Micha Anthenor Benoliel
San Francisco, California, United States
16K followers
500+ connections
About
At age 8, Micha taught himself how to code on a flight simulator in Basic on a Zenith PC…
Articles by Micha Anthenor
Activity
-
I’ve been approached by generative AI founders who want to train models responsibly (i.e. without scraping), but who are being told by potential…
I’ve been approached by generative AI founders who want to train models responsibly (i.e. without scraping), but who are being told by potential…
Liked by Micha Anthenor Benoliel
-
Join us to discuss #Web3 marketing at #consensus in Austin on May 28 https://lu.ma/ye5eeuff with Enterprise Ethereum Alliance absolute labs and…
Join us to discuss #Web3 marketing at #consensus in Austin on May 28 https://lu.ma/ye5eeuff with Enterprise Ethereum Alliance absolute labs and…
Liked by Micha Anthenor Benoliel
-
"Risk-averse limited partners tend to gravitate to fund managers with a long track record, but are they missing out on potential upside by avoiding…
"Risk-averse limited partners tend to gravitate to fund managers with a long track record, but are they missing out on potential upside by avoiding…
Liked by Micha Anthenor Benoliel
Experience
Publications
-
Whisper Tracing Version 3 - An open and privacy first protocol for contact tracing
Abstract—This paper describes a novel protocol named Whis- per Tracing V.3 targeting mobile phones, and aimed at supporting contact tracing efforts in the context of a global pandemic. The Whisper protocol works by tracking contact events using Bluetooth Low Energy while enabling users to notify or be notified when contact was made with an infectious user. In its 3rd version, the protocol uses interactions IDs instead of infected random IDs, and it can be coupled with a decentralized…
Abstract—This paper describes a novel protocol named Whis- per Tracing V.3 targeting mobile phones, and aimed at supporting contact tracing efforts in the context of a global pandemic. The Whisper protocol works by tracking contact events using Bluetooth Low Energy while enabling users to notify or be notified when contact was made with an infectious user. In its 3rd version, the protocol uses interactions IDs instead of infected random IDs, and it can be coupled with a decentralized architecture leveraging IPFS and threads at the server level, for a better interoperability with other implementations of the protocol. Notifications of one’s infectious state are done by a user broadcasting its infected temporary IDs during one’s interaction so that contact tracing can be performed at the server level without impacting privacy or locally on all mobile devices, and without the need to exchange any personally identifiable information (PII).
Other authorsSee publication -
Whisper Tracing - An Open and Privacy First Protocol for Contact Tracing
-
This paper describes a novel protocol named Whis- per Tracing targeting mobile phones, aiming at supporting contact tracing effort in the context of a global pandemic. The whisper protocol works by tracking contact events while enabling users to notify or be notified when contact was made with an infectious user. We describe a way to locally generates anonymous and temporary secure identities and exchange them using a local area wireless interface such as Bluetooth Low Energy. Notifications of…
This paper describes a novel protocol named Whis- per Tracing targeting mobile phones, aiming at supporting contact tracing effort in the context of a global pandemic. The whisper protocol works by tracking contact events while enabling users to notify or be notified when contact was made with an infectious user. We describe a way to locally generates anonymous and temporary secure identities and exchange them using a local area wireless interface such as Bluetooth Low Energy. Notifications of one’s infectious state is done by broadcasting its infected temporary IDs so that contact tracing can be performed locally on all mobile devices without the need to exchange any personally identifiable information (PII).
Other authorsSee publication
Patents
-
Augmenting Reality by Capturing Signals Using Wireless Radios
Issued 2022/0375176
in one example, a method may include receiving a wireless signal from a device. The device may be within an environment. The method may also include identifying the device. The device may be identified based on at least one of data and metadata included in the wireless signal. In addition, the method may include determining alocation of the device within the environment. The location of the device within the environment may bedetermined based on the data included the wireless signal. Further…
in one example, a method may include receiving a wireless signal from a device. The device may be within an environment. The method may also include identifying the device. The device may be identified based on at least one of data and metadata included in the wireless signal. In addition, the method may include determining alocation of the device within the environment. The location of the device within the environment may bedetermined based on the data included the wireless signal. Further, the method may include displaying an augmented environment repre- sentative ofthe environment and a symbol representative of the devicewithin the augmented environment. The symbol may be displayed ni a location within the augmented envi- ronment corresponding to the location ofthe device within the environment.
Other inventors -
Secure Beacon Identity
Issued United States US20190357040A1
A method may include receiving a beacon from a first intermediate device via a first network, the beacon being received by the first intermediate device from an endpoint device via a second network. The beacon may include a hash value based at least in part on the identity of the endpoint device and a time unit when the beacon was generated. The hash value of the beacon may be validated based on the identity of the endpoint device and the time unit when the beacon was generated. The beacon may…
A method may include receiving a beacon from a first intermediate device via a first network, the beacon being received by the first intermediate device from an endpoint device via a second network. The beacon may include a hash value based at least in part on the identity of the endpoint device and a time unit when the beacon was generated. The hash value of the beacon may be validated based on the identity of the endpoint device and the time unit when the beacon was generated. The beacon may be forwarded to a server via a third network in response to the hash value of the beacon being valid.
-
Anonymization and randomization of Device Identities
Issued United States US20210058376
The present disclosure generally relates to security and privacy for communication between networked “smart” devices. In particular, the present disclosure describes secure and
private identification for networked devices.
In one non-limiting example, a method may include generating a unique identifier for an endpoint device. The unique identifier may be specific to the endpoint device and may be configured to identify the endpoint device with at least one semi-trusted party. The unique…The present disclosure generally relates to security and privacy for communication between networked “smart” devices. In particular, the present disclosure describes secure and
private identification for networked devices.
In one non-limiting example, a method may include generating a unique identifier for an endpoint device. The unique identifier may be specific to the endpoint device and may be configured to identify the endpoint device with at least one semi-trusted party. The unique identifier may be a hashed value based on both the endpoint device’s MAC address and an operator secret known to a network operator. The method may include sharing the unique identifier with another device.Other inventors -
Validation in a decentralized network
Issued United States US20200202376A1
A system may include processing logic configured to execute instructions to cause a system to perform operations including receiving, from an intermediate device, data that originated at an endpoint node. The data may be associated with metadata that was associated with the data by the intermediate device. The operations may also include extracting one or more items from the metadata. The operations may include validating an activity of the intermediate device based on the one or more items…
A system may include processing logic configured to execute instructions to cause a system to perform operations including receiving, from an intermediate device, data that originated at an endpoint node. The data may be associated with metadata that was associated with the data by the intermediate device. The operations may also include extracting one or more items from the metadata. The operations may include validating an activity of the intermediate device based on the one or more items that were extracted from the metadata.
Other inventorsSee patent -
Delay Tolerant Decentralized Network
Issued US16/003,024
A system may include processing logic configured to execute instructions to cause a system to perform operations including receiving a beacon from a first intermediate device via a first network. The operations may also include identifying a characteristic of the beacon. The operations may include identifying, based on the characteristic of the beacon, a server that is associated with the beacon. The operations may include sending a beacon message to the server via a third network.
-
Apparatus and method for messaging security and reliability
Issued United States PCT/US2015/043023
Secure messaging system wherein both the content and the metadata are protected from adversary attack. A message for an intended recipient is decrypted using the intended recipient's public key. The message is then sent to the intended recipient as well as to multitude of decoys. The decoys are real devices that are clustered with the intended recipient according to some method, such as logical or geographical method. The decoys are unable to decrypt the message with their private key and will…
Secure messaging system wherein both the content and the metadata are protected from adversary attack. A message for an intended recipient is decrypted using the intended recipient's public key. The message is then sent to the intended recipient as well as to multitude of decoys. The decoys are real devices that are clustered with the intended recipient according to some method, such as logical or geographical method. The decoys are unable to decrypt the message with their private key and will drop it. Only the intended recipient will be able to decrypt and read the message. Since the message is sent to many recipients (intended recipient and decoys), an adversary is unable to determine who is communicating with whom.
Other inventorsSee patent -
App Distribution Over The Air
Issued United States PCT/US2015/030878
A method and system for transferring apps between mobile devices without the need to download the app from an app store. Various examples are provided for discovering, authenticating and transmitting the apps among devices directly or via an access point. Even when no connection is available, examples are provided for establishing a mesh network and transferring the app using the mesh network. If not all devices have mesh networking capability, connection such as Bluetooth is used to distribute…
A method and system for transferring apps between mobile devices without the need to download the app from an app store. Various examples are provided for discovering, authenticating and transmitting the apps among devices directly or via an access point. Even when no connection is available, examples are provided for establishing a mesh network and transferring the app using the mesh network. If not all devices have mesh networking capability, connection such as Bluetooth is used to distribute the mesh network capability and then the mesh network is established.
Other inventorsSee patent -
System and method for access control via social networking
Issued United States PCT/US2015/024173
Systems and methods to grand network access to devices. When device attempts access via an access point, the AP initiates social network inquiry to determine whether to provide unrestricted access, restricted access or no access, depending on the social connection between the user and the AP owner. The social network inquiry may be performed by obtaining a social graph from services such as Facebook, Linkedln, etc. The social network inquiry may also be performed by interrogating a calendar, to…
Systems and methods to grand network access to devices. When device attempts access via an access point, the AP initiates social network inquiry to determine whether to provide unrestricted access, restricted access or no access, depending on the social connection between the user and the AP owner. The social network inquiry may be performed by obtaining a social graph from services such as Facebook, Linkedln, etc. The social network inquiry may also be performed by interrogating a calendar, to determine whether an appointment is indicated for the user associated with the device requesting the access and a user associated with the access point. The social network inquiry may also be performed by interrogating a database to determine whether a specific entry is present, e.g., whether a predetermined "like" is included in lists of "likes" in the Facebook account of the user associated with the device requesting the access.
Other inventorsSee patent -
System and method for improving webpage loading speeds
Issued United States PCT/US2015/023698
Speeding up webpage loading by utilizing one or a combination of the following techniques: heuristic pre-loading; increasing the number of connections to a server; resource caching; and, distributed DNS caching. A software module is inserted between the bowser and the server, so as to perform the heuristic preloading, to increase the number of connections, to perform wireless caching of resources and DNS query responses. The software module may be placed in various places in the technology…
Speeding up webpage loading by utilizing one or a combination of the following techniques: heuristic pre-loading; increasing the number of connections to a server; resource caching; and, distributed DNS caching. A software module is inserted between the bowser and the server, so as to perform the heuristic preloading, to increase the number of connections, to perform wireless caching of resources and DNS query responses. The software module may be placed in various places in the technology stack, for example, inside a home router or in a separate box connected to one's router. The module can insert itself by using proxy discovery protocols, or intercepting the traffic going to the router by issuing ARP replies that look as if it is the router. Alternatively, it could overwrite DHCP.
Other inventorsSee patent -
Passive social networking using location
Issued United States PCT/US2015/016965
A system and a method for collecting passively generated time-stamped location data from mobile devices and using this data to generate social network. The social network utilizes the data to determine a user's friends, family members, coworkers, and other associates. The system and a method improve social networking applications by automatically generating friend lists and user lists, and for automatically keeping these lists up to date. Further, the data can be used for social discovery…
A system and a method for collecting passively generated time-stamped location data from mobile devices and using this data to generate social network. The social network utilizes the data to determine a user's friends, family members, coworkers, and other associates. The system and a method improve social networking applications by automatically generating friend lists and user lists, and for automatically keeping these lists up to date. Further, the data can be used for social discovery, including dating, professional networking, and travel applications. The system and method further uses this data to determine a user's hobbies and interests. A recommendation engine may be used to generate recommendations for products, services, and businesses based on passive location data. A system and a method for an advertising system for products, services, and businesses based on passive location data are also disclosed.
Other inventorsSee patent -
Virtual channel joining
Issued United States US20140250204 A1
Methods for establishing connection to the Internet using multiple channels. A device takes advantage of several channels available to it internally and/or from neighboring devices to request the various resources of the webpage, and assembles the webpage using the resources arriving from the different channels. When a device has the ability to connect to the Internet using multiple internal channels, the device uses internal heuristics to request the webpage resources using these channels. A…
Methods for establishing connection to the Internet using multiple channels. A device takes advantage of several channels available to it internally and/or from neighboring devices to request the various resources of the webpage, and assembles the webpage using the resources arriving from the different channels. When a device has the ability to connect to the Internet using multiple internal channels, the device uses internal heuristics to request the webpage resources using these channels. A cloud exit server may be used to enhance security and to handle requests that may not be handled using multiple channels.
Other inventorsSee patent -
Exchanging energy credits wirelessly
Issued United States US20150230172 A1
A system and method for effectively “exchanging” battery power among physically distinct battery-powered devices communicating in a network for optimal conservation of aggregate battery power to preserve and extend the usable life of devices before requiring recharging. The network communication may be wired, wireless, or some combination; the devices may be mobile, fixed, or some combination. This invention improves Internet access where it already exists by making it faster, more reliable…
A system and method for effectively “exchanging” battery power among physically distinct battery-powered devices communicating in a network for optimal conservation of aggregate battery power to preserve and extend the usable life of devices before requiring recharging. The network communication may be wired, wireless, or some combination; the devices may be mobile, fixed, or some combination. This invention improves Internet access where it already exists by making it faster, more reliable, and less expensive. It can also be used to provide Internet service in places where there is none.
Other inventorsSee patent -
Discovering and connecting wireless devices without discoverability
Issued United States US9049537 B2
Pairing among computing devices is achieved without any of the device entering discoverable mode. An inquiring device obtains a list of MAC addresses and transmits connection requests using the MAC addresses. Any device within reception distance that has the same MAC address would respond to the request. Upon receiving the response, the two devices would pair up. A beacon may be used to store MAC addresses and related data. Computing devices may send inquiries to the beacon and receive in…
Pairing among computing devices is achieved without any of the device entering discoverable mode. An inquiring device obtains a list of MAC addresses and transmits connection requests using the MAC addresses. Any device within reception distance that has the same MAC address would respond to the request. Upon receiving the response, the two devices would pair up. A beacon may be used to store MAC addresses and related data. Computing devices may send inquiries to the beacon and receive in return MAC addresses corresponding to the inquiry. The devices may then transmit pairing requests using these MAC addresses.
Other inventorsSee patent
Honors & Awards
-
Enterprise Wearable of the Year 2020 | NODLE M1, Social Distancing & Contact Tracing Wearable
Juniper Research
-
Financial Times ArcelorMittal Boldness in Business Award for Best Technology of Year 2015
Financial Times, Arcelor Mittal
-
SXSW 2015 Interactive Innovation Award for Innovation in Connecting People with FireChat
SXSW
Languages
-
English
Native or bilingual proficiency
-
Spanish
Professional working proficiency
-
Italian
Native or bilingual proficiency
-
French
Native or bilingual proficiency
Recommendations received
6 people have recommended Micha Anthenor Join now to view
More activity by Micha Anthenor
I've been quiet the last few weeks, meeting with seasoned founders and looking into their projects. I've noticed some standout elements in these…
Liked by Micha Anthenor Benoliel
People also viewed
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore More