-
公开(公告)号:US20230359307A1
公开(公告)日:2023-11-09
申请号:US18004875
申请日:2021-05-18
IPC分类号: G06F3/041 , G06F3/0354 , G06F3/044
CPC分类号: G06F3/04186 , G06F3/0412 , G06F3/03545 , G06F3/0442 , G06F3/04162 , G06F3/0414
摘要: An apparatus and method for improving signal quality of a sensor signal, wherein an AI-based anomaly detector is configured to recognize an anomaly in a sensor output data stream. This approach can be used to predict and identify rare anomaly signals that are not handled properly by noise removal algorithms and help subsequent algorithms to get better decisions on the fly to better handle anomalous samples.
-
公开(公告)号:US20200336505A1
公开(公告)日:2020-10-22
申请号:US16389478
申请日:2019-04-19
发明人: Hani Hana NEUVIRTH , Sangeetha MADDERLA , Larry J. MATUSKA , William K. HOLLIS , Gueorgui CHKODROV , Yotam LIVNY
摘要: Disclosed herein is a system for generating and displaying information useful to help a security analyst understand a scale and a root cause of a potential security issue associated with a resource. The resource can include a server, a storage device, a user device (e.g., a personal computer, a tablet computer, a smartphone, etc.), a virtual machine, networking equipment, etc. The resource may be one that is under control of an entity operating a security operations center. Additionally or alternatively, the resource may be one that is configured to be monitored by the security operations center. The information provides the security analyst with a broader context of the potential security issue based on relationships between the potential security issues and other security issues. Consequently, the information enables the security analyst to implement more efficient and effective actions to handle the potential security issue.
-
公开(公告)号:US20220166762A1
公开(公告)日:2022-05-26
申请号:US17104311
申请日:2020-11-25
发明人: Orr SROUR , Yotam LIVNY
摘要: Embodiments described herein are directed to an integrated circuit (IC) for obtaining elevated credentials and performing actions with respect to a network-based resource in accordance with the elevated credentials. For instance, a user may request his privileges with respect to the resource to be elevated. Responsive to submitting the request, the client device's main CPU may send a request to a specialized IC included in the client device. The specialized IC performs various forms of validation responsive to the request. If validation is successful, the specialized IC sends a request for elevated privileges to a network-based service, which determines whether the user is authorized to do so. Upon a successful determination, the service provides a response granting the elevated credentials. The specialized integrated circuit is then given access to a private key that the IC utilizes to digitally sign an action request to perform the desired action.
-
公开(公告)号:US20200336506A1
公开(公告)日:2020-10-22
申请号:US16390960
申请日:2019-04-22
摘要: Disclosed herein is a system for predicting, given a pattern of triggered alerts, a next alert in order to identify malicious activity that is about to occur on resource(s) being monitored by a security operations center. A resource can include a server, a storage device, a user device (e.g., a personal computer, a tablet computer, a smartphone, etc.), a virtual machine, networking equipment, etc. Accordingly, the next alert is speculatively triggered in advance and a security analyst can be notified of a pattern of activity that is likely to be malicious. The security analyst can then investigate the pattern of triggered alerts and the speculatively triggered alert to determine whether steps to mitigate the malicious activity before it occurs should be taken.
-
公开(公告)号:US20230360513A1
公开(公告)日:2023-11-09
申请号:US18355740
申请日:2023-07-20
发明人: Yotam LIVNY , Tamer SALMAN
CPC分类号: G08B21/182 , G06N20/00 , G06F9/542 , G08B5/222
摘要: Methods, systems and apparatuses are described herein to provide adaptive severity functions for alerts, particularly security alerts. The adaptive severity functions may be aligned with an existing global security situation to upgrade or downgrade the severity of new and existing alerts. By taking into consideration the time factor along with other parameters, the alerts may be prioritized or reprioritized appropriately. The modification of the severity level for the alerts may be made based on rules and/or one or more triggering events or by using severity functions with or without the aid of artificial intelligence based on best-practice preferences.
-
公开(公告)号:US20230028840A1
公开(公告)日:2023-01-26
申请号:US17937826
申请日:2022-10-04
发明人: Andrey KARPOVSKY , Tomer ROTSTEIN , Fady NASERELDEEN , Naama KRAUS , Roy LEVIN , Yotam LIVNY
摘要: Unauthorized use of user credentials in a network is detected. Data indicative of text strings being used to access resources in the network is accessed. Regex models are determined for the text strings. Troupings of the regex models are determined based on an optimization of a cumulative weighted function. A regex model having a cumulative weighted function that exceeds a predetermined threshold is identified. An alert is generated when the cumulative weighted function for the identified regex model exceeds the predetermined threshold.
-
公开(公告)号:US20220391028A1
公开(公告)日:2022-12-08
申请号:US17342162
申请日:2021-06-08
发明人: Yotam LIVNY , Nadav LINENBERG , Amir ZYSKIND
IPC分类号: G06F3/0354 , G06F3/0346 , G06F3/038 , G06K9/62
摘要: Examples are disclosed that relate to interpreting user input at a computing device. One example provides a method comprising recording a plurality of interactions between a user and a computing device conducted using an input device, and extracting, from the plurality of interactions, one or more performance indicators. The method further comprises accessing a data store to obtain a predetermined profile that corresponds to the one or more performance indicators, the predetermined profile including one or more driver parameters, and implementing, at one or both of the computing device and the input device, at least one of the one or more driver parameters so as to at least affect how user input is interpreted at the computing device.
-
公开(公告)号:US20220374099A1
公开(公告)日:2022-11-24
申请号:US17323757
申请日:2021-05-18
发明人: Yotam LIVNY , Nir DAVID , Yael LIVNE
摘要: A computing system includes a touch-sensitive display and one or more processors. The touch-sensitive display is configured to detect a run-time touch input from a user. The one or more processors are configured to execute instructions using portions of associated memory to implement a touch driver of the touch-sensitive display and an artificial intelligence model. The touch driver is configured to process the run-time touch input based on a plurality of calibration parameters and output a touch event and a plurality of run-time touch input parameters associated with the touch input event. The artificial intelligence model is configured to receive, as input, the run-time touch input parameters. Responsive to receiving the run-time touch input parameters, the artificial intelligence model is configured to output a personalized user touch driver profile including a plurality of updated calibration parameters for the touch driver.
-
公开(公告)号:US20220030019A1
公开(公告)日:2022-01-27
申请号:US16938776
申请日:2020-07-24
IPC分类号: H04L29/06 , G06F16/2458
摘要: An indication of a security alert and a context for the security alert is received. The context includes one or more entities related to the context and a timestamp for the security alert. Data sources for the one or more entities are searched during a time window around the timestamp. One or more anomaly detection models are executed to identify anomalies that are related to the security alert based on the context. Identified anomalies for investigation of the security alert are output.
-
公开(公告)号:US20200320845A1
公开(公告)日:2020-10-08
申请号:US16378219
申请日:2019-04-08
发明人: Yotam LIVNY , Tamer SALMAN
摘要: Methods, systems and apparatuses are described herein to provide adaptive severity functions for alerts, particularly security alerts. The adaptive severity functions may be aligned with an existing global security situation to upgrade or downgrade the severity of new and existing alerts. By taking into consideration the time factor along with other parameters, the alerts may be prioritized or reprioritized appropriately. The modification of the severity level for the alerts may be made based on rules and/or one or more triggering events or by using severity functions with or without the aid of artificial intelligence based on best-practice preferences.
-
-
-
-
-
-
-
-
-