Patents by Inventor Ohad Sheory
Ohad Sheory has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20160014190Abstract: A method for allowing a user to select a specific static image displayed within a non-static image such as a video, animation, or slide show, and to receive a network link to the selected static image. The specific static image selected by the user is determined by timing considerations based on the time of the user's selection relative to the start time of the non-static display. Refinements to the method include taking network and processing delays into account and allowing for the display of non-static images that are cached as well as downloaded.Type: ApplicationFiled: July 8, 2015Publication date: January 14, 2016Inventor: Ohad Sheory
-
Publication number: 20150156151Abstract: A method and system for sending email messages to a recipient, wherein the email messages contain interactive dynamic content that can be displayed by the recipient's email client on the recipient's email-reading device without requiring the recipient to launch additional applications. Embodiments of the invention feature a dynamic “ribbon” containing multiple images that automatically scroll across the screen to display a changing subset of the multiple images without requiring the recipient to manually scroll. The recipient can click or tap on an image at any time to obtain more detailed information about a product or service represented by an image.Type: ApplicationFiled: December 4, 2014Publication date: June 4, 2015Inventors: Ohad SHEORY, Jeffrey KUPIETZKY
-
Publication number: 20120054781Abstract: A system is described that dynamically enhances a software application executing on a computing device without having to change and recompile the original application code. The system includes a staging environment that monitors the execution of the application and indexes each item of graphical and/or audio information generated by the application into a first database. A second database is then populated by manual or automated means with one or more business rules, wherein each business rule is associated with one or more of the objects indexed in the first database. The system further includes a run-time environment that identifies items of graphics and/or audio information as they are generated by the application during run-time, uses the second database to determine if an identified item is associated with a business rule, and, responsive to a determination that an identified item is associated with a business rule, applies the business rule.Type: ApplicationFiled: November 4, 2011Publication date: March 1, 2012Applicant: EXENT TECHNOLOGIES, LTD.Inventors: Yoav M. Tzruya, Ohad Sheory, Uri Twig
-
Patent number: 8069136Abstract: A system is described that dynamically enhances a software application executing on a computing device without having to change and recompile the original application code. The system includes a staging environment that monitors the execution of the application and indexes each item of graphical and/or audio information generated by the application into a first database. A second database is then populated by manual or automated means with one or more business rules, wherein each business rule is associated with one or more of the objects indexed in the first database. The system further includes a run-time environment that identifies items of graphics and/or audio information as they are generated by the application during run-time, uses the second database to determine if an identified item is associated with a business rule, and, responsive to a determination that an identified item is associated with a business rule, applies the business rule.Type: GrantFiled: August 18, 2009Date of Patent: November 29, 2011Assignee: Exent Technologies, Ltd.Inventors: Yoav M. Tzruya, Ohad Sheory, Uri Twig
-
Publication number: 20090307173Abstract: A system is described that dynamically enhances a software application executing on a computing device without having to change and recompile the original application code. The system includes a staging environment that monitors the execution of the application and indexes each item of graphical and/or audio information generated by the application into a first database. A second database is then populated by manual or automated means with one or more business rules, wherein each business rule is associated with one or more of the objects indexed in the first database. The system further includes a run-time environment that identifies items of graphics and/or audio information as they are generated by the application during run-time, uses the second database to determine if an identified item is associated with a business rule, and, responsive to a determination that an identified item is associated with a business rule, applies the business rule.Type: ApplicationFiled: August 18, 2009Publication date: December 10, 2009Applicant: EXENT TECHNOLOGIES, LTD.Inventors: Yoav M. Tzruya, Ohad Sheory, Uri Twig
-
Patent number: 7596540Abstract: A system, method and computer program product for dynamically enhancing a software application, such as a video game, executing on a computing device, without having to change and recompile the original application code. The system includes a staging environment that monitors the execution of the application and indexes each item of graphical and/or audio information generated by the application into a first database. A system administrator or other entity then populates a second database by manual or automated means with one or more business rules, wherein each business rule is associated with one or more of the objects indexed in the first database.Type: GrantFiled: December 1, 2005Date of Patent: September 29, 2009Assignee: Exent Technologies, Ltd.Inventors: Yoav Tzruya, Ohad Sheory, Uri Twig
-
Publication number: 20090237418Abstract: Systems, methods, and computer program products for enhancing useability of on-line delivered applications. Access control is provided by generating and delivering an activation key to a client whenever the client seeks access to an application. A security process, integral to the application, validates the key. With respect to displaying information, a client inserts itself between the application and the renderer. This allows the client to provide information to the renderer for display to the user.Type: ApplicationFiled: June 5, 2009Publication date: September 24, 2009Applicant: EXENT TECHNOLOGIES, LTD.Inventors: Itay Nave, Ohad Sheory
-
Patent number: 7533370Abstract: A method and system for determining whether a client is attempting to copy an application or use the application without authorization. First, data for at least one prediction log file for the application is created. Then, based on the at least one prediction log file, prediction knowledge is determined for the application, where the prediction knowledge is stored in a prediction file. The prediction file is then forwarded to the client executing the application. It is then determined by using the predication file whether the client is attempting to copy the application or use the application without authorization. If the client is attempting to copy the application or use the application without authorization, then the client's access to the application is terminated. In an offline mode, usage information is bound to user saved data such that modification of usage information renders user saved data unusable. This prevents unauthorized access to an offline delivered application.Type: GrantFiled: April 2, 2004Date of Patent: May 12, 2009Assignee: Exent Technologies, Ltd.Inventors: Itay Nave, Ohad Sheory
-
Publication number: 20070130292Abstract: A system, method and computer program product for dynamically enhancing a software application, such as a video game, executing on a computing device, without having to change and recompile the original application code. The system includes a staging environment that monitors the execution of the application and indexes each item of graphical and/or audio information generated by the application into a first database. A system administrator or other entity then populates a second database by manual or automated means with one or more business rules, wherein each business rule is associated with one or more of the objects indexed in the first database.Type: ApplicationFiled: December 1, 2005Publication date: June 7, 2007Inventors: Yoav Tzruya, Ohad Sheory, Uri Twig
-
Publication number: 20060031165Abstract: A system and method for protecting against unauthorized use of an application on a computer system. First, saved data associated with the application is stored. Storing the save data includes binding usage information to the saved data, wherein the usage information includes one or more parameters set by the application indicating how the application has been used by a user. Then, a request to access the saved data is processed. Processing the request includes performing an integrity check on the bound usage information and saved data, and denying access to the saved data if the integrity check determines that the usage information has been altered by a user.Type: ApplicationFiled: August 1, 2005Publication date: February 9, 2006Inventors: Itay Nave, Ohad Sheory
-
Publication number: 20050091511Abstract: Systems, methods, and computer program products for enhancing useability of on-line delivered applications. Access control is provided by generating and delivering an activation key to a client whenever the client seeks access to an application. A security process, integral to the application, validates the key. With respect to displaying information, a client inserts itself between the application and the renderer. This allows the client to provide information to the renderer for display to the user. In addition, content at a client can be upgraded or downgraded by providing only modified blocks to the client. The client saves blocks that reflect locally updated information. The efficient caching of blocks in persistent memory of a client is also described. Blocks in the client's cache are sequenced according to a calculated discard priority that depends on the most recent usage of each block and it's frequency of usage. Newly downloaded blocks are cached if space is available.Type: ApplicationFiled: May 24, 2004Publication date: April 28, 2005Inventors: Itay Nave, Ohad Sheory
-
Publication number: 20050091534Abstract: A method and system for determining whether a client is attempting to copy an application or use the application without authorization. First, data for at least one prediction log file for the application is created. Then, based on the at least one prediction log file, prediction knowledge is determined for the application, where the prediction knowledge is stored in a prediction file. The prediction file is then forwarded to the client executing the application. It is then determined by using the predication file whether the client is attempting to copy the application or use the application without authorization. If the client is attempting to copy the application or use the application without authorization, then the client's access to the application is terminated. In an offline mode, usage information is bound to user saved data such that modification of usage information renders user saved data unusable. This prevents unauthorized access to an offline delivered application.Type: ApplicationFiled: April 2, 2004Publication date: April 28, 2005Inventors: Itay Nave, Ohad Sheory