64 patents
Utility
Deploying a Program from Within an Active Cics Region
6 Jul 23
Embodiments of the present disclosure relate to systems and methods for installing a program within a CICS region without an antecedent program.
Scott Heronimus
Filed: 14 Dec 22
Utility
Client-side Firewall
6 Jul 23
A method by a service worker firewall middleware component is disclosed.
Ron MASAS
Filed: 30 Dec 21
Utility
Api User Tracking Via Token to Api Key Mapping
6 Jul 23
Embodiments of the present disclosure relate to tracking a user’s activity using a mapping of their API key to a token.
Jonathan Roy Azaria, Tzlelponit Itzhak, Matan Lion
Filed: 2 Dec 22
Utility
Determining the Technical Maturity of a System User to Use As a Risk Indicator When Auditing System Activity
18 May 23
A method by one or more computing devices to detect anomalous accesses to a system.
James Arthur BURTOFT
Filed: 18 Nov 21
Utility
Attack Categorization Based on Machine Learning Feature Contribution
11 May 23
According to some embodiments of the disclosure, a method includes receiving an electronic communication directed to a data resource, determining, by a machine learning (ML) web application firewall (WAF), an attack probability of the electronic communication based on a plurality of features, wherein subsets of the plurality of features are arranged in a plurality of feature groups, adjusting the attack probability based on respective feature weights of the plurality of feature groups.
Ori Nakar, Nadav Avital, Aiah Lerner
Filed: 9 Nov 21
Utility
Securing Data Lakes Via Object Store Monitoring
11 May 23
Embodiments of the present disclosure provide a method for detecting security incidents in an object store by aggregating log files generated by a monitoring program of the object store and monitoring the aggregated log data.
Ori Nakar
Filed: 10 Nov 21
Utility
Layer 7 Network Attack Detection Using Machine Learning Feature Contribution
4 May 23
Embodiments of the present disclosure relate to detecting new attack vectors in web application servers based on analyzing requests (e.g., HTTP/S requests) that were flagged as attacks by a machine learning web application firewall (ML WAF) but not by a rule-based WAF.
Ori Nakar, Jonathan Roy Azaria
Filed: 1 Nov 21
Utility
Waiting Room with Zero Latency
6 Apr 23
A method by one or more computing devices functioning as a ticket master for a website that has a virtual waiting room, wherein the ticket master is communicatively coupled to a plurality of proxies controlling access to the website.
Oren BREZNER, Nir GABAY, Ortal HASID, Shlomit ABERGEL
Filed: 6 Oct 21
Utility
Assessing Data Security of a Managed Database Deployed In the Cloud Using a Secured Sandbox Environment
26 Jan 23
A method performed by a cloud computing platform of a cloud service is disclosed to assess a data security of a database deployed in a cloud environment associated with a user of the cloud service.
Gabriel BEYO, Tal SHABI, Eytan Shalom NAIM, Elad EREZ, James Arthur BURTOFT, Paul AIUTO
Filed: 22 Jul 22
Utility
Method for Generating a Human Likeness Score
3 Nov 22
A method for determining whether a user is a human is disclosed.
Tyler James PAXTON, Reid Michael TATORIS, Benjamin TRENDA, Elvis JAKUPOVIC, Steven P. BURKETT, Adam Michael JANOWER
Filed: 23 Jun 22
Utility
Application Programming Interface (Api) and Site Discovery Via Request Similarity
3 Nov 22
A method performed by one or more computing devices to discover endpoints of a web service.
Jonathan R. AZARIA, Ori NAKAR, Matan LION
Filed: 29 Apr 22
Utility
Delegating Multi-factor Authentication In Legacy Databases
25 Aug 22
Embodiments of the present disclosure relate to utilizing an existing login process of a data repository to enable the data repository to delegate MFA functionality to an external MFA system.
Ron Ben-Natan, Gabriel Beyo, Rosa Miroshnikov, Ury Segal
Filed: 22 Feb 22
Utility
System and Method for Policy Control In Databases
25 Aug 22
Embodiments of the present disclosure relate to generating a high level security policy for a data repository without knowledge of the access control, entitlement, and other models of the data repository.
Ron Ben-Natan, Gabriel Beyo, Rosa Miroshnikov, Ury Segal
Filed: 22 Feb 21
Utility
Forced Identification with Automated Post Resubmission
21 Jul 22
A method by a web application layer proxy communicatively coupled between a client and an origin server for performing automated POST resubmission.
Daniel SPĂ…NG
Filed: 8 Mar 22
Utility
Dynamic Invocation of Partner Product Exit Routine In an Active Information Management System
30 Jun 22
A method in a mainframe computing system to invoke a partner product exit routine in an information management system while the information management system is in operation.
Scott HERONIMUS
Filed: 29 Dec 20
Utility
Dynamic Emotion Detection Based on User Inputs
30 Jun 22
A method by a network device for dynamically detecting emotional states of a user operating a client end station to interact with an application.
Aiah LERNER, Jonathan R. AZARIA, Matan LION
Filed: 29 Dec 20
Utility
Data Classification Technology
30 Jun 22
A method by one or more computing devices to classify data values into data types.
Itsik MANTIN
Filed: 29 Dec 20
Utility
Streaming-friendly Technology for Detection of Data
30 Jun 22
A method by a network device for detecting data in a data stream.
Itsik MANTIN
Filed: 20 Jan 22
Utility
Robust Learning of Web Traffic
30 Jun 22
A method includes monitoring web traffic until a threshold of network traffic is collected.
Itsik Mantin
Filed: 31 Dec 20
Utility
Batch Clustering of Online Attack Narratives for Botnet Detection
30 Jun 22
A method includes identifying, from online clustering data, an internet protocol (IP) pair.
Ori Nakar, Amit Leibovitz
Filed: 31 Dec 20