Patents by Inventor Elad SHMIDOV

Elad SHMIDOV has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240143778
    Abstract: A method implements input validation using mathematical expressions. The method includes receiving an input string, scanning the input string to locate a hit string matching a hit expression from a validation package, and converting the hit string to a list of values corresponding to characters from the hit string. The method further includes validating the hit string by evaluating a validation expression from the validation package using the list of values to generate a validation result and returning the validation result.
    Type: Application
    Filed: October 31, 2022
    Publication date: May 2, 2024
    Applicant: Intuit Inc.
    Inventors: Yerucham BERKOWITZ, Eugene ZEINISS, Dan SHARON, Elad SHMIDOV
  • Patent number: 11928462
    Abstract: A method includes receiving event strings from source code repositories, creating, for the source code repositories, digests of keywords, receiving log strings, and aggregating the log strings into a log group. The method further includes comparing the digests to the log group to generate scores, whereby the scores correlate the digests to the log group. The method further includes selecting a source code repository from the source code repositories according to the scores, and associating the log group to a service corresponding to the source code repository, where the source code repository corresponds to the digest with a highest score.
    Type: Grant
    Filed: January 31, 2022
    Date of Patent: March 12, 2024
    Assignee: Intuit Inc.
    Inventors: Elad Shmidov, Margarita Vald, Yerucham Meir Berkowitz, Boaz Sapir, Liron London, Dan Sharon, Vadim Belov
  • Publication number: 20230244474
    Abstract: A method includes receiving event strings from source code repositories, creating, for the source code repositories, digests of keywords, receiving log strings, and aggregating the log strings into a log group. The method further includes comparing the digests to the log group to generate scores, whereby the scores correlate the digests to the log group. The method further includes selecting a source code repository from the source code repositories according to the scores, and associating the log group to a service corresponding to the source code repository, where the source code repository corresponds to the digest with a highest score.
    Type: Application
    Filed: January 31, 2022
    Publication date: August 3, 2023
    Applicant: Intuit Inc.
    Inventors: Elad Shmidov, Margarita Vald, Yerucham Meir Berkowitz, Boaz Sapir, Liron London, Dan Sharon, Vadim Belov
  • Publication number: 20230214522
    Abstract: Described herein are example implementations for the automatic detection and handling of personal identifiable information (PII) in electronic records. In some aspects, a system receives one or more computer readable logs of information for one or more computer services, with each log including a string of characters. The system performs one or more string search algorithm based operations on the entirety of the one or more strings of the one or more computer readable logs to identify a range of the one or more strings to be searched for PII that is less than the entirety of the one or more strings. The system also performs one or more regular expression algorithm based operations on the range of the one or more strings to identify one or more instances of PII. The system generates and outputs an indication of the one or more instances of the PII that are identified.
    Type: Application
    Filed: January 5, 2022
    Publication date: July 6, 2023
    Applicant: Intuit Inc.
    Inventors: Daphna LITVIN, Elad Shmidov, Margarita Vald
  • Publication number: 20220382891
    Abstract: Aspects of the present disclosure provide techniques for detecting sensitive information. Embodiments include determining a first likelihood that a record contains at least a given type of sensitive information using a first detection technique that involves providing one or more inputs to a machine learning model based on the record and receiving the first likelihood as an output from the machine learning model based on the one or more inputs. Embodiments include determining a second likelihood that the record contains at least the given type of sensitive information using a second detection technique comprising a search of the record. Embodiments include applying a policy to determine whether the record contains sensitive information based on the first likelihood and the second likelihood. Embodiments include performing one or more actions based on whether the record contains sensitive information.
    Type: Application
    Filed: May 27, 2021
    Publication date: December 1, 2022
    Inventors: Elad SHMIDOV, Yerucham Berkowitz, Yair Horesh, Alexander Zhicharevich