PROGRESSIVE LENSES
    1.
    发明申请
    PROGRESSIVE LENSES 审中-公开
    渐进镜片

    公开(公告)号:WO2014111913A1

    公开(公告)日:2014-07-24

    申请号:PCT/IL2013/051010

    申请日:2013-12-09

    Applicant: UR, Shmuel

    Inventor: UR, Shmuel

    CPC classification number: G02C7/066 G02C7/024 G02C7/027 G02C7/041 G02C7/061

    Abstract: A method comprising: performing eye exam to a subject having a first and second eye; determining a prescription for the first and second eyes, the prescription describing focal power for each of the first eye and the second eye for at least three distances; and providing the prescription to a machine that produces progressive glasses that comprise a first and second lenses, wherein the first and second lenses each having at least three focal portions associated with the at least three distances that are located in a same height in the glasses thereby enabling clear vision for the subject in the first eye and the second eye with respect to the at least three distances.

    Abstract translation: 一种方法,包括:对具有第一和第二只眼睛的对象执行眼睛检查; 确定第一眼睛和第二眼睛的处方,描述第一眼睛和第二眼睛中的每一个的焦距至少三个距离的处方; 以及向生产包括第一和第二透镜的渐进式眼镜的机器提供处方,其中,所述第一和第二透镜每个具有至少三个焦点部分,所述至少三个焦点部分与眼镜中位于相同高度的至少三个距离相关联 使第一眼睛和第二只眼睛中的对象能够相对于至少三个距离获得清晰的视觉。

    MASKING PHONE NUMBERS
    2.
    发明申请
    MASKING PHONE NUMBERS 审中-公开
    屏蔽电话号码

    公开(公告)号:WO2013101036A1

    公开(公告)日:2013-07-04

    申请号:PCT/US2011/067786

    申请日:2011-12-29

    Inventor: UR, Shmuel

    CPC classification number: H04M3/42008

    Abstract: In one example of masking phone numbers, a roster of changeable phone numbers may be assigned to a target phone, a presence of the target phone may be registered to a local cell site, a request for one of the changeable phone numbers that is assigned to the target phone for a current time frame may be received, and a phone call that is intended for the target phone may be facilitated using an assigned one of the changeable phone numbers that is assigned to the target phone for the current time frame.

    Abstract translation: 在屏蔽电话号码的一个示例中,可以将一个可变电话号码的名单分配给目标电话,目标电话的存在可以被注册到本地小区站点,对可分配给一个电话号码的一个可变电话号码的请求 可以接收当前时间帧的目标电话,并且可以使用分配给当前时间帧的目标电话的可分配电话号码之一来促进用于目标电话的电话呼叫。

    PREVENTING CLASSIFICATION OF OBJECT CONTEXTUAL INFORMATION
    3.
    发明申请
    PREVENTING CLASSIFICATION OF OBJECT CONTEXTUAL INFORMATION 审中-公开
    防止对象上下文信息的分类

    公开(公告)号:WO2013100980A1

    公开(公告)日:2013-07-04

    申请号:PCT/US2011/067627

    申请日:2011-12-28

    CPC classification number: G06K9/6201 G06F17/00 G06K9/00671 G06K9/72

    Abstract: Technology is disclosed for preventing classification of objects, e.g., in an augmented reality system. The technology can identify a set of objects to be classified, determine whether context information for one or more objects in the identified set of objects to be classified is identified as not to be employed during classification, and during classification of two different objects, include context information for one object but not the other.

    Abstract translation: 公开了用于防止对象分类的技术,例如在增强现实系统中。 该技术可以识别要分类的一组对象,确定要分类的所识别的一组对象中的一个或多个对象的上下文信息是否被识别为在分类期间不被使用,并且在两个不同对象的分类期间,包括上下文 一个对象的信息,而不是另一个对象的信息。

    STARTING SIMULATION FROM A REAL SITUATION
    4.
    发明申请
    STARTING SIMULATION FROM A REAL SITUATION 审中-公开
    从真实情况开始模拟

    公开(公告)号:WO2012173602A1

    公开(公告)日:2012-12-20

    申请号:PCT/US2011/040343

    申请日:2011-06-14

    Abstract: Technology is disclosed for starting a simulation from a real situation. In various embodiments, the technology receives a parameter corresponding to simulation of a physical entity in a virtual context, receives an attribute corresponding to the physical entity in a physical context, and simulates the physical entity in the virtual context using the attribute as a stimulus. The attribute may identify an actual occurrence during the physical context.

    Abstract translation: 公开了从真实情况开始模拟的技术。 在各种实施例中,技术接收对应于虚拟上下文中物理实体的仿真的参数,在物理上下文中接收对应于物理实体的属性,并使用该属性作为刺激来模拟虚拟上下文中的物理实体。 该属性可以识别在物理上下文期间的实际发生。

    SYSTEM AND METHOD FOR TRANSFERRING AN ANONYMIZED TRANSACTION BETWEEN NODES OF A COMPUTER NETWORK

    公开(公告)号:WO2020234864A1

    公开(公告)日:2020-11-26

    申请号:PCT/IL2020/050458

    申请日:2020-04-19

    Abstract: A system and a method of transferring a transaction between a source node and a destination node of a computer network, by at least one processor of an intermediary node may include: receiving a request to transfer the transaction from the source node to the destination node; extracting from the transaction request at least one data element; obtaining from a first database at least one condition element; anonymizing the transaction; and transferring the anonymized transaction from the intermediary node to the destination node, based on at least one of: the at least one condition element and the at least one extracted data element.

    DEFENDING AGAINST BROWSER ATTACKS
    6.
    发明申请
    DEFENDING AGAINST BROWSER ATTACKS 审中-公开
    防范浏览器攻击

    公开(公告)号:WO2014025334A1

    公开(公告)日:2014-02-13

    申请号:PCT/US2012/049697

    申请日:2012-08-06

    Inventor: UR, Shmuel

    CPC classification number: H04L63/1466 H04L63/168

    Abstract: In one example the opening of a primary browser to a URL may be detected, a reference browser may then be opened to the same URL, data input to respective data fields on the primary browser may be copied to respectively corresponding data fields on the reference browser, and security on the primary browser may be evaluated based on, at least, the data copied to the reference browser.

    Abstract translation: 在一个示例中,可以检测到主浏览器到URL的打开,然后可以将引用浏览器打开到相同的URL,在主浏览器上输入到相应数据字段的数据可以被复制到参考浏览器上的相应的数据字段 ,并且可以至少基于复制到参考浏览器的数据来评估主浏览器上的安全性。

    REMOTE MOVEMENT GUIDANCE
    7.
    发明申请
    REMOTE MOVEMENT GUIDANCE 审中-公开
    远程移动指导

    公开(公告)号:WO2013039510A1

    公开(公告)日:2013-03-21

    申请号:PCT/US2011/051913

    申请日:2011-09-16

    Inventor: UR, Shmuel

    Abstract: A remote control may be configured to guide a user's physical movements by transmitting movement signals that are to be translated into haptic instructions, and cooperative actuators may be configured to be worn by the user to translate the movement signals received from the remote control into the haptic instructions. The movement signals may be translated into the haptic instructions for physical movements of any limb or extremity of the user in either of a vertical direction or a horizontal direction; after the first movement signal, the movement signals may be transmitted prior to completion of an immediately previous physical movement; and the movement signals may include horizontal and vertical directional signal components that indicate the horizontal and vertical direction for the user's next physical movement. The haptic instructions that are translated from the horizontal and vertical directional signal components may differ in either duration or magnitude.

    Abstract translation: 遥控器可以被配置为通过将要被转换成的移动信号传送到触觉指令来引导用户的物理运动,并且协作致动器可以被配置为由用户佩戴以将从遥控器接收的移动信号转换成触觉 说明。 可以将运动信号转换成用于在垂直方向或水平方向中的任何一个中的任何肢体或肢体的物理运动的触觉指令; 在第一移动信号之后,可以在完成紧接的之前的物理运动之前传送运动信号; 并且运动信号可以包括水平和垂直方向信号分量,其指示用户的下一个物理运动的水平和垂直方向。 从水平和垂直方向信号分量转换的触觉指令可以在持续时间或幅度上不同。

    METHOD AND SYSTEM FOR IDENTIFYING DOCUMENTS GENERATED BY AN UNAUTHORIZED SOFTWARE COPY
    8.
    发明申请
    METHOD AND SYSTEM FOR IDENTIFYING DOCUMENTS GENERATED BY AN UNAUTHORIZED SOFTWARE COPY 审中-公开
    用于识别未经授权的软件副本生成的文档的方法和系统

    公开(公告)号:WO1997040619A1

    公开(公告)日:1997-10-30

    申请号:PCT/US1996005670

    申请日:1996-04-23

    Abstract: Each copy of software (9) is assigned a unique identifying code pattern (27) which is printed on all documents (19) produced with that software (9) by a high resolution printer (17). The unique identifying code pattern (27) is a plurality of spaced apart marks having a size no greater than about 300 dpi, and is therefore, at best, barely noticeable to the human observer. The "invisible signature" is also reproduced on documents (19) made by unauthorized copies of software (9) which can therefore be traced. Preferably, the unique identifying code (27) is replicated multiple times (27>1 5 1 5 1 5

    Abstract translation: 为每个软件副本(9)分配一个唯一的识别代码模式(27),该识别代码模式被打印在由该软件(9)由高分辨率打印机(17)产生的所有文档(19)上。 独特的识别码图案(27)是具有不大于约300dpi的尺寸的多个间隔开的标记,并且因此至多对人类观察者几乎不可察觉。 “隐形签名”也被复制在由未经授权的软件副本(9)制作的文件(19)上,因此可以追溯。 优选地,使用纠错码在文档(19)上复制多次(27> 1 <-27> 5 <)所述唯一识别码(27),以确保至少一个复制将被清除选择用于打印的物质 由软件。 高分辨率扫描器(21)提取并识别打印在文档(19)上的代码图案(27> 1 <-27> 5 <)。 在软件(9)产生(39)用于高分辨率打印机(17)的打印文件的系统中,模式复制(27> 1 <-27> 5 <)的打印命令与其他打印机(41)分散 由于“隐形签名”不能防止复制软件(9)或显着地损害完成的文档(19)的外观,所以令命令识别和删除命令非常困难并且不值得。

    SYSTEM AND METHOD FOR OPTIMIZING ROUTING OF TRANSACTIONS OVER A COMPUTER NETWORK

    公开(公告)号:WO2021033184A1

    公开(公告)日:2021-02-25

    申请号:PCT/IL2020/050908

    申请日:2020-08-19

    Abstract: A system and a method of optimizing an organizational structure (OS) of an organization may include: receiving one or more data elements pertaining to the OS; receiving a value of one or more transaction parameters pertaining to one or more transactions conducted over one or more nodes of a computer network; perturbating a value of one or more OS elements; creating a simulated computer network based on the one or more perturbated values; for each network of the computer network and the simulated computer network, calculating a value of at least one OS performance parameter; and generating, based on the calculation, a suggestion for optimizing the OS, wherein the suggestion may include at least one perturbated OS element value.

    ACTIVE LOCK INFORMATION MAINTENANCE AND RETRIEVAL
    10.
    发明申请
    ACTIVE LOCK INFORMATION MAINTENANCE AND RETRIEVAL 审中-公开
    主动锁定信息维护和检索

    公开(公告)号:WO2014021885A1

    公开(公告)日:2014-02-06

    申请号:PCT/US2012/049163

    申请日:2012-08-01

    Inventor: UR, Shmuel

    CPC classification number: G06F9/524 G06F9/526 G06F11/3616

    Abstract: Technologies related to active lock information maintenance and retrieval are generally described. In some examples, a computing device may be configured to maintain active lock information including lock identifiers for active locks, lock access identifiers corresponding to a number of times a lock has been placed and/or released, and/or lock owner identifiers corresponding to threads placing locks. The computing device may provide an active lock information system configured to return active lock information including some or all of the lock identifiers for active locks, lock access identifiers, and/or lock owner identifiers in response to active lock information requests.

    Abstract translation: 通常描述与主动锁信息维护和检索相关的技术。 在一些示例中,计算设备可以被配置为维护主动锁定信息,包括用于主动锁定的锁定标识符,对应于已经被放置和/或释放锁定的次数的锁定访问标识符和/或锁定与线程对应的所有者标识符 放置锁。 计算设备可以提供主动锁定信息系统,其被配置为响应于主动锁定信息请求返回主动锁定信息,其包括用于主动锁定的锁定标识符的一些或全部,锁定访问标识符和/或锁定所有者标识符。

Patent Agency Ranking