Patents by Inventor Benjamin Maytal

Benjamin Maytal has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9773111
    Abstract: Technologies for preventing software-based side-channel attacks are generally disclosed. In some examples, a computing device may receive a cryptographic program having one or more programming instructions for performing a key handling operation and may add one or more programming instructions for performing an anti-attack operation to the one or more programming instructions for performing the key handling operation. The computing device may transmit the resulting cryptographic program with the anti-attack operation to an execution device. The execution device, such as a cloud computing system, may execute the cryptographic program, thereby causing execution of the anti-attack operation. The execution of cryptographic program may prevent a side-channel attack by masking the number of key performance events that occur.
    Type: Grant
    Filed: August 14, 2012
    Date of Patent: September 26, 2017
    Assignee: EMPIRE TECHNOLOGY DEVELOPMENT LLC
    Inventor: Benjamin Maytal
  • Patent number: 9743250
    Abstract: Technologies are generally described for methods and systems effective to determine a location of a communication device. In some examples, a method may include generating a request for a response from the communication device. The method may also include broadcasting the request over a cellular network. The method may also include receiving the response from the communication device at three or more antennas. The method may also include determining respective signal strengths of the response. The method may also include determining a location of the communication device based on the respective signal strengths. The method may also include analyzing a memory based on the location of the device to identify content. The method may also include sending the content to the communication device.
    Type: Grant
    Filed: October 28, 2013
    Date of Patent: August 22, 2017
    Assignee: EMPIRE TECHNOLOGY DEVELOPMENT LLC
    Inventor: Benjamin Maytal
  • Publication number: 20170078400
    Abstract: A system and method in a building or vehicle for an actuator operation in response to a sensor according to a control logic, the system comprising a router or a gateway communicating with a device associated with the sensor and a device associated with the actuator over in-building or in-vehicle networks, and an external Internet-connected control server associated with the control logic implementing a PID closed linear control loop and communicating with the router over external network for controlling the in-building or in-vehicle phenomenon. The sensor may be a microphone or a camera, and the system may include voice or image processing as part of the control logic. A redundancy is used by using multiple sensors or actuators, or by using multiple data paths over the building or vehicle internal or external communication. The networks may be wired or wireless, and may be BAN, PAN, LAN, WAN, or home networks.
    Type: Application
    Filed: November 27, 2016
    Publication date: March 16, 2017
    Inventors: Yehuda BINDER, Benjamin MAYTAL
  • Publication number: 20160286359
    Abstract: Technologies are generally described for methods and systems effective to determine a location of a communication device. In some examples, a method may include generating a request for a response from the communication device. The method may also include broadcasting the request over a cellular network. The method may also include receiving the response from the communication device at three or more antennas. The method may also include determining respective signal strengths of the response. The method may also include determining a location of the communication device based on the respective signal strengths. The method may also include analyzing a memory based on the location of the device to identify content. The method may also include sending the content to the communication device.
    Type: Application
    Filed: October 28, 2013
    Publication date: September 29, 2016
    Inventor: Benjamin Maytal
  • Publication number: 20160275798
    Abstract: In one example embodiment, an operator alertness monitoring system may include a proximate condition monitor that is configured to issue an alert to direct an operator's attention to a detected hazardous condition, and an operator alertness monitor that is configured to detect the operator's physical reaction to the issued alert and instruct the proximate condition monitor to respond to the operator's detected physical reaction to the issued alert.
    Type: Application
    Filed: October 25, 2013
    Publication date: September 22, 2016
    Inventors: Benjamin MAYTAL, Noam MAYTAL
  • Patent number: 9286185
    Abstract: Technologies are generally described for systems, methods and devices configured to monitor a performance of a resource of a device. In some examples, a processor may receive an application code. The application code may include at least one application thread configured to implement at least one task for the application code. The application code may be configured to spawn a performance thread. The processor may execute the application thread on the computing device. The application thread may be configured to use at least one resource of the computing device. The processor may further execute the performance thread on the computing device. The performance thread may be configured to calculate a value relating to the resource.
    Type: Grant
    Filed: November 16, 2012
    Date of Patent: March 15, 2016
    Assignee: Empire Technology Development LLC
    Inventors: Shmuel Ur, Mordehai Margalit, Benjamin Maytal, Vlad Grigore Dabija, Noam Meir
  • Patent number: 9270491
    Abstract: Technologies are generally described for providing a system of scalable networked devices that may be mapped employing a naming convention that enables an optimized route to the devices through device search algorithms for network-connected and non-network connected devices. The naming convention and corresponding algorithms may enable users to search for a desired functionality, access suitable scalable networked device(s), and utilize the desired functionality. Furthermore, a spider algorithm may be employed to continuously map and update a mesh of scalable networked devices.
    Type: Grant
    Filed: November 14, 2011
    Date of Patent: February 23, 2016
    Assignee: Empire Technology Development LLC
    Inventors: Mordehai Margalit, Benjamin Maytal
  • Publication number: 20150304370
    Abstract: Technologies and implementations for facilitating channel-based communication via VOIP are generally disclosed. Example methods may include receiving a communication preference from the plurality Receive a Communication Preference from a Number of Mobile Devices of mobile devices, receiving a status identifier from the plurality of mobile devices and designating one or more of the plurality of mobile devices as belonging to a communication group based at least in part on the received communication preferences and the received Receive a Status Identifier from the Mobile Devices status identifiers.
    Type: Application
    Filed: December 19, 2012
    Publication date: October 22, 2015
    Inventor: Benjamin MAYTAL
  • Patent number: 9166890
    Abstract: Technologies are presented for tracking of used resources and ensuring a similar level of computing resources to be provided at a new cloud-based service provider for a migrating application, even if the new service provider has a different mix of resources. Computing resources in use by the migrating application and a level of used computing power may be identified. Each of the computing resources may be assigned a score according to an associated service level. An overall score generated as a weighted combination of the individual scores according to their influence on application processing and networking status may be used for comparison of service levels between an existing service provider and the new service provider to ensure the migrating application receives a similar performance level. Additionally, the individual and overall scores may be employed by the new service provider to properly allocate its resources to provide similar performance level.
    Type: Grant
    Filed: February 6, 2012
    Date of Patent: October 20, 2015
    Assignee: Empire Technology Development LLC
    Inventors: Benjamin Maytal, Noam Meir
  • Publication number: 20150134973
    Abstract: Technologies for preventing software-based side-channel attacks are generally disclosed. In some examples, a computing device may receive a cryptographic program having one or more programming instructions for performing a key handling operation and may add one or more programming instructions for performing an anti-attack operation to the one or more programming instructions for performing the key handling operation. The computing device may transmit the resulting cryptographic program with the anti-attack operation to an execution device. The execution device, such as a cloud computing system, may execute the cryptographic program, thereby causing execution of the anti-attack operation. The execution of cryptographic program may prevent a side-channel attack by masking the number of key performance events that occur.
    Type: Application
    Filed: August 14, 2012
    Publication date: May 14, 2015
    Applicant: EMPIRE TECHNOLOGY DEVELOPMENT LLC
    Inventor: Benjamin Maytal
  • Publication number: 20150054951
    Abstract: Technologies are generally described for systems and methods for influencing line of sight data. In some examples, a processor may determine a selection zone based on a location of a vehicle. The processor may select an object in the selection zone. The processor may generate an audio query that identifies the object. The processor may receive line of sight data that relates to a line of sight. The processor may determine whether the line of sight intersects the object based on the line of sight data. The processor may generate a response based on the determination.
    Type: Application
    Filed: August 22, 2013
    Publication date: February 26, 2015
    Applicant: EMPIRE TECHNOLOGY DEVELOPMENT, LLC
    Inventors: Benjamin Maytal, Noam Meir
  • Publication number: 20140330958
    Abstract: Technologies are generally described for systems, devices and methods effective to monitor performance of a computing device. A computing device may receive a specified counting rate. The computing device may count at the specified counting rate to generate a sequence of counting numbers. The computing device may identify a first output of a process, such as results from computations performed on data, and may identify a first counting number when the first output is identified. The computing device may identify a second output of the process, such as additional results from the computations, and may identify a second counting number when the second output is identified. The computing device may then determine whether an alert should be generated based on the first and second counting numbers such as when a difference between the first and second counting numbers exceeds a threshold value.
    Type: Application
    Filed: May 6, 2013
    Publication date: November 6, 2014
    Applicant: EMPIRE TECHNOLOGY DEVELOPMENT, LLC
    Inventors: Shmuel Ur, Mordehai Margalit, Benjamin Maytal, Vlad Grigore Dabija, Noam Meir
  • Publication number: 20140143410
    Abstract: Technologies are generally described for systems, methods and devices configured to monitor a performance of a resource of a device. In some examples, a processor may receive an application code. The application code may include at least one application thread configured to implement at least one task for the application code. The application code may be configured to spawn a performance thread. The processor may execute the application thread on the computing device. The application thread may be configured to use at least one resource of the computing device. The processor may further execute the performance thread on the computing device. The performance thread may be configured to calculate a value relating to the resource.
    Type: Application
    Filed: November 16, 2012
    Publication date: May 22, 2014
    Applicant: EMPIRE TECHNOLOGY DEVELOPMENT, LLC
    Inventors: Shmuel Ur, Mordehai Margalit, Benjamin Maytal, Vlad Grigore Dabija, Noam Meir
  • Publication number: 20130343353
    Abstract: The concept of “Internet of Things” is about allowing things and object to connect together over the internet It is expected that a major portion of the “things” to be connected will be a mass number of sensors or controllers, for applications like “Smart City”. It is expected that each sensor will send a brief messages every few minutes. The existing communication solutions do not allow more than few thousands of active units and a relatively high power consumption, usually over short distance. The present invention will describe a method and system which will allow a very large number, potentially tens of millions to communicate with a single base station center over a long distance. The communication will be ultra low power with no battery replacement and will allow real time control messages.
    Type: Application
    Filed: June 20, 2013
    Publication date: December 26, 2013
    Inventor: Benjamin Maytal
  • Publication number: 20130346242
    Abstract: Product counterfeiting is a major problem. It is estimated that about 10% of all goods sold are counterfeits!. In recent years counterfeiters have improved significantly the quality of their products as a good counterfeit can be sold at a much higher value than a poor one. It is very difficult for untrained, regular customers to tell the difference. Currently, there are no reliable means for a person to authenticate a product. Also, online purchases are very popular. The major mean for authentication are passwords—but they are ways to get the passwords of people to break in. Also, biometrics ID means like fingerprinting can be copied and faked.
    Type: Application
    Filed: June 20, 2013
    Publication date: December 26, 2013
    Inventor: Benjamin Maytal
  • Publication number: 20130332588
    Abstract: Technologies are presented for tracking of used resources and ensuring a similar level of computing resources to be provided at a new cloud-based service provider for a migrating application, even if the new service provider has a different mix of resources. Computing resources in use by the migrating application and a level of used computing power may be identified. Each of the computing resources may be assigned a score according to an associated service level. An overall score generated as a weighted combination of the individual scores according to their influence on application processing and networking status may be used for comparison of service levels between an existing service provider and the new service provider to ensure the migrating application receives a similar performance level. Additionally, the individual and overall scores may be employed by the new service provider to properly allocate its resources to provide similar performance level.
    Type: Application
    Filed: February 6, 2012
    Publication date: December 12, 2013
    Applicant: Empire Technology Development, LLC
    Inventors: Benjamin Maytal, Noam Meir
  • Publication number: 20130124706
    Abstract: Technologies are generally described for providing a system of scalable networked devices that may be mapped employing a naming convention that enables an optimized route to the devices through device search algorithms for network-connected and non-network connected devices. The naming convention and corresponding algorithms may enable users to search for a desired functionality, access suitable scalable networked device(s), and utilize the desired functionality. Furthermore, a spider algorithm may be employed to continuously map and update a mesh of scalable networked devices.
    Type: Application
    Filed: November 14, 2011
    Publication date: May 16, 2013
    Applicant: Empire Technology Development, LLC
    Inventors: Mordehai Margalit, Benjamin Maytal
  • Publication number: 20100079322
    Abstract: An electronic measurement system for extracting a small AC signal from a dominant DC background signal, which can be changing at a rate similar to that at which the desired signal changes. The invention is particularly useful for pulse rate measurement of a subject even while undergoing vigorous motion such as running, by means of pulse oximetry. The measurement technique utilizes a moving window for selecting a part of the input signal, and processing in an A/D converter, an offset part of the signal which falls within a range which covers the window. The method is also more generally employable to any measurement task, where the signal to be extracted is a small AC signal buried within a dominant DC or quasi-DC background, which itself can be changing, and even at a rate similar to that expected of the sought-after AC signal.
    Type: Application
    Filed: October 1, 2008
    Publication date: April 1, 2010
    Applicant: Telesen Ltd.
    Inventors: Victor Gladshtein, Benjamin Maytal
  • Publication number: 20090219132
    Abstract: An authentication system enabling a customer to verify the authenticity of a product in a foolproof, secure and simple manner. plurality of secret sets of numbers (10) is generated, each set comprising a challenge portion and a response portion These sets are stored on a remote server (16). Each set is associated with a different product. The customer sends a challenge portion to the server, and prompts the server to provide a response. If the response matches that of the product in hand, the product is known to be authentic. In another embodiment of the system, cellular transmission (42) is used to power an electronic tag (41) attached to the product and carrying authentication data. In a third embodiment, the full manufacturer database is divided into separate databases, possibly related to product vendor, such that an authentication process can be performed without the need to access the manufacturer's entire database of products.
    Type: Application
    Filed: November 27, 2007
    Publication date: September 3, 2009
    Inventors: Benjamin Maytal, Yossi Tsuria
  • Publication number: 20090138275
    Abstract: An authentication system enabling a customer to verify the authenticity of a product in a foolproof, secure and simple manner plurality of secret sets of numbers is generated, each set comprising a challenge portion and a response portion. These sets are stored on a remote server. Each set is associated with a different product. The customer sends a challenge portion to the server, and prompts the server to provide a response. If the response matches that of the product in hand, the product is known to be authentic. In another embodiment of the system, cellular transmission is used to power an electronic tag attached to the product and carrying authentication data. In a third embodiment, the full manufacturer database is divided into separate databases, possibly related to product vendor, such that an authentication process can be performed without the need to access the manufacturer's entire database of products.
    Type: Application
    Filed: November 24, 2008
    Publication date: May 28, 2009
    Inventor: BENJAMIN MAYTAL