Kahana
Chen Kahana, Yehud IL
Patent application number | Description | Published |
---|---|---|
20110276836 | PERFORMANCE ANALYSIS OF APPLICATIONS - Embodiments of methods and systems for analyzing performance of an application are provided. In that regard, an embodiment of a method for analyzing performance, among others, comprises collecting performance metric data from the application over time; segmenting the performance metric data into time segments representing sets of contiguous time samples which exhibit similar performance metric behaviour; determining the presence of an anomaly in a time segment; and correlating the anomalous segment with other data available to the system to determine the cause of the anomaly. | 11-10-2011 |
Chen Kahana, Gan Yavne IL
Patent application number | Description | Published |
---|---|---|
20130080451 | DETERMINING SIMILARITY SCORES OF ANOMALIES - A method and system comprise abstracting configuration items (CI) in at least a first anomaly and a second anomaly based on type of CI. Further, CIs are matched of a common type between the first and second anomalies based on a cost function. Additionally, a similarity score is computed for the first and second anomalies based, at least in part, on the cost function of the matched CI's and based on topology of the first and second anomalies. | 03-28-2013 |
Frigita Kahana US
Patent application number | Description | Published |
---|---|---|
20100068409 | INK JET PRINTABLE COMPOSITIONS - In jet printable compositions that include nano metal powders in a liquid carrier. | 03-18-2010 |
Itay Kahana, Gan Yavne IL
Patent application number | Description | Published |
---|---|---|
20130074076 | AUTOMATIC TASK MANAGEMENT AND RESOLUTION SYSTEMS AND METHODS - An automatic task management and resolution system including semantic task analysis functionality operative to provide a semantic analysis of at least part of a textual description of a task and task-resolution functionality operative to employ the semantic analysis to recommend at least one resolution for the task. The task-resolution functionality is also operative to prompt an owner of the task to select one of at least one resolution for the task and to execute the one of at least one resolution for the task. | 03-21-2013 |
Nachshon Kahana, Jerusalem IL
Patent application number | Description | Published |
---|---|---|
20130144431 | METHOD AND APPARATUS FOR DISPENSING ITEMS - A method for rapidly and accurately dispensing a predetermined number of discrete items, the method comprising: operating a conveyor to transport multiple items towards an imaging device, wherein the items are arranged in a single layer and at least some of the items are transported in parallel; operating the imaging device to continuously capture images of an area immediately below an end of the conveyor, so that items falling off the conveyor are recorded in the images while in trajectory; processing the images in real time, to continuously determine the number of falling items; stopping the conveyor before the number of falling items has reached the predetermined number, while continuing to determine the number of falling items until items cease to fall off the conveyor innertially; and automatically dispensing an additional amount of items, to complete the predetermined number of items. | 06-06-2013 |
20150175287 | METHOD AND APPARATUS FOR DISPENSING ITEMS - A method for rapidly and accurately dispensing a predetermined number of discrete items, the method comprising: operating a conveyor to transport multiple items towards an imaging device, wherein the items are arranged in a single layer and at least some of the items are transported in parallel; operating the imaging device to continuously capture images of an area immediately below an end of the conveyor, so that items falling off the conveyor are recorded in the images while in trajectory; processing the images in real time, to continuously determine the number of falling items; stopping the conveyor before the number of falling items has reached the predetermined number, while continuing to determine the number of falling items until items cease to fall off the conveyor innertially; and automatically dispensing an additional amount of items, to complete the predetermined number of items. | 06-25-2015 |
Paz Kahana, Newton, MA US
Patent application number | Description | Published |
---|---|---|
20110052075 | REMOTE RECEIPT ANALYSIS - A computer implemented method performs remote receipt analysis. The method includes receiving an image of a receipt over a network and automatically performing optical character recognition on the image of the receipt to obtain a machine-encoded text. The method further includes automatically extracting data which includes an amount paid from the machine-encoded text and automatically generating a message based on the data and sending the message to a user device. | 03-03-2011 |
20110166934 | TARGETED ADVERTISING BASED ON REMOTE RECEIPT ANALYSIS - A computer implemented method performs targeted advertising based on remote receipt analysis. The method includes receiving an image of a receipt over a network and automatically performing optical character recognition on the image of the receipt to obtain a machine-encoded text. The method further includes automatically extracting transaction data from the machine-encoded text and automatically distributing commercial data to a user console based on the transaction data. | 07-07-2011 |
Ronen Kahana, Herzeliya IL
Patent application number | Description | Published |
---|---|---|
20090064352 | CREATING POULTRY AND OTHER ANIMALS RESISTANT TO VIRAL DISEASE - The invention is directed to genetically modified animals which are resistant to viral infections. Also provided are methods for creating animals which are resistant to viral infections. | 03-05-2009 |
Shay Kahana, Kibbutz Bet Zera IL
Patent application number | Description | Published |
---|---|---|
20150351768 | CONNECTOR - The present invention provides a device for connecting at least one biological structure, the device including a tubular member, a first opening at one end of the member, a second opening at a second opposing end of the member and a central cavity within the member for accommodating the at least one biological structure. The member includes a plurality of interwoven lengths configured for reversible radial enlargement of the member when the extremities are pushed inwards and reversible radial contraction of the member when the extremities are pulled outwards. The present invention further provides methods of connecting one or more biological structures. | 12-10-2015 |
Uri Kahana, Givat-Ada IL
Patent application number | Description | Published |
---|---|---|
20130276094 | DEVICE, SYSTEM AND METHOD OF MAINTAINING CONNECTIVITY OVER A VIRTUAL PRIVATE NETWORK (VPN) - Some demonstrative embodiments include devices, systems and/or methods of maintaining connectivity over a Virtual-Private-Network (VPN). For example, a system may include a server to communicate with at least one computing device via a VPN tunnel, to receive from the computing device a mode indication indicating that the computing device is in a standby mode, to receive from at least one application server one or more packets intended for the computing device when the computing device is in the standby mode, based on at least one filtering criterion, to detect at least one targeted packet to be provided to the computing device, and to transfer the targeted packet to the computing device via the VPN tunnel. | 10-17-2013 |
20130283345 | TECHNIQUES FOR DYNAMIC ENPOINT SECURE LOCATION AWARENESS - Techniques for dynamic endpoint secure location awareness may include dynamically sending a location query in response to a change in location for a mobile device. A location response may be received. The platform security engine may determine whether the mobile device is located in a secure location based on the location response. Other embodiments are described and claimed. | 10-24-2013 |
20140189777 | POLICY-BASED SECURE CONTAINERS FOR MULTIPLE ENTERPRISE APPLICATIONS - Technologies for providing policy-based secure containers for multiple enterprise applications include a client computing device and an enterprise policy server. The client computing device sends device attribute information and a request for access to an enterprise application to the enterprise policy server. The enterprise policy server determines a device trust level based on the device attribute information and a data sensitivity level based on the enterprise application, and sends a security policy to the client computing device based on the device trust level and the data sensitivity level. The client computing device references or creates a secure container for the security policy, adds the enterprise application to the secure container, and enforces the security policy while executing the enterprise application in the secure container. Multiple enterprise applications may be added to each secure container. Other embodiments are described and claimed. | 07-03-2014 |
20150195301 | CONTEXT-AWARE PROACTIVE THREAT MANAGEMENT SYSTEM - This disclosure is directed to a context-aware proactive threat management system. In general, a device may use internal activity data along with data about external activities (e.g., provided by remote resources) for threat assessment and mitigation. A device may comprise, for example, a hostile environment detection (HED) module to coordinate threat assessment and mitigation. The HED module may accumulate internal activity data (e.g., from security services in the device), and external activity data regarding a system environment and/or a physical environment from the remote resources. The HED module may then assess threats based on the activity data and determine automated and/or manual mitigation operations to respond to the threats. In one embodiment, visualization features may also be used to, for example, visualize threats to a user, visualize automatic/manual mitigation operations, request user confirmation regarding the performance of manual mitigation operations, etc. | 07-09-2015 |
Yaron Kahana, Kfar Saba IL
Patent application number | Description | Published |
---|---|---|
20140259136 | Techniques for Authenticating a Device for Wireless Docking - Examples are disclosed for a first device to wirelessly dock to a second device. In some examples, a first device may receive identification from the second device for wirelessly docking. The first device may determine whether the second device is allowed to wirelessly dock and if allowed an authentication process may be implemented. The first device may then wirelessly dock to the second device based on a successful authentication. Other examples are described and claimed. | 09-11-2014 |
20160087961 | Techniques for Authenticating a Device for Wireless Docking - Examples are disclosed for a first device to wirelessly dock to a second device. In some examples, a first device may receive identification from the second device for wirelessly docking. The first device may determine whether the second device is allowed to wirelessly dock and if allowed an authentication process may be implemented. The first device may then wirelessly dock to the second device based on a successful authentication. Other examples are described and claimed. | 03-24-2016 |
Yehuda Kahana, Herzelia IL
Patent application number | Description | Published |
---|---|---|
20130101691 | FRUIT AND VEGETABLE-DERIVED COMPOSITIONS FIELD OF THE INVENTION - This invention provides fruit and vegetable-derived compositions comprising a fruit or vegetable derivative of inter alia, at least one Beta, Capsicum and Malus species, wherein the composition is at a pH in the range of about 3 to about 6.5. The invention further provides for process for the production of the same and uses thereof. | 04-25-2013 |
Yoko Kahana, Nishinomiya-Shi, Hyogo JP
Patent application number | Description | Published |
---|---|---|
20150371564 | INFORMATION WRITABLE FILM AND A SAMPLE STORAGE TUBE - To provide an information writable film that is chemical and abrasion resistance, and is suitable for high contrast white laser marking. The information writable film comprises a writable film layer | 12-24-2015 |
Yoni Kahana, Kfar Malal IL
Patent application number | Description | Published |
---|---|---|
20160070656 | WRITE PROTECTION MANAGEMENT SYSTEMS - Write protection management systems are disclosed. In this regard, in one exemplary aspect, a security control system is provided to authorize and write a specified number of data blocks to a write-protected region in a storage device. In another exemplary aspect, a write control system is provided to keep track of data blocks written to the write-protected region. The write control system automatically re-enables write protection on the write-protected region after the specified number of data blocks has been written to the write-protected region. By automatically protecting the write-protected region after writing the specified number of data blocks, it is possible to prevent unauthorized attempts to write to the write-protected region, thus ensuring data security and integrity in the write-protected region. | 03-10-2016 |
Yoni Kahana, Beit Yehoshua IL
Patent application number | Description | Published |
---|---|---|
20150286823 | SYSTEM AND METHOD FOR BOOT SEQUENCE MODIFICATION USING CHIP-RESTRICTED INSTRUCTIONS RESIDING ON AN EXTERNAL MEMORY DEVICE - Various embodiments of methods and systems for modification of instructions and/or data associated with one or more boot stages in a boot sequence are disclosed. The authenticity and integrity of the modified instructions and/or data in certain embodiments may be ensured by using a confidential key and a message authentication code (“MAC”) algorithm to generate a MAC output. The MAC output is compared to an expected MAC associated with the modified instructions and/or data. The confidential key is uniquely associated with the system on a chip (“SoC”) or a component of the SoC. In this way, embodiments of the solution guard against unauthorized modification or replacement of the OEM boot instructions. | 10-08-2015 |
Yoni Kahana, Beit Shemesh IL
Patent application number | Description | Published |
---|---|---|
20160063281 | SYSTEM AND METHOD FOR IMPROVED SECURITY FOR A PROCESSOR IN A PORTABLE COMPUTING DEVICE (PCD) - Systems and methods for improved security for a core in a portable computing device (PCD), such as a core operating a high level operating system (HLOS) are presented. In operation, a monitor module on the SoC is initialized. The monitor module sends a request to the core of the SoC and the monitor module receives a response from the core. A timer in communication with the monitor module is checked. The timer is reset or disabled by the monitor module if the response from the core is received at the monitor module before the expiration of the timer. Otherwise, the monitor module applies at least one security measure to the core as a result of the timer expiring. | 03-03-2016 |
Yoni Kahana, Bet Yehusha IL
Patent application number | Description | Published |
---|---|---|
20160065375 | DYNAMIC INTEGRITY VALIDATION OF A HIGH LEVEL OPERATING SYSTEM - Techniques for dynamically validating the integrity of a High Level Operating System (HLOS) stored on a data processing device are provided. The techniques include a method for execution on a data processing device including initiating a boot sequence on the data processing device, reading a code partition from a memory unit in the data processing device, such that the code partition is associated with a HLOS stored in the memory unit, performing a cryptographic function on the code partition, storing a result of the cryptographic function in a secure memory, continuing the boot sequence to load at least a portion of the HLOS into a non-secure memory unit, cryptographically signing the result of the cryptographic function stored in the secure memory unit, and sending the encrypted result of the cryptographic function to a remote server. | 03-03-2016 |
Yuvi Kahana, Rinatya IL
Patent application number | Description | Published |
---|---|---|
20090123112 | FIBER OPTIC MICROPHONE AND A COMMUNICATION SYSTEM UTILIZING SAME - An arrangement for a fiber optic microphone having at least one pair of optical fibers, each having an input end portion and an output end portion made of a material having a critical refractive angle θ | 05-14-2009 |
20150346399 | REFLECTIVE ELEMENT FOR FIBER OPTIC SENSOR - A reflective element for directing an optical signal into a fiber optic sensor having an optical fiber includes a plane containing a sharply defined straight line that separates between a first area of low reflectivity and a second area of high reflectivity. The plane is disposed parallel to a free end surface of the optical fiber so that the free end surface intersects the line of the reflective element, whereby relative movement between the free end surface of the optical fiber and the line in response to a physical change sensed by the fiber optic sensor induces variations in an optical signal reflected by the reflective element through the optical fiber, which variations allow measurement of the physical change. | 12-03-2015 |
Ziv Kahana, Haifa IL
Patent application number | Description | Published |
---|---|---|
20090153401 | MOTION DETECTION FOR TRACKING - An apparatus and method for tracking a target wherein a new position fix is taken when the measured movement of the target is more than a predetermined threshold amount or when the position fix has not been updated in a predetermined interval. The apparatus and method minimize energy use and network resources by performing position determination fixes only when needed. | 06-18-2009 |
20120208605 | MOBILE DEVICE POWER OPTIMIZATION WITH PERIPHERAL SENSORS WITH STANDARD INTERFACES - Methods and systems for using sensors on peripherals with mobile devices are disclosed. The peripherals connect with the mobile device using standard interfaces that are normally used for other functional devices. Using sensor data from the peripheral, the power consumption of the mobile device can be reduced. | 08-16-2012 |