Patents by Inventor Tomer Cherni

Tomer Cherni has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20230403327
    Abstract: According to examples, an apparatus may include a processor and a memory on which are stored machine-readable instructions that when executed by the processor, may cause the processor to obtain an encryption key from a user. The processor may identify session activity data during a proxy session of the user and may encrypt the identified session activity data using the encryption key obtained from the user. The processor may store the encrypted session activity data.
    Type: Application
    Filed: June 14, 2023
    Publication date: December 14, 2023
    Applicant: Microsoft Technology Licensing, LLC
    Inventors: Itamar AZULAY, Tomer Cherni
  • Patent number: 11716391
    Abstract: According to examples, an apparatus may include a processor and a memory on which are stored machine-readable instructions that when executed by the processor, may cause the processor to obtain an encryption key from a user. The processor may identify session activity data during a proxy session of the user and may encrypt the identified session activity data using the encryption key obtained from the user. The processor may store the encrypted session activity data.
    Type: Grant
    Filed: December 17, 2020
    Date of Patent: August 1, 2023
    Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC
    Inventors: Itamar Azulay, Tomer Cherni
  • Patent number: 11381545
    Abstract: Generally discussed herein are devices, systems, and methods for secure cloud application provisioning. A method can include, while providing access to the cloud application, receiving data indicating a first universal resource locator (URL) entered in a search bar of a web browser associated with the cloud application has changed to a second URL, determining whether the second URL has a valid certificate, and in response to determining the second URL is associated with the cloud application and a valid certificate for the second URL exists, providing resources for the second URL and the valid certificate to the web browser or in response to determining the second URL is not associated with the application, re-directing the web browser away from the proxy server.
    Type: Grant
    Filed: May 22, 2020
    Date of Patent: July 5, 2022
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Itamar Azulay, Daniel Senderovich, Tomer Cherni, Meir Blachman
  • Publication number: 20220201084
    Abstract: According to examples, an apparatus may include a processor and a memory on which are stored machine-readable instructions that when executed by the processor, may cause the processor to obtain an encryption key from a user. The processor may identify session activity data during a proxy session of the user and may encrypt the identified session activity data using the encryption key obtained from the user. The processor may store the encrypted session activity data.
    Type: Application
    Filed: December 17, 2020
    Publication date: June 23, 2022
    Applicant: Microsoft Technology Licensing, LLC
    Inventors: Itamar AZULAY, Tomer Cherni
  • Publication number: 20220150280
    Abstract: Context menu item operations pose risks to sensitive data, such as confidentiality violations from data exfiltration during “search” or “translate” communications with external sites, as well as “paste”, “delete”, “move” and other context menu item operations that may harm data integrity or data availability even if no external site is involved. Control scripts injected by a security broker or proxy, working with event listeners in a web page, may be used to monitor and control web browser context menu item displays and functionalities based on suggested or mandated context menu policy actions obtained from a policy server. Policy that is specific to context menus is also enforced in other interactive programs that use context menus, thereby protecting sensitive data against both malevolent efforts and innocent mistakes. Protection may be provided for any kind of sensitive data, regardless of the sensitivity designation criteria or mechanism.
    Type: Application
    Filed: November 6, 2020
    Publication date: May 12, 2022
    Inventors: Itamar AZULAY, Ishay HILZENRAT, Tomer CHERNI
  • Publication number: 20220116406
    Abstract: Methods, systems, apparatuses, and computer-readable storage mediums are described for performing malware detection and mitigation on behalf of a client device by a forward proxy server. For example, the client device is configured to route network traffic through the forward proxy server. The forward proxy server is configured to detect file transfer operations between the client device and a destination server. Responsive to detecting a file transfer operation, the forward proxy server obtains a copy of the file to be transferred and provides it to a malware identification service, which analyzes the file for malware. The malware identification service may execute on the forward proxy server or another server communicatively coupled thereto. Responsive to determining that the file has been compromised with malware, the forward proxy server performs one or more actions to mitigate the malware.
    Type: Application
    Filed: October 12, 2020
    Publication date: April 14, 2022
    Inventors: Guy LEWIN, Tomer CHERNI, Daniel SENDEROVICH, Itamar NIDDAM
  • Publication number: 20210367928
    Abstract: Generally discussed herein are devices, systems, and methods for secure cloud application provisioning. A method can include, while providing access to the cloud application, receiving data indicating a first universal resource locator (URL) entered in a search bar of a web browser associated with the cloud application has changed to a second URL, determining whether the second URL has a valid certificate, and in response to determining the second URL is associated with the cloud application and a valid certificate for the second URL exists, providing resources for the second URL and the valid certificate to the web browser or in response to determining the second URL is not associated with the application, re-directing the web browser away from the proxy server.
    Type: Application
    Filed: May 22, 2020
    Publication date: November 25, 2021
    Inventors: Itamar Azulay, Daniel Senderovich, Tomer Cherni, Meir Blachman
  • Patent number: 11025593
    Abstract: A computer-implemented method includes receiving, by a reverse proxy device, a session control template, and a client request directed to a service provider regarding an application. The method includes determining, by the reverse proxy device, whether the client request should be allowed or blocked based on the received session control template. If the reverse proxy device determines that the client request should be allowed, the client request is forwarded from the reverse proxy device to the service provider. If the reverse proxy device determines that the client request should be blocked, the client request is blocked from proceeding to the service provider.
    Type: Grant
    Filed: June 28, 2019
    Date of Patent: June 1, 2021
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Guy Lewin, Tomer Cherni, Daniel Senderovich, Vitaly Khait
  • Publication number: 20200412698
    Abstract: A computer-implemented method includes receiving, by a reverse proxy device, a session control template, and a client request directed to a service provider regarding an application. The method includes determining, by the reverse proxy device, whether the client request should be allowed or blocked based on the received session control template. If the reverse proxy device determines that the client request should be allowed, the client request is forwarded from the reverse proxy device to the service provider. If the reverse proxy device determines that the client request should be blocked, the client request is blocked from proceeding to the service provider.
    Type: Application
    Filed: June 28, 2019
    Publication date: December 31, 2020
    Applicant: Microsoft Technology Licensing, LLC
    Inventors: Guy Lewin, Tomer Cherni, Daniel Senderovich, Vitaly Khait