Patents by Inventor Amir Kibbar
Amir Kibbar has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11182476Abstract: Examples disclosed herein relate to providing enhanced threat intelligence on a security information sharing platform. Some examples may enable correlating a first set of items of threat information from the security information sharing platform. Some examples may enable, responsive to determining that the correlated first set of items of threat information indicate a first malicious action type, creating a new security indicator comprising information from the correlated first set of items of threat information and associating the new security indicator with the first malicious action type. Some examples may enable determining whether a first threat pattern exists based on the new security indicator.Type: GrantFiled: September 7, 2016Date of Patent: November 23, 2021Assignee: Micro Focus LLCInventors: Tamir Mitelman, Meytal Maor, Ofer Bachner, Amir Kibbar
-
Patent number: 10817819Abstract: A method includes compiling a workflow that is defined in a high-level flow language to generate a plurality of execution units that are executable so as to execute the workflow.Type: GrantFiled: July 16, 2012Date of Patent: October 27, 2020Assignee: Micro Focus LLCInventors: Amir Kibbar, Dmitry Rassin
-
Patent number: 10701044Abstract: Examples disclosed herein relate to sharing of community-based security information. Some examples may enable generating a first community on a security information sharing platform that enables sharing of security information among a plurality of communities; obtaining a first security indicator from a first user of the first community; providing the first security indicator to the first community; obtaining contextual information related to the first security indicator from a second user of the first community; including the first security indicator and the contextual information related to the first security indicator in the security information of the first community; and encrypting a portion of the security information of the first community with an encryption key, wherein the encryption key is unavailable to users outside of the first community.Type: GrantFiled: June 26, 2015Date of Patent: June 30, 2020Assignee: MICRO FOCUS LLCInventors: Tomas Sander, Nadav Cohen, Brian Frederik Hosea Che Hein, Amir Kibbar, Ted Ross
-
Patent number: 10693895Abstract: According to an example, security indicator access determination may include determining a security indicator that is received from a first entity by a security indicator sharing platform for sharing with a second entity. A rule associated with identification of a third entity that has access to the security indicator may be analyzed. The third entity may be different from the second entity, and if the second entity belongs to a community, the third entity may not be in the community of the second entity. A determination may be made as to whether to identify the third entity based on the analysis of the rule. In response to a determination that the third entity is to be identified or not to be identified, the third entity may be identified to the first entity, or not identified to the first entity.Type: GrantFiled: July 22, 2014Date of Patent: June 23, 2020Assignee: Micro Focus LLCInventors: Anurag Singla, Amir Kibbar, Tomas Sander, Edward Ross, Serhan Shbeita
-
Publication number: 20180359232Abstract: Examples disclosed herein relate to sharing of community-based security information. Some examples may enable generating a first community on a security information sharing platform that enables sharing of security information among a plurality of communities; obtaining a first security indicator from a first user of the first community; providing the first security indicator to the first community; obtaining contextual information related to the first security indicator from a second user of the first community; including the first security indicator and the contextual information related to the first security indicator in the security information of the first community; and encrypting a portion of the security information of the first community with an encryption key, wherein the encryption key is unavailable to users outside of the first community.Type: ApplicationFiled: June 26, 2015Publication date: December 13, 2018Inventors: Tomas Sander, Nadav COHEN, Brian Frederik Hosea Che HEIN, Amir KIBBAR, Ted ROSS
-
Publication number: 20180068119Abstract: Examples disclosed herein relate to providing enhanced threat intelligence on a security information sharing platform. Some examples may enable correlating a first set of items of threat information from the security information sharing platform. Some examples may enable, responsive to determining that the correlated first set of items of threat information indicate a first malicious action type, creating a new security indicator comprising information from the correlated first set of items of threat information and associating the new security indicator with the first malicious action type. Some examples may enable determining whether a first threat pattern exists based on the new security indicator.Type: ApplicationFiled: September 7, 2016Publication date: March 8, 2018Inventors: Tamir MITELMAN, Meytal MAOR, Ofer BACHNER, Amir KIBBAR
-
Publication number: 20170365027Abstract: Examples disclosed herein relate to considering geolocation information in a security information sharing platform. Some examples may enable determining geolocation information for a security indicator shared to the security information sharing platform. Some examples may enable determining an indicator score associated with the security indicator based on the determined geolocation information. Some examples may enable facilitating display, via a user interface, the first indicator score to the first community of users based on the indicator score.Type: ApplicationFiled: June 16, 2016Publication date: December 21, 2017Inventors: Brian Frederick Hosea Che Hein, Amir Kibbar, Tomas Sander
-
Publication number: 20170180405Abstract: According to an example, security indicator access determination may include determining a security indicator that is received from a first entity by a security indicator sharing platform for sharing with a second entity. A rule associated with identification of a third entity that has access to the security indicator may be analyzed. The third entity may be different from the second entity, and if the second entity belongs to a community, the third entity may not be in the community of the second entity. A determination may be made as to whether to identify the third entity based on the analysis of the rule. In response to a determination that the third entity is to be identified or not to be identified, the third entity may be identified to the first entity, or not identified to the first entity.Type: ApplicationFiled: July 22, 2014Publication date: June 22, 2017Inventors: Anurag SINGLA, Amir KIBBAR, Tomas SANDER, Edward ROSS, Serhan SHBEITA
-
Patent number: 9612870Abstract: A system method and non-transitory computer readable medium implemented as programming on a suitable computing device, the system for inversion of control of executable extensions including a run-time environment configured to push data to one or a plurality of extensions, wherein said one or plurality of extensions are configured to comprise one or a plurality of signatures. Wherein said one or a plurality of extensions are compilable, designable and testable outside of the run-time environment, and wherein the run-time environment may be configured to accept an extension and to push data to that extension as per said one or a plurality of signatures.Type: GrantFiled: August 18, 2015Date of Patent: April 4, 2017Assignee: Hewlett Packard Enterprise Development LPInventors: Dmitry Rassin, Amir Kibbar
-
Publication number: 20150355939Abstract: A system method and non-transitory computer readable medium implemented as programming on a suitable computing device, the system for inversion of control of executable extensions including a run-time environment configured to push data to one or a plurality of extensions, wherein said one or plurality of extensions are configured to comprise one or a plurality of signatures. Wherein said one or a plurality of extensions are compilable, designable and testable outside of the run-time environment, and wherein the run-time environment may be configured to accept an extension and to push data to that extension as per said one or a plurality of signatures.Type: ApplicationFiled: August 18, 2015Publication date: December 10, 2015Inventors: Dmitry Rassin, Amir Kibbar
-
Patent number: 9141341Abstract: A system method and non-transitory computer readable medium implemented as programming on a suitable computing device, the system for inversion of control of executable extensions including a run-time environment configured to push data to one or a plurality of extensions, wherein said one or plurality of extensions are configured to comprise one or a plurality of signatures. Wherein said one or a plurality of extensions are compilable, designable and testable outside of the run-time environment, and wherein the run-time environment may be configured to accept an extension and to push data to that extension as per said one or a plurality of signatures.Type: GrantFiled: July 16, 2012Date of Patent: September 22, 2015Assignee: Hewlett-Packard Development Company, L.P.Inventors: Dmitry Rassin, Amir Kibbar
-
Publication number: 20150106153Abstract: A method includes compiling a workflow that is defined in a high-level flow language to generate a plurality of execution units that are executable so as to execute the workflow.Type: ApplicationFiled: July 16, 2012Publication date: April 16, 2015Inventors: Amir Kibbar, Dmitry Rassin
-
Patent number: 8832651Abstract: A system, which implemented as programming on a suitable computing device, manages the configuration of a software system. The system includes a create properties configuration module that identifies and stores a collection of properties related to the configuration of the software system; a create file configuration that identifies and stores binary data related to the configuration of the software system; a create configuration set module that creates a draft configuration set including the collection of properties and the binary data; and an activate module that activates the draft configuration set and deactivates and persistently stores a prior configuration set as a historic configuration set. The activated configuration set and the historic configuration sets are immutable.Type: GrantFiled: March 30, 2010Date of Patent: September 9, 2014Assignee: Hewlett-Packard Development Company, L.P.Inventor: Amir Kibbar
-
Publication number: 20140019983Abstract: A system method and non-transitory computer readable medium implemented as programming on a suitable computing device, the system for inversion of control of executable extensions including a run-time environment configured to push data to one or a plurality of extensions, wherein said one or plurality of extensions are configured to comprise one or a plurality of signatures. Wherein said one or a plurality of extensions are compilable, designable and testable outside of the run-time environment, and wherein the run-time environment may be configured to accept an extension and to push data to that extension as per said one or a plurality of signatures.Type: ApplicationFiled: July 16, 2012Publication date: January 16, 2014Inventors: Dmitry RASSIN, Amir Kibbar
-
Publication number: 20110246976Abstract: A system, which implemented as programming on a suitable computing device, manages the configuration of a software system. The system includes a create properties configuration module that identifies and stores a collection of properties related to the configuration of the software system; a create file configuration that identifies and stores binary data related to the configuration of the software system; a create configuration set module that creates a draft configuration set including the collection of properties and the binary data; and an activate module that activates the draft configuration set and deactivates and persistently stores a prior configuration set as a historic configuration set. The activated configuration set and the historic configuration sets are immutable.Type: ApplicationFiled: March 30, 2010Publication date: October 6, 2011Inventor: Amir Kibbar