Patents by Inventor Eliphaz Hibshoosh
Eliphaz Hibshoosh has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 8925030Abstract: A fast channel change (FFC) system including a tuner arrangement to receive at least one transport stream including an aggregated video service (AVS) and TV channels, each video frame of the AVS including some video data of each channel, a demultiplexer arrangement to demultiplex a first channel and the AVS, a FCC buffer to buffer the video frames of the AVS, a decoder arrangement to decode the first channel, a controller to instruct the decoder arrangement to switch from decoding the first channel to decoding the AVS from the FCC buffer, and a graphic engine to extract the video data of a second channel from the AVS yielding a full-screen video, and output the full-screen video to a display device, wherein the controller is operative to instruct the decoder arrangement to switch from decoding the AVS to decoding the second channel. Related apparatus and methods are also described.Type: GrantFiled: December 22, 2011Date of Patent: December 30, 2014Assignee: Cisco Technology Inc.Inventors: Eyal Farkash, Eliphaz Hibshoosh, Oded Tirza, Len Sundy, Yair Mirsky
-
Publication number: 20140195816Abstract: A system including a memory having regions including a first and second region, the first region being different from the second region, and a digital rights management engine to receive a plurality of ciphertext cipher blocks, decrypt the ciphertext cipher blocks yielding plaintext cipher blocks, output the plaintext cipher blocks to the first region of the memory over a period of time, provide a plurality of decoy cipher blocks in addition to the plaintext cipher blocks, the decoy cipher blocks having a pattern in which: a first one of the decoy cipher blocks consists of data, and a second one of the decoy cipher blocks consists of data which is the same as the data of the first one of the decoy cipher blocks, and output the decoy cipher blocks to the second region of the memory during the period of time. Related apparatus and methods are also included.Type: ApplicationFiled: June 27, 2013Publication date: July 10, 2014Inventors: Itsik Mantin, Eliphaz Hibshoosh
-
Publication number: 20140195809Abstract: A method for distributing information includes distributing an item of encrypted information to a plurality of clients and distributing respective key-shares to the clients, such that each client will require a key-share that has been distributed to at least one other client in order to reconstruct a key for decrypting the encrypted information. Upon receiving from a first client a report that a second client requested and received a respective one of the key-shares from the first client, a record of a delivery of the item to the second client is made responsively to the report.Type: ApplicationFiled: November 1, 2012Publication date: July 10, 2014Inventors: Hillel Solow, Harel Cain, Eliphaz Hibshoosh
-
Publication number: 20140075566Abstract: A computer-implemented letter-based method of encoding a length-significant portion of natural language text to generate a letter-based fingerprint of the text portion, the method including detecting letter-based locations of occurrences of pre-determined single-letter and/or multi-letter pattern(s) within the length-significant portion, the detecting being carried out such that at least some occurrences are detected in a word-boundary independent manner that does not depend on locations of word-word boundaries, for a pattern occurrence letter-position signal which describes letter positions of the occurrences of the patterns within the text portion, computing frequency-dependent absolute or relative magnitudes of signal strength for a plurality of frequencies, the computed magnitudes representing letter-based frequencies of the pattern occurrences within the natural language text portion, and storing the computed signal strength magnitudes at the plurality of frequencies, the generated fingerprint comprisingType: ApplicationFiled: September 7, 2011Publication date: March 13, 2014Applicant: Cisco Technology Inc.Inventors: Eyal Farkash, Naomi Magen, Erez Waisbard, Eliphaz Hibshoosh
-
Publication number: 20130339997Abstract: A fast channel change (FFC) system including a tuner arrangement to receive at least one transport stream including an aggregated video service (AVS) and TV channels, each video frame of the AVS including some video data of each channel, a demultiplexer arrangement to demultiplex a first channel and the AVS, a FCC buffer to buffer the video frames of the AVS, a decoder arrangement to decode the first channel, a controller to instruct the decoder arrangement to switch from decoding the first channel to decoding the AVS from the FCC buffer, and a graphic engine to extract the video data of a second channel from the AVS yielding a full-screen video, and output the full-screen video to a display device, wherein the controller is operative to instruct the decoder arrangement to switch from decoding the AVS to decoding the second channel. Related apparatus and methods are also described.Type: ApplicationFiled: December 22, 2011Publication date: December 19, 2013Applicant: Cisco Technology Inc.Inventors: Eyal Farkash, Eliphaz Hibshoosh, Oded Tirza, Len Sundy, Yair Mirsky
-
Publication number: 20130329886Abstract: A cryptographic method, comprising receiving a public key belonging to a message recipient having a private key corresponding to the public key, selecting a numerical seed, having a first entropy, using the numerical seed and the public key, generating key recovery information having a second entropy, which is less than the first entropy, and generating a message key having a third entropy, which is less than the first entropy, encrypting a message using the message key, and transmitting the encrypted message and the key recovery information to the message recipient, whereby the recipient reconstructs the message key using the key recovery information and the private key and decrypts the encrypted message using the reconstructed message key. Related systems and methods are also included.Type: ApplicationFiled: June 10, 2012Publication date: December 12, 2013Applicant: CISCO TECHNOLOGY INC.Inventors: Aviad Kipnis, Eliphaz Hibshoosh
-
Publication number: 20130272521Abstract: A cryptographic method, including generating, using a meta-secret, a first plurality of cryptographic keys, each cryptographic key associated with a respective key identifier, creating, using the meta-secret, a second plurality of sets of secret-shares, which are capable, by combining all the secrets-shares in any one of the sets together with the respective key identifier, of generating the associated cryptographic key, and performing cryptographic operations using the cryptographic keys. Related methods and apparatus are also included.Type: ApplicationFiled: April 23, 2012Publication date: October 17, 2013Applicant: Cisco Technology Inc.Inventors: Aviad Kipnis, Eliphaz Hibshoosh
-
Publication number: 20120254954Abstract: An advertising control method is described. The method includes receiving an advertisement identification message (AIM) (127) at a first mobile device (125), sending the AIM from the first mobile device to a content display unit (CDU) and storing the AIM in the CDU, selecting at least one content item from among a plurality of content items based, at least in part, on at least one stored AIM, the stored AIM being stored in the CDU, and displaying the selected content item on the CDU. Related apparatus and methods are also described.Type: ApplicationFiled: May 21, 2012Publication date: October 4, 2012Inventors: Stephanie WALD, Yossi Tsuria, David Richardson, Eliphaz Hibshoosh, Joseph Deutsch, Shabtai Atlow
-
Publication number: 20120233290Abstract: An advertising control method is described. The method includes receiving an advertisement identification message (AIM) (127) at a first mobile device (125), sending the AIM from the first mobile device to a content display unit (CDU) and storing the AIM in the CDU, selecting at least one content item from among a plurality of content items based, at least in part, on at least one stored AIM, the stored AIM being stored in the CDU, and displaying the selected content item on the CDU. Related apparatus and methods are also described.Type: ApplicationFiled: May 22, 2012Publication date: September 13, 2012Inventors: Stephanie WALD, Yossi TSURIA, David RICHARDSON, Eliphaz HIBSHOOSH, Joseph DEUTSCH, Shabtai ATLOW
-
Patent number: 8229790Abstract: An advertising control method is described. The method includes receiving an advertisement identification message (AIM) (127) at a first mobile device (125), sending the AIM from the first mobile device to a content display unit (CDU) and storing the AIM in the CDU, selecting at least one content item from among a plurality of content items based, at least in part, on at least one stored AIM, the stored AIM being stored in the CDU, and displaying the selected content item on the CDU. Related apparatus and methods are also described.Type: GrantFiled: May 20, 2009Date of Patent: July 24, 2012Assignee: NDS LimitedInventors: Stephanie Wald, Yossi Tsuria, David Richardson, Eliphaz Hibshoosh, Joseph Deutsch, Shabtai Atlow
-
Patent number: 8224699Abstract: An advertising control method is described. The method includes receiving an advertisement identification message (AIM) at a first mobile device, sending the AIM from the first mobile device to a content display unit (CDU) and storing the AIM in the CDU, selecting at least one content item from among a plurality of content items based, at least in part, on at least one stored AIM, the stoned AIM being stored in the CDU, and displaying the selected content item on the CDU. Related apparatus and methods are also described.Type: GrantFiled: September 7, 2003Date of Patent: July 17, 2012Assignee: NDS LimitedInventors: Stephanie Wald, Yossi Tsuria, David Richardson, Eliphaz Hibshoosh, Joseph Deutsch, Shabtai Atlow
-
Patent number: 8051292Abstract: In connection with network elements in a network, enhancing security by measuring proximity between elements, that are communicating with each other, by using facilities of secure devices and secure elements in the network. In some embodiments, secured information stored in a device certificate comprises a device processing delay, and the device processing delay is used in calculating a net response time which is compared to a threshold.Type: GrantFiled: May 11, 2005Date of Patent: November 1, 2011Assignee: NDS LimitedInventors: Chaim D. Shen-Orr, Eliphaz Hibshoosh, Yaacov Belenky
-
Patent number: 7940930Abstract: A system for scrambling/descrambling packets of a stream of content, each packet having a must stay clear (MSC) section, the system including an input handler including a receiving module to receive the stream, a characteristic analyzer to analyze the stream in order to determine a data independent characteristic of each packet, and a scrambling /descrambling device operationally associated with the input handler, the scrambling/descrambling device including a receiving module to receive the data independent characteristic for each packet from the input handler, and an Initial Value module to determine an Initial Value for each packet as a function of the data independent characteristic of one of the packets being processed, wherein the scrambling/descrambling device is adapted to scramble and/or descramble the packets based on the Initial Value and a Control Word. Related apparatus and methods are included.Type: GrantFiled: March 22, 2006Date of Patent: May 10, 2011Assignee: NDS LimitedInventors: Chaim Shen-Orr, Eliphaz Hibshoosh, Yaacov Belenky, Yaakov (Jordan) Levy
-
Patent number: 7920702Abstract: A system and a method for providing variable security mechanisms for securing digital content, in which a single security mechanism is not used for all content. Instead, at least one characteristic or feature of the security mechanism is varied between units, instances or categories of content. Therefore, even if unauthorized access is gained to a single unit of content, the overall integrity and security of the system for content distribution is not compromised. Preferably, security is provided though a general mechanism, which is then varied in order to provide variable, dissimilar security schemes for different types of content. By “type of content”, it is meant any of a single unit of content, a single instance of content or a single category of content. For example, for a category of content, the content may be characterized according to the identity of the content itself, such as the title of a movie for example, and/or according to the owner of a particular copy of the content.Type: GrantFiled: February 19, 2009Date of Patent: April 5, 2011Assignee: NDS LimitedInventors: Chaim Shen-Orr, Eliphaz Hibshoosh, Gyora Benedek, Hillel Solow, Yaacov Belenky, Yossi Tsuria, Zvi Shkedy
-
Publication number: 20090234743Abstract: An advertising control method is described. The method includes receiving an advertisement identification message (AIM) (127) at a first mobile device (125), sending the AIM from the first mobile device to a content display unit (CDU) and storing the AIM in the CDU, selecting at least one content item from among a plurality of content items based, at least in part, on at least one stored AIM, the stored AIM being stored in the CDU, and displaying the selected content item on the CDU. Related apparatus and methods are also described.Type: ApplicationFiled: May 20, 2009Publication date: September 17, 2009Inventors: Stephanie WALD, Yossi TSURIA, David RICHARDSON, Eliphaz HIBSHOOSH, Joseph DEUTSCH, Shabtai ATLOW
-
Publication number: 20090228961Abstract: An advertising control method is described. The method includes receiving an advertisement identification message (AIM) (127) at a first mobile device (125), sending the AIM from the first mobile device to a content display unit (CDU) and storing the AIM in the CDU, selecting at least one content item from among a plurality of content items based, at least in part, on at least one stored AIM, the stored AIM being stored in the CDU, and displaying the selected content item on the CDU. Related apparatus and methods are also described.Type: ApplicationFiled: May 20, 2009Publication date: September 10, 2009Inventors: Stephanie Wald, Yossi Tsuria, David Richardson, Eliphaz Hibshoosh, Joseph Deutsch, Shabtai Atlow
-
Publication number: 20090154697Abstract: A system and a method for providing variable security mechanisms for securing digital content, in which a single security mechanism is not used for all content. Instead, at least one characteristic or feature of the security mechanism is varied between units, instances or categories of content. Therefore, even if unauthorized access is gained to a single unit of content, the overall integrity and security of the system for content distribution is not compromised. Preferably, security is provided though a general mechanism, which is then varied in order to provide variable, dissimilar security schemes for different types of content. By “type of content”, it is meant any of a single unit of content, a single instance of content or a single category of content. For example, for a category of content, the content may be characterized according to the identity of the content itself, such as the title of a movie for example, and/or according to the owner of a particular copy of the content.Type: ApplicationFiled: February 19, 2009Publication date: June 18, 2009Applicant: NDS LimitedInventors: Chaim Shen-Orr, Eliphaz Hibshoosh, Gyora Benedek, Hillel Solow, Yaacov Belenky, Yossi Tsuria, Zvi Shkedy
-
Patent number: 7512986Abstract: A system and a method for providing variable security mechanisms for securing digital content, in which a single security mechanism is not used for all content. Instead, at least one characteristic or feature of the security mechanism is varied between units, instances or categories of content. Therefore, even if unauthorized access is gained to a single unit of content, the overall integrity and security of the system for content distribution is not compromised. Preferably, security is provided through a general mechanism, which is then varied in order to provide variable, dissimilar security schemes for different types of content. By “type of content”, it is meant any of a single unit of content, a single instance of content or a single category of content. For example, for a category of content, the content may be characterized according to the identity of the content itself, such as the title of a movie for example, and/or according to the owner of a particular copy of the content.Type: GrantFiled: February 21, 2002Date of Patent: March 31, 2009Assignee: NDS LimitedInventors: Chaim Shen-Orr, Eliphaz Hibshoosh, Gyora Benedek, Hillel Solow, Yaacov Belenky, Yossi Tsuria, Zvi Shkedy
-
Publication number: 20080137851Abstract: A system for scrambling/descrambling packets of a stream of content, each packet having a must stay clear (MSC) section, the system including an input handler including a receiving module to receive the stream, a characteristic analyzer to analyze the stream in order to determine a data independent characteristic of each packet, and a scrambling /descrambling device operationally associated with the input handler, the scrambling/descrambling device including a receiving module to receive the data independent characteristic for each packet from the input handler, and an Initial Value module to determine an Initial Value for each packet as a function of the data independent characteristic of one of the packets being processed, wherein the scrambling/descrambling device is adapted to scramble and/or descramble the packets based on the Initial Value and a Control Word. Related apparatus and methods are included.Type: ApplicationFiled: March 22, 2006Publication date: June 12, 2008Applicant: NDS LimitedInventors: Chaim Shen-Orr, Eliphaz Hibshoosh, Yaacov Belenky, Yaakov (Jordan) Levy
-
Publication number: 20070300070Abstract: A method for determining proximity between a first device and a second device, the method comprising providing a first device storing a first device private key, the first device having an associated secure first device certificate storing secured information, the secured information comprising a first device public key corresponding to the first device private key, providing a second device storing a second device private key, the second device having an associated secure second device certificate storing secured information, the secured information comprising a second device public key corresponding to the second device private key, and a second device processing delay, providing a copy of the second device certificate to the first device, establishing a secure authenticated channel between the first device and the second device, sending a proximity challenge from the first device to the second device, the proximity challenge including a numeric challenge value, receiving the proximity challenge at the secoType: ApplicationFiled: May 11, 2005Publication date: December 27, 2007Applicant: NDS LimitedInventors: Chaim Shen-Orr, Eliphaz Hibshoosh, Yaacov Belenky