Patents by Inventor Lior Ateret

Lior Ateret has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10063580
    Abstract: A system comprising a computer-readable storage medium storing at least one program, and a method for reducing cyber-security related false positive alerts is presented. In example embodiments the method may include identifying an indication of a cyber-security threat based on an operational anomaly in a network system. The method may further include determining that the operational anomaly is a false positive indicator with respect to the cyber-security threat based on the operational anomaly being correlated with a malfunction or reconfiguration event.
    Type: Grant
    Filed: July 27, 2017
    Date of Patent: August 28, 2018
    Assignee: General Electric Company
    Inventors: Shai Dekel, Lior Ateret, Evgeny Bogokovsky
  • Publication number: 20170324761
    Abstract: A system comprising a computer-readable storage medium storing at least one program, and a method for reducing cyber-security related false positive alerts is presented. In example embodiments the method may include identifying an indication of a cyber-security threat based on an operational anomaly in a network system. The method may further include determining that the operational anomaly is a false positive indicator with respect to the cyber-security threat based on the operational anomaly being correlated with a malfunction or reconfiguration event.
    Type: Application
    Filed: July 27, 2017
    Publication date: November 9, 2017
    Inventors: Shai Dekel, Lior Ateret, Evgeny Bogokovsky
  • Patent number: 9756078
    Abstract: Described herein are reception of first processor-executable program code and a configuration file specifying a target internet protocol address, an asset-identifying information type, and a security protocol, and execution of the received first processor-executable program code to identify a first one or more network communication interfaces of the first computing system, generate a message including information conforming to the asset-identifying information type, the information identifying a first asset, secure the message based on the security protocol, and transmit the secure message to the target internet protocol address via each of the first one or more network communication interfaces.
    Type: Grant
    Filed: July 24, 2014
    Date of Patent: September 5, 2017
    Assignee: GENERAL ELECTRIC COMPANY
    Inventors: Igor Berdichevski, Lior Ateret
  • Patent number: 9756062
    Abstract: A system comprising a computer-readable storage medium storing at least one program, and a method for reducing cyber-security related false positive alerts is presented. In example embodiments the method may include identifying an abnormal operation pattern in the network system that may signal a cyber-security threat. In response to identifying the abnormal operation pattern, data related to a state change of an asset included in the network system is accessed. The method may further include determining that the abnormal operation pattern and the state change of the asset are correlated, and based on this determination, determining that the abnormal operation pattern is a false positive indicator with respect to the cyber-security threat.
    Type: Grant
    Filed: August 27, 2014
    Date of Patent: September 5, 2017
    Assignee: General Electric Company
    Inventors: Shai Dekel, Lior Ateret, Evgeny Bogokovsky
  • Publication number: 20160065603
    Abstract: A system comprising a computer-readable storage medium storing at least one program, and a method for reducing cyber-security related false positive alerts is presented. In example embodiments the method may include identifying an abnormal operation pattern in the network system that may signal a cyber-security threat. In response to identifying the abnormal operation pattern, data related to a state change of an asset included in the network system is accessed. The method may further include determining that the abnormal operation pattern and the state change of the asset are correlated, and based on this determination, determining that the abnormal operation pattern is a false positive indicator with respect to the cyber-security threat.
    Type: Application
    Filed: August 27, 2014
    Publication date: March 3, 2016
    Inventors: Shai Dekel, Lior Ateret, Evgeny Bogokovsky
  • Publication number: 20160028601
    Abstract: Described herein are reception of first processor-executable program code and a configuration file specifying a target internet protocol address, an asset-identifying information type, and a security protocol, and execution of the received first processor-executable program code to identify a first one or more network communication interfaces of the first computing system, generate a message including information conforming to the asset-identifying information type, the information identifying a first asset, secure the message based on the security protocol, and transmit the secure message to the target internet protocol address via each of the first one or more network communication interfaces.
    Type: Application
    Filed: July 24, 2014
    Publication date: January 28, 2016
    Inventors: Igor Berdichevski, Lior Ateret