Patents by Inventor Vitaly Neyman

Vitaly Neyman has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11212305
    Abstract: Computerized methods and systems receive a request message from a client device that is addressed to a web server hosting at least one web application. the request message is analyzed to identify potential attack indicators that are present in the request message. Each potential attack indicator has a score. A reputation score is assigned to the request message that is associated with behavior of the client device relative other client devices sending request message to the web server. A composite score for the request message is calculated based in part on the scores of the potential attack indicators and the reputation score. The request message is handled in accordance with the calculated composite score.
    Type: Grant
    Filed: April 29, 2019
    Date of Patent: December 28, 2021
    Assignee: CHECK POINT WEB APPLICATIONS AND API PROTECTION LTD.
    Inventors: Dotan Bar Noy, Vitaly Neyman, Pavel Borovsky
  • Publication number: 20190334940
    Abstract: Computerized methods and systems receive a request message from a client device that is addressed to a web server hosting at least one web application. the request message is analyzed to identify potential attack indicators that are present in the request message. Each potential attack indicator has a score. A reputation score is assigned to the request message that is associated with behavior of the client device relative other client devices sending request message to the web server. A composite score for the request message is calculated based in part on the scores of the potential attack indicators and the reputation score. The request message is handled in accordance with the calculated composite score.
    Type: Application
    Filed: April 29, 2019
    Publication date: October 31, 2019
    Inventors: Dotan BAR NOY, Vitaly NEYMAN, Pavel BOROVSKY
  • Patent number: 7260725
    Abstract: A method of curing an encrypted computer virus present in a computer system includes analyzing encrypted data to determine at least one most frequently occurring encrypted byte in the encrypted data, calculating an encryption key based on the most frequently occurring encrypted byte and a corresponding expected original byte of original data and decrypting the encrypted data using the encryption key to restore the encrypted data to original data.
    Type: Grant
    Filed: September 13, 2002
    Date of Patent: August 21, 2007
    Assignee: Computer Associates Think, Inc.
    Inventors: Itshak Carmona, Vitaly Neyman, Malivanchuk Taras
  • Patent number: 7065789
    Abstract: A method of selecting a detection method for analyzing computer code for malicious code. The method provides a plurality of malicious code detection methods, wherein at least some of the malicious code detection methods require different amounts of time to analyze for malicious code. A fastest one of the malicious code detection methods is selected. Computer code is analyzed for malicious code using the selected malicious code detection method. A probability of accuracy of a result of the analysis is determined. A next fastest one of the malicious code detection methods is selected and the analyzing and determining steps repeated, if the probability of accuracy is below a predetermined level. A result of the analysis is outputted if the probability of accuracy is at or above the predetermined level.
    Type: Grant
    Filed: May 22, 2001
    Date of Patent: June 20, 2006
    Assignee: Computer Associates Think, Inc.
    Inventors: Vitaly Neyman, Itshak Carmona, Ofer Rotschield
  • Publication number: 20030093682
    Abstract: A method of curing an encrypted computer virus present in a computer system includes analyzing encrypted data to determine at least one most frequently occurring encrypted byte in the encrypted data, calculating an encryption key based on the most frequently occurring encrypted byte and a corresponding expected original byte of original data and decrypting the encrypted data using the encryption key to restore the encrypted data to original data.
    Type: Application
    Filed: September 13, 2002
    Publication date: May 15, 2003
    Inventors: Itshak Carmona, Vitaly Neyman, Malivanchuk Taras