122 patents
Page 3 of 7
Utility
Mechanism for providing obfuscated code to web application clients
26 Jul 22
A method by one or more network devices for providing obfuscated code to web application clients.
Itsik Mantin
Filed: 1 Aug 19
Utility
Forced Identification with Automated Post Resubmission
21 Jul 22
A method by a web application layer proxy communicatively coupled between a client and an origin server for performing automated POST resubmission.
Daniel SPĂ…NG
Filed: 8 Mar 22
Utility
Dynamic Invocation of Partner Product Exit Routine In an Active Information Management System
30 Jun 22
A method in a mainframe computing system to invoke a partner product exit routine in an information management system while the information management system is in operation.
Scott HERONIMUS
Filed: 29 Dec 20
Utility
Dynamic Emotion Detection Based on User Inputs
30 Jun 22
A method by a network device for dynamically detecting emotional states of a user operating a client end station to interact with an application.
Aiah LERNER, Jonathan R. AZARIA, Matan LION
Filed: 29 Dec 20
Utility
Data Classification Technology
30 Jun 22
A method by one or more computing devices to classify data values into data types.
Itsik MANTIN
Filed: 29 Dec 20
Utility
Streaming-friendly Technology for Detection of Data
30 Jun 22
A method by a network device for detecting data in a data stream.
Itsik MANTIN
Filed: 20 Jan 22
Utility
Robust Learning of Web Traffic
30 Jun 22
A method includes monitoring web traffic until a threshold of network traffic is collected.
Itsik Mantin
Filed: 31 Dec 20
Utility
Batch Clustering of Online Attack Narratives for Botnet Detection
30 Jun 22
A method includes identifying, from online clustering data, an internet protocol (IP) pair.
Ori Nakar, Amit Leibovitz
Filed: 31 Dec 20
Utility
Using Access Logs for Network Entities Type Classification
23 Jun 22
A method by one or more electronic devices for detecting attacks on one or more databases.
Shiri MARGEL, Yury GEILER
Filed: 8 Mar 22
Utility
Infrastructure Distributed Denial of Service Protection
23 Jun 22
A method of providing infrastructure protection for a server of a network organization, the method including announcing, as an internet protocol (IP) address associated with a server of a plurality of servers, a first anycast IP address, the first anycast IP address being one of a plurality of anycast IP addresses that each serve as an anycast address for a scrubbing center network.
Dvir Shapira, Ehud Cohen, Tomer Bronshtein, Eyal Leshem, Alon Ludmer
Filed: 14 Mar 22
Utility
Infrastructure Distributed Denial of Service Protection
16 Jun 22
A method of providing infrastructure protection for a server of a network organization, the method including announcing, as an internet protocol (IP) address associated with a server of a plurality of servers, a first anycast IP address, the first anycast IP address being one of a plurality of anycast IP addresses that each serve as an anycast address for a network of edge servers.
Dvir Shapira, Ehud Cohen, Tomer Bronshtein, Eyal Leshem, Alon Ludmer
Filed: 3 Mar 22
Utility
Accelerating Dynamic Content Delivery In a Content Delivery Network
12 May 22
A technique for accelerating dynamic content delivery in a content delivery network.
David LEVY NAHUM
Filed: 20 Jan 22
Utility
Community-based data security
10 May 22
A method by one or more electronic devices implementing a system for providing community-based data security, where the system is communicatively coupled to a plurality of database security analyzers, where each of the plurality of database security analyzers is configured to analyze data accesses to one or more databases associated with that database security analyzer.
Doron Tzur, Shiri Margel, Itsik Mantin
Filed: 30 Apr 19
Utility
Dynamic aggregation of information based on web application layer requests
10 May 22
A method by a web application layer proxy for dynamically creating counters during runtime based on actual web application layer requests received by the web application layer proxy.
David Levy Nahum
Filed: 28 Aug 19
Utility
Generating collection rules based on security rules
10 May 22
A computing device is described that is coupled to a set of web application layer attack detectors (ADs), which are coupled between clients and web application servers.
Nadav Avital Arbel, Luda Lazar, Gilad Yehudai
Filed: 28 Dec 18
Utility
Aggregating Alerts of Malicious Events for Computer Security
17 Mar 22
A method by a computing device implementing an attack analyzer for processing malicious events.
Gilad Yehudai, Itsik Mantin, Lior Fisch, Shelly Hershkovitz, Amichai Shulman, Moran Rachel Ambar
Filed: 23 Nov 21
Utility
Infrastructure distributed denial of service protection
15 Mar 22
A method of providing infrastructure protection for a server of a network organization, the method including announcing an internet protocol (IP) address range associated with the network organization using a border gateway protocol (BGP) on an edge server of a distributed network of edge servers.
Dvir Shapira, Ehud Cohen, Tomer Bronshtein, Eyal Leshem, Alon Ludmer
Filed: 3 Apr 20
Utility
Infrastructure distributed denial of service protection
15 Mar 22
Dvir Shapira, Ehud Cohen, Tomer Bronshtein, Eyal Leshem, Alon Ludmer
Filed: 3 Apr 20
Utility
Streaming-friendly technology for detection of data
1 Mar 22
A method by a network device for detecting data in a data stream.
Itsik Mantin
Filed: 29 Dec 20
Utility
Accelerating dynamic content delivery in a content delivery network
1 Feb 22
A technique for accelerating dynamic content delivery in a content delivery network.
David Levy Nahum
Filed: 27 Jun 19