Patents by Inventor David MIMRAN

David MIMRAN has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240143767
    Abstract: A system for performing an assessment of the robustness and resilience of an examined original ML model against model extraction attacks includes a computerized device having at least one processor, which is adapted to: train multiple candidate models MC with the external dataset D for each of the specified candidate learning algorithms a in Alg, where each candidate substitute model is trained on a subset of D corresponding to the evaluated ith query limit of the query budget constraint Q; evaluate the performance of each substitute model MC according to different evaluation methods ?Evaluation; and calculate the robustness of each substitute model, where smaller difference or high agreement/similarity rate between the performance of the original model and the substitute model indicates that the original and substitute models are similar to each other.
    Type: Application
    Filed: October 30, 2023
    Publication date: May 2, 2024
    Inventors: Yuval ELOVICI, Oleg BRODT, Asaf SHABTAI, Edita GROLMAN, David MIMRAN, Michael KHAVKIN
  • Publication number: 20230076045
    Abstract: An optimized limited-area WiFi network includes a plurality of Internet connectable devices, a wireless router for facilitating Internet connectivity, and a dynamically positionable signal coverage enhancer configured with an onboard processor, a signal coverage enhancing element, and mobile means. The signal coverage enhancer is repositionable, by the mobile means in response to a command signal transmitted by the processor, to a determined location of the limited-area WiFi network that is sufficiently close to one or more of the devices, such that an amplified signal produced by the signal coverage enhancing element which amplifies a wireless signal transmitted by the router maintains uninterrupted Internet operation of the to one or more devices.
    Type: Application
    Filed: September 2, 2022
    Publication date: March 9, 2023
    Inventors: Yuval ELOVICI, Oleg BRODT, Asaf SHABTAI, Rami PUZIS, David MIMRAN
  • Publication number: 20210357508
    Abstract: A system for testing Machine Learning (ML) and deep learning models for robustness, and durability against adversarial bias and privacy attacks, comprising a Project Repository for storing metadata of ongoing projects each of which having a defined project policy, and created ML models and data sources being associated with the ongoing projects; a Secure Data Repository, for storing training and testing datasets and models used in each project for evaluating the robustness of the each project; a Data/Model Profiler for creating a profile, based on the settings and configurations of the datasets and the models; a Test Recommendation Engine for recommending the relevant and most indicative attacks/tests for each examined model and for creating indicative and effective test suites; a Test/Attack Ontology module for storing all attacks/tests with their metadata and mapping the attacks/tests to their corresponding settings and configurations; an Attack Repository for storing the implemented tests/attacks.
    Type: Application
    Filed: May 14, 2021
    Publication date: November 18, 2021
    Inventors: Yuval ELOVICI, Asaf SHABTAI, Oleg BRODT, David MIMRAN, Michael KHAVKIN, Edita GROLMAN
  • Patent number: 10528735
    Abstract: Various approaches are described herein for, among other things, detecting and/or neutralizing attacks by malicious code. For example, instance(s) of a protected process are modified upon loading by injecting a runtime protector that creates a copy of each of the process' imported libraries and maps the copy into a random address inside the process' address space to form a “randomized” shadow library. The libraries loaded at the original address are modified into a stub library. Shadow and stub libraries are also created for libraries that are loaded after the process creation is finalized. Consequently, when malicious code attempts to retrieve the address of a given procedure, it receives the address of the stub procedure, thereby neutralizing the malicious code. When the original program's code (e.g., the non-malicious code) attempts to retrieve the address of a procedure, it receives the correct address of the requested procedure (located in the shadow library).
    Type: Grant
    Filed: May 8, 2015
    Date of Patent: January 7, 2020
    Assignee: Morphisec Information Security 2014 Ltd.
    Inventors: Michael Gorelik, Mordechai Guri, David Mimran, Gabriel Kedma, Ronen Yehoshua
  • Patent number: 10417287
    Abstract: A method of compressing short text messages, comprising: generating an index code comprising an association of keywords in the text messages with indices, the index code is logically divided into segments of variable size, each segment comprising at least one bucket, being a constant range of indices; adjusting the index code according to a natural keyword frequency distribution and to statistical analysis of the text messages; associating short indices with frequent keywords in the text messages; converting the text messages into compressed text messages in which at least some of the keywords are replaced by the associated indices; and updating the association between the indices and the keywords, updating the segments, and updating the updating frequency in respect to a usage keyword frequency distribution and temporal changes thereof.
    Type: Grant
    Filed: May 5, 2010
    Date of Patent: September 17, 2019
    Inventor: David Mimran
  • Patent number: 10091220
    Abstract: A device for protecting a network environment from cyber security threats includes a processing unit and a non-transitory memory having processor-executable instructions stored thereon. The processing unit is configured to execute the processor-executable instructions to: (a) perform one or more auditing stages for examining and analyzing network devices by retrieving information, via a network adapter, from each of the network devices, so as to enable automatically monitoring, scanning and learning the network environment and its security configurations; (b) generate a cyber-security check report that reflects the results of the one or more auditing stages; and (c) give recommendations according to the report in order to increase a security level of the network.
    Type: Grant
    Filed: December 29, 2016
    Date of Patent: October 2, 2018
    Assignee: DEUTSCHE TELEKOM AG
    Inventors: Asaf Shabtai, Yuval Elovici, Christoph Peylo, Barak Chizi, Barak Zacharish, David Mimran, Tobias Glemser
  • Publication number: 20170206357
    Abstract: Various approaches are described herein for, among other things, detecting and/or neutralizing attacks by malicious code. For example, instance(s) of a protected process are modified upon loading by injecting a runtime protector that creates a copy of each of the process' imported libraries and maps the copy into a random address inside the process' address space to form a “randomized” shadow library. The libraries loaded at the original address are modified into a stub library. Shadow and stub libraries are also created for libraries that are loaded after the process creation is finalized. Consequently, when malicious code attempts to retrieve the address of a given procedure, it receives the address of the stub procedure, thereby neutralizing the malicious code. When the original program's code (e.g., the non-malicious code) attempts to retrieve the address of a procedure, it receives the correct address of the requested procedure (located in the shadow library).
    Type: Application
    Filed: May 8, 2015
    Publication date: July 20, 2017
    Inventors: Michael Gorelik, Mordechai Guri, David Mimran, Gabriel Kedma, Ronen Yehoshua
  • Publication number: 20170195349
    Abstract: A device for protecting a network environment from cyber security threats includes a processing unit and a non-transitory memory having processor-executable instructions stored thereon. The processing unit is configured to execute the processor-executable instructions to: (a) perform one or more auditing stages for examining and analyzing network devices by retrieving information, via a network adapter, from each of the network devices, so as to enable automatically monitoring, scanning and learning the network environment and its security configurations; (b) generate a cyber-security check report that reflects the results of the one or more auditing stages; and (c) give recommendations according to the report in order to increase a security level of the network.
    Type: Application
    Filed: December 29, 2016
    Publication date: July 6, 2017
    Inventors: Asaf SHABTAI, Yuval ELOVICI, Christoph PEYLO, Barak CHIZI, Barak ZACHARISH, David MIMRAN, Tobias GLEMSER
  • Publication number: 20150242891
    Abstract: The present invention discloses a method for matching products sale promotions for users while using an application in a computer device. The method comprising the steps of: tracking user usage of application and/or usage of the computer device, including at least path of navigation, activities and context when using an application, aggregating and analyzing usage data of each user in relation to at least one application for identifying behavior pattern, user characteristics and user preferences, updating user profile based on identifying behavior pattern user characteristics and user preferences and matching product commercial in real-time to user while using the application, based on his updated profile and current usage of the application according to predefined triggering rules.
    Type: Application
    Filed: February 25, 2014
    Publication date: August 27, 2015
    Applicant: Kinetic Art Ltd.
    Inventor: David MIMRAN
  • Patent number: 8776009
    Abstract: A system for task modeling interactive sequential applications for one or more mobile devices has a software tool for defining a generic meta-model of the target applications. The generic meta-model has a static model of application components, and a dynamic model of identifiers of application screens and connections; a passive Task Model database for storing the generic meta-model for future reuse, which further comprises static instances of the generic meta-model specifically generated for a variety of mobile devices; a tracker module for real-time monitoring and creating unique identifier for each application's screen visited by the user of the mobile device, wherein created identifiers are used for generating active models of the user actual use; and an active Task Model database for storing the active models, wherein data transferring and storing is minimized to screen identifier numbers.
    Type: Grant
    Filed: March 10, 2010
    Date of Patent: July 8, 2014
    Assignee: Deutsche Telekom AG
    Inventors: Aviram Dayan, Meytal Tubi, David Mimran, Bracha Shapira, Peretz Shoval, Meira Levy, Katja Henke, Gregor Glass, Lutz Schneider
  • Publication number: 20130283274
    Abstract: The present invention discloses a method for discovering and activating an application in a computer device. The method comprising the steps of: defining at least one application based on its functionality including at least one action which is enabled by the application, identifying a required action to be performed by the user and searching loading a relevant application for the identified action, wherein the process of defining and identifying are performed by at least one processor unit.
    Type: Application
    Filed: March 27, 2013
    Publication date: October 24, 2013
    Inventor: David Mimran
  • Publication number: 20100235808
    Abstract: A system for task modeling interactive sequential applications for one or more mobile devices, which comprises a software tool for defining a generic meta-model of the target applications, wherein the generic meta-model consist of a static model of application components, and a dynamic model of IDs of application screens and connections; a passive TM database for storing the generic meta-model for future reuse, which further comprises static instances of the generic meta-model specifically generated for a variety of mobile devices; a tracker module for real-time monitoring and creating unique ID for each application's screen visited by the user of the mobile device, wherein created IDs are used for generating active models of the user actual use; and an active TM database for storing the active models, wherein data transferring and storing is minimized to screen ID numbers.
    Type: Application
    Filed: March 10, 2010
    Publication date: September 16, 2010
    Applicant: Deutsche Telekom AG
    Inventors: Aviram DAYAN, Meytal TUBI, David MIMRAN, Bracha SHAPIRA, Peretz SHOVAL, Meira LEVY, Katja HENKE, Gregor GLASS, Lutz SCHNEIDER