Patents by Inventor Yaniv Shaked

Yaniv Shaked has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240146579
    Abstract: Methods, systems, and devices for wireless communications are described. A user equipment (UE) may receive a downlink message which may include an indication of a precoder applied to one or more downlink signals. The UE may receive the one or more downlink signals using a demodulation reference signal (DMRS) and the precoder, where the one or more downlink signals may be mismatched in gain and phase. The UE may perform an iterative channel estimation procedure to estimate the downlink channel. The UE may then perform a gain and phase mismatch equalization procedure to equalize an estimated gain and phase mismatch of the one or more downlink signals based on the estimated downlink channel and the precoder. The UE may then receive one or more equalized downlink signals in accordance with the gain and phase mismatch equalization procedure.
    Type: Application
    Filed: October 26, 2022
    Publication date: May 2, 2024
    Inventors: Aviv Regev, Ronen Shaked, Yaniv Eistein
  • Patent number: 11973770
    Abstract: A method for scalable vulnerability detection is provided. The method includes selecting at least a workload of a plurality of workloads deployed in a first cloud environment for inspection, wherein the workload includes a first volume; generating in a remote cluster an inspection node, the inspection node including at least a first disk, wherein the remote cluster provisions inspection nodes in response to demand for inspection nodes; generating a persistent volume (PV) on which the at least a first disk is mounted, wherein the at least a first disk is generated from a snapshot of the first volume; and generating a persistent volume claim (PVC) of the PV for an inspector workload, wherein the inspector workload is configured to inspect the PV for an object, and wherein inspector workloads are provisioned in response to demand for inspector workloads.
    Type: Grant
    Filed: November 22, 2021
    Date of Patent: April 30, 2024
    Assignee: Wiz, Inc.
    Inventors: Yarin Miran, Ami Luttwak, Roy Reznik, Avihai Berkovitz, Moran Cohen, Yaniv Shaked, Yaniv Joseph Oliver
  • Publication number: 20240135027
    Abstract: A system and method for agentless detection of sensitive data in a cloud computing environment is disclosed. The method includes: generating an inspectable disk from a clone of an original disk in a cloud computing environment; inspecting the inspectable disk for a cybersecurity object, the cybersecurity object indicating a sensitive data, the disk deployed in a cloud computing environment; extracting a data schema from the cybersecurity object, in response to detecting the cybersecurity object on the disk; generating a classification of the data schema; detecting in the disk a plurality of data files, each data file including the classified data schema; determining that the data schema corresponds to sensitive data based on the generated classification; generating in a security database: a representation of the data schema, and a representation of each data file; and rendering a visual representation of the cloud computing environment including a representation of the data schema.
    Type: Application
    Filed: December 29, 2023
    Publication date: April 25, 2024
    Applicant: Wiz, Inc.
    Inventors: Raaz HERZBERG, Avi Tal LICHTENSTEIN, Roy REZNIK, Ami LUTTWAK, Moran COHEN, Yaniv SHAKED, Yinon COSTICA, George PISHA, Daniel Hershko SHEMESH, Yarin MIRAN
  • Patent number: 11968062
    Abstract: Methods, systems, and devices for wireless communications are described. A user equipment (UE) may receive a downlink message which may include an indication of a precoder applied to one or more downlink signals. The UE may receive the one or more downlink signals using a demodulation reference signal (DMRS) and the precoder, where the one or more downlink signals may be mismatched in gain and phase. The UE may perform an iterative channel estimation procedure to estimate the downlink channel. The UE may then perform a gain and phase mismatch equalization procedure to equalize an estimated gain and phase mismatch of the one or more downlink signals based on the estimated downlink channel and the precoder. The UE may then receive one or more equalized downlink signals in accordance with the gain and phase mismatch equalization procedure.
    Type: Grant
    Filed: October 26, 2022
    Date of Patent: April 23, 2024
    Assignee: QUALCOMM Incorporated
    Inventors: Aviv Regev, Ronen Shaked, Yaniv Eistein
  • Publication number: 20240129121
    Abstract: A system and method for inspecting encrypted disks for a cybersecurity object using a custom key are disclosed. The method includes detecting an encrypted disk in a cloud computing environment, the cloud computing environment including a security policy service; authorizing a key policy on the security policy service for a custom key of an inspector account, wherein the key policy is a policy authorized to decrypt the encrypted disk; generating a second encrypted disk based on the encrypted disk; inspecting the second encrypted disk for a cybersecurity object with the custom key; and releasing a resource allocated to the second encrypted disk in response to completing the inspection.
    Type: Application
    Filed: December 26, 2023
    Publication date: April 18, 2024
    Applicant: Wiz, Inc.
    Inventors: Daniel Hershko SHEMESH, Yarin MIRAN, Roy REZNIK, Ami LUTTWAK, Yinon COSTICA, Yaniv SHAKED, Eyal MOSCOVICI
  • Patent number: 11954516
    Abstract: A system and method for inspecting managed workloads in a cloud computing environment for cybersecurity threats improves inspection of managed workload service repositories, by only inspecting bases of managed workload deployed in the cloud computing environment. The method includes discovering a managed workload deployed in a cloud computing environment; determining an identifier of the managed workload, wherein the identifier includes an indicator to a base repository in which a base is stored, and wherein the managed workload is currently deployed in the cloud computing environment, the base repository further storing a plurality of bases, wherein a portion of the plurality of bases do not correspond to a deployed workload; accessing the base repository to pull the base; and inspecting the base of the deployed managed workload for a cybersecurity threat.
    Type: Grant
    Filed: September 15, 2023
    Date of Patent: April 9, 2024
    Assignee: WIZ, INC.
    Inventors: Niv Roit Ben David, Yaniv Shaked, Yarin Miran, Raaz Herzberg, Amir Lande Blau
  • Publication number: 20240104118
    Abstract: A system and method for agentless detection of sensitive data in a cloud computing environment includes generating a snapshot from a managed database service, the snapshot including a plurality of data files stored in a bucket on a cloud computing environment; detecting a data object in the plurality of data files, the data object including a data schema and a content; classifying the first data object based on the content, wherein the content is classified as sensitive data or non-sensitive data; and generating a node on a security graph stored in a graph database to represent the first data object and the classification thereof, wherein the security graph further includes a representation of the cloud computing environment.
    Type: Application
    Filed: October 24, 2022
    Publication date: March 28, 2024
    Applicant: Wiz, Inc.
    Inventors: Raaz HERZBERG, Avi Tal LICHTENSTEIN, Roy REZNIK, Ami LUTTWAK, Moran COHEN, Yaniv SHAKED, Yinon COSTICA, George PISHA
  • Publication number: 20240104222
    Abstract: A system and method for evaluating definitions from a markup language document for agentless host configuration of an image in a virtualized computing environment generates an instruction to deploy a virtual instance based on a base image, the virtual instance including a disk. The method further includes generating an inspectable disk based on the disk of the virtual instance; receiving a markup language document, the document including a plurality of definitions, each including a data element; inspecting the inspectable disk for a cybersecurity object corresponding to a data element of a first definition of the plurality of definitions; evaluating the first definition based on the cybersecurity object to generate an evaluated first definition result, in response to determining that the definition is evaluable; generating an output based on the evaluated first definition result; and generating the output based on a notification, in response to determining that the definition is unevaluable.
    Type: Application
    Filed: September 23, 2022
    Publication date: March 28, 2024
    Applicant: Wiz, Inc.
    Inventors: Yaniv SHAKED, Mattan SHALEV, Gal KOZOSHNIK, Daniel KLEIN, Roy REZNIK, Ami LUTTWAK
  • Publication number: 20240104235
    Abstract: A system and method for agentless detection of sensitive data in a cloud computing environment includes generating a snapshot from a managed database service, the snapshot including a plurality of data files stored in a bucket on a cloud computing environment; deploying a virtual instance based on the snapshot to generate a database, the database including a database management system (DBMS); querying the DBMS to fetch data from the database; classifying the fetched data, wherein the fetched data is classified as sensitive data or non-sensitive data; and generating a node on a security graph stored in a graph database to represent the fetched data and the classification thereof, wherein the security graph includes a representation of the cloud computing environment.
    Type: Application
    Filed: October 24, 2022
    Publication date: March 28, 2024
    Applicant: Wiz, Inc.
    Inventors: Raaz HERZBERG, Avi Tal LICHTENSTEIN, Roy REZNIK, Ami LUTTWAK, Moran COHEN, Yaniv SHAKED, Yinon COSTICA, George PISHA
  • Publication number: 20240104240
    Abstract: A system and method for agentless detection of sensitive data in a cloud computing environment. The method includes detecting a first data object including a data schema and a content in a cloud computing environment; detecting a second data object, having the data schema of the first data object; generating in a security graph: a first data object node representing the first data object, a second data object node representing the second data object, and a data schema node representing the data schema; storing a classification based on the content in the security graph, wherein the content is classified as sensitive data or non-sensitive data; and rendering an output based on the classification and the data schema node, in lieu of the first data object node and the second data object node, in response to receiving a query to detect a node representing a data object classified as sensitive data.
    Type: Application
    Filed: October 24, 2022
    Publication date: March 28, 2024
    Applicant: Wiz, Inc.
    Inventors: Raaz HERZBERG, Avi Tal LICHTENSTEIN, Roy REZNIK, Ami LUTTWAK, Moran COHEN, Yaniv SHAKED, Yinon COSTICA, George PISHA
  • Patent number: 11936785
    Abstract: A system and method for inspecting encrypted disks for a cybersecurity object using a custom key are disclosed. The method includes detecting an encrypted disk in a cloud computing environment, the cloud computing environment including a security policy service; authorizing a key policy on the security policy service for a custom key of an inspector account, wherein the key policy is a policy authorized to decrypt the encrypted disk; generating a second encrypted disk based on the encrypted disk; inspecting the second encrypted disk for a cybersecurity object with the custom key; and releasing a resource allocated to the second encrypted disk in response to completing the inspection.
    Type: Grant
    Filed: October 4, 2023
    Date of Patent: March 19, 2024
    Assignee: WIZ, INC.
    Inventors: Daniel Hershko Shemesh, Yarin Miran, Roy Reznik, Ami Luttwak, Yinon Costica, Yaniv Shaked, Eyal Moscovici
  • Publication number: 20240089163
    Abstract: Aspects are provided which allow for a network entity such as a base station to configure odd modulation orders to be applied to downlink or uplink transmissions via signaling between the network entity and the UE. Initially, the network entity transmits a configuration to the UE indicating network support for communications using odd order modulation. Afterwards, the UE transmits, and the network entity receives, data in a signal using the odd order modulation. As a result, improved SPEF, PAPR reduction, and phase noise mitigation associated with odd order modulations may be realized through application of odd order modulations to data transmissions or receptions based on network support being configured for such odd order modulations.
    Type: Application
    Filed: September 9, 2022
    Publication date: March 14, 2024
    Inventors: Ronen SHAKED, Yaniv EISTEIN
  • Publication number: 20240086524
    Abstract: A system and method for evaluating definitions from a markup language document for agentless host configuration includes generating an inspectable disk based on a disk of a host, the host deployed in a virtualized computing environment. The system is configured to: receive a markup language document, the markup language document including a plurality of definitions, each definition including a data element; inspect the inspectable disk for a cybersecurity object corresponding to a first data element of a first definition of the plurality of definitions; evaluate the first definition further based on the cybersecurity object to generate an evaluated first definition result, in response to determining that the definition is evaluable; generate an output based on the evaluated first definition result; and generate the output based on a predetermined notification, in response to determining that the definition is unevaluable.
    Type: Application
    Filed: September 8, 2022
    Publication date: March 14, 2024
    Applicant: Wiz, Inc.
    Inventors: Yaniv SHAKED, Mattan SHALEV, Gal KOZOSHNIK, Daniel KLEIN, Roy REZNIK, Ami LUTTWAK
  • Patent number: 11875306
    Abstract: A system and method for agentless generation of a software bill of materials (SBOM) in a cloud computing environment is disclosed. The method includes: accessing a plurality of workloads in a cloud computing environment; detecting in each workload of the plurality of workloads a software component; generating for each workload an SBOM based on the detected software component; and storing each SBOM in a database.
    Type: Grant
    Filed: August 31, 2023
    Date of Patent: January 16, 2024
    Assignee: WIZ, INC.
    Inventors: Mattan Shalev, Yaniv Shaked, Gal Kozoshnik, Omri Kornblau, Roy Reznik, Ami Luttwak, Yinon Costica
  • Publication number: 20240004997
    Abstract: A system and method for reducing redundancy in inspecting container layers for cybersecurity objects includes: a processing circuitry; and a memory, the memory containing instructions that, when executed by the processing circuitry, configure the system to: generate a diff output between a first container layer and a second container layer, wherein the second container layer is previously generated based off of the first container layer, wherein the diff includes at least an object; inspect the first container layer for a cybersecurity object; inspect the object for the cybersecurity threat; associate the cybersecurity object with the first container layer in response to detecting the cybersecurity object in the first container layer and not in the at least an object; and associate the cybersecurity object with the second container layer in response to detecting the cybersecurity object in the at least an object and not in the first container layer.
    Type: Application
    Filed: June 30, 2022
    Publication date: January 4, 2024
    Applicant: Wiz, Inc.
    Inventors: Yaniv Joseph OLIVER, Ami LUTTWAK, Yinon COSTICA, Roy REZNIK, Yaniv SHAKED, Amir Lande BLAU
  • Patent number: 11790900
    Abstract: A system for audio-visual multi-speaker speech separation. The system includes a processing circuitry and a memory containing instructions that, when executed by the processing circuitry, configure the system to: receive audio signals captured by at least one microphone; receive video signals captured by at least one camera; and apply audio-visual separation on the received audio signals and video signals to provide isolation of sounds from individual sources, wherein the audio-visual separation is based, in part, on angle positions of at least one speaker relative to the at least one camera. The system provides for reliable speech processing and separation in noisy environments and environments with multiple users.
    Type: Grant
    Filed: April 6, 2020
    Date of Patent: October 17, 2023
    Assignee: HI AUTO LTD.
    Inventors: Yaniv Shaked, Yoav Ramon, Eyal Shapira, Roy Baharav
  • Publication number: 20230300168
    Abstract: A system and method detect a malware infection path in a compute environment. The method includes detecting a malware object on a first workload in a computing environment including a plurality of workloads, wherein the first workload is represented by a resource node on a security graph, the security graph including an endpoint node representing a resource which is accessible to a public network; generating a potential infection path between the resource node and the endpoint node including at least a second resource node connected to the resource node; inspecting a second workload of the plurality of workloads represented by the second resource node; determining that the potential infection path is a confirmed infection path, in response to detecting the malware on the second workload; and determining that the potential infection path is not an infection path, in response to detecting that the second workload does not include the malware.
    Type: Application
    Filed: May 30, 2023
    Publication date: September 21, 2023
    Applicant: Wiz, Inc.
    Inventors: Elad GABAY, Yaniv SHAKED, Alon SCHINDEL, Roy REZNIK, Ami LUTTWAK
  • Patent number: 11706252
    Abstract: A system and method detect a malware infection path in a compute environment. The method includes detecting a malware object on a first workload in a computing environment including a plurality of workloads, wherein the first workload is represented by a resource node on a security graph, the security graph including an endpoint node representing a resource which is accessible to a public network; generating a potential infection path between the resource node and the endpoint node including at least a second resource node connected to the resource node; inspecting a second workload of the plurality of workloads represented by the second resource node; determining that the potential infection path is a confirmed infection path, in response to detecting the malware on the second workload; and determining that the potential infection path is not an infection path, in response to detecting that the second workload does not include the malware.
    Type: Grant
    Filed: December 23, 2022
    Date of Patent: July 18, 2023
    Assignee: WIZ, INC.
    Inventors: Elad Gabay, Yaniv Shaked, Alon Schindel, Roy Reznik, Ami Luttwak
  • Publication number: 20230208862
    Abstract: A system and method provide detection of a malware attack path. The method includes detecting at a first time a malware object on a first workload deployed in the compute environment, wherein the first workload is represented by a first node in a security graph, the security graph including a representation of the compute environment; querying the security graph to detect a second node connected to the first node, wherein the connection indicates that the first workload represented by the first node can access a second workload represented by the second node; and generating an instruction to inspect the second workload represented by the second node at a second time, occurring after the first time.
    Type: Application
    Filed: December 23, 2022
    Publication date: June 29, 2023
    Applicant: Wiz, Inc.
    Inventors: Elad GABAY, Ami LUTTWAK, Roy REZNIK, Yaniv SHAKED, Alon SCHINDEL
  • Publication number: 20230208873
    Abstract: A system and method detect a malware infection path in a compute environment. The method includes detecting a malware object on a first workload in a computing environment including a plurality of workloads, wherein the first workload is represented by a resource node on a security graph, the security graph including an endpoint node representing a resource which is accessible to a public network; generating a potential infection path between the resource node and the endpoint node including at least a second resource node connected to the resource node; inspecting a second workload of the plurality of workloads represented by the second resource node; determining that the potential infection path is a confirmed infection path, in response to detecting the malware on the second workload; and determining that the potential infection path is not an infection path, in response to detecting that the second workload does not include the malware.
    Type: Application
    Filed: December 23, 2022
    Publication date: June 29, 2023
    Applicant: Wiz, Inc.
    Inventors: Elad GABAY, Yaniv SHAKED, Alon SCHINDEL, Roy REZNIK, Ami LUTTWAK