Patents by Inventor Yaacov HOCH

Yaacov HOCH has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20190188382
    Abstract: A system for detecting malicious software, comprising at least one hardware processor adapted to: execute a tested software object in a plurality of computing environments each configured according to a different hardware and software configuration; monitor a plurality of computer actions performed in each of the plurality of computing environments when executing the tested software object; identify at least one difference between the plurality of computer actions performed in a first of the plurality of computing environments and the plurality of computer actions performed in a second of the plurality of computing environments; and instruct a presentation of an indication of the identified at least one difference on a hardware presentation unit.
    Type: Application
    Filed: December 12, 2018
    Publication date: June 20, 2019
    Applicant: NEC Corporation Of America
    Inventors: Tsvi LEV, Yaacov HOCH
  • Publication number: 20190174452
    Abstract: A computer implemented method of detecting unauthorized mobile wireless transmitters, comprising using one or more processors adapted for obtaining, from one or more radio frequency (RF) sensors deployed in a monitored location, RF sensory data relating to a plurality of transmissions transmitted by one or more of a plurality of mobile wireless transmitters, detecting a change in a location of one or more of the mobile wireless transmitters by analyzing the RF sensory data, classifying one or more of the mobile wireless transmitters as unauthorized in case the detected location change deviates from one or more mobility rules and outputting an indication of the classification.
    Type: Application
    Filed: November 28, 2018
    Publication date: June 6, 2019
    Applicant: NEC Corporation Of America
    Inventors: Tsvi LEV, Yaacov HOCH, Doron GONEN
  • Publication number: 20190080157
    Abstract: A method of authenticating physical activity in a monitored space, comprising: obtaining monitored space activity data from at least one activity detector deployed in the monitored space to capture simultaneously physical activity of a plurality of moving objects in said monitored space; analyzing said monitored space activity data to identify a plurality of spatiotemporal movement patterns in said monitored space; obtaining a plurality of inertial data patterns from each one of a plurality of applications executed in a plurality of mobile devices, each one of said inertial data patterns is recorded using an inertial sensing device installed in one of said plurality of mobile devices, each one of said plurality of mobile devices is associated with one of a plurality of persons; identifying at least one correlation between at least one of said plurality of inertial data patterns and at least one of said plurality of spatiotemporal movement patterns; authenticating said physical activity according to said at le
    Type: Application
    Filed: September 5, 2018
    Publication date: March 14, 2019
    Applicant: NEC Corporation Of America
    Inventors: Tsvi LEV, Yaacov HOCH, Moshe KARAKO
  • Publication number: 20190036964
    Abstract: A computer implemented method of correlating between detected usage events indicative of using client terminals and an operational state of physical interfaces of the client terminals, comprising monitoring a network in a monitored location to detect one or more usage events indicating of a usage of one or more of a plurality of client terminals operatively connected to the network, obtaining sensory data from one or more interface monitoring sensors having a fixed operation which is unmodifiable after deployed to capture an operational state of one or more physical interfaces of the client terminal(s), analyzing the sensory data to identify the operational state of the physical interface(s), correlating between the usage event(s) and the identified operational state to validate the usage event(s) and initiating one or more action according to the validation.
    Type: Application
    Filed: July 31, 2018
    Publication date: January 31, 2019
    Inventors: Tsvi Lev, Yaacov Hoch, Moshe Karako
  • Publication number: 20190018939
    Abstract: A computer implemented method of correlating between detected access events to access client terminals in a monitored location and physical activity of people in the monitored location, comprising detecting one or more access events to access one or more of a plurality of client terminals located in a monitored location and operatively connected to a first network, obtaining sensory activity data from one or more activity detectors deployed in the monitored location to capture physical activity of people in the monitored location wherein the activity detector(s) are operatively connected to a second interconnection isolated from the first network, analyzing the sensory activity data to identify a spatiotemporal activity pattern of one or more persons in the monitored location, correlating between the access event(s) and the spatiotemporal activity pattern(s) to validate the access event(s) and initiating one or more actions according to the validation.
    Type: Application
    Filed: July 13, 2018
    Publication date: January 17, 2019
    Inventors: Tsvi LEV, Doron GONEN, Moshe KARAKO, Yaacov HOCH
  • Publication number: 20170357804
    Abstract: The present disclosure relates to a communication technique for fusing a 5G communication system for supporting a high data transmission rate after a 4G system with the IoT technology, and a system thereof. The present disclosure can be applied to an intelligent service (e.g., a smart home, a smart building, a smart city, a smart car or connected car, healthcare, digital education, retail business, security and safety related service, etc.) based on the 5G communication technology and the IoT related technology. In accordance with an embodiment of the present disclosure, a method for detecting a malicious code which is injected into the command stream of a widget miming on a web-based OS in a device by a web server in a wireless communication system is provided.
    Type: Application
    Filed: November 17, 2015
    Publication date: December 14, 2017
    Applicant: Samsung Electronics Co., Ltd.
    Inventors: Evgeny BESKROVNY, Maya MAIMON, Yaacov HOCH
  • Patent number: 9560013
    Abstract: A system for preventing malicious attacks on a device in a Smart Home network comprises logical circuitry suitable to compare information flows in said network with legal information flows stored in memory means.
    Type: Grant
    Filed: November 4, 2014
    Date of Patent: January 31, 2017
    Assignee: Samsung Electronics Co., Ltd.
    Inventors: Evgeny Beskrovny, Yaacov Hoch
  • Publication number: 20160142437
    Abstract: A method for detecting a malicious code which is injected into the command stream of a widget running by a web-based OS at a device is disclosed. The method requires (a) analyzing the widget at an App-Store to determine first invariant data; (b) recording within a metadata file first invariant data; (c) associating said metadata file with said widget, and supplying said widget within a user device; (d) upon running said widget, activating a monitoring module, analyzing the running widget and determining by said module a second invariants data, and comparing respectively said second determined invariant data with said first determined invariants data; and (e) issuing an alert upon detection of a variation above a predefined value between said second determined invariant data and said first determined invariant data, respectively.
    Type: Application
    Filed: November 17, 2014
    Publication date: May 19, 2016
    Inventors: Evgeny BESKROVNY, Yaacov HOCH, Maya MAIMON
  • Publication number: 20160127315
    Abstract: A system for preventing malicious attacks on a device in a Smart Home network comprises logical circuitry suitable to compare information flows in said network with legal information flows stored in memory means.
    Type: Application
    Filed: November 4, 2014
    Publication date: May 5, 2016
    Inventors: Evgeny BESKROVNY, Yaacov HOCH
  • Publication number: 20160127412
    Abstract: A method for detecting a malicious code injected into the command stream of a widget running by a web-based OS at a device. The method is multi-stepped. Introducing by an App-Store hooks to within the command stream of the widget. Running at the App-Store the widget on an App-Store device, measuring respective time durations between various hooks, and recording said time durations within a metadata file. Associating said metadata file with said widget, and supplying said widget, and associated metadata file to within a user device. Upon running said widget by a web based OS at said user device, activating a monitoring module, determining durations between said introduced hooks, and comparing respectively said determined time durations with said measured time durations. And issuing an alert upon detection of a variation above a predefined value between any of said determined durations and said measured durations respectively.
    Type: Application
    Filed: November 5, 2014
    Publication date: May 5, 2016
    Inventors: Evgeny BESKROVNY, Yaacov HOCH