-
公开(公告)号:US20230216657A1
公开(公告)日:2023-07-06
申请号:US17569672
申请日:2022-01-06
发明人: Ehud Aharoni , OMRI SOCEANU , Allon Adir , GILAD EZOV , Hayim Shaul
CPC分类号: H04L9/008 , G06F9/3887
摘要: In response to identifying that a Single Instruction, Multiple Data (SIMD) operation has been instructed to be performed or has been performed by a Fully-Homomorphic Encryption (FHE) software on one or more original ciphertexts, performing the following steps: Performing the same operation on one or more original plaintexts, respectively, that are each a decrypted version of one of the one or more original ciphertexts. Decrypting a ciphertext resulting from the operation performed on the one or more original ciphertexts. Comparing the decrypted ciphertext with a plaintext resulting from the same operation performed on the one or more original plaintexts. Based on said comparison, performing at least one of: (a) determining an amount of noise caused by the operation, (b) determining whether unencrypted data underlying the one or more original ciphertexts has become corrupt by the operation, and (c) determining correctness of an algorithm which includes the operation.
-
公开(公告)号:US20230053311A1
公开(公告)日:2023-02-16
申请号:US17402569
申请日:2021-08-15
发明人: Ehud Aharoni , Omri Soceanu , Allon Adir , Hayim Shaul , Gilad Ezov
摘要: A method comprising: receiving an input tensor having a shape defined by [n1, ...,nk], where k is equal to a number of dimensions that characterize the input tensor; receiving tile tensor metadata comprising: a tile tensor shape defined by [t1, ..., tk], and information indicative of an interleaving stride to be applied with respect to each dimension of the tile tensor; constructing an output tensor comprising a plurality of the tile tensors, by applying a packing algorithm which maps each element of the input tensor to at least one slot location of one of the plurality of tile tensors, based on the tile tensor shape and the interleaving stride, wherein the interleaving stride results in non-contiguous mapping of the elements of the input tensor, such that each of the tile tensors includes a subset of the elements of the input tensor which are spaced within the input tensor according to the interleaving stride.
-
公开(公告)号:US11528134B2
公开(公告)日:2022-12-13
申请号:US16828294
申请日:2020-03-24
发明人: Ehud Aharoni , Allon Adir , Dov Murik , Ariel Farkash , Omri Soceanu
摘要: An example system includes a processor to receive, at a setup or sign-up, a first cipher including a biometric template transformed using a first transformation and encrypted using a secret key, a second cipher including a security vector encrypted using the secret key, a third cipher including the biometric template transformed using a second transformation and encrypted, and a fourth cipher including an encrypted second security vector. The processor can receive, at a runtime or sign-in, a fifth cipher and a sixth cipher. The processor can verify that the fifth cipher includes a second biometric template transformed using the first transformation and encrypted using the secret key and that the sixth cipher includes the second biometric template transformed using the second transformation by testing a format attribute of the transformation functions using comparisons of inner products. The processor can authenticate a user based on the Euclidean distance between the first cipher and the sixth cipher not exceeding a threshold in response to detecting that the transformations are verified.
-
公开(公告)号:US11176206B2
公开(公告)日:2021-11-16
申请号:US14955361
申请日:2015-12-01
发明人: Allon Adir , Ehud Aharoni , Oded Margalit
IPC分类号: G06N20/00 , G06N5/04 , G06F16/906 , G06F16/28
摘要: Incremental generation of models with dynamic clustering. A first set of data is received. A first set of clusters based on the first set of data is generated. A respective first set of models for the first set of clusters is created. A second set of data is received. A second set of clusters, based on the second set of data and based on a subset of the first set of data, is generated. A respective second set of models for the second set of clusters, based on a subset of the first set of models and based on the second set of data, is created.
-
公开(公告)号:US20210306147A1
公开(公告)日:2021-09-30
申请号:US16828294
申请日:2020-03-24
发明人: Ehud Aharoni , Allon Adir , Dov Murik , Ariel Farkash , Omri Soceanu
摘要: An example system includes a processor to receive, at a setup or sign-up, a first cipher including a biometric template transformed using a first transformation and encrypted using a secret key, a second cipher including a security vector encrypted using the secret key, a third cipher including the biometric template transformed using a second transformation and encrypted, and a fourth cipher including an encrypted second security vector. The processor can receive, at a runtime or sign-in, a fifth cipher and a sixth cipher. The processor can verify that the fifth cipher includes a second biometric template transformed using the first transformation and encrypted using the secret key and that the sixth cipher includes the second biometric template transformed using the second transformation by testing a format attribute of the transformation functions using comparisons of inner products. The processor can authenticate a user based on the Euclidean distance between the first cipher and the sixth cipher not exceeding a threshold in response to detecting that the transformations are verified.
-
公开(公告)号:US20210160264A1
公开(公告)日:2021-05-27
申请号:US16695251
申请日:2019-11-26
发明人: ALLON ADIR , Ehud Aharoni , LEV GREENBERG , OMRI SOCEANU
IPC分类号: H04L29/06
摘要: Embodiments may provide techniques to detect cyber-security events in IoT data traffic that provide improved detection accuracy and preservation of privacy. For example, in an embodiment, a method may be implemented in a computer comprising a processor, memory accessible by the processor, and computer program instructions stored in the memory and executable by the processor, the method may comprise collecting a plurality of messages to and from at least one device, extracting metadata features from the collected plurality of messages, generating a time window, determining additional features based on the extracted metadata features present during the time window, detecting behavioral patterns of the at least one device based on the collected plurality of messages, clustering the determined additional features and the detected behavioral patterns present during the time window, and detecting at least one anomaly or type of anomaly using the clustered determined additional features and the detected behavioral patterns.
-
公开(公告)号:US10091925B2
公开(公告)日:2018-10-09
申请号:US14964288
申请日:2015-12-09
发明人: Ehud Aharoni , Upendra D. Chitnis , Levente Klein , Yehuda Naveh
IPC分类号: A01B79/00
摘要: Techniques for using a scaling relationship between crop drymass and elevation at a farm level to redistribute crop yield data are provided. In one aspect, a method for analyzing crop yield is provided. The method includes the steps of: obtaining crop yield data for a farm; cleansing the crop yield data using a data filter(s), wherein one or more data points are eliminated from the crop yield data by the data filter; and redistributing a value of the data points eliminated from the crop yield data to data points remaining in the crop yield data to create a crop yield distribution for the farm.
-
公开(公告)号:US20170295189A1
公开(公告)日:2017-10-12
申请号:US15095177
申请日:2016-04-11
发明人: ALLON ADIR , Ehud Aharoni , Lev Greenberg , Oded Margalit , Rosa Miroshnikov , Oded Sofer , Boris Rozenberg
摘要: Embodiments of the present invention may provide the capability to identify security breaches in computer systems from clustering properties of clusters generated based on monitored behavior of users of the computer systems by using techniques that provide improved performance and reduced resource requirements. For example, behavior of users or resources may be monitored and analyzed to generate clusters and train clustering models. Labeling information relating to some user or resource may be received. When users or resources are clustered and when a cluster contains some labeled users/resources then an anomaly score can be determined for a user/resource belonging to the cluster. A user or resource may be detected to be an outlier of at least one cluster to which the user or resource has been assigned, and an alert indicating detection of the outlier may be generated.
-
公开(公告)号:US20170164556A1
公开(公告)日:2017-06-15
申请号:US14964288
申请日:2015-12-09
发明人: Ehud Aharoni , Upendra D. Chitnis , Levente Klein , Yehuda Naveh
IPC分类号: A01D41/127 , G01C9/02
CPC分类号: A01B79/005 , G06Q50/02
摘要: Techniques for using a scaling relationship between crop drymass and elevation at a farm level to redistribute crop yield data are provided. In one aspect, a method for analyzing crop yield is provided. The method includes the steps of: obtaining crop yield data for a farm; cleansing the crop yield data using a data filter(s), wherein one or more data points are eliminated from the crop yield data by the data filter; and redistributing a value of the data points eliminated from the crop yield data to data points remaining in the crop yield data to create a crop yield distribution for the farm.
-
公开(公告)号:US09158585B2
公开(公告)日:2015-10-13
申请号:US14093092
申请日:2013-11-29
CPC分类号: G06F9/50 , G06F3/0611 , G06F9/46 , G06F9/5038 , G06Q10/103
摘要: A computer program product comprising: a non-transitory computer readable medium; and a description of a first block comprising: a definition of one or more output port groups each comprising one or more output ports; a definition of two or more input ports, the input ports receive object streams of identical length; one or more instructions for processing input data received in the input ports and for outputting processed data in the output port groups, wherein the instructions are operative to output a same number of output objects to each output port in a same output port group, whereby the output ports of the output port group are operative to output objects stream of identical length, and wherein the instructions are operative to receive a same number of input objects from each input port, whereby the input ports are operative to receive object streams of identical length; and an indication of whether there is a constant ratio between a number of items in input streams received by the first block and a number of items in output streams outputted by the first block; and wherein said description of a first block is stored on said non-transitory computer readable medium.
摘要翻译: 一种计算机程序产品,包括:非暂时性计算机可读介质; 以及对第一块的描述,包括:一个或多个输出端口组的定义,每个输出端口组包括一个或多个输出端口; 两个或多个输入端口的定义,输入端口接收相同长度的对象流; 用于处理在输入端口中接收的输入数据并输出输出端口组中的处理数据的一个或多个指令,其中所述指令可操作以将相同数量的输出对象输出到同一输出端口组中的每个输出端口,由此, 输出端口组的输出端口可操作以输出相同长度的对象流,并且其中该指令可操作以从每个输入端口接收相同数量的输入对象,由此输入端口可操作以接收相同长度的对象流; 以及指示由第一块接收的输入流中的多个项目与由第一块输出的输出流中的项目数之间是否恒定的比率; 并且其中所述第一块的描述被存储在所述非暂时性计算机可读介质上。
-
-
-
-
-
-
-
-
-