Patents by Inventor Eran Werner

Eran Werner has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9998919
    Abstract: A method for establishing credentials for securing text message communications. The method includes receiving, at a text messaging hub executing at a server device, a text message from a user, the text message being directed to a service number and including (1) a user number and (2) a request to establish a secure credential for communicating with a text messaging application. The method also includes transmitting, by the text messaging hub executing at the server device, an initiation message to the user, the initiation message includes a user-specific system number to which the user is to direct future text messages.
    Type: Grant
    Filed: January 30, 2012
    Date of Patent: June 12, 2018
    Assignee: Google LLC
    Inventors: Dror Michael Marcus, Aviad Barzilai, Brian Eaton, Guy Flysher, Mark A. Grossman, Shai Gutner, Divon Mordechai Lan, Michal Maor, Natalia Marmasse, Asaf Revach, Billy Kim Rios, Eran Werner
  • Patent number: 9917863
    Abstract: A method is provided for implementing a mandatory access control model in operating systems which natively use a discretionary access control scheme. A method for implementing mandatory access control in a system comprising a plurality of computers, the system comprising a plurality of information assets, stored as files on the plurality of computers, and a network communicatively connecting the plurality of computers, wherein each of the plurality of computers includes an operating system that uses a discretionary access control policy, and wherein each of a subset of the plurality of computers includes a software agent component operable to perform the steps of intercepting a request for a file operation on a file from a user of one of the plurality of computers including the software agent, determining whether the file is protected, if the file is protected, altering ownership of the file from the user to another owner, and providing access to the file based on a mandatory access control policy.
    Type: Grant
    Filed: May 20, 2016
    Date of Patent: March 13, 2018
    Assignee: McAfee, LLC
    Inventors: Oren Tirosh, Eran Werner
  • Patent number: 9843564
    Abstract: A method and system for securing data in a computer system provides the capability to secure information even when it leaves the boundaries of the organization using a data loss agent integrated with encryption software. A method for securing data in a computer system comprises detecting attempted connection or access to a data destination to which sensitive data may be written, determining an encryption status of the data destination, allowing the connection or access to the data destination when the data destination is encrypted, and taking action to secure the sensitive data when the data destination is not encrypted.
    Type: Grant
    Filed: November 17, 2014
    Date of Patent: December 12, 2017
    Assignee: McAfee, Inc.
    Inventors: Elad Zucker, Eran Werner, Mattias Weidhagen
  • Publication number: 20160315968
    Abstract: A method is provided for implementing a mandatory access control model in operating systems which natively use a discretionary access control scheme. A method for implementing mandatory access control in a system comprising a plurality of computers, the system comprising a plurality of information assets, stored as files on the plurality of computers, and a network communicatively connecting the plurality of computers, wherein each of the plurality of computers includes an operating system that uses a discretionary access control policy, and wherein each of a subset of the plurality of computers includes a software agent component operable to perform the steps of intercepting a request for a file operation on a file from a user of one of the plurality of computers including the software agent, determining whether the file is protected, if the file is protected, altering ownership of the file from the user to another owner, and providing access to the file based on a mandatory access control policy.
    Type: Application
    Filed: May 20, 2016
    Publication date: October 27, 2016
    Inventors: Oren Tirosh, Eran Werner
  • Patent number: 9350760
    Abstract: A method is provided for implementing a mandatory access control model in operating systems which natively use a discretionary access control scheme. A method for implementing mandatory access control in a system comprising a plurality of computers, the system comprising a plurality of information assets, stored as files on the plurality of computers, and a network communicatively connecting the plurality of computers, wherein each of the plurality of computers includes an operating system that uses a discretionary access control policy, and wherein each of a subset of the plurality of computers includes a software agent component operable to perform the steps of intercepting a request for a file operation on a file from a user of one of the plurality of computers including the software agent, determining whether the file is protected, if the file is protected, altering ownership of the file from the user to another owner, and providing access to the file based on a mandatory access control policy.
    Type: Grant
    Filed: January 23, 2014
    Date of Patent: May 24, 2016
    Assignee: McAfee, Inc.
    Inventors: Oren Tirosh, Eran Werner
  • Publication number: 20150074405
    Abstract: A method and system for securing data in a computer system provides the capability to secure information even when it leaves the boundaries of the organization using a data loss agent integrated with encryption software. A method for securing data in a computer system comprises detecting attempted connection or access to a data destination to which sensitive data may be written, determining an encryption status of the data destination, allowing the connection or access to the data destination when the data destination is encrypted, and taking action to secure the sensitive data when the data destination is not encrypted.
    Type: Application
    Filed: November 17, 2014
    Publication date: March 12, 2015
    Inventors: Elad Zucker, Eran Werner, Mattias Weidhagen
  • Patent number: 8893285
    Abstract: A method and system for securing data in a computer system provides the capability to secure information even when it leaves the boundaries of the organization using a data loss agent integrated with encryption software. A method for securing data in a computer system comprises detecting attempted connection or access to a data destination to which sensitive data may be written, determining an encryption status of the data destination, allowing the connection or access to the data destination when the data destination is encrypted, and taking action to secure the sensitive data when the data destination is not encrypted.
    Type: Grant
    Filed: March 14, 2008
    Date of Patent: November 18, 2014
    Assignee: McAfee, Inc.
    Inventors: Elad Zucker, Eran Werner, Mattias Weidhagen
  • Publication number: 20140137185
    Abstract: A method is provided for implementing a mandatory access control model in operating systems which natively use a discretionary access control scheme. A method for implementing mandatory access control in a system comprising a plurality of computers, the system comprising a plurality of information assets, stored as files on the plurality of computers, and a network communicatively connecting the plurality of computers, wherein each of the plurality of computers includes an operating system that uses a discretionary access control policy, and wherein each of a subset of the plurality of computers includes a software agent component operable to perform the steps of intercepting a request for a file operation on a file from a user of one of the plurality of computers including the software agent, determining whether the file is protected, if the file is protected, altering ownership of the file from the user to another owner, and providing access to the file based on a mandatory access control policy.
    Type: Application
    Filed: January 23, 2014
    Publication date: May 15, 2014
    Inventors: Oren Tirosh, Eran Werner
  • Patent number: 8671448
    Abstract: A method for implementing a mandatory access control model in operating systems which natively use a discretionary access control scheme. A method for implementing mandatory access control for a plurality of computers, the system comprising information assets, stored as files on the computers, and a network communicatively connecting the computers, wherein each of the computers includes an operating system that uses a discretionary access control policy, and wherein each of a subset of computers includes a software agent component operable to intercept a request for a file operation on a file from a user of one of the computers including the software agent, determining whether the file is protected, if the file is protected, altering ownership of the file from the user to another owner, and providing access based on a mandatory access control policy.
    Type: Grant
    Filed: December 13, 2011
    Date of Patent: March 11, 2014
    Assignee: McAfee, Inc.
    Inventors: Oren Tirosh, Eran Werner
  • Patent number: 8484327
    Abstract: A method and system for enterprise device management allows the administrator to set a policy of forbidden devices, monitor devices used in the organization, provide alerts and notification incase an unknown device is connected to a computer, and monitor or block connections of devices which do not comply with the said security policy. A method for device management in a computer system comprises detecting connection of a device to the computer system and determining a reaction to perform in response to the connection of the device to the computer system based on parameters related to the device and on device management rules.
    Type: Grant
    Filed: November 7, 2007
    Date of Patent: July 9, 2013
    Assignee: McAfee, Inc.
    Inventors: Eran Werner, Elad Zucker, Ben Matzkel
  • Patent number: 8446607
    Abstract: A method and system for data loss prevention controls and protects sensitive data from being printed in an unauthorized manner. A method for controlling printing activities implemented in a computer system comprises intercepting a print job comprising print data intended for a printer driver, delaying performance of the print job, analyzing content of the print data to determine whether to allow or cancel the print job based on a security policy, and resuming or canceling the print job based on the analysis of the content of the print data.
    Type: Grant
    Filed: October 1, 2007
    Date of Patent: May 21, 2013
    Assignee: McAfee, Inc.
    Inventors: Elad Zucker, Eran Werner
  • Publication number: 20130117858
    Abstract: A method and system is provided by which a trusted software agent can perform in a sharing violation free environment, which reduces complexity and eliminates interference with applications. A method for handling sharing violations in a computer system comprises intercepting a request by an application for access to a file, capturing a sharing violation raised by the operating system, determining whether the sharing violation is due to the trusted agent, and if so holding the request by the application for access to the file until the trusted agent no longer holds the file, and then reprocessing the request by the application for access to the file. The application is not aware that the sharing violation due to the trusted agent occurred, or that the request was pending and reprocessed because at the end of the process the application receives a file handle as if a sharing violation did not occur.
    Type: Application
    Filed: December 31, 2012
    Publication date: May 9, 2013
    Inventors: Eran Werner, Elad Zucker
  • Patent number: 8347401
    Abstract: A method and system is provided by which a trusted software agent can perform in a sharing violation free environment, which reduces complexity and eliminates interference with applications. A method for handling sharing violations in a computer system comprises intercepting a request by an application for access to a file, capturing a sharing violation raised by the operating system due to the said request, determining whether the sharing violation is due to the trusted agent, and if so holding the request by the application for access to the file until the trusted agent no longer holds the file, and then reprocessing the request by the application for access to the file. The application is not aware that the sharing violation due to the trusted agent occurred, or that the request was pending and reprocessed as at the end of the process it receives a file handle as if a sharing violation did not occur.
    Type: Grant
    Filed: October 24, 2007
    Date of Patent: January 1, 2013
    Assignee: McAfee, Inc.
    Inventors: Eran Werner, Elad Zucker
  • Patent number: 8087065
    Abstract: A method is provided for implementing a mandatory access control model in operating systems which natively use a discretionary access control scheme. A method for implementing mandatory access control in a system comprising a plurality of computers, the system comprising a plurality of information assets, stored as files on the plurality of computers, and a network communicatively connecting the plurality of computers, wherein each of the plurality of computers includes an operating system that uses a discretionary access control policy, and wherein each of a subset of the plurality of computers includes a software agent component operable to perform the steps of intercepting a request for a file operation on a file from a user of one of the plurality of computers including the software agent, determining whether the file is protected, if the file is protected, altering ownership of the file from the user to another owner, and providing access to the file based on a mandatory access control policy.
    Type: Grant
    Filed: February 8, 2007
    Date of Patent: December 27, 2011
    Assignee: McAfee, Inc.
    Inventors: Oren Tirosh, Eran Werner
  • Patent number: 7673324
    Abstract: A system and method are provided for tracking an operation performed on an information asset. The information asset has metadata associated therewith. In use, the metadata is preserved during the at least one operation.
    Type: Grant
    Filed: April 9, 2007
    Date of Patent: March 2, 2010
    Assignee: McAfee, Inc.
    Inventors: Oren Tirosh, Eran Werner, Ishay Green, Liad Agmon
  • Publication number: 20090232300
    Abstract: A method and system for securing data in a computer system provides the capability to secure information even when it leaves the boundaries of the organization using a data loss agent integrated with encryption software. A method for securing data in a computer system comprises detecting attempted connection or access to a data destination to which sensitive data may be written, determining an encryption status of the data destination, allowing the connection or access to the data destination when the data destination is encrypted, and taking action to secure the sensitive data when the data destination is not encrypted.
    Type: Application
    Filed: March 14, 2008
    Publication date: September 17, 2009
    Inventors: Elad Zucker, Eran Werner, Mattias Weidhagen
  • Publication number: 20090119743
    Abstract: A method and system for enterprise device management allows the administrator to set a policy of forbidden devices, monitor devices used in the organization, provide alerts and notification incase an unknown device is connected to a computer, and monitor or block connections of devices which do not comply with the said security policy. A method for device management in a computer system comprises detecting connection of a device to the computer system and determining a reaction to perform in response to the connection of the device to the computer system based on parameters related to the device and on device management rules.
    Type: Application
    Filed: November 7, 2007
    Publication date: May 7, 2009
    Inventors: Eran Werner, Elad Zucker, Ben Matzkel
  • Publication number: 20090113526
    Abstract: A method and system is provided by which a trusted software agent can perform in a sharing violation free environment, which reduces complexity and eliminates interference with applications. A method for handling sharing violations in a computer system comprises intercepting a request by an application for access to a file, capturing a sharing violation raised by the operating system due to the said request, determining whether the sharing violation is due to the trusted agent, and if so holding the request by the application for access to the file until the trusted agent no longer holds the file, and then reprocessing the request by the application for access to the file. The application is not aware that the sharing violation due to the trusted agent occurred, or that the request was pending and reprocessed as at the end of the process it receives a file handle as if a sharing violation did not occur.
    Type: Application
    Filed: October 24, 2007
    Publication date: April 30, 2009
    Inventors: Eran Werner, Elad Zucker
  • Publication number: 20090086252
    Abstract: A method and system for data loss prevention controls and protects sensitive data from being printed in an unauthorized manner. A method for controlling printing activities implemented in a computer system comprises intercepting a print job comprising print data intended for a printer driver, delaying performance of the print job, analyzing content of the print data to determine whether to allow or cancel the print job based on a security policy, and resuming or canceling the print job based on the analysis of the content of the print data.
    Type: Application
    Filed: October 1, 2007
    Publication date: April 2, 2009
    Inventors: Elad Zucker, Eran Werner
  • Publication number: 20080120695
    Abstract: A method is provided for implementing a mandatory access control model in operating systems which natively use a discretionary access control scheme. A method for implementing mandatory access control in a system comprising a plurality of computers, the system comprising a plurality of information assets, stored as files on the plurality of computers, and a network communicatively connecting the plurality of computers, wherein each of the plurality of computers includes an operating system that uses a discretionary access control policy, and wherein each of a subset of the plurality of computers includes a software agent component operable to perform the steps of intercepting a request for a file operation on a file from a user of one of the plurality of computers including the software agent, determining whether the file is protected, if the file is protected, altering ownership of the file from the user to another owner, and providing access to the file based on a mandatory access control policy.
    Type: Application
    Filed: February 8, 2007
    Publication date: May 22, 2008
    Inventors: Oren Tirosh, Eran Werner