Patents by Inventor Guy Vincent

Guy Vincent has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11949623
    Abstract: Apparatus, methods, and computer-readable media for facilitating autonomous synchronization are disclosed herein. For example, a UE may be configured to perform an initial synchronization directly to PSCCH and PSSCH when other synchronization sources, such as GNSS, a base station, and/or SLSS, are unavailable. An example method for wireless communication at a user equipment includes receiving a PSCCH. The example method also includes performing an initial synchronization based on the PSCCH. In some examples, the method may also include receiving a PSSCH, and determining a logical subframe number modulo 10 based on the PSSCH. The logical subframe number modulo 10 may correspond to a sequence seed.
    Type: Grant
    Filed: January 25, 2022
    Date of Patent: April 2, 2024
    Assignee: QUALCOMM Incorporated
    Inventors: Moshe Ben-Ari, Peer Berger, Cheol Hee Park, Ashish Shankar Iyer, Assaf Touboul, Guy Spiegelstein, Sivaramakrishna Veerepalli, Soumya Das, Alok Sharma, Sean Vincent Maschue, Narasimha Rao Koramutla
  • Publication number: 20240056480
    Abstract: Mechanisms are provided to detect content generated from phishing attacks. The mechanisms process an electronic communication, received from a data network, to produce a structure token. The structure token represents a content structure of the electronic communication. The structure token is processed by a machine learning model, which is trained to identify content that is generated in response to one or more phishing attacks. The machine learning model produces a classification output that indicates whether the electronic communication includes content that was generated in response to the one or more phishing attacks.
    Type: Application
    Filed: October 27, 2023
    Publication date: February 15, 2024
    Inventors: IOSIF ONUT, Qian Cui, Guy-Vincent Jourdan
  • Patent number: 11818170
    Abstract: Mechanisms are provided to detect phishing exfiltration communications. The mechanisms receive an input electronic communication from a data network and process the input electronic communication to extract a structure token that represents the content structure of the input electronic communication. The structure token is input to a machine learning model that is trained to identify phishing exfiltration communication grammars, and relationships between phishing exfiltration communication grammars, in structure tokens. The machine learning model processes the structure token to generate a vector output indicating computed values for processing by classification logic. The classification logic processes the vector output from the machine learning model to classify the input electronic communication as either a phishing exfiltration communication or a non-phishing exfiltration communication, and outputs a corresponding classification output.
    Type: Grant
    Filed: March 14, 2022
    Date of Patent: November 14, 2023
    Assignee: CrowdStrike, Inc.
    Inventors: Iosif Onut, Qian Cui, Guy-Vincent Jourdan
  • Publication number: 20220201037
    Abstract: Mechanisms are provided to detect phishing exfiltration communications. The mechanisms receive an input electronic communication from a data network and process the input electronic communication to extract a structure token that represents the content structure of the input electronic communication. The structure token is input to a machine learning model that is trained to identify phishing exfiltration communication grammars, and relationships between phishing exfiltration communication grammars, in structure tokens. The machine learning model processes the structure token to generate a vector output indicating computed values for processing by classification logic. The classification logic processes the vector output from the machine learning model to classify the input electronic communication as either a phishing exfiltration communication or a non-phishing exfiltration communication, and outputs a corresponding classification output.
    Type: Application
    Filed: March 14, 2022
    Publication date: June 23, 2022
    Inventors: IOSIF ONUT, Qian Cui, Guy-Vincent Jourdan
  • Patent number: 11303674
    Abstract: Mechanisms are provided to detect phishing exfiltration communications. The mechanisms receive an input electronic communication from a data network and process the input electronic communication to extract a structure token that represents the content structure of the input electronic communication. The structure token is input to a machine learning model that is trained to identify phishing exfiltration communication grammars, and relationships between phishing exfiltration communication grammars, in structure tokens. The machine learning model processes the structure token to generate a vector output indicating computed values for processing by classification logic. The classification logic processes the vector output from the machine learning model to classify the input electronic communication as either a phishing exfiltration communication or a non-phishing exfiltration communication, and outputs a corresponding classification output.
    Type: Grant
    Filed: May 14, 2019
    Date of Patent: April 12, 2022
    Assignee: International Business Machines Corporation
    Inventors: Iosif Onut, Qian Cui, Guy-Vincent Jourdan
  • Patent number: 11275798
    Abstract: A computer-implemented method and/or computer program product selectively assigns a task using a hybrid task assignment process. One or more processors direct a working hardware node in a network to crawl a particular application, thus causing the working hardware node to encounter a task in the particular application. The processor(s) selectively handle the task according to whether the task is reserved for dynamic assignment to an other hardware node in the network, such that in response to a determination that the task encountered is not reserved, the task is handled by the working hardware node that is crawling the particular application, and in response to a determination that the task encountered is reserved, the task encountered is sent to a central unit for dynamic assignment to the other hardware node in the network.
    Type: Grant
    Filed: January 9, 2019
    Date of Patent: March 15, 2022
    Assignee: International Business Machines Corporation
    Inventors: Gregor Von Bochmann, Guy-Vincent R. Jourdan, Iosif V. Onut, Seyed M. Mir Taheri
  • Patent number: 11277443
    Abstract: Embodiments provide a computer implemented method for detecting a phishing internet link, wherein an internet link is a Uniform Resource Locator (URL) or a domain name, the method including: receiving the internet link; replacing one or more visually confusing characters with one or more original characters, wherein the one or more visually confusing characters are similar to the one or more original characters; removing a top-level domain from the internet link; removing a common subdomain from the internet link; splitting the remaining internet link into a list of words; converting the list of words into a list of word vectors; calculating an average word vector of the list of word vectors; and providing a phishing score for the average vector, indicating a probability of the internet link being a phishing internet link.
    Type: Grant
    Filed: October 22, 2019
    Date of Patent: March 15, 2022
    Assignee: International Business Machines Corporation
    Inventors: Iosif Onut, Qian Cui, Guy-Vincent Jourdan
  • Patent number: 11132409
    Abstract: A method for identifying client states, receives a set of paths representative of a document object model (DOM) associated with a web page of a rich internet application and for each path in the set of paths received, extracts a subtree, as subtree X, for a current path. The method traverses all known sub-paths under the current path and delete corresponding subtrees from subtree X and reads contents of and determines states of subtree X to form a state X. The state X is added to a set of current states and responsive to a determination no more paths exist, returns the set of current states of the rich internet application.
    Type: Grant
    Filed: May 24, 2018
    Date of Patent: September 28, 2021
    Assignee: International Business Machines Corporation
    Inventors: Gregor von Bochmann, Paul Ionescu, Guy-Vincent Jourdan, Seyed Ali Moosavi Byooki, Iosif V. Onut, Omer Tripp
  • Publication number: 20210120035
    Abstract: Embodiments provide a computer implemented method for detecting a phishing internet link, wherein an internet link is a Uniform Resource Locator (URL) or a domain name, the method including: receiving the internet link; replacing one or more visually confusing characters with one or more original characters, wherein the one or more visually confusing characters are similar to the one or more original characters; removing a top-level domain from the internet link; removing a common subdomain from the internet link; splitting the remaining internet link into a list of words; converting the list of words into a list of word vectors; calculating an average word vector of the list of word vectors; and providing a phishing score for the average vector, indicating a probability of the internet link being a phishing internet link.
    Type: Application
    Filed: October 22, 2019
    Publication date: April 22, 2021
    Inventors: Iosif Onut, Qian Cui, Guy-Vincent Jourdan
  • Patent number: 10901730
    Abstract: Identifying equivalent JavaScript events includes receiving source code containing two JavaScript events for equivalency analysis, extracting an HTML element containing an event from each JavaScript event and analyzing the extracted HTML elements. Responsive to a determination that the HTML elements are of a same type according to equivalency criteria B, and responsive to a determination that the HTML elements have a same number of attributes according to equivalency criteria C, a determination is made whether JavaScript function calls of each JavaScript event are similar according to equivalency criteria A. Responsive to a determination that the JavaScript function calls are similar according to equivalency criteria A, and responsive to a determination that the other attributes of the HTML elements satisfy equivalency criteria D, the JavaScript events are identified as equivalent.
    Type: Grant
    Filed: November 20, 2018
    Date of Patent: January 26, 2021
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Gregor von Bochmann, Nevon C. Brake, Mustafa Emre Dincturk, Paul Ionescu, Guy-Vincent Jourdan, Iosif Viorel Onut, Wayne Duncan Smith, Seyed M. Mir Taheri
  • Publication number: 20200366712
    Abstract: Mechanisms are provided to detect phishing exfiltration communications. The mechanisms receive an input electronic communication from a data network and process the input electronic communication to extract a structure token that represents the content structure of the input electronic communication. The structure token is input to a machine learning model that is trained to identify phishing exfiltration communication grammars, and relationships between phishing exfiltration communication grammars, in structure tokens. The machine learning model processes the structure token to generate a vector output indicating computed values for processing by classification logic. The classification logic processes the vector output from the machine learning model to classify the input electronic communication as either a phishing exfiltration communication or a non-phishing exfiltration communication, and outputs a corresponding classification output.
    Type: Application
    Filed: May 14, 2019
    Publication date: November 19, 2020
    Inventors: Iosif Onut, Qian Cui, Guy-Vincent Jourdan
  • Patent number: 10826935
    Abstract: An example operation may include one or more of identifying a page of a website for phishing testing, attempting each of a Hypertext Transfer Protocol (HTTP) GET request and a HTTP Secure (HTTPS) GET request via the identified page of the website, attempting each of a HTTP POST request and a HTTPS POST request via the identified page of the website, determining if the website is a phishing website based on server responses to the attempted HTTP and HTTPS GET requests and the attempted HTTP and HTTPS POST requests received from the website, and in response to determining the website is a phishing website, outputting an indication of the determination for display on a display device.
    Type: Grant
    Filed: April 24, 2018
    Date of Patent: November 3, 2020
    Assignee: International Business Machines Corporation
    Inventors: Iosif Onut, Aviv Ron, Avishay Bartik, Russell Couturier, Gregor von Bochmann, Guy-Vincent Jourdan, Qian Cui
  • Patent number: 10506341
    Abstract: A computer-implemented method for reducing undesired crosstalk signals on an inactive channel of a device comprising the steps of: (i) determining system volume levels and associated signal amplitudes required to achieve a range of desired audio output attenuation levels on an active channel of the device; (ii) determining a crosstalk compensation signal comprising a signal amplitude and associated phase shift required to reduce undesired crosstalk on the inactive channel of the device for each desired audio output attention level in the range of desired audio output attenuation levels; and (iii) generating a desired audio output attenuation level on the active channel of the device by generating a signal at the determined system volume level and associated signal amplitude required to achieve said desired audio output attenuation level, and generating a contemporaneous crosstalk compensation signal on the inactive channel of the device by generating a signal at the determined signal amplitude and associated
    Type: Grant
    Filed: October 6, 2016
    Date of Patent: December 10, 2019
    Assignee: SHOEBOX LTD.
    Inventors: Matthew Bromwich, Guy-Vincent Jourdan, Julian Bromwich, Heikki Koivikko
  • Publication number: 20190327267
    Abstract: An example operation may include one or more of identifying a page of a website for phishing testing, attempting each of a Hypertext Transfer Protocol (HTTP) GET request and a HTTP Secure (HTTPS) GET request via the identified page of the website, attempting each of a HTTP POST request and a HTTPS POST request via the identified page of the website, determining if the website is a phishing website based on server responses to the attempted HTTP and HTTPS GET requests and the attempted HTTP and HTTPS POST requests received from the website, and in response to determining the website is a phishing website, outputting an indication of the determination for display on a display device.
    Type: Application
    Filed: April 24, 2018
    Publication date: October 24, 2019
    Inventors: Iosif Onut, Aviv Ron, Avishay Bartik, Russell Couturier, Gregor von Bochmann, Guy-Vincent Jourdan, Qian Cui
  • Publication number: 20190147004
    Abstract: A computer-implemented method and/or computer program product selectively assigns a task using a hybrid task assignment process. One or more processors direct a working hardware node in a network to crawl a particular application, thus causing the working hardware node to encounter a task in the particular application. The processor(s) selectively handle the task according to whether the task is reserved for dynamic assignment to an other hardware node in the network, such that in response to a determination that the task encountered is not reserved, the task is handled by the working hardware node that is crawling the particular application, and in response to a determination that the task encountered is reserved, the task encountered is sent to a central unit for dynamic assignment to the other hardware node in the network.
    Type: Application
    Filed: January 9, 2019
    Publication date: May 16, 2019
    Inventors: Gregor Von Bochmann, Guy-Vincent R. Jourdan, Iosif V. Onut, Seyed M. Mir Taheri
  • Patent number: 10262065
    Abstract: A computer-implemented method for hybrid task assignment is presented. A working hardware node crawls a particular application and encounters a task. A mapping function is used to determine whether the task encountered is reserved. In response to a determination the task encountered is not reserved, the task is handled by the working node, and in response to a determination the task encountered is reserved, the task encountered is sent to a central unit. A determination is made as to whether the working node is idle. In response to a determination the working node is idle, another task is requested from the central unit by the working node. In response to a determination the working node is not idle, as determination is made as to whether all tasks are complete. In response to a determination all tasks are not complete, the task is handled by the working node.
    Type: Grant
    Filed: November 21, 2014
    Date of Patent: April 16, 2019
    Assignee: International Business Machines Corporation
    Inventors: Gregor Von Bochmann, Guy-Vincent R. Jourdan, Iosif V. Onut, Seyed M. Mir Taheri
  • Publication number: 20190087180
    Abstract: Identifying equivalent JavaScript events includes receiving source code containing two JavaScript events for equivalency analysis, extracting an HTML element containing an event from each JavaScript event and analyzing the extracted HTML elements. Responsive to a determination that the HTML elements are of a same type according to equivalency criteria B, and responsive to a determination that the HTML elements have a same number of attributes according to equivalency criteria C, a determination is made whether JavaScript function calls of each JavaScript event are similar according to equivalency criteria A. Responsive to a determination that the JavaScript function calls are similar according to equivalency criteria A, and responsive to a determination that the other attributes of the HTML elements satisfy equivalency criteria D, the JavaScript events are identified as equivalent.
    Type: Application
    Filed: November 20, 2018
    Publication date: March 21, 2019
    Inventors: Gregor von Bochmann, Nevon C. Brake, Mustafa Emre Dincturk, Paul Ionescu, Guy-Vincent Jourdan, Iosif Viorel Onut, Wayne Duncan Smith, Seyed M. Mir Taheri
  • Patent number: 10169037
    Abstract: Identifying equivalent JavaScript events includes receiving source code containing two JavaScript events for equivalency analysis, extracting an HTML element containing an event from each JavaScript event and analyzing the extracted HTML elements. Responsive to a determination that the HTML elements are of a same type according to equivalency criteria B, and responsive to a determination that the HTML elements have a same number of attributes according to equivalency criteria C, a determination is made whether JavaScript function calls of each JavaScript event are similar according to equivalency criteria A. Responsive to a determination that the JavaScript function calls are similar according to equivalency criteria A, and responsive to a determination that the other attributes of the HTML elements satisfy equivalency criteria D, the JavaScript events are identified as equivalent.
    Type: Grant
    Filed: February 25, 2016
    Date of Patent: January 1, 2019
    Assignee: INTERNATIONAL BUSINESS MACHINES COPRORATION
    Inventors: Gregor von Bochmann, Nevon C. Brake, Mustafa Emre Dincturk, Paul Ionescu, Guy-Vincent Jourdan, Iosif Viorel Onut, Wayne Duncan Smith, Seyed M. Mir Taheri
  • Patent number: 10146749
    Abstract: An embodiment for tracking JavaScript actions in a rich Internet application, receives a document object model (DOM) representative of a particular page of an application at a particular time and analyzes the DOM received to identify each JavaScript action on the particular page for which each JavaScript action identified, a JavaScript action characteristics ID is calculated and stored. Responsive to a determination multiple instances of a same ID exist, collecting a list of JavaScript actions corresponding to each ID corresponding to a multiple JavaScript action and removing from memory JavaScript action entries for the multiple instances of the same ID. A neighbor influence is computed for a member of the list of JavaScript actions remaining and the JavaScript action ID calculated for the member of the list of JavaScript actions remaining is stored. Responsive to a determination there are no more multiple JavaScript actions, return all JavaScript action IDs stored.
    Type: Grant
    Filed: January 6, 2015
    Date of Patent: December 4, 2018
    Assignee: International Business Machines Corporation
    Inventors: Khalil A. Ayoub, Gregor V. Bochmann, Nevon C. Brake, Mustafa E. Dincturk, Paul Ionescu, Guy-Vincent Jourdan, Iosif V. Onut
  • Publication number: 20180317008
    Abstract: A computer-implemented method for reducing undesired crosstalk signals on an inactive channel of a device comprising the steps of: (i) determining system volume levels and associated signal amplitudes required to achieve a range of desired audio output attenuation levels on an active channel of the device; (ii) determining a crosstalk compensation signal comprising a signal amplitude and associated phase shift required to reduce undesired crosstalk on the inactive channel of the device for each desired audio output attention level in the range of desired audio output attenuation levels; and (iii) generating a desired audio output attenuation level on the active channel of the device by generating a signal at the determined system volume level and associated signal amplitude required to achieve said desired audio output attenuation level, and generating a contemporaneous crosstalk compensation signal on the inactive channel of the device by generating a signal at the determined signal amplitude and associated
    Type: Application
    Filed: October 6, 2016
    Publication date: November 1, 2018
    Inventors: Matthew Bromwich, Guy-Vincent Jourdan, Julian Bromwich, Heikki Koivikko