Patents Assigned to Cyber-Ark Software Ltd.
  • Patent number: 11316857
    Abstract: Disclosed embodiments include techniques for automatically provisioning dynamic privileged access resources. Aspects may involve receiving a notification that an identity is seeking to participate in a privileged session with an access-restricted network resource, and automatically provisioning, in response to the notification, a privileged access resource for use by the identity in participating in the privileged session with the access-restricted network resource. Further, aspects may include determining that the privileged session with the access-restricted network resource has ended, and automatically deprovisioning, based on the determination, the privileged access resource.
    Type: Grant
    Filed: July 11, 2018
    Date of Patent: April 26, 2022
    Assignee: Cyber Ark Software Ltd.
    Inventor: Asaf Hecht
  • Patent number: 9876804
    Abstract: Methods and systems are disclosed for detecting unauthorized actions associated with network resources, the actions including access to the resource and activity associated with the resource. The unauthorized actions are detected by analyzing action data of a client action associated with the network resource against credential retrieval data including records of authorized actions and/or procedures for performing an action associated with the network resource.
    Type: Grant
    Filed: October 20, 2013
    Date of Patent: January 23, 2018
    Assignee: Cyber-Ark Software Ltd.
    Inventors: Andrey Dulkin, Yair Sade, Roy Adar
  • Patent number: 9781096
    Abstract: Application-to-Application authentication features using a second communication channel for out-of-band authentication separate from a communication channel of a request from a client to a server. Authentication information is associated with a component of the system such as the request or the client application, while being collected independent of interaction with the client application initiating the request. Implementations provide improved security over existing solutions using in-band or other means of collecting authentication information.
    Type: Grant
    Filed: June 24, 2016
    Date of Patent: October 3, 2017
    Assignee: Cyber-Ark Software Ltd.
    Inventors: Yair Sade, Andrey Dulkin
  • Patent number: 9712563
    Abstract: A method of managing a connection-specific policy for accessing a target system includes receiving a request from a user client for a connection with a target system. A unique identifier is determined for the requested connection. Connection settings for connecting to the target system are provided to the user client. The connection settings include the unique connection identifier. A corresponding access policy for the connection identifier is provided to the target system. The target system applies the corresponding access policy on the connection established with the connection settings.
    Type: Grant
    Filed: July 7, 2015
    Date of Patent: July 18, 2017
    Assignee: Cyber-Ark Software Ltd.
    Inventors: Doron Shem Tov, Yair Sade, Shlomy Marom, Millie Richter
  • Patent number: 9712548
    Abstract: A computer-implemented method for determining whether a computer network is compromised by unauthorized activity on the computer network. The computer-implemented method comprises identifying a behavioral anomaly of an entity on the computer network, classifying the anomaly as a system event based on an assigned score for the anomaly being at least at a predetermined score threshold, updating an incident based on at least one common parameter between the system event and other system events which comprise the incident, each system event of the incident including an assigned score from when the event was an anomaly, updating a system status based on at least the incident, and assigning a system status score to the system status, and, determining whether the system status score is at least at a predetermined threshold system status score indicating that the computer network may be compromised.
    Type: Grant
    Filed: October 27, 2014
    Date of Patent: July 18, 2017
    Assignee: Cyber-Ark Software Ltd.
    Inventors: Aviram Shmueli, Andrey Dulkin, Yair Sade, Assaf Weiss
  • Patent number: 9712514
    Abstract: A method of establishing privileged communication sessions to target services unifies multiple sub-sessions into a single super-session. The user client requests access to target services. The request includes authentication credentials. Using the authentication credentials, privileged credentials are retrieved for target services requiring privileged access. Interactive sub-sessions are established between an intermediate element and respective target services. Required credentials are provided by the intermediate element to the target services. The interactive sub-sessions are unified into a single super-session on the intermediate element, and the super-session is established with the user client. The super-session provides the user client with interactive control of each of the interactive sub-sessions. Data communication between the user client and the target services is conducted via the intermediate element.
    Type: Grant
    Filed: February 8, 2015
    Date of Patent: July 18, 2017
    Assignee: Cyber-Ark Software Ltd.
    Inventors: Erez Breiman, Eran Pinhas, Ran Deri, Yair Sade, Yaron Mazor
  • Patent number: 9699261
    Abstract: A method of monitoring a session on a target system includes receiving from a user client a user request to open a session with the target system. A session-specific transient agent for monitoring the session is installed onto the target system. The session is established between the user and the target system over a communication network. The transient agent monitors the session, collects data of events occurring on the target system during the session. The transient agent is terminated when the session ends.
    Type: Grant
    Filed: January 14, 2014
    Date of Patent: July 4, 2017
    Assignee: Cyber-Ark Software Ltd.
    Inventors: Yair Sade, Erez Breiman, Ran Stotsky, Andrey Dulkin
  • Patent number: 9680813
    Abstract: A method of credential provisioning on a target service utilizes three credential sets: authentication credentials, privileged credentials and provisioned credentials. An intermediate element receives a request from a user client to establish a session with a target service. The request includes authentication credentials. The intermediate element creates provisioned credentials using privileged credentials which are authorized for creating provisioned credentials for accessing the target service. Once provisioned credentials have been created, a dual session communication channel is established between the user client and the target service. The session between the user client and intermediate element is established using the authentication credentials and the session between the intermediate element and the target service is established using the provisioned credentials. Optionally, user authorization to establish a session with the target service is determined prior to creating the provisioned credentials.
    Type: Grant
    Filed: September 8, 2014
    Date of Patent: June 13, 2017
    Assignee: Cyber-Ark Software Ltd.
    Inventors: Yair Sade, Roy Adar, Yossi Dantes, Tzippi Yitzhack, Andrey Dulkin
  • Patent number: 9607134
    Abstract: Protected publication of sensitive documents with authentication and accountability enables storing and sharing confidential files, while reducing risk that a recipient will distribute and share the file information with unauthorized recipients. Every user request for an original file generates a unique provided file based on the original file, the user request, and configuration information. The provided file has characteristics that make the provided file based on a first user request unique from any other provided file based on any other user request. Unique characteristics include changing the format of the original file to another format for the provided file, altering file properties, altering file content, and watermarking.
    Type: Grant
    Filed: April 6, 2014
    Date of Patent: March 28, 2017
    Assignee: Cyber-Ark Software Ltd.
    Inventors: Andrey Dulkin, Ori Hirshfeld, Oded Valin
  • Patent number: 9565203
    Abstract: There is provided a computer implemented method for detecting anomalous behavior in a network, comprising: receiving data representing at least one network activity, each network activity representing a certain data access event involving certain network entities; extracting from the data the certain network entities involved in the respective network activity; retrieving at least one relevant diversity value from a network behavior model based on the extracted certain network entities, wherein the network behavior model includes at least one diversity value, wherein each respective diversity value represents a certain relationship between at least one network entity and at least one network entity type; calculating an abnormality score for the received network activity based on the retrieved relevant diversity values; and classifying the network activity as anomalous or normal based on the calculated abnormality score.
    Type: Grant
    Filed: November 13, 2014
    Date of Patent: February 7, 2017
    Assignee: Cyber-Ark Software Ltd.
    Inventors: Ruth Bernstein, Andrey Dulkin
  • Patent number: 9560067
    Abstract: Methods and systems are disclosed for identifying security risks, arising from credentials existing on machines in the networks that enable access to other machines on the networks. Account credentials indications are retrieved from machines in the network, which indicate that credentials for accounts are stored on those machines. Access rights for accounts are collected, describing the access and operation permissions of these accounts on machines in the networks. A correlation is then performed to identify machines that can be accessed by employing credentials of accounts retrieved from other machines in the network.
    Type: Grant
    Filed: June 9, 2016
    Date of Patent: January 31, 2017
    Assignee: Cyber-Ark Software Ltd.
    Inventors: Andrey Dulkin, Denis Kamanovsky, Yoel Eilat, Yair Sade
  • Patent number: 9497206
    Abstract: A method for identifying anomalies in a group of network addresses includes building a model of the group of network addresses and identifying a network address as anomalous based on the deviation of the network address from the model. The model is built from a group of network addresses. The network addresses are input and parsed into one or more address trees. A ripeness score is maintained for each of the nodes in the address trees, based, at least in part, on the number of occurrences of the network address portion represented by the node. Nodes having respective ripeness scores within a specified range are classified as ripe nodes, and may be indicative of normal behavior, and nodes having respective ripeness scores outside the specified range of ripeness scores are classified as unripe, and may be indicative of anomalous behavior.
    Type: Grant
    Filed: April 16, 2014
    Date of Patent: November 15, 2016
    Assignee: Cyber-Ark Software Ltd.
    Inventors: Ruth Bernstein, Andrey Dulkin, Assaf Weiss, Aviram Shmueli
  • Publication number: 20160294863
    Abstract: Methods and systems are disclosed for identifying security risks, arising from credentials existing on machines in the networks that enable access to other machines on the networks. Account credentials indications are retrieved from machines in the network, which indicate that credentials for accounts are stored on those machines. Access rights for accounts are collected, describing the access and operation permissions of these accounts on machines in the networks. A correlation is then performed to identify machines that can be accessed by employing credentials of accounts retrieved from other machines in the network.
    Type: Application
    Filed: June 9, 2016
    Publication date: October 6, 2016
    Applicant: Cyber-Ark Software Ltd.
    Inventors: Andrey DULKIN, Denis KAMANOVSKY, Yoel EILAT, Yair SADE
  • Patent number: 9386044
    Abstract: Methods and systems are disclosed for identifying security risks, arising from credentials existing on machines in the networks that enable access to other machines on the networks. Account credentials indications are retrieved from machines in the network, which indicate that credentials for accounts are stored on those machines. Access rights for accounts are collected, describing the access and operation permissions of these accounts on machines in the networks. A correlation is then performed to identify machines that can be accessed by employing credentials of accounts retrieved from other machines in the network.
    Type: Grant
    Filed: August 13, 2015
    Date of Patent: July 5, 2016
    Assignee: Cyber-Ark Software Ltd.
    Inventors: Andrey Dulkin, Denis Kamanovsky, Yoel Eilat, Yair Sade
  • Publication number: 20150350238
    Abstract: Methods and systems are disclosed for identifying security risks, arising from credentials existing on machines in the networks that enable access to other machines on the networks. Account credentials indications are retrieved from machines in the network, which indicate that credentials for accounts are stored on those machines. Access rights for accounts are collected, describing the access and operation permissions of these accounts on machines in the networks. A correlation is then performed to identify machines that can be accessed by employing credentials of accounts retrieved from other machines in the network.
    Type: Application
    Filed: August 13, 2015
    Publication date: December 3, 2015
    Applicant: Cyber-Ark Software Ltd
    Inventors: Andrey DULKIN, Denis Kamanovsky, Yoel Eilat, Yair Sade
  • Patent number: 9185136
    Abstract: Methods and systems are disclosed for identifying security risks, arising from credentials existing on machines in the networks that enable access to other machines on the networks. Account credentials indications are retrieved from machines in the network, which indicate that credentials for accounts are stored on those machines. Access rights for accounts are collected, describing the access and operation permissions of these accounts on machines in the networks. A correlation is then performed to identify machines that can be accessed by employing credentials of accounts retrieved from other machines in the network.
    Type: Grant
    Filed: November 28, 2013
    Date of Patent: November 10, 2015
    Assignee: Cyber-Ark Software Ltd.
    Inventors: Andrey Dulkin, Denis Kamanovsky, Yoel Eilat, Yair Sade
  • Publication number: 20150304292
    Abstract: A system and method for secure authentication facilitates improving the security of authentication between a client and a target by using an innovative authentication module on a proxy. The client can connect to the proxy using a native protocol and provides client credentials to the proxy. The proxy uses an authentication module to authenticate the client and then to provide target access credentials for proxy-target authentication, thereby giving the client access to the target through the proxy. The invention facilitates connection between the client and the target without requiring the client to be in possession of the target access credentials. The proxy can optionally be connected to a privileged, access management system which can provide and/or store target access credentials. Proxy-provided target access credentials facilitate preventing a client security breech from exposing target access credentials.
    Type: Application
    Filed: October 22, 2013
    Publication date: October 22, 2015
    Applicant: CYBER-ARK SOFTWARE LTD.
    Inventors: Andrey DULKIN, Yair SADE
  • Publication number: 20150304349
    Abstract: A method for identifying anomalies in a group of network addresses includes building a model of the group of network addresses and identifying a network address as anomalous based on the deviation of the network address from the model. The model is built from a group of network addresses. The network addresses are input and parsed into one or more address trees. A ripeness score is maintained for each of the nodes in the address trees, based, at least in part, on the number of occurrences of the network address portion represented by the node. Nodes having respective ripeness scores within a specified range are classified as ripe nodes, and may be indicative of normal behavior, and nodes having respective ripeness scores outside the specified range of ripeness scores are classified as unripe, and may be indicative of anomalous behavior.
    Type: Application
    Filed: April 16, 2014
    Publication date: October 22, 2015
    Applicant: Cyber-Ark Software Ltd.
    Inventors: Ruth Bernstein, Andrey Dulkin, Assaf Weiss, Aviram Shmueli
  • Publication number: 20150271162
    Abstract: A method and system is provided for controlling a remote target application, including sensitive and privileged applications, via a remote application connection. The target application is executed with a set of credentials, different than those credentials submitted by the user to access the target application. The user, via a local client terminal, accesses the target application over the remote application connection, such that the user experience of interaction with the target application is similar to that of the target application running locally, while the target application is actually being run remotely. The execution is protected by the second set of credentials unknown to the user, thus preventing credential hijacking and various other threats to the sensitive application.
    Type: Application
    Filed: March 18, 2014
    Publication date: September 24, 2015
    Applicant: Cyber-Ark Software Ltd.
    Inventors: Andrey Dulkin, Erez Breiman, Yair Sade
  • Publication number: 20150222639
    Abstract: A system and method for maintaining continuous operational access augmented with user authentication and action attribution in shared environments. Multiple users use the same machine/platform to perform their actions. The system includes an access control application and enforcement module that limit users' actions based on authentication and authority level, enabling each user to perform the user's role in the shared environment. In addition, the user's activities can be monitored, logged, and interfered with (such as terminating the session), enabling a key requirement of action attribution.
    Type: Application
    Filed: October 1, 2013
    Publication date: August 6, 2015
    Applicant: Cyber-Ark Software Ltd.
    Inventors: Andrey Dulkin, Yair Sade