Patents by Inventor Oded Dubovsky
Oded Dubovsky has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9930003Abstract: Systems and methods are provided for location-based Domain Name System (DNS) service discovery using a central DNS server in which network resources are aggregated by geographic location (e.g., subnets) and defined using DNS service discovery records that are mapped to corresponding geographic locations.Type: GrantFiled: August 19, 2013Date of Patent: March 27, 2018Assignee: International Business Machines CorporationInventors: Yoni Amishav, Eric J. Barkie, Oded Dubovsky, Benjamin L. Fletcher
-
Patent number: 9917905Abstract: Systems and methods are provided for location-based Domain Name System (DNS) service discovery using a central DNS server in which network resources are aggregated by geographic location (e.g., subnets) and defined using DNS service discovery records that are mapped to corresponding geographic locations.Type: GrantFiled: May 13, 2013Date of Patent: March 13, 2018Assignee: International Business Machines CorporationInventors: Yoni Amishav, Eric J. Barkie, Oded Dubovsky, Benjamin L. Fletcher
-
Publication number: 20170155619Abstract: Systems and methods are provided for location-based Domain Name System (DNS) service discovery using a central DNS server in which network resources are aggregated by geographic location (e.g., subnets) and defined using DNS service discovery records that are mapped to corresponding geographic locations.Type: ApplicationFiled: February 14, 2017Publication date: June 1, 2017Inventors: Yoni Amishav, Eric J. Barkie, Oded Dubovsky, Benjamin L. Fletcher
-
Publication number: 20160313708Abstract: A method enhances an emergency reporting system for controlling equipment. A message receiver receives an electronic message from a person. The electronic message is a report regarding an emergency event. One or more processors identify a profile of the person who sent the electronic message, and determine a bias of the person regarding the emergency event based on the person's profile. One or more processors amend, based on the bias of the person, a content of the electronic message to create a modified electronic message regarding the emergency event. The modified electronic message is consolidated with other modified electronic messages into a bias-corrected report about the emergency event. One or more processors then automatically adjust equipment based on the bias-corrected report about the emergency event.Type: ApplicationFiled: April 21, 2015Publication date: October 27, 2016Inventors: Aaron K. Baughman, Oded Dubovsky, James R. Kozloski, Boaz Mizrachi, Clifford A. Pickover
-
Publication number: 20140337530Abstract: Systems and methods are provided for location-based Domain Name System (DNS) service discovery using a central DNS server in which network resources are aggregated by geographic location (e.g., subnets) and defined using DNS service discovery records that are mapped to corresponding geographic locations.Type: ApplicationFiled: May 13, 2013Publication date: November 13, 2014Inventors: Yoni Amishav, Eric J. Barkie, Oded Dubovsky, Benjamin L. Fletcher
-
Publication number: 20140337526Abstract: Systems and methods are provided for location-based Domain Name System (DNS) service discovery using a central DNS server in which network resources are aggregated by geographic location (e.g., subnets) and defined using DNS service discovery records that are mapped to corresponding geographic locations.Type: ApplicationFiled: August 19, 2013Publication date: November 13, 2014Applicant: International Business Machines CorporationInventors: Yoni Amishav, Eric J. Barkie, Oded Dubovsky, Benjamin L. Fletcher
-
Patent number: 8752164Abstract: The present invention prevents illegitimate access to a user computing machine. A method in accordance with an embodiment includes: setting an authentication routine in the user computing machine; generating a virtual keyboard on the user computing machine; entering a user identification through the virtual keyboard, the user identification being entered according to a virtual keyboard form factor; comparing the entered user identification with a secure user identification previously stored in the user computing machine; and validating the user access to the user computing machine if a match occurs, otherwise denying access.Type: GrantFiled: May 25, 2008Date of Patent: June 10, 2014Assignee: International Business Machines CorporationInventors: Oded Dubovsky, Itzhack Goldberg, Ido Levy, Ilan Shimony, Grant D. Williamson
-
Patent number: 7877791Abstract: System, method and program for managing a production server. An authentication server sends to the production server via a network a group password for a GroupID to access a file in the production server. A user at a workstation sends via a network to the authentication server an individual UserID and corresponding individual password for the user and a request for the group password for the GroupID to access a file in the production server protected by the group password. In response, the authentication server authenticates the individual UserID with the corresponding individual password and returns to the workstation the group password for the GroupID. After receiving the group password from the authentication server, the user at the workstation sends via a network to the production server the group password and GroupID and a request to access the file in the production server protected by the group password.Type: GrantFiled: June 19, 2007Date of Patent: January 25, 2011Assignee: International Business Machines CorporationInventors: Rhonda L. Childress, Oded Dubovsky, Itzhack Goldberg, Ido Levy, Stephen James Watt
-
Patent number: 7774421Abstract: A computer-implemented method for mitigating address book weaknesses that permit sending of e-mail to wrong addresses includes determining prior to sending an e-mail message whether one of a plurality of recipients of an e-mail message should receive the e-mail message, the determining prior to sending the e-mail message including analyzing history information of a sender of the e-mail message to determine whether the one of the plurality of recipients is ordinarily connected with the plurality of recipients and whether the one of the plurality of recipients is ordinarily connected with a subject of the e-mail message, the analyzing history information including comparing the plurality of recipients to a database indicative of recipients that received e-mail from the sender, and, responsive to the history information, determining whether the one of the plurality of recipients is one of a new recipient and an ordinary recipient, and presenting the determining to the sender.Type: GrantFiled: June 30, 2008Date of Patent: August 10, 2010Assignee: International Business Machines CorporationInventors: Oded Dubovsky, Itzhack Goldberg, Boaz Mizrachi
-
Publication number: 20090178135Abstract: The present invention prevents illegitimate access to a user computing machine. A method in accordance with an embodiment includes: setting an authentication routine in the user computing machine; generating a virtual keyboard on the user computing machine; entering a user identification through the virtual keyboard, the user identification being entered according to a virtual keyboard form factor; comparing the entered user identification with a secure user identification previously stored in the user computing machine; and validating the user access to the user computing machine if a match occurs, otherwise denying access.Type: ApplicationFiled: May 25, 2008Publication date: July 9, 2009Inventors: Oded Dubovsky, Itzhack Goldberg, Ido Levy, Ilan Shimony, Grant D. Williamson
-
Publication number: 20080320574Abstract: System, method and program for managing a production server. An authentication server sends to the production server via a network a group password for a GroupID to access a file in the production server. A user at a workstation sends via a network to the authentication server an individual UserID and corresponding individual password for the user and a request for the group password for the GroupID to access a file in the production server protected by the group password. In response, the authentication server authenticates the individual UserID with the corresponding individual password and returns to the workstation the group password for the GroupID. After receiving the group password from the authentication server, the user at the workstation sends via a network to the production server the group password and GroupID and a request to access the file in the production server protected by the group password.Type: ApplicationFiled: June 19, 2007Publication date: December 25, 2008Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Rhonda L. Childress, Oded Dubovsky, Itzhack Goldberg, Ido Levy, Stephen James Watt
-
Publication number: 20080250114Abstract: A computer-implemented method for mitigating address book weaknesses that permit sending of e-mail to wrong addresses includes determining prior to sending an e-mail message whether one of a plurality of recipients of an e-mail message should receive the e-mail message, the determining prior to sending the e-mail message including analyzing history information of a sender of the e-mail message to determine whether the one of the plurality of recipients is ordinarily connected with the plurality of recipients and whether the one of the plurality of recipients is ordinarily connected with a subject of the e-mail message, the analyzing history information including comparing the plurality of recipients to a database indicative of recipients that received e-mail from the sender, and, responsive to the history information, determining whether the one of the plurality of recipients is one of a new recipient and an ordinary recipient, and presenting the determining to the sender.Type: ApplicationFiled: June 30, 2008Publication date: October 9, 2008Applicant: International Business Machines CorporationInventors: Oded DUBOVSKY, Itzhack GOLDBERG, Boaz MIZRACHI
-
Publication number: 20080235302Abstract: The invention is directed to the transparent allocation of a unique per user /tmp file system. A method in accordance with an embodiment of the present invention includes: manipulating an operating system to provide each user with a private temporary file system; and constraining a process of the user to the user's private temporary file system.Type: ApplicationFiled: March 19, 2007Publication date: September 25, 2008Inventors: Rhonda L. Childress, Oded Dubovsky, Itzhack Goldberg, Ido Levy, Stephen J. Watt
-
Publication number: 20080201435Abstract: A method and system for ordering addressees in address fields (141-143) is provided. The method includes entering a plurality of addresses in an address field (141-143) of a message; selecting an ordering policy (134); and ordering (132) the addresses in the address field (141-143) in accordance with the selected ordering policy. The ordering policy (134) may include general ordering policies such as alphabetical ordering, or flattering ordering in which the recipient's address is at the head of the address field. Weightings for individual addressees may be defined. Weightings may be absolute and/or relative to other addressees. An ordering policy (134) may be selected for each of the address fields “To:”, “Cc:”, and “Bcc:”.Type: ApplicationFiled: February 20, 2007Publication date: August 21, 2008Inventors: Oded Dubovsky, Itzhack Goldberg, Ido Levy, Maya Shiran
-
Publication number: 20080126787Abstract: Managing default values. A determination is automatically made that the first program is operating in the batch mode in which user interaction is not intended to affirm or change default values. In response, first current default values for input to the first program are determined, and a determination is made whether a user previously entered or affirmed the first current default values in an interactive mode. If so, the first program is allowed to proceed with operation using the first current default values. If not, the first program is not allowed to proceed with operation using the first current default values. A determination is automatically made that the second program is operating in the interactive mode in which user interaction is intended to affirm or change default values.Type: ApplicationFiled: June 5, 2006Publication date: May 29, 2008Applicant: International Business Machines CorporationInventors: Rhonda L. Childress, Oded Dubovsky, Itzhack Goldberg, Ido Levy, Ziv Rafalovich, Martin J. Tross
-
Publication number: 20070282982Abstract: A system for policy-based management in a computer environment, the system including at least one rule configured to be applied to an element of a computer environment, at least one policy including at least one of the rules, at least one profile including at least one element of the computer environment, at least one association defining a relationship between one of the policies and one of the profiles, and a computer configured to instaniate any of the associations, thereby invoking any of the rules included in the related policy for application to any of the elements in the related profile.Type: ApplicationFiled: June 5, 2006Publication date: December 6, 2007Inventors: Rhonda Childress, Oded Dubovsky, Itzhack Goldberg, Ido Levy, Ziv Rafalovich, Ramakrishnan Rajamony, Eric Van Hensbergen, Martin Tross