Segal, IL
Akiba Segal, Rehovot IL
Patent application number | Description | Published |
---|---|---|
20120186251 | SOLAR POWER PLANT - The present invention provides a novel solar steam generator comprising solar steam boiler compartment carrying water surrounding an internal superheater compartment. The boiler compartment is exposed to a first concentrated solar radiation. The boiler compartment is configured and operable to heat water to saturated temperatures and generate saturated steam. The boiler compartment operates as an integrated cavity enclosing the superheater compartment, reducing the thermal losses of the superheater compartment to the outside environment and absorbs most of the thermal losses of the superheater compartment. The internal superheater compartment is exposed to a second concentrated solar radiation and is configured and operable to superheat the saturated steam generated in the boiler compartment. The boiler compartment and the superheater compartment are thus arranged one with respect to the other such that the boiler compartment surrounds the internal superheater compartment. | 07-26-2012 |
Alexander Segal, Akko IL
Patent application number | Description | Published |
---|---|---|
20100031861 | Stabilizer of ship rolling - The roll-stabilizer consist of short wings, with aspect ratio r=0.5-0.75, fastened immovably to the ship hull in staggered rows or in lines along the bilges, at port and starboard sides. The height of the wings is such that they do not protrude the maximum breadth and base line of the ship. The transverse distance between two wing lines of the staggered row is 0.5-0.7 of the wing's chord, and the stagger between wings of the two lines is equal to the chord. The wing profiles are parallel to the longitudinal axis of the ship or form a small angle of 2-4° with this axis. At zero forward speed the roll damping moment of the staggered stabilizer is almost equal to that of continuous bilge keels having the same height and area. During motion of the ship ahead the lift forces of the wings produce a large damping moment, considerably reducing the ship rolling. | 02-11-2010 |
Alon Segal, Herzlia IL
Patent application number | Description | Published |
---|---|---|
20100210264 | PORTABLE CELLULAR PHONE SYSTEM HAVING AUTOMATIC INITIALIZATION - A portable cellular phone system is provided, wherein matched sets of algorithmically generated communication units are generated, each defining an increment of authorized communication. One set is stored on a system server, i.e. a service provider, and the pre-paid set is available for use within a portable cellular phone. The portable cellular phone, which is normally non-activated, automatically contacts the system server upon selective activation by the user, to initiate a call (outgoing or incoming). A voice recognition system allows the user to place calls and/or receive calls. During a call, the portable cellular phone and the system server allow authorized access to communication, while the communication units are decremented at the system server and at the portable cellular phone. The portable cellular phone typically has either an internal energy supply and storage for the pre-paid communication units, or a removable airtime cartridge, typically containing an energy supply and either the ability to store or to generate a set of pre-paid single use airtime communication units. | 08-19-2010 |
20140316804 | MEDICAL STAFF MESSAGING - A method for communicating with relevant medical staff members about identified medical procedures in real time, comprising mapping at least one dataset of medical roles; monitoring a plurality of physiological measures of a patient; automatically identifying, according to an analysis of the plurality of physiological measures and according to the at least one dataset, when a first of the plurality of medical procedures is required in real time; generating a message containing data indicative of the first medical procedure and one or more physiological measures; acquiring scheduling data indicative which of a plurality of medical staff members currently man the plurality of medical roles; selecting at least one of the plurality of medical staff members for the medical procedure according to the scheduling data; and sending the message to the selected at least one medical staff member. | 10-23-2014 |
20140330589 | DYNAMIC MEDICAL INFORMATION MODEL FOR COORDINATED PATIENT CARE DELIVERY - The methods and systems described by the present invention enable managing a medical order provided to a patient, comprising: | 11-06-2014 |
Amir Segal, Modiin IL
Patent application number | Description | Published |
---|---|---|
20140177328 | Multi-Bit Magnetic Memory Cell | 06-26-2014 |
Amnon Segal, Tel Mond IL
Patent application number | Description | Published |
---|---|---|
20150331200 | SWITCHING PATCH CORD FIBERS - Provided herein are switching methods and systems for switching a patch cord fiber in a fiber management system having non-tensioned patch cord fibers, from a first adapter to a second adapter. Switching comprises disconnecting the patch cord fiber connector from the first adapter; distinguishing the disconnected patch cord fiber, at a region removed from the connector, from other patch cord fibers according to a position of the patch cord fiber in the fiber management system; pulling the distinguished patch cord fiber at the handling region to receive and clasp the disconnected connector, wherein the pulling is carried out to disentangle the pulled patch cord fiber from the other patch cord fibers; and connecting the clasped connector to the second adapter. The patch cord fibers are thus manages at edges thereof only, with no slack control required. | 11-19-2015 |
Assaf Segal, Tel Aviv IL
Patent application number | Description | Published |
---|---|---|
20120041862 | COMPUTERIZED MARKETPLACE FOR RATIO BASED DERIVATIVES - A computerized marketplace for ratio-based derivatives is provided herein. A method implementing the marketplace includes the following stages: receiving a price query related to a selected derivative on two selected underlying assets, defining a ratio of their respective prices in a specified order, at a specified timestamp; applying a pricing algorithm to the query, to yield an ad hoc return or price of the derivative, relevant to the specified timestamp, wherein the price of the option (or return) is based on an estimated relative financial market performance of the selected underlying assets; and presenting the ad hoc price (or return) of the selected option, wherein at least one of: the receiving, the applying, and the presenting is executed by at least one processor. | 02-16-2012 |
20140351941 | METHOD OF DEFENDING A COMPUTER FROM MALWARE - To defend a computer against malware, first executable code, of the computer, that includes a signature that identifies an address, in the computer's memory, of a respective data structure that is potentially vulnerable to tampering, is identified. The first executable code is copied to provide second executable code that emulates the first executable code using its own respective data structure. The first executable code is modified to jump to the second executable code before accessing the data structure, and also so that the signature identifies the address of a guard page. | 11-27-2014 |
Avi Segal, Modiln IL
Patent application number | Description | Published |
---|---|---|
20100209007 | SYSTEM AND METHOD FOR DETECTING CHANGES IN AN ENVIRONMENT - A system capable of detecting changes within an environment in which a known image is displayed. The system includes a computing platform executing a software application being configured for comparing at least a portion of an image captured from the environment to at least a portion of the known image to thereby detect changes in the environment. | 08-19-2010 |
Aviad Segal, Tel Aviv IL
Patent application number | Description | Published |
---|---|---|
20080307310 | WEBSITE APPLICATION SYSTEM FOR ONLINE VIDEO PRODUCERS AND ADVERTISERS - A system for accessing development components, including an online video clip library of templates and an online music clip library, and enabling online production of user-friendly, custom-integrated media products. The system includes a Web application on a Website for hosting services for producers/advertisers/users. The system also includes a search engine that indexes the video, interactive Web formatting screens for selecting development components and producing the Web products in said Web application, an online MIXER module for editing and playing said selected video, an online editing program, which allows the advertiser/user to edit his advertisement himself, outside WebServices accessible by said advertisers of said Web application via the internet for custom-integrating, encoding and formatting the video clips and a parallel platform in which content producer/users and commercial libraries could upload their raw material and set their price. | 12-11-2008 |
Avigdor Segal, Netanya IL
Patent application number | Description | Published |
---|---|---|
20110252187 | SYSTEM AND METHOD FOR OPERATING A NON-VOLATILE MEMORY INCLUDING A PORTION OPERATING AS A SINGLE-LEVEL CELL MEMORY AND A PORTION OPERATING AS A MULTI-LEVEL CELL MEMORY - System and method for storing data in a non-volatile memory including a multi-level cell and single-level cell memory portions. To write a dataset to the non-volatile memory, if the size of the dataset is equal to the size of pages in the multi-level cell memory portion, the dataset may be written directly to the multi-level cell memory portion to fill an integer number of pages in a single write operation. However, if the size of the dataset is different than the size of the multi-level cell memory pages, at least a portion of the dataset may be temporarily written to the single-level cell memory portion until data is accumulated in a plurality of write operations having a size equal the size of the multi-level cell memory pages. The accumulated data may fill an integer number of the pages in the multi-level cell memory portion in a single write operation. | 10-13-2011 |
20110271043 | SYSTEM AND METHOD FOR ALLOCATING AND USING SPARE BLOCKS IN A FLASH MEMORY - A method for using a single spare block pool in flash memory comprising: allocating a plurality of flash memory arrays, wherein each flash memory array comprises a plurality of flash memory blocks; within a main flash memory array: allocating a used block pool comprising a plurality of used blocks and allocating a main spare block pool comprising a plurality of spare blocks; within each of the other flash memory arrays: allocating a used block pool comprising multiple used blocks; allocating a minimum spare block pool comprising a minimum number of spare blocks; allocating the main spare block pool and each of the minimum spare block pools to a single spare block pool; transferring a spare block from the main spare block pool to one of the minimum spare block pools; and transferring a spare block from a first minimum spare block pool to a second minimum spare block pool. | 11-03-2011 |
20120001778 | SYSTEM AND METHOD FOR MULTI-DIMENSIONAL ENCODING AND DECODING - A system and method for decoding multi-dimensional encoded data. A set of multi-dimensional encoded data may be received encoding each input bit in a set of input bits by multiple different component codes in multiple different encoding dimensions. The multi-dimensional data may potentially have errors. A map may be used to locate each set of intersection bits that encode the same input bit by multiple unsolved component codes. The unsolved component codes may be decoded using one or a plurality of tested error correction hypotheses that yields a decoding success, where each hypothesis correcting a different set of intersection bits for a different input bit. The successful hypothesis may be applied for correcting the multi-dimensional encoded data. | 01-05-2012 |
20120005554 | SYSTEM AND METHOD FOR MULTI-DIMENSIONAL ENCODING AND DECODING - A system and method for using a cyclic redundancy check (CRC) to evaluate error corrections. A set of data and initial CRC values associated therewith may be received. The set of data by changing a sub-set of the data may be corrected. Intermediate CRC values may be computed for the entire uncorrected set of data in parallel with said correcting. Supplemental CRC values may be computed for only the sub-set of changed data after said correcting. The intermediate and supplemental CRC values may be combined to generate CRC values for the entire corrected set of data. The validity of the corrected set of data may be evaluated by comparing the combined CRC values with the initial CRC values. | 01-05-2012 |
20120005558 | SYSTEM AND METHOD FOR DATA RECOVERY IN MULTI-LEVEL CELL MEMORIES - A system and method are provided for data recovery in a multi-level cell memory device. One or more bits may be programmed sequentially in one or more respective levels of multi-level cells in the memory device. An interruption of programming a subsequent bit in a subsequent second or greater level of the multi-level cells may be detected. Data may be recovered from the multi-level cells defining the one or more bits programmed preceding the programming interruption of the second or greater level. | 01-05-2012 |
20120005560 | SYSTEM AND METHOD FOR MULTI-DIMENSIONAL ENCODING AND DECODING - A system and method is provided for decoding a set of bits using a plurality of hypotheses, for example, each independently tested on-the-fly. Initial bit states and associated reliability metrics may be received for the set of bits. A current hypothesis may be decoded for correcting the set of bits, wherein the current hypothesis defines different bit states and associated reliability metrics for the set of bits. If decoding the current hypothesis is not successful, a subsequently ordered hypothesis may be decoded, wherein the hypotheses are ordered such that their associated reliability metric is a monotonically non-decreasing sequence. Decoding may proceed iteratively until the current hypothesis is successful. | 01-05-2012 |
20120144093 | INTERLEAVING CODEWORD PORTIONS BETWEEN MULTIPLE PLANES AND/OR DIES OF A FLASH MEMORY DEVICE - A system, a method and non-transitory computer readable medium storing instructions for interleaving at least two portions of a first codeword of the group between at least two flash memory planes while violating at least one ordering rule out of (a) an even odd ordering rule, (b) a programming type ordering rule, and (c) a codeword portions ordering rule and interleaving different portions of other codewords of the group between multiple flash memory planes while maintaining the even odd ordering rule, the programming type ordering rule and the codeword portions ordering rule. | 06-07-2012 |
20130212315 | STATE RESPONSIVEOPERATIONS RELATING TO FLASH MEMORY CELLS - A non-transitory computer readable medium, a flash controller and a method for state responsive encoding and programming; the method may include encoding an information entity by applying a state responsive encoding process to provide at least one codeword; wherein the state responsive encoding process is responsive to a state of flash memory cells; and programming the at least one codeword to at least one group of flash memory cells by applying a state responsive programming process that is responsive to the state, the state being either an estimated state or an actual state. | 08-15-2013 |
Aviram Segal, Kiryat-Gat IL
Patent application number | Description | Published |
---|---|---|
20120259918 | BUSINESS PROCESS MANAGEMENT SYSTEM WITH IMPROVED COMMUNICATION AND COLLABORATION - Techniques are provided for enabling communications between a business process and an external entity, by a) receiving notification data from a business process of a computer-based business process management system, b) applying a set of rules to any of the notification data to select an external entity to whom a communication will be sent, select a communications channel from among a plurality of communications channels associated with the external entity, and generate the communication from any of the notification data in a manner that conforms to the selected communications channel, and c) sending the communication to the external entity via the selected communications channel. | 10-11-2012 |
Dadi Segal, Holon IL
Patent application number | Description | Published |
---|---|---|
20110245349 | BENZYL ALCOHOL MIXTURE FOR TREATING PREMATURE EJACULATION - A penile desensitizing formulation for treating premature ejaculation, comprising benzyl alcohol at a concentration between 1% and 10% by weight of the total formulation, and additionally menthol at a concentration between 0.05% and 1% by weight of the total formulation, prepared as solution, gel, cream or ointment. | 10-06-2011 |
Daniel Segal, Rehovot IL
Patent application number | Description | Published |
---|---|---|
20110224184 | NAPHTHOQUINONE DERIVATIVES USEFUL FOR PREVENTION OF AMYLOID DEPOSITS AND TREATMENT OF DISEASES INVOLVING AMYLOIDOGENESIS - The present invention provides pharmaceutical compositions comprising substituted 1,4 naphthoquinones that are effective in preventing oligomerization of beta amyloid and subsequent pathologies associated with amyloid fibrils. These compositions are useful for the treatment of disease involving amyloidogenesis including neurodegenerative diseases such as Alzheimer's Disease or senile dementia. Particularly effective compositions comprise 1,4 naphthoquinones substituted with an amino acid residue selected from a heterocyclic or aromatic amino acid. | 09-15-2011 |
20140213627 | NAPHTHOQUINONE DERIVATIVES USEFUL FOR PREVENTION OF AMYLOID DEPOSITS AND TREATMENT OF DISEASES INVOLVING AMYLOIDOGENESIS - The present invention provides pharmaceutical compositions comprising substituted 1,4 naphthoquinones that are effective in preventing oligomerization of beta amyloid and subsequent pathologies associated with amyloid fibrils. These compositions are useful for the treatment of disease involving amyloidogenesis including neurodegenerative diseases such as Alzheimer's Disease or senile dementia. Particularly effective compositions comprise 1,4 naphthoquinones substituted with an amino acid residue selected from a heterocyclic or aromatic amino acid. | 07-31-2014 |
David Segal, Jerusalem IL
Patent application number | Description | Published |
---|---|---|
20090254015 | PELVIC ANCHOR BRACE AND SPINAL SUPPORT - The present invention relates to spinal support and brace devices configured to support the lower back and, more specifically the present invention relates to devices that anchor on portions of the pelvis and are configured to support and/or align one or more Lumbar vertebrae. | 10-08-2009 |
20110276146 | PROSTHETIC IMPLANT DEVICE COMPRISING A SEALING ARRANGEMENT AND A CHAMBER ADAPTED TO RECEIVE DEBRIS PARTICLES - A prosthetic implant device designed to protect against debris-related dysfunction when implanted in a living body, the device including: (a) a ball-and-socket prosthesis having: a ball component having a first articulating surface, and a socket component having a second articulating surface, the socket component adapted to receive the ball component, to form an articulating region disposed directly between the surfaces, whereby the first surface is adapted to move in a relative motion with respect to the second surface; (b) a sealing arrangement, associated with the prosthesis, having a sealing member including a sealing face disposed substantially opposite, and abutting a portion of the first articulating surface, to form a sealing region adapted to obstruct a discharge of debris particles disposed directly between the articulating surfaces, from the prosthesis, via the sealing region, and (c) a chamber, associated with the prosthesis, and adapted to receive and contain the debris particles. | 11-10-2011 |
David Segal, Tel Aviv IL
Patent application number | Description | Published |
---|---|---|
20130289131 | INJECTABLE PHARMACEUTICAL COMPOSITIONS FOR THE TREATMENT OF JOINTS - The present invention relates to an injectable pharmaceutical formulation for the alleviation or reduction of joint irritation or for the reduction of worsening of existing joint inflammation, formulated for intra-articular injection comprising an active polyol ingredient, which polyol active ingredient is xylitol. Use of the intra-articular injectable formulations for the treatment of joint diseases or conditions including arthritis is described. | 10-31-2013 |
David Segal, Kiriat Tivon IL
Patent application number | Description | Published |
---|---|---|
20090152986 | PIEZOELECTRIC POWER SUPPLY - An energy generating and storing circuit suitable for use on board a projectile. The circuit includes a current generator consisting of one or more piezoelectric devices, a primary charge storage device and one or more secondary charge storage devices, a voltage responsive fast switching means and at least one transformer. The circuit provides for loading the primary charge storage before the secondary charge storages are loaded. The circuit provides for storing electric energy generated during the compression and decompression phases of the piezoelectric devices during the firing stage of the projectile. | 06-18-2009 |
Edo Segal, Herzeliya IL
Patent application number | Description | Published |
---|---|---|
20100332317 | METHOD AND SYSTEM FOR CREATING A MULTI-LEVEL NETWORK - A method and system for recruiting support, the method including connecting a processor of an organization seeking supporters to a processor of a central organizing body (COBP), providing a software application for connecting a device, including a processor, of at least one supporter of the organization to the COBP; coupling a processor of at least one source of advertising content to the COBP; transferring the advertising content by the COBP to at least one of the supporters; recruiting by the supporter at least one hierarchical child supporter to create a multi-level network of supporters; calculating advertising revenue associated with each said supporter based on pre-selected criteria; and calculating recognition for each supporter based on the calculated advertising revenue for that supporter and for the multi-level network of supporters created by that supporter. | 12-30-2010 |
Ehud Segal, Ramat-Gan IL
Patent application number | Description | Published |
---|---|---|
20110085979 | CONJUGATE OF A POLYMER, AN ANTI-ANGIOGENESIS AGENT AND A TARGETING MOIETY, AND USES THEREOF IN THE TREATMENT OF BONE RELATED ANGIOGENESIS CONDITIONS - Conjugates of hydroxypropyl methacrylamide (HPMA)-derived copolymers having attached thereto TNP-470 and a high load (e.g., higher than 3 mol %) of alendronate (ALN), and processes of preparing same are disclosed. | 04-14-2011 |
20140212357 | CONJUGATE OF A POLYMER, AN ANTI-ANGIOGENESIS AGENT AND A TARGETING MOIETY, AND USES THEREOF IN THE TREATMENT OF BONE RELATED ANGIOGENESIS CONDITIONS - Conjugates of hydroxypropyl methacrylamide (HPMA)-derived copolymers having attached thereto TNP-470 and a high load (e.g., higher than 3 mol %) of alendronate (ALN), and processes of preparing same are disclosed. | 07-31-2014 |
Elazar Segal, Maccabim IL
Patent application number | Description | Published |
---|---|---|
20090069876 | System and Method for thermally Treating Tissues - A system and method are provided for thermally treating tissues in percutaneous surgery or endoluminal treatments. The system consists of at least one catheter for thermally treating a tissue, hydraulic unit for circulating fluids through the catheters and a control station by which an operator is displayed with, and inputs and/or modifies, working parameters of the system. The catheters have an operational face, which is optionally expandable and encloses a lumen through which the fluids are circulated. The method disclosed implements cooling of the targeted tissue prior to its heating. For heating and or cooling the tissues, the operational face of a catheter is pressed against a surface of the targeted tissue while heat emitted from or conducted to the tissue is respectively transferred into or from the circulated fluids. | 03-12-2009 |
Eran Segal, Rehovot IL
Patent application number | Description | Published |
---|---|---|
20100189318 | METHODS FOR CONSTRUCTING ASSOCIATION MAPS OF IMAGING DATA AND BIOLOGICAL DATA - A method for constructing an association map between imaging features and biological data is described. The method comprises combining one or more image features relating to a clinical subject with biological data and using an algorithm to make predictions based on the features and data. | 07-29-2010 |
20100279302 | METHODS OF PREDICTING PAIRABILITY AND SECONDARY STRUCTURES OF RNA MOLECULES - Provided are methods of predicting a pairability of nucleotides of a plurality of RNA polynucleotides by (a) simultaneously determining a paired state or an unpaired state of nucleotides of the plurality of RNA polynucleotides; and (b) corresponding the paired state or the unpaired state of the nucleotides to a database of nucleic acid sequences, the database comprises nucleic acid sequences representing the plurality of RNA polynucleotides, thereby determining the pairability of nucleotides of the plurality of RNA polynucleotides. Also provided are methods of determining a secondary structure of a plurality of RNA molecules; methods of determining if a molecule is capable of modulating a secondary structure of at least one RNA polynucleotide of a plurality of RNA polynucleotides; and methods of screening for a marker associated with a pathology. | 11-04-2010 |
Eran Segal, Tel Aviv IL
Patent application number | Description | Published |
---|---|---|
20100205310 | SYSTEM AND METHOD FOR DYNAMICALLY OPTIMIZING TCP WINDOW SIZE - System and method for optimizing TCP window size in operating systems. | 08-12-2010 |
Eran Segal, Kibbutz Hulda IL
Patent application number | Description | Published |
---|---|---|
20140259906 | MICROENVIRONMENT FOR EFFICIENT UPTAKE OF FERTILIZERS AND OTHER AGROCHEMICALS IN SOIL - The present invention provides a bead comprising: i) an external zone comprising a super absorbent polymer (SAP) that is capable of absorbing at least about 5 times its weight in water, surrounding ii) at least one internal zone comprising a core that contains at least one agrochemical, wherein the external zone is permeable to oxygen when hydrated, or the internal zone is formulated to release the at least one agrochemical into the external zone over a period of at least about one week when the hydrogel of the external zone is hydrated. The present invention also provides methods of using beads of the invention. | 09-18-2014 |
Erel Segal, Kiryat Haim IL
Patent application number | Description | Published |
---|---|---|
20100010826 | CALCULATING CONNECTIVITY, SOCIAL PROXIMITY AND TRUST LEVEL BETWEEN WEB USER - A computer implemented system for, and a computer implemented method of calculating indicators to reflect real-life interactions between people, among those are connectivity, social proximity, best paths and trust level. The system comprises a server connected via a communication link to users associated with communication and web based environments and to the web based environments and communication platforms themselves. The server is arranged to receive data relating to users, their profiles, connections and related data in the communication and web based environments as well as large scale data from these environments. The server comprises an application arranged to convert the data into a standard numeric format quantifying the connectivity, the social proximity, the trust level and other indicators to reflect real-life interactions between people. The computer implemented method collects information about the users and their connectivity, and analyses and maps the information as a virtual network spanning a plurality of the web based environments and communication platforms. | 01-14-2010 |
Erez Segal, Kiryat Haim IL
Patent application number | Description | Published |
---|---|---|
20100010826 | CALCULATING CONNECTIVITY, SOCIAL PROXIMITY AND TRUST LEVEL BETWEEN WEB USER - A computer implemented system for, and a computer implemented method of calculating indicators to reflect real-life interactions between people, among those are connectivity, social proximity, best paths and trust level. The system comprises a server connected via a communication link to users associated with communication and web based environments and to the web based environments and communication platforms themselves. The server is arranged to receive data relating to users, their profiles, connections and related data in the communication and web based environments as well as large scale data from these environments. The server comprises an application arranged to convert the data into a standard numeric format quantifying the connectivity, the social proximity, the trust level and other indicators to reflect real-life interactions between people. The computer implemented method collects information about the users and their connectivity, and analyses and maps the information as a virtual network spanning a plurality of the web based environments and communication platforms. | 01-14-2010 |
Ester Segal, Haifa IL
Patent application number | Description | Published |
---|---|---|
20090179171 | CONTROL OF MATERIALS AND POROUS MAGNETIC PARTICLES - The present invention uses externally applied electromagnetic stimulus to control and heat porous magnetic particles and material associated with the particles. The particles contain magnetic material, such as superparamagnetic iron oxide and are associated with a material. Application of a DC magnetic field allows them to be moved with their associated material, and application of an AC RF electromagnetic field allows them to be heated with their associated material. The material can be associated with the particles by being contained in the pores of the particles, or in other cases the particles can adhere to the associated material, which can be an aqueous droplet. The present invention also provides a multi-layer porous magnetic particle. The particle includes a host layer having pores sized to accept magnetic nanoparticles. Magnetic nanoparticles are infused within pores of the host layer An encoding layer includes pores that define a spectral code. The pores in the encoding layer are sized to substantially exclude the magnetic nanoparticles. The encoding layer can also be a multi-layer, exhibiting, for example, a complex spectral code. | 07-16-2009 |
Eytan Segal, Kadima IL
Patent application number | Description | Published |
---|---|---|
20100138910 | METHODS FOR ENCRYPTED-TRAFFIC URL FILTERING USING ADDRESS-MAPPING INTERCEPTION - The present invention discloses methods, media, and perimeter gateways for encrypted-traffic URL filtering using address-mapping interception, methods including the steps of: providing a client system having a client application for accessing websites from web servers; upon the client application attempting to access an encrypted website, performing a name-to-address query to resolve a name of the encrypted website; intercepting address-mapping responses; creating a mapping between the name and at least one network address of the encrypted website; intercepting incoming encrypted traffic; extracting a server's network address from the incoming encrypted traffic; establishing a resolved name being accessed using the mapping; and filtering the resolved name. Preferably, the step of filtering includes redirecting the encrypted traffic. Preferably, the method further includes the step of: blocking all encrypted traffic for unresolved names. | 06-03-2010 |
20150020188 | Network Host Provided Security System for Local Networks - A gateway host connected to a network can be programmed to control packet traffic from other hosts on the network. The gateway host sends spoof packets to one or more of the other hosts, rendering them as controlled hosts. Each controlled host, having received the spoof packets, sends network packets for an intended destination, which are intercepted by the gateway host. The spoof packets have caused reconfiguration of the packet routing by the controlled host, such that network packets are rerouted upon their being sent from the controlled host. The gateway host renders a decision on the network packet traffic. | 01-15-2015 |
Gadi Segal, Ramat Gun IL
Patent application number | Description | Published |
---|---|---|
20140119025 | ILLUMINATION APPARATUS CONFINING LIGHT BY TOTAL INTERNAL REFLECTION AND METHODS OF FORMING THE SAME - In various embodiments, an illumination apparatus includes an air gap between a sub-assembly and a waveguide attached thereto at a plurality of discrete attachment points, as well as a bare-die light-emitting diode encapsulated by the waveguide. | 05-01-2014 |
Gadi Segal, Ramat Gan IL
Patent application number | Description | Published |
---|---|---|
20150023060 | ILLUMINATION APPARATUS CONFINING LIGHT BY TOTAL INTERNAL REFLECTION AND METHODS OF FORMING THE SAME - In various embodiments, an illumination apparatus includes an air gap between a sub-assembly and a waveguide attached thereto at a plurality of discrete attachment points, as well as a bare-die light-emitting diode encapsulated by the waveguide. | 01-22-2015 |
20150226903 | ILLUMINATION APPARATUS CONFINING LIGHT BY TOTAL INTERNAL REFLECTION AND METHODS OF FORMING THE SAME - In various embodiments, an illumination apparatus includes an air gap between a sub-assembly and a waveguide attached thereto at a plurality of discrete attachment points, as well as a bare-die light-emitting diode encapsulated by the waveguide. | 08-13-2015 |
Gal Segal, Doar-Na Hof Hacarmel IL
Patent application number | Description | Published |
---|---|---|
20090081313 | Biodegradable Magnesium Alloys and Uses Thereof - Novel magnesium-based compositions-of-matter which can be used for manufacturing implantable medical devices such as orthopedic implants are disclosed. The compositions-of-matter can be used for constructing monolithic, porous and/or multilayered structures which are characterized by biocompatibility, mechanical properties and degradation rate that are highly suitable for medical applications. Articles, such as medical devices, made of these magnesium-based compositions-of-matter and processes of preparing these magnesium-based compositions-of-matter are also disclosed. | 03-26-2009 |
Hadar Segal, Bat-Yam IL
Patent application number | Description | Published |
---|---|---|
20120282583 | SYSTEM AND METHOD FOR PERFORMING A HYBRID SIMULATION OF A MEDICAL PROCEDURE - Embodiments of the invention are directed to a method of performing a simulation of a medical procedure. A physical model of an anatomical structure and of a medical tool may be provided. 3D digital models of the anatomical structure and medical tool may be provided. A location parameter related to a location of the physical medical tool with respect to the physical model of the anatomical structure may be received. The 3D models of the anatomical structure and medical tool may be manipulated according to the location parameter. | 11-08-2012 |
20140349263 | FOLDABLE MEDICAL SIMULATION SYSTEM - Embodiments of the invention are directed to a foldable system for a simulated image-guided medical procedure. The system includes a foldable base having at least two portions connected by a hinge, each to support one of the guide tubes two or more guide tubes to guide operational tools and two or more tracking units to detect tracking information of the operational tools. The tracking units are configured to provide tracking information to a processor be used in an image guided computerized medical simulation. | 11-27-2014 |
20140349264 | FOLDABLE MEDICAL SIMULATION SYSTEM - A system for simulating an image-guided medical procedure on a computerized anatomy is provided. The system includes a foldable base having two portions connected by a hinged connector, each portion of the foldable base is provided with one or more docking stations. The system further includes two or more working units, each connectable to any one of the docking stations. Each working unit comprises a chamber capable of receiving an operation tool, a diameter sensor to detect diameter information related to the operational tool and a tracking unit configured to detect tracking information related to the operational tool. | 11-27-2014 |
Ido Segal, Kefar Saba IL
Patent application number | Description | Published |
---|---|---|
20150224414 | INFANT AMUSEMENT DEVICE - Provided is an infant amusement device to be mounted on a furniture item having a supporting wall, the device including a board-like body configured with a first face configured in turn with a first stimulating theme and a second face configured in turn with a second stimulating theme, and a handle unit configured for carrying the amusement device and for mounting it on said supporting wall at a plurality of positions exposing the first face or the second face. | 08-13-2015 |
20150321112 | TOY MOBILE - Provided is an infant toy mobile including a hub rotatable about a first axis and at least one object support articulated to the hub and being configured for articulation thereto of at least two geometric objects, and further being configured for rotation with respect to the hub about a second axis different from the first axis. | 11-12-2015 |
Iftach Segal, Afula Illit IL
Patent application number | Description | Published |
---|---|---|
20090263190 | Arresting Motion of a Vehicle having Wheels with Tires - A barrier (B) for arresting motion of a vehicle driven in an incoming direction (V) and having wheels ( | 10-22-2009 |
Igor Segal, Maalot IL
Patent application number | Description | Published |
---|---|---|
20150147127 | Rotary Cutting Tool Having A Predetermined Number Of Left And Right Handed Helical Flutes And End Face Cutting Teeth - A rotary cutting tool, having a longitudinal axis, includes cutting and mounting portions. The cutting portion includes an end face surface and a peripheral surface extending therefrom. The peripheral surface includes respective pluralities of main and auxiliary flutes that extend helically with opposite hand about the longitudinal axis. The cutting portion includes a plurality of evenly circumferentially distributed end gashes and a plurality of end face cutting teeth. The number of main flutes and auxiliary flutes are different, each being wholly divisible by, and greater than, the number of end face cutting teeth. In each cross sectional view of the cutting portion an imaginary contour line defined by a peripheral contour of the peripheral surface of one of the end face cutting teeth is in rotationally aligned relationship, about the longitudinal axis, with the peripheral contour of the peripheral surfaces of all other end face cutting teeth. | 05-28-2015 |
Jacob Segal, Kiryat Bialik IL
Patent application number | Description | Published |
---|---|---|
20130115108 | HYDRAULIC POWER SYSTEM - A hydraulic power system comprises a hydraulic pump coupled to a brushless motor. The brushless motor may comprise stators having a plurality of windings and at least one outrunning rotor having a plurality of magnetic poles and optionally coupled to a drive shaft via flexible couplings which may be coaxial with the drive shaft and rotor. | 05-09-2013 |
Jonathan Segal, Efrat IL
Patent application number | Description | Published |
---|---|---|
20090081658 | GENEMAP OF THE HUMAN GENES ASSOCIATED WITH CROHN'S DISEASE - The present invention relates to the selection of a set of polymorphism markers for use in genome wide association studies based on linkage disequilibrium mapping. In particular, the invention relates to the fields of pharmacogenomics, diagnostics, patient therapy and the use of genetic haplotype information to predict an individual's susceptibility to Crohn's disease and/or their response to a particular drug or drugs. | 03-26-2009 |
20090305900 | GENEMAP OF THE HUMAN GENES ASSOCIATED WITH LONGEVITY - The present invention relates to the selection of a set of SNP markers for use in genome wide association studies based on linkage disequilibrium mapping. In particular, the invention relates to the fields of pharmacogenomics, diagnostics, patient therapy and the use of genetic haplotype information to predict an individual's longevity, their protection against age-related diseases and/or their response to a particular drug or drugs. | 12-10-2009 |
20100081129 | Genemap of the human genes associated with crohn's disease - The present invention relates to the selection of a set of polymorphism markers for use in genome wide association studies based on linkage disequilibrium mapping. In particular, the invention relates to the fields of pharmacogenomics, diagnostics, patient therapy and the use of genetic haplotype information to predict an individual's susceptibility to Crohn's disease and/or their response to a particular drug or drugs. | 04-01-2010 |
20100120628 | GENEMAP OF THE HUMAN GENES ASSOCIATED WITH ADHD - The present invention relates to the selection of a set of polymorphism markers for use in genome wide association studies based on linkage disequilibrium mapping. In particular, the invention relates to the fields of pharmacogenomics, diagnostics, patient therapy and the use of genetic haplotype information to predict an individual's susceptibility to ADHD disease and/or their response to a particular drug or drugs. | 05-13-2010 |
20100144538 | GENEMAP OF THE HUMAN GENES ASSOCIATED WITH SCHIZOPHRENIA - The present invention relates to the selection of a set of polymorphism markers for use in genome wide association studies based on linkage disequilibrium mapping. In particular, the invention relates to the fields of pharmacogenomics, diagnostics, patient therapy and the use of genetic haplotype information to predict an individual's susceptibility to SCHIZOPHRENIA disease and/or their response to a particular drug or drugs. | 06-10-2010 |
Joseph Segal, Haifa IL
Patent application number | Description | Published |
---|---|---|
20110217251 | THERAPEUTIC COMPOSITIONS COMPRISING POLYHYDROXYLTATE FATTY ALCOHOL DERIVATIVES AND USES THEREOF - Therapeutic compositions comprising pharmaceutically effective amounts of isolated polyhydroxylated fatty alcohols, in particular suitable for topical or systemic administration. A method for the isolation of a natural polyhydroxylated fatty alcohol from a fruit or vegetable source is also disclosed. | 09-08-2011 |
20110250154 | COSMETIC COMPOSITIONS COMPRISING POLYHYDROXYLTATE FATTY ALCOHOLS AND DERIVATIVES AND USES THEREOF - Cosmetic methods and compositions for preventing or reversing damage caused to the skin of a subject by environmental pollution and/or UV radiation, the methods and compositions comprising isolated polyhydroxylated fatty alcohols or derivatives thereof for topical application, in an amount effective to prevent or reverse the harmful effects of environmental pollution and/or UV radiation on the skin e.g. by reducing the damage to the skin cells and/or improving the aesthetic appearance of human skin. | 10-13-2011 |
20150175933 | POLYHYDROXYLATED FATTY ALCOHOLS - A process of obtaining avocado seed extracts comprising polyhydroxylated fatty alcohols (PFAs), the process comprising crushing raw undried avocado seeds; incubating the crushed avocado seeds; and extracting PFAs from the crushed seeds with an organic solvent. | 06-25-2015 |
Liat Segal, Tel Aviv IL
Patent application number | Description | Published |
---|---|---|
20100223498 | OPERATING SYSTEM-BASED APPLICATION RECOVERY - Methods, systems, and computer-readable media are disclosed for operating system-based application recovery. A particular method saves an application state of an application executing at a computer. When a failure of the application is detected, the operating system provides an option to initiate recovery of the application by reverting to the saved application state. When the option to initiate recovery is selected by a user of the computer, the operating system recovers the application by reverting to the saved application state. | 09-02-2010 |
Liat Segal, Holon IL
Patent application number | Description | Published |
---|---|---|
20110282858 | Hierarchical Content Classification Into Deep Taxonomies - A document may be classified by traversing a hierarchical classification tree and comparing the words in the document to words in documents representing the nodes on the classification tree. The document may be classified by traversing the classification tree and generating a comparison score based on word comparisons. The score may be used to trim the classification tree or to advance to another node on the tree. The score may be based on a scarcity or importance of individual words in the document compared to the scarcity or importance of words in the category. The result may be a set of classifications with scores for those classifications. | 11-17-2011 |
20120166441 | KEYWORDS EXTRACTION AND ENRICHMENT VIA CATEGORIZATION SYSTEMS - Techniques for determining a set of keywords associated with a document are provided. A document is received that may be classified into a taxonomy that includes a plurality of categories. A categorization ranking is determined for each category for the received document. A set of categories of the taxonomy having highest categorization rankings is determined for the received document. Documents representing the set of categories having highest categorization rankings are combined together into a cumulative representative text that includes a plurality of terms. A cumulative term corpus importance score is determined for each term in the cumulative representative text. The cumulative term corpus importance score for a particular term indicates an importance of the particular term in a context of the cumulative representative text. A set of terms of the cumulative representative text having highest cumulative term corpus importance scores is selected to be keywords for the received document. | 06-28-2012 |
Lior Segal, Herzeliya IL
Patent application number | Description | Published |
---|---|---|
20120213248 | System and Method for Warm Body Presence Detection - A system and method for warm body presence detection, the system comprising a detection unit comprising a light focusing unit for absorbing light from an inspected region; and a thermal detection unit for receiving the absorbed light, sensing infrared radiation and generating a signal indicative of the sensed infrared radiation; and a processing unit for analyzing the generated signal and deciding based on the analysis whether a warm body presence has been detected. The method for warm body presence detection comprises receiving and analyzing by a processing unit inputs from a short wavelengths thermal detector and a long wavelengths thermal detector, the inputs comprise indications of the amount of emitted infrared radiation in the respective wavelength ranges inspected by each thermal detector, and deciding that a warm body presence has been detected in case the emitted infrared radiation values detected by both thermal detectors correspond to predefined values. | 08-23-2012 |
Maor Segal, D.n. Negev IL
Patent application number | Description | Published |
---|---|---|
20090142456 | Polymeric Sheets and Articles Wrapped Therewith - A polymeric sheet having low density and comprising a low to non-existent amount of cyclic olefinic polymers (COP) and/or cyclic olefinic copolymers (COC). The overall density of the sheet may be lower than water. The sheet may be stretched and then heat shrinked onto an article. The sheet may be used as a label or package to wrap articles therewith. | 06-04-2009 |
20130340919 | POLYMERIC SHEETS AND ARTICLES WRAPPED THEREWITH - A polymeric sheet having low density and comprising a low to non-existent amount of cyclic olefinic polymers (COP) and/or cyclic olefinic copolymers (COC). The overall density of the sheet may be lower than water. The sheet may be stretched and then heat shrinked onto an article. The sheet may be used as a label or package to wrap articles therewith. | 12-26-2013 |
20140099492 | POLYMERIC SHEETS AND ARTICLES WRAPPED THEREWITH - A polymeric sheet having low density and comprising a low to non-existent amount of cyclic olefinic polymers (COP) and/or cyclic olefinic copolymers (COC). The overall density of the sheet may be lower than water. The sheet may be stretched and then heat shrinked onto an article. The sheet may be used as a label or package to wrap articles therewith. | 04-10-2014 |
20140194587 | POLYMERIC SHEETS AND ARTICLES WRAPPED THEREWITH - A polymeric sheet having low density and comprising a low to non-existent amount of cyclic olefinic polymers (COP) and/or cyclic olefinic copolymers (COC). The overall density of the sheet may be lower than water. The sheet may be stretched and then heat shrinked onto an article. The sheet may be used as a label or package to wrap articles therewith. | 07-10-2014 |
20150203644 | POLYMERIC SHEETS AND ARTICLES WRAPPED THEREWITH - A polymeric sheet having low density and comprising a low to non-existent amount of cyclic olefinic polymers (COP) and/or cyclic olefinic copolymers (COC). The overall density of the sheet may be lower than water. The sheet may be stretched and then heat shrinked onto an article. The sheet may be used as a label or package to wrap articles therewith. | 07-23-2015 |
Marina Segal, Tel-Aviv IL
Patent application number | Description | Published |
---|---|---|
20100082685 | SYSTEM AND METHOD FOR EVALUATION AND PRESENTING AUTHORIZATION RIGHTS IN AN ORGANIZATION - A system and method for evaluating instances of authorization authority or segregation of duties in an organization against criteria for such authorizations, storing results of such evaluations and presenting such results to a user through queries of the stored results. | 04-01-2010 |
Mark Segal, Jerusalem IL
Patent application number | Description | Published |
---|---|---|
20140223586 | ALWAYS-AVAILABLE EMBEDDED THEFT REACTION SUBSYSTEM - A system comprising a platform protected by an always-on always-available security system is described. In one embodiment, the system includes a risk behavior logic to detect a potential problem, a core logic component to provide logic to analyze the potential problem and to move the platform to a suspecting mode when the potential problem indicates a theft suspicion, and the security action logic, to send periodic alerts to a security server when the platform is in the suspecting mode, the alert including movement related data, such that the security server can take an action to protect the platform. | 08-07-2014 |
Maurice Segal, Jerusalem IL
Patent application number | Description | Published |
---|---|---|
20140219751 | STORAGE STRUCTURES - A storage structure ( | 08-07-2014 |
Michael Segal, Beer-Sheva IL
Patent application number | Description | Published |
---|---|---|
20150052352 | CERTIFICATING VEHICLE PUBLIC KEY WITH VEHICLE ATTRIBUTES - A method for providing secure connection between vehicles over channels of a wireless communication network, according to which, a first unique pair of digitally signed public key and private key is provided to each vehicle, along with additional vehicle-related data including a visually static collection of attributes of the vehicle. A unique certificate number is generated for each vehicle and monolithic data consisting of the public key, the certificate number and the attributes is signed by a trusted certificate generating authority. Prior to wireless communication between a first vehicle and a second vehicle, a verification step is performed during which the first vehicle sends its unique certificate number to a second vehicle over a communication channel; the second vehicle verifies the authenticity of received unique certificate number of the first vehicle and attributes by a camera that captures attributes which are visible, using image processing means. If the attributes are verified successfully, the second vehicle sends its unique certificate number to the first vehicle over a communication channel, along with a secret session key, which is valid for the current session only. Then the first vehicle verifies the authenticity of received unique certificate number of the second vehicle and attributes by a camera that captures attributes of the second vehicle which are visible, using signal processing means and both vehicles are allowed to securely exchange message or data using the secret session key. | 02-19-2015 |
Muli Segal, Tel Aviv IL
Patent application number | Description | Published |
---|---|---|
20110319052 | SYSTEM AND METHOD FOR DETERMINING COMMONLY USED COMMUNICATION TERMINALS AND FOR IDENTIFYING NOISY ENTITIES IN LARGE-SCALE LINK ANALYSIS - Systems and methods for identifying and characterizing relationships based on communication traffic. The methods may include accepting indications of communication conducted among entities over a communication network, and using a link processor, analyzing the indications so as to identify that two or more of the entities are interrelated by detecting one or more intermediate entities with which the two or more entities communicate. A criterion may be evaluated with respect to the indications associated with a given entity, responsively to meeting the criterion, disqualifying the given entity from serving as an intermediate entity in analyzing the indications. | 12-29-2011 |
20120015626 | SYSTEM AND METHOD FOR DETERMINING COMMONLY USED COMMUNICATION TERMINALS AND FOR IDENTIFYING NOISY ENTITIES IN LARGE-SCALE LINK ANALYSIS - Methods and systems for determining mobile communication terminals (mobiles) that have a common user, or that have a group of users in common. The methods and systems examine change-of-association events of mobiles operating in a network, and correlate the events to determine common mobiles, i.e., mobiles that have the same or similar change-of-association events. The events described are generated by the mobiles themselves automatically, by virtue of the fact that the mobiles are operating in the network. There is thus no need for, and the embodiments described herein do not require, user intervention to generate the events. | 01-19-2012 |
Natalya Segal, Kfar Netter IL
Patent application number | Description | Published |
---|---|---|
20120262463 | Virtualization method of vertical-synchronization in graphics systems - Vertical synchronization (v-sync) in prior art prevents video tearing artifacts by keeping the video pipeline synchronized with the monitor. Such technique keeps the frame rate of the rendering engine equal to monitor's refresh rate. However, it suffers from two substantial shortcomings: performance limitations and input lag, both of which are critical in real-time applications such as video games and professional applications (e.g. 3D CAD). The different embodiments of present invention, termed virtual vertical-synchronization (Virtual v-sync), eliminate tearing artifacts, while solving the shortfall of performance by shortening or dropping undisplayed frames, and solving the input lags by removing frame blocking. Any frame rate is achievable, independently of the monitor refresh. Two additional uses of the virtual vertical-synchronization are cloud gaming improvement and power consumption control. | 10-18-2012 |
20140292773 | VIRTUALIZATION METHOD OF VERTICAL-SYNCHRONIZATION IN GRAPHICS SYSTEMS - A method for rendering frames in graphic systems includes not displaying at least one frame in a sequence of frames. | 10-02-2014 |
20140292785 | VIRTUALIZATION METHOD OF VERTICAL-SYNCHRONIZATION IN GRAPHICS SYSTEMS - A method for reducing power consumption in graphics systems includes not displaying at least one frame in a sequence of frames. | 10-02-2014 |
Natalya Segal, Even Yehuda IL
Patent application number | Description | Published |
---|---|---|
20150324181 | SMART WEARABLE DEVICES AND SYSTEM THEREFOR - The invention addresses a novel system and devices for remote control of wearable computers. In one embodiment the remote control is incorporated in a piece clothing or jewelry, for example a ring, a bracelet, a watch. In another embodiment, it is part of a user's mobile device. The system comprises hardware, accompanied by software running on two or more devices, and allowing for device interoperability over a wireless connection, e.g., Bluetooth. The invention further comprises novel software systems which improve usability of remote control devices disclosed herein and in other patent documents. The invention also presents solutions for combining software and device markets which are continuously introducing new products and more complex software systems. | 11-12-2015 |
Ofer Segal, Rishon Lezion IL
Patent application number | Description | Published |
---|---|---|
20080310260 | Modular watch and device for securing a watch strap to a watch casing - A modular watchcase having a substantially hollow protective casing configured to hold a watch mechanism allowing passage for at least one watch control projection and a frame member configured to surround the casing and having anchor elements for the attachment of a watch strap. The frame member allows passage for the watch control projection, and a bezel ring is attachable to the enclosure without need of tools for easy interchangeability of the frame member. | 12-18-2008 |
Oren Segal, Kfar Saba IL
Patent application number | Description | Published |
---|---|---|
20120254694 | REDUNDANT STORAGE IN NON-VOLATILE MEMORY BY STORING REDUNDANCY INFORMATION IN VOLATILE MEMORY - A method for data storage includes storing two or more data items in a non-volatile memory. Redundancy information is calculated over the data items, and the redundancy information is stored in a volatile memory. Upon a failure to retrieve a data item from the non-volatile memory, the data item is reconstructed from remaining data items stored in the non-volatile memory and from the redundancy information stored in the volatile memory. | 10-04-2012 |
Ori Segal, Tel Aviv IL
Patent application number | Description | Published |
---|---|---|
20100088761 | CROSS-DOMAIN ACCESS PREVENTION - A method, system, and computer program product for cross-domain access prevention are provided. The method includes detecting a request from a first domain to access a second domain, and applying cross-domain access heuristics to determine whether to allow the request. The cross-domain access heuristics define common ownership characteristics between the first domain and the second domain. The method further includes performing the requested access in response to determining that the request complies with at least one of the cross-domain access heuristics, and blocking the requested access in response to determining that the request fails to comply with the cross-domain access heuristics. | 04-08-2010 |
20120198557 | DETERMINING THE VULNERABILITY OF COMPUTER SOFTWARE APPLICATIONS TO PRIVILEGE-ESCALATION ATTACKS - Determining the vulnerability of computer software applications to privilege-escalation attacks, such as where an instruction classifier is configured to be used for identifying a candidate access-restricted area of the instructions of a computer software application, and a static analyzer is configured to statically analyze the candidate access-restricted area to determine if there is a conditional instruction that controls execution flow into the candidate access-restricted area, perform static analysis to determine if the conditional instruction is dependent on a data source within the computer software application, and designate the candidate access-restricted area as vulnerable to privilege-escalation attacks absent either of the conditional instruction and the date source. | 08-02-2012 |
20120272322 | DETERMINING THE VULNERABILITY OF COMPUTER SOFTWARE APPLICATIONS TO PRIVILEGE-ESCALATION ATTACKS - Determining the vulnerability of computer software applications to privilege-escalation attacks, such as where an instruction classifier is configured to be used for identifying a candidate access-restricted area of the instructions of a computer software application, and a static analyzer is configured to statically analyze the candidate access-restricted area to determine if there is a conditional instruction that controls execution flow into the candidate access-restricted area, perform static analysis to determine if the conditional instruction is dependent on a data source within the computer software application, and designate the candidate access-restricted area as vulnerable to privilege-escalation attacks absent either of the conditional instruction and the date source. | 10-25-2012 |
20120278480 | SYSTEM AND METHOD FOR IDENTIFYING SESSION IDENTIFICATION INFORMATION - A computer-implemented process, computer program product, and apparatus for identifying session identification information. A recording is initiated and an operation sequence of interest is performed while recording and the recording ceases. Responsive to a determination that the operation sequence of interest was successful, information from the operation sequence of interest is saved as recorded information and responsive to a determination that a same operation sequence of interest was recorded, the recorded information from each operation sequence of interest is compared. Differences in the recorded information are identified to form identified differences and a session identifier is constructed using the identified differences. | 11-01-2012 |
20130007886 | DETECTING SECURITY VULNERABILITIES IN WEB APPLICATIONS - Method to detect security vulnerabilities includes: interacting with a web application during its execution to identify a web page exposed by the web application; statically analyzing the web page to identify a parameter within the web page that is constrained by a client-side validation measure and that is to be sent to the web application; determining a server-side validation measure to be applied to the parameter in view of the constraint placed upon the parameter by the client-side validation measure; statically analyzing the web application to identify a location within the web application where the parameter is input into the web application; determining whether the parameter is constrained by the server-side validation measure prior to the parameter being used in a security-sensitive operation; and identifying the parameter as a security vulnerability. | 01-03-2013 |
20130160117 | IDENTIFYING REQUESTS THAT INVALIDATE USER SESSIONS - An illustrative embodiment of a computer-implemented process for identifying a request invalidating a session excludes all marked logout requests of a Web application, crawls an identified next portion of the Web application and responsive to a determination, in one instance, that the state of the crawl is out of session, logs in to the Web application. The computer-implemented process further selects all crawl requests sent since a last time the crawl was in-session, excluding all marked logout requests and responsive to a determination that requests remain, crawls a selected next unprocessed request. Responsive to a determination, in the next instance, that state of the crawl is out of session and the selected request meets logout request criteria, the computer-implemented process marks the selected request as a logout request. | 06-20-2013 |
20130174260 | TARGETED SECURITY TESTING - Source code of a plurality of web pages including script code is statically analyzed. A page including a potential vulnerability is identified based on the static analysis. A page not including a potential vulnerability is identified based on the static analysis. The web page including the potential vulnerability is dynamically analyzed using a set of test payloads. The page not including the potential vulnerability is dynamically analyzed using a subset of the set of test payloads, the subset including fewer test payloads than the set of test payloads. | 07-04-2013 |
20130174262 | TARGETED SECURITY TESTING - Source code of a plurality of web pages including script code is statically analyzed. A page including a potential vulnerability is identified based on the static analysis. A page not including a potential vulnerability is identified based on the static analysis. The web page including the potential vulnerability is dynamically analyzed using a set of test payloads. The page not including the potential vulnerability is dynamically analyzed using a subset of the set of test payloads, the subset including fewer test payloads than the set of test payloads. | 07-04-2013 |
20130179979 | DETECTING SECURITY VULNERABILITIES IN WEB APPLICATIONS - Method to detect security vulnerabilities includes: interacting with a web application during its execution to identify a web page exposed by the web application; statically analyzing the web page to identify a parameter within the web page that is constrained by a client-side validation measure and that is to be sent to the web application; determining a server-side validation measure to be applied to the parameter in view of the constraint placed upon the parameter by the client-side validation measure; statically analyzing the web application to identify a location within the web application where the parameter is input into the web application; determining whether the parameter is constrained by the server-side validation measure prior to the parameter being used in a security-sensitive operation; and identifying the parameter as a security vulnerability. | 07-11-2013 |
20130191913 | DYNAMICALLY SCANNING A WEB APPLICATION THROUGH USE OF WEB TRAFFIC INFORMATION - Collecting log file data from at least one log file. From the collected log file data, at least one HTTP request can be generated to exercise a web application to perform a security analysis of the web application. The HTTP request can be communicated to the web application. At least one HTTP response to the HTTP request can be received. The HTTP response can be analyzed to perform validation of the web application. Results of the validation can be output. | 07-25-2013 |
20130191920 | DYNAMICALLY SCANNING A WEB APPLICATION THROUGH USE OF WEB TRAFFIC INFORMATION - Collecting log file data from at least one log file. From the collected log file data, at least one HTTP request can be generated to exercise a web application to perform a security analysis of the web application. The HTTP request can be communicated to the web application. At least one HTTP response to the HTTP request can be received. The HTTP response can be analyzed to perform validation of the web application. Results of the validation can be output. | 07-25-2013 |
20140129620 | INDICATING COVERAGE OF WEB APPLICATION TESTING - Testing a system under test includes intercepting, within a proxy system, a request from a client system sent to the system under test. The request is analyzed within the proxy system and sent to the system under test. Within the proxy system, a response from the system under test sent to the client system is intercepted. The response is instrumented creating a modified response indicating test coverage according to the request. The modified response is sent to the client system. | 05-08-2014 |
20140129878 | INDICATING COVERAGE OF WEB APPLICATION TESTING - Testing a system under test includes intercepting, within a proxy system, a request from a client system sent to the system under test. The request is analyzed within the proxy system and sent to the system under test. Within the proxy system, a response from the system under test sent to the client system is intercepted. The response is instrumented creating a modified response indicating test coverage according to the request. The modified response is sent to the client system. | 05-08-2014 |
Ory Segal, Herzelyia IL
Patent application number | Description | Published |
---|---|---|
20140109228 | TRANSFORMING UNIT TESTS FOR SECURITY TESTING - A method, computer program product, and system for transforming unit tests is described. A unit test associated with one or more software units is identified. A first input parameter of the unit test is identified. A substitute parameter value is determined, wherein the substitute parameter value is associated with a security test for the one or more software units. A value of the first input parameter in the unit test is replaced with the substitute parameter value. The unit test including the substitute parameter value is implemented for the one or more software units. A first security issue associated with the one or more software units is identified, based upon, at least in part, replacing the first input parameter of the unit test with the substitute parameter value and implementing the unit test including the substitute parameter value. | 04-17-2014 |
Ory Segal, Herzliya IL
Patent application number | Description | Published |
---|---|---|
20130205398 | AUTOMATIC SYNTHESIS OF UNIT TESTS FOR SECURITY TESTING - Performing security analysis on a computer program under test (CPUT). The CPUT can be analyzed to identify data pertinent to potential security vulnerabilities of the CPUT. At least a first unit test configured to test a particular unit of program code within the CPUT can be automatically synthesized. The first unit test can be configured to initialize at least one parameter used by the particular unit of program code within the CPUT, and can be provided at least a first test payload configured to exploit at least one potential security vulnerability of the CPUT. The first unit test can be dynamically processed to communicate the first test payload to the particular unit of program code within the CPUT. Whether the first test payload exploits an actual security vulnerability of the CPUT can be determined, and a security analysis report can be output. | 08-08-2013 |
20130205399 | AUTOMATIC SYNTHESIS OF UNIT TESTS FOR SECURITY TESTING - Performing security analysis on a computer program under test (CPUT). The CPUT can be analyzed to identify data pertinent to potential security vulnerabilities of the CPUT. At least a first unit test configured to test a particular unit of program code within the CPUT can be automatically synthesized. The first unit test can be configured to initialize at least one parameter used by the particular unit of program code within the CPUT, and can be provided at least a first test payload configured to exploit at least one potential security vulnerability of the CPUT. The first unit test can be dynamically processed to communicate the first test payload to the particular unit of program code within the CPUT. Whether the first test payload exploits an actual security vulnerability of the CPUT can be determined, and a security analysis report can be output. | 08-08-2013 |
Ory Segal, Tel Aviv IL
Patent application number | Description | Published |
---|---|---|
20090320043 | APPLICATION STATE DETECTOR AND INDUCER - A method for controlling a computer-implemented application, the method including determining a current state of a computer-implemented application, inducing the application into a predefined state associated with a target action of the application if the current state does not match the predefined state in accordance with predefined match criteria, and causing the target action to be performed. | 12-24-2009 |
20100088668 | Crawling of object model using transformation graph - A transformation tree for an object model (OM) is defined. The transformation tree has nodes interconnected by edges, where each node is connected to at most one other tree node. Each node corresponds to a state of the OM; each edge corresponds to an event causing the OM to transition from the state of one node to the state of another node. A transformation graph for the OM is constructed by simulating the transformation tree. The transformation graph has nodes interconnected by edges, and is a directed graph in which each node is connected to one or more other nodes. Each node corresponds to a state of the OM; each edge corresponds to an event causing the OM to transition from the state of one node to the state of another node. Crawling-oriented actions are performed in relation to the OM by being performed in relation to the transformation graph. | 04-08-2010 |
20110321016 | INJECTION CONTEXT BASED STATIC ANALYSIS OF COMPUTER SOFTWARE APPLICATIONS - Embodiments of the invention generally relate to injection context based static analysis of computer software applications. Embodiments of the invention may include selecting a sink within a computer software application, tracing a character output stream leading to the sink within the computer software application, determining an injection context of the character output stream at the sink, where the injection context is predefined in association with a state of the character output stream at the sink, identifying any actions that have been predefined in association with the identified injection context, and providing a report of the actions. | 12-29-2011 |
20120110551 | SIMULATING BLACK BOX TEST RESULTS USING INFORMATION FROM WHITE BOX TESTING - Systems, methods are program products for simulating black box test results using information obtained from white box testing, including analyzing computer software (e.g., an application) to identify a potential vulnerability within the computer software application and a plurality of milestones associated with the potential vulnerability, where each of the milestones indicates a location within the computer software application, tracing a path from a first one of the milestones to an entry point into the computer software application, identifying an input to the entry point that would result in a control flow from the entry point and through each of the milestones, describing the potential vulnerability in a description indicating the entry point and the input, and presenting the description via a computer-controlled output medium. | 05-03-2012 |
20120254839 | SIMULATING BLACK BOX TEST RESULTS USING INFORMATION FROM WHITE BOX TESTING - Systems, methods are program products for simulating black box test results using information obtained from white box testing, including analyzing computer software (e.g., an application) to identify a potential vulnerability within the computer software application and a plurality of milestones associated with the potential vulnerability, where each of the milestones indicates a location within the computer software application, tracing a path from a first one of the milestones to an entry point into the computer software application, identifying an input to the entry point that would result in a control flow from the entry point and through each of the milestones, describing the potential vulnerability in a description indicating the entry point and the input, and presenting the description via a computer-controlled output medium. | 10-04-2012 |
20140068563 | COMPUTER SOFTWARE APPLICATION SELF-TESTING - Testing a computer software application by detecting an arrival of input data provided as input to a computer software application from a source external to the computer software application, modifying the detected input data to include test data configured to test the computer software application in accordance with a predefined test, thereby creating a modified version of the detected input data, and processing the modified version of the detected input data, thereby performing the predefined test on the computer software application using the test data. | 03-06-2014 |
20140096259 | SECURE TRANSPORT OF WEB FORM SUBMISSIONS - Methods and systems for secure web form submission may implement one or more operations including, but not limited to: receiving web content including at least one web form from a web server at a client; determining a value of at least one web form submission security attribute of the at least one web form; and transmitting submission data associated with the at least one web form from the client to the web server according to the value of the web form submission security attribute. | 04-03-2014 |
20140129877 | COLLABORATIVE APPLICATION TESTING - A method, computer program product, and computer system for performing, at a computing device, an analysis of a web application. A response is annotated by the web application with coverage data based upon, at least in part, the analysis, wherein the coverage data indicates which actions have been performed on the web application and which actions have not been performed on the web application according to results of the analysis. The response that includes the coverage data is shared with one or more users. | 05-08-2014 |
20140129915 | COLLABORATIVE APPLICATION TESTING - A method, computer program product, and computer system for performing, at a computing device, an analysis of a web application. A response is annotated by the web application with coverage data based upon, at least in part, the analysis, wherein the coverage data indicates which actions have been performed on the web application and which actions have not been performed on the web application according to results of the analysis. The response that includes the coverage data is shared with one or more users. | 05-08-2014 |
20140298474 | AUTOMATIC SYNTHESIS OF UNIT TESTS FOR SECURITY TESTING - Performing security analysis on a computer program under test (CPUT). The CPUT can be analyzed to identify data pertinent to potential security vulnerabilities of the CPUT. At least a first unit test configured to test a particular unit of program code within the CPUT can be automatically synthesized. The first unit test can be configured to initialize at least one parameter used by the particular unit of program code within the CPUT, and can be provided at least a first test payload configured to exploit at least one potential security vulnerability of the CPUT. The first unit test can be dynamically processed to communicate the first test payload to the particular unit of program code within the CPUT. Whether the first test payload exploits an actual security vulnerability of the CPUT can be determined, and a security analysis report can be output. | 10-02-2014 |
20150358343 | DETECTION AND CLASSIFICATION OF MALICIOUS CLIENTS BASED ON MESSAGE ALPHABET ANALYSIS - Described herein are systems, methods and apparatus for detecting and classifying malicious agents on a computer network. Many attacks require that the malicious message or messages employ certain characters. Such sets of characters can be indicative of an attack and referred to as a “malicious alphabet.” All clients on a network are likely to use characters from malicious alphabets in legitimate and valid network messages. However, malicious clients are likely to use characters from malicious alphabets in different ways than legitimate clients. According to the teachings hereof, a particular client's use of a malicious alphabet can be tracked and used to identify it as a potential attacker. Such tracking may take place across the applications and/or websites to which the traffic is directed. Based on the nature and extent of the client's use of the malicious alphabet, a reputation score for the client can be developed. | 12-10-2015 |
Ory Segal, Hertzllia IL
Patent application number | Description | Published |
---|---|---|
20140109227 | TRANSFORMING UNIT TESTS FOR SECURITY TESTING - A method, computer program product, and system for transforming unit tests is described. A unit test associated with one or more software units is identified. A first input parameter of the unit test is identified. A substitute parameter value is determined, wherein the substitute parameter value is associated with a security test for the one or more software units. A value of the first input parameter in the unit test is replaced with the substitute parameter value. The unit test including the substitute parameter value is implemented for the one or more software units. A first security issue associated with the one or more software units is identified, based upon, at least in part, replacing the first input parameter of the unit test with the substitute parameter value and implementing the unit test including the substitute parameter value. | 04-17-2014 |
Ory Segal, Haifa IL
Patent application number | Description | Published |
---|---|---|
20110055813 | Black Box Testing Optimization Using Information from White Box Testing - Testing a computer software application by identifying a sink in the computer software application, identifying a source associated with the sink in the application, identifying an entry point associated with the source in the application, where the source is configured to receive input provided externally to the application via the entry point, determining a sink type represented by the sink, and providing to a testing application information identifying the entry point and in association with the sink type. | 03-03-2011 |
Ram Segal, Nes Ziona IL
Patent application number | Description | Published |
---|---|---|
20150149982 | AUTOMATIC COMPUTER CODE PARALLELIZATION - A method for computer code parallelization, comprising: providing sequential computer code by a user; defining structure of the sequential computer code, the structure comprises a plurality of code processes; generating automatically a plurality of parallelized computer codes corresponding to the sequential computer code, each having different configuration of parallelizing the plurality of code processes; running the plurality of parallelized computer codes on a multi-core processing platform; evaluating performance of the processing platform during running of each of the parallelized computer codes; and ranking each of the parallelized computer codes according to the performance evaluation. | 05-28-2015 |
Rami Segal, Hod Hasharon IL
Patent application number | Description | Published |
---|---|---|
20150095961 | MOCA REMOTE MONITORING AND MANAGEMENT SYSTEM - A system for multimedia over coax alliance (MoCA) remote monitoring and management includes a gateway and multiple local nodes. The gateway communicates with a service provider. The local nodes perform local diagnostics and communicate diagnostic results to the gateway. The gateway and the local nodes form a MoCA remote entity (MoRE) system. The gateway receives and aggregates diagnostic results of the MORE system and facilitates access to aggregated diagnostic results for the service provider. | 04-02-2015 |
Raul D. Segal, Zichron Yaacov IL
Patent application number | Description | Published |
---|---|---|
20130091110 | Recovery of Inconsistent Data in Databases - A mechanism is provided for efficiently searching a database for data associated with a key value that is unidentifiable in a set of nodes of the database. A request is received to retrieve data from the database, where the request specifies a searched-for key value that is unidentifiable in the set of nodes of the database. The data associated with the searched-for key value is identified in a lowest level node of the database between a current leftmost node and a current rightmost node. A key index is updated in at least one node of the database with the key index value associated with the data and identified from the lowest level node thereby making the searched-for key value identifiable within the at least one node. The data associated with the searched-for key value is then returned to a user. | 04-11-2013 |
Ronen Segal, Herzliya IL
Patent application number | Description | Published |
---|---|---|
20150326921 | SYSTEM AND METHOD FOR PROVIDING AN EVENT-DRIVEN VIDEO/AUDIO CONTENT PLATFORM - The disclosure herein relates to providing a video/audio event-driven platform in digital environments. Particularly, the disclosure relates to systems and methods for controlling the video/audio content stream within a video playing session, automatically responding to events allowing the user to continue in a preferred engagement. The methods support operating a media terminal to present a first segment of video content in a first presentation mode, while a second presentation mode, associated with detectable video content events, may be used for a second segment. | 11-12-2015 |
Ronen Segal, Herzlia IL
Patent application number | Description | Published |
---|---|---|
20130155323 | SYSTEM AND METHOD FOR CONTENT BASED CONTROL OF MEDIA RENDERER - Systems and method are presented for controlling the settings of a media renderer, such as a television, in response to available media content and user preferences. The system may include a client terminal connected to the media renderer via a communication channel. The system may be operable to monitor media content available to the media renderer; to obtain user preferences; to compare monitored media content to the user preferences; to select control signals according to the user preferences; and to send the control signals to the media renderer via the communication line thereby adjusting the settings of the media renderer. | 06-20-2013 |
20150261433 | EFFICIENT TOUCH EMULATION WITH NAVIGATION KEYS - A method for converting touch functionalities to key operated functionalities, comprising: identifying a layout hierarchy structure of a plurality of user interface (UI) elements in an application; defining a plurality of areas of the UI, each corresponding with one of the plurality of UI elements having a touch responsiveness property; and activating a touch event of a UI element corresponding with a currently selected area when an activation key is pressed by said user. | 09-17-2015 |
Sergey Segal, Ramat Gan IL
Patent application number | Description | Published |
---|---|---|
20150351392 | MELANOIDINS AND THEIR USE FOR IMPROVING PROPERTIES OF PLANTS - The present invention relates to melanoidins and their use for improving properties of plants. The methods and compositions of the invention are particularly useful for control of fungal plant diseases and drought conditions, and promotion of plant growth. | 12-10-2015 |
Tal Segal, Nes Ziona IL
Patent application number | Description | Published |
---|---|---|
20150339354 | SYSTEM AND METHOD FOR REAL TIME DISPLAY OF DIAGNOSTIC LABORATORY DATA - A system and method for real time updating and displaying medical diagnostics data, wherein the information stored in databases comprising large amounts of sensitive data that is being updated frequently are provided herein. By using a batch table for data filtering and a snapshot table for data retrieval, the system's performance remains substantially predictable and stable regardless of the base tables' size. | 11-26-2015 |
Tuvia Segal, Haifa IL
Patent application number | Description | Published |
---|---|---|
20100116925 | Stabilization for flight platforms - A flight platform, comprising a rotor rotating about a rotor shaft for providing the platform with an active driving force, and a flight control system that controls the flight based on measured flight parameters that are measured by sensors, wherein at least one of the sensors is located substantially along the axis of rotation of the rotor. | 05-13-2010 |
Uri Segal, Jerusalem IL
Patent application number | Description | Published |
---|---|---|
20150220618 | TAGGING RELATIONS WITH N-BEST - Systems, methods, and media for developing ontologies and analyzing communication data are provided herein. In an example implementation, the method includes: identifying terms in in a set of communication data; identifying a list of possible relations of the identified terms; scoring the possible relations according to a set of predefined merits; ranking the possible relations into a list of possible relations in descending order according to their score; and tagging relations in the set of communication data. The relations may be tagged by identifying the possible relations in the communication data in order corresponding with the list of possible relations. The possible relations that have lower rankings that conflict with higher ranking relations are not tagged. The conflicts may be determined by a predefined set of conflict criteria. | 08-06-2015 |
Yaron Segal, Jerusalem IL
Patent application number | Description | Published |
---|---|---|
20150018706 | METHOD AND DEVICE FOR ENHANCING BRAIN ACTIVITY - An apparatus is provided for stimulating brain neural networks of a subject comprising: at least one transmitter configured to generate an electromagnetic field through the brain neural networks of a subject, at least one brain wave measuring device for detecting subject brain wave frequency, a CPU for processing data concerned with detection of brain wave frequency of a subject, having a database for storing and analyzing natural and affected brain scans, and at least one computer readable medium containing a predetermined protocol for transmission of the electromagnetic wave frequency profiles. The apparatus further provides a resonance effect thereby inducing newly generated brain cells to migrate toward a brain tissue area having the pathology or lesion of interest, and initiating new brain pathways at the brain region of interest. | 01-15-2015 |
Yossi Segal, Holon IL
Patent application number | Description | Published |
---|---|---|
20100284495 | METHOD, DEVICE AND SYSTEM OF WIRELESS COMMUNICATION - Some demonstrative embodiments include devices, systems and/or methods of wireless communication. Some embodiments include a receiver to process a wireless transmission received via a plurality of receive antennas, the receiver including a joint beamforming-synchronization module to jointly determine both a synchronization-error value and a beamforming weight vector. Other embodiments are described and claimed. | 11-11-2010 |
Zelik Segal, Akko IL
Patent application number | Description | Published |
---|---|---|
20100031861 | Stabilizer of ship rolling - The roll-stabilizer consist of short wings, with aspect ratio r=0.5-0.75, fastened immovably to the ship hull in staggered rows or in lines along the bilges, at port and starboard sides. The height of the wings is such that they do not protrude the maximum breadth and base line of the ship. The transverse distance between two wing lines of the staggered row is 0.5-0.7 of the wing's chord, and the stagger between wings of the two lines is equal to the chord. The wing profiles are parallel to the longitudinal axis of the ship or form a small angle of 2-4° with this axis. At zero forward speed the roll damping moment of the staggered stabilizer is almost equal to that of continuous bilge keels having the same height and area. During motion of the ship ahead the lift forces of the wings produce a large damping moment, considerably reducing the ship rolling. | 02-11-2010 |
Zvi Segal, Raanana IL
Patent application number | Description | Published |
---|---|---|
20110129152 | DISTRIBUTED DOCUMENT PROCESSING - A system for document processing including decomposing an image of a document into at least one data entry region sub-image, providing the data entry region sub-image to a data entry clerk available for processing the data entry region sub-image, receiving from the data entry clerk a data entry value associated with the data entry region sub-image, and validating the data entry value. | 06-02-2011 |
20120082382 | DISTRIBUTED DOCUMENT PROCESSING - A system for document processing including decomposing an image of a document into at least one data entry region sub-image, providing the data entry region sub-image to a data entry clerk available for processing the data entry region sub-image, receiving from the data entry clerk a data entry value associated with the data entry region sub-image, and validating the data entry value. | 04-05-2012 |
20140056521 | DISTRIBUTED DOCUMENT PROCESSING - A system for document processing including decomposing an image of a document into at least one data entry region sub-image, providing the data entry region sub-image to a data entry clerk available for processing the data entry region sub-image, receiving from the data entry clerk a data entry value associated with the data entry region sub-image, and validating the data entry value. | 02-27-2014 |
20150131918 | DISTRIBUTED DOCUMENT PROCESSING - A system for document processing including decomposing an image of a document into at least one data entry region sub-image, providing the data entry region sub-image to a data entry clerk available for processing the data entry region sub-image, receiving from the data entry clerk a data entry value associated with the data entry region sub-image, and validating the data entry value. | 05-14-2015 |