Patents by Inventor Yaacov HOCH

Yaacov HOCH has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11129042
    Abstract: Presented herein are systems and methods for detecting a boundary line crossing based on Round Trip Time (RTT) measured for wireless signals transmitted between and initiator wireless transceiver and a responder wireless transceiver deployed to form a straight boundary line. The initiator wireless transceiver transmits wireless probe signal(s) to the responder wireless transceiver, receives a wireless response signal transmitted by the responder wireless transceiver in response to the wireless probe signal(s), calculates an RTT combining a travel time of the wireless probe signal(s) and the travel time of the wireless response signal(s), compares the RTT to a reference RTT computed for a wireless probe signal and a corresponding wireless response signal transmitted in a clear straight transmission path while the boundary line is clear of obstacles and determines whether an object is blocking the straight transmission path based on a deviation of the RTT from the reference RTT.
    Type: Grant
    Filed: September 16, 2019
    Date of Patent: September 21, 2021
    Assignee: NEC Corporation Of America
    Inventors: Tsvi Lev, Yaacov Hoch, Liran Orevi, Mark Vexler
  • Publication number: 20210288805
    Abstract: A method for authenticating communication between an industrial control device and an external control system, comprising: storing, by a key storing module, an authentication key coupled to a matching key of an external control system; calculating, by a processor, an authenticity indication of communication between an industrial control device and the external control system using the authentication key; providing, by a connection module, the authenticity indication to the industrial control device via an input and output (I/O) port of the industrial control device, the connection module is physically and electronically connected to the I/O port.
    Type: Application
    Filed: March 15, 2020
    Publication date: September 16, 2021
    Applicant: NEC Corporation Of America
    Inventors: Tsvi Lev, Yaacov Hoch
  • Publication number: 20210279333
    Abstract: A system for detecting malicious software, comprising at least one hardware processor adapted to: execute a tested software object in a plurality of computing environments each configured according to a different hardware and software configuration; monitor a plurality of computer actions performed in each of the plurality of computing environments when executing the tested software object; identify at least one difference between the plurality of computer actions performed in a first of the plurality of computing environments and the plurality of computer actions performed in a second of the plurality of computing environments; and instruct a presentation of an indication of the identified at least one difference on a hardware presentation unit.
    Type: Application
    Filed: May 19, 2021
    Publication date: September 9, 2021
    Applicant: NEC Corporation Of America
    Inventors: Tsvi LEV, Yaacov HOCH
  • Publication number: 20210216757
    Abstract: A monitoring system, comprising: at least one device, comprising at least one processing circuitry configured for: receiving from at least one image sensor connected to the at least one processing circuitry, at least one digital image captured by the at least one image sensor; identifying a nature of at least one relationship between at least one first body part of at least one first person and at least one second body part of at least one second person, where the at least one first person and the at least one second person are identified in the at least one digital image; identifying at least one offending relationship according to the nature of the at least one relationship and a set of relationship rules; and outputting an indication of the at least one offending relationship.
    Type: Application
    Filed: January 13, 2020
    Publication date: July 15, 2021
    Applicant: NEC Corporation Of America
    Inventors: Tsvi LEV, Yaacov HOCH
  • Patent number: 11023583
    Abstract: A system for detecting malicious software, comprising at least one hardware processor adapted to: execute a tested software object in a plurality of computing environments each configured according to a different hardware and software configuration; monitor a plurality of computer actions performed in each of the plurality of computing environments when executing the tested software object; identify at least one difference between the plurality of computer actions performed in a first of the plurality of computing environments and the plurality of computer actions performed in a second of the plurality of computing environments; and instruct a presentation of an indication of the identified at least one difference on a hardware presentation unit.
    Type: Grant
    Filed: December 12, 2018
    Date of Patent: June 1, 2021
    Assignee: NEC Corporation Of America
    Inventors: Tsvi Lev, Yaacov Hoch
  • Publication number: 20210136292
    Abstract: According to an aspect of some embodiments of the present invention there is provided a system for imaging of objects in a scene. The system contains a hardware processor, or multiple hardware processors, which execute(s) code for: receiving, from a first sensor, image or images depicting an object or objects, where the object(s) include(s) an autonomous navigation system that controls a course of the object(s) in space, predicting a spatiotemporal profile of the object(s) within the image(s), and generating instructions for execution by a second sensor for capturing an image of the object(s) at a time and location corresponding to the spatiotemporal profile.
    Type: Application
    Filed: November 6, 2019
    Publication date: May 6, 2021
    Applicant: NEC Corporation of America
    Inventors: Yaacov Hoch, Tsvi Lev
  • Patent number: 10997302
    Abstract: A computer implemented method of authenticating a user accessing a secure terminal, comprising obtaining identification information stored in a personal machine readable storage medium exclusively associated with an accessing user attempting to access a secure system, retrieving authentication information exclusively associated with the accessing user from a remote network resource using the identification information, operating one or more privately directed user interfaces to exclusively present to the accessing user a requested alteration to a challenge request generated based on the authentication information and presented via another user interface, receiving a response to the challenge request from the accessing user and granting the accessing user access to the secure terminal in case the response matches the altered challenge request and denying access in case of no match.
    Type: Grant
    Filed: July 3, 2018
    Date of Patent: May 4, 2021
    Assignee: NEC Corporation Of America
    Inventors: Moshe Karako, Yaacov Hoch
  • Publication number: 20210084514
    Abstract: Presented herein are systems and methods for detecting a boundary line crossing based on Round Trip Time (RTT) measured for wireless signals transmitted between and initiator wireless transceiver and a responder wireless transceiver deployed to form a straight boundary line. The initiator wireless transceiver transmits wireless probe signal(s) to the responder wireless transceiver, receives a wireless response signal transmitted by the responder wireless transceiver in response to the wireless probe signal(s), calculates an RTT combining a travel time of the wireless probe signal(s) and the travel time of the wireless response signal(s), compares the RTT to a reference RTT computed for a wireless probe signal and a corresponding wireless response signal transmitted in a clear straight transmission path while the boundary line is clear of obstacles and determines whether an object is blocking the straight transmission path based on a deviation of the RTT from the reference RTT.
    Type: Application
    Filed: September 16, 2019
    Publication date: March 18, 2021
    Applicant: NEC Corporation Of America
    Inventors: Tsvi LEV, Yaacov HOCH, Liran OREVI, Mark VEXLER
  • Publication number: 20210056296
    Abstract: A system for processing digital images comprising: at least one remote hardware processor; and at least one device, comprising at least one processing circuitry configured for: receiving from at least one image sensor, electrically coupled to the processing circuitry, at least one digital image captured by the at least one image sensor; partitioning at least one object, identified in the at least one digital image, into a plurality of object segments; replacing in the at least one digital image each of the plurality of object segments with a schematic segment, illustrating respective object segment, to produce at least one schematic image; and sending the at least one schematic image to the remote hardware processor; wherein the remote hardware processor is adapted to: receiving the at least one schematic image from the at least one device; analyzing the at least one schematic image to identify at least one behavioral pattern.
    Type: Application
    Filed: August 25, 2019
    Publication date: February 25, 2021
    Applicant: NEC Corporation Of America
    Inventors: Tsvi LEV, Yaacov Hoch
  • Publication number: 20210025679
    Abstract: Methods and systems fort operating one or more light sources to project adversarial patterns generated to disorient a machine learning based detection system, comprising generating one or more adversarial patterns configured to disorient the machine learning based detection system and operating one or more light sources configured to project one or more of the adversarial pattern(s) in association with the targeted object in order to disorient the machine learning based detection system.
    Type: Application
    Filed: July 23, 2019
    Publication date: January 28, 2021
    Applicant: NEC Corporation Of America
    Inventors: Yaacov HOCH, Tsvi LEV
  • Patent number: 10878067
    Abstract: A computer implemented method of correlating between detected access events to access client terminals in a monitored location and physical activity of people in the monitored location, comprising detecting one or more access events to access one or more of a plurality of client terminals located in a monitored location and operatively connected to a first network, obtaining sensory activity data from one or more activity detectors deployed in the monitored location to capture physical activity of people in the monitored location wherein the activity detector(s) are operatively connected to a second interconnection isolated from the first network, analyzing the sensory activity data to identify a spatiotemporal activity pattern of one or more persons in the monitored location, correlating between the access event(s) and the spatiotemporal activity pattern(s) to validate the access event(s) and initiating one or more actions according to the validation.
    Type: Grant
    Filed: July 13, 2018
    Date of Patent: December 29, 2020
    Assignee: NEC Corporation Of America
    Inventors: Tsvi Lev, Doron Gonen, Moshe Karako, Yaacov Hoch
  • Publication number: 20200389288
    Abstract: A computing device comprises a network element configured for receiving messages sent over a network from a control facility, a reduced instruction set computer processing circuitry comprising a central processing unit (CPU) and a secure hardware-implemented module adapted to verify that a signed PKI message is encoded in the received messages at a plurality of sequential intervals and to either switch the CPU from an operational state to a safe state, or prevent switching of the CPU from the safe state to the operational state, when a receipt of a signed PKI message is not verified in one of the sequential intervals. In the operational state, the CPU accesses a memory address space in the processing circuitry for executing software-based commands. In the safe state the CPU is prevented from executing the software-based commands while access to the memory address space is retained.
    Type: Application
    Filed: June 5, 2019
    Publication date: December 10, 2020
    Applicant: NEC Corporation Of America
    Inventors: Tsvi LEV, Yaacov HOCH, Moshe KARAKO
  • Patent number: 10819737
    Abstract: A computer implemented method of correlating between detected usage events indicative of using client terminals and an operational state of physical interfaces of the client terminals, comprising monitoring a network in a monitored location to detect one or more usage events indicating of a usage of one or more of a plurality of client terminals operatively connected to the network, obtaining sensory data from one or more interface monitoring sensors having a fixed operation which is unmodifiable after deployed to capture an operational state of one or more physical interfaces of the client terminal(s), analyzing the sensory data to identify the operational state of the physical interface(s), correlating between the usage event(s) and the identified operational state to validate the usage event(s) and initiating one or more action according to the validation.
    Type: Grant
    Filed: July 31, 2018
    Date of Patent: October 27, 2020
    Assignee: NEC Corporation of America
    Inventors: Tsvi Lev, Yaacov Hoch, Moshe Karako
  • Publication number: 20200265731
    Abstract: A computer implemented method of planning a drone flight path to increase safety of dynamic objects the drone is estimated to encounter along the flight path based on a mobility model constructed to predict movement of dynamic objects, comprising receiving sensory data captured over time by one or more sensors monitoring movement of a plurality of dynamic objects in a certain geographical area, analyzing the sensory data to identify one or more mobility patterns of one or more dynamic objects detected in the certain geographical area, updating a mobility model with the mobility pattern(s) and generating a planned flight path based on the mobility model for one or more drones planned to fly in the certain geographical area, the flight path is planned to maintain a predefined safety space between the drone(s) and the dynamic object(s).
    Type: Application
    Filed: February 19, 2019
    Publication date: August 20, 2020
    Applicant: NEC Corporation Of America
    Inventors: Tsvi LEV, Yaacov Hoch
  • Publication number: 20200226746
    Abstract: There is provided a computed implemented method of automatically generating an adapted presentation of at least one candidate anomalous object detected from anatomical imaging data of a target individual, comprising: providing anatomical imaging data of the target individual acquired by an anatomical imaging device, analyzing the anatomical imaging data by a detection classifier for detecting at least one candidate anomalous object of the anatomical imaging data and computed associated location thereof, computing, by a presentation parameter classifier, at least one presentation parameter for adapting a presentation of a sub-set of the anatomical imaging data including the at least one candidate anomalous object according to at least the location of the candidate anomalous object, and generating according to the at least one presentation parameter, an adapted presentation of the sub-set of the anatomical imaging data including the at least one candidate anomalous object.
    Type: Application
    Filed: January 15, 2019
    Publication date: July 16, 2020
    Applicant: NEC Corporation Of America
    Inventors: Yael SCHWARTZBARD, Yaacov HOCH, Tsvi LEV
  • Publication number: 20200226257
    Abstract: A method for producing a set of indicators of unwanted activity in a computer system, comprising: receiving a plurality of input data sets, each describing system activity and comprising an infection label and system activity information collected from a computer system; producing a plurality of training sets each comprising: 1) a plurality of activity values, each indicative of execution of an instruction, extracted from one of the plurality of input data sets, and 2) a respective infection label; producing for each training set one of a plurality of sets of relevant activity values by: training a model to output, in response to the respective training set, an infection classification equal to respective infection label; and analyzing the model to identify a set of relevant activity values, of the plurality of activity values, effecting the infection classification; and analyzing the plurality of sets of relevant activity values to produce the indicators.
    Type: Application
    Filed: January 14, 2019
    Publication date: July 16, 2020
    Applicant: NEC Corporation Of America
    Inventors: Maya MAIMON, Yaacov Hoch, Yosef Reuven
  • Patent number: 10542040
    Abstract: The present disclosure relates to an intelligent service (e.g., a smart home, a smart building, a smart car, etc.) based on a 5G communication technology and an IoT related technology. In accordance with an embodiment of the present disclosure, a method is provided for detecting, by a web server in a wireless communication system, a malicious code which is injected into the command stream of a widget miming on a web-based OS in a device. The method includes: analyzing the widget in the web server; determining at least one invariant condition constantly maintained and conserved while the widget is running, on the basis of a result of the analyzing; generating a metadata file including data satisfying the at least one invariant condition; and associating the metadata file with the widget and providing the widget in a state in which the associated metadata file is included in the widget.
    Type: Grant
    Filed: November 17, 2015
    Date of Patent: January 21, 2020
    Assignee: Samsung Electronics Co., Ltd.
    Inventors: Evgeny Beskrovny, Maya Maimon, Yaacov Hoch
  • Publication number: 20200012800
    Abstract: A computer implemented method of authenticating a user accessing a secure terminal, comprising obtaining identification information stored in a personal machine readable storage medium exclusively associated with an accessing user attempting to access a secure system, retrieving authentication information exclusively associated with the accessing user from a remote network resource using the identification information, operating one or more privately directed user interfaces to exclusively present to the accessing user a requested alteration to a challenge request generated based on the authentication information and presented via another user interface, receiving a response to the challenge request from the accessing user and granting the accessing user access to the secure terminal in case the response matches the altered challenge request and denying access in case of no match.
    Type: Application
    Filed: July 3, 2018
    Publication date: January 9, 2020
    Inventors: Moshe KARAKO, Yaacov Hoch
  • Publication number: 20190188382
    Abstract: A system for detecting malicious software, comprising at least one hardware processor adapted to: execute a tested software object in a plurality of computing environments each configured according to a different hardware and software configuration; monitor a plurality of computer actions performed in each of the plurality of computing environments when executing the tested software object; identify at least one difference between the plurality of computer actions performed in a first of the plurality of computing environments and the plurality of computer actions performed in a second of the plurality of computing environments; and instruct a presentation of an indication of the identified at least one difference on a hardware presentation unit.
    Type: Application
    Filed: December 12, 2018
    Publication date: June 20, 2019
    Applicant: NEC Corporation Of America
    Inventors: Tsvi LEV, Yaacov HOCH
  • Publication number: 20190174452
    Abstract: A computer implemented method of detecting unauthorized mobile wireless transmitters, comprising using one or more processors adapted for obtaining, from one or more radio frequency (RF) sensors deployed in a monitored location, RF sensory data relating to a plurality of transmissions transmitted by one or more of a plurality of mobile wireless transmitters, detecting a change in a location of one or more of the mobile wireless transmitters by analyzing the RF sensory data, classifying one or more of the mobile wireless transmitters as unauthorized in case the detected location change deviates from one or more mobility rules and outputting an indication of the classification.
    Type: Application
    Filed: November 28, 2018
    Publication date: June 6, 2019
    Applicant: NEC Corporation Of America
    Inventors: Tsvi LEV, Yaacov HOCH, Doron GONEN