Patents by Inventor Ianir IDESES

Ianir IDESES has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20150213365
    Abstract: There is provided a computer-implemented method for identifying functions within software applications, comprising: receiving a software application for identification; automatically identifying third-party data acquisition functions embedded within the software application, the third-party data acquisition functions communicating with a remote third-party server; and providing the identified third-party data acquisition functions for the software application.
    Type: Application
    Filed: January 29, 2015
    Publication date: July 30, 2015
    Inventors: Ianir IDESES, Assaf NEUBERGER
  • Publication number: 20150215804
    Abstract: A method of queuing network traffic events on a client terminal. The method comprises monitoring, in run time, a plurality of network traffic events triggered by a plurality of applications executed on a client terminal, extracting a plurality of network traffic event characteristics of each of the plurality of network traffic events, classifying each one of the plurality of network traffic events according to a respective the plurality of network traffic event characteristics, clustering the plurality of network traffic events in a plurality of clusters according to the classifying, and managing an opening a plurality data connections between the client terminal and a network such that the content of each cluster of the plurality of clusters is transmitted in another of the plurality data connections.
    Type: Application
    Filed: January 29, 2015
    Publication date: July 30, 2015
    Inventors: Ianir IDESES, Itay KATZ, Doron SHAMIA SADEH
  • Publication number: 20150213376
    Abstract: There is provided a method for training a classifier for classifying applications, comprising: identifying, at a central server, features from training software applications; identifying a classification effectiveness rank for each of the features, wherein the classification effectiveness rank defines a difference in accuracy of classification of a respective of the training software applications with and without extraction of the feature; identifying resource requirements of each of the features of each of the training software applications; combining the classification effectiveness rank and the resource requirements for each of the features of each of the training software applications to select a group of classifying features from the features; generating a classifier for evaluating software applications based on the group of classifying features; and providing the classifier to a resource limited client terminal, for feature extraction and classification of a software application locally by the client te
    Type: Application
    Filed: January 29, 2015
    Publication date: July 30, 2015
    Inventors: Ianir IDESES, Assaf NEUBERGER
  • Publication number: 20150067859
    Abstract: A computerized method of preemptive event handling, The method comprises monitoring, in run time at kernel level, a plurality of events of a plurality of processes executed by an operating system (OS) running on a computing device, detecting, in run time, a first event of the plurality of events, the first event being performed by a first process of the plurality of processes on the computing device, classifying, in run time, the first process as a malware in response to the detection of the first event, and preventing, in run time, the first process from running on the computing device before the first event is processed by the OS.
    Type: Application
    Filed: August 31, 2014
    Publication date: March 5, 2015
    Inventors: Itay KATZ, Ianir IDESES, Ron PORAT, Alon BLAYER-GAT, Oren FARAGE
  • Publication number: 20150058988
    Abstract: A computerized method of reverting system data affected by a malware. The method comprises monitoring, in run time, a plurality of events of a plurality of processes executed by an operating system (OS) running on a computing device, logging in an event log, in run time, the plurality of events, classifying, in run time, a first process of the plurality of processes as a malware, identifying a set of events of the first process from the plurality of events using the event log, and reverting, in response to the classification, at least one system object hosted in the computing device to remove an effect of the set of events on the OS.
    Type: Application
    Filed: August 26, 2014
    Publication date: February 26, 2015
    Inventors: Itay KATZ, Ianir IDESES, Ron PORAT, Alon BLAYER-GAT, Oren FARAGE
  • Publication number: 20100272184
    Abstract: A method and system are presented for real time Super-Resolution image reconstruction. According to this technique, data indicative of a video frame sequence compressed by motion compensated compression technique is processed, and representations of one or more video objects (VOs) appearing in one or more frames of said video frame sequence are obtained. At least one of these representations is utilized as a reference representation and motion vectors, associating said representations with said at least one reference representation, are obtained from said data indicative of the video frame sequence. The representations and the motion vectors are processed, and pixel displacement maps are generated, each associating at least some pixels of one of the representations with locations on said at least one reference representation. The reference representation is re-sampled according to the sub-pixel accuracy of the displacement maps, and a re-sampled reference representation is obtained.
    Type: Application
    Filed: July 10, 2010
    Publication date: October 28, 2010
    Applicant: Ramot at Tel-Aviv University Ltd.
    Inventors: Barak Fishbain, Ianir Ideses, Leonid Yaroslavsky
  • Publication number: 20080205791
    Abstract: A memory storage device readable by machine is presented, the device tangibly embodying a sequence of depth maps associated with a continuous scene sequence of digital 2D images of a predetermined resolution, the sequence of depth maps including at least one restricted redundancy depth map of a resolution lower than the predetermined resolution of the 2D images. The depth maps may be used for 3D (i.e. stereo) visualization.
    Type: Application
    Filed: November 13, 2007
    Publication date: August 28, 2008
    Applicant: Ramot at Tel-Aviv University Ltd.
    Inventors: Ianir IDESES, Barak Fishbain, Leonid Yaroslavsky, Roni Vituch