Patents by Inventor Dan Bar Shalom

Dan Bar Shalom has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20200117319
    Abstract: A system and method for dynamically generating a web page is disclosed. The web page includes a frame having content cells. Content for the content cells is provided based in part on business rules. A business rules engine processes, in real-time, an online interaction and determines appropriate content for the content cells. The business rules engine outputs a pointer to the content which is used to populate the content cell.
    Type: Application
    Filed: December 12, 2018
    Publication date: April 16, 2020
    Applicant: LivePerson, Inc.
    Inventors: Ron Karidi, Dan Bar Shalom, Amir Zucker, Tal Goldberg, Joseph Mermelstein
  • Publication number: 20190258360
    Abstract: A system and method for dynamically generating a web page is disclosed. The web page includes a frame having content cells. Content for the content cells is provided based in part on business rules. A business rules engine processes, in real-time, an online interaction and determines appropriate content for the content cells. The business rules engine outputs a pointer to the content which is used to populate the content cell.
    Type: Application
    Filed: December 12, 2018
    Publication date: August 22, 2019
    Applicant: LivePerson, Inc.
    Inventors: Ron Karidi, Dan Bar Shalom, Amir Zucker, Tal Goldberg, Joseph Mermelstein
  • Patent number: 10191622
    Abstract: A system and method for dynamically generating a web page is disclosed. The web page includes a frame having content cells. Content for the content cells is provided based in part on business rules. A business rules engine processes, in real-time, an online interaction and determines appropriate content for the content cells. The business rules engine outputs a pointer to the content which is used to populate the content cell.
    Type: Grant
    Filed: July 19, 2016
    Date of Patent: January 29, 2019
    Assignee: LivePerson, Inc.
    Inventors: Ron Karidi, Dan Bar Shalom, Amir Zucker, Tal Goldberg, Joseph Mermelstein
  • Publication number: 20180225461
    Abstract: A system for analyzing a computing system for potential breach points, the system comprising a memory device having executable instructions stored therein, and a processing device, in response to the executable instructions, configured to parse a breach scenario file, the breach scenario file comprising a graph including action component nodes connected by edges, determine a root node from the action component nodes, execute the root node with breach point data, generate a root node return value based on the execution of the root node, the root node return value including a modified copy of the breach point data, determine children nodes from the action component nodes connected to the root node, execute the children nodes wherein each execution of the children nodes produces children node return values for a subsequent one of the children nodes, and return a final return value from the execution of the children nodes.
    Type: Application
    Filed: December 28, 2017
    Publication date: August 9, 2018
    Inventors: Itzhak Kotler, Idan Livni, Dan Bar-Shalom, Guy Bejerano
  • Patent number: 9892260
    Abstract: A system for analyzing a computing system for potential breach points, the system comprising a memory device having executable instructions stored therein, and a processing device, in response to the executable instructions, configured to parse a breach scenario file, the breach scenario file comprising a graph including action component nodes connected by edges, determine a root node from the action component nodes, execute the root node with breach point data, generate a root node return value based on the execution of the root node, the root node return value including a modified copy of the breach point data, determine children nodes from the action component nodes connected to the root node, execute the children nodes wherein each execution of the children nodes produces children node return values for a subsequent one of the children nodes, and return a final return value from the execution of the children nodes.
    Type: Grant
    Filed: April 20, 2015
    Date of Patent: February 13, 2018
    Assignee: SAFEBREACH LTD.
    Inventors: Itzhak Kotler, Idan Livni, Dan Bar-Shalom, Guy Bejerano
  • Patent number: 9710653
    Abstract: A system comprising a memory device having executable instructions stored in the memory device, and a processing device, in response to the executable instructions, configured to prepare breach simulation tasks by reading configurations for types of breach scenarios and preparing a list of tasks to be simulated, send breach simulation tasks to simulator nodes, the simulator nodes simulating parties involved in the types of breach scenarios, execute the breach simulation tasks on the simulator nodes, receive results from the simulator nodes, determine that the parties report on a same result, determine that the parties report on successful results, and identify a successful breach based on the parties report on the same result and the parties report on the successful results.
    Type: Grant
    Filed: April 20, 2015
    Date of Patent: July 18, 2017
    Assignee: SafeBreach Ltd.
    Inventors: Itzhak Kotler, Idan Livni, Dan Bar-Shalom, Guy Bejerano
  • Publication number: 20170046021
    Abstract: A system and method for dynamically generating a web page is disclosed. The web page includes a frame having content cells. Content for the content cells is provided based in part on business rules. A business rules engine processes, in real-time, an online interaction and determines appropriate content for the content cells. The business rules engine outputs a pointer to the content which is used to populate the content cell.
    Type: Application
    Filed: July 19, 2016
    Publication date: February 16, 2017
    Applicant: LivePerson, Inc.
    Inventors: Ron Karidi, Dan Bar Shalom, Amir Zucker, Tal Goldberg, Joseph Mermelstein
  • Publication number: 20160308895
    Abstract: A method and system for protecting a computing system, the method comprising allocating simulator nodes, the simulator nodes emulating operations of devices in a target system, simulating malicious action utilizing the simulator nodes, and determining that the malicious action was successfully.
    Type: Application
    Filed: April 20, 2015
    Publication date: October 20, 2016
    Inventors: Itzhak Kotler, Idan Livni, Dan Bar-Shalom, Guy Bejerano
  • Publication number: 20160306979
    Abstract: A system comprising a memory device having executable instructions stored in the memory device, and a processing device, in response to the executable instructions, configured to prepare breach simulation tasks by reading configurations for types of breach scenarios and preparing a list of tasks to be simulated, send breach simulation tasks to simulator nodes, the simulator nodes simulating parties involved in the types of breach scenarios, execute the breach simulation tasks on the simulator nodes, receive results from the simulator nodes, determine that the parties report on a same result, determine that the parties report on successful results, and identify a successful breach based on the parties report on the same result and the parties report on the successful results.
    Type: Application
    Filed: April 20, 2015
    Publication date: October 20, 2016
    Inventors: Itzhak Kotler, Idan Livni, Dan Bar-Shalom, Guy Bejerano
  • Publication number: 20160306980
    Abstract: A system for analyzing a computing system for potential breach points, the system comprising a memory device having executable instructions stored therein, and a processing device, in response to the executable instructions, configured to parse a breach scenario file, the breach scenario file comprising a graph including action component nodes connected by edges, determine a root node from the action component nodes, execute the root node with breach point data, generate a root node return value based on the execution of the root node, the root node return value including a modified copy of the breach point data, determine children nodes from the action component nodes connected to the root node, execute the children nodes wherein each execution of the children nodes produces children node return values for a subsequent one of the children nodes, and return a final return value from the execution of the children nodes.
    Type: Application
    Filed: April 20, 2015
    Publication date: October 20, 2016
    Inventors: Itzhak Kotler, Idan Livni, Dan Bar-Shalom, Guy Bejerano
  • Patent number: 9473522
    Abstract: A method and system for protecting a computing system, the method comprising allocating simulator nodes, the simulator nodes emulating operations of devices in a target system, simulating malicious action utilizing the simulator nodes, and determining that the malicious action was successfully.
    Type: Grant
    Filed: April 20, 2015
    Date of Patent: October 18, 2016
    Assignee: SafeBreach Ltd.
    Inventors: Itzhak Kotler, Idan Livni, Dan Bar-Shalom, Guy Bejerano
  • Patent number: 9432468
    Abstract: A system and method for dynamically generating a web page is disclosed. The web page includes a frame having content cells. Content for the content cells is provided based in part on business rules. A business rules engine processes, in real-time, an online interaction and determines appropriate content for the content cells. The business rules engine outputs a pointer to the content which is used to populate the content cell.
    Type: Grant
    Filed: March 31, 2006
    Date of Patent: August 30, 2016
    Assignee: LivePerson, Inc.
    Inventors: Ron Karidi, Dan Bar Shalom, Amir Zucker, Tal Goldberg, Joseph Mermelstein