Patents by Inventor Ilan D. Prager
Ilan D. Prager has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10360404Abstract: Embodiments of the present invention disclose a method, computer program product, and system for text author anonymization for de-identification of written text. This may be used to replace written text after learning text author writing characteristics, such frequently written terms, grammar patterns, grammar errors, and writing tone. Portions of the written text which may identify the text author may be replaced, for example the text author writing characteristics, social status, geographical location, and specific organization.Type: GrantFiled: February 25, 2016Date of Patent: July 23, 2019Assignee: International Business Machines CorporationInventors: Itai Gordon, Peter Hagelund, Ilan D. Prager
-
Publication number: 20190205550Abstract: An example system includes a processor to monitor a data asset and associated access policies to be synchronized to detect a trigger. The processor is to also request and receive data lineage information on the monitored data asset in response to detecting the trigger. The processor is to further detect a source system and a target system based on the data lineage information. The processor is also to query an access policy of the source system and an access policy of the target system. The processor is to merge the access policy of the source system and the access policy of the target system based on a predetermined merger configuration to generate a merged access policy. The processor is to update a monitoring system based on the merged access policy.Type: ApplicationFiled: March 11, 2019Publication date: July 4, 2019Inventors: Itai Gordon, Shlomit Avrahami, Ilan D. Prager
-
Patent number: 10324932Abstract: An example computer-implemented method includes receiving, via a processor, a plurality of structured query statements associated with an application and a database. The method includes detecting, via the processor, a logical relationship between at least two of the plurality of structured query statements based on a common source, a predetermined threshold time, a common transaction. The method includes generating, via the processor, a model based on the detected logical relationship. The method further includes receiving, via the processor, a request to modify the database. The method also further includes modifying, via the processor, the database in response to detecting that a predetermined threshold probability of application functionality impairment is not exceeded.Type: GrantFiled: February 29, 2016Date of Patent: June 18, 2019Assignee: International Business Machines CorporationInventors: Itai Gordon, Peter Hagelund, Ilan D. Prager
-
Publication number: 20190166159Abstract: A method, computer program product and system for generating false data for suspicious users. A suspicious user is identified. Actions of the user are then tracked. The user attempting to access sensitive information is detected. Relevant false sensitive information corresponding to the sensitive information is then detected. The relevant false sensitive information is then mapped to the sensitive information. The relevant false sensitive information is provided to the suspicious user. In response to user input, at least one command is executed, where the at least one command includes the relevant false sensitive information and not the sensitive information.Type: ApplicationFiled: November 29, 2017Publication date: May 30, 2019Inventors: Shlomit Avrahami, Yoav Ben-Yair, Gil Fuchs, Itai Gordon, Ilan D. Prager
-
Publication number: 20190130123Abstract: A method, computer program product and system for preventing unauthorized access of confidential information. The transmission of data from a first user to a second user is detected. An authorization level corresponding to the second user is then determined. Furthermore, a probability that the authorization level corresponding to the second user and the data is accurate is generated. Additionally, a determination is made that the data includes sensitive information that the second user is not authorized to access based on the authorization level. Moreover, the data can be modified based on the probability, where the data is to be redacted if the probability is within a range of a threshold value or the data is to be blocked from transmission if the probability is above the range.Type: ApplicationFiled: October 30, 2017Publication date: May 2, 2019Inventors: Yoav Ben-Yair, Gil Fuchs, Itai Gordon, Ilan D. Prager
-
Publication number: 20190080101Abstract: Embodiments of the present invention disclose methods and systems which receive a user credential corresponding to a user, a task to be performed by the user, a security policy including a user role, and sensitive information. These methods and systems dynamically provision virtual machines including un-redacted information from received sensitive information. Furthermore, a set of tools process the redacted information, based on the user credential, the task to be performed, and the security policy.Type: ApplicationFiled: November 14, 2018Publication date: March 14, 2019Inventors: Itai Gordon, Peter Hagelund, Ilan D. Prager
-
Publication number: 20190034647Abstract: Disclosed herein is a system and method that can retrieve, via a file monitor, a file and policy data from a case management system or a content management system, wherein the file and the policy data are retrieved in response to detecting a user request for the file. A processor can also modify, via the file monitor, access to the file based on the policy data, and intercept a plurality of document management instructions executed with the file. The processor can also detect at least one of the document management instructions is a malicious action, wherein the malicious action is detected based on the policy data, wherein the policy data is updated in response to detecting each of the document management instructions. Additionally, the processor can execute a policy instruction to prevent execution of the at least one document management instruction.Type: ApplicationFiled: July 27, 2017Publication date: January 31, 2019Inventors: Shlomit Avrahami, Itai Gordon, Elik Katz, Yakir Keisar, Ilan D. Prager, Denis Voloshin
-
Publication number: 20190034648Abstract: Disclosed herein is a system and method that can retrieve, via a file monitor, a file and policy data from a case management system or a content management system, wherein the file and the policy data are retrieved in response to detecting a user request for the file. A processor can also modify, via the file monitor, access to the file based on the policy data, and intercept a plurality of document management instructions executed with the file. The processor can also detect at least one of the document management instructions is a malicious action, wherein the malicious action is detected based on the policy data, wherein the policy data is updated in response to detecting each of the document management instructions. Additionally, the processor can execute a policy instruction to prevent execution of the at least one document management instruction.Type: ApplicationFiled: December 28, 2017Publication date: January 31, 2019Inventors: Shlomit Avrahami, Itai Gordon, Elik Katz, Yakir Keisar, Ilan D. Prager, Denis Voloshin
-
Publication number: 20190005034Abstract: Receiving contextual data including a facial movement associated with an active document. A response associated with the active document is detected and associated with the received contextual data. A contextual metadata tag is generated based on the detected response to the active document. A contextual keyword is created that corresponds to the contextual metadata tag. Search results received in response to the query are filtered based on the contextual metadata tag.Type: ApplicationFiled: March 2, 2018Publication date: January 3, 2019Inventors: Yoav Ben-Yair, Gil Fuchs, Itai Gordon, Ilan D. Prager
-
Publication number: 20190005032Abstract: Receiving contextual data including a facial movement associated with an active document. A response associated with the active document is detected and associated with the received contextual data. A contextual metadata tag is generated based on the detected response to the active document. A contextual keyword is created that corresponds to the contextual metadata tag. Search results received in response to the query are filtered based on the contextual metadata tag.Type: ApplicationFiled: June 29, 2017Publication date: January 3, 2019Inventors: Yoav Ben-Yair, Gil Fuchs, Itai Gordon, Ilan D. Prager
-
Patent number: 10169417Abstract: An example computer-implemented method includes receiving, via a processor, a plurality of structured query statements associated with an application and a database. The method includes detecting, via the processor, a logical relationship between at least two of the plurality of structured query statements based on a common source, a predetermined threshold time, a common transaction. The method includes generating, via the processor, a model based on the detected logical relationship. The method further includes receiving, via the processor, a request to modify the database. The method also further includes modifying, via the processor, the database in response to detecting that a predetermined threshold probability of application functionality impairment is not exceeded.Type: GrantFiled: June 1, 2018Date of Patent: January 1, 2019Assignee: International Business Machines CorporationInventors: Itai Gordon, Peter Hagelund, Ilan D. Prager
-
Patent number: 10169416Abstract: An example computer-implemented method includes receiving, via a processor, a plurality of structured query statements associated with an application and a database. The method includes detecting, via the processor, a logical relationship between at least two of the plurality of structured query statements based on a common source, a predetermined threshold time, a common transaction. The method includes generating, via the processor, a model based on the detected logical relationship. The method further includes receiving, via the processor, a request to modify the database. The method also further includes modifying, via the processor, the database in response to detecting that a predetermined threshold probability of application functionality impairment is not exceeded.Type: GrantFiled: June 1, 2018Date of Patent: January 1, 2019Assignee: International Business Machines CorporationInventors: Itai Gordon, Peter Hagelund, Ilan D. Prager
-
Patent number: 10169342Abstract: Receiving contextual data including a facial movement associated with an active document. A response associated with the active document is detected and associated with the received contextual data. A contextual metadata tag is generated based on the detected response to the active document. A contextual keyword is created that corresponds to the contextual metadata tag. Search results received in response to the query are filtered based on the contextual metadata tag.Type: GrantFiled: March 2, 2018Date of Patent: January 1, 2019Assignee: International Business Machines CorporationInventors: Yoav Ben-Yair, Gil Fuchs, Itai Gordon, Ilan D. Prager
-
Patent number: 10162973Abstract: Embodiments of the present invention disclose methods and systems which receive a user credential corresponding to a user, a task to be performed by the user, a security policy including a user role, and sensitive information. These methods and systems dynamically provision virtual machines including un-redacted information from received sensitive information. Furthermore, a set of tools process the redacted information, based on the user credential, the task to be performed, and the security policy.Type: GrantFiled: June 28, 2016Date of Patent: December 25, 2018Assignee: International Business Machines CorporationInventors: Itai Gordon, Peter Hagelund, Ilan D. Prager
-
Publication number: 20180330107Abstract: An example system includes a processor to monitor a data asset and associated access policies to be synchronized to detect a trigger. The processor is to also request and receive data lineage information on the monitored data asset in response to detecting the trigger. The processor is to further detect a source system and a target system based on the data lineage information. The processor is also to query an access policy of the source system and an access policy of the target system. The processor is to merge the access policy of the source system and the access policy of the target system based on a predetermined merger configuration to generate a merged access policy. The processor is to update a monitoring system based on the merged access policy.Type: ApplicationFiled: May 15, 2017Publication date: November 15, 2018Inventors: Itai Gordon, Shlomit Avrahami, Ilan D. Prager
-
Publication number: 20180330108Abstract: An example system includes a processor to monitor a data asset and associated access policies to be synchronized to detect a trigger. The processor is to also request and receive data lineage information on the monitored data asset in response to detecting the trigger. The processor is to further detect a source system and a target system based on the data lineage information. The processor is also to query an access policy of the source system and an access policy of the target system. The processor is to merge the access policy of the source system and the access policy of the target system based on a predetermined merger configuration to generate a merged access policy. The processor is to update a monitoring system based on the merged access policy.Type: ApplicationFiled: December 13, 2017Publication date: November 15, 2018Inventors: Itai Gordon, Shlomit Avrahami, Ilan D. Prager
-
Publication number: 20180260443Abstract: An example computer-implemented method includes receiving, via a processor, a plurality of structured query statements associated with an application and a database. The method includes detecting, via the processor, a logical relationship between at least two of the plurality of structured query statements based on a common source, a predetermined threshold time, a common transaction. The method includes generating, via the processor, a model based on the detected logical relationship. The method further includes receiving, via the processor, a request to modify the database. The method also further includes modifying, via the processor, the database in response to detecting that a predetermined threshold probability of application functionality impairment is not exceeded.Type: ApplicationFiled: June 1, 2018Publication date: September 13, 2018Inventors: Itai Gordon, Peter Hagelund, Ilan D. Prager
-
Publication number: 20180260444Abstract: An example computer-implemented method includes receiving, via a processor, a plurality of structured query statements associated with an application and a database. The method includes detecting, via the processor, a logical relationship between at least two of the plurality of structured query statements based on a common source, a predetermined threshold time, a common transaction. The method includes generating, via the processor, a model based on the detected logical relationship. The method further includes receiving, via the processor, a request to modify the database. The method also further includes modifying, via the processor, the database in response to detecting that a predetermined threshold probability of application functionality impairment is not exceeded.Type: ApplicationFiled: June 1, 2018Publication date: September 13, 2018Inventors: Itai Gordon, Peter Hagelund, Ilan D. Prager
-
Publication number: 20180240273Abstract: An example system includes a processor to receive data lineage including a plurality of levels, and a configuration. The processor is to also build a three dimensional (3D) virtual reality (VR) model including a first floor based on data lineage content corresponding to a first level of the plurality of levels and the configuration. The processor is to further display a view of the 3D VR model.Type: ApplicationFiled: February 23, 2017Publication date: August 23, 2018Inventors: Itai Gordon, Ilan D. Prager
-
Patent number: 10013458Abstract: An example computer-implemented method includes receiving, via a processor, a plurality of structured query statements associated with an application and a database. The method includes detecting, via the processor, a logical relationship between at least two of the plurality of structured query statements based on a common source, a predetermined threshold time, a common transaction. The method includes generating, via the processor, a model based on the detected logical relationship. The method further includes receiving, via the processor, a request to modify the database. The method also further includes modifying, via the processor, the database in response to detecting that a predetermined threshold probability of application functionality impairment is not exceeded.Type: GrantFiled: July 20, 2017Date of Patent: July 3, 2018Assignee: International Business Machines CorporationInventors: Itai Gordon, Peter Hagelund, Ilan D. Prager