Patents by Inventor Lidror Troyansky
Lidror Troyansky has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11937930Abstract: Method, apparatus and product for providing cognitive state-based seamless stimuli. The method comprising: obtaining a cognitive state of a human subject; determining a target cognitive state for the human subject; determining, based on the cognitive state and the target cognitive state, a saliency level for a stimuli, wherein the saliency level is configured to cause the human subject to direct spatial attention to the stimuli, wherein the saliency level is configured to cause the stimuli to be seamless for the human subject given the cognitive state; and outputting the stimuli at the saliency level to be perceived by the human subject.Type: GrantFiled: September 25, 2020Date of Patent: March 26, 2024Assignee: ADAM COGTEC LTD.Inventors: Moti Salti, Lidror Troyansky, Erez Aluf
-
Publication number: 20230159046Abstract: A method, system and product including identifying, based on sensor information, a hazard in an environment of a user; determining a risk level of the hazard to the user, determining, based on the risk level, a stimuli configuration for presenting stimuli to the user, wherein the stimuli configuration defines a vector of notion having a location and a direction, wherein the location and the direction are determined based on a relative location of the hazard with respect to the user, wherein attributes of the stimuli are determined based on the risk level; and implementing the stimuli configuration, wherein said implementing comprises presenting the stimuli to the user.Type: ApplicationFiled: March 29, 2021Publication date: May 25, 2023Inventors: Erez Aluf, Lidror Troyansky
-
Publication number: 20220095975Abstract: A method, a system, an apparatus and a computer program product, for detecting and monitoring cognitive capabilities pertain to driving. The method comprises applying a series of stimuli on a driver while is driving a vehicle. The series of stimuli comprises a first portion matching a pattern and a second portion deviating from the pattern, and configured to induce an ocular response from eyes of the driver. The method further comprises obtaining a set of images of the eyes of the driver, that are captured during the application of the series of stimuli. The method further comprises analyzing the set of images to determine a set of ocular features corresponding each image; and determining, based thereon, a cognitive state of the driver. Based on the cognitive state of the driver, a determination whether the driver is capable of operating the vehicle safely may be performed.Type: ApplicationFiled: January 22, 2020Publication date: March 31, 2022Inventors: Erez ALUF, Lidror TROYANSKY
-
Publication number: 20210077006Abstract: Method, apparatus and product for providing cognitive state-based seamless stimuli. The method comprising: obtaining a cognitive state of a human subject; determining a target cognitive state for the human subject; determining, based on the cognitive state and the target cognitive state, a saliency level for a stimuli, wherein the saliency level is configured to cause the human subject to direct spatial attention to the stimuli, wherein the saliency level is configured to cause the stimuli to be seamless for the human subject given the cognitive state; and outputting the stimuli at the saliency level to be perceived by the human subject.Type: ApplicationFiled: September 25, 2020Publication date: March 18, 2021Inventors: Moti SALTI, Lidror TROYANSKY, Erez ALUF
-
Patent number: 10733323Abstract: A method, system and computer-usable medium are disclosed for performing a privacy operation, comprising: monitoring user behavior via an Input/output collector, the Input/output collector capturing user/device interactions between a user and a device; determining whether the user/device interactions include sensitive personal information; obfuscating the sensitive personal information, the obfuscating preventing viewing of the sensitive personal information; storing obfuscated sensitive personal information within an obfuscated sensitive personal information repository; and, allowing access to the obfuscated sensitive personal information stored within the obfuscated sensitive personal information repository only when an administrator is authorized to access the obfuscated sensitive personal information so as to provide conditional sensitive personal information access.Type: GrantFiled: March 29, 2019Date of Patent: August 4, 2020Assignee: Forcepoint LLCInventors: Richard A. Ford, Christopher B. Shirey, Jonathan B. Knepher, Lidror Troyansky
-
Publication number: 20190228181Abstract: A method, system and computer-usable medium are disclosed for performing a privacy operation, comprising: monitoring user behavior via an Input/output collector, the Input/output collector capturing user/device interactions between a user and a device; determining whether the user/device interactions include sensitive personal information; obfuscating the sensitive personal information, the obfuscating preventing viewing of the sensitive personal information; storing obfuscated sensitive personal information within an obfuscated sensitive personal information repository; and, allowing access to the obfuscated sensitive personal information stored within the obfuscated sensitive personal information repository only when an administrator is authorized to access the obfuscated sensitive personal information so as to provide conditional sensitive personal information access.Type: ApplicationFiled: March 29, 2019Publication date: July 25, 2019Inventors: Richard A. Ford, Christopher B. Shirey, Jonathan B. Knepher, Lidror Troyansky
-
Patent number: 10318729Abstract: A method, system and computer-usable medium are disclosed for performing a privacy operation, comprising: monitoring user behavior via a data stream collector, the data stream collector capturing data streams resulting from user/device interactions between a user and a corresponding endpoint device; determining whether the data streams resulting from user/device interactions include sensitive personal information; obfuscating the sensitive personal information, the obfuscating preventing unauthorized viewing of the sensitive personal information; and, presenting the sensitive personal information as a sensitive personal information token indicating the data streams include sensitive personal information.Type: GrantFiled: August 2, 2017Date of Patent: June 11, 2019Assignee: Forcepoint, LLCInventors: Richard A. Ford, Christopher B. Shirey, Jonathan B. Knepher, Lidror Troyansky
-
Patent number: 10262153Abstract: A method, system and computer-usable medium are disclosed for performing a privacy operation, comprising: monitoring user behavior via an Input/output collector, the Input/output collector capturing user/device interactions between a user and a device; determining whether the user/device interactions include sensitive personal information; obfuscating the sensitive personal information, the obfuscating preventing viewing of the sensitive personal information; storing obfuscated sensitive personal information within an obfuscated sensitive personal information repository; and, allowing access to the obfuscated sensitive personal information stored within the obfuscated sensitive personal information repository only when an administrator is authorized to access the obfuscated sensitive personal information so as to provide conditional sensitive personal information access.Type: GrantFiled: November 17, 2017Date of Patent: April 16, 2019Assignee: Forcepoint, LLCInventors: Richard A. Ford, Christopher B. Shirey, Jonathan B. Knepher, Lidror Troyansky
-
Publication number: 20190034660Abstract: A method, system and computer-usable medium are disclosed for performing a privacy operation, comprising: monitoring user behavior via a data stream collector, the data stream collector capturing data streams resulting from user/device interactions between a user and a corresponding endpoint device; determining whether the data streams resulting from user/device interactions include sensitive personal information; obfuscating the sensitive personal information, the obfuscating preventing unauthorized viewing of the sensitive personal information; and, presenting the sensitive personal information as a sensitive personal information token indicating the data streams include sensitive personal information.Type: ApplicationFiled: August 2, 2017Publication date: January 31, 2019Inventors: Richard A. Ford, Christopher B. Shirey, Jonathan B. Knepher, Lidror Troyansky
-
Publication number: 20190034657Abstract: A method, system and computer-usable medium are disclosed for performing a privacy operation, comprising: monitoring user behavior via an Input/output collector, the Input/output collector capturing user/device interactions between a user and a device; determining whether the user/device interactions include sensitive personal information; obfuscating the sensitive personal information, the obfuscating preventing viewing of the sensitive personal information; storing obfuscated sensitive personal information within an obfuscated sensitive personal information repository; and, allowing access to the obfuscated sensitive personal information stored within the obfuscated sensitive personal information repository only when an administrator is authorized to access the obfuscated sensitive personal information so as to provide conditional sensitive personal information access.Type: ApplicationFiled: November 17, 2017Publication date: January 31, 2019Inventors: Richard A. Ford, Christopher B. Shirey, Jonathan B. Knepher, Lidror Troyansky
-
Patent number: 9692762Abstract: The disclosed embodiments provide systems, methods, and apparatus for efficient detection of fingerprinted content and relate generally to the field of information (or data) leak prevention. Particularly, a compact and efficient repository of fingerprint ingredients is used to analyze content and determine the content's similarity to previously fingerprinted content. Some embodiments employ probabilistic indications regarding the existence of fingerprint ingredients in the repository.Type: GrantFiled: September 4, 2015Date of Patent: June 27, 2017Assignee: Websense, LLCInventors: Roy Barkan, David Lazarov, Yevgeny Menaker, Lidror Troyansky
-
Patent number: 9495539Abstract: A system and method for identifying infection of unwanted software on an electronic device is disclosed. A software agent configured to generate a bait and is installed on the electronic device. The bait can simulate a situation in which the user performs a login session and submits personal information or it may just contain artificial sensitive information. Parameters may be inserted into the bait such as the identity of the electronic device that the bait is installed upon. The output of the electronic device is monitored and analyzed for attempts of transmitting the bait. The output is analyzed by correlating the output with the bait and can be done by comparing information about the bait with the traffic over a computer network in order to decide about the existence and the location of unwanted software.Type: GrantFiled: April 16, 2015Date of Patent: November 15, 2016Assignee: Websense, LLCInventors: Lidror Troyansky, Sharon Bruckner, Daniel Lyle Hubbard
-
Patent number: 9473521Abstract: A method for mitigating false positive type errors while applying an information leak prevention policy to identify important information and to prevent outward leakage. A positive criterion is defined for a positive set, and a negative criterion for a negative set of benign traffic. An ambiguity set contains items showing indications for both positive and negative sets. An ambiguity resolution criterion allows ambiguous items to be placed in/removed from the positive set or negative set. Each information item is searched for matches with the positive set. Each item in the positive set is checked for membership in the ambiguity set. The ambiguity resolution criteria are used for each member of the ambiguity set and to remove items from the positive set accordingly. The leak prevention policy is applied for all items remaining in the positive set thus protecting the important information.Type: GrantFiled: May 13, 2013Date of Patent: October 18, 2016Assignee: PortAuthority Technologies, LLCInventors: Lidror Troyansky, Assaf Litai, Sharon Bruckner
-
Patent number: 9455981Abstract: A system and method for identifying infection of unwanted software on an electronic device is disclosed. A software agent configured to generate a bait and is installed on the electronic device. The bait can simulate a situation in which the user performs a login session and submits personal information or it may just contain artificial sensitive information. The output of the electronic device is monitored and analyzed for attempts of transmitting the bait. The output is analyzed by correlating the output with the bait and can be done by comparing information about the bait with the traffic over a computer network in order to decide about the existence and the location of unwanted software.Type: GrantFiled: September 4, 2015Date of Patent: September 27, 2016Assignee: Forcepoint, LLCInventor: Lidror Troyansky
-
Patent number: 9348984Abstract: A method for computer workstation based information protection is presented, the method comprises: a) monitoring user's actions on the computer workstation, b) analysis of the actions in respect to a pre-defined policy to determine whether the actions prejudice information to which the policy applies, and c) executing the policy in accordance with the results of the analysis to prevent or modify or restrict or monitor or log the actions.Type: GrantFiled: February 13, 2012Date of Patent: May 24, 2016Assignee: PortAuthority Technologies, Inc.Inventors: Ariel Peled, Lidror Troyansky, Ofir Carny
-
Publication number: 20150381626Abstract: The disclosed embodiments provide systems, methods, and apparatus for efficient detection of fingerprinted content and relate generally to the field of information (or data) leak prevention. Particularly, a compact and efficient repository of fingerprint ingredients is used to analyze content and determine the content's similarity to previously fingerprinted content. Some embodiments employ probabilistic indications regarding the existence of fingerprint ingredients in the repository.Type: ApplicationFiled: September 4, 2015Publication date: December 31, 2015Inventors: Roy Barkan, David Lazarov, Yevgeny Menaker, Lidror Troyansky
-
Publication number: 20150381604Abstract: A system and method for identifying infection of unwanted software on an electronic device is disclosed. A software agent configured to generate a bait and is installed on the electronic device. The bait can simulate a situation in which the user performs a login session and submits personal information or it may just contain artificial sensitive information. Parameters may be inserted into the bait such as the identity of the electronic device that the bait is installed upon. The output of the electronic device is monitored and analyzed for attempts of transmitting the bait. The output is analyzed by correlating the output with the bait and can be done by comparing information about the bait with the traffic over a computer network in order to decide about the existence and the location of unwanted software.Type: ApplicationFiled: September 4, 2015Publication date: December 31, 2015Inventor: Lidror Troyansky
-
Patent number: 9177120Abstract: A system for external monitoring of networked digital file sharing to track predetermined data content, the system comprising: at least one surveillance element for deployment over said network, said surveillance elements comprising: surveillance functionality for searching said digital file sharing and identification functionality associated with said search functionality for identification of said predetermined data content, therewith to determine whether a given file sharing system is distributing said predetermined data content.Type: GrantFiled: July 25, 2012Date of Patent: November 3, 2015Assignee: PortAuthority Technologies, Inc.Inventors: Ariel Peled, Ofir Carny, Arik Baratz, Oded Arbel, Lidror Troyansky
-
Patent number: 9130972Abstract: The disclosed embodiments provide systems, methods, and apparatus for efficient detection of fingerprinted content and relate generally to the field of information (or data) leak prevention. Particularly, a compact and efficient repository of fingerprint ingredients is used to analyze content and determine the content's similarity to previously fingerprinted content. Some embodiments employ probabilistic indications regarding the existence of fingerprint ingredients in the repository.Type: GrantFiled: May 24, 2010Date of Patent: September 8, 2015Assignee: WEBSENSE, INC.Inventors: Roy Barkan, David Lazarov, Yevgeny Menaker, Lidror Troyansky
-
Patent number: 9130986Abstract: A system and method for identifying infection of unwanted software on an electronic device is disclosed. A software agent configured to generate a bait and is installed on the electronic device. The bait can simulate a situation in which the user performs a login session and submits personal information or it may just contain artificial sensitive information. Parameters may be inserted into the bait such as the identity of the electronic device that the bait is installed upon. The output of the electronic device is monitored and analyzed for attempts of transmitting the bait. The output is analyzed by correlating the output with the bait and can be done by comparing information about the bait with the traffic over a computer network in order to decide about the existence and the location of unwanted software.Type: GrantFiled: March 19, 2008Date of Patent: September 8, 2015Assignee: Websense, Inc.Inventor: Lidror Troyansky