Patents by Inventor Haim Schneider

Haim Schneider has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10826863
    Abstract: A system for eliminating redundant notifications to SIP/SIMPLE subscribers, the system including a notification fingerprinter configured to generate a fingerprint from the contents of a SIP/SIMPLE subscriber notification using a predefined fingerprinting method, a fingerprint comparator configured to compare a fingerprint of a previously-sent notification with a fingerprint of a waiting-to-be-sent notification, and a server configured to send the waiting-to-be-sent notification to the subscriber only if the fingerprints do not match.
    Type: Grant
    Filed: October 11, 2018
    Date of Patent: November 3, 2020
    Assignee: International Business Machines Corporation
    Inventors: Asaf Ben-Ezra, Olga Berezin, Haim Schneider, Ofira Tal-Aviv, Asaf Zinger
  • Patent number: 10289518
    Abstract: Techniques for determining the legitimacy of a problem report are provided. Report data indicating a reported problem is received at a computer processor. Image data associated with the reported problem is identified, and metadata associated with the image data is identified. The legitimacy of the reported problem is determined based on the metadata in view of the report data.
    Type: Grant
    Filed: August 7, 2017
    Date of Patent: May 14, 2019
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventor: Haim Schneider
  • Patent number: 10277409
    Abstract: Examples of techniques for authenticating mobile applications are described herein. A method includes receiving, via a first server, a key pair and a policy file associated with a mobile service from a second server. Authentication of the mobile application is performed based on the key pair and the policy file. A scope token is generated with an application scope in response to authenticating the mobile application. Authentication of a client device is performed corresponding to the mobile application and a user to generate a doubly-authenticated scope token including a device scope and application authenticity scope. The doubly-authenticated scope token is sent to a security gateway for user authentication. A trebly-authenticated scope token is received with a grant token request and a grant token is sent to the mobile application. The grant token is received from the mobile application. An access token is generated and sent to the mobile application.
    Type: Grant
    Filed: December 7, 2017
    Date of Patent: April 30, 2019
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Ishai Borovoy, Iddo Levin, Haim Schneider, Gal Shachor, Artem Spector
  • Publication number: 20190068539
    Abstract: A system for eliminating redundant notifications to SIP/SIMPLE subscribers, the system including a notification fingerprinter configured to generate a fingerprint from the contents of a SIP/SIMPLE subscriber notification using a predefined fingerprinting method, a fingerprint comparator configured to compare a fingerprint of a previously-sent notification with a fingerprint of a waiting-to-be-sent notification, and a server configured to send the waiting-to-be-sent notification to the subscriber only if the fingerprints do not match.
    Type: Application
    Filed: October 11, 2018
    Publication date: February 28, 2019
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Asaf BEN-EZRA, Olga BEREZIN, Haim SCHNEIDER, Ofira TAL-AVIV, Asaf ZINGER
  • Patent number: 10158595
    Abstract: A system for eliminating redundant notifications to SIP/SIMPLE subscribers, the system including a notification fingerprinter configured to generate a fingerprint from the contents of a SIP/SIMPLE subscriber notification using a predefined fingerprinting method, a fingerprint comparator configured to compare a fingerprint of a previously-sent notification with a fingerprint of a waiting-to-be-sent notification, and a server configured to send the waiting-to-be-sent notification to the subscriber only if the fingerprints do not match.
    Type: Grant
    Filed: September 26, 2017
    Date of Patent: December 18, 2018
    Assignee: International Business Machines Corporation
    Inventors: Asaf Ben-Ezra, Olga Berezin, Haim Schneider, Ofira Tal-Aviv, Asaf Zinger
  • Patent number: 10085150
    Abstract: Examples of techniques for authenticating mobile applications are described herein. A method can include receiving, by a processor, a key pair and a policy file associated with a mobile service. The processor can receive a service request from a mobile application at a security gateway. The processor can detect that the service request includes an invalid or missing access token. The processor can redirect the mobile application to request a grant token from an authorization end point on a server. The processor can receive a grant token request from the mobile application and forward the grant token request to the server based on a policy file, the policy file including a list of: a plurality of security objects to be authenticated, a plurality of computing devices to authenticate the security objects, and an order of authentication.
    Type: Grant
    Filed: May 11, 2017
    Date of Patent: September 25, 2018
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Ishai Borovoy, Iddo Levin, Haim Schneider, Gal Shachor, Artem Spector
  • Publication number: 20180109505
    Abstract: Examples of techniques for authenticating mobile applications are described herein. A method includes receiving, via a first server, a key pair and a policy file associated with a mobile service from a second server. Authentication of the mobile application is performed based on the key pair and the policy file. A scope token is generated with an application scope in response to authenticating the mobile application. Authentication of a client device is performed corresponding to the mobile application and a user to generate a doubly-authenticated scope token including a device scope and application authenticity scope. The doubly-authenticated scope token is sent to a security gateway for user authentication. A trebly-authenticated scope token is received with a grant token request and a grant token is sent to the mobile application. The grant token is received from the mobile application. An access token is generated and sent to the mobile application.
    Type: Application
    Filed: December 7, 2017
    Publication date: April 19, 2018
    Inventors: Ishai Borovoy, Iddo Levin, Haim Schneider, Gal Shachor, Artem Spector
  • Patent number: 9923880
    Abstract: Examples of techniques for authenticating mobile applications are described herein. A method includes receiving, at a first server, a key pair and a policy file associated with a mobile service on a second server, the policy file includes a plurality of security objects to be authenticated, a plurality of computing devices to authenticate the security objects, and an order of authentication. The method includes distributing the key pair and the policy file to a security device. The method also includes receiving, at the first server, an authentication request from a mobile application. The method further includes creating an authenticity challenge as specified in the policy file and sending the authenticity challenge with a response to the mobile application.
    Type: Grant
    Filed: August 4, 2015
    Date of Patent: March 20, 2018
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Ishai Borovoy, Iddo Levin, Haim Schneider, Gal Shachor, Artem Spector
  • Publication number: 20180019965
    Abstract: A system for eliminating redundant notifications to SIP/SIMPLE subscribers, the system including a notification fingerprinter configured to generate a fingerprint from the contents of a SIP/SIMPLE subscriber notification using a predefined fingerprinting method, a fingerprint comparator configured to compare a fingerprint of a previously-sent notification with a fingerprint of a waiting-to-be-sent notification, and a server configured to send the waiting-to-be-sent notification to the subscriber only if the fingerprints do not match.
    Type: Application
    Filed: September 26, 2017
    Publication date: January 18, 2018
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Asaf BEN-EZRA, Olga BEREZIN, Haim SCHNEIDER, Ofira TAL-AVIV, Asaf ZINGER
  • Patent number: 9832153
    Abstract: A system for eliminating redundant notifications to SIP/SIMPLE subscribers, the system including a notification fingerprinter configured to generate a fingerprint from the contents of a SIP/SIMPLE subscriber notification using a predefined fingerprinting method, a fingerprint comparator configured to compare a fingerprint of a previously-sent notification with a fingerprint of a waiting-to-be-sent notification, and a server configured to send the waiting-to-be-sent notification to the subscriber only if the fingerprints do not match.
    Type: Grant
    Filed: June 9, 2015
    Date of Patent: November 28, 2017
    Assignee: International Business Machines Corporation
    Inventors: Asaf Ben-Ezra, Olga Berezin, Haim Schneider, Ofira Tal-Aviv, Asaf Zinger
  • Publication number: 20170329689
    Abstract: Techniques for determining the legitimacy of a problem report are provided. Report data indicating a reported problem is received at a computer processor. Image data associated with the reported problem is identified, and metadata associated with the image data is identified. The legitimacy of the reported problem is determined based on the metadata in view of the report data.
    Type: Application
    Filed: August 7, 2017
    Publication date: November 16, 2017
    Inventor: Haim Schneider
  • Publication number: 20170251367
    Abstract: Examples of techniques for authenticating mobile applications are described herein. A method can include receiving, by a processor, a key pair and a policy file associated with a mobile service. The processor can receive a service request from a mobile application at a security gateway. The processor can detect that the service request includes an invalid or missing access token. The processor can redirect the mobile application to request a grant token from an authorization end point on a server. The processor can receive a grant token request from the mobile application and forward the grant token request to the server based on a policy file, the policy file including a list of: a plurality of security objects to be authenticated, a plurality of computing devices to authenticate the security objects, and an order of authentication.
    Type: Application
    Filed: May 11, 2017
    Publication date: August 31, 2017
    Inventors: Ishai Borovoy, Iddo Levin, Haim Schneider, Gal Shachor, Artem Spector
  • Patent number: 9736126
    Abstract: Examples of techniques for authenticating mobile applications are described herein. A method includes receiving, at a first server, a key pair and a policy file associated with a mobile service on a second server, the policy file includes a plurality of security objects to be authenticated, a plurality of computing devices to authenticate the security objects, and an order of authentication. The method includes distributing the key pair and the policy file to a security device. The method also includes receiving, at the first server, an authentication request from a mobile application. The method further includes creating an authenticity challenge as specified in the policy file and sending the authenticity challenge with a response to the mobile application.
    Type: Grant
    Filed: December 4, 2014
    Date of Patent: August 15, 2017
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Ishai Borovoy, Iddo Levin, Haim Schneider, Gal Shachor, Artem Spector
  • Patent number: 9727875
    Abstract: Techniques for determining the legitimacy of a problem report are provided. Report data indicating a reported problem is received at a computer processor. Image data associated with the reported problem is identified, and metadata associated with the image data is identified. The legitimacy of the reported problem is determined based on the metadata in view of the report data.
    Type: Grant
    Filed: November 19, 2013
    Date of Patent: August 8, 2017
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventor: Haim Schneider
  • Patent number: 9537865
    Abstract: Examples of techniques for validating access tokens are described herein. An example computer-implemented method includes receiving, via a processor, a pushed event at a server. The method includes adding, via the processor, a value of the pushed event to a black list of recently disabled users, devices, applications, or any combination thereof. The method also includes receiving, via the processor, a request to access a resource on the server, the request including an access token. The method further includes comparing, via the processor, a field value of the access token with the black list. The method further includes declining, via the processor, the request based on a match of the field value of the access token with a value of the pushed event in the black list.
    Type: Grant
    Filed: December 3, 2015
    Date of Patent: January 3, 2017
    Assignee: International Business Machines Corporation
    Inventors: Ishai Borovoy, Iddo Levin, Haim Schneider, Artem Spector, Tomer Vilensky, Uri Zonens
  • Publication number: 20160164851
    Abstract: Examples of techniques for authenticating mobile applications are described herein. A method includes receiving, at a first server, a key pair and a policy file associated with a mobile service on a second server, the policy file includes a plurality of security objects to be authenticated, a plurality of computing devices to authenticate the security objects, and an order of authentication. The method includes distributing the key pair and the policy file to a security device. The method also includes receiving, at the first server, an authentication request from a mobile application. The method further includes creating an authenticity challenge as specified in the policy file and sending the authenticity challenge with a response to the mobile application.
    Type: Application
    Filed: December 4, 2014
    Publication date: June 9, 2016
    Inventors: Ishai Borovoy, Iddo Levin, Haim Schneider, Gal Shachor, Artem Spector
  • Publication number: 20160164920
    Abstract: Examples of techniques for authenticating mobile applications are described herein. A method includes receiving, at a first server, a key pair and a policy file associated with a mobile service on a second server, the policy file includes a plurality of security objects to be authenticated, a plurality of computing devices to authenticate the security objects, and an order of authentication. The method includes distributing the key pair and the policy file to a security device. The method also includes receiving, at the first server, an authentication request from a mobile application. The method further includes creating an authenticity challenge as specified in the policy file and sending the authenticity challenge with a response to the mobile application.
    Type: Application
    Filed: August 4, 2015
    Publication date: June 9, 2016
    Inventors: Ishai Borovoy, Iddo Levin, Haim Schneider, Gal Shachor, Artem Spector
  • Publication number: 20150271123
    Abstract: A system for eliminating redundant notifications to SIP/SIMPLE subscribers, the system including a notification fingerprinter configured to generate a fingerprint from the contents of a SIP/SIMPLE subscriber notification using a predefined fingerprinting method, a fingerprint comparator configured to compare a fingerprint of a previously-sent notification with a fingerprint of a waiting-to-be-sent notification, and a server configured to send the waiting-to-be-sent notification to the subscriber only if the fingerprints do not match.
    Type: Application
    Filed: June 9, 2015
    Publication date: September 24, 2015
    Inventors: Asaf BEN-EZRA, Olga BEREZIN, Haim SCHNEIDER, Ofira TAL-AVIV, Asaf ZINGER
  • Patent number: 9088578
    Abstract: A system for eliminating redundant notifications to SIP/SIMPLE subscribers, the system including a notification fingerprinter configured to generate a fingerprint from the contents of a SIP/SIMPLE subscriber notification using a predefined fingerprinting method, a fingerprint comparator configured to compare a fingerprint of a previously-sent notification with a fingerprint of a waiting-to-be-sent notification, and a server configured to send the waiting-to-be-sent notification to the subscriber only if the fingerprints do not match.
    Type: Grant
    Filed: January 11, 2008
    Date of Patent: July 21, 2015
    Assignee: International Business Machines Corporation
    Inventors: Asaf Ben-Ezra, Olga Berezin, Haim Schneider, Ofira Tal-Aviv, Asaf Zinger
  • Publication number: 20150142681
    Abstract: Techniques for determining the legitimacy of a problem report are provided. Report data indicating a reported problem is received at a computer processor. Image data associated with the reported problem is identified, and metadata associated with the image data is identified. The legitimacy of the reported problem is determined based on the metadata in view of the report data.
    Type: Application
    Filed: November 19, 2013
    Publication date: May 21, 2015
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventor: Haim Schneider