Patents by Inventor Alexander PYASIK

Alexander PYASIK has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11057407
    Abstract: Detecting malware attacks is described herein. A computer-implemented method may include receiving, via a processor, events from a plurality of activity monitors. The method also include extracting, via the processor, a plurality of behavioral features from the received events. The method may further include detecting, via the processor, a malware attack based on the extracted behavioral features using a malware identification model trained on private data and public data using a machine learning technique, wherein the private data includes private enterprise attack findings. The method may also include executing, via the processor, an ad hoc protection improvement based on the detected malware attack.
    Type: Grant
    Filed: November 25, 2019
    Date of Patent: July 6, 2021
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Shlomit Avrahami, Tali Finelt, Itai Gordon, Yakir Keisar, Ilan Prager, Alexander Pyasik, Oded Sofer, Or Bar-Yaacov, Yifat Yulevich
  • Patent number: 10832164
    Abstract: Examples of techniques for generating streaming analytics applications are described herein. An example computer-implemented method includes receiving, via a processor, subject matter requirements in a semi-structured format. The method includes classifying, via the processor, the subject matter requirements based on a predefined taxonomy. The method includes extracting, via the processor, a list of entities from the subject matter requirements based on grammar. The method includes generating a solution based on a glossary and the list of extracted entities. The method includes generating, via the processor, a streaming analytics application based on the solution.
    Type: Grant
    Filed: December 1, 2016
    Date of Patent: November 10, 2020
    Assignee: International Business Machines Corporation
    Inventors: Evgeny Chernis, Leonid Gorelik, Alexander Pyasik, Anand Ranganathan, Dmitry Shusterman, Yifat Yulevich
  • Publication number: 20200092311
    Abstract: Detecting malware attacks is described herein. A computer-implemented method may include receiving, via a processor, events from a plurality of activity monitors. The method also include extracting, via the processor, a plurality of behavioral features from the received events. The method may further include detecting, via the processor, a malware attack based on the extracted behavioral features using a malware identification model trained on private data and public data using a machine learning technique, wherein the private data includes private enterprise attack findings. The method may also include executing, via the processor, an ad hoc protection improvement based on the detected malware attack.
    Type: Application
    Filed: November 25, 2019
    Publication date: March 19, 2020
    Inventors: Shlomit Avrahami, Tali Finelt, ITAI GORDON, Yakir Keisar, Ilan Prager, Alexander Pyasik, ODED SOFER, Or Bar-Yaacov, Yifat Yulevich
  • Patent number: 10530787
    Abstract: Detecting malware attacks is described herein. A computer-implemented method may include receiving, via a processor, events from a plurality of activity monitors. The method also include extracting, via the processor, a plurality of behavioral features from the received events. The method may further include detecting, via the processor, a malware attack based on the extracted behavioral features using a malware identification model trained on private data and public data. The method may also include executing, via the processor, an ad hoc protection improvement based on the detected malware attack.
    Type: Grant
    Filed: August 30, 2017
    Date of Patent: January 7, 2020
    Assignee: International Business Machines Corporation
    Inventors: Shlomit Avrahami, Tali Finelt, Itai Gordon, Yakir Keisar, Ilan Prager, Alexander Pyasik, Oded Sofer, Or Bar-Yaacov, Yifat Yulevich
  • Publication number: 20190068620
    Abstract: Detecting malware attacks is described herein. A computer-implemented method may include receiving, via a processor, events from a plurality of activity monitors. The method also include extracting, via the processor, a plurality of behavioral features from the received events. The method may further include detecting, via the processor, a malware attack based on the extracted behavioral features using a malware identification model trained on private data and public data. The method may also include executing, via the processor, an ad hoc protection improvement based on the detected malware attack.
    Type: Application
    Filed: August 30, 2017
    Publication date: February 28, 2019
    Inventors: Shlomit Avrahami, Tali Finelt, ITAI GORDON, Yakir Keisar, Ilan Prager, Alexander Pyasik, ODED SOFER, Or Bar-Yaacov, Yifat Yulevich
  • Patent number: 10169603
    Abstract: Aspects include detecting that an extract transform load (ETL) job in an ETL system has been submitted for execution. The ETL job can include an input data storage location and an output data storage location. The ETL job is analyzed to predict whether execution of the ETL job will result in sensitive information being made accessible to an unauthorized user. The analyzing can be based on a sensitivity status of contents of the input data storage location and a data lineage of contents of the output data storage location. The ETL job is prevented from executing based on predicting that execution of the ETL job will result in sensitive information being made accessible to an unauthorized user. Execution of the ETL job is initiated based on predicting that execution of the ETL job will not result in sensitive information being made accessible to an unauthorized user.
    Type: Grant
    Filed: March 16, 2016
    Date of Patent: January 1, 2019
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Shlomit Becker, Boris Melamed, Alexander Pyasik, Shani Turgeman, Gidi Weber, Yifat Yulevich
  • Patent number: 9904661
    Abstract: Techniques for informing a user about an agreement including agreement terms and trustworthiness of data source are described herein. In some examples, a processor receives agreement document data while the data is in route to a client device. A system receives network sources and content data of the agreement document. The network sources are to be processed by the processor with traffic analytics, and the content data is to be processed with text analytics. The output of these analytics is used to generate an agreement risk event for delivery to the client device with the original agreement document data.
    Type: Grant
    Filed: June 23, 2015
    Date of Patent: February 27, 2018
    Assignee: International Business Machines Corporation
    Inventors: Leonid Gorelik, Abraham Hochmann, Josemina M. Magdalen, Alexander Pyasik, Yifat Yulevich
  • Patent number: 9904662
    Abstract: Techniques for informing a user about an agreement including agreement terms and trustworthiness of data source are described herein. In some examples, a processor receives agreement document data while the data is in route to a client device. A system receives network sources and content data of the agreement document. The network sources are to be processed by the processor with traffic analytics, and the content data is to be processed with text analytics. The output of these analytics is used to generate an agreement risk event for delivery to the client device with the original agreement document data.
    Type: Grant
    Filed: May 6, 2016
    Date of Patent: February 27, 2018
    Assignee: International Business Machines Corporation
    Inventors: Leonid Gorelik, Abraham Hochmann, Josemina M. Magdalen, Alexander Pyasik, Yifat Yulevich
  • Publication number: 20180025286
    Abstract: A computer-implemented method includes receiving data representing pre-existing instances of an analytics model developed over time; detecting changes in state of the analytics model over time to detect trends; generating a new instance of the analytics model that has been modified based on detected trends in the analytics model; generating new training data based on discovered trends of the analytics model over time; comparing a coverage of the new instance of the analytics model and coverages of the pre-existing instances of the analytics model with the new training data; and determining whether new instance of the analytics model have better coverage than the pre-existing instances of the analytics model with the new training data. A corresponding computer program product and system are also disclosed.
    Type: Application
    Filed: July 25, 2016
    Publication date: January 25, 2018
    Inventors: Leonid Gorelik, Nancy L. Navarro, Srinivasan Parthasarathy, Alexander Pyasik, Yifat Yulevich
  • Patent number: 9779254
    Abstract: Examples of techniques for detecting and preventing sensitive information leaks are described herein. In one example, a method for detection of sensitive information leaks comprises computing, via a processor, a set of rules that identify sensitive information, and sending, via the processor, the set of rules to a dispatcher application using a protocol. The method can also include detecting, via the processor, that at least one data block of the transmitted data matches the set of rules, and executing, via the processor, a corrective action in response to detecting that at least one of the transmitted data blocks matches the set of rules.
    Type: Grant
    Filed: February 26, 2014
    Date of Patent: October 3, 2017
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Guy Galil, Leonid Gorelik, Alexander Pyasik, Oded Sofer, Yifat Yulevich
  • Publication number: 20170270310
    Abstract: Aspects include detecting that an extract transform load (ETL) job in an ETL system has been submitted for execution. The ETL job can include an input data storage location and an output data storage location. The ETL job is analyzed to predict whether execution of the ETL job will result in sensitive information being made accessible to an unauthorized user. The analyzing can be based on a sensitivity status of contents of the input data storage location and a data lineage of contents of the output data storage location. The ETL job is prevented from executing based on predicting that execution of the ETL job will result in sensitive information being made accessible to an unauthorized user. Execution of the ETL job is initiated based on predicting that execution of the ETL job will not result in sensitive information being made accessible to an unauthorized user.
    Type: Application
    Filed: March 16, 2016
    Publication date: September 21, 2017
    Inventors: Shlomit Becker, Boris Melamed, Alexander Pyasik, Shani Turgeman, Gidi Weber, Yifat Yulevich
  • Patent number: 9734343
    Abstract: Examples of techniques for detecting and preventing sensitive information leaks are described herein. In one example, a method for detection of sensitive information leaks includes computing, via a processor, a set of rules that identify sensitive information, and sending, via the processor, the set of rules to a dispatcher application using a protocol. The method can also include detecting, via the processor, that at least one data block of the transmitted data matches the set of rules, and executing, via the processor, a corrective action in response to detecting that at least one of the transmitted data blocks matches the set of rules.
    Type: Grant
    Filed: November 18, 2014
    Date of Patent: August 15, 2017
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Guy Galil, Leonid Gorelik, Alexander Pyasik, Oded Sofer, Yifat Yulevich
  • Publication number: 20170169359
    Abstract: Examples of techniques for generating streaming analytics applications are described herein. An example computer-implemented method includes receiving, via a processor, subject matter requirements in a semi-structured format. The method includes classifying, via the processor, the subject matter requirements based on a predefined taxonomy. The method includes extracting, via the processor, a list of entities from the subject matter requirements based on grammar. The method includes generating a solution based on a glossary and the list of extracted entities. The method includes generating, via the processor, a streaming analytics application based on the solution.
    Type: Application
    Filed: December 1, 2016
    Publication date: June 15, 2017
    Inventors: Evgeny Chernis, Leonid Gorelik, Alexander Pyasik, Anand Ranganathan, Dmitry Shusterman, Yifat Yulevich
  • Patent number: 9542655
    Abstract: Examples of techniques for generating streaming analytics applications are described herein. An example computer-implemented method includes receiving, via a processor, subject matter requirements in a semi-structured format. The method includes classifying, via the processor, the subject matter requirements based on a predefined taxonomy. The method includes extracting, via the processor, a list of entities from the subject matter requirements based on grammar. The method includes generating a solution based on a glossary and the list of extracted entities. The method includes generating, via the processor, a streaming analytics application based on the solution.
    Type: Grant
    Filed: December 9, 2015
    Date of Patent: January 10, 2017
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Evgeny Chernis, Leonid Gorelik, Alexander Pyasik, Anand Ranganathan, Dmitry Shusterman, Yifat Yulevich
  • Publication number: 20160380971
    Abstract: Techniques for informing a user about an agreement including agreement terms and trustworthiness of data source are described herein. In some examples, a processor receives agreement document data while the data is in route to a client device. A system receives network sources and content data of the agreement document. The network sources are to be processed by the processor with traffic analytics, and the content data is to be processed with text analytics. The output of these analytics is used to generate an agreement risk event for delivery to the client device with the original agreement document data.
    Type: Application
    Filed: May 6, 2016
    Publication date: December 29, 2016
    Inventors: Leonid Gorelik, Abraham Hochmann, Josemina M. Magdalen, Alexander Pyasik, Yifat Yulevich
  • Publication number: 20160381046
    Abstract: Techniques for informing a user about an agreement including agreement terms and trustworthiness of data source are described herein. In some examples, a processor receives agreement document data While the data is in route to a client device. A system receives network sources and content data of the agreement document. The network sources are to be processed by the processor with traffic analytics, and the content data is to be processed with text analytics. The output of these analytics is used to generate an agreement risk event for delivery to the client device with the original agreement document data.
    Type: Application
    Filed: June 23, 2015
    Publication date: December 29, 2016
    Inventors: Leonid Gorelik, Abraham Hochmann, Josemina M. Magdalen, Alexander Pyasik, Yifat Yulevich
  • Publication number: 20150242639
    Abstract: Examples of techniques for detecting and preventing sensitive information leaks are described herein. In one example, a method for detection of sensitive information leaks includes computing, via a processor, a set of rules that identify sensitive information, and sending, via the processor, the set of rules to a dispatcher application using a protocol. The method can also include detecting, via the processor, that at least one data block of the transmitted data matches the set of rules, and executing, via the processor, a corrective action in response to detecting that at least one of the transmitted data blocks matches the set of rules.
    Type: Application
    Filed: November 18, 2014
    Publication date: August 27, 2015
    Inventors: Guy Galil, Leonid Gorelik, Alexander Pyasik, Oded Sofer, Yifat Yulevich
  • Publication number: 20150242633
    Abstract: Examples of techniques for detecting and preventing sensitive information leaks are described herein. In one example, a method for detection of sensitive information leaks comprises computing, via a processor, a set of rules that identify sensitive information, and sending, via the processor, the set of rules to a dispatcher application using a protocol. The method can also include detecting, via the processor, that at least one data block of the transmitted data matches the set of rules, and executing, via the processor, a corrective action in response to detecting that at least one of the transmitted data blocks matches the set of rules.
    Type: Application
    Filed: February 26, 2014
    Publication date: August 27, 2015
    Applicant: International Business Machines Corporation
    Inventors: Guy Galil, Leonid Gorelik, Alexander Pyasik, Oded Sofer, Yifat Yulevich
  • Publication number: 20120259918
    Abstract: Techniques are provided for enabling communications between a business process and an external entity, by a) receiving notification data from a business process of a computer-based business process management system, b) applying a set of rules to any of the notification data to select an external entity to whom a communication will be sent, select a communications channel from among a plurality of communications channels associated with the external entity, and generate the communication from any of the notification data in a manner that conforms to the selected communications channel, and c) sending the communication to the external entity via the selected communications channel.
    Type: Application
    Filed: April 7, 2011
    Publication date: October 11, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Eran M. BRINGER, Hagit HAMDANI, Avshalom HOURI, Alexander PYASIK, Aviram SEGAL, Ofira TAL-AVIV, Daniel M. YELLIN, Yifat YULEVICH