Patent application number | Description | Published |
20100296441 | WIRELESS INTERNET SYSTEM AND METHOD - A method for providing a wireless Internet connection to WiFi-enabled devices (STAs) comprising: wirelessly connecting a first STA to the Internet through a first AP with a first SSID; remaining connected to the first Access Point (AP), the first STA creates a software-based wireless AP with a second SSID for wirelessly connecting other STAs to the Internet through the first STA. A software module running on the first STA allows a second STA a wide access to the Internet only if the second STA has a copy of the software module running installed and active therein. A method for configuring STAs to connect to a wireless network, comprising: a customer first connects a STA by wire to its network; a software on the STA copies to the STA the security information gained through the wired connection, thus setting the security parameters for the STA. | 11-25-2010 |
20110268278 | Systems, Devices and Methods for Providing Access to a Distributed Network - In a cellular network system, an add-on base station ( | 11-03-2011 |
20110280393 | Cryptanalysis Method and System - A cryptanalysis method comprising:
| 11-17-2011 |
20120314683 | SYSTEMS, DEVICES AND METHODS FOR PROVIDING ACCESS TO A DISTRIBUTED NETWORK - Systems and apparatus, and methods relating thereto, can be implemented to include base station having a transceiver adapted to establish a radio-frequency link with a mobile telephone; a first interface, separate from said transceiver, that is adapted for communication over the public Internet; and a controller. The controller can be adapted to obtain, from a server accessed via the public Internet, gateway address information for a remote gateway that provides an interface between the public Internet and a network of a telephone service provider and route data from the mobile telephone, over the public Internet, to the remote gateway. | 12-13-2012 |
20130083918 | Cryptanalysis Method and System - A cryptanalysis method comprising:
| 04-04-2013 |
20150244519 | Cryptanalysis Method and System - A cryptanalysis method comprising:
| 08-27-2015 |
Patent application number | Description | Published |
20160072955 | ESTABLISHING TELEPHONE COMMUNICATIONS WITH SECONDARY DEVICES - A method, system, and apparatus, including a program encoded on computer-readable medium, for providing ring notifications in parallel to a primary incoming call are disclosed. An example method can include receiving, at a server system, a notification of a primary incoming call directed to a subscriber telephone number associated with a user device, notifying, by the server system, one or more secondary destinations of the primary incoming call based on the notification, sending, from the server system, an instruction to perform one or more operations to trigger forwarding of the primary incoming call to a telephone number associated with the server system, wherein the instruction is only sent after notifying the one or more secondary destinations of the primary incoming call, receiving the forwarded incoming call at the server system, and connecting, by the server system, the forwarded incoming call to a particular secondary destination. | 03-10-2016 |
Patent application number | Description | Published |
20140086101 | Wireless internet system and method - A method for providing a wireless Internet connection to WiFi-enabled devices (STAs) comprising: wirelessly connecting a first STA to the Internet through a first AP with a first SSID; remaining connected to the first Access Point (AP), the first STA creates a software-based wireless AP with a second SSID for wirelessly connecting other STAs to the Internet through the first STA. A software module running on the first STA allows a second STA a wide access to the Internet only if the second STA has a copy of the software module running installed and active therein. A method for configuring STAs to connect to a wireless network, comprising: a customer first connects a STA by wire to its network; a software on the STA copied to the STA the security information gained through the wired connection, thus setting the security parameters for the STA. | 03-27-2014 |
20150201358 | Wireless Internet System and Method - A method, system, and apparatus, including a program encoded on computer-readable medium, for transmitting data to a server. A wireless communication connection is established between a first computing device and a second computing device. Data transmitted from the first computing device to the second computing device is received over the wireless communication connection and stored on the second computing device for uploading to a server on an IP based network. The wireless communication connection is disconnected. An IP communication connection is established between the second computing device and the server on the IP based network, and at least a portion of the stored data is transmitted from the second computing device to the server on the IP based network over the IP communication connection after the wireless communication connection between the first computing device and the second computing device is disconnected. | 07-16-2015 |
20150230087 | VERIFYING AN ASSOCIATION BETWEEN AN APPLICATION AND A MOBILE DEVICE THROUGH A TELECOMMUNICATION NETWORK - A system for verifying an association between an application and a mobile computing device. The system receives a request to verify the application, which has an application instance identifier, on the mobile computing device. The system also obtains a mobile device identifier used to communicate with the mobile computing device. The system initiates one or more telephone call setup messages, which signal a voice call request, to the mobile computing device using the mobile device identifier. Based on receiving an indication that the one or more telephone call setup messages were detected at the mobile computing device, the system associates the application instance identifier with the mobile device identifier. | 08-13-2015 |
20150230088 | VERIFYING AN ASSOCIATION BETWEEN AN APPLICATION AND A MOBILE DEVICE THROUGH A TELECOMMUNICATION NETWORK - A system for verifying an association between an application and a mobile computing device. The mobile computing device transmits a request to a service to verify the application, which has an application instance identifier. A mobile device identifier, used to establish a communication channel with the mobile computing device, is also conveyed to the service. The mobile computing device receives one or more telephone call setup messages directed to the mobile device identifier, each of which signal a voice call request, and provides an indication to the service of the receipt of the telephone call setup messages. In response to receiving the indication, the service establishes an association between the application instance identifier and the mobile device identifier. | 08-13-2015 |
20150230089 | VERIFYING AN APPLICATION IDENTIFIER ON A MOBILE DEVICE THROUGH A TELECOMMUNICATION NETWORK - A system for verifying an association between an application and a mobile computing device. The application is identified by an application instance identifier, which uniquely identifies the instance of the application on the mobile computing device. The system receives a request to verify the application, including the application instance identifier. The system also obtains a mobile device identifier used to communicate with the mobile computing device. The system initiates one or more telephone call setup messages, which signal a voice call request, to the mobile computing device using the mobile device identifier. Based on receiving an indication that the one or more telephone call setup messages were detected at the mobile computing device, the system associates the application instance identifier with the mobile device identifier. | 08-13-2015 |
20150230090 | AUTHORIZING MOBILE APPLICATION ACCESS TO A SERVICE THROUGH A TELECOMMUNICATION NETWORK - A system for authorizing access to a service by a mobile computing device. The mobile computing device, which is identified by a mobile device identifier, requests authorization to access the service from an application, which has an application instance identifier. A telephone call setup message, which signals a voice call request, is received by the mobile computing device. The mobile computing device disables user interface or notification features of the device prior to receiving the telephone call setup message, and the telephone call setup message is terminated before a voice connection is established with the device. After receiving the telephone call setup message, the mobile computing device sends a communication that causes an association to be made between the mobile device identifier and application instance identifier, enabling authorized access to the service by the device. The mobile computing device then re-enables the user interface or notification features. | 08-13-2015 |
Patent application number | Description | Published |
20090144056 | Method and computer program product for generating recognition error correction information - A method for providing recognition error correction information, the method includes: obtaining metadata associated with a capture of a media item; and generating recognition error correction information in response to the metadata. The recognition error correction information is to be used in a recognition process selected out of a list consisting of an automatic speech recognition process and an optical characters recognition process. | 06-04-2009 |
20090164512 | Method and Computer Program Product for Managing Media Items - A method and computer program product for managing media items, the method includes: clustering media items to media item groups and assigning a semantic event descriptor to each media item group in response to capture time of multiple media items, capture locations of multiple media items, event scheduling information and information extracted from media items; wherein the assigning of the semantic event descriptor is responsive to a type of the event. | 06-25-2009 |
20090169106 | Method and Computer Program Product for Recognition Error Correction Data - A method for altering a recognition error correction data structure, the method includes: altering at least one key out of a set of semantically similar keys in response to text appearance probabilities of keys of the set of semantically similar keys to provide an at least one altered key; and replacing the at least one key by the at least one altered key. | 07-02-2009 |
20100067794 | OPTICAL CHARACTER RECOGNITION VERIFICATION - A method for optical character recognition (OCR) verification, the method includes: receiving a first character image that was obtained from applying an OCR process on a document; wherein the first character image is classified, by the OCR, as being associated with a first character; receiving a first character code of a text; replacing the first character code by the first character image; and evaluating a correctness of the OCR based upon a response of a user to a display of the text first character image. | 03-18-2010 |
20110038542 | COMPUTER APPLICATION ANALYSIS - A method, system, and computer program product for computer application analysis are provided. The method for computer application analysis includes monitoring a computer system on which an application to be analyzed is executed and interacted with by a user of the computer system. The monitoring includes: capturing screen data of the application as displayed on a display screen of the computer system including interpreting the screen data using optical character recognition (OCR); and capturing user inputs to the application to input devices of the computer system. The method further includes analyzing the captured screen data and user inputs to generate a summary of the usage of the application. | 02-17-2011 |
20120296856 | Recognition Techniques to Enhance Automation In a Computing Environment - Systems and methods for detecting end of a transaction in a computing environment are provided. The method comprises determining a target area in a graphical user environment displayed on a display screen, wherein a change is expected to occur when end of a transaction is reached; masking the target area at least partially to remove content included in the target area that is present before or after the transaction was initiated; monitoring the target area for change in content; and detecting the end of the transaction when the content of the target area has changed. | 11-22-2012 |
20140101660 | Recognition Techniques to Enhance Automation In a Computing Environment - Systems and methods for detecting end of a transaction in a computing environment are provided. The method comprises determining a target area in a graphical user environment displayed on a display screen, wherein a change is expected to occur when end of a transaction is reached; masking the target area at least partially to remove content included in the target area that is present before or after the transaction was initiated; monitoring the target area for change in content; and detecting the end of the transaction when the content of the target area has changed. | 04-10-2014 |
20140212039 | Efficient Verification or Disambiguation of Character Recognition Results - Machines, systems and methods for character recognition disambiguation are provided. The method comprises selecting a first set of characters that match a first visual profile based on results of a character recognition process applied to target content; selecting a subset of the first set based on criteria associated with at least one of confidence level with which characters grouped in the subset are recognized or fragmentation associated with the characters grouped in the subset; and disambiguating recognition results for the characters grouped in the subset by displaying the characters along with context information, wherein reviewing two or more of the characters on a display screen along with context information associated with said two or more characters allows a human operator to select one or more suspect characters from among the two or more characters. | 07-31-2014 |
20150332111 | AUTOMATIC GENERATION OF SEMANTIC DESCRIPTION OF VISUAL FINDINGS IN MEDICAL IMAGES - A method comprising using at least one hardware processor for applying a mapping function to a medical image, to generate a semantic description of a visual finding in the medical image. The mapping function is optionally an MRF (Markov random field)-based, SVM (Support Vector Machine) mapping function. | 11-19-2015 |
20160066891 | IMAGE REPRESENTATION SET - A computer implemented method, a computerized system and a computer program product for image representation set creation. The computer implemented method comprises obtaining an image of a subject, wherein the image is produced using an imaging modality. The method further comprises automatically determining, by a processor, values to an image representation set with respect to the image, wherein the image representation set consists of semantic representation parameters of the image according to the imaging modality and according to a clinical diagnosis problem that is ascertainable from the image, wherein a total number of combinations of values of the semantic representation parameters is below a human comprehension threshold; and determining a decision regarding the clinical diagnosis problem based on the values of the image representation set of the image. | 03-10-2016 |
Patent application number | Description | Published |
20090254483 | Payment system and method using tokens - A method of payment using tokens issued by a third party comprising the steps of: a. A transaction management unit receives a request to perform a service for which payment with tokens is required; b. The management unit checks whether there are yet unused tokens available; If an unused token was found, go to step (c); If there are no available tokens, then indicate that, then END; c. The management unit requests information on an available token from a database. The status of the used token is changed to “used”; d. During the subsequent transaction, the management unit sends information relating to the token now used. A system for managing and monitoring the use of tokens, comprising: a. a transactions management unit using tokens, wherein the unit is activated when a local user requires to perform a service for which payment using tokens is required; b. a tokens database which includes information on tokens acquired from the third party; c. a tokens use monitoring unit, to verify the correct use of tokens; d. a database of tokens reports; e. a communication channel to other users. | 10-08-2009 |
20140074695 | Payment System and Method Using Tokens - A method of payment using tokens issued by a third party comprising the steps of: a. A transaction management unit receives a request to perform a service for which payment with tokens is required; b. The management unit checks whether there are yet unused tokens available; If an unused token was found, go to step (c); If there are no available tokens, then indicate that, then END; c. The management unit requests information on an available token from a database. The status of the used token is changed to “used”; d. During the subsequent transaction, the management unit sends information relating to the token now used. A system for managing and monitoring the use of tokens, comprising: a. a transactions management unit using tokens, wherein the unit is activated when a local user requires to perform a service for which payment using tokens is required; b. a tokens database which includes information on tokens acquired from the third party; c. a tokens use monitoring unit, to verify the correct use of tokens; d. a database of tokens reports; e. a communication channel to other users. | 03-13-2014 |
20140089184 | Payment System and Method Using Tokens - A method of payment using tokens issued by a third party comprising the steps of: a. A transaction management unit receives a request to perform a service for which payment with tokens is required; b. The management unit checks whether there are yet unused tokens available; If an unused token was found, go to step (c); If there are no available tokens, then indicate that, then END; c. The management unit requests information on an available token from a database. The status of the used token is changed to “used”; d. During the subsequent transaction, the management unit sends information relating to the token now used. A system for managing and monitoring the use of tokens, comprising: a. a transactions management unit using tokens, wherein the unit is activated when a local user requires to perform a service for which payment using tokens is required; b. a tokens database which includes information on tokens acquired from the third party; c. a tokens use monitoring unit, to verify the correct use of tokens; d. a database of tokens reports; e. a communication channel to other users. | 03-27-2014 |
Patent application number | Description | Published |
20090018206 | PREVENTION OF HYPOTENSION AND STABILIZATION OF BLOOD PRESSURE IN HEMODIALYSIS PATIENTS - The present invention relates to the use of S-alkylisothiouronium derivatives, including S-ethylisothiouronium diethylphosphate, for stabilizing blood pressure in hemodialysis patients. The compositions of the invention are effective in preventing hypotension in hemodialysis patients. | 01-15-2009 |
20090186854 | S-ALKYLISOTHIOURONIUM DERIVATIVES FOR THE TREATMENT OF INFLAMMATORY DISEASES - The present invention relates to uses of S-alkylisothiouronium derivatives for treating inflammation. In particular, the present invention provides extended release pharmaceutical dosage forms of S-alkylisothiouronium derivatives and methods of use thereof for the treatment of various inflammatory diseases or conditions. | 07-23-2009 |
20100285127 | TASTE MASKED PHARMACEUTICAL COMPOSITIONS OF S-ALKYLISOTHIOURONIUM DERIVATIVES - The present invention relates to taste masked compositions of S-alkylisothiouronium derivatives, including, but not limited to, S-ethylisothiouronium diethylphosphate, in the form of a coated oral tablet having a desirable dissolution profile. | 11-11-2010 |
20100305210 | S-ALKYLISOTHIOURONIUM DERIVATIVES FOR TREATING ABNORMAL UTERINE BLEEDING DISORDERS - The present invention relates to methods for treating uterine hypercontractility disorders. In particular, the present invention relates to methods for treating abnormal uterine bleeding and dysmenorrhea comprising administering to women suffering from such disorders a pharmaceutical composition comprising an S-alkylisothiouronium derivative. | 12-02-2010 |
20100311691 | COMPOSITIONS OF S-ALKYLISOTHIOURONIUM DERIVATIVES FOR TREATING UPPER RESPIRATORY CONGESTION - The present invention provides intranasal pharmaceutical compositions comprising an S-alkylisothiouronium derivative and methods of treating or alleviating upper respiratory and oral-pharyngeal congestions by pharmaceutical compositions comprising the S-alkylisothiouronium derivative. | 12-09-2010 |
Patent application number | Description | Published |
20110060713 | METHOD AND SYSTEM FOR MANAGEMENT OF SECURITY RULE SET - There are provided a method of automated managing two or more security rule-sets and a system thereof. The method comprises: obtaining data characterizing a first rule-set and a second rule-set; automated recognizing all possible combinations of values in the first and the second rule-sets; automated verifying each combination of values in the second rule-set against the first rule-set; calculating one or more values characterizing the differences in allowable and rejectable traffic in the first rule-set and the second rule-set; automated comparing the calculated values and/or derivatives thereof with a predefined threshold; and automated classifying the relationship between the first rule-set and the second rule-set in accordance with comparison results. The method may further comprise obtaining a connectivity request; automated verifying each combination of values in the connectivity request against the first rule-set and the second rule-set; and automated classifying the second rule-set with regard to the connectivity request, wherein the second rule-set comprises extra allowable traffic resulting from amending the first rule set. | 03-10-2011 |
20130254150 | METHOD AND SYSTEM FOR MANAGEMENT OF SECURITY RULE SET - There are provided a method of automated managing one or more security rule-sets and a system thereof. The method comprising: obtaining data characterizing a connectivity request and an amended rule-set, the amended rule-set being derivative of an initial rule-set amended to fit the connectivity request; automated verifying each possible combination of values in the connectivity request against the initial rule-set and the amended rule-set; calculating one or more values selected from a group comprising values characterizing relative amount of extra allowed traffic and values characterizing relative amount of dissatisfied requested traffic; automated comparing the calculated values and/or derivatives thereof with a predefined threshold; and automated classifying the amended rule-set as applicable for implementation if the results of the automated comparing match a predefined verification criterion. | 09-26-2013 |
20130329599 | Method of Network Connectivity Analyses and System Thereof - There are provided network analyzer and method of analyzing connectivity between a source and a destination. The method comprises: upon obtaining a partial topological network model comprising at least one cloud, generating the one or more paths between the source and the destination, specifying the cloud as a source point of the one or more paths if at least one source network address belongs to the cloud address space and specifying the cloud as a destination point of the one or more paths between the source and the destination if at least one destination network address belongs to the cloud address space. The method further comprises discovering at least one on-path cloud, the method further comprising specifying, by the processor, the at least discovered on-path cloud as a router configured to route the cloud traffic in accordance with predefined rules. | 12-12-2013 |
Patent application number | Description | Published |
20100260401 | METHOD AND DEVICE FOR PROCESSING COMPUTERIZED TOMOGRAPHY IMAGES - A method of processing a computerized tomography image is disclosed. The method comprises preprocessing the image using contrast enhancement weight function, thereby providing a preprocessed image having a first dynamic range; and applying a companding procedure to the preprocessed image, so as to reduce the first dynamic range. | 10-14-2010 |
20120257808 | METHOD AND SYSTEM FOR PROCESSING AN IMAGE - A method of processing an image having a plurality of picture-elements is disclosed. The method comprises: preprocessing the image to selectively enhance contrast of some picture-elements of the image, and employing a companding procedure for the preprocessed image, thereby providing a processed image. The contrast enhancement optionally and preferably features a mapping function having a plateau region for diminishing image data with intensity levels below an intensity threshold, thereby providing a preprocessed image. | 10-11-2012 |
20130148908 | METHOD AND SYSTEM FOR PROCESSING AN IMAGE FEATURING MULTIPLE SCALES - A method of processing an image is disclosed. The method comprises obtaining an image decomposed into a set of scaled images, each being characterized by a different image-scale; and calculating, for each of at least some scaled images, a relative luminance between the scaled image and another scaled image of the set, using intensities in the scaled image and intensities in the another scaled image. The method further comprises processing each scaled image using an adaptation procedure featuring an image-specific effective saturation function of the relative luminance, thereby providing a processed scaled image; combining at least some of the processed scaled images to provide a combined image; and outputting the combined image to a computer readable medium. | 06-13-2013 |
20140015994 | METHOD AND SYSTEM FOR REDUCING CHROMATIC ABERRATION - A method of processing a polychromatic image is disclosed. The method comprises, for each of at least a portion of the picture elements, assigning to the picture element a new color value for each individual color, and storing the new values in a computer readable medium. The new values are assigned by: processing each of a first and a second colors of the picture element, based, at least in part on first and second colors of peripheral picture elements, to respectively provide a first processed color value and a second processed color value; employing optimization for reducing error and for assigning to the picture element a new color value for each of the first and second colors; and assigning to the picture element a new color value for a third color calculated based, at least in part, on the new color values for the first and second colors. | 01-16-2014 |
20150256735 | METHOD AND SYSTEM FOR PROCESSING AN IMAGE FEATURING MULTIPLE SCALES - A method of processing an image is disclosed. The method comprises obtaining an image decomposed into a set of scaled images, each being characterized by a different image-scale; and calculating, for each of at least some scaled images, a relative luminance between the scaled image and another scaled image of the set, using intensities in the scaled image and intensities in the another scaled image. The method further comprises processing each scaled image using an adaptation procedure featuring an image-specific effective saturation function of the relative luminance, thereby providing a processed scaled image; combining at least some of the processed scaled images to provide a combined image; and outputting the combined image to a computer readable medium. | 09-10-2015 |
20160027162 | METHOD AND SYSTEM FOR PROCESSING AN IMAGE - A method of processing an image having a plurality of picture-elements is disclosed. The method comprises: preprocessing the image to selectively enhance contrast of some picture-elements of the image, and employing a companding procedure for the preprocessed image, thereby providing a processed image. The contrast enhancement optionally and preferably features a mapping function having a plateau region for diminishing image data with intensity levels below an intensity threshold, thereby providing a preprocessed image. | 01-28-2016 |