Patents Assigned to Check Point Software Technologies LTD
-
Patent number: 11075882Abstract: Computerized methods and systems reduce the false positive rate of Web Application Firewalls (WAFs), by operating automatically and utilizing system defined “trusted sources”.Type: GrantFiled: February 28, 2019Date of Patent: July 27, 2021Assignee: CHECK POINT SOFTWARE TECHNOLOGIES LTD.Inventor: Roy Barda
-
Patent number: 10972488Abstract: Computerized methods and systems determine an entry point or source of an attack on an endpoint, such as a machine, e.g., a computer, node of a network, system or the like. These computerized methods and systems utilize an attack execution/attack or start root, to build an attack tree, which shows the attack on the end point and the damage caused by the attack, as it propagates through the machine, network, system, or the like.Type: GrantFiled: September 15, 2019Date of Patent: April 6, 2021Assignee: CHECK POINT SOFTWARE TECHNOLOGIES LTD.Inventors: Anandabrata Pal, Lior Arzi, Tamara Leiderfarb
-
Patent number: 10880316Abstract: Computerized methods and systems determine an initial execution of an attack on an endpoint. An indicator of the attack is obtained by analysis of a first process on the endpoint. A sequence of processes that includes the first process associates the initial execution of the attack with the first process. Each respective process in the sequence of processes is created or executed by at least one of the initial execution or a process in the sequence of processes. The initial execution is identified based on linking from the first process to the initial execution through a combination of executions and creations of the processes in the sequence of processes.Type: GrantFiled: December 9, 2015Date of Patent: December 29, 2020Assignee: CHECK POINT SOFTWARE TECHNOLOGIES LTD.Inventors: Anandabrata Pal, Tamara Leiderfarb, Lior Arzi
-
Patent number: 10728274Abstract: Computerized methods and systems inspect data packets received from a web server for the presence of a value from a list of prohibited values. If a prohibited value is absent, a gateway injects at least one JavaScript code segment for execution by a web browser. The at least one JavaScript code segment includes a plurality of JavaScript functions which include at least one security analysis JavaScript function and a plurality of modified JavaScript functions. Each of the modified JavaScript functions is created from a respective native JavaScript function to include at least one code segment that when executed inspects for at least one of: a dynamic modification of at least one JavaScript function from a prohibited list of JavaScript functions, a dynamic creation of at least one JavaScript function from the prohibited list of JavaScript functions, or a dynamic reference to a value from the list of prohibited values.Type: GrantFiled: September 22, 2016Date of Patent: July 28, 2020Assignee: CHECK POINT SOFTWARE TECHNOLOGIES LTD.Inventors: Ilan Uriel, Aviad Mor
-
Patent number: 10728266Abstract: Computerized methods and systems identify malware enabled by automatically generated domain names. An agent executes a malware, in a controlled environment, at a first temporal input value and a second temporal input value. A first set of domain names is generated in response to the execution at the first temporal input value. A second set of domain names is generated in response to the execution at the second temporal input value. The agent compares the first set of domain names with the second set of domain names to produce a comparison output metric.Type: GrantFiled: August 15, 2017Date of Patent: July 28, 2020Assignee: CHECK POINT SOFTWARE TECHNOLOGIES LTD.Inventor: Aliaksandr Chailytko
-
Patent number: 10645074Abstract: A method for monitoring access of users to Internet SaaS applications includes the CISO (company Internet security office) in the configuration and operation of the method, instead of relying only on whatever security the SaaS application implements. Certificates, not accessible to users, are pushed to a user's client. When an access request is received from a client by an application, a gateway requests from the client the certificate. After a notification and approval process with the user, a received certificate is verified, user access to the application is allowed or denied, and the CISO notified of the attempted access.Type: GrantFiled: March 28, 2017Date of Patent: May 5, 2020Assignee: CHECK POINT SOFTWARE TECHNOLOGIES LTD.Inventors: Alon Boxiner, Liad Mizrachi, Oded Vanunu, Roman Zaikin, Yoav Shay Daniely
-
Patent number: 10567468Abstract: Methods and systems provide mechanisms for inspection devices, such as firewalls and servers and computers associated therewith, to selectively manipulate files, for which a download has been requested. The manipulation is performed in a manner which is transparent to the requesting user.Type: GrantFiled: December 28, 2015Date of Patent: February 18, 2020Assignee: CHECK POINT SOFTWARE TECHNOLOGIES LTD.Inventors: Amnon Perlmutter, Lior Drihem
-
Patent number: 10554629Abstract: A method for introducing a replacement code segment over-the-air through a wireless mobile communication network to an existing code resident on a mobile terminal: identifying the mobile terminal from among terminals served through the wireless mobile communication network; sending a push notification through the network to the mobile terminal, the push notification indicative of the replacement code segment ready for downloading; activating a dynamic update module resident in the mobile terminal, in response to the push notification; sending a request for the replacement code segment; downloading the replacement code segment to the mobile terminal; and transferring the downloaded replacement code segment to the dynamic update module for dynamic replacement of a corresponding old code segment within the mobile terminal with the replacement code segment, obviating a need to recompile the existing code.Type: GrantFiled: June 30, 2016Date of Patent: February 4, 2020Assignee: CHECK POINT SOFTWARE TECHNOLOGIES LTD.Inventors: Yuval Raban, Nadia Goshmir, Shami Reshtik
-
Patent number: 10511616Abstract: Disclosed are methods and systems for detecting malware and potential malware based on using generalized attack trees (generalized attack tree graphs). The generalized attack trees are based on attack trees (attack tree graphs), whose objects, such as links and vertices, have been analyzed, and some of these objects have been generalized, resulting in the generalized attack tree of the invention.Type: GrantFiled: November 6, 2018Date of Patent: December 17, 2019Assignee: CHECK POINT SOFTWARE TECHNOLOGIES LTD.Inventors: Tamara Leiderfarb, Lior Arzi, Anandabrata Pal
-
Patent number: 10462160Abstract: Computerized methods and systems identify events associated with an attack initiated on an endpoint client. A listing of processes executed or created on the endpoint during the attack is obtained. The listing of processes includes a first process and at least one subsequent process executed or created by the first process. The computerized methods and systems analyze for the occurrence of at least one event during a time interval associated with the attack. The computerized methods and systems determine whether the listing of processes includes a process that when executed caused the occurrence of the at least one event. If the listing of processes excludes process that when executed caused the occurrence of the at least one event, the at least one event and the causing process are stored, for example, in a database or memory.Type: GrantFiled: October 13, 2016Date of Patent: October 29, 2019Assignee: CHECK POINT SOFTWARE TECHNOLOGIES LTD.Inventors: Lior Arzi, Tamara Leiderfarb, Anandabrata Pal
-
Patent number: 10382493Abstract: Computerized methods and systems receive neutralized data items on a first entity from a second entity over a network by receiving a first data item from the second entity. A security protocol that applies rules and policies is applied to the first data item to create a second data item that is a neutralized version of the first data item. The first data item and the second data item are converted into comparable forms. The second data item is analyzed against the first data item by comparing the comparable forms to form at least one comparison measure. The second data item is received on the endpoint if the at least one comparison measure satisfies a threshold criterion. The security protocol is modified to adjust the applied rules and policies if the at least one comparison measure does not satisfy the threshold criterion.Type: GrantFiled: June 9, 2016Date of Patent: August 13, 2019Assignee: CHECK POINT SOFTWARE TECHNOLOGIES LTD.Inventors: Daniel Finchelstein, Amnon Perlmutter
-
Patent number: 10243741Abstract: Securely exchanging keys to establish secure connections to low powered connected devices (LPCDs), such as smart devices and IoT (Internet Of Things) devices, and mutual authentication between these devices and third party controllers is accomplished via a higher performance machine configured with a dedicated remote service (DRS). A known symmetric pre-shared key (PSK) is used to establish a secure first connection between the LPCD and the DRS using another symmetric key. The DRS can then use asymmetric key exchange to securely send a new symmetric key to the 3P, and send the same new symmetric key to the LPCD using the secure first connection. This facilitates LPCDs to securely establish secure communications with other devices, in particular for control by third party (3P) devices. This also allows authentication of the LPCD with cloud services, and enables a DRS to vouch for associated devices to other DRSs.Type: GrantFiled: March 30, 2017Date of Patent: March 26, 2019Assignee: CHECK POINT SOFTWARE TECHNOLOGIES LTD.Inventors: Yiftach Cohen, Erez Geva
-
Patent number: 10057390Abstract: Methods and systems provide mechanisms for inspection devices, such as firewalls and servers and computers associated therewith, to modify HTTP requests, without requiring the inspection device to terminate the connections at the TCP (Transport Control Protocol) level, as occurs with contemporary web proxies, e.g., web proxy servers—either explicit or implicit proxies.Type: GrantFiled: April 1, 2015Date of Patent: August 21, 2018Assignee: CHECK POINT SOFTWARE TECHNOLOGIES LTD.Inventors: Amnon Perlmutter, Lior Drihem
-
Patent number: 10050995Abstract: Client-less methods and systems destroy/break the predictive layout of, for example, a client computer memory. The methods and systems operate by injecting a library that manipulates the client computer memory during exploitation attempts.Type: GrantFiled: May 15, 2017Date of Patent: August 14, 2018Assignee: CHECK POINT SOFTWARE TECHNOLOGIES LTD.Inventors: Tomer Teller, Adi Hayon
-
Patent number: 9935903Abstract: Processing client requests for duplicate-free server operations is particularly useful for creating and sending items using Microsoft Exchange Web Services (EWS). The system facilitates avoiding creation and sending of duplicate items. In contrast to conventional implementations that send a single command to create and then perform subsequent processing of an item, a feature of the present embodiment is using two commands: a first command to create the item, and a second command to subsequently process the item. In a specific implementation, an EWS item's provided ChangeKey property is used to keep track of the EWS's reply from the server to the client, thereby avoiding duplicate item creation.Type: GrantFiled: September 30, 2014Date of Patent: April 3, 2018Assignee: Check Point Software Technologies LtdInventors: Yuval Raban, Leo Natan, Ori Feldman
-
Patent number: 9888032Abstract: Computerized methods and systems mitigate the effect of a ransomware attack on an endpoint by detecting access events associated with requests by processes, including ransomware processes, to access data items on the endpoint. The data items are hidden from the operating system processes executed on the endpoint. In response to detecting an access event, an action is taken against the process associated with the access event.Type: GrantFiled: May 3, 2016Date of Patent: February 6, 2018Assignee: CHECK POINT SOFTWARE TECHNOLOGIES LTD.Inventors: Kasif Dekel, Liad Mizrachi, Roman Zaikin, Oded Vanunu
-
Patent number: 9686307Abstract: Client-less methods and systems destroy/break the predictive layout of, for example, a client computer memory. The methods and systems operate by injecting a library that manipulates the client computer memory during exploitation attempts.Type: GrantFiled: January 13, 2015Date of Patent: June 20, 2017Assignee: CHECK POINT SOFTWARE TECHNOLOGIES LTD.Inventors: Tomer Teller, Adi Hayon
-
Patent number: 9686294Abstract: Methods and systems for protecting components of a linked vehicle from cyber-attack are disclosed. These methods and systems comprise elements of hardware and software for receiving a packet; tunneling the packet to a terrestrial-based security service, analyzing whether the packet is harmful to a component in the vehicle, and at least one action to protect at least one component.Type: GrantFiled: June 15, 2015Date of Patent: June 20, 2017Assignee: CHECK POINT SOFTWARE TECHNOLOGIES LTD.Inventors: Alon Kantor, Tamir Zegman
-
Patent number: 9672189Abstract: The present invention discloses methods for effective network-security inspection in virtualized environments, the methods including the steps of: providing a data packet, embodied in machine-readable signals, being sent from a sending virtual machine to a receiving virtual machine via a virtual switch; intercepting the data packet by a sending security agent associated with the sending virtual machine; injecting the data packet into an inspecting security agent associated with a security virtual machine via a direct transmission channel which bypasses the virtual switch; forwarding the data packet to the security virtual machine by employing a packet-forwarding mechanism; determining, by the security virtual machine, whether the data packet is allowed for transmission; upon determining the data packet is allowed, injecting the data packet back into the sending security agent via the direct transmission channel; and forwarding the data packet to the receiving virtual machine via the virtual switch.Type: GrantFiled: July 23, 2009Date of Patent: June 6, 2017Assignee: CHECK POINT SOFTWARE TECHNOLOGIES, LTD.Inventors: Ofer Raz, Amnon Perlmutter, Erez Berkner
-
Patent number: 9661006Abstract: Methods and systems for mitigating cyber attacks on components of an automotive communication system are disclosed. These methods and systems comprise elements of hardware and software for receiving a frame; determining whether the frame potentially affects correct operation of an automotive component; and, taking protective action.Type: GrantFiled: March 31, 2015Date of Patent: May 23, 2017Assignee: CHECK POINT SOFTWARE TECHNOLOGIES LTD.Inventors: Alon Kantor, Tamir Zegman