Patents by Inventor Gal Shachor

Gal Shachor has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20160124735
    Abstract: Embodiments of the present invention provide a method, system and computer program product for workload deployment density management for a multi-stage architecture implemented within a multi-tenant computing environment. The method includes receiving different requests from different tenants of a multi-tenant computing environment to deploy respectively different application instances of respectively different computer programs into different nodes of the host computing system. The method also includes determining from each request an associated stage of a software lifecycle for a corresponding one of the application instances. Finally, the method includes deploying each of the application instances into a particular one of the nodes depending upon an associated stage of each of the application instances so that each of the nodes hosts different application instances for different tenants of a common stage of the software lifecycle.
    Type: Application
    Filed: November 3, 2014
    Publication date: May 5, 2016
    Inventors: Andrew D. Dingsor, Todd E. Kaplinger, Michael R. Rheinheimer, Gal Shachor, Artem Spector
  • Publication number: 20160098260
    Abstract: A processing system can detect a single user gesture while a first application is currently executing in a software environment provided by an operating system and has focus in the operating system. Responsive to the single user gesture being detected, an operating system menu including at least a first menu item can be presented by a user interface. The first menu item can be configured to initiate uninstallation of the first application currently executing in the software environment provided by the operating system and having focus in the operating system. Responsive to receiving a user selection of the first menu item, using a processor of the processing system, the first application currently executing in the software environment provided by the operating system and having focus in the operating system can be uninstalled.
    Type: Application
    Filed: October 6, 2014
    Publication date: April 7, 2016
    Inventors: Yoav Bodor, Ishai Borovoy, Yaron Goldberg, Itay Hindy, Gal Shachor, Arie Shifer, Artem Spector, Issahar Weiss, Daniel M. Yellin
  • Patent number: 9262156
    Abstract: Computerized methods for providing one or more memory values present in memory during execution of a procedure to be automatically available to an asynchronous callback executed later. The methods comprise receiving a code containing procedures, the procedures having input parameters to be executed as asynchronous callback procedures. The methods further comprise replacing the procedures in the code with wrapper procedures, where the wrapper procedures comprise instructions for storing one or more memory values, storing the asynchronous callbacks of the input parameters, replacing each of the input parameters with a wrapper callback, the wrapper callback comprising instruction for restoring the memory values and executing the asynchronous callbacks. The methods further comprise executing the original procedures.
    Type: Grant
    Filed: February 12, 2014
    Date of Patent: February 16, 2016
    Assignee: International Business Machines Corporation
    Inventors: Alexander Dvinsky, Alexey Roytman, Gal Shachor, Konstantin Shagin, Bruno Wasserman
  • Publication number: 20150286694
    Abstract: A method, system and computer program product for integrating a mobile payment application with other applications utilizing analytic analysis. The user usage of applications, including a mobile payment application as well as other mobile applications, on a mobile computing device is tracked. For example, user interactions, such as checking a rewards balance, may be tracked. Analytic analysis may then be applied to the tracked user interactions to identify data and actions to sync between the mobile payment application and the other mobile applications on the mobile computing device as well as with other applications on other computing devices of the user that are identified via a user identification. In this manner, the mobile payment application is seamlessly integrated with the other mobile applications on the mobile computing device as well as with other applications on other computing devices of the user.
    Type: Application
    Filed: April 8, 2014
    Publication date: October 8, 2015
    Applicant: International Business Machines Corporation
    Inventors: Todd E. Kaplinger, Gal Shachor, Gregory L. Truty
  • Publication number: 20150287015
    Abstract: A method, system and computer program product for integrating a mobile payment application with other applications utilizing analytic analysis. The user usage of applications, including a mobile payment application as well as other mobile applications, on a mobile computing device is tracked. For example, user interactions, such as checking a rewards balance, may be tracked. Analytic analysis may then be applied to the tracked user interactions to identify data and actions to sync between the mobile payment application and the other mobile applications on the mobile computing device as well as with other applications on other computing devices of the user that are identified via a user identification. In this manner, the mobile payment application is seamlessly integrated with the other mobile applications on the mobile computing device as well as with other applications on other computing devices of the user.
    Type: Application
    Filed: January 28, 2015
    Publication date: October 8, 2015
    Inventors: Todd E. Kaplinger, Gal Shachor, Gregory L. Truty
  • Publication number: 20150227362
    Abstract: Computerized methods for providing one or more memory values present in memory during execution of a procedure to be automatically available to an asynchronous callback executed later. The methods comprise receiving a code containing procedures, the procedures having input parameters to be executed as asynchronous callback procedures. The methods further comprise replacing the procedures in the code with wrapper procedures, where the wrapper procedures comprise instructions for storing one or more memory values, storing the asynchronous callbacks of the input parameters, replacing each of the input parameters with a wrapper callback, the wrapper callback comprising instruction for restoring the memory values and executing the asynchronous callbacks. The methods further comprise executing the original procedures.
    Type: Application
    Filed: February 12, 2014
    Publication date: August 13, 2015
    Applicant: International Business Machines Corporation
    Inventors: Alexander Dvinsky, Alexey Roytman, Gal Shachor, Konstantin Shagin, Bruno Wasserman
  • Publication number: 20150199674
    Abstract: A method, system and computer program product for integrating a mobile payment application with other mobile applications while preventing security exposures. A set of application programming interfaces of mobile applications that may possibly be utilized by a pass created by a mobile payment application is generated in response to receiving an indication that the pass was created. A “pass,” as used herein, refers to a form of mobile payment, such as a gift card. A selection of these application programming interfaces may then be received to interact with the created pass. In this manner, the existing mobile applications are seamlessly integrated with the features of passes. Furthermore, a virtual container is created for the created pass and the selected application programming interfaces to interface with the created pass. By creating such a container, the data to be exposed to the application layer can be controlled.
    Type: Application
    Filed: September 15, 2014
    Publication date: July 16, 2015
    Inventors: Todd E. Kaplinger, Gal Shachor, Gregory L. Truty
  • Publication number: 20150199678
    Abstract: A method, system and computer program product for integrating a mobile payment application with other mobile applications while preventing security exposures. A set of application programming interfaces of mobile applications that may possibly be utilized by a pass created by a mobile payment application is generated in response to receiving an indication that the pass was created. A “pass,” as used herein, refers to a form of mobile payment, such as a gift card. A selection of these application programming interfaces may then be received to interact with the created pass. In this manner, the existing mobile applications are seamlessly integrated with the features of passes. Furthermore, a virtual container is created for the created pass and the selected application programming interfaces to interface with the created pass. By creating such a container, the data to be exposed to the application layer can be controlled.
    Type: Application
    Filed: January 14, 2014
    Publication date: July 16, 2015
    Applicant: International Business Machines Corporation
    Inventors: Todd E. Kaplinger, Gal Shachor, Gregory L. Truty
  • Publication number: 20150135324
    Abstract: A method of presenting hyperlink data. The method comprises identifying when a web browser running on a web browser client retrieves, in response to a web document data request submitted to a target server, a first web document data for displaying a first web document containing a hyperlink having a label for display and a target destination defining an address of a second web document, evaluating a risk from content of the second web document, generating by the web browser to a reference evaluation indication of the risk, and processing the web document data and the reference evaluation indication by the web browser for generating a presentation on the client terminal which combines the first web document data and the reference evaluation indication such that when the reference evaluation indication is presented when the label is presented by the web browser.
    Type: Application
    Filed: November 11, 2013
    Publication date: May 14, 2015
    Applicant: International Business Machines Corporation
    Inventors: Idan Ben-Harrush, Anat Berkman, Alexander Dvinsky, Nili Guy, Samuel Kallner, Andrei Kirshin, Dmitri Pikus, Yoav Rubin, Gal Shachor, Omer Tripp
  • Patent number: 8856809
    Abstract: A computer implemented method, apparatus, and computer usable program product for processing application code. In one embodiment, a call is received to invoke a set of methods of annotated application code. The annotated application code includes a set of annotations specifying a selection of the set of methods. A selected method from the set of methods is invoked in response to determining that the call is valid according to the set of annotations. Thereafter, a subsequent set of valid methods for execution is identified based upon an annotation associated with the selected method.
    Type: Grant
    Filed: March 19, 2008
    Date of Patent: October 7, 2014
    Assignee: International Business Machines Corporation
    Inventors: Francisco Phelan Curbera, Matthew J. Duftler, Michael Levi Fraenkel, Rania Y. Khalaf, Axel Martens, Johannes Riemer, Gal Shachor
  • Patent number: 8782090
    Abstract: A method of aiding report construction based on inference of implicit application level relationships is provided herein. The method may include the following steps: analyzing a model of a software application to yield data elements associated with base objects of the software application and relationships between the data elements; generating a list of reportable objects comprising the base objects and objects associated with the data elements and their relationships; ordering the reportable objects based on at least one of: content and usage of the reportable objects, to yield an ordered list; and presenting the ordered list in a form usable for building a report on the software application, wherein at least one of: the analyzing, the generating, the ordering, and the presenting, is carried out by at least one processor.
    Type: Grant
    Filed: November 7, 2010
    Date of Patent: July 15, 2014
    Assignee: International Business Machines Corporation
    Inventors: Maya Barnea, Nili Guy, Samuel Kallner, Yoav Rubin, Gal Shachor
  • Publication number: 20140129974
    Abstract: According to some embodiments of the present invention, there is provided a method for revealing at least a portion of a disguised password on a display device. The method comprises receiving a plurality of password characters typed by a user, presenting a plurality of replacement symbols in a password field displayed by a display device of a terminal having a touch surface, each the replacement symbol being indicative of the reception of another of the plurality of password characters, detecting a fingertip which slides contiguously against the touch surface, and temporarily replacing the presentation of at least some of the plurality of replacement symbols with of the presentation of at least some of the plurality of password characters in a sequential manner correspondingly with a movement of the fingertip.
    Type: Application
    Filed: November 4, 2012
    Publication date: May 8, 2014
    Inventors: Idan Ben-Harrush, Nili Guy, Samuel Kallner, Ariel Landau, Yoav Rubin, Gal Shachor
  • Publication number: 20130339605
    Abstract: A computerized method of collaborating storage space across multiple devices according to file usage patterns of the devices. The method comprises receiving access to a plurality of storage media each having a storage space and managed by at least one of a plurality of devices, identifying for each of the plurality of devices at least one usage pattern of at least one of a plurality of file types, creating a virtually contiguous storage pool mapping physical memory addresses of the plurality of storage media, setting a file distribution policy of storing each of a plurality of data files stored in the plurality of storage media in the virtually contiguous storage pool according to a match between a file type and at least one usage pattern, and collaborating storage space across the plurality of storage media managed by the plurality of devices according to the file distribution policy.
    Type: Application
    Filed: June 19, 2012
    Publication date: December 19, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Michael Factor, Boaz Mizrachi, Gal Shachor
  • Patent number: 8443453
    Abstract: A method of ad hoc trust delegation in human-based workflow systems using one-time access key is provided herein. The method may include the following steps: generating a unique access key to a workflow system in response to a delegation of trust to one or more users; associating the unique access key with a specified portion of a workflow within the workflow system; embedding the unique access key in a message sent to the one or more users; and providing the one or more users with a one-time access to the workflow system, such that the access is limited to the specified portion of the workflow, in response to applying the unique access key to the workflow system.
    Type: Grant
    Filed: October 13, 2010
    Date of Patent: May 14, 2013
    Assignee: International Business Machines Corporation
    Inventors: Asaf Adi, Nili Guy, David Franklin Manning, Michael Cain Mansell, Yoav Rubin, Gilad Moredehi Saadoun, Gal Shachor, Avi Yaeli
  • Patent number: 8234175
    Abstract: Device, system, and method of collaborative distribution of digital merchandise. For example, an apparatus for collaborative distribution of Digital Merchandise Items (DMIs) includes: a first computing device having an agent module to receive a command of a first user to purchase a DMI from a second user, to provide information to process a first electronic payment from the first user to the second user, to receive the DMI from a second computing device of the second user, to receive a confirmation that a second electronic payment was made from a third user to the first user, to transfer a copy of the DMI from the first computing device to a third computing device of the third user, to calculate a first portion of the second electronic payment to be maintained by the first user, to calculate a second portion of the second electronic payment to be transferred to the second user, and to provide information to process an electronic payment of the second portion from the first user to the second user.
    Type: Grant
    Filed: April 1, 2008
    Date of Patent: July 31, 2012
    Assignee: International Business Machines Corporation
    Inventors: Amit Fisher, Dagan Gilat, Gal Shachor, Pnina Vortman, Segev Eliezer Wasserkrug
  • Publication number: 20120117117
    Abstract: A method of aiding report construction based on inference of implicit application level relationships is provided herein. The method may include the following steps: analyzing a model of a software application to yield data elements associated with base objects of the software application and relationships between the data elements; generating a list of reportable objects comprising the base objects and objects associated with the data elements and their relationships; ordering the reportable objects based on at least one of: content and usage of the reportable objects, to yield an ordered list; and presenting the ordered list in a form usable for building a report on the software application, wherein at least one of: the analyzing, the generating, the ordering, and the presenting, is carried out by at least one processor.
    Type: Application
    Filed: November 7, 2010
    Publication date: May 10, 2012
    Applicant: International Business Machines Corporation
    Inventors: Maya Barnea, Nili Guy, Samuel Kallner, Yoav Rubin, Gal Shachor
  • Publication number: 20120096543
    Abstract: A method of ad hoc trust delegation in human-based workflow systems using one-time access key is provided herein. The method may include the following steps: generating a unique access key to a workflow system in response to a delegation of trust to one or more users; associating the unique access key with a specified portion of a workflow within the workflow system; embedding the unique access key in a message sent to the one or more users; and providing the one or more users with a one-time access to the workflow system, such that the access is limited to the specified portion of the workflow, in response to applying the unique access key to the workflow system.
    Type: Application
    Filed: October 13, 2010
    Publication date: April 19, 2012
    Applicant: International Business Machines Corporation
    Inventors: Asaf Adi, Nili Guy, David Franklin Manning, Michael Cain Mansell, Yoav Rubin, Gilad Moredehi Saadoun, Gal Shachor, Avi Yaeli
  • Patent number: 8108834
    Abstract: A computer-implemented technique for executing a process is provided. The technique includes providing a class having at least one annotation that defines at least a portion of the process. The annotation is a run-time-readable, non-executable declarative programming construct that is associated with a first method of the class, and specifies at least one transition rule and a second method of the class associated with the transition rule. A process engine, which runs on a computer and is not an instance of the class, parses the annotation to extract the transition rule. The process engine receives a message from a source external to the process engine, and evaluates whether the transition rule is satisfied, responsively to the message. Upon finding that the transition rule is satisfied, the process engine invokes the second method, so as to generate an output with respect to the message. Other embodiments are also described.
    Type: Grant
    Filed: March 21, 2007
    Date of Patent: January 31, 2012
    Assignee: International Business Machines Corporation
    Inventors: David Oren, Gal Shachor
  • Publication number: 20100162208
    Abstract: A modeling tool may be created directed from a drawing. A plurality of components and their relationships are deduced from the drawing and defined as a metamodel. One or more user operations performed while creating the drawing are also determined and used in building the metamodel. The metamodel may be used in a fixed mode to create a model with definition of the metamodel. The metamodel may be also used in a flexible mode to further redefine the metamodel or create a second metamodel.
    Type: Application
    Filed: December 19, 2008
    Publication date: June 24, 2010
    Applicant: International Business Machines Corporation
    Inventors: David Amid, Ateret Anaby-Tavor, Amit Fisher, Aviad Sela, Gal Shachor, Vadim Vasilov
  • Publication number: 20100106547
    Abstract: A computer-implemented method for generating a workflow includes receiving via an interactive user interface operator input that defines a first document that is to be filled in by a user and comprises a decision component. A first state of the workflow corresponding to the first document and a transition associated with actuation of the decision component are automatically defined. A second document that is to be presented upon user selection of the decision component in the first document is generated, and a second state of the workflow that corresponds to the second document and is linked to the first state by the transition is generated. In response to the first and second documents and the decision component, software code that corresponds to the workflow is produced for use in a workflow engine.
    Type: Application
    Filed: October 29, 2008
    Publication date: April 29, 2010
    Inventors: Asaf Adi, Maya Barnea, Nili Guy, Samuel Kallner, Yoav Rubin, Gal Shachor