Patents by Inventor Oded Dubovsky

Oded Dubovsky has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9930003
    Abstract: Systems and methods are provided for location-based Domain Name System (DNS) service discovery using a central DNS server in which network resources are aggregated by geographic location (e.g., subnets) and defined using DNS service discovery records that are mapped to corresponding geographic locations.
    Type: Grant
    Filed: August 19, 2013
    Date of Patent: March 27, 2018
    Assignee: International Business Machines Corporation
    Inventors: Yoni Amishav, Eric J. Barkie, Oded Dubovsky, Benjamin L. Fletcher
  • Patent number: 9917905
    Abstract: Systems and methods are provided for location-based Domain Name System (DNS) service discovery using a central DNS server in which network resources are aggregated by geographic location (e.g., subnets) and defined using DNS service discovery records that are mapped to corresponding geographic locations.
    Type: Grant
    Filed: May 13, 2013
    Date of Patent: March 13, 2018
    Assignee: International Business Machines Corporation
    Inventors: Yoni Amishav, Eric J. Barkie, Oded Dubovsky, Benjamin L. Fletcher
  • Publication number: 20170155619
    Abstract: Systems and methods are provided for location-based Domain Name System (DNS) service discovery using a central DNS server in which network resources are aggregated by geographic location (e.g., subnets) and defined using DNS service discovery records that are mapped to corresponding geographic locations.
    Type: Application
    Filed: February 14, 2017
    Publication date: June 1, 2017
    Inventors: Yoni Amishav, Eric J. Barkie, Oded Dubovsky, Benjamin L. Fletcher
  • Publication number: 20160313708
    Abstract: A method enhances an emergency reporting system for controlling equipment. A message receiver receives an electronic message from a person. The electronic message is a report regarding an emergency event. One or more processors identify a profile of the person who sent the electronic message, and determine a bias of the person regarding the emergency event based on the person's profile. One or more processors amend, based on the bias of the person, a content of the electronic message to create a modified electronic message regarding the emergency event. The modified electronic message is consolidated with other modified electronic messages into a bias-corrected report about the emergency event. One or more processors then automatically adjust equipment based on the bias-corrected report about the emergency event.
    Type: Application
    Filed: April 21, 2015
    Publication date: October 27, 2016
    Inventors: Aaron K. Baughman, Oded Dubovsky, James R. Kozloski, Boaz Mizrachi, Clifford A. Pickover
  • Publication number: 20140337530
    Abstract: Systems and methods are provided for location-based Domain Name System (DNS) service discovery using a central DNS server in which network resources are aggregated by geographic location (e.g., subnets) and defined using DNS service discovery records that are mapped to corresponding geographic locations.
    Type: Application
    Filed: May 13, 2013
    Publication date: November 13, 2014
    Inventors: Yoni Amishav, Eric J. Barkie, Oded Dubovsky, Benjamin L. Fletcher
  • Publication number: 20140337526
    Abstract: Systems and methods are provided for location-based Domain Name System (DNS) service discovery using a central DNS server in which network resources are aggregated by geographic location (e.g., subnets) and defined using DNS service discovery records that are mapped to corresponding geographic locations.
    Type: Application
    Filed: August 19, 2013
    Publication date: November 13, 2014
    Applicant: International Business Machines Corporation
    Inventors: Yoni Amishav, Eric J. Barkie, Oded Dubovsky, Benjamin L. Fletcher
  • Patent number: 8752164
    Abstract: The present invention prevents illegitimate access to a user computing machine. A method in accordance with an embodiment includes: setting an authentication routine in the user computing machine; generating a virtual keyboard on the user computing machine; entering a user identification through the virtual keyboard, the user identification being entered according to a virtual keyboard form factor; comparing the entered user identification with a secure user identification previously stored in the user computing machine; and validating the user access to the user computing machine if a match occurs, otherwise denying access.
    Type: Grant
    Filed: May 25, 2008
    Date of Patent: June 10, 2014
    Assignee: International Business Machines Corporation
    Inventors: Oded Dubovsky, Itzhack Goldberg, Ido Levy, Ilan Shimony, Grant D. Williamson
  • Patent number: 7877791
    Abstract: System, method and program for managing a production server. An authentication server sends to the production server via a network a group password for a GroupID to access a file in the production server. A user at a workstation sends via a network to the authentication server an individual UserID and corresponding individual password for the user and a request for the group password for the GroupID to access a file in the production server protected by the group password. In response, the authentication server authenticates the individual UserID with the corresponding individual password and returns to the workstation the group password for the GroupID. After receiving the group password from the authentication server, the user at the workstation sends via a network to the production server the group password and GroupID and a request to access the file in the production server protected by the group password.
    Type: Grant
    Filed: June 19, 2007
    Date of Patent: January 25, 2011
    Assignee: International Business Machines Corporation
    Inventors: Rhonda L. Childress, Oded Dubovsky, Itzhack Goldberg, Ido Levy, Stephen James Watt
  • Patent number: 7774421
    Abstract: A computer-implemented method for mitigating address book weaknesses that permit sending of e-mail to wrong addresses includes determining prior to sending an e-mail message whether one of a plurality of recipients of an e-mail message should receive the e-mail message, the determining prior to sending the e-mail message including analyzing history information of a sender of the e-mail message to determine whether the one of the plurality of recipients is ordinarily connected with the plurality of recipients and whether the one of the plurality of recipients is ordinarily connected with a subject of the e-mail message, the analyzing history information including comparing the plurality of recipients to a database indicative of recipients that received e-mail from the sender, and, responsive to the history information, determining whether the one of the plurality of recipients is one of a new recipient and an ordinary recipient, and presenting the determining to the sender.
    Type: Grant
    Filed: June 30, 2008
    Date of Patent: August 10, 2010
    Assignee: International Business Machines Corporation
    Inventors: Oded Dubovsky, Itzhack Goldberg, Boaz Mizrachi
  • Publication number: 20090178135
    Abstract: The present invention prevents illegitimate access to a user computing machine. A method in accordance with an embodiment includes: setting an authentication routine in the user computing machine; generating a virtual keyboard on the user computing machine; entering a user identification through the virtual keyboard, the user identification being entered according to a virtual keyboard form factor; comparing the entered user identification with a secure user identification previously stored in the user computing machine; and validating the user access to the user computing machine if a match occurs, otherwise denying access.
    Type: Application
    Filed: May 25, 2008
    Publication date: July 9, 2009
    Inventors: Oded Dubovsky, Itzhack Goldberg, Ido Levy, Ilan Shimony, Grant D. Williamson
  • Publication number: 20080320574
    Abstract: System, method and program for managing a production server. An authentication server sends to the production server via a network a group password for a GroupID to access a file in the production server. A user at a workstation sends via a network to the authentication server an individual UserID and corresponding individual password for the user and a request for the group password for the GroupID to access a file in the production server protected by the group password. In response, the authentication server authenticates the individual UserID with the corresponding individual password and returns to the workstation the group password for the GroupID. After receiving the group password from the authentication server, the user at the workstation sends via a network to the production server the group password and GroupID and a request to access the file in the production server protected by the group password.
    Type: Application
    Filed: June 19, 2007
    Publication date: December 25, 2008
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Rhonda L. Childress, Oded Dubovsky, Itzhack Goldberg, Ido Levy, Stephen James Watt
  • Publication number: 20080250114
    Abstract: A computer-implemented method for mitigating address book weaknesses that permit sending of e-mail to wrong addresses includes determining prior to sending an e-mail message whether one of a plurality of recipients of an e-mail message should receive the e-mail message, the determining prior to sending the e-mail message including analyzing history information of a sender of the e-mail message to determine whether the one of the plurality of recipients is ordinarily connected with the plurality of recipients and whether the one of the plurality of recipients is ordinarily connected with a subject of the e-mail message, the analyzing history information including comparing the plurality of recipients to a database indicative of recipients that received e-mail from the sender, and, responsive to the history information, determining whether the one of the plurality of recipients is one of a new recipient and an ordinary recipient, and presenting the determining to the sender.
    Type: Application
    Filed: June 30, 2008
    Publication date: October 9, 2008
    Applicant: International Business Machines Corporation
    Inventors: Oded DUBOVSKY, Itzhack GOLDBERG, Boaz MIZRACHI
  • Publication number: 20080235302
    Abstract: The invention is directed to the transparent allocation of a unique per user /tmp file system. A method in accordance with an embodiment of the present invention includes: manipulating an operating system to provide each user with a private temporary file system; and constraining a process of the user to the user's private temporary file system.
    Type: Application
    Filed: March 19, 2007
    Publication date: September 25, 2008
    Inventors: Rhonda L. Childress, Oded Dubovsky, Itzhack Goldberg, Ido Levy, Stephen J. Watt
  • Publication number: 20080201435
    Abstract: A method and system for ordering addressees in address fields (141-143) is provided. The method includes entering a plurality of addresses in an address field (141-143) of a message; selecting an ordering policy (134); and ordering (132) the addresses in the address field (141-143) in accordance with the selected ordering policy. The ordering policy (134) may include general ordering policies such as alphabetical ordering, or flattering ordering in which the recipient's address is at the head of the address field. Weightings for individual addressees may be defined. Weightings may be absolute and/or relative to other addressees. An ordering policy (134) may be selected for each of the address fields “To:”, “Cc:”, and “Bcc:”.
    Type: Application
    Filed: February 20, 2007
    Publication date: August 21, 2008
    Inventors: Oded Dubovsky, Itzhack Goldberg, Ido Levy, Maya Shiran
  • Publication number: 20080126787
    Abstract: Managing default values. A determination is automatically made that the first program is operating in the batch mode in which user interaction is not intended to affirm or change default values. In response, first current default values for input to the first program are determined, and a determination is made whether a user previously entered or affirmed the first current default values in an interactive mode. If so, the first program is allowed to proceed with operation using the first current default values. If not, the first program is not allowed to proceed with operation using the first current default values. A determination is automatically made that the second program is operating in the interactive mode in which user interaction is intended to affirm or change default values.
    Type: Application
    Filed: June 5, 2006
    Publication date: May 29, 2008
    Applicant: International Business Machines Corporation
    Inventors: Rhonda L. Childress, Oded Dubovsky, Itzhack Goldberg, Ido Levy, Ziv Rafalovich, Martin J. Tross
  • Publication number: 20070282982
    Abstract: A system for policy-based management in a computer environment, the system including at least one rule configured to be applied to an element of a computer environment, at least one policy including at least one of the rules, at least one profile including at least one element of the computer environment, at least one association defining a relationship between one of the policies and one of the profiles, and a computer configured to instaniate any of the associations, thereby invoking any of the rules included in the related policy for application to any of the elements in the related profile.
    Type: Application
    Filed: June 5, 2006
    Publication date: December 6, 2007
    Inventors: Rhonda Childress, Oded Dubovsky, Itzhack Goldberg, Ido Levy, Ziv Rafalovich, Ramakrishnan Rajamony, Eric Van Hensbergen, Martin Tross