Patents by Inventor Yair Zadik
Yair Zadik has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9383951Abstract: Methods for formatting messages into stylized templates for delivery to a printer. The templates include a variety of different formats to accommodate the various elements of the message. The available templates can include themed templates, calendars, to-do lists, address books, stationary, and the like. The system and methods format the message by parsing the elements of the message into component parts and fitting them within a template.Type: GrantFiled: March 19, 2014Date of Patent: July 5, 2016Assignee: Presto Services Inc.Inventors: Jay D. Logue, Joseph M. Beninato, Julia D. Schiff, Jennifer Bush, Jin Yaw Sun, Sharon E. Chiarella, Yair Zadik, Michael R. Migliore, Barclay R. Loftus, Marian B. Cauwet, Joseph Posner
-
Publication number: 20140204419Abstract: Methods for formatting messages into stylized templates for delivery to a printer. The templates include a variety of different formats to accommodate the various elements of the message. The available templates can include themed templates, calendars, to-do lists, address books, stationary, and the like. The system and methods format the message by parsing the elements of the message into component parts and fitting them within a template.Type: ApplicationFiled: March 19, 2014Publication date: July 24, 2014Applicant: Presto Services, Inc.Inventors: Jay D. Logue, Joseph M. Beninato, Julia D. Schiff, Jennifer Bush, Jin Yaw Sun, Sharon E. Chiarella, Yair Zadik, Michael R. Migliore, Barclay R. Loftus, Marian B. Cauwet, Joseph Posner
-
Patent number: 8694590Abstract: Methods for formatting email messages into stylized templates for delivery to a printer. The templates include a variety of different formats to accommodate the various elements of the email message. The available templates can include themed templates, calendars, to-do lists, address books, stationary, and the like. The system and methods format the email message by parsing the elements of the message into component parts and fitting them within a template.Type: GrantFiled: May 16, 2007Date of Patent: April 8, 2014Assignee: Presto Services, Inc.Inventors: Jay D. Logue, Joseph M. Beninato, Julia D. Schiff, Jennifer Bush, Jin Yaw Sun, Sharon E. Chiarella, Yair Zadik, Michael R. Migliore, Barclay R. Loftus, Marian B. Cauwet, Joseph Posner
-
Patent number: 8515081Abstract: Controlling access to disseminated messages includes implementing one or more key management policies that specify how various encryption keys are maintained and in particular, when encryption keys are made inaccessible. Deleting a particular key renders inaccessible all copies of messages, known or unknown, associated with the particular key, regardless of the location of the associated messages. A message may be directly or indirectly associated with a deleted key. Any number of levels of indirection are possible and either situation makes the message unrecoverable. The approach is applicable to any type of data in any format and the invention is not limited to any type of data or any type of data format.Type: GrantFiled: July 19, 2012Date of Patent: August 20, 2013Assignee: Check Point Software Technologies, Inc.Inventors: Dean Brettle, Yair Zadik
-
Publication number: 20130003978Abstract: Controlling access to disseminated messages includes implementing one or more key management policies that specify how various encryption keys are maintained and in particular, when encryption keys are made inaccessible. Deleting a particular key renders inaccessible all copies of messages, known or unknown, associated with the particular key, regardless of the location of the associated messages. A message may be directly or indirectly associated with a deleted key. Any number of levels of indirection are possible and either situation makes the message unrecoverable. The approach is applicable to any type of data in any format and the invention is not limited to any type of data or any type of data format.Type: ApplicationFiled: July 19, 2012Publication date: January 3, 2013Applicant: CHECK POINT SOFTWARE TECHNOLOGIES, INC.Inventors: Dean Brettle, Yair Zadik
-
Patent number: 8230223Abstract: Controlling access to disseminated messages includes implementing one or more key management policies that specify how various encryption keys are maintained and in particular, when encryption keys are made inaccessible. Deleting a particular key renders inaccessible all copies of messages, known or unknown, associated with the particular key, regardless of the location of the associated messages. A message may be directly or indirectly associated with a deleted key. Any number of levels of indirection are possible and either situation makes the message unrecoverable. The approach is applicable to any type of data in any format and the invention is not limited to any type of data or any type of data format.Type: GrantFiled: September 13, 2010Date of Patent: July 24, 2012Assignee: Check Point Software Technologies, Inc.Inventors: Dean Brettle, Yair Zadik
-
Publication number: 20110007902Abstract: Controlling access to disseminated messages includes implementing one or more key management policies that specify how various encryption keys are maintained and in particular, when encryption keys are made inaccessible. Deleting a particular key renders inaccessible all copies of messages, known or unknown, associated with the particular key, regardless of the location of the associated messages. A message may be directly or indirectly associated with a deleted key. Any number of levels of indirection are possible and either situation makes the message unrecoverable. The approach is applicable to any type of data in any format and the invention is not limited to any type of data or any type of data format.Type: ApplicationFiled: September 13, 2010Publication date: January 13, 2011Inventors: Dean Brettle, Yair Zadik
-
Patent number: 7796760Abstract: Controlling access to disseminated messages includes implementing one or more key management policies that specify how various encryption keys are maintained and in particular, when encryption keys are made inaccessible. Deleting a particular key renders inaccessible all copies of messages, known or unknown, associated with the particular key, regardless of the location of the associated messages. A message may be directly or indirectly associated with a deleted key. Any number of levels of indirection are possible and either situation makes the message unrecoverable. The approach is applicable to any type of data in any format and the invention is not limited to any type of data or any type of data format.Type: GrantFiled: February 19, 2008Date of Patent: September 14, 2010Assignee: Liquid Machines, Inc.Inventors: Dean Brettle, Yair Zadik
-
Publication number: 20080212782Abstract: Controlling access to disseminated messages includes implementing one or more key management policies that specify how various encryption keys are maintained and in particular, when encryption keys are made inaccessible. Deleting a particular key renders inaccessible all copies of messages, known or unknown, associated with the particular key, regardless of the location of the associated messages. A message may be directly or indirectly associated with a deleted key. Any number of levels of indirection are possible and either situation makes the message unrecoverable. The approach is applicable to any type of data in any format and the invention is not limited to any type of data or any type of data format.Type: ApplicationFiled: February 19, 2008Publication date: September 4, 2008Inventors: Dean Brettle, Yair Zadik
-
Patent number: 7333616Abstract: Controlling access to disseminated messages includes implementing one or more key management policies that specify how various encryption keys are maintained and in particular, when encryption keys are made inaccessible. Deleting a particular key renders inaccessible all copies of messages, known or unknown, associated with the particular key, regardless of the location of the associated messages. A message may be directly associated with a deleted key. For example, a message may be directly associated with a deleted key by having been encrypted using the deleted key. A message may also be indirectly associated with a deleted key. For example, a message may be indirectly associated with a deleted key by being encrypted with a key that in turn was encrypted using the deleted key. Any number of levels are indirection are possible and either situation makes the message unrecoverable.Type: GrantFiled: November 14, 2002Date of Patent: February 19, 2008Assignee: Omniva Corp.Inventors: Dean Brettle, Yair Zadik
-
Publication number: 20070271347Abstract: Methods for formatting email messages into stylized templates for delivery to a printer. The templates include a variety of different formats to accommodate the various elements of the email message. The available templates can include themed templates, calendars, to-do lists, address books, stationary, and the like. The system and methods format the email message by parsing the elements of the message into component parts and fitting them within a template.Type: ApplicationFiled: May 16, 2007Publication date: November 22, 2007Inventors: Jay D. Logue, Joseph M. Beninato, Julia D. Schiff, Jennifer Bush, Jing Yaw Sun, Sharon E. Chiarella, Yair Zadik, Michael R. Migliore, Barclay R. Loftus, Marian B. Cauwet, Joseph Posner
-
Patent number: 7096355Abstract: In general, data exchanged between users is protected using any of various encoding approaches. An example of encoding is encryption, but any kind of encoding may be used. The data used to encrypt the data exchanged between the users, referred to as a “key”, is maintained only in a key repository. Users must obtain a key from the key repository to either encode or decode, encrypt or decrypt data, after which the user's copy of the key is destroyed or otherwise rendered inoperable. A key management policy is employed to control access to the keys maintained by the key repository. Encoding algorithms may be dynamically changed over time. Users may negotiate different algorithms to be used with specific users or messages. Thus, different algorithms may be used between different sets of users depending upon what the member users of those sets negotiate among themselves. The frequency at which algorithms are changed may also be separately negotiated between users.Type: GrantFiled: August 6, 2001Date of Patent: August 22, 2006Assignee: Omniva CorporationInventors: Maclen Marvit, Keith David Rosema, Jeffrey Ubois, David Marvit, Dean Brettle, Yair Zadik, Stuart Goodnick