Patents Assigned to ActivePath Ltd.
  • Publication number: 20130145474
    Abstract: Systems, methods, computer program products, and networks for messaging. In some examples the identity of a sending user of a message and/or other data is initially concealed when the (manipulated) message or an associated created message is sent to an intended receiving user. In these examples, revealing data which enables determination of at least some data which the sent message concealed is only provided upon request, and in some of these examples, only after a user has been authenticated as being an intended receiving user.
    Type: Application
    Filed: December 6, 2011
    Publication date: June 6, 2013
    Applicant: ACTIVEPATH LTD.
    Inventors: Aryeh MERGI, Ram COHEN
  • Publication number: 20130117393
    Abstract: Systems, methods, and/or computer program products for handling email messages. In some embodiments, data relating to non-email interactions involving a user and one or more parties may be stored in memory. Therefore, in these embodiments it may be determined, at least partly based on this data, how to handle an email message for the user from an email address associated with any of these party/ies.
    Type: Application
    Filed: November 7, 2012
    Publication date: May 9, 2013
    Applicant: ACTIVEPATH LTD.
    Inventor: ACTIVEPATH LTD.
  • Publication number: 20130086187
    Abstract: Systems, methods, computer program products, and networks for messaging. An example of a method includes outputting a receiver specific indication of validation to a receiver of a message if a sender of the message has been validated. In this example data regarding the receiver specific indication was selected prior to the outputting, the selected data including data associated with the receiver on a website of the sender.
    Type: Application
    Filed: September 27, 2012
    Publication date: April 4, 2013
    Applicant: ACTIVEPATH LTD.
    Inventor: ACTIVEPATH LTD.
  • Publication number: 20130007633
    Abstract: Systems, methods, computer program products, and networks for enhancing message list functionality. In some embodiments, a method includes: after a message in a message list has been indicated by a user performing a gesture on an input module manipulating a graphical user interface whose content included the message list so as to enable data, which relates to content of the message, and which was not visible when the user performed the gesture, to be displayed to the user.
    Type: Application
    Filed: July 3, 2012
    Publication date: January 3, 2013
    Applicant: ACTIVEPATH LTD.
    Inventors: Ram COHEN, Aryeh MERGI
  • Publication number: 20120204242
    Abstract: Systems, methods, computer program products, and networks for protecting web authentication. In some examples a system for protecting web authentication includes a web client and a validator which is external to the web client. In these examples, the validator is configured to enable at least one validation item which is provided to a web server during web user authentication to be protected from possible tampering by the web client.
    Type: Application
    Filed: January 23, 2012
    Publication date: August 9, 2012
    Applicant: ACTIVEPATH LTD.
    Inventor: Ram COHEN
  • Publication number: 20120204225
    Abstract: Systems, methods, and computer program products for online authentication using audio, video and/or image data. In some examples, audio, video and/or image data of a user may be captured, and recognition may be performed on at least part of the captured data during an attempt to confirm that the user is who he/she is supposed to be. If the attempt is successful, a validation confirmation may be generated. In some cases of these examples, the validation confirmation or a part thereof may optionally be provided to a server during user authentication relating to a resource provided by the server. Additionally or alternatively, in some cases of these examples, at least part of the captured data may optionally be provided to the server during user authentication. Depending on the example, the server may or may not be a web server.
    Type: Application
    Filed: February 7, 2012
    Publication date: August 9, 2012
    Applicant: ACTIVEPATH LTD.
    Inventor: Ram COHEN
  • Publication number: 20120030556
    Abstract: Systems, methods and/or computer program products for presenting data to a user. In some cases, there is an additional processing of data for presentation, as some or all of the data received via a communication channel is replaced by data derived inter-alia by execution of instructions which were not executed during the original processing for presentation. Additionally or alternatively, in some cases at least some of the data transferred via a communication channel is in a form which excludes instruction(s) that could possibly be unacceptable to security module(s) and/or excludes instruction(s) that may be unsupported by a potential receiving system. In these cases, excluded instruction(s) are recovered and executed during the processing for presentation to a user. Additionally or alternatively, in some cases instead of presenting to a user received data such as content of a previously attached file, the data is stored and a reference to the stored data is presented.
    Type: Application
    Filed: July 29, 2010
    Publication date: February 2, 2012
    Applicant: ACTIVEPATH LTD.
    Inventors: Ram COHEN, Aryeh MERGI
  • Publication number: 20120030224
    Abstract: Systems, methods, and/or computer program products for automatic pointer activation, acquiring data not included in an obtained dataset and/or for enabling the later acquiring of data not included in the dataset. In some examples, upon automatic activation of a pointer in the dataset, data associated with the pointer may be acquired. In some of these examples the acquired data may include data which requires prior authentication. Additionally or alternatively in some of these examples, the acquired data or a version thereof may include at least one instruction which would not necessarily have been acceptable to every security module in the channel. Additionally or alternatively, in some examples, a pointer may be a candidate for automatic activation if the referenced provider matches any provider listed as being associated with automatic activation.
    Type: Application
    Filed: July 28, 2011
    Publication date: February 2, 2012
    Applicant: ACTIVEPATH LTD.
    Inventors: Ram COHEN, Aryeh MERGI
  • Publication number: 20110099607
    Abstract: Disclosed are systems, methods, networks, and computer programs for messaging. In some cases a receiving system receives certain message data which was slated to be presented in a message list to a receiving user, including a sending system contact indicator. In some cases, the receiving system uses the sending system contact indicator in determining where to send a message authentication request in order to reach the system which presumably sent the message. In some cases, the request preferably includes sufficient message identifying information from the received message data for the system which receives the request to find a match among sent messages, provided that the system which received the request had in fact sent the message. In some cases, the system which received the request provides a response to the request which reflects the matching outcome.
    Type: Application
    Filed: October 25, 2010
    Publication date: April 28, 2011
    Applicant: ACTIVEPATH LTD.
    Inventor: Ram COHEN
  • Publication number: 20110060800
    Abstract: Systems, methods, computer program products, and networks for messaging including sending, receiving and/or tracking messages. In some cases tracking may include updating receipt statuses of sent messages for which receipt notifications were received. In some cases, additionally or alternatively, tracking may include resending messages for which receipt notifications were not received. In some cases, additionally or alternatively, tracking may include receiving receipt notifications for messages which indicate one or more characteristics of the respective receiving systems.
    Type: Application
    Filed: September 7, 2010
    Publication date: March 10, 2011
    Applicant: ACTIVEPATH LTD.
    Inventors: Ram Cohen, Aryeh Mergi
  • Publication number: 20110055922
    Abstract: A method for detecting a suspected phishing attack characterized by monitoring strings of characters in a questionnaire presented by a non-approved address to a user terminal for similarity to a substring of a string of sensitive data, such that the substring has a length of one or more characters less than the length of the string of sensitive data, such that on detecting a substring of critical length, an alert is triggered.
    Type: Application
    Filed: August 31, 2010
    Publication date: March 3, 2011
    Applicant: ActivePath Ltd.
    Inventors: Ram Cohen, Aryeh Mergi