Patents by Inventor Omer Har

Omer Har has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20230214451
    Abstract: A computer-based system and method for finding data enrichments for a first dataset, including obtaining a plurality of candidate datasets; calculating a plurality of mathematical representations, each for one of the first dataset and one of the plurality of candidate datasets, wherein calculating the mathematical representation of a dataset of the first dataset and the plurality of candidate datasets comprises: calculating a set of features of the dataset; and feeding the set of features of the dataset to a first neural network trained to generate the mathematical representation; calculating a plurality of similarity levels, each indicative of the similarity between the mathematical representation of one of the plurality of candidate datasets and the mathematical representation of the first dataset; and selecting the candidate dataset based on the similarity levels.
    Type: Application
    Filed: December 30, 2021
    Publication date: July 6, 2023
    Applicant: Explorium Ltd
    Inventors: Anthony TRABAUD, Revital RUBIN COHN, Shai YANOVSKI, Omer HAR, Tamir OR, Maor Ziv SHLOMO
  • Patent number: 10491009
    Abstract: This invention relates to a portable case including a processor configured to control the portable case; a charging port; at least one output port; an adjustable energy storage system further including a battery printed circuit board (BPCB) including a plurality of battery packs connectors; and a central battery management microprocessor (CBMM); and a plurality of battery packs configured to be connected to the plurality of battery packs connectors and to provide power to electronic appliance connected to the at least one output port; a user interface configured to enable powering and monitoring of the portable case; and a recharging element, carryable by the portable case, the recharging element configured to be connected to the charging port and recharge at least one of the plurality of battery packs.
    Type: Grant
    Filed: May 18, 2015
    Date of Patent: November 26, 2019
    Assignee: Kalisaya Ltd.
    Inventors: Yaron Gissin, David Ben-Natan, Omer Har-Paz, Eyal Eliav, Michal Barzilay-Gissin
  • Patent number: 9848328
    Abstract: A data channel transmission can be used to authenticate a voice channel transmission. An authentication server can authenticate the identity of one or more parties to a call where at least one of the parties to the call is using a mobile device. A PKI authentication methodology or other symmetric or asymmetric encryption/decryption methodology can be used in a mobile network environment to identify and authenticate a first user to a second user. The authentication request sent to the third party trusted server can be encrypted, signed and transmitted over a data channel (such as an internet connection or SMS or MMS connection), concurrent with the voice channel transmission. In response to validation by the third party trusted server, the third party trusted server can send an authentication indication to the second user's device, which can display identification information and other (optional) data associated with the first user.
    Type: Grant
    Filed: August 3, 2016
    Date of Patent: December 19, 2017
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Omer Har, Ittai Doron, Chen Ari Kirsch, Avigad Oron, Keren Master
  • Publication number: 20170110896
    Abstract: This invention relates to a portable case including a processor configured to control the portable case; a charging port; at least one output port; an adjustable energy storage system further including a battery printed circuit board (BPCB) including a plurality of battery packs connectors; and a central battery management microprocessor (CBMM); and a plurality of battery packs configured to be connected to the plurality of battery packs connectors and to provide power to electronic appliance connected to the at least one output port; a user interface configured to enable powering and monitoring of the portable case; and a recharging element, carryable by the portable case, the recharging element configured to be connected to the charging port and recharge at least one of the plurality of battery packs.
    Type: Application
    Filed: May 18, 2015
    Publication date: April 20, 2017
    Inventors: Yaron Gissin, David Ben-Natan, Omer Har-Paz, Eyal Eliav, Michal Barzilay-Gissin
  • Patent number: 9544770
    Abstract: A data channel transmission can be used to authenticate a voice channel transmission. A third party trusted authentication server can be used to authenticate the identity of one or more parties to a call where at least one of the parties to the call is using a mobile device. A PKI authentication methodology or other symmetric or asymmetric encryption/decryption methodology can be used in a mobile network environment to identify and authenticate a first user to a second user. The authentication request sent to the third party trusted server can be encrypted, signed and transmitted over a data channel (such as an internet connection or SMS or MMS connection), concurrent with the voice channel transmission. In response to validation by the third party trusted server, the third party trusted server can send an authentication indication to the second user's device, which can display identification information and other (optional) data associated with the first user.
    Type: Grant
    Filed: December 1, 2010
    Date of Patent: January 10, 2017
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Omer Har, Ittai Doron, Chen Ari Kirsch, Avigad Oron, Keren Master
  • Publication number: 20160344723
    Abstract: A data channel transmission can be used to authenticate a voice channel transmission. An authentication server can authenticate the identity of one or more parties to a call where at least one of the parties to the call is using a mobile device. A PKI authentication methodology or other symmetric or asymmetric encryption/decryption methodology can be used in a mobile network environment to identify and authenticate a first user to a second user. The authentication request sent to the third party trusted server can be encrypted, signed and transmitted over a data channel (such as an internet connection or SMS or MMS connection), concurrent with the voice channel transmission. In response to validation by the third party trusted server, the third party trusted server can send an authentication indication to the second user's device, which can display identification information and other (optional) data associated with the first user.
    Type: Application
    Filed: August 3, 2016
    Publication date: November 24, 2016
    Applicant: Microsoft Technology Licensing, LLC
    Inventors: Omer Har, Ittai Doron, Chen Ari Kirsch, Avigad Oron, Keren Master
  • Publication number: 20140278944
    Abstract: Methods, computer systems, and computer-storage media are provided for ranking ads. A reserve price is included in a calculation of a score to rank one or more advertisements for display. The calculation may further rely on a bid submitted by an advertiser for an advertisement, a click probability associated with the advertisement, a relevance of the advertisement to a search query and/or user, and the like. Once the reserve price is used to establish a score for one or more advertisements, a price is calculated for each of the one or more advertisements. The one or more advertisements may be displayed in an order indicated by the scores of each of the advertisements.
    Type: Application
    Filed: March 13, 2013
    Publication date: September 18, 2014
    Applicant: MICROSOFT CORPORATION
    Inventors: IAN KASH, DINAN SRILAL GUNAWARDENA, PETER KEY, BEN ROBERTS, THOMAS BORCHERT, OMER HAR
  • Publication number: 20120144198
    Abstract: A data channel transmission can be used to authenticate a voice channel transmission. A third party trusted authentication server can be used to authenticate the identity of one or more parties to a call where at least one of the parties to the call is using a mobile device. A PKI authentication methodology or other symmetric or asymmetric encryption/decryption methodology can be used in a mobile network environment to identify and authenticate a first user to a second user. The authentication request sent to the third party trusted server can be encrypted, signed and transmitted over a data channel (such as an internet connection or SMS or MMS connection), concurrent with the voice channel transmission. In response to validation by the third party trusted server, the third party trusted server can send an authentication indication to the second user's device, which can display identification information and other (optional) data associated with the first user.
    Type: Application
    Filed: December 1, 2010
    Publication date: June 7, 2012
    Applicant: Microsoft Corporation
    Inventors: Omer Har, Ittai Doron, Chen Ari Kirsch, Avigad Oron, Keren Master