Patents by Inventor Onn Shehory

Onn Shehory has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10333950
    Abstract: Defending against malicious electronic messages by analyzing electronic messages sent via a computer network to identify predefined risk elements found within the electronic messages, detecting attempts to perform computer-mediated actions that are associated with the electronic messages, identifying a potential security risk associated with the electronic messages and the computer-mediated actions, and performing a predefined preventive security action responsive to identifying the potential security risk.
    Type: Grant
    Filed: May 1, 2016
    Date of Patent: June 25, 2019
    Assignee: International Business Machines Corporation
    Inventor: Onn Shehory
  • Publication number: 20170318038
    Abstract: Defending against malicious electronic messages by analyzing electronic messages sent via a computer network to identify predefined risk elements found within the electronic messages, detecting attempts to perform computer-mediated actions that are associated with the electronic messages, identifying a potential security risk associated with the electronic messages and the computer-mediated actions, and performing a predefined preventive security action responsive to identifying the potential security risk.
    Type: Application
    Filed: May 1, 2016
    Publication date: November 2, 2017
    Inventor: Onn Shehory
  • Patent number: 9606815
    Abstract: Methods, computing systems and computer program products implement embodiments of the present invention that include receiving, by a computer, application code including a set of software elements, and identifying dependencies between the software elements. Based on the dependencies, a respective ranking score can be calculated for each of the software elements, the respective ranking score for a given software element indicating a likelihood that the given software element is configured as an application programming interface (API).
    Type: Grant
    Filed: February 26, 2015
    Date of Patent: March 28, 2017
    Assignee: International Business Machines Corporation
    Inventors: Maayan Goldstein, Eitan Daniel Farchi, Onn Shehory
  • Publication number: 20160253185
    Abstract: Methods, computing systems and computer program products implement embodiments of the present invention that include receiving, by a computer, application code including a set of software elements, and identifying dependencies between the software elements. Based on the dependencies, a respective ranking score can be calculated for each of the software elements, the respective ranking score for a given software element indicating a likelihood that the given software element is configured as an application programming interface (API).
    Type: Application
    Filed: February 26, 2015
    Publication date: September 1, 2016
    Inventors: Maayan Goldstein, Eitan Daniel Farchi, Onn Shehory
  • Publication number: 20130024804
    Abstract: Systems and methods for monitoring user actions, while a user is viewing first content displayed on a display screen, wherein the user views a first portion of the first content within a first context that defines scope of view for the first content; determining whether the user's actions resulted in second content being displayed on the display screen; associating the first portion of the first content with the second content; and maintaining a record of the association between the first portion of the first content and the second content.
    Type: Application
    Filed: July 20, 2011
    Publication date: January 24, 2013
    Applicant: International Business Machines Corporation
    Inventors: Eitan Farchi, Onn Shehory, Moran Shochat, Aviad Zlotnick
  • Patent number: 8086708
    Abstract: A method for managing a computer system includes monitoring first violations of a service level objective (SLO) of a service running on the computer system so as to determine a first statistical behavior of the first violations. Second violations of a component performance threshold of a component of the computer system are monitored so as to determine a second statistical behavior of the second violations. A model that predicts the second statistical behavior based on the first statistical behavior is produced. The component performance threshold is automatically adjusted responsively to the model, so as to improve a prediction of the first violations by the second violations.
    Type: Grant
    Filed: September 28, 2005
    Date of Patent: December 27, 2011
    Assignee: International Business Machines Corporation
    Inventors: David Breitgand, Ealan Henis, Onn Shehory
  • Patent number: 8037365
    Abstract: Managing a computer system including automatically adjusting two separate component thresholds (a component threshold pair) based on a statistical model. Specifically, a first component threshold is modeled to predict violations of an SLO based on a violation of the first component threshold and a second, separate component threshold is modeled to predict a non-violation (compliance) of an SLO based on a non-violation of the second component threshold. Over time, the values of the component thresholds may change and one component threshold may be greater than the other component threshold at one time, and vice versa at another time. A component metric reading between the first and second component thresholds indicates that a prediction of an SLO violation or compliance is less certain, and a warning may be issued rather than an alert.
    Type: Grant
    Filed: November 3, 2009
    Date of Patent: October 11, 2011
    Assignee: International Busniss Machines coporation
    Inventors: Maayan Goldstein, David Breitgand, John Michael Lake, Ealan Abraham Henis, Onn Shehory
  • Publication number: 20110107154
    Abstract: Managing a computer system including automatically adjusting two separate component thresholds (a component threshold pair) based on a statistical model. Specifically, a first component threshold is modeled to predict violations of an SLO based on a violation of the first component threshold and a second, separate component threshold is modeled to predict a non-violation (compliance) of an SLO based on a non-violation of the second component threshold. Over time, the values of the component thresholds may change and one component threshold may be greater than the other component threshold at one time, and vice versa at another time. A component metric reading between the first and second component thresholds indicates that a prediction of an SLO violation or compliance is less certain, and a warning may be issued rather than an alert.
    Type: Application
    Filed: November 3, 2009
    Publication date: May 5, 2011
    Inventors: David Breitgand, Maayan Goldstein, Ealan Abraham Henis, John Michael Lake, Onn Shehory
  • Patent number: 7489639
    Abstract: A method for diagnosing network performance problems includes providing a graph representing a topology of a network including first nodes that are classified as providers of a resource, second nodes that are classified as consumers of the resource, and third nodes that are classified as mediators intervening between the providers and the consumers. Responsively to a report of a performance problem encountered by a given consumer in the network, at least one input/output (I/O) path is traced through the graph connecting the given consumer to one or more of the providers. One or more problematic nodes are identified along the at least one I/O path as possible causes of the performance problem.
    Type: Grant
    Filed: March 23, 2005
    Date of Patent: February 10, 2009
    Assignee: International Business Machines Corporation
    Inventors: David Breitgand, Ealan Henis, Edya Ladan-Mozes, Onn Shehory, Elena Yerushalmi
  • Publication number: 20090018723
    Abstract: A vehicle control system including a vehicle and a vehicle controller for receiving information regarding the vehicle and its environment and vehicle control input via a vehicle control, applying control logic predefined for the vehicle control input and the information to determine an aspect of the vehicle to control and how to control the aspect, and sending a control directive to at least one vehicle subsystem to carry out the determined control of the aspect, where when the vehicle is in a first operational state the controller allows the vehicle control input to control the vehicle subsystem directly related to the vehicle control input without modification by the controller, and where when the vehicle is in a second operational state the controller uses the vehicle control input to determine a vehicle objective and sends the control directive to any of the vehicle subsystems in order to achieve the vehicle objective.
    Type: Application
    Filed: July 12, 2007
    Publication date: January 15, 2009
    Inventors: Dan Chevion, Tal Drory, Oleg Goldshmidt, Ron Sivan, Onn Shehory
  • Publication number: 20060293777
    Abstract: A method for managing a computer system includes monitoring first violations of a service level objective (SLO) of a service running on the computer system so as to determine a first statistical behavior of the first violations. Second violations of a component performance threshold of a component of the computer system are monitored so as to determine a second statistical behavior of the second violations. A model that predicts the second statistical behavior based on the first statistical behavior is produced. The component performance threshold is automatically adjusted responsively to the model, so as to improve a prediction of the first violations by the second violations.
    Type: Application
    Filed: June 7, 2005
    Publication date: December 28, 2006
    Applicant: International Business Machines Corporation
    Inventors: David Breitgand, Ealan Henis, Onn Shehory
  • Publication number: 20060276995
    Abstract: A method for managing a computer system includes monitoring first violations of a service level objective (SLO) of a service running on the computer system so as to determine a first statistical behavior of the first violations. Second violations of a component performance threshold of a component of the computer system are monitored so as to determine a second statistical behavior of the second violations. A model that predicts the second statistical behavior based on the first statistical behavior is produced. The component performance threshold is automatically adjusted responsively to the model, so as to improve a prediction of the first violations by the second violations.
    Type: Application
    Filed: September 28, 2005
    Publication date: December 7, 2006
    Applicant: International Business Machines Corporation
    Inventors: David Breitgand, Ealan Henis, Onn Shehory
  • Publication number: 20060215564
    Abstract: A method for diagnosing network performance problems includes providing a graph representing a topology of a network including first nodes that are classified as providers of a resource, second nodes that are classified as consumers of the resource, and third nodes that are classified as mediators intervening between the providers and the consumers. Responsively to a report of a performance problem encountered by a given consumer in the network, at least one input/output (I/O) path is traced through the graph connecting the given consumer to one or more of the providers. One or more problematic nodes are identified along the at least one I/O path as possible causes of the performance problem.
    Type: Application
    Filed: March 23, 2005
    Publication date: September 28, 2006
    Applicant: International Business Machines Corporation
    Inventors: David Breitgand, Ealan Henis, Edya Ladan-Mozes, Onn Shehory, Elena Yerushalmi
  • Publication number: 20020029201
    Abstract: A method for controlling an exchange of information between a first party and a second party includes receiving from the first party a set of one or more privacy preferences, indicating restrictions to be placed on use of specified items of the information to be disclosed by the first party, and receiving from the second party a description of a privacy policy, indicating undertakings by the second party with regard to restricting the use of the specified items of the information. The compatibility of the privacy preferences with the privacy policy is assessed. If the privacy preferences and the privacy policy are found to be incompatible, a negotiation is brokered with at least one of the first and the second parties so as to bring the privacy preferences and the privacy policy into mutual compatibility. The information is provided from the first party to the second party only when the privacy preferences and the privacy policy are found to be compatible.
    Type: Application
    Filed: November 30, 2000
    Publication date: March 7, 2002
    Inventors: Zeev Barzilai, Sergei Shmulyian, Onn Shehory