Patents by Inventor Serg Bell

Serg Bell has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20250110754
    Abstract: Systems and methods for web UI development, including supporting and rendering UI using multiple frameworks and migrating between different frameworks. Systems and methods can train different adapters for converting UI models in declarative abstract view into framework-specific code and render UI from the code using multiple or optimal frameworks.
    Type: Application
    Filed: September 28, 2023
    Publication date: April 3, 2025
    Inventors: Pavel Kozemirov, Serg Bell, Stanislav Protasov
  • Publication number: 20250110931
    Abstract: In one aspect, a system may receive, via a user graphical user interface, a request to perform a data migration from a source data center to a destination data center. A system may in response to receiving the request, perform the data migration by: (1) creating a copy of a tenants structure that lists information about each tenant of the source data center, wherein a respective tenant is a representation of a user on a platform level, (2) creating and activating, on the destination data center, a plurality of new user accounts that match a main login body and suffix of a plurality of existing user accounts on the source data center, (3) re-registering, at the destination data center, agents from the source data center; and (4) migrating backup data from the source data center to the destination data center.
    Type: Application
    Filed: September 19, 2024
    Publication date: April 3, 2025
    Inventors: Dmitry LEDENYOV, Alexander ANDREEV, Maxim CHEREY, Brad SMITH, Serg BELL, Stanislav PROTASOV
  • Publication number: 20250110924
    Abstract: Disclosed herein are systems and method for executing jump-based content-defined data chunking. In one aspect, a method may generate, for a byte stream of data, a primary window and a secondary window that overlaps with the primary window. A method may scan the byte stream for data chunks using the primary window and the secondary window, wherein the scanning comprises (a) executing, based on minimum values in the secondary window when shifted along the primary window, a jump mechanism in which the primary window and the secondary window are shifted forward by a fixed amount of bytes on the byte stream and (b) marking cut-off points of detected data chunks based on maximum values within and outside the primary window. A method may output the cut-off points of the detected data chunks.
    Type: Application
    Filed: September 29, 2023
    Publication date: April 3, 2025
    Inventors: Abdelrahman Ba'ba', Sreeharsha Udayashankar, Samer Al-Kiswany, Serg Bell, Stanislav Protasov
  • Publication number: 20250112900
    Abstract: Systems and methods for hiding data inside data communications other than a primary message (e.g. primary data). An encoder coupled to a message generator can include hidden data not inside the primary message, but inside secondary data, such as additional technical information or metadata. An injector can inject hidden data in secondary data received as part of a data transmission.
    Type: Application
    Filed: September 28, 2023
    Publication date: April 3, 2025
    Inventors: Serg Bell, Stanislav Protasov
  • Patent number: 12265817
    Abstract: A system and method implemented for installing sequential automatic updates partially distributed in a computing environment. The system includes an update server to identify a first group of nodes having applications that require updates. An update task manager sends an update task to an update agent installed at each node of a first group of the nodes. The update agent determines availability of each software component of a software application that requires the update. If the software components are ready, the update is delivered by uninstalling a previous version and installing the updated version at the software components. During the update installation, progress of the update is monitored, and completion of the update is reported to the nodes. Update availability is monitored, and emergency updates are delivered forcefully if available.
    Type: Grant
    Filed: December 16, 2022
    Date of Patent: April 1, 2025
    Assignee: Acronis International GmbH
    Inventors: Vladimir Miroshkin, Serg Bell, Stanislav Protasov
  • Publication number: 20250103750
    Abstract: A system may store user data associated with a usage of a software application. A system may receive a request for the user data from a developer of the software application. A system may determine whether the user data is generated from a first version of the software application or a second version of the software application. A system may in response to determining that the user data is generated from the first version of the software application, retrieving a first dictionary that indicates an anonymization scheme for transmitting the user data of the first version of the software application, wherein each version of the software application has a different dictionary. A system may execute the anonymization scheme on the user data to generate anonymized user data. A system may transmit the anonymized user data to the developer in response to the request.
    Type: Application
    Filed: September 19, 2024
    Publication date: March 27, 2025
    Inventors: Mikhail BALAYAN, Serg BELL, Stanislav PROTASOV
  • Publication number: 20250106039
    Abstract: Systems and methods for safeguarding the authenticity and integrity of a real-time video feed generated by a webcam. A video frame includes a sequence of frame images and key frames within the sequence. A method includes generating the video feed by the webcam at a first computing device, identifying a key frame [kf] in the video feed, digitally signing the key frame [kf] using a private key of a private key-public key pair, embedding the digitally signed key frame [kf] in the video feed, transmitting the video feed to second computing device, identifying the next key frame [kf+1] in the video feed, and determining a similarity value of the next key frame [kf+1] and the key frame [kf] to determine whether to digitally sign and embed the digitally signed key frame [kf+1] in the video feed.
    Type: Application
    Filed: September 25, 2023
    Publication date: March 27, 2025
    Inventors: Candid Wuest, Serg Bell, Stanislav Protasov
  • Publication number: 20250106251
    Abstract: Virtual file honeypots (VFHs) are deployed to protect real files in a computing system. The storage footprint is reduced because the virtual file honeypots do not require storage resources. VFHs are generated to appear the same as other files in a computing system, presenting an attractive attack surface as bait to reveal malicious processes and agents. The VFHs are generated on-demand and are not backed up in system storage. The use of VFHs requires less storage capacity than real honeypot files and conserves computing system resources.
    Type: Application
    Filed: September 25, 2023
    Publication date: March 27, 2025
    Inventors: Vladimir Strogov, Aliaksei Dodz, Serg Bell, Stanislav Protasov
  • Publication number: 20250103947
    Abstract: Systems and methods for uncovering a conservation law in physical systems including evaluating collected data by a representation learning system. Analyzing the collected data by a topological learning analysis system, transferring the data into at least two displayable trajectories. Generating a distance matrix by computing so-called Wasserstein distances between the trajectories, with the distance matrix showing a shape space between the trajectories. Embedding the shape space of the distance matrix into lower dimensions by using a so-called uniform manifold approximation and projection (UMAP). Determining at least two scores for different embeddings to choose a score, representing the shape space, and/or representing a minimal dimensionality. Using a symbolic regression to identify a closed form of the integrals of motion.
    Type: Application
    Filed: September 26, 2023
    Publication date: March 27, 2025
    Inventors: Andrey Ustyuzhanin, Antonii Belyshev, Alexander Kovrigin, Serg Bell, Stanislav Protasov, Nikolay Dobrovolskiy
  • Publication number: 20250094325
    Abstract: Systems and methods for generating synthetic test data for testing a software solution. Systems and methods include receiving a testing task from a user, identifying test properties of the testing task, gathering initial information based on the test properties of the testing task, forming a training dataset based on the initial information and the test properties, pretraining a generative AI model based on a large language model (LLM) using the training dataset, configuring synthetic test data based on the test properties, and generating synthetic test data according to the testing task using the generative AI model.
    Type: Application
    Filed: September 19, 2023
    Publication date: March 20, 2025
    Inventors: Candid Wuest, Serg Bell, Stanislav Protasov
  • Publication number: 20250094611
    Abstract: Systems and methods for protecting certain personal data used by large language models. A user can ask artificial intelligence to provide an answer that can include personal or sensitive data. Systems and methods determine which data is restricted and personal, and which data is not. Personal or sensitive data is handled according to handling rules.
    Type: Application
    Filed: September 18, 2023
    Publication date: March 20, 2025
    Inventors: Serg Bell, Stanislav Protasov
  • Publication number: 20250094585
    Abstract: Systems and methods for detecting malicious activity on an endpoint, the endpoint having executing processes, including tracking behavior of executing processes, generating a provenance graph to group the behavior events, transforming the provenance graph into a sequence of behavior events, training a sequence classification machine learning model based on the sequence of behavior events, processing a sequence of test behavior events using the sequence classification machine learning model to generate a probability of maliciousness, and alerting for malicious activity when the probability of maliciousness for the sequence of test behavior events is greater than a threshold.
    Type: Application
    Filed: September 19, 2023
    Publication date: March 20, 2025
    Inventors: Candid Wuest, Philipp Gysel, Dinil Mon Divakaran, Andrey Ustyuzhanin, Kenneth Nwafor, Serg Bell, Stanislav Protasov
  • Publication number: 20250094572
    Abstract: Systems and methods for mitigating potential security incidents. A system includes a data ingestion module, a graphical user interface (GUI), a generative AI model, an enrichment module, and a mitigation module. The generative AI model is pretrained on a large language model (LLM) using a dataset of known security incidents and the computer system's infrastructure, and analyses potential security incidents and generates incident overviews, leveraging its understanding of attack frameworks and previous incident data. The enrichment module incorporates user interactions, enhancing the incident overviews with accurate information. The mitigation module proposes mitigation actions based on the generative AI model's insights gained from prior incidents. The system enables natural language interaction through the GUI and provides graphical representations of the incidents.
    Type: Application
    Filed: September 15, 2023
    Publication date: March 20, 2025
    Inventors: Candid Wuest, Serg Bell, Stanislav Protasov
  • Patent number: 12255885
    Abstract: A system of monitoring a user behavior for abnormalities compared to a group behavior includes a processor configured to implement instructions for a user to group behavior signature monitor (UGBSM) with at least one user, as a monitored user, and a group of one or more users, as baseline users, to access to certain characteristics of the monitored user and certain characteristics of the baseline users, calculate a user behavioral signature of the monitored user, calculate a group behavioral signature of the baseline users, calculate a degree of variance (DoV) between the user behavioral signature of the monitored user and the group behavioral signature of baseline users, and compare the calculated DoV to a variance threshold to determine whether the user behavioral signature of the monitored user is similar or is different from the group behavioral signature of the baseline users.
    Type: Grant
    Filed: May 31, 2022
    Date of Patent: March 18, 2025
    Assignee: Acronis International GmbH
    Inventors: Nickolay Berko, Serg Bell, Stanislav Protasov
  • Patent number: 12255924
    Abstract: A system to create Data Loss Prevention (DLP) policies and adjust DLP policies over time in a computing system using agents running at an endpoint to intercept a data transfer in a network traffic. New data flow/DLP policy rules are created and updated with reference to behavior data of trusted and untrusted users.
    Type: Grant
    Filed: May 31, 2022
    Date of Patent: March 18, 2025
    Assignee: Acronis International GmbH
    Inventors: Nickolay Berko, Serg Bell, Stanislav Protasov
  • Publication number: 20250085955
    Abstract: A system and method implemented for installing sequential automatic updates partially distributed in a computing environment. The system includes an update server to identify a first group of nodes having applications that require updates. An update task manager sends an update task to an update agent installed at each node of a first group of the nodes. The update agent determines availability of each software component of a software application that requires the update. If the software components are ready, the update is delivered by uninstalling a previous version and installing the updated version at the software components. During the update installation, progress of the update is monitored, and completion of the update is reported to the nodes. Update availability is monitored, and emergency updates are delivered forcefully if available.
    Type: Application
    Filed: December 16, 2022
    Publication date: March 13, 2025
    Inventors: Vladimir Miroshkin, Serg Bell, Stanislav Protasov
  • Publication number: 20250083707
    Abstract: A multi-layer path-planning system and method calculates trajectories for autonomous vehicles using a global planner, a fast local planner, and an optimizing local planner. The calculated trajectories are used to guide the autonomous vehicle along a bounded path between a starting point and a destination.
    Type: Application
    Filed: November 25, 2024
    Publication date: March 13, 2025
    Inventors: Maksim FILIPENKO, Aleksandr BUYVAL, Ruslan MUSTAFIN, Ilya SHIMCHIK, Serg BELL, Stanislav PROTASOV, Nikolay DOBROVOLSKIY
  • Publication number: 20250083703
    Abstract: A multi-layer path-planning system and method calculates trajectories for autonomous vehicles using a global planner, a fast local planner, and an optimizing local planner. The calculated trajectories are used to guide the autonomous vehicle along a bounded path between a starting point and a destination.
    Type: Application
    Filed: November 22, 2024
    Publication date: March 13, 2025
    Inventors: Maksim FILIPENKO, Aleksandr BUYVAL, Ruslan MUSTAFIN, Ilya SHIMCHIK, Serg BELL, Stanislav PROTASOV, Nikolay DOBROVOLSKIY
  • Publication number: 20250086281
    Abstract: Disclosed herein are systems and method for detecting malware in obfuscated scripts. A method may include receiving the obfuscated script on a computing device written in a first coding language, wherein a malware scanner on the computing device is incompatible with the first coding language, identifying the first coding language based on detected keywords and operators in the obfuscated script, converting each line of the obfuscated script in the first coding language into a respective modified abstract syntax tree (mAST), receiving artifacts of the obfuscated script by executing at least one mAST using a universal emulator, scanning the artifacts for malware using the malware scanner; and in response to detecting the malware in the obfuscated script based on the scanning, performing a remediation action on the obfuscated script.
    Type: Application
    Filed: September 7, 2023
    Publication date: March 13, 2025
    Inventors: Kurt Natvig, Serg BELL, Stanislav PROTASOV
  • Publication number: 20250077392
    Abstract: Systems and methods for checking the correctness of a computer program with at least one incorrect instruction inserted into at least one of a plurality of branches of the computer program. At least one prover generates a counterexample of computer program correctness in order to switch focus from a failed proof of the correctness of the computer program to a failed test of the correctness of the computer program.
    Type: Application
    Filed: August 28, 2023
    Publication date: March 6, 2025
    Inventors: Manuel Oriol, Huang Li, Bertrand Meyer, Serg Bell, Stanislav Protasov, Nikolay Dobrovolskiy