Patents by Inventor Guy Guzner

Guy Guzner has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240061673
    Abstract: Methods, storage systems and computer program products implement embodiments of the present invention that include deploying, to a computer, a hot-patched method for an original method in a method library that is dynamically loaded by a software application running on the computer, wherein the hot-patched method is configured to intercept requests from the software application to the original method. An upload policy can then be specified. Upon the hot-patched method intercepting a request from the software application to the original method to upload a given file from the computer to an Internet site, a comparison can be made between the intercepted request to the policy. In response to the comparison, the upload can be controlled.
    Type: Application
    Filed: October 31, 2023
    Publication date: February 22, 2024
    Inventors: David Ben Zakai, Eldar Kleiner, Guy Guzner, Yoav Horman, Avishai Lazar, Daniel Parolla
  • Publication number: 20230401308
    Abstract: A method includes providing auxiliary code implementing a process for facilitating enforcement of one or more computer-usage rules, and augmenting third-party code with the auxiliary code such that execution of the third-party code carries out the process. Other embodiments are also described.
    Type: Application
    Filed: June 14, 2022
    Publication date: December 14, 2023
    Inventors: David Ben Zakai, Eldar Kleiner, Guy Guzner, Yoav Horman
  • Publication number: 20170111473
    Abstract: Processing computer network requests by receiving from a requesting computer an encoded value in a domain name resolution request, where the encoded value has a valid domain name syntax, decoding the encoded value into a Uniform Resource Locator having a host portion and a non-host portion, determining that the host portion of the Uniform Resource Locator in combination with the non-host portion of the Uniform Resource Locator meets a predefined routing criterion associated with a computer network address that is associated with a proxy server, and sending the computer network address to the requesting computer in response to the domain name resolution request.
    Type: Application
    Filed: October 20, 2016
    Publication date: April 20, 2017
    Inventors: DAN AMIGA, GUY GUZNER
  • Publication number: 20160352803
    Abstract: Processing a web page by receiving from a client software application a request to retrieve a web page, processing the web page at a surrogate software application, thereby representing the web page in a model that is maintained by the surrogate software application in association with the web page, serializing a copy of any portion of the model that is maintained by the surrogate software application, thereby creating serialized data, and sending the serialized data to a mediation agent executed by the client software application, where the mediation agent is configured to deserialize the serialized data, thereby creating deserialized data, and inject the deserialized data into a model that is maintained by the client software application in association with the web page.
    Type: Application
    Filed: May 26, 2016
    Publication date: December 1, 2016
    Inventors: DAN AMIGA, GUY GUZNER
  • Patent number: 8850576
    Abstract: Disclosed are methods and media for inspecting security certificates. Methods include the steps of: scanning, by a network security device, messages of a security protocol between a server and a client system; detecting the messages having a security certificate; detecting suspicious security certificates from the messages; and aborting particular sessions of the security protocol associated with the suspicious certificates. Preferably, the step of scanning is performed only on messages of server certificate records. Preferably, the method further includes the step of sending an invalid-certificate notice to the server and the client system. Preferably, the step of detecting the suspicious certificates includes detecting a use of an incorrectly-generated private key for the certificates. Preferably, the step of detecting the suspicious certificates includes detecting an unavailability of revocation information for the certificates.
    Type: Grant
    Filed: March 4, 2012
    Date of Patent: September 30, 2014
    Assignee: Check Point Software Technologies Ltd.
    Inventors: Guy Guzner, Ami Haviv, Danny Lieblich, Yahav Gal
  • Publication number: 20120167212
    Abstract: Disclosed are methods and media for inspecting security certificates. Methods include the steps of: scanning, by a network security device, messages of a security protocol between a server and a client system; detecting the messages having a security certificate; detecting suspicious security certificates from the messages; and aborting particular sessions of the security protocol associated with the suspicious certificates. Preferably, the step of scanning is performed only on messages of server certificate records. Preferably, the method further includes the step of sending an invalid-certificate notice to the server and the client system. Preferably, the step of detecting the suspicious certificates includes detecting a use of an incorrectly-generated private key for the certificates. Preferably, the step of detecting the suspicious certificates includes detecting an unavailability of revocation information for the certificates.
    Type: Application
    Filed: March 4, 2012
    Publication date: June 28, 2012
    Applicant: CHECK POINT SOFTWARE TECHNOLOGIES, LTD.
    Inventors: Guy Guzner, Ami Haviv, Danny Lieblich, Yahav Gal
  • Patent number: 8146159
    Abstract: Disclosed are methods and media for inspecting security certificates. Methods include the steps of: scanning, by a network security device, messages of a security protocol between a server and a client system; detecting the messages having a security certificate; detecting suspicious security certificates from the messages; and aborting particular sessions of the security protocol associated with the suspicious certificates. Preferably, the step of scanning is performed only on messages of server certificate records. Preferably, the method further includes the step of: sending an invalid-certificate notice to the server and the client system. Preferably, the step of detecting the suspicious certificates includes detecting a use of an incorrectly-generated private key for the certificates. Preferably, the step of detecting the suspicious certificates includes detecting an unavailability of revocation information for the certificates.
    Type: Grant
    Filed: January 20, 2009
    Date of Patent: March 27, 2012
    Assignee: Check Point Software Technologies, Ltd.
    Inventors: Guy Guzner, Ami Haviv, Danny Lieblich, Yahav Gal
  • Publication number: 20100186086
    Abstract: Disclosed are methods and media for inspecting security certificates. Methods include the steps of: scanning, by a network security device, messages of a security protocol between a server and a client system; detecting the messages having a security certificate; detecting suspicious security certificates from the messages; and aborting particular sessions of the security protocol associated with the suspicious certificates. Preferably, the step of scanning is performed only on messages of server certificate records. Preferably, the method further includes the step of: sending an invalid-certificate notice to the server and the client system. Preferably, the step of detecting the suspicious certificates includes detecting a use of an incorrectly-generated private key for the certificates. Preferably, the step of detecting the suspicious certificates includes detecting an unavailability of revocation information for the certificates.
    Type: Application
    Filed: January 20, 2009
    Publication date: July 22, 2010
    Applicant: CHECK POINT SOFTWARE TECHNOLOGIES, LTD.
    Inventors: Guy Guzner, Ami Haviv, Danny Lieblich, Yahav Gal
  • Publication number: 20100138910
    Abstract: The present invention discloses methods, media, and perimeter gateways for encrypted-traffic URL filtering using address-mapping interception, methods including the steps of: providing a client system having a client application for accessing websites from web servers; upon the client application attempting to access an encrypted website, performing a name-to-address query to resolve a name of the encrypted website; intercepting address-mapping responses; creating a mapping between the name and at least one network address of the encrypted website; intercepting incoming encrypted traffic; extracting a server's network address from the incoming encrypted traffic; establishing a resolved name being accessed using the mapping; and filtering the resolved name. Preferably, the step of filtering includes redirecting the encrypted traffic. Preferably, the method further includes the step of: blocking all encrypted traffic for unresolved names.
    Type: Application
    Filed: December 3, 2008
    Publication date: June 3, 2010
    Applicant: CHECK POINT SOFTWARE TECHNOLOGIES, LTD.
    Inventors: Ori Aldor, Guy Guzner, Izhar Shoshani-Levi, Eytan Segal