Birger
Ari Birger, Palo Alto, CA US
Patent application number | Description | Published |
---|---|---|
20090062015 | GAME PLAYING DEVICE WITH NETWORKED PLAYBACK CAPABILITY - A game playing device and a computer readable medium with a set of instructions for playing a game encoded thereon and a set of instructions encoded thereon such that the game playing device is recognized as a controllable playback device in a networked environment. | 03-05-2009 |
20110302318 | ANONYMOUS RE-STREAMING OF MEDIA ITEM OF CONTENT - Particular embodiments include a method of operating a processing system, an apparatus, logic encoded in one or more computer-readable tangible medium to carry out a method, and a tangible computer-readable storage medium configured with instructions that when executed cause carrying out the method. The method comprising: (a) as a result of a request for a stream of a first item of content, receiving the stream of the first item of content and providing an indication that a foreign stream is being received; (b) unless there is an indication that a foreign stream is being received, streaming a default item of content to a local media player; and (c) in the case there is an indication that a foreign stream is being received, re-streaming the received stream of the first item of content, such that local media player renders the requested stream of the first item of content. In some versions, the re-streamed first item of content mimics the default item of content. | 12-08-2011 |
Chet Birger, Lexington, MA US
Patent application number | Description | Published |
---|---|---|
20080301298 | Identifying a computing device - A computer architecture for enterprise device applications that provides a real-time, bi-directional communication layer for device communication. An identity-based communications layer provides for secure, end-to-end telemetry and control communications by enabling mutual authentication and encryption between the devices and the enterprise. A unique identity is assigned to each device, user and application to provide security services. The unique identity is independent of a network-address. Security information and a network address may be associated with the unique identity. | 12-04-2008 |
20090006840 | Using an identity-based communication layer for computing device communication - A computer architecture for enterprise device applications provides a real-time, bi-directional communication layer for device communication. An identity-based communications layer provides for secure, end-to-end telemetry and control communications by enabling mutual authentication and encryption between the devices and the enterprise. The identity-based communications layer is situated between a network layer and an application layer and transmits a message between two devices identified by a global address. The global address specifies a protocol, a network, and an address meaningful for the combination of the protocol and the network. | 01-01-2009 |
20090006850 | Computer system for authenticating a computing device - A computer architecture for enterprise device applications provides a real-time, bi-directional communication layer for device communication. An identity-based communications layer provides for secure, end-to-end telemetry and control communications by enabling mutual authentication and encryption between the devices and the enterprise. A unique identity is assigned to each device, user and application to provide security services. A communications session is established between two devices using an authentication service that authenticates the device that is initiating the establishment of the communications session with another device. After authenticating the initiating device, the authentication service provides to the initiating device the network address of the other device and an authentication credential for use in the communications session between the initiating device and the other device. | 01-01-2009 |
20090007217 | COMPUTER SYSTEM FOR AUTHENTICATING A COMPUTING DEVICE - A computer architecture for enterprise device applications provides a real-time, bi-directional communication layer for device communication. An identity-based communications layer provides for secure, end-to-end telemetry and control communications by enabling mutual authentication and encryption between the devices and the enterprise. A unique identity is assigned to each device, user and application to provide security services. A communications session is established between two devices using an authentication service that authenticates the device that is initiating the establishment of the communications session with another device. After authenticating the initiating device, the authentication service provides to the initiating device the network address of the other device and an authentication credential for use in the communications session between the initiating device and the other device. | 01-01-2009 |
20090007234 | COMPUTER SYSTEM FOR AUTHENTICATING A COMPUTING DEVICE - A computer architecture for enterprise device applications provides a real-time, bi-directional communication layer for device communication. An identity-based communications layer provides for secure, end-to-end telemetry and control communications by enabling mutual authentication and encryption between the devices and the enterprise. A unique identity is assigned to each device, user and application to provide security services. A communications session is established between two devices using an authentication service that authenticates the device that is initiating the establishment of the communications session with another device. After authenticating the initiating device, the authentication service provides to the initiating device the network address of the other device and an authentication credential for use in the communications session between the initiating device and the other device. | 01-01-2009 |
20110293096 | Multi-Level Key Management - A key manager provides a way to separate out the management of encryption keys and policies from application domains. The key manager may create cipher objects that may be used by the domains to perform encryption or decryption, without exposing the keys or encryption/decryption algorithms to the domains. A master key managed by the key manager may be used to encrypt and decrypt the domain keys that are stored under the control of the key manager. The key manager supports the rekeying of both the master key and the domain keys based on policy. Multiple versions of domain keys may be supported, allowing domains to access data encrypted with a previous version of a domain key after a rekeying. | 12-01-2011 |
20110296499 | Security Context Passing for Stateless System Management - Systems and methods for stateless system management are described. Examples include a method wherein a user sends the management system a request to act upon a managed system. The management system determines whether the user is authorized for the requested action. Upon authorization, the management system looks up an automation principal, which is a security principal native to the managed system. The management system retrieves connecting credentials for the automation principal, and connects to the managed system using the retrieved credentials. Once the managed system is connected, the management system performs the requested action on the managed system, and sends the result back to the user. | 12-01-2011 |
20140237560 | SECURITY CONTEXT PASSING FOR STATELESS SYSTEM MANAGEMENT - Systems and methods for stateless system management are described. Examples include a method wherein a user sends the management system a request to act upon a managed system. The management system determines whether the user is authorized for the requested action. Upon authorization, the management system looks up an automation principal, which is a security principal native to the managed system. The management system retrieves connecting credentials for the automation principal, and connects to the managed system using the retrieved credentials. Once the managed system is connected, the management system performs the requested action on the managed system, and sends the result back to the user. | 08-21-2014 |
Eli Birger, Petah Tikva IL
Patent application number | Description | Published |
---|---|---|
20160127292 | METHOD AND SYSTEM FOR CONTROLLING POLLING IN MESSAGE CONVERSATIONS ACROSS MULTIPLE DEVICES - A method and apparatus for controlling polling in message conversations across multiple devices are provided herein. The method includes displaying a poll in a messaging conversation display screen on a first participant device, wherein the poll comprises at least two polling options; receiving an instruction to update the poll based on a response to the poll from at least one of the multiple devices; and updating the poll per the received instruction. | 05-05-2016 |
Johan Birger, Malmo SE
Patent application number | Description | Published |
---|---|---|
20120140976 | Earphone System Comprising An Earphone And A Portable Holding Device - An earphone system ( | 06-07-2012 |
Johan Birger, Ballerup DK
Patent application number | Description | Published |
---|---|---|
20150350762 | MONAURAL WIRELESS HEADSET - The present invention relates to a monaural wireless headset ( | 12-03-2015 |
Reuven Birger, Kfar Kish IL
Patent application number | Description | Published |
---|---|---|
20100107286 | Almond tree named 'Zohar' - A new and distinct almond variety of | 04-29-2010 |
20100107287 | Almond tree named 'Matan' - A new and distinct almond variety of | 04-29-2010 |
Roi Birger, Haifa IL
Patent application number | Description | Published |
---|---|---|
20090265488 | DEVICE, SYSTEM, AND METHOD OF COMMUNICATING KEYBOARD-VIDEO-MOUSE (KVM) INFORMATION - Device, system and method of communicating Keyboard-Video-Mouse (KVM) information. For example, a switch may include a plurality of KVM over Ethernet (KVM/Ethernet) modules to communicate KVM data over Ethernet communications; and a router to route the Ethernet communications between the plurality of KVM/Ethernet modules and one or more remote consoles. Other embodiments are described and claimed. | 10-22-2009 |
20110019329 | CONTROLLABLE POWER RELAY - Device, system and method of controllable power relay. For example, a power relay device, to controllably relay an electric power signal to a first device based on a control signal from a second device, may include a power input to receive an input electric signal; a power output; a control-signal receiver to receive the control signal from the second device, while the power relay device is galvanically separated from the second device; and a control module to controllably output the electric signal via the power output based on the control signal. Other embodiments are described and claimed. | 01-27-2011 |
Seeon Birger, Ramat-Gan IL
Patent application number | Description | Published |
---|---|---|
20090260505 | METHOD FOR THE EFFICIENT IMPLEMTIONATION OF A WAVETABLE OSCILLATOR - A method for organizing a wave sample in a memory comprises loading the wave in two parts, each of which is a continuous waveform, wherein a discontinuity is provided between said two parts. | 10-22-2009 |
Shlomo Birger, Mizpe Adi IL
Patent application number | Description | Published |
---|---|---|
20110126695 | Armor module and an armor array used therein - According to the present invention there is provided an armor array for protecting a body to be protected from an incoming projectile having an anticipated impact direction. The armor array is constituted by at least a first and a second armor cassette, each comprising a top base plate and a bottom base plate sandwiching therebetween an expandable layer. The first and second armor cassettes are spaced apart by an intermediate depressible panel having a top and a bottom face, such that the bottom base plate of the first armor cassette faces the top face of the intermediate depressible panel and the top base plate of the second cassette faces the bottom face of the intermediate depressible panel. The armor array is constructed such that upon expansion of the expandable layer, caused by the impact of the incoming projectile, at least one of the bottom base plate of the first armor cassette and the top base plate of the second armor cassette is urged towards the intermediate depressible panel and depresses it. | 06-02-2011 |
Zeev Birger, Ramat Hasharon IL
Patent application number | Description | Published |
---|---|---|
20110284468 | USES OF HYDROPHOBIC AGGREGATES AND METHODS FOR PERFORMING THOSE USES - A method of mitigating the growth of roots comprising positioning at least one layer of hydrophobic sand adjacent said roots. In some embodiments the sand is positioned beneath the roots to preserve water and/or the sand includes a coating containing a compound containing aluminum. | 11-24-2011 |
20130121766 | FLOATING DEVICE AND METHOD OF USING THE SAME - A floating device is disclosed. The device comprises a first cup member and a second cup member, each having a base and an open end, the first cup member being formed with an opening at a center of a respective base. In some embodiments of the present invention the device comprises a connector member having a peripheral wall fittingly connected to the open ends and enclosing a barrier. The peripheral wall is preferably formed with openings arranged between the barrier and the first cup member such that, when the floating device contacts a liquid, the liquid enters through the openings into the first cup member to submerge the first cup member and to impart a restorable upright orientation to the device. | 05-16-2013 |
20140047933 | USES OF HYDROPHOBIC AGGREGATES AND METHODS FOR PERFORMING THOSE USES - A method of collecting a urine sample including appropriately locating hydrophobic sand with respect to the urine sample. Use of the hydrophobic sand including providing a barrier in the form of at least one layer of the sand; and collecting a urine sample by appropriately locating the sand with respect to the urine. | 02-20-2014 |