Patents by Inventor Amir Hirsh

Amir Hirsh has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20120185337
    Abstract: A method and system for streamlining social media marketing continuous activities are provided for finding Potential Friends (PFs) on various social media avenues, gathering information about PFs' interests and activities on an going basis, creating attractive presences (APs) on various social media sites, befriending with PFs to turn them in Actual Friends (AFs), conversing with AFs to foster the relationship with them, creating Social Campaigns (SCs) to promote Desired Items (DIs), running SCs with the help of AFs, and measuring results of SCs and overall progress.
    Type: Application
    Filed: March 27, 2012
    Publication date: July 19, 2012
    Applicant: COLLACTIVE LTD.
    Inventors: Eran RESHEF, Amir HIRSH
  • Patent number: 7756933
    Abstract: An active deterrence method and system deter rogue cyber activity targeting one or more protected legitimate users (PLUs). Methodologies and/or techniques are included to establish a PLU registry and/or enable a PLU to bear an identifying mark; detect rogue cyber activity; issue warnings to one or more rogue users (RUs) that target or attack PLUs with the detected rogue cyber activity; detect non-complying RUs that ignore or otherwise fail to comply with the warnings; and deploy one or more active deterrence mechanisms against the non-complying RUs. One active deterrence mechanism includes deploying a plurality of scripts to each PLU, and executing the scripts to issue complaints and request the non-complying RUs to clean their mailing lists of all PLUs. Other active deterrence mechanisms include alerting unaware business affiliates of the RUs, and notifying victims or law enforcement authorities of unlawful rogue cyber activity.
    Type: Grant
    Filed: December 12, 2005
    Date of Patent: July 13, 2010
    Assignee: Collactive Ltd.
    Inventors: Eran Reshef, Amir Hirsh
  • Publication number: 20090204482
    Abstract: A method and system for streamlining social media marketing continuous activities are provided for finding Potential Friends (PFs) on various social media avenues, gathering information about PFs' interests and activities on an going basis, creating attractive presences (APs) on various social media sites, befriending with PFs to turn them in Actual Friends (AFs), conversing with AFs to foster the relationship with them, creating Social Campaigns (SCs) to promote Desired Items (DIs), running SCs with the help of AFs, and measuring results of SCs and overall progress.
    Type: Application
    Filed: February 11, 2009
    Publication date: August 13, 2009
    Inventors: Eran Reshef, Amir Hirsh
  • Patent number: 7484097
    Abstract: A method and system for transmitting data from a computer network security device for monitoring at least one computer network node to an operations center for monitoring at least the computer network security device and to the computer network security device from the operations center in a managed computer network security system including at least the computer network security device and operations center, including establishing security information associated with the at least one computer network security device. The established security information is used to authenticate data transmissions from the computer network security device to the operations center. The established security information is used to authenticate data transmission to the computer network security device from the operations center.
    Type: Grant
    Filed: March 24, 2003
    Date of Patent: January 27, 2009
    Assignee: Symantec Corporation
    Inventors: John Thomas Steiger, Robert Edward Schafrik, Jr., Amir Hirsh, Kristine Dejoras Mendoza
  • Publication number: 20080177832
    Abstract: A method and system for accelerating a response rate for action networks, wherein the action networks provide calls for actions (CFAs) to users, includes preparing a CFA for submission to the users. The method and system determines user contact information for the various users, which indicates if the CFA is transmitted via either a slow communication mode (SCM) technique or a rapid communication mode (RCM) technique. For users having contact information indicating transmission via the SCM technique, the method and system provides a conversion request (CR), which invites the user to convert from SCM to RCM for receiving CFAs. The system and method transmits the CFAs to the user via the designated communication mode techniques. The user may accept the CR, such that the system and method receives the response and updates the user contact information from the SCM technique to the RCM technique.
    Type: Application
    Filed: January 22, 2008
    Publication date: July 24, 2008
    Inventors: Eran Reshef, Amir Hirsh
  • Publication number: 20080177819
    Abstract: A method and system for contextual calls-for-actions (CCFAs) includes providing a plurality of CCFAs from a coordination center to a plurality of supporters, including providing the CCFAs to computing devices of the supporters. The method and system further includes determining if a supporter is conducting an action context (AC). Whereby in the method and system, if the supporter is conducting the AC, selecting a call-for-action (CFA) corresponding to the AC and thereby electronically providing the CFA to the supporter. Accordingly, the supporter timely receives notations, instructions, reminder, etc. for performing the CFA relative to the user's AC.
    Type: Application
    Filed: January 22, 2008
    Publication date: July 24, 2008
    Inventors: Eran Reshef, Amir Hirsh
  • Publication number: 20080178081
    Abstract: The method and system for guiding a user to operate simplified computing operations for common web services activities via a web service interface standard to the web service itself include recognizing a user's activity with the web service. The method and system includes providing a first interface to the user for performing an operation relating to the web service, where the first interface is different from the web service interface associated with the web service and the first interface includes a plurality of graphical elements. In the method and system, upon receiving the user input commands via the first interface, the user input commands are translated into a format usable by the web service and provided to the web service, bypassing existing web service input commands provided by the web service interface.
    Type: Application
    Filed: January 22, 2008
    Publication date: July 24, 2008
    Inventors: Eran Reshef, Amir Hirsh
  • Publication number: 20080052147
    Abstract: A method and system for influencing public opinion are provided for influencing public opinion using a community of members. Methodologies and/or techniques are included to collect Influence Points; analyze Influence Points to find URLs of Interest (UOI) where the community needs act; plan effective campaigns; distribute tasks derived from campaigns to community members. The methodologies and/or techniques may also include monitoring the progress of campaigns. One campaign mechanism includes real-time desktop or browser add-on alerts sent to some or all community members, asking the members to voice their opinions at a selected UOI.
    Type: Application
    Filed: July 17, 2007
    Publication date: February 28, 2008
    Inventors: Eran Reshef, Amir Hirsh
  • Publication number: 20060168202
    Abstract: An active deterrence method and system deter rogue cyber activity targeting one or more protected legitimate users (PLUs). Methodologies and/or techniques are included to establish a PLU registry and/or enable a PLU to bear an identifying mark; detect rogue cyber activity; issue warnings to one or more rogue users (RUs) that target or attack PLUs with the detected rogue cyber activity; detect non-complying RUs that ignore or otherwise fail to comply with the warnings; and deploy one or more active deterrence mechanisms against the non-complying RUs. One active deterrence mechanism includes deploying a plurality of scripts to each PLU, and executing the scripts to issue complaints and request the non-complying RUs to clean their mailing lists of all PLUs. Other active deterrence mechanisms include alerting unaware business affiliates of the RUs, and notifying victims or law enforcement authorities of unlawful rogue cyber activity.
    Type: Application
    Filed: December 12, 2005
    Publication date: July 27, 2006
    Inventors: Eran Reshef, Amir Hirsh
  • Publication number: 20060161989
    Abstract: An active deterrence method and system deter rogue cyber activity targeting one or more protected legitimate users (PLUs). Methodologies and/or techniques are included to establish a PLU registry and/or enable a PLU to bear an identifying mark; detect rogue cyber activity; issue warnings to one or more rogue users (RUs) that target or attack PLUs with the detected rogue cyber activity; detect non-complying RUs that ignore or otherwise fail to comply with the warnings; and deploy one or more active deterrence mechanisms against the non-complying RUs. One active deterrence mechanism includes deploying a plurality of scripts to each PLU, and executing the scripts to issue complaints and request the non-complying RUs to clean their mailing lists of all PLUs. Other active deterrence mechanisms include alerting unaware business affiliates of the RUs, and notifying victims or law enforcement authorities of unlawful rogue cyber activity.
    Type: Application
    Filed: December 12, 2005
    Publication date: July 20, 2006
    Inventors: Eran Reshef, Amir Hirsh
  • Publication number: 20030217292
    Abstract: A method and system for transmitting data from a computer network security device for monitoring at least one computer network node to an operations center for monitoring at least the computer network security device and to the computer network security device from the operations center in a managed computer network security system including at least the computer network security device and operations center, including establishing security information associated with the at least one computer network security device. The established security information is used to authenticate data transmissions from the computer network security device to the operations center. The established security information is used to authenticate data transmission to the computer network security device from the operations center.
    Type: Application
    Filed: March 24, 2003
    Publication date: November 20, 2003
    Inventors: John Thomas Steiger, Robert Edward Schafrik, Amir Hirsh, Kristine Dejoras Mendoza