Patents by Inventor Gal Tamir

Gal Tamir has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20200200509
    Abstract: At least one shooter-side image sensor captures images of a plurality of shooters and a plurality of respective firearms periodically fired by the shooters. At least one target-side sensor collects data indicative of projectile strikes on a target area associated with at least one target. A processing unit analyzes images captured by the shooter-side image sensor and detects projectile discharges in response to firing of the firearms, and uniquely identifies each of the shooters associated with the detected projectile discharges. The processing unit detections of projectile strikes, based on the data collected by the target-side sensor, and the detected projectile discharges and identifies, for each detected projectile strike on the target area, the correspondingly fired firearm associated with the uniquely identified shooter.
    Type: Application
    Filed: January 16, 2020
    Publication date: June 25, 2020
    Inventor: Gal TAMIR
  • Patent number: 10691449
    Abstract: Methods for intelligent automatic merging of source control queue items are performed by systems and apparatuses. Project changes are submitted in build requests to a gated check-in build queue requiring successful builds to commit changes to a code repository according to source control. Multiple pending build requests in the build queue are intelligently and automatically merged into a single, pending merged request based on risk factor values associated with the build requests. For merged requests successfully built, files in the build requests are committed and the build requests are removed from the queue. Merged requests unsuccessfully built are divided into equal subsets based on updated risk factor values using information from the unsuccessful build. Successful builds of subsets allow for committing of files and removal from the build queue, while unsuccessful builds are further divided and processed until single build requests are processed to identify root cause errors.
    Type: Grant
    Filed: April 27, 2017
    Date of Patent: June 23, 2020
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Elad Iwanir, Gal Tamir, Mario A. Rodriguez, Chen Lahav
  • Patent number: 10670373
    Abstract: A system trains usage of a firearm and includes an end unit, a processing subsystem, and a control subsystem remotely located from the end unit. The end unit includes an image sensor that is positioned against a target that has a bar code. The image sensor defines a field of view of a scene that includes the target, and the bar code stores encoded information that defines a target coverage zone. The system selectively operates in a first mode and a second mode according to input from the control subsystem. In the first mode the end unit scans the bar code to extract the target coverage zone. In the second mode the image sensor captures a series of images of the target coverage zone, and the processing subsystem analyzes regions of the captured series of images to determine a strike, by a projectile of the firearm, on the target.
    Type: Grant
    Filed: July 17, 2018
    Date of Patent: June 2, 2020
    Assignee: Modular High-End LTD.
    Inventor: Gal Tamir
  • Patent number: 10628585
    Abstract: A system for protecting a database against a ransomware attack includes a database backup handler configured to selectively output database backup data associated with a database to a storage device. A ransomware detector is configured to monitor changes to the database and to detect data changes to the database resulting from a ransomware attack. A ransomware remediator communicates with the ransomware detector and the database backup handler and is configured to restore data in the database to a point prior to the ransomware attack based upon the backup data in the storage device.
    Type: Grant
    Filed: April 19, 2017
    Date of Patent: April 21, 2020
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Gal Tamir, Elad Iwanir, Avi Ben-Menahem
  • Patent number: 10558458
    Abstract: Methods, systems, apparatuses, and computer program products are provided for increasing an efficiency of queries in program code. A plurality of queries is detected in program code. A laziness is extended by which the queries are evaluated in the program code. The queries are decomposed into a plurality of query components. A ruleset that includes a plurality of rules is applied to the query components to generate a functionally equivalent query set to the plurality of queries that evaluates more efficiently relative to the plurality of queries.
    Type: Grant
    Filed: June 6, 2016
    Date of Patent: February 11, 2020
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Elad Iwanir, Gal Tamir, Amir Eluk, Eli Koreh
  • Patent number: 10551148
    Abstract: At least one shooter-side image sensor captures images of a plurality of shooters and a plurality of respective firearms periodically fired by the shooters. At least one target-side sensor collects data indicative of projectile strikes on a target area associated with at least one target. A processing unit analyzes images captured by the shooter-side image sensor and detects projectile discharges in response to firing of the firearms, and uniquely identifies each of the shooters associated with the detected projectile discharges. The processing unit detections of projectile strikes, based on the data collected by the target-side sensor, and the detected projectile discharges and identifies, for each detected projectile strike on the target area, the correspondingly fired firearm associated with the uniquely identified shooter.
    Type: Grant
    Filed: December 6, 2018
    Date of Patent: February 4, 2020
    Assignee: Modular High-End LTD.
    Inventor: Gal Tamir
  • Publication number: 20200035115
    Abstract: A projection assembly displays a virtual driving environment, associated with a vehicle, in the interior portions of an actual vehicle. A capture and processing subsystem includes at least one image sensor and at least one processor, and is removably mounted to the interior of the actual vehicle and is operatively coupled to the projection assembly. The image sensor has a field of view encompassing at least a portion of a driver's side area of the actual vehicle. The processor translates a vehicle operating action performed by a driver of the vehicle to a virtual action in the virtual driving environment. The translation is based in part on images captured by the image sensor.
    Type: Application
    Filed: May 5, 2019
    Publication date: January 30, 2020
    Inventor: Gal TAMIR
  • Patent number: 10536482
    Abstract: Described technologies automatically detect computing system security attacks. Departure of occurrence distributions, which are based on leading digit(s) of digital item occurrence data, from model distributions that correspond to particular data sources, indicates a presence likelihood for particular attack types. Some model distributions exhibit Benford's Phenomenon. Described mechanisms detect security attack types such as ransomware, bitcoin mining, and others, using particular corresponding data sources such as file extensions, processor statistics, etc. Mechanisms detect security attacks without a captured baseline of healthy normal behavior, and without relying on malware code signatures. When an item occurrence distribution departs from a model distribution by at least a predefined degree, the technology electronically raises a security attack alert. Then countermeasures may be asserted for a possible type X security attack on the computing system.
    Type: Grant
    Filed: March 26, 2017
    Date of Patent: January 14, 2020
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Yuri Gabaev, Elad Iwanir, Gal Tamir
  • Patent number: 10516688
    Abstract: An anti-ransomware system protects data in cloud storage of a cloud services provider against a ransomware attack. A backup handler is configured to at least one of: selectively retrieve backup data generated by the cloud services provider from the cloud storage; and selectively generate backup data based on the data in the cloud storage and output the backup data to a storage device. A ransomware detector is configured to detect data changes to the data resulting from a ransomware attack. A ransomware remediator communicates with the ransomware detector and the backup handler and is configured to restore the data to a state prior to the ransomware attack based upon the backup data.
    Type: Grant
    Filed: December 4, 2017
    Date of Patent: December 24, 2019
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Gal Tamir, Elad Iwanir
  • Publication number: 20190318010
    Abstract: Non-limiting examples of the present disclosure relate to automated presentation control during presentation of one or more digital documents. Processing operations described herein may be configured to work with any type of application/service, where examples described herein extend to presentation of any type of digital document(s) including slide-based presentations. Speech signals may be detected while a digital document is being presented. The detected speech signals may be converted to text. The converted text may be matched with contextual data (e.g., pre-processed content) associated with the digital document. Probability scoring for determination of a next placement position of a digital document may be generated based on the matching of converted text with the contextual data of the digital document. The next placement position may be selected based on the generated probability scoring. Display of the digital document may be automatically updated to reflect the selected next placement position.
    Type: Application
    Filed: April 11, 2018
    Publication date: October 17, 2019
    Inventors: Gal TAMIR, Rachel LEMBERG, Ze'ev MAOR, Ori BAR-ILAN
  • Patent number: 10347150
    Abstract: A projection assembly displays a virtual driving environment, associated with a vehicle, in the interior portions of an actual vehicle. A capture and processing subsystem includes at least one image sensor and at least one processor, and is removably mounted to the interior of the actual vehicle and is operatively coupled to the projection assembly. The image sensor has a field of view encompassing at least a portion of a driver's side area of the actual vehicle. The processor translates a vehicle operating action performed by a driver of the vehicle to a virtual action in the virtual driving environment. The translation is based in part on images captured by the image sensor.
    Type: Grant
    Filed: July 30, 2018
    Date of Patent: July 9, 2019
    Assignee: MODULAR HIGH-END LTD.
    Inventor: Gal Tamir
  • Publication number: 20190162509
    Abstract: A system trains usage of a firearm and includes an end unit, a processing subsystem, and a control subsystem remotely located from the end unit. The end unit includes an image sensor that is positioned against a target that has a bar code. The image sensor defines a field of view of a scene that includes the target, and the bar code stores encoded information that defines a target coverage zone. The system selectively operates in a first mode and a second mode according to input from the control subsystem. In the first mode the end unit scans the bar code to extract the target coverage zone. In the second mode the image sensor captures a series of images of the target coverage zone, and the processing subsystem analyzes regions of the captured series of images to determine a strike, by a projectile of the firearm, on the target.
    Type: Application
    Filed: July 17, 2018
    Publication date: May 30, 2019
    Inventor: Gal TAMIR
  • Patent number: 10250587
    Abstract: The misuse of public key, private key, and public/private key certificates poses significant security challenges to computer networks that are addressed by certificate monitoring. Certificate monitoring allows network administrators to detect and remedy poor security practices related to public key certificates and to detect and combat the malicious use of public key certificates in a centralized environment. Best practices and detection methods and systems are developed over time via machine learning to improve network security, and any detected misuse may be brought to a network administrator's attention or automatically remedied.
    Type: Grant
    Filed: September 30, 2016
    Date of Patent: April 2, 2019
    Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC
    Inventors: Elad Iwanir, Gal Tamir, Shahar Weiss, Eli Koreh
  • Patent number: 10157055
    Abstract: Methods, systems, apparatuses, and computer program products are provided for transforming asynchronous code into more efficient, logically equivalent asynchronous code; Program code is converted into a first syntax tree. A dependency graph is generated from the first syntax tree with each node of the dependency graph corresponding to a code statement and having an assigned weight. Weighted topological sorting of the dependency graph is performed to generate a sorted dependency graph. A second syntax tree is generated from the sorted dependency graph. In another implementation, the program code is transformed into await-relaxed and/or loop-relaxed program code prior to being transformed into the first syntax tree.
    Type: Grant
    Filed: September 29, 2016
    Date of Patent: December 18, 2018
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Gal Tamir, Elad Iwanir, Eli Koreh
  • Publication number: 20180314517
    Abstract: Methods for intelligent automatic merging of source control queue items are performed by systems and apparatuses. Project changes are submitted in build requests to a gated check-in build queue requiring successful builds to commit changes to a code repository according to source control. Multiple pending build requests in the build queue are intelligently and automatically merged into a single, pending merged request based on risk factor values associated with the build requests. For merged requests successfully built, files in the build requests are committed and the build requests are removed from the queue. Merged requests unsuccessfully built are divided into equal subsets based on updated risk factor values using information from the unsuccessful build. Successful builds of subsets allow for committing of files and removal from the build queue, while unsuccessful builds are further divided and processed until single build requests are processed to identify root cause errors.
    Type: Application
    Filed: April 27, 2017
    Publication date: November 1, 2018
    Inventors: Elad Iwanir, Gal Tamir, Mario A. Rodriguez, Chen Lahav
  • Publication number: 20180278647
    Abstract: Described technologies automatically detect computing system security attacks. Departure of occurrence distributions, which are based on leading digit(s) of digital item occurrence data, from model distributions that correspond to particular data sources, indicates a presence likelihood for particular attack types. Some model distributions exhibit Benford's Phenomenon. Described mechanisms detect security attack types such as ransomware, bitcoin mining, and others, using particular corresponding data sources such as file extensions, processor statistics, etc. Mechanisms detect security attacks without a captured baseline of healthy normal behavior, and without relying on malware code signatures. When an item occurrence distribution departs from a model distribution by at least a predefined degree, the technology electronically raises a security attack alert. Then countermeasures may be asserted for a possible type X security attack on the computing system.
    Type: Application
    Filed: March 26, 2017
    Publication date: September 27, 2018
    Inventors: Yuri GABAEV, Elad IWANIR, Gal TAMIR
  • Patent number: 10077969
    Abstract: A system trains usage of a firearm and includes an end unit, a processing subsystem, and a control subsystem remotely located from the end unit. The end unit includes an image sensor that is positioned against a target that has a bar code. The image sensor defines a field of view of a scene that includes the target, and the bar code stores encoded information that defines a target coverage zone. The system selectively operates in a first mode and a second mode according to input from the control subsystem. In the first mode the end unit scans the bar code to extract the target coverage zone. In the second mode the image sensor captures a series of images of the target coverage zone, and the processing subsystem analyzes regions of the captured series of images to determine a strike, by a projectile of the firearm, on the target.
    Type: Grant
    Filed: November 28, 2017
    Date of Patent: September 18, 2018
    Assignee: MODULAR HIGH-END LTD.
    Inventor: Gal Tamir
  • Publication number: 20180211039
    Abstract: A system for protecting a database against a ransomware attack includes a database backup handler configured to selectively output database backup data associated with a database to a storage device. A ransomware detector is configured to monitor changes to the database and to detect data changes to the database resulting from a ransomware attack. A ransomware remediator communicates with the ransomware detector and the database backup handler and is configured to restore data in the database to a point prior to the ransomware attack based upon the backup data in the storage device.
    Type: Application
    Filed: April 19, 2017
    Publication date: July 26, 2018
    Applicant: Microsoft Technology Licensing, LLC
    Inventors: Gal TAMIR, Elad IWANIR, Avi BEN-MENAHEM
  • Publication number: 20180212987
    Abstract: An anti-ransomware system protects data in cloud storage of a cloud services provider against a ransomware attack. A backup handler is configured to at least one of: selectively retrieve backup data generated by the cloud services provider from the cloud storage; and selectively generate backup data based on the data in the cloud storage and output the backup data to a storage device. A ransomware detector is configured to detect data changes to the data resulting from a ransomware attack. A ransomware remediator communicates with the ransomware detector and the backup handler and is configured to restore the data to a state prior to the ransomware attack based upon the backup data.
    Type: Application
    Filed: December 4, 2017
    Publication date: July 26, 2018
    Applicant: Microsoft Technology Licensing, LLC
    Inventors: Gal TAMIR, Elad IWANIR
  • Publication number: 20180097803
    Abstract: The misuse of public key, private key, and public/private key certificates poses significant security challenges to computer networks that are addressed by certificate monitoring. Certificate monitoring allows network administrators to detect and remedy poor security practices related to public key certificates and to detect and combat the malicious use of public key certificates in a centralized environment. Best practices and detection methods and systems are developed over time via machine learning to improve network security, and any detected misuse may be brought to a network administrator's attention or automatically remedied.
    Type: Application
    Filed: September 30, 2016
    Publication date: April 5, 2018
    Applicant: Microsoft Technology Licensing, LLC.
    Inventors: Elad Iwanir, Gal Tamir, Shahar Weiss, Eli Koreh