Patents by Inventor Gal MALKA

Gal MALKA has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11783049
    Abstract: An automatic code analysis tool is disclosed. The automatic code analysis tool can automatically analyze an application code of a subject application and application-specific additional information of a resource used by the subject application. The automatic code analysis tool can implement a method to receive the application code for analysis. A determination is made as to how application-specific information from resources operably coupled to the application code is implemented via the application code. The determination is performed with an automatic analysis without running the application code.
    Type: Grant
    Filed: August 31, 2020
    Date of Patent: October 10, 2023
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Michael Zeev Bargury, Gal Malka, Pnina Weiss, Efim Hudis
  • Patent number: 11556630
    Abstract: Privately determining whether a password satisfies a constraint without having to divulge the password itself to a third party that evaluates the constraint, and without the third party even being aware of the result of the evaluation. After the user selects a password, private communication (e.g., private information retrieval) is used to determine whether the selected password satisfies password constraints. For instance, the password might be encrypted (e.g., homomorphically), and then the encrypted password and a function definition (e.g., a homomorphic function definition) is then provided to the third party. The third party then performs the function and returns an already encrypted result. The third party generated the encrypted result directly, without having access to the result in the clear. Upon receiving the encrypted result, the user's computing system may then decrypt the result, to find out whether the password satisfies the constraints, and thus is sufficiently safe.
    Type: Grant
    Filed: October 22, 2019
    Date of Patent: January 17, 2023
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Gal Malka, Michael Zeev Bargury
  • Patent number: 11388163
    Abstract: The least-privilege permission needed for an identity, such as a user account, application, user group, or process, to access a resource of a tenant of a cloud service is determined from a predicted future resource usage. The predicted future resource usage is based on the resource usage history of an identity, the resource usage history of similar identities and the resource usage history of its peers. Similar identities are determined from node embeddings of a graph that represents the assigned permissions of an identity to a resource and the usage activity at a resource. The permissions needed to perform the predicted future resource usage is compared with the current permission assignments to determine the bare minimum permission that an identity needs for its ongoing and future workflow.
    Type: Grant
    Filed: February 3, 2020
    Date of Patent: July 12, 2022
    Assignee: MICROSOFT TECHNOLOGY LICENSING LLC.
    Inventors: Michael Zeev Bargury, Gal Malka
  • Publication number: 20220067170
    Abstract: An automatic code analysis tool is disclosed. The automatic code analysis tool can automatically analyze an application code of a subject application and application-specific additional information of a resource used by the subject application. The automatic code analysis tool can implement a method to receive the application code for analysis. A determination is made as to how application-specific information from resources operably coupled to the application code is implemented via the application code. The determination is performed with an automatic analysis without running the application code.
    Type: Application
    Filed: August 31, 2020
    Publication date: March 3, 2022
    Applicant: Microsoft Technology Licensing, LLC
    Inventors: Michael Zeev Bargury, Gal Malka, Pnina Weiss, Efim Hudis
  • Publication number: 20210243190
    Abstract: The least-privilege permission needed for an identity, such as a user account, application, user group, or process, to access a resource of a tenant of a cloud service is determined from a predicted future resource usage. The predicted future resource usage is based on the resource usage history of an identity, the resource usage history of similar identities and the resource usage history of its peers. Similar identities are determined from node embeddings of a graph that represents the assigned permissions of an identity to a resource and the usage activity at a resource. The permissions needed to perform the predicted future resource usage is compared with the current permission assignments to determine the bare minimum permission that an identity needs for its ongoing and future workflow.
    Type: Application
    Filed: February 3, 2020
    Publication date: August 5, 2021
    Inventors: MICHAEL ZEEV BARGURY, GAL MALKA
  • Publication number: 20210124339
    Abstract: Monitoring of operations of different types of devices to determine when the devices have varied from usual operation. The devices might be connected, directly or through a proxy, to a cloud service, and may be innumerable devices (such as Internet of Things devices) of a variety of different types. The operations of any number of such devices are measured. Based on the measurements, the devices are grouped based on the operational similarity. Then, standard operational characteristics are then defined for each group of devices. The operational characteristics for the devices are monitored so as to detect when a particular device has varied from this defined standard operation. When a variance is detected, an alert is provided to that effect.
    Type: Application
    Filed: October 23, 2019
    Publication date: April 29, 2021
    Inventors: Michael Zeev BARGURY, Moshe ISRAEL, Gal MALKA, Avichai BEN-DAVID
  • Publication number: 20210117533
    Abstract: Privately determining whether a password satisfies a constraint without having to divulge the password itself to a third party that evaluates the constraint, and without the third party even being aware of the result of the evaluation. After the user selects a password, private communication (e.g., private information retrieval) is used to determine whether the selected password satisfies password constraints. For instance, the password might be encrypted (e.g., homomorphically), and then the encrypted password and a function definition (e.g., a homomorphic function definition) is then provided to the third party. The third party then performs the function and returns an already encrypted result. The third party generated the encrypted result directly, without having access to the result in the clear. Upon receiving the encrypted result, the user's computing system may then decrypt the result, to find out whether the password satisfies the constraints, and thus is sufficiently safe.
    Type: Application
    Filed: October 22, 2019
    Publication date: April 22, 2021
    Inventors: Gal MALKA, Michael Zeev BARGURY