Patents by Inventor Amir Kibbar

Amir Kibbar has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11182476
    Abstract: Examples disclosed herein relate to providing enhanced threat intelligence on a security information sharing platform. Some examples may enable correlating a first set of items of threat information from the security information sharing platform. Some examples may enable, responsive to determining that the correlated first set of items of threat information indicate a first malicious action type, creating a new security indicator comprising information from the correlated first set of items of threat information and associating the new security indicator with the first malicious action type. Some examples may enable determining whether a first threat pattern exists based on the new security indicator.
    Type: Grant
    Filed: September 7, 2016
    Date of Patent: November 23, 2021
    Assignee: Micro Focus LLC
    Inventors: Tamir Mitelman, Meytal Maor, Ofer Bachner, Amir Kibbar
  • Patent number: 10817819
    Abstract: A method includes compiling a workflow that is defined in a high-level flow language to generate a plurality of execution units that are executable so as to execute the workflow.
    Type: Grant
    Filed: July 16, 2012
    Date of Patent: October 27, 2020
    Assignee: Micro Focus LLC
    Inventors: Amir Kibbar, Dmitry Rassin
  • Patent number: 10701044
    Abstract: Examples disclosed herein relate to sharing of community-based security information. Some examples may enable generating a first community on a security information sharing platform that enables sharing of security information among a plurality of communities; obtaining a first security indicator from a first user of the first community; providing the first security indicator to the first community; obtaining contextual information related to the first security indicator from a second user of the first community; including the first security indicator and the contextual information related to the first security indicator in the security information of the first community; and encrypting a portion of the security information of the first community with an encryption key, wherein the encryption key is unavailable to users outside of the first community.
    Type: Grant
    Filed: June 26, 2015
    Date of Patent: June 30, 2020
    Assignee: MICRO FOCUS LLC
    Inventors: Tomas Sander, Nadav Cohen, Brian Frederik Hosea Che Hein, Amir Kibbar, Ted Ross
  • Patent number: 10693895
    Abstract: According to an example, security indicator access determination may include determining a security indicator that is received from a first entity by a security indicator sharing platform for sharing with a second entity. A rule associated with identification of a third entity that has access to the security indicator may be analyzed. The third entity may be different from the second entity, and if the second entity belongs to a community, the third entity may not be in the community of the second entity. A determination may be made as to whether to identify the third entity based on the analysis of the rule. In response to a determination that the third entity is to be identified or not to be identified, the third entity may be identified to the first entity, or not identified to the first entity.
    Type: Grant
    Filed: July 22, 2014
    Date of Patent: June 23, 2020
    Assignee: Micro Focus LLC
    Inventors: Anurag Singla, Amir Kibbar, Tomas Sander, Edward Ross, Serhan Shbeita
  • Publication number: 20180359232
    Abstract: Examples disclosed herein relate to sharing of community-based security information. Some examples may enable generating a first community on a security information sharing platform that enables sharing of security information among a plurality of communities; obtaining a first security indicator from a first user of the first community; providing the first security indicator to the first community; obtaining contextual information related to the first security indicator from a second user of the first community; including the first security indicator and the contextual information related to the first security indicator in the security information of the first community; and encrypting a portion of the security information of the first community with an encryption key, wherein the encryption key is unavailable to users outside of the first community.
    Type: Application
    Filed: June 26, 2015
    Publication date: December 13, 2018
    Inventors: Tomas Sander, Nadav COHEN, Brian Frederik Hosea Che HEIN, Amir KIBBAR, Ted ROSS
  • Publication number: 20180068119
    Abstract: Examples disclosed herein relate to providing enhanced threat intelligence on a security information sharing platform. Some examples may enable correlating a first set of items of threat information from the security information sharing platform. Some examples may enable, responsive to determining that the correlated first set of items of threat information indicate a first malicious action type, creating a new security indicator comprising information from the correlated first set of items of threat information and associating the new security indicator with the first malicious action type. Some examples may enable determining whether a first threat pattern exists based on the new security indicator.
    Type: Application
    Filed: September 7, 2016
    Publication date: March 8, 2018
    Inventors: Tamir MITELMAN, Meytal MAOR, Ofer BACHNER, Amir KIBBAR
  • Publication number: 20170365027
    Abstract: Examples disclosed herein relate to considering geolocation information in a security information sharing platform. Some examples may enable determining geolocation information for a security indicator shared to the security information sharing platform. Some examples may enable determining an indicator score associated with the security indicator based on the determined geolocation information. Some examples may enable facilitating display, via a user interface, the first indicator score to the first community of users based on the indicator score.
    Type: Application
    Filed: June 16, 2016
    Publication date: December 21, 2017
    Inventors: Brian Frederick Hosea Che Hein, Amir Kibbar, Tomas Sander
  • Publication number: 20170180405
    Abstract: According to an example, security indicator access determination may include determining a security indicator that is received from a first entity by a security indicator sharing platform for sharing with a second entity. A rule associated with identification of a third entity that has access to the security indicator may be analyzed. The third entity may be different from the second entity, and if the second entity belongs to a community, the third entity may not be in the community of the second entity. A determination may be made as to whether to identify the third entity based on the analysis of the rule. In response to a determination that the third entity is to be identified or not to be identified, the third entity may be identified to the first entity, or not identified to the first entity.
    Type: Application
    Filed: July 22, 2014
    Publication date: June 22, 2017
    Inventors: Anurag SINGLA, Amir KIBBAR, Tomas SANDER, Edward ROSS, Serhan SHBEITA
  • Patent number: 9612870
    Abstract: A system method and non-transitory computer readable medium implemented as programming on a suitable computing device, the system for inversion of control of executable extensions including a run-time environment configured to push data to one or a plurality of extensions, wherein said one or plurality of extensions are configured to comprise one or a plurality of signatures. Wherein said one or a plurality of extensions are compilable, designable and testable outside of the run-time environment, and wherein the run-time environment may be configured to accept an extension and to push data to that extension as per said one or a plurality of signatures.
    Type: Grant
    Filed: August 18, 2015
    Date of Patent: April 4, 2017
    Assignee: Hewlett Packard Enterprise Development LP
    Inventors: Dmitry Rassin, Amir Kibbar
  • Publication number: 20150355939
    Abstract: A system method and non-transitory computer readable medium implemented as programming on a suitable computing device, the system for inversion of control of executable extensions including a run-time environment configured to push data to one or a plurality of extensions, wherein said one or plurality of extensions are configured to comprise one or a plurality of signatures. Wherein said one or a plurality of extensions are compilable, designable and testable outside of the run-time environment, and wherein the run-time environment may be configured to accept an extension and to push data to that extension as per said one or a plurality of signatures.
    Type: Application
    Filed: August 18, 2015
    Publication date: December 10, 2015
    Inventors: Dmitry Rassin, Amir Kibbar
  • Patent number: 9141341
    Abstract: A system method and non-transitory computer readable medium implemented as programming on a suitable computing device, the system for inversion of control of executable extensions including a run-time environment configured to push data to one or a plurality of extensions, wherein said one or plurality of extensions are configured to comprise one or a plurality of signatures. Wherein said one or a plurality of extensions are compilable, designable and testable outside of the run-time environment, and wherein the run-time environment may be configured to accept an extension and to push data to that extension as per said one or a plurality of signatures.
    Type: Grant
    Filed: July 16, 2012
    Date of Patent: September 22, 2015
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Dmitry Rassin, Amir Kibbar
  • Publication number: 20150106153
    Abstract: A method includes compiling a workflow that is defined in a high-level flow language to generate a plurality of execution units that are executable so as to execute the workflow.
    Type: Application
    Filed: July 16, 2012
    Publication date: April 16, 2015
    Inventors: Amir Kibbar, Dmitry Rassin
  • Patent number: 8832651
    Abstract: A system, which implemented as programming on a suitable computing device, manages the configuration of a software system. The system includes a create properties configuration module that identifies and stores a collection of properties related to the configuration of the software system; a create file configuration that identifies and stores binary data related to the configuration of the software system; a create configuration set module that creates a draft configuration set including the collection of properties and the binary data; and an activate module that activates the draft configuration set and deactivates and persistently stores a prior configuration set as a historic configuration set. The activated configuration set and the historic configuration sets are immutable.
    Type: Grant
    Filed: March 30, 2010
    Date of Patent: September 9, 2014
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventor: Amir Kibbar
  • Publication number: 20140019983
    Abstract: A system method and non-transitory computer readable medium implemented as programming on a suitable computing device, the system for inversion of control of executable extensions including a run-time environment configured to push data to one or a plurality of extensions, wherein said one or plurality of extensions are configured to comprise one or a plurality of signatures. Wherein said one or a plurality of extensions are compilable, designable and testable outside of the run-time environment, and wherein the run-time environment may be configured to accept an extension and to push data to that extension as per said one or a plurality of signatures.
    Type: Application
    Filed: July 16, 2012
    Publication date: January 16, 2014
    Inventors: Dmitry RASSIN, Amir Kibbar
  • Publication number: 20110246976
    Abstract: A system, which implemented as programming on a suitable computing device, manages the configuration of a software system. The system includes a create properties configuration module that identifies and stores a collection of properties related to the configuration of the software system; a create file configuration that identifies and stores binary data related to the configuration of the software system; a create configuration set module that creates a draft configuration set including the collection of properties and the binary data; and an activate module that activates the draft configuration set and deactivates and persistently stores a prior configuration set as a historic configuration set. The activated configuration set and the historic configuration sets are immutable.
    Type: Application
    Filed: March 30, 2010
    Publication date: October 6, 2011
    Inventor: Amir Kibbar