Patents by Inventor Yair Zadik

Yair Zadik has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9383951
    Abstract: Methods for formatting messages into stylized templates for delivery to a printer. The templates include a variety of different formats to accommodate the various elements of the message. The available templates can include themed templates, calendars, to-do lists, address books, stationary, and the like. The system and methods format the message by parsing the elements of the message into component parts and fitting them within a template.
    Type: Grant
    Filed: March 19, 2014
    Date of Patent: July 5, 2016
    Assignee: Presto Services Inc.
    Inventors: Jay D. Logue, Joseph M. Beninato, Julia D. Schiff, Jennifer Bush, Jin Yaw Sun, Sharon E. Chiarella, Yair Zadik, Michael R. Migliore, Barclay R. Loftus, Marian B. Cauwet, Joseph Posner
  • Publication number: 20140204419
    Abstract: Methods for formatting messages into stylized templates for delivery to a printer. The templates include a variety of different formats to accommodate the various elements of the message. The available templates can include themed templates, calendars, to-do lists, address books, stationary, and the like. The system and methods format the message by parsing the elements of the message into component parts and fitting them within a template.
    Type: Application
    Filed: March 19, 2014
    Publication date: July 24, 2014
    Applicant: Presto Services, Inc.
    Inventors: Jay D. Logue, Joseph M. Beninato, Julia D. Schiff, Jennifer Bush, Jin Yaw Sun, Sharon E. Chiarella, Yair Zadik, Michael R. Migliore, Barclay R. Loftus, Marian B. Cauwet, Joseph Posner
  • Patent number: 8694590
    Abstract: Methods for formatting email messages into stylized templates for delivery to a printer. The templates include a variety of different formats to accommodate the various elements of the email message. The available templates can include themed templates, calendars, to-do lists, address books, stationary, and the like. The system and methods format the email message by parsing the elements of the message into component parts and fitting them within a template.
    Type: Grant
    Filed: May 16, 2007
    Date of Patent: April 8, 2014
    Assignee: Presto Services, Inc.
    Inventors: Jay D. Logue, Joseph M. Beninato, Julia D. Schiff, Jennifer Bush, Jin Yaw Sun, Sharon E. Chiarella, Yair Zadik, Michael R. Migliore, Barclay R. Loftus, Marian B. Cauwet, Joseph Posner
  • Patent number: 8515081
    Abstract: Controlling access to disseminated messages includes implementing one or more key management policies that specify how various encryption keys are maintained and in particular, when encryption keys are made inaccessible. Deleting a particular key renders inaccessible all copies of messages, known or unknown, associated with the particular key, regardless of the location of the associated messages. A message may be directly or indirectly associated with a deleted key. Any number of levels of indirection are possible and either situation makes the message unrecoverable. The approach is applicable to any type of data in any format and the invention is not limited to any type of data or any type of data format.
    Type: Grant
    Filed: July 19, 2012
    Date of Patent: August 20, 2013
    Assignee: Check Point Software Technologies, Inc.
    Inventors: Dean Brettle, Yair Zadik
  • Publication number: 20130003978
    Abstract: Controlling access to disseminated messages includes implementing one or more key management policies that specify how various encryption keys are maintained and in particular, when encryption keys are made inaccessible. Deleting a particular key renders inaccessible all copies of messages, known or unknown, associated with the particular key, regardless of the location of the associated messages. A message may be directly or indirectly associated with a deleted key. Any number of levels of indirection are possible and either situation makes the message unrecoverable. The approach is applicable to any type of data in any format and the invention is not limited to any type of data or any type of data format.
    Type: Application
    Filed: July 19, 2012
    Publication date: January 3, 2013
    Applicant: CHECK POINT SOFTWARE TECHNOLOGIES, INC.
    Inventors: Dean Brettle, Yair Zadik
  • Patent number: 8230223
    Abstract: Controlling access to disseminated messages includes implementing one or more key management policies that specify how various encryption keys are maintained and in particular, when encryption keys are made inaccessible. Deleting a particular key renders inaccessible all copies of messages, known or unknown, associated with the particular key, regardless of the location of the associated messages. A message may be directly or indirectly associated with a deleted key. Any number of levels of indirection are possible and either situation makes the message unrecoverable. The approach is applicable to any type of data in any format and the invention is not limited to any type of data or any type of data format.
    Type: Grant
    Filed: September 13, 2010
    Date of Patent: July 24, 2012
    Assignee: Check Point Software Technologies, Inc.
    Inventors: Dean Brettle, Yair Zadik
  • Publication number: 20110007902
    Abstract: Controlling access to disseminated messages includes implementing one or more key management policies that specify how various encryption keys are maintained and in particular, when encryption keys are made inaccessible. Deleting a particular key renders inaccessible all copies of messages, known or unknown, associated with the particular key, regardless of the location of the associated messages. A message may be directly or indirectly associated with a deleted key. Any number of levels of indirection are possible and either situation makes the message unrecoverable. The approach is applicable to any type of data in any format and the invention is not limited to any type of data or any type of data format.
    Type: Application
    Filed: September 13, 2010
    Publication date: January 13, 2011
    Inventors: Dean Brettle, Yair Zadik
  • Patent number: 7796760
    Abstract: Controlling access to disseminated messages includes implementing one or more key management policies that specify how various encryption keys are maintained and in particular, when encryption keys are made inaccessible. Deleting a particular key renders inaccessible all copies of messages, known or unknown, associated with the particular key, regardless of the location of the associated messages. A message may be directly or indirectly associated with a deleted key. Any number of levels of indirection are possible and either situation makes the message unrecoverable. The approach is applicable to any type of data in any format and the invention is not limited to any type of data or any type of data format.
    Type: Grant
    Filed: February 19, 2008
    Date of Patent: September 14, 2010
    Assignee: Liquid Machines, Inc.
    Inventors: Dean Brettle, Yair Zadik
  • Publication number: 20080212782
    Abstract: Controlling access to disseminated messages includes implementing one or more key management policies that specify how various encryption keys are maintained and in particular, when encryption keys are made inaccessible. Deleting a particular key renders inaccessible all copies of messages, known or unknown, associated with the particular key, regardless of the location of the associated messages. A message may be directly or indirectly associated with a deleted key. Any number of levels of indirection are possible and either situation makes the message unrecoverable. The approach is applicable to any type of data in any format and the invention is not limited to any type of data or any type of data format.
    Type: Application
    Filed: February 19, 2008
    Publication date: September 4, 2008
    Inventors: Dean Brettle, Yair Zadik
  • Patent number: 7333616
    Abstract: Controlling access to disseminated messages includes implementing one or more key management policies that specify how various encryption keys are maintained and in particular, when encryption keys are made inaccessible. Deleting a particular key renders inaccessible all copies of messages, known or unknown, associated with the particular key, regardless of the location of the associated messages. A message may be directly associated with a deleted key. For example, a message may be directly associated with a deleted key by having been encrypted using the deleted key. A message may also be indirectly associated with a deleted key. For example, a message may be indirectly associated with a deleted key by being encrypted with a key that in turn was encrypted using the deleted key. Any number of levels are indirection are possible and either situation makes the message unrecoverable.
    Type: Grant
    Filed: November 14, 2002
    Date of Patent: February 19, 2008
    Assignee: Omniva Corp.
    Inventors: Dean Brettle, Yair Zadik
  • Publication number: 20070271347
    Abstract: Methods for formatting email messages into stylized templates for delivery to a printer. The templates include a variety of different formats to accommodate the various elements of the email message. The available templates can include themed templates, calendars, to-do lists, address books, stationary, and the like. The system and methods format the email message by parsing the elements of the message into component parts and fitting them within a template.
    Type: Application
    Filed: May 16, 2007
    Publication date: November 22, 2007
    Inventors: Jay D. Logue, Joseph M. Beninato, Julia D. Schiff, Jennifer Bush, Jing Yaw Sun, Sharon E. Chiarella, Yair Zadik, Michael R. Migliore, Barclay R. Loftus, Marian B. Cauwet, Joseph Posner
  • Patent number: 7096355
    Abstract: In general, data exchanged between users is protected using any of various encoding approaches. An example of encoding is encryption, but any kind of encoding may be used. The data used to encrypt the data exchanged between the users, referred to as a “key”, is maintained only in a key repository. Users must obtain a key from the key repository to either encode or decode, encrypt or decrypt data, after which the user's copy of the key is destroyed or otherwise rendered inoperable. A key management policy is employed to control access to the keys maintained by the key repository. Encoding algorithms may be dynamically changed over time. Users may negotiate different algorithms to be used with specific users or messages. Thus, different algorithms may be used between different sets of users depending upon what the member users of those sets negotiate among themselves. The frequency at which algorithms are changed may also be separately negotiated between users.
    Type: Grant
    Filed: August 6, 2001
    Date of Patent: August 22, 2006
    Assignee: Omniva Corporation
    Inventors: Maclen Marvit, Keith David Rosema, Jeffrey Ubois, David Marvit, Dean Brettle, Yair Zadik, Stuart Goodnick