Patents by Inventor David Rozenblat

David Rozenblat has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20210142642
    Abstract: An apparatus and method for providing an alert regarding an unattended child in a vehicle is provided. The apparatus includes a tethered coupling device connected with a stationary device, an untethered coupling device connected with or near a caregiver of the child, and a presence detection device for detecting the presence of a child in a seat of the vehicle. The untethered coupling device is coupled with the tethered coupling device and the presence detection device is connected with a presence detection alarm. Once the presence of a child is detected by the presence detection device and the tethered coupling device is not coupled with the untethered coupling device, the presence detection alarm is activated and generates an alert. Once the presence of a child is detected and the tethered coupling device is coupled with the untethered coupling device, the presence detection alarm is deactivated.
    Type: Application
    Filed: November 8, 2019
    Publication date: May 13, 2021
    Inventors: Yaniv EDRI, David Rozenblat
  • Publication number: 20210142284
    Abstract: A method for enabling anonymous shipment of a package containing goods purchased by a customer from a vendor for delivery to a customer and an address unknown to the vendor is provided. The method includes, storing personal information associated with the customer in a shipping intermediary's secure database including the actual name and associated intended delivery address, and generating a tokenized customer name representing the actual name along with a preferred intermediary address associated with the shipping intermediary. The tokenized customer name and the preferred intermediary address do not include the actual name and any of the intended delivery address information for the package. The method further includes providing to the vender the tokenized customer name and the preferred intermediary address in place of the actual name and the intended delivery address.
    Type: Application
    Filed: August 27, 2020
    Publication date: May 13, 2021
    Inventors: Andrew KACZMAREK, David Rozenblat
  • Publication number: 20210142321
    Abstract: A method for enabling anonymous shipment of a package containing goods purchased by a customer from a vendor for delivery to a customer and an address unknown to the vendor is provided. The method includes, storing personal information associated with the customer in a shipping intermediary's secure database including the actual name and associated intended delivery address, and generating a tokenized customer name representing the actual name along with a preferred intermediary address associated with the shipping intermediary. The tokenized customer name and the preferred intermediary address do not include the actual name and any of the intended delivery address information for the package. The method further includes providing to the vender the tokenized customer name and the preferred intermediary address in place of the actual name and the intended delivery address.
    Type: Application
    Filed: April 27, 2020
    Publication date: May 13, 2021
    Inventors: Andrew KACZMAREK, David Rozenblat
  • Publication number: 20210142380
    Abstract: A method for enabling anonymous shipment of a package containing goods purchased by a customer from a vendor for delivery to a customer and an address unknown to the vendor is provided. The method includes, storing personal information associated with the customer in a shipping intermediary's secure database including the actual name and associated intended delivery address, and generating a tokenized customer name representing the actual name along with a preferred intermediary address associated with the shipping intermediary. The tokenized customer name and the preferred intermediary address do not include the actual name and any of the intended delivery address information for the package. The method further includes providing to the vender the tokenized customer name and the preferred intermediary address in place of the actual name and the intended delivery address.
    Type: Application
    Filed: November 7, 2019
    Publication date: May 13, 2021
    Inventors: Andrew KACZMAREK, David Rozenblat
  • Patent number: 10708282
    Abstract: In some examples, a system for detecting unauthorized data access can include a processor to detect a suspicious operation to be executed by the system and review a plurality of highlights corresponding to the suspicious operation. The processor can also determine that a predefined cyber security image corresponding to the highlights and the suspicious operation does not exist and generate the predefined cyber security image based on a plurality of sub-cyber security images. Furthermore, the processor can store the predefined cyber security image in a cyber security image repository and prevent the suspicious operation from being executed.
    Type: Grant
    Filed: March 27, 2017
    Date of Patent: July 7, 2020
    Assignee: International Business Machines Corporation
    Inventors: Ofer Biller, Rosa Miroshnikov, David Rozenblat, Oded Sofer
  • Patent number: 10171494
    Abstract: A method, computer program product and/or system receives information pertaining to network data traffic from and/or to a network accessible resource, analyzes the information to determine whether a user is engaged in potential hacking transaction(s) with respect to the resource. On condition that the user is determined to be engaged in potential hacking transaction(s), a “scarecrow” message designed for display to the user, is generated and sent to the user.
    Type: Grant
    Filed: February 16, 2016
    Date of Patent: January 1, 2019
    Assignee: International Business Machines Corporation
    Inventors: Roza Miroshnikov, David Rozenblat, Oded Sofer
  • Patent number: 10171471
    Abstract: Methods, computing systems and computer program products implement embodiments of the present invention that include assigning, to multiple users, respective sets of original roles for accessing data stored on a computer system, and performing, in response to requests from the users, multiple operations on the data. While performing the multiple operations on the data, a transaction log is generated that includes a plurality of entries, each of the entries storing attributes of a given operation. Based on the entries in the log file, a respective set of learned roles for respective users is identified, and the respective sets of the learned roles are assigned to the respective users.
    Type: Grant
    Filed: January 10, 2016
    Date of Patent: January 1, 2019
    Assignee: International Business Machines Corporation
    Inventors: Ofer Biller, Oded Sofer, Boris Rozenberg, David Rozenblat
  • Publication number: 20180278630
    Abstract: In some examples, a system for detecting unauthorized data access can include a processor to detect a suspicious operation to be executed by the system and review a plurality of highlights corresponding to the suspicious operation. The processor can also determine that a predefined cyber security image corresponding to the highlights and the suspicious operation does not exist and generate the predefined cyber security image based on a plurality of sub-cyber security images. Furthermore, the processor can store the predefined cyber security image in a cyber security image repository and prevent the suspicious operation from being executed.
    Type: Application
    Filed: March 27, 2017
    Publication date: September 27, 2018
    Inventors: Ofer Biller, Rosa Miroshnikov, David Rozenblat, Oded Sofer
  • Publication number: 20170237771
    Abstract: A method, computer program product and/or system receives information pertaining to network data traffic from and/or to a network accessible resource, analyzes the information to determine whether a user is engaged in potential hacking transaction(s) with respect to the resource. On condition that the user is determined to be engaged in potential hacking transaction(s), a “scarecrow” message designed for display to the user, is generated and sent to the user.
    Type: Application
    Filed: February 16, 2016
    Publication date: August 17, 2017
    Inventors: Roza Miroshnikov, David Rozenblat, Oded Sofer
  • Publication number: 20170201525
    Abstract: Methods, computing systems and computer program products implement embodiments of the present invention that include assigning, to multiple users, respective sets of original roles for accessing data stored on a computer system, and performing, in response to requests from the users, multiple operations on the data. While performing the multiple operations on the data, a transaction log is generated that includes a plurality of entries, each of the entries storing attributes of a given operation. Based on the entries in the log file, a respective set of learned roles for respective users is identified, and the respective sets of the learned roles are assigned to the respective users.
    Type: Application
    Filed: January 10, 2016
    Publication date: July 13, 2017
    Applicant: International Business Machines Corporation
    Inventors: Ofer Biller, Oded Sofer, Boris Rozenberg, David Rozenblat
  • Patent number: 9471797
    Abstract: Embodiments are directed to a computer-based system for tuning roles. The system includes a memory and a processor system communicatively coupled to the memory. The processor system is configured to receive at least one database access log file and existing role definitions of the system. For each role, the processor system is further configured to create an existing user to permission assignment (EUPA) based at least in part on the existing role definitions of the system. For each role, the processor system is further configured to identify logical sessions in the at least one database access log file and create a demonstrated user to permission assignment (DUPA) formed at least in part from data of the identified logical sessions. For each role, the processor system is further configured to create a final user to permission assignment (FUPA) including a function of the EUPA and the DUPA.
    Type: Grant
    Filed: December 8, 2015
    Date of Patent: October 18, 2016
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Ofer Biller, Boris Rozenberg, David Rozenblat, Oded Sofer