Patents Assigned to CORONET CYBER SECURITY LTD
-
Publication number: 20230345356Abstract: A computer implemented method of distributed wireless communications access security, the method comprising steps a computer processor of a server computer is programmed to perform, the steps comprising: receiving data characterizing a device, selecting a policy from a database of policies using the received data characterizing the device, for the device, the policy defining a criterion for determining which wireless access points are allowable, and communicating data defining the selected policy to the device, for the device to use for determining whether access to an active wireless access point is allowable.Type: ApplicationFiled: June 12, 2023Publication date: October 26, 2023Applicant: CORONET CYBER SECURITY LTD.Inventor: Doron MILCHTAICH
-
Publication number: 20230291757Abstract: A computer implemented method for wireless communications access security, the method comprising steps a computer processor of a client device is programmed to perform, the steps comprising: receiving at least one reference set of values from a server computer, each one of the received reference sets pertaining to a respective access point, measuring at least one parameter during wireless communication with an active access point, and determining a threat indication for the active access point based on a deviation of at least one of the measured parameters from a respective one of the received reference sets of values pertaining to the active access point.Type: ApplicationFiled: May 15, 2023Publication date: September 14, 2023Applicant: CORONET CYBER SECURITY LTDInventor: Doron MILCHTAICH
-
Patent number: 11678261Abstract: A computer implemented method of distributed wireless communications access security, the method comprising steps a computer processor of a server computer is programmed to perform, the steps comprising: receiving data characterizing a device, selecting a policy from a database of policies using the received data characterizing the device, for the device, the policy defining a criterion for determining which wireless access points are allowable, and communicating data defining the selected policy to the device, for the device to use for determining whether access to an active wireless access point is allowable.Type: GrantFiled: January 26, 2022Date of Patent: June 13, 2023Assignee: CORONET CYBER SECURITY LTD.Inventor: Doron Milchtaich
-
Patent number: 11652838Abstract: A computer implemented method for wireless communications access security, the method comprising steps a computer processor of a client device is programmed to perform, the steps comprising: receiving at least one reference set of values from a server computer, each one of the received reference sets pertaining to a respective access point, measuring at least one parameter during wireless communication with an active access point, and determining a threat indication for the active access point based on a deviation of at least one of the measured parameters from a respective one of the received reference sets of values pertaining to the active access point.Type: GrantFiled: July 8, 2021Date of Patent: May 16, 2023Assignee: CORONET CYBER SECURITY LTDInventor: Doron Milchtaich
-
Publication number: 20220224692Abstract: A method of multi-factor authentication, the method comprising computer executed steps, the steps comprising: from a computer of a cloud service, receiving data identifying a user logged-in to the cloud service after being successfully authenticated using a first authentication factor, communicating with a client device of the logged-in user, for receiving a second authentication factor from the logged-in user, determining whether the second authentication factor received from the logged-in user is valid, based on a result of the determining, determining a first user-permission policy for the logged-in user, and communicating the determined first user-permission policy to the computer of the cloud service, for the cloud service to base a restriction of usage of the cloud service by the logged-in user on.Type: ApplicationFiled: July 31, 2019Publication date: July 14, 2022Applicant: CORONET CYBER SECURITY LTD.Inventor: Doron MILCHTAICH
-
Publication number: 20220150821Abstract: A computer implemented method of distributed wireless communications access security, the method comprising steps a computer processor of a server computer is programmed to perform, the steps comprising: receiving data characterizing a device, selecting a policy from a database of policies using the received data characterizing the device, for the device, the policy defining a criterion for determining which wireless access points are allowable, and communicating data defining the selected policy to the device, for the device to use for determining whether access to an active wireless access point is allowable.Type: ApplicationFiled: January 26, 2022Publication date: May 12, 2022Applicant: CORONET CYBER SECURITY LTD.Inventor: Doron MILCHTAICH
-
Patent number: 11272443Abstract: A computer implemented method of distributed wireless communications access security, the method comprising steps a computer processor of a server computer is programmed to perform, the steps comprising: receiving data characterizing a device, selecting a policy from a database of policies using the received data characterizing the device, for the device, the policy defining a criterion for determining which wireless access points are allowable, and communicating data defining the selected policy to the device, for the device to use for determining whether access to an active wireless access point is allowable.Type: GrantFiled: April 19, 2017Date of Patent: March 8, 2022Assignee: CORONET CYBER SECURITY LTD.Inventor: Doron Milchtaich
-
Publication number: 20210344699Abstract: A computer implemented method for wireless communications access security, the method comprising steps a computer processor of a client device is programmed to perform, the steps comprising: receiving at least one reference set of values from a server computer, each one of the received reference sets pertaining to a respective access point, measuring at least one parameter during wireless communication with an active access point, and determining a threat indication for the active access point based on a deviation of at least one of the measured parameters from a respective one of the received reference sets of values pertaining to the active access point.Type: ApplicationFiled: July 8, 2021Publication date: November 4, 2021Applicant: CORONET CYBER SECURITY LTDInventor: Doron MILCHTAICH
-
Patent number: 11075928Abstract: A computer implemented method for wireless communications access security, the method comprising steps a computer processor of a client device is programmed to perform, the steps comprising: receiving at least one reference set of values from a server computer, each one of the received reference sets pertaining to a respective access point, measuring at least one parameter during wireless communication with an active access point, and determining a threat indication for the active access point based on a deviation of at least one of the measured parameters from a respective one of the received reference sets of values pertaining to the active access point.Type: GrantFiled: February 22, 2017Date of Patent: July 27, 2021Assignee: CORONET CYBER SECURITY LTDInventor: Doron Milchtaich
-
Publication number: 20200245149Abstract: A computer implemented method of distributed wireless communications access security, the method comprising steps a computer processor of a server computer is programmed to perform, the steps comprising: receiving data characterizing a device, selecting a policy from a database of policies using the received data characterizing the device, for the device, the policy defining a criterion for determining which wireless access points are allowable, and communicating data defining the selected policy to the device, for the device to use for determining whether access to an active wireless access point is allowable.Type: ApplicationFiled: April 19, 2017Publication date: July 30, 2020Applicant: CORONET CYBER SECURITY LTD.Inventor: Doron MILCHTAICH
-
Publication number: 20200244646Abstract: A computer implemented method of remote access computer security, the method comprising steps a computer processor is programmed to perform, the steps comprising: by a computer, receiving and combing data on a client device, data on a user of the client device, data on a network, and data on an information technology service, determining a policy for controlling remote access to the information technology service based on the combined data, and controlling remote access of the user to the information technology service using the remote client device over the network, based on the determined policy.Type: ApplicationFiled: September 10, 2017Publication date: July 30, 2020Applicant: CORONET CYBER SECURITY LTD.Inventor: Mark MISHAEV
-
Patent number: 9615255Abstract: A computer implemented method for wireless communications access security, the method comprising: measuring at least one parameter during a wireless communication with an active access point, calculating at least one indicator from the measured parameter(s), and determining a threat indication by applying a threat evaluation function on the calculated indicator(s).Type: GrantFiled: April 29, 2015Date of Patent: April 4, 2017Assignee: CORONET CYBER SECURITY LTDInventor: Doron Milchtaich