Patents by Inventor Erez Zadok

Erez Zadok has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9959279
    Abstract: A method for maintaining an index in multi-tier data structure includes providing a plurality of a storage devices forming the multi-tier data structure, caching an index of key-value pairs across the multi-tier data structure, wherein each of the key-value pairs includes a key, and one of a data value and a data pointer, the key-value pairs stored in the multi-tier data structure, providing a journal for interfacing with the multi-tier data structure, providing a plurality of zone allocators recording which zones of the multi-tier data structure are in used, and providing a plurality of zone managers for controlling access to cache lines of the multi-tier data structure through the journal and zone allocators, wherein each zone manager maintains a header object pointing to data to be stored in an allocated zone.
    Type: Grant
    Filed: April 20, 2016
    Date of Patent: May 1, 2018
    Assignee: THE RESEARCH FOUNDATION FOR THE STATE UNIVERSITY OF NEW YORK
    Inventors: Shrikar Archak, Sagar Dixit, Richard P. Spillane, Erez Zadok
  • Publication number: 20160232169
    Abstract: A method for maintaining an index in multi-tier data structure includes providing a plurality of a storage devices forming the multi-tier data structure, caching an index of key-value pairs across the multi-tier data structure, wherein each of the key-value pairs includes a key, and one of a data value and a data pointer, the key-value pairs stored in the multi-tier data structure, providing a journal for interfacing with the multi-tier data structure, providing a plurality of zone allocators recording which zones of the multi-tier data structure are in used, and providing a plurality of zone managers for controlling access to cache lines of the multi-tier data structure through the journal and zone allocators, wherein each zone manager maintains a header object pointing to data to be stored in an allocated zone.
    Type: Application
    Filed: April 20, 2016
    Publication date: August 11, 2016
    Inventors: SHRIKAR ARCHAK, SAGAR DIXIT, RICHARD P. SPILLANE, EREZ ZADOK
  • Publication number: 20160230237
    Abstract: A method for identification of circulating tumor cells (CTCs) in a blood sample uses magnetic enrichment and a nanowell assay. The CTCs are magnetically labeled with cancer cell markers conjugated to magnetic nanoparticles and then separated by passing the blood sample through a magnetic sifter. The enriched CTCs are then loaded into a microfluidic single-cell molecular assay comprising an array of 25,600 or more nanowells, each containing at most a single one of the CTCs. Using multiple fluorescent gene markers, simultaneous multiple-color multiplexed gene expression of the CTCs is performed, preferably using RT-PCR. Images of fluorescence signals from individual nanowells are analyzed to identify CTCs.
    Type: Application
    Filed: April 20, 2016
    Publication date: August 11, 2016
    Inventors: Seung Min Park, Sugar Dixit, Richard P. Spillane, Erez Zadok
  • Patent number: 9355109
    Abstract: A method for maintaining an index in multi-tier data structure includes providing a plurality of a storage devices forming the multi-tier data structure, caching an index of key-value pairs across the multi-tier data structure, wherein each of the key-value pairs includes a key, and one of a data value and a data pointer, the key-value pairs stored in the multi-tier data structure, providing a journal for interfacing with the multi-tier data structure, providing a plurality of zone allocators recording which zones of the multi-tier data structure are in used, and providing a plurality of zone managers for controlling access to cache lines of the multi-tier data structure through the journal and zone allocators, wherein each zone manager maintains a header object pointing to data to be stored in an allocated zone.
    Type: Grant
    Filed: June 13, 2011
    Date of Patent: May 31, 2016
    Assignee: The Research Foundation For the State University of New York
    Inventors: Shrikar Archak, Sagar Dixit, Richard P. Spillane, Erez Zadok
  • Publication number: 20120072656
    Abstract: A method for maintaining an index in multi-tier data structure includes providing a plurality of a storage devices forming the multi-tier data structure, caching an index of key-value pairs across the multi-tier data structure, wherein each of the key-value pairs includes a key, and one of a data value and a data pointer, the key-value pairs stored in the multi-tier data structure, providing a journal for interfacing with the multi-tier data structure, providing a plurality of zone allocators recording which zones of the multi-tier data structure are in used, and providing a plurality of zone managers for controlling access to cache lines of the multi-tier data structure through the journal and zone allocators, wherein each zone manager maintains a header object pointing to data to be stored in an allocated zone.
    Type: Application
    Filed: June 13, 2011
    Publication date: March 22, 2012
    Inventors: Shrikar Archak, Sagar Dixit, Richard P. Spillane, Erez Zadok
  • Patent number: 7979907
    Abstract: A system and methods for detecting malicious executable attachments at an email processing application of a computer system using data mining techniques. The email processing application may be located at the server or at the client or host. The executable attachments are filtered from said email, and byte sequence features are extracted from the executable attachment. The executable attachments are classified by comparing the byte sequence feature of the executable attachment to a classification rule set derived from byte sequence features of a data set of known executables having a predetermined class in a set of classes, e.g., malicious or benign. The system is also able to classify executable attachments as borderline when the difference between the probability that the executable is malicious and the probability that the executable is benign are within a predetermined threshold.
    Type: Grant
    Filed: December 18, 2008
    Date of Patent: July 12, 2011
    Assignee: The Trustees of Columbia University in the City of New York
    Inventors: Matthew G. Schultz, Eleazar Eskin, Erez Zadok, Manasi Bhattacharyya, Stolfo Salvatore J.
  • Publication number: 20090254992
    Abstract: A system and methods for detecting malicious executable attachments at an email processing application of a computer system using data mining techniques. The email processing application may be located at the server or at the client or host. The executable attachments are filtered from said email, and byte sequence features are extracted from the executable attachment. The executable attachments are classified by comparing the byte sequence feature of the executable attachment to a classification rule set derived from byte sequence features of a data set of known executables having a predetermined class in a set of classes, e.g., malicious or benign. The system is also able to classify executable attachments as borderline when the difference between the probability that the executable is malicious and the probability that the executable is benign are within a predetermined threshold.
    Type: Application
    Filed: December 18, 2008
    Publication date: October 8, 2009
    Inventors: Matthew G. Schultz, Eleazar Eskin, Erez Zadok, Manasi Bhattacharyya, Stolfo Salvatore J.
  • Patent number: 7487544
    Abstract: A system and methods for detecting malicious executable attachments at an email processing application of a computer system using data mining techniques. The email processing application may be located at the server or at the client or host. The executable attachments are filtered from said email, and byte sequence features are extracted from the executable attachment. The executable attachments are classified by comparing the byte sequence feature of the executable attachment to a classification rule set derived from byte sequence features of a data set of known executables having a predetermined class in a set of classes, e.g., malicious or benign. The system is also able to classify executable attachments as borderline when the difference between the probability that the executable is malicious and the probability that the executable is benign are within a predetermined threshold.
    Type: Grant
    Filed: July 30, 2002
    Date of Patent: February 3, 2009
    Assignee: The Trustees of Columbia University in the city of New York
    Inventors: Matthew G. Schultz, Eleazar Eskin, Erez Zadok, Manasi Bhattacharyya, Stolfo J. Salvatore
  • Publication number: 20050273858
    Abstract: An operating system kernel, including a protocol stack, includes a network layer for receiving a message from a data network, a stackable file system layer coupled to the network layer for inspecting the message, wherein the stackable file system layer is coupled to a storage device, the stackable file system determining and storing file system level information determined from the message, and a wrapped file system comprising a file targeted by the message coupled to the stackable file system layer for receiving the message inspected by the stackable file system.
    Type: Application
    Filed: June 7, 2004
    Publication date: December 8, 2005
    Inventors: Erez Zadok, Charles Wright, Akshat Aranya, Abhijith Das, Yevgeniy Miretskiy, Kiran-Kumar Muniswamy-Reddy, Andrew Himmer
  • Publication number: 20030065926
    Abstract: A system and methods for detecting malicious executable attachments at an email processing application of a computer system using data mining techniques. The email processing application may be located at the server or at the client or host. The executable attachments are filtered from said email, and byte sequence features are extracted from the executable attachment. The executable attachments are classified by comparing the byte sequence feature of the executable attachment to a classification rule set derived from byte sequence features of a data set of known executables having a predetermined class in a set of classes, e.g., malicious or benign. The system is also able to classify executable attachments as borderline when the difference between the probability that the executable is malicious and the probability that the executable is benign are within a predetermined threshold.
    Type: Application
    Filed: July 30, 2002
    Publication date: April 3, 2003
    Inventors: Matthew G. Schultz, Eleazar Eskin, Erez Zadok, Manasi Bhattacharyya, Stolfo J. Salvatore