Patents by Inventor Oleg Izmerly

Oleg Izmerly has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11811805
    Abstract: One embodiment of the present invention sets forth a technique for predicting fraud by correlating user behavior biometric data with one or more other types of data. The technique includes receiving cursor movement data generated via a client device and analyzing the cursor movement data based on a model to generate a result. The model may be generated based on cursor movement data associated with a first group of one or more users. The technique further includes receiving log data generated via the client device and determining, based on the result and the log data, that a user of the client device is not a member of the first group.
    Type: Grant
    Filed: January 29, 2021
    Date of Patent: November 7, 2023
    Assignee: SPLUNK INC.
    Inventors: Gleb Esman, Oleg Izmerly
  • Patent number: 11315010
    Abstract: One embodiment of the present invention sets forth a technique for predicting fraud by analyzing user behavior biometric data via a neural network (NN). The technique includes receiving cursor movement data generated via at least one client device, where the cursor movement data is associated with a group of one or more users. The technique further includes generating a plurality of images based on the cursor movement data and training a first neural network (NN) model based on the plurality of images and based on a discard rate that is greater than 50%.
    Type: Grant
    Filed: April 17, 2017
    Date of Patent: April 26, 2022
    Assignee: SPLUNK INC.
    Inventors: Gleb Esman, Oleg Izmerly
  • Patent number: 11102225
    Abstract: One embodiment of the present invention sets forth a technique for predicting fraud by correlating user behavior biometric data with one or more other types of data. The technique includes receiving cursor movement data generated via a client device and analyzing the cursor movement data based on a model to generate a result. The model may be generated based on cursor movement data associated with a first group of one or more users. The technique further includes receiving log data generated via the client device and determining, based on the result and the log data, that a user of the client device is not a member of the first group.
    Type: Grant
    Filed: April 17, 2017
    Date of Patent: August 24, 2021
    Assignee: SPLUNK INC.
    Inventors: Gleb Esman, Oleg Izmerly
  • Publication number: 20180302425
    Abstract: One embodiment of the present invention sets forth a technique for predicting fraud by correlating user behavior biometric data with one or more other types of data. The technique includes receiving cursor movement data generated via a client device and analyzing the cursor movement data based on a model to generate a result. The model may be generated based on cursor movement data associated with a first group of one or more users. The technique further includes receiving log data generated via the client device and determining, based on the result and the log data, that a user of the client device is not a member of the first group.
    Type: Application
    Filed: April 17, 2017
    Publication date: October 18, 2018
    Inventors: Gleb Esman, SR., Oleg Izmerly
  • Publication number: 20180300572
    Abstract: One embodiment of the present invention sets forth a technique for predicting fraud based on user behavior biometric data. The technique includes receiving cursor movement data generated via a client device and generating a first image based on the cursor movement data. The technique further includes analyzing the first image based on a first model to generate a result, where the first model is generated based on cursor movement data associated with a first group of one or more users. The technique further includes determining, based on the result, that a user of the client device is not a member of the first group.
    Type: Application
    Filed: April 17, 2017
    Publication date: October 18, 2018
    Inventors: Gleb Esman, Oleg Izmerly
  • Publication number: 20180300625
    Abstract: One embodiment of the present invention sets forth a technique for predicting fraud by analyzing user behavior biometric data via a neural network (NN). The technique includes receiving cursor movement data generated via at least one client device, where the cursor movement data is associated with a group of one or more users. The technique further includes generating a plurality of images based on the cursor movement data and training a first neural network (NN) model based on the plurality of images and based on a discard rate that is greater than 50%.
    Type: Application
    Filed: April 17, 2017
    Publication date: October 18, 2018
    Inventors: Gleb ESMAN, SR., Oleg IZMERLY
  • Patent number: 9703681
    Abstract: Assistance is given to aid in optimizing a program's performance during initial development while the program's features are still being implemented and/or debugged, without interfering with that development, by providing easy-to-ignore yet accurate tips about a program's performance inside a debugger. Raw performance information for a software program which is being debugged in a debugger is adjusted by removing from it a measured debug overhead or other diagnostic overhead. Some factors considered when measuring overhead include pauses, context switches, debug versus release build presence, bounds checking, funceval, and call stack analyses. The debugger is enhanced to display the adjusted program performance measure in a graphical user interface, next to the corresponding source code. The enhanced debugger updates the adjusted program performance measure value and keeps its screen location current as the developer moves through the source code, providing more detailed performance information upon request.
    Type: Grant
    Filed: July 28, 2014
    Date of Patent: July 11, 2017
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Daniel Joshua Taylor, Andrew Brian Hall, Karl Melder, Daniel Demetris George Moth, Zhaoqing Wu, Oleg Izmerly, Gregory Miskelly, Jackson Michael Davis
  • Patent number: 9218487
    Abstract: A method for protecting a browser from malicious processes, comprises providing at least one process-proxy object and at least a browser-proxy object, interposed between the browser and a process, such that when the process invokes one of the DOM entry points, the process-proxy object isolates it from the real browser implementation and executes the process-proxy object's code instead.
    Type: Grant
    Filed: October 13, 2014
    Date of Patent: December 22, 2015
    Assignee: TRUSTEER, LTD.
    Inventors: Amit Klein, Eldan Ben-Haim, Oleg Izmerly, Shmuel Regev, Michael Boodaei
  • Publication number: 20150347274
    Abstract: Assistance is given to aid in optimizing a program's performance during initial development while the program's features are still being implemented and/or debugged, without interfering with that development, by providing easy-to-ignore yet accurate tips about a program's performance inside a debugger. Raw performance information for a software program which is being debugged in a debugger is adjusted by removing from it a measured debug overhead or other diagnostic overhead. Some factors considered when measuring overhead include pauses, context switches, debug versus release build presence, bounds checking, funceval, and call stack analyses. The debugger is enhanced to display the adjusted program performance measure in a graphical user interface, next to the corresponding source code. The enhanced debugger updates the adjusted program performance measure value and keeps its screen location current as the developer moves through the source code, providing more detailed performance information upon request.
    Type: Application
    Filed: July 28, 2014
    Publication date: December 3, 2015
    Inventors: Daniel Joshua Taylor, Andrew Brian Hall, Karl Melder, Daniel Demetris George MOTH, Zhaoqing Wu, Oleg Izmerly, Gregory Miskelly, Jackson Michael Davis
  • Patent number: 9081956
    Abstract: A method for protecting a browser from malicious processes, comprises providing at least one process-proxy object and at least a browser-proxy object, interposed between the browser and a process, such that when the process invokes one of the DOM entry points, the process-proxy object isolates it from the real browser implementation and executes the process-proxy object's code instead.
    Type: Grant
    Filed: May 22, 2009
    Date of Patent: July 14, 2015
    Assignee: Trusteer Ltd.
    Inventors: Amit Klein, Eldan Ben-Haim, Oleg Izmerly, Shmuel Regev, Michael Boodaei
  • Publication number: 20150128273
    Abstract: A method for protecting a browser from malicious processes, comprises providing at least one process-proxy object and at least a browser-proxy object, interposed between the browser and a process, such that when the process invokes one of the DOM entry points, the process-proxy object isolates it from the real browser implementation and executes the process-proxy object's code instead.
    Type: Application
    Filed: October 13, 2014
    Publication date: May 7, 2015
    Inventors: Amit KLEIN, Eldan BEN-HAIM, Oleg IZMERLY, Shmuel REGEV, Michael BOODAEI
  • Patent number: 8863281
    Abstract: A method for protecting a browser from malicious processes, comprises providing at least one process-proxy object and at least a browser-proxy object, interposed between the browser and a process, such that when the process invokes one of the DOM entry points, the process-proxy object isolates it from the real browser implementation and executes the process-proxy object's code instead.
    Type: Grant
    Filed: May 22, 2009
    Date of Patent: October 14, 2014
    Assignee: Trusteer Ltd.
    Inventors: Amit Klein, Eldan Ben-Haim, Oleg Izmerly, Shmuel Regev, Michael Boodaei
  • Patent number: 8813224
    Abstract: A method for protecting a browser from malicious processes, comprises providing at least one process-proxy object and at least a browser-proxy object, interposed between the browser and a process, such that when the process invokes one of the DOM entry points, the process-proxy object isolates it from the real browser implementation and executes the process-proxy object's code instead.
    Type: Grant
    Filed: May 22, 2009
    Date of Patent: August 19, 2014
    Assignee: Trusteer Ltd.
    Inventors: Amit Klein, Eldan Ben-Haim, Oleg Izmerly, Shmuel Regev, Michael Boodaei
  • Patent number: 8732794
    Abstract: A browser plug-in firewall manages data exchanged between a browser and a plug-in according to a pre-defined list of rights.
    Type: Grant
    Filed: August 11, 2008
    Date of Patent: May 20, 2014
    Assignee: Trusteer Ltd.
    Inventors: Michael Boodaei, Amit Klein, Oleg Izmerly
  • Patent number: 8595836
    Abstract: A method for preventing malicious attacks on software, using the patching method, includes providing a database of malicious known patches (malware). The database contains characteristic signatures of the malware. The method also includes detecting whether a patch is malicious by comparing it with a signature in the database and performing one or more activities needed to prevent the malicious patch from performing undesired activities.
    Type: Grant
    Filed: August 3, 2011
    Date of Patent: November 26, 2013
    Assignee: Trusteer Ltd.
    Inventors: Amit Klein, Oleg Izmerly, Shmuel Regev, Eldan Ben-Haim
  • Patent number: 8239940
    Abstract: A method for preventing malicious attacks on software, using the patching method, includes providing a database of legitimate and known patches, the database contains characteristic code paths of said legitimate patches. The method also includes detecting whether a patch is malicious by inspecting one or more characteristic paths of the patch and matching one or more code paths against the database of legitimate and known patches. An activity needed to prevent the malicious patch from performing undesired activities is then performed.
    Type: Grant
    Filed: August 7, 2009
    Date of Patent: August 7, 2012
    Assignee: Trusteer Ltd.
    Inventors: Amit Klein, Oleg Izmerly, Shmuel Regev, Eldan Ben-Haim
  • Publication number: 20120030762
    Abstract: A method for preventing malicious attacks on software, using the patching method, includes providing a database of malicious known patches (malware). The database contains characteristic signatures of the malware. The method also includes detecting whether a patch is malicious by comparing it with a signature in the database and performing one or more activities needed to prevent the malicious patch from performing undesired activities.
    Type: Application
    Filed: August 3, 2011
    Publication date: February 2, 2012
    Applicant: TRUSTEER LTD.
    Inventors: Amit KLEIN, Oleg Izmerly, Shmuel Regev, Eldan Ben-Haim
  • Publication number: 20100169969
    Abstract: A method for preventing malicious attacks on software, using the patching method, includes providing a database of legitimate and known patches, the database contains characteristic code paths of said legitimate patches. The method also includes detecting whether a patch is malicious by inspecting one or more characteristic paths of the patch and matching one or more code paths against the database of legitimate and known patches. An activity needed to prevent the malicious patch from performing undesired activities is then performed.
    Type: Application
    Filed: August 7, 2009
    Publication date: July 1, 2010
    Applicant: TRUSTEER LTD.
    Inventors: Amit KLEIN, Oleg Izmerly, Shmuel Regev, Eldan Ben-Haim
  • Publication number: 20090293102
    Abstract: A method for protecting a browser from malicious processes, comprises providing at least one process-proxy object and at least a browser-proxy object, interposed between the browser and a process, such that when the process invokes one of the DOM entry points, the process-proxy object isolates it from the real browser implementation and executes the process-proxy object's code instead.
    Type: Application
    Filed: May 22, 2009
    Publication date: November 26, 2009
    Applicant: TRUSTEER LTD.
    Inventors: Amit KLEIN, Eldan BEN-HAIM, Oleg IZMERLY, Shmuel REGEV, Michael BOODAEI
  • Publication number: 20090064309
    Abstract: A browser plug-in firewall manages data exchanged between a browser and a plug-in according to a pre-defined list of rights.
    Type: Application
    Filed: August 11, 2008
    Publication date: March 5, 2009
    Applicant: TRUSTEER LTD.
    Inventors: Michael Boodaei, Amit Klein, Oleg Izmerly