Patents by Inventor Idan Plotnik

Idan Plotnik has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240028317
    Abstract: A method for mapping source code to computation resource, the method including the steps of: determining computation resources of a cloud provider used by an application; identifying executable artifacts that are deployed on the computation resources; and matching executable artifacts to source-code and configuration content to provide artifact to code or configuration matches.
    Type: Application
    Filed: July 20, 2023
    Publication date: January 25, 2024
    Inventors: Idan PLOTNIK, Eldan Ben-Haim, Ariel LEVY, Eli SHALOM
  • Publication number: 20240028301
    Abstract: A system and method for detecting feature requests that pose a potential security risk, including: collecting the feature requests from providers; and analyzing the feature requests to assess whether features requested in the feature requests will pose a security risk to the system once created.
    Type: Application
    Filed: July 20, 2023
    Publication date: January 25, 2024
    Inventors: Gil David, Brit ARNON, Eli Shalom, Idan Plotnik, Yonatan Eldar
  • Patent number: 11818228
    Abstract: Systems and methods for determining a user's presence on a network of an enterprise are provided. Traffic is collected to a network from devices and, over a period of time, login and logoff information from a user is determined from the collected network traffic. Network sessions are determined from a user's login and logoff information and timetable is generated specific to the user that contains the network sessions. The time table identifies when the user was active and when the user was not active based on the login and logoff information and, therefore, present at a particular location over a period of time.
    Type: Grant
    Filed: September 22, 2016
    Date of Patent: November 14, 2023
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Tal Arieh Be'ery, Itai Grady, Tom Jurgenson, Idan Plotnik, Sivan Krigsman, Michael Dubinsky, Gil David
  • Publication number: 20230132503
    Abstract: A method for unifying risks and remediations associated with entities in application and infrastructure code, including the steps of: defining governance rules; fetching data from more than one source; extracting features from the data in a unified manner; formalizing sub-entities from the extracted features, the formalized sub-entities representing the extracted features in a formal and unified manner; providing a plurality of entities from the formalized sub-entities, matching and unifying sub-entities having common extracted features into single entities of the plurality of entities; aggregating risks and remediations of each of the same sub-entities and assigning the aggregated risks and remediations to the corresponding single entity; and computing risk priority and triggering workflows based on the matched governance rules.
    Type: Application
    Filed: October 27, 2022
    Publication date: May 4, 2023
    Inventors: Idan PLOTNIK, Yonatan ELDAR, Eli SHALOM, Ariel LEVY
  • Publication number: 20220245240
    Abstract: A method for detecting undesired activity prior to performing a code build, the method including: (a) learning behaviors of each of a plurality of entities so as to train unique models for each of the plurality of entities; (b) monitoring new events of the plurality of entities to detect anomalous behavior relative to corresponding models of the unique models; and (c) executing a workflow for remediation of a detected anomalous behavior. A method for monitoring and protecting a deployment process post build, the method including: receiving source code and a corresponding binary resulting from the build of the source code; comparing the source code to the binary for at least one discrepancy there-between; and halting the deployment process if the at least one discrepancy is detected.
    Type: Application
    Filed: February 1, 2022
    Publication date: August 4, 2022
    Inventors: Idan Plotnik, Yonatan Eldar, Eli Shalom, Ariel Levy
  • Patent number: 11301356
    Abstract: A method and system for risk assessment of an application or infrastructure, includes: Code Intelligence Analyzers that scan historic code commits in code repositories of the application or infrastructure as well as real-time code commits; a Developer Behavior Profiler builds a behavior profile for each developer of the application, based, at least on the historic and real-time code commits and relevant issues in Issue Tracking Systems; and a Spacetime Graph, being a multidimensional graph detailing a current state of the application or infrastructure and a history of the code commits of the application or infrastructure, as determined by the Code Intelligence Analyzers and the Developer Behavior Profiler.
    Type: Grant
    Filed: May 27, 2020
    Date of Patent: April 12, 2022
    Assignee: APIIRO LTD.
    Inventors: Idan Plotnik, Yonatan Eldar
  • Patent number: 11025668
    Abstract: The threat of malicious parties exposing users' credentials from one system and applying the exposed credentials to a different system to gain unauthorized access is addressed in the present disclosure by systems and methods to preemptively and reactively mitigate the risk of users reusing passwords between systems. A security device passively monitors traffic comprising authorization requests within a network to reactively identify an ongoing attack based on its use of exposed credentials in the authorization request and identifies accounts that are vulnerable to attacks using exposed credentials by actively attempting to log into those accounts with exposed passwords from other networks. The systems and methods reduce the number of false positives associated with attack identification and strengthens the network against potential attacks, thus improving the network's security and reducing the amount of resources needed to securely manage the network.
    Type: Grant
    Filed: November 13, 2018
    Date of Patent: June 1, 2021
    Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC
    Inventors: Itai Grady, Michael Dubinsky, Benny Lakunishok, Idan Plotnik, Tal Arieh Be'ery
  • Publication number: 20200379879
    Abstract: A method and system for risk assessment of an application or infrastructure, includes: Code Intelligence Analyzers that scan historic code commits in code repositories of the application or infrastructure as well as real-time code commits; a Developer Behavior Profiler builds a behavior profile for each developer of the application, based, at least on the historic and real-time code commits and relevant issues in Issue Tracking Systems; and a Spacetime Graph, being a multidimensional graph detailing a current state of the application or infrastructure and a history of the code commits of the application or infrastructure, as determined by the Code Intelligence Analyzers and the Developer Behavior Profiler.
    Type: Application
    Filed: May 27, 2020
    Publication date: December 3, 2020
    Inventors: Idan PLOTNIK, Yonatan ELDAR
  • Patent number: 10505894
    Abstract: A system and method for performing IP to name resolution in organizational environments. IP addresses are determined for devices utilizing the corporate network. An IP address is resolved to a first device name and then the same IP address is subsequently resolved to a second device name. A profile is generated such as a timeline for the IP address including both the first and second device names. The timeline may be queried to determine whether the first device name or the second device name was associated with the IP address during a period of time.
    Type: Grant
    Filed: February 6, 2017
    Date of Patent: December 10, 2019
    Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC
    Inventors: Idan Plotnik, Sivan Krigsman, Benny Lakunishok, Tal Arieh Be'ery, Michael Dubinsky, Michael Dolinsky
  • Patent number: 10333944
    Abstract: Determining impossible travel for a specific user entity associated with an on-premises site. A method includes identifying an estimated location of an on-premises site associated with an organization network. Identifying the estimated location of an on-premises site comprises aggregating connection information of remote devices, remote from the on-premises site connecting to the on-premises site. Information related to an on-premises connection event is identified including the estimated location, time information, and a first user identification for an entity. Information is identified related to a different connection event. The information comprises location information, time information and a second user identification for the entity. The information related to the on-premises connection event and the information related to the different connection event are used to detect impossible travel for the entity. An alert indicating an impossible travel condition is provided.
    Type: Grant
    Filed: November 3, 2016
    Date of Patent: June 25, 2019
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Tom Jurgenson, Sivan Krigsman, Michael Dubinsky, Tal Arieh Be'ery, Idan Plotnik, Gil David
  • Patent number: 10298699
    Abstract: The present disclosure provides for improved computational efficiency and security in a network by determining the physical location of network connected components, without requiring the components to self-locate. The locations of devices remotely connected to a site within the network are geolocated so that the physical location of that site may be inferred from a centralized point to the remote devices' locations. This calculate site location may be compared against a known site location to improve a generalized algorithm for determining the calculated location of a site with an unknown location, and may be applied to devices that are locally connected to the network, which may be otherwise incapable of being geolocated.
    Type: Grant
    Filed: September 8, 2016
    Date of Patent: May 21, 2019
    Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC
    Inventors: Tom Jurgenson, Tal Arieh Be'ery, Idan Plotnik, Michael Dubinsky, Sivan Krigsman, Gil David
  • Publication number: 20190104153
    Abstract: The threat of malicious parties exposing users' credentials from one system and applying the exposed credentials to a different system to gain unauthorized access is addressed in the present disclosure by systems and methods to preemptively and reactively mitigate the risk of users reusing passwords between systems. A security device passively monitors traffic comprising authorization requests within a network to reactively identify an ongoing attack based on its use of exposed credentials in the authorization request and identifies accounts that are vulnerable to attacks using exposed credentials by actively attempting to log into those accounts with exposed passwords from other networks. The systems and methods reduce the number of false positives associated with attack identification and strengthens the network against potential attacks, thus improving the network's security and reducing the amount of resources needed to securely manage the network.
    Type: Application
    Filed: November 13, 2018
    Publication date: April 4, 2019
    Applicant: Microsoft Technology Licensing, LLC
    Inventors: Itai Grady, Michael Dubinsky, Benny Lakunishok, Idan Plotnik, Tal Arieh Be'ery
  • Patent number: 10148639
    Abstract: Brute force attacks on a given account with various password attempts are a common threat to computer security. When a suspected brute force on an account is detected, systems may lock the account from access, which is frustrating to users and time consuming for administrators in the event of a false positive. To reduce the number of false positives, brute force counterattacks are taught in the present disclosure. A brute force counterattack is used to learn whether the login attempts change the passwords attempted, and are to be classified as malicious, or keep the attempted password the same in multiple attempts, and are to be classified as benign.
    Type: Grant
    Filed: May 24, 2016
    Date of Patent: December 4, 2018
    Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC
    Inventors: Idan Plotnik, Michael Dolinsky, Sivan Krigsman, Tal Arieh Be'ery, Gil David, Marina Simakov
  • Patent number: 10129298
    Abstract: The threat of malicious parties exposing users' credentials from one system and applying the exposed credentials to a different system to gain unauthorized access is addressed in the present disclosure by systems and methods to preemptively and reactively mitigate the risk of users reusing passwords between systems. A security device passively monitors traffic comprising authorization requests within a network to reactively identify an ongoing attack based on its use of exposed credentials in the authorization request and identifies accounts that are vulnerable to attacks using exposed credentials by actively attempting to log into those accounts with exposed passwords from other networks. The systems and methods reduce the number of false positives associated with attack identification and strengthens the network against potential attacks, thus improving the network's security and reducing the amount of resources needed to securely manage the network.
    Type: Grant
    Filed: June 30, 2016
    Date of Patent: November 13, 2018
    Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC
    Inventors: Itai Grady, Michael Dubinsky, Benny Lakunishok, Idan Plotnik, Tal Arieh Be'ery
  • Publication number: 20180124065
    Abstract: Determining impossible travel for a specific user entity associated with an on-premises site. A method includes identifying an estimated location of an on-premises site associated with an organization network. Identifying the estimated location of an on-premises site comprises aggregating connection information of remote devices, remote from the on-premises site connecting to the on-premises site. Information related to an on-premises connection event is identified including the estimated location, time information, and a first user identification for an entity. Information is identified related to a different connection event. The information comprises location information, time information and a second user identification for the entity. The information related to the on-premises connection event and the information related to the different connection event are used to detect impossible travel for the entity. An alert indicating an impossible travel condition is provided.
    Type: Application
    Filed: November 3, 2016
    Publication date: May 3, 2018
    Inventors: Tom Jurgenson, Sivan Krigsman, Michael Dubinsky, Tal Arieh Be'ery, Idan Plotnik, Gil David
  • Publication number: 20180109490
    Abstract: A system and method for performing IP to name resolution in organizational environments. IP addresses are determined for devices utilizing the corporate network. An IP address is resolved to a first device name and then the same IP address is subsequently resolved to a second device name. A profile is generated such as a timeline for the IP address including both the first and second device names. The timeline may be queried to determine whether the first device name or the second device name was associated with the IP address during a period of time.
    Type: Application
    Filed: February 6, 2017
    Publication date: April 19, 2018
    Applicant: Microsoft Technology Licensing, LLC
    Inventors: Idan Plotnik, Sivan Krigsman, Benny Lakunishok, Tal Arieh Be'ery, Michael Dubinsky, Michael Dolinsky
  • Publication number: 20180084069
    Abstract: Systems and methods for determining a user's presence on a network of an enterprise are provided. Traffic is collected to a network from devices and, over a period of time, login and logoff information from a user is determined from the collected network traffic. Network sessions are determined from a user's login and logoff information and timetable is generated specific to the user that contains the network sessions. The time table identifies when the user was active and when the user was not active based on the login and logoff information and, therefore, present at a particular location over a period of time.
    Type: Application
    Filed: September 22, 2016
    Publication date: March 22, 2018
    Applicant: Microsoft Technology Licensing, LLC.
    Inventors: Tal Arieh Be'ery, Itai Grady, Tom Jurgenson, Idan Plotnik, Sivan Krigsman, Michael Dubinsky, Gil David
  • Publication number: 20180069934
    Abstract: The present disclosure provides for improved computational efficiency and security in a network by determining the physical location of network connected components, without requiring the components to self-locate. The locations of devices remotely connected to a site within the network are geolocated so that the physical location of that site may be inferred from a centralized point to the remote devices' locations. This calculate site location may be compared against a known site location to improve a generalized algorithm for determining the calculated location of a site with an unknown location, and may be applied to devices that are locally connected to the network, which may be otherwise incapable of being geolocated.
    Type: Application
    Filed: September 8, 2016
    Publication date: March 8, 2018
    Applicant: Microsoft Technology Licensing, LLC.
    Inventors: Tom Jurgenson, Tal Arieh Be'ery, Idan Plotnik, Michael Dubinsky, Sivan Krigsman, Gil David
  • Publication number: 20180007087
    Abstract: The threat of malicious parties exposing users' credentials from one system and applying the exposed credentials to a different system to gain unauthorized access is addressed in the present disclosure by systems and methods to preemptively and reactively mitigate the risk of users reusing passwords between systems. A security device passively monitors traffic comprising authorization requests within a network to reactively identify an ongoing attack based on its use of exposed credentials in the authorization request and identifies accounts that are vulnerable to attacks using exposed credentials by actively attempting to log into those accounts with exposed passwords from other networks. The systems and methods reduce the number of false positives associated with attack identification and strengthens the network against potential attacks, thus improving the network's security and reducing the amount of resources needed to securely manage the network.
    Type: Application
    Filed: June 30, 2016
    Publication date: January 4, 2018
    Applicant: Microsoft Technology Licensing, LLC.
    Inventors: Itai Grady, Michael Dubinsky, Benny Lakunishok, Idan Plotnik, Tal Arieh Be'ery
  • Patent number: 9860260
    Abstract: Monitoring of a life cycle of a connection of a network client device to a network via monitoring time synchronization traffic flowing between one or more network client devices and a time server in a network is provided. A system for monitoring a life cycle of a connection of a network client device to a network includes a security device operable to identify a true identity of the one or more network client devices, identify a network client device's connections to and disconnections from the network, determine which network client devices have been associated with a particular internet protocol (IP) address, and generate an output of connection and disconnection information associated with a network client device. In some examples, the security device is operable to detect anomalies and malicious patterns in the network.
    Type: Grant
    Filed: April 3, 2017
    Date of Patent: January 2, 2018
    Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC
    Inventors: Tal Arieh Be'ery, Itai Grady, Idan Plotnik