Patents by Inventor Shai Rubin
Shai Rubin has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20220043740Abstract: An embodiment features a method of generating test data. An application-level schema corresponding to a source relational database is received. The schema defines constraints comprising one or more of inter-field, inter-record, and inter-object constraints between related data in the source relational database. A random walk is performed on a graph of nodes representing data in the source relational database. At respective ones of the nodes, corresponding ones of the data in the source relational database are selected along a path ordered in accordance with the constraints defined in the schema. Synthetic test data is generated based on one or more statistical models of the data selected from the source relational database. Data values are generated for respective fields of an object defined in the schema, and data values are generated for records related to the object based on one or more of the constraints defined in the schema.Type: ApplicationFiled: October 24, 2021Publication date: February 10, 2022Inventor: Shai Rubin
-
Patent number: 11188451Abstract: An embodiment features a method of generating test data. An application-level schema corresponding to a source relational database is received. The schema defines constraints comprising one or more of inter-field, inter-record, and inter-object constraints between related data in the source relational database. A random walk is performed on a graph of nodes representing data in the source relational database. At respective ones of the nodes, corresponding ones of the data in the source relational database are selected along a path ordered in accordance with the constraints defined in the schema. Synthetic test data is generated based on one or more statistical models of the data selected from the source relational database. Data values are generated for respective fields of an object defined in the schema, and data values are generated for records related to the object based on one or more of the constraints defined in the schema.Type: GrantFiled: March 8, 2020Date of Patent: November 30, 2021Assignee: OWNBACKUP LTD.Inventor: Shai Rubin
-
Publication number: 20210334612Abstract: In an example, a method includes selecting a unique identifier corresponding to a set of rules. At least one modified image is generated from a seed image using a processor by determining and applying an image attribute modification to the seed image according to at least one rule in the set of rules of the unique identifier. The modified image is placed in a predefined position according to at least one rule in the set of rules of the unique identifier.Type: ApplicationFiled: June 5, 2018Publication date: October 28, 2021Inventors: Amir Gaash, Ori Levron, Guy Franco, Guy Bibi, Chen Peretz, Shai Rubin
-
Publication number: 20210279165Abstract: An embodiment features a method of generating test data. An application-level schema corresponding to a source relational database is received. The schema defines constraints comprising one or more of inter-field, inter-record, and inter-object constraints between related data in the source relational database. A random walk is performed on a graph of nodes representing data in the source relational database. At respective ones of the nodes, corresponding ones of the data in the source relational database are selected along a path ordered in accordance with the constraints defined in the schema. Synthetic test data is generated based on one or more statistical models of the data selected from the source relational database. Data values are generated for respective fields of an object defined in the schema, and data values are generated for records related to the object based on one or more of the constraints defined in the schema.Type: ApplicationFiled: March 8, 2020Publication date: September 9, 2021Applicant: OwnBackup LTDInventor: Shai Rubin
-
Patent number: 10942891Abstract: Information management systems and methods archive and back up data from one or more primary storage devices to one or more secondary storage devices are described. More specifically, systems, methods, and computer program instructions are provided for efficiently transferring relational database data from one or more primary storage devices to one or more secondary storage devices for archival and backup purposes.Type: GrantFiled: March 27, 2019Date of Patent: March 9, 2021Assignee: OWNBACKUP LTD.Inventor: Shai Rubin
-
Publication number: 20200311023Abstract: Information management systems and methods archive and back up data from one or more primary storage devices to one or more secondary storage devices are described. More specifically, systems, methods, and computer program instructions are provided for efficiently transferring relational database data from one or more primary storage devices to one or more secondary storage devices for archival and backup purposes.Type: ApplicationFiled: March 27, 2019Publication date: October 1, 2020Applicant: OwnBackup LTDInventor: Shai Rubin
-
Patent number: 9536087Abstract: Systems, methods, and computer program products are described for controlling malicious activity detection with respect to information technology assets based on behavioral models associated with the respective information technology assets. Protection rules and corresponding sensitivities associated with the behavioral models are applied by protection services to detect malicious activity with respect to the information technology assets.Type: GrantFiled: August 1, 2015Date of Patent: January 3, 2017Assignee: Microsoft Technology Licensing, LLCInventors: Shai A. Rubin, Yosef Dinerstein, Efim Hudis, Yair Helman, Uri Barash, Arie Friedman
-
Publication number: 20150350230Abstract: Systems, methods, and computer program products are described for controlling malicious activity detection with respect to information technology assets based on behavioral models associated with the respective information technology assets. Protection rules and corresponding sensitivities associated with the behavioral models are applied by protection services to detect malicious activity with respect to the information technology assets.Type: ApplicationFiled: August 1, 2015Publication date: December 3, 2015Inventors: Shai A. Rubin, Yosef Dinerstein, Efim Hudis, Yair Helman, Uri Barash, Arie Friedman
-
Patent number: 9098702Abstract: Systems, methods, and computer program products are described for controlling malicious activity detection with respect to information technology assets based on behavioral models associated with the respective information technology assets. Protection rules and corresponding sensitivities associated with the behavioral models are applied by protection services to detect malicious activity with respect to the information technology assets.Type: GrantFiled: July 15, 2013Date of Patent: August 4, 2015Assignee: Microsoft Technology Licensing, LLCInventors: Shai A. Rubin, Yosef Dinerstein, Efim Hudis, Yair Helman, Uri Barash, Arie Friedman
-
Publication number: 20130305374Abstract: Systems, methods, and computer program products are described for controlling malicious activity detection with respect to information technology assets based on behavioral models associated with the respective information technology assets. Protection rules and corresponding sensitivities associated with the behavioral models are applied by protection services to detect malicious activity with respect to the information technology assets.Type: ApplicationFiled: July 15, 2013Publication date: November 14, 2013Inventors: Shai A. Rubin, Yosef Dinerstein, Efim Hudis, Yair Helman, Uri Barash, Arie Friedman
-
Patent number: 8490187Abstract: Systems, methods, and computer program products are described for controlling malicious activity detection with respect to information technology assets based on behavioral models associated with the respective information technology assets. Protection rules and corresponding sensitivities associated with the behavioral models are applied by protection services to detect malicious activity with respect to the information technology assets.Type: GrantFiled: March 20, 2009Date of Patent: July 16, 2013Assignee: Microsoft CorporationInventors: Shai A. Rubin, Yosef Dinerstein, Efim Hudis, Yair Helman, Uri Barash, Arie Friedman
-
Patent number: 7941856Abstract: Systems, methods and devices according to this invention include a plurality of defined modification rules for modifying a sequence of packets that form an attack on an intrusion detection system. These modification rules include both rules that expand the number of packets and rules that reduce the number of packets. The reducing rules can be applied to a given attack instance to identify one or more root attack instances. The expanding rules can then be applied to each root attack instance to generate a corpus of modified attack instances. The modification rules can preserve the semantics of the attack, so that any modified attack instance generated from the given attack instance remains a true attack. To test an intrusion detection system, the corpus of modified attack instances can be used to determine whether an intrusion detection system detects every modified attack instance.Type: GrantFiled: December 5, 2005Date of Patent: May 10, 2011Assignee: Wisconsin Alumni Research FoundationInventors: Shai A. Rubin, Somesh Jha, Barton P. Miller
-
Publication number: 20100241974Abstract: Systems, methods, and computer program products are described for controlling malicious activity detection with respect to information technology assets based on behavioral models associated with the respective information technology assets. Protection rules and corresponding sensitivities associated with the behavioral models are applied by protection services to detect malicious activity with respect to the information technology assets.Type: ApplicationFiled: March 20, 2009Publication date: September 23, 2010Applicant: MICROSOFT CORPORATIONInventors: Shai A. Rubin, Yosef Dinerstein, Efim Hudis, Yair Helman, Uri Barash, Arie Friedman
-
Publication number: 20060253906Abstract: Systems, methods and devices according to this invention include a plurality of defined modification rules for modifying a sequence of packets that form an attack on an intrusion detection system. These modification rules include both rules that expand the number of packets and rules that reduce the number of packets. The reducing rules can be applied to a given attack instance to identify one or more root attack instances. The expanding rules can then be applied to each root attack instance to generate a corpus of modified attack instances. The modification rules can preserve the semantics of the attack, so that any modified attack instance generated from the given attack instance remains a true attack. To test an intrusion detection system, the corpus of modified attack instances can be used to determine whether an intrusion detection system detects every modified attack instance.Type: ApplicationFiled: December 5, 2005Publication date: November 9, 2006Inventors: Shai Rubin, Somesh Jha, Barton Miller
-
Patent number: 7085964Abstract: A method for functional verification of a design for a parallel processing device includes receiving a sequence of single instructions from a dynamic test program generator, and assembling a plurality of the instructions from the sequence into an instruction word, in accordance with predetermined rules applicable to the parallel processing device. The instruction word is input to a simulator of the parallel processing device so as to determine a response of the device to the instruction word.Type: GrantFiled: February 20, 2001Date of Patent: August 1, 2006Assignee: International Business Machines CorporationInventors: Laurent Fournier, Shai Rubin
-
Patent number: 6567815Abstract: A technique for improving the performance of binary tree operations involves defining an implicit binary tree structure in a memory array, and clustering of the nodes of the tree in memory in a cache-aware manner. The technique reduces memory latency by improved spatial locality of the binary tree data, and further improves cache performance through reduced size of the data objects resulting from elimination of pointers to other nodes of the tree.Type: GrantFiled: August 1, 2000Date of Patent: May 20, 2003Assignee: International Business Machines CorporationInventors: Shai Rubin, Ayal Zaks
-
Publication number: 20020116694Abstract: A method for functional verification of a design for a parallel processing device includes receiving a sequence of single instructions from a dynamic test program generator, and assembling a plurality of the instructions from the sequence into an instruction word, in accordance with predetermined rules applicable to the parallel processing device. The instruction word is input to a simulator of the parallel processing device so as to determine a response of the device to the instruction word.Type: ApplicationFiled: February 20, 2001Publication date: August 22, 2002Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Laurent Fournier, Shai Rubin
-
Patent number: 5942388Abstract: An elcctrobiochemical system for the determination of the presence and optionally concentration of an analyte in a liquid medium, the system comprising an electrode having immobilized thereon a member of a recognition pair, the other member of said pair being said analyte, the presence of said analyte in the medium resulting in formation of a pair complex, being a complex between said immobilized member and said analyte; the system further comprising redox molecules capable of changing their redox state by accepting electrons from or donating electrons to the electrode; the formation of the pair complex on the electrode bringing a change in the electrical response of the system, whereby the presence and optionally the concentration of said analyte in the medium can be determined.Type: GrantFiled: February 21, 1995Date of Patent: August 24, 1999Assignee: Yissum Research Development Company of the Hebrew University of JersaleumInventors: Itamar Willner, Arie Dagan, Shai Rubin, Ron Blonder, Azalia Riklin, Yael Cohen