Patents by Inventor Eyal Koren

Eyal Koren has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20180195908
    Abstract: A visually sensible indicator of temperature including electronic temperature sensing circuitry sensing at least when a temperature exceeds at least one predetermined temperature threshold and providing at least one corresponding threshold exceedance output which is sensible as heat and a heat-responsive visually sensible display which is responsive to the at least one threshold exceedance output for providing at least one visually sensible indication indicating that the temperature has exceeded the predetermined temperature threshold.
    Type: Application
    Filed: July 7, 2016
    Publication date: July 12, 2018
    Inventors: Yaron Nemet, Rafael Ben Shahar, Eyal Koren
  • Publication number: 20180103110
    Abstract: Systems and methods provide automatic discovery of cluster membership based on transaction processing. An example method includes, at a source node of a first tier of nodes, generating a service identifier for a transaction that requests a service hosted by a second tier, the service identifier being based on a logical identifier for the second tier. The method also includes sending the transaction, including the service identifier, from the source node to the service hosted by the second tier. The method includes, at a destination node in the second tier, obtaining the service identifier from the transaction and reporting the service identifier with a destination node identifier to a visibility server as cluster information. The method also includes, at the visibility server, receiving cluster information from a plurality of destination nodes and assigning each of the plurality of destination nodes to a cluster based on the service identifiers.
    Type: Application
    Filed: October 6, 2016
    Publication date: April 12, 2018
    Inventors: Eyal KOREN, Nitsan Daniel LAVIE, Sergey KLEYMAN
  • Publication number: 20180024910
    Abstract: According to one general aspect, a method may include monitoring the execution of at least a portion of a software application. The method may also include collecting subroutine call information regarding a plurality of subroutine calls included by the portion of the software application, wherein one or more of the subroutine calls is selected for detailed data recording. The method may further include pruning, as the software application is being executed, a subroutine call tree to include only the subroutine calls selected for detailed data recording and one or more parent subroutine calls of each subroutine calls selected for detailed data recording.
    Type: Application
    Filed: September 11, 2017
    Publication date: January 25, 2018
    Inventors: Eyal Koren, Asaf Dafner, Shiri Semo Judelman
  • Patent number: 9767007
    Abstract: According to one general aspect, a method may include monitoring the execution of at least a portion of a software application. The method may also include collecting subroutine call information regarding a plurality of subroutine calls included by the portion of the software application, wherein one or more of the subroutine calls is selected for detailed data recording. The method may further include pruning, as the software application is being executed, a subroutine call tree to include only the subroutine calls selected for detailed data recording and one or more parent subroutine calls of each subroutine calls selected for detailed data recording.
    Type: Grant
    Filed: October 20, 2016
    Date of Patent: September 19, 2017
    Assignee: Identify Software Ltd. (IL)
    Inventors: Eyal Koren, Asaf Dafner, Shiri Semo Judelman
  • Publication number: 20170039127
    Abstract: According to one general aspect, a method may include monitoring the execution of at least a portion of a software application. The method may also include collecting subroutine call information regarding a plurality of subroutine calls included by the portion of the software application, wherein one or more of the subroutine calls is selected for detailed data recording. The method may further include pruning, as the software application is being executed, a subroutine call tree to include only the subroutine calls selected for detailed data recording and one or more parent subroutine calls of each subroutine calls selected for detailed data recording.
    Type: Application
    Filed: October 20, 2016
    Publication date: February 9, 2017
    Inventors: Eyal KOREN, Asaf DAFNER, Shiri Semo JUDELMAN
  • Patent number: 9483391
    Abstract: According to one general aspect, a method may include monitoring the execution of at least a portion of a software application. The method may also include collecting subroutine call information regarding a plurality of subroutine calls included by the portion of the software application, wherein one or more of the subroutine calls is selected for detailed data recording. The method may further include pruning, as the software application is being executed, a subroutine call tree to include only the subroutine calls selected for detailed data recording and one or more parent subroutine calls of each subroutine calls selected for detailed data recording.
    Type: Grant
    Filed: January 21, 2016
    Date of Patent: November 1, 2016
    Assignee: Identify Software Ltd.
    Inventors: Eyal Koren, Asaf Dafner, Shiri Semo Judelman
  • Patent number: 9436588
    Abstract: According to one general aspect, a method may include monitoring the execution or at least a portion of a software application. The method may also include collecting subroutine call information regarding a plurality of subroutine calls included by the portion of the software application, wherein one or more of the subroutine calls is selected for detailed data recording. The method may further include pruning, as the software application is being executed, a subroutine call tree to include only the subroutine calls selected for detailed data recording and one or more parent subroutine calls of each subroutine calls selected for detailed data recording.
    Type: Grant
    Filed: September 28, 2012
    Date of Patent: September 6, 2016
    Assignee: Identify Software Ltd. (IL)
    Inventors: Eyal Koren, Asaf Dafner, Shiri Semo Judelman
  • Publication number: 20160140029
    Abstract: According to one general aspect, a method may include monitoring the execution of at least a portion of a software application. The method may also include collecting subroutine call information regarding a plurality of subroutine calls included by the portion of the software application, wherein one or more of the subroutine calls is selected for detailed data recording. The method may further include pruning, as the software application is being executed, a subroutine call tree to include only the subroutine calls selected for detailed data recording and one or more parent subroutine calls of each subroutine calls selected for detailed data recording.
    Type: Application
    Filed: January 21, 2016
    Publication date: May 19, 2016
    Inventors: Eyal KOREN, Asaf DAFNER, Shiri Semo JUDELMAN
  • Patent number: 9250924
    Abstract: According to one general aspect, a method may include monitoring the execution or at least a portion of a software application. The method may also include collecting subroutine call information regarding a plurality of subroutine calls included by the portion of the software application, wherein one or more of the subroutine calls is selected for detailed data recording. The method may further include pruning, as the software application is being executed, a subroutine call tree to include only the subroutine calls selected for detailed data recording and one or more parent subroutine calls of each subroutine calls selected for detailed data recording.
    Type: Grant
    Filed: September 28, 2012
    Date of Patent: February 2, 2016
    Assignee: IDENTIFY SOFTWARE LTD.
    Inventors: Eyal Koren, Asaf Dafner, Shiri Semo Judelman
  • Publication number: 20150186644
    Abstract: In accordance with aspects of the disclosure, systems and methods are provided for monitoring one or more classes for detecting suspected memory leaks in a production environment. The systems and methods may include identifying which of the one or more classes hold at least one static or non-static field of collection or array type, accessing the one or more classes that hold the at least one static or non-static fields of collection or array type, and tracking a size for each field of each class by periodically sampling the size of each field over an interval, processing the size data for each field of each class, and detecting suspected memory leaks of each class by identifying which of the one or more fields of each class exhibits suspect behavior in the size over the interval.
    Type: Application
    Filed: March 6, 2015
    Publication date: July 2, 2015
    Inventors: Gilad Arbel KOMISSAR, Eyal KOREN, Asaf DAFNER
  • Publication number: 20150160947
    Abstract: According to an example implementation, a computer-readable storage medium, computer-implemented method and a system are provided to receive a first class, the first class indirectly implementing a first interface, wherein the first class extends a second class that directly implements the first interface, identify one or more directly implemented methods within the first class, determine a method signature for one or more of the directly implemented methods, estimate that the first class indirectly implements the first interface based on the method signatures for the one or more directly implemented methods, and instrument the first class based on the estimating that the first class indirectly implements the first interface.
    Type: Application
    Filed: December 8, 2014
    Publication date: June 11, 2015
    Inventors: Shiri Semo JUDELMAN, Asaf DAFNER, Eyal KOREN
  • Patent number: 9003233
    Abstract: In accordance with aspects of the disclosure, systems and methods are provided for monitoring one or more classes for detecting suspected memory leaks in a production environment. The systems and methods may include identifying which of the one or more classes hold at least one static or non-static field of collection or array type, accessing the one or more classes that hold the at least one static or non-static fields of collection or array type, and tracking a size for each field of each class by periodically sampling the size of each field over an interval, processing the size data for each field of each class, and detecting suspected memory leaks of each class by identifying which of the one or more fields of each class exhibits suspect behavior in the size over the interval.
    Type: Grant
    Filed: December 31, 2012
    Date of Patent: April 7, 2015
    Assignee: BMC Software, Inc.
    Inventors: Gilad Arbel Komissar, Eyal Koren, Asaf Dafner
  • Patent number: 8910127
    Abstract: According to an example implementation, a computer-readable storage medium, computer-implemented method and a system are provided to receive a first class, the first class indirectly implementing a first interface, wherein the first class extends a second class that directly implements the first interface, identify one or more directly implemented methods within the first class, determine a method signature for one or more of the directly implemented methods, estimate that the first class indirectly implements the first interface based on the method signatures for the one or more directly implemented methods, and instrument the first class based on the estimating that the first class indirectly implements the first interface.
    Type: Grant
    Filed: September 20, 2012
    Date of Patent: December 9, 2014
    Assignee: Identify Software Ltd. (IL)
    Inventors: Shiri Semo Judelman, Asaf Dafner, Eyal Koren
  • Publication number: 20140189438
    Abstract: In accordance with aspects of the disclosure, systems and methods are provided for monitoring one or more classes for detecting suspected memory leaks in a production environment. The systems and methods may include identifying which of the one or more classes hold at least one static or non-static field of collection or array type, accessing the one or more classes that hold the at least one static or non-static fields of collection or array type, and tracking a size for each field of each class by periodically sampling the size of each field over an interval, processing the size data for each field of each class, and detecting suspected memory leaks of each class by identifying which of the one or more fields of each class exhibits suspect behavior in the size over the interval.
    Type: Application
    Filed: December 31, 2012
    Publication date: July 3, 2014
    Applicant: BMC SOFTWARE, INC.
    Inventors: Gilad Arbel, Eyal Koren, Asaf Dafner
  • Patent number: 8745598
    Abstract: A technique provides a hook that executes prior to a software application that is invisible to the software application. In an object-oriented execution environment, an imposter main class is loaded instead of the application main class. The imposter main class then manipulates the object-oriented execution environment to load the application main class without requiring knowledge of the application main class other than its name, and without requiring a change to the command line for the application.
    Type: Grant
    Filed: December 14, 2010
    Date of Patent: June 3, 2014
    Assignee: BMC Software, Inc.
    Inventors: Eyal Koren, Golan Hallel, Asaf Dafner
  • Publication number: 20140096114
    Abstract: According to one general aspect, a method may include monitoring the execution or at least a portion of a software application. The method may also include collecting subroutine call information regarding a plurality of subroutine calls included by the portion of the software application, wherein one or more of the subroutine calls is selected for detailed data recording. The method may further include pruning, as the software application is being executed, a subroutine call tree to include only the subroutine calls selected for detailed data recording and one or more parent subroutine calls of each subroutine calls selected for detailed data recording.
    Type: Application
    Filed: September 28, 2012
    Publication date: April 3, 2014
    Applicant: IDENTIFY SOFTWARE LTD. (IL)
    Inventors: Eyal Koren, Asaf Dafner, Shiri Semo Judelman
  • Publication number: 20140082596
    Abstract: According to an example implementation, a computer-readable storage medium, computer-implemented method and a system are provided to receive a first class, the first class indirectly implementing a first interface, wherein the first class extends a second class that directly implements the first interface, identify one or more directly implemented methods within the first class, determine a method signature for one or more of the directly implemented methods, estimate that the first class indirectly implements the first interface based on the method signatures for the one or more directly implemented methods, and instrument the first class based on the estimating that the first class indirectly implements the first interface.
    Type: Application
    Filed: September 20, 2012
    Publication date: March 20, 2014
    Applicant: IDENTIFY SOFTWARE LTD. (IL)
    Inventors: Shiri Semo Judelman, Asaf Dafner, Eyal Koren
  • Patent number: 8204488
    Abstract: The present invention is directed toward distribution of web content to personal cellular telecommunications devices. The present invention proposes compiling syndicated items compilation files containing the entire contents of one or more syndicated information files and/or status notification compilation files containing a list of one or more syndication feeds and status information regarding same. Both types of compilation files can be Point-To-MultiPoint (P2MP) pushed to all available personal cellular telecommunications devices in one or more cells selected by a cellular operator using standardized P2MP push technology. Alternatively, status notification compilation files can be P2P pulled by or P2P pushed to particular personal cellular telecommunications devices. The present invention also proposes offering accessing full stories in formats other than conventional web page formats. Such non web page formats include inter alia SMS, MMS, email, and the like.
    Type: Grant
    Filed: June 11, 2007
    Date of Patent: June 19, 2012
    Assignee: Celltick Technologies Ltd.
    Inventors: Amit Gil, Eyal Koren
  • Publication number: 20120151464
    Abstract: A technique provides a hook that executes prior to a software application that is invisible to the software application. In an object-oriented execution environment, an imposter main class is loaded instead of the application main class. The imposter main class then manipulates the object-oriented execution environment to load the application main class without requiring knowledge of the application main class other than its name, and without requiring a change to the command line for the application.
    Type: Application
    Filed: December 14, 2010
    Publication date: June 14, 2012
    Applicant: BMC SOFTWARE, INC.
    Inventors: Eyal Koren, Golan Hallel, Asaf Dafner
  • Patent number: 8121651
    Abstract: Content personalization on personal cellular telecommunications devices includes determining subscriber personalization profiles each including at least one personalization parameter, determining universal Level 0 IDMs for display on all subscribers' personal cellular telecommunications devices irrespective of their location and their subscriber personalization profiles, and determining a set of at least two different personalized Level 1 IDMs for each universal Level 0 IDM for display on subscribers' personal cellular telecommunications depending on their location and subscriber personalization profiles. Personalization of Level 1 interactive display messages can take place either network side or handset side. Network side personalization requires a personalization server with subscribers' personalization profiles. Handset side personalization requires handset subscriber personalization filters.
    Type: Grant
    Filed: February 11, 2007
    Date of Patent: February 21, 2012
    Assignee: Celltick Technologies Ltd.
    Inventors: Eyal Koren, Uri Neria, Amit Gil