Patents by Inventor Itzhak Fadida

Itzhak Fadida has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10237266
    Abstract: Sanitizing passwords used in a shared, privileged account includes providing a password of a shared account to a user; identifying a first machine logged into using the password; determining when the first machine enters an inconsistent state; and modifying a memory area associated with the first machine to eliminate occurrences of the password in the memory area.
    Type: Grant
    Filed: February 10, 2016
    Date of Patent: March 19, 2019
    Assignee: CA, Inc.
    Inventors: Itzhak Fadida, Guy Balzam, Amir Jerbi, Nir Barak
  • Patent number: 9509672
    Abstract: A method for providing seamless access to a first account using authentication information associated with a second account includes receiving a first account identifier corresponding to the first account, the first account being a shared account on a computer system. The method also includes receiving submitted authentication information associated with the second account. The method also includes comparing the submitted authentication information with stored authentication information that is associated with a plurality of authorized accounts. The plurality of authorized accounts is associated with clients authorized to access the first account. The method also includes determining whether the second account is an authorized account based on comparing the submitted authentication information with the stored authentication information. The method also includes providing seamless access to the first account in response to determining that the second account is an authorized account.
    Type: Grant
    Filed: November 8, 2013
    Date of Patent: November 29, 2016
    Assignee: CA, Inc.
    Inventors: Nir Barak, Itzhak Fadida, Shalom Shimoni, Amir Jerbi
  • Patent number: 9503475
    Abstract: A computer system includes a security coordinator configured to be communicatively coupled to a plurality of managed machines deployed in a same computing environment and managed by an environment manager. The security coordinator is configured to detect a security condition with respect to a first one of the managed machines, and to automatically initiate modification of a second one of the managed machines in the same computing environment responsive to detection of the security condition. The security coordinator is configured to initiate the modification of the second one of the managed machines prior to occurrence of a security condition therein and prior to action by the environment manager with respect to the second one of the managed machines in response to the detected security condition.
    Type: Grant
    Filed: August 14, 2012
    Date of Patent: November 22, 2016
    Assignee: CA, Inc.
    Inventors: Itzhak Fadida, Nir Barak, Eitan Hadar
  • Patent number: 9400727
    Abstract: A virtual machine console is recorded. A method for monitoring a virtual machine may comprise monitoring a virtualization environment, detecting a new virtual machine and associated console, creating an additional instantiation of the console by generating a reflection of the console on a video capture device and recording a real time video of an image of the additional instantiation of the console on the video capture device. Prior to recording, the image may be analyzed to determine a change and the recording of the image can be triggered based upon the analysis.
    Type: Grant
    Filed: May 15, 2012
    Date of Patent: July 26, 2016
    Assignee: CA, Inc.
    Inventors: Nir Barak, Itzhak Fadida, Amir Jerbi
  • Patent number: 9386019
    Abstract: In one embodiment, a system includes a non-transitory computer readable medium comprising one or more rules associated with access to a first server. The system further includes a processor configured to receive, a first request from a client to access a first server, the first request comprising first access information associated with a user of the client. The processor is further configured to determine, based on the one or more rules and the first access information, that the client may access the first server and retrieve second access information associated with the first server in response to determining that the client may access the first server. The processor is also configured to receive data from the first server using the retrieved second access information and the first request and send the data from the first server to the client using the one or more rules.
    Type: Grant
    Filed: March 14, 2013
    Date of Patent: July 5, 2016
    Assignee: CA, Inc.
    Inventors: Nir Barak, Itzhak Fadida, Amir Jerbi, Azy Shalom
  • Publication number: 20160191495
    Abstract: Sanitizing passwords used in a shared, privileged account includes providing a password of a shared account to a user; identifying a first machine logged into using the password; determining when the first machine enters an inconsistent state; and modifying a memory area associated with the first machine to eliminate occurrences of the password in the memory area.
    Type: Application
    Filed: February 10, 2016
    Publication date: June 30, 2016
    Inventors: Itzhak Fadida, Guy Balzam, Amir Jerbi, Nir Barak
  • Patent number: 9367673
    Abstract: Sanitizing passwords used in a shared, privileged account includes providing a password of a shared account to a user; identifying a first machine logged into using the password; determining when the first machine enters an inconsistent state; and modifying a memory area associated with the first machine to eliminate occurrences of the password in the memory area.
    Type: Grant
    Filed: March 3, 2014
    Date of Patent: June 14, 2016
    Assignee: CA, Inc.
    Inventors: Itzhak Fadida, Guy Balzam, Amir Jerbi, Nir Barak
  • Patent number: 9154497
    Abstract: A network server verifies a requesting user's permission to use a password to access a shared account hosted on a network server. The requesting user may be the person to whom the password was assigned, or in some cases, permission to use the password may have been granted to the requesting user by the person to whom the password is assigned. Provided the requesting user has permission to use the password, the system authenticates the requesting user for access to the shared account, and maintains accountability of the password.
    Type: Grant
    Filed: March 24, 2014
    Date of Patent: October 6, 2015
    Assignee: CA, Inc.
    Inventors: Guy Balzam, Itzhak Fadida, Amir Jerbi, Aviva Weinberg
  • Publication number: 20150248544
    Abstract: Sanitizing passwords used in a shared, privileged account includes providing a password of a shared account to a user; identifying a first machine logged into using the password; determining when the first machine enters an inconsistent state; and modifying a memory area associated with the first machine to eliminate occurrences of the password in the memory area.
    Type: Application
    Filed: March 3, 2014
    Publication date: September 3, 2015
    Applicant: CA, Inc.
    Inventors: Itzhak Fadida, Guy Balzam, Amir Jerbi, Nir Barak
  • Patent number: 9003546
    Abstract: Secure deletion of a storage device includes monitoring the storage device, determining whether a predetermined condition occurs, and accessing the storage device when it is determined that the predetermined condition occurs. Further, deleted information to be securely wiped is identified in accordance with a predetermined unified policy for a virtual environment comprising the storage device. Alternatively, information being deleted is intercepted when it is determined that the information being deleted satisfies a predetermined condition. The identified or intercepted deleted information is securely wiped from the storage device by filling a portion of the storage device associated with the deleted information with zero bytes before the deleted information is marked as deleted. The secured wiping of deleted information may occur in accordance with a predetermined enterprise-wide policy.
    Type: Grant
    Filed: October 18, 2012
    Date of Patent: April 7, 2015
    Assignee: CA, Inc.
    Inventors: Miron Gross, Eitan Hadar, Boaz Navott, Itzhak Fadida
  • Patent number: 8997195
    Abstract: In an example computer-implemented method, a password management (PM) server receives an access request message from a login computer at which a resource requiring vaulted credentials has been requested. The access request message identifies the requested resource and the login computer. A session identifier (ID) is generated that is linked to the login computer and to the requested resource, and is transmitted to the login computer. The PM server receives, from a mobile computing device, a user ID and a value indicative of the session ID. If the user ID is not authorized to access the requested resource, the PM server transmits the vaulted credentials to the login computer or the mobile computing device only if an approval message indicative of a confirmation code is received from a manager computing device authorizing release of the vaulted credentials for the user ID.
    Type: Grant
    Filed: March 27, 2014
    Date of Patent: March 31, 2015
    Assignee: CA, Inc.
    Inventors: Itzhak Fadida, Guy Balzam, Amir Jerbi, Nir Barak
  • Patent number: 8997173
    Abstract: A method includes receiving at a similarity arbitrator information about a security policy of a candidate virtual machine that is proposed to be included in a cluster of virtual machines, comparing the security policy of the candidate virtual machine to the security policies of a plurality of virtual machines in the cluster, and in response to the comparison, recommending that a virtualization environment manager exclude the candidate virtual machine from the cluster or include the candidate virtual machine in the cluster. Related systems and computer program products are also disclosed.
    Type: Grant
    Filed: September 12, 2012
    Date of Patent: March 31, 2015
    Assignee: CA, Inc.
    Inventors: Itzhak Fadida, Nir Barak, Eitan Hadar
  • Patent number: 8966573
    Abstract: A method of operating a virtual computing system includes receiving at a security controller security data corresponding to a candidate virtual machine that is proposed to be included in a virtualization environment managed by a virtualization environment manager, comparing the security data of the candidate virtual machine to security data of other virtual machines in the virtualization environment, and in response to the comparison, recommending that the virtualization environment manager exclude the candidate virtual machine from the virtualization environment. Related systems and computer program products are disclosed.
    Type: Grant
    Filed: July 20, 2012
    Date of Patent: February 24, 2015
    Assignee: CA, Inc.
    Inventors: Nir Barak, Itzhak Fadida, Eitan Hadar
  • Patent number: 8959623
    Abstract: Access to virtual machine inputs and outputs are controlled. Controlling access to virtual machine inputs and outputs may comprise locking inputs and outputs of a virtual machine from within the virtual machine, other than a predefined limited access input, detecting a request to unlock the inputs and outputs of the virtual machine; determining if a requester is authorized to unlock the inputs and outputs of the virtual machine and unlocking, temporarily, the inputs and outputs of the virtual machine if the requester is authorized. The predefined limited access input is configured to receive an input device with a private secret for unlocking the inputs and outputs of the virtual machine. The inputs and outputs are unlocked when an input device having a shared password is attached.
    Type: Grant
    Filed: May 25, 2012
    Date of Patent: February 17, 2015
    Assignee: CA, Inc.
    Inventors: Itzhak Fadida, Nir Barak, Alex Korthny, Guy Balzam
  • Patent number: 8959583
    Abstract: According to an example computer-implemented method, a password management server receives an access request message from a login computer at which a resource requiring vaulted credentials has been requested. The access request message identifies the requested resource and the login computer. A session identifier (ID) is generated for enabling release of the vaulted credentials. The session ID is linked to the login computer and to the requested resource. The session ID is transmitted to the login computer. Responsive to receiving a value indicative of the session ID from a mobile computing device, the password management server transmits the vaulted credentials to the login computer or to the mobile computing device.
    Type: Grant
    Filed: February 5, 2013
    Date of Patent: February 17, 2015
    Assignee: CA, Inc.
    Inventors: Itzhak Fadida, Guy Balzam, Amir Jerbi
  • Publication number: 20140223525
    Abstract: According to an example computer-implemented method, a password management server receives an access request message from a login computer at which a resource requiring vaulted credentials has been requested. The access request message identifies the requested resource and the login computer. A session identifier (ID) is generated for enabling release of the vaulted credentials. The session ID is linked to the login computer and to the requested resource. The session ID is transmitted to the login computer. Responsive to receiving a value indicative of the session ID from a mobile computing device, the password management server transmits the vaulted credentials to the login computer or to the mobile computing device.
    Type: Application
    Filed: February 5, 2013
    Publication date: August 7, 2014
    Applicant: CA, Inc.
    Inventors: Itzhak Fadida, Guy Balzam, Amir Jerbi
  • Publication number: 20140115709
    Abstract: Secure deletion of a storage device includes monitoring the storage device, determining whether a predetermined condition occurs, and accessing the storage device when it is determined that the predetermined condition occurs. Further, deleted information to be securely wiped is identified in accordance with a predetermined unified policy for a virtual environment comprising the storage device. Alternatively, information being deleted is intercepted when it is determined that the information being deleted satisfies a predetermined condition. The identified or intercepted deleted information is securely wiped from the storage device by filling a portion of the storage device associated with the deleted information with zero bytes before the deleted information is marked as deleted. The secured wiping of deleted information may occur in accordance with a predetermined enterprise-wide policy.
    Type: Application
    Filed: October 18, 2012
    Publication date: April 24, 2014
    Applicant: CA, INC.
    Inventors: Miron GROSS, Eitan HADAR, Boaz NAVOTT, Itzhak FADIDA
  • Publication number: 20140075494
    Abstract: A method includes receiving at a similarity arbitrator information about a security policy of a candidate virtual machine that is proposed to be included in a cluster of virtual machines, comparing the security policy of the candidate virtual machine to the security policies of a plurality of virtual machines in the cluster, and in response to the comparison, recommending that a virtualization environment manager exclude the candidate virtual machine from the cluster or include the candidate virtual machine in the cluster. Related systems and computer program products are also disclosed.
    Type: Application
    Filed: September 12, 2012
    Publication date: March 13, 2014
    Inventors: Itzhak Fadida, Nir Barak, Eitan Hadar
  • Publication number: 20140053226
    Abstract: A computer system includes a security coordinator configured to be communicatively coupled to a plurality of managed machines deployed in a same computing environment and managed by an environment manager. The security coordinator is configured to detect a security condition with respect to a first one of the managed machines, and to automatically initiate modification of a second one of the managed machines in the same computing environment responsive to detection of the security condition. The security coordinator is configured to initiate the modification of the second one of the managed machines prior to occurrence of a security condition therein and prior to action by the environment manager with respect to the second one of the managed machines in response to the detected security condition.
    Type: Application
    Filed: August 14, 2012
    Publication date: February 20, 2014
    Inventors: Itzhak Fadida, Nir Barak, Eitan Hadar
  • Publication number: 20140026231
    Abstract: A method of operating a virtual computing system includes receiving at a security controller security data corresponding to a candidate virtual machine that is proposed to be included in a virtualization environment managed by a virtualization environment manager, comparing the security data of the candidate virtual machine to security data of other virtual machines in the virtualization environment, and in response to the comparison, recommending that the virtualization environment manager exclude the candidate virtual machine from the virtualization environment. Related systems and computer program products are disclosed.
    Type: Application
    Filed: July 20, 2012
    Publication date: January 23, 2014
    Inventors: Nir Barak, Itzhak Fadida, Eitan Hadar