Patents by Inventor Gal Shachor
Gal Shachor has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20180109505Abstract: Examples of techniques for authenticating mobile applications are described herein. A method includes receiving, via a first server, a key pair and a policy file associated with a mobile service from a second server. Authentication of the mobile application is performed based on the key pair and the policy file. A scope token is generated with an application scope in response to authenticating the mobile application. Authentication of a client device is performed corresponding to the mobile application and a user to generate a doubly-authenticated scope token including a device scope and application authenticity scope. The doubly-authenticated scope token is sent to a security gateway for user authentication. A trebly-authenticated scope token is received with a grant token request and a grant token is sent to the mobile application. The grant token is received from the mobile application. An access token is generated and sent to the mobile application.Type: ApplicationFiled: December 7, 2017Publication date: April 19, 2018Inventors: Ishai Borovoy, Iddo Levin, Haim Schneider, Gal Shachor, Artem Spector
-
Patent number: 9930130Abstract: According to an aspect, techniques for processing hybrid data include receiving a web request and translating the web request into a translated native request. The translated native request and a native request are sent to a server via a single web client. A response is received from the server via the single web client. It is determined whether the response corresponds to the translated native request or to the native request.Type: GrantFiled: August 5, 2015Date of Patent: March 27, 2018Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Cirill Aizenberg, Anton Aleksandrov, Vitaly Meytin, Gal Shachor, Arie Shifer, Issahar Weiss, Uri Zonens
-
Patent number: 9923880Abstract: Examples of techniques for authenticating mobile applications are described herein. A method includes receiving, at a first server, a key pair and a policy file associated with a mobile service on a second server, the policy file includes a plurality of security objects to be authenticated, a plurality of computing devices to authenticate the security objects, and an order of authentication. The method includes distributing the key pair and the policy file to a security device. The method also includes receiving, at the first server, an authentication request from a mobile application. The method further includes creating an authenticity challenge as specified in the policy file and sending the authenticity challenge with a response to the mobile application.Type: GrantFiled: August 4, 2015Date of Patent: March 20, 2018Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Ishai Borovoy, Iddo Levin, Haim Schneider, Gal Shachor, Artem Spector
-
Patent number: 9854034Abstract: Embodiments of the present invention provide a method, system and computer program product for workload deployment density management for a multi-stage architecture implemented within a multi-tenant computing environment. The method includes receiving different requests from different tenants of a multi-tenant computing environment to deploy respectively different application instances of respectively different computer programs into different nodes of the host computing system. The method also includes determining from each request an associated stage of a software lifecycle for a corresponding one of the application instances. Finally, the method includes deploying each of the application instances into a particular one of the nodes depending upon an associated stage of each of the application instances so that each of the nodes hosts different application instances for different tenants of a common stage of the software lifecycle.Type: GrantFiled: June 27, 2016Date of Patent: December 26, 2017Assignee: International Business Machines CorporationInventors: Andrew D. Dingsor, Todd E. Kaplinger, Michael R. Rheinheimer, Gal Shachor, Artem Spector
-
Publication number: 20170251367Abstract: Examples of techniques for authenticating mobile applications are described herein. A method can include receiving, by a processor, a key pair and a policy file associated with a mobile service. The processor can receive a service request from a mobile application at a security gateway. The processor can detect that the service request includes an invalid or missing access token. The processor can redirect the mobile application to request a grant token from an authorization end point on a server. The processor can receive a grant token request from the mobile application and forward the grant token request to the server based on a policy file, the policy file including a list of: a plurality of security objects to be authenticated, a plurality of computing devices to authenticate the security objects, and an order of authentication.Type: ApplicationFiled: May 11, 2017Publication date: August 31, 2017Inventors: Ishai Borovoy, Iddo Levin, Haim Schneider, Gal Shachor, Artem Spector
-
Patent number: 9736126Abstract: Examples of techniques for authenticating mobile applications are described herein. A method includes receiving, at a first server, a key pair and a policy file associated with a mobile service on a second server, the policy file includes a plurality of security objects to be authenticated, a plurality of computing devices to authenticate the security objects, and an order of authentication. The method includes distributing the key pair and the policy file to a security device. The method also includes receiving, at the first server, an authentication request from a mobile application. The method further includes creating an authenticity challenge as specified in the policy file and sending the authenticity challenge with a response to the mobile application.Type: GrantFiled: December 4, 2014Date of Patent: August 15, 2017Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Ishai Borovoy, Iddo Levin, Haim Schneider, Gal Shachor, Artem Spector
-
Publication number: 20170147543Abstract: Displaying Web 1.0 application content on a mobile computing device includes one or more processors request website content, based on a URL corresponding to the website. The web page is generated and includes dynamic content and references to static resources. The web page is crawled and the static resources of the web page are identified. The identified static resources of the web page are compared to the static resources stored on the mobile computing device. In response to determining the absence of a static resource of the web page stored on the mobile computing device, the absent static resource is downloaded and stored within the mobile computing device. In response to accessing the web page of the website, the web page is generated by the dynamic content from the web server and the static content stored on the mobile computing device.Type: ApplicationFiled: November 25, 2015Publication date: May 25, 2017Inventors: Idan Ben-Harrush, Nili Guy, Gal Shachor
-
Patent number: 9648124Abstract: According to an aspect, techniques for processing hybrid data include receiving a web request and translating the web request into a translated native request. The translated native request and a native request are sent to a server via a single web client. A response is received from the server via the single web client. It is determined whether the response corresponds to the translated native request or to the native request.Type: GrantFiled: December 8, 2014Date of Patent: May 9, 2017Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Cirill Aizenberg, Anton Aleksandrov, Vitaly Meytin, Gal Shachor, Arie Shifer, Issahar Weiss, Uri Zonens
-
Publication number: 20160323414Abstract: Managing data access on a computing device by receiving at a first computing device first webpage-related content received from a second computing device via a communications network, storing the first webpage-related content in a locally-accessible data storage medium that is locally accessible to the first computing device, causing an agent executed by the first computing device to access the first webpage-related content from the locally-accessible data storage medium, intercepting an attempt by the agent to receive second webpage-related content via the communications network, and providing the second webpage-related content to the agent from the locally-accessible data storage medium.Type: ApplicationFiled: April 29, 2015Publication date: November 3, 2016Inventors: Idan Ben-Harrush, Ran Bernstein, Nili Guy Ifergan, Gal Shachor
-
Publication number: 20160308955Abstract: Embodiments of the present invention provide a method, system and computer program product for workload deployment density management for a multi-stage architecture implemented within a multi-tenant computing environment. The method includes receiving different requests from different tenants of a multi-tenant computing environment to deploy respectively different application instances of respectively different computer programs into different nodes of the host computing system. The method also includes determining from each request an associated stage of a software lifecycle for a corresponding one of the application instances. Finally, the method includes deploying each of the application instances into a particular one of the nodes depending upon an associated stage of each of the application instances so that each of the nodes hosts different application instances for different tenants of a common stage of the software lifecycle.Type: ApplicationFiled: June 27, 2016Publication date: October 20, 2016Inventors: Andrew D. Dingsor, Todd E. Kaplinger, Michael R. Rheinheimer, Gal Shachor, Artem Spector
-
Patent number: 9454352Abstract: Embodiments of the present invention provide a method, system and computer program product for workload deployment density management for a multi-stage architecture implemented within a multi-tenant computing environment. The method includes receiving different requests from different tenants of a multi-tenant computing environment to deploy respectively different application instances of respectively different computer programs into different nodes of the host computing system. The method also includes determining from each request an associated stage of a software lifecycle for a corresponding one of the application instances. Finally, the method includes deploying each of the application instances into a particular one of the nodes depending upon an associated stage of each of the application instances so that each of the nodes hosts different application instances for different tenants of a common stage of the software lifecycle.Type: GrantFiled: May 11, 2015Date of Patent: September 27, 2016Assignee: International Business Machines CorporationInventors: Andrew D. Dingsor, Todd E. Kaplinger, Michael R. Rheinheimer, Gal Shachor, Artem Spector
-
Patent number: 9396170Abstract: A method of presenting hyperlink data. The method comprises identifying when a web browser running on a web browser client retrieves, in response to a web document data request submitted to a target server, a first web document data for displaying a first web document containing a hyperlink having a label for display and a target destination defining an address of a second web document, evaluating a risk from content of the second web document, generating by the web browser to a reference evaluation indication of the risk, and processing the web document data and the reference evaluation indication by the web browser for generating a presentation on the client terminal which combines the first web document data and the reference evaluation indication such that when the reference evaluation indication is presented when the label is presented by the web browser.Type: GrantFiled: November 11, 2013Date of Patent: July 19, 2016Assignee: GLOBALFOUNDRIES INC.Inventors: Idan Ben-Harrush, Anat Berkman, Alexander Dvinsky, Nili Guy, Samuel Kallner, Andrei Kirshin, Dmitri Pikus, Yoav Rubin, Gal Shachor, Omer Tripp
-
Patent number: 9395967Abstract: Embodiments of the present invention provide a method, system and computer program product for workload deployment density management for a multi-stage architecture implemented within a multi-tenant computing environment. The method includes receiving different requests from different tenants of a multi-tenant computing environment to deploy respectively different application instances of respectively different computer programs into different nodes of the host computing system. The method also includes determining from each request an associated stage of a software lifecycle for a corresponding one of the application instances. Finally, the method includes deploying each of the application instances into a particular one of the nodes depending upon an associated stage of each of the application instances so that each of the nodes hosts different application instances for different tenants of a common stage of the software lifecycle.Type: GrantFiled: November 3, 2014Date of Patent: July 19, 2016Assignee: International Business Machines CorporationInventors: Andrew D. Dingsor, Todd E. Kaplinger, Michael R. Rheinheimer, Gal Shachor, Artem Spector
-
Patent number: 9372602Abstract: According to some embodiments of the present invention, there is provided a method for revealing at least a portion of a disguised password on a display device. The method comprises receiving a plurality of password characters typed by a user, presenting a plurality of replacement symbols in a password field displayed by a display device of a terminal having a touch surface, each the replacement symbol being indicative of the reception of another of the plurality of password characters, detecting a fingertip which slides contiguously against the touch surface, and temporarily replacing the presentation of at least some of the plurality of replacement symbols with of the presentation of at least some of the plurality of password characters in a sequential manner correspondingly with a movement of the fingertip.Type: GrantFiled: November 4, 2012Date of Patent: June 21, 2016Assignee: International Business Machines CorporationInventors: Idan Ben-Harrush, Nili Guy, Samuel Kallner, Ariel Landau, Yoav Rubin, Gal Shachor
-
Publication number: 20160164994Abstract: According to an aspect, techniques for processing hybrid data include receiving a web request and translating the web request into a translated native request. The translated native request and a native request are sent to a server via a single web client. A response is received from the server via the single web client. It is determined whether the response corresponds to the translated native request or to the native request.Type: ApplicationFiled: August 5, 2015Publication date: June 9, 2016Inventors: Cirill Aizenberg, Anton Aleksandrov, Vitaly Meytin, Gal Shachor, Arie Shifer, Issahar Weiss, Uri Zonens
-
Publication number: 20160164851Abstract: Examples of techniques for authenticating mobile applications are described herein. A method includes receiving, at a first server, a key pair and a policy file associated with a mobile service on a second server, the policy file includes a plurality of security objects to be authenticated, a plurality of computing devices to authenticate the security objects, and an order of authentication. The method includes distributing the key pair and the policy file to a security device. The method also includes receiving, at the first server, an authentication request from a mobile application. The method further includes creating an authenticity challenge as specified in the policy file and sending the authenticity challenge with a response to the mobile application.Type: ApplicationFiled: December 4, 2014Publication date: June 9, 2016Inventors: Ishai Borovoy, Iddo Levin, Haim Schneider, Gal Shachor, Artem Spector
-
Publication number: 20160164920Abstract: Examples of techniques for authenticating mobile applications are described herein. A method includes receiving, at a first server, a key pair and a policy file associated with a mobile service on a second server, the policy file includes a plurality of security objects to be authenticated, a plurality of computing devices to authenticate the security objects, and an order of authentication. The method includes distributing the key pair and the policy file to a security device. The method also includes receiving, at the first server, an authentication request from a mobile application. The method further includes creating an authenticity challenge as specified in the policy file and sending the authenticity challenge with a response to the mobile application.Type: ApplicationFiled: August 4, 2015Publication date: June 9, 2016Inventors: Ishai Borovoy, Iddo Levin, Haim Schneider, Gal Shachor, Artem Spector
-
Publication number: 20160164993Abstract: According to an aspect, techniques for processing hybrid data include receiving a web request and translating the web request into a translated native request. The translated native request and a native request are sent to a server via a single web client. A response is received from the server via the single web client. It is determined whether the response corresponds to the translated native request or to the native request.Type: ApplicationFiled: December 8, 2014Publication date: June 9, 2016Inventors: Cirill Aizenberg, Anton Aleksandrov, Vitaly Meytin, Gal Shachor, Arie Shifer, Issahar Weiss, Uri Zonens
-
Publication number: 20160162447Abstract: In one embodiment, a computer-implemented method includes receiving first event details from a provider. The first event details are related to a first event in a business process flow associated with a user and related to a user interaction. A first document is generated, by a computer processor, and includes the first event details. The first document is stored in a first set of documents associated with the user. Second event details are received from the provider. The second event details are related to a second event in the business process flow associated with the user and related to the user interaction. The second event is distinct from the first event. A second document is generated and includes the second event details. The second document is stored in the first set of documents associated with the user. The first set of documents is distributed to the user.Type: ApplicationFiled: December 4, 2014Publication date: June 9, 2016Inventors: Todd E. Kaplinger, Gal Shachor, Gregory L. Truty
-
Publication number: 20160127453Abstract: Embodiments of the present invention provide a method, system and computer program product for workload deployment density management for a multi-stage architecture implemented within a multi-tenant computing environment. The method includes receiving different requests from different tenants of a multi-tenant computing environment to deploy respectively different application instances of respectively different computer programs into different nodes of the host computing system. The method also includes determining from each request an associated stage of a software lifecycle for a corresponding one of the application instances. Finally, the method includes deploying each of the application instances into a particular one of the nodes depending upon an associated stage of each of the application instances so that each of the nodes hosts different application instances for different tenants of a common stage of the software lifecycle.Type: ApplicationFiled: May 11, 2015Publication date: May 5, 2016Inventors: Andrew D. Dingsor, Todd E. Kaplinger, Michael R. Rheinheimer, Gal Shachor, Artem Spector