Issued Patents All Time
Showing 25 most recent of 29 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 12355859 | Secure reordering using tensor of indicators | Eyal Kushnir, Hayim Shaul, Ehud Aharoni, Nathalie Baracaldo Angel, Runhua Xu +1 more | 2025-07-08 |
| 12299410 | String similarity based weighted min-hashing | Allon Adir, Ehud Aharoni, Michael Mirkin | 2025-05-13 |
| 12289393 | Tournament type selection operations on encrypted data | Ramy Masalha, Ehud Aharoni, Nir Drucker, Gilad Ezov, Hayim Shaul | 2025-04-29 |
| 12284265 | Optimal profile selection for FHE based analytical models | Gilad Ezov, Ehud Aharoni | 2025-04-22 |
| 12255980 | Homomorphic encryption key management | Akram Bitar, Dov Murik, Ehud Aharoni, Nir Drucker, Ronen Levy | 2025-03-18 |
| 12192321 | Private vertical federated learning | Runhua Xu, Nathalie Baracaldo Angel, Hayim Shaul | 2025-01-07 |
| 12149607 | Graph based embedding under fully homomorphic encryption | Allon Adir, Ramy Masalha, Eyal Kushnir, Ehud Aharoni, Nir Drucker +1 more | 2024-11-19 |
| 12041157 | Efficiently batching pre-encrypted data for homomorphic inference | Kanthi Sarpatwar, Roman Vaculin, Ehud Aharoni, James T. Rayfield | 2024-07-16 |
| 11947444 | Sharing insights between pre and post deployment to enhance cloud workload security | Fady Copty, Gilad Ezov, Ronen Levy | 2024-04-02 |
| 11928605 | Techniques for cyber-attack event log fabrication | Oleg Blinder, Nitzan Peleg | 2024-03-12 |
| 11882206 | Efficient convolution in an environment that enforces tiles | Ehud Aharoni, Allon Adir, Hayim Shaul, Gilad Ezov | 2024-01-23 |
| 11856083 | Analysis and debugging of fully-homomorphic encryption | Ehud Aharoni, Allon Adir, Gilad Ezov, Hayim Shaul | 2023-12-26 |
| 11841982 | Partitioning circuits for execution of sequential secure computation code on multiple processors | Hayim Shaul, Ehud Aharoni, Dov Murik, Gilad Ezov, Lev Greenberg +1 more | 2023-12-12 |
| 11741063 | Deleting and inserting rows in fully homomorphically encrypted databases using queues | Allon Adir, Michael Mirkin, Ramy Masalha | 2023-08-29 |
| 11704119 | Migrating infrastructure as code between different cloud providers | Fady Copty, Lev Greenberg, Dov Murik, Omer Y. Boehm | 2023-07-18 |
| 11550567 | User and entity behavior analytics of infrastructure as code in pre deployment of cloud infrastructure | Fady Copty, Lev Greenberg, Dov Murik | 2023-01-10 |
| 11528134 | Authentication using transformation verification | Ehud Aharoni, Allon Adir, Dov Murik, Ariel Farkash | 2022-12-13 |
| 11477007 | Packing arbitrary tensors into tiles with descriptive shapes | Ehud Aharoni, Allon Adir, Lev Greenberg, Gilad Ezov, Ramy Masalha | 2022-10-18 |
| 11424928 | Preventing malformed ciphertext attacks on privacy preserving biometric authentication | Ehud Aharoni, Ariel Farkash, Allon Adir | 2022-08-23 |
| 11418319 | Ensure valid range of values of a vector for distance calculations using homomorphic encryption or functional encryption | Ehud Aharoni, Allon Adir, Lev Greenberg, Ariel Farkash | 2022-08-16 |
| 11349859 | Method for privacy preserving anomaly detection in IoT | Allon Adir, Ehud Aharoni, Lev Greenberg | 2022-05-31 |
| 11201745 | Method and system for privacy preserving biometric authentication | Muhammad Barham, Ariel Farkash, Ron Shmelkin, Michael Vinov | 2021-12-14 |
| 11048729 | Cluster evaluation in unsupervised learning of continuous data | Lev Greenberg, Allon Adir | 2021-06-29 |
| 10885204 | Method and system for semantic preserving location encryption | Allon Adir, Lev Greenberg | 2021-01-05 |
| 10878071 | Biometric authentication anomaly detection | Allon Adir, Lev Greenberg | 2020-12-29 |