Patents by Inventor Itzhack Goldberg

Itzhack Goldberg has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9996545
    Abstract: A system and method for deduplicating analyzing system logs is disclosed. The method includes capturing, by an image acquisition component, an image of at least one log entry, converting, by an image processing component, text in the image of the at least one log entry to machine-encoded text, and scanning, by a log scanning component, the machine-encoded text for the at least one redundant copy of the at least one log entry. The method also includes removing, by the log scanning component, the at least one redundant copy of the at least one log entry, determining, by a log analysis component, if the at least one log entry is significant, flagging the at least one log entry if the log entry is significant, and alerting a user if the log entry is flagged.
    Type: Grant
    Filed: September 7, 2017
    Date of Patent: June 12, 2018
    Assignee: International Business Machines Corporation
    Inventors: Itzhack Goldberg, Harry R. McGregor, Christopher B. Moore, Neil Sondhi
  • Patent number: 9996698
    Abstract: A shared networked storage may be separated from a key vault system. A storage request with data to be stored and the storage request with a confidentiality rating may be received. The confidentiality rating may indicate a level of confidentiality the data is associated with. The storage request with the data and the confidentiality rating may be received via a shared networked storage access interface by a security layer. The data to be stored by the key vault system and the confidentiality rating may be encrypted on request of the security layer and into a data container. The shared networked storage may be categorized into Cloud zones. Each Cloud zone may be assigned a trust level. The data container may be stored in one of the Cloud zones of the shared networked storage. The trust level of the one of the Cloud zones may correspond to the confidentiality rating.
    Type: Grant
    Filed: November 23, 2015
    Date of Patent: June 12, 2018
    Assignee: International Business Machines Corporation
    Inventors: Marcus Breuer, Itzhack Goldberg, Thorsten Muehge, Erik Rueger, Matthias Seul
  • Patent number: 9983960
    Abstract: An initial remote region of a first remote storage device of a remote storage system not matching a corresponding local region of a local storage device of a remote local system is detected. A subsequent remote region on the remote storage system—matching the initial remote region is identified. Data in the initial remote region is replaced with data from the subsequent remote region.
    Type: Grant
    Filed: January 23, 2012
    Date of Patent: May 29, 2018
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventor: Itzhack Goldberg
  • Patent number: 9985941
    Abstract: An embodiment of the invention may include a method, computer program product and computer system for password management. The embodiment may include a computing device that creates a password inventory. The password inventory may be a list of one or more passwords, where each of the one or more passwords corresponds to a password key. The embodiment may update the password inventory without input from a user. The embodiment may receive a first login request from a first device. The embodiment may transmit information detailing a first password key to the first device, where the first password key corresponds to a first password from the list of one or more passwords. The embodiment may receive information detailing a first entered password from the first device. The embodiment may determine whether the first entered password is identical to the first password from the list of one or more passwords.
    Type: Grant
    Filed: September 8, 2015
    Date of Patent: May 29, 2018
    Assignee: International Business Machines Corporation
    Inventors: Rhonda L. Childress, Itzhack Goldberg, Clifford A. Pickover, Neil Sondhi
  • Patent number: 9983961
    Abstract: An initial remote region of a first remote storage device of a remote storage system not matching a corresponding local region of a local storage device of a remote local system is detected. A subsequent remote region on the remote storage system matching the initial remote region is identified. Data in the initial remote region is replaced with data from the subsequent remote region.
    Type: Grant
    Filed: June 28, 2012
    Date of Patent: May 29, 2018
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventor: Itzhack Goldberg
  • Patent number: 9984228
    Abstract: An approach is provided for password re-usage identification based on an Input Method Editor (IME) analysis. The approach analyzes a number of keystrokes received from a user at the IME that is running on the information handling system. A set of keystrokes received at the IME are identified as a possible new password that is being established by the user. A set of existing password data is searched with the search being based on the possible new password. The set of existing passwords are stored in a data store accessible from at least one of the processors of the information handling system. In response to the searching identifying that one of the existing passwords matches the possible new password, a notification, or warning, is displayed to the user.
    Type: Grant
    Filed: December 17, 2015
    Date of Patent: May 29, 2018
    Assignee: International Business Machines Corporation
    Inventors: Rhonda L. Childress, Itzhack Goldberg, David B. Kumhyr, Su Liu, Neil Sondhi
  • Publication number: 20180143775
    Abstract: Provided are a computer program product, computer system, and method for utilization of a thin provision grid storage array. Storage devices are divided into a plurality of slices, wherein each of the slices has a same number of partitions. Volumes in a pool are configured, wherein the pool is associated with physical capacity of a slice, wherein a volume size is unlimited, and wherein a cumulative size of all volumes in the pool is unlimited. While data is being written to the volumes in the pool, partitions of a first slice of the plurality of slices are allocated to the volumes in the pool and, in response to determining that the first slice needs additional physical capacity, allocating a partition of a second slice to the first slice by updating a mapping table.
    Type: Application
    Filed: November 21, 2016
    Publication date: May 24, 2018
    Inventors: Yuval Ben-Horin, Ehood Garmiza, Itzhack Goldberg, Michael Keller, Rivka M. Matosevich
  • Patent number: 9971887
    Abstract: A method for determining a password strength is provided. The method may include receiving a user-entered password. The method may also include identifying a keyboard layout type associated with a keyboard utilized to enter the received user-entered password. The method may further include mapping each character within a plurality of characters in the received user-entered password to a corresponding location on a grid associated with the identified keyboard layout type. The method may also include determining a coordinate sequence associated with the received user-entered password based on the mapped plurality of characters. The method may further include applying a pattern recognition algorithm to the determined coordinate sequence. The method may also include determining a password strength based on the applied pattern recognition algorithm.
    Type: Grant
    Filed: November 7, 2017
    Date of Patent: May 15, 2018
    Assignee: International Business Machines Corporation
    Inventors: Itzhack Goldberg, Harry R. McGregor, Christopher B. Moore, Shawn P. Mullen, Neil Sondhi
  • Patent number: 9972361
    Abstract: Various embodiments for audibly mapping computing components in a computer storage system, by a processor device, are provided. In one embodiment, a method comprises creating a detectible audible pattern using an actuator arm and head assembly of a hard disk drive operating in the computer storage system for physically mapping the hard disk drive to a logical location within the computer storage system.
    Type: Grant
    Filed: December 14, 2015
    Date of Patent: May 15, 2018
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Itzhack Goldberg, Harry McGregor, Christopher B. Moore, Neil Sondhi
  • Publication number: 20180131778
    Abstract: A method includes, responsive to receiving a request from a first user to establish an electronic communication with a second user, determining time zone information for the second user. Responsive to determining communication preferences exist for the second user, the method determines a notification procedure for the second user based on the communication preferences of the second user and the time zone information for the second user. The method sends the time zone information for the second user to the first user based on the notification procedure.
    Type: Application
    Filed: November 8, 2016
    Publication date: May 10, 2018
    Inventors: Itzhack Goldberg, Richard Hutzler, Samuel Kallner, Neil Sondhi
  • Patent number: 9965616
    Abstract: A method for determining a password strength is provided. The method may include receiving a user-entered password. The method may also include identifying a keyboard layout type associated with a keyboard utilized to enter the received user-entered password. The method may further include mapping each character within a plurality of characters in the received user-entered password to a corresponding location on a grid associated with the identified keyboard layout type. The method may also include determining a coordinate sequence associated with the received user-entered password based on the mapped plurality of characters. The method may further include applying a pattern recognition algorithm to the determined coordinate sequence. The method may also include determining a password strength based on the applied pattern recognition algorithm.
    Type: Grant
    Filed: November 7, 2017
    Date of Patent: May 8, 2018
    Assignee: International Business Machines Corporation
    Inventors: Itzhack Goldberg, Harry R. McGregor, Christopher B. Moore, Shawn P. Mullen, Neil Sondhi
  • Publication number: 20180121105
    Abstract: A system and method for data storage management is disclosed. The method includes determining, by an access tracking component, a quantity of access requests for at least one data block, and determining a quantity of current copies of the data block. The method also includes creating, by a duplication component, at least one additional copy of the data block when the quantity of the access requests exceeds an access request threshold. Additionally, a deduplication component removes at least one current copy of the data block when the quantity of the access requests falls below the access request threshold. The access request threshold can be a threshold number of access requests for the data block, the presence of an input/output bottleneck, or a given length of a read latency when accessing the data block. Further, data coloring techniques can be used to distribute current copies of the data block.
    Type: Application
    Filed: July 31, 2017
    Publication date: May 3, 2018
    Inventors: Joseph W. Dain, Itzhack Goldberg, Gregory T. Kishi, Daniel I. Tan
  • Publication number: 20180121685
    Abstract: Embodiments for authorizing power charging of a user equipment (UE) based on a location. A power charging session is authorized by firmware of the UE for charging the UE upon detecting the UE is currently located and validated within an authorized geographic location. Either an unauthorized charging session is permitted to charge the UE up to a pre-authorized charging limit upon the UE being located in an unauthorized geographic location, or the power charging session is permitted to continue to charge the UE upon detecting the UE relocated from the authorized geographic location to an unauthorized geographic location.
    Type: Application
    Filed: October 25, 2017
    Publication date: May 3, 2018
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Itzhack GOLDBERG, Harry R. MCGREGOR, Yossi MESIKA, Christopher B. MOORE
  • Publication number: 20180121108
    Abstract: A method, executed by a computer, includes writing, to a storage device, a first instance of a data sequence and a corresponding first reference count, in response to determining that a subsequent data sequence is identical to the first instance of the data sequence, writing, to the storage device, a metadata reference referencing the subsequent data sequence and incrementing the first reference count, and writing, to a storage device, a second instance of the data sequence and a corresponding second reference count in response to determining that the first reference count is equal to a selected threshold. A computer system and computer program product corresponding to the above method are also disclosed herein.
    Type: Application
    Filed: October 28, 2016
    Publication date: May 3, 2018
    Inventors: Joseph W. Dain, Itzhack Goldberg, Gregory T. Kishi
  • Publication number: 20180124271
    Abstract: A method includes receiving a package comprising an image and metadata of the image including ambient condition data, storing the package in a memory, receiving a request for the image, outputting the image in response to the request, determining a context of the request, determining, using the context of the request, a substitute for the ambient condition data, and outputting the substitute for the ambient condition data with the image.
    Type: Application
    Filed: December 31, 2017
    Publication date: May 3, 2018
    Inventors: ITZHACK GOLDBERG, JAMES R. KOZLOSKI, CLIFFORD A. PICKOVER, NEIL SONDHI
  • Publication number: 20180121684
    Abstract: Embodiments for using power charge management authorization for a user equipment (UE) by a processor. A power charging session is authorized by firmware of the UE for charging the UE using a cryptographic handshake between the UE and a power charging station.
    Type: Application
    Filed: October 31, 2016
    Publication date: May 3, 2018
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Itzhack GOLDBERG, Harry R. MCGREGOR, Yossi MESIKA, Christopher B. MOORE
  • Publication number: 20180121104
    Abstract: A system and method for data storage management is disclosed. The method includes determining, by an access tracking component, a quantity of access requests for at least one data block, and determining a quantity of current copies of the data block. The method also includes creating, by a duplication component, at least one additional copy of the data block when the quantity of the access requests exceeds an access request threshold. Additionally, a deduplication component removes at least one current copy of the data block when the quantity of the access requests falls below the access request threshold. The access request threshold can be a threshold number of access requests for the data block, the presence of an input/output bottleneck, or a given length of a read latency when accessing the data block. Further, data coloring techniques can be used to distribute current copies of the data block.
    Type: Application
    Filed: October 31, 2016
    Publication date: May 3, 2018
    Inventors: Joseph W. Dain, Itzhack Goldberg, Gregory T. Kishi, Daniel I. Tan
  • Publication number: 20180121683
    Abstract: Embodiments for physical token based secured charge management of a user equipment (UE) by a processor. A power charging session is authorized by firmware of the UE for charging the UE upon detecting one or more physical authentication tokens within a selected area of a power charging source or on the power charging source itself, or combination thereof.
    Type: Application
    Filed: October 31, 2016
    Publication date: May 3, 2018
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Itzhack GOLDBERG, Harry R. MCGREGOR, Yossi MESIKA, Christopher B. MOORE
  • Publication number: 20180107678
    Abstract: An approach to de-duplicating data in an electronic text repository by performing the following steps: (i) processing one or more text documents associated with an electronic text repository to identify first instances of a plurality of words; (ii) adding words associated with the identified first instances of the plurality of words to a list, wherein each word added to the list is assigned a unique serial number; and (iii) replacing the plurality of words included in the one or more text documents with serial numbers corresponding to the words associated with the list for generating one or more reduced documents.
    Type: Application
    Filed: October 13, 2016
    Publication date: April 19, 2018
    Inventors: Olympia Gluck, Itzhack Goldberg, Harry R. McGregor, Christopher B. Moore, Neil Sondhi
  • Patent number: 9942116
    Abstract: A first electronic device can receive an identifying signal broadcast from a second electronic device located within a wireless communication range of the first electronic device, and in response, establish a first, local electronic communication path between the first and second electronic devices. The first electronic device can then receive a set of status data from the second electronic device over the local electronic communication path. The first electronic device can then establish a second, remote electronic communication path to a remote server and subsequently transmit, over the remote electronic communication path, the status data from the second electronic device along with status data from the first electronic device.
    Type: Grant
    Filed: July 14, 2016
    Date of Patent: April 10, 2018
    Assignee: International Business Machines Corporation
    Inventors: Itzhack Goldberg, Erik Rueger, Neil Sondhi