Patents by Inventor Omer Har
Omer Har has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20230214451Abstract: A computer-based system and method for finding data enrichments for a first dataset, including obtaining a plurality of candidate datasets; calculating a plurality of mathematical representations, each for one of the first dataset and one of the plurality of candidate datasets, wherein calculating the mathematical representation of a dataset of the first dataset and the plurality of candidate datasets comprises: calculating a set of features of the dataset; and feeding the set of features of the dataset to a first neural network trained to generate the mathematical representation; calculating a plurality of similarity levels, each indicative of the similarity between the mathematical representation of one of the plurality of candidate datasets and the mathematical representation of the first dataset; and selecting the candidate dataset based on the similarity levels.Type: ApplicationFiled: December 30, 2021Publication date: July 6, 2023Applicant: Explorium LtdInventors: Anthony TRABAUD, Revital RUBIN COHN, Shai YANOVSKI, Omer HAR, Tamir OR, Maor Ziv SHLOMO
-
Patent number: 10491009Abstract: This invention relates to a portable case including a processor configured to control the portable case; a charging port; at least one output port; an adjustable energy storage system further including a battery printed circuit board (BPCB) including a plurality of battery packs connectors; and a central battery management microprocessor (CBMM); and a plurality of battery packs configured to be connected to the plurality of battery packs connectors and to provide power to electronic appliance connected to the at least one output port; a user interface configured to enable powering and monitoring of the portable case; and a recharging element, carryable by the portable case, the recharging element configured to be connected to the charging port and recharge at least one of the plurality of battery packs.Type: GrantFiled: May 18, 2015Date of Patent: November 26, 2019Assignee: Kalisaya Ltd.Inventors: Yaron Gissin, David Ben-Natan, Omer Har-Paz, Eyal Eliav, Michal Barzilay-Gissin
-
Patent number: 9848328Abstract: A data channel transmission can be used to authenticate a voice channel transmission. An authentication server can authenticate the identity of one or more parties to a call where at least one of the parties to the call is using a mobile device. A PKI authentication methodology or other symmetric or asymmetric encryption/decryption methodology can be used in a mobile network environment to identify and authenticate a first user to a second user. The authentication request sent to the third party trusted server can be encrypted, signed and transmitted over a data channel (such as an internet connection or SMS or MMS connection), concurrent with the voice channel transmission. In response to validation by the third party trusted server, the third party trusted server can send an authentication indication to the second user's device, which can display identification information and other (optional) data associated with the first user.Type: GrantFiled: August 3, 2016Date of Patent: December 19, 2017Assignee: Microsoft Technology Licensing, LLCInventors: Omer Har, Ittai Doron, Chen Ari Kirsch, Avigad Oron, Keren Master
-
Publication number: 20170110896Abstract: This invention relates to a portable case including a processor configured to control the portable case; a charging port; at least one output port; an adjustable energy storage system further including a battery printed circuit board (BPCB) including a plurality of battery packs connectors; and a central battery management microprocessor (CBMM); and a plurality of battery packs configured to be connected to the plurality of battery packs connectors and to provide power to electronic appliance connected to the at least one output port; a user interface configured to enable powering and monitoring of the portable case; and a recharging element, carryable by the portable case, the recharging element configured to be connected to the charging port and recharge at least one of the plurality of battery packs.Type: ApplicationFiled: May 18, 2015Publication date: April 20, 2017Inventors: Yaron Gissin, David Ben-Natan, Omer Har-Paz, Eyal Eliav, Michal Barzilay-Gissin
-
Patent number: 9544770Abstract: A data channel transmission can be used to authenticate a voice channel transmission. A third party trusted authentication server can be used to authenticate the identity of one or more parties to a call where at least one of the parties to the call is using a mobile device. A PKI authentication methodology or other symmetric or asymmetric encryption/decryption methodology can be used in a mobile network environment to identify and authenticate a first user to a second user. The authentication request sent to the third party trusted server can be encrypted, signed and transmitted over a data channel (such as an internet connection or SMS or MMS connection), concurrent with the voice channel transmission. In response to validation by the third party trusted server, the third party trusted server can send an authentication indication to the second user's device, which can display identification information and other (optional) data associated with the first user.Type: GrantFiled: December 1, 2010Date of Patent: January 10, 2017Assignee: Microsoft Technology Licensing, LLCInventors: Omer Har, Ittai Doron, Chen Ari Kirsch, Avigad Oron, Keren Master
-
Publication number: 20160344723Abstract: A data channel transmission can be used to authenticate a voice channel transmission. An authentication server can authenticate the identity of one or more parties to a call where at least one of the parties to the call is using a mobile device. A PKI authentication methodology or other symmetric or asymmetric encryption/decryption methodology can be used in a mobile network environment to identify and authenticate a first user to a second user. The authentication request sent to the third party trusted server can be encrypted, signed and transmitted over a data channel (such as an internet connection or SMS or MMS connection), concurrent with the voice channel transmission. In response to validation by the third party trusted server, the third party trusted server can send an authentication indication to the second user's device, which can display identification information and other (optional) data associated with the first user.Type: ApplicationFiled: August 3, 2016Publication date: November 24, 2016Applicant: Microsoft Technology Licensing, LLCInventors: Omer Har, Ittai Doron, Chen Ari Kirsch, Avigad Oron, Keren Master
-
Publication number: 20140278944Abstract: Methods, computer systems, and computer-storage media are provided for ranking ads. A reserve price is included in a calculation of a score to rank one or more advertisements for display. The calculation may further rely on a bid submitted by an advertiser for an advertisement, a click probability associated with the advertisement, a relevance of the advertisement to a search query and/or user, and the like. Once the reserve price is used to establish a score for one or more advertisements, a price is calculated for each of the one or more advertisements. The one or more advertisements may be displayed in an order indicated by the scores of each of the advertisements.Type: ApplicationFiled: March 13, 2013Publication date: September 18, 2014Applicant: MICROSOFT CORPORATIONInventors: IAN KASH, DINAN SRILAL GUNAWARDENA, PETER KEY, BEN ROBERTS, THOMAS BORCHERT, OMER HAR
-
Publication number: 20120144198Abstract: A data channel transmission can be used to authenticate a voice channel transmission. A third party trusted authentication server can be used to authenticate the identity of one or more parties to a call where at least one of the parties to the call is using a mobile device. A PKI authentication methodology or other symmetric or asymmetric encryption/decryption methodology can be used in a mobile network environment to identify and authenticate a first user to a second user. The authentication request sent to the third party trusted server can be encrypted, signed and transmitted over a data channel (such as an internet connection or SMS or MMS connection), concurrent with the voice channel transmission. In response to validation by the third party trusted server, the third party trusted server can send an authentication indication to the second user's device, which can display identification information and other (optional) data associated with the first user.Type: ApplicationFiled: December 1, 2010Publication date: June 7, 2012Applicant: Microsoft CorporationInventors: Omer Har, Ittai Doron, Chen Ari Kirsch, Avigad Oron, Keren Master