Patents by Inventor Itzhack Goldberg

Itzhack Goldberg has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20180018669
    Abstract: A method for establishing an index of usability associated with a replacement payment card is provided. The method may include receiving a payment card replacement request in a vending facility. The method may further include identifying at least one possible risk factor associated with a user utilizing the replacement payment card. The method may also include creating a risk assessment based on the at least one identified possible risk factor. The method may further include establishing an index of usability for the replacement payment card based on the created assessment, whereby a value of the index of usability correlates to a plurality of restrictions placed on using the replacement payment card. The method may also include storing the established index of usability in a database.
    Type: Application
    Filed: July 14, 2016
    Publication date: January 18, 2018
    Inventors: Itzhack Goldberg, Rick A. Hamilton, II, Shawn P. Mullen, Clifford A. Pickover
  • Patent number: 9864949
    Abstract: An open domain question answering apparatus includes a communication parser and a machine learning module. The communication parser parses a communication from a user account. The communication parser uses a natural language interpretation algorithm to construct a query and identify a product. The machine learning module is coupled to the communication parser and populates a plurality of potential responses to the query based on data associated with the identified product. Each of the plurality of potential responses has an associated level of detail. The machine learning module applies a machine learning user capacity model to the plurality of potential responses to identify a response with an associated level of detail commensurate with the machine learning user capacity model. The machine learning user capacity model is trained using data relating to a cognitive capacity of the user account.
    Type: Grant
    Filed: October 31, 2016
    Date of Patent: January 9, 2018
    Assignee: International Business Machines Corporation
    Inventors: Tara Astigarraga, Itzhack Goldberg, Jose R. Mosqueda Mejia, Daniel J. Winarski, George G. Zamora
  • Patent number: 9852287
    Abstract: A method for determining a password strength is provided. The method may include receiving a user-entered password. The method may also include identifying a keyboard layout type associated with a keyboard utilized to enter the received user-entered password. The method may further include mapping each character within a plurality of characters in the received user-entered password to a corresponding location on a grid associated with the identified keyboard layout type. The method may also include determining a coordinate sequence associated with the received user-entered password based on the mapped plurality of characters. The method may further include applying a pattern recognition algorithm to the determined coordinate sequence. The method may also include determining a password strength based on the applied pattern recognition algorithm.
    Type: Grant
    Filed: October 4, 2016
    Date of Patent: December 26, 2017
    Assignee: International Business Machines Corporation
    Inventors: Itzhack Goldberg, Harry R. McGregor, Christopher B. Moore, Shawn P. Mullen, Neil Sondhi
  • Publication number: 20170364529
    Abstract: A method for selectively compressing unstructured data includes preparing, at a host system, a data blob made up of unstructured data, for storage on a storage system. The method encodes a first portion of the data blob with a first color and a second portion of the data blob with a second color. The first color indicates that the associated portion should remain uncompressed, while the second color indicates that the associated portion should be compressed. The method transmits the encoded data blob to a storage virtualization layer associated with the storage system. In response, the storage virtualization layer stores the first portion in an uncompressed format, and compresses the second portion and stores the second portion in a compressed format. A corresponding system and computer program product are also disclosed herein.
    Type: Application
    Filed: June 15, 2016
    Publication date: December 21, 2017
    Applicants: International Business Machines Corporation, Computer Task Group, Inc.
    Inventors: Christophe Fagiano, Itzhack Goldberg, Neil Sondhi, Daniel J. Winarski
  • Patent number: 9836595
    Abstract: A method for determining a password strength is provided. The method may include receiving a user-entered password. The method may also include identifying a keyboard layout type associated with a keyboard utilized to enter the received user-entered password. The method may further include mapping each character within a plurality of characters in the received user-entered password to a corresponding location on a grid associated with the identified keyboard layout type. The method may also include determining a coordinate sequence associated with the received user-entered password based on the mapped plurality of characters. The method may further include applying a pattern recognition algorithm to the determined coordinate sequence. The method may also include determining a password strength based on the applied pattern recognition algorithm.
    Type: Grant
    Filed: January 23, 2017
    Date of Patent: December 5, 2017
    Assignee: International Business Machines Corporation
    Inventors: Itzhack Goldberg, Harry R. McGregor, Christopher B. Moore, Shawn P. Mullen, Neil Sondhi
  • Publication number: 20170343363
    Abstract: A route navigation method, system, and non-transitory computer readable medium, include a route navigation circuit configured to provide a navigation route for a user including navigation instructions, a route querying circuit configured to send queries to the user for a response from the user regarding information of the route, and a route query managing circuit configured to manage a delivery state of the queries sent to the user and to manage the user response such that the delivery state is modified so as to change a cognitive state of the user.
    Type: Application
    Filed: May 31, 2016
    Publication date: November 30, 2017
    Inventors: Itzhack Goldberg, James Robert Kozloski, Clifford A. Pickover
  • Patent number: 9832787
    Abstract: Techniques are described for attention management. In one embodiment, a computer program product comprising a computer-readable storage medium has program code embodied therewith. The program code is executable by a computing device to build a communication history between two or more users, perform an analysis of the communication history for a pattern of communication between the two or more users, and generate an assessment based on the analysis. The communication history may include data from multiple different communication systems.
    Type: Grant
    Filed: July 31, 2015
    Date of Patent: November 28, 2017
    Assignee: International Business Machines Corporation
    Inventors: Matthew E. Broomhall, Itzhack Goldberg, Bruce Kahn, Boaz Mizrachi, Neil Sondhi
  • Patent number: 9830229
    Abstract: For adding cooperative file coloring protocols in a data deduplication system using a processor device in a computing environment, a preferred character is represented for file coloring in a file using a code selected from a multiplicity of codes that represent a variety of contexts. The original meaning of the preferred character is retained when representing the preferred character for the file coloring by the code selected from the multiplicity of codes.
    Type: Grant
    Filed: August 21, 2013
    Date of Patent: November 28, 2017
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Christophe Fagiano, Itzhack Goldberg, Michael Hirsch, Frank Krick, Neil Sondhi
  • Publication number: 20170339091
    Abstract: A cognitive communication assistant receives a message transmitted over a communication network from a sender to a recipient. A sender's industry identified with the sender and a recipient's industry identified with the recipient are determined. One or more terms associated with the sender's industry are extracted from the message. A definition associated with the one or more terms is searched for in an on-line reference text. The message is updated based on the definition. The message is transmitted over the communication network to the recipient.
    Type: Application
    Filed: May 20, 2016
    Publication date: November 23, 2017
    Inventors: Tara Astigarraga, Itzhack Goldberg, Jose R. Mosqueda Mejia, Daniel J. Winarski
  • Publication number: 20170337239
    Abstract: Various embodiments for managing data integrity in a data deduplication system in a computing storage environment, by a processor device, are provided. In one embodiment, a method comprises, in a data deduplication system using a data scrubber process, overwriting a stored data chunk declared as corrupted with an identical fresh data chunk discovered in an incoming data stream.
    Type: Application
    Filed: May 23, 2016
    Publication date: November 23, 2017
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Itzhack GOLDBERG, Erik RUEGER, Christof SCHMITT, Neil SONDHI
  • Publication number: 20170329681
    Abstract: An initial remote region of a first remote storage device of a remote storage system not matching a corresponding local region of a local storage device of a remote local system is detected. A subsequent remote region on the remote storage system matching the initial remote region is identified. Data in the initial remote region is replaced with data from the subsequent remote region.
    Type: Application
    Filed: June 28, 2012
    Publication date: November 16, 2017
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventor: Itzhack GOLDBERG
  • Publication number: 20170322914
    Abstract: In a method for dynamically highlighting repetitive text in electronic documents, obtaining one or more user preferences related to a user reading an electronic document. The method further includes determining whether the electronic document contains one or more repetitive text associations, wherein a repetitive text association is data that provides one or more indications of repetitive text segments interspersed within a document. In response to determining that the electronic document contains one or more repetitive text associations, the method further includes identifying one or more repetitive text segments in the electronic document corresponding to the one or more repetitive text associations and determining a time duration expended by the user reading an instance of the identified one or more repetitive text segments within the electronic document.
    Type: Application
    Filed: July 31, 2017
    Publication date: November 9, 2017
    Inventors: Olympia Gluck, Itzhack Goldberg, Gilad Sharaby, Neil Sondhi
  • Publication number: 20170310679
    Abstract: A method and system for determining user security is provided. The method includes registering a first user associated with a service provider system by retrieving identification information for the first user and a first user communication device. In response, Internet of things (IOT) devices belonging to the first user are detected. A second user associated with the service provider system is registered by retrieving identification information for the second user and a second user communication device. In response, IOT devices belonging to the second user are detected. A request for a service provided by the service provider system is received from the first user via the first user communication device belonging to the first user.
    Type: Application
    Filed: April 26, 2016
    Publication date: October 26, 2017
    Inventors: Rhonda L. Childress, Itzhack Goldberg, Neil Sondhi, Aviad Zlotnick
  • Publication number: 20170300512
    Abstract: A method and system are provided. The method includes analyzing, by a hardware processor, one or more images to determine cognitive characteristics related to the one or more images and to a user. The method further includes forming, by the hardware processor, a composable template relating to the cognitive characteristics. The method also includes performing, by the hardware processor or another hardware processor, an amelioration action with respect to a displaying on a display device of at least one image from the one or more images, based on the composable template. The amelioration action is selected from a set of amelioration actions that include transmitting the at least one image to the disturbing image repository.
    Type: Application
    Filed: April 18, 2016
    Publication date: October 19, 2017
    Inventors: Itzhack Goldberg, Clifford A. Pickover, Maja Vukovic
  • Publication number: 20170289175
    Abstract: A security method that includes assigning a sensitivity value for a communication with a sensitivity determining module including at least one hardware processor. Following assignment of the sensitivity value to the communication, the communication is formatted for display. When sensitivity value exceeds a security threshold, the communication is parsed into a sequence of fragments. The communication is transmitted as the sequence of fragments when said sensitivity value exceeds the security threshold.
    Type: Application
    Filed: June 20, 2017
    Publication date: October 5, 2017
    Inventors: Rhonda L. Childress, Itzhack Goldberg, James R. Kozloski, Clifford A. Pickover, Neil Sondhi, Maja Vukovic
  • Publication number: 20170279889
    Abstract: A computer-implemented method includes receiving, by a storage controller, a hash data. The hash data includes a hash of a remote data. The method includes comparing, by the storage controller, the hash data against an index. The index includes one or more hashes of a local data. The method includes determining, by the storage controller, whether the remote data parallels any part of the local data, based on comparing the hash data with the index. The method is responsive to the remote data paralleling any part of the local data. The method includes sending, from the storage controller, a request to not transmit said remote data.
    Type: Application
    Filed: March 22, 2016
    Publication date: September 28, 2017
    Inventors: Gregory J. Boss, Itzhack Goldberg, Jonathan D. Herd, Neil Sondhi
  • Patent number: 9773195
    Abstract: An aspect of providing user-configurable settings for content obfuscation includes, for each media segment in a media file, inputting the media segment to a neural network, applying a classifier to features output by the neural network, and determining from results of the classifier images in the media segment that contain the sensitive characteristics. The classifier specifies images that are predetermined to include sensitive characteristics. An aspect further includes assigning a tag to each of the images in the media segment that contain the sensitive characteristics. The tag indicates a type of sensitivity. An aspect also includes receiving at least one user-defined sensitivity, the user-defined sensitivity indicating an action or condition that is considered objectionable to a user, identifying a subset of the tagged images that correlate to the user-defined sensitivity, and visually modifying, during playback of the media file, an appearance of the subset of the tagged images.
    Type: Grant
    Filed: October 5, 2016
    Date of Patent: September 26, 2017
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Rogerio S. Feris, Itzhack Goldberg, Minkyong Kim, Clifford A. Pickover, Neil Sondhi
  • Patent number: 9756057
    Abstract: A security method that includes assigning a sensitivity value for a communication with a sensitivity determining module including at least one hardware processor. Following assignment of the sensitivity value to the communication, the communication is formatted for display. When sensitivity value exceeds a security threshold, the communication is parsed into a sequence of fragments. The communication is transmitted as the sequence of fragments when said sensitivity value exceeds the security threshold.
    Type: Grant
    Filed: June 19, 2015
    Date of Patent: September 5, 2017
    Assignee: International Business Machines Corporation
    Inventors: Rhonda L. Childress, Itzhack Goldberg, James R. Kozloski, Clifford A. Pickover, Neil Sondhi, Maja Vukovic
  • Patent number: 9734256
    Abstract: A host sends an I/O transaction. The I/O transaction relates to a read or write operation for a first datum. A first listening service which manages I/O transactions for a first set of addresses receives the I/O transaction. The first listening service forwards the I/O transaction to a second listening service. The second listening service manages I/O transactions for a second set of addresses. The second listening service executes the I/O transaction at a selected address of the second set of addresses. The second listening service creates a data packet to respond to the I/O transaction. The header of the data packet includes the selected address. The second listening service transmits the data packet to the host. The host uses the selected address to update a database which includes addresses of data within.
    Type: Grant
    Filed: October 14, 2016
    Date of Patent: August 15, 2017
    Assignee: International Business Machines Corporation
    Inventors: Itzhack Goldberg, Harry McGregor, Christopher B. Moore, Gerhard H. Pieper
  • Publication number: 20170228314
    Abstract: Various embodiments for managing data integrity in a computing storage environment, by a processor device, are provided. In one embodiment, a method comprises applying a copy-on-write technique to a cache in a computer storage system such that each write arriving in the cache is assigned to a separate new physical location and registered sequentially in an order the write arrived, for preserving a state of the computer storage system during a failure event.
    Type: Application
    Filed: February 5, 2016
    Publication date: August 10, 2017
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Tara ASTIGARRAGA, Itzhack GOLDBERG, Gerhard H. PIEPER, Neil SONDHI, Daniel J. WINARSKI