Patents by Inventor Yotam Medini
Yotam Medini has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 8948353Abstract: A method for establishing a communication connection between a first communication device and a second communication device, the method comprising requesting contact information for a second communication device, during a first communication connection established between a first communication device and a third communication device; receiving the contact information from the third communication device, in response to a third party interacting with the third communication device during the first communication connection; and establishing a second communication connection between the first communication device and the second communication device based on the contact information received from the third communication device, wherein the second communication connection is established by way of the first communication device independently initiating communication with the second communication device.Type: GrantFiled: June 12, 2007Date of Patent: February 3, 2015Assignee: International Business Machines CorporationInventors: Itzhack Goldberg, Samuel Kallner, Yotam Medini, Kenneth Nagin
-
Patent number: 8370925Abstract: Password aging based on the strength of the password provides an incentive for users to generate and/or memorize more complex passwords. The strength of the password is computed from a formula that relates the length of the password and the types of characters contained in the password to a strength value, which can be performed using a lookup table having values for different characteristics of the password, determining partial strength values corresponding to the ranges in which the characteristics fall, and then adding the partial strength values. Alternatively, a separate password strength application may be used to provide the strength value, which is entered by the user or administrator generating a new password. Alternatively, the password may be generated based on a specified desired expiration period, with the strength computation performed to ensure that the strength is sufficient to merit the desired expiration period.Type: GrantFiled: July 29, 2008Date of Patent: February 5, 2013Assignee: International Business Machines CorporationInventors: Rhonda L. Childress, Itzhack Goldberg, Moriel Lechtman, Yotam Medini
-
Patent number: 7783921Abstract: A system and method for restoring a computing system to a first operating state associated with a first system software code installed on the computing system is provided. The method comprises installing a second system software code on the computing system, while the system is operating in the first operating state. The second system software code is activated and the first system software code is deactivated to cause the computing system to operate in a second operating state. The first system software code is activated and the second system software code is deactivated to cause the system to return to the first operating state, if activation of the second system software code causes the system to operate in an undesirable manner.Type: GrantFiled: February 21, 2007Date of Patent: August 24, 2010Assignee: International Business Machines CorporationInventors: Itzhack Goldberg, Yotam Medini, Kenneth Nagin, Shmuel Vashdi
-
Patent number: 7661018Abstract: A method, apparatus and program storage device for providing automatic recovery from premature reboot of a system during a concurrent upgrade is disclosed. A concurrent code-load to a plurality of storage controllers of a storage system is initiated. A code-load failure is detected. The stage of the code-load failure is identified. A code-load recovery process based upon the identification of the stage that the code-load failure occurred is initiated.Type: GrantFiled: December 21, 2006Date of Patent: February 9, 2010Assignee: International Business Machines CorporationInventors: Jimmie Lee Brundidge, Chiahong Chen, Itzhack Goldberg, Yotam Medini
-
Publication number: 20100031343Abstract: Password aging based on the strength of the password provides an incentive for users to generate and/or memorize more complex passwords. The strength of the password is computed from a formula that relates the length of the password and the types of characters contained in the password to a strength value, which can be performed using a lookup table having values for different characteristics of the password, determining partial strength values corresponding to the ranges in which the characteristics fall, and then adding the partial strength values. Alternatively, a separate password strength application may be used to provide the strength value, which is entered by the user or administrator generating a new password. Alternatively, the password may be generated based on a specified desired expiration period, with the strength computation performed to ensure that the strength is sufficient to merit the desired expiration period.Type: ApplicationFiled: July 29, 2008Publication date: February 4, 2010Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Rhonda L. Childress, Itzhack Goldberg, Moriel Lechtman, Yotam Medini
-
Patent number: 7552185Abstract: A method of managing the entry of individuals or email groups into their intended recipient field within a sender's email is disclosed. A predefined, static association between an intended recipient or email group and a To, CC, or BCC recipient field may be created by a sender. A new email message graphical user interface having General, To, CC, and BCC fields contained within the header is provided. When an individual or group is entered into the General recipient field it is automatically delegated to the To, CC, or BCC field with which it is associated. Provisions for ensuring that recipients with multiple field associations do not exist, that recipients with a predefined association are not entered into an incorrect field, for creating a predefined association with two recipient fields, and for creating a predefined association when none exists are also provided.Type: GrantFiled: July 28, 2008Date of Patent: June 23, 2009Assignee: International Business Machines CorporationInventors: Eli Kirzner, Itzhack Goldberg, Yotam Medini, Boaz Mizrachi
-
Publication number: 20080310605Abstract: A method for establishing a communication connection between a first communication device and a second communication device, the method comprising requesting contact information for a second communication device, during a first communication connection established between a first communication device and a third communication device; receiving the contact information from the third communication device, in response to a third party interacting with the third communication device during the first communication connection; and establishing a second communication connection between the first communication device and the second communication device based on the contact information received from the third communication device, wherein the second communication connection is established by way of the first communication device independently initiating communication with the second communication device.Type: ApplicationFiled: June 12, 2007Publication date: December 18, 2008Inventors: Itzhack Goldberg, Samuel Kallner, Yotam Medini, Kenneth Nagin
-
Publication number: 20080208981Abstract: A method for providing information regarding mailing list aliases, the method including displaying an email message including at least one mailing list alias, and displaying an email address of a recipient of the email message in association with the mailing list alias.Type: ApplicationFiled: February 28, 2007Publication date: August 28, 2008Inventors: Itzhack Goldberg, Yotam Medini, Boaz Mizrachi, Kenneth Nagin
-
Publication number: 20080201694Abstract: A system and method for restoring a computing system to a first operating state associated with a first system software code installed on the computing system is provided. The method comprises installing a second system software code on the computing system, while the system is operating in the first operating state. The second system software code is activated and the first system software code is deactivated to cause the computing system to operate in a second operating state. The first system software code is activated and the second system software code is deactivated to cause the system to return to the first operating state, if activation of the second system software code causes the system to operate in an undesirable manner.Type: ApplicationFiled: February 21, 2007Publication date: August 21, 2008Inventors: Itzhack Goldberg, Yotam Medini, Kenneth Nagin, Shmuel Vashdi
-
Publication number: 20080155333Abstract: A method, apparatus and program storage device for providing automatic recovery from premature reboot of a system during a concurrent upgrade is disclosed. A concurrent code-load to a plurality of storage controllers of a storage system is initiated. A code-load failure is detected. The stage of the code-load failure is identified. A code-load recovery process based upon the identification of the stage that the code-load failure occurred is initiated.Type: ApplicationFiled: December 21, 2006Publication date: June 26, 2008Applicant: International Business Machines CorporationInventors: Jimmie Lee Brundidge, Chiahong Chen, Itzhack Goldberg, Yotam Medini
-
Publication number: 20080072295Abstract: A method and system for authentication are provided for verifying a service provider and providing a secure session. The method carried out at the service provider (402) includes: starting (403) a session with a client (401); receiving a challenge (405) from the client (401); responding to the challenge with a response (408); and sending a key (408) to the client (401) in non-OCR format, wherein the key is used for the session between the client (401) and the service provider (402). The response to the challenge is known only to the client (401) and the service provider (402). The key is used by the client (401) to encrypt (412) all the communications with the service provider (402) in the session. The response and the key may be sent to an alternative channel previously supplied by the client (401).Type: ApplicationFiled: September 20, 2006Publication date: March 20, 2008Inventors: Nathaniel Solomon Borenstein, Michael Factor, Itzhack Goldberg, Yotam Medini, Kenneth Nagin