Patents by Inventor Alon Kantor
Alon Kantor has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11212308Abstract: Computerized methods and systems locate a first device connected to a first network. One or more logs, each generated at a corresponding second device connected to the first network, are received via a second network linked to the first network. Each log has network data having network information associated with the corresponding second device, and location data having location information indicative of a location of the corresponding second device. The network data is analyzed to identify network information in at least one log that matches received network information associated with the first device. Location information in the location data of the at least one log is used to determine a location associated with the first device. In some implementations, the network data in the at least one log and timestamps associated with the network data in the at least one log are used in order to classify the determined location.Type: GrantFiled: December 31, 2020Date of Patent: December 28, 2021Assignee: CYBERTOKA LTD.Inventors: Alon Kantor, Moty Zaltzman, Sofia Belikovetsky, Reut Roich
-
Patent number: 10674118Abstract: Systems and methods are provided for modifying transmissions made by security cameras so as to allow access to the surveyed locations without the knowledge of the operator of the cameras.Type: GrantFiled: May 1, 2019Date of Patent: June 2, 2020Assignee: CYBERTOKA Ltd.Inventors: Micha Kalfon, Sofia Belikovetsky, Shimi Gersner, Roi Leibovich, Michael Volfman, Alon Kantor
-
Patent number: 9686294Abstract: Methods and systems for protecting components of a linked vehicle from cyber-attack are disclosed. These methods and systems comprise elements of hardware and software for receiving a packet; tunneling the packet to a terrestrial-based security service, analyzing whether the packet is harmful to a component in the vehicle, and at least one action to protect at least one component.Type: GrantFiled: June 15, 2015Date of Patent: June 20, 2017Assignee: CHECK POINT SOFTWARE TECHNOLOGIES LTD.Inventors: Alon Kantor, Tamir Zegman
-
Patent number: 9661006Abstract: Methods and systems for mitigating cyber attacks on components of an automotive communication system are disclosed. These methods and systems comprise elements of hardware and software for receiving a frame; determining whether the frame potentially affects correct operation of an automotive component; and, taking protective action.Type: GrantFiled: March 31, 2015Date of Patent: May 23, 2017Assignee: CHECK POINT SOFTWARE TECHNOLOGIES LTD.Inventors: Alon Kantor, Tamir Zegman
-
Publication number: 20160366156Abstract: Methods and systems for protecting components of a linked vehicle from cyber-attack are disclosed. These methods and systems comprise elements of hardware and software for receiving a packet; tunneling the packet to a terrestrial-based security service, analyzing whether the packet is harmful to a component in the vehicle, and at least one action to protect at least one component.Type: ApplicationFiled: June 15, 2015Publication date: December 15, 2016Inventors: Alon KANTOR, Tamir Zegman
-
Publication number: 20160294848Abstract: Methods and systems for mitigating cyber attacks on components of an automotive communication system are disclosed. These methods and systems comprise elements of hardware and software for receiving a frame; determining whether the frame potentially affects correct operation of an automotive component; and, taking protective action.Type: ApplicationFiled: March 31, 2015Publication date: October 6, 2016Inventors: Alon KANTOR, Tamir ZEGMAN
-
Patent number: 9130777Abstract: Disclosed are methods, media, and vault servers for providing a secure messaging system using vault servers in conjunction with client-side restricted-execution vault-mail environments. Methods include the steps of upon activating a vault-mail message containing sensitive content, removing the content from the vault-mail message; placing the content on a vault server; creating a link in the vault-mail message to the content on the vault server; sending the vault-mail message to a designated recipient; and upon activating the link, allowing the content to be only viewed in a restricted-execution session of a client application, wherein the restricted-execution session does not allow the content to be altered, copied, stored, printed, forwarded, or otherwise executed. Preferably, the activation of the vault-mail message is performed by a network-security gateway, and can be performed on a per-message basis.Type: GrantFiled: November 19, 2008Date of Patent: September 8, 2015Assignee: Check Point Software Technologies, LTD.Inventors: Oded Gonda, Ofer Raz, Alon Kantor, Uri Bialik, Yoav Kirsch
-
Patent number: 8254698Abstract: The present invention discloses methods for document-to-template matching for data-leak prevention (DLP), the methods including the steps of: providing a document as a stream of characters; splitting the stream into a plurality of serialized data lines; calculating a hash value for each serialized data line; checking for each hash value in a hash map of a template set; determining a similarity match to a particular template based on a predefined threshold of template hash values, of the template set, being found in the stream; and based on the similarity match, executing a DLP security policy for the document. Preferably, the template set is extracted from documents manually prepared by a security administrator. Preferably, each template in the template set is deduced automatically from a plurality of documents.Type: GrantFiled: April 2, 2009Date of Patent: August 28, 2012Assignee: Check Point Software Technologies LtdInventors: Alon Kantor, Liran Antebi, Yoav Kirsch, Uri Bialik
-
Methods for automatic categorization of internal and external communication for preventing data loss
Patent number: 8051187Abstract: Disclosed are methods for automatic categorization of internal and external communication, the method including the steps of: defining groups of entities that transmit data; monitoring data flow of the groups; extracting the data, from the data flow, for learning traffic-flow characteristics of the groups; classifying the data into group flows; upon the data being transmitted, checking the data to determine whether the data is designated as group-internal; and blocking data traffic for data that is group-internal. Preferably, the step of monitoring includes assigning data weights to the data using Bayesian methods. Most preferably, the step of classifying includes classifying the data using Bayesian methods for evaluating the data weights. Preferably, the step of blocking includes blocking data traffic between members of two or more groups. Preferably, the method further includes the step of: enabling an authorized entity to unblock the data traffic.Type: GrantFiled: December 22, 2008Date of Patent: November 1, 2011Assignee: Check Point Software Technologies Ltd.Inventors: Tomer Noy, Alon Kantor, Uri Bialik, Yoav Kirsch -
Publication number: 20100254615Abstract: The present invention discloses methods for document-to-template matching for data-leak prevention (DLP), the methods including the steps of: providing a document as a stream of characters; splitting the stream into a plurality of serialized data lines; calculating a hash value for each serialized data line; checking for each hash value in a hash map of a template set; determining a similarity match to a particular template based on a predefined threshold of template hash values, of the template set, being found in the stream; and based on the similarity match, executing a DLP security policy for the document. Preferably, the template set is extracted from documents manually prepared by a security administrator. Preferably, each template in the template set is deduced automatically from a plurality of documents.Type: ApplicationFiled: April 2, 2009Publication date: October 7, 2010Applicant: CHECK POINT SOFTWARE TECHNOLOGIES, LTD.Inventors: ALON KANTOR, LIRAN ANTEBI, YOAV KIRSCH, URI BIALIK
-
METHODS FOR AUTOMATIC CATEGORIZATION OF INTERNAL AND EXTERNAL COMMUNICATION FOR PREVENTING DATA LOSS
Publication number: 20100161830Abstract: Disclosed are methods for automatic categorization of internal and external communication, the method including the steps of: defining groups of entities that transmit data; monitoring data flow of the groups; extracting the data, from the data flow, for learning traffic-flow characteristics of the groups; classifying the data into group flows; upon the data being transmitted, checking the data to determine whether the data is designated as group-internal; and blocking data traffic for data that is group-internal. Preferably, the step of monitoring includes assigning data weights to the data using Bayesian methods. Most preferably, the step of classifying includes classifying the data using Bayesian methods for evaluating the data weights. Preferably, the step of blocking includes blocking data traffic between members of two or more groups. Preferably, the method further includes the step of: enabling an authorized entity to unblock the data traffic.Type: ApplicationFiled: December 22, 2008Publication date: June 24, 2010Applicant: CHECK POINT SOFTWARE TECHNOLOGIES, LTD.Inventors: Tomer Noy, Alon Kantor, Uri Bialik, Yoav Kirsch -
Publication number: 20100125637Abstract: Disclosed are methods, media, and vault servers for providing a secure messaging system using vault servers in conjunction with client-side restricted-execution vault-mail environments. Methods include the steps of upon activating a vault-mail message containing sensitive content, removing the content from the vault-mail message; placing the content on a vault server; creating a link in the vault-mail message to the content on the vault server; sending the vault-mail message to a designated recipient; and upon activating the link, allowing the content to be only viewed in a restricted-execution session of a client application, wherein the restricted-execution session does not allow the content to be altered, copied, stored, printed, forwarded, or otherwise executed. Preferably, the activation of the vault-mail message is performed by a network-security gateway, and can be performed on a per-message basis.Type: ApplicationFiled: November 19, 2008Publication date: May 20, 2010Applicant: CHECK POINT SOFTWARE TECHNOLOGIES, LTD.Inventors: Oded GONDA, Ofer Raz, Alon Kantor, Uri Bialik, Yoav Kirsch
-
Publication number: 20060274642Abstract: A system and method for providing high availability for data communications between two data networks. The system comprises at least two network modules for operatively connecting two data networks. Each network module includes a first and a second network interfaces. The network modules are interconnected using the first network interfaces. The data networks are connected respectively to the second network interfaces. A security or service module is included between the first and second network interfaces in each network module to provide security or otherwise a network service. Upon failure of one of the network modules, its two network interfaces are interconnected, thereby maintaining data traffic between the two network interfaces and between the two data networks.Type: ApplicationFiled: June 1, 2005Publication date: December 7, 2006Inventors: Moshe Litvin, Gil Harari, Alon Kantor
-
Publication number: 20050147037Abstract: A method for detecting a scan in network connections, each connection to a respective destination determined by a destination key and a destination parameter. For each of the connections, an active-connection entry is logged in a first table. The active-connection entry includes the destination key and the destination parameter. For each destination key entered in the first table, each active-connection entry is counted by: (i) entering in a second table a new-connection entry including the destination key, and (ii) assigning to the new-connection entry a use value; the use value equals a number of the active-connection entries with the destination key. A scan event is generated when the use value exceeds a previously determined new-connection-threshold.Type: ApplicationFiled: January 3, 2005Publication date: July 7, 2005Inventors: Uriel Maimon, Alon Kantor, Oded Dov