Patents by Inventor Michal Sofka

Michal Sofka has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20170360404
    Abstract: Aspects of the technology described herein relate to techniques for guiding an operator to use an ultrasound device. Thereby, operators with little or no experience operating ultrasound devices may capture medically relevant ultrasound images and/or interpret the contents of the obtained ultrasound images. For example, some of the techniques disclosed herein may be used to identify a particular anatomical view of a subject to image with an ultrasound device, guide an operator of the ultrasound device to capture an ultrasound image of the subject that contains the particular anatomical view, and/or analyze the captured ultrasound image to identify medical information about the subject.
    Type: Application
    Filed: June 19, 2017
    Publication date: December 21, 2017
    Inventors: Tomer Gafner, Matthew de Jonge, Robert Schneider, David Elgena, Alex Rothberg, Jonathan M. Rothberg, Michal Sofka, Karl Thiele
  • Publication number: 20170360401
    Abstract: Aspects of the technology described herein relate to techniques for guiding an operator to use an ultrasound device. Thereby, operators with little or no experience operating ultrasound devices may capture medically relevant ultrasound images and/or interpret the contents of the obtained ultrasound images. For example, some of the techniques disclosed herein may be used to identify a particular anatomical view of a subject to image with an ultrasound device, guide an operator of the ultrasound device to capture an ultrasound image of the subject that contains the particular anatomical view, and/or analyze the captured ultrasound image to identify medical information about the subject.
    Type: Application
    Filed: June 19, 2017
    Publication date: December 21, 2017
    Inventors: Alex Rothberg, Jonathan M. Rothberg, Matthew de Jonge, Jimmy Jia, Daniel Nouri, Michal Sofka
  • Publication number: 20170360411
    Abstract: Aspects of the technology described herein relate to techniques for guiding an operator to use an ultrasound device. Thereby, operators with little or no experience operating ultrasound devices may capture medically relevant ultrasound images and/or interpret the contents of the obtained ultrasound images. For example, some of the techniques disclosed herein may be used to identify a particular anatomical view of a subject to image with an ultrasound device, guide an operator of the ultrasound device to capture an ultrasound image of the subject that contains the particular anatomical view, and/or analyze the captured ultrasound image to identify medical information about the subject.
    Type: Application
    Filed: June 19, 2017
    Publication date: December 21, 2017
    Inventors: Alex Rothberg, Matthew de Jonge, Jimmy Jia, Daniel Nouri, Jonathan M. Rothberg, Michal Sofka
  • Publication number: 20170360403
    Abstract: Aspects of the technology described herein relate to techniques for guiding an operator to use an ultrasound device. Thereby, operators with little or no experience operating ultrasound devices may capture medically relevant ultrasound images and/or interpret the contents of the obtained ultrasound images. For example, some of the techniques disclosed herein may be used to identify a particular anatomical view of a subject to image with an ultrasound device, guide an operator of the ultrasound device to capture an ultrasound image of the subject that contains the particular anatomical view, and/or analyze the captured ultrasound image to identify medical information about the subject.
    Type: Application
    Filed: June 19, 2017
    Publication date: December 21, 2017
    Inventors: Alex Rothberg, Matthew de Jonge, Jimmy Jia, Daniel Nouri, Jonathan M. Rothberg, Michal Sofka
  • Publication number: 20170360402
    Abstract: Aspects of the technology described herein relate to techniques for guiding an operator to use an ultrasound device. Thereby, operators with little or no experience operating ultrasound devices may capture medically relevant ultrasound images and/or interpret the contents of the obtained ultrasound images. For example, some of the techniques disclosed herein may be used to identify a particular anatomical view of a subject to image with an ultrasound device, guide an operator of the ultrasound device to capture an ultrasound image of the subject that contains the particular anatomical view, and/or analyze the captured ultrasound image to identify medical information about the subject.
    Type: Application
    Filed: June 19, 2017
    Publication date: December 21, 2017
    Inventors: Matthew de Jonge, Robert Schneider, David Elgena, Alex Rothberg, Jonathan M. Rothberg, Michal Sofka, Tomer Gafner, Karl Thiele
  • Publication number: 20170316342
    Abstract: In one embodiment, a learning machine device initializes thresholds of a data representation of one or more data features, the thresholds specifying a first number of pre-defined bins (e.g., uniform and equidistant bins). Next, adjacent bins of the pre-defined bins having substantially similar weights may be reciprocally merged, the merging resulting in a second number of refined bins that is less than the first number. Notably, while merging, the device also learns weights of a linear decision rule associated with the one or more data features. Accordingly, a data-driven representation for a data-driven classifier may be established based on the refined bins and learned weights.
    Type: Application
    Filed: May 2, 2016
    Publication date: November 2, 2017
    Inventors: Vojtech Franc, Karel Bartos, Michal Sofka
  • Patent number: 9800597
    Abstract: A system and a method are disclosed for identifying network threats based on hierarchical classification. The system receives packet flows from a data network and determines flow features for the received packet flows based on data from the packet flows. The system also classifies each packet flow into a flow class based on flow features of the packet flow. Based on a criterion, the system selects packet flows from the received packet flows and places the selected packet flows into an event set that represents an event on the network. The system determines event set features for the event set based on the flow features of the selected packet flows. The system then classifies the event set into a set class based on the determined event set features. Based on the set class, the computer system may report a threat incident on an internetworking device that originated the selected packet flows.
    Type: Grant
    Filed: October 3, 2016
    Date of Patent: October 24, 2017
    Assignee: Cisco Technology, Inc.
    Inventors: Karel Bartos, Michal Sofka
  • Publication number: 20170295187
    Abstract: In one embodiment, a security device identifies, from monitored network traffic of one or more users, one or more suspicious domain names as candidate domains, the one or more suspicious domain names identified based on an occurrence of linguistic units used in discovered domain names within the monitored network traffic. The security device may then determine one or more features of the candidate domains, and confirms certain domains of the candidate domains as malicious domains using a parameterized classifier against the one or more features.
    Type: Application
    Filed: April 6, 2016
    Publication date: October 12, 2017
    Inventors: Jiri Havelka, Michal Sofka, Martin Rehák
  • Patent number: 9781139
    Abstract: Techniques are presented to identify malware communication with domain generation algorithm (DGA) generated domains. Sample domain names are obtained and labeled as DGA domains, non-DGA domains or suspicious domains. A classifier is trained in a first stage based on the sample domain names. Sample proxy logs including proxy logs of DGA domains and proxy logs of non-DGA domains are obtained to train the classifier in a second stage based on the plurality of sample domain names and the plurality of sample proxy logs. Live traffic proxy logs are obtained and the classifier is tested by classifying the live traffic proxy logs as DGA proxy logs, and the classifier is forwarded to a second computing device to identify network communication of a third computing device as malware network communication with DGA domains via a network interface unit of the third computing device based on the trained and tested classifier.
    Type: Grant
    Filed: July 22, 2015
    Date of Patent: October 3, 2017
    Assignee: Cisco Technology, Inc.
    Inventors: Michal Sofka, Lukas Machlica, Karel Bartos, David McGrew
  • Publication number: 20170134404
    Abstract: In one embodiment, a method includes receiving packet flow data at a feature extraction hierarchy comprising a plurality of levels, each of the levels comprising a set of feature extraction functions, computing a first set of feature vectors for the packet flow data at a first level of the feature extraction hierarchy, inputting the first set of feature vectors from the first level of the feature extraction hierarchy into a second level of the feature extraction hierarchy to compute a second set of feature vectors, and transmitting a final feature vector to a classifier to identify malicious traffic. An apparatus and logic are also disclosed herein.
    Type: Application
    Filed: November 6, 2015
    Publication date: May 11, 2017
    Applicant: CISCO TECHNOLOGY, INC.
    Inventors: Lukas Machlica, Michal Sofka
  • Patent number: 9646229
    Abstract: A method and system for automatic bone segmentation and landmark detection for joint replacement surgery is disclosed. A 3D medical image of at least a target joint region of a patient is received. A plurality bone structures are automatically segmented in the target joint region of the 3D medical image and a plurality of landmarks associated with a joint replacement surgery are automatically detected in the target joint region of the 3D medical image. The boundaries of segmented bone structures can then be interactively refined based on user inputs.
    Type: Grant
    Filed: September 30, 2013
    Date of Patent: May 9, 2017
    Assignee: SIEMENS MEDICAL SOLUTIONS USA, INC.
    Inventors: Michal Sofka, Meizhu Liu, Dijia Wu, Shaohua Kevin Zhou
  • Publication number: 20170063892
    Abstract: Techniques are presented that identify malware network communications between a computing device and a server based on a cumulative feature vector generated from a group of network traffic records associated with communications between computing devices and servers. Feature vectors are generated, each vector including features extracted from the network traffic records in the group. A self-similarity matrix is computed for each feature which is a representation of the feature that is invariant to an increase or a decrease of feature values across all feature vectors in the group. Each self-similarity matrix is transformed into corresponding histograms to be invariant to a number of network traffic records in the group. The cumulative feature vector is a cumulative representation of the predefined set of features of all network traffic records included in the at least one group of network traffic records and is generated based on the corresponding histograms.
    Type: Application
    Filed: November 19, 2015
    Publication date: March 2, 2017
    Inventors: Karel Bartos, Michal Sofka
  • Publication number: 20170063893
    Abstract: Techniques are presented that identify malware network communications between a computing device and a server utilizing a detector process. Network traffic records are classified as either malware or legitimate network traffic records and divided into groups of classified network traffic records associated with network communications between the computing device and the server for a predetermined period of time. A group of classified network traffic records is labeled as malicious when at least one of the classified network traffic records in the group is malicious and as legitimate when none of the classified network traffic records in the group is malicious to obtain a labeled group of classified network traffic records. A detector process is trained on individual classified network traffic records in the labeled group of classified network traffic records and network communication between the computing device and the server is identified as malware network communication utilizing the detector process.
    Type: Application
    Filed: December 4, 2015
    Publication date: March 2, 2017
    Inventors: Vojtech Franc, Michal Sofka, Karel Bartos
  • Publication number: 20170026394
    Abstract: A system and a method are disclosed for identifying network threats based on hierarchical classification. The system receives packet flows from a data network and determines flow features for the received packet flows based on data from the packet flows. The system also classifies each packet flow into a flow class based on flow features of the packet flow. Based on a criterion, the system selects packet flows from the received packet flows and places the selected packet flows into an event set that represents an event on the network. The system determines event set features for the event set based on the flow features of the selected packet flows. The system then classifies the event set into a set class based on the determined event set features. Based on the set class, the computer system may report a threat incident on an internetworking device that originated the selected packet flows.
    Type: Application
    Filed: October 3, 2016
    Publication date: January 26, 2017
    Inventors: KAREL BARTOS, MICHAL SOFKA
  • Publication number: 20170026390
    Abstract: Techniques are presented to identify malware communication with domain generation algorithm (DGA) generated domains. Sample domain names are obtained and labeled as DGA domains, non-DGA domains or suspicious domains. A classifier is trained in a first stage based on the sample domain names. Sample proxy logs including proxy logs of DGA domains and proxy logs of non-DGA domains are obtained to train the classifier in a second stage based on the plurality of sample domain names and the plurality of sample proxy logs. Live traffic proxy logs are obtained and the classifier is tested by classifying the live traffic proxy logs as DGA proxy logs, and the classifier is forwarded to a second computing device to identify network communication of a third computing device as malware network communication with DGA domains via a network interface unit of the third computing device based on the trained and tested classifier.
    Type: Application
    Filed: July 22, 2015
    Publication date: January 26, 2017
    Inventors: Michal Sofka, Lukas Machlica, Karel Bartos, David McGrew
  • Patent number: 9542741
    Abstract: A method and system for automatic pelvis unfolding from 3D computed tomography (CT) images is disclosed. A 3D medical image, such as a 3D CT image, is received. Pelvis anatomy is segmented in the 3D medical image. The 3D medical image is reformatted to visualize an unfolded pelvis based on the segmented pelvis anatomy.
    Type: Grant
    Filed: February 12, 2014
    Date of Patent: January 10, 2017
    Assignee: Siemens Healthcare GmbH
    Inventors: Neil Birkbeck, Dijia Wu, Michal Sofka, Meizhu Liu, Grzegorz Soza, Shaohua Kevin Zhou, Clifford R. Weiss, Atilla Peter Kiraly
  • Publication number: 20160344757
    Abstract: In an embodiment, a method, performed by processors of a computing device for creating and storing clusters of incident data records based on behavioral characteristic values in the records and origin characteristic values in the records, the method comprising: receiving a plurality of input incident data records comprising sets of attribute values; identifying two or more first incident data records that have a particular behavioral characteristic value; using a malicious incident behavioral data table that maps sets of behavioral characteristic values to identifiers of malicious acts in the network, and a plurality of comparison operations using the malicious incident behavioral data table and the two or more first incident data records, determining whether any of the two or more first incident data records are malicious; and if so, creating a similarity behavioral cluster record that includes the two or more first incident data records.
    Type: Application
    Filed: August 8, 2016
    Publication date: November 24, 2016
    Inventors: KAREL BARTOS, MARTIN REHAK, MICHAL SOFKA
  • Patent number: 9495752
    Abstract: Multiple object segmentation is performed for three-dimensional computed tomography. The adjacent objects are individually segmented. Overlapping regions or locations designated as belonging to both objects may be identified. Confidence maps for the individual segmentations are used to label the locations of the overlap as belonging to one or the other object, not both. This re-segmentation is applied for the overlapping local, and not other locations. Confidence maps in re-segmentation and application just to overlap locations may be used independently of each other or in combination.
    Type: Grant
    Filed: July 30, 2013
    Date of Patent: November 15, 2016
    Assignee: Siemens Product Lifecycle Management Software Inc.
    Inventors: Dijia Wu, Neil Birkbeck, Michal Sofka, Meizhu Liu, Shaohua Kevin Zhou
  • Patent number: 9462008
    Abstract: A system and a method are disclosed for identifying network threats based on hierarchical classification. The system receives packet flows from a data network and determines flow features for the received packet flows based on data from the packet flows. The system also classifies each packet flow into a flow class based on flow features of the packet flow. Based on a criterion, the system selects packet flows from the received packet flows and places the selected packet flows into an event set that represents an event on the network. The system determines event set features for the event set based on the flow features of the selected packet flows. The system then classifies the event set into a set class based on the determined event set features. Based on the set class, the computer system may report a threat incident on an internetworking device that originated the selected packet flows.
    Type: Grant
    Filed: October 21, 2014
    Date of Patent: October 4, 2016
    Assignee: Cisco Technology, Inc.
    Inventors: Karel Bartos, Michal Sofka
  • Patent number: 9432393
    Abstract: In an embodiment, a method, performed by processors of a computing device for creating and storing clusters of incident data records based on behavioral characteristic values in the records and origin characteristic values in the records, the method comprising: receiving a plurality of input incident data records comprising sets of attribute values; identifying two or more first incident data records that have a particular behavioral characteristic value; using a malicious incident behavioral data table that maps sets of behavioral characteristic values to identifiers of malicious acts in the network, and a plurality of comparison operations using the malicious incident behavioral data table and the two or more first incident data records, determining whether any of the two or more first incident data records are malicious; and if so, creating a similarity behavioral cluster record that includes the two or more first incident data records.
    Type: Grant
    Filed: February 3, 2015
    Date of Patent: August 30, 2016
    Assignee: Cisco Technology, Inc.
    Inventors: Karel Bartos, Martin Rehak, Michal Sofka