Patents by Inventor Vlad Grigore Dabija
Vlad Grigore Dabija has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20160316506Abstract: Technologies are generally described for systems, devices and methods effective to implement a line of sight initiated handshake. In some examples, a processor in a first communication device may detect a line of sight directed from the first communication device to a second communication device. The first communication device may send a handshake request to the second communication device. The first communication device may receive a handshake acknowledgement from the second communication device. The handshake request and handshake acknowledgement may be effective to create the handshake. The first and second communication devices can thereafter share data.Type: ApplicationFiled: July 1, 2016Publication date: October 27, 2016Applicant: EMPIRE TECHNOLOGY DEVELOPMENT LLCInventors: SHMUEL UR, VLAD GRIGORE DABIJA, DAVID ASH
-
Patent number: 9432380Abstract: Technologies are generally described for systems, devices and methods effective to allow a network element to retrieve a control command. In some examples, a network controller device may associate an identifier with the control command. The network controller device may send the identifier and the associated control command over a first network with a first level of security to a computing device. The network controller device may send an activation signal to the network element over a second network with a second level of security different from the first level of security. The network controller device may send the identifier to the network element over the second network. The identifier may be effective to allow the network element to retrieve the control command.Type: GrantFiled: September 22, 2014Date of Patent: August 30, 2016Assignee: Empire Technology Development LLCInventors: Mordehai Margalit, Yoav Wechsler, Vlad Grigore Dabija
-
Patent number: 9430350Abstract: Methods to facilitate monitoring the execution of a first instance and a second instance, such as multiple instantiations of a program, are generally described. The methods may include generating a first instance and a second instance, appending first monitoring instructions to the first instance to produce a first modified instance and appending second monitoring instructions to the second instance to produce a second modified instance. The first and second monitoring instructions may relate to monitoring an execution of the first instance and the second instance. The processor may further send the first modified instance to a first computing device and send the second modified instance to a second computing device different from the first computing device. The computing devices may provide different computational functionality and/or may split a load in processing the program.Type: GrantFiled: March 22, 2013Date of Patent: August 30, 2016Assignee: Empire Technology Development LLCInventors: Shmuel Ur, David Hirshberg, Vlad Grigore Dabija, Shimon Gruper, Gad S. Sheaffer, Mordehai Margalit
-
Patent number: 9408243Abstract: Technologies are generally described for systems, devices and methods effective to implement a line of sight initiated handshake. In some examples, a processor in a first communication device may detect a line of sight directed from the first communication device to a second communication device. The first communication device may send a handshake request to the second communication device. The first communication device may receive a handshake acknowledgement from the second communication device. The handshake request and handshake acknowledgement may be effective to create the handshake. The first and second communication devices can thereafter share data.Type: GrantFiled: May 13, 2013Date of Patent: August 2, 2016Assignee: Empire Technology Development LLCInventors: Shmuel Ur, Vlad Grigore Dabija, David Ash
-
Patent number: 9392049Abstract: Technologies are provided for identifying context associated with received content and automatically forwarding the content to an associated communication network for posting. In some examples, a user may create content for posting to one or more communication networks and send the content over a network for posting to a first communication network. Upon receipt of the content for posting, the first communication network may identify a context of the received content and may associate the context with a second communication network based on a set of content forwarding rules. The first communication network may automatically forward the received content to the associated second communication network for posting at the second communication network. Additionally, a third party entity may be configured to monitor content received at a first communication network, identify a context of the received content, and automatically forward the received content to the associated second communication network for posting.Type: GrantFiled: June 19, 2012Date of Patent: July 12, 2016Assignee: EMPIRE TECHNOLOGY DEVELOPMENT LLCInventors: Patrick John Ennis, Alexander Knight, Vlad Grigore Dabija, Timothy Martin Londergan, Dominic Dan Suciu, Raghuram Madabushi, David Walter Ash
-
Publication number: 20160132598Abstract: Technologies are generally described for systems, methods and devices effective to remove information from a network such as the Internet. In some examples, a device may include a memory including instructions and a processor configured in communication with the memory. The processor may be configured effective to receive user information relating to a user and search the network using the user information. In response to the search, the processor may find additional information relating to the user stored in the network. The processor may receive a first request to remove particular information from the network. The particular information may be part of the additional information and the particular information may be removable by a second user. The processor may send a second request to remove the particular information from the network.Type: ApplicationFiled: January 14, 2016Publication date: May 12, 2016Applicant: EMPIRE TECHNOLOGY DEVELOPMENT LLCInventors: Patrick John Ennis, Alexander Knight, Vlad Grigore Dabija, Timothy Martin Londergan, David Walter Ash, Dominic Dan Suciu, Raghuram Madabushi
-
Publication number: 20160087994Abstract: Technologies are generally described for systems, devices and methods effective to allow a network element to retrieve a control command. In some examples, a network controller device may associate an identifier with the control command. The network controller device may send the identifier and the associated control command over a first network with a first level of security to a computing device. The network controller device may send an activation signal to the network element over a second network with a second level of security different from the first level of security. The network controller device may send the identifier to the network element over the second network. The identifier may be effective to allow the network element to retrieve the control command.Type: ApplicationFiled: September 22, 2014Publication date: March 24, 2016Inventors: MORDEHAI MARGALIT, YOAV WECHSLER, VLAD GRIGORE DABIJA
-
Patent number: 9286185Abstract: Technologies are generally described for systems, methods and devices configured to monitor a performance of a resource of a device. In some examples, a processor may receive an application code. The application code may include at least one application thread configured to implement at least one task for the application code. The application code may be configured to spawn a performance thread. The processor may execute the application thread on the computing device. The application thread may be configured to use at least one resource of the computing device. The processor may further execute the performance thread on the computing device. The performance thread may be configured to calculate a value relating to the resource.Type: GrantFiled: November 16, 2012Date of Patent: March 15, 2016Assignee: Empire Technology Development LLCInventors: Shmuel Ur, Mordehai Margalit, Benjamin Maytal, Vlad Grigore Dabija, Noam Meir
-
Publication number: 20160072828Abstract: Technologies are generally described for a systems, methods and devices effective to analyze a file. In some examples, a processor may receive the file. The file may include content and instructions. The content may include data executable by a browser. The processor may analyze the instructions. The processor may identify an internet protocol (IP) address in the instructions based on the analysis. The processor may compare the identified IP address with a list of IP addresses associated with an attack. The processor may generate an alert based on the comparison.Type: ApplicationFiled: September 8, 2014Publication date: March 10, 2016Inventors: MORDEHAI MARGALIT, VLAD GRIGORE DABIJA
-
Patent number: 9251177Abstract: Technologies are generally described for systems, methods and devices effective to remove information from a network such as the Internet. In some examples, a device may include a memory including instructions and a processor configured in communication with the memory. The processor may be configured effective to receive user information relating to a user and search the network using the user information. In response to the search, the processor may find additional information relating to the user stored in the network. The processor may receive a first request to remove particular information from the network. The particular information may be part of the additional information and the particular information may be removable by a second user. The processor may send a second request to remove the particular information from the network.Type: GrantFiled: June 12, 2012Date of Patent: February 2, 2016Assignee: Empire Technology Development LLCInventors: Patrick John Ennis, Alexander Knight, Vlad Grigore Dabija, Timothy Martin Londergan, David Walter Ash, Dominic Dan Suciu, Raghuram Madabushi
-
Patent number: 9232563Abstract: Technologies are generally described for an aggregation of bandwidth from multiple wireless devices. In some examples, a source device may communicate with a destination device at a first bandwidth. The source device may divide data into a first piece and a second piece. The source device may transmit the first piece to a first wireless device and the second piece to a second wireless device over a first network. The first wireless device and second wireless device may communicate with the destination device at a second bandwidth and a third bandwidth respectively. The first bandwidth may be less than an aggregation of the second bandwidth and the third bandwidth. The first wireless device may transmit the first piece over a second network, different from the first network, to the destination device. The second wireless device may transmit the second piece over a third network, different from the first network, to the destination device.Type: GrantFiled: August 13, 2013Date of Patent: January 5, 2016Assignee: Empire Technologies Development LLCInventors: Mordehai Margalit, Menachem Kaplan, Vlad Grigore Dabija, Maya Goodman, Noa Ramot, Dana Cohen, Noam Meir
-
Publication number: 20150181632Abstract: Technologies are generally described for systems, devices and methods effective to implement a line of sight initiated handshake. In some examples, a processor in a first communication device may detect a line of sight directed from the first communication device to a second communication device. The first communication device may send a handshake request to the second communication device. The first communication device may receive a handshake acknowledgement from the second communication device. The handshake request and handshake acknowledgement may be effective to create the handshake The first and second communication devices can thereafter share data.Type: ApplicationFiled: May 13, 2013Publication date: June 25, 2015Inventors: Shmuel Ur, Vlad Grigore Dabija, David Ash
-
Publication number: 20150070388Abstract: Technologies are generally described for systems and methods effective to detect an alteration in augmented reality. A processor may receive a real image that corresponds to a real object and may receive augmented reality instructions to generate a virtual object. The processor may determine that the virtual object at least partially obscures the real object when the virtual object is rendered on a display. The processor may, upon determining that the virtual object at least partially obscures the real object when the virtual object is rendered on the display, simulate an activity on the real object to produce a first activity simulation and simulate the activity on the virtual object to produce a second activity simulation. The processor may determine a difference between the first and the second activity simulation and modify the augmented reality instructions to generate a modified virtual object in response to the determination of the difference.Type: ApplicationFiled: September 9, 2013Publication date: March 12, 2015Inventors: Gad S. Sheaffer, Shmuel Ur, Shay Bushinsky, Vlad Grigore Dabija
-
Publication number: 20150050898Abstract: Technologies are generally described for an aggregation of bandwidth from multiple wireless devices. In some examples, a source device may communicate with a destination device at a first bandwidth. The source device may divide data into a first piece and a second piece. The source device may transmit the first piece to a first wireless device and the second piece to a second wireless device over a first network. The first wireless device and second wireless device may communicate with the destination device at a second bandwidth and a third bandwidth respectively. The first bandwidth may be less than an aggregation of the second bandwidth and the third bandwidth. The first wireless device may transmit the first piece over a second network, different from the first network, to the destination device. The second wireless device may transmit the second piece over a third network, different from the first network, to the destination device.Type: ApplicationFiled: August 13, 2013Publication date: February 19, 2015Inventors: Mordehai Margalit, Menachem Kaplan, Vlad Grigore Dabija, Maya Goodman, Noa Ramot, Dana Cohen, Noam Meir
-
Publication number: 20150029217Abstract: Technologies are generally described for systems and methods effective to output a composite image. In some examples, a processor may be configured to receive first and second display data that relate to a first and second image. The processor may identify an overlap region where the first display overlaps the second display and generate imaging instructions effective to cause the first and second image to be output on the first display and second display, respectively. The processor may further modify the first imaging instructions based on the overlap region to produce a modified first imaging instruction. The processor may send the modified first imaging instruction to the first display so that the first image is output on the first display at a first resolution. The processor may send the second imaging instruction to the second display so that the second image is output on the second display at a second resolution.Type: ApplicationFiled: July 25, 2013Publication date: January 29, 2015Applicant: EMPIRE TECHNOLOGY DEVELOPEMENT, LLCInventors: Shmuel Ur, Vlad Grigore Dabija, David Ash
-
Publication number: 20140330958Abstract: Technologies are generally described for systems, devices and methods effective to monitor performance of a computing device. A computing device may receive a specified counting rate. The computing device may count at the specified counting rate to generate a sequence of counting numbers. The computing device may identify a first output of a process, such as results from computations performed on data, and may identify a first counting number when the first output is identified. The computing device may identify a second output of the process, such as additional results from the computations, and may identify a second counting number when the second output is identified. The computing device may then determine whether an alert should be generated based on the first and second counting numbers such as when a difference between the first and second counting numbers exceeds a threshold value.Type: ApplicationFiled: May 6, 2013Publication date: November 6, 2014Applicant: EMPIRE TECHNOLOGY DEVELOPMENT, LLCInventors: Shmuel Ur, Mordehai Margalit, Benjamin Maytal, Vlad Grigore Dabija, Noam Meir
-
Publication number: 20140289392Abstract: Methods to facilitate monitoring the execution of a first instance and a second instance, such as multiple instantiations of a program, are generally described. The methods may include generating a first instance and a second instance, appending first monitoring instructions to the first instance to produce a first modified instance and appending second monitoring instructions to the second instance to produce a second modified instance. The first and second monitoring instructions may relate to monitoring an execution of the first instance and the second instance. The processor may further send the first modified instance to a first computing device and send the second modified instance to a second computing device different from the first computing device. The computing devices may provide different computational functionality and/or may split a load in processing the program.Type: ApplicationFiled: March 22, 2013Publication date: September 25, 2014Applicant: EMPIRE TECHNOLOGY DEVELOPMENT, LLCInventors: Shmuel Ur, DAVID Hirshberg, Vlad Grigore Dabija, Shimon Gruper, Gad S. Sheaffer
-
Patent number: 8821261Abstract: Technologies are generally described for processes and systems effective to select or determine a wager for an event. A wager processor may be configured to be in communication with a wager database and an event status processor over a network. The wager processor may be effective to receive event information and crowd information. The event information may relate to a status of the event. The crowd information may relate to demographics and/or interests of the participants at the event. The wager processor may select or determine the wager based on the event information and the crowd information.Type: GrantFiled: June 12, 2012Date of Patent: September 2, 2014Assignee: Empire Technology Development LLCInventors: Patrick John Ennis, Alexander Knight, Vlad Grigore Dabija, Timothy Martin Londergan, David Walter Ash, Dominic Dan Suciu, Raghuram Madabushi
-
Publication number: 20140165197Abstract: Technologies are generally described for systems and methods configured to produce an executable code. In some examples, a developer may send machine language code to a system manager. The machine language code may include two or more machine language blocks and linking information. The system manager may include a processor configured to permute the machine language blocks to produce permuted machine language code. The processor may modify the linking information based on the permuted machine language code to produce modified linking information. The processor may link the permuted machine language code with use of the modified linking information to produce the executable code.Type: ApplicationFiled: December 6, 2012Publication date: June 12, 2014Inventors: Shmuel Ur, David Hirshberg, Mordehai Margalit, Vlad Grigore Dabija, Shimon Gruper, Gad S. Sheaffer
-
Publication number: 20140143410Abstract: Technologies are generally described for systems, methods and devices configured to monitor a performance of a resource of a device. In some examples, a processor may receive an application code. The application code may include at least one application thread configured to implement at least one task for the application code. The application code may be configured to spawn a performance thread. The processor may execute the application thread on the computing device. The application thread may be configured to use at least one resource of the computing device. The processor may further execute the performance thread on the computing device. The performance thread may be configured to calculate a value relating to the resource.Type: ApplicationFiled: November 16, 2012Publication date: May 22, 2014Applicant: EMPIRE TECHNOLOGY DEVELOPMENT, LLCInventors: Shmuel Ur, Mordehai Margalit, Benjamin Maytal, Vlad Grigore Dabija, Noam Meir