Patents Assigned to PortAuthority Technologies Inc.
-
Patent number: 9348984Abstract: A method for computer workstation based information protection is presented, the method comprises: a) monitoring user's actions on the computer workstation, b) analysis of the actions in respect to a pre-defined policy to determine whether the actions prejudice information to which the policy applies, and c) executing the policy in accordance with the results of the analysis to prevent or modify or restrict or monitor or log the actions.Type: GrantFiled: February 13, 2012Date of Patent: May 24, 2016Assignee: PortAuthority Technologies, Inc.Inventors: Ariel Peled, Lidror Troyansky, Ofir Carny
-
Patent number: 9177120Abstract: A system for external monitoring of networked digital file sharing to track predetermined data content, the system comprising: at least one surveillance element for deployment over said network, said surveillance elements comprising: surveillance functionality for searching said digital file sharing and identification functionality associated with said search functionality for identification of said predetermined data content, therewith to determine whether a given file sharing system is distributing said predetermined data content.Type: GrantFiled: July 25, 2012Date of Patent: November 3, 2015Assignee: PortAuthority Technologies, Inc.Inventors: Ariel Peled, Ofir Carny, Arik Baratz, Oded Arbel, Lidror Troyansky
-
Patent number: 8844016Abstract: A system for network content monitoring and control, comprising: a transport data monitor, connectable to a point in a network, for monitoring data being transported past said point, a signature extractor, associated with said transport data monitor, for extracting a derivation of said data, said derivation being indicative of content of said payload, a database of preobtained signatures of content whose movements it is desired to monitor, and a comparator for comparing said derivation with said preobtained signatures, thereby to determine whether said payload comprises any of said content whose movements it is desired to monitor. The monitoring result may be used in bandwidth control on the network to restrict transport of the content it is desired to control.Type: GrantFiled: August 21, 2012Date of Patent: September 23, 2014Assignee: PortAuthority Technologies, Inc.Inventors: Ariel Peled, Ofir Carny, Lidror Troyansky, Oren Tirosh, Guy Roglit, Galit Gutman
-
Patent number: 8635458Abstract: A method for automatically embedding information in a digital text, said method comprising: identifying a plurality of positions, in said digital text, that are suitable for introducing modifications into said digital text; identifying modifications suitable for introduction into at least some of said suitable positions in said digital text; selecting at least some of said identified modifications for introduction into said digital text, said selection of said modifications being operable to represent said information; and performing said selected modifications on said digital text, thereby to embed said information.Type: GrantFiled: July 21, 2011Date of Patent: January 21, 2014Assignee: PortAuthority Technologies, Inc.Inventors: Lidror Troyansky, Ofir Carny, Ariel Peled
-
Publication number: 20130254883Abstract: A method for mitigating false positive type errors while applying an information leak prevention policy to identify important information and to prevent outward leakage. A positive criterion is defined for a positive set, and a negative criterion for a negative set of benign traffic. An ambiguity set contains items showing indications for both positive and negative sets. An ambiguity resolution criterion allows ambiguous items to be placed in/removed from the positive set or negative set. Each information item is searched for matches with the positive set. Each item in the positive set is checked for membership in the ambiguity set. The ambiguity resolution criteria are used for each member of the ambiguity set and to remove items from the positive set accordingly. The leak prevention policy is applied for all items remaining in the positive set thus protecting the important information.Type: ApplicationFiled: May 13, 2013Publication date: September 26, 2013Applicant: PortAuthority Technologies Inc.Inventors: Lidror TROYANSKY, Assaf Litai, Sharon Bruckner
-
Patent number: 8478824Abstract: A method for classification and enforcement of security requirements in an information dissemination system, said information dissemination system not being designed for said security requirements and enforcement. The method comprising the steps of: accepting a user specification of said security requirements for dissemination of respective information, said specifying is done using a user interface; Associating with said dissemination system an enforcement module, said module being operable to receive said security requirements and apply them to control dissemination via said dissemination system, and then enforcing said dissemination via said module.Type: GrantFiled: February 4, 2003Date of Patent: July 2, 2013Assignee: PortAuthority Technologies Inc.Inventors: Ariel Peled, Ofir Carny
-
Patent number: 8463892Abstract: A method for mitigating false positive type errors while applying an information leak prevention policy, the method comprising the computer implemented steps of: defining at least one positive criterion for a positive set, wherein the positive criterion comprises at least one indicator of a possible breach of the information leak prevention policy; defining at least one negative criterion for a negative set, wherein the negative criterion comprises at least one indicator of benign traffic; establishing an ambiguity set in association with an intersection between the positive set and the negative set, such that information items in the intersection enter the ambiguity set; defining at least one ambiguity resolution criterion for resolving the ambiguity; monitoring and analyzing electronic traffic, where each information item in the traffic is searched for matches with the positive set; checking for membership of each item in the positive set in the ambiguity set; resolving ambiguities using one of the ambiguitType: GrantFiled: July 13, 2006Date of Patent: June 11, 2013Assignee: PortAuthority Technologies Inc.Inventors: Lidror Troyansky, Assaf Litai, Sharon Bruckner
-
Publication number: 20130104191Abstract: A method and a system for information management and control is presented, based on modular and abstract description of the information. Identifiers are used to identify features of interest in the information and information use policies are assigned directly or indirectly on the basis of the identifiers, allowing for flexible and efficient policy management and enforcement, in that a policy can be defined with a direct relationship to the actual information content of digital data items. The information content can be of various kinds: e.g., textual documents, numerical spreadsheets, audio and video files, pictures and images, drawings etc. The system can provide protection against information policy breaches such as information misuse, unauthorized distribution and leakage, and for information tracking.Type: ApplicationFiled: December 12, 2012Publication date: April 25, 2013Applicant: PortAuthority Technologies Inc.Inventor: PortAuthority Technologies Inc.
-
Patent number: 8352535Abstract: A method and a system for information management and control is presented, based on modular and abstract description of the information. Identifiers are used to identify features of interest in the information and information use policies are assigned directly or indirectly on the basis of the identifiers, allowing for flexible and efficient policy management and enforcement, in that a policy can be defined with a direct relationship to the actual information content of digital data items. The information content can be of various kinds: e.g., textual documents, numerical spreadsheets, audio and video files, pictures and images, drawings etc. The system can provide protection against information policy breaches such as information misuse, unauthorized distribution and leakage, and for information tracking.Type: GrantFiled: October 28, 2003Date of Patent: January 8, 2013Assignee: PortAuthority Technologies Inc.Inventors: Ariel Peled, Yair Grindlinger, Lidror Troyansky, Ofir Carny, Arik Baratz
-
Publication number: 20120317635Abstract: A system for network content monitoring and control, comprising: a transport data monitor, connectable to a point in a network, for monitoring data being transported past said point, a signature extractor, associated with said transport data monitor, for extracting a derivation of said data, said derivation being indicative of content of said payload, a database of preobtained signatures of content whose movements it is desired to monitor, and a comparator for comparing said derivation with said preobtained signatures, thereby to determine whether said payload comprises any of said content whose movements it is desired to monitor. The monitoring result may be used in bandwidth control on the network to restrict transport of the content it is desired to control.Type: ApplicationFiled: August 21, 2012Publication date: December 13, 2012Applicant: PortAuthority Technologies Inc.Inventors: Ariel Peled, Lidror Troyansky, Ofir Carny, Oren Tirosh, Guy Roglit, Galit Gutman
-
Publication number: 20120291135Abstract: A system for external monitoring of networked digital file sharing to track predetermined data content, the system comprising: at least one surveillance element for deployment over said network, said surveillance elements comprising: surveillance functionality for searching said digital file sharing and identification functionality associated with said search functionality for identification of said predetermined data content, therewith to determine whether a given file sharing system is distributing said predetermined data content.Type: ApplicationFiled: July 25, 2012Publication date: November 15, 2012Applicant: PortAuthority Technologies Inc.Inventors: Ariel PELED, Ofir Carny, Arik Baratz, Oded Arbel, Lidror Troyansky
-
Patent number: 8281139Abstract: A system for network content monitoring and control, comprising: a transport data monitor, connectable to a point in a network, for monitoring data being transported past said point, a signature extractor, associated with said transport data monitor, for extracting a derivation of said data, said derivation being indicative of content of said payload, a database of preobtained signatures of content whose movements it is desired to monitor, and a comparator for comparing said derivation with said preobtained signatures, thereby to determine whether said payload comprises any of said content whose movements it is desired to monitor. The monitoring result may be used in bandwidth control on the network to restrict transport of the content it is desired to control.Type: GrantFiled: October 7, 2009Date of Patent: October 2, 2012Assignee: PortAuthority Technologies Inc.Inventors: Ariel Peled, Ofir Carny, Lidror Troyansky, Oren Tirosh, Guy Roglit, Galit Gutman
-
Patent number: 8271555Abstract: A system for external monitoring of networked digital file sharing to track predetermined data content, the system comprising: at least one surveillance element for deployment over said network, said surveillance elements comprising: surveillance functionality for searching said digital file sharing and identification functionality associated with said search functionality for identification of said predetermined data content, therewith to determine whether a given file sharing system is distributing said predetermined data content.Type: GrantFiled: November 10, 2009Date of Patent: September 18, 2012Assignee: PortAuthority Technologies Inc.Inventors: Ariel Peled, Ofir Carny, Arik Baratz, Oded Arbel, Lidror Troyansky
-
Publication number: 20120144449Abstract: A method for computer workstation based information protection is presented, the method comprises: a) monitoring user's actions on the computer workstation, b) analysis of the actions in respect to a pre-defined policy to determine whether the actions prejudice information to which the policy applies, and c) executing the policy in accordance with the results of the analysis to prevent or modify or restrict or monitor or log the actions.Type: ApplicationFiled: February 13, 2012Publication date: June 7, 2012Applicant: PortAuthority Technologies Inc.Inventors: Ariel Peled, Lidror Troyansky, Ofir Carny
-
Patent number: 8141159Abstract: A method for computer workstation based information protection is presented, the method comprises: a) monitoring user's actions on the computer workstation, b) analysis of the actions in respect to a pre-defined policy to determine whether the actions prejudice information to which the policy applies, and c) executing the policy in accordance with the results of the analysis to prevent or modify or restrict or monitor or log the actions.Type: GrantFiled: December 31, 2003Date of Patent: March 20, 2012Assignee: PortAuthority Technologies Inc.Inventors: Ariel Peled, Lidror Troyansky, Ofir Carny
-
Publication number: 20110276877Abstract: A method for automatically embedding information in a digital text, said method comprising: identifying a plurality of positions, in said digital text, that are suitable for introducing modifications into said digital text; identifying modifications suitable for introduction into at least some of said suitable positions in said digital text; selecting at least some of said identified modifications for introduction into said digital text, said selection of said modifications being operable to represent said information; and performing said selected modifications on said digital text, thereby to embed said information.Type: ApplicationFiled: July 21, 2011Publication date: November 10, 2011Applicant: PortAuthority Technologies Inc.Inventors: Lidror Troyansky, Ofir Carny, Ariel Peled
-
Publication number: 20110264637Abstract: A method for detecting an information item within an information sequence obtained from a digital medium, said information item comprising any one of a specified set of prestored information items, comprising: transforming each of the set of prestored information items into a respective representation, in accordance with a predetermined transformation format; transforming the information sequence obtained from the digital medium, in accordance with the transformation format; and determining the presence of one or more of the prestored information items within the transformed information sequence, utilizing the respective representation, wherein the information items are divided into sets, and applying a security policy that depends on the number of detected information items that belong to the same set.Type: ApplicationFiled: June 30, 2011Publication date: October 27, 2011Applicant: PortAuthority Technologies Inc.Inventors: Ariel PELED, Ofir CARNY, Lidror TROYANSKY
-
Patent number: 7991751Abstract: A method for detecting an information item within an information sequence obtained from a digital medium, the information item comprising any one of a specified set of prestored information items, comprises: transforming each of the set of prestored information items into a respective representation, in accordance with a predetermined transformation format; transforming the information sequence obtained from the digital medium, in accordance with the transformation format; and determining the presence of one or more of the prestored information items within the transformed information sequence, utilizing the respective representation.Type: GrantFiled: April 2, 2004Date of Patent: August 2, 2011Assignee: PortAuthority Technologies Inc.Inventors: Ariel Peled, Ofir Carny, Lidror Troyansky
-
Patent number: 7920298Abstract: According to a first aspect of the present invention, a method for enforcing a distribution policy with respect to information transmitted from a sending fax machine to a recipient fax machine as fax traffic is presented. The method comprising defining an information distribution policy with respect to the fax traffic, then monitoring the fax traffic in accordance with the distribution policy, where the monitoring comprising: (i) de-modulating the fax traffic being monitored into a digital stream; (ii) reconstructing from the digital stream a graphic image representing at least part of the information within the fax traffic; and (iii) analyzing information within the reconstructed image, and then applying the distribution policy with respect to the analyzed fax traffic.Type: GrantFiled: December 7, 2009Date of Patent: April 5, 2011Assignee: PortAuthority Technologies Inc.Inventors: Ariel Peled, Guy Lupo, Lidror Troyansky, Arik Baratz, Ofir Carny, Oren Tirosh
-
Patent number: 7859725Abstract: A method for enforcing a distribution policy associated with an electronic document comprising the steps of: sending the document to an output device; determining said distribution policy associated with said document; instructing a marking module to embed a marking indicating at least the existence of said distribution policy on an output form of said electronic document produced by said output device, said marking being readable to enforce said associated marking policy.Type: GrantFiled: December 18, 2007Date of Patent: December 28, 2010Assignee: PortAuthority Technologies Inc.Inventors: Lidror Troyansky, Ofir Carny, Ariel Peled