Patents by Inventor Gal Shachor
Gal Shachor has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20160124735Abstract: Embodiments of the present invention provide a method, system and computer program product for workload deployment density management for a multi-stage architecture implemented within a multi-tenant computing environment. The method includes receiving different requests from different tenants of a multi-tenant computing environment to deploy respectively different application instances of respectively different computer programs into different nodes of the host computing system. The method also includes determining from each request an associated stage of a software lifecycle for a corresponding one of the application instances. Finally, the method includes deploying each of the application instances into a particular one of the nodes depending upon an associated stage of each of the application instances so that each of the nodes hosts different application instances for different tenants of a common stage of the software lifecycle.Type: ApplicationFiled: November 3, 2014Publication date: May 5, 2016Inventors: Andrew D. Dingsor, Todd E. Kaplinger, Michael R. Rheinheimer, Gal Shachor, Artem Spector
-
Publication number: 20160098260Abstract: A processing system can detect a single user gesture while a first application is currently executing in a software environment provided by an operating system and has focus in the operating system. Responsive to the single user gesture being detected, an operating system menu including at least a first menu item can be presented by a user interface. The first menu item can be configured to initiate uninstallation of the first application currently executing in the software environment provided by the operating system and having focus in the operating system. Responsive to receiving a user selection of the first menu item, using a processor of the processing system, the first application currently executing in the software environment provided by the operating system and having focus in the operating system can be uninstalled.Type: ApplicationFiled: October 6, 2014Publication date: April 7, 2016Inventors: Yoav Bodor, Ishai Borovoy, Yaron Goldberg, Itay Hindy, Gal Shachor, Arie Shifer, Artem Spector, Issahar Weiss, Daniel M. Yellin
-
Patent number: 9262156Abstract: Computerized methods for providing one or more memory values present in memory during execution of a procedure to be automatically available to an asynchronous callback executed later. The methods comprise receiving a code containing procedures, the procedures having input parameters to be executed as asynchronous callback procedures. The methods further comprise replacing the procedures in the code with wrapper procedures, where the wrapper procedures comprise instructions for storing one or more memory values, storing the asynchronous callbacks of the input parameters, replacing each of the input parameters with a wrapper callback, the wrapper callback comprising instruction for restoring the memory values and executing the asynchronous callbacks. The methods further comprise executing the original procedures.Type: GrantFiled: February 12, 2014Date of Patent: February 16, 2016Assignee: International Business Machines CorporationInventors: Alexander Dvinsky, Alexey Roytman, Gal Shachor, Konstantin Shagin, Bruno Wasserman
-
Publication number: 20150286694Abstract: A method, system and computer program product for integrating a mobile payment application with other applications utilizing analytic analysis. The user usage of applications, including a mobile payment application as well as other mobile applications, on a mobile computing device is tracked. For example, user interactions, such as checking a rewards balance, may be tracked. Analytic analysis may then be applied to the tracked user interactions to identify data and actions to sync between the mobile payment application and the other mobile applications on the mobile computing device as well as with other applications on other computing devices of the user that are identified via a user identification. In this manner, the mobile payment application is seamlessly integrated with the other mobile applications on the mobile computing device as well as with other applications on other computing devices of the user.Type: ApplicationFiled: April 8, 2014Publication date: October 8, 2015Applicant: International Business Machines CorporationInventors: Todd E. Kaplinger, Gal Shachor, Gregory L. Truty
-
Publication number: 20150287015Abstract: A method, system and computer program product for integrating a mobile payment application with other applications utilizing analytic analysis. The user usage of applications, including a mobile payment application as well as other mobile applications, on a mobile computing device is tracked. For example, user interactions, such as checking a rewards balance, may be tracked. Analytic analysis may then be applied to the tracked user interactions to identify data and actions to sync between the mobile payment application and the other mobile applications on the mobile computing device as well as with other applications on other computing devices of the user that are identified via a user identification. In this manner, the mobile payment application is seamlessly integrated with the other mobile applications on the mobile computing device as well as with other applications on other computing devices of the user.Type: ApplicationFiled: January 28, 2015Publication date: October 8, 2015Inventors: Todd E. Kaplinger, Gal Shachor, Gregory L. Truty
-
Publication number: 20150227362Abstract: Computerized methods for providing one or more memory values present in memory during execution of a procedure to be automatically available to an asynchronous callback executed later. The methods comprise receiving a code containing procedures, the procedures having input parameters to be executed as asynchronous callback procedures. The methods further comprise replacing the procedures in the code with wrapper procedures, where the wrapper procedures comprise instructions for storing one or more memory values, storing the asynchronous callbacks of the input parameters, replacing each of the input parameters with a wrapper callback, the wrapper callback comprising instruction for restoring the memory values and executing the asynchronous callbacks. The methods further comprise executing the original procedures.Type: ApplicationFiled: February 12, 2014Publication date: August 13, 2015Applicant: International Business Machines CorporationInventors: Alexander Dvinsky, Alexey Roytman, Gal Shachor, Konstantin Shagin, Bruno Wasserman
-
Publication number: 20150199674Abstract: A method, system and computer program product for integrating a mobile payment application with other mobile applications while preventing security exposures. A set of application programming interfaces of mobile applications that may possibly be utilized by a pass created by a mobile payment application is generated in response to receiving an indication that the pass was created. A “pass,” as used herein, refers to a form of mobile payment, such as a gift card. A selection of these application programming interfaces may then be received to interact with the created pass. In this manner, the existing mobile applications are seamlessly integrated with the features of passes. Furthermore, a virtual container is created for the created pass and the selected application programming interfaces to interface with the created pass. By creating such a container, the data to be exposed to the application layer can be controlled.Type: ApplicationFiled: September 15, 2014Publication date: July 16, 2015Inventors: Todd E. Kaplinger, Gal Shachor, Gregory L. Truty
-
Publication number: 20150199678Abstract: A method, system and computer program product for integrating a mobile payment application with other mobile applications while preventing security exposures. A set of application programming interfaces of mobile applications that may possibly be utilized by a pass created by a mobile payment application is generated in response to receiving an indication that the pass was created. A “pass,” as used herein, refers to a form of mobile payment, such as a gift card. A selection of these application programming interfaces may then be received to interact with the created pass. In this manner, the existing mobile applications are seamlessly integrated with the features of passes. Furthermore, a virtual container is created for the created pass and the selected application programming interfaces to interface with the created pass. By creating such a container, the data to be exposed to the application layer can be controlled.Type: ApplicationFiled: January 14, 2014Publication date: July 16, 2015Applicant: International Business Machines CorporationInventors: Todd E. Kaplinger, Gal Shachor, Gregory L. Truty
-
Publication number: 20150135324Abstract: A method of presenting hyperlink data. The method comprises identifying when a web browser running on a web browser client retrieves, in response to a web document data request submitted to a target server, a first web document data for displaying a first web document containing a hyperlink having a label for display and a target destination defining an address of a second web document, evaluating a risk from content of the second web document, generating by the web browser to a reference evaluation indication of the risk, and processing the web document data and the reference evaluation indication by the web browser for generating a presentation on the client terminal which combines the first web document data and the reference evaluation indication such that when the reference evaluation indication is presented when the label is presented by the web browser.Type: ApplicationFiled: November 11, 2013Publication date: May 14, 2015Applicant: International Business Machines CorporationInventors: Idan Ben-Harrush, Anat Berkman, Alexander Dvinsky, Nili Guy, Samuel Kallner, Andrei Kirshin, Dmitri Pikus, Yoav Rubin, Gal Shachor, Omer Tripp
-
Patent number: 8856809Abstract: A computer implemented method, apparatus, and computer usable program product for processing application code. In one embodiment, a call is received to invoke a set of methods of annotated application code. The annotated application code includes a set of annotations specifying a selection of the set of methods. A selected method from the set of methods is invoked in response to determining that the call is valid according to the set of annotations. Thereafter, a subsequent set of valid methods for execution is identified based upon an annotation associated with the selected method.Type: GrantFiled: March 19, 2008Date of Patent: October 7, 2014Assignee: International Business Machines CorporationInventors: Francisco Phelan Curbera, Matthew J. Duftler, Michael Levi Fraenkel, Rania Y. Khalaf, Axel Martens, Johannes Riemer, Gal Shachor
-
Patent number: 8782090Abstract: A method of aiding report construction based on inference of implicit application level relationships is provided herein. The method may include the following steps: analyzing a model of a software application to yield data elements associated with base objects of the software application and relationships between the data elements; generating a list of reportable objects comprising the base objects and objects associated with the data elements and their relationships; ordering the reportable objects based on at least one of: content and usage of the reportable objects, to yield an ordered list; and presenting the ordered list in a form usable for building a report on the software application, wherein at least one of: the analyzing, the generating, the ordering, and the presenting, is carried out by at least one processor.Type: GrantFiled: November 7, 2010Date of Patent: July 15, 2014Assignee: International Business Machines CorporationInventors: Maya Barnea, Nili Guy, Samuel Kallner, Yoav Rubin, Gal Shachor
-
Publication number: 20140129974Abstract: According to some embodiments of the present invention, there is provided a method for revealing at least a portion of a disguised password on a display device. The method comprises receiving a plurality of password characters typed by a user, presenting a plurality of replacement symbols in a password field displayed by a display device of a terminal having a touch surface, each the replacement symbol being indicative of the reception of another of the plurality of password characters, detecting a fingertip which slides contiguously against the touch surface, and temporarily replacing the presentation of at least some of the plurality of replacement symbols with of the presentation of at least some of the plurality of password characters in a sequential manner correspondingly with a movement of the fingertip.Type: ApplicationFiled: November 4, 2012Publication date: May 8, 2014Inventors: Idan Ben-Harrush, Nili Guy, Samuel Kallner, Ariel Landau, Yoav Rubin, Gal Shachor
-
Publication number: 20130339605Abstract: A computerized method of collaborating storage space across multiple devices according to file usage patterns of the devices. The method comprises receiving access to a plurality of storage media each having a storage space and managed by at least one of a plurality of devices, identifying for each of the plurality of devices at least one usage pattern of at least one of a plurality of file types, creating a virtually contiguous storage pool mapping physical memory addresses of the plurality of storage media, setting a file distribution policy of storing each of a plurality of data files stored in the plurality of storage media in the virtually contiguous storage pool according to a match between a file type and at least one usage pattern, and collaborating storage space across the plurality of storage media managed by the plurality of devices according to the file distribution policy.Type: ApplicationFiled: June 19, 2012Publication date: December 19, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Michael Factor, Boaz Mizrachi, Gal Shachor
-
Patent number: 8443453Abstract: A method of ad hoc trust delegation in human-based workflow systems using one-time access key is provided herein. The method may include the following steps: generating a unique access key to a workflow system in response to a delegation of trust to one or more users; associating the unique access key with a specified portion of a workflow within the workflow system; embedding the unique access key in a message sent to the one or more users; and providing the one or more users with a one-time access to the workflow system, such that the access is limited to the specified portion of the workflow, in response to applying the unique access key to the workflow system.Type: GrantFiled: October 13, 2010Date of Patent: May 14, 2013Assignee: International Business Machines CorporationInventors: Asaf Adi, Nili Guy, David Franklin Manning, Michael Cain Mansell, Yoav Rubin, Gilad Moredehi Saadoun, Gal Shachor, Avi Yaeli
-
Patent number: 8234175Abstract: Device, system, and method of collaborative distribution of digital merchandise. For example, an apparatus for collaborative distribution of Digital Merchandise Items (DMIs) includes: a first computing device having an agent module to receive a command of a first user to purchase a DMI from a second user, to provide information to process a first electronic payment from the first user to the second user, to receive the DMI from a second computing device of the second user, to receive a confirmation that a second electronic payment was made from a third user to the first user, to transfer a copy of the DMI from the first computing device to a third computing device of the third user, to calculate a first portion of the second electronic payment to be maintained by the first user, to calculate a second portion of the second electronic payment to be transferred to the second user, and to provide information to process an electronic payment of the second portion from the first user to the second user.Type: GrantFiled: April 1, 2008Date of Patent: July 31, 2012Assignee: International Business Machines CorporationInventors: Amit Fisher, Dagan Gilat, Gal Shachor, Pnina Vortman, Segev Eliezer Wasserkrug
-
Publication number: 20120117117Abstract: A method of aiding report construction based on inference of implicit application level relationships is provided herein. The method may include the following steps: analyzing a model of a software application to yield data elements associated with base objects of the software application and relationships between the data elements; generating a list of reportable objects comprising the base objects and objects associated with the data elements and their relationships; ordering the reportable objects based on at least one of: content and usage of the reportable objects, to yield an ordered list; and presenting the ordered list in a form usable for building a report on the software application, wherein at least one of: the analyzing, the generating, the ordering, and the presenting, is carried out by at least one processor.Type: ApplicationFiled: November 7, 2010Publication date: May 10, 2012Applicant: International Business Machines CorporationInventors: Maya Barnea, Nili Guy, Samuel Kallner, Yoav Rubin, Gal Shachor
-
Publication number: 20120096543Abstract: A method of ad hoc trust delegation in human-based workflow systems using one-time access key is provided herein. The method may include the following steps: generating a unique access key to a workflow system in response to a delegation of trust to one or more users; associating the unique access key with a specified portion of a workflow within the workflow system; embedding the unique access key in a message sent to the one or more users; and providing the one or more users with a one-time access to the workflow system, such that the access is limited to the specified portion of the workflow, in response to applying the unique access key to the workflow system.Type: ApplicationFiled: October 13, 2010Publication date: April 19, 2012Applicant: International Business Machines CorporationInventors: Asaf Adi, Nili Guy, David Franklin Manning, Michael Cain Mansell, Yoav Rubin, Gilad Moredehi Saadoun, Gal Shachor, Avi Yaeli
-
Patent number: 8108834Abstract: A computer-implemented technique for executing a process is provided. The technique includes providing a class having at least one annotation that defines at least a portion of the process. The annotation is a run-time-readable, non-executable declarative programming construct that is associated with a first method of the class, and specifies at least one transition rule and a second method of the class associated with the transition rule. A process engine, which runs on a computer and is not an instance of the class, parses the annotation to extract the transition rule. The process engine receives a message from a source external to the process engine, and evaluates whether the transition rule is satisfied, responsively to the message. Upon finding that the transition rule is satisfied, the process engine invokes the second method, so as to generate an output with respect to the message. Other embodiments are also described.Type: GrantFiled: March 21, 2007Date of Patent: January 31, 2012Assignee: International Business Machines CorporationInventors: David Oren, Gal Shachor
-
Publication number: 20100162208Abstract: A modeling tool may be created directed from a drawing. A plurality of components and their relationships are deduced from the drawing and defined as a metamodel. One or more user operations performed while creating the drawing are also determined and used in building the metamodel. The metamodel may be used in a fixed mode to create a model with definition of the metamodel. The metamodel may be also used in a flexible mode to further redefine the metamodel or create a second metamodel.Type: ApplicationFiled: December 19, 2008Publication date: June 24, 2010Applicant: International Business Machines CorporationInventors: David Amid, Ateret Anaby-Tavor, Amit Fisher, Aviad Sela, Gal Shachor, Vadim Vasilov
-
Publication number: 20100106547Abstract: A computer-implemented method for generating a workflow includes receiving via an interactive user interface operator input that defines a first document that is to be filled in by a user and comprises a decision component. A first state of the workflow corresponding to the first document and a transition associated with actuation of the decision component are automatically defined. A second document that is to be presented upon user selection of the decision component in the first document is generated, and a second state of the workflow that corresponds to the second document and is linked to the first state by the transition is generated. In response to the first and second documents and the decision component, software code that corresponds to the workflow is produced for use in a workflow engine.Type: ApplicationFiled: October 29, 2008Publication date: April 29, 2010Inventors: Asaf Adi, Maya Barnea, Nili Guy, Samuel Kallner, Yoav Rubin, Gal Shachor