Patents by Inventor Inbal ZILBERMAN-KUBOVSKY
Inbal ZILBERMAN-KUBOVSKY has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10333925Abstract: The disclosed embodiments include systems and methods for providing security tokens to cloud-based assets on demand. Operations performed in the disclosed embodiments include receiving a prompt from a cloud-based asset indicating that the cloud-based asset is seeking to communicate with an access-controlled resource, wherein the cloud-based asset lacks authorization to communicate with the access-controlled resource. Additionally, the operations include extracting information associated with the cloud-based asset by accessing a trusted cloud platform resource storing data associated with verified cloud-based assets, where the trusted cloud platform resource is separate from the cloud-based asset, and authenticating the cloud-based asset based on the extracted information.Type: GrantFiled: June 20, 2018Date of Patent: June 25, 2019Assignee: CYBERARK SOFTWARE LTD.Inventors: Rafi Schwarz, Eli Maccabi, Moti Cohen, Nessi Lahav, Inbal Zilberman Kubovsky, Evgeny Sakirko
-
Publication number: 20180367528Abstract: The disclosed embodiments include systems and methods for providing authentication credential data to cloud-based assets on demand. Operations include receiving a prompt indicating that a cloud-based asset is seeking to communicate with an access-controlled resource, extracting information associated with the cloud-based asset, authenticating the cloud-based asset based on the extracted information, generating first authentication credential data for the cloud-based asset, generating second authentication credential data for the cloud-based asset, making the first authentication credential data available to the cloud-based asset via a first communication channel, and making the second authentication credential data available to the cloud-based asset via a second communication channel. A combination of the first and the second authentication credential data may be sufficient to authenticate the cloud-based asset to the access-controlled resource.Type: ApplicationFiled: July 30, 2018Publication date: December 20, 2018Inventors: Rafi Schwarz, Eli Maccabi, Moti Cohen, Nessi Lahav, Inbal Zilberman Kubovsky, Evgeny Sakirko
-
Publication number: 20180359239Abstract: The disclosed embodiments include systems and methods for providing security tokens to cloud-based assets on demand. Operations performed in the disclosed embodiments include receiving a prompt from a cloud-based asset indicating that the cloud-based asset is seeking to communicate with an access-controlled resource, wherein the cloud-based asset lacks authorization to communicate with the access-controlled resource. Additionally, the operations include extracting information associated with the cloud-based asset by accessing a trusted cloud platform resource storing data associated with verified cloud-based assets, where the trusted cloud platform resource is separate from the cloud-based asset, and authenticating the cloud-based asset based on the extracted information.Type: ApplicationFiled: June 20, 2018Publication date: December 13, 2018Inventors: Rafi Schwarz, Eli Maccabi, Moti Cohen, Nessi Lahav, Inbal Zilberman Kubovsky, Evgeny Sakirko
-
Patent number: 10027658Abstract: The disclosed embodiments include systems and methods for providing security tokens to cloud-based assets on demand. Operations performed in the disclosed embodiments include receiving a prompt from a cloud-based asset indicating that the cloud-based asset is seeking to communicate with an access-controlled resource, wherein the cloud-based asset lacks authorization to communicate with the access-controlled resource. Additionally, the operations include extracting information associated with the cloud-based asset by accessing a trusted cloud platform resource storing data associated with verified cloud-based assets, where the trusted cloud platform resource is separate from the cloud-based asset, and authenticating the cloud-based asset based on the extracted information.Type: GrantFiled: June 12, 2017Date of Patent: July 17, 2018Assignee: CYBERARK SOFTWARE LTDInventors: Rafi Schwarz, Eli Maccabi, Moti Cohen, Nessi Lahav, Inbal Zilberman Kubovsky, Evgeny Sakirko
-
Patent number: 9823995Abstract: The present disclosure describes methods, systems, and computer program products for debugging structured query language (SQL) statements.Type: GrantFiled: August 28, 2014Date of Patent: November 21, 2017Assignee: SAP SEInventors: Tamir Menahem, Ohad Navon, Amiram Wingarten, Inbal Zilberman Kubovsky
-
Publication number: 20160062870Abstract: The present disclosure describes methods, systems, and computer program products for debugging structured query language (SQL) statements.Type: ApplicationFiled: August 28, 2014Publication date: March 3, 2016Inventors: Tamir Menahem, Ohad Navon, Amiram Wingarten, Inbal Zilberman Kubovsky
-
Patent number: 9036648Abstract: The present disclosure involves systems, software, and computer implemented methods for tracking files attached to electronic messages. One process includes operations for receiving a message, the message including information to be displayed by a message reading application, the message including a first indication that a file was attached to the earlier message, wherein the first indication is marked to not be displayed with the information by the message reading application; determining that the file is not attached to the message; sending a request for the file to a user identifier, the user identifier being included in the message and associated with the file or the earlier message or both; and receiving the file.Type: GrantFiled: July 13, 2011Date of Patent: May 19, 2015Assignee: SAP SEInventors: Inbal Zilberman Kubovsky, Guy Soffer
-
Patent number: 8943462Abstract: The present disclosure involves systems, software, and computer implemented methods for operating on type instances. One example method includes identifying a reference to a type instance during execution of a child control flow. The child control flow is associated with one or more ancestor control flows. One or more stack frames associated with the ancestor control flows are searched for a prior instantiation of the type instance. Access to the prior instantiation of the type instance in an identified stack frame associated with an identified ancestor control flow is provided in response to determining that the prior instantiation of the type instance exists in the identified stack frame. A new instance of the type instance is instantiated in a stack frame associated with the child control flow in response to determining that the prior instantiation of the type instance does not exist in the one or more stack frames.Type: GrantFiled: June 28, 2013Date of Patent: January 27, 2015Assignee: SAP SEInventors: Jonathan Heller, Lior Schejter, Inbal Zilberman Kubovsky
-
Publication number: 20150007125Abstract: The present disclosure involves systems, software, and computer implemented methods for operating on type instances. One example method includes identifying a reference to a type instance during execution of a child control flow. The child control flow is associated with one or more ancestor control flows. One or more stack frames associated with the ancestor control flows are searched for a prior instantiation of the type instance. Access to the prior instantiation of the type instance in an identified stack frame associated with an identified ancestor control flow is provided in response to determining that the prior instantiation of the type instance exists in the identified stack frame. A new instance of the type instance is instantiated in a stack frame associated with the child control flow in response to determining that the prior instantiation of the type instance does not exist in the one or more stack frames.Type: ApplicationFiled: June 28, 2013Publication date: January 1, 2015Applicant: SAP AGInventors: Jonathan Heller, Lior Schejter, Inbal Zilberman Kubovsky
-
Patent number: 8881307Abstract: According to some embodiments, an electronic file security management platform may receive a request from a user to access a first electronic file associated with a first application, such as a word processing document. A security characteristic associated with the user may be determined, and an encrypted version of the first electronic file may be decrypted in accordance with the security characteristic. The electronic file security management platform may then arrange for the user to access the first electronic file via the first application such that: (i) a first portion of the first electronic file is available to the user based on a first security requirement associated with the first portion and the security characteristic, and (ii) a second portion of the first electronic file is not available to the user based on a second security requirement associated with the second portion and the security characteristic.Type: GrantFiled: May 30, 2012Date of Patent: November 4, 2014Assignee: SAP SEInventors: Yiftach Nun, Inbal Zilberman Kubovsky
-
Publication number: 20140101199Abstract: According to some embodiments, a method and apparatus are provided to receive a request for a REST or OData object at an input field and suggest a file associated with the REST or OData object.Type: ApplicationFiled: October 10, 2012Publication date: April 10, 2014Inventors: Yiftach Nun, Inbal Zilberman Kubovsky
-
Publication number: 20130326640Abstract: According to some embodiments, an electronic file security management platform may receive a request from a user to access a first electronic file associated with a first application, such as a word processing document. A security characteristic associated with the user may be determined, and an encrypted version of the first electronic file may be decrypted in accordance with the security characteristic. The electronic file security management platform may then arrange for the user to access the first electronic file via the first application such that: (i) a first portion of the first electronic file is available to the user based on a first security requirement associated with the first portion and the security characteristic, and (ii) a second portion of the first electronic file is not available to the user based on a second security requirement associated with the second portion and the security characteristic.Type: ApplicationFiled: May 30, 2012Publication date: December 5, 2013Inventors: Yiftach Nun, Inbal Zilberman Kubovsky
-
Publication number: 20130018966Abstract: The present disclosure involves systems, software, and computer implemented methods for tracking files attached to electronic messages. One process includes operations for receiving a message, the message including information to be displayed by a message reading application, the message including a first indication that a file was attached to the earlier message, wherein the first indication is marked to not be displayed with the information by the message reading application; determining that the file is not attached to the message; sending a request for the file to a user identifier, the user identifier being included in the message and associated with the file or the earlier message or both; and receiving the file.Type: ApplicationFiled: July 13, 2011Publication date: January 17, 2013Applicant: SAP AGInventors: Inbal Zilberman Kubovsky, Guy Soffer
-
Publication number: 20120030552Abstract: The subject matter discloses a computerized apparatus for linking to an attached file from a text, the apparatus having a processor, the apparatus comprising a receiving module configured to receive an object comprising the text, wherein the object further comprises the attached file, wherein the receiver is further configured to receive a file identification associated with the attached file, wherein the receiver is further configured to determine a representation of the file in the text; a storage device for retaining the object received by the receiving module; a linking module configured to determine a link object, wherein the link object refers to the file, wherein the link object is displayable using the representation of the file; and an applying module configured to modify the object retained in the memory, wherein the applying module is configured to insert in the text the link object determined by the linking module.Type: ApplicationFiled: August 1, 2010Publication date: February 2, 2012Applicant: SAP AGInventors: Inbal ZILBERMAN-KUBOVSKY, Yiftach Nun