Patents by Inventor Yoram Zahavi

Yoram Zahavi has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240013158
    Abstract: Technology is disclosed for programmatically determining an event of interest that is specific to a user, and generating, based on user-meeting data, an enriched playback timeline that includes the event of interest on a graphical user interface (GUI). To determine the event of interest, this disclosure provides technologies to determine one or more meeting data features based on meeting data associated with a meeting. Based on the one or more meeting data features, this disclosure includes determining an event of interest. The event of interest may include, for example, an indication of whether a person was mentioned, an indication of whether a question was asked, an indication of whether a keyword was mentioned, an indication of whether a topic was covered, and so forth. From these events of interest, a GUI that includes an enriched meeting playback timeline that includes an indication of the event of interest may be generated.
    Type: Application
    Filed: July 5, 2022
    Publication date: January 11, 2024
    Inventors: Yoram ZAHAVI, Michael SHTERENBERG, Adi L. MILLER
  • Publication number: 20170185745
    Abstract: Technologies for customized drug provisioning include a drug dosage determination server and a drug dispenser device. The drug dosage determination server is configured to obtain patient physiological data associated with a patient, determine a drug dosage for the patient based on the patient physiological data, generate drug dosage instructions for a drug dispenser device, based on the determined drug dosage, and transmit the drug dosage instructions to the drug dispenser device. The drug dispenser device is configured to receive drug dosage instructions from the drug dosage determination server, prompt the patient for authentication credentials, determine whether the patient is authenticated, generate the drug based on the drug dosage instructions in response to a determination that the patient is authenticated, and dispense the drug. Other embodiments are described.
    Type: Application
    Filed: December 26, 2015
    Publication date: June 29, 2017
    Inventors: Dan Wartski, Glen J. Anderson, Tamara Gaidar, Ido Lapidot, Yoram Zahavi, Maria Bezaitis
  • Patent number: 9602613
    Abstract: A solution that improves a user's experience while surfing the Internet. An intermediate device resides logically between a browsing device and content available via the Internet. As responses to content requests from browsing devices are received from a content server, browser links are identified and modified, disabled or covered for example. The intermediate device also creates a browser link to a compound browser object(s) that is created and stored at the intermediate device. This created browser link invokes code at the intermediate device to upload the compound browser object(s). The intermediate device obtains these compound browser objects by obtaining content associated with the identified browser links either from a content server, a local cache or knowledge of its existence eat the browser device.
    Type: Grant
    Filed: September 26, 2008
    Date of Patent: March 21, 2017
    Assignee: FLASH NETWORKS, LTD
    Inventors: Yoram Zahavi, Moran Cohen
  • Patent number: 9465946
    Abstract: Embodiments of apparatus, computer-implemented methods, systems, devices, and computer-readable media are described herein for identifying and encrypting a subset of a plurality of instructions, for execution in a more secure execution environment. In various embodiments, the subset may include a single entry point and a single exit point. In various embodiments, one or more instructions of the plurality of instructions that precede or follow the subset may be executed in a first execution environment with a first security level. In various embodiments, the subset may be executed in a second execution environment with a second security level that is more secure than the first security level.
    Type: Grant
    Filed: June 1, 2012
    Date of Patent: October 11, 2016
    Assignee: Intel Corporation
    Inventors: Sergei Goffman, Alex Berenzon, Oron Lenz, Tevi Devor, Bo Zhang, Yoram Zahavi, Moshe Maor
  • Patent number: 9152615
    Abstract: Disclosed is a system and method that adds additional data (a banner, footer or a header, for example) to a web page while the data is transferred toward a mobile device. An exemplary system can comprise an intermediate node between a surfer and the Internet. Such an intermediate node element can reside at a service provider premises (SPP), for example. The service provider can be a telecom operator, such as but not limited to, a cellular service provider, a satellite communication service provider, a Public Switched Telephone Network (PSTN) operator, an access network service provider, etc. Alternatively, other exemplary embodiments can comprise elements which reside at an Internet Service Provider (ISP) premises.
    Type: Grant
    Filed: December 27, 2012
    Date of Patent: October 6, 2015
    Assignee: Flash Networks, LTD
    Inventors: Yoram Zahavi, Yoav Weiss, Adi Belan, Evgeny Gorokhovsky
  • Patent number: 9071505
    Abstract: Access services are dynamically allocated for processing received data traffic by creating routing information for data traffic associated with a particular subscriber, subscriber equipment and/or network address information. The routing information identifies services that the data traffic can be subjected to and the order in which the services are provided. When an attached request is received, appropriate services for the requesting subscriber are retrieved from a database based on particular identifying information which may include the identification of the subscriber, subscriber equipment, network address or other information. The services are organized in a routing path and the allocated network address and the routing path are transferred to a smart router. Data traffic, associated with the allocated network address is then routed through servers to provide the identified services.
    Type: Grant
    Filed: October 7, 2014
    Date of Patent: June 30, 2015
    Assignee: Flash Networks Ltd
    Inventors: Yoram Zahavi, Eyal Pessach, Assaf Benedic
  • Publication number: 20150085865
    Abstract: Access services are dynamically allocated for processing received data traffic by creating routing information for data traffic associated with a particular subscriber, subscriber equipment and/or network address information. The routing information identifies services that the data traffic can be subjected to and the order in which the services are provided. When an attached request is received, appropriate services for the requesting subscriber are retrieved from a database based on particular identifying information which may include the identification of the subscriber, subscriber equipment, network address or other information. The services are organized in a routing path and the allocated network address and the routing path are transferred to a smart router. Data traffic, associated with the allocated network address is then routed through servers to provide the identified services.
    Type: Application
    Filed: October 7, 2014
    Publication date: March 26, 2015
    Inventors: Yoram Zahavi, Eyal Pessach, Assaf Benedic
  • Patent number: 8886805
    Abstract: Access services are dynamically allocated for processing received data traffic by creating routing information for data traffic associated with a particular subscriber, subscriber equipment and/or network address information. The routing information identifies services that the data traffic can be subjected to and the order in which the services are provided. When an attached request is received, appropriate services for the requesting subscriber are retrieved from a database based on particular identifying information which may include the identification of the subscriber, subscriber equipment, network address or other information. The services are organized in a routing path and the allocated network address and the routing path are transferred to a smart router. Data traffic, associated with the allocated network address is then routed through servers to provide the identified services.
    Type: Grant
    Filed: November 15, 2010
    Date of Patent: November 11, 2014
    Assignee: Flash Networks, Ltd
    Inventors: Yoram Zahavi, Eyal Pessach, Assaf Benedic
  • Publication number: 20140047245
    Abstract: Embodiments of apparatus, computer-implemented methods, systems, devices, and computer-readable media are described herein for identifying and encrypting a subset of a plurality of instructions, for execution in a more secure execution environment. In various embodiments, the subset may include a single entry point and a single exit point. In various embodiments, one or more instructions of the plurality of instructions that precede or follow the subset may be executed in a first execution environment with a first security level. In various embodiments, the subset may be executed in a second execution environment with a second security level that is more secure than the first security level.
    Type: Application
    Filed: June 1, 2012
    Publication date: February 13, 2014
    Inventors: Sergei Goffman, Alex Berenzon, Oron Lenz, Tevi Devor, Bo Zhang, Yoram Zahavi, Moshe Maor
  • Patent number: 8595835
    Abstract: Systems and methods for identification of network attacks are disclosed. An example system includes an adaptor module to route a received encrypted packet to a decryption module, receive a decrypted packet corresponding to the encrypted packet from the decryption module, and transmit the decrypted packet and the encrypted packet to a sensor module. The decryption module is to receive an encrypted packet, decrypt the encrypted packet to form the decrypted packet, and transmit the decrypted packet to the adaptor module. The sensor module is to inspect the decrypted packet and the encrypted packet received from the adaptor module to determine when an attack is detected.
    Type: Grant
    Filed: January 13, 2011
    Date of Patent: November 26, 2013
    Assignee: Trustwave Holdings, Inc.
    Inventors: Doron Kolton, Adi Stav, Asaf Wexler, Ariel Ernesto Frydman, Yoram Zahavi
  • Publication number: 20130124976
    Abstract: Disclosed is a system and method that adds additional data (a banner, footer or a header, for example) to a web page while the data is transferred toward a mobile device. An exemplary system can comprise an intermediate node between a surfer and the Internet. Such an intermediate node element can reside at a service provider premises (SPP), for example. The service provider can be a telecom operator, such as but not limited to, a cellular service provider, a satellite communication service provider, a Public Switched Telephone Network (PSTN) operator, an access network service provider, etc. Alternatively, other exemplary embodiments can comprise elements which reside at an Internet Service Provider (ISP) premises.
    Type: Application
    Filed: December 27, 2012
    Publication date: May 16, 2013
    Inventors: Yoram Zahavi, Yoav Weiss, Adi Belan, Evgeny Gorokhovsky
  • Patent number: 8370737
    Abstract: Disclosed is a system and method that adds additional data (a banner, footer or a header, for example) to a web page while the data is transferred toward a mobile device. An exemplary system can comprise an intermediate node between a surfer and the Internet. Such an intermediate node element can reside at a service provider premises (SPP), for example. The service provider can be a telecom operator, such as but not limited to, a cellular service provider, a satellite communication service provider, a Public Switched Telephone Network (PSTN) operator, an access network service provider, etc. Alternatively, other exemplary embodiments can comprise elements which reside at an Internet Service Provider (ISP) premises.
    Type: Grant
    Filed: December 17, 2009
    Date of Patent: February 5, 2013
    Assignee: Flash Networks, Ltd
    Inventors: Yoram Zahavi, Yoav Weiss, Adi Belan, Evgeny Gorokhovsky
  • Publication number: 20110282996
    Abstract: Access services are dynamically allocated for processing received data traffic by creating routing information for data traffic associated with a particular subscriber, subscriber equipment and/or network address information. The routing information identifies services that the data traffic can be subjected to and the order in which the services are provided. When an attached request is received, appropriate services for the requesting subscriber are retrieved from a database based on particular identifying information which may include the identification of the subscriber, subscriber equipment, network address or other information. The services are organized in a routing path and the allocated network address and the routing path are transferred to a smart router. Data traffic, associated with the allocated network address is then routed through servers to provide the identified services.
    Type: Application
    Filed: November 15, 2010
    Publication date: November 17, 2011
    Inventors: YORAM ZAHAVI, Eyal Pessach, Assaf Benedic
  • Publication number: 20110283101
    Abstract: A system and method for detecting network attacks within encrypted network traffic received by a protected network includes a decryption module and an adaptor module. This system and method can be inserted and used with multiple types of operating systems.
    Type: Application
    Filed: January 13, 2011
    Publication date: November 17, 2011
    Applicant: TRUSTWAVE HOLDINGS, INC.
    Inventors: Doron Kolton, Adi Stav, Asaf Wexler, Ariel Ernesto Frydman, Yoram Zahavi
  • Patent number: 7934253
    Abstract: A system and method for protection of Web based applications are described. The techniques described provide an enterprise wide approach to preventing attacks of Web based applications. Individual computer networks within the enterprise monitor network traffic to identify anomalous traffic. The anomalous traffic can be identified by comparing the traffic to a profile of acceptable user traffic when interacting with the application. The anomalous traffic, or security events, identified at the individual computer networks are communicated to a central security manager. The central security manager correlates the security events at the individual computer networks to determine if there is an enterprise wide security threat. The central security manager can then communicate instructions to the individual computer networks so as to provide an enterprise wide solution to the threat.
    Type: Grant
    Filed: September 14, 2006
    Date of Patent: April 26, 2011
    Assignee: TrustWave Holdings, Inc.
    Inventors: Kevin Overcash, Kate Delikat, Rami Mizrahi, Galit Efron, Doron Kolton, Asaf Wexler, Netta Gavrieli, Yoram Zahavi
  • Patent number: 7895652
    Abstract: A system and method for detecting network attacks within encrypted network traffic received by a protected network includes a decryption module and an adaptor module. This system and method can be inserted and used with multiple types of operating systems.
    Type: Grant
    Filed: January 4, 2006
    Date of Patent: February 22, 2011
    Assignee: Trustwave Holdings, Inc.
    Inventors: Doron Kolton, Adi Stav, Asaf Wexler, Ariel Ernesto Frydman, Yoram Zahavi
  • Publication number: 20100169763
    Abstract: Disclosed is a system and method that adds additional data (a banner, footer or a header, for example) to a web page while the data is transferred toward a mobile device. An exemplary system can comprise an intermediate node between a surfer and the Internet. Such an intermediate node element can reside at a service provider premises (SPP), for example. The service provider can be a telecom operator, such as but not limited to, a cellular service provider, a satellite communication service provider, a Public Switched Telephone Network (PSTN) operator, an access network service provider, etc. Alternatively, other exemplary embodiments can comprise elements which reside at an Internet Service Provider (ISP) premises.
    Type: Application
    Filed: December 17, 2009
    Publication date: July 1, 2010
    Inventors: Yoram Zahavi, Yoav Weiss, Adi Belan, Evgeny Gorokhovsky
  • Publication number: 20090094377
    Abstract: A solution that improves a user's experience while surfing the Internet. An intermediate device resides logically between a browsing device and content available via the Internet. As responses to content requests from browsing devices are received from a content server, browser links are identified and modified, disabled or covered for example. The intermediate device also creates a browser link to a compound browser object(s) that is created and stored at the intermediate device. This created browser link invokes code at the intermediate device to upload the compound browser object(s). The intermediate device obtains these compound browser objects by obtaining content associated with the identified browser links either from a content server, a local cache or knowledge of its existence eat the browser device.
    Type: Application
    Filed: September 26, 2008
    Publication date: April 9, 2009
    Inventors: Yoram Zahavi, Moran Cohen
  • Publication number: 20080047009
    Abstract: A system and method for protection of Web based applications are described. A Web application security system is included within a computer network to monitor traffic received from a wide area network, such as the Internet, and determine if there is a threat to the Web application. The Web application security system monitors web traffic in a non-inline configuration and identifies any anomalous traffic against a profile that identifies acceptable behavior of a user of the application. Any anomalous traffic is analyzed and appropriate protective action is taken to secure the Web application against an attack.
    Type: Application
    Filed: July 20, 2006
    Publication date: February 21, 2008
    Inventors: Kevin Overcash, Kate Delikat, Rami Mizrahi, Galit Efron (Njtzan), Doron Kolton, Asaf Wexler, Netta Gavrieli, Yoram Zahavi
  • Publication number: 20080034424
    Abstract: A system and method for protection of Web based applications are described. An agent is included in a web server such that traffic is routed through the agent. A security module is also in communication with the agent. The agent receives information about the application profile, and patterns of acceptable traffic behavior, from the security module. The agent acts as a gatekeeper, holding up suspicious traffic that does not match the pattern of acceptable traffic behavior until the suspicious traffic has been analyzed by the security module. Using the agent, malicious traffic can dropped before it can reach the application, or the user can be logged out, or both.
    Type: Application
    Filed: September 14, 2006
    Publication date: February 7, 2008
    Inventors: Kevin Overcash, Kate Delikate, Rami Mizrahi, Galit Efron, Doron Kolton, Asaf Wexler, Netta Gavrieli, Yoram Zahavi