Patents by Inventor Oded Cohen

Oded Cohen has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20080194332
    Abstract: A software agent interfaces with an interactive game program allowing for dynamic conveyance of objects during runtime for receiving data indicative of at least one parameter relating to a player of the interactive game program and/or to the player station on which the program is run. The data is used to set a dynamic policy that is customized on-the-fly according to the at least one parameter, and which is adapted to determine one or more objects to be conveyed to the player station for dynamically embedding in the program. The dynamic policy is also adapted to determine one or more characteristics of the object and is capable of subsequent re-customization and revision during game play. The objects are retrieved and periodically conveyed to the interactive game program based on the dynamic policy for dynamically embedding in the interactive game program to interface with the game player of the interactive game program.
    Type: Application
    Filed: February 13, 2007
    Publication date: August 14, 2008
    Applicant: Eyeblaster Ltd.
    Inventors: Ofer Kadikario, Ran Cohen, Yiftah Frechter, Oded Cohen, Hanit Galili, Keren Friedman
  • Patent number: 7386884
    Abstract: A method for preventing activating a malicious object passing through a checkpoint, and decreasing the overall inspection delay thereof, the method comprising the steps of: (a) at the checkpoint, creating an envelope file, being an executable file comprising: the object; code for extracting the object from the envelope file; and an indicator for indicating the integrity of the object; (b) forwarding the envelope file instead of the object toward its destination, while holding at least a part of the envelope file which comprises the indicator; (c) inspecting the object; and (d) setting the indicator on the envelope file to indicate the inspection result thereof, and releasing the rest of the envelope file.
    Type: Grant
    Filed: April 19, 2004
    Date of Patent: June 10, 2008
    Assignee: Aladdin Knowledge Systems Ltd.
    Inventors: Oded Cohen, Yanki Margalit, Dany Margalit
  • Publication number: 20080002929
    Abstract: An apparatus and method electrically pumping a hybrid evanescent laser. For one example, an apparatus includes an optical waveguide disposed in silicon. An active semiconductor material is disposed over the optical waveguide defining an evanescent coupling interface between the optical waveguide and the active semiconductor material such that an optical mode to be guided by the optical waveguide overlaps both the optical waveguide and the active semiconductor material. A current injection path is defined through the active semiconductor material and at least partially overlapping the optical mode such that light is generated in response to electrical pumping of the active semiconductor material in response to current injection along the current injection path at least partially overlapping the optical mode.
    Type: Application
    Filed: June 30, 2006
    Publication date: January 3, 2008
    Inventors: John E. Bowers, Oded Cohen, Alexander W. Fang, Richard Jones, Mario J. Paniccia, Hyundai Park
  • Patent number: 7292753
    Abstract: An apparatus comprising a first core layer having a first thickness and a first refractive index; a second core layer formed on the first core layer, the second core layer having a second thickness and a second refractive index; and a grating formed at the interface between the first core layer and the second core layer. Corresponding process and system embodiments are disclosed and claimed.
    Type: Grant
    Filed: December 21, 2005
    Date of Patent: November 6, 2007
    Assignee: Intel Corporation
    Inventors: Oded Cohen, Richard Jones, Doron Rubin, Alex Fang
  • Publication number: 20070226603
    Abstract: A method and system for indicating an executable as Trojan Horse, based on the CRC values of the routines of an executable. The method comprising a preliminary stage in which the CRC values of the routines of known Trojan Horses are gathered in a database, and a stage in which indicating an executable as Trojan Horse is carried out by the correspondence of the CRC values of the routines of said executable to the CRC values of the known Trojan Horses, as gathered in said database. The system comprising means for calculating the CRC values of routines; means for identifying the borders of the routines of an executable; a database system, for storing the CRC values of routines of known Trojan Horses; and means for determining the correspondence between two groups of CRC values, thereby enabling detection of the correspondence of an executable to at least one known Trojan Horse.
    Type: Application
    Filed: May 13, 2003
    Publication date: September 27, 2007
    Inventors: Oded Cohen, Yanki Margalit, Dany Margalit
  • Publication number: 20070140619
    Abstract: An apparatus comprising a first core layer having a first thickness and a first refractive index; a second core layer formed on the first core layer, the second core layer having a second thickness and a second refractive index; and a grating formed at the interface between the first core layer and the second core layer. Corresponding process and system embodiments are disclosed and claimed.
    Type: Application
    Filed: December 21, 2005
    Publication date: June 21, 2007
    Inventors: Oded Cohen, Richard Jones, Doron Rubin, Alex Fang
  • Patent number: 7013483
    Abstract: The present invention is directed to a method for emulating an executable code, whether it is a human-readable code (e.g., macro and script) or a compiled code (e.g. Windows executable). At the design time, one or more content attributes are defined for the variables of the code. A content attribute indicates a property with relevance to maliciousness, e.g. Windows directory, a random value, “.EXE” at the right of a string, etc. A content attribute may be implemented, for example, by a flag. Also defined at the design time, is a list of malicious states, where a malicious state comprises at least the combination of a call to a certain system function with certain content, as the calling parameter(s). When emulating an assignment instruction, the attributes of the assigned variable are set according to the assigned content. When emulating a mathematical operator, a content mathematics is also applied. When emulating a function call, the current state (i.e.
    Type: Grant
    Filed: January 3, 2003
    Date of Patent: March 14, 2006
    Assignee: Aladdin Knowledge Systems Ltd.
    Inventors: Oded Cohen, Inbal Meir, Yanki Margalit, Dany Margalit
  • Publication number: 20060010495
    Abstract: In an inspection facility (e.g. at a gateway server, at a proxy server, at a firewall to a network, at an entrance to a local area network or even at the user's computer) connected to an anti-virus center for updates, a method for protecting a computer from suspicious objects (e.g. a file, an executable, a Web page, an email message, etc.), the method comprising the steps of: inspecting an object; upon determining the object as suspicious, holding the object in quarantine (e.g. preventing from the object to be forwarded to its destination) for a time period, thereby enabling the inspection facility to be updated during the time period by the anti-virus center; upon ending of the time period, re-inspecting the object, thereby inspecting the object by updated inspection tests; and upon determining the object as malicious by the re-inspection, blocking the object, otherwise forwarding the object toward its destination.
    Type: Application
    Filed: July 6, 2004
    Publication date: January 12, 2006
    Inventors: Oded Cohen, Yanki Margalit, Dany Margalit
  • Publication number: 20050235160
    Abstract: A method for preventing activating a malicious object passing through a checkpoint, and decreasing the overall inspection delay thereof, the method comprising the steps of: (a) at the checkpoint, creating an envelope file, being an executable file comprising: the object; code for extracting the object from the envelope file; and an indicator for indicating the integrity of the object; (b) forwarding the envelope file instead of the object toward its destination, while holding at least a part of the envelope file which comprises the indicator; (c) inspecting the object; and (d) setting the indicator on the envelope file to indicate the inspection result thereof, and releasing the rest of the envelope file.
    Type: Application
    Filed: April 19, 2004
    Publication date: October 20, 2005
    Inventors: Oded Cohen, Yanki Margalit, Dany Margalit
  • Publication number: 20050220406
    Abstract: Embodiments of the invention describe a silicon oxynitride Bragg grating disposed in a semiconductive layer on an insulating substrate. The grating may be formed of alternating silicon oxynitride elements that differ in a relative composition of oxygen and nitrogen. The different composition elements have different refractive indices that may vary within a desired range.
    Type: Application
    Filed: March 31, 2004
    Publication date: October 6, 2005
    Inventors: Richard Jones, Oded Cohen, Ling Liao
  • Publication number: 20050081057
    Abstract: The present invention relates to a method for preventing exploiting an email message and a system thereof. The method comprising: decomposing the email message to its components; for each of the components, correcting the structural form (e.g. structure, format, and content) of the component to comply with common rules thereof whenever the structural form of the component deviates from the rules; and recomposing the email message from its components (in their recent state). The rules relate to email messages structure, for preventing malformed structure of email messages, for preventing exploiting an email message, etc. In case where the structural form of the component cannot be identified, the component may not be included within the recomposed email message, or included as is to the recomposed email message.
    Type: Application
    Filed: October 10, 2003
    Publication date: April 14, 2005
    Inventors: Oded Cohen, Yanki Margalit, Dany Margalit
  • Publication number: 20040133796
    Abstract: The present invention is directed to a method for emulating an executable code, whether it is a human-readable code (e.g., macro and script) or a compiled code (e.g. Windows executable). At the design time, one or more content attributes are defined for the variables of the code. A content attribute indicates a property with relevance to maliciousness, e.g. Windows directory, a random value, “.EXE” at the right of a string, etc. A content attribute may be implemented, for example, by a flag. Also defined at the design time, is a list of malicious states, where a malicious state comprises at least the combination of a call to a certain system function with certain content, as the calling parameter(s). When emulating an assignment instruction, the attributes of the assigned variable are set according to the assigned content. When emulating a mathematical operator, a content mathematics is also applied. When emulating a function call, the current state (i.e.
    Type: Application
    Filed: January 3, 2003
    Publication date: July 8, 2004
    Applicant: ALADDIN KNOWLEDGE SYSTEMS LTD.
    Inventors: Oded Cohen, Inbal Meir, Yanki Margalit, Dany Margalit