Patents by Inventor Shmuel Ur

Shmuel Ur has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10270807
    Abstract: A computer implemented method of detecting unauthorized access to a protected network by monitoring a dynamically updated deception environment, comprising launching, on one or more decoy endpoints, one or more decoy operating system (OS) managing one or more of a plurality of deception applications mapping a plurality of applications executed in a protected network, updating dynamically a usage indication for a plurality of deception data objects deployed in the protected network to emulate usage of the plurality of deception data objects for accessing the deception application(s) wherein the plurality of deception data objects are configured to trigger an interaction with the deception application(s) when used, detecting usage of data contained in the deception data object(s) by monitoring the interaction and identifying one or more potential unauthorized operations based on analysis of the detection.
    Type: Grant
    Filed: July 20, 2016
    Date of Patent: April 23, 2019
    Assignee: Cymmetria, Inc.
    Inventors: Dean Sysman, Gadi Evron, Imri Goldberg, Ran Harel, Shmuel Ur
  • Patent number: 10248824
    Abstract: A method, system for encoding or decoding information in physical properties of an object. A tangible product comprises a three dimensional tangible object having modified physical properties; and wherein the modified physical properties are a modification of physical properties, wherein the modification encodes information. A method comprising: obtaining a representation of a three dimensional object having physical properties; obtaining information to encode; determining modified physical properties by modifying the physical properties to encode within the modified physical properties the information; and producing a tangible product, wherein the tangible product is the three dimensional object having the modified physical properties.
    Type: Grant
    Filed: April 15, 2017
    Date of Patent: April 2, 2019
    Assignee: Glazberg Appelbaum & Co.
    Inventors: Ziv Glazberg, Nadav Applebaum, Shmuel Ur
  • Patent number: 10245724
    Abstract: A first method comprising: predicting a scene of an environment using a model of the environment and based on a first scene of the environment obtained from sensors observing scenes of the environment; comparing the predicted scene with an observed scene from the sensors; and performing an action based on differences determined between the predicted scene and the observed scene. A second method comprising applying a vibration stimuli on an object via a computer-controlled component; obtaining a plurality of images depicting the object from a same viewpoint, captured during the application of the vibration stimuli. The second method further comprising comparing the plurality of images to detect changes occurring in response to the application of the vibration stimuli, which changes are attributed to a change of a location of a boundary of the object; and determining the boundary of the object based on the comparison.
    Type: Grant
    Filed: June 9, 2016
    Date of Patent: April 2, 2019
    Assignee: SHMUEL UR INNOVATION LTD.
    Inventors: Shmuel Ur, Vlad Dabija, David Hirshberg
  • Patent number: 10229523
    Abstract: Technologies are generally described for systems and methods effective to detect an alteration in augmented reality. A processor may receive a real image that corresponds to a real object and may receive augmented reality instructions to generate a virtual object. The processor may determine that the virtual object at least partially obscures the real object when the virtual object is rendered on a display. The processor may, upon determining that the virtual object at least partially obscures the real object when the virtual object is rendered on the display, simulate an activity on the real object to produce a first activity simulation and simulate the activity on the virtual object to produce a second activity simulation. The processor may determine a difference between the first and the second activity simulation and modify the augmented reality instructions to generate a modified virtual object in response to the determination of the difference.
    Type: Grant
    Filed: April 3, 2017
    Date of Patent: March 12, 2019
    Assignee: EMPIRE TECHNOLOGY DEVELOPMENT LLC
    Inventors: Gad S. Sheaffer, Shmuel Ur, Shay Bushinsky, Vlad Grigore Dabija
  • Patent number: 10193982
    Abstract: There is provided a method performed by a server, comprising: detecting a dropping of a bidirectional voice communication on a communication segment between a first client terminal and the server, the communication segment part of the bidirectional voice communication established between the first client terminal and a second client terminal using respective communication segments with the server, the dropping triggered by insufficient resources for maintaining the bidirectional voice communication in a desired quality for the first client terminal, receiving at least one message from the first client terminal, the at least one message including instructions for restoring the bidirectional voice communication, the at least one message received over available resources sufficient for transmission of the at least one message over the affected communication segment; and restoring the bidirectional voice communication according to the received instructions when sufficient resources are available for maintaining t
    Type: Grant
    Filed: August 2, 2015
    Date of Patent: January 29, 2019
    Assignee: SECURE CONNECTION LTD.
    Inventors: Tal Elyashiv, Yoseph Taguri, Shmuel Ur
  • Patent number: 10192359
    Abstract: Technologies are generally described for systems, devices and methods effective to generate augmented image data. In some examples, a first device may receive first data from a second device. The first data may include data related to an image associated with the first device, such as an image of a user using the first device. The first device may apply an augmented reality skin to the first data to generate second data. The second data may relate to an augmented image associated with the first device. The first device may send the second data to the second device. The second device may then display the second data.
    Type: Grant
    Filed: January 31, 2014
    Date of Patent: January 29, 2019
    Assignee: EMPIRE TECHNOLOGY DEVELOPMENT, LLC
    Inventor: Shmuel Ur
  • Patent number: 10164944
    Abstract: A system, method, and computer program product are provided for implementing a virtual obfuscation service in a network. In use, an obfuscation service component is initiated in a network system including one or more virtual services, the obfuscation service component including at least one of: at least one first obfuscation service component associated with a physical portion of the network system or at least one second obfuscation service component associated with a cloud-based virtual portion of the network system. Further, communication to be sent from the physical portion of the network system to the cloud-based virtual portion of the network system is identified. Additionally, the communication is directed from the physical portion of the network system to the first obfuscation service component associated with the physical portion of the network system.
    Type: Grant
    Filed: August 5, 2015
    Date of Patent: December 25, 2018
    Assignees: AMDOCS DEVELOPMENT LIMITED, AMDOCS SOFTWARE SYSTEMS LIMITED
    Inventors: Eyal Felstaine, Itzik Kitroser, Ofer Hermoni, Shmuel Ur
  • Patent number: 10162725
    Abstract: A system, method, and computer program product are provided for providing feedback indicating an impact of user directives on a software system. In use, user input associated with a software system is received. Additionally, an impact of the user input on the software system is determined. Further, feedback is provided indicating the impact of the user input on the software system.
    Type: Grant
    Filed: September 23, 2016
    Date of Patent: December 25, 2018
    Assignee: AMDOCS DEVELOPMENT LIMITED
    Inventors: Eyal Felstaine, Ofer Hermoni, Itzik Kitroser, Shmuel Ur
  • Publication number: 20180357647
    Abstract: A computer implemented method, a computerized system and a computer program product for selective scent dispensing. The computer implemented method comprising: detecting an event, wherein the event is associated with a person entering a predetermined physical area; in response to the detection of the event, determining, by a processor, a scent for the event; and applying, by a dispenser, the scent on the predetermined physical area.
    Type: Application
    Filed: August 14, 2018
    Publication date: December 13, 2018
    Inventor: Shmuel UR
  • Patent number: 10147293
    Abstract: A safety control system, method, and computer system is disclosed for sensing a dangerous device and its environment, analyzing the sensed dangerous device and environment. to determine compliance with a safety precaution. Accordingly, an enabling or disabling signal can then be set to the dangerous device. Examples include using a digital camera sensor and computer vision analysis techniques for dangerous devices such as a chainsaw, welding torch, or a forklift.
    Type: Grant
    Filed: April 16, 2014
    Date of Patent: December 4, 2018
    Assignee: Empire Technology Development LLC
    Inventor: Shmuel Ur
  • Publication number: 20180330084
    Abstract: Technologies are generally described for systems, devices and methods effective to detect a potential attack on a memory of a memory device. In some examples, a processor may send a request to the memory device. The request may include a request for information that relates to memory writes to the memory of the memory device. The processor may receive a response from the memory device. The response may include the information that relates to the memory writes. The processor may determine, based on the response, an amount of memory of the memory device written to during an interval of time. The processor may detect the potential attack based on the amount of memory written to and based on the interval of time. The processor may then generate an alert based on the detection of the potential attack.
    Type: Application
    Filed: May 7, 2018
    Publication date: November 15, 2018
    Applicant: Empire Technology Development LLC
    Inventors: Mordehai MARGALIT, Shmuel UR, David Hirshberg, Shimon Gruper
  • Publication number: 20180309787
    Abstract: A computer implemented method of detecting unauthorized access to a protected network by detecting a usage of dynamically updated deception communication, comprising deploying, in a protected network, a plurality of decoy endpoints configured to transmit one or more communication deception data objects encoded according to one or more communication protocols used in the protected network, instructing a first decoy endpoint of the plurality of decoy endpoints to transmit the communication deception data object(s) to a second decoy endpoint of the plurality of decoy endpoints, monitoring the protected network to detect a usage of data contained in the one or more communication deception data object, detecting one or more potential unauthorized operations based on analysis of the detection and initiating one or more actions according to the detection.
    Type: Application
    Filed: July 31, 2017
    Publication date: October 25, 2018
    Inventors: Gadi EVRON, Dean SYSMAN, Imri GOLDBERG, Shmuel UR, Itamar SHER
  • Publication number: 20180276326
    Abstract: Methods and systems are provided that are effective to generate an alarm for a vehicle. The methods include receiving, by a device, a first sensor value from a first sensor for the vehicle. The methods further include receiving, by the device, a second sensor value from a second sensor for the vehicle. The methods further include retrieving, by the device, an instruction from a memory disposed in the vehicle while the memory is in a write-protected mode. The methods further include evaluating, by the device, the first sensor value and the second sensor value based on the instruction. The methods further include determining, by the device, that the first sensor value is outside a range associated with the first sensor based on the evaluation. The methods further include transforming, by the device, the determination into an alarm.
    Type: Application
    Filed: May 29, 2018
    Publication date: September 27, 2018
    Applicant: EMPIRE TECHNOLOGY DEVELOPMENT LLC
    Inventors: SHMUEL UR, David Hirshberg, Shay Bushinsky, Vlad Grigore Dabija, Ariel Fligler
  • Patent number: 10079743
    Abstract: Technologies are generally described for systems, devices and methods effective to monitor performance of a computing device. A computing device may receive a specified counting rate. The computing device may count at the specified counting rate to generate a sequence of counting numbers. The computing device may identify a first output of a process, such as results from computations performed on data, and may identify a first counting number when the first output is identified. The computing device may identify a second output of the process, such as additional results from the computations, and may identify a second counting number when the second output is identified. The computing device may then determine whether an alert should be generated based on the first and second counting numbers such as when a difference between the first and second counting numbers exceeds a threshold value.
    Type: Grant
    Filed: May 6, 2013
    Date of Patent: September 18, 2018
    Assignee: Empire Technology Development LLC
    Inventors: Shmuel Ur, Mordehai Margalit, Benjamin Maytal, Vlad Grigore Dabija, Noam Meir
  • Patent number: 10078842
    Abstract: A computer implemented method, a computerized system and a computer program product for selective scent dispensing. The computer implemented method comprising: detecting an event, wherein the event is associated with a person entering a predetermined physical area; in response to the detection of the event, determining, by a processor, a scent for the event; and applying, by a dispenser, the scent on the predetermined physical area.
    Type: Grant
    Filed: April 13, 2015
    Date of Patent: September 18, 2018
    Assignee: Shmuel Ur Innovation Ltd
    Inventor: Shmuel Ur
  • Patent number: 10068567
    Abstract: A system, method, and computer program product are provided for automatic management of intent classification. In operation, an intent classification system identifies a conversation including a plurality of utterances for which to identify intent of a user associated with the plurality of utterances. The intent classification system identifies one or more actions performed in association with the plurality of utterances. Further, the intent classification system correlates at least one of the one or more actions to at least one of the plurality of utterances based on which of the one or more actions were performed as a result of the plurality of utterances. The intent classification system automatically determines an intent of the user based on the correlation of the at least one of the one or more actions to the at least one of the plurality of utterances. Additionally, the intent classification system stores an indication of the intent based on the at least one of the plurality of utterances.
    Type: Grant
    Filed: December 29, 2016
    Date of Patent: September 4, 2018
    Assignee: AMDOCS DEVELOPMENT LIMITED
    Inventors: Yosef Asaf Hermush, Eran Yosef Paran, Liat Taub Bahar, Sarit Chehanowitz, Tsvi Haim Lev, Shmuel Ur
  • Patent number: 10063453
    Abstract: A system, method, and computer program product are provided for tag based testing of virtual services. In use, an original portion of a system within a network in which to implement at least one modification is identified, the original portion of the system including a first virtual service and a second virtual service. Additionally, the original portion of the system is duplicated implemented within the network to form an updated portion of the system. Both the original portion and the updated portion share a single instance of a third service. The updated portion is then tested by processing the same data through the original portion, including the single instance of the third service, and through the updated portion, including the single instance of the third service, and comparing the outputs thereof.
    Type: Grant
    Filed: January 9, 2015
    Date of Patent: August 28, 2018
    Assignees: AMDOCS DEVELOPMENT LIMITED, AMDOCS SOFTWARE SYSTEMS LIMITED
    Inventors: Shmuel Ur, Itzik Kitroser, Ofer Hermoni, Eyal Felstaine
  • Publication number: 20180232947
    Abstract: A system and method for generating a high-density three-dimensional (3D) map are disclosed. The system comprises acquiring at least one high density image of a scene using at least one passive sensor; acquiring at least one new set of distance measurements of the scene using at least one active sensor; acquiring a previously generated 3D map of the scene comprising a previous set of distance measurements; merging the at least one new set of distance measurements with the previous set of upsampled distance measurements, wherein merging the at least one new set of distance measurements further includes accounting for a motion transformation between a previous high-density image frame and the acquired high density image and the acquired distance measurements; and overlaying the new set of distance measurements on the high-density image via an upsampling interpolation, creating an output 3D map.
    Type: Application
    Filed: February 8, 2018
    Publication date: August 16, 2018
    Applicant: VayaVision, Ltd.
    Inventors: Youval NEHMADI, Shmuel MANGAN, Shahar BEN-EZRA, Anna COHEN, Ronny COHEN, Lev GOLDENTOUCH, Shmuel UR
  • Publication number: 20180234540
    Abstract: In some examples, a first device may detect the presence of a second device or a particular person and, when a triggering event related to the second device or the particular person applies, the first device may change from a first mode to a second mode.
    Type: Application
    Filed: April 13, 2018
    Publication date: August 16, 2018
    Applicant: EMPIRE TECHNOLOGY DEVELOPMENT LLC
    Inventor: Shmuel UR
  • Publication number: 20180212995
    Abstract: A computer implemented method of detecting unauthorized access to a protected network by monitoring a dynamically updated deception environment, comprising launching, on one or more decoy endpoints, one or more decoy operating system (OS) managing one or more of a plurality of deception applications mapping a plurality of applications executed in a protected network, updating dynamically a usage indication for a plurality of deception data objects deployed in the protected network to emulate usage of the plurality of deception data objects for accessing the deception application(s) wherein the plurality of deception data objects are configured to trigger an interaction with the deception application(s) when used, detecting usage of data contained in the deception data object(s) by monitoring the interaction and identifying one or more potential unauthorized operations based on analysis of the detection.
    Type: Application
    Filed: July 20, 2016
    Publication date: July 26, 2018
    Applicant: Cymmetria , Inc.
    Inventors: Dean SYSMAN, Gadi EVRON, Imri GOLDBERG, Ran HAREL, Shmuel UR