Patents by Inventor Yifat Sagiv

Yifat Sagiv has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10510012
    Abstract: Providing predictive data predicting data values for a historical dataset. The method facilitates improving the accuracy of the predictive data by identifying for a user, and allowing the user to select ancillary datasets that can be evaluated, using a predictive evaluation, together with a historical dataset to improve the accuracy of the predictive data. A user interface is provided to a user. The user interface identifies one or more ancillary datasets. The ancillary datasets are identified to the user based on the ancillary datasets meeting a threshold condition to a historical dataset. The ancillary datasets are selectable by the user in the user interface. User input is received at the user interface selecting one or more of the ancillary datasets. A predictive dataset is displayed to the user. The predictive dataset is determined by predictive evaluation of the historical dataset and the one or more selected ancillary datasets.
    Type: Grant
    Filed: April 28, 2014
    Date of Patent: December 17, 2019
    Assignee: Microsoft Technology Licensing LLC
    Inventors: Amir Netz, Moshe Golan, Chairy Chiu Ying Cheung, Yury Berezansky, Oded Bar Levy, Yoav Yassour, Yifat Sagiv, Ran Didi
  • Patent number: 10250620
    Abstract: Described is a technology by which a signature used by network traffic intrusion prevention/detection systems includes logic that helps a prevention/detection engine detect that signature. A signature to detect is compiled into executable logic that is executed to communicate with an engine that evaluates network traffic. The signature logic provides an expression set (such as group of regular expressions) for the engine to match against a token corresponding to the network traffic. When matched, the engine notifies the logic and receives a further expression set to match, or a communication indicative that that the signature was detected. The signature thus directs the analysis, facilitating a lightweight, generic engine. Safety of the signature logic is described as being accomplished through layers, including by publisher signing, and by compilation and execution (e.g., interpretation) in safe environments.
    Type: Grant
    Filed: June 30, 2016
    Date of Patent: April 2, 2019
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Vladimir Lifliand, Evgeney Ryzhyk, Yifat Sagiv, Maxim Uritsky
  • Publication number: 20160315957
    Abstract: Described is a technology by which a signature used by network traffic intrusion prevention/detection systems includes logic that helps a prevention/detection engine detect that signature. A signature to detect is compiled into executable logic that is executed to communicate with an engine that evaluates network traffic. The signature logic provides an expression set (such as group of regular expressions) for the engine to match against a token corresponding to the network traffic. When matched, the engine notifies the logic and receives a further expression set to match, or a communication indicative that that the signature was detected. The signature thus directs the analysis, facilitating a lightweight, generic engine. Safety of the signature logic is described as being accomplished through layers, including by publisher signing, and by compilation and execution (e.g., interpretation) in safe environments.
    Type: Application
    Filed: June 30, 2016
    Publication date: October 27, 2016
    Applicant: Microsoft Technology Licensing, LLC
    Inventors: Vladimir Lifliand, Evgeney Ryzhyk, Yifat Sagiv, Maxim Uritsky
  • Patent number: 9389839
    Abstract: Described is a technology by which a signature used by network traffic intrusion prevention/detection systems includes logic that helps a prevention/detection engine detect that signature. A signature to detect is compiled into executable logic that is executed to communicate with an engine that evaluates network traffic. The signature logic provides an expression set (such as group of regular expressions) for the engine to match against a token corresponding to the network traffic. When matched, the engine notifies the logic and receives a further expression set to match, or a communication indicative that that the signature was detected. The signature thus directs the analysis, facilitating a lightweight, generic engine. Safety of the signature logic is described as being accomplished through layers, including by publisher signing, and by compilation and execution (e.g., interpretation) in safe environments.
    Type: Grant
    Filed: June 26, 2008
    Date of Patent: July 12, 2016
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Vladimir Lifliand, Evgeney Ryzhyk, Yifat Sagiv, Maxim Uritsky
  • Publication number: 20150310343
    Abstract: Providing predictive data predicting data values for a historical dataset. The method facilitates improving the accuracy of the predictive data by identifying for a user, and allowing the user to select ancillary datasets that can be evaluated, using a predictive evaluation, together with a historical dataset to improve the accuracy of the predictive data. A user interface is provided to a user. The user interface identifies one or more ancillary datasets. The ancillary datasets are identified to the user based on the ancillary datasets meeting a threshold condition to a historical dataset. The ancillary datasets are selectable by the user in the user interface. User input is received at the user interface selecting one or more of the ancillary datasets. A predictive dataset is displayed to the user. The predictive dataset is determined by predictive evaluation of the historical dataset and the one or more selected ancillary datasets.
    Type: Application
    Filed: April 28, 2014
    Publication date: October 29, 2015
    Applicant: MICROSOFT CORPORATION
    Inventors: Amir Netz, Moshe Golan, Chairy Chiu Ying Cheung, Yury Berezansky, Oded Bar Levy, Yoav Yassour, Yifat Sagiv, Ran Didi
  • Publication number: 20090328011
    Abstract: Described is a technology by which a signature used by network traffic intrusion prevention/detection systems includes logic that helps a prevention/detection engine detect that signature. A signature to detect is compiled into executable logic that is executed to communicate with an engine that evaluates network traffic. The signature logic provides an expression set (such as group of regular expressions) for the engine to match against a token corresponding to the network traffic. When matched, the engine notifies the logic and receives a further expression set to match, or a communication indicative that that the signature was detected. The signature thus directs the analysis, facilitating a lightweight, generic engine. Safety of the signature logic is described as being accomplished through layers, including by publisher signing, and by compilation and execution (e.g., interpretation) in safe environments.
    Type: Application
    Filed: June 26, 2008
    Publication date: December 31, 2009
    Applicant: Microsoft Corporation
    Inventors: Vladimir Lifliand, Evgeney Ryzhyk, Yifat Sagiv, Maxim Uritsky
  • Publication number: 20070101131
    Abstract: A security flag stored in a trusted store is utilized to determine if the trusted store has been subjected to tampering. The security flag is indicative of a globally unique identifier (GUID), the version of the trusted store, and a counter. The security flag is created when the trusted store is created. Each time a critical event occurs, the security flag is updated to indicate the occurrence thereof. The security flag also is stored in a write-once portion of the system registry. At appropriate times, the security flag stored in the trusted store is compared with the corresponding security flag stored in the write-once registry. If the security flags match within a predetermined tolerance, it is determined that the trusted store has not been subjected to tampering. If the security flags do not match, or if a security flag is missing, it is determined that the trusted store has been subjected to tampering.
    Type: Application
    Filed: November 1, 2005
    Publication date: May 3, 2007
    Applicant: Microsoft Corporation
    Inventors: Ivan Davtchev, Karan Dhillon, Nir Zvi, Aaron Goldsmid, Ping Xie, Yifat Sagiv
  • Patent number: 7076544
    Abstract: A streaming media caching mechanism and cache manager efficiently establish and maintain the contents of a streaming media cache for use in serving streaming media requests from cache rather than from an original data source when appropriate. The cost of caching is incurred only when the benefits of caching are likely to be experienced. The caching mechanism and cache manager evaluate the request count for each requested URL to determine whether the URL represents a cache candidate, and further analyze the URL request rate to determine whether the content associated with the URL will be cached. In an embodiment, the streaming media cache is maintained with a predetermined amount of reserve capacity rather than being filled to capacity whenever possible.
    Type: Grant
    Filed: April 8, 2002
    Date of Patent: July 11, 2006
    Assignee: Microsoft Corporation
    Inventors: Ariel Katz, Yifat Sagiv, Guy Friedel, David E. Heckerman, John R. Douceur, Joshua Goodman
  • Publication number: 20030217113
    Abstract: A streaming media caching mechanism and cache manager efficiently establish and maintain the contents of a streaming media cache for use in serving streaming media requests from cache rather than from an original data source when appropriate. The cost of caching is incurred only when the benefits of caching are likely to be experienced. The caching mechanism and cache manager evaluate the request count for each requested URL to determine whether the URL represents a cache candidate, and further analyze the URL request rate to determine whether the content associated with the URL will be cached. In an embodiment, the streaming media cache is maintained with a predetermined amount of reserve capacity rather than being filled to capacity whenever possible.
    Type: Application
    Filed: April 8, 2002
    Publication date: November 20, 2003
    Applicant: Microsoft Corporation
    Inventors: Ariel Katz, Yifat Sagiv, Guy Friedel, David E. Heckerman, John R. Douceur, Joshua Goodman