Dotan
Alon Dotan, Pinehurst, NC US
Patent application number | Description | Published |
---|---|---|
20140216482 | ORNAMENTAL WRAP FOR ELECTRONIC CIGARETTES AND METHOD FOR WRAPPING AN ELECTRONIC CIGARETTE - A cover for use with an electronic cigarette assembly is provided. The cover includes a sheet defining at least one cutout that generally corresponds in size to a push button of the electronic cigarette assembly, and an adhesive layer applied to one side of the sheet for adhering the sheet to the cover. A related method of applying the cover to an electronic cigarette assembly is also provided. | 08-07-2014 |
Douglas Bernard Dotan, Bellaire, TX US
Patent application number | Description | Published |
---|---|---|
20160070864 | HEALTHCARE HAZARD DETECTION AND EARLY WARNING SYSTEM - A patient safety system receives remote inputs wirelessly transmitted by a mobile device over a wireless network referred to herein as a patient safety network. The remote inputs indicate information, obtained by the patient safety application, pertaining to a patient safety event. Responsive to receiving remote input indicating a patient safety event category, the patient safety system creates a patient safety data record, comprising a set of predefined fields, corresponding to the patient safety event. In one non-limiting application applicable to patient safety events defined in the AHRQ Common Formats, the mobile device user may initiate the generation of a patient safety database record simply by selecting from a mobile device user interface one of nine patient safety event types defined by the Common Formats and one of three patient safety event levels of severity defined by the Common Formats. | 03-10-2016 |
Eliana Dotan, Pelham, NY US
Patent application number | Description | Published |
---|---|---|
20080235111 | Internet Art Community - An internet-based system for making works of art accessible to a broad viewing public comprising a means whereby users may upload to an on-line database information describing individual works of art including information describing the accessibility of said works. Users may retrieve from said database information regarding artworks accessible in a specified location and time. Additionally users may upload information describing collections of artworks. Users may upload reviews of artworks and collections and also provide ratings of art works, of reviews, and of collections. Aggregated user ratings are visible by users of the system and thus serve several purposes including collaborative filtering and providing recognition of and reputation for individual artists, reviewers, collectors, artworks, reviews, and collections. Thus the present invention provides a means whereby artists, reviewers, collectors, and an interested public can interact without the intercession of limiting bodies. | 09-25-2008 |
Eyal Dotan, Bussy St. Georges FR
Patent application number | Description | Published |
---|---|---|
20100058472 | METHOD FOR PROTECTING COMPUTER PROGRAMS AND DATA FROM HOSTILE CODE - A method that protects computer data from untrusted programs. Each computer's object and process is assigned with trust attributes, which define the way it can interact with other objects within the system. When an object is classified as untrusted, it can interact with other object within the system on a limited basis. A virtualized system is provided on the computer so that when the untrusted object attempts to perform an operation that is outside its scope of authorization, the virtualized system intercepts the operation but present the untrusted program with an indication that the requested operation has been performed. The method further includes processes to securely move a program from an untrusted group to a trusted group. | 03-04-2010 |
20120090029 | METHOD FOR PROTECTING COMPUTER PROGRAMS AND DATA FROM HOSTILE CODE - A method that protects computer data from untrusted programs. Each computer's object and process is assigned with trust attributes, which define the way it can interact with other objects within the system. When an object is classified as untrusted, it can interact with other object within the system on a limited basis. A virtualized system is provided on the computer so that when the untrusted object attempts to perform an operation that is outside its scope of authorization, the virtualized system intercepts the operation but present the untrusted program with an indication that the requested operation has been performed. The method further includes processes to securely move a program from an untrusted group to a trusted group. | 04-12-2012 |
20130298234 | METHOD FOR PROTECTING COMPUTER PROGRAMS AND DATA FROM HOSTILE CODE - A method that protects computer data from untrusted programs. Each computer's object and process is assigned with trust attributes, which define the way it can interact with other objects within the system. When an object is classified as untrusted, it can interact with other object within the system on a limited basis. A virtualized system is provided on the computer so that when the untrusted object attempts to perform an operation that is outside its scope of authorization, the virtualized system intercepts the operation but present the untrusted program with an indication that the requested operation has been performed. The method further includes processes to securely move a program from an untrusted group to a trusted group. | 11-07-2013 |
20140373181 | METHOD FOR PROTECTING COMPUTER PROGRAMS AND DATA FROM HOSTILE CODE - A method that protects computer data from untrusted programs. Each computer's object and process is assigned with trust attributes, which define the way it can interact with other objects within the system. When an object is classified as untrusted, it can interact with other object within the system on a limited basis. A virtualized system is provided on the computer so that when the untrusted object attempts to perform an operation that is outside its scope of authorization, the virtualized system intercepts the operation but present the untrusted program with an indication that the requested operation has been performed. The method further includes processes to securely move a program from an untrusted group to a trusted group. | 12-18-2014 |
20140380513 | USER TRANSPARENT VIRTUALIZATION METHOD FOR PROTECTING COMPUTER PROGRAMS AND DATA FROM HOSTILE CODE - A secure computing environment that prevents malicious code from “illegitimately” interacting with programs and data residing on the computing platform. While the various embodiments restrict certain programs to operate in a virtualized environment, such operation is transparent to the user from the operational point of view. Moreover, any program operating in the virtualized environment is made to believe that it has full access to all of the computing resources. To prevent a user from unknowingly or inadvertently allowing the program to adversely affect the computer, the user is also presented with “feel” that the program is able to perform all operations in the computing environment. | 12-25-2014 |
Eyal Dotan, Bussy Saint Georges FR
Patent application number | Description | Published |
---|---|---|
20110113427 | VIRTUALIZATION METHOD FOR PROTECTING COMPUTER PROGRAMS AND DATA FROM HOSTILE CODE - A secure computing environment that prevents malicious code from “illegitimately” interacting with programs and data residing on the computing platform. While the various embodiments restrict certain programs to operate in a virtualized environment, such operation is transparent to the user from the operational point of view. Moreover, any program operating in the virtualized environment is made to believe that it has full access to all of the computing resources. To prevent a user from unknowingly or inadvertently allowing the program to adversely affect the computer, the user is also presented with “feel” that the program is able to perform all operations in the computing environment. | 05-12-2011 |
Hilla Dotan, Los Angeles, CA US
Patent application number | Description | Published |
---|---|---|
20080294506 | Method and a tool for measuring the formation and effects of workplace friendships - A method and a tool to measure workplace friendship formation and its effects on individual and organizational job outcomes. The tool comprises one or more items that measure the formation of workplace friendships ( | 11-27-2008 |
Natan Dotan, Pelham, NY US
Patent application number | Description | Published |
---|---|---|
20080235111 | Internet Art Community - An internet-based system for making works of art accessible to a broad viewing public comprising a means whereby users may upload to an on-line database information describing individual works of art including information describing the accessibility of said works. Users may retrieve from said database information regarding artworks accessible in a specified location and time. Additionally users may upload information describing collections of artworks. Users may upload reviews of artworks and collections and also provide ratings of art works, of reviews, and of collections. Aggregated user ratings are visible by users of the system and thus serve several purposes including collaborative filtering and providing recognition of and reputation for individual artists, reviewers, collectors, artworks, reviews, and collections. Thus the present invention provides a means whereby artists, reviewers, collectors, and an interested public can interact without the intercession of limiting bodies. | 09-25-2008 |