Patents by Inventor Lidror Troyansky

Lidror Troyansky has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11937930
    Abstract: Method, apparatus and product for providing cognitive state-based seamless stimuli. The method comprising: obtaining a cognitive state of a human subject; determining a target cognitive state for the human subject; determining, based on the cognitive state and the target cognitive state, a saliency level for a stimuli, wherein the saliency level is configured to cause the human subject to direct spatial attention to the stimuli, wherein the saliency level is configured to cause the stimuli to be seamless for the human subject given the cognitive state; and outputting the stimuli at the saliency level to be perceived by the human subject.
    Type: Grant
    Filed: September 25, 2020
    Date of Patent: March 26, 2024
    Assignee: ADAM COGTEC LTD.
    Inventors: Moti Salti, Lidror Troyansky, Erez Aluf
  • Publication number: 20230159046
    Abstract: A method, system and product including identifying, based on sensor information, a hazard in an environment of a user; determining a risk level of the hazard to the user, determining, based on the risk level, a stimuli configuration for presenting stimuli to the user, wherein the stimuli configuration defines a vector of notion having a location and a direction, wherein the location and the direction are determined based on a relative location of the hazard with respect to the user, wherein attributes of the stimuli are determined based on the risk level; and implementing the stimuli configuration, wherein said implementing comprises presenting the stimuli to the user.
    Type: Application
    Filed: March 29, 2021
    Publication date: May 25, 2023
    Inventors: Erez Aluf, Lidror Troyansky
  • Publication number: 20220095975
    Abstract: A method, a system, an apparatus and a computer program product, for detecting and monitoring cognitive capabilities pertain to driving. The method comprises applying a series of stimuli on a driver while is driving a vehicle. The series of stimuli comprises a first portion matching a pattern and a second portion deviating from the pattern, and configured to induce an ocular response from eyes of the driver. The method further comprises obtaining a set of images of the eyes of the driver, that are captured during the application of the series of stimuli. The method further comprises analyzing the set of images to determine a set of ocular features corresponding each image; and determining, based thereon, a cognitive state of the driver. Based on the cognitive state of the driver, a determination whether the driver is capable of operating the vehicle safely may be performed.
    Type: Application
    Filed: January 22, 2020
    Publication date: March 31, 2022
    Inventors: Erez ALUF, Lidror TROYANSKY
  • Publication number: 20210077006
    Abstract: Method, apparatus and product for providing cognitive state-based seamless stimuli. The method comprising: obtaining a cognitive state of a human subject; determining a target cognitive state for the human subject; determining, based on the cognitive state and the target cognitive state, a saliency level for a stimuli, wherein the saliency level is configured to cause the human subject to direct spatial attention to the stimuli, wherein the saliency level is configured to cause the stimuli to be seamless for the human subject given the cognitive state; and outputting the stimuli at the saliency level to be perceived by the human subject.
    Type: Application
    Filed: September 25, 2020
    Publication date: March 18, 2021
    Inventors: Moti SALTI, Lidror TROYANSKY, Erez ALUF
  • Patent number: 10733323
    Abstract: A method, system and computer-usable medium are disclosed for performing a privacy operation, comprising: monitoring user behavior via an Input/output collector, the Input/output collector capturing user/device interactions between a user and a device; determining whether the user/device interactions include sensitive personal information; obfuscating the sensitive personal information, the obfuscating preventing viewing of the sensitive personal information; storing obfuscated sensitive personal information within an obfuscated sensitive personal information repository; and, allowing access to the obfuscated sensitive personal information stored within the obfuscated sensitive personal information repository only when an administrator is authorized to access the obfuscated sensitive personal information so as to provide conditional sensitive personal information access.
    Type: Grant
    Filed: March 29, 2019
    Date of Patent: August 4, 2020
    Assignee: Forcepoint LLC
    Inventors: Richard A. Ford, Christopher B. Shirey, Jonathan B. Knepher, Lidror Troyansky
  • Publication number: 20190228181
    Abstract: A method, system and computer-usable medium are disclosed for performing a privacy operation, comprising: monitoring user behavior via an Input/output collector, the Input/output collector capturing user/device interactions between a user and a device; determining whether the user/device interactions include sensitive personal information; obfuscating the sensitive personal information, the obfuscating preventing viewing of the sensitive personal information; storing obfuscated sensitive personal information within an obfuscated sensitive personal information repository; and, allowing access to the obfuscated sensitive personal information stored within the obfuscated sensitive personal information repository only when an administrator is authorized to access the obfuscated sensitive personal information so as to provide conditional sensitive personal information access.
    Type: Application
    Filed: March 29, 2019
    Publication date: July 25, 2019
    Inventors: Richard A. Ford, Christopher B. Shirey, Jonathan B. Knepher, Lidror Troyansky
  • Patent number: 10318729
    Abstract: A method, system and computer-usable medium are disclosed for performing a privacy operation, comprising: monitoring user behavior via a data stream collector, the data stream collector capturing data streams resulting from user/device interactions between a user and a corresponding endpoint device; determining whether the data streams resulting from user/device interactions include sensitive personal information; obfuscating the sensitive personal information, the obfuscating preventing unauthorized viewing of the sensitive personal information; and, presenting the sensitive personal information as a sensitive personal information token indicating the data streams include sensitive personal information.
    Type: Grant
    Filed: August 2, 2017
    Date of Patent: June 11, 2019
    Assignee: Forcepoint, LLC
    Inventors: Richard A. Ford, Christopher B. Shirey, Jonathan B. Knepher, Lidror Troyansky
  • Patent number: 10262153
    Abstract: A method, system and computer-usable medium are disclosed for performing a privacy operation, comprising: monitoring user behavior via an Input/output collector, the Input/output collector capturing user/device interactions between a user and a device; determining whether the user/device interactions include sensitive personal information; obfuscating the sensitive personal information, the obfuscating preventing viewing of the sensitive personal information; storing obfuscated sensitive personal information within an obfuscated sensitive personal information repository; and, allowing access to the obfuscated sensitive personal information stored within the obfuscated sensitive personal information repository only when an administrator is authorized to access the obfuscated sensitive personal information so as to provide conditional sensitive personal information access.
    Type: Grant
    Filed: November 17, 2017
    Date of Patent: April 16, 2019
    Assignee: Forcepoint, LLC
    Inventors: Richard A. Ford, Christopher B. Shirey, Jonathan B. Knepher, Lidror Troyansky
  • Publication number: 20190034660
    Abstract: A method, system and computer-usable medium are disclosed for performing a privacy operation, comprising: monitoring user behavior via a data stream collector, the data stream collector capturing data streams resulting from user/device interactions between a user and a corresponding endpoint device; determining whether the data streams resulting from user/device interactions include sensitive personal information; obfuscating the sensitive personal information, the obfuscating preventing unauthorized viewing of the sensitive personal information; and, presenting the sensitive personal information as a sensitive personal information token indicating the data streams include sensitive personal information.
    Type: Application
    Filed: August 2, 2017
    Publication date: January 31, 2019
    Inventors: Richard A. Ford, Christopher B. Shirey, Jonathan B. Knepher, Lidror Troyansky
  • Publication number: 20190034657
    Abstract: A method, system and computer-usable medium are disclosed for performing a privacy operation, comprising: monitoring user behavior via an Input/output collector, the Input/output collector capturing user/device interactions between a user and a device; determining whether the user/device interactions include sensitive personal information; obfuscating the sensitive personal information, the obfuscating preventing viewing of the sensitive personal information; storing obfuscated sensitive personal information within an obfuscated sensitive personal information repository; and, allowing access to the obfuscated sensitive personal information stored within the obfuscated sensitive personal information repository only when an administrator is authorized to access the obfuscated sensitive personal information so as to provide conditional sensitive personal information access.
    Type: Application
    Filed: November 17, 2017
    Publication date: January 31, 2019
    Inventors: Richard A. Ford, Christopher B. Shirey, Jonathan B. Knepher, Lidror Troyansky
  • Patent number: 9692762
    Abstract: The disclosed embodiments provide systems, methods, and apparatus for efficient detection of fingerprinted content and relate generally to the field of information (or data) leak prevention. Particularly, a compact and efficient repository of fingerprint ingredients is used to analyze content and determine the content's similarity to previously fingerprinted content. Some embodiments employ probabilistic indications regarding the existence of fingerprint ingredients in the repository.
    Type: Grant
    Filed: September 4, 2015
    Date of Patent: June 27, 2017
    Assignee: Websense, LLC
    Inventors: Roy Barkan, David Lazarov, Yevgeny Menaker, Lidror Troyansky
  • Patent number: 9495539
    Abstract: A system and method for identifying infection of unwanted software on an electronic device is disclosed. A software agent configured to generate a bait and is installed on the electronic device. The bait can simulate a situation in which the user performs a login session and submits personal information or it may just contain artificial sensitive information. Parameters may be inserted into the bait such as the identity of the electronic device that the bait is installed upon. The output of the electronic device is monitored and analyzed for attempts of transmitting the bait. The output is analyzed by correlating the output with the bait and can be done by comparing information about the bait with the traffic over a computer network in order to decide about the existence and the location of unwanted software.
    Type: Grant
    Filed: April 16, 2015
    Date of Patent: November 15, 2016
    Assignee: Websense, LLC
    Inventors: Lidror Troyansky, Sharon Bruckner, Daniel Lyle Hubbard
  • Patent number: 9473521
    Abstract: A method for mitigating false positive type errors while applying an information leak prevention policy to identify important information and to prevent outward leakage. A positive criterion is defined for a positive set, and a negative criterion for a negative set of benign traffic. An ambiguity set contains items showing indications for both positive and negative sets. An ambiguity resolution criterion allows ambiguous items to be placed in/removed from the positive set or negative set. Each information item is searched for matches with the positive set. Each item in the positive set is checked for membership in the ambiguity set. The ambiguity resolution criteria are used for each member of the ambiguity set and to remove items from the positive set accordingly. The leak prevention policy is applied for all items remaining in the positive set thus protecting the important information.
    Type: Grant
    Filed: May 13, 2013
    Date of Patent: October 18, 2016
    Assignee: PortAuthority Technologies, LLC
    Inventors: Lidror Troyansky, Assaf Litai, Sharon Bruckner
  • Patent number: 9455981
    Abstract: A system and method for identifying infection of unwanted software on an electronic device is disclosed. A software agent configured to generate a bait and is installed on the electronic device. The bait can simulate a situation in which the user performs a login session and submits personal information or it may just contain artificial sensitive information. The output of the electronic device is monitored and analyzed for attempts of transmitting the bait. The output is analyzed by correlating the output with the bait and can be done by comparing information about the bait with the traffic over a computer network in order to decide about the existence and the location of unwanted software.
    Type: Grant
    Filed: September 4, 2015
    Date of Patent: September 27, 2016
    Assignee: Forcepoint, LLC
    Inventor: Lidror Troyansky
  • Patent number: 9348984
    Abstract: A method for computer workstation based information protection is presented, the method comprises: a) monitoring user's actions on the computer workstation, b) analysis of the actions in respect to a pre-defined policy to determine whether the actions prejudice information to which the policy applies, and c) executing the policy in accordance with the results of the analysis to prevent or modify or restrict or monitor or log the actions.
    Type: Grant
    Filed: February 13, 2012
    Date of Patent: May 24, 2016
    Assignee: PortAuthority Technologies, Inc.
    Inventors: Ariel Peled, Lidror Troyansky, Ofir Carny
  • Publication number: 20150381626
    Abstract: The disclosed embodiments provide systems, methods, and apparatus for efficient detection of fingerprinted content and relate generally to the field of information (or data) leak prevention. Particularly, a compact and efficient repository of fingerprint ingredients is used to analyze content and determine the content's similarity to previously fingerprinted content. Some embodiments employ probabilistic indications regarding the existence of fingerprint ingredients in the repository.
    Type: Application
    Filed: September 4, 2015
    Publication date: December 31, 2015
    Inventors: Roy Barkan, David Lazarov, Yevgeny Menaker, Lidror Troyansky
  • Publication number: 20150381604
    Abstract: A system and method for identifying infection of unwanted software on an electronic device is disclosed. A software agent configured to generate a bait and is installed on the electronic device. The bait can simulate a situation in which the user performs a login session and submits personal information or it may just contain artificial sensitive information. Parameters may be inserted into the bait such as the identity of the electronic device that the bait is installed upon. The output of the electronic device is monitored and analyzed for attempts of transmitting the bait. The output is analyzed by correlating the output with the bait and can be done by comparing information about the bait with the traffic over a computer network in order to decide about the existence and the location of unwanted software.
    Type: Application
    Filed: September 4, 2015
    Publication date: December 31, 2015
    Inventor: Lidror Troyansky
  • Patent number: 9177120
    Abstract: A system for external monitoring of networked digital file sharing to track predetermined data content, the system comprising: at least one surveillance element for deployment over said network, said surveillance elements comprising: surveillance functionality for searching said digital file sharing and identification functionality associated with said search functionality for identification of said predetermined data content, therewith to determine whether a given file sharing system is distributing said predetermined data content.
    Type: Grant
    Filed: July 25, 2012
    Date of Patent: November 3, 2015
    Assignee: PortAuthority Technologies, Inc.
    Inventors: Ariel Peled, Ofir Carny, Arik Baratz, Oded Arbel, Lidror Troyansky
  • Patent number: 9130972
    Abstract: The disclosed embodiments provide systems, methods, and apparatus for efficient detection of fingerprinted content and relate generally to the field of information (or data) leak prevention. Particularly, a compact and efficient repository of fingerprint ingredients is used to analyze content and determine the content's similarity to previously fingerprinted content. Some embodiments employ probabilistic indications regarding the existence of fingerprint ingredients in the repository.
    Type: Grant
    Filed: May 24, 2010
    Date of Patent: September 8, 2015
    Assignee: WEBSENSE, INC.
    Inventors: Roy Barkan, David Lazarov, Yevgeny Menaker, Lidror Troyansky
  • Patent number: 9130986
    Abstract: A system and method for identifying infection of unwanted software on an electronic device is disclosed. A software agent configured to generate a bait and is installed on the electronic device. The bait can simulate a situation in which the user performs a login session and submits personal information or it may just contain artificial sensitive information. Parameters may be inserted into the bait such as the identity of the electronic device that the bait is installed upon. The output of the electronic device is monitored and analyzed for attempts of transmitting the bait. The output is analyzed by correlating the output with the bait and can be done by comparing information about the bait with the traffic over a computer network in order to decide about the existence and the location of unwanted software.
    Type: Grant
    Filed: March 19, 2008
    Date of Patent: September 8, 2015
    Assignee: Websense, Inc.
    Inventor: Lidror Troyansky