Patents by Inventor Alex Gelman

Alex Gelman has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10642715
    Abstract: Disclosed embodiments relate to context-based analysis of requested activities. Techniques include building dynamic context profiles for processes based on static parameters of the processes, dynamic parameters of the processes, and detected activity involving the processes; receiving an indication of current runtime activity involving at least one identity; matching the indication of current runtime activity to a dynamic context profile; determining a context-based probability that the current runtime activity is anomalous, suspicious, or non-valid with respect to the dynamic context profile; and performing a control action in association with either the current runtime activity or the process based on whether the current runtime activity is determined to be anomalous, suspicious, or non-valid.
    Type: Grant
    Filed: February 21, 2019
    Date of Patent: May 5, 2020
    Assignee: CYBERARK SOFTWARE LTD.
    Inventors: Dor Simca, Tal Kandel, Alex Gelman, Daniel Schwartzer
  • Patent number: 10263787
    Abstract: Disclosed embodiments relate to decentralized and scalable trust among a plurality of decentralized applications. Techniques include receiving, at a first decentralized application, a signature associated with a first public key, receiving data representing one or more permissions specified by a trusted root application and signed by the trusted root application, signing a second public key associated with a second decentralized application, signing data representing one or more permissions specified by the first decentralized application, and providing the signature associated with the second public key and the signed data representing one or more permissions specified by the first decentralized application, in order to thereby provide trust between the first decentralized application and the second decentralized application.
    Type: Grant
    Filed: November 12, 2018
    Date of Patent: April 16, 2019
    Assignee: CyberArk Software Ltd.
    Inventors: Alex Gelman, Dor Simca
  • Patent number: 6842743
    Abstract: A secure credit card transaction method and system operates when a buyer wishes to purchase goods or services using a computer from a web site that is hosted by a server. The credit card transaction method and system embeds a signature in a credit card image on the computer. A first public key is used to embed the signature. The embedded credit card image is authenticated by concatenating bits of the credit card image with transaction information such as payment amount, the buyer's ID, a description of the goods or services, and/or the transaction date. A one-way hash is performed and signed employing a secret key cryptography method. The authenticated and embedded credit card image is then encrypted using the first public key and transmitted to the server that hosts the web site offering the goods and services for sale.
    Type: Grant
    Filed: December 1, 2000
    Date of Patent: January 11, 2005
    Assignee: Matsushita Electric Industrial Co., Ltd.
    Inventors: Hong Heather Yu, Xiangyang Kong, Alex Gelman
  • Publication number: 20020095388
    Abstract: A secure credit card transaction method and system operates when a buyer wishes to purchase goods or services using a computer from a web site that is hosted by a server. The credit card transaction method and system embeds a signature in a credit card image on the computer. A first public key is used to embed the signature. The embedded credit card image is authenticated by concatenating bits of the credit card image with transaction information such as payment amount, the buyer's ID, a description of the goods or services, and/or the transaction date. A one-way hash is performed and signed employing a secret key cryptography method. The authenticated and embedded credit card image is then encrypted using the first public key and transmitted to the server that hosts the web site offering the goods and services for sale.
    Type: Application
    Filed: December 1, 2000
    Publication date: July 18, 2002
    Inventors: Hong Heather Yu, Xiangyang Kong, Alex Gelman