Patents Assigned to Check Point Software Technologies LTD
-
Patent number: 8646073Abstract: To protect a user of a social network, the user's activity is monitored during a baseline monitoring period to determine a baseline activity record. If subsequently monitored activity of the user deviates sufficiently from the baseline activity record to indicate abuse (hijacking) of the user's account, the abuse is mitigated, for example by notifying the user of the abuse. Monitored activity includes posting links, updating statuses, sending messages, and changing a profile. Monitoring also includes logging times of the user activity. Monitoring anomalous profile changes does not need a baseline.Type: GrantFiled: May 18, 2011Date of Patent: February 4, 2014Assignee: Check Point Software Technologies Ltd.Inventor: Gil Raviv
-
Patent number: 8615655Abstract: Methods including the steps of: upon sending an IP packet, obtaining, by a sender, a sender identity for a sender of the packet; securely tagging, by a sender, the packet with the sender identity, the packet having a plurality of fixed-length fields concatenated into a single fixed-length virtual field shared between a cryptographic hash and an identity index for supporting multiple distinct identities residing on an IP endpoint; determining, by a receiver, the sender identity by extracting it from the packet; checking, by the receiver, the packet to ensure the packet has been appropriately tagged; and enforcing a security policy, by the receiver, according to the sender identity. Preferably, the step of obtaining includes: accessing, by the sender, a server for obtaining the sender identity; and associating, by the server, the sender identity with the endpoint. Most preferably, the associating is performed using a prefix code for encoding the identities.Type: GrantFiled: January 22, 2009Date of Patent: December 24, 2013Assignee: Check Point Software Technologies, Ltd.Inventor: Avi Shua
-
Publication number: 20130304690Abstract: To validate data, a plurality of strings that match a predetermined regular expression is extracted from the data. A validated subset of the strings is identified. To determine whether the validated subset has been falsely validated, it is determined whether the validated subset satisfies each of one or more predetermined criteria relative to the plurality of strings. In one embodiment, the subset is determined to be falsely validated if at least one of the criteria is satisfied. In another embodiment, the subset is determined to be falsely validated if all of the criteria are satisfied. The data are released only if the subset is determined to be falsely validated.Type: ApplicationFiled: May 10, 2012Publication date: November 14, 2013Applicant: CHECK POINT SOFTWARE TECHNOLOGIES LTD.Inventors: Amnon Perlmutter, Limor Ganon, Meir Jonathan Dehan
-
Patent number: 8533808Abstract: A method for protecting data communications using a multiple processor device in which multiple processors are operatively connected by a transport mechanism for sharing data. One or more of the processors is programmed as a dispatcher and other processors are programmed with processes. Each of the processes enforce an identical security policy and/or perform an identical or specialized security function. Data streams are transferred respectively from the dispatcher to the processes through the transport mechanism. Control information is transmitted through the transport mechanism from one or more processes to the dispatcher. The control information specifies balancing load of the data streams between the processes. The dispatcher balances load based on the control information.Type: GrantFiled: March 29, 2007Date of Patent: September 10, 2013Assignee: Check Point Software Technologies Ltd.Inventors: Ofer Raz, Erez Geva, Uri Goren
-
Publication number: 20130156040Abstract: A method and system is provided for a scalable clustered system. The method and system may handle asynchronous traffic as well as session backup. In the method and system, a home cluster member having ownership of a local session predicts designation of a an other cluster member to receive a packet associated with the local session and sends appropriate state information or forwarding instruction to the other network member.Type: ApplicationFiled: February 13, 2013Publication date: June 20, 2013Applicant: CHECK POINT SOFTWARE TECHNOLOGIES LTD.Inventor: CHECK POINT SOFTWARE TECHNOLOGIES LTD.
-
Publication number: 20130117853Abstract: Three heuristic layers are used to determine whether suspicious code received at a port of a data processing device is malware. First, static analysis is applied to the suspicious code. If the suspicious code passes the static analysis, dissembling analysis is applied to the suspicious code. Preferably, if the suspicious code passes the dissembling analysis, dynamic analysis is applied to the suspicious code.Type: ApplicationFiled: November 26, 2012Publication date: May 9, 2013Applicant: CHECK POINT SOFTWARE TECHNOLOGIES LTD.Inventor: CHECK POINT SOFTWARE TECHNOLOGIES LT
-
Patent number: 8406233Abstract: A method and system is provided for a scalable clustered system. The method and system may handle asynchronous traffic as well as session backup. In the method and system, a home cluster member having ownership of a local session predicts designation of a an other cluster member to receive a packet associated with the local session and sends appropriate state information or forwarding instruction to the other network member.Type: GrantFiled: September 7, 2010Date of Patent: March 26, 2013Assignee: Check Point Software Technologies Ltd.Inventors: Amir Erman, Amnon Perlmutter, Ben Zion Weissman
-
Patent number: 8375452Abstract: Disclosed are methods for user profiling for detecting insider threats including the steps of: upon a client application sending a request for a link, extracting at least one search keyword from a search session associated with the request; classifying the link into at least one classification; determining whether at least one classification is a monitored classification; capturing search elements of search sessions associated with the monitored classification; acquiring usage data from the search elements to create a user profile associated with a user's search behavior; and performing a statistical analysis, on a search frequency for the monitored classification, on user profiles associated with many users.Type: GrantFiled: December 25, 2008Date of Patent: February 12, 2013Assignee: Check Point Software Technologies LtdInventor: Gil Raviv
-
Patent number: 8370934Abstract: Three heuristic layers are used to determine whether suspicious code received at a port of a data processing device is malware. First, static analysis is applied to the suspicious code. If the suspicious code passes the static analysis, dissembling analysis is applied to the suspicious code. Preferably, if the suspicious code passes the dissembling analysis, dynamic analysis is applied to the suspicious code.Type: GrantFiled: January 20, 2010Date of Patent: February 5, 2013Assignee: Check Point Software Technologies Ltd.Inventors: Siarhei Tsviatkou, Siarhei Rabinin, Aliaksei Vavilau, Andrei Ryshkevich
-
Publication number: 20120297491Abstract: A system and method for protecting data communications in a system including a toad-balancer connected to a cluster of security network components, e.g. firewall node. The load-balancer transfers one or more of the data streams respectively to the security components. The security network components transmit control information to the load-balancer and the control information includes an instruction regarding balancing load of the data streams between said components; The load-balancer balances load based on the control information. Preferably, network address translation (NAT) is performed by the load-balancer based on the control information or NAT is performed by the security network component and the control information includes information regarding an expected connection based on NAT.Type: ApplicationFiled: March 28, 2012Publication date: November 22, 2012Applicant: CHECK POINT SOFTWARE TECHNOLOGIES LTD.Inventors: Omer Schory, Ofer Raz, Oded Gonda
-
Publication number: 20120297477Abstract: To protect a user of a social network, the user's activity is monitored during a baseline monitoring period to determine a baseline activity record. If subsequently monitored activity of the user deviates sufficiently from the baseline activity record to indicate abuse (hijacking) of the user's account, the abuse is mitigated, for example by notifying the user of the abuse. Monitored activity includes posting links, updating statuses, sending messages, and changing a profile. Monitoring also includes logging times of the user activity. Monitoring anomalous profile changes does not need a baseline.Type: ApplicationFiled: May 18, 2011Publication date: November 22, 2012Applicant: CHECK POINT SOFTWARE TECHNOLOGIES LTD.Inventor: Gil RAVIV
-
Patent number: 8254698Abstract: The present invention discloses methods for document-to-template matching for data-leak prevention (DLP), the methods including the steps of: providing a document as a stream of characters; splitting the stream into a plurality of serialized data lines; calculating a hash value for each serialized data line; checking for each hash value in a hash map of a template set; determining a similarity match to a particular template based on a predefined threshold of template hash values, of the template set, being found in the stream; and based on the similarity match, executing a DLP security policy for the document. Preferably, the template set is extracted from documents manually prepared by a security administrator. Preferably, each template in the template set is deduced automatically from a plurality of documents.Type: GrantFiled: April 2, 2009Date of Patent: August 28, 2012Assignee: Check Point Software Technologies LtdInventors: Alon Kantor, Liran Antebi, Yoav Kirsch, Uri Bialik
-
Publication number: 20120167212Abstract: Disclosed are methods and media for inspecting security certificates. Methods include the steps of: scanning, by a network security device, messages of a security protocol between a server and a client system; detecting the messages having a security certificate; detecting suspicious security certificates from the messages; and aborting particular sessions of the security protocol associated with the suspicious certificates. Preferably, the step of scanning is performed only on messages of server certificate records. Preferably, the method further includes the step of sending an invalid-certificate notice to the server and the client system. Preferably, the step of detecting the suspicious certificates includes detecting a use of an incorrectly-generated private key for the certificates. Preferably, the step of detecting the suspicious certificates includes detecting an unavailability of revocation information for the certificates.Type: ApplicationFiled: March 4, 2012Publication date: June 28, 2012Applicant: CHECK POINT SOFTWARE TECHNOLOGIES, LTD.Inventors: Guy Guzner, Ami Haviv, Danny Lieblich, Yahav Gal
-
Patent number: 8176539Abstract: The present invention discloses methods, media, and gateways for protecting against cookie-poisoning attacks in networked-communication applications. Methods include the steps of: creating a protected gateway cookie, generated by a gateway, for a server cookie, generated by a server, wherein the server cookie is received by the gateway in an HTTP response message; and validating, by the gateway, that a client cookie from a client request has a corresponding gateway cookie with expected field values. Preferably, the field values include at least one field value selected from the group consisting of: a name, a hash value computed over the server cookie, a hash-function index, a timestamp, a nonce, a hash value computed over newly-generated values, a path, a domain, an expiration, and an HTTP-only value. Preferably, the gateway cookie is signed with a secret key. Most preferably, the secret key is generated by a secret seed.Type: GrantFiled: October 28, 2008Date of Patent: May 8, 2012Assignee: Check Point Software Technologies Ltd.Inventors: Ori Aldor, Neta Solomon
-
Patent number: 8161188Abstract: Disclosed are devices and methods for providing network access control utilizing traffic-regulation hardware, the device including: at least one client-side port for operationally connecting to a client system; at least one network-side port for operationally connecting to a network; a logic module for regulating network traffic, based on device-related data, between the ports, the logic module including: a memory unit for storing and loading the device-related data; and a CPU for processing the device-related data; and at least one relay, between at least one respective client-side port and at least one respective network-side port, configured to open upon receiving a respective network-access-denial command from the logic module. Preferably, the logic module is configured to maintain an open-relay line-rate when at least one relay is open, and to maintain a closed-relay line-rate when at least one relay is closed.Type: GrantFiled: May 4, 2008Date of Patent: April 17, 2012Assignee: Check Point Software Technologies, LtdInventors: Oded Gonda, Yaron Sheffer
-
Patent number: 8146159Abstract: Disclosed are methods and media for inspecting security certificates. Methods include the steps of: scanning, by a network security device, messages of a security protocol between a server and a client system; detecting the messages having a security certificate; detecting suspicious security certificates from the messages; and aborting particular sessions of the security protocol associated with the suspicious certificates. Preferably, the step of scanning is performed only on messages of server certificate records. Preferably, the method further includes the step of: sending an invalid-certificate notice to the server and the client system. Preferably, the step of detecting the suspicious certificates includes detecting a use of an incorrectly-generated private key for the certificates. Preferably, the step of detecting the suspicious certificates includes detecting an unavailability of revocation information for the certificates.Type: GrantFiled: January 20, 2009Date of Patent: March 27, 2012Assignee: Check Point Software Technologies, Ltd.Inventors: Guy Guzner, Ami Haviv, Danny Lieblich, Yahav Gal
-
Publication number: 20120057591Abstract: A method and system is provided for a scalable clustered system. The method and system may handle asynchronous traffic as well as session backup. In the method and system, a home cluster member having ownership of a local session predicts designation of a an other cluster member to receive a packet associated with the local session and sends appropriate state information or forwarding instruction to the other network member.Type: ApplicationFiled: September 7, 2010Publication date: March 8, 2012Applicant: CHECK POINT SOFTWARE TECHNOLOGIES LTD.Inventors: Amir Erman, Amnon Perlmutter, Ben Zion Weissman
-
Publication number: 20120023480Abstract: A data leak prevention application that categorizes documents by data type is provided, a data type being a sensitivity classification of a document based on what data the document contains. A scripting language processing engine is embedded into the data leak prevention application, the scripting language forming part of the application as hard code. A user configures interaction of the scripting language processing engine with the application. The configuring may include modifying or adding code or setting criteria for when code portions of the scripting language processing engine activates. The scripting language processing engine is activated to enhance an accuracy of an existing data type or so as to detect a new data type. Upon enhancing the accuracy of the data type, documents may be re-categorized.Type: ApplicationFiled: July 26, 2010Publication date: January 26, 2012Applicant: Check Point Software Technologies Ltd.Inventors: Amnon Perlmutter, Aviad Mor, Oded Gonda, Ofer Raz, Matt LeGrow
-
Patent number: 8090727Abstract: Methods, for automatically generating natural-language news items from log files, including the steps of: gathering at least one data record; filtering at least one data record according to at least one rule to produce at least one filtered data set; aggregating at least one filtered data set; analyzing at least one filtered data set for at least one statistical trend; and automatically generating a news item based on at least one statistical trend. Preferably, the method further includes the step of: customizing the news item based on a relative importance of at least one statistical trend. Preferably, the method further includes the step of: performing a drill-down analysis on at least one statistical trend. Most preferably, the method further includes the step of: enriching the news item based on the drill-down analysis. Preferably, the method further includes the step of: embedding at least one graphical element into the news item.Type: GrantFiled: May 20, 2008Date of Patent: January 3, 2012Assignee: Check Point Software Technologies Ltd.Inventors: Marina Lachtarnik, Gil Raviv
-
Methods for automatic categorization of internal and external communication for preventing data loss
Patent number: 8051187Abstract: Disclosed are methods for automatic categorization of internal and external communication, the method including the steps of: defining groups of entities that transmit data; monitoring data flow of the groups; extracting the data, from the data flow, for learning traffic-flow characteristics of the groups; classifying the data into group flows; upon the data being transmitted, checking the data to determine whether the data is designated as group-internal; and blocking data traffic for data that is group-internal. Preferably, the step of monitoring includes assigning data weights to the data using Bayesian methods. Most preferably, the step of classifying includes classifying the data using Bayesian methods for evaluating the data weights. Preferably, the step of blocking includes blocking data traffic between members of two or more groups. Preferably, the method further includes the step of: enabling an authorized entity to unblock the data traffic.Type: GrantFiled: December 22, 2008Date of Patent: November 1, 2011Assignee: Check Point Software Technologies Ltd.Inventors: Tomer Noy, Alon Kantor, Uri Bialik, Yoav Kirsch