Dolev, IL
Boaz Dolev, Jerusalem IL
Patent application number | Description | Published |
---|---|---|
20090083377 | MEETING COORDINATOR - The present invention is a new system and method for enabling multiple users of computerized schedulers to automatically find a time for a meeting. According to embodiments of the present invention a user of the system sends a request to other participants of the meeting to coordinate the meeting via a centralized platform, such as a network server. Provided that the invitation is accepted by the other participants, the central network server receives from the computerizes scheduler of each of the participants the available time according to their prospective schedules and finds a time when all participants can meet. According to embodiments of the present invention users can define their preferred time for the meeting. Having found a time when all participants can meet the system sends each of the participants a notification concerning the meeting and a request to approve the selected time. | 03-26-2009 |
Danny Dolev, Mevaseret Zion IL
Patent application number | Description | Published |
---|---|---|
20080282246 | COMPILER AIDED TICKET SCHEDULING OF TASKS IN A COMPUTING SYSTEM - A method of scheduling tasks for execution in a computer system includes determining a dynamic worst case execution time for a non-periodic task. The dynamic worst case execution time is based on an actual execution path of the non-periodic task. An available time period is also determined, wherein the available time period is an amount of time available for execution of the non-periodic task. The non-periodic task is scheduled for execution if the dynamic worst case execution time is less than the available time period. | 11-13-2008 |
20100074342 | Method and system for linear processing of an input using Gaussian Belief Propagation - Methods and systems for processing an input. An input vector y is received that represents a noisy observation of Ax, where A is a data matrix and x is a data vector of unknown variables. Data vector x is recovered from the received input vector y via an iterative method. The recovering comprises determining an inference of a vector of marginal means over a graph G, where the graph G is of a joint Gaussian probability density function p(x) associated with noise in the received input vector y. | 03-25-2010 |
Dotan Dolev, Bustan Haglil IL
Patent application number | Description | Published |
---|---|---|
20160078387 | RULE ADJUSTMENT BY VISUALIZATION OF PHYSICAL LOCATION DATA - According to some embodiments of the present invention there is provided a computerized method for visually modifying a rule. The method may comprise receiving a rule and two or more data records, the rule comprising two or more computation instructions and each one of the data records comprising one or more physical location value. The method may comprise displaying a simulation comprising visual objects, each of the visual objects showing a result of applying the rule to one of the data records, and displayed on a computerized display at a position corresponding to the physical location value of the data records. The method may comprise receiving a marking from a user of one or more of the visual objects on the computerized display. The method may comprise modifying the computation instructions to produce a modified rule, based on the markings, and sending the modified rule. | 03-17-2016 |
Eyal Dolev, Holon IL
Patent application number | Description | Published |
---|---|---|
20130339790 | APPARATUS, SYSTEM AND METHOD FOR A COMMON UNIFIED DEBUG ARCHITECTURE FOR INTEGRATED CIRCUITS AND SoCs - A system and method for a common unified debug architecture for integrated circuits and System on Chips (SoCs) are provided. A system consistent with the present disclosure may comprise of an integrated circuit or SoC which includes a display port, plurality of logic blocks, and debug logic. The debug logic may receive debug data from one or more of the plurality of logic blocks in response to the integrated circuit or SoC operating in a debug mode. In addition, control logic coupled to the debug logic. The control logic provides display data to the display port in response to the integrated circuit operating in an operational mode. The control logic further directs high-speed debug data to the display port in response to the integrated circuit or SoC operating in the debug mode. The high-speed debug data is to be based on the debug data. | 12-19-2013 |
Guy Dolev, Herzliya IL
Patent application number | Description | Published |
---|---|---|
20120226600 | COMPUTERIZED INTEGRATED AUTHENTICATION/DOCUMENT BEARER VERIFICATION SYSTEM AND METHODS USEFUL IN CONJUNCTION THEREWITH - A computerized document bearer authentication system operative in conjunction with a document bearer verifying functionality operative to check at least one aspect of a document bearing individual, the system comprising a computerized document authenticator operative to ascertain that a presented computerized document is valid including reading data from the computerized document and using a processor to find, within the data, validation information useful in ascertaining that the presented computerized document is valid; and a document bearer verifying functionality initiator operative to initiate operation of the document bearer verifying functionality including finding, within the data, bearer verification information useful in checking the at least one aspect and providing the verification information to the document bearer verifying functionality. | 09-06-2012 |
20120229872 | APPARATUS AND METHODS FOR COMPUTERIZED AUTHENTICATION OF ELECTRONIC DOCUMENTS - A computerized method for authenticating documents having VIZ sections, the method comprising capturing an image of a document to be authenticated from a scanner and enhancing the captured image, and using a processor for identifying and cropping a VIZ section in the image. | 09-13-2012 |
20140180981 | SYSTEM AND METHODS FOR COMPUTERIZED MACHINE-LEARNING BASED AUTHENTICATION OF ELECTRONIC DOCUMENTS INCLUDING USE OF LINEAR PROGRAMMING FOR CLASSIFICATION - Electronic document classification comprising providing training documents sorted into classes; linear programming including selecting inputs which maximize an output, given constraints on inputs, the output maximized being a difference between: a. first estimated probability that a document instance will be correctly classified, by a classifier corresponding to given inputs, as belonging to its own class, and b. second estimated probability that document instance will be classified, by the classifier, as not belonging to its own class; and classifying electronic document instances into classes, using a preferred classifier corresponding, to the inputs selected by the linear programming. A computerized electronic document forgery detection method provides training documents and uses a processor to select value-ranges of non-trivial parameters, such that selected values-range(s) of parameters are typical to an authentic document of given class, and atypical to a forged document of same class. | 06-26-2014 |
20150312440 | APPARATUS AND METHODS FOR COMPUTERIZED AUTHENTICATION OF ELECTRONIC DOCUMENTS - A computerized method for authenticating documents having VIZ sections, the method comprising capturing an image of a document to be authenticated from a scanner and enhancing the captured image, and using a processor for identifying and cropping a VIZ section in the image. | 10-29-2015 |
Ido Dolev, Manof IL
Patent application number | Description | Published |
---|---|---|
20090284835 | SCANNING MICROSCOPY USING INHOMOGENEOUS POLARIZATION - Apparatus for imaging a surface, including an acousto-optic (AO) system. The AO system includes an AO element having a radiation input surface and a radiation output surface. The element is configured to receive radio-frequency (RF) pulses and a radiation input at the radiation input surface and to generate traveling beams from the radiation output surface. The AO system also includes an inhomogeneous polarization generator, positioned relative to the AO element so that the AO system outputs traveling inhomogeneously polarized beams. The apparatus includes objective optics which are configured to focus the inhomogeneously polarized beams onto the surface so as to form respective traveling spots thereon; collection optics, which are configured to collect scattered radiation from the traveling spots and to focus the scattered radiation to form respective image spots; and a detector which is arranged to receive the respective image spots and to generate a signal in response thereto. | 11-19-2009 |
Ido Dolev, Rehovot IL
Patent application number | Description | Published |
---|---|---|
20110158502 | MAPPING VARIATIONS OF A SURFACE - A method for characterizing a surface, consisting of dividing the surface into pixels which are characterized by a parameter variation and defining blocks of the surface as respective groups of the pixels. The pixels are irradiated in multiple scans over the surface with radiation having different first polarization states. At least part of the radiation returning from the pixels is analyzed using second polarization states, to generate processed returning radiation. For each scan, block signatures of the blocks are constructed using the processed returning radiation from the group of pixels in each block. Also for each scan, a block signature variation is determined using the respective block signatures of the blocks, and, in response to the block signature variation, one of the first polarization states and at least one of the second polarization states are selected for use in subsequent examination of a test object. | 06-30-2011 |
20150193926 | INSPECTION HAVING A SEGMENTED PUPIL - A method and an apparatus that may include optics that is arranged to illuminate a surface of a sample with radiation and to collect reflected radiation from the surface of the sample; wherein the optics includes a pupil that has multiple pupil segments that correspond to different angular regions of collection or illumination; and a detection module arranged to receive the reflected radiation and generate, for each pupil segment, pupil segment detection signals. | 07-09-2015 |
Irit Dolev, Haifa IL
Patent application number | Description | Published |
---|---|---|
20110191557 | SYNCHRONIZING DATA STORAGE SYSTEMS IN A DATA STORAGE ENVIRONMENT - A method for synchronizing data storage systems is provided. The method comprises designating a relationship between a first data storage system and a second data storage system, such that data stored in the first data storage system is copied to the second data storage system, in response to determining that the data stored in the first data storage system has been modified; receiving a first request to modify data stored in a first data block of a first storage volume in the first data storage system, wherein the data block is modified according to the first request; determining that the first data block has not been successfully synchronized when the modified data stored in the first data block is not copied to the second data storage system; and executing a process to retry synchronization of the first data block until synchronization of the first data block is successful, without suspending the relationship while the process is executed. | 08-04-2011 |
Michael Moshe Dolev, Oranit IL
Patent application number | Description | Published |
---|---|---|
20130046619 | SYSTEM AND METHOD FOR TARGETED ADVERTISING - The invention improves the targeting accuracy and hence efficiency of retail advertising, by use of interactive, behavioral, and contextual advertising). Improvement in the relevance of an ad to the recipient thereof is central to the system, where relevance here is taken to involve many factors including relevance of item to customer, relevance of customer to advertiser, timing of advert, context of advert, context of customer, advertising return on investment (ROI), and advertisement usefulness to customer. | 02-21-2013 |
Moshe Dolev, Raanana IL
Patent application number | Description | Published |
---|---|---|
20120210758 | KEY BLANK, KEY AND CYLINDER LOCK WITH REDUCED COSTS - An article including a key comprising a key head that slides along a key shaft, said key head being affixable to said key shaft with a fastener. | 08-23-2012 |
20130091910 | CYLINDER LOCK ASSEMBLY WITH NON-ROTATING ELEMENTS - A key device including a shaft including a key-cut surface for forming inward key cuts thereon, a key head mounted on the shaft; and a fixed key pin protruding outwards from the key-cut surface. | 04-18-2013 |
20130091911 | CYLINDER LOCK ASSEMBLY WITH NON-ROTATING ELEMENTS - A cylinder lock assembly including a plug rotatable in a cylinder lock body and including a plurality of chambers, each of the chambers having a chamber depth axis, and a plurality of plug locking elements received in the chambers, each of the plug locking elements including a key cut interface probe for interfacing with a key cut formed on a key, and wherein each of the plug locking elements is arranged to move along the chamber depth axis and not rotate about the chamber depth axis, and each of the key cut interface probes has a predetermined orientation with respect to the chamber depth axis. | 04-18-2013 |
20140069154 | REVERSIBLE DOOR AND MULTIPOINT LOCK - A lock assembly including a cylinder lock including a plug and cam which are both rotatable about a longitudinal axis of the cylinder lock, and a latch and a rotatable deadbolt both operatively linked to the cam, wherein rotation of the cam about the longitudinal axis causes two actions: rotation of the deadbolt about a rotational axis different from the longitudinal axis to move the deadbolt to an unlocked position, and retraction of the latch to an unlatched position. | 03-13-2014 |
Moshe Dolev, Ramat Hasharon IL
Patent application number | Description | Published |
---|---|---|
20090031769 | HIGH - SECURITY ROTATING BOLT LOCK - A cylinder lock having a body and a modified cam, the cylinder lock being adapted for moving an external element arranged to engage the modified cam, so that the external element slides axially on the cylinder lock body. In a preferred embodiment, the inventive cylinder lock is designed to utilize a helical cam which engages a movable external element or slider, and this design is referred to as the HC cylinder lock. When operated by rotating the appropriate key within it, the movable external element can be moved in a linear fashion along the length of the HC cylinder lock thus converting rotational motion of the key to axial motion of the external element. The external element is arranged to engage an eccentric pin formed as part of a rotating bolt which rotates on an orthogonal axis to the cylinder plug in response to said sliding motion, for the function of locking or unlocking a device. The streamlined design of the inventive HC cylinder lock enables efficient placement of a door lock within the hollow volume of a door to provide locking action. | 02-05-2009 |
Moshe Dolev, Udim IL
Patent application number | Description | Published |
---|---|---|
20140236203 | FINGERNAIL DRILL - A fingernail drill has a drill bit and a tip which is capable of drilling through a thickness of a fingernail. The tip extends longitudinally outwards from an abutment integrally formed with the drill bit, and the drill cannot drill past the abutment. The distance from the abutment to a distal end of the tip is such that the drill can drill through the thickness of the fingernail but cannot damage tissue under the fingernail. | 08-21-2014 |
20140358171 | FINGERNAIL DRILL - A fingernail drill has a drill bit and a tip which is capable of drilling through a thickness of a fingernail. The tip extends longitudinally outwards from an abutment integrally formed with the drill bit, and the drill cannot drill past the abutment. The distance from the abutment to a distal end of the tip is such that the drill can drill through the thickness of the fingernail but cannot damage tissue under the fingernail. A kit is provided that includes the fingernail drill and a dispenser for dispensing a substance through a hole drilled by the fingernail drill. | 12-04-2014 |
20150119912 | FINGERNAIL DRILL - A fingernail drill has a drill bit and a tip which is capable of drilling through a thickness of a fingernail. The tip extends longitudinally outwards from an abutment integrally formed with the drill bit, and the drill cannot drill past the abutment. The distance from the abutment to a distal end of the tip is such that the drill can drill through the thickness of the fingernail but cannot damage tissue under the fingernail. A kit is provided that includes the fingernail drill and a dispenser for dispensing a substance through a hole drilled by the fingernail drill. | 04-30-2015 |
Ran Dolev, Netanya IL
Patent application number | Description | Published |
---|---|---|
20150256514 | AUTOMATIC DETECTION OF AUTHENTICATION METHODS BY A GATEWAY - Disclosed herein is a system and method for allowing access to secure resources through a gateway without having to pre-configure the gateway with each specific URL that access is to be granted as well as maintaining the list of resources that are exposed. The gateway is configured to take incoming requests from client devices, such as the URL, and determine from the URL itself what type of authentication is required to gain access to the resource as opposed to comparing the URL with a managed list of URL's. Once the authentication process is identified by the gateway that process is implemented. The gateway analyzes the responses from the resources that may include denials or user authentication requests from the resource to determine the authentication process to use to gain access to the resource. Once the user is authenticated the communications traffic between the client/user and the resource is permitted through the gateway. | 09-10-2015 |
Shlomi Dolev, Omer IL
Patent application number | Description | Published |
---|---|---|
20090225985 | METHOD, APPARATUS AND PRODUCT FOR RFID AUTHENTICATION - A method and apparatus for repeated communication sessions between a sender (e.g., RFID tag) and a receiver (RFID reader) that employs a proactive information security scheme is based on the assumption that the information exchanged during at least one of every n successive communication sessions is not exposed to an adversary. The sender and the receiver maintain a vector of n entries that is repeatedly refreshed by pairwise XORING entries, with a new vector of n entries that is randomly chosen by the sender and sent to the receiver as a part of each communication session. Also, a computational secure scheme based on the information secure scheme is employed to ensure that even in the case that the adversary listens to all the information exchanges, the communication between the sender and the receiver is secure. In particular, the scheme can be used in the domain of remote controls (e.g., for cars). | 09-10-2009 |
20090296931 | Method for encryption and decryption of messages - A communication system that includes a sender computer and plurality of designated receiver computers coupled to the sender through a communication link. Each one of the receiver computers is equipped with computational resources stronger than the computational resources of an adversary computer. There is provided a method for sending a secret from the sender computer to a designated receiver computer. The sender computer defining a succession of computational tasks having respective solutions. The computational tasks are so defined such that the duration of solving each task by the receiver computer is shorter than what would have been required for the adversary computer to solve the task. Next, the sender computer sending through the link the succession of tasks encrypted by previous solutions and the receiver computer receiving the tasks and is capable of decrypting the secret faster than what would have been required for the adversary computer to decrypt the secret. | 12-03-2009 |
20110113491 | COLLABORATIVE SYSTEM FOR PROTECTING AGAINST THE PROPAGATION OF MALWARES IN A NETWORK - The present invention is a system for using a collective computing power of a plurality of network stations in a communication network in order to overcome threats generated by malicious applications. Collaboratively, a large group of simple network stations implement a vaccination mechanism, proliferating information concerning malicious applications (malwares) throughout the network in an efficient manner. | 05-12-2011 |
20140101440 | DIGITAL ARBITRATION - A method for resolving disputes between users in network communications using digital arbitration. The method comprising the steps of agreeing on a contract between the users and choosing a set of arbitrators; appealing to the arbitrators by a first user, if he/she suspects the second user violates the agreement; and giving the information needed to reconstruct a resource of the second user, if a large enough number of arbitrators agree that the second user actually violated the agreement. | 04-10-2014 |
20150052352 | CERTIFICATING VEHICLE PUBLIC KEY WITH VEHICLE ATTRIBUTES - A method for providing secure connection between vehicles over channels of a wireless communication network, according to which, a first unique pair of digitally signed public key and private key is provided to each vehicle, along with additional vehicle-related data including a visually static collection of attributes of the vehicle. A unique certificate number is generated for each vehicle and monolithic data consisting of the public key, the certificate number and the attributes is signed by a trusted certificate generating authority. Prior to wireless communication between a first vehicle and a second vehicle, a verification step is performed during which the first vehicle sends its unique certificate number to a second vehicle over a communication channel; the second vehicle verifies the authenticity of received unique certificate number of the first vehicle and attributes by a camera that captures attributes which are visible, using image processing means. If the attributes are verified successfully, the second vehicle sends its unique certificate number to the first vehicle over a communication channel, along with a secret session key, which is valid for the current session only. Then the first vehicle verifies the authenticity of received unique certificate number of the second vehicle and attributes by a camera that captures attributes of the second vehicle which are visible, using signal processing means and both vehicles are allowed to securely exchange message or data using the secret session key. | 02-19-2015 |
Shlomo Dolev, Omer IL
Patent application number | Description | Published |
---|---|---|
20080212481 | NOVEL DYNAMIC FIREWALL FOR NSP NETWORKS - Method for protecting an NSP data network against data overflow, according to which the NSP data network is divided to a protected sub-network and an unprotected sub-network. Connectivity to external data networks is allowed through the unprotected sub-network via a set of predefined controlled data ports. Each user is connected to the protected sub-network via a proxy router and to the unprotected sub-network via gateway routers that are connected to the proxy router through interconnected intermediating routers and to unprotected sub-network via the set of controlled data ports. A maximum available bandwidth that can be processed by a user is determined for each user and maximal sub-bandwidth is allocated for each router, such that the sub-bandwidth is smaller than the bandwidth. Whenever the data packet flow intended to the user exceeds the sub-bandwidth at one of the routers, the excess packet flow is filtered according to predetermined criteria defined by the user, who gets a report about the filtered packets within a predetermined period after the filtering begins. Otherwise, the data packet flow is passed from each router to the next router until the proxy router. | 09-04-2008 |
Yair Dolev, Matan IL
Patent application number | Description | Published |
---|---|---|
20110206198 | METHOD, APPARATUS AND SYSTEM FOR CAPTURING AND ANALYZING INTERACTION BASED CONTENT - An apparatus and methods for capturing and analyzing customer interactions the apparatus comprising interaction information units, interaction meta-data information units associated with each of the interaction information units, a rule based analysis engine component for receiving the interaction information, an adaptive database, an interaction capture and storage component for capturing interaction information, a multi segment interaction capture device, an initial set up and calibration device and a pre processing and content extraction device. | 08-25-2011 |