Patents by Inventor Arie Friedman
Arie Friedman has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20230004296Abstract: Various examples herein described are directed to methods, apparatuses and computer program products configured for dynamically replicating and/or converting source data objects in one or more external-access-limited source data object repositories to replica data objects in one or more external-service-accessible replica data object repositories in a network service cloud. For example, a network service server of the network service cloud may generate a plurality of bootstrap task objects and at least one change data capture (CDC) task object, and may generate the replica data objects based on the task objects.Type: ApplicationFiled: June 30, 2021Publication date: January 5, 2023Inventors: Rohan DHUPELIA, Stephen LEE, Carlos KHATCHIKIAN, Jon HARTLAUB, Arie FRIEDMAN, Benjamin JACKSON
-
Patent number: 11537311Abstract: Various examples herein described are directed to methods, apparatuses and computer program products configured for dynamically replicating and/or converting source data objects in one or more external-access-limited source data object repositories to replica data objects in one or more external-service-accessible replica data object repositories in a network service cloud. For example, a network service server of the network service cloud may generate a plurality of bootstrap task objects and at least one change data capture (CDC) task object, and may generate the replica data objects based on the task objects.Type: GrantFiled: June 30, 2021Date of Patent: December 27, 2022Assignees: ATLASSIAN PTY LTD, ATLASSIAN, INC.Inventors: Rohan Dhupelia, Stephen Lee, Carlos Khatchikian, Jon Hartlaub, Arie Friedman, Benjamin Jackson
-
Publication number: 20210073399Abstract: An online service may maintain or create data for a user, and a user may be allowed to exert control over how the data are used. In one example, there may be several categories of data, and the user may be able to specify who may use the data, and the purpose for which the data may be used. Additionally, a user may be able to see how many of his “friends” (or other contacts) have extended trust to a particular entity, which may aid the user in making a decision about whether to extend trust to that entity. User interfaces may be provided to allow users to specify how their data are to be used.Type: ApplicationFiled: November 20, 2020Publication date: March 11, 2021Inventors: Arie Friedman, Hadas Bitran, Uri Barash, Marc Davis, Oded Nahir
-
Patent number: 10853505Abstract: An online service may maintain or create data for a user, and a user may be allowed to exert control over how the data are used. In one example, there may be several categories of data, and the user may be able to specify who may use the data, and the purpose for which the data may be used. Additionally, a user may be able to see how many of his “friends” (or other contacts) have extended trust to a particular entity, which may aid the user in making a decision about whether to extend trust to that entity. User interfaces may be provided to allow users to specify how their data are to be used.Type: GrantFiled: December 30, 2011Date of Patent: December 1, 2020Assignee: Microsoft Technology Licensing, LLCInventors: Arie Friedman, Hadas Bitran, Uri Barash, Marc Davis, Oded Nahir
-
Patent number: 10360392Abstract: This disclosure relates to generating shares of secret data represented by secret data elements based on a first threshold for the number of shares that allow determining the secret data. The shares are determined based on the secret data, one or more random data elements added to the secret data and coefficients of a systematic maximum distance separable (MDS) code. The MDS code has a number of input data elements that is equal to the first threshold and that is also equal to the number of secret data elements plus the number of the one or more random data elements. The method of determining shares can be used for different data sets and multiple pairs of the shares can be generated to allow performing an operation between the first secret data with the second secret data based on distributed processing of each of the multiple pairs.Type: GrantFiled: July 31, 2015Date of Patent: July 23, 2019Assignee: National ICT Australia LimitedInventors: Guillaume Smith, Roksana Boreli, Arie Friedman, Mentari Djatmiko
-
Patent number: 10284679Abstract: Embodiments of the present invention relate to systems, methods, and computer-storage media for maintaining privacy while delivering advertisements based on encrypted user profile identifiers. In embodiments, a Public key Encryption with Keyword Search (PEKS) is used to generate a public key and a private key. In embodiments, a public key and a private key are used to encrypt user profile identifiers and generate trapdoors associated with defined profile identifiers, respectively. A portion of the encrypted user profile identifiers are compared to a portion of the trapdoors. If a match is present between at least one encrypted user profile identifier and an associated trapdoor, a delivery engine is provided with an identification of content to be delivered to the user. The provided description is then used to determine an advertisement to present to a user. The advertisement is then presented to the user.Type: GrantFiled: January 7, 2010Date of Patent: May 7, 2019Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Nir Nice, Ehud Wieder, Arie Friedman
-
Patent number: 9536087Abstract: Systems, methods, and computer program products are described for controlling malicious activity detection with respect to information technology assets based on behavioral models associated with the respective information technology assets. Protection rules and corresponding sensitivities associated with the behavioral models are applied by protection services to detect malicious activity with respect to the information technology assets.Type: GrantFiled: August 1, 2015Date of Patent: January 3, 2017Assignee: Microsoft Technology Licensing, LLCInventors: Shai A. Rubin, Yosef Dinerstein, Efim Hudis, Yair Helman, Uri Barash, Arie Friedman
-
Publication number: 20150350230Abstract: Systems, methods, and computer program products are described for controlling malicious activity detection with respect to information technology assets based on behavioral models associated with the respective information technology assets. Protection rules and corresponding sensitivities associated with the behavioral models are applied by protection services to detect malicious activity with respect to the information technology assets.Type: ApplicationFiled: August 1, 2015Publication date: December 3, 2015Inventors: Shai A. Rubin, Yosef Dinerstein, Efim Hudis, Yair Helman, Uri Barash, Arie Friedman
-
Patent number: 9098702Abstract: Systems, methods, and computer program products are described for controlling malicious activity detection with respect to information technology assets based on behavioral models associated with the respective information technology assets. Protection rules and corresponding sensitivities associated with the behavioral models are applied by protection services to detect malicious activity with respect to the information technology assets.Type: GrantFiled: July 15, 2013Date of Patent: August 4, 2015Assignee: Microsoft Technology Licensing, LLCInventors: Shai A. Rubin, Yosef Dinerstein, Efim Hudis, Yair Helman, Uri Barash, Arie Friedman
-
Patent number: 8607305Abstract: Aspects of the subject matter described herein relate to collecting anonymous and traceable telemetry. In aspects, a telemetry source may obtain a certificate or other data from an escrow certificate issuer. The certificate includes information usable by a certificate collector to verify that the certificate is valid, but does not include information usable to identify the telemetry source to the telemetry collector.Type: GrantFiled: September 1, 2008Date of Patent: December 10, 2013Assignee: Microsoft CorporationInventors: John Neystadt, Arie Friedman, Gregory Aaron Kohanim, Adam Shostack
-
Publication number: 20130305374Abstract: Systems, methods, and computer program products are described for controlling malicious activity detection with respect to information technology assets based on behavioral models associated with the respective information technology assets. Protection rules and corresponding sensitivities associated with the behavioral models are applied by protection services to detect malicious activity with respect to the information technology assets.Type: ApplicationFiled: July 15, 2013Publication date: November 14, 2013Inventors: Shai A. Rubin, Yosef Dinerstein, Efim Hudis, Yair Helman, Uri Barash, Arie Friedman
-
Patent number: 8520842Abstract: Systems, methods, and computer storage media having computer-executable instructions embodied thereon that maintain privacy during user profiling are provided. A profiling service receives, from a first device, rules for profiling a user. The rules were encrypted using a private key. The profiling service also receives, from a second device, user data. The user data was encrypted using a public key communicated to the second device by the first device. The profiling service then matches the encrypted rules with the encrypted user data, and based on the matching, generates a profile for the user. In embodiments, such a user profile can be utilized to deliver personalized digital content to a user.Type: GrantFiled: January 7, 2010Date of Patent: August 27, 2013Assignee: Microsoft CorporationInventors: Nir Nice, Ehud Wieder, Boaz Feldbaum, Sefy Ophir, Eran Shamir, Yacov Yacobi, Arie Friedman
-
Patent number: 8490187Abstract: Systems, methods, and computer program products are described for controlling malicious activity detection with respect to information technology assets based on behavioral models associated with the respective information technology assets. Protection rules and corresponding sensitivities associated with the behavioral models are applied by protection services to detect malicious activity with respect to the information technology assets.Type: GrantFiled: March 20, 2009Date of Patent: July 16, 2013Assignee: Microsoft CorporationInventors: Shai A. Rubin, Yosef Dinerstein, Efim Hudis, Yair Helman, Uri Barash, Arie Friedman
-
Publication number: 20130174274Abstract: An online service may maintain or create data for a user, and a user may be allowed to exert control over how the data are used. In one example, there may be several categories of data, and the user may be able to specify who may use the data, and the purpose for which the data may be used. Additionally, a user may be able to see how many of his “friends” (or other contacts) have extended trust to a particular entity, which may aid the user in making a decision about whether to extend trust to that entity. User interfaces may be provided to allow users to specify how their data are to be used.Type: ApplicationFiled: December 30, 2011Publication date: July 4, 2013Applicant: MICROSOFT CORPORATIONInventors: Arie Friedman, Hadas Bitran, Uri Barash, Marc Davis, Oded Nahir
-
Patent number: 8402537Abstract: Aspects of the subject matter described herein relate to tuning detection components of a security system. In aspects, a history of alerts is collected. This history is then used together with knowledge about tunable objects of the system to determine parameters of the tunable objects that can be changed to improve detection of the system. Parameters of tunable objects are adjusted in a simulator that determines an effect on alerts in the history based on the adjusted parameters. A recommendation of one or more tuning actions may be provided together with information regarding the effect of each tuning action.Type: GrantFiled: September 26, 2008Date of Patent: March 19, 2013Assignee: Microsoft CorporationInventors: Arie Friedman, Shai Aharon Rubin, Lior Arzi, Ron J. Karidi
-
Publication number: 20110164746Abstract: Systems, methods, and computer storage media having computer-executable instructions embodied thereon that maintain privacy during user profiling are provided. A profiling service receives, from a first device, rules for profiling a user. The rules were encrypted using a private key. The profiling service also receives, from a second device, user data. The user data was encrypted using a public key communicated to the second device by the first device. The profiling service then matches the encrypted rules with the encrypted user data, and based on the matching, generates a profile for the user. In embodiments, such a user profile can be utilized to deliver personalized digital content to a user.Type: ApplicationFiled: January 7, 2010Publication date: July 7, 2011Applicant: MICROSOFT CORPORATIONInventors: NIR NICE, EHUD WIEDER, BOAZ FELDBAUM, SEFY OPHIR, ERAN SHAMIR, YACOV YACOBI, ARIE FRIEDMAN
-
Patent number: D665407Type: GrantFiled: January 24, 2011Date of Patent: August 14, 2012Assignee: Microsoft CorporationInventors: Hadas Bitran, Arie Friedman, Dana Cohen Baron
-
Patent number: D670726Type: GrantFiled: January 24, 2011Date of Patent: November 13, 2012Assignee: Microsoft CorporationInventors: Hadas Bitran, Arie Friedman, Dana Cohen Baron
-
Patent number: D681653Type: GrantFiled: January 24, 2011Date of Patent: May 7, 2013Assignee: Microsoft CorporationInventors: Hadas Bitran, Arie Friedman, Dana Cohen Baron
-
Patent number: D697940Type: GrantFiled: November 5, 2012Date of Patent: January 21, 2014Assignee: Microsoft CorporationInventors: Hadas Bitran, Arie Friedman, Dana Cohen Baron