Patents by Inventor Yaacov HOCH
Yaacov HOCH has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11177934Abstract: A computing device comprises a network element configured for receiving messages sent over a network from a control facility, a reduced instruction set computer processing circuitry comprising a central processing unit (CPU) and a secure hardware-implemented module adapted to verify that a signed PKI message is encoded in the received messages at a plurality of sequential intervals and to either switch the CPU from an operational state to a safe state, or prevent switching of the CPU from the safe state to the operational state, when a receipt of a signed PKI message is not verified in one of the sequential intervals. In the operational state, the CPU accesses a memory address space in the processing circuitry for executing software-based commands. In the safe state the CPU is prevented from executing the software-based commands while access to the memory address space is retained.Type: GrantFiled: June 5, 2019Date of Patent: November 16, 2021Assignee: NEC Corporation Of AmericaInventors: Tsvi Lev, Yaacov Hoch, Moshe Karako
-
Patent number: 11170208Abstract: A method of authenticating physical activity in a monitored space, comprising: obtaining monitored space activity data from at least one activity detector deployed in the monitored space to capture simultaneously physical activity of a plurality of moving objects in said monitored space; analyzing said monitored space activity data to identify a plurality of spatiotemporal movement patterns in said monitored space; obtaining a plurality of inertial data patterns from each one of a plurality of applications executed in a plurality of mobile devices, each one of said inertial data patterns is recorded using an inertial sensing device installed in one of said plurality of mobile devices, each one of said plurality of mobile devices is associated with one of a plurality of persons; identifying at least one correlation between at least one of said plurality of inertial data patterns and at least one of said plurality of spatiotemporal movement patterns; authenticating said physical activity according to said at leType: GrantFiled: September 5, 2018Date of Patent: November 9, 2021Assignee: NEC Corporation Of AmericaInventors: Tsvi Lev, Yaacov Hoch, Moshe Karako
-
Patent number: 11138414Abstract: A system for processing digital images comprising: at least one remote hardware processor; and at least one device, comprising at least one processing circuitry configured for: receiving from at least one image sensor, electrically coupled to the processing circuitry, at least one digital image captured by the at least one image sensor; partitioning at least one object, identified in the at least one digital image, into a plurality of object segments; replacing in the at least one digital image each of the plurality of object segments with a schematic segment, illustrating respective object segment, to produce at least one schematic image; and sending the at least one schematic image to the remote hardware processor; wherein the remote hardware processor is adapted to: receiving the at least one schematic image from the at least one device; analyzing the at least one schematic image to identify at least one behavioral pattern.Type: GrantFiled: August 25, 2019Date of Patent: October 5, 2021Assignee: NEC Corporation Of AmericaInventors: Tsvi Lev, Yaacov Hoch
-
Patent number: 11129042Abstract: Presented herein are systems and methods for detecting a boundary line crossing based on Round Trip Time (RTT) measured for wireless signals transmitted between and initiator wireless transceiver and a responder wireless transceiver deployed to form a straight boundary line. The initiator wireless transceiver transmits wireless probe signal(s) to the responder wireless transceiver, receives a wireless response signal transmitted by the responder wireless transceiver in response to the wireless probe signal(s), calculates an RTT combining a travel time of the wireless probe signal(s) and the travel time of the wireless response signal(s), compares the RTT to a reference RTT computed for a wireless probe signal and a corresponding wireless response signal transmitted in a clear straight transmission path while the boundary line is clear of obstacles and determines whether an object is blocking the straight transmission path based on a deviation of the RTT from the reference RTT.Type: GrantFiled: September 16, 2019Date of Patent: September 21, 2021Assignee: NEC Corporation Of AmericaInventors: Tsvi Lev, Yaacov Hoch, Liran Orevi, Mark Vexler
-
Publication number: 20210288805Abstract: A method for authenticating communication between an industrial control device and an external control system, comprising: storing, by a key storing module, an authentication key coupled to a matching key of an external control system; calculating, by a processor, an authenticity indication of communication between an industrial control device and the external control system using the authentication key; providing, by a connection module, the authenticity indication to the industrial control device via an input and output (I/O) port of the industrial control device, the connection module is physically and electronically connected to the I/O port.Type: ApplicationFiled: March 15, 2020Publication date: September 16, 2021Applicant: NEC Corporation Of AmericaInventors: Tsvi Lev, Yaacov Hoch
-
Publication number: 20210279333Abstract: A system for detecting malicious software, comprising at least one hardware processor adapted to: execute a tested software object in a plurality of computing environments each configured according to a different hardware and software configuration; monitor a plurality of computer actions performed in each of the plurality of computing environments when executing the tested software object; identify at least one difference between the plurality of computer actions performed in a first of the plurality of computing environments and the plurality of computer actions performed in a second of the plurality of computing environments; and instruct a presentation of an indication of the identified at least one difference on a hardware presentation unit.Type: ApplicationFiled: May 19, 2021Publication date: September 9, 2021Applicant: NEC Corporation Of AmericaInventors: Tsvi LEV, Yaacov HOCH
-
Publication number: 20210216757Abstract: A monitoring system, comprising: at least one device, comprising at least one processing circuitry configured for: receiving from at least one image sensor connected to the at least one processing circuitry, at least one digital image captured by the at least one image sensor; identifying a nature of at least one relationship between at least one first body part of at least one first person and at least one second body part of at least one second person, where the at least one first person and the at least one second person are identified in the at least one digital image; identifying at least one offending relationship according to the nature of the at least one relationship and a set of relationship rules; and outputting an indication of the at least one offending relationship.Type: ApplicationFiled: January 13, 2020Publication date: July 15, 2021Applicant: NEC Corporation Of AmericaInventors: Tsvi LEV, Yaacov HOCH
-
Patent number: 11023583Abstract: A system for detecting malicious software, comprising at least one hardware processor adapted to: execute a tested software object in a plurality of computing environments each configured according to a different hardware and software configuration; monitor a plurality of computer actions performed in each of the plurality of computing environments when executing the tested software object; identify at least one difference between the plurality of computer actions performed in a first of the plurality of computing environments and the plurality of computer actions performed in a second of the plurality of computing environments; and instruct a presentation of an indication of the identified at least one difference on a hardware presentation unit.Type: GrantFiled: December 12, 2018Date of Patent: June 1, 2021Assignee: NEC Corporation Of AmericaInventors: Tsvi Lev, Yaacov Hoch
-
Publication number: 20210136292Abstract: According to an aspect of some embodiments of the present invention there is provided a system for imaging of objects in a scene. The system contains a hardware processor, or multiple hardware processors, which execute(s) code for: receiving, from a first sensor, image or images depicting an object or objects, where the object(s) include(s) an autonomous navigation system that controls a course of the object(s) in space, predicting a spatiotemporal profile of the object(s) within the image(s), and generating instructions for execution by a second sensor for capturing an image of the object(s) at a time and location corresponding to the spatiotemporal profile.Type: ApplicationFiled: November 6, 2019Publication date: May 6, 2021Applicant: NEC Corporation of AmericaInventors: Yaacov Hoch, Tsvi Lev
-
Patent number: 10997302Abstract: A computer implemented method of authenticating a user accessing a secure terminal, comprising obtaining identification information stored in a personal machine readable storage medium exclusively associated with an accessing user attempting to access a secure system, retrieving authentication information exclusively associated with the accessing user from a remote network resource using the identification information, operating one or more privately directed user interfaces to exclusively present to the accessing user a requested alteration to a challenge request generated based on the authentication information and presented via another user interface, receiving a response to the challenge request from the accessing user and granting the accessing user access to the secure terminal in case the response matches the altered challenge request and denying access in case of no match.Type: GrantFiled: July 3, 2018Date of Patent: May 4, 2021Assignee: NEC Corporation Of AmericaInventors: Moshe Karako, Yaacov Hoch
-
Publication number: 20210084514Abstract: Presented herein are systems and methods for detecting a boundary line crossing based on Round Trip Time (RTT) measured for wireless signals transmitted between and initiator wireless transceiver and a responder wireless transceiver deployed to form a straight boundary line. The initiator wireless transceiver transmits wireless probe signal(s) to the responder wireless transceiver, receives a wireless response signal transmitted by the responder wireless transceiver in response to the wireless probe signal(s), calculates an RTT combining a travel time of the wireless probe signal(s) and the travel time of the wireless response signal(s), compares the RTT to a reference RTT computed for a wireless probe signal and a corresponding wireless response signal transmitted in a clear straight transmission path while the boundary line is clear of obstacles and determines whether an object is blocking the straight transmission path based on a deviation of the RTT from the reference RTT.Type: ApplicationFiled: September 16, 2019Publication date: March 18, 2021Applicant: NEC Corporation Of AmericaInventors: Tsvi LEV, Yaacov HOCH, Liran OREVI, Mark VEXLER
-
Publication number: 20210056296Abstract: A system for processing digital images comprising: at least one remote hardware processor; and at least one device, comprising at least one processing circuitry configured for: receiving from at least one image sensor, electrically coupled to the processing circuitry, at least one digital image captured by the at least one image sensor; partitioning at least one object, identified in the at least one digital image, into a plurality of object segments; replacing in the at least one digital image each of the plurality of object segments with a schematic segment, illustrating respective object segment, to produce at least one schematic image; and sending the at least one schematic image to the remote hardware processor; wherein the remote hardware processor is adapted to: receiving the at least one schematic image from the at least one device; analyzing the at least one schematic image to identify at least one behavioral pattern.Type: ApplicationFiled: August 25, 2019Publication date: February 25, 2021Applicant: NEC Corporation Of AmericaInventors: Tsvi LEV, Yaacov Hoch
-
Publication number: 20210025679Abstract: Methods and systems fort operating one or more light sources to project adversarial patterns generated to disorient a machine learning based detection system, comprising generating one or more adversarial patterns configured to disorient the machine learning based detection system and operating one or more light sources configured to project one or more of the adversarial pattern(s) in association with the targeted object in order to disorient the machine learning based detection system.Type: ApplicationFiled: July 23, 2019Publication date: January 28, 2021Applicant: NEC Corporation Of AmericaInventors: Yaacov HOCH, Tsvi LEV
-
Patent number: 10878067Abstract: A computer implemented method of correlating between detected access events to access client terminals in a monitored location and physical activity of people in the monitored location, comprising detecting one or more access events to access one or more of a plurality of client terminals located in a monitored location and operatively connected to a first network, obtaining sensory activity data from one or more activity detectors deployed in the monitored location to capture physical activity of people in the monitored location wherein the activity detector(s) are operatively connected to a second interconnection isolated from the first network, analyzing the sensory activity data to identify a spatiotemporal activity pattern of one or more persons in the monitored location, correlating between the access event(s) and the spatiotemporal activity pattern(s) to validate the access event(s) and initiating one or more actions according to the validation.Type: GrantFiled: July 13, 2018Date of Patent: December 29, 2020Assignee: NEC Corporation Of AmericaInventors: Tsvi Lev, Doron Gonen, Moshe Karako, Yaacov Hoch
-
Publication number: 20200389288Abstract: A computing device comprises a network element configured for receiving messages sent over a network from a control facility, a reduced instruction set computer processing circuitry comprising a central processing unit (CPU) and a secure hardware-implemented module adapted to verify that a signed PKI message is encoded in the received messages at a plurality of sequential intervals and to either switch the CPU from an operational state to a safe state, or prevent switching of the CPU from the safe state to the operational state, when a receipt of a signed PKI message is not verified in one of the sequential intervals. In the operational state, the CPU accesses a memory address space in the processing circuitry for executing software-based commands. In the safe state the CPU is prevented from executing the software-based commands while access to the memory address space is retained.Type: ApplicationFiled: June 5, 2019Publication date: December 10, 2020Applicant: NEC Corporation Of AmericaInventors: Tsvi LEV, Yaacov HOCH, Moshe KARAKO
-
Patent number: 10819737Abstract: A computer implemented method of correlating between detected usage events indicative of using client terminals and an operational state of physical interfaces of the client terminals, comprising monitoring a network in a monitored location to detect one or more usage events indicating of a usage of one or more of a plurality of client terminals operatively connected to the network, obtaining sensory data from one or more interface monitoring sensors having a fixed operation which is unmodifiable after deployed to capture an operational state of one or more physical interfaces of the client terminal(s), analyzing the sensory data to identify the operational state of the physical interface(s), correlating between the usage event(s) and the identified operational state to validate the usage event(s) and initiating one or more action according to the validation.Type: GrantFiled: July 31, 2018Date of Patent: October 27, 2020Assignee: NEC Corporation of AmericaInventors: Tsvi Lev, Yaacov Hoch, Moshe Karako
-
Publication number: 20200265731Abstract: A computer implemented method of planning a drone flight path to increase safety of dynamic objects the drone is estimated to encounter along the flight path based on a mobility model constructed to predict movement of dynamic objects, comprising receiving sensory data captured over time by one or more sensors monitoring movement of a plurality of dynamic objects in a certain geographical area, analyzing the sensory data to identify one or more mobility patterns of one or more dynamic objects detected in the certain geographical area, updating a mobility model with the mobility pattern(s) and generating a planned flight path based on the mobility model for one or more drones planned to fly in the certain geographical area, the flight path is planned to maintain a predefined safety space between the drone(s) and the dynamic object(s).Type: ApplicationFiled: February 19, 2019Publication date: August 20, 2020Applicant: NEC Corporation Of AmericaInventors: Tsvi LEV, Yaacov Hoch
-
Publication number: 20200226746Abstract: There is provided a computed implemented method of automatically generating an adapted presentation of at least one candidate anomalous object detected from anatomical imaging data of a target individual, comprising: providing anatomical imaging data of the target individual acquired by an anatomical imaging device, analyzing the anatomical imaging data by a detection classifier for detecting at least one candidate anomalous object of the anatomical imaging data and computed associated location thereof, computing, by a presentation parameter classifier, at least one presentation parameter for adapting a presentation of a sub-set of the anatomical imaging data including the at least one candidate anomalous object according to at least the location of the candidate anomalous object, and generating according to the at least one presentation parameter, an adapted presentation of the sub-set of the anatomical imaging data including the at least one candidate anomalous object.Type: ApplicationFiled: January 15, 2019Publication date: July 16, 2020Applicant: NEC Corporation Of AmericaInventors: Yael SCHWARTZBARD, Yaacov HOCH, Tsvi LEV
-
Publication number: 20200226257Abstract: A method for producing a set of indicators of unwanted activity in a computer system, comprising: receiving a plurality of input data sets, each describing system activity and comprising an infection label and system activity information collected from a computer system; producing a plurality of training sets each comprising: 1) a plurality of activity values, each indicative of execution of an instruction, extracted from one of the plurality of input data sets, and 2) a respective infection label; producing for each training set one of a plurality of sets of relevant activity values by: training a model to output, in response to the respective training set, an infection classification equal to respective infection label; and analyzing the model to identify a set of relevant activity values, of the plurality of activity values, effecting the infection classification; and analyzing the plurality of sets of relevant activity values to produce the indicators.Type: ApplicationFiled: January 14, 2019Publication date: July 16, 2020Applicant: NEC Corporation Of AmericaInventors: Maya MAIMON, Yaacov Hoch, Yosef Reuven
-
Patent number: 10542040Abstract: The present disclosure relates to an intelligent service (e.g., a smart home, a smart building, a smart car, etc.) based on a 5G communication technology and an IoT related technology. In accordance with an embodiment of the present disclosure, a method is provided for detecting, by a web server in a wireless communication system, a malicious code which is injected into the command stream of a widget miming on a web-based OS in a device. The method includes: analyzing the widget in the web server; determining at least one invariant condition constantly maintained and conserved while the widget is running, on the basis of a result of the analyzing; generating a metadata file including data satisfying the at least one invariant condition; and associating the metadata file with the widget and providing the widget in a state in which the associated metadata file is included in the widget.Type: GrantFiled: November 17, 2015Date of Patent: January 21, 2020Assignee: Samsung Electronics Co., Ltd.Inventors: Evgeny Beskrovny, Maya Maimon, Yaacov Hoch