Patents by Inventor Yuri Khidekel

Yuri Khidekel has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20180225587
    Abstract: A method of machine learning includes performing dimensionality reduction on a parameter space by performing initial tests to determine scores for a plurality of parameter values in the parameter space, determining aggregate scores for a plurality of parameter value combinations, determining a ranking of the plurality of parameter value combinations based on the aggregate scores, and performing cluster analysis on the plurality of parameter value combinations to determine a set having highest aggregate scores. The method further includes performing additional tests, wherein each additional test is for a parameter value combination in the set. For each such parameter value combination, a probability of achieving a key performance indicator (KPI) is computed. Cluster analysis is then performed to determine a first subset of the set having highest probabilities of achieving the KPI. An operation is then performed on the first subset.
    Type: Application
    Filed: February 3, 2017
    Publication date: August 9, 2018
    Inventors: Yuri Khidekel, Dmitry Aryshev
  • Publication number: 20180225588
    Abstract: A method of machine learning includes performing dimensionality reduction on a parameter space by performing initial tests to determine scores for a plurality of parameter values in the parameter space, determining aggregate scores for a plurality of parameter value combinations, determining a ranking of the plurality of parameter value combinations based on the aggregate scores, and performing cluster analysis on the plurality of parameter value combinations to determine a set having highest aggregate scores. The method further includes performing additional tests, wherein each additional test is for a parameter value combination in the set. For each such parameter value combination, a probability of achieving a key performance indicator (KPI) is computed. Cluster analysis is then performed to determine a first subset of the set having highest probabilities of achieving the KPI. An operation is then performed on the first subset.
    Type: Application
    Filed: February 3, 2017
    Publication date: August 9, 2018
    Inventors: Yuri Khidekel, Dmitry Aryshev
  • Patent number: 6636975
    Abstract: A method and computer program product for accessing a secure resource using a certificate bound with authentication information. In one implementation, the method includes receiving a certificate request from a user, the certificate request including identification information and authentication information associated with the user; verifying the identification information; issuing a certificate to the user when the identification information is verified; and sending the authentication information and a certificate identifier for the certificate to an authentication server. According to one aspect, the sending step includes signing a combination of the authentication information and the certificate identifier to form a unique user identifier; signing the authentication information; and sending the unique user identifier to the authentication server.
    Type: Grant
    Filed: December 15, 1999
    Date of Patent: October 21, 2003
    Assignee: Identix Incorporated
    Inventors: Yuri Khidekel, Alex Balashov, Sergey Kisurin
  • Publication number: 20010027527
    Abstract: Techniques for providing secure transactions can include receiving a request for access to a first server by a user. The request includes the user's credentials such as biometric information, an electronic certificate, or other information. The user is authenticated based on the credentials, and a token is sent to the first server. The token indicates whether the user has been authenticated and includes criteria about the user. Based on the criteria in the token, the first server can determine whether the user is authorized to perform a particular transaction in connection with a specified file or application at the first server. The user can be re-authenticated prior to allowing the transaction to be completed. Each time the user is authenticated, a time-stamped record can be stored. Encryption can be used to enhance security.
    Type: Application
    Filed: February 23, 2001
    Publication date: October 4, 2001
    Inventors: Yuri Khidekel, Alex Balashov, Vladimir Bashmakov