Patents by Inventor Boris Spivak
Boris Spivak has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20220159029Abstract: Disclosed embodiments relate to systems and methods for detecting and addressing security risks in remote native access sessions. Techniques include identifying a remote native access session between a client and a target resource. The techniques may further include identifying connection data associated with the remote native access session obtained by a connection agent, wherein the connection data originates from the client and from a mobile device associated with a user, and comprises data indicative of at least one of: hardware of the client or mobile device, configuration settings of the client or mobile device, and network connection attributes of the client or mobile device. Techniques may further include comparing a first portion of the connection data associated with the client with a second portion of the connection data associated with the mobile device; and determining, based on the comparing, a security risk associated with the remote native access session.Type: ApplicationFiled: July 6, 2021Publication date: May 19, 2022Applicant: CyberArk Software Ltd.Inventors: Arthur BENDERSKY, Tal ZIGMAN, Nir POPIK, Boris SPIVAK
-
Patent number: 10985924Abstract: Disclosed embodiments relate to verifying identities based on identity-inherent data that is inaccessible to the system. Techniques include receiving, from a client, an encrypted token, the encrypted token having been encrypted at the client using a cryptographic key created at the client based on identity-inherent data of an identity of the client; wherein the identity-inherent data of the identity is not itself received by the system, and wherein the cryptographic key is accessible only to the client; and storing the encrypted token in association with a hash of a decrypted version of the encrypted token to allow for comparing the stored hash with a created hash and determining whether to verify the identity based on a result of the comparing.Type: GrantFiled: August 4, 2020Date of Patent: April 20, 2021Assignee: CYBERARK SOFTWARE LTD.Inventors: Evgeni Aizikovich, Boris Spivak, Michael Yavnilovich, Tal Kandel, Hadas Elkabir
-
Publication number: 20210028941Abstract: Disclosed embodiments relate to verifying identities based on identity-inherent data that is inaccessible to the system. Techniques include receiving, from a client, an encrypted token, the encrypted token having been encrypted at the client using a cryptographic key created at the client based on identity-inherent data of an identity of the client; wherein the identity-inherent data of the identity is not itself received by the system, and wherein the cryptographic key is accessible only to the client; and storing the encrypted token in association with a hash of a decrypted version of the encrypted token to allow for comparing the stored hash with a created hash and determining whether to verify the identity based on a result of the comparing.Type: ApplicationFiled: August 4, 2020Publication date: January 28, 2021Applicant: CyberArk Software Ltd.Inventors: Evgeni AIZIKOVICH, Boris Spivak, Michael Yavnilovich, Tal Kandel, Hadas Elkabir
-
Patent number: 10862689Abstract: Disclosed embodiments relate to verifying identities based on identity-inherent data that is inaccessible to the system. Techniques include receiving, from a client, an encrypted token, the encrypted token having been encrypted at the client using a cryptographic key created at the client based on identity-inherent data of an identity of the client; wherein the identity-inherent data of the identity is not itself received by the system, and wherein the cryptographic key is accessible only to the client; and storing the encrypted token in association with a hash of a decrypted version of the encrypted token to allow for comparing the stored hash with a created hash and determining whether to verify the identity based on a result of the comparing.Type: GrantFiled: July 23, 2019Date of Patent: December 8, 2020Assignee: CYBERARK SOFTWARE LTD.Inventors: Evgeni Aizikovich, Boris Spivak, Michael Yavnilovich, Tal Kandel, Hadas Elkabir
-
Patent number: 10567438Abstract: The disclosed embodiments include systems and methods for dynamically managing privileged access for non-privileged accounts. Operations may include receiving a request from a computer device associated with a network account to access a privileged resource, wherein the network account lacks any privileged account membership enabling the network account to access the privileged resource. Operations may include authenticating the network account, and assigning, based on the authentication, privileged on-demand membership for the network account, wherein the privileged on-demand membership enables the network account to access the privileged resource. Operations may also include identifying that the network account should no longer have access to the privileged resource, and removing, based on the identification, the privileged on-demand membership for the network account.Type: GrantFiled: February 25, 2019Date of Patent: February 18, 2020Assignee: CYBERARK SOFTWARE LTD.Inventors: Dima Barboi, Boris Spivak, Yair Sade
-
Patent number: 10411894Abstract: Disclosed embodiments relate to systems and methods for authenticating users of personal computing devices using encoded versions of the temporary and unique codes. Techniques include receiving a first cryptographic key having been created by a personal computing device and corresponding to a second cryptographic key maintained on the personal computing device; associating a user identifier with the first cryptographic key; accessing a temporary and unique code; accessing an encoded version of the temporary and unique code; making available to the personal computing device the encoded version of the temporary and unique code; receiving, from the personal computing device, a signed version of the temporary and unique code, the signed version having been signed by the second cryptographic key; verifying, using the first cryptographic key, the signed version of the temporary and unique code; and determining, based on the verifying, whether to authenticate the user of the personal computing device.Type: GrantFiled: May 17, 2019Date of Patent: September 10, 2019Assignee: CYBERARK SOFTWARE LTD.Inventors: Michael Yavnilovich, Evgeni Aizikovich, Boris Spivak
-
Publication number: 20190190957Abstract: The disclosed embodiments include systems and methods for dynamically managing privileged access for non-privileged accounts. Operations may include receiving a request from a computer device associated with a network account to access a privileged resource, wherein the network account lacks any privileged account membership enabling the network account to access the privileged resource. Operations may include authenticating the network account, and assigning, based on the authentication, privileged on-demand membership for the network account, wherein the privileged on-demand membership enables the network account to access the privileged resource. Operations may also include identifying that the network account should no longer have access to the privileged resource, and removing, based on the identification, the privileged on-demand membership for the network account.Type: ApplicationFiled: February 25, 2019Publication date: June 20, 2019Applicant: CyberArk Software Ltd.Inventors: Dima BARBOI, Boris SPIVAK, Yair SADE
-
Patent number: 10264026Abstract: The disclosed embodiments include systems and methods for dynamically managing privileged access for non-privileged accounts. Operations may include receiving a request from a computer device associated with a network account to access a privileged resource, wherein the network account lacks any privileged account membership enabling the network account to access the privileged resource. Operations may include authenticating the network account, and assigning, based on the authentication, privileged on-demand membership for the network account, wherein the privileged on-demand membership enables the network account to access the privileged resource. Operations may also include identifying that the network account should no longer have access to the privileged resource, and removing, based on the identification, the privileged on-demand membership for the network account.Type: GrantFiled: July 24, 2017Date of Patent: April 16, 2019Assignee: CyberArk Software Ltd.Inventors: Dima Barboi, Boris Spivak, Yair Sade
-
Publication number: 20190028514Abstract: The disclosed embodiments include systems and methods for dynamically managing privileged access for non-privileged accounts. Operations may include receiving a request from a computer device associated with a network account to access a privileged resource, wherein the network account lacks any privileged account membership enabling the network account to access the privileged resource. Operations may include authenticating the network account, and assigning, based on the authentication, privileged on-demand membership for the network account, wherein the privileged on-demand membership enables the network account to access the privileged resource. Operations may also include identifying that the network account should no longer have access to the privileged resource, and removing, based on the identification, the privileged on-demand membership for the network account.Type: ApplicationFiled: July 24, 2017Publication date: January 24, 2019Inventors: Dima BARBOI, Boris SPIVAK, Yair SADE
-
Publication number: 20160032273Abstract: The present invention describes methods for the characterization of mRNA molecules during mRNA production. Characterizing mRNA includes processes such as oligonucleotide mapping, reverse transcriptase sequencing, charge distribution analysis, and detection of RNA impurities. Oligonucleotide mapping includes using an RNase to digest antisense duplexes from an RNA transcript, and then subjecting the digested RNA to reverse phase HPLC, anion exchange HPLC, and/or mass spectrometry analysis. Reverse transcriptase sequencing involves reverse transcription of an RNA transcript followed by DNA sequencing. Charge distribution analysis can comprise procedures such as anion exchange HPLC, or capillary electrophoresis. Detection of impurities includes detecting short mRNA transcripts, RNA-RNA hybrids, and RNA-DNA hybrids.Type: ApplicationFiled: March 14, 2014Publication date: February 4, 2016Inventors: Zahra SHAHROKH, Ingo RÖHL, Vlad Boris SPIVAK, Tirtha CHAKRABORTY, John Grant AUNINS
-
Publication number: 20160017313Abstract: Reversed phase-High Performance (High Pressure) Liquid Chromatography (RP-HPLC) and Size Exclusion Chromatography (SEC) methods have been developed for monitoring structural and size heterogeneity as well as stability of large RNA transcripts, including lengths of up to at least 10,000 nucleotides. The methods are designed for significantly larger mRNAs that could be monitored in the past, including lengths of up to at least 10,000 nucleotides, and including chemically modified RNA transcripts. SEC techniques are also used in the preparative purification of large RNA transcripts to remove impurities, including hybridized nucleic acid impurities and multimeric RNA species. All of these techniques are also beneficial in that they can be used for large scale manufacturing of therapeutics.Type: ApplicationFiled: March 14, 2014Publication date: January 21, 2016Inventors: Vlad Boris SPIVAK, Zahra SHAHROKH, William Joseph ISSA
-
Patent number: 8888416Abstract: A control system for an air driven drill is described, wherein the control system is of the kind that provides a feed stroke to a drill bit. The system comprises an interrupt line so that compressed air fed to a feed chamber is also fed to a clamp chamber whereby the unbalanced force on the feed piston becomes balanced so as to stop the feed stroke. An adjustable frequency generator is provided to impose a pulsating pressure variation in an air pressure supply. During a feed stroke under which compressed air is fed to the feed chamber, air fed to the clamp chamber via the interrupt line is caused by the adjustable frequency generator to have a pulsating pressure, so that the feed stroke is caused to be stopped for a first period, then resumed for a second period, to provide a periodically interrupted feed stroke.Type: GrantFiled: March 29, 2011Date of Patent: November 18, 2014Assignee: U.S. Industrial Tool & Supply CompanyInventor: Boris Spivak
-
Publication number: 20120251255Abstract: A control system for an air driven drill is described, wherein the control system is of the kind that provides a feed stroke to a drill bit. The system comprises an interrupt line so that compressed air fed to a feed chamber is also fed to a clamp chamber whereby the unbalanced force on the feed piston becomes balanced so as to stop the feed stroke. An adjustable frequency generator is provided to impose a pulsating pressure variation in an air pressure supply. During a feed stroke under which compressed air is fed to the feed chamber, air fed to the clamp chamber via the interrupt line is caused by the adjustable frequency generator to have a pulsating pressure, so that the feed stroke is caused to be stopped for a first period, then resumed for a second period, to provide a periodically interrupted feed stroke.Type: ApplicationFiled: March 29, 2011Publication date: October 4, 2012Applicant: U.S. INDUSTRIAL TOOL & SUPPLY COMPANYInventor: Boris Spivak
-
Patent number: 7290431Abstract: A pneumatically operated rivet squeezer is described, having features that allow for the miniaturization of a squeezer to a size smaller than portable rivet squeezers presently available. A first feature of the invention is that a return spring is accommodated within the squeezer housing by embedding the spring diametrically partially within a cavity in an internal wall of the housing and diametrically partially within a cavity in a jaw of the squeezer. A second feature of the invention contributing to miniaturization is that the squeezer utilizes a wedge having a very high mechanical advantage during the final stage of squeezing action, and a novel two curve surface for applying force to arms of the squeezer.Type: GrantFiled: January 12, 2007Date of Patent: November 6, 2007Assignee: U.S. Industrial Tool & Supply CompanyInventor: Boris Spivak
-
Patent number: 7265354Abstract: A high-energy radiation detector is disclosed which uses a semiconductor material to absorb high-energy radiation and emit secondary light in response. The semiconductor is designed to be largely transparent for the interband light it emits so that the generated secondary photons can reach the semiconductor surface, to be detected by a suitable photo-detector. The semiconductor thus plays a role of a scintillator with the emitted light registered by a photo-detector. Two different device embodiments are disclosed. The first embodiment employs a uniform bulk slab of the appropriately chosen semiconductor, such as n-doped InP. Its principal advantage lies in the simplicity and low cost. The second device employs a multi-layer heterostructure. The principal advantage of the second type detector is the possibility of a substantial enhancement in the efficiency of absorption of the primary high-energy radiation.Type: GrantFiled: June 6, 2005Date of Patent: September 4, 2007Inventors: Alexander Kastalsky, Serge Luryi, Boris Spivak
-
Publication number: 20060273258Abstract: A high-energy radiation detector is disclosed which uses a semiconductor material to absorb high-energy radiation and emit secondary light in response. The semiconductor is designed to be largely transparent for the interband light it emits so that the generated seciondary photons can reach the semiconductor surface, to be detected by a suitable photo-detector. The semiconductor thus plays a role of a scintillator with the emitted light registered by a photo-detector. Two different device embodiments are disclosed. The first embodiment employs a uniform bulk slab of the appropriately chosen semiconductor, such as n-doped InP. Its principal advantage lies in the simplicity and low cost. The second device employs a multi-layer heterostructure. The principal advantage of the second type detector is the possibility of a substantial enhancement in the efficiency of absorption of the primary high-energy radiation.Type: ApplicationFiled: June 6, 2005Publication date: December 7, 2006Inventors: Alexander Kastalsky, Serge Luryi, Boris Spivak