Patents by Inventor Tomer LEVY
Tomer LEVY has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11954233Abstract: Embodiments are directed to techniques for chaining, triggering, and/or enforcing entitlements in a constrained environment. A constrained environment may be provided within with shielded assets are required to exist or execute. An entitlement may be granted on a variety of shielded assets, including datasets, computations scripts, data privacy pipelines, and intermediate datasets generated by an intermediate step of a data privacy pipeline. Thus, a beneficiary may use a granted entitlement as an input into other data privacy pipelines, without the need for the grantor to approve each specific downstream operation. The constrained environment may enforce an entitlement by fulfilling applicable constraints upon accessing the entitlement, restricting the output of the entitlement to the constrained environment, and fulfilling applicable policies when executing downstream operations.Type: GrantFiled: May 12, 2022Date of Patent: April 9, 2024Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Yisroel Gershon Taber, Tomer Turgeman, Ittay Levy Ophir, Lev Rozenbaum, Nerya Cohen
-
Patent number: 11928144Abstract: A computer implemented method of creating a clustering model used for clustering a plurality of log messages comprising using one or more processors for receiving a plurality of training log messages, performing the following for each of the plurality of training log messages: calculating a string distance between a textual content of the respective training log message and a representative string pattern of each of the plurality of clusters, associating the respective training log message with a respective one of the plurality of clusters in case the string distance is within a predefined threshold and adding a new cluster to the plurality of clusters for associating respective training log message in case the string distance exceeds the predefined threshold, and outputting the clustering model.Type: GrantFiled: December 8, 2021Date of Patent: March 12, 2024Assignee: LogsHero Ltd.Inventors: Tomer Levy, Asaf Yigal, Ziv Segal, Amir Kalron, Eran Nir, Asaf Mesika, Doron Gill
-
Patent number: 11558158Abstract: A wireless communication device for communicating across a wireless communication channel includes one or more processors configured to determine whether a further device is generating a radio frequency interference at an operating frequency; transmit a request message to the further device requesting the further device vacate the operating frequency based on the determination that the further device is generating radio frequency interference; receive a response message from the further device; and generate an instruction based on the response message.Type: GrantFiled: November 10, 2020Date of Patent: January 17, 2023Assignee: Intel CorporationInventors: Michael Shusterman, John Fallin, Ana M. Yepes, Dong-Ho Han, Nasser A. Kurd, Tomer Levy, Ehud Reshef, Arik Gihon, Ido Ouzieli, Yevgeni Sabin, Maor Tal, Zhongsheng Wang, Amit Zeevi
-
Publication number: 20220262428Abstract: Methods and apparatus for row hammer (RH) mitigation and recovery. A host comprising a memory controller is configured to interface with one or more DRAM devices, such as DRAM DIMMs. The memory controller includes host-side RH mitigation logic and the DRAM devices include DRAM-side RH mitigation logic that cooperates with the host-side RH mitigation logic to perform RH mitigation and/or recovery operations in response to detection of RH attacks. The memory controller and DRAM device are configured to support an RH polling mode under which the memory controller periodically polls for RH attack detection indicia on the DRAM device that is toggled when the DRAM device detects an RH attack. The memory controller and DRAM device may also be configured to support an RH ALERT_n mode under which the use of an ALERT_n signal and pin is used to provide an alert to the memory controller to initiate RH mitigation and/or recovery.Type: ApplicationFiled: May 6, 2022Publication date: August 18, 2022Inventors: Kuljit S. BAINS, Jongwon LEE, Tomer LEVY, Bill NALE, Amir Ali RADJAI
-
Patent number: 11334602Abstract: A system and methods for classification of events, the system including a memory, a network interface, and a processor configured to monitor system events via the network interface and store the system events as an event log in the memory, collect information about events from various web resources, extract, from the event log and the collected event information, labeling data including data about urgency of events and generate, based on the extracted labeling data, labeling data structures ascribing labels to respective events, extract, from the event log and the collected event information, event features data and generate, based on the extracted event features data, event features data structures ascribing features to respective events, and formulate decision rule structures for identification of urgent events based on the labeling data structures and the event features data structures.Type: GrantFiled: August 9, 2018Date of Patent: May 17, 2022Assignee: LogsHero Ltd.Inventors: Ianir Ideses, Tomer Levy, Asaf Yigal, Ziv Segal
-
Publication number: 20220150006Abstract: A wireless communication device for communicating across a wireless communication channel includes one or more processors configured to determine whether a further device is generating a radio frequency interference at an operating frequency; transmit a request message to the further device requesting the further device vacate the operating frequency based on the determination that the further device is generating radio frequency interference; receive a response message from the further device; and generate an instruction based on the response message.Type: ApplicationFiled: November 10, 2020Publication date: May 12, 2022Inventors: Michael SHUSTERMAN, John FALLIN, Ana M. YEPES, Dong-Ho HAN, Nasser A. KURD, Tomer LEVY, Ehud RESHEF, Arik GIHON, Ido OUZIELI, Yevgeni SABIN, Maor TAL, Zhongsheng WANG, Amit ZEEVI
-
Publication number: 20220138286Abstract: Systems, apparatuses and methods may provide for encryption based technology. Data may be encrypted locally with a graphics processor with encryption engines. The graphics processor components may be verified with a root-of-trust and based on collection of claims. The graphics processor may further be able to modify encrypted data from a non-pageable format to a pageable format. The graphics processor may further process data associated with a virtual machine based on a key that is known by the virtual machine and the graphics processor.Type: ApplicationFiled: December 23, 2020Publication date: May 5, 2022Applicant: Intel CorporationInventors: David Zage, Scott Janus, Ned M. Smith, Vidhya Krishnan, Siddhartha Chhabra, Rajesh Poornachandran, Tomer Levy, Julien Carreno, Ankur Shah, Ronald Silvas, Aravindh Anantaraman, David Puffer, Vedvyas Shanbhogue, David Cowperthwaite, Aditya Navale, Omer Ben-Shalom, Alex Nayshtut, Xiaoyu Ruan
-
Publication number: 20220121263Abstract: In a memory subsystem, a memory controller can put its physical interface (PHY) into a low power state when an associated memory device is in self-refresh. Instead of powering on the interface and then triggering the memory device to exit self-refresh, or instead waiting for the physical interface to be powered up prior to waking the memory device from self-refresh, the memory controller can instruct the PHY to send a self-refresh exit command to the memory device and power up the physical interface in parallel with the memory device coming out of self-refresh. The memory controller can power down a high speed clock path of the PHY and use a slower clock path to send the self-refresh exit command before powering the high speed clock path back up.Type: ApplicationFiled: December 23, 2021Publication date: April 21, 2022Inventors: Christopher P. MOZAK, Robert J. ROYER, Jr., Aaron MARTIN, Alex P. THOMAS, Tomer LEVY, Noam LUPOVICH
-
Publication number: 20220092102Abstract: A computer implemented method of creating a clustering model used for clustering a plurality of log messages comprising using one or more processors for receiving a plurality of training log messages, performing the following for each of the plurality of training log messages: calculating a string distance between a textual content of the respective training log message and a representative string pattern of each of the plurality of clusters, associating the respective training log message with a respective one of the plurality of clusters in case the string distance is within a predefined threshold and adding a new cluster to the plurality of clusters for associating respective training log message in case the string distance exceeds the predefined threshold, and outputting the clustering model.Type: ApplicationFiled: December 8, 2021Publication date: March 24, 2022Applicant: LogsHero Ltd.Inventors: Tomer LEVY, Asaf YIGAL, Ziv SEGAL, Amir KALRON, Eran NIR, Asaf MESIKA, Doron GILL
-
Patent number: 11250691Abstract: Methods and a system for detecting physical intrusion are providing, including sampling a set of seismic signals from a vibration sensor of a buried sensor intrusion device, determining that the set of seismic signals matches a seismic threat pattern and responsively generating a seismic alert, recording a surveillance video of an area under which the sensor device has been buried, processing the surveillance video to determine whether a human figure is present and, responsively to determining that a human figure is present and to the generation of the seismic alert, issuing an threat detection alert.Type: GrantFiled: November 23, 2020Date of Patent: February 15, 2022Assignee: SENSOGUARD LTD.Inventor: Tomer Levy
-
Patent number: 11216502Abstract: A computer implemented method of creating a clustering model used for clustering a plurality of log messages comprising using one or more processors for receiving a plurality of training log messages, performing the following for each of the plurality of training log messages: calculating a string distance between a textual content of the respective training log message and a representative string pattern of each of the plurality of clusters, associating the respective training log message with a respective one of the plurality of clusters in case the string distance is within a predefined threshold and adding a new cluster to the plurality of clusters for associating respective training log message in case the string distance exceeds the predefined threshold, and outputting the clustering model.Type: GrantFiled: June 5, 2018Date of Patent: January 4, 2022Assignee: LogsHero Ltd.Inventors: Tomer Levy, Asaf Yigal, Ziv Segal, Amir Kalron, Eran Nir, Asaf Mesika, Doron Gill
-
Publication number: 20210104150Abstract: Methods and a system for detecting physical intrusion are providing, including sampling a set of seismic signals from a vibration sensor of a buried sensor intrusion device, determining that the set of seismic signals matches a seismic threat pattern and responsively generating a seismic alert, recording a surveillance video of an area under which the sensor device has been buried, processing the surveillance video to determine whether a human figure is present and, responsively to determining that a human figure is present and to the generation of the seismic alert, issuing an threat detection alert.Type: ApplicationFiled: November 23, 2020Publication date: April 8, 2021Inventor: Tomer LEVY
-
Patent number: 10878674Abstract: Methods and a device for detecting physical intrusion are providing, the device including a vibration sensor, a processor, a transmitter, a battery, and a conductive wire connecting the vibration sensor and the processor. The vibration sensor is affixed to a first part of the device, and the processor, transmitter, and battery are affixed to a second part of the device. The first and second parts, when attached together, form a case containing the conductive wire. The device performs steps of: sampling a set of seismic signals from the vibration sensor, determining that the set of seismic signals matches a seismic threat pattern, and responsively issuing an intrusion alert.Type: GrantFiled: November 14, 2019Date of Patent: December 29, 2020Assignee: SENSOGUARD LTD.Inventor: Tomer Levy
-
Publication number: 20200160678Abstract: Methods and a device for detecting physical intrusion are providing, the device including a vibration sensor, a processor, a transmitter, a battery, and a conductive wire connecting the vibration sensor and the processor. The vibration sensor is affixed to a first part of the device, and the processor, transmitter, and battery are affixed to a second part of the device. The first and second parts, when attached together, form a case containing the conductive wire. The device performs steps of: sampling a set of seismic signals from the vibration sensor, determining that the set of seismic signals matches a seismic threat pattern, and responsively issuing an intrusion alert.Type: ApplicationFiled: November 14, 2019Publication date: May 21, 2020Inventor: Tomer LEVY
-
Patent number: 10516439Abstract: In one example a controller comprises logic, at least partially including hardware logic, configured to implement a first iteration of an interference test on a communication interconnect comprising a victim lane and a first aggressor lane by generating a first set of pseudo-random patterns on the victim lane and the aggressor lane using a first seed and implement a second iteration of an interference test by advancing the seed on the first aggressor lane. Other examples may be described.Type: GrantFiled: August 1, 2017Date of Patent: December 24, 2019Assignee: Intel CorporationInventors: Alexey Kostinsky, Tomer Levy, Paul S. Cheses, Danny Naiger, Theodore Z. Schoenborn, Christopher P. Mozak, Nagi Aboulenein, James M. Shehadi
-
Publication number: 20190370347Abstract: A computer implemented method of creating a clustering model used for clustering a plurality of log messages comprising using one or more processors for receiving a plurality of training log messages, performing the following for each of the plurality of training log messages: calculating a string distance between a textual content of the respective training log message and a representative string pattern of each of the plurality of clusters, associating the respective training log message with a respective one of the plurality of clusters in case the string distance is within a predefined threshold and adding a new cluster to the plurality of clusters for associating respective training log message in case the string distance exceeds the predefined threshold, and outputting the clustering model.Type: ApplicationFiled: June 5, 2018Publication date: December 5, 2019Inventors: Tomer Levy, Asaf Yigal, Ziv Segal, Amir Kalron, Eran Nir, Asaf Mesika, Doron Gill
-
Publication number: 20190149420Abstract: A management unit comprising a processor, the management unit is configured to be in communication with at least one management system, the at least one management system configured to be in communication with at least one endpoint machine in an environment of multiple endpoint machines, the processor is configured to: assign for the at least one management system a dynamic group of endpoint machines; execute a relevant adaptor on the management system according to the assigned dynamic group; and apply to the dynamic group of endpoint machines, by the executed adaptor, policy rules relevant to the dynamic group of endpoint machines.Type: ApplicationFiled: January 14, 2019Publication date: May 16, 2019Applicant: INTIGUA , INC.Inventors: Tomer LEVY, Shimon HASON, Oran EPELBAUM, Shai TOREN
-
Patent number: 10192633Abstract: A method and system for high speed on chip testing for quality assurance. A multi-core system on a chip has a plurality of processing cores. The cores act as transaction agents with an auto-response unit fabricated on the chip at a chip boundary, the auto-response unit to provide a deterministic return value based on a logical address of a received read request.Type: GrantFiled: March 1, 2016Date of Patent: January 29, 2019Assignee: Intel CorporationInventors: Lakshminarayana Pappu, Timothy J. Callahan, Tomer Levy
-
Publication number: 20180373779Abstract: A system and methods for classification of events, the system including a memory, a network interface, and a processor configured to monitor system events via the network interface and store the system events as an event log in the memory, collect information about events from various web resources, extract, from the event log and the collected event information, labeling data including data about urgency of events and generate, based on the extracted labeling data, labeling data structures ascribing labels to respective events, extract, from the event log and the collected event information, event features data and generate, based on the extracted event features data, event features data structures ascribing features to respective events, and formulate decision rule structures for identification of urgent events based on the labeling data structures and the event features data structures.Type: ApplicationFiled: August 9, 2018Publication date: December 27, 2018Applicant: LogsHero Ltd.Inventors: Ianir IDESES, Tomer LEVY, Asaf YIGAL, Ziv SEGAL
-
Patent number: 10109340Abstract: Memory subsystem refresh management enables commands to access one or more identified banks across different bank groups with a single command. Instead of sending commands identifying a bank or banks in separate bank groups by each bank group individually, the command can cause the memory device to access banks in different bank groups. The command can be a refresh command. The command can be a precharge command.Type: GrantFiled: June 30, 2017Date of Patent: October 23, 2018Assignee: Intel CorporationInventors: Kuljit S. Bains, John B. Halbert, Nadav Bonen, Tomer Levy