Patents by Inventor Royi Ronen
Royi Ronen has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20170359372Abstract: Detecting a volumetric attack on a computer network with fewer false positives and while also requiring fewer processing resources is provided. The systems and methods described herein use observations taken at the network level to observe network traffic to form a predictive model for future traffic. When the network's future traffic sufficiently exceeds the predictive model, the monitoring systems and methods will indicate to the network to take security measures. The traffic to the network may be observed in subsets, corresponding to various groupings of sources, destinations, and protocols so that security measures may be targeted to that subset without affecting other machines in the network.Type: ApplicationFiled: June 14, 2016Publication date: December 14, 2017Applicant: Microsoft Technology Licensing, LLC.Inventors: Royi Ronen, Hani Neuvirth-Telem, Shai Baruch Nahum, Yuri Gabaev, Oleg Yanovsky, Vlad Korsunsky, Tomer Teller, Hanan Shteingart
-
Publication number: 20170344901Abstract: A computerized method of classifying network accessible storage transactions at network accessible storage. The method comprises obtaining an client predictive security model for anomaly or malfunctioning detection, the client predictive security model is dynamically created by an analysis of a plurality of client transactions made to access target data stored in an client computing device, monitoring a plurality of network accessible storage transactions made to access a replica of the target data when the replica is stored in an network accessible storage, and classifying at least some of the plurality of network accessible storage transactions based on the client predictive security model.Type: ApplicationFiled: May 29, 2016Publication date: November 30, 2017Inventors: Royi RONEN, Peiheng HU, Lars MOHR
-
Publication number: 20170270171Abstract: A query network is disclosed, comprising sets of nodes and edges connecting pairs of nodes. The nodes of the query network are associated with edge-defining queries. A method is taught for fully evaluating such a query network. A language is further disclosed for constructing queries. The query network may be used to model a social network, a professional network or the like.Type: ApplicationFiled: March 27, 2017Publication date: September 21, 2017Inventors: Oded SHMUELI, Royi RONEN
-
Publication number: 20170207980Abstract: A recommendation system for recommending a target feature value for a target feature for a target deployment is provided. The recommendation system, for each of a plurality of deployments, collects feature values for the features of that deployment. The recommendation system then generates a model for recommending a target feature value for the target feature based on the collected feature values of the features for the deployments. The recommendation system applies the model to the features of the target deployment to identify a target feature value for the target feature. The recommendation system then provides the identified target feature value as a recommendation for the target feature for the target deployment.Type: ApplicationFiled: May 16, 2016Publication date: July 20, 2017Inventors: Efim Hudis, Hani-Hana Neuvirth, Daniel Alon, Royi Ronen, Yair Tor, Gilad Michael Elyashar
-
Publication number: 20170091332Abstract: Data from social networking applications and other applications that can be used to communicate are combined for a user to generate a graph of the various relationships that the user has with other users in the social networking applications and other applications. In addition, the behaviors of each user with respect to communicating through the various social networking applications and other applications are monitored to generate task data that describes user preferences for communicating using each social networking application or other application for different tasks. At a later time, when a user is looking to connect with another user for an indicated task such as networking, the graph can be used to recommend paths to other users in the various social networking applications and other applications, and the generated task data can be used to rank the recommended paths based on the indicated task.Type: ApplicationFiled: September 25, 2015Publication date: March 30, 2017Inventors: Neta Haiby-Weiss, Amir Pinchas, Hanan Lavy, Yitzhak Tzahi Weisfeld, Yair Snir, Royi Ronen
-
Patent number: 9607052Abstract: A query network is disclosed, comprising sets of nodes and edges connecting pairs of nodes. The nodes of the query network are associated with edge-defining queries. A method is taught for fully evaluating such a query network. A language is further disclosed for constructing queries. The query network may be used to model a social network, a professional network or the like.Type: GrantFiled: December 29, 2009Date of Patent: March 28, 2017Assignee: Technion Research & Development Foundation LimitedInventors: Oded Shmueli, Royi Ronen
-
Patent number: 9569536Abstract: Systems, methods, and media for proposing similar applications to a candidate application are provided. A similar results server may surface similar applications to a user of an application store. The applications can be selected based on similarity between features of the application. The features may be extracted from graphical user interface information rendered by a device that executes the applications. The applications that are identified as similar (e.g., based on the features) are displayed to the user.Type: GrantFiled: December 17, 2013Date of Patent: February 14, 2017Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Royi Ronen, Gal Lavee
-
Publication number: 20170039335Abstract: A network-accessible computer includes a network-communications interface, configured to receive health metrics of a user over a computer network. The network-accessible computer also includes a logic machine, which is configured to localize the user in a virtual space based on the health metrics, identify k nearest neighbors in the virtual space having k shortest Euclidean distances to the user, and generate a health insight comparing the user to the k nearest neighbors. The network-communications interface is further configured to send the health insight to a computing device associated with the user via the computer network.Type: ApplicationFiled: December 2, 2015Publication date: February 9, 2017Applicant: Microsoft Technology Licensing, LLCInventors: Ansari Mohammed Ismail, Hadas Bitran, Royi Ronen, Ohad Jassin, Elad Yom-Tov, Andrew Lindsay Dumovic, Haithem Albadawi, Farah Shariff, Todd Holmdahl
-
Publication number: 20160262017Abstract: Aspects of the technology described herein provide a mechanism to authenticate a task request received by a personal digital assistant. The authentication mechanism improves security for transactions facilitated by the personal digital assistant. The authentication mechanism can also improve machine and user efficiency by streamlining a transaction process. In one aspect, the request is a verbal request made by a person and received by the personal digital assistant through a microphone. The personal assistant can generate an authentication questions using data from a semantic knowledge base accessible to the personal digital assistant.Type: ApplicationFiled: March 4, 2015Publication date: September 8, 2016Inventors: GAL LAVEE, ROYI RONEN, RONEN YAARI
-
Publication number: 20160212089Abstract: A method for managing communication among a plurality of social network members. The method comprises defining a multi participant task, setting at least one forward rule limiting the distribution an invitation message for participating in the multi participant task, forwarding the invitation message to at least one addressee from a plurality of social network members, allowing the at least one addressee to forward the invitation message to at least one additional addressee from the plurality of social network members under the at least one forward rule, monitoring a plurality of feedbacks to the invitation message to determine whether the multi participant task is achieved, and updating a status of the multi participant task according to the determination.Type: ApplicationFiled: March 29, 2016Publication date: July 21, 2016Applicant: Technion Research & Development Foundation LimitedInventors: Oded SHMUELI, Royi RONEN
-
Patent number: 9398034Abstract: Disclosed herein is a system and method for automatically identifying potential malware files or benign files in files that are not known to be malware. Vector distances for select features of the files are compared to vectors both known malware files and benign files. Based on the distance measures a malware score is obtained for the unknown file. If the malware score exceeds a threshold a researcher may be notified of the potential malware, or the file may be automatically classified as malware if the score is significantly high.Type: GrantFiled: December 19, 2013Date of Patent: July 19, 2016Assignee: Microsoft Technology Licensing, LLCInventors: Royi Ronen, Shay Kels, Elad Ziklik, Efim Hudis, Corina Feuerstein, Tomer Brand
-
Patent number: 9305284Abstract: A method for managing communication among a plurality of social network members. The method comprises defining a multi participant task, setting at least one forward rule limiting the distribution an invitation message for participating in the multi participant task, forwarding the invitation message to at least one addressee from a plurality of social network members, allowing the at least one addressee to forward the invitation message to at least one additional addressee from the plurality of social network members under the at least one forward rule, monitoring a plurality of feedbacks to the invitation message to determine whether the multi participant task is achieved, and updating a status of the multi participant task according to the determination.Type: GrantFiled: May 19, 2011Date of Patent: April 5, 2016Assignee: Technion Research & Development Foundation LimitedInventors: Oded Shmueli, Royi Ronen
-
Publication number: 20160012512Abstract: Disclosed herein is a system and method for generating a user profile for a user from multiple different data sources and providing recommendations to a user that are directed to benefiting the user and not benefiting a particular merchant or service provider. This disparate data is taken from multiple different data sources that are often competitors of one another. From the multiple data sources the same transaction or event can be determined and correlated with each other. This information is then processed to generate the user's profile which is used to generated recommendations for the user based on the user's needs. Recommendations that are presented can be positive or negative recommendations.Type: ApplicationFiled: July 13, 2014Publication date: January 14, 2016Inventors: Neta Haiby, Elad Ziklik, Ronen Yaari, Efim Hudis, Royi Ronen, Yuri Gurevich
-
Publication number: 20150363863Abstract: A method includes acts for filtering auto consumption recommendations and auto consumption actions. The method includes receiving from a recommendation system, a recommendation of an asset for consumption. The asset for consumption is evaluated in the context of one or more filter rules regarding auto consumption. The filter rules are configured to filter recommended assets from being consumed when certain criteria are met or to permit recommended assets to be consumed when certain criteria are met. As a result, the method includes identifying one or more constraints on how recommended asset should be consumed. The method further includes filtering consumption of the recommended asset based on the one or more constraints.Type: ApplicationFiled: June 17, 2014Publication date: December 17, 2015Inventors: Tom Jurgenson, Royi Ronen, Elad Ziklik, Oran Brill
-
Publication number: 20150310529Abstract: One or more web-behavior-augmented recommendation servers augment catalog interaction data between consumers and a catalog of products with collected online web behavior data associated with individual users. The online web behavior data represents online web behavior of the each consumer outside of the catalog of products and can improve the accuracy of product recommendations, which then be presented to an individual consumer via a computer user interface.Type: ApplicationFiled: April 28, 2014Publication date: October 29, 2015Applicant: Microsoft CorporationInventors: Royi Ronen, Elad Yom-Tov, Elad Ziklik, Gal Lavee
-
Publication number: 20150310213Abstract: Disclosed herein is a system and method for a system and method for determining whether the protection level of a protection system is appropriate for the way the user of a computing system is using the device. The protection system monitors the user's activity while they are using the various applications on the device. The protection system identifies an activity record that is the most similar to the user's activity and compares the current protection level with the associated record's protection level. The protection system may change the protection level when the user's protection level and the associated record's protection level are different.Type: ApplicationFiled: April 29, 2014Publication date: October 29, 2015Applicant: Microsoft CorporationInventors: Royi Ronen, Elad Ziklik, Corina Feuerstein, Tomer Brand
-
Publication number: 20150180890Abstract: Disclosed herein is a system and method for automatically identifying potential malware files or benign files in files that are not known to be malware. Vector distances for select features of the files are compared to vectors both known malware files and benign files. Based on the distance measures a malware score is obtained for the unknown file. If the malware score exceeds a threshold a researcher may be notified of the potential malware, or the file may be automatically classified as malware if the score is significantly high.Type: ApplicationFiled: December 19, 2013Publication date: June 25, 2015Applicant: Microsoft CorporationInventors: Royi Ronen, Shay Kels, Elad Ziklik, Efim Hudis, Corina Feuerstein, Tomar Brand
-
Publication number: 20150169759Abstract: Systems, methods, and media for proposing similar applications to a candidate application are provided. A similar results server may surface similar applications to a user of an application store. The applications can be selected based on similarity between features of the application. The features may be extracted from graphical user interface information rendered by a device that executes the applications. The applications that are identified as similar (e.g., based on the features) are displayed to the user.Type: ApplicationFiled: December 17, 2013Publication date: June 18, 2015Applicant: MICROSOFT CORPORATIONInventors: ROYI RONEN, Gal Lavee
-
Publication number: 20150073931Abstract: Disclosed herein is a system and method for identifying features of items that are more relevant for making recommendations to consumers for content that they may be interested in. The system determines the similarity between items that are recommend and items in the user's history and compares that similarity measure to the similarity measure calculated for a random item on the same features. From this similarity measure the relative impactfullness of a particular feature on a recommendation can be determined.Type: ApplicationFiled: September 6, 2013Publication date: March 12, 2015Applicant: Microsoft CorporationInventors: Royi Ronen, Noam Koenigstein, Nir Nice, Elad Ziklik
-
Publication number: 20140372429Abstract: Disclosed herein is a system and method for generating a user profile for a user based on the way the user interacts with consumable content in an application, such as an electronic book in an e-reader. The actions of the user with regards to the content are monitored and the associated with characteristics of the content. This association is used to build the user's profile of their likes and dislikes which are then provided to a recommender system to provide more relevant and personalize recommendations.Type: ApplicationFiled: June 14, 2013Publication date: December 18, 2014Inventors: Elad Ziklik, Royi Ronen