Patents by Inventor Uri Barash
Uri Barash has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20230265213Abstract: The present invention relates to an heparanase-binding and heparanase-neutralizing monoclonal antibody (IgG-1 mAb A54), including its epitope (HBD-II) and mode of interaction with heparanase, pharmaceutical composition comprising same, and uses thereof e.g. for inhibiting or treating a disease or disorder associated with heparanase activity, including but not limited to cancer, inflammation, viral infection, diabetes and related complications. The present invention further provides combinatorial cancer therapies, comprising the heparanase-neutralizing mAb and an additional anti-cancer treatment such as chemotherapy or radiation.Type: ApplicationFiled: July 6, 2021Publication date: August 24, 2023Applicants: TECHNION RESEARCH & DEVELOPMENT FOUNDATION LIMITED, HADASIT MEDICAL RESEARCH SERVICES AND DEVELOPMENT LTD.Inventors: Israel VLODAVASKY, Uri BARASH
-
Publication number: 20210073399Abstract: An online service may maintain or create data for a user, and a user may be allowed to exert control over how the data are used. In one example, there may be several categories of data, and the user may be able to specify who may use the data, and the purpose for which the data may be used. Additionally, a user may be able to see how many of his “friends” (or other contacts) have extended trust to a particular entity, which may aid the user in making a decision about whether to extend trust to that entity. User interfaces may be provided to allow users to specify how their data are to be used.Type: ApplicationFiled: November 20, 2020Publication date: March 11, 2021Inventors: Arie Friedman, Hadas Bitran, Uri Barash, Marc Davis, Oded Nahir
-
Patent number: 10853505Abstract: An online service may maintain or create data for a user, and a user may be allowed to exert control over how the data are used. In one example, there may be several categories of data, and the user may be able to specify who may use the data, and the purpose for which the data may be used. Additionally, a user may be able to see how many of his “friends” (or other contacts) have extended trust to a particular entity, which may aid the user in making a decision about whether to extend trust to that entity. User interfaces may be provided to allow users to specify how their data are to be used.Type: GrantFiled: December 30, 2011Date of Patent: December 1, 2020Assignee: Microsoft Technology Licensing, LLCInventors: Arie Friedman, Hadas Bitran, Uri Barash, Marc Davis, Oded Nahir
-
Patent number: 10216734Abstract: One or more techniques and/or systems are provided for constructing a complementary calendar and/or a shadow calendar. A user may maintain a primary calendar within which the user may schedule user specified tasks and/or meetings, but may inadvertently omit other entries. Accordingly, a complementary calendar may be constructed based upon inferences derived from user signal data (e.g., information used to identify/infer activities of the user, such as social network profile information, messages, temporal information, locational information, documents, etc.). The complementary calendar may be automatically populated with entries corresponding to inferences derived from user signals and/or real-time conditions (e.g., weather, store hours, traffic conditions, etc.). The primary calendar and the complementary calendar may be merged to create a shadow calendar.Type: GrantFiled: September 4, 2018Date of Patent: February 26, 2019Assignee: Microsoft Technology Licensing, LLCInventors: Shira Weinberg, Haim Somech, Scott Vernon Fynn, Uri Barash, Colleen Elizabeth Hamilton, Robert J. Howard, III
-
Publication number: 20180373707Abstract: One or more techniques and/or systems are provided for constructing a complementary calendar and/or a shadow calendar. A user may maintain a primary calendar within which the user may schedule user specified tasks and/or meetings, but may inadvertently omit other entries. Accordingly, a complementary calendar may be constructed based upon inferences derived from user signal data (e.g., information used to identify/infer activities of the user, such as social network profile information, messages, temporal information, locational information, documents, etc.). The complementary calendar may be automatically populated with entries corresponding to inferences derived from user signals and/or real-time conditions (e.g., weather, store hours, traffic conditions, etc.). The primary calendar and the complementary calendar may be merged to create a shadow calendar.Type: ApplicationFiled: September 4, 2018Publication date: December 27, 2018Inventors: Shira Weinberg, Haim Somech, Scott Vernon Fynn, Uri Barash, Colleen Elizabeth Hamilton, Robert J. Howard, III
-
Patent number: 10089310Abstract: One or more techniques and/or systems are provided for constructing a complementary calendar and/or a shadow calendar. A user may maintain a primary calendar within which the user may schedule user specified tasks and/or meetings, but may inadvertently omit other entries. Accordingly, a complementary calendar may be constructed based upon inferences derived from user signal data (e.g., information used to identify/infer activities of the user, such as social network profile information, messages, temporal information, locational information, documents, etc.). The complementary calendar may be automatically populated with entries corresponding to inferences derived from user signals and/or real-time conditions (e.g., weather, store hours, traffic conditions, etc.). The primary calendar and the complementary calendar may be merged to create a shadow calendar.Type: GrantFiled: January 14, 2014Date of Patent: October 2, 2018Assignee: Microsoft Technology Licensing, LLCInventors: Shira Weinberg, Haim Somech, Scott Vernon Fynn, Uri Barash, Colleen Elizabeth Hamilton, Robert J. Howard, III
-
Patent number: 9536087Abstract: Systems, methods, and computer program products are described for controlling malicious activity detection with respect to information technology assets based on behavioral models associated with the respective information technology assets. Protection rules and corresponding sensitivities associated with the behavioral models are applied by protection services to detect malicious activity with respect to the information technology assets.Type: GrantFiled: August 1, 2015Date of Patent: January 3, 2017Assignee: Microsoft Technology Licensing, LLCInventors: Shai A. Rubin, Yosef Dinerstein, Efim Hudis, Yair Helman, Uri Barash, Arie Friedman
-
Publication number: 20160267439Abstract: An electronic calendaring system provides contextual calendar conflict resolution by dynamically evaluating the contexts of a user's obligations and offering the user assistance in scheduling non-conflicting events in a calendar. The electronic calendaring system generates one or more electronic calendar conflict resolution options based on contextual information associated with conflicting calendar events. An event conflict evaluator identifies a calendar conflict between at least two calendar events within received calendar event information. An event context evaluator collects contextual information about the conflicting calendar events. A conflict resolution mediator ranks available time slots to which at least one of the conflicting calendar events can be rescheduled based on the collected contextual information. The conflict resolution mediator further communicates a conflict resolution option message via a user interface of a computing device.Type: ApplicationFiled: March 11, 2015Publication date: September 15, 2016Inventors: Hadas Bitran, Delia Koren, Omri Koshorek, Elinor Axelrod, Limor Lahiani, Uri Barash, Ido Priness, Dikla Dotan-Cohen, Adi Miller, Haim Somech
-
Patent number: 9428586Abstract: The present invention, in at least some aspects, is of splice variants of heparanase, as well as diagnostic kits and methods of use, and therapeutic agents and methods of use based thereon, and antibodies specifically binding thereof.Type: GrantFiled: November 30, 2010Date of Patent: August 30, 2016Assignee: COMPUGEN LTDInventors: Ronen Shemesh, Michal Ayalon-Soffer, Zurit Levine, Sergey Nemzer, Tomer Zekharya, Gad S. Cojocaru, Uri Barash, Neta Ilan, Israel Vlodavsky, Iris Hecht
-
Publication number: 20150350230Abstract: Systems, methods, and computer program products are described for controlling malicious activity detection with respect to information technology assets based on behavioral models associated with the respective information technology assets. Protection rules and corresponding sensitivities associated with the behavioral models are applied by protection services to detect malicious activity with respect to the information technology assets.Type: ApplicationFiled: August 1, 2015Publication date: December 3, 2015Inventors: Shai A. Rubin, Yosef Dinerstein, Efim Hudis, Yair Helman, Uri Barash, Arie Friedman
-
Patent number: 9098702Abstract: Systems, methods, and computer program products are described for controlling malicious activity detection with respect to information technology assets based on behavioral models associated with the respective information technology assets. Protection rules and corresponding sensitivities associated with the behavioral models are applied by protection services to detect malicious activity with respect to the information technology assets.Type: GrantFiled: July 15, 2013Date of Patent: August 4, 2015Assignee: Microsoft Technology Licensing, LLCInventors: Shai A. Rubin, Yosef Dinerstein, Efim Hudis, Yair Helman, Uri Barash, Arie Friedman
-
Publication number: 20150199649Abstract: One or more techniques and/or systems are provided for constructing a complementary calendar and/or a shadow calendar. A user may maintain a primary calendar within which the user may schedule user specified tasks and/or meetings, but may inadvertently omit other entries. Accordingly, a complementary calendar may be constructed based upon inferences derived from user signal data (e.g., information used to identify/infer activities of the user, such as social network profile information, messages, temporal information, locational information, documents, etc.). The complementary calendar may be automatically populated with entries corresponding to inferences derived from user signals and/or real-time conditions (e.g., weather, store hours, traffic conditions, etc.). The primary calendar and the complementary calendar may be merged to create a shadow calendar.Type: ApplicationFiled: January 14, 2014Publication date: July 16, 2015Applicant: Microsoft CorporationInventors: Shira Weinberg, Haim Somech, Scott Vernon Fynn, Uri Barash, Colleen Elizabeth Hamilton, Robert J. Howard, III
-
Patent number: 8983859Abstract: A client-based ad agent dynamically determines whether an advertisement campaign should bid on an impression for an end user and/or sets the bid price of the advertisement campaign for the impression. When an opportunity for an impression on a web page is identified, the ad agent accesses user data associated with an end user. The ad agent analyzes the user data to identify the relevance and/or value of serving an impression to the end user to the advertisement campaign. Based on the analysis, the ad agent controls whether the advertisement campaign bids on the impression for the end user and/or sets the bid price of the advertisement campaign for the impression.Type: GrantFiled: June 18, 2010Date of Patent: March 17, 2015Assignee: Microsoft Technology Licensing, LLCInventors: Nir Nice, Uri Barash, Ying Li, Michael J. Goldbach, William H. Gates, III
-
Patent number: 8959568Abstract: An enterprise-wide sharing arrangement uses a semantic abstraction, called a security assessment, to share security-related information between different security products, called endpoints. A security assessment is defined as a tentative assignment by an endpoint of broader contextual meaning to information that is collected about an object of interest. Its tentative nature is reflected in two of its components: a fidelity field used to express the level of confidence in the assessment, and a time-to-live field for an estimated time period for which the assessment is valid. Endpoints may publish security assessments onto a security assessment channel, as well as subscribe to a subset of security assessments published by other endpoints. A specialized endpoint is coupled to the channel that performs as a centralized audit point by subscribing to all security assessments, logging the security assessments, and also logging the local actions taken by endpoints in response to security threats.Type: GrantFiled: March 14, 2007Date of Patent: February 17, 2015Assignee: Microsoft CorporationInventors: Efim Hudis, Yair Helman, Joseph Malka, Uri Barash
-
Patent number: 8955105Abstract: An enterprise-wide sharing arrangement uses a semantic abstraction, called a security assessment, to share security-related information between security products, called endpoints. A security assessment is defined as a tentative assignment by an endpoint of broader contextual meaning to information that is collected about an object of interest. Endpoints utilize an architecture that comprises a common assessment sharing agent and a common assessment generating agent. The common assessment sharing agent is arranged for subscribing to security assessments, publishing security assessments onto a channel, maintaining an awareness of configuration changes on the channel (e.g., when a new endpoint is added or removed), and implementing security features like authorization, authentication and encryption.Type: GrantFiled: March 14, 2007Date of Patent: February 10, 2015Assignee: Microsoft CorporationInventors: Efim Hudis, Yair Helman, Joseph Malka, Uri Barash
-
Publication number: 20140180835Abstract: Online advertisements may be verified before being rendered. In one example, an ad control is incorporated into an application or web page. When the ad control is to present an ad, the ad control requests an ad from an ad provider. Ads that are provided to the ad control have previously been submitted for certification, and have received a certificate. When the ad control receives the ad, it verifies the certificate using a digital signature. If the certificate verifies, then the ad is deemed acceptable to render, and the ad control renders the ad. Otherwise, the ad is not deemed acceptable to render, and the ad control requests another ad from the ad provider.Type: ApplicationFiled: December 20, 2012Publication date: June 26, 2014Applicant: Microsoft CorporationInventors: Hadas Bitran, Haim Somech, Ishai Oren, Uri Barash, Ran Mizrachi
-
Publication number: 20130305374Abstract: Systems, methods, and computer program products are described for controlling malicious activity detection with respect to information technology assets based on behavioral models associated with the respective information technology assets. Protection rules and corresponding sensitivities associated with the behavioral models are applied by protection services to detect malicious activity with respect to the information technology assets.Type: ApplicationFiled: July 15, 2013Publication date: November 14, 2013Inventors: Shai A. Rubin, Yosef Dinerstein, Efim Hudis, Yair Helman, Uri Barash, Arie Friedman
-
Patent number: 8490187Abstract: Systems, methods, and computer program products are described for controlling malicious activity detection with respect to information technology assets based on behavioral models associated with the respective information technology assets. Protection rules and corresponding sensitivities associated with the behavioral models are applied by protection services to detect malicious activity with respect to the information technology assets.Type: GrantFiled: March 20, 2009Date of Patent: July 16, 2013Assignee: Microsoft CorporationInventors: Shai A. Rubin, Yosef Dinerstein, Efim Hudis, Yair Helman, Uri Barash, Arie Friedman
-
Publication number: 20130174274Abstract: An online service may maintain or create data for a user, and a user may be allowed to exert control over how the data are used. In one example, there may be several categories of data, and the user may be able to specify who may use the data, and the purpose for which the data may be used. Additionally, a user may be able to see how many of his “friends” (or other contacts) have extended trust to a particular entity, which may aid the user in making a decision about whether to extend trust to that entity. User interfaces may be provided to allow users to specify how their data are to be used.Type: ApplicationFiled: December 30, 2011Publication date: July 4, 2013Applicant: MICROSOFT CORPORATIONInventors: Arie Friedman, Hadas Bitran, Uri Barash, Marc Davis, Oded Nahir
-
Patent number: 8413247Abstract: Endpoints in an enterprise security environment are configured to adaptively switch from their normal data collection mode to a long-term, detailed data collection mode where advanced analyses are applied to the collected detailed data. Such adaptive data collection and analysis is triggered upon the receipt of a security assessment of a particular type, where a security assessment is defined as a tentative assignment by an endpoint of broader contextual meaning to information (i.e., data in some context) that is collected about an object of interest. A specialized endpoint is coupled to the security assessment channel and performs as a centralized audit point by subscribing to all security assessments, logging the security assessments, and also logging the local actions taken by endpoints in response to detected security incidents in the environment. The specialized endpoint is arranged to perform various analyses and processes on historical security assessments.Type: GrantFiled: March 14, 2007Date of Patent: April 2, 2013Assignee: Microsoft CorporationInventors: Efim Hudis, Yair Helman, Joseph Malka, Uri Barash