Patents by Inventor Noam Ben-Yochanan
Noam Ben-Yochanan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11757899Abstract: Aspects of a privileged identity management system and method provide users with the ability to request elevated privileges to perform tasks on computing systems and software applications. The privileged identity management system and method also provides users with the ability to extend the elevated privileges to access privileged features or perform tasks using elevated privileges. The privileged identity management system and method utilize a different device that is readily available to the user in order to provide communications relating to the elevated privileges.Type: GrantFiled: January 19, 2021Date of Patent: September 12, 2023Assignee: Microsoft Technology Licensing, LLCInventors: Shimi Ezra, Natan Kfir, Noam Ben-Yochanan
-
Publication number: 20210144151Abstract: Aspects of a privileged identity management system and method provide users with the ability to request elevated privileges to perform tasks on computing systems and software applications. The privileged identity management system and method also provides users with the ability to extend the elevated privileges to access privileged features or perform tasks using elevated privileges. The privileged identity management system and method utilize a different device that is readily available to the user in order to provide communications relating to the elevated privileges.Type: ApplicationFiled: January 19, 2021Publication date: May 13, 2021Applicant: Microsoft Technology Licensing, LLCInventors: Shimi EZRA, Natan KFIR, Noam BEN-YOCHANAN
-
Patent number: 10931682Abstract: Aspects of a privileged identity management system and method provide users with the ability to request elevated privileges to perform tasks on computing systems and software applications. The privileged identity management system and method also provides users with the ability to extend the elevated privileges to access privileged features or perform tasks using elevated privileges. The privileged identity management system and method utilize a different device that is readily available to the user in order to provide communications relating to the elevated privileges.Type: GrantFiled: June 30, 2015Date of Patent: February 23, 2021Assignee: Microsoft Technology Licensing, LLCInventors: Shimi Ezra, Natan Kfir, Noam Ben-Yochanan
-
Patent number: 10677826Abstract: Device, system, and method of protecting utility meters and utility infrastructure; and particularly, for determining whether an electricity meter or associated electricity wires have been tampered with or have been physically switched or manipulated. An electricity meter includes a challenge transmitter to transmit a challenge message, via a wired electric cable, to a consumer-side responder that is located within a venue which receives electric power via the electricity meter. The electricity meter further includes a response receiver to receive a response message from the consumer-side responder via the wired electric cable, and to check the response message for correctness based on a shared secret that is known only to the electricity meter and to the consumer-side responder.Type: GrantFiled: June 12, 2018Date of Patent: June 9, 2020Assignee: ARM LIMITEDInventor: Noam Ben Yochanan
-
Publication number: 20190377015Abstract: Device, system, and method of protecting utility meters and utility infrastructure; and particularly, for determining whether an electricity meter or associated electricity wires have been tampered with or have been physically switched or manipulated. An electricity meter includes a challenge transmitter to transmit a challenge message, via a wired electric cable, to a consumer-side responder that is located within a venue which receives electric power via the electricity meter. The electricity meter further includes a response receiver to receive a response message from the consumer-side responder via the wired electric cable, and to check the response message for correctness based on a shared secret that is known only to the electricity meter and to the consumer-side responder.Type: ApplicationFiled: June 12, 2018Publication date: December 12, 2019Inventor: Noam Ben Yochanan
-
Publication number: 20170006044Abstract: Aspects of a privileged identity management system and method provide users with the ability to request elevated privileges to perform tasks on computing systems and software applications. The privileged identity management system and method also provides users with the ability to extend the elevated privileges to access privileged features or perform tasks using elevated privileges. The privileged identity management system and method utilize a different device that is readily available to the user in order to provide communications relating to the elevated privileges.Type: ApplicationFiled: June 30, 2015Publication date: January 5, 2017Applicant: MICROSOFT TECHNOLOGY LICENSING, LLC.Inventors: Shimi Ezra, Natan Kfir, Noam Ben-Yochanan
-
Patent number: 8954897Abstract: In a virtualization environment, a host machine on which a guest machine is operable is monitored to determine that it is healthy by being compliant with applicable policies (such as being up to date with the current security patches, running an anti-virus program, certified to run a guest machine, etc.) and free from malicious software or “malware” that could potentially disrupt or compromise the security of the guest machine. If the host machine is found to be non-compliant, then the guest machine is prevented from either booting up on the host machine or connecting to a network to ensure that the entire virtualization environment is compliant and that the guest machine, including its data and applications, etc., is protected against attacks that may be launched against it via malicious code that runs on the unhealthy host machine, or is isolated from the network until the non-compliancy is remediated.Type: GrantFiled: August 28, 2008Date of Patent: February 10, 2015Assignee: Microsoft CorporationInventors: John Neystadt, Noam Ben-Yochanan, Nir Nice
-
Patent number: 8910270Abstract: In some embodiments of the invention, techniques may make private identifiers for private network resources usable to establish connections to those private network resources from computing devices connected to an outside network. For example, when a computing device is connected to an outside network and attempting to contact a private network resource, DNS may be used to resolve a domain name for the private network resource to an IP address for an edge resource of the private network. Communications may be passed between the computing device and the edge resource according to protocols which embed the identifier originally used to identify the private network resource. The edge resource of the private network may analyze communications over the connection to determine this identifier, and use it to pass the communication to the desired private network resource.Type: GrantFiled: January 20, 2009Date of Patent: December 9, 2014Assignee: Microsoft CorporationInventors: Nir Nice, Amit Finkelstein, Dror Kremer, Noam Ben-Yochanan, Shyam Seshadri
-
Patent number: 8341720Abstract: Methods, systems, and computer-readable media are disclosed for applying information protection. A particular method includes receiving a data file at a gateway coupled to a network. The data file is to be sent to a destination device that is external to the network. The method also includes selectively applying information protection to the data file at the gateway prior to sending the data file to the destination device. The information protection is selectively applied based on information associated with the destination device, information associated with the data file, and information associated with a user of the destination device.Type: GrantFiled: January 9, 2009Date of Patent: December 25, 2012Assignee: Microsoft CorporationInventors: Noam Ben-Yochanan, John Neystadt, Nir Nice, Max Uritsky, Rushmi Malaviarachchi
-
Publication number: 20100186079Abstract: In some embodiments of the invention, techniques may make private identifiers for private network resources usable to establish connections to those private network resources from computing devices connected to an outside network. For example, when a computing device is connected to an outside network and attempting to contact a private network resource, DNS may be used to resolve a domain name for the private network resource to an IP address for an edge resource of the private network. Communications may be passed between the computing device and the edge resource according to protocols which embed the identifier originally used to identify the private network resource. The edge resource of the private network may analyze communications over the connection to determine this identifier, and use it to pass the communication to the desired private network resource.Type: ApplicationFiled: January 20, 2009Publication date: July 22, 2010Applicant: Microsoft CorporationInventors: Nir Nice, Amit Finkelstein, Dror Kremer, Noam Ben-Yochanan, Shyam Seshadri
-
Publication number: 20100180332Abstract: Methods, systems, and computer-readable media are disclosed for applying information protection. A particular method includes receiving a data file at a gateway coupled to a network. The data file is to be sent to a destination device that is external to the network. The method also includes selectively applying information protection to the data file at the gateway prior to sending the data file to the destination device. The information protection is selectively applied based on information associated with the destination device, information associated with the data file, and information associated with a user of the destination device.Type: ApplicationFiled: January 9, 2009Publication date: July 15, 2010Applicant: Microsoft CorporationInventors: Noam Ben-Yochanan, John Neystadt, Nir Nice, Max Uritsky, Rushmi Malaviarachchi
-
Publication number: 20100058432Abstract: In a virtualization environment, a host machine on which a guest machine is operable is monitored to determine that it is healthy by being compliant with applicable policies (such as being up to date with the current security patches, running an anti-virus program, certified to run a guest machine, etc.) and free from malicious software or “malware” that could potentially disrupt or compromise the security of the guest machine. If the host machine is found to be non-compliant, then the guest machine is prevented from either booting up on the host machine or connecting to a network to ensure that the entire virtualization environment is compliant and that the guest machine, including its data and applications, etc., is protected against attacks that may be launched against it via malicious code that runs on the unhealthy host machine, or is isolated from the network until the non-compliancy is remediated.Type: ApplicationFiled: August 28, 2008Publication date: March 4, 2010Applicant: Microsoft CorporationInventors: John Neystadt, Noam Ben-Yochanan, Nir Nice