Patents by Inventor Yotam HARCHOL

Yotam HARCHOL has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11190458
    Abstract: The disclosure provides an approach for enabling network functions to be executed in serverless computing environments. One embodiment employs a per-packet architecture, in which the trigger for launching a serverless computing instance is receipt of a packet. In such a case, each received packet is packaged into a request to invoke network function(s) required to process the packet, and a serverless computing environment in turn executes the requested network function(s) as serverless computing instance(s) that process the packet and return a response. Another embodiment employs a per-flow architecture in which the trigger for launching a serverless computing instance is receipt of a packet belonging to a new traffic flow. In such a case, a coordinator identifies (or receives notification of) a received packet that belongs to a new sub-flow and launches a serverless computing instance to process packets of the sub-flow that are redirected to the serverless computing instance.
    Type: Grant
    Filed: November 15, 2017
    Date of Patent: November 30, 2021
    Assignee: VMware, Inc.
    Inventors: Arjun Singhvi, Sujata Banerjee, Mark Peek, Yotam Harchol, Pontus Rydin
  • Patent number: 11070374
    Abstract: The current document is directed to distributed-secure-storage systems, and processes carried out within the distributed-secure-storage systems, that provide for secure storage and retrieval of secrets within distributed computer systems, including private encryption keys used for client authentication during establishment of secure communications channels. The secret-storage systems partition an input secret into multiple secret shares and distribute the secret shares among multiple secret-share-storing node subsystems, without persistently storing the secret itself. An agent within a client device subsequently requests a secret share corresponding to a secret, or a share of data derived from the secret share, from each of the multiple secret-share-storing nodes.
    Type: Grant
    Filed: February 28, 2018
    Date of Patent: July 20, 2021
    Assignee: VMware, Inc.
    Inventors: Asaf Kariv, Ittai Abraham, Yotam Harchol
  • Patent number: 11057209
    Abstract: The current document is directed to distributed-secure-storage systems, and processes carried out within the distributed-secure-storage systems, that provide for secure storage and retrieval of confidential and critical data, referred to as “secrets,” within distributed computer systems. The secret-storage systems partition an input secret into multiple secret shares and distribute the secret shares among multiple secret-share-storing node subsystems, without persistently storing the secret itself. An agent within a client device subsequently requests a secret share corresponding to a secret, or a share of data derived from the secret share, from each of the multiple secret-share-storing nodes. The multiple secret-share-storing nodes additionally cooperate to periodically alter the stored secret shares corresponding to a secret in a way that allows agents to recover the original secret, or derived data, from all or a portion of the altered secret shares or derived-data shares.
    Type: Grant
    Filed: February 28, 2018
    Date of Patent: July 6, 2021
    Assignee: VMware, Inc.
    Inventors: Asaf Kariv, Ittai Abraham, Yotam Harchol
  • Patent number: 10541970
    Abstract: A method and system for providing Deep Packet Inspection (DPI) as a service to a computer network are provided herein. The contribution of embodiments of the present invention is two-folded. First, a possible framework of having DPI deployed as a service is detailed, including the necessary algorithms and required adaptations. Second, the superior performance of the suggested design is demonstrated via simulations. Since the focus is on the algorithmic aspects and network design, an SDN implementation of the suggested design is not provided herein. However, many aspects of such an SDN implementation follow closely the guidelines known in the art.
    Type: Grant
    Filed: June 23, 2015
    Date of Patent: January 21, 2020
    Assignee: Yissum Research Development Company of The Hebrew University of Jerusalem Ltd.
    Inventors: David Hay, Yaron Koral, Yotam Harchol, Anat Brembler-Barr
  • Publication number: 20190268150
    Abstract: The current document is directed to distributed-secure-storage systems, and processes carried out within the distributed-secure-storage systems, that provide for secure storage and retrieval of confidential and critical data, referred to as “secrets,” within distributed computer systems. The secret-storage systems partition an input secret into multiple secret shares and distribute the secret shares among multiple secret-share-storing node subsystems, without persistently storing the secret itself. An agent within a client device subsequently requests a secret share corresponding to a secret, or a share of data derived from the secret share, from each of the multiple secret-share-storing nodes. The multiple secret-share-storing nodes additionally cooperate to periodically alter the stored secret shares corresponding to a secret in a way that allows agents to recover the original secret, or derived data, from all or a portion of the altered secret shares or derived-data shares.
    Type: Application
    Filed: February 28, 2018
    Publication date: August 29, 2019
    Applicant: VMware, Inc.
    Inventors: Asaf Kariv, lttai Abraham, Yotam Harchol
  • Publication number: 20190268149
    Abstract: The current document is directed to distributed-secure-storage systems, and processes carried out within the distributed-secure-storage systems, that provide for secure storage and retrieval of secrets within distributed computer systems, including private encryption keys used for client authentication during establishment of secure communications channels. The secret-storage systems partition an input secret into multiple secret shares and distribute the secret shares among multiple secret-share-storing node subsystems, without persistently storing the secret itself. An agent within a client device subsequently requests a secret share corresponding to a secret, or a share of data derived from the secret share, from each of the multiple secret-share-storing nodes.
    Type: Application
    Filed: February 28, 2018
    Publication date: August 29, 2019
    Applicant: VMware, Inc.
    Inventors: Asaf Kariv, Ittai Abraham, Yotam Harchol
  • Publication number: 20190149480
    Abstract: The disclosure provides an approach for enabling network functions to be executed in serverless computing environments. One embodiment employs a per-packet architecture, in which the trigger for launching a serverless computing instance is receipt of a packet. In such a case, each received packet is packaged into a request to invoke network function(s) required to process the packet, and a serverless computing environment in turn executes the requested network function(s) as serverless computing instance(s) that process the packet and return a response. Another embodiment employs a per-flow architecture in which the trigger for launching a serverless computing instance is receipt of a packet belonging to a new traffic flow. In such a case, a coordinator identifies (or receives notification of) a received packet that belongs to a new sub-flow and launches a serverless computing instance to process packets of the sub-flow that are redirected to the serverless computing instance.
    Type: Application
    Filed: November 15, 2017
    Publication date: May 16, 2019
    Inventors: Arjun SINGHVI, Sujata BANERJEE, Mark PEEK, Yotam HARCHOL, Pontus RYDIN
  • Publication number: 20170208037
    Abstract: A method and system for providing Deep Packet Inspection (DPI) as a service to a computer network are provided herein. The contribution of embodiments of the present invention is two-folded. First, a possible framework of having DPI deployed as a service is detailed, including the necessary algorithms and required adaptations. Second, the superior performance of the suggested design is demonstrated via simulations. Since the focus is on the algorithmic aspects and network design, an SDN implementation of the suggested design is not provided herein. However, many aspects of such an SDN implementation follow closely the guidelines known in the art.
    Type: Application
    Filed: June 23, 2015
    Publication date: July 20, 2017
    Inventors: David HAY, Yaron KORAL, Yotam HARCHOL, Anat BREMBLER-BARR