Patents by Inventor Oded Sofer

Oded Sofer has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20170237771
    Abstract: A method, computer program product and/or system receives information pertaining to network data traffic from and/or to a network accessible resource, analyzes the information to determine whether a user is engaged in potential hacking transaction(s) with respect to the resource. On condition that the user is determined to be engaged in potential hacking transaction(s), a “scarecrow” message designed for display to the user, is generated and sent to the user.
    Type: Application
    Filed: February 16, 2016
    Publication date: August 17, 2017
    Inventors: Roza Miroshnikov, David Rozenblat, Oded Sofer
  • Patent number: 9734343
    Abstract: Examples of techniques for detecting and preventing sensitive information leaks are described herein. In one example, a method for detection of sensitive information leaks includes computing, via a processor, a set of rules that identify sensitive information, and sending, via the processor, the set of rules to a dispatcher application using a protocol. The method can also include detecting, via the processor, that at least one data block of the transmitted data matches the set of rules, and executing, via the processor, a corrective action in response to detecting that at least one of the transmitted data blocks matches the set of rules.
    Type: Grant
    Filed: November 18, 2014
    Date of Patent: August 15, 2017
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Guy Galil, Leonid Gorelik, Alexander Pyasik, Oded Sofer, Yifat Yulevich
  • Publication number: 20170201525
    Abstract: Methods, computing systems and computer program products implement embodiments of the present invention that include assigning, to multiple users, respective sets of original roles for accessing data stored on a computer system, and performing, in response to requests from the users, multiple operations on the data. While performing the multiple operations on the data, a transaction log is generated that includes a plurality of entries, each of the entries storing attributes of a given operation. Based on the entries in the log file, a respective set of learned roles for respective users is identified, and the respective sets of the learned roles are assigned to the respective users.
    Type: Application
    Filed: January 10, 2016
    Publication date: July 13, 2017
    Applicant: International Business Machines Corporation
    Inventors: Ofer Biller, Oded Sofer, Boris Rozenberg, David Rozenblat
  • Patent number: 9471797
    Abstract: Embodiments are directed to a computer-based system for tuning roles. The system includes a memory and a processor system communicatively coupled to the memory. The processor system is configured to receive at least one database access log file and existing role definitions of the system. For each role, the processor system is further configured to create an existing user to permission assignment (EUPA) based at least in part on the existing role definitions of the system. For each role, the processor system is further configured to identify logical sessions in the at least one database access log file and create a demonstrated user to permission assignment (DUPA) formed at least in part from data of the identified logical sessions. For each role, the processor system is further configured to create a final user to permission assignment (FUPA) including a function of the EUPA and the DUPA.
    Type: Grant
    Filed: December 8, 2015
    Date of Patent: October 18, 2016
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Ofer Biller, Boris Rozenberg, David Rozenblat, Oded Sofer
  • Publication number: 20150242639
    Abstract: Examples of techniques for detecting and preventing sensitive information leaks are described herein. In one example, a method for detection of sensitive information leaks includes computing, via a processor, a set of rules that identify sensitive information, and sending, via the processor, the set of rules to a dispatcher application using a protocol. The method can also include detecting, via the processor, that at least one data block of the transmitted data matches the set of rules, and executing, via the processor, a corrective action in response to detecting that at least one of the transmitted data blocks matches the set of rules.
    Type: Application
    Filed: November 18, 2014
    Publication date: August 27, 2015
    Inventors: Guy Galil, Leonid Gorelik, Alexander Pyasik, Oded Sofer, Yifat Yulevich
  • Publication number: 20150242633
    Abstract: Examples of techniques for detecting and preventing sensitive information leaks are described herein. In one example, a method for detection of sensitive information leaks comprises computing, via a processor, a set of rules that identify sensitive information, and sending, via the processor, the set of rules to a dispatcher application using a protocol. The method can also include detecting, via the processor, that at least one data block of the transmitted data matches the set of rules, and executing, via the processor, a corrective action in response to detecting that at least one of the transmitted data blocks matches the set of rules.
    Type: Application
    Filed: February 26, 2014
    Publication date: August 27, 2015
    Applicant: International Business Machines Corporation
    Inventors: Guy Galil, Leonid Gorelik, Alexander Pyasik, Oded Sofer, Yifat Yulevich
  • Publication number: 20030158897
    Abstract: A system for defining communities and matching users into said communities, said matched users thereby gaining access to one or more elements associated with said communities; the system comprising a host connected to a network being for communication with a plurality of users, said host being configured for: creating at least one community by defining attributes for each of said communities; and defining one or more elements associated with each of said communities; and assigning attributes to a user, said attributes extracted from information associated with the user; and matching said attributes of at least one user to attributes of at least one community; assigning said user to said community based on the result of said matching; said user thereby gaining access to at least one element associated with said community.
    Type: Application
    Filed: November 30, 2000
    Publication date: August 21, 2003
    Applicant: ViryaNet Ltd.
    Inventors: Ron Ben-Natan, Chava Kahana, Miri Levy, Rosa Miroshnikov, Oded Sofer, Lea Zafransky