Patents by Inventor Guy SHTAR
Guy SHTAR has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20250111905Abstract: A method and system of predicting drug-drug interactions (DDIs) may include receiving: (a) a DDI data structure, representing known DDIs between baseline drugs, (b) a plurality of baseline drug data elements, comprising line-notation descriptions of chemical structure of corresponding baseline drugs, and (c) a substance data element, comprising a line-notation description of a chemical structure of a substance of interest. Embodiments may calculate one or more similarity metric values, representing structural similarity between the substance of interest and specific baseline drugs, and select a subset of the baseline drugs based on the one or more similarity metric values. Embodiments may subsequently predict DDI between the substance of interest and a target baseline drug, based on (i) the selected subset of baseline drugs and (ii) the DDI data structure.Type: ApplicationFiled: February 2, 2023Publication date: April 3, 2025Applicant: B. G. NEGEV TECHNOLOGIES AND APPLICATIONS LTD.Inventors: Guy SHTAR, Adir SOLOMON, Eyal MAZUZ, Lior ROKACH, Bracha SHAPIRA
-
Patent number: 11750627Abstract: Techniques for detecting suspicious data object access requests indicative of potential insider threats are described. A suspicious access detection module (SADM) determines, based on access data describing a access requests issued on behalf of multiple users, groups of the users having similar patterns of accesses to resource groups, a set of the resource groups accessed by each of the user groups, and ones of the user groups that are to be considered nearby others of the user groups based on having a threshold amount of resource group access similarities. The SADM causes an alert to be generated responsive to a determination that a subsequent access request is suspicious because it accesses a data object of a resource group that is not within the set of accessed resource groups of the issuing user's user group, and because the resource group is not within the sets of accessed resource groups of any nearby user groups.Type: GrantFiled: September 8, 2021Date of Patent: September 5, 2023Assignee: Imperva, Inc.Inventors: Guy Shtar, Shiri Margel
-
Patent number: 11537734Abstract: A method by a security system implemented by one or more electronic for detecting attacks on one or more databases. The method includes analyzing database logs of one or more databases to determine transaction characteristics of each of the one or more databases, selecting, for each of a plurality of database accesses to the one or more databases, one or more security rules to apply to that database access, wherein different security rules are selected for different ones of the plurality of database accesses depending on the determined transaction characteristics of the database being accessed, and causing, for each of the plurality of database accesses, the one or more security rules selected for that database access to be applied to that database access.Type: GrantFiled: September 10, 2020Date of Patent: December 27, 2022Assignee: Imperva, Inc.Inventors: Shiri Margel, Itsik Mantin, Guy Shtar, Yury Geiler
-
Publication number: 20210400062Abstract: Techniques for detecting suspicious data object access requests indicative of potential insider threats are described. A suspicious access detection module (SADM) determines, based on access data describing a access requests issued on behalf of multiple users, groups of the users having similar patterns of accesses to resource groups, a set of the resource groups accessed by each of the user groups, and ones of the user groups that are to be considered nearby others of the user groups based on having a threshold amount of resource group access similarities. The SADM causes an alert to be generated responsive to a determination that a subsequent access request is suspicious because it accesses a data object of a resource group that is not within the set of accessed resource groups of the issuing user's user group, and because the resource group is not within the sets of accessed resource groups of any nearby user groups.Type: ApplicationFiled: September 8, 2021Publication date: December 23, 2021Applicant: Imperva, Inc.Inventors: Guy SHTAR, Shiri MARGEL
-
Patent number: 11146573Abstract: Techniques for detecting suspicious data object access requests indicative of potential insider threats are described. A suspicious access detection module (SADM) determines, based on access data describing a access requests issued on behalf of multiple users, groups of the users having similar patterns of accesses to resource groups, a set of the resource groups accessed by each of the user groups, and ones of the user groups that are to be considered nearby others of the user groups based on having a threshold amount of resource group access similarities. The SADM causes an alert to be generated responsive to a determination that a subsequent access request is suspicious because it accesses a data object of a resource group that is not within the set of accessed resource groups of the issuing user's user group, and because the resource group is not within the sets of accessed resource groups of any nearby user groups.Type: GrantFiled: January 22, 2019Date of Patent: October 12, 2021Assignee: Imperva, Inc.Inventors: Guy Shtar, Shiri Margel
-
Publication number: 20200410128Abstract: A method by a security system implemented by one or more electronic for detecting attacks on one or more databases. The method includes analyzing database logs of one or more databases to determine transaction characteristics of each of the one or more databases, selecting, for each of a plurality of database accesses to the one or more databases, one or more security rules to apply to that database access, wherein different security rules are selected for different ones of the plurality of database accesses depending on the determined transaction characteristics of the database being accessed, and causing, for each of the plurality of database accesses, the one or more security rules selected for that database access to be applied to that database access.Type: ApplicationFiled: September 10, 2020Publication date: December 31, 2020Applicant: Imperva, Inc.Inventors: Shiri MARGEL, Itsik MANTIN, Guy SHTAR, Yury GEILER
-
Patent number: 10803192Abstract: A method by a security system implemented by one or more electronic for detecting attacks on one or more databases. The method includes analyzing database logs of one or more databases to determine transaction characteristics of each of the one or more databases, selecting, for each of a plurality of database accesses to the one or more databases, one or more security rules to apply to that database access, wherein different security rules are selected for different ones of the plurality of database accesses depending on the determined transaction characteristics of the database being accessed, and causing, for each of the plurality of database accesses, the one or more security rules selected for that database access to be applied to that database access.Type: GrantFiled: May 31, 2018Date of Patent: October 13, 2020Assignee: Imperva, Inc.Inventors: Shiri Margel, Itsik Mantin, Guy Shtar, Yury Geiler
-
Patent number: 10771496Abstract: Techniques for detecting suspicious file access requests indicative of potential insider threats are described. A suspicious access detection module (SADM) determines, based on access data describing a access requests issued on behalf of multiple users, groups of the users having similar patterns of accesses to folders, a set of the folders accessed by each of the user groups, and ones of the user groups that are to be considered nearby others of the user groups based on having a threshold amount of folder access similarities. The SADM causes an alert to be generated responsive to a determination that a subsequent access request is suspicious because it accesses a file of a folder that is not within the set of accessed folders of the issuing user's user group, and because the folder is not within the sets of accessed folders of any nearby user groups.Type: GrantFiled: August 10, 2017Date of Patent: September 8, 2020Assignee: Imperva, Inc.Inventors: Guy Shtar, Shiri Margel
-
Publication number: 20190311149Abstract: A method by a security system implemented by one or more electronic for detecting attacks on one or more databases. The method includes analyzing database logs of one or more databases to determine transaction characteristics of each of the one or more databases, selecting, for each of a plurality of database accesses to the one or more databases, one or more security rules to apply to that database access, wherein different security rules are selected for different ones of the plurality of database accesses depending on the determined transaction characteristics of the database being accessed, and causing, for each of the plurality of database accesses, the one or more security rules selected for that database access to be applied to that database access.Type: ApplicationFiled: May 31, 2018Publication date: October 10, 2019Inventors: Shiri MARGEL, Itsik MANTIN, Guy SHTAR, Yury GEILER
-
Publication number: 20190158513Abstract: Techniques for detecting suspicious data object access requests indicative of potential insider threats are described. A suspicious access detection module (SADM) determines, based on access data describing a access requests issued on behalf of multiple users, groups of the users having similar patterns of accesses to resource groups, a set of the resource groups accessed by each of the user groups, and ones of the user groups that are to be considered nearby others of the user groups based on having a threshold amount of resource group access similarities. The SADM causes an alert to be generated responsive to a determination that a subsequent access request is suspicious because it accesses a data object of a resource group that is not within the set of accessed resource groups of the issuing user's user group, and because the resource group is not within the sets of accessed resource groups of any nearby user groups.Type: ApplicationFiled: January 22, 2019Publication date: May 23, 2019Inventors: Guy SHTAR, Shiri MARGEL
-
Publication number: 20190028504Abstract: Techniques for detecting suspicious file access requests indicative of potential insider threats are described. A suspicious access detection module (SADM) determines, based on access data describing a access requests issued on behalf of multiple users, groups of the users having similar patterns of accesses to folders, a set of the folders accessed by each of the user groups, and ones of the user groups that are to be considered nearby others of the user groups based on having a threshold amount of folder access similarities. The SADM causes an alert to be generated responsive to a determination that a subsequent access request is suspicious because it accesses a file of a folder that is not within the set of accessed folders of the issuing user's user group, and because the folder is not within the sets of accessed folders of any nearby user groups.Type: ApplicationFiled: August 10, 2017Publication date: January 24, 2019Inventors: Guy SHTAR, Shiri MARGEL