Patents by Inventor Assaf Israel

Assaf Israel has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20230376604
    Abstract: According to examples, an apparatus may include a processor and a memory on which is stored machine-readable instructions that may cause the processor to access vulnerabilities identified in a set of container images and to identify, from a set of reference vulnerabilities, which reference vulnerabilities the identified vulnerabilities match, in which each of the reference vulnerabilities is assigned one of a plurality of mitigation priority values. The processor may also determine mitigation priority values of the identified vulnerabilities based on the mitigation priority values assigned to the reference vulnerabilities to which the identified vulnerabilities match. In addition, the processor may output the determined mitigation priority values of the identified vulnerabilities.
    Type: Application
    Filed: May 19, 2022
    Publication date: November 23, 2023
    Applicant: Microsoft Technology Licensing, LLC
    Inventors: Josef WEIZMAN, Aharon MICHAELS, Lior KESTEN, Assaf ISRAEL
  • Patent number: 11811802
    Abstract: A security threat detection system is used to monitor the physical resource usage of a hosted application in a PaaS service in order to detect anomalous behavior indicative of a security threat. The system analyzes the historical usage of the application's physical resources in order to determine the normal range of consumption of a resource by the application. A security threat alert is then provided when the application's resource consumption exceeds the normal range of consumption.
    Type: Grant
    Filed: August 21, 2020
    Date of Patent: November 7, 2023
    Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC.
    Inventors: Benyamin Farshteindiker, Assaf Israel, Tomer Weinberger
  • Publication number: 20220060490
    Abstract: A security threat detection system is used to monitor the physical resource usage of a hosted application in a PaaS service in order to detect anomalous behavior indicative of a security threat. The system analyzes the historical usage of the application's physical resources in order to determine the normal range of consumption of a resource by the application. A security threat alert is then provided when the application's resource consumption exceeds the normal range of consumption.
    Type: Application
    Filed: August 21, 2020
    Publication date: February 24, 2022
    Inventors: BENYAMIN FARSHTEINDIKER, ASSAF ISRAEL, TOMER WEINBERGER
  • Patent number: 11003766
    Abstract: Tools and techniques are described to automate triage of security and operational alerts. Insight instances extracted from raw event data associated with an alert are aggregated, vectorized, and assigned confidence scores through classification based on machine learning. Confidence scoring enables heavily loaded administrators and controls to focus attention and resources where they are most likely to protect or improve the functionality of a monitored system. Feature vectors receive a broad base in the underlying instance values through aggregation, even when the number of instance values is unknown prior to receipt of the event data. Visibility into the confidence scoring process may be provided, to allow tuning or inform further training of a classifier model. Performance metrics are defined, and production level performance may be achieved.
    Type: Grant
    Filed: August 20, 2018
    Date of Patent: May 11, 2021
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Naama Kraus, Roy Levin, Assaf Israel, Oran Brill, Yotam Livny
  • Publication number: 20200057850
    Abstract: Tools and techniques are described to automate triage of security and operational alerts. Insight instances extracted from raw event data associated with an alert are aggregated, vectorized, and assigned confidence scores through classification based on machine learning. Confidence scoring enables heavily loaded administrators and controls to focus attention and resources where they are most likely to protect or improve the functionality of a monitored system. Feature vectors receive a broad base in the underlying instance values through aggregation, even when the number of instance values is unknown prior to receipt of the event data. Visibility into the confidence scoring process may be provided, to allow tuning or inform further training of a classifier model. Performance metrics are defined, and production level performance may be achieved.
    Type: Application
    Filed: August 20, 2018
    Publication date: February 20, 2020
    Inventors: Naama KRAUS, Roy LEVIN, Assaf ISRAEL, Oran BRILL, Yotam LIVNY
  • Publication number: 20180007208
    Abstract: A method of indicating to a callee an availability status of a caller, the method includes receiving a request of the caller to be called by the callee, receiving from the caller a unique identifier and an availability status, displaying to the callee the availability status of the caller, and displaying to the caller an availability status of the callee.
    Type: Application
    Filed: January 7, 2016
    Publication date: January 4, 2018
    Applicant: Mystate Mobile (2014) Ltd.
    Inventors: Rony Haim OHAYON, Oshry MAIMON, Ami HANYA, Assaf Israel, Zvika STARKMAN
  • Publication number: 20170172651
    Abstract: A method is described, including: (i) advancing a catheter to a first portion of a renal artery, the catheter having a plurality of electrodes coupled thereto; (ii) using one or more of the electrodes to apply ablating energy at a first portion of the renal artery; (iii) using one or more of the electrodes to apply excitatory current at a second portion of the renal artery that is at or efferent to the first portion; (iv) using a physiological sensor, sensing that a physiological response to the excitatory current is below a threshold response; (v) subsequently, advancing the catheter distally, and (vi) subsequently, using one or more of the electrodes to apply ablating energy at a third portion of the renal artery that is the same as or efferent to the second portion. Other embodiments are also described.
    Type: Application
    Filed: December 17, 2015
    Publication date: June 22, 2017
    Applicant: RAINBOW MEDICAL LTD.
    Inventors: Yossi GROSS, Yehuda ZADOK, Assaf Israel Pele LEON
  • Publication number: 20170007157
    Abstract: A method includes disposing a pair of current-application electrodes in or on a body, including disposing an intrarenal current-application electrode of the pair in a renal artery. Two or more sensing electrodes are disposed in or on the body, including disposing one of the sensing electrodes on en external surface of skin. Control circuitry is activated to (a) apply an electrical current between the pair of current-application electrodes, (b) while applying the electrical current, sense an electrical signal between the sensing electrodes, including the sensing electrode disposed on the external surface of the skin, and (c) based on the electrical signal, ascertain a level of contact between the intrarenal current-application electrode and a wall of the renal artery. In response to the level of contact being less than a threshold level of contact, a disposition of the intrarenal current-application electrode in the renal artery is adjusted.
    Type: Application
    Filed: July 8, 2015
    Publication date: January 12, 2017
    Inventors: Yossi GROSS, Yehuda ZADOK, Assaf Israel Pele LEON
  • Patent number: 8370473
    Abstract: Methods and systems of computing, involve identifying a target location for live migration of virtual machine services, delivering the virtual machine services to an operating system from a source location, migrating the virtual machine services a first time via a data network from the source location to an intermediate location, delivering the virtual machine services to the operating system from the intermediate location, and migrating the virtual machine services a second time from the intermediate location to the target location via the data network. Breaks in the virtual machine services to the operating system while migrating the virtual machine are minimal.
    Type: Grant
    Filed: December 16, 2009
    Date of Patent: February 5, 2013
    Assignee: International Business Machines Corporation
    Inventors: Alexander Glikson, Assaf Israel, Dean Har'el Lorenz
  • Publication number: 20120137285
    Abstract: Systems and methods for reliably migrating a virtual machine (VM) are provided. The method comprises receiving overhead and reliability factors for hosts in a hosting fabric; determining a plurality of viable migration paths for migrating a source VM from a source host to a target host in the hosting fabric, wherein the migration is accomplished through a series of migration phases, wherein a phase involves migration of the source VM from one host to another host in a migration path; determining total overhead costs associated with each migration path; and selecting a migration path from among said plurality of migration paths according to the overhead costs and reliability factors, wherein the reliability of the migration over the selected path is monitored and controlled by dynamically allocating and de-allocating one or more replicas of the source VM on one or more hosts in the migration fabric.
    Type: Application
    Filed: November 29, 2010
    Publication date: May 31, 2012
    Applicant: International Business Machines Corporation
    Inventors: Alexander Glikson, Assaf Israel
  • Publication number: 20110145380
    Abstract: Methods and systems of computing, involve identifying a target location for live migration of virtual machine services, delivering the virtual machine services to an operating system from a source location, migrating the virtual machine services a first time via a data network from the source location to an intermediate location, delivering the virtual machine services to the operating system from the intermediate location, and migrating the virtual machine services a second time from the intermediate location to the target location via the data network. Breaks in the virtual machine services to the operating system while migrating the virtual machine are minimal.
    Type: Application
    Filed: December 16, 2009
    Publication date: June 16, 2011
    Applicant: International Business Machines Corporation
    Inventors: Alexander Glikson, Assaf Israel, Dean Har'el Lorenz