Patents by Inventor SAGI ELIYAHU

SAGI ELIYAHU has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240054013
    Abstract: Systems and methods for entity item matching include, responsive to identifying a workflow, monitoring one or more first entity items of a first entity item type for updates to one or more first field-value pairs; determining, subsequent to processing a first monitored item of a plurality of monitored items, an update to a first field-value pair of a first entity item of the first entity item type; responsive to determining that the update matches a corresponding field-value pair of the first monitored item, matching the first entity item with the first monitored item by performing a lookup in the first monitored item for a field-value pair matching the update to the first field-value pair; and performing a first action specified in the workflow on the first monitored item using data corresponding to the update in the first field-value pair of the first entity item matched with the first monitored item.
    Type: Application
    Filed: October 23, 2023
    Publication date: February 15, 2024
    Applicant: TONKEAN, INC.
    Inventors: Sagi Eliyahu, Offir Talmor
  • Patent number: 11797339
    Abstract: Systems and methods for maintaining data objects include receiving an event in a queue indicating a change to a data source; obtaining data corresponding to the event from the data source; determining that a monitored item condition defined in a workflow is satisfied based on the data corresponding to the event; generating a data object responsive to the monitored item condition being satisfied; identifying, using a mapping between fields and triggers generated based on the workflow, a trigger defined in the workflow that uses a first field of one or more fields; determining that the value of the first field satisfies a trigger condition of the trigger; and performing, responsive to determining that the value satisfies the trigger condition, an action corresponding to the trigger defined in the workflow.
    Type: Grant
    Filed: March 31, 2023
    Date of Patent: October 24, 2023
    Assignee: TONKEAN, INC.
    Inventors: Sagi Eliyahu, Offir Talmor
  • Publication number: 20230236880
    Abstract: Systems and methods for maintaining data objects include receiving an event in a queue indicating a change to a data source; obtaining data corresponding to the event from the data source; determining that a monitored item condition defined in a workflow is satisfied based on the data corresponding to the event; generating a data object responsive to the monitored item condition being satisfied; identifying, using a mapping between fields and triggers generated based on the workflow, a trigger defined in the workflow that uses a first field of one or more fields; determining that the value of the first field satisfies a trigger condition of the trigger; and performing, responsive to determining that the value satisfies the trigger condition, an action corresponding to the trigger defined in the workflow.
    Type: Application
    Filed: March 31, 2023
    Publication date: July 27, 2023
    Applicant: TONKEAN, INC.
    Inventors: Sagi Eliyahu, Offir Talmor
  • Patent number: 11616780
    Abstract: Disclosed embodiments relate to systems and methods for security protection against threats to network identity providers. Techniques include identifying a first request from a client for access to a secure network resource; redirecting the client to an identity provider. The identity provider may be configured to authenticate the client and provide the client with data signed using a first identity provider key. Further techniques include identifying a second request from the client, the second request including a doubly-signed version of the data, verifying the doubly-signed version of the data using a second identity provider key corresponding to the first identity provider key and a second client key corresponding to the first client key; and allowing, conditional on a result of the verifying, the client to access the secure network resource.
    Type: Grant
    Filed: February 25, 2021
    Date of Patent: March 28, 2023
    Assignee: CYBERARK SOFTWARE LTD.
    Inventors: Tal Zigman, Arthur Bendersky, Sagi Eliyahu
  • Publication number: 20210385218
    Abstract: Disclosed embodiments relate to systems and methods for security protection against threats to network identity providers. Techniques include identifying a first request from a client for access to a secure network resource; redirecting the client to an identity provider. The identity provider may be configured to authenticate the client and provide the client with data signed using a first identity provider key. Further techniques include identifying a second request from the client, the second request including a doubly-signed version of the data, verifying the doubly-signed version of the data using a second identity provider key corresponding to the first identity provider key and a second client key corresponding to the first client key; and allowing, conditional on a result of the verifying, the client to access the secure network resource.
    Type: Application
    Filed: February 25, 2021
    Publication date: December 9, 2021
    Applicant: CyberArk Software Ltd.
    Inventors: Tal Zigman, Arthur Bendersky, Sagi Eliyahu
  • Patent number: 10965674
    Abstract: Disclosed embodiments relate to systems and methods for security protection against threats to network identity providers. Techniques include identifying a first request from a client for access to a secure network resource; redirecting the client to an identity provider. The identity provider may be configured to authenticate the client and provide the client with data signed using a first identity provider key. Further techniques include identifying a second request from the client, the second request including a doubly-signed version of the data, verifying the doubly-signed version of the data using a second identity provider key corresponding to the first identity provider key and a second client key corresponding to the first client key; and allowing, conditional on a result of the verifying, the client to access the secure network resource.
    Type: Grant
    Filed: June 8, 2020
    Date of Patent: March 30, 2021
    Assignee: CyberArk Software Ltd.
    Inventors: Tal Zigman, Arthur Bendersky, Sagi Eliyahu
  • Patent number: 10848491
    Abstract: Disclosed embodiments include securing privileged access communication with target systems. Techniques include identifying a request for access to a target resource by an identity, the request being associated with a requested activity that requires privileged access, identifying a connection session in which the identity communicates with the target resource, automatically analyzing an actual activity of the identity occurring in the connection session, automatically comparing the actual activity to the requested activity to determine whether the actual activity complies with the requested activity, and automatically detecting, based on the determination, an inconsistency between the actual activity of the identity and the requested activity associated with the request for access.
    Type: Grant
    Filed: January 18, 2018
    Date of Patent: November 24, 2020
    Assignee: Cyberark Software Ltd.
    Inventors: Sagi Eliyahu, Millie Richter
  • Publication number: 20190222577
    Abstract: Disclosed embodiments include securing privileged access communication with target systems. Techniques include identifying a request for access to a target resource by an identity, the request being associated with a requested activity that requires privileged access, identifying a connection session in which the identity communicates with the target resource, automatically analyzing an actual activity of the identity occurring in the connection session, automatically comparing the actual activity to the requested activity to determine whether the actual activity complies with the requested activity, and automatically detecting, based on the determination, an inconsistency between the actual activity of the identity and the requested activity associated with the request for access.
    Type: Application
    Filed: January 18, 2018
    Publication date: July 18, 2019
    Applicant: CyberArk Software Ltd.
    Inventors: Sagi Eliyahu, Millie Richter
  • Patent number: 9424364
    Abstract: A method and a device are disclosed including an integrated connection between a Social Business Network (SBN) and a webpage configured to provide context-based relevant information about content and/or metadata associated with the webpage. A SBN provides business-oriented information in a social networking environment. In some embodiments, SBN connection automatically provides information about the webpage's owner, or is used used or to start a conversation with another user. In still other embodiments, the SBN connection may retrieve information from external sources such as Facebook®, web, and databases associated with the SBN, including prior relevant conversations, project information, participant information, articles, historical data, and the like. In various embodiments, the SBN connection is in the form of a browser plugin component, which may be enhanced by custom software cartridges developed by customers of SBN to dynamically alter the behavior or add functionality to the SBN plugin component.
    Type: Grant
    Filed: February 14, 2012
    Date of Patent: August 23, 2016
    Inventors: Oudi Antebi, Amir Leshem, Roy Antebi, Ran Hanoch Meiteles, Sagi Eliyahu
  • Publication number: 20140136525
    Abstract: A method and a device are disclosed including a Username Software Component (USC) configured to provide a connection between a communication software application, social networking sites, and a database to allow search, retrieval, and verification of various usernames associated with a single user and uniquely identifying the single user. The database stores the various usernames for future use. When a local user receives a message from a remote user, various usernames potentially associated with the remote user are retrieved by USC. The local user validates some of the usernames to indicate that they represent the same remote user. Usernames may also be validated by weighted functions applied to user votes. Such validated usernames may be stored in the database for future use by all users to uniquely identify the same remote user. The USC may be implemented as a plug-in component or as a built-in software application functionality.
    Type: Application
    Filed: November 9, 2012
    Publication date: May 15, 2014
    Inventors: Oudi Antebi, Sagi Eliyahu, Shalom Shaltiel, Roy Antebi
  • Publication number: 20130212496
    Abstract: A method and a device are disclosed including an integrated connection between a Social Business Network (SBN) and a webpage configured to provide context-based relevant information about content and/or metadata associated with the webpage. A SBN provides business-oriented information in a social networking environment. In some embodiments, SBN connection automatically provides information about the webpage's owner, or is used used or to start a conversation with another user. In still other embodiments, the SBN connection may retrieve information from external sources such as Facebook®, web, and databases associated with the SBN, including prior relevant conversations, project information, participant information, articles, historical data, and the like. In various embodiments, the SBN connection is in the form of a browser plugin component, which may be enhanced by custom software cartridges developed by customers of SBN to dynamically alter the behavior or add functionality to the SBN plugin component.
    Type: Application
    Filed: February 14, 2012
    Publication date: August 15, 2013
    Inventors: OUDI ANTEBI, AMIR LESHEM, ROY ANTEBI, RAN HANOCH MEITELES, SAGI ELIYAHU