Patents by Inventor Boaz Mizrachi

Boaz Mizrachi has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10353385
    Abstract: A method enhances an emergency reporting system for controlling equipment. A message receiver receives an electronic message from a person. The electronic message is a report regarding an emergency event related to equipment. One or more processors identify a profile of the person who sent the electronic message, and determine a bias of the person regarding the emergency event based on the person's profile. One or more processors amend, based on the bias of the person, a content of the electronic message to create a modified electronic message regarding the emergency event. The message receiver detects that the modified electronic message came from an unauthorized source. A local controller on the equipment, in response to detecting that the modified electronic message came from the unauthorized source, automatically isolates the equipment from remote control signals for controlling the equipment.
    Type: Grant
    Filed: September 28, 2018
    Date of Patent: July 16, 2019
    Assignee: International Business Machines Corporation
    Inventors: Aaron K. Baughman, Oded Dubovsky, James R. Kozloski, Boaz Mizrachi, Clifford A. Pickover
  • Publication number: 20190098501
    Abstract: Approaches presented herein enable challenge-response authentication of a user based on information captured by a personal internet of things (IoT) device set associated with the user. Specifically, in one approach, a personal IoT device set comprising at least one device records and stores data associated with a user. The data is synchronized and stored to a computerized authentication system, which prompts the user with an authentication question based on the synchronized and stored data. The user may find an answer to the authentication question by reviewing data recorded and stored in the device of the personal IoT device set. The user may then enter the found answer to the authentication question, thereby authenticating the user. The personal IoT device set may comprise a single device or may comprise a plurality of devices, the information of one of which may be selected as the basis of the authentication question.
    Type: Application
    Filed: November 21, 2018
    Publication date: March 28, 2019
    Inventors: Rhonda L. Childress, Itzhack Goldberg, Boaz Mizrachi, Clifford A. Pickover, Neil Sondhi
  • Patent number: 10231122
    Abstract: Approaches presented herein enable challenge-response authentication of a user based on information captured by a personal internet of things (IoT) device set associated with the user. Specifically, in one approach, a personal IoT device set comprising at least one device records and stores data associated with a user. The data is synchronized and stored to a computerized authentication system, which prompts the user with an authentication question based on the synchronized and stored data. The user may find an answer to the authentication question by reviewing data recorded and stored in the device of the personal IoT device set. The user may then enter the found answer to the authentication question, thereby authenticating the user. The personal IoT device set may comprise a single device or may comprise a plurality of devices, the information of one of which may be selected as the basis of the authentication question.
    Type: Grant
    Filed: April 27, 2015
    Date of Patent: March 12, 2019
    Assignee: International Business Machines Corporation
    Inventors: Rhonda L. Childress, Itzhack Goldberg, Boaz Mizrachi, Clifford A. Pickover, Neil Sondhi
  • Publication number: 20190033841
    Abstract: A method enhances an emergency reporting system for controlling equipment. A message receiver receives an electronic message from a person. The electronic message is a report regarding an emergency event related to equipment. One or more processors identify a profile of the person who sent the electronic message, and determine a bias of the person regarding the emergency event based on the person's profile. One or more processors amend, based on the bias of the person, a content of the electronic message to create a modified electronic message regarding the emergency event. The message receiver detects that the modified electronic message came from an unauthorized source. A local controller on the equipment, in response to detecting that the modified electronic message came from the unauthorized source, automatically isolates the equipment from remote control signals for controlling the equipment.
    Type: Application
    Filed: September 28, 2018
    Publication date: January 31, 2019
    Inventors: Aaron K. Baughman, Oded Dubovsky, James R. Kozloski, Boaz Mizrachi, Clifford A. Pickover
  • Patent number: 10162345
    Abstract: A method enhances an emergency reporting system for controlling equipment. A message receiver receives an electronic message from a person. The electronic message is a report regarding an emergency event. One or more processors identify a profile of the person who sent the electronic message, and determine a bias of the person regarding the emergency event based on the person's profile. One or more processors amend, based on the bias of the person, a content of the electronic message to create a modified electronic message regarding the emergency event. The modified electronic message is consolidated with other modified electronic messages into a bias-corrected report about the emergency event. One or more processors then automatically adjust equipment based on the bias-corrected report about the emergency event.
    Type: Grant
    Filed: April 21, 2015
    Date of Patent: December 25, 2018
    Assignee: International Business Machines Corporation
    Inventors: Aaron K. Baughman, Oded Dubovsky, James R. Kozloski, Boaz Mizrachi, Clifford A. Pickover
  • Patent number: 10025457
    Abstract: Techniques for display a file folder are described herein. In one example, a system includes a processor to detect a transmission of one or more files from a file folder to a service and calculate a popularity value for each of the one or more files based on detected feedback from the service. The processor can also display the file with the highest popularity value as an icon for the file folder.
    Type: Grant
    Filed: October 18, 2015
    Date of Patent: July 17, 2018
    Assignee: International Business Machines Corporation
    Inventors: Boaz Mizrachi, Lisa S DeLuca
  • Patent number: 9985971
    Abstract: An aspect includes a cognitive password entry system. A processor detects a login attempt targeting a website for a user identifier having a previously stored instance of a password associated with the user identifier. A number of login attempts is monitored since the password was manually entered at the website. The processor determines whether a prompting period has been reached based on the number of login attempts meeting a prompting period threshold. The stored instance of the password is used as an entered password for the login attempt based on determining that the prompting period has not been reached. A cognitive aid prompt is output based on determining that the prompting period has been reached.
    Type: Grant
    Filed: September 29, 2015
    Date of Patent: May 29, 2018
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Lisa Seacat DeLuca, James R. Kozloski, Boaz Mizrachi, Clifford A. Pickover
  • Patent number: 9942234
    Abstract: An aspect includes a cognitive password entry system. A processor detects a login attempt targeting a website for a user identifier having a previously stored instance of a password associated with the user identifier. A number of login attempts is monitored since the password was manually entered at the website. The processor determines whether a prompting period has been reached based on the number of login attempts meeting a prompting period threshold. The stored instance of the password is used as an entered password for the login attempt based on determining that the prompting period has not been reached. A cognitive aid prompt is output based on determining that the prompting period has been reached.
    Type: Grant
    Filed: November 30, 2015
    Date of Patent: April 10, 2018
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Lisa Seacat DeLuca, James R. Kozloski, Boaz Mizrachi, Clifford A. Pickover
  • Patent number: 9832787
    Abstract: Techniques are described for attention management. In one embodiment, a computer program product comprising a computer-readable storage medium has program code embodied therewith. The program code is executable by a computing device to build a communication history between two or more users, perform an analysis of the communication history for a pattern of communication between the two or more users, and generate an assessment based on the analysis. The communication history may include data from multiple different communication systems.
    Type: Grant
    Filed: July 31, 2015
    Date of Patent: November 28, 2017
    Assignee: International Business Machines Corporation
    Inventors: Matthew E. Broomhall, Itzhack Goldberg, Bruce Kahn, Boaz Mizrachi, Neil Sondhi
  • Publication number: 20170109010
    Abstract: Techniques for display a file folder are described herein. In one example, a system includes a processor to detect a transmission of one or more files from a file folder to a service and calculate a popularity value for each of the one or more files based on detected feedback from the service. The processor can also display the file with the highest popularity value as an icon for the file folder.
    Type: Application
    Filed: October 18, 2015
    Publication date: April 20, 2017
    Inventors: Boaz Mizrachi, Lisa S. DeLuca
  • Publication number: 20170093841
    Abstract: An aspect includes a cognitive password entry system. A processor detects a login attempt targeting a website for a user identifier having a previously stored instance of a password associated with the user identifier. A number of login attempts is monitored since the password was manually entered at the website. The processor determines whether a prompting period has been reached based on the number of login attempts meeting a prompting period threshold. The stored instance of the password is used as an entered password for the login attempt based on determining that the prompting period has not been reached. A cognitive aid prompt is output based on determining that the prompting period has been reached.
    Type: Application
    Filed: November 30, 2015
    Publication date: March 30, 2017
    Inventors: Lisa Seacat DeLuca, James R. Kozloski, Boaz Mizrachi, Clifford A. Pickover
  • Publication number: 20170093862
    Abstract: An aspect includes a cognitive password entry system. A processor detects a login attempt targeting a website for a user identifier having a previously stored instance of a password associated with the user identifier. A number of login attempts is monitored since the password was manually entered at the website. The processor determines whether a prompting period has been reached based on the number of login attempts meeting a prompting period threshold. The stored instance of the password is used as an entered password for the login attempt based on determining that the prompting period has not been reached. A cognitive aid prompt is output based on determining that the prompting period has been reached.
    Type: Application
    Filed: September 29, 2015
    Publication date: March 30, 2017
    Inventors: Lisa Seacat DeLuca, James R. Kozloski, Boaz Mizrachi, Clifford A. Pickover
  • Publication number: 20170034726
    Abstract: Techniques are described for attention management. In one embodiment, a computer program product comprising a computer-readable storage medium has program code embodied therewith. The program code is executable by a computing device to build a communication history between two or more users, perform an analysis of the communication history for a pattern of communication between the two or more users, and generate an assessment based on the analysis. The communication history may include data from multiple different communication systems.
    Type: Application
    Filed: July 31, 2015
    Publication date: February 2, 2017
    Inventors: Matthew E. Broomhall, ltzhack Goldberg, Bruce Kahn, Boaz Mizrachi, Neil Sondhi
  • Publication number: 20160315929
    Abstract: Approaches presented herein enable challenge-response authentication of a user based on information captured by a personal internet of things (IoT) device set associated with the user. Specifically, in one approach, a personal IoT device set comprising at least one device records and stores data associated with a user. The data is synchronized and stored to a computerized authentication system, which prompts the user with an authentication question based on the synchronized and stored data. The user may find an answer to the authentication question by reviewing data recorded and stored in the device of the personal IoT device set. The user may then enter the found answer to the authentication question, thereby authenticating the user. The personal IoT device set may comprise a single device or may comprise a plurality of devices, the information of one of which may be selected as the basis of the authentication question.
    Type: Application
    Filed: April 27, 2015
    Publication date: October 27, 2016
    Inventors: Rhonda L. Childress, Itzhack Goldberg, Boaz Mizrachi, Clifford A. Pickover, Neil Sondhi
  • Publication number: 20160313708
    Abstract: A method enhances an emergency reporting system for controlling equipment. A message receiver receives an electronic message from a person. The electronic message is a report regarding an emergency event. One or more processors identify a profile of the person who sent the electronic message, and determine a bias of the person regarding the emergency event based on the person's profile. One or more processors amend, based on the bias of the person, a content of the electronic message to create a modified electronic message regarding the emergency event. The modified electronic message is consolidated with other modified electronic messages into a bias-corrected report about the emergency event. One or more processors then automatically adjust equipment based on the bias-corrected report about the emergency event.
    Type: Application
    Filed: April 21, 2015
    Publication date: October 27, 2016
    Inventors: Aaron K. Baughman, Oded Dubovsky, James R. Kozloski, Boaz Mizrachi, Clifford A. Pickover
  • Patent number: 9368102
    Abstract: A method and system are provided for text-to-speech synthesis with personalized voice. The method includes receiving an incidental audio input (403) of speech in the form of an audio communication from an input speaker (401) and generating a voice dataset (404) for the input speaker (401). The method includes receiving a text input (411) at the same device as the audio input (403) and synthesizing (312) the text from the text input (411) to synthesized speech including using the voice dataset (404) to personalize the synthesized speech to sound like the input speaker (401). In addition, the method includes analyzing (316) the text for expression and adding the expression (315) to the synthesized speech. The audio communication may be part of a video communication (453) and the audio input (403) may have an associated visual input (455) of an image of the input speaker.
    Type: Grant
    Filed: October 10, 2014
    Date of Patent: June 14, 2016
    Assignee: Nuance Communications, Inc.
    Inventors: Itzhack Goldberg, Ron Hoory, Boaz Mizrachi, Zvi Kons
  • Patent number: 9307374
    Abstract: The program code identifies a problem with a first mobile computing device, wherein the problem is capable of preventing completion of an action attempted by a first end-user via the first mobile computing device. In response to identifying the problem, the program code determines the first end-user wants to complete the action on a first peer mobile computing device of a second end-user. The program code scans a computer network to identify the first peer mobile computing device and other peer mobile computing devices on which to complete the action. The program code grants access to a copy of information to complete the action on the first peer mobile computing device. The program code revokes access to the copy of information.
    Type: Grant
    Filed: June 19, 2013
    Date of Patent: April 5, 2016
    Assignee: GLOBALFOUNDRIES INC.
    Inventors: Lisa Seacat DeLuca, Boaz Mizrachi
  • Publication number: 20150294012
    Abstract: Displaying a representative item for a collection of items includes obtaining, from at least one source, a history of interests associated with a user, analyzing the history of interests associated with the user to determine preference criteria for the user, identifying, based on the preference criteria for the user, a representative item for a collection of items, and displaying, to the user, the representative item.
    Type: Application
    Filed: February 25, 2015
    Publication date: October 15, 2015
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Lisa Seacat DeLuca, Ido Guy, Nili Guy, Boaz Mizrachi
  • Publication number: 20150293982
    Abstract: Displaying a representative item for a collection of items includes obtaining, from at least one source, a history of interests associated with a user, analyzing the history of interests associated with the user to determine preference criteria for the user, identifying, based on the preference criteria for the user, a representative item for a collection of items, and displaying, to the user, the representative item.
    Type: Application
    Filed: April 14, 2014
    Publication date: October 15, 2015
    Applicant: International Business Machines Corporation
    Inventors: Lisa Seacat DeLuca, Ido Guy, Nili Guy, Boaz Mizrachi
  • Patent number: 9014634
    Abstract: An embodiment of the invention provides a method for social network based Wi-Fi, wherein an antenna of a mobile electronic device identifies at least one wireless network within range of the mobile electronic device, and wherein owner(s) of the wireless network(s) are identified with a processor. Relationship status(es) between the owner of the mobile electronic device and the owner(s) of the wireless network(s) are determined with an analysis engine. The wireless network(s) and the relationship status(es) between the owner of the mobile electronic device and the owner(s) of the wireless network(s) are displayed on the mobile electronic device. A request to access a wireless network is received from the owner of the mobile electronic device. Access to the wireless network is automatically granting when the relationship status between the owner of the mobile electronic device and the owner of the wireless network is above a predetermined threshold.
    Type: Grant
    Filed: May 14, 2013
    Date of Patent: April 21, 2015
    Assignee: International Business Machines Corporation
    Inventors: Lisa Seacat DeLuca, Ido Guy, Boaz Mizrachi