Patents by Inventor Fabian Trumper
Fabian Trumper has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11256431Abstract: A field programmable gate array (FPGA), that includes a trusted FPGA logic, an untrusted FPGA logic and a monitor; wherein the monitor is configured to monitor the untrusted FPGA logic and prevent the untrusted FPGA logic from violating predefined constrains imposed on an operation of the untrusted FPGA logic; wherein the predefined constraints are stored in a memory region of the FPGA that is not accessible to the untrusted FPGA logic.Type: GrantFiled: December 29, 2017Date of Patent: February 22, 2022Assignee: LIGHTBITS LABS LTD.Inventors: Shmuel Ben-Yehuda, Ofir Efrati, Sagi Grimberg, Eran Kirzner, Ziv Tishel, Fabian Trumper
-
Patent number: 10963393Abstract: A method for accessing a storage system, the method may include receiving a block call, from a processor that executes an application and by a storage engine of a computer that is coupled to a storage system; generating, by the storage engine and based on the block call, a key value call; and sending the key value call to a key value frontend of the storage system.Type: GrantFiled: December 29, 2017Date of Patent: March 30, 2021Assignee: Lightbits Labs Ltd.Inventors: Shmuel Ben-Yehuda, Ofir Efrati, Abel Alkon Gordon, Eran Kirzner, Fabian Trumper
-
Patent number: 10956346Abstract: A storage system that includes an in-line hardware accelerator, a solid-state drive (SSD) unit, a central processing unit (CPU), a volatile memory module, and an accelerator memory module that is coupled to the in-line hardware accelerator or belongs to the in-line hardware accelerator; wherein the in-line hardware accelerator is directly coupled to the SSD unit, the volatile memory and the non-volatile memory; wherein the CPU is directly coupled to the volatile memory and to the non-volatile memory; wherein the in-line hardware accelerator is configured to manage access to the SSD unit; wherein the in-line accelerator is configured to retrieve data stored in the volatile memory module and the non-volatile memory module without involving the CPU.Type: GrantFiled: December 29, 2017Date of Patent: March 23, 2021Assignee: Lightbits Labs Ltd.Inventors: Shmuel Ben-Yehuda, Ofir Efrati, Sagi Grimberg, Eran Kirzner, Ziv Tishel, Fabian Trumper
-
Patent number: 9622478Abstract: Embodiments of the invention relate to compositions for topical administration to dogs and cats comprising the active components dinotefuran and flumethrin, and methods for the treatment and prevention of flea and tick infestation comprising topical administration of such compositions.Type: GrantFiled: October 16, 2013Date of Patent: April 18, 2017Assignee: SOLANO S.P. LTD.Inventors: Amnon Vardi, Nimrod Vardi, Fabian Trumper
-
Publication number: 20150257388Abstract: Embodiments of the invention relate to compositions for topical administration to dogs and cats comprising the active components dinotefuran and flumethrin, and methods for the treatment and prevention of flea and tick infestation comprising topical administration of such compositions.Type: ApplicationFiled: October 16, 2013Publication date: September 17, 2015Inventors: Amnon Vardi, Nimrod Vardi, Fabian Trumper
-
Patent number: 7644188Abstract: A capability of a device may be registered to an adapter. This capability may characterize the device in terms of tasks performing abilities that may be available or associated therewith. When a packet of data including a task to be handled is received at the adapter, based on the capability registered earlier for the device, the adapter may determine whether to assign the task to the device. An indication, such as packet processing information may be derived from the packet to assist in distribution of the task. By comparing the indication with the capability, the task may be offloaded to the device based on the comparison. Using the device for a networked device, in one embodiment, one or more network communication tasks associated with data communications may be distributed and optionally performed within an adapter. In this way, the networked device may be spared of undertaking network communication tasks that are conventionally performed within the networked device.Type: GrantFiled: February 25, 2002Date of Patent: January 5, 2010Assignee: Intel CorporationInventors: Zvi Vlodavsky, Fabian Trumper, Avigdor Eldar, Ariel Rosenblatt, Moshe Valenci
-
Patent number: 7603696Abstract: Apparatus and systems, as well as methods and articles, may operate to control a security state associated with one or more network node(s) using a master heuristic policy enforcement module associated with a network firewall, and to selectively re-direct first packets to the network firewall from a remotely manageable network controller located within the network node(s) based upon the security state.Type: GrantFiled: June 10, 2005Date of Patent: October 13, 2009Assignee: Intel CorporationInventors: Fabian Trumper, Avigdor Eldar
-
Patent number: 7551615Abstract: A method to redirect data packets by a network controller to a network node. A network interface routes a data packet from the network node. Another network interface redirects the data packet from the network node. A switch selects between the two network interfaces based upon the state of the network node.Type: GrantFiled: December 29, 2004Date of Patent: June 23, 2009Assignee: Intel CorporationInventors: Fabian Trumper, Avigdor Eldar
-
Patent number: 7549023Abstract: A method, apparatus, and article for caching security records for access by a hardware offloading device are disclosed. A method for updating security record entries in a hardware table is disclosed that includes marking every security record entry in the hardware table as a replacement candidate based upon passage of a determined time interval, each security record entry having a set of security parameters. Upon receiving a packet having a security record, the hardware table is checked for a security record entry corresponding to the security record. A check is done to determine whether there is a replacement candidate in the hardware table if there is no security record entry corresponding to the security record. The security record entry containing the replacement candidate is replaced with the security record if there is a replacement candidate. Other embodiments are described.Type: GrantFiled: April 21, 2003Date of Patent: June 16, 2009Assignee: Intel CorporationInventors: Avigdor Eldar, Fabian Trumper, Zvi Vlodavsky, Ariel Rosenblatt
-
Publication number: 20080156276Abstract: The invention is a portable den for dogs which is divided into a sleeping/feeding area and a litter area. This internal division, allows a puppy to avoid contact with the litter area except to relieve itself the dog's natural instinct to avoid soiling its den is reinforced. The portable den is fully collapsible for travel or storage.Type: ApplicationFiled: December 28, 2006Publication date: July 3, 2008Inventors: Sagi Denenberg, Fabian Trumper
-
Publication number: 20060282887Abstract: Apparatus and systems, as well as methods and articles, may operate to control a security state associated with one or more network node(s) using a master heuristic policy enforcement module associated with a network firewall, and to selectively re-direct first packets to the network firewall from a remotely manageable network controller located within the network node(s) based upon the security state.Type: ApplicationFiled: June 10, 2005Publication date: December 14, 2006Inventors: Fabian Trumper, Avigdor Eldar
-
Publication number: 20060140181Abstract: A method to redirect data packets by a network controller to a network node. A network interface routes a data packet from the network node. Another network interface redirects the data packet from the network node. A switch selects between the two network interfaces based upon the state of the network node.Type: ApplicationFiled: December 29, 2004Publication date: June 29, 2006Inventors: Fabian Trumper, Avigdor Eldar
-
Publication number: 20060101310Abstract: A method, device and system for using a first verification algorithm or program to evaluate the integrity or authenticity of a second verification program. The first verification program may be stored in a device and may compare a result of such evaluation with a stored expected result. The second verification program may be included in for example an attachable memory unit of the device or other for example add-on memory unit of the device. The second verification program may evaluate the authenticity or integrity of firmware, software, data or other code that is included on the attachable device or elsewhere in the device. If both verification programs confirm the integrity of the respective codes, the firmware or software may be executed or loaded for execution by the device.Type: ApplicationFiled: October 22, 2004Publication date: May 11, 2006Inventors: Nimrod Diamant, Gershon Bar-On, Eliel Louzoun, Fabian Trumper
-
Publication number: 20040210761Abstract: A method for caching security records for access by a hardware offloading device is disclosed.Type: ApplicationFiled: April 21, 2003Publication date: October 21, 2004Inventors: Avigdor Eldar, Fabian Trumper, Zvi Vlodavsky, Ariel Rosenblatt
-
Publication number: 20030233545Abstract: A diagnostic technique is disclosed for use in high-load, low-latency communication systems involving encrypted communications. During diagnostic operation, an encryption engine is placed in an offline mode to determine whether security records stored by the engine have been corrupted. In the offline mode, the encryption engine is provided with test data to be either encrypted or decrypted. The encryption engine processes the test data using the same algorithms and the same security records that would be used if it were operating on any other data in an online mode. The encryption engine then returns the processed data to its source. At the source, the processed data is compared to data that should have been generated if the encryption engine were using a correct security record. If they do not match, the security record is identified as corrupted.Type: ApplicationFiled: June 13, 2002Publication date: December 18, 2003Inventors: Avigdor Eldar, Fabian Trumper, Zvi Vlodavsky, Ariel Rosenblatt
-
Publication number: 20030161327Abstract: A capability of a device may be registered to an adapter. This capability may characterize the device in terms of tasks performing abilities that may be available or associated therewith. When a packet of data including a task to be handled is received at the adapter, based on the capability registered earlier for the device, the adapter may determine whether to assign the task to the device. An indication, such as packet processing information may be derived from the packet to assist in distribution of the task. By comparing the indication with the capability, the task may be offloaded to the device based on the comparison. Using the device for a networked device, in one embodiment, one or more network communication tasks associated with data communications may be distributed and optionally performed within an adapter. In this way, the networked device may be spared of undertaking network communication tasks that are conventionally performed within the networked device.Type: ApplicationFiled: February 25, 2002Publication date: August 28, 2003Inventors: Zvi Vlodavsky, Fabian Trumper, Avigdor Eldar, Ariel Rosenblatt, Moshe Valenci