Patents by Inventor Amnon Perlmutter
Amnon Perlmutter has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11323426Abstract: Transparently identifying users using a shared VPN tunnel uses an innovative method to detect a user of a shared VPN tunnel, after authenticating the user, using an assigned userid (that may be a virtual IP). The virtual IP is used as a cookie in each request made by the user. This cookie is an authentication token used by the gateway to detect the user behind a specific request for an Internet resource (such as an http/s request). The cookie is stripped by the gateway so the cookie is not sent to the resource.Type: GrantFiled: October 19, 2017Date of Patent: May 3, 2022Assignee: CHECK POINT SOFTWARE TECHNOLOGIES LTD.Inventors: Amnon Perlmutter, Lior Drihem, Yair Ziv, Jeremy Sinai, Tsemach Mizrachi
-
Patent number: 10567468Abstract: Methods and systems provide mechanisms for inspection devices, such as firewalls and servers and computers associated therewith, to selectively manipulate files, for which a download has been requested. The manipulation is performed in a manner which is transparent to the requesting user.Type: GrantFiled: December 28, 2015Date of Patent: February 18, 2020Assignee: CHECK POINT SOFTWARE TECHNOLOGIES LTD.Inventors: Amnon Perlmutter, Lior Drihem
-
Patent number: 10382493Abstract: Computerized methods and systems receive neutralized data items on a first entity from a second entity over a network by receiving a first data item from the second entity. A security protocol that applies rules and policies is applied to the first data item to create a second data item that is a neutralized version of the first data item. The first data item and the second data item are converted into comparable forms. The second data item is analyzed against the first data item by comparing the comparable forms to form at least one comparison measure. The second data item is received on the endpoint if the at least one comparison measure satisfies a threshold criterion. The security protocol is modified to adjust the applied rules and policies if the at least one comparison measure does not satisfy the threshold criterion.Type: GrantFiled: June 9, 2016Date of Patent: August 13, 2019Assignee: CHECK POINT SOFTWARE TECHNOLOGIES LTD.Inventors: Daniel Finchelstein, Amnon Perlmutter
-
Patent number: 10057390Abstract: Methods and systems provide mechanisms for inspection devices, such as firewalls and servers and computers associated therewith, to modify HTTP requests, without requiring the inspection device to terminate the connections at the TCP (Transport Control Protocol) level, as occurs with contemporary web proxies, e.g., web proxy servers—either explicit or implicit proxies.Type: GrantFiled: April 1, 2015Date of Patent: August 21, 2018Assignee: CHECK POINT SOFTWARE TECHNOLOGIES LTD.Inventors: Amnon Perlmutter, Lior Drihem
-
Patent number: 9672189Abstract: The present invention discloses methods for effective network-security inspection in virtualized environments, the methods including the steps of: providing a data packet, embodied in machine-readable signals, being sent from a sending virtual machine to a receiving virtual machine via a virtual switch; intercepting the data packet by a sending security agent associated with the sending virtual machine; injecting the data packet into an inspecting security agent associated with a security virtual machine via a direct transmission channel which bypasses the virtual switch; forwarding the data packet to the security virtual machine by employing a packet-forwarding mechanism; determining, by the security virtual machine, whether the data packet is allowed for transmission; upon determining the data packet is allowed, injecting the data packet back into the sending security agent via the direct transmission channel; and forwarding the data packet to the receiving virtual machine via the virtual switch.Type: GrantFiled: July 23, 2009Date of Patent: June 6, 2017Assignee: CHECK POINT SOFTWARE TECHNOLOGIES, LTD.Inventors: Ofer Raz, Amnon Perlmutter, Erez Berkner
-
Publication number: 20160191531Abstract: Methods and systems for blocking reception of digital content elements by devices are disclosed. These methods and systems comprise elements of hardware and software for, receiving an electronic communication including at least one digital document; determining the content type of the at least one digital document; based on the content type of the at least one digital document, modifying the digital content of the digital document so as to selectively disable functionality of the digital document; and, enabling the subsequent processing of the electronic communication including the at least one digital document with the modified digital content.Type: ApplicationFiled: December 29, 2014Publication date: June 30, 2016Inventors: Amnon Perlmutter, Limor Ganon, Lior Drihem, Lior Tamim
-
Patent number: 9210128Abstract: A computer-readable storage medium has embedded thereon non-transient computer-readable code for controlling access to a protected computer network, by intercepting packets that are being exchanged between a computer system and the protected network, and then, for each intercepted packet, identifying the associated application that is running on the computer system, determining whether the application is trusted, for example according to a white list or according to a black list, and disposing of the packet accordingly.Type: GrantFiled: May 26, 2013Date of Patent: December 8, 2015Assignee: CHECK POINT SOFTWARE TECHNOLOGIES LTD.Inventors: Lior Drihem, Amnon Perlmutter
-
Publication number: 20150188749Abstract: A server and/or a gateway of a computer network receive a filter for filtering data items to be sent to a mobile device of a cellular network. The mobile device is notified of receipt of data items by the server only if such notification is allowed by the filter. In one embodiment, the server maintains a first queue of data items for which notification is allowed and a second queue of data items for which notification is not allowed, and the gateway periodically inspects the first queue and notifies the mobile device of receipt of new data items.Type: ApplicationFiled: December 30, 2013Publication date: July 2, 2015Applicant: Check Point Software Technologies Ltd.tInventors: Daniel Finchelstein, Amnon Perlmutter, Aviad Mor, Noam Arad
-
Patent number: 8959047Abstract: To validate data, a plurality of strings that match a predetermined regular expression is extracted from the data. A validated subset of the strings is identified. To determine whether the validated subset has been falsely validated, it is determined whether the validated subset satisfies each of one or more predetermined criteria relative to the plurality of strings. In one embodiment, the subset is determined to be falsely validated if at least one of the criteria is satisfied. In another embodiment, the subset is determined to be falsely validated if all of the criteria are satisfied. The data are released only if the subset is determined to be falsely validated.Type: GrantFiled: May 10, 2012Date of Patent: February 17, 2015Assignee: Check Point Software Technologies Ltd.Inventors: Amnon Perlmutter, Limor Ganon, Meir Jonathan Dahan
-
Patent number: 8948193Abstract: Methods, devices, and media for intelligent NIC bonding and load-balancing including the steps of: providing a packet at an incoming-packet port of a gateway; attaching an incoming-port identification, associated with the incoming-packet port, to the packet; routing the packet to a processing core; passing the packet through a gateway processing; sending the packet, by the core, to the operating system of a host system; and routing the packet to an outgoing-packet port of the gateway based on the incoming-port identification. Preferably, the gateway processing includes security processing of the packets. Preferably, the step of routing the packet to the outgoing-packet port is based solely on the incoming-port identification. Preferably, an outgoing-port identification, associated with the outgoing-packet port, has an identical bond-index to the incoming-port identification.Type: GrantFiled: August 19, 2008Date of Patent: February 3, 2015Assignee: Check Point Software Technologies, Ltd.Inventors: Amnon Perlmutter, Benzi Waisman
-
Publication number: 20150006881Abstract: A user device generates a key for encrypting and decrypting data of an application suite, uses a long secret to encrypt the key, and stores the key locally only as encrypted. The key is stored, along with a user-provided short secret, in a non-volatile memory of a server. Preferably, the key is generated only if an indication is received from the server that the long secret is identical to a reference long secret. The user obtains the key either by presenting the short secret to the server or by presenting the long secret to the user device to enable the user device to decrypt the encrypted key.Type: ApplicationFiled: June 27, 2013Publication date: January 1, 2015Inventors: Amnon Perlmutter, Lior Drihem
-
Patent number: 8902900Abstract: A method and system is provided for a scalable clustered system. The method and system may handle asynchronous traffic as well as session backup. In the method and system, a home cluster member having ownership of a local session predicts designation of a an other cluster member to receive a packet associated with the local session and sends appropriate state information or forwarding instruction to the other network member.Type: GrantFiled: February 13, 2013Date of Patent: December 2, 2014Assignee: Check Point Software Technologies Ltd.Inventors: Amir Erman, Amnon Perlmutter, Ben Zion Weissman
-
Publication number: 20140351209Abstract: A method and system is provided for a scalable clustered system. The method and system may handle asynchronous traffic as well as session backup. In the method and system, a home cluster member having ownership of a local session predicts designation of a an other cluster member to receive a packet associated with the local session and sends appropriate state information or forwarding instruction to the other network member.Type: ApplicationFiled: June 5, 2014Publication date: November 27, 2014Inventors: Amir ERMAN, Amnon Perlmutter, Ben Zion Weissman
-
Patent number: 8776017Abstract: A data leak prevention application that categorizes documents by data type is provided, a data type being a sensitivity classification of a document based on what data the document contains. A scripting language processing engine is embedded into the data leak prevention application, the scripting language forming part of the application as hard code. A user configures interaction of the scripting language processing engine with the application. The configuring may include modifying or adding code or setting criteria for when code portions of the scripting language processing engine activates. The scripting language processing engine is activated to enhance an accuracy of an existing data type or so as to detect a new data type. Upon enhancing the accuracy of the data type, documents may be re-categorized.Type: GrantFiled: July 26, 2010Date of Patent: July 8, 2014Assignee: Check Point Software Technologies LtdInventors: Amnon Perlmutter, Aviad Mor, Oded Gonda, Ofer Raz, Matt LeGrow
-
Publication number: 20140123269Abstract: A computer-readable storage medium has embedded thereon non-transient computer-readable code for controlling access to a protected computer network, by intercepting packets that are being exchanged between a computer system and the protected network, and then, for each intercepted packet, identifying the associated application that is running on the computer system, determining whether the application is trusted, for example according to a white list or according to a black list, and disposing of the packet accordingly.Type: ApplicationFiled: May 26, 2013Publication date: May 1, 2014Applicant: Check Point Software Technologies Ltd.Inventors: Lior Drihem, Amnon Perlmutter
-
Patent number: 8644328Abstract: Methods, devices, and media for intelligent NIC bonding and load-balancing including the steps of: providing a packet at an incoming-packet port of a gateway; attaching an incoming-port identification, associated with the incoming-packet port, to the packet; routing the packet to a processing core; passing the packet through a gateway processing; sending the packet, by the core, to the operating system of a host system; and routing the packet to an outgoing-packet port of the gateway based on the incoming-port identification. Preferably, the gateway processing includes security processing of the packets. Preferably, the step of routing the packet to the outgoing-packet port is based solely on the incoming-port identification. Preferably, an outgoing-port identification, associated with the outgoing-packet port, has an identical bond-index to the incoming-port identification.Type: GrantFiled: March 31, 2011Date of Patent: February 4, 2014Assignee: Check Point Software Technologies, Ltd.Inventors: Amnon Perlmutter, Benzi Waisman
-
Publication number: 20130304690Abstract: To validate data, a plurality of strings that match a predetermined regular expression is extracted from the data. A validated subset of the strings is identified. To determine whether the validated subset has been falsely validated, it is determined whether the validated subset satisfies each of one or more predetermined criteria relative to the plurality of strings. In one embodiment, the subset is determined to be falsely validated if at least one of the criteria is satisfied. In another embodiment, the subset is determined to be falsely validated if all of the criteria are satisfied. The data are released only if the subset is determined to be falsely validated.Type: ApplicationFiled: May 10, 2012Publication date: November 14, 2013Applicant: CHECK POINT SOFTWARE TECHNOLOGIES LTD.Inventors: Amnon Perlmutter, Limor Ganon, Meir Jonathan Dehan
-
Patent number: 8406233Abstract: A method and system is provided for a scalable clustered system. The method and system may handle asynchronous traffic as well as session backup. In the method and system, a home cluster member having ownership of a local session predicts designation of a an other cluster member to receive a packet associated with the local session and sends appropriate state information or forwarding instruction to the other network member.Type: GrantFiled: September 7, 2010Date of Patent: March 26, 2013Assignee: Check Point Software Technologies Ltd.Inventors: Amir Erman, Amnon Perlmutter, Ben Zion Weissman
-
Publication number: 20120057591Abstract: A method and system is provided for a scalable clustered system. The method and system may handle asynchronous traffic as well as session backup. In the method and system, a home cluster member having ownership of a local session predicts designation of a an other cluster member to receive a packet associated with the local session and sends appropriate state information or forwarding instruction to the other network member.Type: ApplicationFiled: September 7, 2010Publication date: March 8, 2012Applicant: CHECK POINT SOFTWARE TECHNOLOGIES LTD.Inventors: Amir Erman, Amnon Perlmutter, Ben Zion Weissman
-
Publication number: 20120023480Abstract: A data leak prevention application that categorizes documents by data type is provided, a data type being a sensitivity classification of a document based on what data the document contains. A scripting language processing engine is embedded into the data leak prevention application, the scripting language forming part of the application as hard code. A user configures interaction of the scripting language processing engine with the application. The configuring may include modifying or adding code or setting criteria for when code portions of the scripting language processing engine activates. The scripting language processing engine is activated to enhance an accuracy of an existing data type or so as to detect a new data type. Upon enhancing the accuracy of the data type, documents may be re-categorized.Type: ApplicationFiled: July 26, 2010Publication date: January 26, 2012Applicant: Check Point Software Technologies Ltd.Inventors: Amnon Perlmutter, Aviad Mor, Oded Gonda, Ofer Raz, Matt LeGrow