Patents by Inventor Assaf Israel
Assaf Israel has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20230376604Abstract: According to examples, an apparatus may include a processor and a memory on which is stored machine-readable instructions that may cause the processor to access vulnerabilities identified in a set of container images and to identify, from a set of reference vulnerabilities, which reference vulnerabilities the identified vulnerabilities match, in which each of the reference vulnerabilities is assigned one of a plurality of mitigation priority values. The processor may also determine mitigation priority values of the identified vulnerabilities based on the mitigation priority values assigned to the reference vulnerabilities to which the identified vulnerabilities match. In addition, the processor may output the determined mitigation priority values of the identified vulnerabilities.Type: ApplicationFiled: May 19, 2022Publication date: November 23, 2023Applicant: Microsoft Technology Licensing, LLCInventors: Josef WEIZMAN, Aharon MICHAELS, Lior KESTEN, Assaf ISRAEL
-
Patent number: 11811802Abstract: A security threat detection system is used to monitor the physical resource usage of a hosted application in a PaaS service in order to detect anomalous behavior indicative of a security threat. The system analyzes the historical usage of the application's physical resources in order to determine the normal range of consumption of a resource by the application. A security threat alert is then provided when the application's resource consumption exceeds the normal range of consumption.Type: GrantFiled: August 21, 2020Date of Patent: November 7, 2023Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC.Inventors: Benyamin Farshteindiker, Assaf Israel, Tomer Weinberger
-
Publication number: 20220060490Abstract: A security threat detection system is used to monitor the physical resource usage of a hosted application in a PaaS service in order to detect anomalous behavior indicative of a security threat. The system analyzes the historical usage of the application's physical resources in order to determine the normal range of consumption of a resource by the application. A security threat alert is then provided when the application's resource consumption exceeds the normal range of consumption.Type: ApplicationFiled: August 21, 2020Publication date: February 24, 2022Inventors: BENYAMIN FARSHTEINDIKER, ASSAF ISRAEL, TOMER WEINBERGER
-
Patent number: 11003766Abstract: Tools and techniques are described to automate triage of security and operational alerts. Insight instances extracted from raw event data associated with an alert are aggregated, vectorized, and assigned confidence scores through classification based on machine learning. Confidence scoring enables heavily loaded administrators and controls to focus attention and resources where they are most likely to protect or improve the functionality of a monitored system. Feature vectors receive a broad base in the underlying instance values through aggregation, even when the number of instance values is unknown prior to receipt of the event data. Visibility into the confidence scoring process may be provided, to allow tuning or inform further training of a classifier model. Performance metrics are defined, and production level performance may be achieved.Type: GrantFiled: August 20, 2018Date of Patent: May 11, 2021Assignee: Microsoft Technology Licensing, LLCInventors: Naama Kraus, Roy Levin, Assaf Israel, Oran Brill, Yotam Livny
-
Publication number: 20200057850Abstract: Tools and techniques are described to automate triage of security and operational alerts. Insight instances extracted from raw event data associated with an alert are aggregated, vectorized, and assigned confidence scores through classification based on machine learning. Confidence scoring enables heavily loaded administrators and controls to focus attention and resources where they are most likely to protect or improve the functionality of a monitored system. Feature vectors receive a broad base in the underlying instance values through aggregation, even when the number of instance values is unknown prior to receipt of the event data. Visibility into the confidence scoring process may be provided, to allow tuning or inform further training of a classifier model. Performance metrics are defined, and production level performance may be achieved.Type: ApplicationFiled: August 20, 2018Publication date: February 20, 2020Inventors: Naama KRAUS, Roy LEVIN, Assaf ISRAEL, Oran BRILL, Yotam LIVNY
-
Publication number: 20180007208Abstract: A method of indicating to a callee an availability status of a caller, the method includes receiving a request of the caller to be called by the callee, receiving from the caller a unique identifier and an availability status, displaying to the callee the availability status of the caller, and displaying to the caller an availability status of the callee.Type: ApplicationFiled: January 7, 2016Publication date: January 4, 2018Applicant: Mystate Mobile (2014) Ltd.Inventors: Rony Haim OHAYON, Oshry MAIMON, Ami HANYA, Assaf Israel, Zvika STARKMAN
-
Publication number: 20170172651Abstract: A method is described, including: (i) advancing a catheter to a first portion of a renal artery, the catheter having a plurality of electrodes coupled thereto; (ii) using one or more of the electrodes to apply ablating energy at a first portion of the renal artery; (iii) using one or more of the electrodes to apply excitatory current at a second portion of the renal artery that is at or efferent to the first portion; (iv) using a physiological sensor, sensing that a physiological response to the excitatory current is below a threshold response; (v) subsequently, advancing the catheter distally, and (vi) subsequently, using one or more of the electrodes to apply ablating energy at a third portion of the renal artery that is the same as or efferent to the second portion. Other embodiments are also described.Type: ApplicationFiled: December 17, 2015Publication date: June 22, 2017Applicant: RAINBOW MEDICAL LTD.Inventors: Yossi GROSS, Yehuda ZADOK, Assaf Israel Pele LEON
-
Publication number: 20170007157Abstract: A method includes disposing a pair of current-application electrodes in or on a body, including disposing an intrarenal current-application electrode of the pair in a renal artery. Two or more sensing electrodes are disposed in or on the body, including disposing one of the sensing electrodes on en external surface of skin. Control circuitry is activated to (a) apply an electrical current between the pair of current-application electrodes, (b) while applying the electrical current, sense an electrical signal between the sensing electrodes, including the sensing electrode disposed on the external surface of the skin, and (c) based on the electrical signal, ascertain a level of contact between the intrarenal current-application electrode and a wall of the renal artery. In response to the level of contact being less than a threshold level of contact, a disposition of the intrarenal current-application electrode in the renal artery is adjusted.Type: ApplicationFiled: July 8, 2015Publication date: January 12, 2017Inventors: Yossi GROSS, Yehuda ZADOK, Assaf Israel Pele LEON
-
Patent number: 8370473Abstract: Methods and systems of computing, involve identifying a target location for live migration of virtual machine services, delivering the virtual machine services to an operating system from a source location, migrating the virtual machine services a first time via a data network from the source location to an intermediate location, delivering the virtual machine services to the operating system from the intermediate location, and migrating the virtual machine services a second time from the intermediate location to the target location via the data network. Breaks in the virtual machine services to the operating system while migrating the virtual machine are minimal.Type: GrantFiled: December 16, 2009Date of Patent: February 5, 2013Assignee: International Business Machines CorporationInventors: Alexander Glikson, Assaf Israel, Dean Har'el Lorenz
-
Publication number: 20120137285Abstract: Systems and methods for reliably migrating a virtual machine (VM) are provided. The method comprises receiving overhead and reliability factors for hosts in a hosting fabric; determining a plurality of viable migration paths for migrating a source VM from a source host to a target host in the hosting fabric, wherein the migration is accomplished through a series of migration phases, wherein a phase involves migration of the source VM from one host to another host in a migration path; determining total overhead costs associated with each migration path; and selecting a migration path from among said plurality of migration paths according to the overhead costs and reliability factors, wherein the reliability of the migration over the selected path is monitored and controlled by dynamically allocating and de-allocating one or more replicas of the source VM on one or more hosts in the migration fabric.Type: ApplicationFiled: November 29, 2010Publication date: May 31, 2012Applicant: International Business Machines CorporationInventors: Alexander Glikson, Assaf Israel
-
Publication number: 20110145380Abstract: Methods and systems of computing, involve identifying a target location for live migration of virtual machine services, delivering the virtual machine services to an operating system from a source location, migrating the virtual machine services a first time via a data network from the source location to an intermediate location, delivering the virtual machine services to the operating system from the intermediate location, and migrating the virtual machine services a second time from the intermediate location to the target location via the data network. Breaks in the virtual machine services to the operating system while migrating the virtual machine are minimal.Type: ApplicationFiled: December 16, 2009Publication date: June 16, 2011Applicant: International Business Machines CorporationInventors: Alexander Glikson, Assaf Israel, Dean Har'el Lorenz