| 12153661 |
Delegating multi-factor authentication in legacy databases |
Ron Ben-Natan, Gabriel Beyo, Rosa Miroshnikov |
2024-11-26 |
| 11763018 |
System and method for policy control in databases |
Ron Ben-Natan, Gabriel Beyo, Rosa Miroshnikov |
2023-09-19 |
| 11604923 |
High volume message classification and distribution |
Ron Ben-Natan, Derek DiFilippo, Uri Hershenhorn, Roman Krashanitsa, Luigi Labigalini |
2023-03-14 |
| 11416521 |
Data item classification and organization in large data sets |
Joey Andres, Ron Ben-Natan, Uri Hershenhorn, Dan Nguyen, Luigi Labigalini +1 more |
2022-08-16 |
| 11144580 |
Columnar storage and processing of unstructured data |
Ron Ben-Natan |
2021-10-12 |
| 10956672 |
High volume message classification and distribution |
Ron Ben-Natan, Derek DiFilippo, Uri Hershenhorn, Roman Krashanitsa, Luigi Labigalini |
2021-03-23 |
| 10642876 |
Query processing pipeline for semi-structured and unstructured data |
Ron Ben-Natan |
2020-05-05 |
| 10397279 |
Directing audited data traffic to specific repositories |
Sean C. Foley, Shidong Shan |
2019-08-27 |
| 10387466 |
Window queries for large unstructured data sets |
Ron Ben-Natan |
2019-08-20 |
| 10373058 |
Unstructured database analytics processing |
Ron Ben-Natan |
2019-08-06 |
| 10110637 |
Directing audited data traffic to specific repositories |
Sean C. Foley, Shidong Shan |
2018-10-23 |
| 9973536 |
Directing audited data traffic to specific repositories |
Sean C. Foley, Shidong Shan |
2018-05-15 |
| 9830369 |
Processor for database analytics processing |
Ron Ben-Natan |
2017-11-28 |
| 9760571 |
Tabular DB interface for unstructured data |
Ron Ben-Natan |
2017-09-12 |
| 9124619 |
Directing audited data traffic to specific repositories |
Sean C. Foley, Shidong Shan |
2015-09-01 |
| 9106682 |
Method for directing audited data traffic to specific repositories |
Sean C. Foley, Shidong Shan |
2015-08-11 |
| 9069628 |
Spooling system call data to facilitate data transformation |
Richard Ory Jerrell, Galia Diamant |
2015-06-30 |
| 8898796 |
Managing network data |
Ron Ben-Natan, Tamar Domany, Ariel Farkash, Igor Gokhman, Abigail Goldsteen +3 more |
2014-11-25 |
| 8141100 |
Identifying attribute propagation for multi-tier processing |
Ron Ben-Natan |
2012-03-20 |
| 6301699 |
Method for detecting buffer overflow for computer security |
Yona Hollander, Ophir Rahman, Shmuel Sagiv |
2001-10-09 |