Patents by Inventor Noam HEROLD

Noam HEROLD has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 12130898
    Abstract: Disclosed herein are systems and method for verifying user identity. In one exemplary aspect, a method comprises receiving sensor data from at least one sensor and parsing the sensor data to determine a plurality of identifiers of a user authorized to access data via a computing device. The method comprises generating, for each identifier, an event including the user. The method comprises intercepting, on the computing device, a data access request including an identifier of the user. The method comprises verifying whether the data access request is from the user authorized to access data by generating a chain of events including the user for a period of time preceding the data access request, determining a deviation of the chain of events from a target chain of events, and in response to determining the deviation is less than a threshold deviation value, granting the data access request.
    Type: Grant
    Filed: September 27, 2021
    Date of Patent: October 29, 2024
    Assignee: Acronis International GmbH
    Inventors: Alexander Tormasov, Noam Herold, Yury Averkiev, Serguei Beloussov, Stanislav Protasov
  • Patent number: 12013956
    Abstract: Disclosed herein are systems and methods for verifying user activity based on behavioral models. In an exemplary aspect, a method may include receiving and parsing sensor data from at least one sensor in an environment to determine a first identifier of a person that is not authorized to access data via a computing device. The method may include intercepting, on the computing device, a data access request including a second identifier of a user that is authorized to access the data via the computing device. The method may include verifying whether the data access request is from the user authorized to access data by determining whether a chain of events involving the first person and the user corresponds to a behavioral model indicative of malicious activity. Based on the verification, the data access request is either granted or denied.
    Type: Grant
    Filed: September 28, 2021
    Date of Patent: June 18, 2024
    Assignee: Acronis International GmbH
    Inventors: Alexander Tormasov, Noam Herold, Yury Averkiev, Serguei Beloussov, Stanislav Protasov
  • Patent number: 11995167
    Abstract: Disclosed herein are systems and method for authenticating user identity based on supplemental environment data. When a structured approach to acquiring user identifiers (e.g., facial images, voice clips, biometric data, etc.) of authorized user is inconclusive (e.g., a matching face is similar, but not a direct match) the systems and methods describe retrieving supplemental environment data that indirectly verifies a presence of the user in an environment. The systems and methods further comprise determining whether the supplemental environment data indicates that a respective identifier belongs to the user, and in response to determining that the supplemental environment data indicates that the respective identifier belongs to the user, authenticating the respective identifier as belonging to the user and storing the respective identifier in a database of identifiers.
    Type: Grant
    Filed: September 28, 2021
    Date of Patent: May 28, 2024
    Assignee: Acronis International GmbH
    Inventors: Alexander Tormasov, Noam Herold, Yury Averkiev, Serguei Beloussov, Stanislav Protasov
  • Publication number: 20230139161
    Abstract: Disclosed herein are systems and methods for verifying user activity based on behavioral models. In an exemplary aspect, a method may include receiving and parsing sensor data from at least one sensor in an environment to determine a first identifier of a person that is not authorized to access data via a computing device. The method may include intercepting, on the computing device, a data access request including a second identifier of a user that is authorized to access the data via the computing device. The method may include verifying whether the data access request is from the user authorized to access data by determining whether a chain of events involving the first person and the user corresponds to a behavioral model indicative of malicious activity. Based on the verification, the data access request is either granted or denied.
    Type: Application
    Filed: September 28, 2021
    Publication date: May 4, 2023
    Inventors: Alexander TORMASOV, Noam HEROLD, Yury AVERKIEV, Serguei BELOUSSOV, Stanislav PROTASOV
  • Publication number: 20230117755
    Abstract: Disclosed herein are systems and method for verifying user identity. In one exemplary aspect, a method comprises receiving sensor data from at least one sensor and parsing the sensor data to determine a plurality of identifiers of a user authorized to access data via a computing device. The method comprises generating, for each identifier, an event including the user. The method comprises intercepting, on the computing device, a data access request including an identifier of the user. The method comprises verifying whether the data access request is from the user authorized to access data by generating a chain of events including the user for a period of time preceding the data access request, determining a deviation of the chain of events from a target chain of events, and in response to determining the deviation is less than a threshold deviation value, granting the data access request.
    Type: Application
    Filed: September 27, 2021
    Publication date: April 20, 2023
    Inventors: Alexander Tormasov, Noam HEROLD, Yury AVERKIEV, Serguei BELOUSSOV, Stanislav PROTASOV
  • Publication number: 20230097219
    Abstract: Disclosed herein are systems and method for authenticating user identity based on supplemental environment data. When a structured approach to acquiring user identifiers (e.g., facial images, voice clips, biometric data, etc.) of authorized user is inconclusive (e.g., a matching face is similar, but not a direct match) the systems and methods describe retrieving supplemental environment data that indirectly verifies a presence of the user in an environment. The systems and methods further comprise determining whether the supplemental environment data indicates that a respective identifier belongs to the user, and in response to determining that the supplemental environment data indicates that the respective identifier belongs to the user, authenticating the respective identifier as belonging to the user and storing the respective identifier in a database of identifiers.
    Type: Application
    Filed: September 28, 2021
    Publication date: March 30, 2023
    Inventors: Alexander TORMASOV, Noam HEROLD, Yury AVERKIEV, Serguei BELOUSSOV, Stanislav PROTASOV