Patents by Inventor Keren Master
Keren Master has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20190303177Abstract: In one embodiment, a computing system generates a reference distance to classify a user in a first position or a second position and measures a current distance of the user using a camera. The current distance measured using features of the user and the current distance is not a measurement of distance of the user to the camera. The computing system determines that the user is in one of the first position and the second position based on comparing the reference distance to the current distance. A user interface operates in a first mode when the user is in the first position and operates in a second mode when the user is in the second position.Type: ApplicationFiled: March 29, 2018Publication date: October 3, 2019Inventors: Keren MASTER, Eyal KRUPKA, Ido LEICHTER, Raz HALALY
-
Patent number: 9848328Abstract: A data channel transmission can be used to authenticate a voice channel transmission. An authentication server can authenticate the identity of one or more parties to a call where at least one of the parties to the call is using a mobile device. A PKI authentication methodology or other symmetric or asymmetric encryption/decryption methodology can be used in a mobile network environment to identify and authenticate a first user to a second user. The authentication request sent to the third party trusted server can be encrypted, signed and transmitted over a data channel (such as an internet connection or SMS or MMS connection), concurrent with the voice channel transmission. In response to validation by the third party trusted server, the third party trusted server can send an authentication indication to the second user's device, which can display identification information and other (optional) data associated with the first user.Type: GrantFiled: August 3, 2016Date of Patent: December 19, 2017Assignee: Microsoft Technology Licensing, LLCInventors: Omer Har, Ittai Doron, Chen Ari Kirsch, Avigad Oron, Keren Master
-
Patent number: 9544770Abstract: A data channel transmission can be used to authenticate a voice channel transmission. A third party trusted authentication server can be used to authenticate the identity of one or more parties to a call where at least one of the parties to the call is using a mobile device. A PKI authentication methodology or other symmetric or asymmetric encryption/decryption methodology can be used in a mobile network environment to identify and authenticate a first user to a second user. The authentication request sent to the third party trusted server can be encrypted, signed and transmitted over a data channel (such as an internet connection or SMS or MMS connection), concurrent with the voice channel transmission. In response to validation by the third party trusted server, the third party trusted server can send an authentication indication to the second user's device, which can display identification information and other (optional) data associated with the first user.Type: GrantFiled: December 1, 2010Date of Patent: January 10, 2017Assignee: Microsoft Technology Licensing, LLCInventors: Omer Har, Ittai Doron, Chen Ari Kirsch, Avigad Oron, Keren Master
-
Publication number: 20160344723Abstract: A data channel transmission can be used to authenticate a voice channel transmission. An authentication server can authenticate the identity of one or more parties to a call where at least one of the parties to the call is using a mobile device. A PKI authentication methodology or other symmetric or asymmetric encryption/decryption methodology can be used in a mobile network environment to identify and authenticate a first user to a second user. The authentication request sent to the third party trusted server can be encrypted, signed and transmitted over a data channel (such as an internet connection or SMS or MMS connection), concurrent with the voice channel transmission. In response to validation by the third party trusted server, the third party trusted server can send an authentication indication to the second user's device, which can display identification information and other (optional) data associated with the first user.Type: ApplicationFiled: August 3, 2016Publication date: November 24, 2016Applicant: Microsoft Technology Licensing, LLCInventors: Omer Har, Ittai Doron, Chen Ari Kirsch, Avigad Oron, Keren Master
-
Patent number: 8812028Abstract: A proximity matching system may use broadcast wireless identifiers transmitted by users' devices to match users with other nearby users. The identifiers may be collected by a plurality of agents, then the identifiers may be matched with pre-defined profiles to generate physically proximate users by a remote service. The group of proximate users may be provided to various applications and consumed with summarized properties or individual properties, depending on the approved privacy settings as selected by the users. In some embodiments, the broadcast wireless identifiers may be personal area network identifiers, local area network identifiers, cellular network identifiers, or other broadcast identifier. In some embodiments, the agents may not establish a peer to peer or other connection with the broadcasting device. The agents may be fixed or mobile agents, and the proximity of users may be generated through links between nearby agents in a meshed fashion.Type: GrantFiled: March 17, 2011Date of Patent: August 19, 2014Assignee: Microsoft CorporationInventors: Eran Yariv, Keren Master, Daniel Sitton, Roy Varshavsky, Yoram Yaacovi
-
Publication number: 20130091431Abstract: A video previewing and selection system may allow a user to filter and select video clips based on metadata associated with the video clips, including metadata that defines when certain people are shown in the clips. A set of video sequences may be analyzed to extract existing metadata and present the metadata in a user interface. A user may select various metadata which may be used to filter the selections using logical AND and OR combinations. The user interface may allow a user to view the clips, as well as select clips for further editing by a video editor.Type: ApplicationFiled: October 5, 2011Publication date: April 11, 2013Applicant: Microsoft CorporationInventors: Keren MASTER, Guy MERIN, Igor ABRAMOVSKI, Inbal ORT
-
Publication number: 20120238285Abstract: A proximity matching system may use broadcast wireless identifiers transmitted by users' devices to match users with other nearby users. The identifiers may be collected by a plurality of agents, then the identifiers may be matched with pre-defined profiles to generate physically proximate users by a remote service. The group of proximate users may be provided to various applications and consumed with summarized properties or individual properties, depending on the approved privacy settings as selected by the users. In some embodiments, the broadcast wireless identifiers may be personal area network identifiers, local area network identifiers, cellular network identifiers, or other broadcast identifier. In some embodiments, the agents may not establish a peer to peer or other connection with the broadcasting device. The agents may be fixed or mobile agents, and the proximity of users may be generated through links between nearby agents in a meshed fashion.Type: ApplicationFiled: March 17, 2011Publication date: September 20, 2012Applicant: Microsoft CorporationInventors: Eran YARIV, Keren Master, Daniel Sitton, Roy Varshavsky, Yoram Yaacovi
-
Publication number: 20120144198Abstract: A data channel transmission can be used to authenticate a voice channel transmission. A third party trusted authentication server can be used to authenticate the identity of one or more parties to a call where at least one of the parties to the call is using a mobile device. A PKI authentication methodology or other symmetric or asymmetric encryption/decryption methodology can be used in a mobile network environment to identify and authenticate a first user to a second user. The authentication request sent to the third party trusted server can be encrypted, signed and transmitted over a data channel (such as an internet connection or SMS or MMS connection), concurrent with the voice channel transmission. In response to validation by the third party trusted server, the third party trusted server can send an authentication indication to the second user's device, which can display identification information and other (optional) data associated with the first user.Type: ApplicationFiled: December 1, 2010Publication date: June 7, 2012Applicant: Microsoft CorporationInventors: Omer Har, Ittai Doron, Chen Ari Kirsch, Avigad Oron, Keren Master