Patents by Inventor Yossi Mesika
Yossi Mesika has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11082425Abstract: In an approach to securing data using alternative value identification schemes, one or more computer processors receive user registration data, wherein the user registration data includes one or more authentication parameters, wherein the one or more authentication parameters includes one or more physical pressure-based inputs by a user. The one or more computer processors receive an access request requiring an authentication from the user, wherein the access request includes the one or more physical pressure-based inputs by the user associated with the one or more authentication parameters. The one or more computer processors determine whether the one or more authentication parameters match the user registration data. Responsive to determining that the authentication data matches the registration data, the one or more computer processors authenticate access for the user.Type: GrantFiled: September 26, 2019Date of Patent: August 3, 2021Assignee: International Business Machines CorporationInventors: Itzhack Goldberg, Harry R. McGregor, Yossi Mesika, Christopher B. Moore
-
Patent number: 10712930Abstract: Electronic devices that include a force sensor input and input user interface elements are described. The force sensors may be located to detect force on the display of the electronic device. The force sensor, alone or in combination with one or more other sensors such as capacitive touch sensors, allows for interaction with the user interface input on the device. By using a hold detection logic with a pressure level sensitive sensor, user interface elements can be manipulated or values can be assigned to input elements.Type: GrantFiled: May 28, 2017Date of Patent: July 14, 2020Assignee: International Business Machines CorporationInventors: Oded Dubovsky, Yossi Mesika
-
Patent number: 10673846Abstract: In an approach to securing data using alternative value identification schemes, one or more computer processors receive user registration data, wherein the user registration data includes one or more authentication parameters, wherein the one or more authentication parameters includes one or more physical pressure-based inputs by a user. The one or more computer processors receive an access request requiring an authentication from the user, wherein the access request includes the one or more physical pressure-based inputs by the user associated with the one or more authentication parameters. The one or more computer processors determine whether the one or more authentication parameters match the user registration data. Responsive to determining that the authentication data matches the registration data, The one or more computer processors authenticate access for the user.Type: GrantFiled: April 24, 2019Date of Patent: June 2, 2020Assignee: International Business Machines CorporationInventors: Itzhack Goldberg, Harry R. McGregor, Yossi Mesika, Christopher B. Moore
-
Publication number: 20200021578Abstract: In an approach to securing data using alternative value identification schemes, one or more computer processors receive user registration data, wherein the user registration data includes one or more authentication parameters, wherein the one or more authentication parameters includes one or more physical pressure-based inputs by a user. The one or more computer processors receive an access request requiring an authentication from the user, wherein the access request includes the one or more physical pressure-based inputs by the user associated with the one or more authentication parameters. The one or more computer processors determine whether the one or more authentication parameters match the user registration data. Responsive to determining that the authentication data matches the registration data, the one or more computer processors authenticate access for the user.Type: ApplicationFiled: September 26, 2019Publication date: January 16, 2020Inventors: Itzhack Goldberg, Harry R. McGregor, Yossi Mesika, Christopher B. Moore
-
Patent number: 10530770Abstract: In an approach to securing data using alternative value identification schemes, one or more computer processors receive user registration data, wherein the user registration data includes one or more authentication parameters, wherein the one or more authentication parameters includes one or more physical pressure-based inputs by a user. The one or more computer processors receive an access request requiring an authentication from the user, wherein the access request includes the one or more physical pressure-based inputs by the user associated with the one or more authentication parameters. The one or more computer processors determine whether the one or more authentication parameters match the user registration data. Responsive to determining that the authentication data matches the registration data, The one or more computer processors authenticate access for the user.Type: GrantFiled: June 28, 2017Date of Patent: January 7, 2020Assignee: International Business Machines CorporationInventors: Itzhack Goldberg, Harry R. McGregor, Yossi Mesika, Christopher B. Moore
-
Publication number: 20190245849Abstract: In an approach to securing data using alternative value identification schemes, one or more computer processors receive user registration data, wherein the user registration data includes one or more authentication parameters, wherein the one or more authentication parameters includes one or more physical pressure-based inputs by a user. The one or more computer processors receive an access request requiring an authentication from the user, wherein the access request includes the one or more physical pressure-based inputs by the user associated with the one or more authentication parameters. The one or more computer processors determine whether the one or more authentication parameters match the user registration data. Responsive to determining that the authentication data matches the registration data, The one or more computer processors authenticate access for the user.Type: ApplicationFiled: April 24, 2019Publication date: August 8, 2019Inventors: Itzhack Goldberg, Harry R. McGregor, Yossi Mesika, Christopher B. Moore
-
Patent number: 10318722Abstract: Embodiments for using power charge management authorization for a user equipment (UE) by a processor. A power charging session is authorized by firmware of the UE for charging the UE using a cryptographic handshake between the UE and a power charging station.Type: GrantFiled: October 31, 2016Date of Patent: June 11, 2019Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Itzhack Goldberg, Harry R. McGregor, Yossi Mesika, Christopher B. Moore
-
Publication number: 20190007397Abstract: In an approach to securing data using alternative value identification schemes, one or more computer processors receive user registration data, wherein the user registration data includes one or more authentication parameters, wherein the one or more authentication parameters includes one or more physical pressure-based inputs by a user. The one or more computer processors receive an access request requiring an authentication from the user, wherein the access request includes the one or more physical pressure-based inputs by the user associated with the one or more authentication parameters. The one or more computer processors determine whether the one or more authentication parameters match the user registration data. Responsive to determining that the authentication data matches the registration data, The one or more computer processors authenticate access for the user.Type: ApplicationFiled: June 28, 2017Publication date: January 3, 2019Inventors: Itzhack Goldberg, Harry R. McGregor, Yossi Mesika, Christopher B. Moore
-
Patent number: 10169619Abstract: Embodiments for physical token based secured charge management of a user equipment (UE) by a processor. A power charging session is authorized by firmware of the UE for charging the UE upon detecting one or more physical authentication tokens within a selected area of a power charging source or on the power charging source itself, or combination thereof.Type: GrantFiled: October 31, 2016Date of Patent: January 1, 2019Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Itzhack Goldberg, Harry R. McGregor, Yossi Mesika, Christopher B. Moore
-
Publication number: 20180341384Abstract: Electronic devices that include a force sensor input and input user interface elements are described. The force sensors may be located to detect force on the display of the electronic device. The force sensor, alone or in combination with one or more other sensors such as capacitive touch sensors, allows for interaction with the user interface input on the device. By using a hold detection logic with a pressure level sensitive sensor, user interface elements can be manipulated or values can be assigned to input elements.Type: ApplicationFiled: May 28, 2017Publication date: November 29, 2018Inventors: Oded Dubovsky, Yossi Mesika
-
Patent number: 10127407Abstract: Embodiments for authorizing power charging of a user equipment (UE) based on a location. A power charging session is authorized by firmware of the UE for charging the UE upon detecting the UE is currently located and validated within an authorized geographic location. Either an unauthorized charging session is permitted to charge the UE up to a pre-authorized charging limit upon the UE being located in an unauthorized geographic location, or the power charging session is permitted to continue to charge the UE upon detecting the UE relocated from the authorized geographic location to an unauthorized geographic location.Type: GrantFiled: October 25, 2017Date of Patent: November 13, 2018Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Itzhack Goldberg, Harry R. McGregor, Yossi Mesika, Christopher B. Moore
-
Publication number: 20180121685Abstract: Embodiments for authorizing power charging of a user equipment (UE) based on a location. A power charging session is authorized by firmware of the UE for charging the UE upon detecting the UE is currently located and validated within an authorized geographic location. Either an unauthorized charging session is permitted to charge the UE up to a pre-authorized charging limit upon the UE being located in an unauthorized geographic location, or the power charging session is permitted to continue to charge the UE upon detecting the UE relocated from the authorized geographic location to an unauthorized geographic location.Type: ApplicationFiled: October 25, 2017Publication date: May 3, 2018Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Itzhack GOLDBERG, Harry R. MCGREGOR, Yossi MESIKA, Christopher B. MOORE
-
Publication number: 20180121684Abstract: Embodiments for using power charge management authorization for a user equipment (UE) by a processor. A power charging session is authorized by firmware of the UE for charging the UE using a cryptographic handshake between the UE and a power charging station.Type: ApplicationFiled: October 31, 2016Publication date: May 3, 2018Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Itzhack GOLDBERG, Harry R. MCGREGOR, Yossi MESIKA, Christopher B. MOORE
-
Publication number: 20180121683Abstract: Embodiments for physical token based secured charge management of a user equipment (UE) by a processor. A power charging session is authorized by firmware of the UE for charging the UE upon detecting one or more physical authentication tokens within a selected area of a power charging source or on the power charging source itself, or combination thereof.Type: ApplicationFiled: October 31, 2016Publication date: May 3, 2018Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Itzhack GOLDBERG, Harry R. MCGREGOR, Yossi MESIKA, Christopher B. MOORE
-
Patent number: 9913152Abstract: A discovering master communication device for discovering high resources consuming wireless network resources to optimize resources consumption during network discovery session(s) within a group of nearby communication devices, comprising: a first interface for communicating with remote site(s) over high resources consuming wireless network(s), a second interface for communicating with nearby device(s) which include similar first interface and located within range of the second interface. For a similar communication session, resources consumption of the second interface is lower compared to the first interface, and processor(s) executing a stored code for activating the first interface to discover availability of high resources consuming wireless network resource(s) with assistance of the nearby device(s), sending availability message to the nearby device(s) over the second interface, and sending master assignment message to one of the nearby device(s) over the second interface.Type: GrantFiled: November 23, 2015Date of Patent: March 6, 2018Assignee: International Business Machines CorporationInventors: Aharon Abadi, Nili Guy-Ifergan, Yossi Mesika, Oleg Sternberg
-
Patent number: 9898626Abstract: Embodiments for using location defined power charge management authorization for a user equipment (UE) by a processor. A power charging session is authorized by firmware of the UE for charging the UE upon detecting the UE is within an authorized geographic location.Type: GrantFiled: October 31, 2016Date of Patent: February 20, 2018Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Itzhack Goldberg, Harry R. McGregor, Yossi Mesika, Christopher B. Moore
-
Publication number: 20170150374Abstract: A discovering master communication device for discovering high resources consuming wireless network resources to optimize resources consumption during network discovery session(s) within a group of nearby communication devices, comprising: (1) First interface for communicating with remote site(s) over high resources consuming wireless network(s). (2) Second interface for communicating with nearby device(s) which include similar first interface and located within range of the second interface. For a similar communication session, resources consumption of the second interface is lower compared to the first interface. (3) Processor(s) coupled to the first and second interfaces to execute stored code comprising: (a) Activating the first interface to discover availability of high resources consuming wireless network resource(s) with assistance of the nearby device(s). (b) Sending availability message to the nearby device(s) over the second interface.Type: ApplicationFiled: November 23, 2015Publication date: May 25, 2017Inventors: Aharon Abadi, Nili Guy-Ifergan, Yossi Mesika, Oleg Sternberg
-
Publication number: 20140324518Abstract: A method of autotagging business processes for monitoring analysis of an IT system within an organization is provided herein. The method includes the following stages: modeling an IT system associated with one or more business processes, into a model representing the business processes as process instances; tracking a flow of information entities throughout nodes located along the process instances; extracting, at each one of the nodes, tags associated with each one of the information entities flowing through the process instance; aggregating over time, the extracted tags being associated with its respective node and process instance; and visually representing the aggregated tags in association with its respective business processes, based on the model.Type: ApplicationFiled: July 15, 2014Publication date: October 30, 2014Inventors: Haggai Roitman, Yossi Mesika
-
Publication number: 20130332187Abstract: Method, system, and computer program product for personalized medical content recommendation are provided. The method may include: having a patient medical profile; having a concept or relationship relating to the patient medical profile; obtaining medical content relevant to the concept or relationship; determining a score of the concept or relationship to the patient medical profile; enhancing the score with a context score based on the values of attributes of the concept or relationship in the patient medical profile; enhancing the score with an additional knowledge score based on knowledge of the concept or relationship additional to the medical content; recommending medical content with respect to a patient medical profile based on the enhanced scores.Type: ApplicationFiled: August 13, 2013Publication date: December 12, 2013Applicant: International Business Machines CorporationInventors: Yonatan Maman, Yossi Mesika, Haggai Roitman
-
Patent number: 8543422Abstract: Method, system, and computer program product for personalized medical content recommendation are provided. The method may comprise having a patient medical profile; having a concept or relationship relating to the patient medical profile; obtaining medical content relevant to the concept or relationship; determining a score of the concept or relationship to the patient medical profile; enhancing the score with a context score based on the values of attributes of the concept or relationship in the patient medical profile; enhancing the score with an additional knowledge score based on knowledge of the concept or relationship additional to the medical content; recommending medical content with respect to a patient medical profile based on the enhanced scores. The method may also include providing an explanation of a medical content recommendation based on a matching concept or relationship.Type: GrantFiled: April 4, 2011Date of Patent: September 24, 2013Assignee: International Business Machines CorporationInventors: Yonatan Maman, Yossi Mesika, Haggai Roitman