Patents by Inventor Amit Klein
Amit Klein has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 8863281Abstract: A method for protecting a browser from malicious processes, comprises providing at least one process-proxy object and at least a browser-proxy object, interposed between the browser and a process, such that when the process invokes one of the DOM entry points, the process-proxy object isolates it from the real browser implementation and executes the process-proxy object's code instead.Type: GrantFiled: May 22, 2009Date of Patent: October 14, 2014Assignee: Trusteer Ltd.Inventors: Amit Klein, Eldan Ben-Haim, Oleg Izmerly, Shmuel Regev, Michael Boodaei
-
Publication number: 20140304816Abstract: A method for detecting malware in a user terminal device that has been infected by malware via a browser running on the user terminal device, according to which upon detecting a predetermined a triggering event on the user terminal, a security application installed on the terminal automatically activates a transparent browser to navigate to one or more predetermined URLs. Then the security application checks the code of an inspected webpage that has been received immediately after it is opened by the transparent browser and rechecks the code after being at least partially processed by the transparent browser. If a change the code is detected, an alert is issued, indicating that the terminal has been infected by malware.Type: ApplicationFiled: April 8, 2013Publication date: October 9, 2014Inventors: Amit KLEIN, Michael BOODAEI
-
Publication number: 20140289851Abstract: A process for identifying potentially harmful malware, comprises the steps of: a) identifying an executable that is about to run; b) providing a monitoring agent that monitors all threads that are descendent of a thread initiated by the process of said executable; and c) configuring said monitoring agent to conclude that a high probability of malware presence exists, if one of said descendent threads reaches a target process in which suspicious patches are created.Type: ApplicationFiled: March 19, 2013Publication date: September 25, 2014Applicant: TRUSTEER LTD.Inventors: Amit KLEIN, Yaron DYCIAN, Gal FRISHMAN, Avner GIDEONI
-
Patent number: 8813224Abstract: A method for protecting a browser from malicious processes, comprises providing at least one process-proxy object and at least a browser-proxy object, interposed between the browser and a process, such that when the process invokes one of the DOM entry points, the process-proxy object isolates it from the real browser implementation and executes the process-proxy object's code instead.Type: GrantFiled: May 22, 2009Date of Patent: August 19, 2014Assignee: Trusteer Ltd.Inventors: Amit Klein, Eldan Ben-Haim, Oleg Izmerly, Shmuel Regev, Michael Boodaei
-
Patent number: 8732794Abstract: A browser plug-in firewall manages data exchanged between a browser and a plug-in according to a pre-defined list of rights.Type: GrantFiled: August 11, 2008Date of Patent: May 20, 2014Assignee: Trusteer Ltd.Inventors: Michael Boodaei, Amit Klein, Oleg Izmerly
-
Patent number: 8725636Abstract: A method detects fraudulent transaction of money transfer to a mule account, according to which a detection software module is injected into a browser or a website to be protected. The detection module traces the content and the activities performed on a webpage of the website and detects any exceptional activity/condition which may be fraudulent online activity performed by malware and waits until all sensitive data to perform a fraud transaction is entered. Then the detection module stores and/or forwards the details of the mule account that has been used for the fraudulent transaction.Type: GrantFiled: October 22, 2012Date of Patent: May 13, 2014Assignee: Trusteer Ltd.Inventors: Amit Klein, Michael Boodaei
-
Publication number: 20140114843Abstract: A method detects fraudulent transaction of money transfer to a mule account, according to which a detection software module is injected into a browser or a website to be protected. The detection module traces the content and the activities performed on a webpage of the website and detects any exceptional activity/condition which may be fraudulent online activity performed by malware and waits until all sensitive data to perform a fraud transaction is entered. Then the detection module stores and/or forwards the details of the mule account that has been used for the fraudulent transaction.Type: ApplicationFiled: October 22, 2012Publication date: April 24, 2014Applicant: TRUSTEER LTD.Inventors: Amit KLEIN, Michael BOODAEI
-
Publication number: 20140053267Abstract: In a computer system, a method detects a suspected malware behavior. Activities on a computer system conducted within a given time frame are monitored during the installation of a suspected file. The monitored activities are recorded and the monitored/recorded activities are compared with patterns of malware behavior, stored in a database. Upon detecting a suspicious program, the recorded monitored activities are provided for further analysis to be performed by appropriate software removal tools.Type: ApplicationFiled: August 20, 2012Publication date: February 20, 2014Applicant: TRUSTEER LTD.Inventors: Amit KLEIN, Mickey Boodaei
-
Patent number: 8595836Abstract: A method for preventing malicious attacks on software, using the patching method, includes providing a database of malicious known patches (malware). The database contains characteristic signatures of the malware. The method also includes detecting whether a patch is malicious by comparing it with a signature in the database and performing one or more activities needed to prevent the malicious patch from performing undesired activities.Type: GrantFiled: August 3, 2011Date of Patent: November 26, 2013Assignee: Trusteer Ltd.Inventors: Amit Klein, Oleg Izmerly, Shmuel Regev, Eldan Ben-Haim
-
Publication number: 20130263264Abstract: A method for alerting a service provider and/or a user of a web browser of a phishing attempt comprises providing on a page that it is desired to protect against phishing, a Javascript that when caused by a phishing page to run not in the context of the original page generates an indication that a phishing attempt may exist.Type: ApplicationFiled: April 2, 2012Publication date: October 3, 2013Applicant: TRUSTEER LTD.Inventors: Amit KLEIN, Michael BOODAEI
-
Publication number: 20130239214Abstract: A method for detecting and removing a suspicious software code in a computer system, according to which the installation process of the suspicious software code is monitored by a client agent residing within the computer system where predetermined operations of the suspicious software code are identified and registered during the installation process. The predetermined operations are compared with a known software code in order to define whether the software code is similar to the known software code. It is then determined if the suspicious software code is malware and if it is, the client agent is instructed to uninstall the suspicious software code from the OS, or to remove its entry from the boot registry.Type: ApplicationFiled: March 6, 2012Publication date: September 12, 2013Applicant: TRUSTEER LTD.Inventors: Amit Klein, Mickey Boodaei
-
Publication number: 20130198842Abstract: System and method for determining, by a security application, whether an examined software code is a malware, according to which the system detects whenever the examined process code performs system calls and further detects a call site. Pieces of code in the surrounding area of the site and/or in branches related to the site are analyzed and the properties of the analyzed pieces of code are compared with a predefined software code patterns, for determining whether the examined process code corresponds to one of the predefined software code patterns. Then the examined process code is classified according to the comparison results.Type: ApplicationFiled: January 31, 2012Publication date: August 1, 2013Applicant: TRUSTEER LTD.Inventors: Amit KLEIN, Eldan BEN-HAIM, Gal FRISHMAN
-
Patent number: 8311907Abstract: Some demonstrative embodiments of the invention include a system and method for detecting related transactions, e.g., fraudulent transactions by for example associating transactions and creating lists of related transactions. Other embodiments are described and claimed.Type: GrantFiled: October 11, 2006Date of Patent: November 13, 2012Assignee: EMC CorporationInventors: Amit Klein, Ronen Heled, Lior Golan
-
Patent number: 8266295Abstract: Embodiments of the present invention relate to a method and system for detecting and/or mitigating domain name system (DNS) spoofing Trojan horse (or Trojan) code. Trojan code (sometimes called malware or malicious software) is a common computer security problem. Some Trojans modify the DNS resolution mechanism employed by the infected computer, such that the computer traffic, when browsing the Internet, is routed to a location not intended by the rightful owner of the computer. The present invention can detect this phenomenon from a remote device or location and may take action to mitigate its effects.Type: GrantFiled: February 26, 2006Date of Patent: September 11, 2012Assignee: EMC CorporationInventors: Amit Klein, Zohar Golan
-
Patent number: 8239940Abstract: A method for preventing malicious attacks on software, using the patching method, includes providing a database of legitimate and known patches, the database contains characteristic code paths of said legitimate patches. The method also includes detecting whether a patch is malicious by inspecting one or more characteristic paths of the patch and matching one or more code paths against the database of legitimate and known patches. An activity needed to prevent the malicious patch from performing undesired activities is then performed.Type: GrantFiled: August 7, 2009Date of Patent: August 7, 2012Assignee: Trusteer Ltd.Inventors: Amit Klein, Oleg Izmerly, Shmuel Regev, Eldan Ben-Haim
-
Patent number: 8122082Abstract: A method and system for determining whether a proxy is present in a communication link between a client and a server, and if so, certain characteristics of the proxy.Type: GrantFiled: March 26, 2006Date of Patent: February 21, 2012Assignee: EMC CorporationInventor: Amit Klein
-
Publication number: 20120030762Abstract: A method for preventing malicious attacks on software, using the patching method, includes providing a database of malicious known patches (malware). The database contains characteristic signatures of the malware. The method also includes detecting whether a patch is malicious by comparing it with a signature in the database and performing one or more activities needed to prevent the malicious patch from performing undesired activities.Type: ApplicationFiled: August 3, 2011Publication date: February 2, 2012Applicant: TRUSTEER LTD.Inventors: Amit KLEIN, Oleg Izmerly, Shmuel Regev, Eldan Ben-Haim
-
Publication number: 20110239300Abstract: A method for detecting HTML-modifying malware present in a computer includes providing a server which serves a web page (HTML) to a browser. A determination is made whether a modified string exists in the page received by said browser and if a modifying element is found, determining the malware is present in the computer.Type: ApplicationFiled: November 1, 2010Publication date: September 29, 2011Applicant: TRUSTEER LTD.Inventors: Amit KLEIN, Michael Boodaei
-
Patent number: 7908223Abstract: A system and method of conducting a transaction comprising accepting transaction information from a user, producing a customized statement, the customized statement relating to at least a portion of the transaction information and including a challenge to the user, and sending the user an obscured representation of the customized statement. The system and method may accept from the user a response to the challenge. The system and method may further allow the transaction to proceed if the response is correct and prevent the transaction from proceeding if the response is incorrect.Type: GrantFiled: September 27, 2006Date of Patent: March 15, 2011Assignee: EMC CorporationInventors: Amit Klein, Ronen Heled
-
Publication number: 20100169969Abstract: A method for preventing malicious attacks on software, using the patching method, includes providing a database of legitimate and known patches, the database contains characteristic code paths of said legitimate patches. The method also includes detecting whether a patch is malicious by inspecting one or more characteristic paths of the patch and matching one or more code paths against the database of legitimate and known patches. An activity needed to prevent the malicious patch from performing undesired activities is then performed.Type: ApplicationFiled: August 7, 2009Publication date: July 1, 2010Applicant: TRUSTEER LTD.Inventors: Amit KLEIN, Oleg Izmerly, Shmuel Regev, Eldan Ben-Haim