Patents by Inventor Or GORODISSKY

Or GORODISSKY has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11582256
    Abstract: Methods and systems for penetration testing of a networked system involve assigning network nodes to disjoint classes based on current information about the compromisability of the network nodes. The classes distinguish between nodes not currently known to be compromisable, nodes that only recently have become known to be compromisable, e.g., by a first method of a attack, and nodes that have been known for a longer time to be compromisable. Nodes that only recently have become known to be compromisable can be re-targeted by the penetration testing system to determine whether such nodes can be compromised using multiple methods of attack and not just using the first method of attack.
    Type: Grant
    Filed: November 16, 2020
    Date of Patent: February 14, 2023
    Assignee: XM Cyber Ltd.
    Inventors: Yarden Moskovich, Ronen Segal, Boaz Gorodissky
  • Publication number: 20230027783
    Abstract: A system and method for concealing and revealing a human face in media objects may include obtaining a first media object capturing an image of the face; employing a first unit to: extract, from the first media object, a set of features representing the face, and generate a second media object, by embedding the extracted features in an anonymized media object; and employing a second unit to recognize the face based on the second media object.
    Type: Application
    Filed: December 15, 2020
    Publication date: January 26, 2023
    Applicant: DE-IDENTIFICATION LTD.
    Inventors: Eliran KUTA, Sella BLONDHEIM, Gil PERRY, Matan BEN YOSEF, Yoav HACOHEN, Or GORODISSKY
  • Publication number: 20230023148
    Abstract: A system and a method of performing face recognition may include: receiving a first facial image, depicting a first face, and a second facial image depicting a second face; applying an ML model on the first image, to produce a first representation vector, and applying the ML model on the second image to produce a second representation vector; comparing the first representation vector and the second representation vector; and associating the first face with the second face based on the comparison, where the ML model is trained to produce the representation vectors from the facial images, based on regions in the facial images that correspond to distinctiveness scores that are beneath a distinctiveness threshold.
    Type: Application
    Filed: December 14, 2020
    Publication date: January 26, 2023
    Applicant: DE-IDENTIFICATION LTD.
    Inventors: Eliran KUTA, Sella BLONDHEIM, Gil PERRY, Yoav HACOHEN, Matan BEN YOSEF, Or GORODISSKY
  • Publication number: 20230027309
    Abstract: A system and method for de-identification of an image may include receiving an input image of a human face; iteratively modifying the input image to produce an output image of the human face until: (a) a threshold indicating how unlikely a human is to associate the input image with the output image is reached, and (b) a threshold indicating an ability of a computerized unit to associate the input image with the output image is reached; and providing the output image.
    Type: Application
    Filed: December 15, 2020
    Publication date: January 26, 2023
    Applicant: DE-IDENTIFICATION LTD.
    Inventors: Eliran KUTA, Sella BLONDHEIM, Gil PERRY, Or GORODISSKY, Matan BEN YOSEF
  • Patent number: 11526626
    Abstract: To consistently anonymize video, an identity-preserving encoder may be trained with a decoder to preserve identity information unique to an individual in an encoded space. The identity-preserving encoder may encode source video images of a source identity to generate identity-preserving encoded data representing the source identity. A de-identification engine may generate de-identifying encoded data representing a different target identity. A transformation may be generated based on a difference between the identity-preserving and de-identifying encoded data, representing swapping the source identity with the target identity. The identity may be consistently swapped from the source to target in the encoded space by applying the same transformation to the identity-preserving encoded data for the source images.
    Type: Grant
    Filed: July 10, 2020
    Date of Patent: December 13, 2022
    Assignee: DE-IDENTIFICATION LTD.
    Inventors: Eliran Kuta, Sella Blondheim, Gil Perry, Yoav Hacohen, Amitay Nachmani, Naama Antebi, Matan Ben-Yosef, Or Gorodissky
  • Patent number: 11461948
    Abstract: A system and method voice driven animation of an object in an image by sampling an input video, depicting a puppet object, to obtain an image, receiving audio data, extracting voice related features from the audio data, producing an expression representation based on the voice related features, wherein the expression representation is related to a region of interest, obtaining from the image, auxiliary data related to the image and generating a target image based on the expression representation and the auxiliary data.
    Type: Grant
    Filed: July 15, 2021
    Date of Patent: October 4, 2022
    Assignee: DE-IDENTIFICATION LTD.
    Inventors: Eliran Kuta, Sella Blondheim, Gil Perry, Amitay Nachmani, Matan Ben-Yosef, Or Gorodissky
  • Patent number: 11436781
    Abstract: A system and method of animating an image of an object by extracting a plurality of three dimensional (3D) features from a first image, depicting a puppet object, and from the second image of a driver object, obtaining, a value of a first 3D identity-invariant feature of the puppet object, and a value of a second 3D identity-invariant feature, from the second image, calculating and applying, a mixing function, on the plurality of 3D features, generating a rendered image, based on the plurality of 3D features, the first 3D identity-invariant feature and the second 3D identity-invariant feature, and generating an output image based on the rendered image, the plurality of 3D features, the first image and the second image, wherein the output image depicting a target object comprising at least one 3D identity-invariant feature of the driver object.
    Type: Grant
    Filed: July 15, 2021
    Date of Patent: September 6, 2022
    Assignee: DE-IDENTIFICATION LTD.
    Inventors: Eliran Kuta, Sella Blondheim, Gil Perry, Amitay Nachmani, Matan Ben-Yosef, Or Gorodissky
  • Publication number: 20220172416
    Abstract: A system and method of performing facial image anonymization may include: obtaining, by at least one processor of a first computing device, at least one first image data element, depicting a first face; using, by the at least one processor, a first neural network (NN), to encode the facial image into a first low-dimension, latent vector; using, by the at least one processor, a transformation module, adapted to modify the first latent vector, to produce an anonymized latent vector; and transmitting, by the at least one processor, the anonymized latent vector, via a communication network to a remote second computing device, wherein the second computing device is adapted to decode the anonymized latent vector into a second image data element, depicting an anonymized face.
    Type: Application
    Filed: December 1, 2021
    Publication date: June 2, 2022
    Applicant: DE-IDENTIFICATION LTD.
    Inventors: Eliran KUTA, Sella BLONDHEIM, Gil PERRY, Yoav HACOHEN, Amitay NACHMANI, Matan BEN-YOSEF, Or GORODISSKY
  • Patent number: 11276214
    Abstract: A system and method of animating an image of an object may include: receiving a first image, depicting a “puppet” object; sampling an input video, depicting a second, “driver” object, to obtain at least one second image; obtaining, by a first machine-learning (ML) model, a first identity-invariant feature of the puppet object, from the first image; obtaining at least one second identity-invariant feature of the driver object, from the respective at least one second image; calculating, by a second ML model, a transformation function, based on the first identity-invariant feature and the at least one second identity-invariant feature; applying the calculated transformation function on the first image, to produce one or more third images, depicting a target object, including at least one identity-invariant feature of the driver object; and appending the one or more third images to produce an output video depicting animation of the puppet object.
    Type: Grant
    Filed: April 6, 2021
    Date of Patent: March 15, 2022
    Assignee: DE-IDENIIFICATION LTD.
    Inventors: Eliran Kuta, Sella Blondheim, Gil Perry, Amitay Nachmani, Matan Ben-Yosef, Or Gorodissky
  • Publication number: 20220020197
    Abstract: A system and method of animating an image of an object by extracting a plurality of three dimensional (3D) features from a first image, depicting a puppet object, and from the second image of a driver object, obtaining, a value of a first 3D identity-invariant feature of the puppet object, and a value of a second 3D identity-invariant feature, from the second image, calculating and applying, a mixing function, on the plurality of 3D features, generating a rendered image, based on the plurality of 3D features, the first 3D identity-invariant feature and the second 3D identity-invariant feature, and generating an output image based on the rendered image, the plurality of 3D features, the first image and the second image, wherein the output image depicting a target object comprising at least one 3D identity-invariant feature of the driver object.
    Type: Application
    Filed: July 15, 2021
    Publication date: January 20, 2022
    Applicant: DE-IDENTIFICATION LTD.
    Inventors: Eliran KUTA, Sella BLONDHEIM, Gil PERRY, Amitay NACHMANI, Matan BEN-YOSEF, Or GORODISSKY
  • Publication number: 20220020196
    Abstract: A system and method voice driven animation of an object in an image by sampling an input video, depicting a puppet object, to obtain an image, receiving audio data, extracting voice related features from the audio data, producing an expression representation based on the voice related features, wherein the expression representation is related to a region of interest, obtaining from the image, auxiliary data related to the image and generating a target image based on the expression representation and the auxiliary data.
    Type: Application
    Filed: July 15, 2021
    Publication date: January 20, 2022
    Applicant: DE-IDENTIFICATION LTD.
    Inventors: Eliran KUTA, Sella BLONDHEIM, Gil PERRY, Amitay NACHMANI, Matan BEN-YOSEF, Or GORODISSKY
  • Publication number: 20220020195
    Abstract: A system and method of animating an image of an object may include: receiving a first image, depicting a “puppet” object; sampling an input video, depicting a second, “driver” object, to obtain at least one second image; obtaining, by a first machine-learning (ML) model, a first identity-invariant feature of the puppet object, from the first image; obtaining at least one second identity-invariant feature of the driver object, from the respective at least one second image; calculating, by a second ML model, a transformation function, based on the first identity-invariant feature and the at least one second identity-invariant feature; applying the calculated transformation function on the first image, to produce one or more third images, depicting a target object, including at least one identity-invariant feature of the driver object; and appending the one or more third images to produce an output video depicting animation of the puppet object.
    Type: Application
    Filed: April 6, 2021
    Publication date: January 20, 2022
    Applicant: DE-IDENTIFICATION LTD.
    Inventors: Eliran KUTA, Sella BLONDHEIM, Gil PERRY, Amitay Nachmani, Matan BEN-YOSEF, Or GORODISSKY
  • Publication number: 20220012362
    Abstract: To consistently anonymize video, an identity-preserving encoder may be trained with a decoder to preserve identity information unique to an individual in an encoded space. The identity-preserving encoder may encode source video images of a source identity to generate identity-preserving encoded data representing the source identity. A de-identification engine may generate de-identifying encoded data representing a different target identity. A transformation may be generated based on a difference between the identity-preserving and de-identifying encoded data, representing swapping the source identity with the target identity. The identity may be consistently swapped from the source to target in the encoded space by applying the same transformation to the identity-preserving encoded data for the source images.
    Type: Application
    Filed: July 10, 2020
    Publication date: January 13, 2022
    Applicant: DE-IDENTIFICATION LTD.
    Inventors: Eliran KUTA, Sella BLONDHEIM, Gil PERRY, Yoav HACOHEN, Amitay NACHMANI, Naama ANTEBI, Matan BEN-YOSEF, Or GORODISSKY
  • Patent number: 11206282
    Abstract: Methods and systems for penetration testing of a networked system by a penetration testing system. In some embodiments, both active and passive validation methods are used during a single penetration testing campaign in a single networked system. In other embodiments, a first penetration testing campaign uses only active validation and a second penetration campaign uses only passive validation, where both campaigns are performed by a single penetration testing system in a single networked system. Node-by-node determination of whether to use active or passive validation can be based on expected extent and/or likelihood of damage from actually compromising a network node using active validation.
    Type: Grant
    Filed: December 24, 2020
    Date of Patent: December 21, 2021
    Assignee: XM Cyber Ltd.
    Inventors: Boaz Gorodissky, Adi Ashkenazy, Ronen Segal, Menahem Lasser
  • Publication number: 20210314341
    Abstract: Methods and systems for penetration testing of a networked system involve assigning network nodes to disjoint classes based on current information about the compromisability of the network nodes. The classes distinguish between nodes not currently known to be compromisable, nodes that only recently have become known to be compromisable, e.g., by a first method of a attack, and nodes that have been known for a longer time to be compromisable. Nodes that only recently have become known to be compromisable can be re-targeted by the penetration testing system to determine whether such nodes can be compromised using multiple methods of attack and not just using the first method of attack.
    Type: Application
    Filed: November 16, 2020
    Publication date: October 7, 2021
    Inventors: Yarden Moskovich, Ronen Segal, Boaz GORODISSKY
  • Publication number: 20210226984
    Abstract: Methods and systems for penetration testing of a networked system by a penetration testing system. In some embodiments, both active and passive validation methods are used during a single penetration testing campaign in a single networked system. In other embodiments, a first penetration testing campaign uses only active validation and a second penetration campaign uses only passive validation, where both campaigns are performed by a single penetration testing system in a single networked system. Node-by-node determination of whether to use active or passive validation can be based on expected extent and/or likelihood of damage from actually compromising a network node using active validation.
    Type: Application
    Filed: December 24, 2020
    Publication date: July 22, 2021
    Inventors: Boaz GORODISSKY, Adi ASHKENAZY, Ronen SEGAL, Menahem LASSER
  • Patent number: 10999308
    Abstract: Methods and systems for penetration testing of a networked system by a penetration testing system (e.g. that is controlled by a user interface of a computing device) are disclosed herein. In one example, a penetration testing campaign is executed according to a manual and explicit selecting of one or more goals of an attacker of the penetration testing campaign. Alternatively or additionally, a penetration testing campaign is executed according to an automatic selecting of of one or more goals of the attacker (e.g. according to a type of attacker of the penetration testing campaign).
    Type: Grant
    Filed: August 21, 2017
    Date of Patent: May 4, 2021
    Assignee: XM Cyber Ltd.
    Inventors: Boaz Gorodissky, Adi Ashkenazy, Ronen Segal
  • Patent number: 10911476
    Abstract: Methods and systems for penetration testing of a networked system by a penetration testing system. In some embodiments, both active and passive validation methods are used during a single penetration testing campaign in a single networked system. In other embodiments, a first penetration testing campaign uses only active validation and a second penetration campaign uses only passive validation, where both campaigns are performed by a single penetration testing system in a single networked system. Node-by-node determination of whether to use active or passive validation can be based on expected extent and/or likelihood of damage from actually compromising a network node using active validation.
    Type: Grant
    Filed: March 27, 2020
    Date of Patent: February 2, 2021
    Assignee: XM CYBER LTD.
    Inventors: Boaz Gorodissky, Adi Ashkenazy, Ronen Segal, Menahem Lasser
  • Patent number: 10898420
    Abstract: Compositions comprising an isolate or extract comprising mangiferin, one or more of ferulic acid, Vitamin C, and baicalin, present in amounts sufficient to produce synergistic antioxidant activity and provided for cosmetic and other uses.
    Type: Grant
    Filed: October 31, 2016
    Date of Patent: January 26, 2021
    Assignee: L'OREAL
    Inventors: Zhi Pan, Ashleigh Murtaugh, Fan Hu, Yan Yu, Irina Gorodissky
  • Publication number: 20200236130
    Abstract: Methods and systems for penetration testing of a networked system by a penetration testing system. In some embodiments, both active and passive validation methods are used during a single penetration testing campaign in a single networked system. In other embodiments, a first penetration testing campaign uses only active validation and a second penetration campaign uses only passive validation, where both campaigns are performed by a single penetration testing system in a single networked system. Node-by-node determination of whether to use active or passive validation can be based on expected extent and/or likelihood of damage from actually compromising a network node using active validation.
    Type: Application
    Filed: March 27, 2020
    Publication date: July 23, 2020
    Inventors: Boaz GORODISSKY, Adi ASHKENAZY, Ronen SEGAL, Menahem LASSER