Patents by Inventor Nili Guy
Nili Guy has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11928583Abstract: Techniques for generating a set of Deep Learning (DL) models are described. An example method includes training an initial set of DL models using the training data, wherein a topology of each of the DL models is determined based on the parameters vector. The method also includes generating a set of estimate performance functions for each of the DL models in the initial set based on the set of edge-related metrics, and generating a plurality of objective functions based on the set of estimated performance functions. The method also includes generating a final DL model set based on the objective functions, receiving a user selection of a selected DL model from the final DL model set, and deploying the selected DL model to an edge device.Type: GrantFiled: July 8, 2019Date of Patent: March 12, 2024Assignee: International Business Machines CorporationInventors: Lior Turgeman, Nir Naaman, Michael Masin, Nili Guy, Shmuel Kalner, Ira Rosen, Adar Amir
-
Patent number: 11843569Abstract: An example system includes a processor to train an artificial intelligence (AI) model on a training set of images on a client device associated with a particular user. Images in the training set of images are selected using face recognition from a digital camera roll on the client device based on a set of faces chosen by the particular user of the client device. All of images in the training set of images include a detected face from the set of chosen faces. The processor is to filter a group message received from a second device based on the trained AI model.Type: GrantFiled: October 4, 2022Date of Patent: December 12, 2023Assignee: International Business Machines CorporationInventors: Gil Sharon, Nili Guy
-
Patent number: 11829888Abstract: An example system includes a processor to monitor system resources and performance preferences. The processor is to select model fragments based on the system resources and the performance preferences. The processor is to also construct a running artificial intelligence (AI) model from the selected model fragments. The processor is to further automatically modify the running AI model using the model fragments in response to detecting a change in the system resources or a change in the performance preferences.Type: GrantFiled: March 27, 2019Date of Patent: November 28, 2023Assignee: International Business Machines CorporationInventors: Nir Naaman, Ira Rosen, Lior Turgeman, Nili Guy, Samuel Kallner, Adar Amir
-
Patent number: 11757865Abstract: In an approach for a rule-based filtering system for securing password logins, a processor receives a password input on a user device. A processor determines whether the password requires filtering. Responsive to determining the password requires filtering, a processor filters characters from the password based on a set of filtering rules to create a filtered password. A processor determines whether the filtered password matches a stored password.Type: GrantFiled: October 23, 2020Date of Patent: September 12, 2023Assignee: International Business Machines CorporationsInventors: Nir Rozenbaum, Nili Guy
-
Publication number: 20230186775Abstract: An example system includes a processor to receive target asset information from an asset management system. The processor can generate an inspection mission based on the target asset information. The processor can generate unmanned aerial vehicle (UAV)-specific commands based on the inspection mission. The processor can transmit the UAV-specific commands to an unmanned aerial vehicle (UAV) platform. The processor can receive images and sensor data from the UAV. The processor can also send the images and sensor data to an artificial intelligence (AI) services module. The processor can receive feedback from the AI services module. The processor can further modify the inspection mission based on the feedback.Type: ApplicationFiled: December 14, 2021Publication date: June 15, 2023Inventors: Benjamin MANDLER, Nili GUY, Samuel KALLNER, Maya BARNEA, Ira ROSEN, Dmitri PIKUS, Gil SHARON, Netanel EDER
-
Publication number: 20230055968Abstract: An example system includes a processor to train an artificial intelligence (AI) model on a training set of images on a client device associated with a particular user. Images in the training set of images are selected using face recognition from a digital camera roll on the client device based on a set of faces chosen by the particular user of the client device. All of images in the training set of images include a detected face from the set of chosen faces. The processor is to filter a group message received from a second device based on the trained AI model.Type: ApplicationFiled: October 4, 2022Publication date: February 23, 2023Inventors: Gil SHARON, Nili GUY
-
Patent number: 11552914Abstract: An example system includes a processor to receive an artificial intelligence (AI) model trained on a client device associated with a particular user. The processor is to filter a group message based on the AI model. The processor is to send the filtered group message to the client device.Type: GrantFiled: October 6, 2019Date of Patent: January 10, 2023Assignee: International Business Machines CorporationInventors: Gil Sharon, Nili Guy
-
Publication number: 20220131849Abstract: In an approach for a rule-based filtering system for securing password logins, a processor receives a password input on a user device. A processor determines whether the password requires filtering. Responsive to determining the password requires filtering, a processor filters characters from the password based on a set of filtering rules to create a filtered password. A processor determines whether the filtered password matches a stored password.Type: ApplicationFiled: October 23, 2020Publication date: April 28, 2022Inventors: NIR ROZENBAUM, NILI GUY
-
Publication number: 20210256845Abstract: We describe a method for training, inferencing, and a system, for controlling a swarm of unmanned aerial vehicles (UAV). The method comprises introducing a plurality of real time, past and/or simulated records documenting a plurality of sensor readings generated based on measurements taken at a region associated with an emergency event to a system. The system comprises at least one processor adapted to execute code and at least one memory storing a machine learning based model. The system produces code instructions for controlling a plurality of UAVs for presenting at the region a plurality of visual navigation instructions.Type: ApplicationFiled: February 17, 2020Publication date: August 19, 2021Inventors: Gil SHARON, Nili GUY
-
Publication number: 20210116912Abstract: An example system includes a processor to receive media and an event from a deployed unmanned aerial vehicle (UAV). The processor is to send the media and the event to an artificial intelligence (AI) service and receive smart insights from the AI service. The processor is to dynamically generate an execution block based on the smart insights. The processor is to send the generated execution block to an edge device for generating vehicle specific commands.Type: ApplicationFiled: October 16, 2019Publication date: April 22, 2021Inventors: Dmitri Pikus, Nili Guy, Maya Barnea, Gil Sharon, ldan Ben-Harrush
-
Publication number: 20210105238Abstract: An example system includes a processor to receive an artificial intelligence (AI) model trained on a client device associated with a particular user. The processor is to filter a group message based on the AI model. The processor is to send the filtered group message to the client device.Type: ApplicationFiled: October 6, 2019Publication date: April 8, 2021Inventors: Gil Sharon, Nili Guy
-
Publication number: 20210012187Abstract: Techniques for generating a set of Deep Learning (DL) models are described. An example method includes training an initial set of DL models using the training data, wherein a topology of each of the DL models is determined based on the parameters vector. The method also includes generating a set of estimate performance functions for each of the DL models in the initial set based on the set of edge-related metrics, and generating a plurality of objective functions based on the set of estimated performance functions. The method also includes generating a final DL model set based on the objective functions, receiving a user selection of a selected DL model from the final DL model set, and deploying the selected DL model to an edge device.Type: ApplicationFiled: July 8, 2019Publication date: January 14, 2021Inventors: Lior Turgeman, Nir Naaman, Michael Masin, Nili Guy, Shmuel Kalner, Ira Rosen, Adar Amir
-
Publication number: 20200311561Abstract: An example system includes a processor to monitor system resources and performance preferences. The processor is to select model fragments based on the system resources and the performance preferences. The processor is to also construct a running artificial intelligence (AI) model from the selected model fragments. The processor is to further automatically modify the running AI model using the model fragments in response to detecting a change in the system resources or a change in the performance preferences.Type: ApplicationFiled: March 27, 2019Publication date: October 1, 2020Inventors: Nir Naaman, Ira Rosen, Lior Turgeman, Nili Guy, Samuel Kallner, Adar Amir
-
Patent number: 9961126Abstract: Managing data access on a computing device by receiving at a first computing device first webpage-related content received from a second computing device via a communications network, storing the first webpage-related content in a locally-accessible data storage medium that is locally accessible to the first computing device, causing an agent executed by the first computing device to access the first webpage-related content from the locally-accessible data storage medium, intercepting an attempt by the agent to receive second webpage-related content via the communications network, and providing the second webpage-related content to the agent from the locally-accessible data storage medium.Type: GrantFiled: April 29, 2015Date of Patent: May 1, 2018Assignee: International Business Machines CorporationInventors: Idan Ben-Harrush, Ran Bernstein, Nili Guy Ifergan, Gal Shachor
-
Patent number: 9913152Abstract: A discovering master communication device for discovering high resources consuming wireless network resources to optimize resources consumption during network discovery session(s) within a group of nearby communication devices, comprising: a first interface for communicating with remote site(s) over high resources consuming wireless network(s), a second interface for communicating with nearby device(s) which include similar first interface and located within range of the second interface. For a similar communication session, resources consumption of the second interface is lower compared to the first interface, and processor(s) executing a stored code for activating the first interface to discover availability of high resources consuming wireless network resource(s) with assistance of the nearby device(s), sending availability message to the nearby device(s) over the second interface, and sending master assignment message to one of the nearby device(s) over the second interface.Type: GrantFiled: November 23, 2015Date of Patent: March 6, 2018Assignee: International Business Machines CorporationInventors: Aharon Abadi, Nili Guy-Ifergan, Yossi Mesika, Oleg Sternberg
-
Publication number: 20170150374Abstract: A discovering master communication device for discovering high resources consuming wireless network resources to optimize resources consumption during network discovery session(s) within a group of nearby communication devices, comprising: (1) First interface for communicating with remote site(s) over high resources consuming wireless network(s). (2) Second interface for communicating with nearby device(s) which include similar first interface and located within range of the second interface. For a similar communication session, resources consumption of the second interface is lower compared to the first interface. (3) Processor(s) coupled to the first and second interfaces to execute stored code comprising: (a) Activating the first interface to discover availability of high resources consuming wireless network resource(s) with assistance of the nearby device(s). (b) Sending availability message to the nearby device(s) over the second interface.Type: ApplicationFiled: November 23, 2015Publication date: May 25, 2017Inventors: Aharon Abadi, Nili Guy-Ifergan, Yossi Mesika, Oleg Sternberg
-
Publication number: 20170147543Abstract: Displaying Web 1.0 application content on a mobile computing device includes one or more processors request website content, based on a URL corresponding to the website. The web page is generated and includes dynamic content and references to static resources. The web page is crawled and the static resources of the web page are identified. The identified static resources of the web page are compared to the static resources stored on the mobile computing device. In response to determining the absence of a static resource of the web page stored on the mobile computing device, the absent static resource is downloaded and stored within the mobile computing device. In response to accessing the web page of the website, the web page is generated by the dynamic content from the web server and the static content stored on the mobile computing device.Type: ApplicationFiled: November 25, 2015Publication date: May 25, 2017Inventors: Idan Ben-Harrush, Nili Guy, Gal Shachor
-
Publication number: 20160323414Abstract: Managing data access on a computing device by receiving at a first computing device first webpage-related content received from a second computing device via a communications network, storing the first webpage-related content in a locally-accessible data storage medium that is locally accessible to the first computing device, causing an agent executed by the first computing device to access the first webpage-related content from the locally-accessible data storage medium, intercepting an attempt by the agent to receive second webpage-related content via the communications network, and providing the second webpage-related content to the agent from the locally-accessible data storage medium.Type: ApplicationFiled: April 29, 2015Publication date: November 3, 2016Inventors: Idan Ben-Harrush, Ran Bernstein, Nili Guy Ifergan, Gal Shachor
-
Patent number: 9396170Abstract: A method of presenting hyperlink data. The method comprises identifying when a web browser running on a web browser client retrieves, in response to a web document data request submitted to a target server, a first web document data for displaying a first web document containing a hyperlink having a label for display and a target destination defining an address of a second web document, evaluating a risk from content of the second web document, generating by the web browser to a reference evaluation indication of the risk, and processing the web document data and the reference evaluation indication by the web browser for generating a presentation on the client terminal which combines the first web document data and the reference evaluation indication such that when the reference evaluation indication is presented when the label is presented by the web browser.Type: GrantFiled: November 11, 2013Date of Patent: July 19, 2016Assignee: GLOBALFOUNDRIES INC.Inventors: Idan Ben-Harrush, Anat Berkman, Alexander Dvinsky, Nili Guy, Samuel Kallner, Andrei Kirshin, Dmitri Pikus, Yoav Rubin, Gal Shachor, Omer Tripp
-
Patent number: 9372602Abstract: According to some embodiments of the present invention, there is provided a method for revealing at least a portion of a disguised password on a display device. The method comprises receiving a plurality of password characters typed by a user, presenting a plurality of replacement symbols in a password field displayed by a display device of a terminal having a touch surface, each the replacement symbol being indicative of the reception of another of the plurality of password characters, detecting a fingertip which slides contiguously against the touch surface, and temporarily replacing the presentation of at least some of the plurality of replacement symbols with of the presentation of at least some of the plurality of password characters in a sequential manner correspondingly with a movement of the fingertip.Type: GrantFiled: November 4, 2012Date of Patent: June 21, 2016Assignee: International Business Machines CorporationInventors: Idan Ben-Harrush, Nili Guy, Samuel Kallner, Ariel Landau, Yoav Rubin, Gal Shachor