Patents by Inventor Shai Rubin
Shai Rubin has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20250086139Abstract: In one embodiment, a system includes a processor configured to search a datastore to find records including a given field with a given value, the found records defining a dataset for consideration for archive having an aggregate data size, render to a display an indication of the aggregate data size of the dataset for consideration for archive, receive a user selection to archive at least part of the dataset, and purge the at least part of the dataset from the datastore and archive the at least part of the dataset into archive storage responsively to receiving the user selection, and a memory configured to store data used by the processor.Type: ApplicationFiled: September 7, 2023Publication date: March 13, 2025Inventors: Shai Rubin, Yoav Alroy, Liron Sarel, Eliyahu Shua, Shahar Meir
-
Publication number: 20240061824Abstract: A method, including accessing a source database including records stored in tables organized in a hierarchy defining respective parent and dependent tables of the tables in the source database and containing respective parent and dependent records of the records, each record including one or more attributes having respective values. A selection is received for at least a first table and one or more second tables that are related to the first table by being parent tables or dependent tables of the first table. A filtering request is received that includes, for a given attribute having one or more distinct values, a limiting number of records to select having each of the distinct values. The request is applied to select a subset of the records in the one of the tables. A target database is generated including the subset and the records that are related to the records in the subset.Type: ApplicationFiled: October 30, 2023Publication date: February 22, 2024Inventors: Bar Jakubovitz, Shai Rubin, Yehonatan Mazar, David Anaton, Shahar Yalov, Roy Emek
-
Patent number: 11841836Abstract: A method, including accessing a source database including records stored in tables, which are organized in a hierarchy defining respective parents and dependents of the tables, containing respective parent and dependent records, the records including attribute values. Upon presenting a first list of the tables, an input is received selecting a first table. Upon presenting a second list of the tables related to the first table, an input is received selecting a second table in the second list. Upon presenting filtering criteria for the selected tables, a filtering request is received for a given selected table. The request is applied to the given selected table to select a subset of the records in the given selected table and to generate a target database including the subset of the records and the records in the set that are the respective directly related records of the records in the subset.Type: GrantFiled: December 30, 2021Date of Patent: December 12, 2023Assignee: OWNBACKUP LTD.Inventors: Bar Jakubovitz, Shai Rubin, Yehonatan Mazar, David Anaton, Shahar Yalov, Roy Emek
-
Patent number: 11755462Abstract: An embodiment features a method of generating test data. An application-level schema corresponding to a source relational database is received. The schema defines constraints comprising one or more of inter-field, inter-record, and inter-object constraints between related data in the source relational database. A random walk is performed on a graph of nodes representing data in the source relational database. At respective ones of the nodes, corresponding ones of the data in the source relational database are selected along a path ordered in accordance with the constraints defined in the schema. Synthetic test data is generated based on one or more statistical models of the data selected from the source relational database. Data values are generated for respective fields of an object defined in the schema, and data values are generated for records related to the object based on one or more of the constraints defined in the schema.Type: GrantFiled: October 24, 2021Date of Patent: September 12, 2023Assignee: OWNBACKUP LTD.Inventor: Shai Rubin
-
Publication number: 20220215004Abstract: A method, including accessing a source database including records stored in tables, which are organized in a hierarchy defining respective parents and dependents of the tables, containing respective parent and dependent records, the records including attribute values. Upon presenting a first list of the tables, an input is received selecting a first table. Upon presenting a second list of the tables related to the first table, an input is received selecting a second table in the second list. Upon presenting filtering criteria for the selected tables, a filtering request is received for a given selected table. The request is applied to the given selected table to select a subset of the records in the given selected table and to generate a target database including the subset of the records and the records in the set that are the respective directly related records of the records in the subset.Type: ApplicationFiled: December 30, 2021Publication date: July 7, 2022Inventors: Bar Jakubovitz, Shai Rubin, Yehonatan Mazar, David Anaton, Shahar Yalov, Roy Emek
-
Publication number: 20220043740Abstract: An embodiment features a method of generating test data. An application-level schema corresponding to a source relational database is received. The schema defines constraints comprising one or more of inter-field, inter-record, and inter-object constraints between related data in the source relational database. A random walk is performed on a graph of nodes representing data in the source relational database. At respective ones of the nodes, corresponding ones of the data in the source relational database are selected along a path ordered in accordance with the constraints defined in the schema. Synthetic test data is generated based on one or more statistical models of the data selected from the source relational database. Data values are generated for respective fields of an object defined in the schema, and data values are generated for records related to the object based on one or more of the constraints defined in the schema.Type: ApplicationFiled: October 24, 2021Publication date: February 10, 2022Inventor: Shai Rubin
-
Patent number: 11188451Abstract: An embodiment features a method of generating test data. An application-level schema corresponding to a source relational database is received. The schema defines constraints comprising one or more of inter-field, inter-record, and inter-object constraints between related data in the source relational database. A random walk is performed on a graph of nodes representing data in the source relational database. At respective ones of the nodes, corresponding ones of the data in the source relational database are selected along a path ordered in accordance with the constraints defined in the schema. Synthetic test data is generated based on one or more statistical models of the data selected from the source relational database. Data values are generated for respective fields of an object defined in the schema, and data values are generated for records related to the object based on one or more of the constraints defined in the schema.Type: GrantFiled: March 8, 2020Date of Patent: November 30, 2021Assignee: OWNBACKUP LTD.Inventor: Shai Rubin
-
Publication number: 20210334612Abstract: In an example, a method includes selecting a unique identifier corresponding to a set of rules. At least one modified image is generated from a seed image using a processor by determining and applying an image attribute modification to the seed image according to at least one rule in the set of rules of the unique identifier. The modified image is placed in a predefined position according to at least one rule in the set of rules of the unique identifier.Type: ApplicationFiled: June 5, 2018Publication date: October 28, 2021Inventors: Amir Gaash, Ori Levron, Guy Franco, Guy Bibi, Chen Peretz, Shai Rubin
-
Publication number: 20210279165Abstract: An embodiment features a method of generating test data. An application-level schema corresponding to a source relational database is received. The schema defines constraints comprising one or more of inter-field, inter-record, and inter-object constraints between related data in the source relational database. A random walk is performed on a graph of nodes representing data in the source relational database. At respective ones of the nodes, corresponding ones of the data in the source relational database are selected along a path ordered in accordance with the constraints defined in the schema. Synthetic test data is generated based on one or more statistical models of the data selected from the source relational database. Data values are generated for respective fields of an object defined in the schema, and data values are generated for records related to the object based on one or more of the constraints defined in the schema.Type: ApplicationFiled: March 8, 2020Publication date: September 9, 2021Applicant: OwnBackup LTDInventor: Shai Rubin
-
Patent number: 10942891Abstract: Information management systems and methods archive and back up data from one or more primary storage devices to one or more secondary storage devices are described. More specifically, systems, methods, and computer program instructions are provided for efficiently transferring relational database data from one or more primary storage devices to one or more secondary storage devices for archival and backup purposes.Type: GrantFiled: March 27, 2019Date of Patent: March 9, 2021Assignee: OWNBACKUP LTD.Inventor: Shai Rubin
-
Publication number: 20200311023Abstract: Information management systems and methods archive and back up data from one or more primary storage devices to one or more secondary storage devices are described. More specifically, systems, methods, and computer program instructions are provided for efficiently transferring relational database data from one or more primary storage devices to one or more secondary storage devices for archival and backup purposes.Type: ApplicationFiled: March 27, 2019Publication date: October 1, 2020Applicant: OwnBackup LTDInventor: Shai Rubin
-
Patent number: 9536087Abstract: Systems, methods, and computer program products are described for controlling malicious activity detection with respect to information technology assets based on behavioral models associated with the respective information technology assets. Protection rules and corresponding sensitivities associated with the behavioral models are applied by protection services to detect malicious activity with respect to the information technology assets.Type: GrantFiled: August 1, 2015Date of Patent: January 3, 2017Assignee: Microsoft Technology Licensing, LLCInventors: Shai A. Rubin, Yosef Dinerstein, Efim Hudis, Yair Helman, Uri Barash, Arie Friedman
-
Publication number: 20150350230Abstract: Systems, methods, and computer program products are described for controlling malicious activity detection with respect to information technology assets based on behavioral models associated with the respective information technology assets. Protection rules and corresponding sensitivities associated with the behavioral models are applied by protection services to detect malicious activity with respect to the information technology assets.Type: ApplicationFiled: August 1, 2015Publication date: December 3, 2015Inventors: Shai A. Rubin, Yosef Dinerstein, Efim Hudis, Yair Helman, Uri Barash, Arie Friedman
-
Patent number: 9098702Abstract: Systems, methods, and computer program products are described for controlling malicious activity detection with respect to information technology assets based on behavioral models associated with the respective information technology assets. Protection rules and corresponding sensitivities associated with the behavioral models are applied by protection services to detect malicious activity with respect to the information technology assets.Type: GrantFiled: July 15, 2013Date of Patent: August 4, 2015Assignee: Microsoft Technology Licensing, LLCInventors: Shai A. Rubin, Yosef Dinerstein, Efim Hudis, Yair Helman, Uri Barash, Arie Friedman
-
Publication number: 20130305374Abstract: Systems, methods, and computer program products are described for controlling malicious activity detection with respect to information technology assets based on behavioral models associated with the respective information technology assets. Protection rules and corresponding sensitivities associated with the behavioral models are applied by protection services to detect malicious activity with respect to the information technology assets.Type: ApplicationFiled: July 15, 2013Publication date: November 14, 2013Inventors: Shai A. Rubin, Yosef Dinerstein, Efim Hudis, Yair Helman, Uri Barash, Arie Friedman
-
Patent number: 8490187Abstract: Systems, methods, and computer program products are described for controlling malicious activity detection with respect to information technology assets based on behavioral models associated with the respective information technology assets. Protection rules and corresponding sensitivities associated with the behavioral models are applied by protection services to detect malicious activity with respect to the information technology assets.Type: GrantFiled: March 20, 2009Date of Patent: July 16, 2013Assignee: Microsoft CorporationInventors: Shai A. Rubin, Yosef Dinerstein, Efim Hudis, Yair Helman, Uri Barash, Arie Friedman
-
Patent number: 7941856Abstract: Systems, methods and devices according to this invention include a plurality of defined modification rules for modifying a sequence of packets that form an attack on an intrusion detection system. These modification rules include both rules that expand the number of packets and rules that reduce the number of packets. The reducing rules can be applied to a given attack instance to identify one or more root attack instances. The expanding rules can then be applied to each root attack instance to generate a corpus of modified attack instances. The modification rules can preserve the semantics of the attack, so that any modified attack instance generated from the given attack instance remains a true attack. To test an intrusion detection system, the corpus of modified attack instances can be used to determine whether an intrusion detection system detects every modified attack instance.Type: GrantFiled: December 5, 2005Date of Patent: May 10, 2011Assignee: Wisconsin Alumni Research FoundationInventors: Shai A. Rubin, Somesh Jha, Barton P. Miller
-
Publication number: 20100241974Abstract: Systems, methods, and computer program products are described for controlling malicious activity detection with respect to information technology assets based on behavioral models associated with the respective information technology assets. Protection rules and corresponding sensitivities associated with the behavioral models are applied by protection services to detect malicious activity with respect to the information technology assets.Type: ApplicationFiled: March 20, 2009Publication date: September 23, 2010Applicant: MICROSOFT CORPORATIONInventors: Shai A. Rubin, Yosef Dinerstein, Efim Hudis, Yair Helman, Uri Barash, Arie Friedman
-
Publication number: 20060253906Abstract: Systems, methods and devices according to this invention include a plurality of defined modification rules for modifying a sequence of packets that form an attack on an intrusion detection system. These modification rules include both rules that expand the number of packets and rules that reduce the number of packets. The reducing rules can be applied to a given attack instance to identify one or more root attack instances. The expanding rules can then be applied to each root attack instance to generate a corpus of modified attack instances. The modification rules can preserve the semantics of the attack, so that any modified attack instance generated from the given attack instance remains a true attack. To test an intrusion detection system, the corpus of modified attack instances can be used to determine whether an intrusion detection system detects every modified attack instance.Type: ApplicationFiled: December 5, 2005Publication date: November 9, 2006Inventors: Shai Rubin, Somesh Jha, Barton Miller
-
Patent number: 7085964Abstract: A method for functional verification of a design for a parallel processing device includes receiving a sequence of single instructions from a dynamic test program generator, and assembling a plurality of the instructions from the sequence into an instruction word, in accordance with predetermined rules applicable to the parallel processing device. The instruction word is input to a simulator of the parallel processing device so as to determine a response of the device to the instruction word.Type: GrantFiled: February 20, 2001Date of Patent: August 1, 2006Assignee: International Business Machines CorporationInventors: Laurent Fournier, Shai Rubin