Patents by Inventor Ram Cohen
Ram Cohen has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10647601Abstract: Provided is a method of bioremediation of organic contaminated water within an annulus of an oil lubricated shaft, the method includes: (a) introducing into the annulus of said oil lubricated shaft an amount of a bioremediation combination including (i) a microbial cocktail capable of biodegrading the organic contaminants and (ii) nitrogen source, such that said bioremediation combination is brought into contact with water suspected of being contaminated in said annulus; and (b) supply into said annulus oxygen source for a time sufficient for biodegradation of at least a portion of said organic contaminants in the water within the annulus.Type: GrantFiled: July 2, 2015Date of Patent: May 12, 2020Assignee: MEKOROT WATER COMPANY, LTDInventors: Ram Cohen, Eliora Ron, Eugene Rosenberg
-
Publication number: 20180201531Abstract: Provided is a method of bioremediation of organic contaminated water within an annulus of an oil lubricated shaft, the method includes: (a) introducing into the annulus of said oil lubricated shaft an amount of a bioremediation combination including (i) a microbial cocktail capable of biodegrading the organic contaminants and (ii) nitrogen source, such that said bioremediation combination is brought into contact with water suspected of being contaminated in said annulus; and (b) supply into said annulus oxygen source for a time sufficient for biodegradation of at least a portion of said organic contaminants in the water within the annulus.Type: ApplicationFiled: July 2, 2015Publication date: July 19, 2018Applicant: MEKOROT WATER COMPANY, LTDInventors: Ram COHEN, Eliora RON, Eugene ROSENBERG
-
Publication number: 20130145474Abstract: Systems, methods, computer program products, and networks for messaging. In some examples the identity of a sending user of a message and/or other data is initially concealed when the (manipulated) message or an associated created message is sent to an intended receiving user. In these examples, revealing data which enables determination of at least some data which the sent message concealed is only provided upon request, and in some of these examples, only after a user has been authenticated as being an intended receiving user.Type: ApplicationFiled: December 6, 2011Publication date: June 6, 2013Applicant: ACTIVEPATH LTD.Inventors: Aryeh MERGI, Ram COHEN
-
Publication number: 20130007633Abstract: Systems, methods, computer program products, and networks for enhancing message list functionality. In some embodiments, a method includes: after a message in a message list has been indicated by a user performing a gesture on an input module manipulating a graphical user interface whose content included the message list so as to enable data, which relates to content of the message, and which was not visible when the user performed the gesture, to be displayed to the user.Type: ApplicationFiled: July 3, 2012Publication date: January 3, 2013Applicant: ACTIVEPATH LTD.Inventors: Ram COHEN, Aryeh MERGI
-
Publication number: 20120204225Abstract: Systems, methods, and computer program products for online authentication using audio, video and/or image data. In some examples, audio, video and/or image data of a user may be captured, and recognition may be performed on at least part of the captured data during an attempt to confirm that the user is who he/she is supposed to be. If the attempt is successful, a validation confirmation may be generated. In some cases of these examples, the validation confirmation or a part thereof may optionally be provided to a server during user authentication relating to a resource provided by the server. Additionally or alternatively, in some cases of these examples, at least part of the captured data may optionally be provided to the server during user authentication. Depending on the example, the server may or may not be a web server.Type: ApplicationFiled: February 7, 2012Publication date: August 9, 2012Applicant: ACTIVEPATH LTD.Inventor: Ram COHEN
-
Publication number: 20120204242Abstract: Systems, methods, computer program products, and networks for protecting web authentication. In some examples a system for protecting web authentication includes a web client and a validator which is external to the web client. In these examples, the validator is configured to enable at least one validation item which is provided to a web server during web user authentication to be protected from possible tampering by the web client.Type: ApplicationFiled: January 23, 2012Publication date: August 9, 2012Applicant: ACTIVEPATH LTD.Inventor: Ram COHEN
-
Publication number: 20120030556Abstract: Systems, methods and/or computer program products for presenting data to a user. In some cases, there is an additional processing of data for presentation, as some or all of the data received via a communication channel is replaced by data derived inter-alia by execution of instructions which were not executed during the original processing for presentation. Additionally or alternatively, in some cases at least some of the data transferred via a communication channel is in a form which excludes instruction(s) that could possibly be unacceptable to security module(s) and/or excludes instruction(s) that may be unsupported by a potential receiving system. In these cases, excluded instruction(s) are recovered and executed during the processing for presentation to a user. Additionally or alternatively, in some cases instead of presenting to a user received data such as content of a previously attached file, the data is stored and a reference to the stored data is presented.Type: ApplicationFiled: July 29, 2010Publication date: February 2, 2012Applicant: ACTIVEPATH LTD.Inventors: Ram COHEN, Aryeh MERGI
-
Publication number: 20120030224Abstract: Systems, methods, and/or computer program products for automatic pointer activation, acquiring data not included in an obtained dataset and/or for enabling the later acquiring of data not included in the dataset. In some examples, upon automatic activation of a pointer in the dataset, data associated with the pointer may be acquired. In some of these examples the acquired data may include data which requires prior authentication. Additionally or alternatively in some of these examples, the acquired data or a version thereof may include at least one instruction which would not necessarily have been acceptable to every security module in the channel. Additionally or alternatively, in some examples, a pointer may be a candidate for automatic activation if the referenced provider matches any provider listed as being associated with automatic activation.Type: ApplicationFiled: July 28, 2011Publication date: February 2, 2012Applicant: ACTIVEPATH LTD.Inventors: Ram COHEN, Aryeh MERGI
-
Publication number: 20110099607Abstract: Disclosed are systems, methods, networks, and computer programs for messaging. In some cases a receiving system receives certain message data which was slated to be presented in a message list to a receiving user, including a sending system contact indicator. In some cases, the receiving system uses the sending system contact indicator in determining where to send a message authentication request in order to reach the system which presumably sent the message. In some cases, the request preferably includes sufficient message identifying information from the received message data for the system which receives the request to find a match among sent messages, provided that the system which received the request had in fact sent the message. In some cases, the system which received the request provides a response to the request which reflects the matching outcome.Type: ApplicationFiled: October 25, 2010Publication date: April 28, 2011Applicant: ACTIVEPATH LTD.Inventor: Ram COHEN
-
Publication number: 20110060800Abstract: Systems, methods, computer program products, and networks for messaging including sending, receiving and/or tracking messages. In some cases tracking may include updating receipt statuses of sent messages for which receipt notifications were received. In some cases, additionally or alternatively, tracking may include resending messages for which receipt notifications were not received. In some cases, additionally or alternatively, tracking may include receiving receipt notifications for messages which indicate one or more characteristics of the respective receiving systems.Type: ApplicationFiled: September 7, 2010Publication date: March 10, 2011Applicant: ACTIVEPATH LTD.Inventors: Ram Cohen, Aryeh Mergi
-
Publication number: 20110055922Abstract: A method for detecting a suspected phishing attack characterized by monitoring strings of characters in a questionnaire presented by a non-approved address to a user terminal for similarity to a substring of a string of sensitive data, such that the substring has a length of one or more characters less than the length of the string of sensitive data, such that on detecting a substring of critical length, an alert is triggered.Type: ApplicationFiled: August 31, 2010Publication date: March 3, 2011Applicant: ActivePath Ltd.Inventors: Ram Cohen, Aryeh Mergi
-
Publication number: 20100306537Abstract: A method for securely transmitting a message to a recipient whilst allowing subsequent access to the message content, wherein at least part of the message is encrypted, comprising the steps of: (a) encrypting a first piece of content with an encryption key; (b) providing a decryption engine at an address on a recipient accessible server; (c) incorporating the address of the recipient accessible server within the message, together with the first piece of encrypted content; (d) transmitting the first piece of encrypted content together with the address of the recipient accessible server to the recipient, such that the recipient is able to decrypt the first piece of content by uploading it to the decryption engine, and (e) authenticating the sender to the recipient.Type: ApplicationFiled: November 24, 2008Publication date: December 2, 2010Applicant: PostalGuard Ltd.Inventor: Ram Cohen
-
Publication number: 20100235636Abstract: A method of enabling enriched content of an electronic message including embedding instructions within the electronic message for rendering the content of the message correctly on a recipient system. That may be protected by a firewall, anti virus or anti-spam program, the method comprising the steps of transforming the message content including the embedded instructions into data, in accordance with an algorithm; transmitting the data to the recipient system; receiving the data by recipient system, inverse transforming the data to regenerate the message and the embedded instructions, and executing the embedded instructions to correctly display the enriched content.Type: ApplicationFiled: March 11, 2010Publication date: September 16, 2010Applicant: PostalGuard Ltd.Inventor: Ram Cohen
-
Publication number: 20100218180Abstract: A method for a provider to update a user application comprising the steps of: providing a monitor for monitoring content streaming to the user system, monitoring the content streaming to the user system and detecting an update data block and selectively updating an application in accordance with the data block.Type: ApplicationFiled: February 23, 2010Publication date: August 26, 2010Applicant: PostalGuard Ltd.Inventor: Ram Cohen
-
Publication number: 20100057874Abstract: A method of restricting transmission of a message (step A) to an addressee unless said message contains previously specified data associated with the addressee, in which case the message is transmitted (STEP B) to the addressee.Type: ApplicationFiled: August 25, 2009Publication date: March 4, 2010Applicant: PostalGuard Ltd.Inventor: Ram Cohen
-
Publication number: 20100031041Abstract: The present invention is directed to a method of authenticating internet communication using at least one reference URL along with associated, approved digital certificates. The method includes the use of a URL verification module for verifying communication from a source URL. Communications from the source URL are intercepted and comparison made with approved digital certificates to determine if communication is authorized.Type: ApplicationFiled: August 3, 2009Publication date: February 4, 2010Applicant: PostalGuard Ltd.Inventor: Ram Cohen
-
Publication number: 20100031319Abstract: A method of securing an electronic message from a sender to a recipient comprising the step of restricting access to content of message at a recipient terminal unless an session is opened by transmission of a signal from equipment of the recipient via a second communication channel.Type: ApplicationFiled: August 3, 2009Publication date: February 4, 2010Applicant: PostalGuard Ltd.Inventors: Ram Cohen, Ariel Walersztajn
-
Publication number: 20090271627Abstract: A method of facilitating secure sending of a message from a sender to a recipient over a network, comprising establishing communication between a sender side and a recipient trusted server having knowledge of an encryption key of recipient; obtaining a messaging key comprising a messaging encryption key and a messaging decryption key; exchanging messaging key data between sender side and recipient trusted server such that sender side has knowledge of the messaging encryption key and recipient trusted server has knowledge of the messaging decryption key; encrypting messaging decryption key with recipient's encryption key by recipient trusted server; transmitting messaging decryption key encrypted by recipient's encryption key from recipient trusted server to sender side, and transmitting messaging decryption key encrypted by recipient's encryption key from sender side to recipient and transmitting the message encrypted by messaging encryption key directly from sender side to recipient.Type: ApplicationFiled: September 26, 2006Publication date: October 29, 2009Inventors: Ram Cohen, Meir Zorea
-
Publication number: 20090222887Abstract: A system and method for digitally signing an email communication using a shared digital certificate. The system includes a means for selecting a digital certificate and a matching private key, a header-field editor for populating a sender-field of the digital message with an address associated with the authentication means, and a means for digitally signing the digital message with the private key matching the digital certificate.Type: ApplicationFiled: March 2, 2009Publication date: September 3, 2009Inventor: Ram Cohen
-
Publication number: 20090216795Abstract: A system and associated method for preventing at least one credential from being submitted to an unauthorized web location. The system comprises 1) a credential blocker for communicating with a database, and 2) the database for storing the at least one credential and an associated set of approved URLs. The credential blocker allows submission of the at least one credential only if at least one URL involved with the submission is a member of the associated set.Type: ApplicationFiled: February 20, 2009Publication date: August 27, 2009Inventors: Ram COHEN, Aryeh Mergi