Patent application number | Description | Published |
20080261657 | Plug-In Device for Enabling Mobile Telephone to Execute Applications - A device for plugging into the data port of a mobile telephone, for enabling the mobile telephone to execute user applications; and a method for developing such devices and programming the applications therein. Application plugs may be inserted into the data port of the mobile telephone by the user for executing applications, without modifying any hardware or software of the mobile telephone itself. An exemplary telephonic application is presented, which monitors outgoing calls on the mobile telephone, and automatically reroutes long-distance calls through a calling-card or call-back service to obtain lower-cost calling rates. This application is transparent to the user and allows the user to place calls using the mobile telephone's phone book, speed-dialing, or redial features, and without having to enter local access numbers, calling-card account numbers, or other service access codes. Other applications, including non-telephonic applications, can be pre-programmed or downloaded by the user. | 10-23-2008 |
20100036863 | METHOD AND SYSTEM FOR TRANSFORMATION OF LOGICAL DATA OBJECTS FOR STORAGE - A method and system for compressing a raw logical data object ( | 02-11-2010 |
20100077063 | SYSTEM AND METHOD FOR EMULATING A COMPUTING DEVICE - A system apparatus and method for emulating a computing device are provided. Operational parameters of a server may be obtained and provided to an emulating computing device. An emulating device may emulate the server. While being emulated, a server may operate in a reduced functionality mode. Emulation of a server may be transparent to client or other machines associated with an emulated server. Conditions requiring a termination of an emulation of a server may be detected. Upon detecting conditions requiring a termination of an emulation of a server, operational or other parameters may be provided to the server and the server may assume full, or other, operational mode. Other embodiments are described and claimed. | 03-25-2010 |
20100250891 | METHOD AND SYSTEM FOR TRANSFORMATION OF LOGICAL DATA OBJECTS FOR STORAGE - There is provided a system capable of transformation of logical data objects for storage and method of operating thereof. The method comprises: a) identifying among a plurality of requests addressed to the storage device two or more “write” requests addressed to the same logical data object; b) deriving data chunks corresponding to identified “write” requests and transforming the derived data chunks; c) grouping the transformed data chunks in accordance with the order the requests have been received and in accordance with a predefined criteria; d) generating a grouped “write” request to the storage device; and e) providing mapping in a manner facilitating one-to-one relationship between the data in the obtained data chunks and the data to be read from the transformed logical object. The method further comprises obtaining an acknowledging response from the storage device; multiplying the obtained acknowledging response, and sending respective acknowledgements to each source which initiated respective “write” request. | 09-30-2010 |
20100277353 | METHOD AND SYSTEM FOR COMPRESSION OF LOGICAL DATA OBJECTS FOR STORAGE - There is provided a compression system configured to compress logical data objects into one or more accommodation blocks with a predefined size, and a method of operating thereof. The compression system comprises a compression engine capable of compressing input data with the help of sequential encoding one or more input strings and a counter operatively coupled to the compression engine. The counter is configured to keep its ongoing value indicative of a number of input bytes in one or more strings successfully encoded into a given accommodation block; and, responsive to unsuccessful compression of a string into the given accommodation block, to provide the compression engine with information indicative of starting point in the input stream for encoding into the next accommodation block, thus giving rise to a “start indication”. | 11-04-2010 |
20110179228 | METHOD OF STORING LOGICAL DATA OBJECTS AND SYSTEM THEREOF - Various embodiments for storing a logical object are provided. In one such embodiment, by way of example only, incoming data is divided corresponding to a logical data object into a plurality of independent streams, associating each data chunk of a plurality of obtained data chunks with a corresponding stream among the plurality of independent streams. At least one of the obtained data chunks and derivatives thereof is sequentially accommodated in accordance with an order the obtained chunks are received, while keeping the association with the corresponding streams. A global index is generated as a single meta-data stream accommodated in the logical data object and comprising information common to the plurality of independent streams and related to mapping between data in the logical data object and the obtained data chunks. | 07-21-2011 |
20110202546 | METHOD AND SYSTEM FOR TRANSFORMATION OF LOGICAL DATA OBJECTS FOR STORAGE - Various embodiments for transforming a logical data object for storage in a storage device operable with at least one storage protocol are provided. In one such embodiment, the logical data object into one or more segments are divided with each segment characterized by respective start and end offsets. One or more obtained variable size data chunks are processed corresponding to the logical data object to obtain processed data chunks, wherein at least one of the processed data chunks comprises transformed data resulting from the processing. Each of the variable size data chunks is associated with a respective segment of the logical data object. The processed data chunks are sequentially accommodated in accordance with an order of chunks received while keeping the association with the respective segments | 08-18-2011 |
20110208789 | TRANSFORMATION OF LOGICAL DATA OBJECTS FOR STORAGE - Various embodiments for operating a transformation system, capable of transforming a logical data object (LO) to a transformed logical data object (TLO), are provided. In one such embodiment, an open LO request to a certain LO and addressed by the at least one client to the at least one storage device, is intercepted. An identifier (ID) in a header of a TLO corresponding to the requested LO and stored in the at least one storage device, is obtained. The obtained ID is used to characterize the TLO and the LO. A determination is made whether the transformation system handles at least one open LO characterized by an ID with a same value as the obtained ID. The requested LO is opened if at least one open LO is not found. An instance corresponding to the intercepted open LO request is generated. The instance is associated to the obtained ID. | 08-25-2011 |
20110218970 | SYSTEMS AND METHODS FOR COMPRESSION OF DATA FOR BLOCK MODE ACCESS STORAGE - Methods and systems for creating, reading, and writing compressed data for use with a block mode access storage. The compressed data are packed into a plurality of compressed units and stored in a storage logical unit (LU). One or more corresponding compressed units may be read and/or updated with no need of restoring the entire storage logical unit while maintaining a de-fragmented structure of the LU. | 09-08-2011 |
20110218974 | SYSTEMS AND METHODS FOR COMPRESSING FILES FOR STORAGE AND OPERATION ON COMPRESSED FILES - Methods and systems for creating, reading, and writing compressed files in a computer system comprising a file system coupled with storage medium and at least one application program interface (API) configured to communicate with the file system by means of file access-related requests are provided. The file access-related requests are intercepted in order to provide at least one of the following: a) to derive and compress data corresponding to the intercepted file access request and to facilitate storing the compressed data at the storage medium as a compressed file; b) to facilitate restoring at least part of compressed data corresponding to the intercepted file request and communicating the resulting data through the API. The compressed files comprise plurality of compressed units. One or more corresponding compressed units may be read and/or updated with no need of restoring the entire file whilst maintaining de-fragmented structure of the compressed file. | 09-08-2011 |
20110218975 | METHOD AND SYSTEM FOR COMPRESSION OF FILES FOR STORAGE AND OPERATION ON COMPRESSED FILES - Methods and systems for creating, reading, and writing compressed data for use with a block mode access storage. The compressed data are packed into a plurality of compressed units and stored in a storage logical unit (LU). One or more corresponding compressed units may be read and/or updated with no need of restoring the entire storage logical unit while maintaining a de-fragmented structure of the LU. | 09-08-2011 |
20110218976 | METHOD AND SYSTEM FOR COMPRESSION OF FILES FOR STORAGE AND OPERATION ON COMPRESSED FILES - Systems and methods for creating, reading, and writing compressed files for use with a file access storage. The compressed data of a raw file are packed into a plurality of compressed units and stored as compressed files. One or more corresponding compressed units may be read and/or updated with no need for restoring the entire file while maintaining a de-fragmented structure of the compressed file. | 09-08-2011 |
20110218977 | SYSTEMS AND METHODS FOR COMPRESSION OF DATA FOR BLOCK MODE ACCESS STORAGE - Systems and methods for creating, reading, and writing compressed data for use with a block mode access storage. The compressed data are packed into plurality of compressed units and stored in a storage logical unit (LU). One or more corresponding compressed units may be read and/or updated with no need of restoring the entire storage logical unit while maintaining de-fragmented structure of the LU. | 09-08-2011 |
20110219144 | SYSTEMS AND METHODS FOR COMPRESSION OF DATA FOR BLOCK MODE ACCESS STORAGE - Methods and systems for creating, reading, and writing compressed data for use with a block mode access storage. The compressed data are packed into a plurality of compressed units and stored in a storage logical unit (LU). One or more corresponding compressed units may be read and/or updated with no need of restoring the entire storage logical unit while maintaining a de-fragmented structure of the LU. | 09-08-2011 |
20110219153 | SYSTEMS AND METHODS FOR COMPRESSION OF DATA FOR BLOCK MODE ACCESS STORAGE - Systems and methods for creating, reading, and writing compressed data for use with a block mode access storage. The compressed data are packed into plurality of compressed units and stored in a storage logical unit (LU). One or more corresponding compressed units may be read and/or updated with no need of restoring the entire storage logical unit while maintaining de-fragmented structure of the LU. | 09-08-2011 |
20110219186 | SYSTEMS AND METHODS FOR COMPRESSION OF DATA FOR BLOCK MODE ACCESS STORAGE - Systems and methods for creating, reading, and writing compressed data for use with a block mode access storage. The compressed data are packed into plurality of compressed units and stored in a storage logical unit (LU). One or more corresponding compressed units may be read and/or updated with no need of restoring the entire storage logical unit while maintaining de-fragmented structure of the LU. | 09-08-2011 |
20110227764 | SYSTEMS AND METHODS FOR COMPRESSION OF LOGICAL DATA OBJECTS FOR STORAGE - A compression system configured to compress logical data objects into one or more accommodation blocks with a predefined size, and a method of operating thereof are provided. The compression system includes a compression engine capable of compressing input data with the help of sequential encoding one or more input strings and a counter operatively coupled to the compression engine. The counter is configured to keep its ongoing value indicative of a number of input bytes in one or more strings successfully encoded into a given accommodation block; and, responsive to unsuccessful compression of a string into the given accommodation block, to provide the compression engine with information indicative of starting point in the input stream for encoding into the next accommodation block, thus giving rise to a “start indication.” | 09-22-2011 |
20110227765 | SYSTEMS AND METHODS FOR COMPRESSION OF LOGICAL DATA OBJECTS FOR STORAGE - A compression system configured to compress logical data objects into one or more accommodation blocks with a predefined size, and a method of operating thereof are provided. The compression system includes a compression engine capable of compressing input data with the help of sequential encoding one or more input strings and a counter operatively coupled to the compression engine. The counter is configured to keep its ongoing value indicative of a number of input bytes in one or more strings successfully encoded into a given accommodation block; and, responsive to unsuccessful compression of a string into the given accommodation block, to provide the compression engine with information indicative of starting point in the input stream for encoding into the next accommodation block, thus giving rise to a “start indication.” | 09-22-2011 |
20110231485 | SYSTEMS AND METHODS FOR COMPRESSION OF LOGICAL DATA OBJECTS FOR STORAGE - A compression system configured to compress logical data objects into one or more accommodation blocks with a predefined size, and a method of operating thereof are provided. The compression system includes a compression engine capable of compressing input data with the help of sequential encoding one or more input strings and a counter operatively coupled to the compression engine. The counter is configured to keep its ongoing value indicative of a number of input bytes in one or more strings successfully encoded into a given accommodation block; and, responsive to unsuccessful compression of a string into the given accommodation block, to provide the compression engine with information indicative of starting point in the input stream for encoding into the next accommodation block, thus giving rise to a “start indication.” | 09-22-2011 |
20110231619 | METHOD AND SYSTEM FOR TRANSFORMATION OF LOGICAL DATA OBJECTS FOR STORAGE - Systems capable of transformation of logical data objects for storage and methods of operating thereof are provided. One method includes identifying among a plurality of requests addressed to the storage device two or more “write” requests addressed to the same logical data object, deriving data chunks corresponding to identified “write” requests and transforming the derived data chunks, grouping the transformed data chunks in accordance with the order the requests have been received and in accordance with a predefined criteria, generating a grouped “write” request to the storage device, and providing mapping in a manner facilitating one-to-one relationship between the data in the obtained data chunks and the data to be read from the transformed logical object. The method further includes obtaining an acknowledging response from the storage device, multiplying the obtained acknowledging response, and sending respective acknowledgements to each source that initiated each respective “write” request. | 09-22-2011 |
20110231625 | SYSTEMS AND METHODS FOR TRANSFORMATION OF LOGICAL DATA OBJECTS FOR STORAGE - Systems capable of transformation of logical data objects for storage and methods of operating thereof are provided. One method includes identifying among a plurality of requests addressed to the storage device two or more “write” requests addressed to the same logical data object, deriving data chunks corresponding to identified “write” requests and transforming the derived data chunks, grouping the transformed data chunks in accordance with the order the requests have been received and in accordance with a predefined criteria, generating a grouped “write” request to the storage device, and providing mapping in a manner facilitating one-to-one relationship between the data in the obtained data chunks and the data to be read from the transformed logical object. The method further includes obtaining an acknowledging response from the storage device, multiplying the obtained acknowledging response, and sending respective acknowledgements to each source that initiated each respective “write” request. | 09-22-2011 |
20110231626 | METHOD AND SYSTEM FOR TRANSFORMATION OF LOGICAL DATA OBJECTS FOR STORAGE - Systems capable of transformation of logical data objects for storage and methods of operating thereof are provided. One method includes identifying among a plurality of requests addressed to the storage device two or more “write” requests addressed to the same logical data object, deriving data chunks corresponding to identified “write” requests and transforming the derived data chunks, grouping the transformed data chunks in accordance with the order the requests have been received and in accordance with a predefined criteria, generating a grouped “write” request to the storage device, and providing mapping in a manner facilitating one-to-one relationship between the data in the obtained data chunks and the data to be read from the transformed logical object. The method further includes obtaining an acknowledging response from the storage device, multiplying the obtained acknowledging response, and sending respective acknowledgements to each source that initiated each respective “write” request. | 09-22-2011 |
20110264634 | SYSTEMS AND METHODS FOR TRANSFORMATION OF LOGICAL DATA OBJECTS FOR STORAGE - Systems and methods for compressing a raw logical data object ( | 10-27-2011 |
20110276545 | SYSTEMS AND METHODS FOR TRANSFORMATION OF LOGICAL DATA OBJECTS FOR STORAGE - Systems and methods for compressing a raw logical data object ( | 11-10-2011 |
20110276546 | SYSTEMS AND METHODS FOR TRANSFORMATION OF LOGICAL DATA OBJECTS FOR STORAGE - Systems and methods for compressing a raw logical data object ( | 11-10-2011 |
20110276547 | SYSTEMS AND METHODS FOR TRANSFORMATION OF LOGICAL DATA OBJECTS FOR STORAGE - Systems and methods for compressing a raw logical data object ( | 11-10-2011 |
20110276548 | SYSTEMS AND METHODS FOR TRANSFORMATION OF LOGICAL DATA OBJECTS FOR STORAGE - Systems and methods for compressing a raw logical data object ( | 11-10-2011 |
20110295818 | METHOD AND SYSTEM FOR TRANSFORMATION OF LOGICAL DATA OBJECTS FOR STORAGE - Various embodiments for transforming a logical data object for storage in a storage device operable with at least one storage protocol are provided. In one such embodiment, the logical data object into one or more segments are divided with each segment characterized by respective start and end offsets. One or more obtained variable size data chunks are processed corresponding to the logical data object to obtain processed data chunks, wherein at least one of the processed data chunks comprises transformed data resulting from the processing. Each of the variable size data chunks is associated with a respective segment of the logical data object. The processed data chunks are sequentially accommodated in accordance with an order of chunks received while keeping the association with the respective segments | 12-01-2011 |
20110295819 | METHOD AND SYSTEM FOR TRANSFORMATION OF LOGICAL DATA OBJECTS FOR STORAGE - Various embodiments for transforming a logical data object for storage in a storage device operable with at least one storage protocol are provided. In one such embodiment, the logical data object into one or more segments are divided with each segment characterized by respective start and end offsets. One or more obtained variable size data chunks are processed corresponding to the logical data object to obtain processed data chunks, wherein at least one of the processed data chunks comprises transformed data resulting from the processing. Each of the variable size data chunks is associated with a respective segment of the logical data object. The processed data chunks are sequentially accommodated in accordance with an order of chunks received while keeping the association with the respective segments | 12-01-2011 |
20110302181 | METHOD OF STORING LOGICAL DATA OBJECTS AND SYSTEM THEREOF - Various embodiments for storing a logical object are provided. In one such embodiment, by way of example only, incoming data is divided corresponding to a logical data object into a plurality of independent streams, associating each data chunk of a plurality of obtained data chunks with a corresponding stream among the plurality of independent streams. At least one of the obtained data chunks and derivatives thereof is sequentially accommodated in accordance with an order the obtained chunks are received, while keeping the association with the corresponding streams. A global index is generated as a single meta-data stream accommodated in the logical data object and comprising information common to the plurality of independent streams and related to mapping between data in the logical data object and the obtained data chunks. | 12-08-2011 |
20110302218 | TRANSFORMATION OF LOGICAL DATA OBJECTS FOR STORAGE - Various embodiments for operating a transformation system, capable of transforming a logical data object (LO) to a transformed logical data object (TLO), are provided. In one such embodiment, an open LO request to a certain LO and addressed by the at least one client to the at least one storage device, is intercepted. An identifier (ID) in a header of a TLO corresponding to the requested LO and stored in the at least one storage device, is obtained. The obtained ID is used to characterize the TLO and the LO. A determination is made whether the transformation system handles at least one open LO characterized by an ID with a same value as the obtained ID. The requested LO is opened if at least one open LO is not found. An instance corresponding to the intercepted open LO request is generated. The instance is associated to the obtained ID. | 12-08-2011 |
20110302219 | TRANSFORMATION OF LOGICAL DATA OBJECTS FOR STORAGE - Various embodiments for operating a transformation system, capable of transforming a logical data object (LO) to a transformed logical data object (TLO), are provided. In one such embodiment, an open LO request to a certain LO and addressed by the at least one client to the at least one storage device, is intercepted. An identifier (ID) in a header of a TLO corresponding to the requested LO and stored in the at least one storage device, is obtained. The obtained ID is used to characterize the TLO and the LO. A determination is made whether the transformation system handles at least one open LO characterized by an ID with a same value as the obtained ID. The requested LO is opened if at least one open LO is not found. An instance corresponding to the intercepted open LO request is generated. The instance is associated to the obtained ID. | 12-08-2011 |
20110302380 | METHOD OF STORING LOGICAL DATA OBJECTS AND SYSTEM THEREOF - Various embodiments for storing a logical object are provided. In one such embodiment, by way of example only, incoming data is divided corresponding to a logical data object into a plurality of independent streams, associating each data chunk of a plurality of obtained data chunks with a corresponding stream among the plurality of independent streams. At least one of the obtained data chunks and derivatives thereof is sequentially accommodated in accordance with an order the obtained chunks are received, while keeping the association with the corresponding streams. A global index is generated as a single meta-data stream accommodated in the logical data object and comprising information common to the plurality of independent streams and related to mapping between data in the logical data object and the obtained data chunks. | 12-08-2011 |
20120117341 | METHOD AND SYSTEM FOR TRANSFORMATION OF LOGICAL DATA OBJECTS FOR STORAGE - There are provided a method of transforming a non-transformed stored logical data object (LO) device into a transformed LO and system thereof. The method comprises: a) in response to a respective transformation request, logically dividing the non-transformed LO in a first segment and one or more non-transformed subsequent segments, the segments having predefined size; b) generating a header for the respective transformed LO; c) processing said first segment; d) overwriting said first segment by said generated header and said transformed first segment; e) indexing said first transformed segment and said one or more non-transformed subsequent segments as constituting a part of said transformed LO; f) generating at least one index section; and g) updating the indication in the header to point that the non-transformed LO has been transformed in the transformed LO comprising said generated header, said first transformed segment, said one or more subsequent segments comprising data in non-transformed form and said at least one index section. | 05-10-2012 |
20120265740 | METHOD AND SYSTEM FOR COMPRESSION OF FILES FOR STORAGE AND OPERATION ON COMPRESSED FILES - Methods and systems for creating, reading, and writing compressed data for use with a block mode access storage. The compressed data are packed into a plurality of compressed units and stored in a storage logical unit (LU). One or more corresponding compressed units may be read and/or updated with no need of restoring the entire storage logical unit while maintaining a de-fragmented structure of the LU. | 10-18-2012 |
20120284241 | SYSTEMS AND METHODS FOR COMPRESSING FILES FOR STORAGE AND OPERATION ON COMPRESSED FILES - Methods and systems for creating, reading, and writing compressed files in a computer system comprising a file system coupled with storage medium and at least one application program interface (API) configured to communicate with the file system by means of file access-related requests are provided. The file access-related requests are intercepted in order to provide at least one of the following: a) to derive and compress data corresponding to the intercepted file access request and to facilitate storing the compressed data at the storage medium as a compressed file; b) to facilitate restoring at least part of compressed data corresponding to the intercepted file request and communicating the resulting data through the API. The compressed files comprise plurality of compressed units. One or more corresponding compressed units may be read and/or updated with no need of restoring the entire file whilst maintaining de-fragmented structure of the compressed file. | 11-08-2012 |
20120284242 | SYSTEMS AND METHODS FOR COMPRESSING FILES FOR STORAGE AND OPERATION ON COMPRESSED FILES - Methods and systems for creating, reading, and writing compressed files in a computer system comprising a file system coupled with storage medium and at least one application program interface (API) configured to communicate with the file system by means of file access-related requests are provided. The file access-related requests are intercepted in order to provide at least one of the following: a) to derive and compress data corresponding to the intercepted file access request and to facilitate storing the compressed data at the storage medium as a compressed file; b) to facilitate restoring at least part of compressed data corresponding to the intercepted file request and communicating the resulting data through the API. The compressed files comprise plurality of compressed units. One or more corresponding compressed units may be read and/or updated with no need of restoring the entire file whilst maintaining de-fragmented structure of the compressed file. | 11-08-2012 |
20130024433 | REAL-TIME COMPRESSION OF TABULAR DATA - Exemplary method, system, and computer program product embodiments for real-time column compression of data are provided. In one embodiment, by way of example only, a data structure is estimated for an initially unknown structured data. The estimated data structure is placed in a stream. A columnar compression operation is applied to the stream to generate an achieved compression ratio. The stream is compressed. Feedback of the achieved compression ratio is analyzed from the stream to determine if an optimal one of the columnar compression operations has been applied. If the optimal one of the columnar compression operations has been applied, the actual data structure of the initially unknown structured data is determined. | 01-24-2013 |
20130044961 | REAL-TIME IMAGE COMPRESSION - Exemplary method, system, and computer program product embodiments for real-time image recompression are provided. In one embodiment, by way of example only, compressed segments that are identified as having used at least one of a plurality of inefficient compression operations are partially decoded. The compressed segments are recompressed by employing context mapping. Additional system and computer program product embodiments are disclosed and provide related advantages. | 02-21-2013 |
20130097210 | EFFICIENT GARBAGE COLLECTION IN A COMPRESSED JOURNAL FILE - Exemplary method, system, and computer program product embodiments for efficient garbage collection in a compressed journal file system are provided. In one embodiment, by way of example only, a map corresponding to data blocks with overwritten compressed journal entries is configured. Weighted conditions for each of the overwritten compressed journal entries are calculated. The weighted conditions are arranged in the map from lowest to highest. One of the weighted conditions includes a biasing variable towards selecting data blocks having free space at an end of at least one associated record. Additional system and computer program product embodiments are disclosed and provide related advantages. | 04-18-2013 |
20130179410 | REAL-TIME SELECTION OF COMPRESSION OPERATIONS - Exemplary method, system, and computer program product embodiments for real-time selection of compression operations are provided. In one embodiment, by way of example only, available compression operations are initialized according to an assigned success factor. The available compression operations are tested for determining if at least one of the compression operations yields a compression ratio greater than a minimal compression ratio. The available compression operations selected in real time for compressing at least one of the data blocks is applied. Additional system and computer program product embodiments are disclosed and provide related advantages. | 07-11-2013 |
20130185269 | REAL-TIME SELECTION OF COMPRESSION OPERATIONS - Exemplary method, system, and computer program product embodiments for real-time selection of compression operations are provided. In one embodiment, by way of example only, available compression operations are initialized according to an assigned success factor. The available compression operations are tested for determining if at least one of the compression operations yields a compression ratio greater than a minimal compression ratio. The available compression operations selected in real time for compressing at least one of the data blocks is applied. Additional system and computer program product embodiments are disclosed and provide related advantages. | 07-18-2013 |
20130185338 | EFFICIENT GARBAGE COLLECTION IN A COMPRESSED JOURNAL FILE - A map corresponding to data blocks with overwritten compressed journal entries is configured. Weighted conditions for each of the overwritten compressed journal entries are calculated. The weighted conditions are arranged in the map from lowest to highest. One of the weighted conditions includes a biasing variable towards selecting data blocks having free space at an end of at least one associated record. | 07-18-2013 |
20130318050 | DATA DEPULICATION USING SHORT TERM HISTORY - Exemplary system, and computer program product embodiments for data deduplication using short term history in a computing environment are provided. In one embodiment, by way of example only, a hash value is calculated on data chunks for a read operation. The calculated hash value is stored in a storage media. The calculated hash value is looked up in the storage media to verify if a current write operation was previously written and/or read. Additional system and computer program product embodiments are disclosed and provide related advantages. | 11-28-2013 |
20130318052 | DATA DEPULICATION USING SHORT TERM HISTORY - Exemplary embodiments for data deduplication using short term history in a computing environment are provided. In one embodiment, by way of example only, a hash value is calculated on data chunks for a read operation. The calculated hash value is stored in a storage media. The calculated hash value is looked up in the storage media to verify if a current write operation was previously written and/or read. Additional system and computer program product embodiments are disclosed and provide related advantages. | 11-28-2013 |
20130339322 | REDUCING DECOMPRESSION LATENCY IN A COMPRESSION STORAGE SYSTEM - In a compression processing storage system, using a pool of compression cores, the compression cores are assigned to process either compression operations, decompression operations, or decompression and compression operations, which are scheduled for processing. A maximum number of the compression cores are set for processing only the decompression operations, thereby lowering a decompression latency. A minimal number of the compression cores are allocated for processing the compression operations, thereby increasing compression latency. Upon reaching a throughput limit for the compression operations that causes the minimal number of the plurality of compression cores to reach a busy status, the minimal number of the plurality of compression cores for processing the compression operations is increased. | 12-19-2013 |
20130339635 | REDUCING READ LATENCY USING A POOL OF PROCESSING CORES - In a read processing storage system, using a pool of CPU cores, the CPU cores are assigned to process either write operations, read operations, and read and write operations, that are scheduled for processing. A maximum number of the CPU cores are set for processing only the read operations, thereby lowering a read latency. A minimal number of the CPU cores are allocated for processing the write operations, thereby increasing write latency. Upon reaching a throughput limit for the write operations that causes the minimal number of the plurality of CPU cores to reach a busy status, the minimal number of the plurality of CPU cores for processing the write operations is increased. | 12-19-2013 |
20130339750 | REDUCING DECRYPTION LATENCY FOR ENCRYPTION PROCESSING - In a storage system, using a pool of encryption processing cores, the encryption processing cores are assigned to process either encryption operations, decryption operations, and decryption and encryption operations, that are scheduled for processing. A maximum number of the encryption processing cores are set for processing only the decryption operations, thereby lowering a decryption latency. A minimal number of the encryption processing cores are allocated for processing the encryption operations, thereby increasing encryption latency. Upon reaching a throughput limit for the encryption operations that causes the minimal number of the plurality of encryption processing cores to reach a busy status, the minimal number of the plurality of encryption processing cores for processing the encryption operations is increased. | 12-19-2013 |
20140188823 | REDUCING FRAGMENTATION IN COMPRESSED JOURNAL STORAGE - A data chunk is compressed into a storage block when emitting the data chunk. If the data chunk is unable to be completely compressed into the storage block, attributes of the data chunk are analyzed for determining whether the data chunk should be split. If the data chunk should be split, a remaining portion of the data chunk is compressed to a next chronological storage block. If the data chunk should not be split, all of the data chunk is moved to the next chronological storage block while leaving any remaining space in the storage block as unused. | 07-03-2014 |
20140188824 | REDUCING FRAGMENTATION IN COMPRESSED JOURNAL STORAGE - A data chunk is compressed into a storage block when emitting the data chunk. If the data chunk is unable to be completely compressed into the storage block, attributes of the data chunk are analyzed for determining whether the data chunk should be split. If the data chunk should be split, a remaining portion of the data chunk is compressed to a next chronological storage block. If the data chunk should not be split, all of the data chunk is moved to the next chronological storage block while leaving any remaining space in the storage block as unused. | 07-03-2014 |
20140195497 | REAL-TIME IDENTIFICATION OF DATA CANDIDATES FOR CLASSIFICATION BASED COMPRESSION - Identification of data candidates for data processing is performed in real time by a processor device in a computing environment. Data candidates are sampled for performing a classification-based compression upon the data candidates. A heuristic is computed on a randomly selected data sample from the data candidate for determining if the data candidate may benefit from the classification-based compression. A decision is provided for approving the classification-based compression on the data candidates according to the heuristic. | 07-10-2014 |
20140195499 | REAL-TIME CLASSIFICATION OF DATA INTO DATA COMPRESSION DOMAINS - For real-time classification of data into data compression domains, a decision is made for which of the data compression domains write operations should be forwarded by reading randomly selected data of the write operations for computing a set of classifying heuristics thereby creating a fingerprint for each of the write operations. The write operations having a similar fingerprint are compressed together in a similar compression stream. | 07-10-2014 |
20140195500 | REAL-TIME IDENTIFICATION OF DATA CANDIDATES FOR CLASSIFICATION BASED COMPRESSION - Identification of data candidates for data processing is performed in real time by a processor device in a computing environment. Data candidates are sampled for performing a classification-based compression upon the data candidates. A heuristic is computed on a randomly selected data sample from the data candidate for determining if the data candidate may benefit from the classification-based compression. A decision is provided for approving the classification-based compression on the data candidates according to the heuristic. | 07-10-2014 |
20140250305 | REDUCING DECRYPTION LATENCY FOR ENCRYPTION PROCESSING - In a compression processing storage system, using a pool of encryption processing cores, the encryption processing cores are assigned to process either encryption operations, decryption operations, and decryption and encryption operations, that are scheduled for processing. A maximum number of the encryption processing cores are set for processing only the decryption operations, thereby lowering a decryption latency. A minimal number of the encryption processing cores are allocated for processing the encryption operations, thereby increasing encryption latency. Upon reaching a throughput limit for the encryption operations that causes the minimal number of the plurality of encryption processing cores to reach a busy status, the minimal number of the plurality of encryption processing cores for processing the encryption operations is increased. | 09-04-2014 |
20140279967 | DATA COMPRESSION USING COMPRESSION BLOCKS AND PARTITIONS - Compression blocks are divided into partitions creating a two dimensional divide of the compression blocks by slicing the compression blocks forming a first dimension and sub-partitioning the compression blocks into the partitions forming a second dimension. Each one of the partitions are compressed in separate compression streams. | 09-18-2014 |
20140347331 | CONTROLLING REAL-TIME COMPRESSION DETECTION - A detection learning module is used for enabling and/or disabling real-time compression detection by maintaining a history of real-time compression detection success for sampled data. The enabling or disabling of the real-time compression detection is based on a detection benefit function derived from a set of calculated heuristics indicating the real-time compression detection success on input streams. | 11-27-2014 |
20150095295 | REDUCING DECOMPRESSION LATENCY IN A COMPRESSION STORAGE SYSTEM - In a compression processing storage system, using a pool of compression cores, the compression cores are assigned to process either compression operations, decompression operations, or decompression and compression operations, which are scheduled for processing. A minimal number of the compression cores are allocated for processing the compression operations, thereby increasing compression latency. Upon reaching a throughput limit for the compression operations that causes the minimal number of the plurality of compression cores to reach a busy status, the minimal number of the plurality of compression cores for processing the compression operations is increased. | 04-02-2015 |
20150113220 | EFFICIENT ONE-PASS CACHE-AWARE COMPRESSION - Exemplary method, system, and computer program product embodiments for efficient one-pass cache-aware compression are provided. In one embodiment, by way of example only, an output of a fast compressor to Huffman encoding for achieving the one-pass cache-aware compression by using a predetermined Huffman-tree upon determining by the fast compressor a final representation of each data byte. | 04-23-2015 |
20150121017 | REDUCING READ LATENCY USING A POOL OF PROCESSING CORES - In a read processing storage system, using a pool of CPU cores, the CPU cores are assigned to process either write operations, read operations, and read and write operations, that are scheduled for processing. A minimal number of the CPU cores are allocated for processing the write operations, thereby increasing write latency. Upon reaching a throughput limit for the write operations that causes the minimal number of the plurality of CPU cores to reach a busy status, the minimal number of the plurality of CPU cores for processing the write operations is increased. | 04-30-2015 |
20150227565 | EFFICIENT CACHING OF HUFFMAN DICTIONARIES - A Huffman cache is used to hold Huffman dictionaries that are changeable for dynamically selecting literal frequencies that are similar, wherein the Huffman cache is a data storage cache. | 08-13-2015 |
Patent application number | Description | Published |
20090196860 | Isolated Primate Embryonic Cells and Methods of Generating and Using Same - An isolated primate embryonic cell is provided as well as cell cultures and cell lines derived therefrom. Also provided are methods of generating and using such cells. | 08-06-2009 |
20090311781 | METHODS OF EXPANDING EMBRYONIC STEM CEELS IN A SUSPENSION CULTURE - A method of expanding and maintaining human embryonic stem cells (ESCs) in an undifferentiated state by culturing the ESCs in a suspension culture under culturing conditions devoid of substrate adherence is provided. Also provided are a method of deriving ESC lines in the suspension culture and methods of generating lineage-specific cells from ESCs which were expanded in the suspension culture of the present invention. | 12-17-2009 |
20100021999 | Methods of preparing feeder cells-free, xeno-free human embryonic stem cells and stem cell cultures prepared using same - The present invention is of methods of establishing and propagating human embryonic stem cell lines using feeder cells-free, xeno-free culture systems and stem cells which are capable of being maintained in an undifferentiated, pluripotent and proliferative state in culture which is free of xeno contaminants and feeder cells. | 01-28-2010 |
20100129907 | HUMAN FORESKIN FIBROBLAST CONDITIONED MEDIA FOR CULTURING ES CELLS - A cell culture comprising human foreskin cells, the human foreskin cells being capable of maintaining stem cells in an undifferentiated state when co-cultured therewith. | 05-27-2010 |
20100196910 | METHODS OF GENERATING HUMAN CARDIAC CELLS AND TISSUES AND USES THEREOF - A method of generating cells predominantly displaying at least one characteristic associated with a cardiac phenotype is disclosed. The method comprises (a) partially dispersing a confluent cultured population of human stem cells, thereby generating a cell population including cell aggregates; (b) subjecting the cell aggregates to culturing conditions suitable for generating embryoid bodies; (c) subjecting the embryoid bodies to culturing conditions suitable for inducing cardiac lineage differentiation in at least a portion of the cells of the embryoid bodies, the culturing conditions suitable for inducing cardiac lineage differentiation including adherence of the embryoid bodies to a surface, and culture, medium supplemented with serum, thereby generating cells predominantly displaying at least one characteristic associated with a cardiac phenotype. | 08-05-2010 |
20100221829 | Media for culturing stem cells - Well-defined, xeno-free culture media which comprise a TGF-beta isoform or the chimera formed between IL6 and the soluble IL6 receptor (IL6RIL6), which are capable of maintaining stem cells, and particularly, human embryonic stem cells, in an undifferentiated state are provided. Also provided are cell cultures comprising the culture media and the stem cells and methods of expanding and deriving embryonic stem cells in such well-defined, xeno-free culture media. In addition, the present invention provides methods of differentiating ESCs or EBs formed therefrom for the generation of lineage specific cells. | 09-02-2010 |
20100233136 | ISOLATED POPULATIONS OF CELLS AND METHODS OF GENERATING AND USING SAME - An isolated homogeneous population of cells comprising a plurality of human ectodermal progenitor cells. Also provided are methods of generating and using the population of cells. | 09-16-2010 |
20120164117 | METHODS OF GENERATING HUMAN CARDIAC CELLS AND TISSUES AND USES THEREOF - A method of generating cells predominantly displaying at least one characteristic associated with a cardiac phenotype is disclosed. The method comprises (a) partially dispersing a confluent cultured population of human stem cells, thereby generating a cell population including cell aggregates; (b) subjecting the cell aggregates to culturing conditions suitable for generating embryoid bodies; (c) subjecting the embryoid bodies to culturing conditions suitable for inducing cardiac lineage differentiation in at least a portion of the cells of the embryoid bodies, the culturing conditions suitable for inducing cardiac lineage differentiation including adherence of the embryoid bodies to a surface, and culture, medium supplemented with serum, thereby generating cells predominantly displaying at least one characteristic associated with a cardiac phenotype. | 06-28-2012 |
20120214232 | METHODS OF CULTURING CELLS IN A MEDIUM COMPRISING TRANSFORMING GROWTH FACTOR BETA 1 AND BASIC FIBROBLAST GROWTH FACTOR - The present invention is of methods of establishing and propagating human embryonic stem cell lines using feeder cells-free, xeno-free culture systems and stem cells which are capable of being maintained in an undifferentiated, pluripotent and proliferative state in culture which is free of xeno contaminants and feeder cells. | 08-23-2012 |
20120225480 | CULTURE MEDIA, CELL CULTURES AND METHODS OF CULTURING PLURIPOTENT STEM CELLS IN AN UNDIFFERENTIATED STATE - Provided are serum-free culture media which comprise basic fibroblast growth factor (bFGF), transforming growth factor beta-3, ascorbic acid, xeno-free serum replacement and a lipid mixture. The media may also comprise an IL6R/IL6 chimera, or leukemia inhibitory factor (LIF); wherein the culture medium is capable of maintaining pluripotent stem cells in an undifferentiated state in the absence of feeder cell support. Also provided are cell cultures comprising pluripotent stem cells such as human embryonic stem cells and induced pluripotent stem (iPS) cells, and methods of using the same for expanding pluripotent stem cells in an undifferentiated state using two-dimensional or three-dimensional culture systems. Methods of expanding iPS cells in a suspension culture devoid of substrate adherence and cell encapsulation are also provided. | 09-06-2012 |
20130084563 | CO-CULTURING MAMMALIAN EMBRYONIC STEM CELLS WITH HUMAN FORESKIN FIBROBLASTS - A cell culture comprising human foreskin cells, the human foreskin cells being capable of maintaining stem cells in an undifferentiated state when co-cultured therewith. | 04-04-2013 |
20130108597 | ISOLATED PRIMATE EMBRYONIC CELLS DERIVED FROM EXTENDED BLASTOCYSTS | 05-02-2013 |
20130236961 | NOVEL METHODS AND CULTURE MEDIA FOR CULTURING PLURIPOTENT STEM CELLS - Provided is an isolated population of human pluripotent stem cells comprising at least 50% human pluripotent stem cells characterized by an OCT4 | 09-12-2013 |
20130252329 | MEDIA FOR CULTURING STEM CELLS - Well-defined, xeno-free culture media which comprise a TGF-beta isoform or the chimera formed between IL6 and the soluble IL6 receptor (IL6RIL6), which are capable of mainataining stem cells, and particularly, human embryonic stem cells, in an undifferentiated state are provided. Also provided are cell cultures comprising the culture media and the stem cells and methods of expanding and deriving embryonic stem cells in such well-defined, xeno-free culture media. In addition, the present invention provides methods of differentiating ESCs or EBs formed therefrom for the generation of lineage specific cells. | 09-26-2013 |
20140045266 | METHODS OF CULTURING CELLS IN A MEDIUM COMPRISING TRANSFORMING GROWTH FACTOR BETA 1 AND BASIC FIBROBLAST GROWTH FACTOR - The present invention is of methods of establishing and propagating human embryonic stem cell lines using feeder cells-free, xeno-free culture systems and stem cells which are capable of being maintained in an undifferentiated, pluripotent and proliferative state in culture which is free of xeno contaminants and feeder cells. | 02-13-2014 |
20140356950 | METHODS OF DERIVING MAMMALIAN PLURIPOTENT STEM CELL LINES - A cell culture comprising human foreskin cells, the human foreskin cells being capable of maintaining stem cells in an undifferentiated state when co-cultured therewith. | 12-04-2014 |
20150104871 | MEDIUM COMPRISING TRANSFORMING GROWTH FACTOR BETA 1 AND BASIC FIBROBLAST GROWTH FACTOR - The present invention is of methods of establishing and propagating human embryonic stem cell lines using feeder cells-free, xeno-free culture systems and stem cells which are capable of being maintained in an undifferentiated, pluripotent and proliferative state in culture which is free of xeno contaminants and feeder cells. | 04-16-2015 |
Patent application number | Description | Published |
20100077063 | SYSTEM AND METHOD FOR EMULATING A COMPUTING DEVICE - A system apparatus and method for emulating a computing device are provided. Operational parameters of a server may be obtained and provided to an emulating computing device. An emulating device may emulate the server. While being emulated, a server may operate in a reduced functionality mode. Emulation of a server may be transparent to client or other machines associated with an emulated server. Conditions requiring a termination of an emulation of a server may be detected. Upon detecting conditions requiring a termination of an emulation of a server, operational or other parameters may be provided to the server and the server may assume full, or other, operational mode. Other embodiments are described and claimed. | 03-25-2010 |
20110218970 | SYSTEMS AND METHODS FOR COMPRESSION OF DATA FOR BLOCK MODE ACCESS STORAGE - Methods and systems for creating, reading, and writing compressed data for use with a block mode access storage. The compressed data are packed into a plurality of compressed units and stored in a storage logical unit (LU). One or more corresponding compressed units may be read and/or updated with no need of restoring the entire storage logical unit while maintaining a de-fragmented structure of the LU. | 09-08-2011 |
20110218974 | SYSTEMS AND METHODS FOR COMPRESSING FILES FOR STORAGE AND OPERATION ON COMPRESSED FILES - Methods and systems for creating, reading, and writing compressed files in a computer system comprising a file system coupled with storage medium and at least one application program interface (API) configured to communicate with the file system by means of file access-related requests are provided. The file access-related requests are intercepted in order to provide at least one of the following: a) to derive and compress data corresponding to the intercepted file access request and to facilitate storing the compressed data at the storage medium as a compressed file; b) to facilitate restoring at least part of compressed data corresponding to the intercepted file request and communicating the resulting data through the API. The compressed files comprise plurality of compressed units. One or more corresponding compressed units may be read and/or updated with no need of restoring the entire file whilst maintaining de-fragmented structure of the compressed file. | 09-08-2011 |
20110218975 | METHOD AND SYSTEM FOR COMPRESSION OF FILES FOR STORAGE AND OPERATION ON COMPRESSED FILES - Methods and systems for creating, reading, and writing compressed data for use with a block mode access storage. The compressed data are packed into a plurality of compressed units and stored in a storage logical unit (LU). One or more corresponding compressed units may be read and/or updated with no need of restoring the entire storage logical unit while maintaining a de-fragmented structure of the LU. | 09-08-2011 |
20110218976 | METHOD AND SYSTEM FOR COMPRESSION OF FILES FOR STORAGE AND OPERATION ON COMPRESSED FILES - Systems and methods for creating, reading, and writing compressed files for use with a file access storage. The compressed data of a raw file are packed into a plurality of compressed units and stored as compressed files. One or more corresponding compressed units may be read and/or updated with no need for restoring the entire file while maintaining a de-fragmented structure of the compressed file. | 09-08-2011 |
20110218977 | SYSTEMS AND METHODS FOR COMPRESSION OF DATA FOR BLOCK MODE ACCESS STORAGE - Systems and methods for creating, reading, and writing compressed data for use with a block mode access storage. The compressed data are packed into plurality of compressed units and stored in a storage logical unit (LU). One or more corresponding compressed units may be read and/or updated with no need of restoring the entire storage logical unit while maintaining de-fragmented structure of the LU. | 09-08-2011 |
20110219144 | SYSTEMS AND METHODS FOR COMPRESSION OF DATA FOR BLOCK MODE ACCESS STORAGE - Methods and systems for creating, reading, and writing compressed data for use with a block mode access storage. The compressed data are packed into a plurality of compressed units and stored in a storage logical unit (LU). One or more corresponding compressed units may be read and/or updated with no need of restoring the entire storage logical unit while maintaining a de-fragmented structure of the LU. | 09-08-2011 |
20110219153 | SYSTEMS AND METHODS FOR COMPRESSION OF DATA FOR BLOCK MODE ACCESS STORAGE - Systems and methods for creating, reading, and writing compressed data for use with a block mode access storage. The compressed data are packed into plurality of compressed units and stored in a storage logical unit (LU). One or more corresponding compressed units may be read and/or updated with no need of restoring the entire storage logical unit while maintaining de-fragmented structure of the LU. | 09-08-2011 |
20110219186 | SYSTEMS AND METHODS FOR COMPRESSION OF DATA FOR BLOCK MODE ACCESS STORAGE - Systems and methods for creating, reading, and writing compressed data for use with a block mode access storage. The compressed data are packed into plurality of compressed units and stored in a storage logical unit (LU). One or more corresponding compressed units may be read and/or updated with no need of restoring the entire storage logical unit while maintaining de-fragmented structure of the LU. | 09-08-2011 |
20110301628 | TECHNIQUES FOR USE WITH A NAIL PENETRATION DEVICE - Apparatus and methods are described for cutting a hole in a nail of a subject. The apparatus includes an element having a nail-contacting cutting surface for contacting the subject's nail. A control unit is configured to generate a hole in the subject's nail by moving the nail-contacting surface in a back-and-forth motion, while the nail-contacting surface is in contact with the subject's nail. Other applications are also described. | 12-08-2011 |
20120265740 | METHOD AND SYSTEM FOR COMPRESSION OF FILES FOR STORAGE AND OPERATION ON COMPRESSED FILES - Methods and systems for creating, reading, and writing compressed data for use with a block mode access storage. The compressed data are packed into a plurality of compressed units and stored in a storage logical unit (LU). One or more corresponding compressed units may be read and/or updated with no need of restoring the entire storage logical unit while maintaining a de-fragmented structure of the LU. | 10-18-2012 |
20120284241 | SYSTEMS AND METHODS FOR COMPRESSING FILES FOR STORAGE AND OPERATION ON COMPRESSED FILES - Methods and systems for creating, reading, and writing compressed files in a computer system comprising a file system coupled with storage medium and at least one application program interface (API) configured to communicate with the file system by means of file access-related requests are provided. The file access-related requests are intercepted in order to provide at least one of the following: a) to derive and compress data corresponding to the intercepted file access request and to facilitate storing the compressed data at the storage medium as a compressed file; b) to facilitate restoring at least part of compressed data corresponding to the intercepted file request and communicating the resulting data through the API. The compressed files comprise plurality of compressed units. One or more corresponding compressed units may be read and/or updated with no need of restoring the entire file whilst maintaining de-fragmented structure of the compressed file. | 11-08-2012 |
20120284242 | SYSTEMS AND METHODS FOR COMPRESSING FILES FOR STORAGE AND OPERATION ON COMPRESSED FILES - Methods and systems for creating, reading, and writing compressed files in a computer system comprising a file system coupled with storage medium and at least one application program interface (API) configured to communicate with the file system by means of file access-related requests are provided. The file access-related requests are intercepted in order to provide at least one of the following: a) to derive and compress data corresponding to the intercepted file access request and to facilitate storing the compressed data at the storage medium as a compressed file; b) to facilitate restoring at least part of compressed data corresponding to the intercepted file request and communicating the resulting data through the API. The compressed files comprise plurality of compressed units. One or more corresponding compressed units may be read and/or updated with no need of restoring the entire file whilst maintaining de-fragmented structure of the compressed file. | 11-08-2012 |
20130012891 | SKIN-TREATMENT AND DRUG-DELIVERY DEVICES - Apparatus for use with skin of a subject is provided, including a mount, a first zone of which is adhesively adherable to the skin. A second zone is not adhesively adherable to the skin. The mount is disposable in one shape and in another shape, at least one of the shapes being an unconstrained shape, the mount being deformable from the one shape to the other shape in response to application of a deforming force to the mount. When the mount moves toward the unconstrained shape, the movement is sudden regardless of a speed of application of the deforming force prior to the sudden movement. A treatment unit is provided, coupled to the mount, positioned with respect to the mount such that the treatment unit is moved into a position to apply a treatment to the subject by the mount moving toward the unconstrained shape. Other applications are also described. | 01-10-2013 |
Patent application number | Description | Published |
20100299754 | Identifying Security Breaches Caused by Web-Enabled Software Applications - Identifying a security breach caused when a computer-based software application uses a computer-based web browser application, including identifying at least one function within a computer-based software application that causes a computer-based web browser application to access data from a source that is external to the software application, at least partially replacing the data with malicious content that is configured to cause a predefined action to occur when the malicious content is accessed by the web browser application, where the predefined action is associated with a known security breach when the predefined action occurs subsequent to the malicious content being accessed by the web browser application, causing the software application to perform the function, and determining whether the predefined action is performed. | 11-25-2010 |
20110225234 | Preventing Cross-Site Request Forgery Attacks on a Server - Preventing Cross-Site Request Forgery (CSRF) security attacks on a server in a client-server environment. In one aspect, this comprises embedding a nonce and a script in all responses from the server to the client wherein, when executed, the script adds the nonce to each request from the client to the server; sending the response with the nonce and the script to the client; and verifying that each request from the client includes the nonce sent by the server from the server to the client. The script preferably modifies all objects, including dynamically generated objects, in a server response that may generate future requests to the server to add the nonce to the requests. The server verifies the nonce value in a request and optionally confirms the request with the client if the value is not the same as the value previously sent by the server. Server-side aspects might be embodied in the server or a proxy between the server and the client. | 09-15-2011 |
20110321168 | THWARTING CROSS-SITE REQUEST FORGERY (CSRF) AND CLICKJACKING ATTACKS - Embodiments of the invention generally relate to thwarting fraud perpetrated with a computer by receiving a request from a computer to perform a transaction. Embodiments of the invention may include receiving the request together with transaction data and a cookie, where the transaction data are separate from the cookie; determining in accordance with predefined validation criteria whether the cookie includes a valid representation of the transaction data; and performing the transaction only if the cookie includes a valid representation of the transaction data. | 12-29-2011 |
20120180128 | Preventing Cross-Site Request Forgery Attacks on a Server - Preventing Cross-Site Request Forgery security attacks on a server in a client-server environment. In one aspect, this comprises embedding a nonce and a script in all responses from the server to the client wherein, when executed, the script adds the nonce to each request from the client to the server; sending the response with the nonce and the script to the client; and verifying that each request from the client includes the nonce sent by the server to the client. The script preferably modifies all objects, including dynamically generated objects, in a server response that may generate future requests to the server to add the nonce to the requests. The server verifies the nonce value in a request and optionally confirms the request with the client if the value differs from the value previously sent. Server-side aspects might be embodied in the server or a proxy. | 07-12-2012 |
20120311711 | DETECTING PERSISTENT VULNERABILITIES IN WEB APPLICATIONS - A method, including storing a test payload to a persistent state of an application and performing a static analysis to identify a first code location in the application that retrieves the test payload, to identify a first path from an entry point to the first code location, and to identify a second path from the first code location to a second code location that executes a security sensitive operation using the retrieved data. A dynamic analysis is then performed to retrieve the test payload via the first path, and to convey the test payload to the second code location via the second path. | 12-06-2012 |
20120311713 | DETECTING PERSISTENT VULNERABILITIES IN WEB APPLICATIONS - A method, including storing a test payload to a persistent state of an application and performing a static analysis to identify a first code location in the application that retrieves the test payload, to identify a first path from an entry point to the first code location, and to identify a second path from the first code location to a second code location that executes a security sensitive operation using the retrieved data. A dynamic analysis is then performed to retrieve the test payload via the first path, and to convey the test payload to the second code location via the second path. | 12-06-2012 |
20130055397 | DETECTING STORED CROSS-SITE SCRIPTING VULNERABILITIES IN WEB APPLICATIONS - A system for detecting security vulnerabilities in web applications, the system including, a black-box tester configured to provide a payload to a web application during a first interaction with the web application at a computer server, where the payload includes a payload instruction and an identifier, and an execution engine configured to detect the identifier within the payload received during an interaction with the web application subsequent to the first interaction, and determine, responsive to detecting the identifier within the payload, whether the payload instruction underwent a security check prior to execution of the payload instruction. | 02-28-2013 |
20130055402 | DETECTING STORED CROSS-SITE SCRIPTING VULNERABILITIES IN WEB APPLICATIONS - A method for detecting security vulnerabilities in web applications can include providing a payload to a web application during a first interaction with the web application at a computer server, where the payload includes a payload instruction and an identifier, detecting the identifier within the payload received during an interaction with the web application subsequent to the first interaction, and determining, responsive to detecting the identifier within the payload, whether the payload instruction underwent a security check prior to execution of the payload instruction. | 02-28-2013 |
20130111594 | DETECTION OF DOM-BASED CROSS-SITE SCRIPTING VULNERABILITIES | 05-02-2013 |
20130111595 | DETECTION OF DOM-BASED CROSS-SITE SCRIPTING VULNERABILITIES | 05-02-2013 |
20130166676 | DETECTION OF CUSTOM PARAMETERS IN A REQUEST URL - Identifying at least one custom parameter in a request uniform resource locator (URL). At least a first portion of source code of a Web application that typically consumes the custom parameter provided in the request URL can be identified. The Web application can be instrumented at the first portion of the source code. The Web application can receive the request URL and the Web application can be executed with the instrumented source code. At least one run-time value consumed by the second portion of the source code can be identified, and the run-time value can be compared to the request URL to determine whether the run-time value intersects with the request URL. Responsive to determining that the run-time value intersects with the request URL, the run-time value can be identified as the custom parameter. A custom parameter rule can be generated based on the comparison. | 06-27-2013 |
20130167124 | DETECTION OF CUSTOM PARAMETERS IN A REQUEST URL - Identifying at least one custom parameter in a request uniform resource locator (URL). The method can include identifying at least a first portion of source code of a Web application that typically consumes the custom parameter provided in the request URL and, via a processor, instrumenting the Web application at the first portion of the source code. The Web application can receive the request URL and the Web application can be executed with the instrumented source code. At least one run-time value consumed by the second portion of the source code can be identified, and the run-time value can be compared to the request URL to determine whether the run-time value intersects with the request URL. Responsive to determining that the run-time value intersects with the request URL, the run-time value can be identified as the custom parameter. A custom parameter rule can be generated based on the comparison. | 06-27-2013 |
20130167237 | DETECTION OF SECOND ORDER VULNERABILITIES IN WEB SERVICES - A system for detecting a vulnerability in a Web service can include a processor configured to initiate executable operations including determining whether a Web service uses identity of a requester to select one of a plurality of different paths of a branch in program code of the Web service and, responsive to determining that the Web service does select one of a plurality of different paths of a branch according to identity of the requester, indicating that the Web service has a potential vulnerability. | 06-27-2013 |
20130167239 | DETECTION OF SECOND ORDER VULNERABILITIES IN WEB SERVICES - A method of detecting a vulnerability in a Web service can include determining, using a processor, whether a Web service uses identity of a requester to select one of a plurality of different paths of a branch in program code of the Web service. The method further can include, responsive to determining that the Web service does select one of a plurality of different paths of a branch according to identity of the requester, indicating that the Web service has a potential vulnerability. | 06-27-2013 |
20130174260 | TARGETED SECURITY TESTING - Source code of a plurality of web pages including script code is statically analyzed. A page including a potential vulnerability is identified based on the static analysis. A page not including a potential vulnerability is identified based on the static analysis. The web page including the potential vulnerability is dynamically analyzed using a set of test payloads. The page not including the potential vulnerability is dynamically analyzed using a subset of the set of test payloads, the subset including fewer test payloads than the set of test payloads. | 07-04-2013 |
20130174262 | TARGETED SECURITY TESTING - Source code of a plurality of web pages including script code is statically analyzed. A page including a potential vulnerability is identified based on the static analysis. A page not including a potential vulnerability is identified based on the static analysis. The web page including the potential vulnerability is dynamically analyzed using a set of test payloads. The page not including the potential vulnerability is dynamically analyzed using a subset of the set of test payloads, the subset including fewer test payloads than the set of test payloads. | 07-04-2013 |
20130191913 | DYNAMICALLY SCANNING A WEB APPLICATION THROUGH USE OF WEB TRAFFIC INFORMATION - Collecting log file data from at least one log file. From the collected log file data, at least one HTTP request can be generated to exercise a web application to perform a security analysis of the web application. The HTTP request can be communicated to the web application. At least one HTTP response to the HTTP request can be received. The HTTP response can be analyzed to perform validation of the web application. Results of the validation can be output. | 07-25-2013 |
20130191920 | DYNAMICALLY SCANNING A WEB APPLICATION THROUGH USE OF WEB TRAFFIC INFORMATION - Collecting log file data from at least one log file. From the collected log file data, at least one HTTP request can be generated to exercise a web application to perform a security analysis of the web application. The HTTP request can be communicated to the web application. At least one HTTP response to the HTTP request can be received. The HTTP response can be analyzed to perform validation of the web application. Results of the validation can be output. | 07-25-2013 |
20130339724 | SELECTIVE ENCRYPTION IN MOBILE DEVICES - A method, product and system for selective encryption in a mobile device. The method comprising: selectively encrypting requests issued by the mobile device, wherein said selectively encrypting comprises: obtaining a request issued by an application executed by the mobile device, the request having one or more characteristics, the request has a destination; determining, based on the one or more characteristics, whether to encrypt the request; and in response to a determination to encrypt the request, re-routing the request to be transmitted to the destination through a secure channel; whereby the request is encrypted regardless of the destination being a priori associated with the secure channel. | 12-19-2013 |
20130340031 | ACCESS CONTROL SYSTEM FOR A MOBILE DEVICE - A method, apparatus and product that provide a access control system for mobile devices. The mobile device performing: selecting a proxy to handle a request to a remote server, the request is issued by a program being executed by the mobile device, wherein the proxy is configured to perform a security action in response to the request; and sending the request to the proxy; whereby selectively performing the predetermined security action on a portion of the requests issued by the mobile device. Additionally or alternatively, a computer performing: receiving from a mobile device, an instruction to provide a Proxy Auto Config (PAC) file; and generating a PAC file that comprises a function which is configured to receive a URL and return a proxy to handle a request to the URL, wherein the proxy is configured to perform a security action in response to receiving a request. | 12-19-2013 |
20140157406 | APPLICATION TESTING SYSTEM AND METHOD - A method, computer program product, and computer system for sending, by a first computing device, a payload from a plurality of payloads to a second computing device. A response from the second computing device responding to the payload is received at the first computing device. It is determined whether the payload has successfully attacked an application executing at the second computing device based upon, at least in part, the response. If not, at least a portion of the plurality of payloads that shares a structural overlap with the first payload is identified. At least a second payload of the portion is prevented from being sent to the second computing device in response to identifying that the second payload shares the structural overlap with the first payload. | 06-05-2014 |
20140157413 | APPLICATION TESTING SYSTEM AND METHOD - A method, computer program product, and computer system for sending, by a first computing device, a payload from a plurality of payloads to a second computing device. A response from the second computing device responding to the payload is received at the first computing device. It is determined whether the payload has successfully attacked an application executing at the second computing device based upon, at least in part, the response. If not, at least a portion of the plurality of payloads that shares a structural overlap with the first payload is identified. At least a second payload of the portion is prevented from being sent to the second computing device in response to identifying that the second payload shares the structural overlap with the first payload. | 06-05-2014 |
20150106889 | POTENTIAL ATTACK DETECTION BASED ON DUMMY NETWORK TRAFFIC - A method, apparatus and product for potential attack detection based on dummy network traffic. One embodiment includes a method comprising analyzing an activity, wherein the activity is performed in response to a message, wherein the message is transmitted by a first application that is executed by a computing device, wherein the computing device is connected to a computerized network, wherein the first application is configured to transmit the message in order to induce a potential attacker to perform a malicious activity, wherein said analyzing comprises comparing the activity to a predetermined expected activity in response to the message; and determining, based on the analysis of the activity, that a second application is under a potential attack; whereby an operation of the first application is capable of exposing potential attacks on the second application without monitoring network traffic of the second application. | 04-16-2015 |