Pinkas
Binyamin Pinkas, Tel Aviv IL
Patent application number | Description | Published |
---|---|---|
20110026781 | SYSTEM FOR SECURE FACE IDENTIFICATION (SCIFI) AND METHODS USEFUL IN CONJUNCTION THEREWITH - A method for privacy-retaining face identification comprising dividing at least one input face into a first set of patches, providing an assortment of patch profiles for each patch in the first set of patches, each patch profile in the assortment being associated with a unique index thereby to define an assortment of unique indices, for each individual patch in the input face, finding at least one patch profile within the assortment of patch profiles which most resembles the individual patch, thereby to define a first set of indices from among the assortment of unique indices whose corresponding patch profiles most resemble the input face's patches respectively, and using a privacy preserving computation to generate a physical output indicative of a comparison of the input face and at least one target face by comparing first and second functions of the first set of indices and of a second set of indices respectively, the second set of indices corresponding to patch profiles which most resemble a second set of patches into which the target face has been divided. | 02-03-2011 |
Binyamin Pinkas, Jersey City, NJ US
Patent application number | Description | Published |
---|---|---|
20110029780 | Systems and Methods for Conducting Transactions and Communications Using a Trusted Third Party - Systems and methods are provided for managing the transfer of electronic files. In one embodiment, a sender transfers an encrypted version of a file (such as a digitally encoded audio track, movie, document, or the like) to someone who wishes to receive it. The receiver computes a hash of the encrypted file, and sends it to a trusted third party. The trusted third party compares the hash that was computed by the receiver with another hash computed by the sender. If the two hashes match, the third party sends the file decryption key to the receiver. In some embodiments, the receiver may also send the third party payment information so that the sender, the content owner, and/or the third party can be paid for their role in the transaction. In a preferred embodiment, the payment information is only sent to, and/or used by, the third party once the third party has confirmed to the satisfaction of the receiver that the encrypted file in the receiver's possession will decrypt correctly. In some embodiments, the sender computes a hash of the encrypted version of the file and sends it directly to the third party. In other embodiments, the sender encrypts this hash using a key associated with the third party and sends the encrypted hash to the receiver, who then forwards it to the third party. | 02-03-2011 |
20110214169 | Secure Authentication Systems and Methods - Systems and methods are provided for authentication by combining a Reverse Turing Test (RTT) with password-based user authentication protocols to provide improved resistance to brute force attacks. In accordance with one embodiment of the invention, a method is provided for user authentication, the method including receiving a username/password pair associated with a user; requesting one or more responses to a first Reverse Turing Test (RTT); and granting access to the user if a valid response to the first RTT is received and the username/password pair is valid. | 09-01-2011 |
20120204246 | ESTABLISHING A SECURE CHANNEL WITH A HUMAN USER - A method of establishing a secure channel between a human user and a computer application is described. A secret unique identifier (“PIN”) is shared between a user and an application. When the user makes a request that involves utilizing the PIN for authentication purposes, the application renders a randomly selected identifier. The randomly selected identifier is in a format that is recognizable to a human but is not readily recognizable by an automated agent. The randomly selected identifier is then presented to the human user. The user identifies the relationship between the randomly selected identifier and the PIN. If the user's input reflects the fact that the user knows the PIN, then the user is authenticated. | 08-09-2012 |
20120266226 | SECURE AUTHENTICATION SYSTEMS AND METHODS - Systems and methods are provided for authentication by combining a Reverse Turing Test (RTT) with password-based user authentication protocols to provide improved resistance to brute force attacks. In accordance with one embodiment of the invention, a method is provided for user authentication, the method including receiving a username/password pair associated with a user; requesting one or more responses to a first Reverse Turing Test (RTT); and granting access to the user if a valid response to the first RTT is received and the username/password pair is valid. | 10-18-2012 |
20130013493 | SYSTEMS AND METHODS FOR CONDUCTING TRANSACTIONS AND COMMUNICATIONS USING A TRUSTED THIRD PARTY - Systems and methods are provided for performing transactions and managing communications using a trusted third party. In one embodiment, a sender transfers an encrypted version of a file (such as a digitally encoded audio track, movie, document, or the like) to someone who wishes to receive it. The receiver computes a first hash of at least a portion of the encrypted data content, and sends the first hash to a third party configured to compare at least a portion of the first hash to at least a portion of a second hash. The receiver receives a file decryption key from the third party, and decrypts at least the portion of the received encrypted data content with the decryption key. In some cases, multiple hashes of the encrypted data content may be computed, each using a different portion of the encrypted data content. | 01-10-2013 |
20140058952 | SYSTEMS AND METHODS FOR CONDUCTING TRANSACTIONS AND COMMUNICATIONS USING A TRUSTED THIRD PARTY - Systems and methods are provided for performing transactions and managing communications using a trusted third party. In one embodiment, a sender transfers an encrypted version of a file (such as a digitally encoded audio track, movie, document, or the like) to someone who wishes to receive it. The receiver computes a first hash of at least a portion of the encrypted data content, and sends the first hash to a third party configured to compare at least a portion of the first hash to at least a portion of a second hash. The receiver receives a file decryption key from the third party, and decrypts at least the portion of the received encrypted data content with the decryption key. In some cases, multiple hashes of the encrypted data content may be computed, each using a different portion of the encrypted data content. | 02-27-2014 |
20140196135 | SECURE AUTHENTICATION SYSTEMS AND METHODS - Systems and methods are provided for authentication by combining a Reverse Turing Test (RTT) with password-based user authentication protocols to provide improved resistance to brute force attacks. In accordance with one embodiment of the invention, a method is provided for user authentication, the method including receiving a username/password pair associated with a user; requesting one or more responses to a first Reverse Turing Test (RTT); and granting access to the user if a valid response to the first RTT is received and the username/password pair is valid. | 07-10-2014 |
Daniel M. Pinkas, Walnut Creek, CA US
Patent application number | Description | Published |
---|---|---|
20130116412 | Production of Post-Translationally Hydroxylated Recombinant Proteins in Bacteria - Bacterial cells capable of producing recombinant proteins, such as post-translationally hydroxylated recombinant proteins, methods and kits for producing recombinant proteins, such as post-translationally hydroxylated recombinant proteins, and particular post-translationally hydroxylated recombinant collagen molecules produced by the methods and cells disclosed herein are provided by this invention. | 05-09-2013 |
Daniel M. Pinkas, Menlo Park, CA US
Patent application number | Description | Published |
---|---|---|
20090042806 | TRANSGLUTAMINASE INHIBITORS AND METHODS OF USE THEREOF - Transglutaminase inhibitors and methods of use thereof are provided. | 02-12-2009 |
20090312272 | Transglutaminase inhibitors and methods of use thereof - Transglutaminase inhibitors and methods of use thereof are provided. | 12-17-2009 |
20130102633 | TRANSGLUTAMINASE INHIBITORS AND METHODS OF USE THEREOF - Transglutaminase inhibitors and methods of use thereof are provided. | 04-25-2013 |
Eyal Pinkas, Rishon Lezion IL
Patent application number | Description | Published |
---|---|---|
20120016661 | SYSTEM, METHOD AND DEVICE FOR INTELLIGENT TEXTUAL CONVERSATION SYSTEM - A method of intelligent textual markup in an information exchange includes: determining semantic elements in said information exchange; determining relations between said semantic elements; representing said semantic elements as nodes in a directed graph; and representing said relations as edges connecting said nodes. A data processing system for enabling a visual representation of semantic relations in an information exchange includes: a semantic analysis engine adapted to determine semantic elements of said information exchange; a relation analysis engine adapted to determine relations between said semantic elements; and a presentation engine adapted to present said semantic elements as nodes and said relations as edges in a directed graph representing said information exchange. | 01-19-2012 |
Gad Pinkas, Ganei Tikva IL
Patent application number | Description | Published |
---|---|---|
20090063365 | System and method of managing cash and suggesting transactions in a multi-strategy portfolio - According to some embodiments of the present invention, there is provided a system for managing an investment portfolio that is associated with at least two investment strategies, at least one of the investment strategies providing a strategy change in respect of a non-cash position by explicitly or implicitly specifying a recommended change value for the non-cash position, the system comprising: a portfolio management processor, the portfolio management processor is responsive to the strategy change in respect of the non-cash position for calculating a cash allocation for a cash position of an investment strategy providing the change, wherein the cash allocation is based upon: a recommended relative weight for the cash position, the relative weight is provided explicitly or implicitly by the investment strategy providing the change, a relative weight of at least one other cash position, the relative weight is provided explicitly or implicitly by at least one other investment strategy with which the investment portfolio is associated, a specified proportion between the two or more investment strategies with which the investment portfolio is associated, and a value of a cash holding within the investment portfolio; and the portfolio management processor is further responsive to the investment strategy providing the change for calculating a suggested transaction based upon the change value specified explicitly or implicitly by the strategy providing the change in respect of the non-cash position, and based upon the cash allocation calculated for the cash position of the investment strategy providing the change. | 03-05-2009 |
Iddo Pinkas, Rehovot IL
Patent application number | Description | Published |
---|---|---|
20080272280 | Cascaded image intensifier - A cascaded image intensifier device is presented. In one embodiment the device comprises: at least two sections in cascade, each of a first section and a last section out of the at least two sections including a photocathode unit adapted to convert photons to electrons and a screen unit adapted to convert electrons to photons; wherein the first section includes a reducing element adapted to: (i) reduce ion-caused degradation of a photocathode unit of the first section, and (ii) reduce a number of photons exiting from the first section from a first value to a second value; and wherein the last section outputs a number of photons that equals or exceeds the first value. Also disclosed are methods and systems using the disclosed cascaded image intensifier device. | 11-06-2008 |
Moshe Pinkas, Brooklyn, NY US
Patent application number | Description | Published |
---|---|---|
20100235253 | Secured Item Delivery Method and Device - The technology is of methods, devices, and systems for conducting transactions. Orders may be placed via public data networks where a device indicator or other unique identifier of the purchasing device is transmitted to the merchant. The order is then delivered by the merchant to a location indicated in the order or associated with the purchaser or purchaser's device, or alternatively, the order is picked up by the purchaser. The purchaser then transits or exhibits directly from the device used to make the purchase to a device associated with, or operated by, the merchant, the device indicator, or other unique identifier to verify and identify the transaction and ensure security of a transaction. Embodiments of the disclosed technology may be used at sporting events or other large venues as part of online or catalog shopping and deliveries. | 09-16-2010 |
Zorka Pinkas, Honolulu, HI US
Patent application number | Description | Published |
---|---|---|
20120110935 | Children Massage Center - “Children Massage Center” is pediatric massage facility established specially for children from birth to 18 years. Particularly divided facility for different age group where children and parents are introduced to pediatric massage therapy that utilizes equipment specifically tailored to children, games and toys/tools, and visual stimulants as wall graphics, audio, personal computer etc. Providing massage therapy in such environment significantly increases effectiveness of treatment. | 05-10-2012 |