Patents by Inventor Ram Cohen

Ram Cohen has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10647601
    Abstract: Provided is a method of bioremediation of organic contaminated water within an annulus of an oil lubricated shaft, the method includes: (a) introducing into the annulus of said oil lubricated shaft an amount of a bioremediation combination including (i) a microbial cocktail capable of biodegrading the organic contaminants and (ii) nitrogen source, such that said bioremediation combination is brought into contact with water suspected of being contaminated in said annulus; and (b) supply into said annulus oxygen source for a time sufficient for biodegradation of at least a portion of said organic contaminants in the water within the annulus.
    Type: Grant
    Filed: July 2, 2015
    Date of Patent: May 12, 2020
    Assignee: MEKOROT WATER COMPANY, LTD
    Inventors: Ram Cohen, Eliora Ron, Eugene Rosenberg
  • Publication number: 20180201531
    Abstract: Provided is a method of bioremediation of organic contaminated water within an annulus of an oil lubricated shaft, the method includes: (a) introducing into the annulus of said oil lubricated shaft an amount of a bioremediation combination including (i) a microbial cocktail capable of biodegrading the organic contaminants and (ii) nitrogen source, such that said bioremediation combination is brought into contact with water suspected of being contaminated in said annulus; and (b) supply into said annulus oxygen source for a time sufficient for biodegradation of at least a portion of said organic contaminants in the water within the annulus.
    Type: Application
    Filed: July 2, 2015
    Publication date: July 19, 2018
    Applicant: MEKOROT WATER COMPANY, LTD
    Inventors: Ram COHEN, Eliora RON, Eugene ROSENBERG
  • Publication number: 20130145474
    Abstract: Systems, methods, computer program products, and networks for messaging. In some examples the identity of a sending user of a message and/or other data is initially concealed when the (manipulated) message or an associated created message is sent to an intended receiving user. In these examples, revealing data which enables determination of at least some data which the sent message concealed is only provided upon request, and in some of these examples, only after a user has been authenticated as being an intended receiving user.
    Type: Application
    Filed: December 6, 2011
    Publication date: June 6, 2013
    Applicant: ACTIVEPATH LTD.
    Inventors: Aryeh MERGI, Ram COHEN
  • Publication number: 20130007633
    Abstract: Systems, methods, computer program products, and networks for enhancing message list functionality. In some embodiments, a method includes: after a message in a message list has been indicated by a user performing a gesture on an input module manipulating a graphical user interface whose content included the message list so as to enable data, which relates to content of the message, and which was not visible when the user performed the gesture, to be displayed to the user.
    Type: Application
    Filed: July 3, 2012
    Publication date: January 3, 2013
    Applicant: ACTIVEPATH LTD.
    Inventors: Ram COHEN, Aryeh MERGI
  • Publication number: 20120204225
    Abstract: Systems, methods, and computer program products for online authentication using audio, video and/or image data. In some examples, audio, video and/or image data of a user may be captured, and recognition may be performed on at least part of the captured data during an attempt to confirm that the user is who he/she is supposed to be. If the attempt is successful, a validation confirmation may be generated. In some cases of these examples, the validation confirmation or a part thereof may optionally be provided to a server during user authentication relating to a resource provided by the server. Additionally or alternatively, in some cases of these examples, at least part of the captured data may optionally be provided to the server during user authentication. Depending on the example, the server may or may not be a web server.
    Type: Application
    Filed: February 7, 2012
    Publication date: August 9, 2012
    Applicant: ACTIVEPATH LTD.
    Inventor: Ram COHEN
  • Publication number: 20120204242
    Abstract: Systems, methods, computer program products, and networks for protecting web authentication. In some examples a system for protecting web authentication includes a web client and a validator which is external to the web client. In these examples, the validator is configured to enable at least one validation item which is provided to a web server during web user authentication to be protected from possible tampering by the web client.
    Type: Application
    Filed: January 23, 2012
    Publication date: August 9, 2012
    Applicant: ACTIVEPATH LTD.
    Inventor: Ram COHEN
  • Publication number: 20120030556
    Abstract: Systems, methods and/or computer program products for presenting data to a user. In some cases, there is an additional processing of data for presentation, as some or all of the data received via a communication channel is replaced by data derived inter-alia by execution of instructions which were not executed during the original processing for presentation. Additionally or alternatively, in some cases at least some of the data transferred via a communication channel is in a form which excludes instruction(s) that could possibly be unacceptable to security module(s) and/or excludes instruction(s) that may be unsupported by a potential receiving system. In these cases, excluded instruction(s) are recovered and executed during the processing for presentation to a user. Additionally or alternatively, in some cases instead of presenting to a user received data such as content of a previously attached file, the data is stored and a reference to the stored data is presented.
    Type: Application
    Filed: July 29, 2010
    Publication date: February 2, 2012
    Applicant: ACTIVEPATH LTD.
    Inventors: Ram COHEN, Aryeh MERGI
  • Publication number: 20120030224
    Abstract: Systems, methods, and/or computer program products for automatic pointer activation, acquiring data not included in an obtained dataset and/or for enabling the later acquiring of data not included in the dataset. In some examples, upon automatic activation of a pointer in the dataset, data associated with the pointer may be acquired. In some of these examples the acquired data may include data which requires prior authentication. Additionally or alternatively in some of these examples, the acquired data or a version thereof may include at least one instruction which would not necessarily have been acceptable to every security module in the channel. Additionally or alternatively, in some examples, a pointer may be a candidate for automatic activation if the referenced provider matches any provider listed as being associated with automatic activation.
    Type: Application
    Filed: July 28, 2011
    Publication date: February 2, 2012
    Applicant: ACTIVEPATH LTD.
    Inventors: Ram COHEN, Aryeh MERGI
  • Publication number: 20110099607
    Abstract: Disclosed are systems, methods, networks, and computer programs for messaging. In some cases a receiving system receives certain message data which was slated to be presented in a message list to a receiving user, including a sending system contact indicator. In some cases, the receiving system uses the sending system contact indicator in determining where to send a message authentication request in order to reach the system which presumably sent the message. In some cases, the request preferably includes sufficient message identifying information from the received message data for the system which receives the request to find a match among sent messages, provided that the system which received the request had in fact sent the message. In some cases, the system which received the request provides a response to the request which reflects the matching outcome.
    Type: Application
    Filed: October 25, 2010
    Publication date: April 28, 2011
    Applicant: ACTIVEPATH LTD.
    Inventor: Ram COHEN
  • Publication number: 20110060800
    Abstract: Systems, methods, computer program products, and networks for messaging including sending, receiving and/or tracking messages. In some cases tracking may include updating receipt statuses of sent messages for which receipt notifications were received. In some cases, additionally or alternatively, tracking may include resending messages for which receipt notifications were not received. In some cases, additionally or alternatively, tracking may include receiving receipt notifications for messages which indicate one or more characteristics of the respective receiving systems.
    Type: Application
    Filed: September 7, 2010
    Publication date: March 10, 2011
    Applicant: ACTIVEPATH LTD.
    Inventors: Ram Cohen, Aryeh Mergi
  • Publication number: 20110055922
    Abstract: A method for detecting a suspected phishing attack characterized by monitoring strings of characters in a questionnaire presented by a non-approved address to a user terminal for similarity to a substring of a string of sensitive data, such that the substring has a length of one or more characters less than the length of the string of sensitive data, such that on detecting a substring of critical length, an alert is triggered.
    Type: Application
    Filed: August 31, 2010
    Publication date: March 3, 2011
    Applicant: ActivePath Ltd.
    Inventors: Ram Cohen, Aryeh Mergi
  • Publication number: 20100306537
    Abstract: A method for securely transmitting a message to a recipient whilst allowing subsequent access to the message content, wherein at least part of the message is encrypted, comprising the steps of: (a) encrypting a first piece of content with an encryption key; (b) providing a decryption engine at an address on a recipient accessible server; (c) incorporating the address of the recipient accessible server within the message, together with the first piece of encrypted content; (d) transmitting the first piece of encrypted content together with the address of the recipient accessible server to the recipient, such that the recipient is able to decrypt the first piece of content by uploading it to the decryption engine, and (e) authenticating the sender to the recipient.
    Type: Application
    Filed: November 24, 2008
    Publication date: December 2, 2010
    Applicant: PostalGuard Ltd.
    Inventor: Ram Cohen
  • Publication number: 20100235636
    Abstract: A method of enabling enriched content of an electronic message including embedding instructions within the electronic message for rendering the content of the message correctly on a recipient system. That may be protected by a firewall, anti virus or anti-spam program, the method comprising the steps of transforming the message content including the embedded instructions into data, in accordance with an algorithm; transmitting the data to the recipient system; receiving the data by recipient system, inverse transforming the data to regenerate the message and the embedded instructions, and executing the embedded instructions to correctly display the enriched content.
    Type: Application
    Filed: March 11, 2010
    Publication date: September 16, 2010
    Applicant: PostalGuard Ltd.
    Inventor: Ram Cohen
  • Publication number: 20100218180
    Abstract: A method for a provider to update a user application comprising the steps of: providing a monitor for monitoring content streaming to the user system, monitoring the content streaming to the user system and detecting an update data block and selectively updating an application in accordance with the data block.
    Type: Application
    Filed: February 23, 2010
    Publication date: August 26, 2010
    Applicant: PostalGuard Ltd.
    Inventor: Ram Cohen
  • Publication number: 20100057874
    Abstract: A method of restricting transmission of a message (step A) to an addressee unless said message contains previously specified data associated with the addressee, in which case the message is transmitted (STEP B) to the addressee.
    Type: Application
    Filed: August 25, 2009
    Publication date: March 4, 2010
    Applicant: PostalGuard Ltd.
    Inventor: Ram Cohen
  • Publication number: 20100031041
    Abstract: The present invention is directed to a method of authenticating internet communication using at least one reference URL along with associated, approved digital certificates. The method includes the use of a URL verification module for verifying communication from a source URL. Communications from the source URL are intercepted and comparison made with approved digital certificates to determine if communication is authorized.
    Type: Application
    Filed: August 3, 2009
    Publication date: February 4, 2010
    Applicant: PostalGuard Ltd.
    Inventor: Ram Cohen
  • Publication number: 20100031319
    Abstract: A method of securing an electronic message from a sender to a recipient comprising the step of restricting access to content of message at a recipient terminal unless an session is opened by transmission of a signal from equipment of the recipient via a second communication channel.
    Type: Application
    Filed: August 3, 2009
    Publication date: February 4, 2010
    Applicant: PostalGuard Ltd.
    Inventors: Ram Cohen, Ariel Walersztajn
  • Publication number: 20090271627
    Abstract: A method of facilitating secure sending of a message from a sender to a recipient over a network, comprising establishing communication between a sender side and a recipient trusted server having knowledge of an encryption key of recipient; obtaining a messaging key comprising a messaging encryption key and a messaging decryption key; exchanging messaging key data between sender side and recipient trusted server such that sender side has knowledge of the messaging encryption key and recipient trusted server has knowledge of the messaging decryption key; encrypting messaging decryption key with recipient's encryption key by recipient trusted server; transmitting messaging decryption key encrypted by recipient's encryption key from recipient trusted server to sender side, and transmitting messaging decryption key encrypted by recipient's encryption key from sender side to recipient and transmitting the message encrypted by messaging encryption key directly from sender side to recipient.
    Type: Application
    Filed: September 26, 2006
    Publication date: October 29, 2009
    Inventors: Ram Cohen, Meir Zorea
  • Publication number: 20090222887
    Abstract: A system and method for digitally signing an email communication using a shared digital certificate. The system includes a means for selecting a digital certificate and a matching private key, a header-field editor for populating a sender-field of the digital message with an address associated with the authentication means, and a means for digitally signing the digital message with the private key matching the digital certificate.
    Type: Application
    Filed: March 2, 2009
    Publication date: September 3, 2009
    Inventor: Ram Cohen
  • Publication number: 20090216795
    Abstract: A system and associated method for preventing at least one credential from being submitted to an unauthorized web location. The system comprises 1) a credential blocker for communicating with a database, and 2) the database for storing the at least one credential and an associated set of approved URLs. The credential blocker allows submission of the at least one credential only if at least one URL involved with the submission is a member of the associated set.
    Type: Application
    Filed: February 20, 2009
    Publication date: August 27, 2009
    Inventors: Ram COHEN, Aryeh Mergi