Patents by Inventor Alon Kantor

Alon Kantor has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11212308
    Abstract: Computerized methods and systems locate a first device connected to a first network. One or more logs, each generated at a corresponding second device connected to the first network, are received via a second network linked to the first network. Each log has network data having network information associated with the corresponding second device, and location data having location information indicative of a location of the corresponding second device. The network data is analyzed to identify network information in at least one log that matches received network information associated with the first device. Location information in the location data of the at least one log is used to determine a location associated with the first device. In some implementations, the network data in the at least one log and timestamps associated with the network data in the at least one log are used in order to classify the determined location.
    Type: Grant
    Filed: December 31, 2020
    Date of Patent: December 28, 2021
    Assignee: CYBERTOKA LTD.
    Inventors: Alon Kantor, Moty Zaltzman, Sofia Belikovetsky, Reut Roich
  • Patent number: 10674118
    Abstract: Systems and methods are provided for modifying transmissions made by security cameras so as to allow access to the surveyed locations without the knowledge of the operator of the cameras.
    Type: Grant
    Filed: May 1, 2019
    Date of Patent: June 2, 2020
    Assignee: CYBERTOKA Ltd.
    Inventors: Micha Kalfon, Sofia Belikovetsky, Shimi Gersner, Roi Leibovich, Michael Volfman, Alon Kantor
  • Patent number: 9686294
    Abstract: Methods and systems for protecting components of a linked vehicle from cyber-attack are disclosed. These methods and systems comprise elements of hardware and software for receiving a packet; tunneling the packet to a terrestrial-based security service, analyzing whether the packet is harmful to a component in the vehicle, and at least one action to protect at least one component.
    Type: Grant
    Filed: June 15, 2015
    Date of Patent: June 20, 2017
    Assignee: CHECK POINT SOFTWARE TECHNOLOGIES LTD.
    Inventors: Alon Kantor, Tamir Zegman
  • Patent number: 9661006
    Abstract: Methods and systems for mitigating cyber attacks on components of an automotive communication system are disclosed. These methods and systems comprise elements of hardware and software for receiving a frame; determining whether the frame potentially affects correct operation of an automotive component; and, taking protective action.
    Type: Grant
    Filed: March 31, 2015
    Date of Patent: May 23, 2017
    Assignee: CHECK POINT SOFTWARE TECHNOLOGIES LTD.
    Inventors: Alon Kantor, Tamir Zegman
  • Publication number: 20160366156
    Abstract: Methods and systems for protecting components of a linked vehicle from cyber-attack are disclosed. These methods and systems comprise elements of hardware and software for receiving a packet; tunneling the packet to a terrestrial-based security service, analyzing whether the packet is harmful to a component in the vehicle, and at least one action to protect at least one component.
    Type: Application
    Filed: June 15, 2015
    Publication date: December 15, 2016
    Inventors: Alon KANTOR, Tamir Zegman
  • Publication number: 20160294848
    Abstract: Methods and systems for mitigating cyber attacks on components of an automotive communication system are disclosed. These methods and systems comprise elements of hardware and software for receiving a frame; determining whether the frame potentially affects correct operation of an automotive component; and, taking protective action.
    Type: Application
    Filed: March 31, 2015
    Publication date: October 6, 2016
    Inventors: Alon KANTOR, Tamir ZEGMAN
  • Patent number: 9130777
    Abstract: Disclosed are methods, media, and vault servers for providing a secure messaging system using vault servers in conjunction with client-side restricted-execution vault-mail environments. Methods include the steps of upon activating a vault-mail message containing sensitive content, removing the content from the vault-mail message; placing the content on a vault server; creating a link in the vault-mail message to the content on the vault server; sending the vault-mail message to a designated recipient; and upon activating the link, allowing the content to be only viewed in a restricted-execution session of a client application, wherein the restricted-execution session does not allow the content to be altered, copied, stored, printed, forwarded, or otherwise executed. Preferably, the activation of the vault-mail message is performed by a network-security gateway, and can be performed on a per-message basis.
    Type: Grant
    Filed: November 19, 2008
    Date of Patent: September 8, 2015
    Assignee: Check Point Software Technologies, LTD.
    Inventors: Oded Gonda, Ofer Raz, Alon Kantor, Uri Bialik, Yoav Kirsch
  • Patent number: 8254698
    Abstract: The present invention discloses methods for document-to-template matching for data-leak prevention (DLP), the methods including the steps of: providing a document as a stream of characters; splitting the stream into a plurality of serialized data lines; calculating a hash value for each serialized data line; checking for each hash value in a hash map of a template set; determining a similarity match to a particular template based on a predefined threshold of template hash values, of the template set, being found in the stream; and based on the similarity match, executing a DLP security policy for the document. Preferably, the template set is extracted from documents manually prepared by a security administrator. Preferably, each template in the template set is deduced automatically from a plurality of documents.
    Type: Grant
    Filed: April 2, 2009
    Date of Patent: August 28, 2012
    Assignee: Check Point Software Technologies Ltd
    Inventors: Alon Kantor, Liran Antebi, Yoav Kirsch, Uri Bialik
  • Patent number: 8051187
    Abstract: Disclosed are methods for automatic categorization of internal and external communication, the method including the steps of: defining groups of entities that transmit data; monitoring data flow of the groups; extracting the data, from the data flow, for learning traffic-flow characteristics of the groups; classifying the data into group flows; upon the data being transmitted, checking the data to determine whether the data is designated as group-internal; and blocking data traffic for data that is group-internal. Preferably, the step of monitoring includes assigning data weights to the data using Bayesian methods. Most preferably, the step of classifying includes classifying the data using Bayesian methods for evaluating the data weights. Preferably, the step of blocking includes blocking data traffic between members of two or more groups. Preferably, the method further includes the step of: enabling an authorized entity to unblock the data traffic.
    Type: Grant
    Filed: December 22, 2008
    Date of Patent: November 1, 2011
    Assignee: Check Point Software Technologies Ltd.
    Inventors: Tomer Noy, Alon Kantor, Uri Bialik, Yoav Kirsch
  • Publication number: 20100254615
    Abstract: The present invention discloses methods for document-to-template matching for data-leak prevention (DLP), the methods including the steps of: providing a document as a stream of characters; splitting the stream into a plurality of serialized data lines; calculating a hash value for each serialized data line; checking for each hash value in a hash map of a template set; determining a similarity match to a particular template based on a predefined threshold of template hash values, of the template set, being found in the stream; and based on the similarity match, executing a DLP security policy for the document. Preferably, the template set is extracted from documents manually prepared by a security administrator. Preferably, each template in the template set is deduced automatically from a plurality of documents.
    Type: Application
    Filed: April 2, 2009
    Publication date: October 7, 2010
    Applicant: CHECK POINT SOFTWARE TECHNOLOGIES, LTD.
    Inventors: ALON KANTOR, LIRAN ANTEBI, YOAV KIRSCH, URI BIALIK
  • Publication number: 20100161830
    Abstract: Disclosed are methods for automatic categorization of internal and external communication, the method including the steps of: defining groups of entities that transmit data; monitoring data flow of the groups; extracting the data, from the data flow, for learning traffic-flow characteristics of the groups; classifying the data into group flows; upon the data being transmitted, checking the data to determine whether the data is designated as group-internal; and blocking data traffic for data that is group-internal. Preferably, the step of monitoring includes assigning data weights to the data using Bayesian methods. Most preferably, the step of classifying includes classifying the data using Bayesian methods for evaluating the data weights. Preferably, the step of blocking includes blocking data traffic between members of two or more groups. Preferably, the method further includes the step of: enabling an authorized entity to unblock the data traffic.
    Type: Application
    Filed: December 22, 2008
    Publication date: June 24, 2010
    Applicant: CHECK POINT SOFTWARE TECHNOLOGIES, LTD.
    Inventors: Tomer Noy, Alon Kantor, Uri Bialik, Yoav Kirsch
  • Publication number: 20100125637
    Abstract: Disclosed are methods, media, and vault servers for providing a secure messaging system using vault servers in conjunction with client-side restricted-execution vault-mail environments. Methods include the steps of upon activating a vault-mail message containing sensitive content, removing the content from the vault-mail message; placing the content on a vault server; creating a link in the vault-mail message to the content on the vault server; sending the vault-mail message to a designated recipient; and upon activating the link, allowing the content to be only viewed in a restricted-execution session of a client application, wherein the restricted-execution session does not allow the content to be altered, copied, stored, printed, forwarded, or otherwise executed. Preferably, the activation of the vault-mail message is performed by a network-security gateway, and can be performed on a per-message basis.
    Type: Application
    Filed: November 19, 2008
    Publication date: May 20, 2010
    Applicant: CHECK POINT SOFTWARE TECHNOLOGIES, LTD.
    Inventors: Oded GONDA, Ofer Raz, Alon Kantor, Uri Bialik, Yoav Kirsch
  • Publication number: 20060274642
    Abstract: A system and method for providing high availability for data communications between two data networks. The system comprises at least two network modules for operatively connecting two data networks. Each network module includes a first and a second network interfaces. The network modules are interconnected using the first network interfaces. The data networks are connected respectively to the second network interfaces. A security or service module is included between the first and second network interfaces in each network module to provide security or otherwise a network service. Upon failure of one of the network modules, its two network interfaces are interconnected, thereby maintaining data traffic between the two network interfaces and between the two data networks.
    Type: Application
    Filed: June 1, 2005
    Publication date: December 7, 2006
    Inventors: Moshe Litvin, Gil Harari, Alon Kantor
  • Publication number: 20050147037
    Abstract: A method for detecting a scan in network connections, each connection to a respective destination determined by a destination key and a destination parameter. For each of the connections, an active-connection entry is logged in a first table. The active-connection entry includes the destination key and the destination parameter. For each destination key entered in the first table, each active-connection entry is counted by: (i) entering in a second table a new-connection entry including the destination key, and (ii) assigning to the new-connection entry a use value; the use value equals a number of the active-connection entries with the destination key. A scan event is generated when the use value exceeds a previously determined new-connection-threshold.
    Type: Application
    Filed: January 3, 2005
    Publication date: July 7, 2005
    Inventors: Uriel Maimon, Alon Kantor, Oded Dov