Patents by Inventor Ittai Golde
Ittai Golde has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10500505Abstract: Techniques to interact with an application via messaging are described. An apparatus may comprise an application support component and a communication component. The application support component may be operative to generate an image representing a state of an application and to update the state of the application according to a text command. The communication component may be operative to transmit the image to a client device via a messaging system as an image attachment to a first message and to receive a second message from the client device via the messaging system, the second message comprising the text command. Other embodiments are described and claimed.Type: GrantFiled: August 1, 2017Date of Patent: December 10, 2019Assignee: FACEBOOK, INC.Inventors: Oded Blayer, Ittai Golde, Ran Makavy, Amir Rosenfeld
-
Publication number: 20180015365Abstract: Techniques to interact with an application via messaging are described. An apparatus may comprise an application support component and a communication component. The application support component may be operative to generate an image representing a state of an application and to update the state of the application according to a text command. The communication component may be operative to transmit the image to a client device via a messaging system as an image attachment to a first message and to receive a second message from the client device via the messaging system, the second message comprising the text command. Other embodiments are described and claimed.Type: ApplicationFiled: August 1, 2017Publication date: January 18, 2018Inventors: Oded Blayer, Ittai Golde, Ran Makavy, Amir Rosenfeld
-
Patent number: 9751012Abstract: Techniques to interact with an application via messaging are described. An apparatus may comprise an application support component and a communication component. The application support component may be operative to generate an image representing a state of an application and to update the state of the application according to a text command. The communication component may be operative to transmit the image to a client device via a messaging system as an image attachment to a first message and to receive a second message from the client device via the messaging system, the second message comprising the text command. Other embodiments are described and claimed.Type: GrantFiled: December 12, 2016Date of Patent: September 5, 2017Assignee: FACEBOOK, INC.Inventors: Oded Blayer, Ittai Golde, Ran Makavy, Amir Rosenfeld
-
Publication number: 20170100669Abstract: Techniques to interact with an application via messaging are described. An apparatus may comprise an application support component and a communication component. The application support component may be operative to generate an image representing a state of an application and to update the state of the application according to a text command. The communication component may be operative to transmit the image to a client device via a messaging system as an image attachment to a first message and to receive a second message from the client device via the messaging system, the second message comprising the text command. Other embodiments are described and claimed.Type: ApplicationFiled: December 12, 2016Publication date: April 13, 2017Inventors: Oded Blayer, Ittai Golde, Ran Makavy, Amir Rosenfeld
-
Patent number: 9553832Abstract: Techniques to interact with an application via messaging are described. An apparatus may comprise an application support component and a communication component. The application support component may be operative to generate an image representing a state of an application and to update the state of the application according to a text command. The communication component may be operative to transmit the image to a client device via a messaging system as an image attachment to a first message and to receive a second message from the client device via the messaging system, the second message comprising the text command. Other embodiments are described and claimed.Type: GrantFiled: August 13, 2013Date of Patent: January 24, 2017Inventors: Oded Blayer, Ittai Golde, Ran Makavy, Amir Rosenfeld
-
Publication number: 20150050993Abstract: Techniques to interact with an application via messaging are described. An apparatus may comprise an application support component and a communication component. The application support component may be operative to generate an image representing a state of an application and to update the state of the application according to a text command. The communication component may be operative to transmit the image to a client device via a messaging system as an image attachment to a first message and to receive a second message from the client device via the messaging system, the second message comprising the text command. Other embodiments are described and claimed.Type: ApplicationFiled: August 13, 2013Publication date: February 19, 2015Applicant: Facebook, Inc.Inventors: Oded Blayer, Ittai Golde, Ran Makavy, Amir Rosenfeld
-
Patent number: 8806604Abstract: The present invention discloses methods for protecting a host system from information-security risks posed by a URD, the method including the steps of: operationally connecting the URD to the host system; communicating, between the URD and the host system, via a network protocol, through a firewall residing in the host system; and configuring said firewall to provide security measures related to the URD. Preferably, the firewall is a software firewall or a hardware firewall. A method for protecting a host system from information-security risks posed by a URD, the method including the steps of: operationally connecting the URD to the host system; communicating, between the URD and the host system, via a network protocol, through a firewall residing in the host system; and configuring said firewall to restrict access of at least one application to the URD. Preferably, the firewall is a software firewall or a hardware firewall.Type: GrantFiled: June 28, 2007Date of Patent: August 12, 2014Assignee: SanDisk IL Ltd.Inventors: Ittai Golde, Alexander Paley, Leonid Shmulevich
-
Patent number: 8589341Abstract: A system and method to protect a target file from data damage wherein a wrapper application transparently intercepts a write call operative to affect the target file and stores the pertinent data in a delta file. Occasionally the target file is backed up in a temporary file and then updated. The wrapper application also intercepts a read call operative to access the target file and merges the update information with data from the target file in a temporary file. The resulting merged data is returned as read results data.Type: GrantFiled: November 26, 2007Date of Patent: November 19, 2013Assignee: Sandisk IL Ltd.Inventors: Ittai Golde, Kobi Ben Tzi, Oron Vexler, Itzhak Pomerantz
-
Patent number: 8103631Abstract: A client designates and transfers a file to a server in distinct chunks. The number of data chunks equals the number of communication sessions that are required to complete the transfer of the designated file to the server, that number being dependent on the number of times the communication session between the client and the server is interrupted. If the designated file includes several concatenated client files, each chunk of the designated file may include one or more such client files. Each chunk of the designated file may include some part of a client file and one or more whole client files. The byte-wise size or length of a chunk depends on the duration of the related communication session: the longer a communication session, the larger the related chunk. By transferring the designated file to the server as distinctly recognizable chunks, the need to retransmit large files to the server is avoided.Type: GrantFiled: November 19, 2008Date of Patent: January 24, 2012Assignee: Sandisk IL LtdInventors: Yaakov Ben Tsvi, Ittai Golde, Judah Gamliel Hahn
-
Publication number: 20100125591Abstract: A client designates and transfers a file to a server in distinct chunks. The number of data chunks equals the number of communication sessions that are required to complete the transfer of the designated file to the server, that number being dependent on the number of times the communication session between the client and the server is interrupted. If the designated file includes several concatenated client files, each chunk of the designated file may include one or more such client files. Each chunk of the designated file may include some part of a client file and one or more whole client files. The byte-wise size or length of a chunk depends on the duration of the related communication session: the longer a communication session, the larger the related chunk. By transferring the designated file to the server as distinctly recognizable chunks, the need to retransmit large files to the server is avoided.Type: ApplicationFiled: November 19, 2008Publication date: May 20, 2010Inventors: Yaakov Ben Tsvi, Ittai Golde, Judah Gamliel Hahn
-
Publication number: 20080250488Abstract: The present invention discloses methods for protecting a host system from information-security risks posed by a URD, the method including the steps of: operationally connecting the URD to the host system; communicating, between the URD and the host system, via a network protocol, through a firewall residing in the host system; and configuring said firewall to provide security measures related to the URD. Preferably, the firewall is a software firewall or a hardware firewall. A method for protecting a host system from information-security risks posed by a URD, the method including the steps of: operationally connecting the URD to the host system; communicating, between the URD and the host system, via a network protocol, through a firewall residing in the host system; and configuring said firewall to restrict access of at least one application to the URD. Preferably, the firewall is a software firewall or a hardware firewall.Type: ApplicationFiled: June 28, 2007Publication date: October 9, 2008Applicant: SANDISK IL LTD.Inventors: Ittai Golde, Alexander Paley, Leonid Shmulevich
-
Publication number: 20080250487Abstract: The present invention discloses a URD including: a non-volatile storage memory having program code, wherein said program code is configured to enable a network protocol for communicating with a host system; and a controller for controlling operations performed on said storage memory. Preferably, the storage memory includes flash memory. A URD including: a host system having a firewall; and a URD having a non-volatile storage memory, wherein said storage memory includes program code, and wherein said program code is configured to enable a network protocol, said URD operationally connected to said host system; wherein said firewall is configured to provide security measures related to said URD. Preferably, the firewall is a software firewall or a hardware firewall.Type: ApplicationFiled: June 28, 2007Publication date: October 9, 2008Applicant: SANDISK IL LTD.Inventors: Ittai Golde, Alexander Paley, Leonid Shmulevich
-
Publication number: 20080250489Abstract: The present invention discloses a URD including: a non-volatile storage memory having program code, wherein said program code is configured to enable a network protocol for communicating with a host system; and a controller for controlling operations performed on said storage memory. Preferably, the storage memory includes flash memory. A URD including: a host system having a firewall; and a URD having a nonvolatile storage memory, wherein said storage memory includes program code, and wherein said program code is configured to enable a network protocol, said URD operationally connected to said host system; wherein said firewall is configured to provide security measures related to said URD. Preferably, the firewall is a software firewall or a hardware firewall.Type: ApplicationFiled: July 12, 2007Publication date: October 9, 2008Applicant: SANDISK IL Ltd.Inventors: Ittai Golde, Alexander Paley, Leonid Shmulevich
-
Publication number: 20080134163Abstract: A system and method to protect a target file from data damage wherein a wrapper application transparently intercepts a write call operative to affect the target file and stores the pertinent data in a delta file. Occasionally the target file is backed up in a temporary file and then updated. The wrapper application also intercepts a read call operative to access the target file and merges the update information with data from the target file in a temporary file. The resulting merged data is returned as read results data.Type: ApplicationFiled: November 26, 2007Publication date: June 5, 2008Applicant: SANDISK IL LTD.Inventors: Ittai Golde, Kobi Ben Tzvi, Oron Vexler, Yitzhak Pomerantz
-
Patent number: 7296144Abstract: When a non-volatile memory device is reversibly operationally connected to a computer, the computer executes an application that is stored on the device. The execution causes changes to a non-volatile memory of the computer. After the execution terminates, all such changes are undone, either immediately if the termination was normal or upon rebooting the computer if the termination was abnormal. Before or during the execution, information related to the changes is recorded. The undoing of the changes is based on that information. Examples of such information recorded before the execution include a list of expected changes and a partial or full copy of the computer's non-volatile memory.Type: GrantFiled: November 23, 2004Date of Patent: November 13, 2007Assignee: SanDisk IL Ltd.Inventors: Donald Ray Bryant-Rich, Ittai Golde, Yaakov Ben Tsvi, Erez Baum, Daniel Yerushalmi
-
Publication number: 20050114643Abstract: When a non-volatile memory device is reversibly operationally connected to a computer, the computer executes an application that is stored on the device. The execution causes changes to a non-volatile memory of the computer. After the execution terminates, all such changes are undone, either immediately if the termination was normal or upon rebooting the computer if the termination was abnormal. Before or during the execution, information related to the changes is recorded. The undoing of the changes is based on that information. Examples of such information recorded before the execution include a list of expected changes and a partial or full copy of the computer's non-volatile memory.Type: ApplicationFiled: November 23, 2004Publication date: May 26, 2005Inventors: Donald Bryant-Rich, Ittai Golde, Yaakov Tsvi, Erez Baum, Daniel Yerushalmi