Patents by Inventor Michal Malka

Michal Malka has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11570178
    Abstract: A method and a system for checking permissions compatibility between a configuration management system and an orchestration system of a computing cluster are disclosed. The method comprises: identifying a request to approve a change in at least one file of the computing cluster. Retrieving from a repository of the configuration management system an identity of a user for performing the change. Acquiring a denial response or an approval response received in response to a query provisioned to the orchestration system, the query is for rights to change the at least one file using the identity of the user. In response to the approval response, entering the approval response, into the configuration management system for confirming the checking permissions compatibility is approved. In response to the denial received, sending a message to the configuration management system, the message is indicative that the checking permissions compatibility is not approved.
    Type: Grant
    Filed: October 26, 2020
    Date of Patent: January 31, 2023
    Assignee: International Business Machines Corporation
    Inventors: Etai Lev Ran, Alexey Roytman, Zvi Cahana, Idan Zach, Michal Malka, Vita Bortnikov
  • Publication number: 20220131865
    Abstract: A method and a system for checking permissions compatibility between a configuration management system and an orchestration system of a computing cluster are disclosed. The method comprises: identifying a request to approve a change in at least one file of the computing cluster. Retrieving from a repository of the configuration management system an identity of a user for performing the change. Acquiring a denial response or an approval response received in response to a query provisioned to the orchestration system, the query is for rights to change the at least one file using the identity of the user. In response to the approval response, entering the approval response, into the configuration management system for confirming the checking permissions compatibility is approved. In response to the denial received, sending a message to the configuration management system, the message is indicative that the checking permissions compatibility is not approved.
    Type: Application
    Filed: October 26, 2020
    Publication date: April 28, 2022
    Inventors: Etai Lev Ran, Alexey Roytman, Zvi Cahana, Idan Zach, Michal Malka, Vita Bortnikov
  • Patent number: 11269751
    Abstract: Embodiments may include techniques for hierarchical evaluation of the anomaly level of a system and its sub-components using domain knowledge, so as to provide improved accuracy and explainability compared to conventional methods. For example a method of anomaly detection in a hierarchical computer network may comprise defining a tree-like topological structure which describes how the hierarchical computer network comprises sub-components, wherein each node of the tree-like topological structure represents a sub-component of the hierarchical computer network, and wherein at least some of the sub-components are monitored to generate signals indicating an operational condition of each sub-component, collecting a plurality of time-series of maximum absolute anomaly scores for each monitored signal, and computing an anomaly score for a root node of the tree-like topological structure.
    Type: Grant
    Filed: June 11, 2020
    Date of Patent: March 8, 2022
    Assignee: International Business Machines Corporation
    Inventors: David Ohana, Bruno Wassermann, Michal Malka
  • Publication number: 20210390027
    Abstract: Embodiments may include techniques for hierarchical evaluation of the anomaly level of a system and its sub-components using domain knowledge, so as to provide improved accuracy and explainability compared to conventional methods. For example a method of anomaly detection in a hierarchical computer network may comprise defining a tree-like topological structure which describes how the hierarchical computer network comprises sub-components, wherein each node of the tree-like topological structure represents a sub-component of the hierarchical computer network, and wherein at least some of the sub-components are monitored to generate signals indicating an operational condition of each sub-component, collecting a plurality of time-series of maximum absolute anomaly scores for each monitored signal, and computing an anomaly score for a root node of the tree-like topological structure.
    Type: Application
    Filed: June 11, 2020
    Publication date: December 16, 2021
    Inventors: DAVID OHANA, Bruno Wassermann, Michal Malka