Nimrod Vered

Nimrod Vered

Seattle, Washington, United States
7K followers 500+ connections

About

As a technology executive, I specialize in scaling engineering organizations that deliver…

Experience

  • Syndio Graphic

    Syndio

    Greater Seattle Area

  • -

    Greater Seattle Area

  • -

    Greater Seattle Area

  • -

    Greater Seattle Area

  • -

  • -

    Greater Seattle Area

  • -

    Greater Seattle Area

  • -

    Greater Seattle Area

  • -

    Greater Seattle Area

  • -

    Greater Seattle Area

  • -

  • -

    Greater Seattle Area

  • -

    Greater Seattle Area

  • -

    Greater Seattle Area

  • -

    Greater Seattle Area

  • -

    Greater Seattle Area

  • -

    Israel

  • -

    Israel

  • -

    Israel

  • -

    Israel

  • -

    Israel

  • -

    Israel

  • -

    Israel

  • -

    Israel

Education

Volunteer Experience

  • hashtag-leadership Graphic

    Co Editor

    hashtag-leadership

    - Present 3 years 9 months

    Science and Technology

  • Co-Chairman

    Israeli-American Council (IAC) Seattle

    - 2 years 1 month

    Education

    http://www.israeliamerican.org/seattle

  • Israeli-American Civic Education Institute Graphic

    National Board Member

    Israeli-American Civic Education Institute

    - 1 year 1 month

    Civil Rights and Social Action

Publications

  • Malicious mobile code runtime monitoring system and methods

    US Patent Office

    Protection systems and methods provide for protecting one or more personal computers (“PCs”) and/or other intermittently or persistently network accessible devices or processes from undesirable or otherwise malicious operations of Java TN applets, ActiveX™ controls, JavaScript™ scripts, Visual Basic scripts, add-ins, downloaded/uploaded programs or other “Downloadables” or “mobile code” in whole or part. A protection engine embodiment provides, within a server, firewall or other suitable…

    Protection systems and methods provide for protecting one or more personal computers (“PCs”) and/or other intermittently or persistently network accessible devices or processes from undesirable or otherwise malicious operations of Java TN applets, ActiveX™ controls, JavaScript™ scripts, Visual Basic scripts, add-ins, downloaded/uploaded programs or other “Downloadables” or “mobile code” in whole or part. A protection engine embodiment provides, within a server, firewall or other suitable “recommunicator,” for monitoring information received by the communicator, determining whether received information does or is likely to include executable code, and if so, causes mobile protection code (MPC) to be transferred to and rendered operable within a destination device of the received information, more suitably by forming a protection agent including the MPC, protection policies and a detected-Downloadable. An MPC embodiment further provides, within a Downloadable-destination, for initiating the Downloadable, enabling malicious Downloadable operation attempts to be received by the MPC, and causing (predetermined) corresponding operations to be executed in response to the attempts, more suitably in conjunction with protection policies.

    Other authors
    See publication
  • One time passwords with IPSEC and IKE version 1 authentication

    US Patent Office

    A system adapted to condition access to a network over an IPsec session to clients providing a proper one-time-password, even though the network access control uses IKEv1, which does not support one-time-passwords. An authentication service receives from a client an access request including the one-time-password, and provides the one-time-password to a service that checks the password. The one-time-password service returns a cookie when the password is successfully validated and the client is…

    A system adapted to condition access to a network over an IPsec session to clients providing a proper one-time-password, even though the network access control uses IKEv1, which does not support one-time-passwords. An authentication service receives from a client an access request including the one-time-password, and provides the one-time-password to a service that checks the password. The one-time-password service returns a cookie when the password is successfully validated and the client is properly authenticated. The cookie is passed on to the client computer, which uses the cookie as part of a request for a certificate. A certificate authority generates a certificate if a request for a certificate is received from an authenticated client, which in turn may be used to form the IPsec session for access to the network.

    Other authors
    See publication
  • Malicious mobile code runtime monitoring system and methods

    US Patent Office

    Protection systems and methods provide for protecting one or more personal computers (“PCs”) and/or other intermittently or persistently network accessible devices or processes from undesirable or otherwise malicious operations of Java™ applets, ActiveX™ controls, JavaScript™ scripts, Visual Basic scripts, add-ins, downloaded/uploaded programs or other “Downloadables” or “mobile code” in whole or part. A protection engine embodiment provides, within a server, firewall or other suitable…

    Protection systems and methods provide for protecting one or more personal computers (“PCs”) and/or other intermittently or persistently network accessible devices or processes from undesirable or otherwise malicious operations of Java™ applets, ActiveX™ controls, JavaScript™ scripts, Visual Basic scripts, add-ins, downloaded/uploaded programs or other “Downloadables” or “mobile code” in whole or part. A protection engine embodiment provides, within a server, firewall or other suitable “re-communicator,” for monitoring information received by the communicator, determining whether received information does or is likely to include executable code, and if so, causes mobile protection code (MPC) to be transferred to and rendered operable within a destination device of the received information, more suitably by forming a protection agent including the MPC, protection policies and a detected-Downloadable. An MPC embodiment further provides, within a Downloadable-destination, for initiating the Downloadable, enabling malicious Downloadable operation attempts to be received by the MPC, and causing (predetermined) corresponding operations to be executed in response to the attempts, more suitably in conjunction with protection policies.

    Other authors
    See publication
  • Method and system for protecting a computer and a network from hostile downloadables

    US Patent Office

    Protection systems and methods provide for protecting one or more personal computers (“PCs”) and/or other intermittently or persistently network accessible devices or processes from undesirable or otherwise malicious operations of Java™ applets, ActiveX™ controls, JavaScript™ scripts, Visual Basic scripts, add-ins, downloaded/uploaded programs or other “Downloadables” or “mobile code” in whole or part. A protection engine embodiment provides, within a server, firewall or other suitable…

    Protection systems and methods provide for protecting one or more personal computers (“PCs”) and/or other intermittently or persistently network accessible devices or processes from undesirable or otherwise malicious operations of Java™ applets, ActiveX™ controls, JavaScript™ scripts, Visual Basic scripts, add-ins, downloaded/uploaded programs or other “Downloadables” or “mobile code” in whole or part. A protection engine embodiment provides, within a server, firewall or other suitable “re-communicator,” for monitoring information received by the communicator, determining whether received information does or is likely to include executable code, and if so, causes mobile protection code (MPC) to be transferred to and rendered operable within a destination device of the received information, more suitably by forming a protection agent including the MPC, protection policies and a detected-Downloadable. An MPC embodiment further provides, within a Downloadable-destination, for initiating the Downloadable, enabling malicious Downloadable operation attempts to be received by the MPC, and causing (predetermined) corresponding operations to be executed in response to the attempts, more suitably in conjunction with protection policies.

    Other authors
    See publication
  • Malicious mobile code runtime monitoring system and methods

    US Patent Office

    Protection systems and methods provide for protecting one or more personal computers (“PCs”) and/or other intermittently or persistently network accessible devices or processes from undesirable or otherwise malicious operations of Java™ applets, ActiveX™ controls, JavaScript™ scripts, Visual Basic scripts, add-ins, downloaded/uploaded programs or other “Downloadables” or “mobile code” in whole or part. A protection engine embodiment provides, within a server, firewall or other suitable…

    Protection systems and methods provide for protecting one or more personal computers (“PCs”) and/or other intermittently or persistently network accessible devices or processes from undesirable or otherwise malicious operations of Java™ applets, ActiveX™ controls, JavaScript™ scripts, Visual Basic scripts, add-ins, downloaded/uploaded programs or other “Downloadables” or “mobile code” in whole or part. A protection engine embodiment provides, within a server, firewall or other suitable “re-communicator,” for monitoring information received by the communicator, determining whether received information does or is likely to include executable code, and if so, causes mobile protection code (MPC) to be transferred to and rendered operable within a destination device of the received information, more suitably by forming a protection agent including the MPC, protection policies and a detected-Downloadable. An MPC embodiment further provides, within a Downloadable-destination, for initiating the Downloadable, enabling malicious Downloadable operation attempts to be received by the MPC, and causing (predetermined) corresponding operations to be executed in response to the attempts, more suitably in conjunction with protection policies.

    Other authors
    See publication
  • Method for serving IP users by graphically-based interaction to agents of a call center

    US Patent Office

    Method and apparatus for connecting Internet or IP users to agents of a call center, which may be linked to an Internet web site. Visual information about quality of service, available agents, and history of previous connections, is transferred to the IP user via the IP network prior to voice call establishment, and a voice call is established according to inputs from the IP user which are responsive to the transferred information.

    Other authors
    See publication

Patents

  • Visual IVR/Contact Center Queue Patent

    Issued US 6,826,194

    Method and apparatus for connecting Internet or IP users to agents of a call center, which may be linked to an Internet web site. Visual information about quality of service, available agents, and history of previous connections, is transferred to the IP user via the IP network prior to voice call establishment, and a voice call is established according to inputs from the IP user which are responsive to the transferred information.

    Other inventors
    See patent

View Nimrod’s full profile

  • See who you know in common
  • Get introduced
  • Contact Nimrod directly
Join to view full profile

Other similar profiles

Explore top content on LinkedIn

Find curated posts and insights for relevant topics all in one place.

View top content

Others named Nimrod Vered

1 other named Nimrod Vered is on LinkedIn

See others named Nimrod Vered