Patents by Inventor Eran Reshef

Eran Reshef has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20120185337
    Abstract: A method and system for streamlining social media marketing continuous activities are provided for finding Potential Friends (PFs) on various social media avenues, gathering information about PFs' interests and activities on an going basis, creating attractive presences (APs) on various social media sites, befriending with PFs to turn them in Actual Friends (AFs), conversing with AFs to foster the relationship with them, creating Social Campaigns (SCs) to promote Desired Items (DIs), running SCs with the help of AFs, and measuring results of SCs and overall progress.
    Type: Application
    Filed: March 27, 2012
    Publication date: July 19, 2012
    Applicant: COLLACTIVE LTD.
    Inventors: Eran RESHEF, Amir HIRSH
  • Patent number: 8099760
    Abstract: The present invention provides systems and methods for risk detection and analysis in a computer network. Computerized, automated systems and methods can be provided. Raw vulnerability information and network information can be utilized in determining actual vulnerability information associated with network nodes. Methods are provided in which computer networks are modeled, and the models utilized in performing attack simulations and determining risks associated with vulnerabilities. Risks can be evaluated and prioritized, and fix information can be provided.
    Type: Grant
    Filed: April 28, 2005
    Date of Patent: January 17, 2012
    Assignee: Skybox Security, Inc.
    Inventors: Gideon Cohen, Moshe Meiseles, Eran Reshef
  • Patent number: 7774835
    Abstract: A method and computer program for automatically and continually extracting application protocols (i.e., defining a set of allowable or authorized actions) for any application. The method involves receiving a message from a server before it is sent or in parallel with sending to a client. The message may be in response to a specific request for it from the client. The program then extracts the application protocol data from the server message. Working with a copy of the message, the program strips off the communications protocol(s) from the message and parses the remaining message to identify user-selectable options contained in the message such as commands, fields, etc. These items represent the set of allowable or authorized user actions for the particular “stage” of the current version of the application as set forth in the message. The set of allowable user actions is then stored by the extraction program in a protocol database accessible to a gateway or filter module.
    Type: Grant
    Filed: August 2, 2004
    Date of Patent: August 10, 2010
    Assignee: F5 Networks, Inc.
    Inventors: Gil Raanan, Tal Moran, Yaron Galant, Yuval El-Hanani, Eran Reshef
  • Patent number: 7756933
    Abstract: An active deterrence method and system deter rogue cyber activity targeting one or more protected legitimate users (PLUs). Methodologies and/or techniques are included to establish a PLU registry and/or enable a PLU to bear an identifying mark; detect rogue cyber activity; issue warnings to one or more rogue users (RUs) that target or attack PLUs with the detected rogue cyber activity; detect non-complying RUs that ignore or otherwise fail to comply with the warnings; and deploy one or more active deterrence mechanisms against the non-complying RUs. One active deterrence mechanism includes deploying a plurality of scripts to each PLU, and executing the scripts to issue complaints and request the non-complying RUs to clean their mailing lists of all PLUs. Other active deterrence mechanisms include alerting unaware business affiliates of the RUs, and notifying victims or law enforcement authorities of unlawful rogue cyber activity.
    Type: Grant
    Filed: December 12, 2005
    Date of Patent: July 13, 2010
    Assignee: Collactive Ltd.
    Inventors: Eran Reshef, Amir Hirsh
  • Patent number: 7703127
    Abstract: A system and method are presented for authorizing execution of requested actions transmitted between clients and servers of a data processing system. The method includes receiving a message including a set of actions and simulating execution of the set of actions. A list representing allowable actions and user-definable inputs to the simulated actions is defined. The list of allowable actions and user-definable inputs to the allowable action is then compared to user-requested actions and inputs. When elements within the user-requested actions and inputs are included in the allowable actions and input list, the user-requested actions and inputs are authorized for execution.
    Type: Grant
    Filed: October 17, 2007
    Date of Patent: April 20, 2010
    Assignee: International Business Machines Corporation
    Inventors: Tal Moran, Yuval El-Hanani, Eran Reshef, Gil Zoran
  • Publication number: 20090204482
    Abstract: A method and system for streamlining social media marketing continuous activities are provided for finding Potential Friends (PFs) on various social media avenues, gathering information about PFs' interests and activities on an going basis, creating attractive presences (APs) on various social media sites, befriending with PFs to turn them in Actual Friends (AFs), conversing with AFs to foster the relationship with them, creating Social Campaigns (SCs) to promote Desired Items (DIs), running SCs with the help of AFs, and measuring results of SCs and overall progress.
    Type: Application
    Filed: February 11, 2009
    Publication date: August 13, 2009
    Inventors: Eran Reshef, Amir Hirsh
  • Publication number: 20080177832
    Abstract: A method and system for accelerating a response rate for action networks, wherein the action networks provide calls for actions (CFAs) to users, includes preparing a CFA for submission to the users. The method and system determines user contact information for the various users, which indicates if the CFA is transmitted via either a slow communication mode (SCM) technique or a rapid communication mode (RCM) technique. For users having contact information indicating transmission via the SCM technique, the method and system provides a conversion request (CR), which invites the user to convert from SCM to RCM for receiving CFAs. The system and method transmits the CFAs to the user via the designated communication mode techniques. The user may accept the CR, such that the system and method receives the response and updates the user contact information from the SCM technique to the RCM technique.
    Type: Application
    Filed: January 22, 2008
    Publication date: July 24, 2008
    Inventors: Eran Reshef, Amir Hirsh
  • Publication number: 20080177819
    Abstract: A method and system for contextual calls-for-actions (CCFAs) includes providing a plurality of CCFAs from a coordination center to a plurality of supporters, including providing the CCFAs to computing devices of the supporters. The method and system further includes determining if a supporter is conducting an action context (AC). Whereby in the method and system, if the supporter is conducting the AC, selecting a call-for-action (CFA) corresponding to the AC and thereby electronically providing the CFA to the supporter. Accordingly, the supporter timely receives notations, instructions, reminder, etc. for performing the CFA relative to the user's AC.
    Type: Application
    Filed: January 22, 2008
    Publication date: July 24, 2008
    Inventors: Eran Reshef, Amir Hirsh
  • Publication number: 20080178081
    Abstract: The method and system for guiding a user to operate simplified computing operations for common web services activities via a web service interface standard to the web service itself include recognizing a user's activity with the web service. The method and system includes providing a first interface to the user for performing an operation relating to the web service, where the first interface is different from the web service interface associated with the web service and the first interface includes a plurality of graphical elements. In the method and system, upon receiving the user input commands via the first interface, the user input commands are translated into a format usable by the web service and provided to the web service, bypassing existing web service input commands provided by the web service interface.
    Type: Application
    Filed: January 22, 2008
    Publication date: July 24, 2008
    Inventors: Eran Reshef, Amir Hirsh
  • Publication number: 20080066173
    Abstract: A system and method are presented for authorizing execution of requested actions transmitted between clients and servers of a data processing system. The method includes receiving a message including a set of actions and simulating execution of the set of actions. A list representing allowable actions and user-definable inputs to the simulated actions is defined. The list of allowable actions and user-definable inputs to the allowable action is then compared to user-requested actions and inputs. When elements within the user-requested actions and inputs are included in the allowable actions and input list, the user-requested actions and inputs are authorized for execution.
    Type: Application
    Filed: October 17, 2007
    Publication date: March 13, 2008
    Applicant: WATCHFIRE CORPORATION
    Inventors: Tal MORAN, Yuval EL-HANANI, Gil RAANAN, Eran RESHEF
  • Publication number: 20080052147
    Abstract: A method and system for influencing public opinion are provided for influencing public opinion using a community of members. Methodologies and/or techniques are included to collect Influence Points; analyze Influence Points to find URLs of Interest (UOI) where the community needs act; plan effective campaigns; distribute tasks derived from campaigns to community members. The methodologies and/or techniques may also include monitoring the progress of campaigns. One campaign mechanism includes real-time desktop or browser add-on alerts sent to some or all community members, asking the members to voice their opinions at a selected UOI.
    Type: Application
    Filed: July 17, 2007
    Publication date: February 28, 2008
    Inventors: Eran Reshef, Amir Hirsh
  • Patent number: 7293281
    Abstract: A system and method are presented for authorizing execution of requested actions transmitted between clients and servers of a data processing system. The method includes receiving a message including a set of actions and simulating execution of the set of actions. A list representing allowable actions and user-definable inputs to the simulated actions is defined. The list of allowable actions and user-definable inputs to the allowable action is then compared to user-requested actions and inputs. When elements within the user-requested actions and inputs are included in the allowable actions and input list, the user-requested actions and inputs are authorized for execution.
    Type: Grant
    Filed: October 25, 2000
    Date of Patent: November 6, 2007
    Assignee: Watchfire Corporation
    Inventors: Tal Moran, Yuval El-Hanani, Gil Raanan, Eran Reshef
  • Patent number: 7237265
    Abstract: A method for detecting security vulnerabilities in a web application includes analyzing the client requests and server responses resulting therefrom in order to discover pre-defined elements of the application's interface with external clients and the attributes of these elements. The client requests are then mutated based on a pre-defined set of mutation rules to thereby generate exploits unique to the application. The web application is attacked using the exploits and the results of the attack are evaluated for anomalous application activity.
    Type: Grant
    Filed: March 20, 2003
    Date of Patent: June 26, 2007
    Assignee: Watchfire Corporation
    Inventors: Eran Reshef, Yuval El-Hanany, Gil Raanan, Tom Tsarfati
  • Publication number: 20060168202
    Abstract: An active deterrence method and system deter rogue cyber activity targeting one or more protected legitimate users (PLUs). Methodologies and/or techniques are included to establish a PLU registry and/or enable a PLU to bear an identifying mark; detect rogue cyber activity; issue warnings to one or more rogue users (RUs) that target or attack PLUs with the detected rogue cyber activity; detect non-complying RUs that ignore or otherwise fail to comply with the warnings; and deploy one or more active deterrence mechanisms against the non-complying RUs. One active deterrence mechanism includes deploying a plurality of scripts to each PLU, and executing the scripts to issue complaints and request the non-complying RUs to clean their mailing lists of all PLUs. Other active deterrence mechanisms include alerting unaware business affiliates of the RUs, and notifying victims or law enforcement authorities of unlawful rogue cyber activity.
    Type: Application
    Filed: December 12, 2005
    Publication date: July 27, 2006
    Inventors: Eran Reshef, Amir Hirsh
  • Publication number: 20060161989
    Abstract: An active deterrence method and system deter rogue cyber activity targeting one or more protected legitimate users (PLUs). Methodologies and/or techniques are included to establish a PLU registry and/or enable a PLU to bear an identifying mark; detect rogue cyber activity; issue warnings to one or more rogue users (RUs) that target or attack PLUs with the detected rogue cyber activity; detect non-complying RUs that ignore or otherwise fail to comply with the warnings; and deploy one or more active deterrence mechanisms against the non-complying RUs. One active deterrence mechanism includes deploying a plurality of scripts to each PLU, and executing the scripts to issue complaints and request the non-complying RUs to clean their mailing lists of all PLUs. Other active deterrence mechanisms include alerting unaware business affiliates of the RUs, and notifying victims or law enforcement authorities of unlawful rogue cyber activity.
    Type: Application
    Filed: December 12, 2005
    Publication date: July 20, 2006
    Inventors: Eran Reshef, Amir Hirsh
  • Patent number: 6952779
    Abstract: The present invention provides systems and methods for risk detection and analysis in a computer network. Computerized, automated systems and methods can be provided. Raw vulnerability information and network information can be utilized in determining actual vulnerability information associated with network nodes. Methods are provided in which computer networks are modeled, and the models utilized in performing attack simulations and determining risks associated with vulnerabilities. Risks can be evaluated and prioritized, and fix information can be provided.
    Type: Grant
    Filed: October 1, 2002
    Date of Patent: October 4, 2005
    Inventors: Gideon Cohen, Moshe Meiseles, Eran Reshef
  • Publication number: 20050193430
    Abstract: The present invention provides systems and methods for risk detection and analysis in a computer network. Computerized, automated systems and methods can be provided. Raw vulnerability information and network information can be utilized in determining actual vulnerability information associated with network nodes. Methods are provided in which computer networks are modeled, and the models utilized in performing attack simulations and determining risks associated with vulnerabilities. Risks can be evaluated and prioritized, and fix information can be provided.
    Type: Application
    Filed: April 28, 2005
    Publication date: September 1, 2005
    Inventors: Gideon Cohen, Moshe Meiseles, Eran Reshef
  • Publication number: 20050114705
    Abstract: A method and system are disclosed for discriminating automatic computerized action from a human performed action. The invention is based on applying human advantage in applying sensory and cognitive skills to solving simple problems that prove to be extremely hard for computer software. Such skills include, but are not limited to processing of sensory information such as identification of objects and letters within a noisy graphical environment, signals and speech within an auditory signal, patterns and objects within a video or animation sequence. Human skills also include higher level cognitive processing such as understanding natural language and logical assignments. The method for discriminating between humans and computerized actions can be used during authentication, to limit access by automated agents, and for confirmation of actions.
    Type: Application
    Filed: March 1, 2004
    Publication date: May 26, 2005
    Inventors: Eran Reshef, Gil Raanan, Eilon Solan
  • Publication number: 20050044420
    Abstract: A method and computer program for automatically and continually extracting application protocols (i.e., defining a set of allowable or authorized actions) for any application. The method involves receiving a message from a server before it is sent or in parallel with sending to a client. The message may be in response to a specific request for it from the client. The program then extracts the application protocol data from the server message. Working with a copy of the message, the program strips off the communications protocol(s) from the message and parses the remaining message to identify user-selectable options contained in the message such as commands, fields, etc. These items represent the set of allowable or authorized user actions for the particular “stage” of the current version of the application as set forth in the message. The set of allowable user actions is then stored by the extraction program in a protocol database accessible to a gateway or filter module.
    Type: Application
    Filed: August 2, 2004
    Publication date: February 24, 2005
    Inventors: Gil Raanan, Tal Moran, Yaron Galant, Yuval El-Hanani, Eran Reshef
  • Publication number: 20030233581
    Abstract: A method for detecting security vulnerabilities in a web application includes analyzing the client requests and server responses resulting therefrom in order to discover pre-defined elements of the application's interface with external clients and the attributes of these elements. The client requests are then mutated based on a pre-defined set of mutation rules to thereby generate exploits unique to the application. The web application is attacked using the exploits and the results of the attack are evaluated for anomalous application activity.
    Type: Application
    Filed: March 20, 2003
    Publication date: December 18, 2003
    Inventors: Eran Reshef, Yuval El-Hanany, Gil Raanan, Tom Tsarfati