Patents by Inventor Gal Shachor

Gal Shachor has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20180109505
    Abstract: Examples of techniques for authenticating mobile applications are described herein. A method includes receiving, via a first server, a key pair and a policy file associated with a mobile service from a second server. Authentication of the mobile application is performed based on the key pair and the policy file. A scope token is generated with an application scope in response to authenticating the mobile application. Authentication of a client device is performed corresponding to the mobile application and a user to generate a doubly-authenticated scope token including a device scope and application authenticity scope. The doubly-authenticated scope token is sent to a security gateway for user authentication. A trebly-authenticated scope token is received with a grant token request and a grant token is sent to the mobile application. The grant token is received from the mobile application. An access token is generated and sent to the mobile application.
    Type: Application
    Filed: December 7, 2017
    Publication date: April 19, 2018
    Inventors: Ishai Borovoy, Iddo Levin, Haim Schneider, Gal Shachor, Artem Spector
  • Patent number: 9930130
    Abstract: According to an aspect, techniques for processing hybrid data include receiving a web request and translating the web request into a translated native request. The translated native request and a native request are sent to a server via a single web client. A response is received from the server via the single web client. It is determined whether the response corresponds to the translated native request or to the native request.
    Type: Grant
    Filed: August 5, 2015
    Date of Patent: March 27, 2018
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Cirill Aizenberg, Anton Aleksandrov, Vitaly Meytin, Gal Shachor, Arie Shifer, Issahar Weiss, Uri Zonens
  • Patent number: 9923880
    Abstract: Examples of techniques for authenticating mobile applications are described herein. A method includes receiving, at a first server, a key pair and a policy file associated with a mobile service on a second server, the policy file includes a plurality of security objects to be authenticated, a plurality of computing devices to authenticate the security objects, and an order of authentication. The method includes distributing the key pair and the policy file to a security device. The method also includes receiving, at the first server, an authentication request from a mobile application. The method further includes creating an authenticity challenge as specified in the policy file and sending the authenticity challenge with a response to the mobile application.
    Type: Grant
    Filed: August 4, 2015
    Date of Patent: March 20, 2018
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Ishai Borovoy, Iddo Levin, Haim Schneider, Gal Shachor, Artem Spector
  • Patent number: 9854034
    Abstract: Embodiments of the present invention provide a method, system and computer program product for workload deployment density management for a multi-stage architecture implemented within a multi-tenant computing environment. The method includes receiving different requests from different tenants of a multi-tenant computing environment to deploy respectively different application instances of respectively different computer programs into different nodes of the host computing system. The method also includes determining from each request an associated stage of a software lifecycle for a corresponding one of the application instances. Finally, the method includes deploying each of the application instances into a particular one of the nodes depending upon an associated stage of each of the application instances so that each of the nodes hosts different application instances for different tenants of a common stage of the software lifecycle.
    Type: Grant
    Filed: June 27, 2016
    Date of Patent: December 26, 2017
    Assignee: International Business Machines Corporation
    Inventors: Andrew D. Dingsor, Todd E. Kaplinger, Michael R. Rheinheimer, Gal Shachor, Artem Spector
  • Publication number: 20170251367
    Abstract: Examples of techniques for authenticating mobile applications are described herein. A method can include receiving, by a processor, a key pair and a policy file associated with a mobile service. The processor can receive a service request from a mobile application at a security gateway. The processor can detect that the service request includes an invalid or missing access token. The processor can redirect the mobile application to request a grant token from an authorization end point on a server. The processor can receive a grant token request from the mobile application and forward the grant token request to the server based on a policy file, the policy file including a list of: a plurality of security objects to be authenticated, a plurality of computing devices to authenticate the security objects, and an order of authentication.
    Type: Application
    Filed: May 11, 2017
    Publication date: August 31, 2017
    Inventors: Ishai Borovoy, Iddo Levin, Haim Schneider, Gal Shachor, Artem Spector
  • Patent number: 9736126
    Abstract: Examples of techniques for authenticating mobile applications are described herein. A method includes receiving, at a first server, a key pair and a policy file associated with a mobile service on a second server, the policy file includes a plurality of security objects to be authenticated, a plurality of computing devices to authenticate the security objects, and an order of authentication. The method includes distributing the key pair and the policy file to a security device. The method also includes receiving, at the first server, an authentication request from a mobile application. The method further includes creating an authenticity challenge as specified in the policy file and sending the authenticity challenge with a response to the mobile application.
    Type: Grant
    Filed: December 4, 2014
    Date of Patent: August 15, 2017
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Ishai Borovoy, Iddo Levin, Haim Schneider, Gal Shachor, Artem Spector
  • Publication number: 20170147543
    Abstract: Displaying Web 1.0 application content on a mobile computing device includes one or more processors request website content, based on a URL corresponding to the website. The web page is generated and includes dynamic content and references to static resources. The web page is crawled and the static resources of the web page are identified. The identified static resources of the web page are compared to the static resources stored on the mobile computing device. In response to determining the absence of a static resource of the web page stored on the mobile computing device, the absent static resource is downloaded and stored within the mobile computing device. In response to accessing the web page of the website, the web page is generated by the dynamic content from the web server and the static content stored on the mobile computing device.
    Type: Application
    Filed: November 25, 2015
    Publication date: May 25, 2017
    Inventors: Idan Ben-Harrush, Nili Guy, Gal Shachor
  • Patent number: 9648124
    Abstract: According to an aspect, techniques for processing hybrid data include receiving a web request and translating the web request into a translated native request. The translated native request and a native request are sent to a server via a single web client. A response is received from the server via the single web client. It is determined whether the response corresponds to the translated native request or to the native request.
    Type: Grant
    Filed: December 8, 2014
    Date of Patent: May 9, 2017
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Cirill Aizenberg, Anton Aleksandrov, Vitaly Meytin, Gal Shachor, Arie Shifer, Issahar Weiss, Uri Zonens
  • Publication number: 20160323414
    Abstract: Managing data access on a computing device by receiving at a first computing device first webpage-related content received from a second computing device via a communications network, storing the first webpage-related content in a locally-accessible data storage medium that is locally accessible to the first computing device, causing an agent executed by the first computing device to access the first webpage-related content from the locally-accessible data storage medium, intercepting an attempt by the agent to receive second webpage-related content via the communications network, and providing the second webpage-related content to the agent from the locally-accessible data storage medium.
    Type: Application
    Filed: April 29, 2015
    Publication date: November 3, 2016
    Inventors: Idan Ben-Harrush, Ran Bernstein, Nili Guy Ifergan, Gal Shachor
  • Publication number: 20160308955
    Abstract: Embodiments of the present invention provide a method, system and computer program product for workload deployment density management for a multi-stage architecture implemented within a multi-tenant computing environment. The method includes receiving different requests from different tenants of a multi-tenant computing environment to deploy respectively different application instances of respectively different computer programs into different nodes of the host computing system. The method also includes determining from each request an associated stage of a software lifecycle for a corresponding one of the application instances. Finally, the method includes deploying each of the application instances into a particular one of the nodes depending upon an associated stage of each of the application instances so that each of the nodes hosts different application instances for different tenants of a common stage of the software lifecycle.
    Type: Application
    Filed: June 27, 2016
    Publication date: October 20, 2016
    Inventors: Andrew D. Dingsor, Todd E. Kaplinger, Michael R. Rheinheimer, Gal Shachor, Artem Spector
  • Patent number: 9454352
    Abstract: Embodiments of the present invention provide a method, system and computer program product for workload deployment density management for a multi-stage architecture implemented within a multi-tenant computing environment. The method includes receiving different requests from different tenants of a multi-tenant computing environment to deploy respectively different application instances of respectively different computer programs into different nodes of the host computing system. The method also includes determining from each request an associated stage of a software lifecycle for a corresponding one of the application instances. Finally, the method includes deploying each of the application instances into a particular one of the nodes depending upon an associated stage of each of the application instances so that each of the nodes hosts different application instances for different tenants of a common stage of the software lifecycle.
    Type: Grant
    Filed: May 11, 2015
    Date of Patent: September 27, 2016
    Assignee: International Business Machines Corporation
    Inventors: Andrew D. Dingsor, Todd E. Kaplinger, Michael R. Rheinheimer, Gal Shachor, Artem Spector
  • Patent number: 9396170
    Abstract: A method of presenting hyperlink data. The method comprises identifying when a web browser running on a web browser client retrieves, in response to a web document data request submitted to a target server, a first web document data for displaying a first web document containing a hyperlink having a label for display and a target destination defining an address of a second web document, evaluating a risk from content of the second web document, generating by the web browser to a reference evaluation indication of the risk, and processing the web document data and the reference evaluation indication by the web browser for generating a presentation on the client terminal which combines the first web document data and the reference evaluation indication such that when the reference evaluation indication is presented when the label is presented by the web browser.
    Type: Grant
    Filed: November 11, 2013
    Date of Patent: July 19, 2016
    Assignee: GLOBALFOUNDRIES INC.
    Inventors: Idan Ben-Harrush, Anat Berkman, Alexander Dvinsky, Nili Guy, Samuel Kallner, Andrei Kirshin, Dmitri Pikus, Yoav Rubin, Gal Shachor, Omer Tripp
  • Patent number: 9395967
    Abstract: Embodiments of the present invention provide a method, system and computer program product for workload deployment density management for a multi-stage architecture implemented within a multi-tenant computing environment. The method includes receiving different requests from different tenants of a multi-tenant computing environment to deploy respectively different application instances of respectively different computer programs into different nodes of the host computing system. The method also includes determining from each request an associated stage of a software lifecycle for a corresponding one of the application instances. Finally, the method includes deploying each of the application instances into a particular one of the nodes depending upon an associated stage of each of the application instances so that each of the nodes hosts different application instances for different tenants of a common stage of the software lifecycle.
    Type: Grant
    Filed: November 3, 2014
    Date of Patent: July 19, 2016
    Assignee: International Business Machines Corporation
    Inventors: Andrew D. Dingsor, Todd E. Kaplinger, Michael R. Rheinheimer, Gal Shachor, Artem Spector
  • Patent number: 9372602
    Abstract: According to some embodiments of the present invention, there is provided a method for revealing at least a portion of a disguised password on a display device. The method comprises receiving a plurality of password characters typed by a user, presenting a plurality of replacement symbols in a password field displayed by a display device of a terminal having a touch surface, each the replacement symbol being indicative of the reception of another of the plurality of password characters, detecting a fingertip which slides contiguously against the touch surface, and temporarily replacing the presentation of at least some of the plurality of replacement symbols with of the presentation of at least some of the plurality of password characters in a sequential manner correspondingly with a movement of the fingertip.
    Type: Grant
    Filed: November 4, 2012
    Date of Patent: June 21, 2016
    Assignee: International Business Machines Corporation
    Inventors: Idan Ben-Harrush, Nili Guy, Samuel Kallner, Ariel Landau, Yoav Rubin, Gal Shachor
  • Publication number: 20160164994
    Abstract: According to an aspect, techniques for processing hybrid data include receiving a web request and translating the web request into a translated native request. The translated native request and a native request are sent to a server via a single web client. A response is received from the server via the single web client. It is determined whether the response corresponds to the translated native request or to the native request.
    Type: Application
    Filed: August 5, 2015
    Publication date: June 9, 2016
    Inventors: Cirill Aizenberg, Anton Aleksandrov, Vitaly Meytin, Gal Shachor, Arie Shifer, Issahar Weiss, Uri Zonens
  • Publication number: 20160164851
    Abstract: Examples of techniques for authenticating mobile applications are described herein. A method includes receiving, at a first server, a key pair and a policy file associated with a mobile service on a second server, the policy file includes a plurality of security objects to be authenticated, a plurality of computing devices to authenticate the security objects, and an order of authentication. The method includes distributing the key pair and the policy file to a security device. The method also includes receiving, at the first server, an authentication request from a mobile application. The method further includes creating an authenticity challenge as specified in the policy file and sending the authenticity challenge with a response to the mobile application.
    Type: Application
    Filed: December 4, 2014
    Publication date: June 9, 2016
    Inventors: Ishai Borovoy, Iddo Levin, Haim Schneider, Gal Shachor, Artem Spector
  • Publication number: 20160164920
    Abstract: Examples of techniques for authenticating mobile applications are described herein. A method includes receiving, at a first server, a key pair and a policy file associated with a mobile service on a second server, the policy file includes a plurality of security objects to be authenticated, a plurality of computing devices to authenticate the security objects, and an order of authentication. The method includes distributing the key pair and the policy file to a security device. The method also includes receiving, at the first server, an authentication request from a mobile application. The method further includes creating an authenticity challenge as specified in the policy file and sending the authenticity challenge with a response to the mobile application.
    Type: Application
    Filed: August 4, 2015
    Publication date: June 9, 2016
    Inventors: Ishai Borovoy, Iddo Levin, Haim Schneider, Gal Shachor, Artem Spector
  • Publication number: 20160164993
    Abstract: According to an aspect, techniques for processing hybrid data include receiving a web request and translating the web request into a translated native request. The translated native request and a native request are sent to a server via a single web client. A response is received from the server via the single web client. It is determined whether the response corresponds to the translated native request or to the native request.
    Type: Application
    Filed: December 8, 2014
    Publication date: June 9, 2016
    Inventors: Cirill Aizenberg, Anton Aleksandrov, Vitaly Meytin, Gal Shachor, Arie Shifer, Issahar Weiss, Uri Zonens
  • Publication number: 20160162447
    Abstract: In one embodiment, a computer-implemented method includes receiving first event details from a provider. The first event details are related to a first event in a business process flow associated with a user and related to a user interaction. A first document is generated, by a computer processor, and includes the first event details. The first document is stored in a first set of documents associated with the user. Second event details are received from the provider. The second event details are related to a second event in the business process flow associated with the user and related to the user interaction. The second event is distinct from the first event. A second document is generated and includes the second event details. The second document is stored in the first set of documents associated with the user. The first set of documents is distributed to the user.
    Type: Application
    Filed: December 4, 2014
    Publication date: June 9, 2016
    Inventors: Todd E. Kaplinger, Gal Shachor, Gregory L. Truty
  • Publication number: 20160127453
    Abstract: Embodiments of the present invention provide a method, system and computer program product for workload deployment density management for a multi-stage architecture implemented within a multi-tenant computing environment. The method includes receiving different requests from different tenants of a multi-tenant computing environment to deploy respectively different application instances of respectively different computer programs into different nodes of the host computing system. The method also includes determining from each request an associated stage of a software lifecycle for a corresponding one of the application instances. Finally, the method includes deploying each of the application instances into a particular one of the nodes depending upon an associated stage of each of the application instances so that each of the nodes hosts different application instances for different tenants of a common stage of the software lifecycle.
    Type: Application
    Filed: May 11, 2015
    Publication date: May 5, 2016
    Inventors: Andrew D. Dingsor, Todd E. Kaplinger, Michael R. Rheinheimer, Gal Shachor, Artem Spector