Patents Assigned to Check Point Software Technologies LTD
  • Patent number: 8776017
    Abstract: A data leak prevention application that categorizes documents by data type is provided, a data type being a sensitivity classification of a document based on what data the document contains. A scripting language processing engine is embedded into the data leak prevention application, the scripting language forming part of the application as hard code. A user configures interaction of the scripting language processing engine with the application. The configuring may include modifying or adding code or setting criteria for when code portions of the scripting language processing engine activates. The scripting language processing engine is activated to enhance an accuracy of an existing data type or so as to detect a new data type. Upon enhancing the accuracy of the data type, documents may be re-categorized.
    Type: Grant
    Filed: July 26, 2010
    Date of Patent: July 8, 2014
    Assignee: Check Point Software Technologies Ltd
    Inventors: Amnon Perlmutter, Aviad Mor, Oded Gonda, Ofer Raz, Matt LeGrow
  • Publication number: 20140165127
    Abstract: To administer computer network security, a computer system receives a bit string that encodes a natural-language request for adjusting a security policy of the network and parses the bit string to identify one or more objects and an action to be applied to the object(s). Preferably, the system displays a description of one of the objects and a menu of operations that are applicable to the object, receives a user selection of one of the options, and effects the selected operation. The scope of the invention also includes a non-transient computer-readable storage medium bearing code for implementing the method and a system for implementing the method.
    Type: Application
    Filed: December 6, 2012
    Publication date: June 12, 2014
    Applicant: CHECK POINT SOFTWARE TECHNOLOGIES LTD.
    Inventors: Uri BIALIK, Rami BEN-AMI
  • Publication number: 20140143850
    Abstract: A security gateway of a computer network receives incoming packets at one or more network interfaces. One or more security functions are applied to the packets. Reports of security function violations are recorded. The reports include the source addresses of the packets, the times that the packets were received, and descriptions of the violations. The descriptions include weights, and if the sum of the weights, for packets of a common source address that are received within a first time interval, exceeds a threshold, subsequent packets from that source address are dropped. Alternatively, in a “monitor only” mode, the common source address is logged but packets are not dropped. Optionally, encrypted packets and/or packets received at some network interfaces but not at other network interfaces are not dropped.
    Type: Application
    Filed: November 21, 2012
    Publication date: May 22, 2014
    Applicant: Check Point Software Technologies Ltd.
    Inventors: Ofer Barkai, Dorit Dor, Tamir Zegman
  • Patent number: 8726008
    Abstract: A system and method for protecting data communications in a system including a load-balancer connected to a cluster of security network components, e.g. firewall node. The load-balancer transfers one or more of the data streams respectively to the security components. The security network components transmit control information to the load-balancer and the control information includes an instruction regarding balancing load of the data streams between said components; The load-balancer balances load based on the control information. Preferably, network address translation (NAT) is performed by the load-balancer based on the control information or NAT is performed by the security network component and the control information includes information regarding an expected connection based on NAT.
    Type: Grant
    Filed: March 28, 2012
    Date of Patent: May 13, 2014
    Assignee: Check Point Software Technologies Ltd.
    Inventors: Omer Schory, Ofer Raz, Oded Gonda
  • Publication number: 20140123269
    Abstract: A computer-readable storage medium has embedded thereon non-transient computer-readable code for controlling access to a protected computer network, by intercepting packets that are being exchanged between a computer system and the protected network, and then, for each intercepted packet, identifying the associated application that is running on the computer system, determining whether the application is trusted, for example according to a white list or according to a black list, and disposing of the packet accordingly.
    Type: Application
    Filed: May 26, 2013
    Publication date: May 1, 2014
    Applicant: Check Point Software Technologies Ltd.
    Inventors: Lior Drihem, Amnon Perlmutter
  • Patent number: 8713666
    Abstract: Disclosed are methods, devices, and media for enforcing network access control, the method including the steps of: extracting a packet signature from a packet (or packet fragment) received from a network; storing the packet signature and the packet in a buffer; computing a buffer signature using a per-endpoint secret key; determining whether the packet signature and the buffer signature are identical; and upon determining the packet signature and the buffer signature are identical, transmitting the packet to a protocol stack. Preferably, the step of extracting includes extracting the packet signature from a field (e.g. identification field) of a header of the packet. Preferably, the method further includes the step of: upon determining the packet signature and the buffer signature are not identical, discarding the packet. Methods for receiving a packet from a protocol stack, and transmitting the packet to a network are disclosed as well.
    Type: Grant
    Filed: March 27, 2008
    Date of Patent: April 29, 2014
    Assignee: Check Point Software Technologies, Ltd.
    Inventors: Kirill Motil, Almog Cohen, Yaron Sheffer
  • Patent number: 8646073
    Abstract: To protect a user of a social network, the user's activity is monitored during a baseline monitoring period to determine a baseline activity record. If subsequently monitored activity of the user deviates sufficiently from the baseline activity record to indicate abuse (hijacking) of the user's account, the abuse is mitigated, for example by notifying the user of the abuse. Monitored activity includes posting links, updating statuses, sending messages, and changing a profile. Monitoring also includes logging times of the user activity. Monitoring anomalous profile changes does not need a baseline.
    Type: Grant
    Filed: May 18, 2011
    Date of Patent: February 4, 2014
    Assignee: Check Point Software Technologies Ltd.
    Inventor: Gil Raviv
  • Patent number: 8644328
    Abstract: Methods, devices, and media for intelligent NIC bonding and load-balancing including the steps of: providing a packet at an incoming-packet port of a gateway; attaching an incoming-port identification, associated with the incoming-packet port, to the packet; routing the packet to a processing core; passing the packet through a gateway processing; sending the packet, by the core, to the operating system of a host system; and routing the packet to an outgoing-packet port of the gateway based on the incoming-port identification. Preferably, the gateway processing includes security processing of the packets. Preferably, the step of routing the packet to the outgoing-packet port is based solely on the incoming-port identification. Preferably, an outgoing-port identification, associated with the outgoing-packet port, has an identical bond-index to the incoming-port identification.
    Type: Grant
    Filed: March 31, 2011
    Date of Patent: February 4, 2014
    Assignee: Check Point Software Technologies, Ltd.
    Inventors: Amnon Perlmutter, Benzi Waisman
  • Patent number: 8615655
    Abstract: Methods including the steps of: upon sending an IP packet, obtaining, by a sender, a sender identity for a sender of the packet; securely tagging, by a sender, the packet with the sender identity, the packet having a plurality of fixed-length fields concatenated into a single fixed-length virtual field shared between a cryptographic hash and an identity index for supporting multiple distinct identities residing on an IP endpoint; determining, by a receiver, the sender identity by extracting it from the packet; checking, by the receiver, the packet to ensure the packet has been appropriately tagged; and enforcing a security policy, by the receiver, according to the sender identity. Preferably, the step of obtaining includes: accessing, by the sender, a server for obtaining the sender identity; and associating, by the server, the sender identity with the endpoint. Most preferably, the associating is performed using a prefix code for encoding the identities.
    Type: Grant
    Filed: January 22, 2009
    Date of Patent: December 24, 2013
    Assignee: Check Point Software Technologies, Ltd.
    Inventor: Avi Shua
  • Publication number: 20130304690
    Abstract: To validate data, a plurality of strings that match a predetermined regular expression is extracted from the data. A validated subset of the strings is identified. To determine whether the validated subset has been falsely validated, it is determined whether the validated subset satisfies each of one or more predetermined criteria relative to the plurality of strings. In one embodiment, the subset is determined to be falsely validated if at least one of the criteria is satisfied. In another embodiment, the subset is determined to be falsely validated if all of the criteria are satisfied. The data are released only if the subset is determined to be falsely validated.
    Type: Application
    Filed: May 10, 2012
    Publication date: November 14, 2013
    Applicant: CHECK POINT SOFTWARE TECHNOLOGIES LTD.
    Inventors: Amnon Perlmutter, Limor Ganon, Meir Jonathan Dehan
  • Patent number: 8533808
    Abstract: A method for protecting data communications using a multiple processor device in which multiple processors are operatively connected by a transport mechanism for sharing data. One or more of the processors is programmed as a dispatcher and other processors are programmed with processes. Each of the processes enforce an identical security policy and/or perform an identical or specialized security function. Data streams are transferred respectively from the dispatcher to the processes through the transport mechanism. Control information is transmitted through the transport mechanism from one or more processes to the dispatcher. The control information specifies balancing load of the data streams between the processes. The dispatcher balances load based on the control information.
    Type: Grant
    Filed: March 29, 2007
    Date of Patent: September 10, 2013
    Assignee: Check Point Software Technologies Ltd.
    Inventors: Ofer Raz, Erez Geva, Uri Goren
  • Publication number: 20130156040
    Abstract: A method and system is provided for a scalable clustered system. The method and system may handle asynchronous traffic as well as session backup. In the method and system, a home cluster member having ownership of a local session predicts designation of a an other cluster member to receive a packet associated with the local session and sends appropriate state information or forwarding instruction to the other network member.
    Type: Application
    Filed: February 13, 2013
    Publication date: June 20, 2013
    Applicant: CHECK POINT SOFTWARE TECHNOLOGIES LTD.
    Inventor: CHECK POINT SOFTWARE TECHNOLOGIES LTD.
  • Publication number: 20130117853
    Abstract: Three heuristic layers are used to determine whether suspicious code received at a port of a data processing device is malware. First, static analysis is applied to the suspicious code. If the suspicious code passes the static analysis, dissembling analysis is applied to the suspicious code. Preferably, if the suspicious code passes the dissembling analysis, dynamic analysis is applied to the suspicious code.
    Type: Application
    Filed: November 26, 2012
    Publication date: May 9, 2013
    Applicant: CHECK POINT SOFTWARE TECHNOLOGIES LTD.
    Inventor: CHECK POINT SOFTWARE TECHNOLOGIES LT
  • Patent number: 8406233
    Abstract: A method and system is provided for a scalable clustered system. The method and system may handle asynchronous traffic as well as session backup. In the method and system, a home cluster member having ownership of a local session predicts designation of a an other cluster member to receive a packet associated with the local session and sends appropriate state information or forwarding instruction to the other network member.
    Type: Grant
    Filed: September 7, 2010
    Date of Patent: March 26, 2013
    Assignee: Check Point Software Technologies Ltd.
    Inventors: Amir Erman, Amnon Perlmutter, Ben Zion Weissman
  • Patent number: 8375452
    Abstract: Disclosed are methods for user profiling for detecting insider threats including the steps of: upon a client application sending a request for a link, extracting at least one search keyword from a search session associated with the request; classifying the link into at least one classification; determining whether at least one classification is a monitored classification; capturing search elements of search sessions associated with the monitored classification; acquiring usage data from the search elements to create a user profile associated with a user's search behavior; and performing a statistical analysis, on a search frequency for the monitored classification, on user profiles associated with many users.
    Type: Grant
    Filed: December 25, 2008
    Date of Patent: February 12, 2013
    Assignee: Check Point Software Technologies Ltd
    Inventor: Gil Raviv
  • Patent number: 8370934
    Abstract: Three heuristic layers are used to determine whether suspicious code received at a port of a data processing device is malware. First, static analysis is applied to the suspicious code. If the suspicious code passes the static analysis, dissembling analysis is applied to the suspicious code. Preferably, if the suspicious code passes the dissembling analysis, dynamic analysis is applied to the suspicious code.
    Type: Grant
    Filed: January 20, 2010
    Date of Patent: February 5, 2013
    Assignee: Check Point Software Technologies Ltd.
    Inventors: Siarhei Tsviatkou, Siarhei Rabinin, Aliaksei Vavilau, Andrei Ryshkevich
  • Publication number: 20120297477
    Abstract: To protect a user of a social network, the user's activity is monitored during a baseline monitoring period to determine a baseline activity record. If subsequently monitored activity of the user deviates sufficiently from the baseline activity record to indicate abuse (hijacking) of the user's account, the abuse is mitigated, for example by notifying the user of the abuse. Monitored activity includes posting links, updating statuses, sending messages, and changing a profile. Monitoring also includes logging times of the user activity. Monitoring anomalous profile changes does not need a baseline.
    Type: Application
    Filed: May 18, 2011
    Publication date: November 22, 2012
    Applicant: CHECK POINT SOFTWARE TECHNOLOGIES LTD.
    Inventor: Gil RAVIV
  • Publication number: 20120297491
    Abstract: A system and method for protecting data communications in a system including a toad-balancer connected to a cluster of security network components, e.g. firewall node. The load-balancer transfers one or more of the data streams respectively to the security components. The security network components transmit control information to the load-balancer and the control information includes an instruction regarding balancing load of the data streams between said components; The load-balancer balances load based on the control information. Preferably, network address translation (NAT) is performed by the load-balancer based on the control information or NAT is performed by the security network component and the control information includes information regarding an expected connection based on NAT.
    Type: Application
    Filed: March 28, 2012
    Publication date: November 22, 2012
    Applicant: CHECK POINT SOFTWARE TECHNOLOGIES LTD.
    Inventors: Omer Schory, Ofer Raz, Oded Gonda
  • Patent number: 8254698
    Abstract: The present invention discloses methods for document-to-template matching for data-leak prevention (DLP), the methods including the steps of: providing a document as a stream of characters; splitting the stream into a plurality of serialized data lines; calculating a hash value for each serialized data line; checking for each hash value in a hash map of a template set; determining a similarity match to a particular template based on a predefined threshold of template hash values, of the template set, being found in the stream; and based on the similarity match, executing a DLP security policy for the document. Preferably, the template set is extracted from documents manually prepared by a security administrator. Preferably, each template in the template set is deduced automatically from a plurality of documents.
    Type: Grant
    Filed: April 2, 2009
    Date of Patent: August 28, 2012
    Assignee: Check Point Software Technologies Ltd
    Inventors: Alon Kantor, Liran Antebi, Yoav Kirsch, Uri Bialik
  • Publication number: 20120167212
    Abstract: Disclosed are methods and media for inspecting security certificates. Methods include the steps of: scanning, by a network security device, messages of a security protocol between a server and a client system; detecting the messages having a security certificate; detecting suspicious security certificates from the messages; and aborting particular sessions of the security protocol associated with the suspicious certificates. Preferably, the step of scanning is performed only on messages of server certificate records. Preferably, the method further includes the step of sending an invalid-certificate notice to the server and the client system. Preferably, the step of detecting the suspicious certificates includes detecting a use of an incorrectly-generated private key for the certificates. Preferably, the step of detecting the suspicious certificates includes detecting an unavailability of revocation information for the certificates.
    Type: Application
    Filed: March 4, 2012
    Publication date: June 28, 2012
    Applicant: CHECK POINT SOFTWARE TECHNOLOGIES, LTD.
    Inventors: Guy Guzner, Ami Haviv, Danny Lieblich, Yahav Gal