Patents by Inventor Lidror Troyansky

Lidror Troyansky has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 7920298
    Abstract: According to a first aspect of the present invention, a method for enforcing a distribution policy with respect to information transmitted from a sending fax machine to a recipient fax machine as fax traffic is presented. The method comprising defining an information distribution policy with respect to the fax traffic, then monitoring the fax traffic in accordance with the distribution policy, where the monitoring comprising: (i) de-modulating the fax traffic being monitored into a digital stream; (ii) reconstructing from the digital stream a graphic image representing at least part of the information within the fax traffic; and (iii) analyzing information within the reconstructed image, and then applying the distribution policy with respect to the analyzed fax traffic.
    Type: Grant
    Filed: December 7, 2009
    Date of Patent: April 5, 2011
    Assignee: PortAuthority Technologies Inc.
    Inventors: Ariel Peled, Guy Lupo, Lidror Troyansky, Arik Baratz, Ofir Carny, Oren Tirosh
  • Publication number: 20110035805
    Abstract: The disclosed embodiments provide systems, methods, and apparatus for efficient detection of fingerprinted content and relate generally to the field of information (or data) leak prevention. Particularly, a compact and efficient repository of fingerprint ingredients is used to analyze content and determine the content's similarity to previously fingerprinted content. Some embodiments employ probabilistic indications regarding the existence of fingerprint ingredients in the repository.
    Type: Application
    Filed: May 24, 2010
    Publication date: February 10, 2011
    Applicant: WEBSENSE, INC.
    Inventors: Roy Barkan, David Lazarov, Yevgeny Menaker, Lidror Troyansky
  • Patent number: 7859725
    Abstract: A method for enforcing a distribution policy associated with an electronic document comprising the steps of: sending the document to an output device; determining said distribution policy associated with said document; instructing a marking module to embed a marking indicating at least the existence of said distribution policy on an output form of said electronic document produced by said output device, said marking being readable to enforce said associated marking policy.
    Type: Grant
    Filed: December 18, 2007
    Date of Patent: December 28, 2010
    Assignee: PortAuthority Technologies Inc.
    Inventors: Lidror Troyansky, Ofir Carny, Ariel Peled
  • Publication number: 20100085593
    Abstract: According to a first aspect of the present invention, a method for enforcing a distribution policy with respect to information transmitted from a sending fax machine to a recipient fax machine as fax traffic is presented. The method comprising defining an information distribution policy with respect to the fax traffic, then monitoring the fax traffic in accordance with the distribution policy, where the monitoring comprising: (i) de-modulating the fax traffic being monitored into a digital stream; (ii) reconstructing from the digital stream a graphic image representing at least part of the information within the fax traffic; and (iii) analyzing information within the reconstructed image, and then applying the distribution policy with respect to the analyzed fax traffic.
    Type: Application
    Filed: December 7, 2009
    Publication date: April 8, 2010
    Applicant: PortAuthority Technologies Inc.
    Inventors: Ariel PELED, Guy LUPO, Lidror TROYANSKY, Arik BARATZ, Ofir CARNY, Oren TIROSH
  • Patent number: 7681032
    Abstract: A system for network content monitoring and control, comprising: a transport data monitor, connectable to a point in a network, for monitoring data being transported past said point, a signature extractor, associated with said transport data monitor, for extracting a derivation of said data, said derivation being indicative of content of said payload, a database of preobtained signatures of content whose movements it is desired to monitor, and a comparator for comparing said derivation with said preobtained signatures, thereby to determine whether said payload comprises any of said content whose movements it is desired to monitor. The monitoring result may be used in bandwidth control on the network to restrict transport of the content it is desired to control.
    Type: Grant
    Filed: December 6, 2001
    Date of Patent: March 16, 2010
    Assignee: PortAuthority Technologies Inc.
    Inventors: Ariel Peled, Lidror Troyansky, Ofir Carny, Oren Tirosh, Guy Roglit, Gallt Gutman
  • Publication number: 20100057906
    Abstract: A system for external monitoring of networked digital file sharing to track predetermined data content, the system comprising: at least one surveillance element for deployment over said network, said surveillance elements comprising: surveillance functionality for searching said digital file sharing and identification functionality associated with said search functionality for identification of said predetermined data content, therewith to determine whether a given file sharing system is distributing said predetermined data content.
    Type: Application
    Filed: November 10, 2009
    Publication date: March 4, 2010
    Applicant: PortAuthority Technologies, Inc.
    Inventors: Ariel PELED, Ofir CARNY, Arik BARATZ, Oded ARBEL, Lidror TROYANSKY
  • Patent number: 7669225
    Abstract: A method and apparatus for providing multi-domain control over a digital data item via a first domain security policy assigned to the digital data item at a first domain, the data item being transferred from the first domain to a second domain, the second domain being autonomous from the first domain in respect of security policies. The method comprises assigning the security policy to the digital item within the first domain; transferring the digital items to the second domain together with data defining the first domain security policy; analyzing the first domain security policy within the second domain; and distributing and/or allowing usage of the digital items within the second domain in accordance with analyzed first domain security policy, and/or reporting breaches or attempted breaches of the policy.
    Type: Grant
    Filed: May 6, 2004
    Date of Patent: February 23, 2010
    Assignee: PortAuthority Technologies Inc.
    Inventors: Ariel Peled, Guy Lupo, Lidror Troyansky
  • Publication number: 20100023754
    Abstract: A system for network content monitoring and control, comprising: a transport data monitor, connectable to a point in a network, for monitoring data being transported past said point, a signature extractor, associated with said transport data monitor, for extracting a derivation of said data, said derivation being indicative of content of said payload, a database of preobtained signatures of content whose movements it is desired to monitor, and a comparator for comparing said derivation with said preobtained signatures, thereby to determine whether said payload comprises any of said content whose movements it is desired to monitor. The monitoring result may be used in bandwidth control on the network to restrict transport of the content it is desired to control.
    Type: Application
    Filed: October 7, 2009
    Publication date: January 28, 2010
    Applicant: PortAuthority Technologies Inc.
    Inventors: Ariel PELED, Lidror Troyansky, Ofir Carny, Oren Tirosh, Guy Roglit, Galit Gutman
  • Patent number: 7643164
    Abstract: According to a first aspect of the present invention, a method for enforcing a distribution policy with respect to information transmitted from a sending fax machine to a recipient fax machine as fax traffic is presented. The method comprising defining an information distribution policy with respect to the fax traffic, then monitoring the fax traffic in accordance with the distribution policy, where the monitoring comprising: (i) de-modulating the fax traffic being monitored into a digital stream; (ii) reconstructing from the digital stream a graphic image representing at least part of the information within the fax traffic; and (iii) analyzing information within the reconstructed image, and then applying the distribution policy with respect to the analyzed fax traffic.
    Type: Grant
    Filed: February 27, 2004
    Date of Patent: January 5, 2010
    Assignee: PortAuthority Technologies Inc.
    Inventors: Ariel Peled, Guy Lupo, Lidror Troyansky, Arik Baratz, Ofir Carny, Oren Tirosh
  • Patent number: 7636947
    Abstract: A method for distributed management of phrase-based security policy, the security policy applied with respect to a digital medium, the method comprising: storing at least one phrase together with accompanying security policy; assigning an owner to at least one of the stored phrases; scanning and analyzing the digital medium in order to locate and identify the at least one stored phrase; upon locating the at least one phrase within a digital item in the digital medium: applying the security policy with respect to the digital item, and notifying the owner.
    Type: Grant
    Filed: June 3, 2004
    Date of Patent: December 22, 2009
    Assignee: PortAuthority Technologies Inc.
    Inventors: Ariel Peled, Lidror Troyansky, Guy Lupo, Ofir Carny
  • Patent number: 7627897
    Abstract: A system for external monitoring of networked digital file sharing to track predetermined data content, the system comprising: at least one surveillance element for deployment over said network, said surveillance elements comprising: surveillance functionality for searching said digital file sharing and identification functionality associated with said search functionality for identification of said predetermined data content, therewith to determine whether a given file sharing system is distributing said predetermined data content.
    Type: Grant
    Filed: July 3, 2001
    Date of Patent: December 1, 2009
    Assignee: PortAuthority Technologies Inc.
    Inventors: Ariel Peled, Ofir Carny, Arik Baratz, Oded Arbel, Lidror Troyansky
  • Patent number: 7610324
    Abstract: A method for the detection and estimation of periodicities in noisy signals. First the signal is sampled and preprocessed in a discrete succession of equal periods. Then, short term characteristics vectors are generated for each period. The short term characteristics vectors are then grouped into sets, followed by the obtainment of at least one representative vector for each set. Periodic structures are estimated using the representative vectors. In a preferred embodiment, the short term characteristics are the the short term spectra of the signal. Practically, an autocorrelation matrix is constructed to assess autocorrelation along a diagonal.
    Type: Grant
    Filed: July 8, 2004
    Date of Patent: October 27, 2009
    Inventors: Lidror Troyansky, Arnon Breuer
  • Publication number: 20090241187
    Abstract: A system and method for identifying infection of unwanted software on an electronic device is disclosed. A software agent configured to generate a bait and is installed on the electronic device. The bait can simulate a situation in which the user performs a login session and submits personal information or it may just contain artificial sensitive information. Parameters may be inserted into the bait such as the identity of the electronic device that the bait is installed upon. The output of the electronic device is monitored and analyzed for attempts of transmitting the bait. The output is analyzed by correlating the output with the bait and can be done by comparing information about the bait with the traffic over a computer network in order to decide about the existence and the location of unwanted software.
    Type: Application
    Filed: March 19, 2008
    Publication date: September 24, 2009
    Applicant: Websense, Inc.
    Inventor: Lidror Troyansky
  • Publication number: 20090241196
    Abstract: A system and method for identifying infection of unwanted software on an electronic device is disclosed. A software agent configured to generate a bait and is installed on the electronic device. The bait can simulate a situation in which the user performs a login session and submits personal information or it may just contain artificial sensitive information. Parameters may be inserted into the bait such as the identity of the electronic device that the bait is installed upon. The output of the electronic device is monitored and analyzed for attempts of transmitting the bait. The output is analyzed by correlating the output with the bait and can be done by comparing information about the bait with the traffic over a computer network in order to decide about the existence and the location of unwanted software.
    Type: Application
    Filed: March 19, 2008
    Publication date: September 24, 2009
    Applicant: Websense, Inc.
    Inventors: Lidror Troyansky, Sharon Bruckner, Daniel Lyle Hubbard
  • Publication number: 20090241197
    Abstract: A system and method for determining an intent of a sender in transmitting electronic information in order to prevent unauthorized dissemination of electronic information is disclosed. The system and method facilitate cost-effective handling of dissemination events and comprise a traffic analyzer configured to analyze descriptors of the electronic information and parameters of the transmission of the electronic information in order to determine the intent of the sender. By determining the intent of the sender, it is possible to effectively quarantine the electronic information before it is disseminated.
    Type: Application
    Filed: March 19, 2008
    Publication date: September 24, 2009
    Applicant: Websense, Inc.
    Inventor: Lidror Troyansky
  • Publication number: 20090241173
    Abstract: A system and method for identifying infection of unwanted software on an electronic device is disclosed. A software agent configured to generate a bait and is installed on the electronic device. The bait can simulate a situation in which the user performs a login session and submits personal information or it may just contain artificial sensitive information. Parameters may be inserted into the bait such as the identity of the electronic device that the bait is installed upon. The output of the electronic device is monitored and analyzed for attempts of transmitting the bait. The output is analyzed by correlating the output with the bait and can be done by comparing information about the bait with the traffic over a computer network in order to decide about the existence and the location of unwanted software.
    Type: Application
    Filed: March 19, 2008
    Publication date: September 24, 2009
    Applicant: Websense, Inc.
    Inventor: Lidror Troyansky
  • Patent number: 7496197
    Abstract: A method for robust embedding of information into video content, said method comprising of breaking said video content into a series of at least one unit; selecting at least one of said units; selecting at least one parameter for at least one of said units and performing at least one geometric transformation on said selected units according to said parameters selected for said unit, thereby to embed said information in said video content.
    Type: Grant
    Filed: June 14, 2002
    Date of Patent: February 24, 2009
    Assignee: PortAuthority Technologies Inc.
    Inventors: Lidror Troyansky, Ofir Carny
  • Patent number: 7493650
    Abstract: A method for determining compliance with a data distribution or usage policy applied with respect to a digital medium is presented. The method comprising: assigning numerical values to breaches of the policy; assigning a quota of breaches of the policy to at least one user subjected to the policy, the quota being expressed in terms of the numerical value; monitoring information distribution or usage covered by the policy in order to detect breaches of the policy by users; upon detection of an action breaching the policy by a given one of the users: determining whether a numerical value has been assigned to the type of the breach; comparing the numerical value assigned to the type of breach with a respective quota assigned to the given user, and allowing the action to be executed only if the comparing indicates that the respective quota assigned to the given user is sufficient to cover the breach.
    Type: Grant
    Filed: July 1, 2004
    Date of Patent: February 17, 2009
    Assignee: PortAuthority Technologies Inc.
    Inventors: Ariel Peled, Lidror Troyansky, Ofir Carny
  • Publication number: 20080094654
    Abstract: A method for enforcing a distribution policy associated with an electronic document comprising the steps of: sending the document to an output device; determining said distribution policy associated with said document; instructing a marking module to embed a marking indicating at least the existence of said distribution policy on an output form of said electronic document produced by said output device, said marking being readable to enforce said associated marking policy.
    Type: Application
    Filed: December 18, 2007
    Publication date: April 24, 2008
    Applicant: PortAuthority Technologies Inc.
    Inventors: Lidror Troyansky, Ofir Carny, Ariel Peled
  • Patent number: 7350228
    Abstract: A method for secure distribution of digital content to an untrusted environment, comprising the steps of; constructing a relatively trusted environment within the untrusted environment; constructing at least two digital inputs, the digital inputs are operable in order to reproduce the digital content; transferring digital media to the relatively trusted environment such that each of the inputs is transmitted via a different path, and combining the inputs in order to reproduce the digital content.
    Type: Grant
    Filed: January 22, 2002
    Date of Patent: March 25, 2008
    Assignee: PortAuthority Technologies Inc.
    Inventors: Ariel Peled, Ofir Carny, Lidror Troyansky, Arik Baratz, Oded Arbel