Patents by Inventor Oleg Izmerly
Oleg Izmerly has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11811805Abstract: One embodiment of the present invention sets forth a technique for predicting fraud by correlating user behavior biometric data with one or more other types of data. The technique includes receiving cursor movement data generated via a client device and analyzing the cursor movement data based on a model to generate a result. The model may be generated based on cursor movement data associated with a first group of one or more users. The technique further includes receiving log data generated via the client device and determining, based on the result and the log data, that a user of the client device is not a member of the first group.Type: GrantFiled: January 29, 2021Date of Patent: November 7, 2023Assignee: SPLUNK INC.Inventors: Gleb Esman, Oleg Izmerly
-
Patent number: 11315010Abstract: One embodiment of the present invention sets forth a technique for predicting fraud by analyzing user behavior biometric data via a neural network (NN). The technique includes receiving cursor movement data generated via at least one client device, where the cursor movement data is associated with a group of one or more users. The technique further includes generating a plurality of images based on the cursor movement data and training a first neural network (NN) model based on the plurality of images and based on a discard rate that is greater than 50%.Type: GrantFiled: April 17, 2017Date of Patent: April 26, 2022Assignee: SPLUNK INC.Inventors: Gleb Esman, Oleg Izmerly
-
Patent number: 11102225Abstract: One embodiment of the present invention sets forth a technique for predicting fraud by correlating user behavior biometric data with one or more other types of data. The technique includes receiving cursor movement data generated via a client device and analyzing the cursor movement data based on a model to generate a result. The model may be generated based on cursor movement data associated with a first group of one or more users. The technique further includes receiving log data generated via the client device and determining, based on the result and the log data, that a user of the client device is not a member of the first group.Type: GrantFiled: April 17, 2017Date of Patent: August 24, 2021Assignee: SPLUNK INC.Inventors: Gleb Esman, Oleg Izmerly
-
Publication number: 20180302425Abstract: One embodiment of the present invention sets forth a technique for predicting fraud by correlating user behavior biometric data with one or more other types of data. The technique includes receiving cursor movement data generated via a client device and analyzing the cursor movement data based on a model to generate a result. The model may be generated based on cursor movement data associated with a first group of one or more users. The technique further includes receiving log data generated via the client device and determining, based on the result and the log data, that a user of the client device is not a member of the first group.Type: ApplicationFiled: April 17, 2017Publication date: October 18, 2018Inventors: Gleb Esman, SR., Oleg Izmerly
-
Publication number: 20180300572Abstract: One embodiment of the present invention sets forth a technique for predicting fraud based on user behavior biometric data. The technique includes receiving cursor movement data generated via a client device and generating a first image based on the cursor movement data. The technique further includes analyzing the first image based on a first model to generate a result, where the first model is generated based on cursor movement data associated with a first group of one or more users. The technique further includes determining, based on the result, that a user of the client device is not a member of the first group.Type: ApplicationFiled: April 17, 2017Publication date: October 18, 2018Inventors: Gleb Esman, Oleg Izmerly
-
Publication number: 20180300625Abstract: One embodiment of the present invention sets forth a technique for predicting fraud by analyzing user behavior biometric data via a neural network (NN). The technique includes receiving cursor movement data generated via at least one client device, where the cursor movement data is associated with a group of one or more users. The technique further includes generating a plurality of images based on the cursor movement data and training a first neural network (NN) model based on the plurality of images and based on a discard rate that is greater than 50%.Type: ApplicationFiled: April 17, 2017Publication date: October 18, 2018Inventors: Gleb ESMAN, SR., Oleg IZMERLY
-
Patent number: 9703681Abstract: Assistance is given to aid in optimizing a program's performance during initial development while the program's features are still being implemented and/or debugged, without interfering with that development, by providing easy-to-ignore yet accurate tips about a program's performance inside a debugger. Raw performance information for a software program which is being debugged in a debugger is adjusted by removing from it a measured debug overhead or other diagnostic overhead. Some factors considered when measuring overhead include pauses, context switches, debug versus release build presence, bounds checking, funceval, and call stack analyses. The debugger is enhanced to display the adjusted program performance measure in a graphical user interface, next to the corresponding source code. The enhanced debugger updates the adjusted program performance measure value and keeps its screen location current as the developer moves through the source code, providing more detailed performance information upon request.Type: GrantFiled: July 28, 2014Date of Patent: July 11, 2017Assignee: Microsoft Technology Licensing, LLCInventors: Daniel Joshua Taylor, Andrew Brian Hall, Karl Melder, Daniel Demetris George Moth, Zhaoqing Wu, Oleg Izmerly, Gregory Miskelly, Jackson Michael Davis
-
Patent number: 9218487Abstract: A method for protecting a browser from malicious processes, comprises providing at least one process-proxy object and at least a browser-proxy object, interposed between the browser and a process, such that when the process invokes one of the DOM entry points, the process-proxy object isolates it from the real browser implementation and executes the process-proxy object's code instead.Type: GrantFiled: October 13, 2014Date of Patent: December 22, 2015Assignee: TRUSTEER, LTD.Inventors: Amit Klein, Eldan Ben-Haim, Oleg Izmerly, Shmuel Regev, Michael Boodaei
-
Publication number: 20150347274Abstract: Assistance is given to aid in optimizing a program's performance during initial development while the program's features are still being implemented and/or debugged, without interfering with that development, by providing easy-to-ignore yet accurate tips about a program's performance inside a debugger. Raw performance information for a software program which is being debugged in a debugger is adjusted by removing from it a measured debug overhead or other diagnostic overhead. Some factors considered when measuring overhead include pauses, context switches, debug versus release build presence, bounds checking, funceval, and call stack analyses. The debugger is enhanced to display the adjusted program performance measure in a graphical user interface, next to the corresponding source code. The enhanced debugger updates the adjusted program performance measure value and keeps its screen location current as the developer moves through the source code, providing more detailed performance information upon request.Type: ApplicationFiled: July 28, 2014Publication date: December 3, 2015Inventors: Daniel Joshua Taylor, Andrew Brian Hall, Karl Melder, Daniel Demetris George MOTH, Zhaoqing Wu, Oleg Izmerly, Gregory Miskelly, Jackson Michael Davis
-
Patent number: 9081956Abstract: A method for protecting a browser from malicious processes, comprises providing at least one process-proxy object and at least a browser-proxy object, interposed between the browser and a process, such that when the process invokes one of the DOM entry points, the process-proxy object isolates it from the real browser implementation and executes the process-proxy object's code instead.Type: GrantFiled: May 22, 2009Date of Patent: July 14, 2015Assignee: Trusteer Ltd.Inventors: Amit Klein, Eldan Ben-Haim, Oleg Izmerly, Shmuel Regev, Michael Boodaei
-
Publication number: 20150128273Abstract: A method for protecting a browser from malicious processes, comprises providing at least one process-proxy object and at least a browser-proxy object, interposed between the browser and a process, such that when the process invokes one of the DOM entry points, the process-proxy object isolates it from the real browser implementation and executes the process-proxy object's code instead.Type: ApplicationFiled: October 13, 2014Publication date: May 7, 2015Inventors: Amit KLEIN, Eldan BEN-HAIM, Oleg IZMERLY, Shmuel REGEV, Michael BOODAEI
-
Patent number: 8863281Abstract: A method for protecting a browser from malicious processes, comprises providing at least one process-proxy object and at least a browser-proxy object, interposed between the browser and a process, such that when the process invokes one of the DOM entry points, the process-proxy object isolates it from the real browser implementation and executes the process-proxy object's code instead.Type: GrantFiled: May 22, 2009Date of Patent: October 14, 2014Assignee: Trusteer Ltd.Inventors: Amit Klein, Eldan Ben-Haim, Oleg Izmerly, Shmuel Regev, Michael Boodaei
-
Patent number: 8813224Abstract: A method for protecting a browser from malicious processes, comprises providing at least one process-proxy object and at least a browser-proxy object, interposed between the browser and a process, such that when the process invokes one of the DOM entry points, the process-proxy object isolates it from the real browser implementation and executes the process-proxy object's code instead.Type: GrantFiled: May 22, 2009Date of Patent: August 19, 2014Assignee: Trusteer Ltd.Inventors: Amit Klein, Eldan Ben-Haim, Oleg Izmerly, Shmuel Regev, Michael Boodaei
-
Patent number: 8732794Abstract: A browser plug-in firewall manages data exchanged between a browser and a plug-in according to a pre-defined list of rights.Type: GrantFiled: August 11, 2008Date of Patent: May 20, 2014Assignee: Trusteer Ltd.Inventors: Michael Boodaei, Amit Klein, Oleg Izmerly
-
Patent number: 8595836Abstract: A method for preventing malicious attacks on software, using the patching method, includes providing a database of malicious known patches (malware). The database contains characteristic signatures of the malware. The method also includes detecting whether a patch is malicious by comparing it with a signature in the database and performing one or more activities needed to prevent the malicious patch from performing undesired activities.Type: GrantFiled: August 3, 2011Date of Patent: November 26, 2013Assignee: Trusteer Ltd.Inventors: Amit Klein, Oleg Izmerly, Shmuel Regev, Eldan Ben-Haim
-
Patent number: 8239940Abstract: A method for preventing malicious attacks on software, using the patching method, includes providing a database of legitimate and known patches, the database contains characteristic code paths of said legitimate patches. The method also includes detecting whether a patch is malicious by inspecting one or more characteristic paths of the patch and matching one or more code paths against the database of legitimate and known patches. An activity needed to prevent the malicious patch from performing undesired activities is then performed.Type: GrantFiled: August 7, 2009Date of Patent: August 7, 2012Assignee: Trusteer Ltd.Inventors: Amit Klein, Oleg Izmerly, Shmuel Regev, Eldan Ben-Haim
-
Publication number: 20120030762Abstract: A method for preventing malicious attacks on software, using the patching method, includes providing a database of malicious known patches (malware). The database contains characteristic signatures of the malware. The method also includes detecting whether a patch is malicious by comparing it with a signature in the database and performing one or more activities needed to prevent the malicious patch from performing undesired activities.Type: ApplicationFiled: August 3, 2011Publication date: February 2, 2012Applicant: TRUSTEER LTD.Inventors: Amit KLEIN, Oleg Izmerly, Shmuel Regev, Eldan Ben-Haim
-
Publication number: 20100169969Abstract: A method for preventing malicious attacks on software, using the patching method, includes providing a database of legitimate and known patches, the database contains characteristic code paths of said legitimate patches. The method also includes detecting whether a patch is malicious by inspecting one or more characteristic paths of the patch and matching one or more code paths against the database of legitimate and known patches. An activity needed to prevent the malicious patch from performing undesired activities is then performed.Type: ApplicationFiled: August 7, 2009Publication date: July 1, 2010Applicant: TRUSTEER LTD.Inventors: Amit KLEIN, Oleg Izmerly, Shmuel Regev, Eldan Ben-Haim
-
Publication number: 20090293102Abstract: A method for protecting a browser from malicious processes, comprises providing at least one process-proxy object and at least a browser-proxy object, interposed between the browser and a process, such that when the process invokes one of the DOM entry points, the process-proxy object isolates it from the real browser implementation and executes the process-proxy object's code instead.Type: ApplicationFiled: May 22, 2009Publication date: November 26, 2009Applicant: TRUSTEER LTD.Inventors: Amit KLEIN, Eldan BEN-HAIM, Oleg IZMERLY, Shmuel REGEV, Michael BOODAEI
-
Publication number: 20090064309Abstract: A browser plug-in firewall manages data exchanged between a browser and a plug-in according to a pre-defined list of rights.Type: ApplicationFiled: August 11, 2008Publication date: March 5, 2009Applicant: TRUSTEER LTD.Inventors: Michael Boodaei, Amit Klein, Oleg Izmerly