Patents Assigned to VOTIRO CYBERSEC LTD.
-
Patent number: 11822660Abstract: Systems and methods of disarming malicious code in protected content in a computer system having a processor are provided. The method includes determining that a received input file intended for a recipient is protected, the recipient may be connected to a network; accessing a credential associated with the intended recipient for accessing the protected input file; accessing the content of the protected input file based on the credential; modifying at least a portion of digital values of the content of the input file configuring to disable any malicious code included in the input file, thereby creating a modified input file; and protecting the modified input file based on the credential associated with the intended recipient. The method also includes forwarding the protected modified input file to the intended recipient in the network.Type: GrantFiled: August 30, 2021Date of Patent: November 21, 2023Assignee: Votiro Cybersec Ltd.Inventor: Aviv Grafi
-
Patent number: 11816213Abstract: Method and system for protecting an executing environment from malicious code elements, one exemplary method including compiling a set of trustworthy code elements, each code element being executable using an application. The method further includes determining whether the file contains an embedded code element. If the file contains an embedded element, the embedded code element can be authenticated based on the stored set of code elements, to determine whether the embedded code element is trustworthy. Access to the file can be enabled in response to an authentication result that the embedded code element is trustworthy.Type: GrantFiled: December 8, 2020Date of Patent: November 14, 2023Assignee: VOTIRO CYBERSEC LTD.Inventors: Aviv Grafi, Yehuda Neeman
-
Patent number: 11106793Abstract: Systems and methods of disarming malicious code in protected content in a computer system having a processor are provided. The method includes determining that a received input file intended for a recipient is protected, the recipient may be connected to a network; accessing a credential associated with the intended recipient for accessing the protected input file; accessing the content of the protected input file based on the credential; modifying at least a portion of digital values of the content of the input file configuring to disable any malicious code included in the input file, thereby creating a modified input file; and protecting the modified input file based on the credential associated with the intended recipient. The method also includes forwarding the protected modified input file to the intended recipient in the network.Type: GrantFiled: June 21, 2019Date of Patent: August 31, 2021Assignee: Votiro Cybersec Ltd.Inventor: Aviv Grafi
-
Patent number: 10691802Abstract: The disclosed embodiments include a method of disarming malicious code in a computer system having a processor. The method comprises receiving, by the computer system, input content, and rendering, by the processor, any malicious code included in the input content inactive for its intended malicious purpose without applying a malware detection algorithm to the input content. The rendering is performed by automatically applying, using the processor, a data value alteration model to the input content for altering select data values within the input content, and outputting a new content reflecting the application of the data value alteration model to the input content. The processor renders any malicious code included in the input content inactive for its intended malicious purpose without regard to any structure used to encapsulate the input content. The input content includes media content.Type: GrantFiled: July 2, 2018Date of Patent: June 23, 2020Assignee: Votiro Cybersec Ltd.Inventors: Aviv Grafi, Itay Glick
-
Patent number: 10664602Abstract: The disclosed embodiments include a method for retroactively analyzing original input content to detect malicious content in a computer system, in which the original input content has been previously processed to generate modified input content and prevented from being received by an intended recipient. The method includes accessing the original input content or a characteristic associated with the original input content, and analyzing it based on a malware detection algorithm to determine whether the original input content includes suspected malicious content, wherein the malware detection algorithm includes at least one update of a signature or behavioral characteristic that was not included in the malware detection algorithm when the modified input content was generated. When it is determined that the original input content includes suspected malicious content, the method includes analyzing the modified input content to determine whether the modified input content includes the suspected malicious content.Type: GrantFiled: March 20, 2018Date of Patent: May 26, 2020Assignee: Votiro Cybersec Ltd.Inventor: Aviv Grafi
-
Patent number: 10452853Abstract: Systems and methods for disarming malicious code in digitally-signed content are provided. An example method includes determining that content is associated with a first digital signature, modifying at least a portion of digital values of the content to disable any malicious code included in the content, thereby creating modified content, and signing the modified content with a second digital signature, thereby creating signed modified content, the signed modified content including a data element corresponding to the first digital signature.Type: GrantFiled: March 20, 2018Date of Patent: October 22, 2019Assignee: VOTIRO CYBERSEC LTD.Inventor: Aviv Grafi
-
Patent number: 10372912Abstract: The disclosed embodiments include a method for disarming malicious code in a computer system having a processor. The method comprises accessing, by the computer system, input content, wherein the input content includes a plurality of data units having a value representing media content, and adjusting, by the processor, a data unit value of at least a portion of the data units, wherein the portion of the data units and an adjustment of the data unit value are determined so as to render any malicious code included in the plurality of data units inactive for its intended malicious purpose while not interfering with an intended use of the input content.Type: GrantFiled: July 2, 2018Date of Patent: August 6, 2019Assignee: VOTIRO CYBERSEC LTD.Inventors: Aviv Grafi, Itay Glick
-
Patent number: 10331889Abstract: The disclosed embodiments include a method for disarming malicious content in a computer system. The method includes accessing input content intended for a recipient of a network, automatically modifying at least a portion of digital values of the input content to render inactive code that is included in the input content intended for malicious purpose, the modified input content being of the same type as the accessed input content, enabling access to the modified input content by the intended recipient, analyzing the input content according to at least one malware detection algorithm configured to detect malicious content, and enabling access to the input content by the intended recipient when no malicious content is detected according to the at least one malware detection algorithm.Type: GrantFiled: March 20, 2018Date of Patent: June 25, 2019Assignee: VOTIRO CYBERSEC LTD.Inventor: Aviv Grafi
-
Patent number: 10331890Abstract: Systems and methods of disarming malicious code in protected content in a computer system having a processor are provided. The method includes determining that a received input file intended for a recipient is protected, the recipient may be connected to a network; accessing a credential associated with the intended recipient for accessing the protected input file; accessing the content of the protected input file based on the credential; modifying at least a portion of digital values of the content of the input file configuring to disable any malicious code included in the input file, thereby creating a modified input file; and protecting the modified input file based on the credential associated with the intended recipient. The method also includes forwarding the protected modified input file to the intended recipient in the network.Type: GrantFiled: March 20, 2018Date of Patent: June 25, 2019Assignee: VOTIRO CYBERSEC LTD.Inventor: Aviv Grafi
-
Patent number: 10192059Abstract: The disclosed embodiments include a method of disarming active content in a received input file in a computer system having a processor. The method includes steps for identifying from digital content of the input file, targeted active content associated with with an automatically invoked subroutine, altering the automatically invoked subroutine to prevent automatic execution of the instructions associated with the subroutine upon rendering by a rendering application, such that functionality of the targeted active content is preserved, and configuring the input file to include a selectable feature enabling a user to invoke the targeted active content responsive to a user input, thereby creating a reconfigured input file.Type: GrantFiled: December 29, 2017Date of Patent: January 29, 2019Assignee: VOTIRO CYBERSEC LTD.Inventor: Aviv Grafi
-
Publication number: 20180330090Abstract: The disclosed embodiments include a method for disarming malicious code in a computer system having a processor. The method comprises accessing, by the computer system, input content, wherein the input content includes a plurality of data units having a value representing media content, and adjusting, by the processor, a data unit value of at least a portion of the data units, wherein the portion of the data units and an adjustment of the data unit value are determined so as to render any malicious code included in the plurality of data units inactive for its intended malicious purpose while not interfering with an intended use of the input content.Type: ApplicationFiled: July 2, 2018Publication date: November 15, 2018Applicant: VOTIRO CYBERSEC LTD.Inventors: Aviv GRAFI, Itay GLICK
-
Publication number: 20180330089Abstract: The disclosed embodiments include a method of disarming malicious code in a computer system having a processor. The method comprises receiving, by the computer system, input content, and rendering, by the processor, any malicious code included in the input content inactive for its intended malicious purpose without applying a malware detection algorithm to the input content. The rendering is performed by automatically applying, using the processor, a data value alteration model to the input content for altering select data values within the input content, and outputting a new content reflecting the application of the data value alteration model to the input content. The processor renders any malicious code included in the input content inactive for its intended malicious purpose without regard to any structure used to encapsulate the input content. The input content includes media content.Type: ApplicationFiled: July 2, 2018Publication date: November 15, 2018Applicant: VOTIRO CYBERSEC LTD.Inventors: Aviv GRAFI, Itay GLICK
-
Patent number: 10013557Abstract: The disclosed embodiments include a method for disarming malicious code in a computer system having a processor. The method comprises accessing, by the computer system, input content, wherein the input content includes a plurality of data units having a value representing media content, and adjusting, by the processor, a data unit value of at least a portion of the data units, wherein the portion of the data units and an adjustment of the data unit value are determined so as to render any malicious code included in the plurality of data units inactive for its intended malicious purpose while not interfering with an intended use of the input content.Type: GrantFiled: February 24, 2017Date of Patent: July 3, 2018Assignee: VOTIRO CYBERSEC LTD.Inventors: Aviv Grafi, Itay Glick
-
Patent number: 10015194Abstract: The disclosed embodiments include a method of disarming malicious code in a computer system having a processor. The method comprises receiving, by the computer system, input content, and rendering, by the processor, any malicious code included in the input content inactive for its intended malicious purpose without applying a malware detection algorithm to the input content. The rendering is performed by automatically applying, using the processor, a data value alteration model to the input content for altering select data values within the input content, and outputting a new content reflecting the application of the data value alteration model to the input content. The processor renders any malicious code included in the input content inactive for its intended malicious purpose without regard to any structure used to encapsulate the input content. The input content includes media content.Type: GrantFiled: February 24, 2017Date of Patent: July 3, 2018Assignee: VOTIRO CYBERSEC LTD.Inventors: Aviv Grafi, Itay Glick
-
Patent number: 9923921Abstract: Systems and methods for disarming malicious code in digitally-signed content are provided. An example method includes determining that content is associated with a first digital signature, modifying at least a portion of digital values of the content to disable any malicious code included in the content, thereby creating modified content, and signing the modified content with a second digital signature, thereby creating signed modified content, the signed modified content including a data element corresponding to the first digital signature.Type: GrantFiled: October 26, 2017Date of Patent: March 20, 2018Assignee: Votiro Cybersec Ltd.Inventor: Aviv Grafi
-
Patent number: 9922191Abstract: The disclosed embodiments include a method for retroactively analyzing original input content to detect malicious content in a computer system, in which the original input content has been previously processed to generate modified input content and prevented from being received by an intended recipient. The method includes accessing the original input content or a characteristic associated with the original input content, and analyzing it based on a malware detection algorithm to determine whether the original input content includes suspected malicious content, wherein the malware detection algorithm includes at least one update of a signature or behavioral characteristic that was not included in the malware detection algorithm when the modified input content was generated. When it is determined that the original input content includes suspected malicious content, the method includes analyzing the modified input content to determine whether the modified input content includes the suspected malicious content.Type: GrantFiled: August 8, 2017Date of Patent: March 20, 2018Assignee: Votiro Cybersec Ltd.Inventor: Aviv Grafi
-
Patent number: 9858424Abstract: The disclosed embodiments include a method of disarming active content in a received input file in a computer system having a processor. The method includes steps for identifying from digital content of the input file, targeted active content associated with an automatically invoked subroutine, altering the automatically invoked subroutine to prevent automatic execution of the instructions associated with the subroutine upon rendering by a rendering application, such that functionality of the targeted active content is preserved, and configuring the input file to include a selectable feature enabling a user to invoke the targeted active content responsive to a user input, thereby creating a reconfigured input file.Type: GrantFiled: June 7, 2017Date of Patent: January 2, 2018Assignee: VOTIRO CYBERSEC LTD.Inventor: Aviv Grafi