Patents Assigned to Shine Security Ltd.
  • Publication number: 20180227316
    Abstract: A computerized method of preemptive event handling, The method comprises monitoring, in run time at kernel level, a plurality of events of a plurality of processes executed by an operating system (OS) running on a computing device, detecting, in run time, a first event of the plurality of events, the first event being performed by a first process of the plurality of processes on the computing device, classifying, in run time, the first process as a malware in response to the detection of the first event, and preventing, in run time, the first process from running on the computing device before the first event is processed by the OS.
    Type: Application
    Filed: April 3, 2018
    Publication date: August 9, 2018
    Applicant: Shine Security Ltd.
    Inventors: Itay KATZ, Ianir IDESES, Ron PORAT, Alon BLAYER-GAT, Oren FARAGE
  • Publication number: 20180139218
    Abstract: A computerized method of reverting system data affected by a malware. The method comprises monitoring, in run time, a plurality of events of a plurality of processes executed by an operating system (OS) running on a computing device, logging in an event log, in run time, the plurality of events, classifying, in run time, a first process of the plurality of processes as a malware, identifying a set of events of the first process from the plurality of events using the event log, and reverting, in response to the classification, at least one system object hosted in the computing device to remove an effect of the set of events on the OS.
    Type: Application
    Filed: January 15, 2018
    Publication date: May 17, 2018
    Applicant: Shine Security Ltd.
    Inventors: Itay Katz, Ianir Ideses, Ron Porat, Alon Blayer-Gat, Oren Farage
  • Patent number: 9942246
    Abstract: A computerized method of preemptive event handling, The method comprises monitoring, in run time at kernel level, a plurality of events of a plurality of processes executed by an operating system (OS) running on a computing device, detecting, in run time, a first event of the plurality of events, the first event being performed by a first process of the plurality of processes on the computing device, classifying, in run time, the first process as a malware in response to the detection of the first event, and preventing, in run time, the first process from running on the computing device before the first event is processed by the OS.
    Type: Grant
    Filed: August 31, 2014
    Date of Patent: April 10, 2018
    Assignee: Shine Security Ltd.
    Inventors: Itay Katz, Ianir Ideses, Ron Porat, Alon Blayer-Gat, Oren Farage
  • Publication number: 20180070261
    Abstract: A method of queuing network traffic events on a client terminal. The method comprises monitoring, in run time, a plurality of network traffic events triggered by a plurality of applications executed on a client terminal, extracting a plurality of network traffic event characteristics of each of the plurality of network traffic events, classifying each one of the plurality of network traffic events according to a respective the plurality of network traffic event characteristics, clustering the plurality of network traffic events in a plurality of clusters according to the classifying, and managing an opening a plurality data connections between the client terminal and a network such that the content of each cluster of the plurality of clusters is transmitted in another of the plurality data connections.
    Type: Application
    Filed: October 30, 2017
    Publication date: March 8, 2018
    Applicant: Shine Security Ltd.
    Inventors: Ianir IDESES, Itay KATZ, Doron SHAMIA SADEH
  • Patent number: 9871809
    Abstract: A computerized method of reverting system data affected by a malware. The method comprises monitoring, in run time, a plurality of events of a plurality of processes executed by an operating system (OS) running on a computing device, logging in an event log, in run time, the plurality of events, classifying, in run time, a first process of the plurality of processes as a malware, identifying a set of events of the first process from the plurality of events using the event log, and reverting, in response to the classification, at least one system object hosted in the computing device to remove an effect of the set of events on the OS.
    Type: Grant
    Filed: August 26, 2014
    Date of Patent: January 16, 2018
    Assignee: Shine Security Ltd.
    Inventors: Itay Katz, Ianir Ideses, Ron Porat, Alon Blayer-Gat, Oren Farage
  • Patent number: 9807639
    Abstract: A method of queuing network traffic events on a client terminal. The method comprises monitoring, in run time, a plurality of network traffic events triggered by a plurality of applications executed on a client terminal, extracting a plurality of network traffic event characteristics of each of the plurality of network traffic events, classifying each one of the plurality of network traffic events according to a respective the plurality of network traffic event characteristics, clustering the plurality of network traffic events in a plurality of clusters according to the classifying, and managing an opening a plurality data connections between the client terminal and a network such that the content of each cluster of the plurality of clusters is transmitted in another of the plurality data connections.
    Type: Grant
    Filed: January 29, 2015
    Date of Patent: October 31, 2017
    Assignee: Shine Security Ltd.
    Inventors: Ianir Ideses, Itay Katz, Doron Shamia Sadeh
  • Publication number: 20160357966
    Abstract: A method of identifying one or more malicious threats in a computing device. The device comprises monitoring a plurality of events occurring on a computing device in run time, a plurality of processes executed on the computing device in run time, and a plurality of host activities of the computing device in run time, identifying a compliance of at least some of the plurality of events, the plurality of processes, and the plurality of host activities with a plurality of rules, generating a rule compliance status dataset generated according to the compliance, identifying a match between the rule compliance status dataset and at least one of a plurality of reference profiles each indicative of a computing device operation under a malicious threat activity, and detecting a malicious threat according to the match.
    Type: Application
    Filed: August 14, 2016
    Publication date: December 8, 2016
    Applicant: Shine Security Ltd.
    Inventors: Ron PORAT, Andrey BAYORA, Oren FARAGE, Alon BLAYER-GAT
  • Patent number: 9419996
    Abstract: A method of identifying one or more malicious threats in a computing device. The device comprises monitoring a plurality of events occurring on a computing device in run time, a plurality of processes executed on the computing device in run time, and a plurality of host activities of the computing device in run time, identifying a compliance of at least some of the plurality of events, the plurality of processes, and the plurality of host activities with a plurality of rules, generating a rule compliance status dataset generated according to the compliance, identifying a match between the rule compliance status dataset and at least one of a plurality of reference profiles each indicative of a computing device operation under a malicious threat activity, and detecting a malicious threat according to the match.
    Type: Grant
    Filed: May 1, 2013
    Date of Patent: August 16, 2016
    Assignee: Shine Security Ltd.
    Inventors: Ron Porat, Andrey Bayora, Oren Farage, Alon Blayer-Gat