| 12430366 |
Data classification using dynamically filtered formats |
Ariel Farkash |
2025-09-30 |
| 12411825 |
Expanding database column names |
Boris Rozenberg, Yehoshua Sagron, Ariel Farkash, Igor Gokhman |
2025-09-09 |
| 12411851 |
Ranking instances of composite subtraction format using ranked intervals |
Ariel Farkash |
2025-09-09 |
| 12293153 |
Fuzzy matching of obscure texts with meaningful terms included in a glossary |
Shlomit I. Shachor, Natalia Razinkov, Omer Y. Boehm |
2025-05-06 |
| 12254110 |
Searching, matching, and masking of composite formats |
Ariel Farkash |
2025-03-18 |
| 12229555 |
Generating masks for formats including masking restrictions |
Ariel Farkash |
2025-02-18 |
| 12141706 |
Data generalization for predictive models |
Gilad Ezov, Ariel Farkash, Abigail Goldsteen, Ron Shmelkin |
2024-11-12 |
| 11949667 |
Masking composite payloads using policy graphs |
Ariel Farkash |
2024-04-02 |
| 11893132 |
Discovery of personal data in machine learning models |
Abigail Goldsteen, Ariel Farkash |
2024-02-06 |
| 11841977 |
Training anonymized machine learning models via generalized data generated using received trained machine learning models |
Abigail Goldsteen, Ariel Farkash, Gilad Ezov, Ron Shmelkin |
2023-12-12 |
| 11675976 |
Exploitation of domain restrictions for data classification |
Sigal Asaf, Ariel Farkash, Lev Greenberg |
2023-06-13 |
| 11281728 |
Data generalization for predictive models |
Gilad Ezov, Ariel Farkash, Abigail Goldsteen, Ron Shmelkin |
2022-03-22 |
| 11240044 |
Verifying purpose of data usage at sub-application granularity |
Ariel Farkash, Abigail Goldsteen |
2022-02-01 |
| 11194841 |
Value classification by contextual classification of similar values in additional documents |
Sigal Asaf, Ariel Farkash |
2021-12-07 |
| 10360402 |
Intercepting sensitive data using hashed candidates |
Ariel Farkash, Ayman Jarrous, Gal Peretz, Tamer Salman |
2019-07-23 |
| 10148423 |
Data security system with identifiable format-preserving encryption |
Ariel Farkash, Abigail Goldsteen |
2018-12-04 |
| 10032043 |
Masking sensitive data in mobile applications |
Ariel Farkash, Abigail Goldsteen |
2018-07-24 |
| 9984247 |
Password theft protection for controlling access to computer software |
Ariel Farkash, Ayman Jarrous |
2018-05-29 |
| 9864871 |
Masking of haptic data |
Ariel Farkash, Mattias Marder |
2018-01-09 |
| 9858431 |
Seamless data masking for PaaS based applications |
Ariel Farkash, Igor Gokhman, Abigail Goldsteen |
2018-01-02 |
| 9021608 |
Methods and apparatus for sharing, transferring and removing previously owned digital media |
Lawrence S. Rogel, John M. Ossenmacher, Amihai Viks, Xiao Zou |
2015-04-28 |
| 8719936 |
VMM-based intrusion detection system |
David Kaeli, Aviram Cohen, Javed Aslam, Malak Alshawabkeh, Jennifer Dy +1 more |
2014-05-06 |
| 8627500 |
Methods and apparatus for sharing, transferring and removing previously owned digital media |
Lawrence S. Rogel, John M. Ossenmacher, Amihai Viks |
2014-01-07 |
| 7047395 |
Reordering serial data in a system with parallel processing flows |
Roni Rosner, Abraham Mendelson |
2006-05-16 |