Patents by Inventor Gil BARAK

Gil BARAK has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11976949
    Abstract: Actuators for rotating an optical-path-folding-element with two, first and second, degrees of freedom in an extended rotation range around two respective rotation axes, folded cameras including such actuators and dual-cameras including a folded camera as above together with an upright camera.
    Type: Grant
    Filed: November 15, 2023
    Date of Patent: May 7, 2024
    Assignee: Corephotonics Lid.
    Inventors: Itay Yedid, Ephraim Goldenberg, Gil Bachar, Gal Barak, Yiftah Kowal
  • Publication number: 20240085216
    Abstract: Actuators for rotating an optical-path-folding-element with two, first and second, degrees of freedom in an extended rotation range around two respective rotation axes, folded cameras including such actuators and dual-cameras including a folded camera as above together with an upright camera.
    Type: Application
    Filed: November 15, 2023
    Publication date: March 14, 2024
    Inventors: Itay Yedid, Ephraim Goldenberg, Gil Bachar, Gal Barak, Yiftah Kowal
  • Publication number: 20220092183
    Abstract: A computerized method for logical identification of malicious threats across a plurality of end-point devices (EPD) communicatively connected by a network, comprising collecting over the network an identifier associated with each file of a plurality of files, wherein each file of the plurality of files is installed on at least one of the plurality of EPDs and wherein the identifier is the same for each like file of the plurality of file. Information associated with an identified subset of files is collected, wherein the information indicates at least a time at which the at least one file was installed on one or more of the plurality of EPDs and the way the at least one file spread within the network. The collected information is analyzed according to a set of predetermined computerized investigation rules. The analysis is used to determine whether at least a file of the identified subset files is a suspicious file.
    Type: Application
    Filed: December 3, 2021
    Publication date: March 24, 2022
    Inventor: Gil Barak
  • Patent number: 11194909
    Abstract: A computerized method for logical identification of malicious threats across a plurality of end-point devices (EPD) communicatively connected by a network, comprising collecting over the network an identifier associated with each file of a plurality of files, wherein each file of the plurality of files is installed on at least one of the plurality of EPDs and wherein the identifier is the same for each like file of the plurality of file. Information associated with an identified subset of files is collected, wherein the information indicates at least a time at which the at least one file was installed on one or more of the plurality of EPDs and the way the at least one file spread within the network. The collected information is analyzed according to a set of predetermined computerized investigation rules. The analysis is used to determine whether at least a file of the identified subset files is a suspicious file.
    Type: Grant
    Filed: June 21, 2018
    Date of Patent: December 7, 2021
    Assignee: Palo Alto Networks, Inc.
    Inventor: Gil Barak
  • Patent number: 11100241
    Abstract: To prevent ransomware from encrypting data elements stored in a memory of a computer-based system, the system identifies at least one identifier associated with a data element. The identifiers indicate an attribute(s) of the corresponding data element within the memory. The system then determines an optimal number of virtual traps for the data elements respective of at least one identifier. The system then determines an optimal position for each virtual trap corresponding to the at least one identifier. The system then positions the virtual traps at the determined position within the memory. The system monitors the data elements stored in the memory in order to identify whether changes have occurred, and determines respectively updated optimal number and positions of virtual traps.
    Type: Grant
    Filed: November 27, 2019
    Date of Patent: August 24, 2021
    Assignee: Palo Alto Networks, Inc.
    Inventor: Gil Barak
  • Publication number: 20200193041
    Abstract: To prevent ransomware from encrypting data elements stored in a memory of a computer-based system, the system identifies at least one identifier associated with a data element. The identifiers indicate an attribute(s) of the corresponding data element within the memory. The system then determines an optimal number of virtual traps for the data elements respective of at least one identifier. The system then determines an optimal position for each virtual trap corresponding to the at least one identifier. The system then positions the virtual traps at the determined position within the memory. The system monitors the data elements stored in the memory in order to identify whether changes have occurred, and determines respectively updated optimal number and positions of virtual traps.
    Type: Application
    Filed: November 27, 2019
    Publication date: June 18, 2020
    Inventor: Gil Barak
  • Patent number: 10652274
    Abstract: A system is connected to a plurality of user devices coupled to an enterprise's network. The system continuously collects, stores, and analyzes forensic data related to the enterprise's network. Based on the analysis, the system is able to determine normal behavior of the network and portions thereof and thereby identify abnormal behaviors within the network. Upon identification of an abnormal behavior, the system determines whether the abnormal behavior relates to a security incident. Upon determining a security incident in any portion of the enterprise's network, the system extracts forensic data respective of the security incident and enables further assessment of the security incident as well as identification of the source of the security incident. The system provides real-time damage assessment respective of the security incident as well as the security incident's attributions.
    Type: Grant
    Filed: April 22, 2019
    Date of Patent: May 12, 2020
    Assignee: PALO ALTO NETWORKS, INC.
    Inventors: Gil Barak, Shai Morag
  • Patent number: 10616245
    Abstract: For remediation of security incidents occurring in a network, forensic data which is collected from devices connected to a network is analyzed. A security incident is detected based on the analysis of the forensic data. Based on detecting the security incident, a source which is affected by the security data is identified based, at least in part, on attributes of the forensic data. The affected source is isolated from the network. Information about the affected source in association with an indication of the security incident and an indication of the isolating is stored.
    Type: Grant
    Filed: November 25, 2015
    Date of Patent: April 7, 2020
    Assignee: Palo Alto Networks, Inc.
    Inventors: Gil Barak, Shai Morag
  • Patent number: 10554672
    Abstract: Processes in a network which cause and are attributable to security incidents are identified. Processes which are initiated on devices in an enterprise network at boot of the devices are identified. The enterprise network is continuously monitored to collect data about processes which were initiated or spawned on devices in the enterprise network after the boot of the devices. Each process is determined to be a major system process, a minor system process, or a non-system process based, at least in part, on the collected data which indicates associations among the processes. Based on matching a security incident alert to a first of the processes, it is determined whether the first process is a non-system process to validate the security incident alert.
    Type: Grant
    Filed: January 4, 2017
    Date of Patent: February 4, 2020
    Assignee: PALO ALTO NETWORKS INC.
    Inventor: Gil Barak
  • Patent number: 10496836
    Abstract: A computerized method for preventing ransomware from encrypting data elements stored in a memory of a computer-based system, the method comprising identifying at least one identifier for a data element, wherein the at least one identifier indicates at least a position of the data element within the memory. An optimal number of virtual traps is determined for the data element corresponding to the at least one identifier. An optimal position for each of the virtual traps is determined corresponding to the at least one identifier. The virtual traps are send to the determined optimal position within the memory.
    Type: Grant
    Filed: April 20, 2017
    Date of Patent: December 3, 2019
    Assignee: Palo Alto Networks, Inc.
    Inventor: Gil Barak
  • Patent number: 10423789
    Abstract: A computerized method for identification of suspicious processes executing on an end-point device communicatively connected to network, the network communicatively connected to a server, the method comprising receiving, by the server, a record of at least one process, initiated by and executing on by the end-point device. One or more parameters associated with the at least one process are identified. A first time pointer is identified corresponding to the identified one or more parameters, a first time pointer. A second time pointer at which a user associated with the end-point device initiated a user dependent process is identified. Whether the second time pointer occurred before the first time pointer is identified. It is determined whether the at least one process was initiated by the user based on identification of user dependent processes and corresponding attribution. An action is performed based on the above determination.
    Type: Grant
    Filed: April 3, 2017
    Date of Patent: September 24, 2019
    Assignee: Palo Alto Networks, Inc.
    Inventor: Gil Barak
  • Publication number: 20190253437
    Abstract: A system is connected to a plurality of user devices coupled to an enterprise's network. The system continuously collects, stores, and analyzes forensic data related to the enterprise's network. Based on the analysis, the system is able to determine normal behavior of the network and portions thereof and thereby identify abnormal behaviors within the network. Upon identification of an abnormal behavior, the system determines whether the abnormal behavior relates to a security incident. Upon determining a security incident in any portion of the enterprise's network, the system extracts forensic data respective of the security incident and enables further assessment of the security incident as well as identification of the source of the security incident. The system provides real-time damage assessment respective of the security incident as well as the security incident's attributions.
    Type: Application
    Filed: April 22, 2019
    Publication date: August 15, 2019
    Inventors: Gil Barak, Shai Morag
  • Patent number: 10360381
    Abstract: A system is used for detection of advanced persistent and non-persistent threats in a computerized environment. The system collects data about at least a first event associated with a process of an operating system of one of a plurality of devices connected to a network. The system identifies threads which attribute to the first event. The system generates a causality chain for the first event, where the causality chain comprises the threads which attribute to the first event in chronological order of spawning. The system determines whether a main thread corresponding to the first process can be identified based, at least in part, on the causality chain. Based on determining that the main thread corresponding to the first process cannot be identified, the system determines that the process is malicious.
    Type: Grant
    Filed: January 12, 2017
    Date of Patent: July 23, 2019
    Assignee: Palo Alto Networks, Inc.
    Inventor: Gil Barak
  • Patent number: 10270805
    Abstract: A system is connected to a plurality of user devices coupled to an enterprise's network. The system continuously collects, stores, and analyzes forensic data related to the enterprise's network. Based on the analysis, the system is able to determine normal behavior of the network and portions thereof and thereby identify abnormal behaviors within the network. Upon identification of an abnormal behavior, the system determines whether the abnormal behavior relates to a security incident. Upon determining a security incident in any portion of the enterprise's network, the system extracts forensic data respective of the security incident and enables further assessment of the security incident as well as identification of the source of the security incident. The system provides real-time damage assessment respective of the security incident as well as the security incident's attributions.
    Type: Grant
    Filed: December 12, 2017
    Date of Patent: April 23, 2019
    Assignee: CYBER SECDO LTD.
    Inventors: Gil Barak, Shai Morag
  • Publication number: 20180373870
    Abstract: A computerized method for logical identification of malicious threats across a plurality of end-point devices (EPD) communicatively connected by a network, comprising collecting over the network an identifier associated with each file of a plurality of files, wherein each file of the plurality of files is installed on at least one of the plurality of EPDs and wherein the identifier is the same for each like file of the plurality of file. Information associated with an identified subset of files is collected, wherein the information indicates at least a time at which the at least one file was installed on one or more of the plurality of EPDs and the way the at least one file spread within the network. The collected information is analyzed according to a set of predetermined computerized investigation rules. The analysis is used to determine whether at least a file of the identified subset files is a suspicious file.
    Type: Application
    Filed: June 21, 2018
    Publication date: December 27, 2018
    Applicant: CYBER SECDO LTD.
    Inventor: Gil BARAK
  • Publication number: 20180115564
    Abstract: A system is connected to a plurality of user devices coupled to an enterprise's network. The system continuously collects, stores, and analyzes forensic data related to the enterprise's network. Based on the analysis, the system is able to determine normal behavior of the network and portions thereof and thereby identify abnormal behaviors within the network. Upon identification of an abnormal behavior, the system determines whether the abnormal behavior relates to a security incident. Upon determining a security incident in any portion of the enterprise's network, the system extracts forensic data respective of the security incident and enables further assessment of the security incident as well as identification of the source of the security incident. The system provides real-time damage assessment respective of the security incident as well as the security incident's attributions.
    Type: Application
    Filed: December 12, 2017
    Publication date: April 26, 2018
    Applicant: CYBER SECDO LTD.
    Inventors: Gil BARAK, Shai MORAG
  • Patent number: 9888031
    Abstract: A system is connected to a plurality of user devices coupled to an enterprise's network. The system continuously collects, stores, and analyzes forensic data related to the enterprise's network. Based on the analysis, the system is able to determine normal behavior of the network and portions thereof and thereby identify abnormal behaviors within the network. Upon identification of an abnormal behavior, the system determines whether the abnormal behavior relates to a security incident. Upon determining a security incident in any portion of the enterprise's network, the system extracts forensic data respective of the security incident and enables further assessment of the security incident as well as identification of the source of the security incident. The system provides real-time damage assessment respective of the security incident as well as the security incident's attributions.
    Type: Grant
    Filed: November 18, 2015
    Date of Patent: February 6, 2018
    Assignee: CYBER SECDO LTD.
    Inventors: Gil Barak, Shai Morag
  • Publication number: 20170308711
    Abstract: A computerized method for preventing ransomware from encrypting data elements stored in a memory of a computer-based system, the method comprising identifying at least one identifier for a data element, wherein the at least one identifier indicates at least a position of the data element within the memory. An optimal number of virtual traps is determined for the data element corresponding to the at least one identifier. An optimal position for each of the virtual traps is determined corresponding to the at least one identifier. The virtual traps are send to the determined optimal position within the memory.
    Type: Application
    Filed: April 20, 2017
    Publication date: October 26, 2017
    Applicant: CYBER SECDO LTD.
    Inventor: Gil BARAK
  • Publication number: 20170286683
    Abstract: A computerized method for identification of suspicious processes executing on an end-point device communicatively connected to network, the network communicatively connected to a server, the method comprising receiving, by the server, a record of at least one process, initiated by and executing on by the end-point device. One or more parameters associated with the at least one process are identified. A first time pointer is identified corresponding to the identified one or more parameters, a first time pointer. A second time pointer at which a user associated with the end-point device initiated a user dependent process is identified. Whether the second time pointer occurred before the first time pointer is identified. It is determined whether the at least one process was initiated by the user based on identification of user dependent processes and corresponding attribution. An action is performed based on the above determination.
    Type: Application
    Filed: April 3, 2017
    Publication date: October 5, 2017
    Applicant: CYBER SECDO LTD.
    Inventor: Gil BARAK
  • Publication number: 20170206358
    Abstract: A system is used for detection of advanced persistent and non-persistent threats in a computerized environment. The system is connected to a plurality of user devices coupled to an enterprise's network. The system receives via an interface an electronic notification of at least one event in the operating system of the computer. The system then analyzes the at least one event. The system then generates a causality chain for the at least one event respective of the analysis. The causality chain comprises all the threads that attributed to the at least one event in a chronological order. The system then identifies a main thread that started the causality chain that led to the at least one event. Then, the system determines whether the main thread is associated with malicious software. Upon determination that the main thread is associated with malicious software, the causality chain is marked as infected.
    Type: Application
    Filed: January 12, 2017
    Publication date: July 20, 2017
    Applicant: CYBER SECDO LTD.
    Inventor: Gil BARAK