Patents by Inventor Yotam Medini

Yotam Medini has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8948353
    Abstract: A method for establishing a communication connection between a first communication device and a second communication device, the method comprising requesting contact information for a second communication device, during a first communication connection established between a first communication device and a third communication device; receiving the contact information from the third communication device, in response to a third party interacting with the third communication device during the first communication connection; and establishing a second communication connection between the first communication device and the second communication device based on the contact information received from the third communication device, wherein the second communication connection is established by way of the first communication device independently initiating communication with the second communication device.
    Type: Grant
    Filed: June 12, 2007
    Date of Patent: February 3, 2015
    Assignee: International Business Machines Corporation
    Inventors: Itzhack Goldberg, Samuel Kallner, Yotam Medini, Kenneth Nagin
  • Patent number: 8370925
    Abstract: Password aging based on the strength of the password provides an incentive for users to generate and/or memorize more complex passwords. The strength of the password is computed from a formula that relates the length of the password and the types of characters contained in the password to a strength value, which can be performed using a lookup table having values for different characteristics of the password, determining partial strength values corresponding to the ranges in which the characteristics fall, and then adding the partial strength values. Alternatively, a separate password strength application may be used to provide the strength value, which is entered by the user or administrator generating a new password. Alternatively, the password may be generated based on a specified desired expiration period, with the strength computation performed to ensure that the strength is sufficient to merit the desired expiration period.
    Type: Grant
    Filed: July 29, 2008
    Date of Patent: February 5, 2013
    Assignee: International Business Machines Corporation
    Inventors: Rhonda L. Childress, Itzhack Goldberg, Moriel Lechtman, Yotam Medini
  • Patent number: 7783921
    Abstract: A system and method for restoring a computing system to a first operating state associated with a first system software code installed on the computing system is provided. The method comprises installing a second system software code on the computing system, while the system is operating in the first operating state. The second system software code is activated and the first system software code is deactivated to cause the computing system to operate in a second operating state. The first system software code is activated and the second system software code is deactivated to cause the system to return to the first operating state, if activation of the second system software code causes the system to operate in an undesirable manner.
    Type: Grant
    Filed: February 21, 2007
    Date of Patent: August 24, 2010
    Assignee: International Business Machines Corporation
    Inventors: Itzhack Goldberg, Yotam Medini, Kenneth Nagin, Shmuel Vashdi
  • Patent number: 7661018
    Abstract: A method, apparatus and program storage device for providing automatic recovery from premature reboot of a system during a concurrent upgrade is disclosed. A concurrent code-load to a plurality of storage controllers of a storage system is initiated. A code-load failure is detected. The stage of the code-load failure is identified. A code-load recovery process based upon the identification of the stage that the code-load failure occurred is initiated.
    Type: Grant
    Filed: December 21, 2006
    Date of Patent: February 9, 2010
    Assignee: International Business Machines Corporation
    Inventors: Jimmie Lee Brundidge, Chiahong Chen, Itzhack Goldberg, Yotam Medini
  • Publication number: 20100031343
    Abstract: Password aging based on the strength of the password provides an incentive for users to generate and/or memorize more complex passwords. The strength of the password is computed from a formula that relates the length of the password and the types of characters contained in the password to a strength value, which can be performed using a lookup table having values for different characteristics of the password, determining partial strength values corresponding to the ranges in which the characteristics fall, and then adding the partial strength values. Alternatively, a separate password strength application may be used to provide the strength value, which is entered by the user or administrator generating a new password. Alternatively, the password may be generated based on a specified desired expiration period, with the strength computation performed to ensure that the strength is sufficient to merit the desired expiration period.
    Type: Application
    Filed: July 29, 2008
    Publication date: February 4, 2010
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Rhonda L. Childress, Itzhack Goldberg, Moriel Lechtman, Yotam Medini
  • Patent number: 7552185
    Abstract: A method of managing the entry of individuals or email groups into their intended recipient field within a sender's email is disclosed. A predefined, static association between an intended recipient or email group and a To, CC, or BCC recipient field may be created by a sender. A new email message graphical user interface having General, To, CC, and BCC fields contained within the header is provided. When an individual or group is entered into the General recipient field it is automatically delegated to the To, CC, or BCC field with which it is associated. Provisions for ensuring that recipients with multiple field associations do not exist, that recipients with a predefined association are not entered into an incorrect field, for creating a predefined association with two recipient fields, and for creating a predefined association when none exists are also provided.
    Type: Grant
    Filed: July 28, 2008
    Date of Patent: June 23, 2009
    Assignee: International Business Machines Corporation
    Inventors: Eli Kirzner, Itzhack Goldberg, Yotam Medini, Boaz Mizrachi
  • Publication number: 20080310605
    Abstract: A method for establishing a communication connection between a first communication device and a second communication device, the method comprising requesting contact information for a second communication device, during a first communication connection established between a first communication device and a third communication device; receiving the contact information from the third communication device, in response to a third party interacting with the third communication device during the first communication connection; and establishing a second communication connection between the first communication device and the second communication device based on the contact information received from the third communication device, wherein the second communication connection is established by way of the first communication device independently initiating communication with the second communication device.
    Type: Application
    Filed: June 12, 2007
    Publication date: December 18, 2008
    Inventors: Itzhack Goldberg, Samuel Kallner, Yotam Medini, Kenneth Nagin
  • Publication number: 20080208981
    Abstract: A method for providing information regarding mailing list aliases, the method including displaying an email message including at least one mailing list alias, and displaying an email address of a recipient of the email message in association with the mailing list alias.
    Type: Application
    Filed: February 28, 2007
    Publication date: August 28, 2008
    Inventors: Itzhack Goldberg, Yotam Medini, Boaz Mizrachi, Kenneth Nagin
  • Publication number: 20080201694
    Abstract: A system and method for restoring a computing system to a first operating state associated with a first system software code installed on the computing system is provided. The method comprises installing a second system software code on the computing system, while the system is operating in the first operating state. The second system software code is activated and the first system software code is deactivated to cause the computing system to operate in a second operating state. The first system software code is activated and the second system software code is deactivated to cause the system to return to the first operating state, if activation of the second system software code causes the system to operate in an undesirable manner.
    Type: Application
    Filed: February 21, 2007
    Publication date: August 21, 2008
    Inventors: Itzhack Goldberg, Yotam Medini, Kenneth Nagin, Shmuel Vashdi
  • Publication number: 20080155333
    Abstract: A method, apparatus and program storage device for providing automatic recovery from premature reboot of a system during a concurrent upgrade is disclosed. A concurrent code-load to a plurality of storage controllers of a storage system is initiated. A code-load failure is detected. The stage of the code-load failure is identified. A code-load recovery process based upon the identification of the stage that the code-load failure occurred is initiated.
    Type: Application
    Filed: December 21, 2006
    Publication date: June 26, 2008
    Applicant: International Business Machines Corporation
    Inventors: Jimmie Lee Brundidge, Chiahong Chen, Itzhack Goldberg, Yotam Medini
  • Publication number: 20080072295
    Abstract: A method and system for authentication are provided for verifying a service provider and providing a secure session. The method carried out at the service provider (402) includes: starting (403) a session with a client (401); receiving a challenge (405) from the client (401); responding to the challenge with a response (408); and sending a key (408) to the client (401) in non-OCR format, wherein the key is used for the session between the client (401) and the service provider (402). The response to the challenge is known only to the client (401) and the service provider (402). The key is used by the client (401) to encrypt (412) all the communications with the service provider (402) in the session. The response and the key may be sent to an alternative channel previously supplied by the client (401).
    Type: Application
    Filed: September 20, 2006
    Publication date: March 20, 2008
    Inventors: Nathaniel Solomon Borenstein, Michael Factor, Itzhack Goldberg, Yotam Medini, Kenneth Nagin