122 patents
Page 2 of 7
Utility
Dynamic emotion detection based on user inputs
28 Feb 23
A method by a network device for dynamically detecting emotional states of a user operating a client end station to interact with an application.
Aiah Lerner, Jonathan R. Azaria, Matan Lion
Filed: 29 Dec 20
Utility
Detecting behavioral anomalies in user-data access logs
28 Feb 23
A method by one or more computing devices for detecting application user anomalies in audit logs of database operations performed on one or more databases.
Itsik Mantin, Craig Burlingame, Brian Anderson, Kunal Anand, Ran Rosin, Peter Klimek, Joseph Moore
Filed: 26 Apr 21
Utility
Dynamic invocation of partner product exit routine in an active information management system
14 Feb 23
A method in a mainframe computing system to invoke a partner product exit routine in an information management system while the information management system is in operation.
Scott Heronimus
Filed: 29 Dec 20
Utility
Assessing Data Security of a Managed Database Deployed In the Cloud Using a Secured Sandbox Environment
26 Jan 23
A method performed by a cloud computing platform of a cloud service is disclosed to assess a data security of a database deployed in a cloud environment associated with a user of the cloud service.
Gabriel BEYO, Tal SHABI, Eytan Shalom NAIM, Elad EREZ, James Arthur BURTOFT, Paul AIUTO
Filed: 22 Jul 22
Utility
Detecting attacks on databases based on transaction characteristics determined from analyzing database logs
27 Dec 22
A method by a security system implemented by one or more electronic for detecting attacks on one or more databases.
Shiri Margel, Itsik Mantin, Guy Shtar, Yury Geiler
Filed: 10 Sep 20
Utility
Techniques for securely detecting compromises of enterprise end stations utilizing tunnel tokens
20 Dec 22
A method in a cloud network to detect compromises within an enterprise network based on tokens tunneled outside of the enterprise network to the cloud network.
Amichai Shulman, Sagie Dulce, Daniella Goihman-Shuster, Shahar Ben-Hador
Filed: 30 Dec 19
Utility
Infrastructure distributed denial of service protection
20 Dec 22
A method of providing infrastructure protection for a network that includes IP addresses as low as a single IP address.
Dvir Shapira, Ehud Cohen, Tomer Bronshtein, Eyal Leshem, Alon Ludmer
Filed: 22 Jan 20
Utility
Application Programming Interface (Api) and Site Discovery Via Request Similarity
3 Nov 22
A method performed by one or more computing devices to discover endpoints of a web service.
Jonathan R. AZARIA, Ori NAKAR, Matan LION
Filed: 29 Apr 22
Utility
Method for Generating a Human Likeness Score
3 Nov 22
A method for determining whether a user is a human is disclosed.
Tyler James PAXTON, Reid Michael TATORIS, Benjamin TRENDA, Elvis JAKUPOVIC, Steven P. BURKETT, Adam Michael JANOWER
Filed: 23 Jun 22
Utility
Predictive activation of security rules to protect web application servers against web application layer attacks
25 Oct 22
A method by a web application layer proxy for predictively activating security rules to protect one or more web application servers from attacks by one or more web application clients.
Itsik Mantin, Ori Or-Meir
Filed: 30 Dec 19
Utility
Identifying and classifying community attacks
11 Oct 22
A method by one or more electronic devices for identifying and classifying community attacks.
Shiri Margel, Amit Leibovitz
Filed: 30 Dec 19
Utility
Data leakage prevention over application programming interface
4 Oct 22
A method by a network device for assigning data types to data values included in application programming interface (API) responses sent by an API server to one or more API clients via an API.
Itsik Mantin, Avidan Reich
Filed: 30 Dec 20
Utility
Capturing contextual information for data accesses to improve data security
4 Oct 22
A method by one or more runtime agents protecting a web application for capturing contextual information for data accesses.
Kunal Anand, Brian Anderson, Joe Moore, Ran Rosin, Itsik Mantin, Peter Klimek, Craig Burlingame
Filed: 30 Dec 19
Utility
Chunk-scanning of web application layer requests to reduce delays
27 Sep 22
A method by a web application layer attack detector communicatively coupled between web application clients and web application servers.
Boris Zingerman, Uri Shapen
Filed: 18 Jan 19
Utility
Data based web application firewall
6 Sep 22
A method for protecting information from databases includes a web application firewall and a database activity monitor.
Shiri Margel, Itsik Mantin, Amichai Shulman, Daniella Goihman-Shuster
Filed: 17 Apr 19
Utility
Delegating Multi-factor Authentication In Legacy Databases
25 Aug 22
Embodiments of the present disclosure relate to utilizing an existing login process of a data repository to enable the data repository to delegate MFA functionality to an external MFA system.
Ron Ben-Natan, Gabriel Beyo, Rosa Miroshnikov, Ury Segal
Filed: 22 Feb 22
Utility
System and Method for Policy Control In Databases
25 Aug 22
Embodiments of the present disclosure relate to generating a high level security policy for a data repository without knowledge of the access control, entitlement, and other models of the data repository.
Ron Ben-Natan, Gabriel Beyo, Rosa Miroshnikov, Ury Segal
Filed: 22 Feb 21
Utility
Method for generating a human likeness score
23 Aug 22
One embodiment of the invention is a method utilizing a CAPTCHA to generate a human likeness score including blocks: a) receiving a user solution to the CAPTCHA; b) receiving a user interaction pattern descriptive of an interaction undertaken by the user, through a graphical interface of the CAPTCHA, to achieve the user solution; c) determining the accuracy of the user solution; d) comparing the user interaction pattern against an interaction model generated from interaction patterns of previous users; e) calculating the human likeness score based upon the determination of block c) and the comparison of block d), wherein the human likeness score lies within a continuum of human likeness scores.
Tyler James Paxton, Reid Michael Tatoris, Benjamin Trenda, Elvis Jakupovic, Steven P. Burkett, Adam Michael Janower
Filed: 6 Feb 20
Utility
Monitoring and preventing use of weak cryptographic logic
2 Aug 22
A runtime application self protection (RASP) plug-in monitors for, and prevents, invocation of unacceptably weak cryptographic processing requested by an application.
Kunal Anand
Filed: 17 Oct 19
Utility
Inline anomaly detection for multi-request operations
2 Aug 22
A method is described for a proxy to mitigate attacks from web application clients based on context of web application layer requests.
Jonathan R. Azaria, Ori Or-Meir, Nadav Avital, Amir Shladovsky, Ben Herzberg
Filed: 30 Dec 19