Lipin
Adi Lipin, Yehud IL
Patent application number | Description | Published |
---|---|---|
20160048586 | CLASSIFYING URLS - According to an example, a Trie is formed from URLs and nodes of the Trie are assigned a weight. A node is selected based on its weight and child nodes of the selected node merged together. A URL classification is output based on a path in the Trie. | 02-18-2016 |
Andrew Lipin, West Bloomfield, MI US
Patent application number | Description | Published |
---|---|---|
20140067790 | TECHNIQUES FOR CONSTRUCTING MINIMUM SUPERSETS OF TEST DATA FROM RELATIONAL DATABASES - A computer-implemented method is provided for constructing a minimum superset of data that complies with referential completeness as well as other specified data relationships. Given extraction criteria for the data, an iterative process analyzes the database for records to be included in the minimal superset. The iterative process includes: selecting a given table from a listing of tables implicated by the extraction criteria; identifying tables in the relational database having either a parent or a child relationship with the given table; evaluating concurrently and asynchronously each of the identified tables; and repeating these steps for each of the tables in the listing of tables. | 03-06-2014 |
20140365535 | VISUAL DATA DEFINITION FOR IDENTIFYING DATA ITEMS IN LOOSELY-STRUCTURED DATA - A computer-implemented method is provided for identifying items in loosely-structured data. The method generally includes constructing a composite data definition for items which are to be identified and parsing input data using the data definition. The composite data definition is constructed by defining a layout for a composite data definition, where the layout indicates at least one of positional relationship of data items to each other and positional information for data items in the loosely-structured data; arranging data items in the layout, where each data item in the layout has a common meaning for applications that use the data item; creating an identification order list for the composite data definition, where the identification order list includes the data items in the layout and specifies an order in which the data items comprising the composite data definition are to be identified within the loosely-structured data. | 12-11-2014 |
David Lipin, San Carlos, CA US
Patent application number | Description | Published |
---|---|---|
20130080166 | DIALOG-BASED VOICEPRINT SECURITY FOR BUSINESS TRANSACTIONS - A system for biometrically securing business transactions uses speech recognition and voiceprint authentication to biometrically secure a transaction from a variety of client devices in a variety of media. A voiceprint authentication server receives a request from a third party requestor to authenticate a previously enrolled end user of a client device. A signature collection applet presents the user a randomly generated signature string, prompting the user to speak the string, and recording the user's as he speaks. After transmittal to the authentication server, the signature string is recognized using voice recognition software, and compared with a stored voiceprint, using voiceprint authentication software. An authentication result is reported to both user and requestor. Voiceprints are stored in a repository along with the associated user data. Enrollment is by way of a separate enrollment applet, wherein the end user provides user information and records a voiceprint, which is subsequently stored. | 03-28-2013 |
Sergey Lipin, Palo Alto, CA US
Patent application number | Description | Published |
---|---|---|
20100132043 | Method and Apparatus for an End User Identity Protection Suite - A method comprising an indicator showing an overall security status of a user. | 05-27-2010 |
20140115717 | Method and Apparatus for an End User Identity Protection Suite - An end user identity protection suite (IPS) is discussed. In one embodiment, the IPS includes a identity validation system to evaluate a security level of at least one identity tool, the identity tool not related to computer security but rather to the user's identity. In one embodiment, the IPS further includes a security signal logic to generate a security status signal indicating an overall security state of the user, the security status signal comprising a combination of the security levels of each of the plurality of identity tools. | 04-24-2014 |