Patents by Inventor Elad Yom-Tov
Elad Yom-Tov has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11405413Abstract: Performing anomaly lookup on data sources that include an entity related to an alert. One or more entities related to an alert and a date when the alert occurred are received. The alert may indicate that an anomaly in data collected from a various data sources may be present in at least one of the data sources. The various data sources are searched for the one or more entities around the alert date to determine which of the data sources include the one or more entities. For those data sources including the one or more entities, an anomaly lookup procedure is performed on the data sources during a first time window to determine an initial set of suspicious anomalies.Type: GrantFiled: February 1, 2019Date of Patent: August 2, 2022Assignee: Microsoft Technology Licensing, LLCInventors: Hani Hana Neuvirth, Gueorgui Chkodrov, Dotan Patrich, Elad Yom-Tov, Dawn Antonette Burns, Yotam Livny
-
Patent number: 10922405Abstract: A system includes identification of a data source of a production environment, the data source storing authentic data, generation of simulated data of the data source, reception of a request for data of the data source from a requesting system in the production environment and, in response to the received request, providing of the simulated data to the requesting system. In some aspects, the simulated data is provided to the requesting system if it is determined that the request is related to an electronic attack, and the authentic data of the data source is provided to the requesting system if it is not determined that the request is related to an electronic attack.Type: GrantFiled: November 1, 2017Date of Patent: February 16, 2021Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Elad Yom-Tov, Hani Hana Neuvirth, Ron Matchoro, Nir Rosenfeld
-
Patent number: 10853427Abstract: A computer-implemented filtering method comprising: receiving a set of propositions, each comprising a respective linguistic description expressed by a respective user; forming an input matrix of lexical components vs. propositions, wherein rows in the input matrix represent the propositions and columns in the input matrix represent lexical components in the respective descriptions; performing a matrix factorization on the input matrix to reveal latent clusters of the lexical components and/or propositions; filtering the set of propositions based on one or more of the latent clusters; and outputting a result of the filtering to a target user.Type: GrantFiled: June 30, 2017Date of Patent: December 1, 2020Assignee: Microsoft Technology Licensing, LLCInventors: Eran Gat, Moshe Goldstine, Elad Yom-Tov
-
Publication number: 20200252417Abstract: Performing anomaly lookup on data sources that include an entity related to an alert. One or more entities related to an alert and a date when the alert occurred are received. The alert may indicate that an anomaly in data collected from a various data sources may be present in at least one of the data sources. The various data sources are searched for the one or more entities around the alert date to determine which of the data sources include the one or more entities. For those data sources including the one or more entities, an anomaly lookup procedure is performed on the data sources during a first time window to determine an initial set of suspicious anomalies.Type: ApplicationFiled: February 1, 2019Publication date: August 6, 2020Inventors: Hani Hana Neuvirth, Gueorgui Chkodrov, Dotan Patrich, Elad Yom-Tov, Dawn Antonette Burns, Yotam Livny
-
Patent number: 10402244Abstract: A system for identifying abnormal resource usage in a data center is provided. In some embodiments, the system employs a prediction model for each of a plurality of resources and an abnormal resource usage criterion. For each of a plurality of resources of the data center, the system retrieves current resource usage data for a current time and past resource usage data for that resource. The system then extracts features from the past resource usage data for that resource, predicts using the prediction model for that resource usage data for the current time based on the extracted features, and determines an error between the predicted resource usage data and the current resource usage data. After determining the error data for the resources, the system determines whether errors satisfy the abnormal resource usage criterion. If so, the system indicates that an abnormal resource usage has occurred.Type: GrantFiled: December 20, 2016Date of Patent: September 3, 2019Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC.Inventors: Hani Neuvirth-Telem, Amit Hilbuch, Shay Baruch Nahum, Yehuda Finkelstein, Daniel Alon, Elad Yom-Tov
-
Patent number: 10397256Abstract: In an example embodiment, a computer-implemented method comprises obtaining labels from messages associated with an email service provider, wherein the labels indicate for each message IP how many spam and non-spam messages have been received; obtaining network data features from a cloud service provider; providing the labels and network data features to a machine learning application; generating a prediction model representing an algorithm for determining whether a particular set of network data features are spam or not; applying the prediction model to network data features for an unlabeled message; and generating an output of the prediction model indicating a likelihood that the unlabeled message is spam.Type: GrantFiled: November 30, 2016Date of Patent: August 27, 2019Assignee: Microsoft Technology Licensing, LLCInventors: Ori Kashi, Philip Newman, Daniel Alon, Elad Yom-Tov, Hani Neuvirth, Royi Ronen
-
Patent number: 10320817Abstract: A system for detecting an attack by a virtual or physical machine on one or more auto-generated websites is provided. The system includes a processor, a memory, and an application. The application is stored in the memory and includes instructions, which are executable by the processor. The instructions are configured to: access an index of a search engine server computer and determine uniform resource locators (URLs) of auto-generated websites, where the auto-generated websites include the one or more auto-generated websites; and access Internet protocol (IP) address-URL entries stored in a domain name system server computer.Type: GrantFiled: November 16, 2016Date of Patent: June 11, 2019Assignee: Microsoft Technology Licensing, LLCInventors: Hani Neuvirth-Telem, Elad Yom-Tov, Royi Ronen, Daniel Alon Hilevich
-
Publication number: 20190130099Abstract: A system includes identification of a data source of a production environment, the data source storing authentic data, generation of simulated data of the data source, reception of a request for data of the data source from a requesting system in the production environment and, in response to the received request, providing of the simulated data to the requesting system. In some aspects, the simulated data is provided to the requesting system if it is determined that the request is related to an electronic attack, and the authentic data of the data source is provided to the requesting system if it is not determined that the request is related to an electronic attack.Type: ApplicationFiled: November 1, 2017Publication date: May 2, 2019Inventors: Elad YOM-TOV, Hani Hana NEUVIRTH, Ron MATCHORO, Nir ROSENFELD
-
Publication number: 20180366024Abstract: A method that includes accessing, from a database, a correlation between a first variable and a second variable; retrieving a list of suggested user behavior modifications for the correlation; selecting a user behavior modification from the list; presenting the selected user behavior modification to a computer device; receiving adherence data indicating a level of adherence by the user to the user behavior modification; and reevaluating the correlation between the first variable and the second variable based on the adherence data. The method may improve the determination of causality, versus merely correlation, between the variables. This determination may permit for improved recommendations to individuals to achieve a desired user outcome.Type: ApplicationFiled: June 14, 2017Publication date: December 20, 2018Inventors: Elad Yom-Tov, Hadas Bitran, Shahar Yekutiel, Gil Shacham, Tachen Chester Ni, Ryen W. White
-
Publication number: 20180342004Abstract: Computerized systems and methods are provided for determining cumulative success-based recommendations for repeat users. One such method includes determining user and item latent-features based on matrix factorization applied to matrices that include recommendation and feedback events. The feedback events indicate previously provided user preferences for at least a portion of the items. An item-recommendation policy is determined based on a cumulative metric that includes an expected value for the accumulation of stochastic user-item rewards associated with future (or subsequent) recommendations. The accumulation of the rewards is based on the user latent-features, the item latent-features, and the previous rewards included in the feedback events. Machine learning, such as reinforcement learning (RL), is employed to determine the item-recommendation policy based on the feedback events.Type: ApplicationFiled: May 25, 2017Publication date: November 29, 2018Inventors: Elad Yom-Tov, Assaf Hallak, Noam Koenigstein
-
Publication number: 20180329997Abstract: A computer-implemented filtering method comprising: receiving a set of propositions, each comprising a respective linguistic description expressed by a respective user; forming an input matrix of lexical components vs. propositions, wherein rows in the input matrix represent the propositions and columns in the input matrix represent lexical components in the respective descriptions; performing a matrix factorization on the input matrix to reveal latent clusters of the lexical components and/or propositions; filtering the set of propositions based on one or more of the latent clusters; and outputting a result of the filtering to a target user.Type: ApplicationFiled: June 30, 2017Publication date: November 15, 2018Inventors: Eran GAT, Moshe GOLDSTINE, Elad YOM-TOV
-
Publication number: 20180144154Abstract: Examples are disclosed that relate to providing healthcare-related information. One example provides a computing device comprising a logic machine and a storage machine holding instructions executable by the logic machine to receive an input of information regarding a health state of a user, obtain, based upon the information regarding the health state of the user, an inference of a possible health condition of the user, output a notification of the inference, the notification comprising a first representation of the inference, receive data representing a mechanism for authorizing a healthcare practitioner to access a second representation of the inference, and output a user-selectable control for triggering the mechanism. The instructions may be further executable to receive an input via the user-selectable control triggering the mechanism, and, in response, send authorization to provide the healthcare practitioner with access to the second representation of the inference.Type: ApplicationFiled: November 22, 2016Publication date: May 24, 2018Applicant: Microsoft Technology Licensing, LLCInventors: Gil Shacham, Ryen William White, Hadas Bitran, Shahar Yekutiel, Elad Yom-Tov, Christopher R. Jones, Todd Eric Holmdahl
-
Publication number: 20180139215Abstract: A system for detecting an attack by a virtual or physical machine on one or more auto-generated websites is provided. The system includes a processor, a memory, and an application. The application is stored in the memory and includes instructions, which are executable by the processor. The instructions are configured to: access an index of a search engine server computer and determine uniform resource locators (URLs) of auto-generated websites, where the auto-generated websites include the one or more auto-generated websites; and access Internet protocol (IP) address-URL entries stored in a domain name system server computer.Type: ApplicationFiled: November 16, 2016Publication date: May 17, 2018Inventors: Hani Neuvirth-Telem, Elad Yom-Tov, Royi Ronen, Daniel Alon Hilevich
-
Publication number: 20180089372Abstract: Examples are disclosed herein that relate to modifying an analysis of personal behavior based on determining a subset of personal data to be non-routine. One example provides a computing device configured to receive personal data relating to personal behavior of a user, receive contextual data regarding the personal data, determine a subset of the personal data to be non-routine based upon the contextual data, and modify an analysis of personal behavior based upon the subset of the personal data determined to be non-routine.Type: ApplicationFiled: September 29, 2016Publication date: March 29, 2018Applicant: Microsoft Technology Licensing, LLCInventors: Hadas Bitran, Gil Shacham, Arie Schwartzman, Ryen William White, Tachen C. Ni, Girish Sthanu Nathan, Elad Yom-Tov, Jessica Lundin, Shahar Yekutiel
-
Publication number: 20170359362Abstract: In an example embodiment, a computer-implemented method comprises obtaining labels from messages associated with an email service provider, wherein the labels indicate for each message IP how many spam and non-spam messages have been received; obtaining network data features from a cloud service provider; providing the labels and network data features to a machine learning application; generating a prediction model representing an algorithm for determining whether a particular set of network data features are spam or not; applying the prediction model to network data features for an unlabeled message; and generating an output of the prediction model indicating a likelihood that the unlabeled message is spam.Type: ApplicationFiled: November 30, 2016Publication date: December 14, 2017Applicant: Microsoft Technology Licensing, LLCInventors: Ori Kashi, Philip Newman, Daniel Alon, Elad Yom-Tov, Hani Neuvirth, Royi Ronen
-
Patent number: 9811992Abstract: A system for providing care to a ward that alerts a caregiver of the caregiver's capacity to deal competently with the ward's needs.Type: GrantFiled: June 6, 2016Date of Patent: November 7, 2017Assignee: Microsoft Technology Licensing, LLC.Inventors: Hani Neuvirth-Telem, Elad Yom-Tov, Hadas Bitran, Omer Chechik, Amit Hilbuch
-
Publication number: 20170161127Abstract: A system for identifying abnormal resource usage in a data center is provided. In some embodiments, the system employs a prediction model for each of a plurality of resources and an abnormal resource usage criterion. For each of a plurality of resources of the data center, the system retrieves current resource usage data for a current time and past resource usage data for that resource. The system then extracts features from the past resource usage data for that resource, predicts using the prediction model for that resource usage data for the current time based on the extracted features, and determines an error between the predicted resource usage data and the current resource usage data. After determining the error data for the resources, the system determines whether errors satisfy the abnormal resource usage criterion. If so, the system indicates that an abnormal resource usage has occurred.Type: ApplicationFiled: December 20, 2016Publication date: June 8, 2017Inventors: Hani Neuvirth-Telem, Amit Hilbuch, Shay Baruch Nahum, Yehuda Finkelstein, Daniel Alon, Elad Yom-Tov
-
Patent number: 9665460Abstract: A system for identifying abnormal resource usage in a data center is provided. In some embodiments, the system employs a prediction model for each of a plurality of resources and an abnormal resource usage criterion. For each of a plurality of resources of the data center, the system retrieves current resource usage data for a current time and past resource usage data for that resource. The system then extracts features from the past resource usage data for that resource, predicts using the prediction model for that resource usage data for the current time based on the extracted features, and determines an error between the predicted resource usage data and the current resource usage data. After determining the error data for the resources, the system determines whether errors satisfy the abnormal resource usage criterion. If so, the system indicates that an abnormal resource usage has occurred.Type: GrantFiled: May 26, 2015Date of Patent: May 30, 2017Assignee: Microsoft Technology Licensing, LLCInventors: Hani Neuvirth-Telem, Amit Hilbuch, Shay Baruch Nahum, Yehuda Finkelstein, Daniel Alon, Elad Yom-Tov
-
Publication number: 20170039332Abstract: A method for presenting health notifications begins with creating a plurality of different health notifications, each conveying the same type of information. Each of the different health notifications is provided to a plurality of different users, each user categorized with user health metrics. Post-health notification user activity is tracked for each of the different users. A machine-learning classification machine is trained with tracked user activity, along with corresponding user health metrics, for each of the different health notifications. When provided with user health metrics received from a health-monitoring computing device associated with a user, the machine-learning classification machine chooses a selected health notification for the user from among the different health notifications, the selected notification determined to be more likely than any of the other health notifications to elicit a healthy response from the user. The selected health notification is then sent to the user.Type: ApplicationFiled: December 14, 2015Publication date: February 9, 2017Applicant: Microsoft Technology Licensing, LLCInventors: Elad Yom-Tov, Hadas Bitran, Nazia Zaman, Brian Bilodeau, Katherine Winant Osborne, David A. Wickert, Ran Gilad-Bachrach, Gerrit Hendrik Hofmeester, Farah Shariff
-
Publication number: 20170039335Abstract: A network-accessible computer includes a network-communications interface, configured to receive health metrics of a user over a computer network. The network-accessible computer also includes a logic machine, which is configured to localize the user in a virtual space based on the health metrics, identify k nearest neighbors in the virtual space having k shortest Euclidean distances to the user, and generate a health insight comparing the user to the k nearest neighbors. The network-communications interface is further configured to send the health insight to a computing device associated with the user via the computer network.Type: ApplicationFiled: December 2, 2015Publication date: February 9, 2017Applicant: Microsoft Technology Licensing, LLCInventors: Ansari Mohammed Ismail, Hadas Bitran, Royi Ronen, Ohad Jassin, Elad Yom-Tov, Andrew Lindsay Dumovic, Haithem Albadawi, Farah Shariff, Todd Holmdahl