Patents by Inventor Yoav Ben-Yair
Yoav Ben-Yair has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11750652Abstract: A method, computer program product and system for generating false data for suspicious users. A suspicious user is identified. Actions of the user are then tracked. The user attempting to access sensitive information is detected. Relevant false sensitive information corresponding to the sensitive information is then detected. The relevant false sensitive information is then mapped to the sensitive information. The relevant false sensitive information is provided to the suspicious user. In response to user input, at least one command is executed, where the at least one command includes the relevant false sensitive information and not the sensitive information.Type: GrantFiled: December 20, 2020Date of Patent: September 5, 2023Assignee: International Business Machines CorporationInventors: Shlomit Avrahami, Yoav Ben-Yair, Gil Fuchs, Itai Gordon, Ilan D. Prager
-
Patent number: 11188667Abstract: A method, computer program product and system for preventing unauthorized access of confidential information. The transmission of data from a first user to a second user is detected. An authorization level corresponding to the second user is then determined. Furthermore, a probability that the authorization level corresponding to the second user and the data is accurate is generated. Additionally, a determination is made that the data includes sensitive information that the second user is not authorized to access based on the authorization level. Moreover, the data can be modified based on the probability, where the data is to be redacted if the probability is within a range of a threshold value or the data is to be blocked from transmission if the probability is above the range.Type: GrantFiled: August 29, 2019Date of Patent: November 30, 2021Assignee: International Business Machines CorporationInventors: Yoav Ben-Yair, Gil Fuchs, Itai Gordon, Ilan D. Prager
-
Patent number: 11099840Abstract: Client side code of a web application can be received by a mobile device. The mobile device can automatically inject mobile aware code into the client side code of the web application. The mobile aware code can modify the client side code of the web application for use by the mobile device, wherein the client side code of the web application is not modified for use by the mobile device prior to the mobile aware code being injected. The client side code of the web application modified by the mobile aware code can be executed by the mobile device.Type: GrantFiled: May 28, 2015Date of Patent: August 24, 2021Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Yoav Ben-Yair, Gil Fuchs, Itai Gordon, Amitai Madar, Josemina Marcella Magdalen, Oren Paikowsky
-
Patent number: 11099839Abstract: Client side code of a web application can be received by a mobile device. The mobile device can automatically inject mobile aware code into the client side code of the web application. The mobile aware code can modify the client side code of the web application for use by the mobile device, wherein the client side code of the web application is not modified for use by the mobile device prior to the mobile aware code being injected. The client side code of the web application modified by the mobile aware code can be executed by the mobile device.Type: GrantFiled: August 6, 2014Date of Patent: August 24, 2021Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Yoav Ben-Yair, Gil Fuchs, Itai Gordon, Amitai Madar, Josemina Marcella Magdalen, Oren Paikowsky
-
Patent number: 11062004Abstract: A computer-implemented method is provided. The method may include determining a behavioral pattern of a user based on historical data access events and historical data access conditions corresponding to the historical data access events, wherein the data access events are associated with a computer enterprise system. A data access request from the user with respect to a secure resource may be received from a computing node connected to the computer enterprise system. A behavioral state of the user may be determined with respect to the data access request and data access conditions corresponding to the data access request. A discrepancy between the behavioral pattern and the behavioral state of the user may be detected. A security risk level may be determined based on the discrepancy. In response to determining that the security risk level exceeds a predetermined threshold, a security action may be performed with respect to the secure resource.Type: GrantFiled: April 30, 2018Date of Patent: July 13, 2021Assignee: International Business Machines CorporationInventors: Itai Gordon, Gil Fuchs, Ilan D. Prager, Yoav Ben-Yair, Shlomit Avrahami
-
Publication number: 20210112096Abstract: A method, computer program product and system for generating false data for suspicious users. A suspicious user is identified. Actions of the user are then tracked. The user attempting to access sensitive information is detected. Relevant false sensitive information corresponding to the sensitive information is then detected. The relevant false sensitive information is then mapped to the sensitive information. The relevant false sensitive information is provided to the suspicious user. In response to user input, at least one command is executed, where the at least one command includes the relevant false sensitive information and not the sensitive information.Type: ApplicationFiled: December 20, 2020Publication date: April 15, 2021Inventors: Shlomit Avrahami, Yoav Ben-Yair, Gil Fuchs, Itai Gordon, Ilan D. Prager
-
Patent number: 10958687Abstract: A method, computer program product and system for generating false data for suspicious users. A suspicious user is identified. Actions of the user are then tracked. The user attempting to access sensitive information is detected. Relevant false sensitive information corresponding to the sensitive information is then detected. The relevant false sensitive information is then mapped to the sensitive information. The relevant false sensitive information is provided to the suspicious user. In response to user input, at least one command is executed, where the at least one command includes the relevant false sensitive information and not the sensitive information.Type: GrantFiled: January 24, 2020Date of Patent: March 23, 2021Assignee: International Business Machines CorporationInventors: Shlomit Avrahami, Yoav Ben-Yair, Gil Fuchs, Itai Gordon, Ilan D. Prager
-
Patent number: 10929478Abstract: Receiving contextual data including a facial movement associated with an active document. A response associated with the active document is detected and associated with the received contextual data. A contextual metadata tag is generated based on the detected response to the active document. A contextual keyword is created that corresponds to the contextual metadata tag. Search results received in response to the query are filtered based on the contextual metadata tag.Type: GrantFiled: June 29, 2017Date of Patent: February 23, 2021Assignee: International Business Machines CorporationInventors: Yoav Ben-Yair, Gil Fuchs, Itai Gordon, Ilan D. Prager
-
Publication number: 20200162512Abstract: A method, computer program product and system for generating false data for suspicious users. A suspicious user is identified. Actions of the user are then tracked. The user attempting to access sensitive information is detected. Relevant false sensitive information corresponding to the sensitive information is then detected. The relevant false sensitive information is then mapped to the sensitive information. The relevant false sensitive information is provided to the suspicious user. In response to user input, at least one command is executed, where the at least one command includes the relevant false sensitive information and not the sensitive information.Type: ApplicationFiled: January 24, 2020Publication date: May 21, 2020Inventors: Shlomit Avrahami, Yoav Ben-Yair, Gil Fuchs, Itai Gordon, Ilan D. Prager
-
Patent number: 10587652Abstract: A method, computer program product and system for generating false data for suspicious users. A suspicious user is identified. Actions of the user are then tracked. The user attempting to access sensitive information is detected. Relevant false sensitive information corresponding to the sensitive information is then detected. The relevant false sensitive information is then mapped to the sensitive information. The relevant false sensitive information is provided to the suspicious user. In response to user input, at least one command is executed, where the at least one command includes the relevant false sensitive information and not the sensitive information.Type: GrantFiled: November 29, 2017Date of Patent: March 10, 2020Assignee: International Business Machines CorporationInventors: Shlomit Avrahami, Yoav Ben-Yair, Gil Fuchs, Itai Gordon, Ilan D. Prager
-
Patent number: 10579814Abstract: A method, computer program product and system for preventing unauthorized access of confidential information. The transmission of data from a first user to a second user is detected. An authorization level corresponding to the second user is then determined. Furthermore, a probability that the authorization level corresponding to the second user and the data is accurate is generated. Additionally, a determination is made that the data includes sensitive information that the second user is not authorized to access based on the authorization level. Moreover, the data can be modified based on the probability, where the data is to be redacted if the probability is within a range of a threshold value or the data is to be blocked from transmission if the probability is above the range.Type: GrantFiled: October 30, 2017Date of Patent: March 3, 2020Assignee: International Business Machines CorporationInventors: Yoav Ben-Yair, Gil Fuchs, Itai Gordon, Ilan D. Prager
-
Publication number: 20190384930Abstract: A method, computer program product and system for preventing unauthorized access of confidential information. The transmission of data from a first user to a second user is detected. An authorization level corresponding to the second user is then determined. Furthermore, a probability that the authorization level corresponding to the second user and the data is accurate is generated. Additionally, a determination is made that the data includes sensitive information that the second user is not authorized to access based on the authorization level. Moreover, the data can be modified based on the probability, where the data is to be redacted if the probability is within a range of a threshold value or the data is to be blocked from transmission if the probability is above the range.Type: ApplicationFiled: August 29, 2019Publication date: December 19, 2019Inventors: Yoav Ben-Yair, Gil Fuchs, Itai Gordon, Ilan D. Prager
-
Publication number: 20190332752Abstract: A computer-implemented method is provided. The method may include determining a behavioral pattern of a user based on historical data access events and historical data access conditions corresponding to the historical data access events, wherein the data access events are associated with a computer enterprise system. A data access request from the user with respect to a secure resource may be received from a computing node connected to the computer enterprise system. A behavioral state of the user may be determined with respect to the data access request and data access conditions corresponding to the data access request. A discrepancy between the behavioral pattern and the behavioral state of the user may be detected. A security risk level may be determined based on the discrepancy. In response to determining that the security risk level exceeds a predetermined threshold, a security action may be performed with respect to the secure resource.Type: ApplicationFiled: April 30, 2018Publication date: October 31, 2019Inventors: Itai Gordon, Gil Fuchs, Ilan D. Prager, Yoav Ben-Yair, Shlomit Avrahami
-
Publication number: 20190166159Abstract: A method, computer program product and system for generating false data for suspicious users. A suspicious user is identified. Actions of the user are then tracked. The user attempting to access sensitive information is detected. Relevant false sensitive information corresponding to the sensitive information is then detected. The relevant false sensitive information is then mapped to the sensitive information. The relevant false sensitive information is provided to the suspicious user. In response to user input, at least one command is executed, where the at least one command includes the relevant false sensitive information and not the sensitive information.Type: ApplicationFiled: November 29, 2017Publication date: May 30, 2019Inventors: Shlomit Avrahami, Yoav Ben-Yair, Gil Fuchs, Itai Gordon, Ilan D. Prager
-
Publication number: 20190130123Abstract: A method, computer program product and system for preventing unauthorized access of confidential information. The transmission of data from a first user to a second user is detected. An authorization level corresponding to the second user is then determined. Furthermore, a probability that the authorization level corresponding to the second user and the data is accurate is generated. Additionally, a determination is made that the data includes sensitive information that the second user is not authorized to access based on the authorization level. Moreover, the data can be modified based on the probability, where the data is to be redacted if the probability is within a range of a threshold value or the data is to be blocked from transmission if the probability is above the range.Type: ApplicationFiled: October 30, 2017Publication date: May 2, 2019Inventors: Yoav Ben-Yair, Gil Fuchs, Itai Gordon, Ilan D. Prager
-
Publication number: 20190005032Abstract: Receiving contextual data including a facial movement associated with an active document. A response associated with the active document is detected and associated with the received contextual data. A contextual metadata tag is generated based on the detected response to the active document. A contextual keyword is created that corresponds to the contextual metadata tag. Search results received in response to the query are filtered based on the contextual metadata tag.Type: ApplicationFiled: June 29, 2017Publication date: January 3, 2019Inventors: Yoav Ben-Yair, Gil Fuchs, Itai Gordon, Ilan D. Prager
-
Publication number: 20190005034Abstract: Receiving contextual data including a facial movement associated with an active document. A response associated with the active document is detected and associated with the received contextual data. A contextual metadata tag is generated based on the detected response to the active document. A contextual keyword is created that corresponds to the contextual metadata tag. Search results received in response to the query are filtered based on the contextual metadata tag.Type: ApplicationFiled: March 2, 2018Publication date: January 3, 2019Inventors: Yoav Ben-Yair, Gil Fuchs, Itai Gordon, Ilan D. Prager
-
Patent number: 10169342Abstract: Receiving contextual data including a facial movement associated with an active document. A response associated with the active document is detected and associated with the received contextual data. A contextual metadata tag is generated based on the detected response to the active document. A contextual keyword is created that corresponds to the contextual metadata tag. Search results received in response to the query are filtered based on the contextual metadata tag.Type: GrantFiled: March 2, 2018Date of Patent: January 1, 2019Assignee: International Business Machines CorporationInventors: Yoav Ben-Yair, Gil Fuchs, Itai Gordon, Ilan D. Prager
-
Patent number: 9886584Abstract: An embodiment of the invention may include a method, computer program product and system for redacting a document. The embodiment may include receiving an unredacted document. The embodiment may include determining portions of the unredacted document containing sensitive information. The embodiment may include applying a redaction method to the portions containing sensitive information to create a redacted document. The redaction method replaces the portion containing sensitive information with a different piece of content. The different piece of content correlates to a most stringent redaction method. The embodiment may include displaying the redacted document to a user. The embodiment may include determining the user is frustrated, and replacing the piece of content with a piece of content corresponding to a next most stringent redaction method from the list of redaction methods. The embodiment may include displaying the updated redacted document to the user.Type: GrantFiled: February 25, 2016Date of Patent: February 6, 2018Assignee: International Business Machines CorporationInventors: Yoav Ben-Yair, Gil Fuchs, Itai Gordon, Ilan D. Prager
-
Patent number: 9852015Abstract: An approach to creating a canonical representation of a JavaScript API. Objects associated with the JavaScript API are instantiated, creating entry points for analysis. A list of discovered objects is created based on parsing a document object model associated with the JavaScript API. The objects are instrumented and statically analyzed, creating an infrastructure associated with the JavaScript API. The infrastructure is updated based on analyzing the objects while the interface is being used and the objects are executing. A canonical representation, based on the updated infrastructure, is generated for further operations.Type: GrantFiled: December 22, 2016Date of Patent: December 26, 2017Assignee: International Business Machines CorporationInventors: Yoav Ben-Yair, Gil Fuchs, Itai Gordon, Oren Paikowsky