Patents by Inventor Jehuda Shemer

Jehuda Shemer has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11960612
    Abstract: A system receives a request from a user to execute a command on an air-gapped computer system. If a role-based access control system permits the user to execute the command, the system prompts a number of approvers to determine whether to approve of the user executing the command. If a required number of approvers have approved of the user executing the command, the system encodes the command and incorporates the encoded command in an encoded message. The system uses a simplex communication output device to communicate the encoded message to a simplex communication input device for the air-gapped computer system. The system enables execution of the command by requesting the air-gapped computer system to execute the command, or by providing the user with an access token, received from the air-gapped computer system, which enables the user to physically access the air-gapped computer system and execute the command.
    Type: Grant
    Filed: February 9, 2022
    Date of Patent: April 16, 2024
    Assignee: Dell Products L.P.
    Inventors: Amihai Savir, Stav Sapir, Naor Radami, Jehuda Shemer
  • Publication number: 20240120659
    Abstract: A system can comprise a communications antenna comprising a material that is configured to change shape in response to being stimulated with an external stimulus. The system can comprise an antenna performance detector that is configured to detect a measure of performance of the communications antenna. The system can comprise a distortion correction component that is configured to receive an indication of the measure of performance, determine an amount of distortion of the shape of the communications antenna based on the indication of the measure of performance, based on the amount of distortion, determine an amount of the external stimulus with which to stimulate the communications antenna, and selectively apply the amount of the external stimulus to the communications antenna to change the shape of the communications antenna.
    Type: Application
    Filed: September 29, 2022
    Publication date: April 11, 2024
    Inventors: Ofir Ezrielev, Jehuda Shemer, Ronen Rabani, Avitan Gefen
  • Patent number: 11953994
    Abstract: One example method includes optimizing client-side deduplication. When backing up a client, a cadence and a change log resolution are determined. These values are evaluated alone or in combination with respect to various thresholds. Client-side deduplication is enabled or disabled based on whether any one or more of the thresholds are satisfied.
    Type: Grant
    Filed: June 1, 2023
    Date of Patent: April 9, 2024
    Assignee: EMC IP HOLDING COMPANY LLC
    Inventors: Jehuda Shemer, Maxim Drobachevsky, Zion Drori
  • Publication number: 20240111865
    Abstract: Data protection including malware response operations are disclosed. When a production system is attacked, the malware is allowed to run in a forensic environment in order to learn its operational characteristics. Once learned, a return malware can be placed in the data. The return malware is transmitted to a malware host system by the malware itself and executed.
    Type: Application
    Filed: October 4, 2022
    Publication date: April 4, 2024
    Inventors: Ofir Ezrielev, Jehuda Shemer, Amihai Savir
  • Publication number: 20240111631
    Abstract: One example method includes assigning, at a production site, a priority to a portion of a dataset to be backed up, checking to determine if the priority meets or exceeds a threshold priority; and, when the priority meets or exceeds the threshold priority, and when an air gap between the production site and a storage vault is closed, backing up, by way of the closed air gap, the portion of the dataset to the storage vault.
    Type: Application
    Filed: October 4, 2022
    Publication date: April 4, 2024
    Inventors: Ofir Ezrielev, Jehuda Shemer, Amihai Savir
  • Publication number: 20240111635
    Abstract: One method includes listening, by a storage vault, to a port that is specific to a particular data structure in the storage vault, determining that an air gap between the storage vault and an entity external to the storage vault, is closed, such that communication between the storage vault and the external entity, by way of the port, is enabled, signaling, by the storage vault to the external entity, that the air gap is closed, and receiving, at the storage vault by way of the port, data from the external entity.
    Type: Application
    Filed: October 4, 2022
    Publication date: April 4, 2024
    Inventors: Ofir Ezrielev, Jehuda Shemer, Amihai Savir
  • Publication number: 20240111867
    Abstract: Automated research experimentation on malware is disclosed. When malware is detected, an infected backup is generated. The infected backup is deployed to multiple working environments as recovered production systems, starting from the same state. Different scenarios are performed on the recovered production systems to learn the operational characteristics of the malware operating in the recovered production systems. The insights may be used to protect against the malware and/or other malware.
    Type: Application
    Filed: October 4, 2022
    Publication date: April 4, 2024
    Inventors: Ofir Ezrielev, Jehuda Shemer, Amihai Savir
  • Publication number: 20240111866
    Abstract: Data protection including malware response operations are disclosed. When a production system is attacked, the malware is allowed to run in a forensic environment in order to learn its operational characteristics. The forensic environment includes a working scenario that may be prepared in advance with false data that allows the malware to communicate with a malware host system. Once the operational characteristics are learned, a return malware can be placed in the data. The return malware is transmitted to a malware host system by the malware itself and executed.
    Type: Application
    Filed: October 4, 2022
    Publication date: April 4, 2024
    Inventors: Ofir Ezrielev, Jehuda Shemer, Amihai Savir
  • Publication number: 20240103834
    Abstract: A system can determine complexity data representative of a complexity of changes to computer code that is executable to operate at least one microservice that is part of a group of microservices, wherein a portion of the changes corresponds to a library on which the computer code depends. The system can generate a progressive deployment plan for the at least one microservice based on the complexity of changes. The system can progressively direct traffic to the at least one microservice based on the progressive deployment plan.
    Type: Application
    Filed: September 26, 2022
    Publication date: March 28, 2024
    Inventors: Jehuda Shemer, Boris Shpilyuck, Igor Dubrovsky
  • Publication number: 20240103833
    Abstract: A system can determine complexity data representative of a complexity of changes to computer code that is executable to operate at least one updated microservice that is part of a group of microservices, wherein at least one current microservice is deployed, and wherein the at least one updated microservice corresponds to an update of the at least one current microservice. The system can determine a rate at which invocations of the at least one current microservice are made. The system can determine a threshold number of calls to be processed to proceed from a first stage of a progressive deployment plan to a second stage of the progressive deployment plan based on the complexity data and the rate. The system can progressively direct traffic to the at least one updated microservice based on the progressive deployment plan.
    Type: Application
    Filed: September 26, 2022
    Publication date: March 28, 2024
    Inventors: Jehuda Shemer, Boris Shpilyuck, Igor Dubrovsky
  • Publication number: 20240103831
    Abstract: A system can identify that computer code that is executable to operate at least one microservice that is part of a group of microservices has been modified. The system can determine complexity data representative of a complexity of changes to the computer code. The system can determine conditions under which the changes to the computer code are invoked based on at least one of performing a static analysis of the computer code or instrumenting the computer code. The system can generate a progressive deployment plan for the at least one microservice based on the complexity of changes. The system can progressively direct traffic to the at least one microservice based on the progressive deployment plan, and the conditions under which the changes to the computer code are invoked.
    Type: Application
    Filed: September 26, 2022
    Publication date: March 28, 2024
    Inventors: Jehuda Shemer, Boris Shpilyuck, Igor Dubrovsky
  • Patent number: 11934283
    Abstract: Data protection operations including replication operations are disclosed. Virtual machines, applications, and/or application data are replicated according to at least one strategy. The replication strategy can improve performance of the recovery operation.
    Type: Grant
    Filed: May 19, 2020
    Date of Patent: March 19, 2024
    Assignee: EMC IP HOLDING COMPANY LLC
    Inventors: Bing Liu, Jehuda Shemer, Kfir Wolfson, Jawad Said
  • Patent number: 11928085
    Abstract: One example method includes performing various operations while a stream of IOs is being applied to a source dataset and replicated to a target dataset, and the operations include receiving a replicated IO that was previously applied to a source dataset Merkle tree, applying the replicated IO to a target dataset Merkle tree by entering an updated hash value in the target dataset Merkle tree, and applying a timestamp to the target dataset Merkle tree.
    Type: Grant
    Filed: December 13, 2019
    Date of Patent: March 12, 2024
    Assignee: EMC IP HOLDING COMPANY LLC
    Inventors: Jehuda Shemer, Alex Solan
  • Patent number: 11921589
    Abstract: Any point in time backups for distributed consistency is disclosed. IOs from a consistency group are received by multiple aggregators and stored in corresponding journals. In response to a bookmark, the multiple journals are synthesized to create a do stream or to add the multiple journals to the do stream. A full synchronization operation can be performed simultaneously with replication operations.
    Type: Grant
    Filed: June 23, 2020
    Date of Patent: March 5, 2024
    Assignee: EMC IP HOLDING COMPANY LLC
    Inventors: Jehuda Shemer, Valerie Lotosh, Saar Cohen, Erez Sharvit
  • Patent number: 11922047
    Abstract: One example method includes ingesting data to a data protection system, separating, by the data protection system, the ingested data into groups according to Recovery Point Objective (RPO) such that each group is associated with a different respective RPO, storing the groups in respective storage pools, and each of the storage pools is associated with a respective one of the RPOs, and performing a respective garbage collection (GC) process at each storage pool.
    Type: Grant
    Filed: September 16, 2021
    Date of Patent: March 5, 2024
    Assignee: EMC IP Holding Company LLC
    Inventors: Anand Rudrabhatla, Jehuda Shemer, Abhinav Duggal
  • Patent number: 11921881
    Abstract: Systems and methods for protecting data including user data. A recommendation service is disclosed that receives verifiable claims from a user. A verifiable output is generated from the verifiable claims. The verifiable output can be provided to service providers and allows the service providers to personalize their services to the user. The user's data is protected and exposure of the user's data is controlled by the user.
    Type: Grant
    Filed: August 1, 2019
    Date of Patent: March 5, 2024
    Assignee: EMC IP HOLDING COMPANY LLC
    Inventors: Amos Zamir, Kfir Wolfson, Jehuda Shemer
  • Patent number: 11921747
    Abstract: Replication operations of replicating data from a production site to a replica site. The replication is performed using independent Merkle trees. The Merkle trees are updated asynchronously using Merkle trees that have been augmented with a time-based value. The synchronization is verified by comprising root hashes of the independent Merkle trees at certain points in time. The replication and Merkle trees are self-healing and trigger a resynchronization when a discrepancy is discovered.
    Type: Grant
    Filed: June 23, 2022
    Date of Patent: March 5, 2024
    Assignee: EMC IP HOLDING COMPANY LLC
    Inventors: Jehuda Shemer, Alex Solan
  • Patent number: 11921585
    Abstract: Run-time selection of optimal commands for accessing serial access resources is described. A system receives a request to access a serial access resource. The system identifies a first section to access in the serial access resource and a second section to access in the serial access resource which is separated from the first section to access by an intermediate section in the serial access resource. The system generates combinations of access commands associated with accessing the first and the second sections to access. The system estimates target values, based on locations of the first and the second sections to access in the serial access resource, corresponding to the combinations of access commands. The system selects a combination of access commands which corresponds to an optimal target value. The system enables performance of the selected combination of access commands on the first and the second sections in the serial access resource.
    Type: Grant
    Filed: February 23, 2022
    Date of Patent: March 5, 2024
    Assignee: Dell Products L.P.
    Inventors: Jehuda Shemer, Zion Drori, Maxim Drobachevsky
  • Patent number: 11914866
    Abstract: One example method includes performing delta operations to protect data. During a delta operation, a primary map and a secondary map are processed using bit logic. The bit logic determines how to handle data stored at a location on the volume associated with an entry in the primary map and included in the current delta operation when a new write for the same location is received as the corresponding entry in the primary map is processed.
    Type: Grant
    Filed: October 27, 2021
    Date of Patent: February 27, 2024
    Assignee: EMC IP HOLDING COMPANY LLC
    Inventors: Jehuda Shemer, Ravi Vijayakumar Chitloor
  • Patent number: 11917724
    Abstract: One example method includes receiving input concerning a mobile IoT device, and the input includes information about a location of the mobile IoT device, information about whether the mobile IoT device is moving, and, when the mobile IoT device is moving, information about the range, speed, and bearing of the mobile IoT device. Next, the method includes generating a predicted location of the mobile IoT device based on the inputs received, using the predicted location of the mobile IoT device and a map of nodes in an environment where the mobile IoT device is located to make a migration decision concerning an application used by the mobile IoT device, and migrating the application from a present location to a node expected to be accessible by the mobile IoT device when the mobile IoT device reaches the predicted location, and the node and present location are physically separated by a distance.
    Type: Grant
    Filed: June 26, 2019
    Date of Patent: February 27, 2024
    Assignee: EMC IP HOLDING COMPANY LLC
    Inventors: Jehuda Shemer, Kfir Wolfson, Assaf Natanzon