Patents by Inventor Oded Peer

Oded Peer has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10592128
    Abstract: A computer implemented method, system, and computer program product comprising intercepting an interaction with a data storage capability at the abstraction layer enabled to intercept data interactions for different types of data storage capabilities; wherein the interaction changes data on the data storage capability; sending a copy of the interaction to a replication data storage capability; and sending the interaction to the data storage capability.
    Type: Grant
    Filed: December 30, 2015
    Date of Patent: March 17, 2020
    Assignee: EMC IP HOLDING COMPANY LLC
    Inventors: Assaf Natanzon, Jehuda Shemer, Ron Bigman, Amit Lieberman, Yana Vaisman, Oded Peer
  • Patent number: 10409787
    Abstract: In one aspect, a method includes migrating a database object from a source database to a target database, updating a storage of the location of the DB object to be the target database, directly accessing one of the target database and the source database during the migrating and executing, during the migrating, a database command by retrieving the DB object from the other one of the target database and the source database.
    Type: Grant
    Filed: December 22, 2015
    Date of Patent: September 10, 2019
    Assignee: EMC IP HOLDING COMPANY LLC
    Inventors: Ron Bigman, Assaf Natanzon, Jehuda Shemer, Amit Lieberman, Yana Vaisman, Oded Peer
  • Patent number: 10334044
    Abstract: According to one embodiment, a request is received for estimating migrating a first dataset from a first cloud system to a second cloud system. A migration cost estimation module determines a network bandwidth required to migrate the first dataset from the first cloud system to the second cloud system, determines a duplicated data time period during migration that the first dataset has to be maintained by both the first cloud system and the second cloud system for service continuity, and determines a total cost of migrating the first dataset from the first cloud system to the second cloud system based on the required network bandwidth and the duplicated data time period. It is then determined whether to migrate the first dataset from the first cloud system to the second cloud system based on the total cost.
    Type: Grant
    Filed: March 30, 2016
    Date of Patent: June 25, 2019
    Assignee: EMC IP HOLDING COMPANY LLC
    Inventors: Ron Bigman, Jehuda Shemer, Amit Lieberman, Assaf Natanzon, Yana Vaisman, Oded Peer
  • Patent number: 10303528
    Abstract: Parallel processing of events having multi-dimensional dependencies is provided. Each event has at least one profile and each profile has at least one profile key. An event is dependent on another event if they have at least one common profile key. The profile key(s) for a plurality of profiles of the given event are compared to profile keys of previously queued events. A given event is assigned to a same queue as at least one dependent event. When a given event is dependent on events in at least two queues, the given event is not assigned to a queue until only one queue has dependent events remaining to be processed. A list of profile keys that have been assigned to each queue and/or a reference count of a number of events that have been queued for each profile key are optionally maintained.
    Type: Grant
    Filed: September 25, 2015
    Date of Patent: May 28, 2019
    Assignee: EMC IP Holding Company LLC
    Inventors: Mikael Peres, Yariv Amar, Oded Peer, Tomer Meidan
  • Patent number: 10284601
    Abstract: There are disclosed techniques for use in authentication. In one embodiment, the techniques comprise generating first and second distributions. The first distribution relating to risk scores expected to be produced by an authentication system in connection with requests to access a computerized resource. The expected risk scores are based on a normalization process configured to produce risk scores by normalizing raw risk scores in connection with requests. The second distribution relates to risk scores actually produced by the authentication system in connection with requests. The actual risk scores include risk scores normalized by the normalization process. The techniques also comprise comparing the first and second distributions by determining a Kolmogorov-Smirnov distance between the respective distributions. The techniques also comprise initiating, based on the comparison, a failover of the normalization process to a new normalization process for use by the authentication system.
    Type: Grant
    Filed: May 17, 2017
    Date of Patent: May 7, 2019
    Assignee: EMC IP Holding Company LLC
    Inventors: Ika Bar-Menachem, Marcelo Blatt, Tomer Meidan, Elad Koren, Oded Peer, Shachar Israeli
  • Patent number: 10108645
    Abstract: In general, the invention relates to a method and system for migrating tables in databases. The method may include calculating a first plurality of migration factors for a first set of tables in a source database using a plurality of pre-calculated factors and a first plurality of dynamically-calculated factor, where each of the first plurality of migration factors is associated with one of the first set of tables. The method may further include selecting a first table from the first set of tables to migrate based on the first plurality of migration factors; and migrating the first table to a target database.
    Type: Grant
    Filed: December 30, 2015
    Date of Patent: October 23, 2018
    Assignee: EMC IP Holding Company LLC
    Inventors: Ron Bigman, Jehuda Shemer, Amit Lieberman, Assaf Natanzon, Yana Vaisman, Oded Peer
  • Patent number: 10095993
    Abstract: Methods and apparatus are provided for configuring the granularity of key performance indicators that are available from a monitored component. A granularity of a key performance indicator provided by a monitored component can be configured by creating a plurality of instances of a statistics collector object, wherein each instance of the statistics collector object collects information for a different context of the key performance indicator; updating an indicator value for a corresponding instance of the statistics collector object when an activity occurs for the context of the key performance indicator; and providing the indicator value for a given context of the key performance indicator to a monitoring object. The configurable granularity can be specified by the product, for example, using an application programming interface.
    Type: Grant
    Filed: September 14, 2012
    Date of Patent: October 9, 2018
    Assignee: EMC IP Holding Company LLC
    Inventors: Ika Bar-Menachem, Oded Peer
  • Patent number: 10055148
    Abstract: In one example, a method includes generating an enhanced copy, which includes application data generated from using an application, the application, a configuration of the application and runtime settings to run the application. The method also includes restoring at least one of the application, the configuration of the application and the runtime settings using the enhanced copy.
    Type: Grant
    Filed: December 22, 2015
    Date of Patent: August 21, 2018
    Assignee: EMC IP Holding Company LLC
    Inventors: Assaf Natanzon, Jehuda Shemer, Ron Bigman, Amit Lieberman, Yana Vaisman, Oded Peer
  • Patent number: 10009330
    Abstract: Disclosed are techniques for use in authentication. In one embodiment, the techniques comprise a method. The method comprises the step of receiving a request comprising a plurality of attributes. The method also comprises determining whether to grant authentication or to perform an assessment of at least some of the attributes. The said determination is dependent on whether one of the attributes corresponds with a predictor.
    Type: Grant
    Filed: September 30, 2015
    Date of Patent: June 26, 2018
    Assignee: EMC IP Holding Company LLC
    Inventors: Oded Peer, Nir Moatty, Yana Vaisman
  • Patent number: 9967265
    Abstract: Techniques of detecting malicious events involve generating a relational graph of event data describing events that occur within a specified, limited time window. Along these lines, a malicious event detection computer receives event data describing interactions between entities such as users, devices, and network domains from various servers that occur within a specified time window. In response, the malicious event detection computer generates a relational graph that has graph structures (e.g., nodes and edges) representing these interactions. Analysis of patterns within the resulting relational graph indicates whether there is a malicious event occurring.
    Type: Grant
    Filed: September 29, 2015
    Date of Patent: May 8, 2018
    Assignee: EMC IP Holding Company LLC
    Inventors: Oded Peer, Oleg Freylafert, Anton Khitrenovich, Yana Vaisman
  • Patent number: 9535955
    Abstract: Methods, apparatus and articles of manufacture for modifying queries and rules for profile fetching and risk calculation are provided herein. A method includes comparing at least one aspect of a query submitted to access a data store to rule sets associated with the data store to determine a potential access path within the data store for responding to the query, comparing information pertaining to an entity identified via the query to risk information pertaining to entities to determine a level of risk associated with the entity identified via the query, generating a modified version of the query based on information derived from the potential access path within the data store for responding to the query, and calculating a risk score associated with the modified version of the query based on the aspect of the query and the level of risk associated with the entity identified via the query.
    Type: Grant
    Filed: March 12, 2013
    Date of Patent: January 3, 2017
    Assignee: EMC IP Holding Company LLC
    Inventors: Yedidya Dotan, Oded Peer, Oleg Freylafert, Asaf Shoval, Eyal Lewinsohn
  • Patent number: 9094447
    Abstract: An information security application responds to a request by generating a context vector and performing a lookup in a configuration structure to identify a configurable action to be taken. The context vector includes current values of environment variables. The configuration structure stores configuration objects having an environment field storing configured values of the environment variables to specify a context for use of an action value in an action field. A wildcard value indicates that the context for use is independent of a given environment variable. The lookup results in a set of configuration objects whose configured values of the environment variables either are wildcards or match respective values in the context vector. The set of action values is resolved to a resolved action value specifying the configurable action, and a response is returned to the client computer based on a result of the configurable action.
    Type: Grant
    Filed: March 21, 2014
    Date of Patent: July 28, 2015
    Assignee: EMC Corporation
    Inventors: Oded Peer, Ika Bar Menachem
  • Patent number: 8683568
    Abstract: Techniques for using a network analyzer device connected to a network include (a) sniffing packets traversing the network between a web-based application server and a user machine, the user machine being operated by a user, (b) analyzing the sniffed packets to extract event information relating to interaction events between the user machine and the web-based application server, and (c) sending the extracted event information to an authentication server for risk-based authentication of the user.
    Type: Grant
    Filed: September 22, 2011
    Date of Patent: March 25, 2014
    Assignee: EMC Corporation
    Inventors: Anton Khitrenovich, Oded Peer, Oleg Freylafert
  • Patent number: 8621586
    Abstract: An improved technique of processing an authentication request from an authentication requestor involves an adaptive authentication device comparing a behavioral history of fact values associated with a user over a current time window with a user's baseline profile that includes a behavioral history of the fact values. The adaptive authentication device accesses such a behavioral history over several previous time windows from a database whose entries include a user identifier, a time interval and user data which represents fact value behavioral history over the time interval. When the device receives an authentication request from an authentication requestor, the adaptive authentication device matches a username of the request with a user identifier of an entry of the database whose time period is the current time period. The adaptive authentication device then updates fact values representing the user's current behavioral history and compares the current behavioral history to the user's baseline profile.
    Type: Grant
    Filed: September 28, 2011
    Date of Patent: December 31, 2013
    Assignee: EMC Corporation
    Inventors: Oded Peer, Yedidya Dotan, Yael Villa, Marcelo Blatt