Patents by Inventor Itai Gordon

Itai Gordon has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11954231
    Abstract: An embodiment for recursively adapting a sensitive content masking technique is provided. The embodiment may include receiving a request from a primary user to share an original document. The embodiment may also include receiving an identity of a secondary user who needs access to a masked version of the original document. The embodiment may further include scanning the original document for sensitive information and identifying sensitive information in the original document. The identified sensitive information may be displayed to the primary user. The embodiment may also include generating a masked value for each piece of identified sensitive information. The embodiment may further include suggesting one or more groups of secondary users if there are additional secondary users. The embodiment may also include presenting the masked version of the original document to the secondary user. The embodiment may further include indexing the masked version of the original document.
    Type: Grant
    Filed: January 19, 2021
    Date of Patent: April 9, 2024
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Itai Gordon, Shlomit Avrahami, Rotem Brosh, Shiran Yosef
  • Patent number: 11949967
    Abstract: In an approach for enhancing an experience of a user listening to and/or watching an audio-visual content by modifying future audio and/or video frames of the audio-visual content, a processor captures a set of sensor data from an IoT device worn by the first user. A processor analyzes the set of sensor data to generate one or more connotations by converting the emotion using an emotional vector analytics technique and a supervised machine learning technique. A processor scores the one or more connotations on a basis of similarity between the emotion exhibited by the first user and an emotion expected to be provoked by a second user. A processor determines whether a score of the one or more connotations exceeds a pre-configured threshold level. Responsive to determining the score does not exceed the pre-configured threshold level, a processor generates a suggestion for the producer of the audio-visual content.
    Type: Grant
    Filed: September 28, 2022
    Date of Patent: April 2, 2024
    Assignee: International Business Machines Corporation
    Inventors: Dhruv Khurana, Kristin E. McNeil, Itai Gordon, Radha Mohan De
  • Publication number: 20240107130
    Abstract: In an approach for enhancing an experience of a user listening to and/or watching an audio-visual content by modifying future audio and/or video frames of the audio-visual content, a processor captures a set of sensor data from an IoT device worn by the first user. A processor analyzes the set of sensor data to generate one or more connotations by converting the emotion using an emotional vector analytics technique and a supervised machine learning technique. A processor scores the one or more connotations on a basis of similarity between the emotion exhibited by the first user and an emotion expected to be provoked by a second user. A processor determines whether a score of the one or more connotations exceeds a pre-configured threshold level. Responsive to determining the score does not exceed the pre-configured threshold level, a processor generates a suggestion for the producer of the audio-visual content.
    Type: Application
    Filed: September 28, 2022
    Publication date: March 28, 2024
    Inventors: Dhruv Khurana, Kristin E. McNeil, ITAI GORDON, Radha Mohan De
  • Publication number: 20240095391
    Abstract: A computer-implemented method, a computer system and a computer program product select enterprise assets for migration to open cloud storage. The method includes identifying an asset on a server. The method also includes determining whether the asset contains sensitive information. The method further includes obtaining a migration cost for the asset based on asset attributes. In addition, the method includes calculating a migration score for the asset based on whether the asset contains the sensitive information, access rules for the asset, an asset handling history, and the migration cost. Lastly, the method includes selecting the asset for migration to open cloud storage when the migration score of the asset is above a threshold.
    Type: Application
    Filed: September 21, 2022
    Publication date: March 21, 2024
    Inventors: Itai GORDON, Shlomit Avrahami Tomer, Ofer Haim, Miriam NIZRI
  • Patent number: 11750652
    Abstract: A method, computer program product and system for generating false data for suspicious users. A suspicious user is identified. Actions of the user are then tracked. The user attempting to access sensitive information is detected. Relevant false sensitive information corresponding to the sensitive information is then detected. The relevant false sensitive information is then mapped to the sensitive information. The relevant false sensitive information is provided to the suspicious user. In response to user input, at least one command is executed, where the at least one command includes the relevant false sensitive information and not the sensitive information.
    Type: Grant
    Filed: December 20, 2020
    Date of Patent: September 5, 2023
    Assignee: International Business Machines Corporation
    Inventors: Shlomit Avrahami, Yoav Ben-Yair, Gil Fuchs, Itai Gordon, Ilan D. Prager
  • Publication number: 20220229934
    Abstract: An embodiment for recursively adapting a sensitive content masking technique is provided. The embodiment may include receiving a request from a primary user to share an original document. The embodiment may also include receiving an identity of a secondary user who needs access to a masked version of the original document. The embodiment may further include scanning the original document for sensitive information and identifying sensitive information in the original document. The identified sensitive information may be displayed to the primary user. The embodiment may also include generating a masked value for each piece of identified sensitive information. The embodiment may further include suggesting one or more groups of secondary users if there are additional secondary users. The embodiment may also include presenting the masked version of the original document to the secondary user. The embodiment may further include indexing the masked version of the original document.
    Type: Application
    Filed: January 19, 2021
    Publication date: July 21, 2022
    Inventors: Itai Gordon, Shlomit Avrahami, Rotem Brosh, Shiran Yosef
  • Patent number: 11308280
    Abstract: The capture and search of application properties for applications installed on virtual machines, includes obtaining a plurality of logs on a plurality of virtual machine images coupled to a network. For each given virtual machine image of the plurality of virtual machine images, the method includes: obtaining one or more logs on the given virtual machine image of the plurality of virtual machine images; analyzing each given log of the one or more logs to identify one or more concepts related to a set of application properties for one or more applications installed on the given virtual machine image; associating the one or more concepts and the set of application properties with an identity of the given virtual machine image; and storing the association of the one or more concepts and the set of application properties with the identity of the given virtual machine image in a virtual machine catalogue.
    Type: Grant
    Filed: January 21, 2020
    Date of Patent: April 19, 2022
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Itai Gordon, Kristin E. McNeil, Radha Mohan De, Miriam Nizri
  • Publication number: 20220101985
    Abstract: Embodiments herein disclose computer-implemented methods, computer program products and computer systems for efficiently scheduling referral appointments. The computer-implemented method may include receiving text data corresponding to a referral request; determining patient data based on the text data comprising patient demographic data, patient complaint data, patient medication data, and patient history data; determining doctor data based on the text data comprising sending doctor data and receiving doctor; determining a patient treatment time based on the patient data and the receiving doctor data; sending an appointment request including the patient treatment time to a receiving doctor computing device; and receiving an appointment confirmation including the patient treatment time, wherein the appointment confirmation indicates acceptance of the appointment request by the receiving doctor.
    Type: Application
    Filed: September 30, 2020
    Publication date: March 31, 2022
    Inventors: ITAI GORDON, Kristin E. McNeil, Shlomit Avrahami, ROTEM BROSH, SHIRAN YOSEF
  • Patent number: 11188667
    Abstract: A method, computer program product and system for preventing unauthorized access of confidential information. The transmission of data from a first user to a second user is detected. An authorization level corresponding to the second user is then determined. Furthermore, a probability that the authorization level corresponding to the second user and the data is accurate is generated. Additionally, a determination is made that the data includes sensitive information that the second user is not authorized to access based on the authorization level. Moreover, the data can be modified based on the probability, where the data is to be redacted if the probability is within a range of a threshold value or the data is to be blocked from transmission if the probability is above the range.
    Type: Grant
    Filed: August 29, 2019
    Date of Patent: November 30, 2021
    Assignee: International Business Machines Corporation
    Inventors: Yoav Ben-Yair, Gil Fuchs, Itai Gordon, Ilan D. Prager
  • Patent number: 11099840
    Abstract: Client side code of a web application can be received by a mobile device. The mobile device can automatically inject mobile aware code into the client side code of the web application. The mobile aware code can modify the client side code of the web application for use by the mobile device, wherein the client side code of the web application is not modified for use by the mobile device prior to the mobile aware code being injected. The client side code of the web application modified by the mobile aware code can be executed by the mobile device.
    Type: Grant
    Filed: May 28, 2015
    Date of Patent: August 24, 2021
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Yoav Ben-Yair, Gil Fuchs, Itai Gordon, Amitai Madar, Josemina Marcella Magdalen, Oren Paikowsky
  • Patent number: 11099839
    Abstract: Client side code of a web application can be received by a mobile device. The mobile device can automatically inject mobile aware code into the client side code of the web application. The mobile aware code can modify the client side code of the web application for use by the mobile device, wherein the client side code of the web application is not modified for use by the mobile device prior to the mobile aware code being injected. The client side code of the web application modified by the mobile aware code can be executed by the mobile device.
    Type: Grant
    Filed: August 6, 2014
    Date of Patent: August 24, 2021
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Yoav Ben-Yair, Gil Fuchs, Itai Gordon, Amitai Madar, Josemina Marcella Magdalen, Oren Paikowsky
  • Publication number: 20210224478
    Abstract: The capture and search of application properties for applications installed on virtual machines, includes obtaining a plurality of logs on a plurality of virtual machine images coupled to a network. For each given virtual machine image of the plurality of virtual machine images, the method includes: obtaining one or more logs on the given virtual machine image of the plurality of virtual machine images; analyzing each given log of the one or more logs to identify one or more concepts related to a set of application properties for one or more applications installed on the given virtual machine image; associating the one or more concepts and the set of application properties with an identity of the given virtual machine image; and storing the association of the one or more concepts and the set of application properties with the identity of the given virtual machine image in a virtual machine catalogue.
    Type: Application
    Filed: January 21, 2020
    Publication date: July 22, 2021
    Inventors: Itai GORDON, Kristin E. MCNEIL, Radha Mohan DE, Miriam NIZRI
  • Patent number: 11062004
    Abstract: A computer-implemented method is provided. The method may include determining a behavioral pattern of a user based on historical data access events and historical data access conditions corresponding to the historical data access events, wherein the data access events are associated with a computer enterprise system. A data access request from the user with respect to a secure resource may be received from a computing node connected to the computer enterprise system. A behavioral state of the user may be determined with respect to the data access request and data access conditions corresponding to the data access request. A discrepancy between the behavioral pattern and the behavioral state of the user may be detected. A security risk level may be determined based on the discrepancy. In response to determining that the security risk level exceeds a predetermined threshold, a security action may be performed with respect to the secure resource.
    Type: Grant
    Filed: April 30, 2018
    Date of Patent: July 13, 2021
    Assignee: International Business Machines Corporation
    Inventors: Itai Gordon, Gil Fuchs, Ilan D. Prager, Yoav Ben-Yair, Shlomit Avrahami
  • Patent number: 11057407
    Abstract: Detecting malware attacks is described herein. A computer-implemented method may include receiving, via a processor, events from a plurality of activity monitors. The method also include extracting, via the processor, a plurality of behavioral features from the received events. The method may further include detecting, via the processor, a malware attack based on the extracted behavioral features using a malware identification model trained on private data and public data using a machine learning technique, wherein the private data includes private enterprise attack findings. The method may also include executing, via the processor, an ad hoc protection improvement based on the detected malware attack.
    Type: Grant
    Filed: November 25, 2019
    Date of Patent: July 6, 2021
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Shlomit Avrahami, Tali Finelt, Itai Gordon, Yakir Keisar, Ilan Prager, Alexander Pyasik, Oded Sofer, Or Bar-Yaacov, Yifat Yulevich
  • Publication number: 20210182885
    Abstract: In an approach for promoting collaborative marketing, a processor registers a user for a social IoT platform. A processor registers an IoT device associated with the registered user into the social IoT platform. A processor identifies social contacts of the registered user in the social IoT platform. A processor detects a plurality of IoT devices which are associated with the social contacts of the registered user. A processor monitors the IoT device associated with the registered user and the plurality of IoT devices associated with the social contacts of the registered user. A processor analyzes social IoT feed among the IoT device associated with the registered user and the plurality of IoT devices associated with the social contacts of the registered user. A processor recognizes a collaborative need for a plurality of registered users. A processor recommends a collaborative marketing plan based on the collaborative need.
    Type: Application
    Filed: December 11, 2019
    Publication date: June 17, 2021
    Inventors: Kristin E. McNeil, Itai Gordon, Miriam Nizri, Radha Mohan De
  • Patent number: 11030805
    Abstract: Data lineage including a plurality of levels can be received. A configuration also can be received. A three dimensional (3D) virtual reality (VR) model can be built, the 3D VR model including a plurality of floors based on data lineage content corresponding to the plurality of levels and the configuration. The 3D VR model can depict, on at least a first of the plurality of floors, a plurality of rooms of a virtual building representing data elements and hallways of the building representing data flows between data elements. A view of the 3D VR model can be displayed on a display device, wherein the 3D VR model is configured for a user to navigate the plurality of the rooms and hallways of the virtual building to determine lineage of data.
    Type: Grant
    Filed: September 4, 2019
    Date of Patent: June 8, 2021
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Itai Gordon, Ilan D. Prager
  • Publication number: 20210112096
    Abstract: A method, computer program product and system for generating false data for suspicious users. A suspicious user is identified. Actions of the user are then tracked. The user attempting to access sensitive information is detected. Relevant false sensitive information corresponding to the sensitive information is then detected. The relevant false sensitive information is then mapped to the sensitive information. The relevant false sensitive information is provided to the suspicious user. In response to user input, at least one command is executed, where the at least one command includes the relevant false sensitive information and not the sensitive information.
    Type: Application
    Filed: December 20, 2020
    Publication date: April 15, 2021
    Inventors: Shlomit Avrahami, Yoav Ben-Yair, Gil Fuchs, Itai Gordon, Ilan D. Prager
  • Patent number: 10958687
    Abstract: A method, computer program product and system for generating false data for suspicious users. A suspicious user is identified. Actions of the user are then tracked. The user attempting to access sensitive information is detected. Relevant false sensitive information corresponding to the sensitive information is then detected. The relevant false sensitive information is then mapped to the sensitive information. The relevant false sensitive information is provided to the suspicious user. In response to user input, at least one command is executed, where the at least one command includes the relevant false sensitive information and not the sensitive information.
    Type: Grant
    Filed: January 24, 2020
    Date of Patent: March 23, 2021
    Assignee: International Business Machines Corporation
    Inventors: Shlomit Avrahami, Yoav Ben-Yair, Gil Fuchs, Itai Gordon, Ilan D. Prager
  • Patent number: 10929478
    Abstract: Receiving contextual data including a facial movement associated with an active document. A response associated with the active document is detected and associated with the received contextual data. A contextual metadata tag is generated based on the detected response to the active document. A contextual keyword is created that corresponds to the contextual metadata tag. Search results received in response to the query are filtered based on the contextual metadata tag.
    Type: Grant
    Filed: June 29, 2017
    Date of Patent: February 23, 2021
    Assignee: International Business Machines Corporation
    Inventors: Yoav Ben-Yair, Gil Fuchs, Itai Gordon, Ilan D. Prager
  • Patent number: 10891391
    Abstract: Disclosed embodiments provide techniques for accessing a document from a cloud storage system and controlling the display of sensitive data within the document based on user permissions. One or more restricted information segments are identified within a document to be stored on the cloud storage system. Restricted information segments can include anything within an electronic file for which it is desired to provide multiple levels of access. In some embodiments, the restricted information segments are automatically identified via computer-implemented natural language processing (NLP) techniques. For each restricted information segment, one or more alternative data sequences are generated. The alternative data sequences are encrypted using various keys residing on a client device associated with a user. The keys can be used to decrypt data stored within a multiple-value encrypted field structure.
    Type: Grant
    Filed: August 29, 2018
    Date of Patent: January 12, 2021
    Assignee: International Business Machines Corporation
    Inventors: Itai Gordon, Miriam Nizri, Ilan D. Prager