Itzhaki
Chen Itzhaki, Herzeliya IL
Patent application number | Description | Published |
---|---|---|
20130260790 | METHOD AND SYSTEM FOR PROVIDING LOCATION IDENTIFICATION - A method and system for providing location identification, including a server and a corresponding database storing data representing the deployment of network transmitters in a specific area. The system configured to measure, over different selected locations in the specific area, the signal strength as received from one or more network transmitters deployed in the area; map a network signals power scheme for each specific area based on the measured signal strengths; store the mapped power scheme(s) in the database; receive measurements and/or calculations from devices in a previously mapped specific area; compare the local calculated/measured power scheme with one or more power schemes stored in the database; and, upon finding a power scheme that essentially corresponds to the location of the local calculated power scheme, determine the current location of the corresponding device. | 10-03-2013 |
Eran Itzhaki, Valley Village, CA US
Patent application number | Description | Published |
---|---|---|
20160023795 | Combination Drink Bottle and Frozen Comestible Maker - An apparatus for enabling consumers to seamlessly convert the contents of a sippable drink container into a handheld frozen comestible. The present invention alleviates the need for consumers to purchase distinct products for when they desire a beverage and when they desire a frozen comestible. Further alleviated is the need for cumbersome and messy homemade kits consisting of plastic molds and popsicle stick support members. | 01-28-2016 |
Hanan Itzhaki, Ness Zionna IL
Patent application number | Description | Published |
---|---|---|
20160046929 | METHODS AND COMPOSITIONS FOR IDENTIFYING A PEPTIDE HAVING AN INTERMOLECULAR INTERACTION WITH A TARGET OF INTEREST - This invention provides, in one embodiment, a recombinant virus or a recombinant virus library wherein each virus comprises a protein involved in viral attachment or infection, a polypeptide which differs by at least a single amino acid from another peptide or polypeptide in the library, and a modified cleavage site that is proximal to the peptide and the protein, wherein the cleavage site is modified such that a compound mediating cleavage has a reduced binding affinity for it as compared to a non-modified cleavage site. The invention further provides a target of interest complex comprising a protease, a target of interest involved in an intermolecular interaction, and a flexible linker that attaches the protease and target of interest. The invention further provides uses thereof, including a method for identifying a peptide which has an intermolecular interaction with a target of interest or identifying the agonistic or antagonistic feature of a peptide that has an intermolecular reaction with a target of interest. | 02-18-2016 |
Ruth Itzhaki, Oxford GB
Patent application number | Description | Published |
---|---|---|
20150374676 | HELICASE-PRIMASE INHIBITORS FOR USE IN A METHOD OF TREATING ALZHEIMER'S DISEASE - The present invention relates to the use of helicase-primase inhibitors in a method of treating Alzheimer's Disease (AD). Particularly, the present invention relates to the use of helicase-primase inhibitors in a method of treating AD in a subject that is having HSV-1 infection and is having AD or is having HSV-1 infection and is suspected of having AD. | 12-31-2015 |
Shai Itzhaki, Kidron IL
Patent application number | Description | Published |
---|---|---|
20140096207 | LAYER 7 AUTHENTICATION USING LAYER 2 OR LAYER 3 AUTHENTICATION - A system and method for authenticating a layer 7 client application (application layer) based on a layer 2 (data link layer) or a layer 3 (network layer) authentication is provided. A request to authenticate to a network is received from a communication device. The request to authenticate to the network is for a layer 2 or layer 3 authentication. The communication device is authenticated to the network based on having the necessary credentials. | 04-03-2014 |