Patents by Inventor Haim Schneider
Haim Schneider has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10826863Abstract: A system for eliminating redundant notifications to SIP/SIMPLE subscribers, the system including a notification fingerprinter configured to generate a fingerprint from the contents of a SIP/SIMPLE subscriber notification using a predefined fingerprinting method, a fingerprint comparator configured to compare a fingerprint of a previously-sent notification with a fingerprint of a waiting-to-be-sent notification, and a server configured to send the waiting-to-be-sent notification to the subscriber only if the fingerprints do not match.Type: GrantFiled: October 11, 2018Date of Patent: November 3, 2020Assignee: International Business Machines CorporationInventors: Asaf Ben-Ezra, Olga Berezin, Haim Schneider, Ofira Tal-Aviv, Asaf Zinger
-
Patent number: 10289518Abstract: Techniques for determining the legitimacy of a problem report are provided. Report data indicating a reported problem is received at a computer processor. Image data associated with the reported problem is identified, and metadata associated with the image data is identified. The legitimacy of the reported problem is determined based on the metadata in view of the report data.Type: GrantFiled: August 7, 2017Date of Patent: May 14, 2019Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventor: Haim Schneider
-
Patent number: 10277409Abstract: Examples of techniques for authenticating mobile applications are described herein. A method includes receiving, via a first server, a key pair and a policy file associated with a mobile service from a second server. Authentication of the mobile application is performed based on the key pair and the policy file. A scope token is generated with an application scope in response to authenticating the mobile application. Authentication of a client device is performed corresponding to the mobile application and a user to generate a doubly-authenticated scope token including a device scope and application authenticity scope. The doubly-authenticated scope token is sent to a security gateway for user authentication. A trebly-authenticated scope token is received with a grant token request and a grant token is sent to the mobile application. The grant token is received from the mobile application. An access token is generated and sent to the mobile application.Type: GrantFiled: December 7, 2017Date of Patent: April 30, 2019Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Ishai Borovoy, Iddo Levin, Haim Schneider, Gal Shachor, Artem Spector
-
Publication number: 20190068539Abstract: A system for eliminating redundant notifications to SIP/SIMPLE subscribers, the system including a notification fingerprinter configured to generate a fingerprint from the contents of a SIP/SIMPLE subscriber notification using a predefined fingerprinting method, a fingerprint comparator configured to compare a fingerprint of a previously-sent notification with a fingerprint of a waiting-to-be-sent notification, and a server configured to send the waiting-to-be-sent notification to the subscriber only if the fingerprints do not match.Type: ApplicationFiled: October 11, 2018Publication date: February 28, 2019Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Asaf BEN-EZRA, Olga BEREZIN, Haim SCHNEIDER, Ofira TAL-AVIV, Asaf ZINGER
-
Patent number: 10158595Abstract: A system for eliminating redundant notifications to SIP/SIMPLE subscribers, the system including a notification fingerprinter configured to generate a fingerprint from the contents of a SIP/SIMPLE subscriber notification using a predefined fingerprinting method, a fingerprint comparator configured to compare a fingerprint of a previously-sent notification with a fingerprint of a waiting-to-be-sent notification, and a server configured to send the waiting-to-be-sent notification to the subscriber only if the fingerprints do not match.Type: GrantFiled: September 26, 2017Date of Patent: December 18, 2018Assignee: International Business Machines CorporationInventors: Asaf Ben-Ezra, Olga Berezin, Haim Schneider, Ofira Tal-Aviv, Asaf Zinger
-
Patent number: 10085150Abstract: Examples of techniques for authenticating mobile applications are described herein. A method can include receiving, by a processor, a key pair and a policy file associated with a mobile service. The processor can receive a service request from a mobile application at a security gateway. The processor can detect that the service request includes an invalid or missing access token. The processor can redirect the mobile application to request a grant token from an authorization end point on a server. The processor can receive a grant token request from the mobile application and forward the grant token request to the server based on a policy file, the policy file including a list of: a plurality of security objects to be authenticated, a plurality of computing devices to authenticate the security objects, and an order of authentication.Type: GrantFiled: May 11, 2017Date of Patent: September 25, 2018Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Ishai Borovoy, Iddo Levin, Haim Schneider, Gal Shachor, Artem Spector
-
Publication number: 20180109505Abstract: Examples of techniques for authenticating mobile applications are described herein. A method includes receiving, via a first server, a key pair and a policy file associated with a mobile service from a second server. Authentication of the mobile application is performed based on the key pair and the policy file. A scope token is generated with an application scope in response to authenticating the mobile application. Authentication of a client device is performed corresponding to the mobile application and a user to generate a doubly-authenticated scope token including a device scope and application authenticity scope. The doubly-authenticated scope token is sent to a security gateway for user authentication. A trebly-authenticated scope token is received with a grant token request and a grant token is sent to the mobile application. The grant token is received from the mobile application. An access token is generated and sent to the mobile application.Type: ApplicationFiled: December 7, 2017Publication date: April 19, 2018Inventors: Ishai Borovoy, Iddo Levin, Haim Schneider, Gal Shachor, Artem Spector
-
Patent number: 9923880Abstract: Examples of techniques for authenticating mobile applications are described herein. A method includes receiving, at a first server, a key pair and a policy file associated with a mobile service on a second server, the policy file includes a plurality of security objects to be authenticated, a plurality of computing devices to authenticate the security objects, and an order of authentication. The method includes distributing the key pair and the policy file to a security device. The method also includes receiving, at the first server, an authentication request from a mobile application. The method further includes creating an authenticity challenge as specified in the policy file and sending the authenticity challenge with a response to the mobile application.Type: GrantFiled: August 4, 2015Date of Patent: March 20, 2018Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Ishai Borovoy, Iddo Levin, Haim Schneider, Gal Shachor, Artem Spector
-
Publication number: 20180019965Abstract: A system for eliminating redundant notifications to SIP/SIMPLE subscribers, the system including a notification fingerprinter configured to generate a fingerprint from the contents of a SIP/SIMPLE subscriber notification using a predefined fingerprinting method, a fingerprint comparator configured to compare a fingerprint of a previously-sent notification with a fingerprint of a waiting-to-be-sent notification, and a server configured to send the waiting-to-be-sent notification to the subscriber only if the fingerprints do not match.Type: ApplicationFiled: September 26, 2017Publication date: January 18, 2018Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Asaf BEN-EZRA, Olga BEREZIN, Haim SCHNEIDER, Ofira TAL-AVIV, Asaf ZINGER
-
Patent number: 9832153Abstract: A system for eliminating redundant notifications to SIP/SIMPLE subscribers, the system including a notification fingerprinter configured to generate a fingerprint from the contents of a SIP/SIMPLE subscriber notification using a predefined fingerprinting method, a fingerprint comparator configured to compare a fingerprint of a previously-sent notification with a fingerprint of a waiting-to-be-sent notification, and a server configured to send the waiting-to-be-sent notification to the subscriber only if the fingerprints do not match.Type: GrantFiled: June 9, 2015Date of Patent: November 28, 2017Assignee: International Business Machines CorporationInventors: Asaf Ben-Ezra, Olga Berezin, Haim Schneider, Ofira Tal-Aviv, Asaf Zinger
-
Publication number: 20170329689Abstract: Techniques for determining the legitimacy of a problem report are provided. Report data indicating a reported problem is received at a computer processor. Image data associated with the reported problem is identified, and metadata associated with the image data is identified. The legitimacy of the reported problem is determined based on the metadata in view of the report data.Type: ApplicationFiled: August 7, 2017Publication date: November 16, 2017Inventor: Haim Schneider
-
Publication number: 20170251367Abstract: Examples of techniques for authenticating mobile applications are described herein. A method can include receiving, by a processor, a key pair and a policy file associated with a mobile service. The processor can receive a service request from a mobile application at a security gateway. The processor can detect that the service request includes an invalid or missing access token. The processor can redirect the mobile application to request a grant token from an authorization end point on a server. The processor can receive a grant token request from the mobile application and forward the grant token request to the server based on a policy file, the policy file including a list of: a plurality of security objects to be authenticated, a plurality of computing devices to authenticate the security objects, and an order of authentication.Type: ApplicationFiled: May 11, 2017Publication date: August 31, 2017Inventors: Ishai Borovoy, Iddo Levin, Haim Schneider, Gal Shachor, Artem Spector
-
Patent number: 9736126Abstract: Examples of techniques for authenticating mobile applications are described herein. A method includes receiving, at a first server, a key pair and a policy file associated with a mobile service on a second server, the policy file includes a plurality of security objects to be authenticated, a plurality of computing devices to authenticate the security objects, and an order of authentication. The method includes distributing the key pair and the policy file to a security device. The method also includes receiving, at the first server, an authentication request from a mobile application. The method further includes creating an authenticity challenge as specified in the policy file and sending the authenticity challenge with a response to the mobile application.Type: GrantFiled: December 4, 2014Date of Patent: August 15, 2017Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Ishai Borovoy, Iddo Levin, Haim Schneider, Gal Shachor, Artem Spector
-
Patent number: 9727875Abstract: Techniques for determining the legitimacy of a problem report are provided. Report data indicating a reported problem is received at a computer processor. Image data associated with the reported problem is identified, and metadata associated with the image data is identified. The legitimacy of the reported problem is determined based on the metadata in view of the report data.Type: GrantFiled: November 19, 2013Date of Patent: August 8, 2017Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventor: Haim Schneider
-
Patent number: 9537865Abstract: Examples of techniques for validating access tokens are described herein. An example computer-implemented method includes receiving, via a processor, a pushed event at a server. The method includes adding, via the processor, a value of the pushed event to a black list of recently disabled users, devices, applications, or any combination thereof. The method also includes receiving, via the processor, a request to access a resource on the server, the request including an access token. The method further includes comparing, via the processor, a field value of the access token with the black list. The method further includes declining, via the processor, the request based on a match of the field value of the access token with a value of the pushed event in the black list.Type: GrantFiled: December 3, 2015Date of Patent: January 3, 2017Assignee: International Business Machines CorporationInventors: Ishai Borovoy, Iddo Levin, Haim Schneider, Artem Spector, Tomer Vilensky, Uri Zonens
-
Publication number: 20160164851Abstract: Examples of techniques for authenticating mobile applications are described herein. A method includes receiving, at a first server, a key pair and a policy file associated with a mobile service on a second server, the policy file includes a plurality of security objects to be authenticated, a plurality of computing devices to authenticate the security objects, and an order of authentication. The method includes distributing the key pair and the policy file to a security device. The method also includes receiving, at the first server, an authentication request from a mobile application. The method further includes creating an authenticity challenge as specified in the policy file and sending the authenticity challenge with a response to the mobile application.Type: ApplicationFiled: December 4, 2014Publication date: June 9, 2016Inventors: Ishai Borovoy, Iddo Levin, Haim Schneider, Gal Shachor, Artem Spector
-
Publication number: 20160164920Abstract: Examples of techniques for authenticating mobile applications are described herein. A method includes receiving, at a first server, a key pair and a policy file associated with a mobile service on a second server, the policy file includes a plurality of security objects to be authenticated, a plurality of computing devices to authenticate the security objects, and an order of authentication. The method includes distributing the key pair and the policy file to a security device. The method also includes receiving, at the first server, an authentication request from a mobile application. The method further includes creating an authenticity challenge as specified in the policy file and sending the authenticity challenge with a response to the mobile application.Type: ApplicationFiled: August 4, 2015Publication date: June 9, 2016Inventors: Ishai Borovoy, Iddo Levin, Haim Schneider, Gal Shachor, Artem Spector
-
Publication number: 20150271123Abstract: A system for eliminating redundant notifications to SIP/SIMPLE subscribers, the system including a notification fingerprinter configured to generate a fingerprint from the contents of a SIP/SIMPLE subscriber notification using a predefined fingerprinting method, a fingerprint comparator configured to compare a fingerprint of a previously-sent notification with a fingerprint of a waiting-to-be-sent notification, and a server configured to send the waiting-to-be-sent notification to the subscriber only if the fingerprints do not match.Type: ApplicationFiled: June 9, 2015Publication date: September 24, 2015Inventors: Asaf BEN-EZRA, Olga BEREZIN, Haim SCHNEIDER, Ofira TAL-AVIV, Asaf ZINGER
-
Patent number: 9088578Abstract: A system for eliminating redundant notifications to SIP/SIMPLE subscribers, the system including a notification fingerprinter configured to generate a fingerprint from the contents of a SIP/SIMPLE subscriber notification using a predefined fingerprinting method, a fingerprint comparator configured to compare a fingerprint of a previously-sent notification with a fingerprint of a waiting-to-be-sent notification, and a server configured to send the waiting-to-be-sent notification to the subscriber only if the fingerprints do not match.Type: GrantFiled: January 11, 2008Date of Patent: July 21, 2015Assignee: International Business Machines CorporationInventors: Asaf Ben-Ezra, Olga Berezin, Haim Schneider, Ofira Tal-Aviv, Asaf Zinger
-
Publication number: 20150142681Abstract: Techniques for determining the legitimacy of a problem report are provided. Report data indicating a reported problem is received at a computer processor. Image data associated with the reported problem is identified, and metadata associated with the image data is identified. The legitimacy of the reported problem is determined based on the metadata in view of the report data.Type: ApplicationFiled: November 19, 2013Publication date: May 21, 2015Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventor: Haim Schneider