Patents by Inventor David Rozenblat
David Rozenblat has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20210142642Abstract: An apparatus and method for providing an alert regarding an unattended child in a vehicle is provided. The apparatus includes a tethered coupling device connected with a stationary device, an untethered coupling device connected with or near a caregiver of the child, and a presence detection device for detecting the presence of a child in a seat of the vehicle. The untethered coupling device is coupled with the tethered coupling device and the presence detection device is connected with a presence detection alarm. Once the presence of a child is detected by the presence detection device and the tethered coupling device is not coupled with the untethered coupling device, the presence detection alarm is activated and generates an alert. Once the presence of a child is detected and the tethered coupling device is coupled with the untethered coupling device, the presence detection alarm is deactivated.Type: ApplicationFiled: November 8, 2019Publication date: May 13, 2021Inventors: Yaniv EDRI, David Rozenblat
-
Publication number: 20210142284Abstract: A method for enabling anonymous shipment of a package containing goods purchased by a customer from a vendor for delivery to a customer and an address unknown to the vendor is provided. The method includes, storing personal information associated with the customer in a shipping intermediary's secure database including the actual name and associated intended delivery address, and generating a tokenized customer name representing the actual name along with a preferred intermediary address associated with the shipping intermediary. The tokenized customer name and the preferred intermediary address do not include the actual name and any of the intended delivery address information for the package. The method further includes providing to the vender the tokenized customer name and the preferred intermediary address in place of the actual name and the intended delivery address.Type: ApplicationFiled: August 27, 2020Publication date: May 13, 2021Inventors: Andrew KACZMAREK, David Rozenblat
-
Publication number: 20210142321Abstract: A method for enabling anonymous shipment of a package containing goods purchased by a customer from a vendor for delivery to a customer and an address unknown to the vendor is provided. The method includes, storing personal information associated with the customer in a shipping intermediary's secure database including the actual name and associated intended delivery address, and generating a tokenized customer name representing the actual name along with a preferred intermediary address associated with the shipping intermediary. The tokenized customer name and the preferred intermediary address do not include the actual name and any of the intended delivery address information for the package. The method further includes providing to the vender the tokenized customer name and the preferred intermediary address in place of the actual name and the intended delivery address.Type: ApplicationFiled: April 27, 2020Publication date: May 13, 2021Inventors: Andrew KACZMAREK, David Rozenblat
-
Publication number: 20210142380Abstract: A method for enabling anonymous shipment of a package containing goods purchased by a customer from a vendor for delivery to a customer and an address unknown to the vendor is provided. The method includes, storing personal information associated with the customer in a shipping intermediary's secure database including the actual name and associated intended delivery address, and generating a tokenized customer name representing the actual name along with a preferred intermediary address associated with the shipping intermediary. The tokenized customer name and the preferred intermediary address do not include the actual name and any of the intended delivery address information for the package. The method further includes providing to the vender the tokenized customer name and the preferred intermediary address in place of the actual name and the intended delivery address.Type: ApplicationFiled: November 7, 2019Publication date: May 13, 2021Inventors: Andrew KACZMAREK, David Rozenblat
-
Patent number: 10708282Abstract: In some examples, a system for detecting unauthorized data access can include a processor to detect a suspicious operation to be executed by the system and review a plurality of highlights corresponding to the suspicious operation. The processor can also determine that a predefined cyber security image corresponding to the highlights and the suspicious operation does not exist and generate the predefined cyber security image based on a plurality of sub-cyber security images. Furthermore, the processor can store the predefined cyber security image in a cyber security image repository and prevent the suspicious operation from being executed.Type: GrantFiled: March 27, 2017Date of Patent: July 7, 2020Assignee: International Business Machines CorporationInventors: Ofer Biller, Rosa Miroshnikov, David Rozenblat, Oded Sofer
-
Patent number: 10171494Abstract: A method, computer program product and/or system receives information pertaining to network data traffic from and/or to a network accessible resource, analyzes the information to determine whether a user is engaged in potential hacking transaction(s) with respect to the resource. On condition that the user is determined to be engaged in potential hacking transaction(s), a “scarecrow” message designed for display to the user, is generated and sent to the user.Type: GrantFiled: February 16, 2016Date of Patent: January 1, 2019Assignee: International Business Machines CorporationInventors: Roza Miroshnikov, David Rozenblat, Oded Sofer
-
Patent number: 10171471Abstract: Methods, computing systems and computer program products implement embodiments of the present invention that include assigning, to multiple users, respective sets of original roles for accessing data stored on a computer system, and performing, in response to requests from the users, multiple operations on the data. While performing the multiple operations on the data, a transaction log is generated that includes a plurality of entries, each of the entries storing attributes of a given operation. Based on the entries in the log file, a respective set of learned roles for respective users is identified, and the respective sets of the learned roles are assigned to the respective users.Type: GrantFiled: January 10, 2016Date of Patent: January 1, 2019Assignee: International Business Machines CorporationInventors: Ofer Biller, Oded Sofer, Boris Rozenberg, David Rozenblat
-
Publication number: 20180278630Abstract: In some examples, a system for detecting unauthorized data access can include a processor to detect a suspicious operation to be executed by the system and review a plurality of highlights corresponding to the suspicious operation. The processor can also determine that a predefined cyber security image corresponding to the highlights and the suspicious operation does not exist and generate the predefined cyber security image based on a plurality of sub-cyber security images. Furthermore, the processor can store the predefined cyber security image in a cyber security image repository and prevent the suspicious operation from being executed.Type: ApplicationFiled: March 27, 2017Publication date: September 27, 2018Inventors: Ofer Biller, Rosa Miroshnikov, David Rozenblat, Oded Sofer
-
Publication number: 20170237771Abstract: A method, computer program product and/or system receives information pertaining to network data traffic from and/or to a network accessible resource, analyzes the information to determine whether a user is engaged in potential hacking transaction(s) with respect to the resource. On condition that the user is determined to be engaged in potential hacking transaction(s), a “scarecrow” message designed for display to the user, is generated and sent to the user.Type: ApplicationFiled: February 16, 2016Publication date: August 17, 2017Inventors: Roza Miroshnikov, David Rozenblat, Oded Sofer
-
Publication number: 20170201525Abstract: Methods, computing systems and computer program products implement embodiments of the present invention that include assigning, to multiple users, respective sets of original roles for accessing data stored on a computer system, and performing, in response to requests from the users, multiple operations on the data. While performing the multiple operations on the data, a transaction log is generated that includes a plurality of entries, each of the entries storing attributes of a given operation. Based on the entries in the log file, a respective set of learned roles for respective users is identified, and the respective sets of the learned roles are assigned to the respective users.Type: ApplicationFiled: January 10, 2016Publication date: July 13, 2017Applicant: International Business Machines CorporationInventors: Ofer Biller, Oded Sofer, Boris Rozenberg, David Rozenblat
-
Patent number: 9471797Abstract: Embodiments are directed to a computer-based system for tuning roles. The system includes a memory and a processor system communicatively coupled to the memory. The processor system is configured to receive at least one database access log file and existing role definitions of the system. For each role, the processor system is further configured to create an existing user to permission assignment (EUPA) based at least in part on the existing role definitions of the system. For each role, the processor system is further configured to identify logical sessions in the at least one database access log file and create a demonstrated user to permission assignment (DUPA) formed at least in part from data of the identified logical sessions. For each role, the processor system is further configured to create a final user to permission assignment (FUPA) including a function of the EUPA and the DUPA.Type: GrantFiled: December 8, 2015Date of Patent: October 18, 2016Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Ofer Biller, Boris Rozenberg, David Rozenblat, Oded Sofer