Patents by Inventor Gilad Parann-Nissany

Gilad Parann-Nissany has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9660805
    Abstract: The present invention discloses methods and devices for securing keys when key-management processes are subverted by an adversary. Methods include the steps of: upon receiving a creation request in the computing-environment, creating a secure key in at least one location in a computing environment by repetitively computing respective secure-key contributions: in at least one location; and in a set of N computing resources in the computing environment, wherein N is a non-negative integer; and applying the respective secure-key contributions to change a secure-key value, wherein: the respective secure-key contributions cannot be omitted or modified by at least one location; and the secure key is never revealed to the computing resources; thereby enabling the computing resources in the computing environment to ensure that the secure key is truly random; wherein at least one location is a region of memory located in a computing resource operationally connected to the computing-environment.
    Type: Grant
    Filed: May 13, 2015
    Date of Patent: May 23, 2017
    Assignee: Porticor Ltd.
    Inventors: Gilad Parann-Nissany, Yaron Sheffer, Alon Rosen
  • Patent number: 9660801
    Abstract: The present invention discloses methods and devices for key management in an as-a-service (aaS) context.
    Type: Grant
    Filed: June 23, 2015
    Date of Patent: May 23, 2017
    Assignee: Porticor Ltd.
    Inventor: Gilad Parann-Nissany
  • Patent number: 9380036
    Abstract: The present invention discloses methods and devices for securing keys for a non-secure computing-environment.
    Type: Grant
    Filed: November 28, 2012
    Date of Patent: June 28, 2016
    Assignee: Porticor Ltd.
    Inventors: Gilad Parann-Nissany, Yaron Sheffer
  • Patent number: 9380037
    Abstract: The present invention discloses methods for trusted protocols for a non-secure computing-environment. Methods include the steps of: upon request for determining that an untrusted computing resource is trustworthy, vouching for the untrusted resource as trustworthy by a trusted computing resource upon satisfying at least one criterion of: the trusted resource was directly involved in setting up and/or activating the untrusted resource; and/or has access to a database of identifying credentials and/or information which allow the trusted resource to verify that the untrusted resource is trustworthy; and concealing at least one secret that needs to be present on any computing resource, wherein at least one secret is concealed differently on each computing resource; and transmitting at least one secret from any computing resource to any other computing resource in a way that changes the step of concealing at least one secret without any computing resource knowing at least one secret.
    Type: Grant
    Filed: May 9, 2013
    Date of Patent: June 28, 2016
    Assignee: Porticor Ltd.
    Inventors: Gilad Parann-Nissany, Yaron Sheffer
  • Publication number: 20160134675
    Abstract: The present invention discloses methods for securing information by transforming the information into individually-unintelligible parts, methods include: dividing an original data stream into a set of split data streams; applying a first invertible transformation function to the split data streams, the step of applying producing an intermediate set of data streams; and extracting a final set of data streams from the intermediate set by applying a selection rule which produces the final set, thereby transforming the original data stream into individually-unintelligible parts in the final set.
    Type: Application
    Filed: December 28, 2015
    Publication date: May 12, 2016
    Inventor: Gilad Parann-Nissany
  • Publication number: 20150372812
    Abstract: The present invention discloses methods and devices for key management in an as-a-service (aaS) context.
    Type: Application
    Filed: June 23, 2015
    Publication date: December 24, 2015
    Inventor: Gilad Parann-Nissany
  • Publication number: 20150333905
    Abstract: The present invention discloses methods and devices for securing keys when key-management processes are subverted by an adversary. Methods include the steps of: upon receiving a creation request in the computing-environment, creating a secure key in at least one location in a computing environment by repetitively computing respective secure-key contributions: in at least one location; and in a set of N computing resources in the computing environment, wherein N is a non-negative integer; and applying the respective secure-key contributions to change a secure-key value, wherein: the respective secure-key contributions cannot be omitted or modified by at least one location; and the secure key is never revealed to the computing resources; thereby enabling the computing resources in the computing environment to ensure that the secure key is truly random; wherein at least one location is a region of memory located in a computing resource operationally connected to the computing-environment.
    Type: Application
    Filed: May 13, 2015
    Publication date: November 19, 2015
    Inventors: Gilad Parann-Nissany, Yaron Sheffer, Alon Rosen
  • Publication number: 20150143111
    Abstract: The present invention discloses methods and devices for securing keys for a non-secure computing-environment.
    Type: Application
    Filed: November 28, 2012
    Publication date: May 21, 2015
    Applicant: Porticor Ltd.
    Inventors: Gilad Parann-Nissany, Yaron Sheffer
  • Patent number: 8625802
    Abstract: The present invention discloses methods, devices, and media for secure key management in a non-secured, distributed, virtualized environment with applications to cloud-computing security and management.
    Type: Grant
    Filed: June 15, 2011
    Date of Patent: January 7, 2014
    Assignee: Porticor Ltd.
    Inventor: Gilad Parann-Nissany
  • Publication number: 20130247230
    Abstract: The present invention discloses methods for trusted protocols for a non-secure computing-environment. Methods include the steps of: upon request for determining that an untrusted computing resource is trustworthy, vouching for the untrusted resource as trustworthy by a trusted computing resource upon satisfying at least one criterion of: the trusted resource was directly involved in setting up and/or activating the untrusted resource; and/or has access to a database of identifying credentials and/or information which allow the trusted resource to verify that the untrusted resource is trustworthy; and concealing at least one secret that needs to be present on any computing resource, wherein at least one secret is concealed differently on each computing resource; and transmitting at least one secret from any computing resource to any other computing resource in a way that changes the step of concealing at least one secret without any computing resource knowing at least one secret.
    Type: Application
    Filed: May 9, 2013
    Publication date: September 19, 2013
    Applicant: Porticor Ltd.
    Inventors: Gilad Parann-Nissany, Yaron Sheffer
  • Publication number: 20110311055
    Abstract: The present invention discloses methods, devices, and media for secure key management in a non-secured, distributed, virtualized environment with applications to cloud-computing security and management.
    Type: Application
    Filed: June 15, 2011
    Publication date: December 22, 2011
    Inventor: Gilad Parann-Nissany
  • Publication number: 20110072489
    Abstract: The present invention discloses methods, devices, and media for securely utilizing a non-secured, distributed, virtualized network resource with applications to cloud-computing security and management. Methods including the steps of: receiving, by a deployed security mechanism, a user request over a network; parsing the user request by the deployed security mechanism; preparing, including applying security measures, the user request to transmit to a computing-service resource; and submitting, by the deployed security mechanism, the user request to the computing-service resource.
    Type: Application
    Filed: September 22, 2010
    Publication date: March 24, 2011
    Inventor: Gilad Parann-Nissany
  • Publication number: 20100153948
    Abstract: A system and method enabling two way communication between a virtual hosted operating system running in a web page and the local operating system and applications in order to allow a user to combine the advantages of both systems.
    Type: Application
    Filed: December 10, 2009
    Publication date: June 17, 2010
    Applicant: GHOST, INC.
    Inventors: Zvi SCHREIBER, Gilad PARANN-NISSANY
  • Patent number: 7562347
    Abstract: Methods and apparatus, including computer program products, implement techniques for structuring applications into reusable components. A reusable component having an external interface and an internal interface is implemented. The component encapsulates functionality, where multiple instances of the component are reusable at the same time. The component is configurable to embed one or more specified components. The external interface comprises an external programming interface, an external data-binding interface, and an external visual interface. The internal interface comprises an embedding interface, an internal programming interface, an internal data-binding interface, and an internal visual interface. The embedding interface specifies one or more component interfaces of components that can be embedded.
    Type: Grant
    Filed: November 4, 2004
    Date of Patent: July 14, 2009
    Assignee: SAP AG
    Inventors: Jens Baumgart, Reiner P. Hammerich, Jens C. Ittel, Johannes Lauterbach, Gilad Parann-Nissany, Frank Stienhans
  • Publication number: 20080162279
    Abstract: There are provided methods and system for facilitating relationships in an e-commerce marketplace. For example, in one embodiment, there is provided a computerized method for suggesting new products to a marketplace player, the method Including receiving an indication of one or more purchases by a marketplace player, comparing the received indication with a database of purchase trends to determine an item associated with the purchases by the marketplace player, locating one or more suppliers for the determined item, and communicating the identity of the item and at least one of the suppliers to the marketplace player.
    Type: Application
    Filed: December 30, 2006
    Publication date: July 3, 2008
    Applicant: SAP AG
    Inventors: Barak Hershkovitz, Jason Wolf, Gadi Shamia, Gilad Parann-Nissany
  • Publication number: 20080162278
    Abstract: There are provided methods and system for providing business ratings in an e-commerce marketplace. For example, in one embodiment, there is provided a computerized method including compiling a plurality of business attributes associated with a business entity to create a business profile for the business entity, compiling transaction information associated with the business entity to create a business grading for the business entity, identifying a match between the business entity and a service provider based on the business profile and the business grading of the retailer, publishing the match to the retailer, and initiating a business relationship between the business entity and the service provider.
    Type: Application
    Filed: December 30, 2006
    Publication date: July 3, 2008
    Applicant: SAP AG
    Inventors: Barak Hershkovitz, Jason Wolf, Gadi Shamia, Gilad Parann-Nissany
  • Publication number: 20080162297
    Abstract: There are provided methods and system for facilitating relationships in an e-commerce marketplace. For example, in one embodiment, there is provided a computerized method for providing virtual consignment in an e-commerce system, including receiving a request to establish a virtual consignment for an item, transmitting an offer price from a first party to the consignment and a second party to the consignment, determining if the offer price is acceptable to the second party, and automatically adding the item to an e-commerce site in if the offer price is acceptable.
    Type: Application
    Filed: December 30, 2006
    Publication date: July 3, 2008
    Applicant: SAP AG
    Inventors: Barak Hershkovitz, Jason Wolf, Gadi Shamia, Gilad Parann-Nissany
  • Publication number: 20060101442
    Abstract: Methods and apparatus, including computer program products, implement techniques for structuring applications into reusable components. A reusable component having an external interface and an internal interface is implemented. The component encapsulates functionality, where multiple instances of the component are reusable at the same time. The component is configurable to embed one or more specified components. The external interface comprises an external programming interface, an external data-binding interface, and an external visual interface. The internal interface comprises an embedding interface, an internal programming interface, an internal data-binding interface, and an internal visual interface. The embedding interface specifies one or more component interfaces of components that can be embedded.
    Type: Application
    Filed: November 4, 2004
    Publication date: May 11, 2006
    Inventors: Jens Baumgart, Reiner Hammerich, Jens Ittel, Johannes Lauterbach, Gilad Parann-Nissany, Frank Stienhans