Patents by Inventor Iftach Ragoler

Iftach Ragoler has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11455234
    Abstract: A robotic device management service obtains, from a customer, a first set of parameters of a robotic device and a second set of parameters for a simulation environment for testing a robotic device application installable on the robotic device. The set of parameters are used to indicate a storage location of the application and a selection of a simulation environment for testing the application. In response to the request, the robotic device management service selects a set of resources on which to execute the simulation in the simulation environment. The robotic device management service obtains the robotic device application from the storage location and loads the application on to the set of resources to execute the simulation.
    Type: Grant
    Filed: November 21, 2018
    Date of Patent: September 27, 2022
    Assignee: Amazon Technologies, Inc.
    Inventors: Gaurav D. Ghare, Bin Zhu, Roger S. Barga, William J. Vass, Gourav Roy, Chetan Banthiya, Paul Andrew Lafranchise, Dmitry Berkovich, Fusheng Yuan, Ritesh Singh, Swarnaprakash Udayakumar, Brandon Kyle Pelfrey, Jason Chen Hooi Chionh, Iftach Ragoler
  • Publication number: 20200159648
    Abstract: A robotic device management service obtains, from a customer, a first set of parameters of a robotic device and a second set of parameters for a simulation environment for testing a robotic device application installable on the robotic device. The set of parameters are used to indicate a storage location of the application and a selection of a simulation environment for testing the application. In response to the request, the robotic device management service selects a set of resources on which to execute the simulation in the simulation environment. The robotic device management service obtains the robotic device application from the storage location and loads the application on to the set of resources to execute the simulation.
    Type: Application
    Filed: November 21, 2018
    Publication date: May 21, 2020
    Inventors: Gaurav D. Ghare, Bin Zhu, Roger S. Barga, William J. Vass, Gourav Roy, Chetan Banthiya, Paul Andrew Lafranchise, Dmitry Berkovich, Fusheng Yuan, Ritesh Singh, Swarnaprakash Udayakumar, Brandon Kyle Pelfrey, Jason Chen Hooi Chionh, Iftach Ragoler
  • Publication number: 20200156243
    Abstract: A robotic device management service obtains a set of parameters of a simulation environment and a set of components for execution of a simulation of a robotic device application. Based on these parameters, the robotic device management service selects a set of resources for executing the application in a simulation environment. The robotic device management service may launch the set of components among the set of resources and monitor execution of the application in the simulation environment to ensure completion of the simulation.
    Type: Application
    Filed: November 21, 2018
    Publication date: May 21, 2020
    Inventors: Gaurav D. Ghare, Bin Zhu, Roger S. Barga, William J. Vass, Gourav Roy, Chetan Banthiya, Paul Andrew Lafranchise, Dmitry Berkovich, Fusheng Yuan, Ritesh Singh, Swarnaprakash Udayakumar, Brandon Kyle Pelfrey, Jason Chen Hooi Chionh, Iftach Ragoler
  • Patent number: 10263789
    Abstract: A service provider network includes a certificate manager that auto-generates and auto-renews security certificates for customers of the provider network. The security certificates may be usable to implement a Secure Sockets Layer (SSL) protocol, or other types of security protocols. The certificate manager generates a public key, private key pair for the customer, generates the certificate signing request (CSR) on behalf of the customer, transmits the CSR to the certificate authority (CA), and binds the resulting CA-generated certificate and private key to whatever internet-facing service the customer chooses (e.g., a load balancer).
    Type: Grant
    Filed: March 28, 2016
    Date of Patent: April 16, 2019
    Assignee: Amazon Technologies, Inc.
    Inventors: Stefan Popoveniuc, Nicholas James Lynch, Preston Anthony Elder, III, Param Sharma, Todd Lawrence Cignetti, Dmitry Berkovich, Iftach Ragoler
  • Patent number: 9990500
    Abstract: Disclosed herein are techniques for determining vulnerabilities in applications under testing. It is determined whether a first database instruction of an application enters information into a database and whether a second database instruction thereof obtains said information from the database. If the first database instruction enters the information in the database and the second database instruction obtains the information therefrom, it is determined whether the application is vulnerable to entry of malicious code via the database.
    Type: Grant
    Filed: July 25, 2012
    Date of Patent: June 5, 2018
    Assignee: ENTIT SOFTWARE LLC
    Inventors: Sasi Siddharth Muthurajan, Prajakta Subhash Jagdale, Leonid Promyshlyansky Bensman, Iftach Ragoler, Philip Edward Hamer
  • Patent number: 9501650
    Abstract: The present disclosure provides a system that includes a server hosting an application under test (AUT), an observer configured to monitor instructions executed by the AUT, and a computing device communicatively coupled to the AUT and the observer through a common communication channel. The computing device may be configured to send an application request to the AUT, wherein the application request is configured to expose a potential vulnerability of the AUT. The computing device may receive an application response from the AUT in accordance with the AUT's programming. The computing device may send a service request to the observer, and receive a service response from the observer that contains information corresponding to the instructions executed by the AUT due to the application request, information about the AUT, or information about a server hosting the AUT.
    Type: Grant
    Filed: September 4, 2015
    Date of Patent: November 22, 2016
    Assignee: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
    Inventors: Brian V. Chess, Iftach Ragoler, Philip Edward Hamer, Russell Andrew Spitler, Sean Patrick Fay, Prajakta Subbash Jagdale
  • Publication number: 20150379273
    Abstract: The present disclosure provides a system that includes a server hosting an application under test (AUT), an observer configured to monitor instructions executed by the AUT, and a computing device communicatively coupled to the AUT and the observer through a common communication channel. The computing device may be configured to send an application request to the AUT, wherein the application request is configured to expose a potential vulnerability of the AUT. The computing device may receive an application response from the AUT in accordance with the AUT's programming. The computing device may send a service request to the observer, and receive a service response from the observer that contains information corresponding to the instructions executed by the AUT due to the application request, information about the AUT, or information about a server hosting the AUT.
    Type: Application
    Filed: September 4, 2015
    Publication date: December 31, 2015
    Inventors: Brian V. Chess, Iftach Ragoler, Philip Edward Hamer, Russell Andrew Spitler, Sean Patrick Fay, Prajakta Subbash Jagdale
  • Patent number: 9215247
    Abstract: The present disclosure provides a system that includes a server hosting an application under test (AUT), an observer configured to monitor instructions executed by the AUT, and a computing device communicatively coupled to the AUT and the observer through a common communication channel. The computing device may be configured to send an application request to the AUT, wherein the application request is configured to expose a potential vulnerability of the AUT. The computing device may receive an application response from the AUT in accordance with the AUT's programming. The computing device may send a service request to the observer, and receive a service response from the observer that contains information corresponding to the instructions executed by the AUT due to the application request, information about the AUT, or information about a server hosting the AUT.
    Type: Grant
    Filed: May 31, 2011
    Date of Patent: December 15, 2015
    Assignee: Hewlett Packard Enterprise Development LP
    Inventors: Brian V. Chess, Iftach Ragoler, Philip Edward Hamer, Russell Andrew Spitler, Sean Patrick Fay, Prajakta Subbash Jagdate
  • Publication number: 20150128281
    Abstract: Disclosed herein are techniques for determining vulnerabilities in applications under testing. It is determined whether a first database instruction of an application enters information into a database and whether a second database instruction thereof obtains said information from the database. If the first database instruction enters the information in the database and the second database instruction obtains the information therefrom, it is determined whether the application is vulnerable to entry of malicious code via the database.
    Type: Application
    Filed: July 25, 2012
    Publication date: May 7, 2015
    Inventors: Sasi Siddharth Muthurajan, Prajakta Subhash Jagdale, Leonid Promyshlyansky Bensman, Iftach Ragoler, Philip Edward Hamer
  • Publication number: 20140082739
    Abstract: The present disclosure provides a system that includes a server hosting an application under test (AUT), an observer configured to monitor instructions executed by the AUT, and a computing device communicatively coupled to the AUT and the observer through a common communication channel. The computing device may be configured to send an application request to the AUT, wherein the application request is configured to expose a potential vulnerability of the AUT. The computing device may receive an application response from the AUT in accordance with the AUT's programming. The computing device may send a service request to the observer, and receive a service response from the observer that contains information corresponding to the instructions executed by the AUT due to the application request, information about the AUT, or information about a server hosting the AUT.
    Type: Application
    Filed: May 31, 2011
    Publication date: March 20, 2014
    Inventors: Brian V. Chess, Iftach Ragoler, Philip Edward Hamer, Russell Andrew Spitler, Sean Patrick Fay, Prajakta Subbash Jagdate
  • Publication number: 20130160130
    Abstract: In one implementation, an attack surface identification system defines an interface description of an application during execution of the application. The interface description is then provided to a scanner.
    Type: Application
    Filed: December 20, 2011
    Publication date: June 20, 2013
    Inventors: Kirill Mendelev, Iftach Ragoler, Brian V. Chess, Spencer James Firestone, Yaron Kfir
  • Publication number: 20110029950
    Abstract: Computer-readable media, methods and computer systems for designing a software application graphically are provided herein. Designing a software application graphically may include inserting a graphical link between parameters of graphical nodes representing first and second activities of a software application, the graphical link representing a data control link that includes an adjustable state, and forming a computer-generated executable with the first and second activities, the data link and the adjustable state.
    Type: Application
    Filed: July 30, 2009
    Publication date: February 3, 2011
    Inventors: Iftach RAGOLER, Adi BARDA, Ran LAMPERT
  • Publication number: 20060101435
    Abstract: A code pattern detector including at least one pattern definition expressed in a pattern language, and a code analyzer operative to employ the pattern definition to analyze a code base, the code analyzer including a representation builder operative to construct a representation of the code base, a pattern detector operative to process the representation in conjunction with the pattern definition to find a pattern within the representation, and an inference engine operative to express any of the found patterns as an abstract relationship within the code base.
    Type: Application
    Filed: October 13, 2004
    Publication date: May 11, 2006
    Applicant: International Business Machines Corporation
    Inventors: Alex Akilov, Ronen Lerner, Sara Porat, Iftach Ragoler, Avi Yaeli
  • Publication number: 20040100494
    Abstract: A development tool operable in a development environment. The tool may include tracking means and a processor. The tracking means may be adapted for tracking one or more user interface actions. The processor may be adapted for associating the user interface actions with development information. The development tool may further include notification means for notifying a user of the receipt of development information.
    Type: Application
    Filed: November 27, 2002
    Publication date: May 27, 2004
    Applicant: International Business Machines Corporation
    Inventors: Iftach Ragoler, Avi Yaeli, Gabi Zodik