Patents by Inventor Noam Ben-Yochanan

Noam Ben-Yochanan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20210144151
    Abstract: Aspects of a privileged identity management system and method provide users with the ability to request elevated privileges to perform tasks on computing systems and software applications. The privileged identity management system and method also provides users with the ability to extend the elevated privileges to access privileged features or perform tasks using elevated privileges. The privileged identity management system and method utilize a different device that is readily available to the user in order to provide communications relating to the elevated privileges.
    Type: Application
    Filed: January 19, 2021
    Publication date: May 13, 2021
    Applicant: Microsoft Technology Licensing, LLC
    Inventors: Shimi EZRA, Natan KFIR, Noam BEN-YOCHANAN
  • Patent number: 10931682
    Abstract: Aspects of a privileged identity management system and method provide users with the ability to request elevated privileges to perform tasks on computing systems and software applications. The privileged identity management system and method also provides users with the ability to extend the elevated privileges to access privileged features or perform tasks using elevated privileges. The privileged identity management system and method utilize a different device that is readily available to the user in order to provide communications relating to the elevated privileges.
    Type: Grant
    Filed: June 30, 2015
    Date of Patent: February 23, 2021
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Shimi Ezra, Natan Kfir, Noam Ben-Yochanan
  • Patent number: 10677826
    Abstract: Device, system, and method of protecting utility meters and utility infrastructure; and particularly, for determining whether an electricity meter or associated electricity wires have been tampered with or have been physically switched or manipulated. An electricity meter includes a challenge transmitter to transmit a challenge message, via a wired electric cable, to a consumer-side responder that is located within a venue which receives electric power via the electricity meter. The electricity meter further includes a response receiver to receive a response message from the consumer-side responder via the wired electric cable, and to check the response message for correctness based on a shared secret that is known only to the electricity meter and to the consumer-side responder.
    Type: Grant
    Filed: June 12, 2018
    Date of Patent: June 9, 2020
    Assignee: ARM LIMITED
    Inventor: Noam Ben Yochanan
  • Publication number: 20190377015
    Abstract: Device, system, and method of protecting utility meters and utility infrastructure; and particularly, for determining whether an electricity meter or associated electricity wires have been tampered with or have been physically switched or manipulated. An electricity meter includes a challenge transmitter to transmit a challenge message, via a wired electric cable, to a consumer-side responder that is located within a venue which receives electric power via the electricity meter. The electricity meter further includes a response receiver to receive a response message from the consumer-side responder via the wired electric cable, and to check the response message for correctness based on a shared secret that is known only to the electricity meter and to the consumer-side responder.
    Type: Application
    Filed: June 12, 2018
    Publication date: December 12, 2019
    Inventor: Noam Ben Yochanan
  • Publication number: 20170006044
    Abstract: Aspects of a privileged identity management system and method provide users with the ability to request elevated privileges to perform tasks on computing systems and software applications. The privileged identity management system and method also provides users with the ability to extend the elevated privileges to access privileged features or perform tasks using elevated privileges. The privileged identity management system and method utilize a different device that is readily available to the user in order to provide communications relating to the elevated privileges.
    Type: Application
    Filed: June 30, 2015
    Publication date: January 5, 2017
    Applicant: MICROSOFT TECHNOLOGY LICENSING, LLC.
    Inventors: Shimi Ezra, Natan Kfir, Noam Ben-Yochanan
  • Patent number: 8954897
    Abstract: In a virtualization environment, a host machine on which a guest machine is operable is monitored to determine that it is healthy by being compliant with applicable policies (such as being up to date with the current security patches, running an anti-virus program, certified to run a guest machine, etc.) and free from malicious software or “malware” that could potentially disrupt or compromise the security of the guest machine. If the host machine is found to be non-compliant, then the guest machine is prevented from either booting up on the host machine or connecting to a network to ensure that the entire virtualization environment is compliant and that the guest machine, including its data and applications, etc., is protected against attacks that may be launched against it via malicious code that runs on the unhealthy host machine, or is isolated from the network until the non-compliancy is remediated.
    Type: Grant
    Filed: August 28, 2008
    Date of Patent: February 10, 2015
    Assignee: Microsoft Corporation
    Inventors: John Neystadt, Noam Ben-Yochanan, Nir Nice
  • Patent number: 8910270
    Abstract: In some embodiments of the invention, techniques may make private identifiers for private network resources usable to establish connections to those private network resources from computing devices connected to an outside network. For example, when a computing device is connected to an outside network and attempting to contact a private network resource, DNS may be used to resolve a domain name for the private network resource to an IP address for an edge resource of the private network. Communications may be passed between the computing device and the edge resource according to protocols which embed the identifier originally used to identify the private network resource. The edge resource of the private network may analyze communications over the connection to determine this identifier, and use it to pass the communication to the desired private network resource.
    Type: Grant
    Filed: January 20, 2009
    Date of Patent: December 9, 2014
    Assignee: Microsoft Corporation
    Inventors: Nir Nice, Amit Finkelstein, Dror Kremer, Noam Ben-Yochanan, Shyam Seshadri
  • Patent number: 8341720
    Abstract: Methods, systems, and computer-readable media are disclosed for applying information protection. A particular method includes receiving a data file at a gateway coupled to a network. The data file is to be sent to a destination device that is external to the network. The method also includes selectively applying information protection to the data file at the gateway prior to sending the data file to the destination device. The information protection is selectively applied based on information associated with the destination device, information associated with the data file, and information associated with a user of the destination device.
    Type: Grant
    Filed: January 9, 2009
    Date of Patent: December 25, 2012
    Assignee: Microsoft Corporation
    Inventors: Noam Ben-Yochanan, John Neystadt, Nir Nice, Max Uritsky, Rushmi Malaviarachchi
  • Publication number: 20100186079
    Abstract: In some embodiments of the invention, techniques may make private identifiers for private network resources usable to establish connections to those private network resources from computing devices connected to an outside network. For example, when a computing device is connected to an outside network and attempting to contact a private network resource, DNS may be used to resolve a domain name for the private network resource to an IP address for an edge resource of the private network. Communications may be passed between the computing device and the edge resource according to protocols which embed the identifier originally used to identify the private network resource. The edge resource of the private network may analyze communications over the connection to determine this identifier, and use it to pass the communication to the desired private network resource.
    Type: Application
    Filed: January 20, 2009
    Publication date: July 22, 2010
    Applicant: Microsoft Corporation
    Inventors: Nir Nice, Amit Finkelstein, Dror Kremer, Noam Ben-Yochanan, Shyam Seshadri
  • Publication number: 20100180332
    Abstract: Methods, systems, and computer-readable media are disclosed for applying information protection. A particular method includes receiving a data file at a gateway coupled to a network. The data file is to be sent to a destination device that is external to the network. The method also includes selectively applying information protection to the data file at the gateway prior to sending the data file to the destination device. The information protection is selectively applied based on information associated with the destination device, information associated with the data file, and information associated with a user of the destination device.
    Type: Application
    Filed: January 9, 2009
    Publication date: July 15, 2010
    Applicant: Microsoft Corporation
    Inventors: Noam Ben-Yochanan, John Neystadt, Nir Nice, Max Uritsky, Rushmi Malaviarachchi
  • Publication number: 20100058432
    Abstract: In a virtualization environment, a host machine on which a guest machine is operable is monitored to determine that it is healthy by being compliant with applicable policies (such as being up to date with the current security patches, running an anti-virus program, certified to run a guest machine, etc.) and free from malicious software or “malware” that could potentially disrupt or compromise the security of the guest machine. If the host machine is found to be non-compliant, then the guest machine is prevented from either booting up on the host machine or connecting to a network to ensure that the entire virtualization environment is compliant and that the guest machine, including its data and applications, etc., is protected against attacks that may be launched against it via malicious code that runs on the unhealthy host machine, or is isolated from the network until the non-compliancy is remediated.
    Type: Application
    Filed: August 28, 2008
    Publication date: March 4, 2010
    Applicant: Microsoft Corporation
    Inventors: John Neystadt, Noam Ben-Yochanan, Nir Nice