Patents by Inventor Martin Soukup

Martin Soukup has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20230367704
    Abstract: A method for a testing system to perform fuzzy testing of a software system, wherein the software system comprises a plurality of callable units and is arranged to receive input for the software system to process, the method comprising: determining, for each callable unit of the plurality of callable units, based on one or more security vulnerability metrics, a target number of times that callable unit is to be tested; initializing a ranked plurality of queues, each queue for storing one or more seeds, said initializing comprising storing one or more initial seeds in a corresponding queue of the ranked plurality of queues; performing a sequence of tests, wherein performing each test comprises: obtaining a seed from the highest ranked non-empty queue; performing a mutation process on the obtained seed to generate a test seed, wherein the mutation process is configured, at least in part, by mutation guidance information; providing the test seed as input to the software system for the software system to process;
    Type: Application
    Filed: May 9, 2023
    Publication date: November 16, 2023
    Inventors: Martin Soukup, Daniel Murdock, Lama Moukahal, Mohammad Zulkernine
  • Patent number: 11637835
    Abstract: Methods and systems for providing secure digital access to services are described. Embodiments include user behavior tracking, learning, and updating one or more contextual access algorithms and thereafter can act as multi-factor authentications. The method may include receiving data for a group of users and initializing a machine learning algorithm with the group data. The method may also collect individual user data and context data periodically, including characteristic behavior data, and update the machine learning algorithm with the individual user data. The method may further calculate a threshold for tolerance based on the updated algorithm, and verify user requests for access to the service. A multi-factor authentication may be presented to the user when the verifications are not acceptable, such as by being below a threshold. A permissions data structure can be generated and used to control access to the service.
    Type: Grant
    Filed: June 17, 2020
    Date of Patent: April 25, 2023
    Assignee: Irdeto B.V.
    Inventors: Clifford Liem, Martin Soukup, Daniel Murdock
  • Publication number: 20230122660
    Abstract: There is disclosed heat pump, comprising: an internal heat exchanger configured to transfer heat from refrigerant in a liquid line pathway to refrigerant in a suction line pathway, to superheat the refrigerant upstream of a compressor; and a controller configured to: control an expansion valve to maintain a target superheat of refrigerant at a control location. The target superheat is variable and is determined based on one or more operating conditions of the heat pump. There is also disclosed a method of operating a heat pump and a simulation method to determine a variable superheat.
    Type: Application
    Filed: October 19, 2022
    Publication date: April 20, 2023
    Inventors: Pavel HOUDEK, Martin GALANSKY, Martin SOUKUP
  • Publication number: 20220292351
    Abstract: Disclosed implementations include a depth generation method using a novel teacher-student GAN architecture (TS-GAN) to generate depth images for 2-D images, such as RGB images, where no corresponding depth information is available. An example model consists of two components, a teacher and a student. The teacher consists of a fully convolutional encoder-decoder network as a generator along with a fully convolution classification network as the discriminator. The generator takes 2-D images as inputs and aims to output the corresponding depth images. The teacher learns an initial latent mapping between 2-dimensional and co-registered depth images and the student applies the latent mapping to provide feedback to the classification network for refinement.
    Type: Application
    Filed: March 9, 2022
    Publication date: September 15, 2022
    Applicant: IRDETO B.V.
    Inventors: Ali ETEMAD, Alireza SEPAS-MOGHADDAM, Hardik UPPAL, Michael GREENSPAN, Martin SOUKUP
  • Patent number: 11369804
    Abstract: System and methods may be used for arc fluence optimization without iteration to arc sequence generation. A method may include defining a particle arc range for a radiotherapy treatment of a patient, and generating an arc sequence, including a set of parameters for delivering the radiotherapy treatment, without requiring a dose calculation. The method may include optimizing fluence of the arc sequence for the radiotherapy treatment without iterating back to arc sequence generation, and outputting the fluence optimized arc sequence for use in the radiotherapy treatment.
    Type: Grant
    Filed: April 27, 2021
    Date of Patent: June 28, 2022
    Assignee: Elekta, Inc.
    Inventors: Martin Soukup, Kun-Yu Tsai
  • Publication number: 20220118282
    Abstract: System and methods may be used for arc fluence optimization without iteration to arc sequence generation. A method may include defining a particle arc range for a radiotherapy treatment of a patient, and generating an arc sequence, including a set of parameters for delivering the radiotherapy treatment, without requiring a dose calculation. The method may include optimizing fluence of the arc sequence for the radiotherapy treatment without iterating back to arc sequence generation, and outputting the fluence optimized arc sequence for use in the radiotherapy treatment.
    Type: Application
    Filed: April 27, 2021
    Publication date: April 21, 2022
    Inventors: Martin Soukup, Kun-Yu Tsai
  • Publication number: 20210400048
    Abstract: Methods and systems for providing secure digital access to services are described. Embodiments include user behavior tracking, learning, and updating one or more contextual access algorithms and thereafter can act as multi-factor authentications. The method may include receiving data for a group of users and initializing a machine learning algorithm with the group data. The method may also collect individual user data and context data periodically, including characteristic behavior data, and update the machine learning algorithm with the individual user data. The method may further calculate a threshold for tolerance based on the updated algorithm, and verify user requests for access to the service. A multi-factor authentication may be presented to the user when the verifications are not acceptable, such as by being below a threshold. A permissions data structure can be generated and used to control access to the service.
    Type: Application
    Filed: June 17, 2020
    Publication date: December 23, 2021
    Inventors: Clifford LIEM, Martin SOUKUP, Daniel MURDOCK
  • Publication number: 20210397683
    Abstract: Methods and systems for continuously authenticating a user of a device by comparing current sensor data of the device being used with a fingerprint generated from sensor data collected from the device during use by an authorized user. A likelihood value, indicating the likelihood that the user is an authorized user of the device, is generated and the user is authenticated when the likelihood value is determined to be acceptable.
    Type: Application
    Filed: June 17, 2021
    Publication date: December 23, 2021
    Inventors: Clifford LIEM, Martin SOUKUP, Daniel MURDOCK, Fernando Berra Kossik
  • Publication number: 20210084387
    Abstract: A method and system for watermarking content utilizing a user device GPU. Embodiments include receiving on a processing server a request from a video server for a video to be played on the user's device. The processing server may extract a set of identifying information, such as user information, from the request for the video. The processing server may further prepare shader software code which is to be executed on a GPU present on the user's device. The code preparation may include creating a watermarking procedure to be executed during playback on the user device. The processing server may further transmit the shader software code to the streaming video server to be transmitted to the user device for execution during video playback.
    Type: Application
    Filed: October 6, 2020
    Publication date: March 18, 2021
    Inventors: Martin Soukup, Daniel Murdock
  • Patent number: 10805693
    Abstract: A method and system for watermarking content utilizing a user device GPU. Embodiments include receiving on a processing server a request from a video server for a video to be played on the user's device. The processing server may extract a set of identifying information, such as user information, from the request for the video. The processing server may further prepare shader software code which is to be executed on a GPU present on the user's device. The code preparation may include creating a watermarking procedure to be executed during playback on the user device. The processing server may further transmit the shader software code to the streaming video server to be transmitted to the user device for execution during video playback.
    Type: Grant
    Filed: September 12, 2018
    Date of Patent: October 13, 2020
    Assignee: IRDETO B.V.
    Inventors: Martin Soukup, Daniel Murdock
  • Patent number: 10303857
    Abstract: A method of providing access to content at a first device, the method comprising: receiving an item of content, wherein at least part of the item of content is encrypted, the encrypted at least part of the item of content being decryptable using at least one decryption key; in a first software client: obtaining a transformed version of the at least one decryption key; performing a decryption operation on the encrypted at least part of the item of content based on the at least one decryption key to obtain an intermediate version of the at least part of the item of content, wherein said performing the decryption operation uses a white-box implementation of the decryption operation that forms part of the first software client and that operates using the transformed version of the at least one decryption key; and performing an encryption operation on at least a portion of the intermediate version based on at least one encryption key to obtain re-encrypted content, wherein said performing the encryption operation
    Type: Grant
    Filed: October 15, 2015
    Date of Patent: May 28, 2019
    Assignee: IRDETO B.V.
    Inventors: Arnoud Evert Van Foreest, Martin Soukup
  • Publication number: 20190141414
    Abstract: A method and system for watermarking content utilizing a user device GPU. Embodiments include receiving on a processing server a request from a video server for a video to be played on the user's device. The processing server may extract a set of identifying information, such as user information, from the request for the video. The processing server may further prepare shader software code which is to be executed on a GPU present on the user's device. The code preparation may include creating a watermarking procedure to be executed during playback on the user device. The processing server may further transmit the shader software code to the streaming video server to be transmitted to the user device for execution during video playback.
    Type: Application
    Filed: September 12, 2018
    Publication date: May 9, 2019
    Applicant: Irdeto B.V.
    Inventors: Grant Goodes, Martin Soukup, Daniel Murdock
  • Patent number: 10212387
    Abstract: There are described methods and apparatus for scrambling digital content, such as video or audio content, by dividing the digital content into blocks set out in an original arrangement, and reordering the blocks from the original arrangement to a scrambled arrangement. Additional manipulation transforms such as rotations and reflections may be applied to individual blocks. A subsequent compression step may then be carried out. Methods and apparatus for carrying out corresponding descrambling of digital content are also described.
    Type: Grant
    Filed: March 28, 2013
    Date of Patent: February 19, 2019
    Assignee: IRDETO B.V.
    Inventors: Annie Liu, Catherine Chambers, Luc Martel, Martin Soukup
  • Publication number: 20170237551
    Abstract: A method of providing access to content at a first device, the method comprising: receiving an item of content, wherein at least part of the item of content is encrypted, the encrypted at least part of the item of content being decryptable using at least one decryption key; in a first software client: obtaining a transformed version of the at least one decryption key; performing a decryption operation on the encrypted at least part of the item of content based on the at least one decryption key to obtain an intermediate version of the at least part of the item of content, wherein said performing the decryption operation uses a white-box implementation of the decryption operation that forms part of the first software client and that operates using the transformed version of the at least one decryption key; and performing an encryption operation on at least a portion of the intermediate version based on at least one encryption key to obtain re-encrypted content, wherein said performing the encryption operation
    Type: Application
    Filed: October 15, 2015
    Publication date: August 17, 2017
    Applicant: Irdeto B.V.
    Inventors: Arnoud Evert Van Foreest, Martin Soukup
  • Publication number: 20160057380
    Abstract: There are described methods and apparatus for scrambling digital content, such as video or audio content, by dividing the digital content into blocks set out in an original arrangement, and reordering the blocks from the original arrangement to a scrambled arrangement. Additional manipulation transforms such as rotations and reflections may be applied to individual blocks. A subsequent compression step may then be carried out. Methods and apparatus for carrying out corresponding descrambling of digital content are also described.
    Type: Application
    Filed: March 28, 2013
    Publication date: February 25, 2016
    Inventors: Annie Liu, Catherine Chambers, Luc Martel, Martin Soukup
  • Publication number: 20150066776
    Abstract: A method and apparatus for enhancing content security including a content corruptor module having an input for encoded content, a content parameter modifier coupled to the input and having outputs for modified content and fixer data, a content encoder coupled to the output for modified content and having an output for encoded modified content and a fixer data encoder coupled to the output for fixer data and having an output for encoded fixer data. The modified encoded content discourages copying as it is not usable with the corrector data.
    Type: Application
    Filed: September 7, 2011
    Publication date: March 5, 2015
    Applicant: IRDETO CANADA CORPORATION
    Inventors: Andrew Szczeszynski, Andrew Wajs, Martin Soukup
  • Publication number: 20140092954
    Abstract: Data that is to be transmitted to a viewer is encoded multiple times at multiple playback speeds. For example, a video advertisement may be encoded to play at normal speed, 4× normal speed, and 16× normal speed. Frames from the multiple encoded streams are combined to form a combined encoded stream that will play full motion video at each of the respective playback speeds. Thus, when a user elects to watch the video at a speed other than the slowest speed, the decoder will be able to decode the video at the selected speed to provide a full motion video output stream to the viewer at the selected playback speed.
    Type: Application
    Filed: December 1, 2013
    Publication date: April 3, 2014
    Inventor: Martin Soukup
  • Patent number: 8327427
    Abstract: System and method for transparent single sign-on authentication on computers in a networked environment. A preferred embodiment comprises receiving an authentication request from an operating system of a first computer, requesting credentials of an application making the authentication request, authenticating the credentials, storing the credentials if the authentication is successful, and transmitting the credentials to a second computer. On subsequent access requests made by the user on the second computer, the credentials can be retrieved from the secure store, eliminating the need to prompt the user to re-enter authentication information.
    Type: Grant
    Filed: September 25, 2006
    Date of Patent: December 4, 2012
    Assignee: Rockstar Consortium US LP
    Inventors: Martin Soukup, Albert Reiche, Arn Hyndman, Hongbo Li
  • Publication number: 20120102100
    Abstract: A technique for enabling a plurality of software components to communicate in a software component matrix environment is disclosed. In one particular exemplary embodiment, the technique may be realized by a method for enabling a plurality of software components to communicate in a software component matrix environment comprising the steps of encoding a request at a client side; communicating the request to a server at a server side via a communication interface; comparing the request to a plurality of operations supported at the server side; determining whether a function match exists at the server side; and returning a response comprising the function match to the client side in response to the request via the communication interface wherein the response is mapped to a data model of a client.
    Type: Application
    Filed: December 22, 2011
    Publication date: April 26, 2012
    Applicant: ROCKSTAR BIDCO, LP
    Inventors: Martin Soukup, Gregory Hughes, Michael Heffernan
  • Patent number: 8086665
    Abstract: A technique for enabling a plurality of software components to communicate in a software component matrix environment is disclosed. In one particular exemplary embodiment, the technique may be realized by a method for enabling a plurality of software components to communicate in a software component matrix environment comprising the steps of encoding a request at a client side; communicating the request to a server at a server side via a communication interface; comparing the request to a plurality of operations supported at the server side; determining whether a function match exists at the server side; and returning a response comprising the function match to the client side in response to the request via the communication interface wherein the response is mapped to a data model of a client.
    Type: Grant
    Filed: August 21, 2002
    Date of Patent: December 27, 2011
    Assignee: Rockstar Bidco, LP
    Inventors: Martin Soukup, Gregory Hughes, Michael Heffernan