Patents Assigned to Check Point Software Technologies LTD
  • Patent number: 9210128
    Abstract: A computer-readable storage medium has embedded thereon non-transient computer-readable code for controlling access to a protected computer network, by intercepting packets that are being exchanged between a computer system and the protected network, and then, for each intercepted packet, identifying the associated application that is running on the computer system, determining whether the application is trusted, for example according to a white list or according to a black list, and disposing of the packet accordingly.
    Type: Grant
    Filed: May 26, 2013
    Date of Patent: December 8, 2015
    Assignee: CHECK POINT SOFTWARE TECHNOLOGIES LTD.
    Inventors: Lior Drihem, Amnon Perlmutter
  • Patent number: 9137204
    Abstract: A system and method for protecting data communications in a system including a load-balancer connected to a cluster of security network components, e.g. firewall node. The load-balancer transfers one or more of the data streams respectively to the security components. The security network components transmit control information to the load-balancer and the control information includes an instruction regarding balancing load of the data streams between said security network components; The load-balancer balances load based on the control information. Preferably, network address translation is performed by the load-balancer based on the control information or network address translation is performed by the security network component and the control information includes information regarding an expected connection based on the network address translation.
    Type: Grant
    Filed: February 2, 2006
    Date of Patent: September 15, 2015
    Assignee: CHECK POINT SOFTWARE TECHNOLOGIES LTD.
    Inventors: Omer Schory, Ofer Raz, Oded Gonda
  • Patent number: 9130777
    Abstract: Disclosed are methods, media, and vault servers for providing a secure messaging system using vault servers in conjunction with client-side restricted-execution vault-mail environments. Methods include the steps of upon activating a vault-mail message containing sensitive content, removing the content from the vault-mail message; placing the content on a vault server; creating a link in the vault-mail message to the content on the vault server; sending the vault-mail message to a designated recipient; and upon activating the link, allowing the content to be only viewed in a restricted-execution session of a client application, wherein the restricted-execution session does not allow the content to be altered, copied, stored, printed, forwarded, or otherwise executed. Preferably, the activation of the vault-mail message is performed by a network-security gateway, and can be performed on a per-message basis.
    Type: Grant
    Filed: November 19, 2008
    Date of Patent: September 8, 2015
    Assignee: Check Point Software Technologies, LTD.
    Inventors: Oded Gonda, Ofer Raz, Alon Kantor, Uri Bialik, Yoav Kirsch
  • Publication number: 20150220645
    Abstract: A system for optimized paged item loading in Exchange Web Services (EWS) improves response time of user queries to EWS. In contrast to conventional implementations that search an entire folder first, and then present results to user, this invention features not searching the entire folder, but searching only portions of the folder and then only searching portions until a desired number of results is obtained. Folders are sampled in an interval of N items and then using an abstract paging mechanism, thus defining a new restricted page with a limited item count of N. The sampling is performed in a first operation, for example, by using FindItem. In a second operation, FindItem is again used with a requested restriction, which is limited to the restricted page according to the samples. Searches may be limited by the amount of items to return or results (result set) desired.
    Type: Application
    Filed: February 6, 2014
    Publication date: August 6, 2015
    Applicant: CHECK POINT SOFTWARE TECHNOLOGIES LTD.
    Inventor: Yuval RABAN
  • Publication number: 20150188749
    Abstract: A server and/or a gateway of a computer network receive a filter for filtering data items to be sent to a mobile device of a cellular network. The mobile device is notified of receipt of data items by the server only if such notification is allowed by the filter. In one embodiment, the server maintains a first queue of data items for which notification is allowed and a second queue of data items for which notification is not allowed, and the gateway periodically inspects the first queue and notifies the mobile device of receipt of new data items.
    Type: Application
    Filed: December 30, 2013
    Publication date: July 2, 2015
    Applicant: Check Point Software Technologies Ltd.t
    Inventors: Daniel Finchelstein, Amnon Perlmutter, Aviad Mor, Noam Arad
  • Patent number: 8959047
    Abstract: To validate data, a plurality of strings that match a predetermined regular expression is extracted from the data. A validated subset of the strings is identified. To determine whether the validated subset has been falsely validated, it is determined whether the validated subset satisfies each of one or more predetermined criteria relative to the plurality of strings. In one embodiment, the subset is determined to be falsely validated if at least one of the criteria is satisfied. In another embodiment, the subset is determined to be falsely validated if all of the criteria are satisfied. The data are released only if the subset is determined to be falsely validated.
    Type: Grant
    Filed: May 10, 2012
    Date of Patent: February 17, 2015
    Assignee: Check Point Software Technologies Ltd.
    Inventors: Amnon Perlmutter, Limor Ganon, Meir Jonathan Dahan
  • Patent number: 8948193
    Abstract: Methods, devices, and media for intelligent NIC bonding and load-balancing including the steps of: providing a packet at an incoming-packet port of a gateway; attaching an incoming-port identification, associated with the incoming-packet port, to the packet; routing the packet to a processing core; passing the packet through a gateway processing; sending the packet, by the core, to the operating system of a host system; and routing the packet to an outgoing-packet port of the gateway based on the incoming-port identification. Preferably, the gateway processing includes security processing of the packets. Preferably, the step of routing the packet to the outgoing-packet port is based solely on the incoming-port identification. Preferably, an outgoing-port identification, associated with the outgoing-packet port, has an identical bond-index to the incoming-port identification.
    Type: Grant
    Filed: August 19, 2008
    Date of Patent: February 3, 2015
    Assignee: Check Point Software Technologies, Ltd.
    Inventors: Amnon Perlmutter, Benzi Waisman
  • Patent number: 8902900
    Abstract: A method and system is provided for a scalable clustered system. The method and system may handle asynchronous traffic as well as session backup. In the method and system, a home cluster member having ownership of a local session predicts designation of a an other cluster member to receive a packet associated with the local session and sends appropriate state information or forwarding instruction to the other network member.
    Type: Grant
    Filed: February 13, 2013
    Date of Patent: December 2, 2014
    Assignee: Check Point Software Technologies Ltd.
    Inventors: Amir Erman, Amnon Perlmutter, Ben Zion Weissman
  • Publication number: 20140351878
    Abstract: A network component has a set of one or more rules, each of which has a match component and an action component. If an incoming packet maps to the match component of a rule, then the packet is handled according to the rule's action component. If the rule also includes a limit component, then if the packet maps to the rule's match component, a family history of the rule is updated, and the packet is handled according to the rule's action component only if the rule's family history satisfies the rule's limit component.
    Type: Application
    Filed: May 23, 2013
    Publication date: November 27, 2014
    Applicant: Check Point Software Technologies Ltd.
    Inventors: Tamir Zegman, Ofer Barkai
  • Patent number: 8850576
    Abstract: Disclosed are methods and media for inspecting security certificates. Methods include the steps of: scanning, by a network security device, messages of a security protocol between a server and a client system; detecting the messages having a security certificate; detecting suspicious security certificates from the messages; and aborting particular sessions of the security protocol associated with the suspicious certificates. Preferably, the step of scanning is performed only on messages of server certificate records. Preferably, the method further includes the step of sending an invalid-certificate notice to the server and the client system. Preferably, the step of detecting the suspicious certificates includes detecting a use of an incorrectly-generated private key for the certificates. Preferably, the step of detecting the suspicious certificates includes detecting an unavailability of revocation information for the certificates.
    Type: Grant
    Filed: March 4, 2012
    Date of Patent: September 30, 2014
    Assignee: Check Point Software Technologies Ltd.
    Inventors: Guy Guzner, Ami Haviv, Danny Lieblich, Yahav Gal
  • Patent number: 8843993
    Abstract: To administer computer network security, a computer system receives a bit string that encodes a natural-language request for adjusting a security policy of the network and parses the bit string to identify one or more objects and an action to be applied to the object(s). Preferably, the system displays a description of one of the objects and a menu of operations that are applicable to the object, receives a user selection of one of the options, and effects the selected operation. The scope of the invention also includes a non-transient computer-readable storage medium bearing code for implementing the method and a system for implementing the method.
    Type: Grant
    Filed: December 6, 2012
    Date of Patent: September 23, 2014
    Assignee: Check Point Software Technologies Ltd.
    Inventors: Uri Bialik, Rami Ben-Ami
  • Patent number: 8844019
    Abstract: A security gateway of a computer network receives incoming packets at one or more network interfaces. One or more security functions are applied to the packets. Reports of security function violations are recorded. The reports include the source addresses of the packets, the times that the packets were received, and descriptions of the violations. The descriptions include weights, and if the sum of the weights, for packets of a common source address that are received within a first time interval, exceeds a threshold, subsequent packets from that source address are dropped. Alternatively, in a “monitor only” mode, the common source address is logged but packets are not dropped. Optionally, encrypted packets and/or packets received at some network interfaces but not at other network interfaces are not dropped.
    Type: Grant
    Filed: November 21, 2012
    Date of Patent: September 23, 2014
    Assignee: Check Point Software Technologies Ltd.
    Inventors: Ofer Barkai, Dorit Dor, Tamir Zegman
  • Publication number: 20140237590
    Abstract: A plurality of untrusted digital files are run simultaneously in fewer sandboxes than there are files, while monitoring for malicious activity. Preferably, only one sandbox is used. If the monitoring detects malicious activity, either the files are run again in individual sandboxes, or the files are divided among subsets whose files are run simultaneously in one or more sandboxes, while monitoring for malicious activity.
    Type: Application
    Filed: February 17, 2013
    Publication date: August 21, 2014
    Applicant: CHECK POINT SOFTWARE TECHNOLOGIES LTD.
    Inventors: Avi SHUA, Hen AMAR, John BASILIA
  • Patent number: 8776017
    Abstract: A data leak prevention application that categorizes documents by data type is provided, a data type being a sensitivity classification of a document based on what data the document contains. A scripting language processing engine is embedded into the data leak prevention application, the scripting language forming part of the application as hard code. A user configures interaction of the scripting language processing engine with the application. The configuring may include modifying or adding code or setting criteria for when code portions of the scripting language processing engine activates. The scripting language processing engine is activated to enhance an accuracy of an existing data type or so as to detect a new data type. Upon enhancing the accuracy of the data type, documents may be re-categorized.
    Type: Grant
    Filed: July 26, 2010
    Date of Patent: July 8, 2014
    Assignee: Check Point Software Technologies Ltd
    Inventors: Amnon Perlmutter, Aviad Mor, Oded Gonda, Ofer Raz, Matt LeGrow
  • Publication number: 20140165127
    Abstract: To administer computer network security, a computer system receives a bit string that encodes a natural-language request for adjusting a security policy of the network and parses the bit string to identify one or more objects and an action to be applied to the object(s). Preferably, the system displays a description of one of the objects and a menu of operations that are applicable to the object, receives a user selection of one of the options, and effects the selected operation. The scope of the invention also includes a non-transient computer-readable storage medium bearing code for implementing the method and a system for implementing the method.
    Type: Application
    Filed: December 6, 2012
    Publication date: June 12, 2014
    Applicant: CHECK POINT SOFTWARE TECHNOLOGIES LTD.
    Inventors: Uri BIALIK, Rami BEN-AMI
  • Publication number: 20140143850
    Abstract: A security gateway of a computer network receives incoming packets at one or more network interfaces. One or more security functions are applied to the packets. Reports of security function violations are recorded. The reports include the source addresses of the packets, the times that the packets were received, and descriptions of the violations. The descriptions include weights, and if the sum of the weights, for packets of a common source address that are received within a first time interval, exceeds a threshold, subsequent packets from that source address are dropped. Alternatively, in a “monitor only” mode, the common source address is logged but packets are not dropped. Optionally, encrypted packets and/or packets received at some network interfaces but not at other network interfaces are not dropped.
    Type: Application
    Filed: November 21, 2012
    Publication date: May 22, 2014
    Applicant: Check Point Software Technologies Ltd.
    Inventors: Ofer Barkai, Dorit Dor, Tamir Zegman
  • Patent number: 8726008
    Abstract: A system and method for protecting data communications in a system including a load-balancer connected to a cluster of security network components, e.g. firewall node. The load-balancer transfers one or more of the data streams respectively to the security components. The security network components transmit control information to the load-balancer and the control information includes an instruction regarding balancing load of the data streams between said components; The load-balancer balances load based on the control information. Preferably, network address translation (NAT) is performed by the load-balancer based on the control information or NAT is performed by the security network component and the control information includes information regarding an expected connection based on NAT.
    Type: Grant
    Filed: March 28, 2012
    Date of Patent: May 13, 2014
    Assignee: Check Point Software Technologies Ltd.
    Inventors: Omer Schory, Ofer Raz, Oded Gonda
  • Publication number: 20140123269
    Abstract: A computer-readable storage medium has embedded thereon non-transient computer-readable code for controlling access to a protected computer network, by intercepting packets that are being exchanged between a computer system and the protected network, and then, for each intercepted packet, identifying the associated application that is running on the computer system, determining whether the application is trusted, for example according to a white list or according to a black list, and disposing of the packet accordingly.
    Type: Application
    Filed: May 26, 2013
    Publication date: May 1, 2014
    Applicant: Check Point Software Technologies Ltd.
    Inventors: Lior Drihem, Amnon Perlmutter
  • Patent number: 8713666
    Abstract: Disclosed are methods, devices, and media for enforcing network access control, the method including the steps of: extracting a packet signature from a packet (or packet fragment) received from a network; storing the packet signature and the packet in a buffer; computing a buffer signature using a per-endpoint secret key; determining whether the packet signature and the buffer signature are identical; and upon determining the packet signature and the buffer signature are identical, transmitting the packet to a protocol stack. Preferably, the step of extracting includes extracting the packet signature from a field (e.g. identification field) of a header of the packet. Preferably, the method further includes the step of: upon determining the packet signature and the buffer signature are not identical, discarding the packet. Methods for receiving a packet from a protocol stack, and transmitting the packet to a network are disclosed as well.
    Type: Grant
    Filed: March 27, 2008
    Date of Patent: April 29, 2014
    Assignee: Check Point Software Technologies, Ltd.
    Inventors: Kirill Motil, Almog Cohen, Yaron Sheffer
  • Patent number: 8644328
    Abstract: Methods, devices, and media for intelligent NIC bonding and load-balancing including the steps of: providing a packet at an incoming-packet port of a gateway; attaching an incoming-port identification, associated with the incoming-packet port, to the packet; routing the packet to a processing core; passing the packet through a gateway processing; sending the packet, by the core, to the operating system of a host system; and routing the packet to an outgoing-packet port of the gateway based on the incoming-port identification. Preferably, the gateway processing includes security processing of the packets. Preferably, the step of routing the packet to the outgoing-packet port is based solely on the incoming-port identification. Preferably, an outgoing-port identification, associated with the outgoing-packet port, has an identical bond-index to the incoming-port identification.
    Type: Grant
    Filed: March 31, 2011
    Date of Patent: February 4, 2014
    Assignee: Check Point Software Technologies, Ltd.
    Inventors: Amnon Perlmutter, Benzi Waisman