authentication, e.g., facial recognition. In some embodiments, a device is configured to verify that image data from a camera unit exhibits a pseudo-random sequence of image capture modes and/or a probing pattern of illumination points (e.g., from lasers in a depth capture mode) before authenticating a user based on recognizing a face in the image data. In some embodiments, a secure circuit may control verification of the sequence and/or the probing pattern. In some embodiments, the secure circuit may verify frame numbers, signatures, and/or nonce values for captured image information. In some embodiments, a device may implement one or more lockout procedures in response to biometric authentication failures. The disclosed techniques may reduce or eliminate the effectiveness of spoofing and/or replay attacks, in some embodiments.Type: ApplicationFiled: November 28, 2023Publication date: May 23, 2024Inventors: Deepti S. Prakash, Lucia E. Ballard, Jerrold V. Hauck, Feng Tang, Etai Littwin, Pavan Kumar Anasosalu Vasu, Gideon Littwin, Thorsten Gernoth, Lucie Kucerova, Petr Kostka, Steven P. Hotelling, Eitan Hirsh, Tal Kaitz, Jonathan Pokrass, Andrei Kolin, Moshe Laifenfeld, Matthew C. Waldon, Thomas P. Mensch, Lynn R. Youngs, Christopher G. Zeleznik, Michael R. Malone, Ziv Hendel, Ivan Krstic, Anup K. Sharma
-
Patent number: 11868455Abstract: Techniques are disclosed relating to biometric authentication, e.g., facial recognition. In some embodiments, a device is configured to verify that image data from a camera unit exhibits a pseudo-random sequence of image capture modes and/or a probing pattern of illumination points (e.g., from lasers in a depth capture mode) before authenticating a user based on recognizing a face in the image data. In some embodiments, a secure circuit may control verification of the sequence and/or the probing pattern. In some embodiments, the secure circuit may verify frame numbers, signatures, and/or nonce values for captured image information. In some embodiments, a device may implement one or more lockout procedures in response to biometric authentication failures. The disclosed techniques may reduce or eliminate the effectiveness of spoofing and/or replay attacks, in some embodiments.Type: GrantFiled: February 22, 2021Date of Patent: January 9, 2024Assignee: Apple Inc.Inventors: Deepti S. Prakash, Lucia E. Ballard, Jerrold V. Hauck, Feng Tang, Etai Littwin, Pavan Kumar Anasosalu Vasu, Gideon Littwin, Thorsten Gernoth, Lucie Kucerova, Petr Kostka, Steven P. Hotelling, Eitan Hirsh, Tal Kaitz, Jonathan Pokrass, Andrei Kolin, Moshe Laifenfeld, Matthew C. Waldon, Thomas P. Mensch, Lynn R. Youngs, Christopher G. Zeleznik, Michael R. Malone, Ziv Hendel, Ivan Krstic, Anup K. Sharma
-
Patent number: 11151235Abstract: Techniques are disclosed relating to biometric authentication, e.g., facial recognition. In some embodiments, a device is configured to verify that image data from a camera unit exhibits a pseudo-random sequence of image capture modes and/or a probing pattern of illumination points (e.g., from lasers in a depth capture mode) before authenticating a user based on recognizing a face in the image data. In some embodiments, a secure circuit may control verification of the sequence and/or the probing pattern. In some embodiments, the secure circuit may verify frame numbers, signatures, and/or nonce values for captured image information. In some embodiments, a device may implement one or more lockout procedures in response to biometric authentication failures. The disclosed techniques may reduce or eliminate the effectiveness of spoofing and/or replay attacks, in some embodiments.Type: GrantFiled: July 31, 2018Date of Patent: October 19, 2021Assignee: Apple Inc.Inventors: Deepti S. Prakash, Lucia E. Ballard, Jerrold V. Hauck, Feng Tang, Etai Littwin, Pavan Kumar Anasosalu Vasu, Gideon Littwin, Thorsten Gernoth, Lucie Kucerova, Petr Kostka, Steven P. Hotelling, Eitan Hirsh, Tal Kaitz, Jonathan Pokrass, Andrei Kolin, Moshe Laifenfeld, Matthew C. Waldon, Thomas P. Mensch, Lynn R. Youngs, Christopher G. Zeleznik, Michael R. Malone, Ziv Hendel, Ivan Krstic, Anup K. Sharma, Kelsey Y. Ho
-
Publication number: 20210286865Abstract: Techniques are disclosed relating to biometric authentication, e.g., facial recognition. In some embodiments, a device is configured to verify that image data from a camera unit exhibits a pseudo-random sequence of image capture modes and/or a probing pattern of illumination points (e.g., from lasers in a depth capture mode) before authenticating a user based on recognizing a face in the image data. In some embodiments, a secure circuit may control verification of the sequence and/or the probing pattern. In some embodiments, the secure circuit may verify frame numbers, signatures, and/or nonce values for captured image information. In some embodiments, a device may implement one or more lockout procedures in response to biometric authentication failures. The disclosed techniques may reduce or eliminate the effectiveness of spoofing and/or replay attacks, in some embodiments.Type: ApplicationFiled: February 22, 2021Publication date: September 16, 2021Inventors: Deepti S. Prakash, Lucia E. Ballard, Jerrold V. Hauck, Feng Tang, Etai Littwin, Pavan Kumar Ansosalu Vasu, Gideon Littwin, Thorsten Gernoth, Lucie Kucerova, Petr Kostka, Steven P. Hotelling, Eitan Hirsh, Tal Kaitz, Jonathan Pokrass, Andrei Kolin, Moshe Laifenfeld, Matthew C. Waldon, Thomas P. Mensch, Lynn R. Youngs, Christopher G. Zeleznik, Michael R. Malone, Ziv Hendel, Ivan Krstic, Anup K. Sharma
-
Patent number: 10929515Abstract: Techniques are disclosed relating to biometric authentication, e.g., facial recognition. In some embodiments, a device is configured to verify that image data from a camera unit exhibits a pseudo-random sequence of image capture modes and/or a probing pattern of illumination points (e.g., from lasers in a depth capture mode) before authenticating a user based on recognizing a face in the image data. In some embodiments, a secure circuit may control verification of the sequence and/or the probing pattern. In some embodiments, the secure circuit may verify frame numbers, signatures, and/or nonce values for captured image information. In some embodiments, a device may implement one or more lockout procedures in response to biometric authentication failures. The disclosed techniques may reduce or eliminate the effectiveness of spoofing and/or replay attacks, in some embodiments.Type: GrantFiled: July 31, 2018Date of Patent: February 23, 2021Assignee: Apple Inc.Inventors: Deepti S. Prakash, Lucia E. Ballard, Jerrold V. Hauck, Feng Tang, Etai Littwin, Pavan Kumar Ansosalu Vasu, Gideon Littwin, Thorsten Gernoth, Lucie Kucerova, Petr Kostka, Steven P. Hotelling, Eitan Hirsh, Tal Kaitz, Jonathan Pokrass, Andrei Kolin, Moshe Laifenfeld, Matthew C. Waldon, Thomas P. Mensch, Lynn R. Youngs, Christopher G. Zeleznik, Michael R. Malone, Ziv Hendel, Ivan Krstic, Anup K. Sharma
-
Patent number: 10311290Abstract: A system and method for generation of a facial model. The method includes analyzing, via machine vision, a plurality of multimedia content elements to identify a plurality of facial images shown in the plurality of multimedia content elements; clustering the identified facial images into at least one cluster, wherein the clustering is based on metadata associated with each of the plurality of facial images; and selecting, from among the at least one cluster, a representative cluster representing a face, wherein the facial model is the selected representative cluster.Type: GrantFiled: April 27, 2017Date of Patent: June 4, 2019Assignee: Rogue Capital LLCInventors: Gideon Littwin, Adi Eckhouse Barzilai
-
Publication number: 20190044723Abstract: Techniques are disclosed relating to biometric authentication, e.g., facial recognition. In some embodiments, a device is configured to verify that image data from a camera unit exhibits a pseudo-random sequence of image capture modes and/or a probing pattern of illumination points (e.g., from lasers in a depth capture mode) before authenticating a user based on recognizing a face in the image data. In some embodiments, a secure circuit may control verification of the sequence and/or the probing pattern. In some embodiments, the secure circuit may verify frame numbers, signatures, and/or nonce values for captured image information. In some embodiments, a device may implement one or more lockout procedures in response to biometric authentication failures. The disclosed techniques may reduce or eliminate the effectiveness of spoofing and/or replay attacks, in some embodiments.Type: ApplicationFiled: July 31, 2018Publication date: February 7, 2019Inventors: Deepti S. Prakash, Lucia E. Ballard, Jerrold V. Hauck, Feng Tang, Etai Littwin, Pavan Kumar Ansosalu Vasu, Gideon Littwin, Thorsten Gernoth, Lucie Kucerova, Petr Kostka, Steven P. Hotelling, Eitan Hirsh, Tal Kaitz, Jonathan Pokrass, Andrei Kolin, Moshe Laifenfeld, Matthew C. Waldon, Thomas P. Mensch, Lynn R. Youngs, Christopher G. Zeleznik, Michael R. Malone, Ziv Hendel, Ivan Krstic, Anup K. Sharma
-
Publication number: 20190042718Abstract: Techniques are disclosed relating to biometric authentication, e.g., facial recognition. In some embodiments, a device is configured to verify that image data from a camera unit exhibits a pseudo-random sequence of image capture modes and/or a probing pattern of illumination points (e.g., from lasers in a depth capture mode) before authenticating a user based on recognizing a face in the image data. In some embodiments, a secure circuit may control verification of the sequence and/or the probing pattern. In some embodiments, the secure circuit may verify frame numbers, signatures, and/or nonce values for captured image information. In some embodiments, a device may implement one or more lockout procedures in response to biometric authentication failures. The disclosed techniques may reduce or eliminate the effectiveness of spoofing and/or replay attacks, in some embodiments.Type: ApplicationFiled: July 31, 2018Publication date: February 7, 2019Inventors: Deepti S. Prakash, Lucia E. Ballard, Jerrold V. Hauck, Feng Tang, Etai Littwin, Pavan Kumar Ansosalu Vasu, Gideon Littwin, Thorsten Gernoth, Lucie Kucerova, Petr Kostka, Steven P. Hotelling, Eitan Hirsh, Tal Kaitz, Jonathan Pokrass, Andrei Kolin, Moshe Laifenfeld, Matthew C. Waldon, Thomas P. Mensch, Lynn R. Youngs, Christopher G. Zeleznik, Michael R. Malone, Ziv Hendel, Ivan Krstic, Anup K. Sharma, Kelsey Y. Ho