Patents by Inventor Amit Klein

Amit Klein has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8863281
    Abstract: A method for protecting a browser from malicious processes, comprises providing at least one process-proxy object and at least a browser-proxy object, interposed between the browser and a process, such that when the process invokes one of the DOM entry points, the process-proxy object isolates it from the real browser implementation and executes the process-proxy object's code instead.
    Type: Grant
    Filed: May 22, 2009
    Date of Patent: October 14, 2014
    Assignee: Trusteer Ltd.
    Inventors: Amit Klein, Eldan Ben-Haim, Oleg Izmerly, Shmuel Regev, Michael Boodaei
  • Publication number: 20140304816
    Abstract: A method for detecting malware in a user terminal device that has been infected by malware via a browser running on the user terminal device, according to which upon detecting a predetermined a triggering event on the user terminal, a security application installed on the terminal automatically activates a transparent browser to navigate to one or more predetermined URLs. Then the security application checks the code of an inspected webpage that has been received immediately after it is opened by the transparent browser and rechecks the code after being at least partially processed by the transparent browser. If a change the code is detected, an alert is issued, indicating that the terminal has been infected by malware.
    Type: Application
    Filed: April 8, 2013
    Publication date: October 9, 2014
    Inventors: Amit KLEIN, Michael BOODAEI
  • Publication number: 20140289851
    Abstract: A process for identifying potentially harmful malware, comprises the steps of: a) identifying an executable that is about to run; b) providing a monitoring agent that monitors all threads that are descendent of a thread initiated by the process of said executable; and c) configuring said monitoring agent to conclude that a high probability of malware presence exists, if one of said descendent threads reaches a target process in which suspicious patches are created.
    Type: Application
    Filed: March 19, 2013
    Publication date: September 25, 2014
    Applicant: TRUSTEER LTD.
    Inventors: Amit KLEIN, Yaron DYCIAN, Gal FRISHMAN, Avner GIDEONI
  • Patent number: 8813224
    Abstract: A method for protecting a browser from malicious processes, comprises providing at least one process-proxy object and at least a browser-proxy object, interposed between the browser and a process, such that when the process invokes one of the DOM entry points, the process-proxy object isolates it from the real browser implementation and executes the process-proxy object's code instead.
    Type: Grant
    Filed: May 22, 2009
    Date of Patent: August 19, 2014
    Assignee: Trusteer Ltd.
    Inventors: Amit Klein, Eldan Ben-Haim, Oleg Izmerly, Shmuel Regev, Michael Boodaei
  • Patent number: 8732794
    Abstract: A browser plug-in firewall manages data exchanged between a browser and a plug-in according to a pre-defined list of rights.
    Type: Grant
    Filed: August 11, 2008
    Date of Patent: May 20, 2014
    Assignee: Trusteer Ltd.
    Inventors: Michael Boodaei, Amit Klein, Oleg Izmerly
  • Patent number: 8725636
    Abstract: A method detects fraudulent transaction of money transfer to a mule account, according to which a detection software module is injected into a browser or a website to be protected. The detection module traces the content and the activities performed on a webpage of the website and detects any exceptional activity/condition which may be fraudulent online activity performed by malware and waits until all sensitive data to perform a fraud transaction is entered. Then the detection module stores and/or forwards the details of the mule account that has been used for the fraudulent transaction.
    Type: Grant
    Filed: October 22, 2012
    Date of Patent: May 13, 2014
    Assignee: Trusteer Ltd.
    Inventors: Amit Klein, Michael Boodaei
  • Publication number: 20140114843
    Abstract: A method detects fraudulent transaction of money transfer to a mule account, according to which a detection software module is injected into a browser or a website to be protected. The detection module traces the content and the activities performed on a webpage of the website and detects any exceptional activity/condition which may be fraudulent online activity performed by malware and waits until all sensitive data to perform a fraud transaction is entered. Then the detection module stores and/or forwards the details of the mule account that has been used for the fraudulent transaction.
    Type: Application
    Filed: October 22, 2012
    Publication date: April 24, 2014
    Applicant: TRUSTEER LTD.
    Inventors: Amit KLEIN, Michael BOODAEI
  • Publication number: 20140053267
    Abstract: In a computer system, a method detects a suspected malware behavior. Activities on a computer system conducted within a given time frame are monitored during the installation of a suspected file. The monitored activities are recorded and the monitored/recorded activities are compared with patterns of malware behavior, stored in a database. Upon detecting a suspicious program, the recorded monitored activities are provided for further analysis to be performed by appropriate software removal tools.
    Type: Application
    Filed: August 20, 2012
    Publication date: February 20, 2014
    Applicant: TRUSTEER LTD.
    Inventors: Amit KLEIN, Mickey Boodaei
  • Patent number: 8595836
    Abstract: A method for preventing malicious attacks on software, using the patching method, includes providing a database of malicious known patches (malware). The database contains characteristic signatures of the malware. The method also includes detecting whether a patch is malicious by comparing it with a signature in the database and performing one or more activities needed to prevent the malicious patch from performing undesired activities.
    Type: Grant
    Filed: August 3, 2011
    Date of Patent: November 26, 2013
    Assignee: Trusteer Ltd.
    Inventors: Amit Klein, Oleg Izmerly, Shmuel Regev, Eldan Ben-Haim
  • Publication number: 20130263264
    Abstract: A method for alerting a service provider and/or a user of a web browser of a phishing attempt comprises providing on a page that it is desired to protect against phishing, a Javascript that when caused by a phishing page to run not in the context of the original page generates an indication that a phishing attempt may exist.
    Type: Application
    Filed: April 2, 2012
    Publication date: October 3, 2013
    Applicant: TRUSTEER LTD.
    Inventors: Amit KLEIN, Michael BOODAEI
  • Publication number: 20130239214
    Abstract: A method for detecting and removing a suspicious software code in a computer system, according to which the installation process of the suspicious software code is monitored by a client agent residing within the computer system where predetermined operations of the suspicious software code are identified and registered during the installation process. The predetermined operations are compared with a known software code in order to define whether the software code is similar to the known software code. It is then determined if the suspicious software code is malware and if it is, the client agent is instructed to uninstall the suspicious software code from the OS, or to remove its entry from the boot registry.
    Type: Application
    Filed: March 6, 2012
    Publication date: September 12, 2013
    Applicant: TRUSTEER LTD.
    Inventors: Amit Klein, Mickey Boodaei
  • Publication number: 20130198842
    Abstract: System and method for determining, by a security application, whether an examined software code is a malware, according to which the system detects whenever the examined process code performs system calls and further detects a call site. Pieces of code in the surrounding area of the site and/or in branches related to the site are analyzed and the properties of the analyzed pieces of code are compared with a predefined software code patterns, for determining whether the examined process code corresponds to one of the predefined software code patterns. Then the examined process code is classified according to the comparison results.
    Type: Application
    Filed: January 31, 2012
    Publication date: August 1, 2013
    Applicant: TRUSTEER LTD.
    Inventors: Amit KLEIN, Eldan BEN-HAIM, Gal FRISHMAN
  • Patent number: 8311907
    Abstract: Some demonstrative embodiments of the invention include a system and method for detecting related transactions, e.g., fraudulent transactions by for example associating transactions and creating lists of related transactions. Other embodiments are described and claimed.
    Type: Grant
    Filed: October 11, 2006
    Date of Patent: November 13, 2012
    Assignee: EMC Corporation
    Inventors: Amit Klein, Ronen Heled, Lior Golan
  • Patent number: 8266295
    Abstract: Embodiments of the present invention relate to a method and system for detecting and/or mitigating domain name system (DNS) spoofing Trojan horse (or Trojan) code. Trojan code (sometimes called malware or malicious software) is a common computer security problem. Some Trojans modify the DNS resolution mechanism employed by the infected computer, such that the computer traffic, when browsing the Internet, is routed to a location not intended by the rightful owner of the computer. The present invention can detect this phenomenon from a remote device or location and may take action to mitigate its effects.
    Type: Grant
    Filed: February 26, 2006
    Date of Patent: September 11, 2012
    Assignee: EMC Corporation
    Inventors: Amit Klein, Zohar Golan
  • Patent number: 8239940
    Abstract: A method for preventing malicious attacks on software, using the patching method, includes providing a database of legitimate and known patches, the database contains characteristic code paths of said legitimate patches. The method also includes detecting whether a patch is malicious by inspecting one or more characteristic paths of the patch and matching one or more code paths against the database of legitimate and known patches. An activity needed to prevent the malicious patch from performing undesired activities is then performed.
    Type: Grant
    Filed: August 7, 2009
    Date of Patent: August 7, 2012
    Assignee: Trusteer Ltd.
    Inventors: Amit Klein, Oleg Izmerly, Shmuel Regev, Eldan Ben-Haim
  • Patent number: 8122082
    Abstract: A method and system for determining whether a proxy is present in a communication link between a client and a server, and if so, certain characteristics of the proxy.
    Type: Grant
    Filed: March 26, 2006
    Date of Patent: February 21, 2012
    Assignee: EMC Corporation
    Inventor: Amit Klein
  • Publication number: 20120030762
    Abstract: A method for preventing malicious attacks on software, using the patching method, includes providing a database of malicious known patches (malware). The database contains characteristic signatures of the malware. The method also includes detecting whether a patch is malicious by comparing it with a signature in the database and performing one or more activities needed to prevent the malicious patch from performing undesired activities.
    Type: Application
    Filed: August 3, 2011
    Publication date: February 2, 2012
    Applicant: TRUSTEER LTD.
    Inventors: Amit KLEIN, Oleg Izmerly, Shmuel Regev, Eldan Ben-Haim
  • Publication number: 20110239300
    Abstract: A method for detecting HTML-modifying malware present in a computer includes providing a server which serves a web page (HTML) to a browser. A determination is made whether a modified string exists in the page received by said browser and if a modifying element is found, determining the malware is present in the computer.
    Type: Application
    Filed: November 1, 2010
    Publication date: September 29, 2011
    Applicant: TRUSTEER LTD.
    Inventors: Amit KLEIN, Michael Boodaei
  • Patent number: 7908223
    Abstract: A system and method of conducting a transaction comprising accepting transaction information from a user, producing a customized statement, the customized statement relating to at least a portion of the transaction information and including a challenge to the user, and sending the user an obscured representation of the customized statement. The system and method may accept from the user a response to the challenge. The system and method may further allow the transaction to proceed if the response is correct and prevent the transaction from proceeding if the response is incorrect.
    Type: Grant
    Filed: September 27, 2006
    Date of Patent: March 15, 2011
    Assignee: EMC Corporation
    Inventors: Amit Klein, Ronen Heled
  • Publication number: 20100169969
    Abstract: A method for preventing malicious attacks on software, using the patching method, includes providing a database of legitimate and known patches, the database contains characteristic code paths of said legitimate patches. The method also includes detecting whether a patch is malicious by inspecting one or more characteristic paths of the patch and matching one or more code paths against the database of legitimate and known patches. An activity needed to prevent the malicious patch from performing undesired activities is then performed.
    Type: Application
    Filed: August 7, 2009
    Publication date: July 1, 2010
    Applicant: TRUSTEER LTD.
    Inventors: Amit KLEIN, Oleg Izmerly, Shmuel Regev, Eldan Ben-Haim