Patents by Inventor Imri Goldberg
Imri Goldberg has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20190311117Abstract: A computer implemented method of detecting execution of unregistered code in a protected networked system, comprising maintaining a pages registry record in a storage of an endpoint in a protected networked system, the pages registry record comprising a registration signature for each of a plurality of registered executable pages, monitoring a plurality of executable pages at a page management level using an adjusted page fault handler of an operating system kernel executed by one or more processors of the endpoint, detecting one or more unregistered executable pages by identifying incompliance of a runtime signature calculated in runtime for the unregistered executable page(s) with respective registration signature stored in the pages registry record and initiating one or more actions in case of the detection of the unregistered executable page(s).Type: ApplicationFiled: June 14, 2017Publication date: October 10, 2019Applicant: Cymmetria, Inc.Inventors: Dean SYSMAN, Imri GOLDBERG, Itamar SHER, Jonathan PERRY, Shmuel UR
-
Patent number: 10270807Abstract: A computer implemented method of detecting unauthorized access to a protected network by monitoring a dynamically updated deception environment, comprising launching, on one or more decoy endpoints, one or more decoy operating system (OS) managing one or more of a plurality of deception applications mapping a plurality of applications executed in a protected network, updating dynamically a usage indication for a plurality of deception data objects deployed in the protected network to emulate usage of the plurality of deception data objects for accessing the deception application(s) wherein the plurality of deception data objects are configured to trigger an interaction with the deception application(s) when used, detecting usage of data contained in the deception data object(s) by monitoring the interaction and identifying one or more potential unauthorized operations based on analysis of the detection.Type: GrantFiled: July 20, 2016Date of Patent: April 23, 2019Assignee: Cymmetria, Inc.Inventors: Dean Sysman, Gadi Evron, Imri Goldberg, Ran Harel, Shmuel Ur
-
Patent number: 10235470Abstract: Systems and methods are described for performing a travel search and presenting search results to a user. A computing device may retrieve multiple travel documents and analyze the travel documents to identify points of interest. The computing device may analyze the subset of the travel documents that have points of interest or significant information regarding points of interest. The computing device is configured to calculate a POI relevance score based on text associated with the identified POIs. The POI relevance score indicates how likely the text is relevant to a travel search and rank the subset of the travel documents based on the POI relevance score.Type: GrantFiled: December 5, 2014Date of Patent: March 19, 2019Assignee: HERE Global B.V.Inventors: Nadav Gur, Stephen Young, Ofer Melnik, Imri Goldberg
-
Publication number: 20180309787Abstract: A computer implemented method of detecting unauthorized access to a protected network by detecting a usage of dynamically updated deception communication, comprising deploying, in a protected network, a plurality of decoy endpoints configured to transmit one or more communication deception data objects encoded according to one or more communication protocols used in the protected network, instructing a first decoy endpoint of the plurality of decoy endpoints to transmit the communication deception data object(s) to a second decoy endpoint of the plurality of decoy endpoints, monitoring the protected network to detect a usage of data contained in the one or more communication deception data object, detecting one or more potential unauthorized operations based on analysis of the detection and initiating one or more actions according to the detection.Type: ApplicationFiled: July 31, 2017Publication date: October 25, 2018Inventors: Gadi EVRON, Dean SYSMAN, Imri GOLDBERG, Shmuel UR, Itamar SHER
-
Publication number: 20180212995Abstract: A computer implemented method of detecting unauthorized access to a protected network by monitoring a dynamically updated deception environment, comprising launching, on one or more decoy endpoints, one or more decoy operating system (OS) managing one or more of a plurality of deception applications mapping a plurality of applications executed in a protected network, updating dynamically a usage indication for a plurality of deception data objects deployed in the protected network to emulate usage of the plurality of deception data objects for accessing the deception application(s) wherein the plurality of deception data objects are configured to trigger an interaction with the deception application(s) when used, detecting usage of data contained in the deception data object(s) by monitoring the interaction and identifying one or more potential unauthorized operations based on analysis of the detection.Type: ApplicationFiled: July 20, 2016Publication date: July 26, 2018Applicant: Cymmetria , Inc.Inventors: Dean SYSMAN, Gadi EVRON, Imri GOLDBERG, Ran HAREL, Shmuel UR
-
Publication number: 20170359376Abstract: A method for deploying threat specific deception campaigns for updating a score given to a malicious activity threat by performing an analysis of processes executed by computing nodes of a monitored computer network. When an analysis outcome is indicative of a malicious activity threat to the monitored computer network from process(es) executed on one or more of the computing node(s): setting a score to the malicious activity threat according to potential damage characteristic(s) of the malicious activity threat when the score is above a first threshold launch a threat specific deception campaign by using at least one deception application executed by the computing node(s) for gathering additional data and updating the score according to an analysis of the additional data, and when the score/updated score is above a second threshold generate instructions for alerting an operator and/or reacting to the malicious activity on the at computing node(s).Type: ApplicationFiled: June 14, 2017Publication date: December 14, 2017Inventors: Gadi EVRON, Dean Sysman, Imri Goldberg, Shmuel Ur
-
Patent number: 9836511Abstract: A computer-automated method and system of providing a searchable knowledge base with decision-relevant attributes (including some subjective or sentiment-based attributes) for a plurality of individual items within a choice set are described. First, information (including texts) relevant to the plurality of individual items in the choice set is harvested from Internet sources. Next, normalized representations of statements are extracted from excerpts of the harvested texts that pertain to attributes of interest for the choice set, and corresponding scores for the attributes are derived from each of the normalized representations. The scores derived from the various harvested sources are aggregated for each attribute of each item. Finally, the knowledge base of the plurality of individual topics is generated.Type: GrantFiled: September 10, 2015Date of Patent: December 5, 2017Assignee: SRI INTERNATIONALInventors: Nadav Gur, David Israel, Imri Goldberg
-
Publication number: 20170134423Abstract: A computer implemented method of detecting unauthorized access to a protected network by monitoring a dynamically updated deception environment, comprising launching, on one or more decoy endpoints, one or more decoy operating system (OS) managing one or more of a plurality of deception applications mapping a plurality of applications executed in a protected network, updating dynamically a usage indication for a plurality of deception data objects deployed in the protected network to emulate usage of the plurality of deception data objects for accessing the deception application(s) wherein the plurality of deception data objects are configured to trigger an interaction with the deception application(s) when used, detecting usage of data contained in the deception data object(s) by monitoring the interaction and identifying one or more potential unauthorized operations based on analysis of the detection.Type: ApplicationFiled: January 25, 2017Publication date: May 11, 2017Inventors: Dean Sysman, Gadi Evron, Imri Goldberg, Itamar Sher, Shmuel Ur
-
Patent number: 9600228Abstract: A system and method for static query generation and input, comprising a set of auto-complete and auto-suggest rules, based on a template derived from at least one of an initial user input and context, is used to elicit a more complete query from said user, said auto-complete and auto-suggest values being offered in the form of widgets that offer a visual indicia receptive for user interaction, and wherein depending on at least one of context and status and user input, more than one such widget may be offered concurrently.Type: GrantFiled: December 5, 2013Date of Patent: March 21, 2017Assignee: HERE Global B.V.Inventors: Nadav Gur, David Berlin, Moshe Shuchman, Ofer Melnik, Imri Goldberg
-
Publication number: 20150379018Abstract: A computer-automated method and system of providing a searchable knowledge base with decision-relevant attributes (including some subjective or sentiment-based attributes) for a plurality of individual items within a choice set are described. First, information (including texts) relevant to the plurality of individual items in the choice set is harvested from Internet sources. Next, normalized representations of statements are extracted from excerpts of the harvested texts that pertain to attributes of interest for the choice set, and corresponding scores for the attributes are derived from each of the normalized representations. The scores derived from the various harvested sources are aggregated for each attribute of each item. Finally, the knowledge base of the plurality of individual topics is generated.Type: ApplicationFiled: September 10, 2015Publication date: December 31, 2015Inventors: Nadav Gur, David Israel, Imri Goldberg
-
Patent number: 9135350Abstract: A computer-automated method and system of providing a searchable knowledge base with decision-relevant attributes (including some subjective or sentiment-based attributes) for a plurality of individual items within a choice set are described. First, information (including texts) relevant to the plurality of individual items in the choice set is harvested from Internet sources. Next, normalized representations of statements are extracted from excerpts of the harvested texts that pertain to attributes of interest for the choice set, and corresponding scores for the attributes are derived from each of the normalized representations. The scores derived from the various harvested sources are aggregated for each attribute of each item. Finally, the knowledge base of the plurality of individual topics is generated.Type: GrantFiled: January 5, 2012Date of Patent: September 15, 2015Assignee: SRI INTERNATIONALInventors: Nadav Gur, David Israel, Imri Goldberg
-
Publication number: 20150161271Abstract: Systems and methods are described for performing a travel search and presenting search results to a user. A computing device may retrieve multiple travel documents and analyze the travel documents to identify points of interest. The computing device may analyze the subset of the travel documents that have points of interest or significant information regarding points of interest. The computing device is configured to calculate a POI relevance score based on text associated with the identified POIs. The POI relevance score indicates how likely the text is relevant to a travel search and rank the subset of the travel documents based on the POI relevance score.Type: ApplicationFiled: December 5, 2014Publication date: June 11, 2015Inventors: Nadav Gur, Stephen Young, Ofer Melnik, Imri Goldberg
-
Publication number: 20150161291Abstract: A system and method for static query generation and input, comprising a set of auto-complete and auto-suggest rules, based on a template derived from at least one of an initial user input and context, is used to elicit a more complete query from said user, said auto-complete and auto-suggest values being offered in the form of widgets that offer a visual indicia receptive for user interaction, and wherein depending on at least one of context and status and user input, more than one such widget may be offered concurrently.Type: ApplicationFiled: December 5, 2013Publication date: June 11, 2015Inventors: Nadav Gur, David Berlin, Moshe Shuchman, Ofer Melnik, Imri Goldberg
-
Publication number: 20130179423Abstract: A computer-automated method and system of providing a searchable knowledge base with decision-relevant attributes (including some subjective or sentiment-based attributes) for a plurality of individual items within a choice set are described. First, information (including texts) relevant to the plurality of individual items in the choice set is harvested from Internet sources. Next, normalized representations of statements are extracted from excerpts of the harvested texts that pertain to attributes of interest for the choice set, and corresponding scores for the attributes are derived from each of the normalized representations. The scores derived from the various harvested sources are aggregated for each attribute of each item. Finally, the knowledge base of the plurality of individual topics is generated.Type: ApplicationFiled: January 5, 2012Publication date: July 11, 2013Applicant: SRI InternationalInventors: Nadav Gur, David Israel, Imri Goldberg
-
Patent number: 8082186Abstract: An automated method for operating a bimodal itinerary creation and management system. The method includes specifying by a user of his travel preferences and telling the system to plan and calculate an itinerary, calculating by the system of an itinerary meeting said user's travel preferences and presenting said itinerary to said user. The method also includes either accepting this as the final itinerary by the user or further specifying and fine tuning his preferences and finally recalculating the itinerary, until a sufficiently satisfactory itinerary is created.Type: GrantFiled: August 31, 2009Date of Patent: December 20, 2011Inventors: Moshe Shuchman, Imri Goldberg
-
Publication number: 20110302048Abstract: An automated method for operating a bimodal itinerary creation and management system. The method includes specifying by a user of his travel preferences and telling the system to plan and calculate an itinerary, calculating by the system of an itinerary meeting said user's travel preferences and presenting said itinerary to said user. The method also includes either accepting this as the final itinerary by the user or further specifying and fine tuning his preferences and finally recalculating the itinerary, until a sufficiently satisfactory itinerary is created.Type: ApplicationFiled: August 31, 2009Publication date: December 8, 2011Inventors: Moshe Shuchman, Imri Goldberg