Patents by Inventor Itzhack Goldberg

Itzhack Goldberg has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20200081787
    Abstract: A computer-implemented method, according to one embodiment, includes: receiving a write request which includes data, and allocating an inode entry in a central inode list, such that the inode entry corresponds to the data received. The data is allocated to a block of storage space in memory. Moreover, one or more instructions to write the data to the block of storage space are sent. A determination is also made as to whether the data fills a threshold amount of a last block of storage space. In response to determining that the data does not fill the threshold amount of the last block of storage space, one or more instructions to create an identifier at an end of the data are sent. Furthermore, one or more instructions to store a copy of the inode entry after the identifier in the last block of storage space are sent.
    Type: Application
    Filed: September 12, 2018
    Publication date: March 12, 2020
    Inventors: Itzhack Goldberg, Deborah A. Messing
  • Patent number: 10586447
    Abstract: Smart traffic signal methods are provided. One method includes determining a stopping distance for a vehicle approaching a geographic location and, in response to determining the stopping distance, determining whether the first vehicle will stop prior to reaching the geographic location. The method further includes, in response to determining that the vehicle will not stop prior to reaching the geographic location, modifying a signal of a traffic light located at the geographic location. Systems and computer program products for performing the above method are also provided.
    Type: Grant
    Filed: July 25, 2017
    Date of Patent: March 10, 2020
    Assignee: International Business Machines Corporation
    Inventors: Tara Astigarraga, Christopher V. DeRobertis, Itzhack Goldberg, Jose R. Mosqueda Mejia, Daniel J. Winarski
  • Patent number: 10579743
    Abstract: A cognitive communication assistant receives a message transmitted over a communication network from a sender to a recipient. A sender's industry identified with the sender and a recipient's industry identified with the recipient are determined. One or more terms associated with the sender's industry are extracted from the message. A definition associated with the one or more terms is searched for in an on-line reference text. The message is updated based on the definition. The message is transmitted over the communication network to the recipient.
    Type: Grant
    Filed: May 20, 2016
    Date of Patent: March 3, 2020
    Assignee: International Business Machines Corporation
    Inventors: Tara Astigarraga, Itzhack Goldberg, Jose R. Mosqueda Mejia, Daniel J. Winarski
  • Patent number: 10579553
    Abstract: Adaptive control of Input/Output (I/O) operations in a data storage system is provided to enable efficient use of the data storage system. More specifically, an interface is provided in order to adaptively control I/O operations to the data storage system. The interface receives a data request. The interface mediates with the data storage system and employs a handle which references one or more files. The handle designates how to process the data request associated with the referenced one or more files. The interface supports execution of the data request in accordance with the handle. Accordingly, the interface provides adaptive direct management of the data storage system at file granularity and/or at data request granularity as designated in the handle(s).
    Type: Grant
    Filed: March 14, 2017
    Date of Patent: March 3, 2020
    Assignee: International Business Machines Corporation
    Inventors: Itzhack Goldberg, Gregory T. Kishi, David B. Kumhyr, Neil Sondhi
  • Publication number: 20200068402
    Abstract: Approaches presented herein enable challenge-response authentication of a user based on information captured by devices associated with the user. Specifically, in one approach, a plurality of devices associated with the user that each dynamically track and store on-device data points over a period of time are identified. A request initiated by a party claiming to be the user is received to authenticate the party as the user. An authentication question is generated in a natural language, the answer to which is a data point selected from data points on at least one device of the plurality, wherein the selected data point is discoverable by viewing data points on the at least one device. The requesting party is prompted to find the data point by presenting the authentication question to the requesting party. In the case that the requesting party returns the answer, the requesting party is authenticated as the user.
    Type: Application
    Filed: November 4, 2019
    Publication date: February 27, 2020
    Inventors: Rhonda L. Childress, Itzhack Goldberg, Boaz Mizrachi, Clifford A. Pickover, Neil Sondhi
  • Patent number: 10574751
    Abstract: A computer-implemented method includes receiving, by a storage controller, a hash data. The hash data includes a hash of a remote data. The method includes comparing, by the storage controller, the hash data against an index. The index includes one or more hashes of a local data. The method includes determining, by the storage controller, whether the remote data parallels any part of the local data, based on comparing the hash data with the index. The method is responsive to the remote data paralleling any part of the local data. The method includes sending, from the storage controller, a request to not transmit said remote data.
    Type: Grant
    Filed: March 22, 2016
    Date of Patent: February 25, 2020
    Assignee: International Business Machines Corporation
    Inventors: Gregory J. Boss, Itzhack Goldberg, Jonathan D. Herd, Neil Sondhi
  • Patent number: 10558363
    Abstract: A hybrid compressed media is maintained by detecting hot data within a logical unit name (LUN), and compressing a remaining cold data within the LUN while keeping the hot data uncompressed. The uncompressed hot data and the compressed cold data are both stored within the LUN.
    Type: Grant
    Filed: August 9, 2016
    Date of Patent: February 11, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Christophe Fagiano, Itzhack Goldberg, Sandor Lengyel, Neil Sondhi, Daniel J. Winarski
  • Patent number: 10548011
    Abstract: Approaches presented herein enable challenge-response authentication of a user based on information captured by a personal internet of things (IoT) device set associated with the user. Specifically, in one approach, a personal IoT device set comprising at least one device records and stores data associated with a user. The data is synchronized and stored to a computerized authentication system, which prompts the user with an authentication question based on the synchronized and stored data. The user may find an answer to the authentication question by reviewing data recorded and stored in the device of the personal IoT device set. The user may then enter the found answer to the authentication question, thereby authenticating the user. The personal IoT device set may comprise a single device or may comprise a plurality of devices, the information of one of which may be selected as the basis of the authentication question.
    Type: Grant
    Filed: November 21, 2018
    Date of Patent: January 28, 2020
    Assignee: International Business Machines Corporation
    Inventors: Rhonda L. Childress, Itzhack Goldberg, Boaz Mizrachi, Clifford A. Pickover, Neil Sondhi
  • Patent number: 10545502
    Abstract: Embodiments of the present invention disclose a method, computer program product, and system for directing movements of an autonomous vehicle. A vehicle operator exiting a vehicle is detected. A plurality of metadata is received wherein the plurality of metadata includes at least location data of a user and a timestamp. A pickup time and pickup location is identified based on received metadata. A route to the pickup location is generated based on at least a default location of the autonomous vehicle. The autonomous vehicle is directed to travel to the identified location such that the autonomous vehicle is arriving at the identified pickup time. Updates to the pickup location and pickup time are determined by dynamically monitoring received metadata. A modified route is generated, in response determining updates in one or more of the pickup location and pickup time and the autonomous vehicle is redirected to the updated pickup location.
    Type: Grant
    Filed: March 27, 2019
    Date of Patent: January 28, 2020
    Assignee: International Business Machines Corporation
    Inventors: Itzhack Goldberg, Harry R. McGregor, Christopher B. Moore, Jose R. Mosqueda Mejia
  • Publication number: 20200021578
    Abstract: In an approach to securing data using alternative value identification schemes, one or more computer processors receive user registration data, wherein the user registration data includes one or more authentication parameters, wherein the one or more authentication parameters includes one or more physical pressure-based inputs by a user. The one or more computer processors receive an access request requiring an authentication from the user, wherein the access request includes the one or more physical pressure-based inputs by the user associated with the one or more authentication parameters. The one or more computer processors determine whether the one or more authentication parameters match the user registration data. Responsive to determining that the authentication data matches the registration data, the one or more computer processors authenticate access for the user.
    Type: Application
    Filed: September 26, 2019
    Publication date: January 16, 2020
    Inventors: Itzhack Goldberg, Harry R. McGregor, Yossi Mesika, Christopher B. Moore
  • Patent number: 10534755
    Abstract: An approach to de-duplicating data in an electronic text repository by performing the following steps: (i) processing one or more text documents associated with an electronic text repository to identify first instances of a plurality of words; (ii) adding words associated with the identified first instances of the plurality of words to a list, wherein each word added to the list is assigned a unique serial number; and (iii) replacing the plurality of words included in the one or more text documents with serial numbers corresponding to the words associated with the list for generating one or more reduced documents.
    Type: Grant
    Filed: October 13, 2016
    Date of Patent: January 14, 2020
    Assignee: International Business Machines Corporation
    Inventors: Olympia Gluck, Itzhack Goldberg, Harry R. McGregor, Christopher B. Moore, Neil Sondhi
  • Publication number: 20200014756
    Abstract: A computer controls deduplication of data. The computer generates a hash of a remote data and a hash of a local data. The computer generates a set of unmatched hash data based on a comparison of the hash of the remote data against the hash of the local data. The computer generates a splitting cost that is associated with splitting the set of unmatched hash data. The computer sends a request to a server based on a comparison of the splitting cost to a threshold. The request dictates sending of the remote data to a storage controller.
    Type: Application
    Filed: September 18, 2019
    Publication date: January 9, 2020
    Inventors: Gregory J. Boss, Itzhack Goldberg, Jonathan D. Herd, Neil Sondhi
  • Publication number: 20200012799
    Abstract: A shared networked storage may be separated from a key vault system. A storage request with data to be stored and the storage request with a confidentiality rating may be received. The confidentiality rating may indicate a level of confidentiality the data is associated with. The storage request with the data and the confidentiality rating may be received via a shared networked storage access interface by a security layer. The data to be stored by the key vault system and the confidentiality rating may be encrypted on request of the security layer and into a data container. The shared networked storage may be categorized into Cloud zones. Each Cloud zone may be assigned a trust level. The data container may be stored in one of the Cloud zones of the shared networked storage. The trust level of the one of the Cloud zones may correspond to the confidentiality rating.
    Type: Application
    Filed: September 17, 2019
    Publication date: January 9, 2020
    Inventors: Marcus Breuer, Itzhack Goldberg, Thorsten Muehge, Erik Rueger, Matthias Seul
  • Patent number: 10530770
    Abstract: In an approach to securing data using alternative value identification schemes, one or more computer processors receive user registration data, wherein the user registration data includes one or more authentication parameters, wherein the one or more authentication parameters includes one or more physical pressure-based inputs by a user. The one or more computer processors receive an access request requiring an authentication from the user, wherein the access request includes the one or more physical pressure-based inputs by the user associated with the one or more authentication parameters. The one or more computer processors determine whether the one or more authentication parameters match the user registration data. Responsive to determining that the authentication data matches the registration data, The one or more computer processors authenticate access for the user.
    Type: Grant
    Filed: June 28, 2017
    Date of Patent: January 7, 2020
    Assignee: International Business Machines Corporation
    Inventors: Itzhack Goldberg, Harry R. McGregor, Yossi Mesika, Christopher B. Moore
  • Publication number: 20190377753
    Abstract: A method and system are provided. The method includes analyzing, by a hardware processor, one or more images to determine cognitive characteristics related to the one or more images and to a user. The method further includes forming, by the hardware processor, a composable template relating to the cognitive characteristics. The method also includes performing, by the hardware processor or another hardware processor, an amelioration action with respect to a displaying on a display device of at least one image from the one or more images, based on the composable template. The amelioration action is selected from a set of amelioration actions that include transmitting the at least one image to the disturbing image repository.
    Type: Application
    Filed: August 21, 2019
    Publication date: December 12, 2019
    Inventors: Itzhack Goldberg, Clifford A. Pickover, Maja Vukovic
  • Patent number: 10496293
    Abstract: A technique for operating a data storage system includes accessing respective absolute expiration times for valid pages in one or more candidate storage blocks. Garbage collection is performed on ones of the candidate storage blocks that include a first predetermined number of the valid pages that do not expire, as indicated by the absolute expiration times, prior to a first predetermined time period. Garbage collection is deferred on ones of the candidate storage blocks that include a second predetermined number of the valid pages that expire, as indicated by the absolute expiration times, prior to a second predetermined time period.
    Type: Grant
    Filed: March 14, 2017
    Date of Patent: December 3, 2019
    Assignee: International Business Machines Corporation
    Inventors: Itzhack Goldberg, Frank Krick, Heiko H. Schloesser, Neil Sondhi
  • Publication number: 20190361619
    Abstract: Embodiments of the present invention provides methods, computer program products, and a system for improving serial performance of a computer system storage volume. Embodiments of the present invention can be used to reduce a partition scheme of a storage volume to allow for a computer system to read the storage volume using additional system resources that were previously idle during a serial read operation. Embodiments of the present invention can be used to reserve random-access memory (RAM) to store metadata describing data stored on a storage volume that utilizes a reduced partition scheme. Once the serial read of the storage volume is complete, the embodiments of the present invention can revert the partition scheme back to the original partition scheme for normal, non-serial read operations.
    Type: Application
    Filed: August 13, 2019
    Publication date: November 28, 2019
    Inventors: Deborah A. Messing, Harry R. McGregor, Itzhack Goldberg, Christopher B. Moore
  • Publication number: 20190354304
    Abstract: A computer-implemented method, according to one embodiment, is for performing internal striping within a subset of slices. The computer-implemented method includes: receiving, by a computer, a logical unit; splitting, by the computer, the logical unit into a plurality of data chunks; and distributing, by the computer, the plurality of data chunks across the subset of slices such that the plurality of data chunks are striped across the subset of slices, and striped across a plurality of physical partitions in each of the subset of slices. Moreover, each of the subset of slices correspond to a different physical storage module in a single storage device. Other systems, methods, and computer program products are described in additional embodiments.
    Type: Application
    Filed: May 15, 2018
    Publication date: November 21, 2019
    Inventors: Harry R. McGregor, Christopher B. Moore, Deborah A. Messing, Itzhack Goldberg, Tomer Goldberg, Avi Liani, Moshe Kalish, Jonathan Amit
  • Patent number: 10474830
    Abstract: A shared networked storage may be separated from a key vault system. A storage request with data to be stored and the storage request with a confidentiality rating may be received. The confidentiality rating may indicate a level of confidentiality the data is associated with. The storage request with the data and the confidentiality rating may be received via a shared networked storage access interface by a security layer. The data to be stored by the key vault system and the confidentiality rating may be encrypted on request of the security layer and into a data container. The shared networked storage may be categorized into Cloud zones. Each Cloud zone may be assigned a trust level. The data container may be stored in one of the Cloud zones of the shared networked storage. The trust level of the one of the Cloud zones may correspond to the confidentiality rating.
    Type: Grant
    Filed: April 20, 2018
    Date of Patent: November 12, 2019
    Assignee: International Business Machines Corporation
    Inventors: Marcus Breuer, Itzhack Goldberg, Thorsten Muehge, Erik Rueger, Matthias Seul
  • Patent number: 10445294
    Abstract: Solutions are provided that use shared scan phases and scan output for various file-level incremental data analysis systems. In one embodiment, a shared scan phase is initiated for a plurality of files in a file system. During the shared scan phase, one or more rules are applied to the files in the file system to identify files on which to perform one or more operations. Shared scan output is created that includes information describing the identified files and operations to be performed on the identified files. Embodiments of the present invention can reduce the amount of time and computing resources that would otherwise be consumed by performing separate walkthroughs of a file system during separate scan phases.
    Type: Grant
    Filed: March 3, 2015
    Date of Patent: October 15, 2019
    Assignee: International Business Machines Corporation
    Inventors: Michael Diederich, Itzhack Goldberg, Erik Rueger, Neil Sondhi