Patents Assigned to NEC Corporation of America
  • Publication number: 20210295745
    Abstract: Provided herein are methods, systems and computer program products for detecting tampering, comprising a sealing process and a seal verification process. The sealing process comprising analyzing a seal applied to seal an object as a tamper evident element, recording one or more manufacturing defects of the seal identified based on the analysis, each of the one or more manufacturing defects comprising one or more non-reproducible deviations from seal generation instructions used to produce the seal, and generating a signature comprising the one or more manufacturing defects. The seal verification process comprising obtaining the signature, analyzing the seal sealing the object, and determining whether the object is tampered based on a comparison between the analyzed seal and the signature.
    Type: Application
    Filed: March 18, 2020
    Publication date: September 23, 2021
    Applicant: NEC Corporation Of America
    Inventor: Tsvi LEV
  • Publication number: 20210295350
    Abstract: Provided herein are methods and systems for detecting counterfeit of a personal object, comprising, analyzing one or more images depicting a personal object to identify one or more wearing marks in the personal object induced by one or more wearing conditions, generating a wearing pattern comprising the one or more wearing marks, comparing between the wearing pattern and one or more previous wearing patterns created for the personal object based on past images of the personal object, and determining whether the personal object is genuine or counterfeit based on the comparison.
    Type: Application
    Filed: May 18, 2020
    Publication date: September 23, 2021
    Applicant: NEC Corporation Of America
    Inventors: Tsvi LEV, Kota Iwamoto
  • Patent number: 11126709
    Abstract: A method for performing secure computations on records, comprising: receiving a request to apply a computation on a record; assigning a respective partial record of a plurality of partial records of the record to each of a plurality of computational processes; instructing each of the plurality of computational processes to perform a computation scheme comprising: applying a semi honest multiparty computation on the partial record; iteratively repeating a predetermined number of times: using a secure multiparty arithmetic computation to generate random terms; using the secure multiparty arithmetic computation to assign the random terms and an outcome of the application to at least one predetermined equation; verifying an integrity of the semi honest multiparty computation by comparison of the assignments to the at least one predetermined equation to at least one constant; and when the integrity is valid, combining the applications of the semi honest multiparty computations on the partial records.
    Type: Grant
    Filed: January 28, 2019
    Date of Patent: September 21, 2021
    Assignee: NEC Corporation Of America
    Inventors: Jun Furukawa, Kazuma Ohara, Toshinori Araki
  • Patent number: 11129042
    Abstract: Presented herein are systems and methods for detecting a boundary line crossing based on Round Trip Time (RTT) measured for wireless signals transmitted between and initiator wireless transceiver and a responder wireless transceiver deployed to form a straight boundary line. The initiator wireless transceiver transmits wireless probe signal(s) to the responder wireless transceiver, receives a wireless response signal transmitted by the responder wireless transceiver in response to the wireless probe signal(s), calculates an RTT combining a travel time of the wireless probe signal(s) and the travel time of the wireless response signal(s), compares the RTT to a reference RTT computed for a wireless probe signal and a corresponding wireless response signal transmitted in a clear straight transmission path while the boundary line is clear of obstacles and determines whether an object is blocking the straight transmission path based on a deviation of the RTT from the reference RTT.
    Type: Grant
    Filed: September 16, 2019
    Date of Patent: September 21, 2021
    Assignee: NEC Corporation Of America
    Inventors: Tsvi Lev, Yaacov Hoch, Liran Orevi, Mark Vexler
  • Publication number: 20210288805
    Abstract: A method for authenticating communication between an industrial control device and an external control system, comprising: storing, by a key storing module, an authentication key coupled to a matching key of an external control system; calculating, by a processor, an authenticity indication of communication between an industrial control device and the external control system using the authentication key; providing, by a connection module, the authenticity indication to the industrial control device via an input and output (I/O) port of the industrial control device, the connection module is physically and electronically connected to the I/O port.
    Type: Application
    Filed: March 15, 2020
    Publication date: September 16, 2021
    Applicant: NEC Corporation Of America
    Inventors: Tsvi Lev, Yaacov Hoch
  • Publication number: 20210286338
    Abstract: A method for automatic monitoring of industrial control systems, comprising: monitoring an environment by an electromagnetic sensor to measure a plurality of electromagnetic pulses emitted by at least one industrial control device during operation of the at least one industrial control device; calculating automatically at least one normal data pattern based on an analysis of the plurality of electromagnetic pulses; matching between at least one new electromagnetic pulse measured by the electromagnetic sensor and the at least one normal data pattern to automatically detect at least one abnormal data pattern; and sending automatically a security alert in response to the abnormal data pattern.
    Type: Application
    Filed: March 15, 2020
    Publication date: September 16, 2021
    Applicant: NEC Corporation Of America
    Inventor: Moshe KARAKO
  • Publication number: 20210279333
    Abstract: A system for detecting malicious software, comprising at least one hardware processor adapted to: execute a tested software object in a plurality of computing environments each configured according to a different hardware and software configuration; monitor a plurality of computer actions performed in each of the plurality of computing environments when executing the tested software object; identify at least one difference between the plurality of computer actions performed in a first of the plurality of computing environments and the plurality of computer actions performed in a second of the plurality of computing environments; and instruct a presentation of an indication of the identified at least one difference on a hardware presentation unit.
    Type: Application
    Filed: May 19, 2021
    Publication date: September 9, 2021
    Applicant: NEC Corporation Of America
    Inventors: Tsvi LEV, Yaacov HOCH
  • Publication number: 20210216757
    Abstract: A monitoring system, comprising: at least one device, comprising at least one processing circuitry configured for: receiving from at least one image sensor connected to the at least one processing circuitry, at least one digital image captured by the at least one image sensor; identifying a nature of at least one relationship between at least one first body part of at least one first person and at least one second body part of at least one second person, where the at least one first person and the at least one second person are identified in the at least one digital image; identifying at least one offending relationship according to the nature of the at least one relationship and a set of relationship rules; and outputting an indication of the at least one offending relationship.
    Type: Application
    Filed: January 13, 2020
    Publication date: July 15, 2021
    Applicant: NEC Corporation Of America
    Inventors: Tsvi LEV, Yaacov HOCH
  • Patent number: 11050762
    Abstract: A system for identifying one or more malicious parties participating in a secure multi-party computation (MPC), comprising one of a plurality of computing nodes communicating with the plurality of computing nodes through a network(s). The computing node is adapted for participating in an MPC with the plurality of computing nodes using secure protocol(s) established over the network(s), the secure protocol(s) support transmittal of private messages to each of the other computing nodes and transmittal of broadcast messages to all of the computing nodes, detecting invalid share value(s) of a plurality of share values computed and committed by the computing nodes during the MPC, verifying each of the share values according to a plurality of agreed share values valid for the MPC which are determined through a plurality of broadcast private messages, identifying identity of malicious computing node(s) which committed the invalid share value(s) failing the verification and outputting the identity.
    Type: Grant
    Filed: July 6, 2018
    Date of Patent: June 29, 2021
    Assignees: NEC Corporation Of America, Bar-Iian University
    Inventors: Jun Furukawa, Yehuda Lindell
  • Patent number: 11023583
    Abstract: A system for detecting malicious software, comprising at least one hardware processor adapted to: execute a tested software object in a plurality of computing environments each configured according to a different hardware and software configuration; monitor a plurality of computer actions performed in each of the plurality of computing environments when executing the tested software object; identify at least one difference between the plurality of computer actions performed in a first of the plurality of computing environments and the plurality of computer actions performed in a second of the plurality of computing environments; and instruct a presentation of an indication of the identified at least one difference on a hardware presentation unit.
    Type: Grant
    Filed: December 12, 2018
    Date of Patent: June 1, 2021
    Assignee: NEC Corporation Of America
    Inventors: Tsvi Lev, Yaacov Hoch
  • Publication number: 20210136292
    Abstract: According to an aspect of some embodiments of the present invention there is provided a system for imaging of objects in a scene. The system contains a hardware processor, or multiple hardware processors, which execute(s) code for: receiving, from a first sensor, image or images depicting an object or objects, where the object(s) include(s) an autonomous navigation system that controls a course of the object(s) in space, predicting a spatiotemporal profile of the object(s) within the image(s), and generating instructions for execution by a second sensor for capturing an image of the object(s) at a time and location corresponding to the spatiotemporal profile.
    Type: Application
    Filed: November 6, 2019
    Publication date: May 6, 2021
    Applicant: NEC Corporation of America
    Inventors: Yaacov Hoch, Tsvi Lev
  • Patent number: 10997302
    Abstract: A computer implemented method of authenticating a user accessing a secure terminal, comprising obtaining identification information stored in a personal machine readable storage medium exclusively associated with an accessing user attempting to access a secure system, retrieving authentication information exclusively associated with the accessing user from a remote network resource using the identification information, operating one or more privately directed user interfaces to exclusively present to the accessing user a requested alteration to a challenge request generated based on the authentication information and presented via another user interface, receiving a response to the challenge request from the accessing user and granting the accessing user access to the secure terminal in case the response matches the altered challenge request and denying access in case of no match.
    Type: Grant
    Filed: July 3, 2018
    Date of Patent: May 4, 2021
    Assignee: NEC Corporation Of America
    Inventors: Moshe Karako, Yaacov Hoch
  • Publication number: 20210084514
    Abstract: Presented herein are systems and methods for detecting a boundary line crossing based on Round Trip Time (RTT) measured for wireless signals transmitted between and initiator wireless transceiver and a responder wireless transceiver deployed to form a straight boundary line. The initiator wireless transceiver transmits wireless probe signal(s) to the responder wireless transceiver, receives a wireless response signal transmitted by the responder wireless transceiver in response to the wireless probe signal(s), calculates an RTT combining a travel time of the wireless probe signal(s) and the travel time of the wireless response signal(s), compares the RTT to a reference RTT computed for a wireless probe signal and a corresponding wireless response signal transmitted in a clear straight transmission path while the boundary line is clear of obstacles and determines whether an object is blocking the straight transmission path based on a deviation of the RTT from the reference RTT.
    Type: Application
    Filed: September 16, 2019
    Publication date: March 18, 2021
    Applicant: NEC Corporation Of America
    Inventors: Tsvi LEV, Yaacov HOCH, Liran OREVI, Mark VEXLER
  • Publication number: 20210056296
    Abstract: A system for processing digital images comprising: at least one remote hardware processor; and at least one device, comprising at least one processing circuitry configured for: receiving from at least one image sensor, electrically coupled to the processing circuitry, at least one digital image captured by the at least one image sensor; partitioning at least one object, identified in the at least one digital image, into a plurality of object segments; replacing in the at least one digital image each of the plurality of object segments with a schematic segment, illustrating respective object segment, to produce at least one schematic image; and sending the at least one schematic image to the remote hardware processor; wherein the remote hardware processor is adapted to: receiving the at least one schematic image from the at least one device; analyzing the at least one schematic image to identify at least one behavioral pattern.
    Type: Application
    Filed: August 25, 2019
    Publication date: February 25, 2021
    Applicant: NEC Corporation Of America
    Inventors: Tsvi LEV, Yaacov Hoch
  • Publication number: 20210035302
    Abstract: There is provided a medical imaging processing device, comprising: at least one hardware processor executing a code for: iteratively generating instructions for iterative adjustment of presentation parameter(s) of a 2D frame of the 3D anatomical image presented on the display, for creating a sequence of adapted 2D frames of the 3D anatomical image, the instructions transmitted from the medical imaging processing device to a physical input interface of at least one of the client terminal and display, for each respective 2D frame: capturing the respective 2D frame from video signals transmitted from the client terminal to the display, analyzing the respective captured 2D frame for extraction of a 2D anatomical image, analyzing the respective captured 2D frame to identify metadata element(s), converting the metadata element(s) into converted metadata value(s), and formatting the extracted 2D anatomical images and associated converted metadata values for reconstruction of the 3D anatomical image.
    Type: Application
    Filed: October 21, 2020
    Publication date: February 4, 2021
    Applicant: NEC Corporation Of America
    Inventors: Maya COHEN MAIMON, Tsvi LEV
  • Publication number: 20210025679
    Abstract: Methods and systems fort operating one or more light sources to project adversarial patterns generated to disorient a machine learning based detection system, comprising generating one or more adversarial patterns configured to disorient the machine learning based detection system and operating one or more light sources configured to project one or more of the adversarial pattern(s) in association with the targeted object in order to disorient the machine learning based detection system.
    Type: Application
    Filed: July 23, 2019
    Publication date: January 28, 2021
    Applicant: NEC Corporation Of America
    Inventors: Yaacov HOCH, Tsvi LEV
  • Patent number: 10885205
    Abstract: A method for performing secure computations on records, comprising: receiving a request to apply an arithmetic computation on a record; assigning a respective partial record to each of a plurality of computational processes; instructing each of the computational processes sharing a computation scheme to perform the following: submitting the arithmetic computation to the computation scheme to assemble a processed partial record from the respective partial record components; instructing each of the plurality of computational processes to verify an integrity of at least one of the plurality of processed partial records by: broadcasting combined encryptions of one of the plurality of processed partial record components to all other of the plurality of computational processes and analyzing received combined encryptions to detect integrity in the other of the processed partial record components; and when the detected integrity is valid, calculating a response to the request by combining the received processed parti
    Type: Grant
    Filed: October 31, 2018
    Date of Patent: January 5, 2021
    Assignees: NEC Corporation Of America, Bar-Ilan University
    Inventors: Jun Furukawa, Yehuda Lindell
  • Patent number: 10878067
    Abstract: A computer implemented method of correlating between detected access events to access client terminals in a monitored location and physical activity of people in the monitored location, comprising detecting one or more access events to access one or more of a plurality of client terminals located in a monitored location and operatively connected to a first network, obtaining sensory activity data from one or more activity detectors deployed in the monitored location to capture physical activity of people in the monitored location wherein the activity detector(s) are operatively connected to a second interconnection isolated from the first network, analyzing the sensory activity data to identify a spatiotemporal activity pattern of one or more persons in the monitored location, correlating between the access event(s) and the spatiotemporal activity pattern(s) to validate the access event(s) and initiating one or more actions according to the validation.
    Type: Grant
    Filed: July 13, 2018
    Date of Patent: December 29, 2020
    Assignee: NEC Corporation Of America
    Inventors: Tsvi Lev, Doron Gonen, Moshe Karako, Yaacov Hoch
  • Patent number: 10867492
    Abstract: An apparatus for discreet imaging of a scene, comprising: at least one short wave infrared (SWIR) sensor that captures at least one SWIR image of the scene at a SWIR wavelength range, at least one SWIR illumination element that generates SWIR illumination at the SWIR wavelength range, and a barrier positioned such that SWIR illumination reflecting off objects of scene within the field of view passes through the barrier to reach the at least one SWIR sensor, the barrier made out of a material and having a thickness selected for being opaque to visible light and non-opaque to the SWIR wavelength range.
    Type: Grant
    Filed: July 25, 2019
    Date of Patent: December 15, 2020
    Assignee: NEC Corporation Of America
    Inventor: Tsvi Lev
  • Publication number: 20200389288
    Abstract: A computing device comprises a network element configured for receiving messages sent over a network from a control facility, a reduced instruction set computer processing circuitry comprising a central processing unit (CPU) and a secure hardware-implemented module adapted to verify that a signed PKI message is encoded in the received messages at a plurality of sequential intervals and to either switch the CPU from an operational state to a safe state, or prevent switching of the CPU from the safe state to the operational state, when a receipt of a signed PKI message is not verified in one of the sequential intervals. In the operational state, the CPU accesses a memory address space in the processing circuitry for executing software-based commands. In the safe state the CPU is prevented from executing the software-based commands while access to the memory address space is retained.
    Type: Application
    Filed: June 5, 2019
    Publication date: December 10, 2020
    Applicant: NEC Corporation Of America
    Inventors: Tsvi LEV, Yaacov HOCH, Moshe KARAKO