Patents by Inventor Hed Kovetz

Hed Kovetz has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11792008
    Abstract: A system (20) includes a network interface (32) and a processor (34). The processor is configured to (i) receive, via the network interface, a request originating from a request-origin application and directed to a request-destination application (24b) that runs on a request-destination device (24), (ii) subsequently to receiving the request, communicate the request to the request-destination device, (iii) subsequently to communicating the request to the request-destination device, receive a response, from the request-destination application, to the request, (iv) while holding the response, identify information contained in at least one log entry that was recorded by the request-destination application responsively to the request, and (v) perform a function in response to the information. Other embodiments are also described.
    Type: Grant
    Filed: June 19, 2018
    Date of Patent: October 17, 2023
    Assignee: SILVERFORT LTD.
    Inventors: Matan Binyamin Fattal, Yaron Kassner, Hed Kovetz, Rotem Zach
  • Patent number: 11303652
    Abstract: Embodiments for generating appropriate data sets for learning to identify user actions. A user uses one or more applications over a suitable period of time. As the user uses the applications, a monitoring device, acting as a “man-in-the-middle,” intermediates the exchange of encrypted communication between the applications and the servers that serve the applications. The monitoring device obtains, for each action performed by the user, two corresponding (bidirectional) flows of communication: an encrypted flow, and an unencrypted flow. Since the unencrypted flow indicates the type of action that was performed by the user, the correspondence between the encrypted flow and the unencrypted flow may be used to automatically label the encrypted flow, without decrypting the encrypted flow. Features of the encrypted communication may then be stored in association with the label to automatically generate appropriately-sized learning set for each application of interest.
    Type: Grant
    Filed: January 21, 2021
    Date of Patent: April 12, 2022
    Assignee: COGNYTE TECHNOLOGIES ISRAEL LTD
    Inventors: Ziv Katzir, Gershon Celniker, Hed Kovetz
  • Patent number: 11177958
    Abstract: Described embodiments include an apparatus, comprising a communication interface and a processor. The processor is configured to obtain an NT Local Area Network Manager (NTLM) authentication token, which authenticates a client device to a service using an NTLM authentication protocol. The processor is further configured to, subsequently to obtaining the NTLM authentication token, receive, via the communication interface, from another processor that belongs to the client device, a challenge that was sent to the client device by the service in response to a request, from the client device, to access the service. The processor is further configured to, using the NTLM authentication token, compute a response to the received challenge, and to communicate the computed response to the client device, without exposing the NTLM authentication token to the client device. Other embodiments are also described.
    Type: Grant
    Filed: September 13, 2017
    Date of Patent: November 16, 2021
    Assignee: SILVERFORT LTD.
    Inventors: Yaron Kassner, Hed Kovetz, Matan Binyamin Fattal
  • Publication number: 20210288804
    Abstract: Described embodiments include an apparatus (40), comprising a communication interface (42) and a processor (44). The processor is configured to obtain an NT Local Area Network Manager (NTLM) authentication token, which authenticates a client device (22) to a service using an NTLM authentication protocol. The processor is further configured to, subsequently to obtaining the NTLM authentication token, receive, via the communication interface, from another processor (30) that belongs to the client device, a challenge that was sent to the client device by the service in response to a request, from the client device, to access the service. The processor is further configured to, using the NTLM authentication token, compute a response to the received challenge, and to communicate the computed response to the client device, without exposing the NTLM authentication token to the client device. Other embodiments are also described.
    Type: Application
    Filed: September 13, 2017
    Publication date: September 16, 2021
    Inventors: Yaron Kassner, Hed Kovetz, Matan Binyamin Fattal
  • Publication number: 20210168158
    Abstract: Embodiments for generating appropriate data sets for learning to identify user actions. A user uses one or more applications over a suitable period of time. As the user uses the applications, a monitoring device, acting as a “man-in-the-middle,” intermediates the exchange of encrypted communication between the applications and the servers that serve the applications. The monitoring device obtains, for each action performed by the user, two corresponding (bidirectional) flows of communication: an encrypted flow, and an unencrypted flow. Since the unencrypted flow indicates the type of action that was performed by the user, the correspondence between the encrypted flow and the unencrypted flow may be used to automatically label the encrypted flow, without decrypting the encrypted flow. Features of the encrypted communication may then be stored in association with the label to automatically generate appropriately-sized learning set for each application of interest.
    Type: Application
    Filed: January 21, 2021
    Publication date: June 3, 2021
    Inventors: Ziv Katzir, Gershon Celnicker, Hed Kovetz
  • Patent number: 10944763
    Abstract: Embodiments for generating appropriate data sets for learning to identify user actions. A user uses one or more applications over a suitable period of time. As the user uses the applications, a monitoring device, acting as a “man-in-the-middle,” intermediates the exchange of encrypted communication between the applications and the servers that serve the applications. The monitoring device obtains, for each action performed by the user, two corresponding (bidirectional) flows of communication: an encrypted flow, and an unencrypted flow. Since the unencrypted flow indicates the type of action that was performed by the user, the correspondence between the encrypted flow and the unencrypted flow may be used to automatically label the encrypted flow, without decrypting the encrypted flow. Features of the encrypted communication may then be stored in association with the label to automatically generate appropriately-sized learning set for each application of interest.
    Type: Grant
    Filed: November 25, 2019
    Date of Patent: March 9, 2021
    Assignee: Verint Systems, Ltd.
    Inventors: Ziv Katzir, Gershon Celnicker, Hed Kovetz
  • Publication number: 20200213116
    Abstract: A system (20) includes a network interface (32) and a processor (34). The processor is configured to (i) receive, via the network interface, a request originating from a request-origin application and directed to a request-destination application (24b) that runs on a request-destination device (24), (ii) subsequently to receiving the request, communicate the request to the request-destination device, (iii) subsequently to communicating the request to the request-destination device, receive a response, from the request-destination application, to the request, (iv) while holding the response, identify information contained in at least one log entry that was recorded by the request-destination application responsively to the request, and (v) perform a function in response to the information. Other embodiments are also described.
    Type: Application
    Filed: June 19, 2018
    Publication date: July 2, 2020
    Inventors: Matan Binyamin Fattal, Yaron Kassner, Hed Kovetz, Rotem Zach
  • Publication number: 20200169571
    Abstract: Embodiments for generating appropriate data sets for learning to identify user actions. A user uses one or more applications over a suitable period of time. As the user uses the applications, a monitoring device, acting as a “man-in-the-middle,” intermediates the exchange of encrypted communication between the applications and the servers that serve the applications. The monitoring device obtains, for each action performed by the user, two corresponding (bidirectional) flows of communication: an encrypted flow, and an unencrypted flow. Since the unencrypted flow indicates the type of action that was performed by the user, the correspondence between the encrypted flow and the unencrypted flow may be used to automatically label the encrypted flow, without decrypting the encrypted flow. Features of the encrypted communication may then be stored in association with the label to automatically generate appropriately-sized learning set for each application of interest.
    Type: Application
    Filed: November 25, 2019
    Publication date: May 28, 2020
    Inventors: Ziv Katzir, Gershon Celnicker, Hed Kovetz
  • Patent number: 10491609
    Abstract: Embodiments for generating appropriate data sets for learning to identify user actions. A user uses one or more applications over a suitable period of time. As the user uses the applications, a monitoring device, acting as a “man-in-the-middle,” intermediates the exchange of encrypted communication between the applications and the servers that serve the applications. The monitoring device obtains, for each action performed by the user, two corresponding (bidirectional) flows of communication: an encrypted flow, and an unencrypted flow. Since the unencrypted flow indicates the type of action that was performed by the user, the correspondence between the encrypted flow and the unencrypted flow may be used to automatically label the encrypted flow, without decrypting the encrypted flow. Features of the encrypted communication may then be stored in association with the label to automatically generate appropriately-sized learning set for each application of interest.
    Type: Grant
    Filed: October 4, 2017
    Date of Patent: November 26, 2019
    Assignee: VERINT SYSTEMS LTD.
    Inventors: Ziv Katzir, Gershon Celnicker, Hed Kovetz
  • Publication number: 20190273731
    Abstract: A method includes receiving a message belonging to an access request or to a response to the access request, the access request originating from a request-origin device and directed to a request-destination application. The method further includes, without using the request-destination application, subsequently to receiving the message, forwarding the message to a traffic-management server before communicating the message to a destination of the message, subsequently to forwarding the message, receiving the message from the traffic-management server, and subsequently to receiving the message from the traffic-management server, communicating the message to the destination of the message. Other embodiments are also described.
    Type: Application
    Filed: May 22, 2019
    Publication date: September 5, 2019
    Inventors: Yaron Kassner, Matan Binyamin Fattal, Hed Kovetz, Rotem Zach
  • Publication number: 20180109542
    Abstract: Embodiments for generating appropriate data sets for learning to identify user actions. A user uses one or more applications over a suitable period of time. As the user uses the applications, a monitoring device, acting as a “man-in-the-middle,” intermediates the exchange of encrypted communication between the applications and the servers that serve the applications. The monitoring device obtains, for each action performed by the user, two corresponding (bidirectional) flows of communication: an encrypted flow, and an unencrypted flow. Since the unencrypted flow indicates the type of action that was performed by the user, the correspondence between the encrypted flow and the unencrypted flow may be used to automatically label the encrypted flow, without decrypting the encrypted flow. Features of the encrypted communication may then be stored in association with the label to automatically generate appropriately-sized learning set for each application of interest.
    Type: Application
    Filed: October 4, 2017
    Publication date: April 19, 2018
    Inventors: Ziv Katzir, Gershon Celnicker, Hed Kovetz