Patents Assigned to NEC Corporation of America
  • Publication number: 20200293944
    Abstract: There is provided a system for computing a secure statistical classifier, comprising: at least one hardware processor executing a code for: accessing code instructions of an untrained statistical classifier, accessing a training dataset, accessing a plurality of cryptographic keys, creating a plurality of instances of the untrained statistical classifier, creating a plurality of trained sub-classifiers by training each of the plurality of instances of the untrained statistical classifier by iteratively adjusting adjustable classification parameters of the respective instance of the untrained statistical classifier according to a portion of the training data serving as input and a corresponding ground truth label, and at least one unique cryptographic key of the plurality of cryptographic keys, wherein the adjustable classification parameters of each trained sub-classifier have unique values computed according to corresponding at least one unique cryptographic key, and providing the statistical classifier, whe
    Type: Application
    Filed: March 14, 2019
    Publication date: September 17, 2020
    Applicants: NEC Corporation Of America, Bar-Ilan University, NEC Corporation
    Inventors: Jun FURUKAWA, Joseph KESHET, Kazuma OHARA, Toshinori ARAKI, Hikaru TSUCHIDA, Takuma AMADA, Kazuya KAKIZAKI, Shir AVIV-REUVEN
  • Publication number: 20200265731
    Abstract: A computer implemented method of planning a drone flight path to increase safety of dynamic objects the drone is estimated to encounter along the flight path based on a mobility model constructed to predict movement of dynamic objects, comprising receiving sensory data captured over time by one or more sensors monitoring movement of a plurality of dynamic objects in a certain geographical area, analyzing the sensory data to identify one or more mobility patterns of one or more dynamic objects detected in the certain geographical area, updating a mobility model with the mobility pattern(s) and generating a planned flight path based on the mobility model for one or more drones planned to fly in the certain geographical area, the flight path is planned to maintain a predefined safety space between the drone(s) and the dynamic object(s).
    Type: Application
    Filed: February 19, 2019
    Publication date: August 20, 2020
    Applicant: NEC Corporation Of America
    Inventors: Tsvi LEV, Yaacov Hoch
  • Publication number: 20200265607
    Abstract: A system for estimating a plurality of device poses in a space, comprising: at least one device, comprising at least one hardware processor connected to at least one sensor and adapted to: in at least one of a plurality of iterations: using at least one model to compute a first estimated device pose in a first identified region of the space in response to at least one input signal captured by the at least one sensor, where the at least one model is one of a plurality of region specific models, each trained to compute an estimated device pose in one of a plurality of regions of the space; providing the first estimated device pose to at least one software object executed by the at least one hardware processor to perform a pose-oriented task; receiving at least one other model trained to compute another estimated device pose in a second.
    Type: Application
    Filed: February 18, 2019
    Publication date: August 20, 2020
    Applicant: NEC Corporation of America
    Inventor: Tsvi Lev
  • Publication number: 20200250826
    Abstract: There is provided a medical imaging processing device, comprising: at least one hardware processor executing a code for: iteratively generating instructions for iterative adjustment of presentation parameter(s) of a 2D frame of the 3D anatomical image presented on the display, for creating a sequence of adapted 2D frames of the 3D anatomical image, the instructions transmitted from the medical imaging processing device to a physical input interface of at least one of the client terminal and display, for each respective 2D frame: capturing the respective 2D frame from video signals transmitted from the client terminal to the display, analyzing the respective captured 2D frame for extraction of a 2D anatomical image, analyzing the respective captured 2D frame to identify metadata element(s), converting the metadata element(s) into converted metadata value(s), and formatting the extracted 2D anatomical images and associated converted metadata values for reconstruction of the 3D anatomical image.
    Type: Application
    Filed: February 3, 2019
    Publication date: August 6, 2020
    Applicant: NEC Corporation Of America
    Inventors: Maya Cohen Maimon, Tsvi Lev
  • Publication number: 20200242234
    Abstract: A method for performing secure computations on records, comprising: receiving a request to apply a computation on a record; assigning a respective partial record of a plurality of partial records of the record to each of a plurality of computational processes; instructing each of the plurality of computational proccesses to perform a computation scheme comprising: applying a semi honest multiparty computation on the partial record; iteratively repeating a predetermined number of times: using a secure multiparty arithmetic computation to generate random terms; using the secure multiparty arithmetic computation to assign the random terms and an outcome of the application to at least one predetermined equation; verifying an integrity of the semi honest multiparty computation by comparison of the assignments to the at least one predetermined equation to at least one constant; and when the integrity is valid, combining the applications of the semi honest multiparty computations on the partial records.
    Type: Application
    Filed: January 28, 2019
    Publication date: July 30, 2020
    Applicant: NEC Corporation Of America
    Inventors: Jun FURUKAWA, Kazuma Ohara, Toshinori Araki
  • Publication number: 20200226257
    Abstract: A method for producing a set of indicators of unwanted activity in a computer system, comprising: receiving a plurality of input data sets, each describing system activity and comprising an infection label and system activity information collected from a computer system; producing a plurality of training sets each comprising: 1) a plurality of activity values, each indicative of execution of an instruction, extracted from one of the plurality of input data sets, and 2) a respective infection label; producing for each training set one of a plurality of sets of relevant activity values by: training a model to output, in response to the respective training set, an infection classification equal to respective infection label; and analyzing the model to identify a set of relevant activity values, of the plurality of activity values, effecting the infection classification; and analyzing the plurality of sets of relevant activity values to produce the indicators.
    Type: Application
    Filed: January 14, 2019
    Publication date: July 16, 2020
    Applicant: NEC Corporation Of America
    Inventors: Maya MAIMON, Yaacov Hoch, Yosef Reuven
  • Publication number: 20200226746
    Abstract: There is provided a computed implemented method of automatically generating an adapted presentation of at least one candidate anomalous object detected from anatomical imaging data of a target individual, comprising: providing anatomical imaging data of the target individual acquired by an anatomical imaging device, analyzing the anatomical imaging data by a detection classifier for detecting at least one candidate anomalous object of the anatomical imaging data and computed associated location thereof, computing, by a presentation parameter classifier, at least one presentation parameter for adapting a presentation of a sub-set of the anatomical imaging data including the at least one candidate anomalous object according to at least the location of the candidate anomalous object, and generating according to the at least one presentation parameter, an adapted presentation of the sub-set of the anatomical imaging data including the at least one candidate anomalous object.
    Type: Application
    Filed: January 15, 2019
    Publication date: July 16, 2020
    Applicant: NEC Corporation Of America
    Inventors: Yael SCHWARTZBARD, Yaacov HOCH, Tsvi LEV
  • Patent number: 10657362
    Abstract: Various embodiments of a facial recognition system are provided. In one embodiment, a processor determines a value for a lighting parameter associated with a captured facial image, determines whether any previously obtained images in a biometric database includes a similar value for the lighting parameter and, if not, stores the newly captured image in the database along with the lighting parameter value. In another embodiment, the processor calculates a score indicative of the likelihood that the face in the captured facial image is identical to the face of a previously obtained image in the database, determines whether the score exceeds a threshold value and, if so, generates a signal indicating a match. The processor adjusts the threshold based on one or more parameter values.
    Type: Grant
    Filed: June 30, 2016
    Date of Patent: May 19, 2020
    Assignee: NEC Corporation of America
    Inventors: Krishna Ranganath, Allen Ganz, Alvin Leong Ying Yap, Ashlee Phillips, Michael Molinari, Algernon Callier
  • Publication number: 20200134204
    Abstract: A method for performing secure computations on records, comprising: receiving a request to apply an arithmetic computation on a record; assigning a respective partial record to each of a plurality of computational processes; instructing each of the computational processes sharing a computation scheme to perform the following: submitting the arithmetic computation to the computation scheme to assemble a processed partial record from the respective partial record components; instructing each of the plurality of computational processes to verify an integrity of at least one of the plurality of processed partial records by: broadcasting combined encryptions of one of the plurality of processed partial record components to all other of the plurality of computational processes and analyzing received combined encryptions to detect integrity in the other of the processed partial record components; and when the detected integrity is valid, calculating a response to the request by combining the received processed parti
    Type: Application
    Filed: October 31, 2018
    Publication date: April 30, 2020
    Applicants: NEC Corporation Of America, Bar-Ilan University
    Inventors: Jun FURUKAWA, Yehuda LINDELL
  • Patent number: 10467457
    Abstract: A system and method for capturing images used in a facial recognition system are provided. The system and method are configured to generate a sequential set of control signals configured to cause a camera to capture a corresponding sequential set of probe images of a face of an individual. Each control signal in the sequential set of control signals is configured to cause the camera to capture a probe image of the sequential set of probe images using a different exposure time. The different exposure times associated with the sequential set of control signals together form a predetermined profile configured to enable capture of a usable image from the sequential set of probe images despite variation in at least one of an amount of light and a skin tone of the face of the individual.
    Type: Grant
    Filed: December 3, 2015
    Date of Patent: November 5, 2019
    Assignee: NEC Corporation of America
    Inventors: Krishna Ranganath, Alvin Yap, Suresh Subramanian
  • Publication number: 20190188382
    Abstract: A system for detecting malicious software, comprising at least one hardware processor adapted to: execute a tested software object in a plurality of computing environments each configured according to a different hardware and software configuration; monitor a plurality of computer actions performed in each of the plurality of computing environments when executing the tested software object; identify at least one difference between the plurality of computer actions performed in a first of the plurality of computing environments and the plurality of computer actions performed in a second of the plurality of computing environments; and instruct a presentation of an indication of the identified at least one difference on a hardware presentation unit.
    Type: Application
    Filed: December 12, 2018
    Publication date: June 20, 2019
    Applicant: NEC Corporation Of America
    Inventors: Tsvi LEV, Yaacov HOCH
  • Publication number: 20190174452
    Abstract: A computer implemented method of detecting unauthorized mobile wireless transmitters, comprising using one or more processors adapted for obtaining, from one or more radio frequency (RF) sensors deployed in a monitored location, RF sensory data relating to a plurality of transmissions transmitted by one or more of a plurality of mobile wireless transmitters, detecting a change in a location of one or more of the mobile wireless transmitters by analyzing the RF sensory data, classifying one or more of the mobile wireless transmitters as unauthorized in case the detected location change deviates from one or more mobility rules and outputting an indication of the classification.
    Type: Application
    Filed: November 28, 2018
    Publication date: June 6, 2019
    Applicant: NEC Corporation Of America
    Inventors: Tsvi LEV, Yaacov HOCH, Doron GONEN
  • Publication number: 20190166144
    Abstract: A method of monitoring network traffic in a communication network with a sentinel module to detect malicious activity is described. A gateway sentinel module receives network traffic directed through a gateway installed for a local distribution of the network, the gateway connecting the local distribution of the network to a core of the network. Malicious activity in the local distribution is detected based on a combination of: a local machine-learning model for identifying malicious activity in the local distribution, the local machine-learning model modelling network traffic from the local distribution; and a global machine-learning model. The global machine-learning model models network traffic from a plurality of local distributions of the network based training data from a plurality of local sentinel modules executed on a respective plurality of computing nodes. The computing nodes respectively receive network traffic from the plurality of location distributions.
    Type: Application
    Filed: November 29, 2018
    Publication date: May 30, 2019
    Applicants: NEC Corporation Of America, B.G. Negev Technologies & Applications Ltd., at Ben-Gurion University
    Inventors: Yisroel Avraham Mirsky, Oleg Brodt, Asaf Shabtai, Yuval Elovici, Masayuki Nakae
  • Publication number: 20190080157
    Abstract: A method of authenticating physical activity in a monitored space, comprising: obtaining monitored space activity data from at least one activity detector deployed in the monitored space to capture simultaneously physical activity of a plurality of moving objects in said monitored space; analyzing said monitored space activity data to identify a plurality of spatiotemporal movement patterns in said monitored space; obtaining a plurality of inertial data patterns from each one of a plurality of applications executed in a plurality of mobile devices, each one of said inertial data patterns is recorded using an inertial sensing device installed in one of said plurality of mobile devices, each one of said plurality of mobile devices is associated with one of a plurality of persons; identifying at least one correlation between at least one of said plurality of inertial data patterns and at least one of said plurality of spatiotemporal movement patterns; authenticating said physical activity according to said at le
    Type: Application
    Filed: September 5, 2018
    Publication date: March 14, 2019
    Applicant: NEC Corporation Of America
    Inventors: Tsvi LEV, Yaacov HOCH, Moshe KARAKO
  • Publication number: 20130138469
    Abstract: A system for forecasting demand includes a store client, an application for running a demand forecasting algorithm, a database providing store-level data to the application for the demand forecasting algorithm, wherein the store client communicates with the application, and an external interface providing future event information to the application, wherein the application manages ordering based on the demand forecasting algorithm using the future event information.
    Type: Application
    Filed: September 14, 2012
    Publication date: May 30, 2013
    Applicant: NEC CORPORATION OF AMERICA
    Inventors: Ariane Eltchaninoff, Brad A. Foreman, Charles K. King, Andre D. Laramore, James R. Snow, Naohide Takatani
  • Patent number: 8290831
    Abstract: A system for forecasting demand includes a store client, an application for running a demand forecasting algorithm, a database providing store-level data to the application for the demand forecasting algorithm, wherein the store client communicates with the application, and an external interface providing future event information to the application, wherein the application manages ordering based on the demand forecasting algorithm using the future event information.
    Type: Grant
    Filed: September 18, 2001
    Date of Patent: October 16, 2012
    Assignee: NEC Corporation of America
    Inventors: Ariane Eltchaninoff, Brad A. Foreman, Patricia J. Johnson, Charles K. King, Andre D. Laramore, James R. Snow, Naohide Takatani
  • Patent number: 8281344
    Abstract: A method is described that enables a user to remotely manage and/or monitor servers such as digital cinema screen servers and other equipment such as digital projectors within one or more digital multiplex theaters. In one embodiment, the remote management and/or monitoring of the present invention can be performed via a public, wide area network (e.g., the Internet) with or without VPN. In other embodiments, the remote management and/or monitoring of the present invention can be performed via a private, wide area network (WAN), or via a satellite communication link. In yet another embodiment, the remote management and/or monitoring of the present invention can be performed via a local area network (LAN).
    Type: Grant
    Filed: September 13, 2010
    Date of Patent: October 2, 2012
    Assignee: NEC Corporation of America
    Inventor: Harry M. Mathias