Patents by Inventor Dmitri Pikus

Dmitri Pikus has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20230186775
    Abstract: An example system includes a processor to receive target asset information from an asset management system. The processor can generate an inspection mission based on the target asset information. The processor can generate unmanned aerial vehicle (UAV)-specific commands based on the inspection mission. The processor can transmit the UAV-specific commands to an unmanned aerial vehicle (UAV) platform. The processor can receive images and sensor data from the UAV. The processor can also send the images and sensor data to an artificial intelligence (AI) services module. The processor can receive feedback from the AI services module. The processor can further modify the inspection mission based on the feedback.
    Type: Application
    Filed: December 14, 2021
    Publication date: June 15, 2023
    Inventors: Benjamin MANDLER, Nili GUY, Samuel KALLNER, Maya BARNEA, Ira ROSEN, Dmitri PIKUS, Gil SHARON, Netanel EDER
  • Publication number: 20210116912
    Abstract: An example system includes a processor to receive media and an event from a deployed unmanned aerial vehicle (UAV). The processor is to send the media and the event to an artificial intelligence (AI) service and receive smart insights from the AI service. The processor is to dynamically generate an execution block based on the smart insights. The processor is to send the generated execution block to an edge device for generating vehicle specific commands.
    Type: Application
    Filed: October 16, 2019
    Publication date: April 22, 2021
    Inventors: Dmitri Pikus, Nili Guy, Maya Barnea, Gil Sharon, ldan Ben-Harrush
  • Patent number: 10560356
    Abstract: A computer implemented method of assuring correctness of data updated at a remote server and used by a local application, comprising one or more processors at a client terminal adapted to receive from a remote server updated values for a plurality of data items associated with a dataset required for execution of an application executed by the processor(s) where the dataset defines a close relation among the plurality of associated data items, determine whether the reception includes updated values for all of the associated data items, retrieve automatically from a local memory resource, previous values for all of the associated data items in case the updated value is missing for at least one of the associated data items and provide to the application the updated values or the previous values according to the determination.
    Type: Grant
    Filed: July 14, 2016
    Date of Patent: February 11, 2020
    Assignee: International Business Machines Corporation
    Inventors: Aharon Abadi, Dmitri Pikus
  • Patent number: 10248536
    Abstract: According to an aspect of some embodiments of the present invention there is provided a method for verifying correctness of application configuration of an application, comprising: for each of baseline and changed source codes of an application analyzing a graph representation of an execution flow of a plurality of application functionalities performed by execution of the respective source code to identify a plurality of functional dependencies between source code segments of the baseline source code and a plurality of functional dependencies between source code segments of the changed source code, wherein each of the functional dependencies is at least one of data dependency and control dependency, identifying a configuration discrepancy according to a match between functional dependencies of the changed source code when compared to the baseline source code, and producing a notification when the configuration discrepancy is found and is not permitted by the configuration.
    Type: Grant
    Filed: October 31, 2016
    Date of Patent: April 2, 2019
    Assignee: International Business Machines Corporation
    Inventors: Aharon Abadi, Nili Ifergan-Guy, Dmitri Pikus, Oleg Sternberg
  • Patent number: 10157049
    Abstract: Statically analyzing a computer software application can include identifying a plurality of objects within the instructions of a computer software application, where the objects in the plurality of objects are of the same object type, and preparing a modified version of the instructions in which any of the objects in the plurality of objects determined to be extraneous is omitted.
    Type: Grant
    Filed: October 26, 2011
    Date of Patent: December 18, 2018
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Yinnon A. Haviv, Daniel Kalman, Dmitri Pikus, Omer Tripp, Omri Weisman
  • Patent number: 10136282
    Abstract: Obtaining a dynamic download policy for a mobile application being executed on the mobile computing device, wherein the dynamic download policy indicating a download policy for a data item, the download policy is defined by the dynamic download policy as enabled in a first device context of the mobile computing device. During execution of the mobile application, a current device context of the mobile application is being monitored. In response to the mobile application attempting to download the data item and in response to the current device context being the first device context, the download policy may be enforced.
    Type: Grant
    Filed: February 4, 2016
    Date of Patent: November 20, 2018
    Assignee: International Business Machines Corporation
    Inventors: Aharon Abadi, Idan Ben-Harrush, Samuel Kallner, Dmitri Pikus
  • Publication number: 20180203707
    Abstract: A computer implemented method of dynamically configuring a mobile application according to environment context information of the mobile application, comprising using one or more processors for executing a code for collecting a plurality of context information items defining an environment of an application executed on a mobile device associated with a user, extracting according to the plurality of context information items, a plurality of context profiles assigned to the user, each of the plurality of context profiles defines a respective one of a plurality of aspects of the environment and maps a plurality of pre-defined configuration settings of the application, determining an aggregated configuration setting for the application by evaluating a combination of the plurality of configuration settings for the extracted plurality of context profiles and applying automatically the aggregated configuration setting to the application.
    Type: Application
    Filed: January 19, 2017
    Publication date: July 19, 2018
    Inventors: Aharon Abadi, Nili Ifergan - Guy, Dmitri Pikus, Oleg Sternberg, Idan Ben-Harrush
  • Publication number: 20180129581
    Abstract: According to an aspect of some embodiments of the present invention there is provided a method for verifying correctness of application configuration of an application, comprising: for each of baseline and changed source codes of an application analyzing a graph representation of an execution flow of a plurality of application functionalities performed by execution of the respective source code to identify a plurality of functional dependencies between source code segments of the baseline source code and a plurality of functional dependencies between source code segments of the changed source code, wherein each of the functional dependencies is at least one of data dependency and control dependency, identifying a configuration discrepancy according to a match between functional dependencies of the changed source code when compared to the baseline source code, and producing a notification when the configuration discrepancy is found and is not permitted by the configuration.
    Type: Application
    Filed: November 7, 2016
    Publication date: May 10, 2018
    Inventors: Aharon Abadi, Nili Ifergan - Guy, Dmitri Pikus, Oleg Sternberg
  • Publication number: 20180121315
    Abstract: According to an aspect of some embodiments of the present invention there is provided a method for verifying correctness of application configuration of an application, comprising: for each of baseline and changed source codes of an application analyzing a graph representation of an execution flow of a plurality of application functionalities performed by execution of the respective source code to identify a plurality of functional dependencies between source code segments of the baseline source code and a plurality of functional dependencies between source code segments of the changed source code, wherein each of the functional dependencies is at least one of data dependency and control dependency, identifying a configuration discrepancy according to a match between functional dependencies of the changed source code when compared to the baseline source code, and producing a notification when the configuration discrepancy is found and is not permitted by the configuration.
    Type: Application
    Filed: October 31, 2016
    Publication date: May 3, 2018
    Inventors: Aharon Abadi, Nili Ifergan-Guy, Dmitri Pikus, Oleg Sternberg
  • Publication number: 20180019934
    Abstract: A computer implemented method of assuring correctness of data updated at a remote server and used by a local application, comprising one or more processors at a client terminal adapted to receive from a remote server updated values for a plurality of data items associated with a dataset required for execution of an application executed by the processor(s) where the dataset defines a close relation among the plurality of associated data items, determine whether the reception includes updated values for all of the associated data items, retrieve automatically from a local memory resource, previous values for all of the associated data items in case the updated value is missing for at least one of the associated data items and provide to the application the updated values or the previous values according to the determination.
    Type: Application
    Filed: July 14, 2016
    Publication date: January 18, 2018
    Inventors: Aharon Abadi, Dmitri Pikus
  • Publication number: 20180013616
    Abstract: This invention relates to an apparatus, system, and method for modifying the behavior of an application using configuration. A configuration platform allows for the provisioning of configuration data on a local device. The configuration can cause the application to be reactive to the user's environment, such as location and time of day. The configuration data provides a convenient way to change application behavior without implementing dynamic behavior at development time.
    Type: Application
    Filed: July 7, 2016
    Publication date: January 11, 2018
    Inventors: Aharon Abadi, Idan Ben-Harrush, Nili Ifergan-Guy, Dmitri Pikus, Oleg Sternberg
  • Patent number: 9830149
    Abstract: According to an aspect of some embodiments of the present invention there is provided a computer implemented method of refactoring a source code that includes a plurality of references to sensitive data into at least two separate source codes, comprising receiving a source code comprising a plurality of references to sensitive data, identifying a plurality of code blocks comprising the plurality of references, refactoring the source code into an enterprise source code having a plurality of functions containing the plurality of code blocks and a cloud source code that is semantically equivalent when executed to the source code when executed, and replacing within the cloud source code at least one of the plurality of code blocks with a call to a function within the enterprise source code, the function containing a code block that is semantically identical to the replaced code block.
    Type: Grant
    Filed: January 14, 2016
    Date of Patent: November 28, 2017
    Assignee: International Business Machines Corporation
    Inventors: Aharon Abadi, Idan Ben-Harrush, Nili Ifergan-Guy, Dmitri Pikus
  • Publication number: 20170230480
    Abstract: Obtaining a dynamic download policy for a mobile application being executed on the mobile computing device, wherein the dynamic download policy indicating a download policy for a data item, the download policy is defined by the dynamic download policy as enabled in a first device context of the mobile computing device. During execution of the mobile application, a current device context of the mobile application is being monitored. In response to the mobile application attempting to download the data item and in response to the current device context being the first device context, the download policy may be enforced.
    Type: Application
    Filed: February 4, 2016
    Publication date: August 10, 2017
    Inventors: Aharon Abadi, Idan Ben-Harrush, Samuel Kallner, Dmitri Pikus
  • Publication number: 20170206081
    Abstract: According to an aspect of some embodiments of the present invention there is provided a computer implemented method of refactoring a source code that includes a plurality of references to sensitive data into at least two separate source codes, comprising receiving a source code comprising a plurality of references to sensitive data, identifying a plurality of code blocks comprising the plurality of references, refactoring the source code into an enterprise source code having a plurality of functions containing the plurality of code blocks and a cloud source code that is semantically equivalent when executed to the source code when executed, and replacing within the cloud source code at least one of the plurality of code blocks with a call to a function within the enterprise source code, the function containing a code block that is semantically identical to the replaced code block.
    Type: Application
    Filed: January 14, 2016
    Publication date: July 20, 2017
    Inventors: Aharon Abadi, Idan Ben-Harrush, Nili Ifergan-Guy, Dmitri Pikus
  • Publication number: 20170206082
    Abstract: According to an aspect of some embodiments of the present invention there is provided a computer implemented method of refactoring a source code that includes a plurality of references to sensitive data into at least two separate source codes, comprising receiving a source code comprising a plurality of references to sensitive data, identifying a plurality of code blocks comprising the plurality of references, refactoring the source code into an enterprise source code having a plurality of functions containing the plurality of code blocks and a cloud source code that is semantically equivalent when executed to the source code when executed, and replacing within the cloud source code at least one of the plurality of code blocks with a call to a function within the enterprise source code, the function containing a code block that is semantically identical to the replaced code block.
    Type: Application
    Filed: January 14, 2016
    Publication date: July 20, 2017
    Inventors: Aharon Abadi, Idan Ben-Harrush, Nili Ifergan-Guy, Dmitri Pikus
  • Patent number: 9396170
    Abstract: A method of presenting hyperlink data. The method comprises identifying when a web browser running on a web browser client retrieves, in response to a web document data request submitted to a target server, a first web document data for displaying a first web document containing a hyperlink having a label for display and a target destination defining an address of a second web document, evaluating a risk from content of the second web document, generating by the web browser to a reference evaluation indication of the risk, and processing the web document data and the reference evaluation indication by the web browser for generating a presentation on the client terminal which combines the first web document data and the reference evaluation indication such that when the reference evaluation indication is presented when the label is presented by the web browser.
    Type: Grant
    Filed: November 11, 2013
    Date of Patent: July 19, 2016
    Assignee: GLOBALFOUNDRIES INC.
    Inventors: Idan Ben-Harrush, Anat Berkman, Alexander Dvinsky, Nili Guy, Samuel Kallner, Andrei Kirshin, Dmitri Pikus, Yoav Rubin, Gal Shachor, Omer Tripp
  • Publication number: 20150135324
    Abstract: A method of presenting hyperlink data. The method comprises identifying when a web browser running on a web browser client retrieves, in response to a web document data request submitted to a target server, a first web document data for displaying a first web document containing a hyperlink having a label for display and a target destination defining an address of a second web document, evaluating a risk from content of the second web document, generating by the web browser to a reference evaluation indication of the risk, and processing the web document data and the reference evaluation indication by the web browser for generating a presentation on the client terminal which combines the first web document data and the reference evaluation indication such that when the reference evaluation indication is presented when the label is presented by the web browser.
    Type: Application
    Filed: November 11, 2013
    Publication date: May 14, 2015
    Applicant: International Business Machines Corporation
    Inventors: Idan Ben-Harrush, Anat Berkman, Alexander Dvinsky, Nili Guy, Samuel Kallner, Andrei Kirshin, Dmitri Pikus, Yoav Rubin, Gal Shachor, Omer Tripp
  • Patent number: 9032528
    Abstract: Detecting security vulnerabilities in web applications by interacting with a web application at a computer server during its execution at the computer server, identifying client-side instructions provided by the web application responsive to an interaction with the web application, where the client-side instructions are configured to be implemented by a client computer that receives the client-side instructions from the computer server, evaluating the identified client-side instructions, and identifying a security vulnerability associated with the client-side instructions.
    Type: Grant
    Filed: June 28, 2011
    Date of Patent: May 12, 2015
    Assignee: International Business Machines Corporation
    Inventors: Yinnon A. Haviv, Daniel Kalman, Dmitri Pikus, Omer Tripp, Omri Weisman
  • Patent number: 8910291
    Abstract: Detecting security vulnerabilities in web applications by interacting with a web application at a computer server during its execution at the computer server, identifying client-side instructions provided by the web application responsive to an interaction with the web application, where the client-side instructions are configured to be implemented by a client computer that receives the client-side instructions from the computer server, evaluating the identified client-side instructions, and identifying a security vulnerability associated with the client-side instructions.
    Type: Grant
    Filed: March 26, 2012
    Date of Patent: December 9, 2014
    Assignee: International Business Machines Corporation
    Inventors: Yinnon A. Haviv, Daniel Kalman, Dmitri Pikus, Omer Tripp, Omri Weisman
  • Patent number: 8849631
    Abstract: A method of telephone call management in process of service development that allows a user to model and create telephone call management schemes independent of telecommunications protocols and network layer details. The method of the invention operates by creating an abstract model of a telephone call life-cycle that is converted, using a set of communication threads, into executable code. Models in accordance with the method of the invention are constructed using an Integrated Development Environment (IDE) for creating and developing telecom services that embodies the Telecom Service Domain Specific Language (TS-DSL) which is implemented as a Unified Modeling Language (UML) extension for the telecom domain. By this method, individuals without specialized knowledge of telecom related software programming and protocols can successfully design and implement telecom services that manages calls.
    Type: Grant
    Filed: May 13, 2008
    Date of Patent: September 30, 2014
    Assignee: International Business Machines Corporation
    Inventors: Shiri Kremer-Davidson, Alan Hartman, Mila Keren, Dmitri Pikus