Patents by Inventor Yair Cohen

Yair Cohen has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11979421
    Abstract: In some examples, a system for decorating network traffic flows with outlier scores includes a processor and a memory device to store traffic flows received from a network. The processor is configured to receive a set of traffic flows from the memory device and generate a tree model to split the traffic flows into clusters of traffic flows. Each cluster corresponds with a leaf of the tree model. The processor is further configured to generate machine learning models for each of the clusters of traffic flows separately. For a new traffic flow, the processor is configured to identify a specific one of the machine learning models that corresponds with the new traffic flow, compute an outlier score for the new traffic flow using the identified specific one of the machine learning models, and decorate the new traffic flow with the outlier score.
    Type: Grant
    Filed: December 31, 2021
    Date of Patent: May 7, 2024
    Assignee: International Business Machines Corporation
    Inventors: Yair Allouche, Aviad Cohen, Ravid Sagy, Ofer Haim Biller, Eitan Daniel Farchi
  • Publication number: 20240143737
    Abstract: Described are techniques for automated generation of labeled datasets for training an AI model to identify a cyberattack. The techniques include receiving configuration information for simulating a cyberattack against a target computer network. The techniques further include executing a cyberattack simulation, based on the configuration information, against the target computer network, where one or more attack log files containing information related to the cyberattack simulation are generated by resources of the target computer network in response to the cyberattack simulation. The techniques further include generating labeled training data from the one or more attack log files to correspond to specifications of the target computer network, and training an artificial intelligence (AI) model to identify the cyberattack in the target computer network using the labeled training data.
    Type: Application
    Filed: October 26, 2022
    Publication date: May 2, 2024
    Inventors: Amos Zamir, Yair Allouche, Aviad Cohen, RAVID SAGY
  • Patent number: 11972333
    Abstract: Systems and methods are disclosed for managing a generative artificial intelligence (AI) model to improve performance. Managing the generative AI model includes using a second generative AI model to generate outputs from similar inputs and comparing the outputs of the generative AI models to determine their similarity. The second generative AI model is trained using fresher training data but may not be manually supervised and adjusted to the level of the generative AI model being managed. As such, an output of the second generative AI model is compared to an output of the managed generative AI model by a classification model to determine a relevance of the output from the managed generative AI model. An output of the classification model is used to perform various suitable policies to optimize the performance of the managed generative AI model, such as providing alternate outputs, preventing providing the output, or retraining the model.
    Type: Grant
    Filed: June 28, 2023
    Date of Patent: April 30, 2024
    Assignee: Intuit Inc.
    Inventors: Yair Horesh, Rami Cohen, Talia Tron, Adi Shalev, Kfir Aharon, Osnat Haj Yahia, Nitzan Gado
  • Patent number: 10120925
    Abstract: A computer implemented method for reading signatures corresponding to a portion of data on a virtual machine disk on a production site, wherein reading the signature includes mapping the virtual machine disk offset into a physical storage offset, and reading the signature from the physical storage; sending the signature of the portion of data to a replication site; obtaining a mapping from a virtual disk to a physical disk at the replica site; issuing a command to write a portion of data corresponding to the signature to a the physical storage based on the mapping of the replica of the virtual machine disk on the replication site; determining if the command was successful; and based on a determination that the command was not successful, marking the locations corresponding to the signature for synchronization in a synchronization structure.
    Type: Grant
    Filed: September 30, 2015
    Date of Patent: November 6, 2018
    Assignee: EMC IP Holding Company LLC
    Inventors: Assaf Natanzon, Yair Cohen
  • Patent number: 10067837
    Abstract: In one aspect, a method includes storing a virtual machine disk in a first logical unit stored on a data store; replicating the first virtual machine disk used by a first virtual machine at a second virtual machine disk stored on a second logical unit on a cloud array storage device; storing changes to the first virtual machine disk on a journal stored on the data store; periodically rolling each virtual machine disk of virtual machines on the second logical unit to a same-point-in-time using the journal and taking a snapshot of the second logical unit at the same point-in-time and sending the snapshots to a cloud storage network.
    Type: Grant
    Filed: December 28, 2015
    Date of Patent: September 4, 2018
    Assignee: EMC IP Holding Company LLC
    Inventors: Assaf Natanzon, Ran Goldschmidt, Yair Cohen
  • Patent number: 9990514
    Abstract: Disclosed herein is a system and method for managing collaborative electronic data that is owned by two different users who belong to different organizations. Both users are also granted ownership rights of collaborative electronic data created by the users. Users then contribute to the collaborative electronic data by providing information that may be confidential to their organization. The users want to ensure that they can cut off access to the confidential information if and when the relationship between the users or organizations sours. When one of the users with ownership privileges decides to end the cooperation with the other users, that user simply revokes access to the collaborative electronic data to the other user. As a result of the revocation all users are no longer able to see or access at least a portion of the collaborative electronic data to protect confidential information of all the parties.
    Type: Grant
    Filed: March 1, 2017
    Date of Patent: June 5, 2018
    Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC
    Inventors: Yair Cohen, Nir Winter, Nir Shalom Soudry
  • Patent number: 9959061
    Abstract: A computer implemented method for replicating virtual machine disk volumes on a storage array supporting reading signatures of data based on offset of data by reading signatures of data of a production virtual machine on production site; wherein reading the signature includes mapping a virtual machine disk offset into a physical storage offset and reading the signature from the physical storage; reading signatures of data of a replica virtual machine used to replicate the production virtual machine on a replica site wherein reading the signature includes mapping a virtual machine disk offset into a physical storage offset and reading the signature from the physical storage; and based on determination the signatures are not identical marking the locations for synchronization in a synchronization structure.
    Type: Grant
    Filed: September 30, 2015
    Date of Patent: May 1, 2018
    Assignee: EMC IP Holding Company LLC
    Inventors: Assaf Natanzon, Yair Cohen
  • Publication number: 20170177900
    Abstract: Disclosed herein is a system and method for managing collaborative electronic data that is owned by two different users who belong to different organizations. Both users are also granted ownership rights of collaborative electronic data created by the users. Users then contribute to the collaborative electronic data by providing information that may be confidential to their organization. The users want to ensure that they can cut off access to the confidential information if and when the relationship between the users or organizations sours. When one of the users with ownership privileges decides to end the cooperation with the other users, that user simply revokes access to the collaborative electronic data to the other user. As a result of the revocation all users are no longer able to see or access at least a portion of the collaborative electronic data to protect confidential information of all the parties.
    Type: Application
    Filed: March 1, 2017
    Publication date: June 22, 2017
    Applicant: Microsoft Technology Licensing, LLC
    Inventors: Yair Cohen, Nir Winter, Nir Shalom Soudry
  • Patent number: 9626493
    Abstract: Data from one or more sensors of a computing device can be employed to provide continuous protection of digital content. After user authentication and authorization, sensor data can be utilized to control access to protected content. More specifically, sensor data can be employed as a basis for initially providing an authorized user access to protected content and subsequently terminating access to the protected content. For additional security, content can be embedded with user identifying information in the form of a watermark. Further, such user identifying information can be provided to a content owner identifying one or more users who viewed the content.
    Type: Grant
    Filed: June 8, 2013
    Date of Patent: April 18, 2017
    Assignee: Microsoft Technology Licensing, LLC
    Inventor: Yair Cohen
  • Patent number: 9609032
    Abstract: Disclosed herein is a system and method for managing a collaborative document that is owned by two different users who belong to different organizations. The users first create a document that will be owned by both users. Both users are also granted full ownership rights in the document. The users then contribute to the document by providing information that may be confidential to their organization. The users want to ensure that they can cut off access to the confidential information if and when the relationship between the users or organizations sours. When one of the users with full ownership privileges decides to end the cooperation with the other users, that user simply revokes access to the document to the other user. As a result of the revocation all users are no longer able to see or access the entire document. In this way the confidential information of all parties is protected.
    Type: Grant
    Filed: June 26, 2014
    Date of Patent: March 28, 2017
    Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC
    Inventors: Yair Cohen, Nir Winter, Nir Shalom Soudry
  • Publication number: 20150379294
    Abstract: Disclosed herein is a system and method for managing a collaborative document that is owned by two different users who belong to different organizations. The users first create a document that will be owned by both users. Both users are also granted full ownership rights in the document. The users then contribute to the document by providing information that may be confidential to their organization. The users want to ensure that they can cut off access to the confidential information if and when the relationship between the users or organizations sours. When one of the users with full ownership privileges decides to end the cooperation with the other users, that user simply revokes access to the document to the other user. As a result of the revocation all users are no longer able to see or access the entire document. In this way the confidential information of all parties is protected.
    Type: Application
    Filed: June 26, 2014
    Publication date: December 31, 2015
    Inventors: Yair Cohen, Nir Winter, Nir Shalom Soudry
  • Publication number: 20140366159
    Abstract: Data from one or more sensors of a computing device can be employed to provide continuous protection of digital content. After user authentication and authorization, sensor data can be utilized to control access to protected content. More specifically, sensor data can be employed as a basis for initially providing an authorized user access to protected content and subsequently terminating access to the protected content. For additional security, content can be embedded with user identifying information in the form of a watermark. Further, such user identifying information can be provided to a content owner identifying one or more users who viewed the content.
    Type: Application
    Filed: June 8, 2013
    Publication date: December 11, 2014
    Inventor: Yair Cohen