Micha Anthenor Benoliel

Micha Anthenor Benoliel

San Francisco, California, United States
16K followers 500+ connections

About

At age 8, Micha taught himself how to code on a flight simulator in Basic on a Zenith PC…

Articles by Micha Anthenor

Activity

Join now to see all activity

Experience

Publications

  • Whisper Tracing Version 3 - An open and privacy first protocol for contact tracing

    Abstract—This paper describes a novel protocol named Whis- per Tracing V.3 targeting mobile phones, and aimed at supporting contact tracing efforts in the context of a global pandemic. The Whisper protocol works by tracking contact events using Bluetooth Low Energy while enabling users to notify or be notified when contact was made with an infectious user. In its 3rd version, the protocol uses interactions IDs instead of infected random IDs, and it can be coupled with a decentralized…

    Abstract—This paper describes a novel protocol named Whis- per Tracing V.3 targeting mobile phones, and aimed at supporting contact tracing efforts in the context of a global pandemic. The Whisper protocol works by tracking contact events using Bluetooth Low Energy while enabling users to notify or be notified when contact was made with an infectious user. In its 3rd version, the protocol uses interactions IDs instead of infected random IDs, and it can be coupled with a decentralized architecture leveraging IPFS and threads at the server level, for a better interoperability with other implementations of the protocol. Notifications of one’s infectious state are done by a user broadcasting its infected temporary IDs during one’s interaction so that contact tracing can be performed at the server level without impacting privacy or locally on all mobile devices, and without the need to exchange any personally identifiable information (PII).

    Other authors
    See publication
  • Whisper Tracing - An Open and Privacy First Protocol for Contact Tracing

    -

    This paper describes a novel protocol named Whis- per Tracing targeting mobile phones, aiming at supporting contact tracing effort in the context of a global pandemic. The whisper protocol works by tracking contact events while enabling users to notify or be notified when contact was made with an infectious user. We describe a way to locally generates anonymous and temporary secure identities and exchange them using a local area wireless interface such as Bluetooth Low Energy. Notifications of…

    This paper describes a novel protocol named Whis- per Tracing targeting mobile phones, aiming at supporting contact tracing effort in the context of a global pandemic. The whisper protocol works by tracking contact events while enabling users to notify or be notified when contact was made with an infectious user. We describe a way to locally generates anonymous and temporary secure identities and exchange them using a local area wireless interface such as Bluetooth Low Energy. Notifications of one’s infectious state is done by broadcasting its infected temporary IDs so that contact tracing can be performed locally on all mobile devices without the need to exchange any personally identifiable information (PII).

    Other authors
    See publication

Patents

  • Augmenting Reality by Capturing Signals Using Wireless Radios

    Issued 2022/0375176

    in one example, a method may include receiving a wireless signal from a device. The device may be within an environment. The method may also include identifying the device. The device may be identified based on at least one of data and metadata included in the wireless signal. In addition, the method may include determining alocation of the device within the environment. The location of the device within the environment may bedetermined based on the data included the wireless signal. Further…

    in one example, a method may include receiving a wireless signal from a device. The device may be within an environment. The method may also include identifying the device. The device may be identified based on at least one of data and metadata included in the wireless signal. In addition, the method may include determining alocation of the device within the environment. The location of the device within the environment may bedetermined based on the data included the wireless signal. Further, the method may include displaying an augmented environment repre- sentative ofthe environment and a symbol representative of the devicewithin the augmented environment. The symbol may be displayed ni a location within the augmented envi- ronment corresponding to the location ofthe device within the environment.

    Other inventors
  • Secure Beacon Identity

    Issued United States US20190357040A1

    A method may include receiving a beacon from a first intermediate device via a first network, the beacon being received by the first intermediate device from an endpoint device via a second network. The beacon may include a hash value based at least in part on the identity of the endpoint device and a time unit when the beacon was generated. The hash value of the beacon may be validated based on the identity of the endpoint device and the time unit when the beacon was generated. The beacon may…

    A method may include receiving a beacon from a first intermediate device via a first network, the beacon being received by the first intermediate device from an endpoint device via a second network. The beacon may include a hash value based at least in part on the identity of the endpoint device and a time unit when the beacon was generated. The hash value of the beacon may be validated based on the identity of the endpoint device and the time unit when the beacon was generated. The beacon may be forwarded to a server via a third network in response to the hash value of the beacon being valid.

    See patent
  • Anonymization and randomization of Device Identities

    Issued United States US20210058376

    The present disclosure generally relates to security and privacy for communication between networked “smart” devices. In particular, the present disclosure describes secure and
    private identification for networked devices.
    In one non-limiting example, a method may include generating a unique identifier for an endpoint device. The unique identifier may be specific to the endpoint device and may be configured to identify the endpoint device with at least one semi-trusted party. The unique…

    The present disclosure generally relates to security and privacy for communication between networked “smart” devices. In particular, the present disclosure describes secure and
    private identification for networked devices.
    In one non-limiting example, a method may include generating a unique identifier for an endpoint device. The unique identifier may be specific to the endpoint device and may be configured to identify the endpoint device with at least one semi-trusted party. The unique identifier may be a hashed value based on both the endpoint device’s MAC address and an operator secret known to a network operator. The method may include sharing the unique identifier with another device.

    Other inventors
  • Validation in a decentralized network

    Issued United States US20200202376A1

    A system may include processing logic configured to execute instructions to cause a system to perform operations including receiving, from an intermediate device, data that originated at an endpoint node. The data may be associated with metadata that was associated with the data by the intermediate device. The operations may also include extracting one or more items from the metadata. The operations may include validating an activity of the intermediate device based on the one or more items…

    A system may include processing logic configured to execute instructions to cause a system to perform operations including receiving, from an intermediate device, data that originated at an endpoint node. The data may be associated with metadata that was associated with the data by the intermediate device. The operations may also include extracting one or more items from the metadata. The operations may include validating an activity of the intermediate device based on the one or more items that were extracted from the metadata.

    Other inventors
    See patent
  • Delay Tolerant Decentralized Network

    Issued US16/003,024

    A system may include processing logic configured to execute instructions to cause a system to perform operations including receiving a beacon from a first intermediate device via a first network. The operations may also include identifying a characteristic of the beacon. The operations may include identifying, based on the characteristic of the beacon, a server that is associated with the beacon. The operations may include sending a beacon message to the server via a third network.

    See patent
  • Apparatus and method for messaging security and reliability

    Issued United States PCT/US2015/043023

    Secure messaging system wherein both the content and the metadata are protected from adversary attack. A message for an intended recipient is decrypted using the intended recipient's public key. The message is then sent to the intended recipient as well as to multitude of decoys. The decoys are real devices that are clustered with the intended recipient according to some method, such as logical or geographical method. The decoys are unable to decrypt the message with their private key and will…

    Secure messaging system wherein both the content and the metadata are protected from adversary attack. A message for an intended recipient is decrypted using the intended recipient's public key. The message is then sent to the intended recipient as well as to multitude of decoys. The decoys are real devices that are clustered with the intended recipient according to some method, such as logical or geographical method. The decoys are unable to decrypt the message with their private key and will drop it. Only the intended recipient will be able to decrypt and read the message. Since the message is sent to many recipients (intended recipient and decoys), an adversary is unable to determine who is communicating with whom.

    Other inventors
    See patent
  • App Distribution Over The Air

    Issued United States PCT/US2015/030878

    A method and system for transferring apps between mobile devices without the need to download the app from an app store. Various examples are provided for discovering, authenticating and transmitting the apps among devices directly or via an access point. Even when no connection is available, examples are provided for establishing a mesh network and transferring the app using the mesh network. If not all devices have mesh networking capability, connection such as Bluetooth is used to distribute…

    A method and system for transferring apps between mobile devices without the need to download the app from an app store. Various examples are provided for discovering, authenticating and transmitting the apps among devices directly or via an access point. Even when no connection is available, examples are provided for establishing a mesh network and transferring the app using the mesh network. If not all devices have mesh networking capability, connection such as Bluetooth is used to distribute the mesh network capability and then the mesh network is established.

    Other inventors
    See patent
  • System and method for access control via social networking

    Issued United States PCT/US2015/024173

    Systems and methods to grand network access to devices. When device attempts access via an access point, the AP initiates social network inquiry to determine whether to provide unrestricted access, restricted access or no access, depending on the social connection between the user and the AP owner. The social network inquiry may be performed by obtaining a social graph from services such as Facebook, Linkedln, etc. The social network inquiry may also be performed by interrogating a calendar, to…

    Systems and methods to grand network access to devices. When device attempts access via an access point, the AP initiates social network inquiry to determine whether to provide unrestricted access, restricted access or no access, depending on the social connection between the user and the AP owner. The social network inquiry may be performed by obtaining a social graph from services such as Facebook, Linkedln, etc. The social network inquiry may also be performed by interrogating a calendar, to determine whether an appointment is indicated for the user associated with the device requesting the access and a user associated with the access point. The social network inquiry may also be performed by interrogating a database to determine whether a specific entry is present, e.g., whether a predetermined "like" is included in lists of "likes" in the Facebook account of the user associated with the device requesting the access.

    Other inventors
    See patent
  • System and method for improving webpage loading speeds

    Issued United States PCT/US2015/023698

    Speeding up webpage loading by utilizing one or a combination of the following techniques: heuristic pre-loading; increasing the number of connections to a server; resource caching; and, distributed DNS caching. A software module is inserted between the bowser and the server, so as to perform the heuristic preloading, to increase the number of connections, to perform wireless caching of resources and DNS query responses. The software module may be placed in various places in the technology…

    Speeding up webpage loading by utilizing one or a combination of the following techniques: heuristic pre-loading; increasing the number of connections to a server; resource caching; and, distributed DNS caching. A software module is inserted between the bowser and the server, so as to perform the heuristic preloading, to increase the number of connections, to perform wireless caching of resources and DNS query responses. The software module may be placed in various places in the technology stack, for example, inside a home router or in a separate box connected to one's router. The module can insert itself by using proxy discovery protocols, or intercepting the traffic going to the router by issuing ARP replies that look as if it is the router. Alternatively, it could overwrite DHCP.

    Other inventors
    See patent
  • Passive social networking using location

    Issued United States PCT/US2015/016965

    A system and a method for collecting passively generated time-stamped location data from mobile devices and using this data to generate social network. The social network utilizes the data to determine a user's friends, family members, coworkers, and other associates. The system and a method improve social networking applications by automatically generating friend lists and user lists, and for automatically keeping these lists up to date. Further, the data can be used for social discovery…

    A system and a method for collecting passively generated time-stamped location data from mobile devices and using this data to generate social network. The social network utilizes the data to determine a user's friends, family members, coworkers, and other associates. The system and a method improve social networking applications by automatically generating friend lists and user lists, and for automatically keeping these lists up to date. Further, the data can be used for social discovery, including dating, professional networking, and travel applications. The system and method further uses this data to determine a user's hobbies and interests. A recommendation engine may be used to generate recommendations for products, services, and businesses based on passive location data. A system and a method for an advertising system for products, services, and businesses based on passive location data are also disclosed.

    Other inventors
    See patent
  • Virtual channel joining

    Issued United States US20140250204 A1

    Methods for establishing connection to the Internet using multiple channels. A device takes advantage of several channels available to it internally and/or from neighboring devices to request the various resources of the webpage, and assembles the webpage using the resources arriving from the different channels. When a device has the ability to connect to the Internet using multiple internal channels, the device uses internal heuristics to request the webpage resources using these channels. A…

    Methods for establishing connection to the Internet using multiple channels. A device takes advantage of several channels available to it internally and/or from neighboring devices to request the various resources of the webpage, and assembles the webpage using the resources arriving from the different channels. When a device has the ability to connect to the Internet using multiple internal channels, the device uses internal heuristics to request the webpage resources using these channels. A cloud exit server may be used to enhance security and to handle requests that may not be handled using multiple channels.

    Other inventors
    See patent
  • Exchanging energy credits wirelessly

    Issued United States US20150230172 A1

    A system and method for effectively “exchanging” battery power among physically distinct battery-powered devices communicating in a network for optimal conservation of aggregate battery power to preserve and extend the usable life of devices before requiring recharging. The network communication may be wired, wireless, or some combination; the devices may be mobile, fixed, or some combination. This invention improves Internet access where it already exists by making it faster, more reliable…

    A system and method for effectively “exchanging” battery power among physically distinct battery-powered devices communicating in a network for optimal conservation of aggregate battery power to preserve and extend the usable life of devices before requiring recharging. The network communication may be wired, wireless, or some combination; the devices may be mobile, fixed, or some combination. This invention improves Internet access where it already exists by making it faster, more reliable, and less expensive. It can also be used to provide Internet service in places where there is none.

    Other inventors
    See patent
  • Discovering and connecting wireless devices without discoverability

    Issued United States US9049537 B2

    Pairing among computing devices is achieved without any of the device entering discoverable mode. An inquiring device obtains a list of MAC addresses and transmits connection requests using the MAC addresses. Any device within reception distance that has the same MAC address would respond to the request. Upon receiving the response, the two devices would pair up. A beacon may be used to store MAC addresses and related data. Computing devices may send inquiries to the beacon and receive in…

    Pairing among computing devices is achieved without any of the device entering discoverable mode. An inquiring device obtains a list of MAC addresses and transmits connection requests using the MAC addresses. Any device within reception distance that has the same MAC address would respond to the request. Upon receiving the response, the two devices would pair up. A beacon may be used to store MAC addresses and related data. Computing devices may send inquiries to the beacon and receive in return MAC addresses corresponding to the inquiry. The devices may then transmit pairing requests using these MAC addresses.

    Other inventors
    See patent

Honors & Awards

  • Enterprise Wearable of the Year 2020 | NODLE M1, Social Distancing & Contact Tracing Wearable

    Juniper Research

    Enterprise Wearable Device of the Year
    Platinum Winner: Nodle M1 smart wearable

    This category recognizes the most impactful technology products and services operating across numerous areas, including: Automotive; Devices; Energy; IoT; Smart Cities and Smart Homes. Juniper Research has identified the following organizations below that are driving innovation and growth.

  • Financial Times ArcelorMittal Boldness in Business Award for Best Technology of Year 2015

    Financial Times, Arcelor Mittal

    In this volatile and unpredictable environment, the need for business to be bold has never been greater: the need for managers to think and plan beyond the short term; the need for workforces to embrace change; the need for companies, large and small, to consider how to build sustainable enterprises in a world where competition is tougher than ever. This is the context for the FT ArcelorMittal Boldness in Business Awards. Since their inception, the awards have established themselves as the…

    In this volatile and unpredictable environment, the need for business to be bold has never been greater: the need for managers to think and plan beyond the short term; the need for workforces to embrace change; the need for companies, large and small, to consider how to build sustainable enterprises in a world where competition is tougher than ever. This is the context for the FT ArcelorMittal Boldness in Business Awards. Since their inception, the awards have established themselves as the premier accolades in their category, thanks to their global reach and the impressive credentials of our eight-member judging panel.

  • SXSW 2015 Interactive Innovation Award for Innovation in Connecting People with FireChat

    SXSW

    Previously called the Interactive Awards, the SXSW Interactive Innovation Awards showcase the evolving and broadening scope of the digital industry by reflecting the increasingly multifaceted and diverse ecosystem of platforms, software, apps and devices.

    “We’re ecstatic that FireChat was chosen for such a respected award at this year’s festival,” said Micha Benoliel, cofounder and CEO. “Our mission is to connect people around the world. The recognition from this team of judges and our…

    Previously called the Interactive Awards, the SXSW Interactive Innovation Awards showcase the evolving and broadening scope of the digital industry by reflecting the increasingly multifaceted and diverse ecosystem of platforms, software, apps and devices.

    “We’re ecstatic that FireChat was chosen for such a respected award at this year’s festival,” said Micha Benoliel, cofounder and CEO. “Our mission is to connect people around the world. The recognition from this team of judges and our peers is wonderful and exciting for our team as we continue our efforts.”

Languages

  • English

    Native or bilingual proficiency

  • Spanish

    Professional working proficiency

  • Italian

    Native or bilingual proficiency

  • French

    Native or bilingual proficiency

Recommendations received

6 people have recommended Micha Anthenor Join now to view

View Micha Anthenor’s full profile

  • See who you know in common
  • Get introduced
  • Contact Micha Anthenor directly
Join to view full profile

People also viewed

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More

Add new skills with these courses