Patents by Inventor Amit Wix
Amit Wix has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20220121725Abstract: A method includes issuing, by an application running in a user device, a request to fetch over a network content that includes multiple content items. The request is received by a software agent running in the user device and, in response to the request, a chain of fetch operations is executed for fetching the requested content. Each of the fetch operations in the chain includes (i) receiving from the application an identification of one or more additional content items identified by the application within a content item fetched in a preceding fetch operation in the chain, (ii) evaluating a criterion, and (iii) deciding, depending on the criterion, whether or not to fetch the one or more additional content items.Type: ApplicationFiled: January 3, 2022Publication date: April 21, 2022Inventors: Roee Peled, Amit Wix
-
Publication number: 20220124171Abstract: A method includes, in a user device configured to execute User Interface (UI) tasks that process one or more UI displays presented to a user, assigning to each UI task among the UI tasks (i) a priority selected from at least a Foreground (FG) priority and a Background (BG) priority, and (ii) an association with a UI display being processed by the UI task. The UI tasks are scheduled for execution in accordance with a schedule that (i) gives precedence to the UI tasks having the FG priority over the UI tasks having the BG priority, and (ii) for any UI display, retains in-order execution of the UI tasks associated with the UI display. The UI tasks are executed in accordance with the schedule.Type: ApplicationFiled: January 3, 2022Publication date: April 21, 2022Inventors: Roee Peled, Amit Wix
-
Publication number: 20210329090Abstract: A user device includes an interface and one or more processors. The interface is configured to communicate over a network. The one or more processors are configured to evaluate a pre-load scheduling condition with respect to a user application installed in the user device, and to schedule pre-loading of the user application depending on the pre-load scheduling condition.Type: ApplicationFiled: June 30, 2021Publication date: October 21, 2021Inventors: Daniel Yellin, Roee Peled, David Ben Eli, Shimon Moshavi, Ehud Weinstein, Navot Goren, Eilon Regev, Amit Wix
-
Publication number: 20210329089Abstract: A user device includes a memory and one or more processors. The memory is configured to store one or more user applications installed in the user device. The one or more processors are configured to run an Operating System (OS) of the user device, including maintaining a data structure that tracks activity of the user applications, and to pre-load a user application before the user application is accessed by a user, including preventing the data structure from tracking the pre-loaded user application.Type: ApplicationFiled: June 30, 2021Publication date: October 21, 2021Inventors: Daniel Yellin, Roee Peled, David Ben Eli, Shimon Moshavi, Ehud Weinstein, Navot Goren, Eilon Regev, Amit Wix
-
Publication number: 20210329091Abstract: A user device includes a display screen and one or more processors. The display screen is configured to display content to a user. The one or more processors are configured to pre-load a user application by running at least part of a program code of the user application in a background, including enabling the program code of the user application to pre-render a visual display of the user application in the background, and, in response to the user accessing the user application, to transfer the pre-rendered visual display to a foreground, thereby displaying the visual display to the user on the display screen.Type: ApplicationFiled: June 30, 2021Publication date: October 21, 2021Inventors: Daniel Yellin, Roee Peled, David Ben Eli, Shimon Moshavi, Ehud Weinstein, Navot Goren, Eilon Regev, Amit Wix
-
Publication number: 20210329088Abstract: A user device includes a memory and one or more processors. The memory is configured to store one or more user applications installed in the user device. The one or more processors are configured to select one or more operations, which are to be performed in normal launching of a user application but not in background pre-loading of the user application, to pre-load the user application before the user application is accessed by a user, including skipping the one or more selected operations, and to complete the one or more skipped operations in response to the user accessing the user application.Type: ApplicationFiled: June 30, 2021Publication date: October 21, 2021Inventors: Daniel Yellin, Roee Peled, David Ben Eli, Shimon Moshavi, Ehud Weinstein, Navot Goren, Eilon Regev, Amit Wix
-
Patent number: 11095743Abstract: A system (20) includes one or more interfaces and multiple processors. The one or more interfaces are configured to communicate over a communication network (40). At least a first processor from among the processors is included in a user device (24) and at least a second processor from among the processors is included in a server (52) external to the user device. The processors are configured to track content items that are provided by one or more content sources (36) and to deliver the content items to one or more applications (32) installed in the user device.Type: GrantFiled: September 19, 2017Date of Patent: August 17, 2021Assignee: TENSERA NETWORKS LTD.Inventors: Daniel Yellin, Roee Peled, David Ben Eli, Shimon Moshavi, Ehud Weinstein, Navot Goren, Eilon Regev, Amit Wix
-
Publication number: 20190230186Abstract: A system (20) includes one or more interfaces and multiple processors. The one or more interfaces are configured to communicate over a communication network (40). At least a first processor from among the processors is included in a user device (24) and at least a second processor from among the processors is included in a server (52) external to the user device. The processors are configured to track content items that are provided by one or more content sources (36) and to deliver the content items to one or more applications (32) installed in the user device.Type: ApplicationFiled: September 19, 2017Publication date: July 25, 2019Inventors: Daniel Yellin, Roee Peled, David Ben Eli, Shimon Moshavi, Ehud Weinstein, Navot Goren, Eilon Regev, Amit Wix
-
Patent number: 9872299Abstract: A method includes, in a wireless communication terminal that transmits a data channel over multiple component carriers, dividing a total transmit-power allocation specified for the data channel into carrier-specific power allocations for the respective component carriers. Block sizes, which specify respective numbers of bits for transmitting the data channel, are initially derived for one or more of the component carriers from a quantized set of block sizes, such that the respective carrier-specific power allocations are not exceeded. For at least a selected component carrier, an extended block size is selected from the quantized set. The extended block size exceeds a carrier-specific power allocation assigned to the selected component carrier, but together with the block sizes of the other component carriers does not exceed the total transmit-power allocation. The data channel is transmitted over the component carriers using the selected block sizes, including the extended block size.Type: GrantFiled: December 3, 2015Date of Patent: January 16, 2018Assignee: MARVELL INTERNATIONAL LTD.Inventors: Ofir Mahazri, Amit Wix
-
Patent number: 9749298Abstract: A method in a receiver includes receiving from a transmitter a sequence of communication packets, which carry data encrypted with an encryption scheme. The encryption scheme depends on a counter value that is incremented independently by each of the transmitter and the receiver. Attempts are made to decrypt the data of a received packet multiple times using different, respective counter values, to produce multiple respective decrypted outputs. A decrypted output in which the data has been decrypted correctly is identified, the counter value is corrected, and the data of the received packet is recovered from the identified decrypted output.Type: GrantFiled: January 14, 2015Date of Patent: August 29, 2017Assignee: MARVELL WORLD TRADE LTD.Inventors: Danny Alexander, Amit Wix
-
Patent number: 9385865Abstract: A method includes, in a mobile communication terminal, receiving a signal, which carries media content that has been encrypted after being compressed in accordance with a compression protocol having a plurality of predefined configurations. Each configuration specifies a respective compression mode of the compression protocol. The received signal is decrypted, and one or more parameters that define a configuration of the compression protocol that was used for compressing the media content are determined from the decrypted signal. An absence of match is detected when the determined one or more parameters do not match any of the plurality of predetermined configurations of the compression protocol. An error in decrypting the received signal is identified based on detecting the absence of a match.Type: GrantFiled: July 17, 2014Date of Patent: July 5, 2016Assignee: MARVELL WORLD TRADE LTD.Inventors: Amit Wix, Boris Korenfeld, Morag Agmon
-
Publication number: 20160182460Abstract: A method in a receiver includes receiving from a transmitter a sequence of communication packets, which carry data encrypted with an encryption scheme. The encryption scheme depends on a counter value that is incremented independently by each of the transmitter and the receiver. Attempts are made to decrypt the data of a received packet multiple times using different, respective counter values, to produce multiple respective decrypted outputs. A decrypted output in which the data has been decrypted correctly is identified, the counter value is corrected, and the data of the received packet is recovered from the identified decrypted output.Type: ApplicationFiled: January 14, 2015Publication date: June 23, 2016Inventors: DANNY ALEXANDER, AMIT WIX
-
Patent number: 9232431Abstract: A method includes classifying signaling messages to be transmitted from a mobile communication terminal into one or more classes, wherein each class corresponds to a respective event relating to the terminal and specifies the signaling messages that become irrelevant when the event occurs. The signaling messages are queued for transmission in a queue. In response to detecting an occurrence of a given event, the irrelevant signaling messages are removed from the queue based on the class specifying irrelevant signaling messages corresponding to the given event.Type: GrantFiled: December 17, 2013Date of Patent: January 5, 2016Assignee: MARVELL WORLD TRADE LTD.Inventors: Amit Wix, Amit Rahav, Gil Levy
-
Patent number: 8971276Abstract: A method includes, in a mobile communication terminal, accepting from an application layer first data having a first data size for transmission to a base station over a radio channel. An indication of a second data size of second data, which is to be transmitted over the radio channel but was not yet accepted from the application layer, is accepted from the application layer. A resource allocation on the radio channel is calculated in the terminal depending on both the first data size and the second data size. The base station is requested for the resource allocation, and at least part of the first and second data is transmitted from the terminal in accordance with the resource allocation.Type: GrantFiled: January 3, 2013Date of Patent: March 3, 2015Assignee: Marvell International Ltd.Inventor: Amit Wix
-
Patent number: 8964985Abstract: A method in a receiver includes receiving from a transmitter a sequence of communication packets, which carry data encrypted with an encryption scheme. The encryption scheme depends on a counter value that is incremented independently by each of the transmitter and the receiver. Attempts are made to decrypt the data of a received packet multiple times using different, respective counter values, to produce multiple respective decrypted outputs. A decrypted output in which the data has been decrypted correctly is identified, the counter value is corrected, and the data of the received packet is recovered from the identified decrypted output.Type: GrantFiled: October 17, 2013Date of Patent: February 24, 2015Assignee: Marvell World Trade Ltd.Inventors: Danny Alexander, Amit Wix
-
Publication number: 20150023504Abstract: A method includes, in a mobile communication terminal, receiving a signal, which carries media content that has been encrypted after being compressed in accordance with a compression protocol having a plurality of predefined configurations. Each configuration specifies a respective compression mode of the compression protocol. The received signal is decrypted, and one or more parameters that define a configuration of the compression protocol that was used for compressing the media content are determined from the decrypted signal. An absence of match is detected when the determined one or more parameters do not match any of the plurality of predetermined configurations of the compression protocol. An error in decrypting the received signal is identified based on detecting the absence of a match.Type: ApplicationFiled: July 17, 2014Publication date: January 22, 2015Inventors: Amit Wix, Boris Korenfeld, Morag Agmon
-
Publication number: 20140192984Abstract: A method in a receiver includes receiving from a transmitter a sequence of communication packets, which carry data encrypted with an encryption scheme. The encryption scheme depends on a counter value that is incremented independently by each of the transmitter and the receiver. Attempts are made to decrypt the data of a received packet multiple times using different, respective counter values, to produce multiple respective decrypted outputs. A decrypted output in which the data has been decrypted correctly is identified, the counter value is corrected, and the data of the received packet is recovered from the identified decrypted output.Type: ApplicationFiled: October 17, 2013Publication date: July 10, 2014Applicant: MARVELL WORLD TRADE LTD.Inventors: DANNY ALEXANDER, AMIT WIX
-
Publication number: 20140171138Abstract: A method includes classifying signaling messages to be transmitted from a mobile communication terminal into one or more classes, wherein each class corresponds to a respective event relating to the terminal and specifies the signaling messages that become irrelevant when the event occurs. The signaling messages are queued for transmission in a queue. In response to detecting an occurrence of a given event, the irrelevant signaling messages are removed from the queue based on the class specifying irrelevant signaling messages corresponding to the given event.Type: ApplicationFiled: December 17, 2013Publication date: June 19, 2014Applicant: Marvell World Trade Ltd.Inventors: Amit Wix, Amit Rahav, Gil Levy
-
Patent number: 8582768Abstract: A method in a receiver includes receiving from a transmitter a sequence of communication packets, which carry data encrypted with an encryption scheme. The encryption scheme depends on a counter value that is incremented independently by each of the transmitter and the receiver. Attempts are made to decrypt the data of a received packet multiple times using different, respective counter values, to produce multiple respective decrypted outputs. A decrypted output in which the data has been decrypted correctly is identified, the counter value is corrected, and the data of the received packet is recovered from the identified decrypted output.Type: GrantFiled: February 15, 2012Date of Patent: November 12, 2013Assignee: Marvell World Trade Ltd.Inventors: Danny Alexander, Amit Wix
-
Publication number: 20120207302Abstract: A method in a receiver includes receiving from a transmitter a sequence of communication packets, which carry data encrypted with an encryption scheme. The encryption scheme depends on a counter value that is incremented independently by each of the transmitter and the receiver. Attempts are made to decrypt the data of a received packet multiple times using different, respective counter values, to produce multiple respective decrypted outputs. A decrypted output in which the data has been decrypted correctly is identified, the counter value is corrected, and the data of the received packet is recovered from the identified decrypted output.Type: ApplicationFiled: February 15, 2012Publication date: August 16, 2012Inventors: Danny Alexander, Amit Wix