Patents by Inventor Uri Barash

Uri Barash has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20230265213
    Abstract: The present invention relates to an heparanase-binding and heparanase-neutralizing monoclonal antibody (IgG-1 mAb A54), including its epitope (HBD-II) and mode of interaction with heparanase, pharmaceutical composition comprising same, and uses thereof e.g. for inhibiting or treating a disease or disorder associated with heparanase activity, including but not limited to cancer, inflammation, viral infection, diabetes and related complications. The present invention further provides combinatorial cancer therapies, comprising the heparanase-neutralizing mAb and an additional anti-cancer treatment such as chemotherapy or radiation.
    Type: Application
    Filed: July 6, 2021
    Publication date: August 24, 2023
    Applicants: TECHNION RESEARCH & DEVELOPMENT FOUNDATION LIMITED, HADASIT MEDICAL RESEARCH SERVICES AND DEVELOPMENT LTD.
    Inventors: Israel VLODAVASKY, Uri BARASH
  • Publication number: 20210073399
    Abstract: An online service may maintain or create data for a user, and a user may be allowed to exert control over how the data are used. In one example, there may be several categories of data, and the user may be able to specify who may use the data, and the purpose for which the data may be used. Additionally, a user may be able to see how many of his “friends” (or other contacts) have extended trust to a particular entity, which may aid the user in making a decision about whether to extend trust to that entity. User interfaces may be provided to allow users to specify how their data are to be used.
    Type: Application
    Filed: November 20, 2020
    Publication date: March 11, 2021
    Inventors: Arie Friedman, Hadas Bitran, Uri Barash, Marc Davis, Oded Nahir
  • Patent number: 10853505
    Abstract: An online service may maintain or create data for a user, and a user may be allowed to exert control over how the data are used. In one example, there may be several categories of data, and the user may be able to specify who may use the data, and the purpose for which the data may be used. Additionally, a user may be able to see how many of his “friends” (or other contacts) have extended trust to a particular entity, which may aid the user in making a decision about whether to extend trust to that entity. User interfaces may be provided to allow users to specify how their data are to be used.
    Type: Grant
    Filed: December 30, 2011
    Date of Patent: December 1, 2020
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Arie Friedman, Hadas Bitran, Uri Barash, Marc Davis, Oded Nahir
  • Patent number: 10216734
    Abstract: One or more techniques and/or systems are provided for constructing a complementary calendar and/or a shadow calendar. A user may maintain a primary calendar within which the user may schedule user specified tasks and/or meetings, but may inadvertently omit other entries. Accordingly, a complementary calendar may be constructed based upon inferences derived from user signal data (e.g., information used to identify/infer activities of the user, such as social network profile information, messages, temporal information, locational information, documents, etc.). The complementary calendar may be automatically populated with entries corresponding to inferences derived from user signals and/or real-time conditions (e.g., weather, store hours, traffic conditions, etc.). The primary calendar and the complementary calendar may be merged to create a shadow calendar.
    Type: Grant
    Filed: September 4, 2018
    Date of Patent: February 26, 2019
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Shira Weinberg, Haim Somech, Scott Vernon Fynn, Uri Barash, Colleen Elizabeth Hamilton, Robert J. Howard, III
  • Publication number: 20180373707
    Abstract: One or more techniques and/or systems are provided for constructing a complementary calendar and/or a shadow calendar. A user may maintain a primary calendar within which the user may schedule user specified tasks and/or meetings, but may inadvertently omit other entries. Accordingly, a complementary calendar may be constructed based upon inferences derived from user signal data (e.g., information used to identify/infer activities of the user, such as social network profile information, messages, temporal information, locational information, documents, etc.). The complementary calendar may be automatically populated with entries corresponding to inferences derived from user signals and/or real-time conditions (e.g., weather, store hours, traffic conditions, etc.). The primary calendar and the complementary calendar may be merged to create a shadow calendar.
    Type: Application
    Filed: September 4, 2018
    Publication date: December 27, 2018
    Inventors: Shira Weinberg, Haim Somech, Scott Vernon Fynn, Uri Barash, Colleen Elizabeth Hamilton, Robert J. Howard, III
  • Patent number: 10089310
    Abstract: One or more techniques and/or systems are provided for constructing a complementary calendar and/or a shadow calendar. A user may maintain a primary calendar within which the user may schedule user specified tasks and/or meetings, but may inadvertently omit other entries. Accordingly, a complementary calendar may be constructed based upon inferences derived from user signal data (e.g., information used to identify/infer activities of the user, such as social network profile information, messages, temporal information, locational information, documents, etc.). The complementary calendar may be automatically populated with entries corresponding to inferences derived from user signals and/or real-time conditions (e.g., weather, store hours, traffic conditions, etc.). The primary calendar and the complementary calendar may be merged to create a shadow calendar.
    Type: Grant
    Filed: January 14, 2014
    Date of Patent: October 2, 2018
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Shira Weinberg, Haim Somech, Scott Vernon Fynn, Uri Barash, Colleen Elizabeth Hamilton, Robert J. Howard, III
  • Patent number: 9536087
    Abstract: Systems, methods, and computer program products are described for controlling malicious activity detection with respect to information technology assets based on behavioral models associated with the respective information technology assets. Protection rules and corresponding sensitivities associated with the behavioral models are applied by protection services to detect malicious activity with respect to the information technology assets.
    Type: Grant
    Filed: August 1, 2015
    Date of Patent: January 3, 2017
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Shai A. Rubin, Yosef Dinerstein, Efim Hudis, Yair Helman, Uri Barash, Arie Friedman
  • Publication number: 20160267439
    Abstract: An electronic calendaring system provides contextual calendar conflict resolution by dynamically evaluating the contexts of a user's obligations and offering the user assistance in scheduling non-conflicting events in a calendar. The electronic calendaring system generates one or more electronic calendar conflict resolution options based on contextual information associated with conflicting calendar events. An event conflict evaluator identifies a calendar conflict between at least two calendar events within received calendar event information. An event context evaluator collects contextual information about the conflicting calendar events. A conflict resolution mediator ranks available time slots to which at least one of the conflicting calendar events can be rescheduled based on the collected contextual information. The conflict resolution mediator further communicates a conflict resolution option message via a user interface of a computing device.
    Type: Application
    Filed: March 11, 2015
    Publication date: September 15, 2016
    Inventors: Hadas Bitran, Delia Koren, Omri Koshorek, Elinor Axelrod, Limor Lahiani, Uri Barash, Ido Priness, Dikla Dotan-Cohen, Adi Miller, Haim Somech
  • Patent number: 9428586
    Abstract: The present invention, in at least some aspects, is of splice variants of heparanase, as well as diagnostic kits and methods of use, and therapeutic agents and methods of use based thereon, and antibodies specifically binding thereof.
    Type: Grant
    Filed: November 30, 2010
    Date of Patent: August 30, 2016
    Assignee: COMPUGEN LTD
    Inventors: Ronen Shemesh, Michal Ayalon-Soffer, Zurit Levine, Sergey Nemzer, Tomer Zekharya, Gad S. Cojocaru, Uri Barash, Neta Ilan, Israel Vlodavsky, Iris Hecht
  • Publication number: 20150350230
    Abstract: Systems, methods, and computer program products are described for controlling malicious activity detection with respect to information technology assets based on behavioral models associated with the respective information technology assets. Protection rules and corresponding sensitivities associated with the behavioral models are applied by protection services to detect malicious activity with respect to the information technology assets.
    Type: Application
    Filed: August 1, 2015
    Publication date: December 3, 2015
    Inventors: Shai A. Rubin, Yosef Dinerstein, Efim Hudis, Yair Helman, Uri Barash, Arie Friedman
  • Patent number: 9098702
    Abstract: Systems, methods, and computer program products are described for controlling malicious activity detection with respect to information technology assets based on behavioral models associated with the respective information technology assets. Protection rules and corresponding sensitivities associated with the behavioral models are applied by protection services to detect malicious activity with respect to the information technology assets.
    Type: Grant
    Filed: July 15, 2013
    Date of Patent: August 4, 2015
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Shai A. Rubin, Yosef Dinerstein, Efim Hudis, Yair Helman, Uri Barash, Arie Friedman
  • Publication number: 20150199649
    Abstract: One or more techniques and/or systems are provided for constructing a complementary calendar and/or a shadow calendar. A user may maintain a primary calendar within which the user may schedule user specified tasks and/or meetings, but may inadvertently omit other entries. Accordingly, a complementary calendar may be constructed based upon inferences derived from user signal data (e.g., information used to identify/infer activities of the user, such as social network profile information, messages, temporal information, locational information, documents, etc.). The complementary calendar may be automatically populated with entries corresponding to inferences derived from user signals and/or real-time conditions (e.g., weather, store hours, traffic conditions, etc.). The primary calendar and the complementary calendar may be merged to create a shadow calendar.
    Type: Application
    Filed: January 14, 2014
    Publication date: July 16, 2015
    Applicant: Microsoft Corporation
    Inventors: Shira Weinberg, Haim Somech, Scott Vernon Fynn, Uri Barash, Colleen Elizabeth Hamilton, Robert J. Howard, III
  • Patent number: 8983859
    Abstract: A client-based ad agent dynamically determines whether an advertisement campaign should bid on an impression for an end user and/or sets the bid price of the advertisement campaign for the impression. When an opportunity for an impression on a web page is identified, the ad agent accesses user data associated with an end user. The ad agent analyzes the user data to identify the relevance and/or value of serving an impression to the end user to the advertisement campaign. Based on the analysis, the ad agent controls whether the advertisement campaign bids on the impression for the end user and/or sets the bid price of the advertisement campaign for the impression.
    Type: Grant
    Filed: June 18, 2010
    Date of Patent: March 17, 2015
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Nir Nice, Uri Barash, Ying Li, Michael J. Goldbach, William H. Gates, III
  • Patent number: 8959568
    Abstract: An enterprise-wide sharing arrangement uses a semantic abstraction, called a security assessment, to share security-related information between different security products, called endpoints. A security assessment is defined as a tentative assignment by an endpoint of broader contextual meaning to information that is collected about an object of interest. Its tentative nature is reflected in two of its components: a fidelity field used to express the level of confidence in the assessment, and a time-to-live field for an estimated time period for which the assessment is valid. Endpoints may publish security assessments onto a security assessment channel, as well as subscribe to a subset of security assessments published by other endpoints. A specialized endpoint is coupled to the channel that performs as a centralized audit point by subscribing to all security assessments, logging the security assessments, and also logging the local actions taken by endpoints in response to security threats.
    Type: Grant
    Filed: March 14, 2007
    Date of Patent: February 17, 2015
    Assignee: Microsoft Corporation
    Inventors: Efim Hudis, Yair Helman, Joseph Malka, Uri Barash
  • Patent number: 8955105
    Abstract: An enterprise-wide sharing arrangement uses a semantic abstraction, called a security assessment, to share security-related information between security products, called endpoints. A security assessment is defined as a tentative assignment by an endpoint of broader contextual meaning to information that is collected about an object of interest. Endpoints utilize an architecture that comprises a common assessment sharing agent and a common assessment generating agent. The common assessment sharing agent is arranged for subscribing to security assessments, publishing security assessments onto a channel, maintaining an awareness of configuration changes on the channel (e.g., when a new endpoint is added or removed), and implementing security features like authorization, authentication and encryption.
    Type: Grant
    Filed: March 14, 2007
    Date of Patent: February 10, 2015
    Assignee: Microsoft Corporation
    Inventors: Efim Hudis, Yair Helman, Joseph Malka, Uri Barash
  • Publication number: 20140180835
    Abstract: Online advertisements may be verified before being rendered. In one example, an ad control is incorporated into an application or web page. When the ad control is to present an ad, the ad control requests an ad from an ad provider. Ads that are provided to the ad control have previously been submitted for certification, and have received a certificate. When the ad control receives the ad, it verifies the certificate using a digital signature. If the certificate verifies, then the ad is deemed acceptable to render, and the ad control renders the ad. Otherwise, the ad is not deemed acceptable to render, and the ad control requests another ad from the ad provider.
    Type: Application
    Filed: December 20, 2012
    Publication date: June 26, 2014
    Applicant: Microsoft Corporation
    Inventors: Hadas Bitran, Haim Somech, Ishai Oren, Uri Barash, Ran Mizrachi
  • Publication number: 20130305374
    Abstract: Systems, methods, and computer program products are described for controlling malicious activity detection with respect to information technology assets based on behavioral models associated with the respective information technology assets. Protection rules and corresponding sensitivities associated with the behavioral models are applied by protection services to detect malicious activity with respect to the information technology assets.
    Type: Application
    Filed: July 15, 2013
    Publication date: November 14, 2013
    Inventors: Shai A. Rubin, Yosef Dinerstein, Efim Hudis, Yair Helman, Uri Barash, Arie Friedman
  • Patent number: 8490187
    Abstract: Systems, methods, and computer program products are described for controlling malicious activity detection with respect to information technology assets based on behavioral models associated with the respective information technology assets. Protection rules and corresponding sensitivities associated with the behavioral models are applied by protection services to detect malicious activity with respect to the information technology assets.
    Type: Grant
    Filed: March 20, 2009
    Date of Patent: July 16, 2013
    Assignee: Microsoft Corporation
    Inventors: Shai A. Rubin, Yosef Dinerstein, Efim Hudis, Yair Helman, Uri Barash, Arie Friedman
  • Publication number: 20130174274
    Abstract: An online service may maintain or create data for a user, and a user may be allowed to exert control over how the data are used. In one example, there may be several categories of data, and the user may be able to specify who may use the data, and the purpose for which the data may be used. Additionally, a user may be able to see how many of his “friends” (or other contacts) have extended trust to a particular entity, which may aid the user in making a decision about whether to extend trust to that entity. User interfaces may be provided to allow users to specify how their data are to be used.
    Type: Application
    Filed: December 30, 2011
    Publication date: July 4, 2013
    Applicant: MICROSOFT CORPORATION
    Inventors: Arie Friedman, Hadas Bitran, Uri Barash, Marc Davis, Oded Nahir
  • Patent number: 8413247
    Abstract: Endpoints in an enterprise security environment are configured to adaptively switch from their normal data collection mode to a long-term, detailed data collection mode where advanced analyses are applied to the collected detailed data. Such adaptive data collection and analysis is triggered upon the receipt of a security assessment of a particular type, where a security assessment is defined as a tentative assignment by an endpoint of broader contextual meaning to information (i.e., data in some context) that is collected about an object of interest. A specialized endpoint is coupled to the security assessment channel and performs as a centralized audit point by subscribing to all security assessments, logging the security assessments, and also logging the local actions taken by endpoints in response to detected security incidents in the environment. The specialized endpoint is arranged to perform various analyses and processes on historical security assessments.
    Type: Grant
    Filed: March 14, 2007
    Date of Patent: April 2, 2013
    Assignee: Microsoft Corporation
    Inventors: Efim Hudis, Yair Helman, Joseph Malka, Uri Barash