Patents by Inventor Omer Ben-Shalom

Omer Ben-Shalom has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20200169563
    Abstract: Technologies to facilitate supervision of an online identify include a gateway server to facilitate and monitor access to an online service by a user of a “child” client computer device. The gateway server may include an identity manager to receive a request for access to the online service from the client computing device, retrieve access information to the online service, and facilitate access to the online service for the client computing device using the access information. The access information is kept confidential from the user. The gateway server may also include an activity monitor module to control activity between the client computing device and the online service based on the set of policy rules of a policy database. The gateway server may transmit notifications of such activity to a “parental” client computing device for review and/or approval, which also may be used to update the policy database.
    Type: Application
    Filed: August 5, 2019
    Publication date: May 28, 2020
    Inventors: Alex Nayshtut, Omer Ben-Shalom, Hong Li
  • Patent number: 10601898
    Abstract: Measurement exchange networks and protocols to exchange measurements of a parameter amongst devices (e.g., IoT devices), select the best measurement(s), accuracy/precision-wise, and determine a process variable for a control system based on the selected best measurement(s). A device may select a peer-provided best measurement to output as the process variable in place of a local measurement, and/or compute the process variable from multiple best measurements (e.g., local and/or peer-provided measurements). Metadata may be used to select a measurement(s) and/or to increase reliability/trust of exchanged data. In this way, each device of an exchange group/network may obtain the highest measurement accuracy of all available collocated sensors with little or no additional processing or cloud connectivity.
    Type: Grant
    Filed: December 18, 2017
    Date of Patent: March 24, 2020
    Assignee: Intel Corporation
    Inventors: Oleg Pogorelik, Alex Nayshtut, Igor Tatourian, Omer Ben-Shalom
  • Publication number: 20200059499
    Abstract: Technologies for audiovisual communication include an audiovisual server and a number of audiovisual client devices, including a presenter device and a number of audience devices. Each audience device captures an audiovisual stream and transmits the audiovisual stream to the audiovisual server. Each audience device also captures sensor input data such as eye tracking data or facial expression data and transmits abstracted sensor input data to the audiovisual server. The abstracted sensor input data may be based on the captured audiovisual stream. The audiovisual server determines an interestingness rating associated with each audience device based on the sensor input data, and selects one or more audiovisual streams based on the interestingness ratings. The audiovisual server transmits the selected audiovisual streams to the presenter device. The audiovisual server may update the interestingness rating algorithm based on feedback from the presenter device or the audience devices.
    Type: Application
    Filed: August 26, 2019
    Publication date: February 20, 2020
    Inventors: Sigal Louchheim, Omer Ben-Shalom
  • Patent number: 10469524
    Abstract: Various embodiments are generally directed to techniques to detect and eradicate malware attacks by employing information indicative of malware activity received from both endpoint devices and network devices proving network services to endpoint devices. An apparatus to detect malware includes a processor component, an analysis component for execution by the processor component to employ a trust level assigned to a device in a network as a factor in an analysis of an indication received from the device of a malware attack, and an eradication component for execution by the processor component to determine an action to take through the network to eradicate the malware attack based on the analysis. Other embodiments are described and claimed.
    Type: Grant
    Filed: December 18, 2013
    Date of Patent: November 5, 2019
    Assignee: INTEL CORPORATION
    Inventors: Omer Ben-Shalom, Igor Muttik, Alex Nayshtut, Yaniv Avidan
  • Patent number: 10440071
    Abstract: Technologies for audiovisual communication include an audiovisual server and a number of audiovisual client devices, including a presenter device and a number of audience devices. Each audience device captures an audiovisual stream and transmits the audiovisual stream to the audiovisual server. Each audience device also captures sensor input data such as eye tracking data or facial expression data and transmits abstracted sensor input data to the audiovisual server. The abstracted sensor input data may be based on the captured audiovisual stream. The audiovisual server determines an interestingness rating associated with each audience device based on the sensor input data, and selects one or more audiovisual streams based on the interestingness ratings. The audiovisual server transmits the selected audiovisual streams to the presenter device. The audiovisual server may update the interestingness rating algorithm based on feedback from the presenter device or the audience devices.
    Type: Grant
    Filed: June 30, 2016
    Date of Patent: October 8, 2019
    Assignee: Intel Corporation
    Inventors: Sigal Louchheim, Omer Ben-Shalom
  • Patent number: 10402571
    Abstract: Technologies for de-duplicating encrypted content include fragmenting a file into blocks on a computing device, encrypting each block, and storing each encrypted block on a content data server with associated keyed hashes and member identifications. The computing device additionally transmits each encrypted block with an associated member encryption key and member identification to a key server. As part of the de-duplication process, the content data server stores only one copy of the encrypted data for a particular associated keyed hash, and the key server similarly associates a single member encryption key with the keyed hash. To retrieve the file, the computing device receives the encrypted blocks with their associated keyed hashes and member identifications from the content data server and receives the corresponding member decryption key from the key server. The computing device decrypts each block using the member decryption keys and combines to blocks to generate the file.
    Type: Grant
    Filed: July 27, 2015
    Date of Patent: September 3, 2019
    Assignee: Intel Corporation
    Inventors: Alex Nayshtut, Omer Ben-Shalom, Terry H. Yoshii
  • Patent number: 10382454
    Abstract: Distributed systems for protecting networked computer assets from compromise are disclosed. The distributed system includes one or more enterprise event sources, such as endpoint(s). The system also includes a server, such as a Big Data Analytics server, and optionally a security management server such as a Security Information and Event Management server. The Big Data Analytics server processes data collected from the enterprise event sources and produces behavioral profile models for each endpoint (or group of similar endpoints). The profiles, models, and ontology analysis are provided to the endpoints. Endpoint analytics use the output from the analytics servers to detect deviations from the endpoint's behavioral profile.
    Type: Grant
    Filed: September 26, 2014
    Date of Patent: August 13, 2019
    Assignee: McAfee, LLC
    Inventors: Yaniv Avidan, Alex Nayshtut, Igor Muttik, Omer Ben-Shalom
  • Patent number: 10375080
    Abstract: Technologies to facilitate supervision of an online identify include a gateway server to facilitate and monitor access to an online service by a user of a “child” client computer device. The gateway server may include an identity manager to receive a request for access to the online service from the client computing device, retrieve access information to the online service, and facilitate access to the online service for the client computing device using the access information. The access information is kept confidential from the user. The gateway server may also include an activity monitor module to control activity between the client computing device and the online service based on the set of policy rules of a policy database. The gateway server may transmit notifications of such activity to a “parental” client computing device for review and/or approval, which also may be used to update the policy database.
    Type: Grant
    Filed: April 3, 2017
    Date of Patent: August 6, 2019
    Assignee: Intel Corporation
    Inventors: Alex Nayshtut, Omer Ben-Shalom, Hong Li
  • Patent number: 10318746
    Abstract: There is disclosed in an example, a computing apparatus, including: a trusted execution environment (TEE); and one or more logic elements providing a collaboration engine within the TEE, operable to: receive a change to a secured document via a trusted channel; apply a change to the secured document; log the change to a ledger; and display the document to a client device via a protected audio-video path (PAVP). There is also disclosed a method of providing a collaboration engine, and a computer-readable medium having stored thereon executable instructions for providing a collaboration engine.
    Type: Grant
    Filed: September 25, 2015
    Date of Patent: June 11, 2019
    Assignee: McAfee, LLC
    Inventors: Oleg Pogorelik, Alex Nayshtut, Ned M. Smith, Igor Muttik, Omer Ben-Shalom
  • Publication number: 20190156183
    Abstract: The present disclosure is directed to systems and methods for the selective introduction of low-level pseudo-random noise into at least a portion of the weights used in a neural network model to increase the robustness of the neural network and provide a stochastic transformation defense against perturbation type attacks. Random number generation circuitry provides a plurality of pseudo-random values. Combiner circuitry combines the pseudo-random values with a defined number of least significant bits/digits in at least some of the weights used to provide a neural network model implemented by neural network circuitry. In some instances, selection circuitry selects pseudo-random values for combination with the network weights based on a defined pseudo-random value probability distribution.
    Type: Application
    Filed: December 27, 2018
    Publication date: May 23, 2019
    Inventors: David M. Durham, Michael Kounavis, Oleg Pogorelik, Alex Nayshtut, Omer Ben-Shalom, Antonios Papadimitriou
  • Publication number: 20190138717
    Abstract: Various embodiments are generally directed to techniques for library behavior verification, such as by generating executables for software with indications of permitted behaviors by the library. Some embodiments are particularly directed to monitoring library behavior and performing one or more protective actions based on abnormal or unpermitted library behavior. In many embodiments, libraries and library manifests may be validated based on one or more signatures. In various embodiments, library behavior data comprising a set of permitted behaviors for the library may be determined based on the library manifest. In various such embodiments, a compiler may embed indications of the permitted library behavior in executables.
    Type: Application
    Filed: December 28, 2018
    Publication date: May 9, 2019
    Inventors: OMER BEN-SHALOM, HILA YITZHAKI, YONI WOLF, DROR SHILO, GYORA M. BENEDEK, EZRA CALTUM
  • Publication number: 20190104116
    Abstract: There is disclosed in one example a computing apparatus to broker purchase of an item or service between a consumer and seller, including: a hardware platform including a processor; and a memory, including executable instructions to instruct the hardware platform to: receive an encrypted payload including a request from a consumer to purchase the item or service, the encrypted payload including information about the consumer; without exposing the information about the consumer to the seller, determine, based on the seller's availability to sell the item or service and the seller's preferences for selling the item or service, that the request matches the seller's availability and preferences; and send a notification that the seller will sell the item or service.
    Type: Application
    Filed: December 3, 2018
    Publication date: April 4, 2019
    Applicant: McAfee, LLC
    Inventors: Alex Nayshtut, Oleg Pogorelik, Omer Ben-Shalom, Igor Muttik
  • Publication number: 20190052819
    Abstract: Methods, apparatus, systems and articles of manufacture to protect sensitive information in video collaboration systems are disclosed. A disclosed example method includes an analytics engine to recognize a feature in a first frame of a first video stream, a policy enforcer to apply an obscuration policy to the recognized feature to identify whether to mask the recognized feature, and a masker to obscure the recognized feature in the first frame to form a second frame in a second video stream.
    Type: Application
    Filed: November 29, 2017
    Publication date: February 14, 2019
    Inventors: Oleg Pogorelik, Alex Nayshtut, Omer Ben-Shalom, Shay Pluderman, Roy Gavrielov
  • Publication number: 20190049275
    Abstract: A circuit includes a first communication interface configured to receive first sensor data from a stationary sensor. The first sensor data include a result of a first sensing of a local environment of the stationary sensor performed by the stationary sensor. The circuit may further include a second communication interface configured to receive second sensor data from an unmanned aerial vehicle. The second sensor data include a result of a second sensing of at least a portion of the local environment of the stationary sensor performed by a sensor of the unmanned aerial vehicle. The circuit may further include one or a plurality of processors configured to compare the first sensor data and the second sensor data and to classify the at least one stationary sensor based on a result of the comparison.
    Type: Application
    Filed: December 29, 2017
    Publication date: February 14, 2019
    Inventors: Oleg POGORELIK, Omer BEN-SHALOM, Alex NAYSHTUT
  • Patent number: 10157273
    Abstract: Embodiments of methods, apparatuses, and storage mediums associated with eye movement based knowledge demonstration, having a particular application to authentication, are disclosed. In embodiments, a computing device may determine whether a received input of a pattern of eye movements is consistent with an expected pattern of eye movements of a user when the user attempts to visually locate a piece of information embedded in a display. In embodiments, the expected pattern of eye movements may include patterns related to fixations and/or other statistical patterns, however, may not be limited to such patterns. In applications, determining consistency or correlation with the expected pattern of eye movements may identify the user by simultaneously verifying at least factors of authentication—that of biometric criteria related to a user's pattern of eye movements and a password or other information known to the user.
    Type: Grant
    Filed: November 28, 2016
    Date of Patent: December 18, 2018
    Assignee: Intel Corporation
    Inventors: Eran Birk, Shai Kavas, Michal Jacob, Omer Ben-Shalom
  • Patent number: 10148624
    Abstract: In an example, there is disclosed a computing apparatus having one or more logic elements forming a non-encrypted flow processor engine; and one or more logic elements forming a service selection engine, wherein the one or more logic elements include a trusted execution environment (TEE), and wherein the service selection engine is operable to; receive from the flow processor engine an encrypted payload; determine that the encrypted payload satisfies at least one selection criterion; and provide a notification of satisfaction to the flow engine. There is further disclosed a method of performing the operations disclosed, and one or more computer-readable mediums having stored thereon executable instructions to perform the method.
    Type: Grant
    Filed: September 25, 2015
    Date of Patent: December 4, 2018
    Assignee: McAfee, LLC
    Inventors: Alex Nayshtut, Oleg Pogorelik, Omer Ben-Shalom, Igor Muttik
  • Publication number: 20180205783
    Abstract: Measurement exchange networks and protocols to exchange measurements of a parameter amongst devices (e.g., IoT devices), select the best measurement(s), accuracy/precision-wise, and determine a process variable for a control system based on the selected best measurement(s). A device may select a peer-provided best measurement to output as the process variable in place of a local measurement, and/or compute the process variable from multiple best measurements (e.g., local and/or peer-provided measurements). Metadata may be used to select a measurement(s) and/or to increase reliability/trust of exchanged data. In this way, each device of an exchange group/network may obtain the highest measurement accuracy of all available collocated sensors with little or no additional processing or cloud connectivity.
    Type: Application
    Filed: December 18, 2017
    Publication date: July 19, 2018
    Inventors: Oleg POGORELIK, Alex NAYSHTUT, Igor TATOURIAN, Omer BEN-SHALOM
  • Patent number: 10027717
    Abstract: Providing peer-to-peer network security includes collecting, by a local trusted network device, local trust data related to behavior of the local trusted network device, receiving, by one or more remote trusted network devices, additional trust data for the local trusted network device, calculating a combined trust score for the local trusted network device based on the local trust data and additional trust data, and modifying activity of the local trusted network device based on the combined trust score.
    Type: Grant
    Filed: June 26, 2015
    Date of Patent: July 17, 2018
    Assignee: McAfee, LLC
    Inventors: Omer Ben-Shalom, Alex Nayshtut, Oleg Pogorelik, Igor Muttik
  • Patent number: 9979749
    Abstract: A method and apparatus for network security elements using endpoint resources. An embodiment of a method includes receiving a request for access to a network at an endpoint server. The method further includes detecting that the request for access to the network includes a request that is unauthorized. The request for access to the network is directed to a network security element.
    Type: Grant
    Filed: February 3, 2015
    Date of Patent: May 22, 2018
    Assignee: INTEL CORPORATION
    Inventors: Omer Ben-Shalom, Uri Blumenthal
  • Patent number: 9912645
    Abstract: Methods and apparatus to securely share data are disclosed. An example includes retrieving, by executing an instruction with a processor at a first computing device associated with a first user of a cloud service, an encrypted archive file and a wrapped encryption key from a second computing device associated with a second user of the cloud service, the wrapped encryption key wrapped with key data associated with the first user of the cloud service at the second computing device, unwrapping the wrapped encryption key with the key data to obtain an unwrapped encryption key, and decrypting the encrypted archive file with the unwrapped encryption key to obtain a decrypted archive file.
    Type: Grant
    Filed: June 30, 2016
    Date of Patent: March 6, 2018
    Assignee: Intel Corporation
    Inventors: Ned M. Smith, Omer Ben-Shalom, Alex Nayshtut