Patents by Inventor Kirill MOTIL

Kirill MOTIL has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240037222
    Abstract: A system includes calling to a first function, determination, in response to the call, of whether to execute a first version of the first function or a second version of the first function, execution of the first version of the first function if it is determined to execute the first version of the first function, and execution of the second version of the second function if it is determined to execute the second version of the first function, wherein the second version of the first function comprises a security-related features and the first version of the first function does not comprise the security-related feature.
    Type: Application
    Filed: October 9, 2023
    Publication date: February 1, 2024
    Inventor: Kirill MOTIL
  • Patent number: 11847207
    Abstract: A system includes calling to a first function, determination, in response to the call, of whether to execute a first version of the first function or a second version of the first function, execution of the first version of the first function if it is determined to execute the first version of the first function, and execution of the second version of the second function if it is determined to execute the second version of the first function, wherein the second version of the first function comprises a security-related features and the first version of the first function does not comprise the security-related feature.
    Type: Grant
    Filed: March 4, 2019
    Date of Patent: December 19, 2023
    Assignee: Microsoft Technology Licensing, LLC
    Inventor: Kirill Motil
  • Patent number: 11775657
    Abstract: Enhancing security achieved via encryption that is performed within an encryption device by combining entropy that is generated within the encryption device with additional entropy, that is generated external to the encryption device, into the generation of an encryption key. Prior to an encryption device utilizing a deterministic algorithm to generate the encryption key, multiple random numbers may be obtained from different entropy sources—at least one of which is internal to the encryption device and at least one of which is external to the encryption device. The encryption device combines the multiple random numbers into a combined entropy input that cannot be determined from either one of the random numbers alone. This combined entropy input is then utilized to generate the encryption key that is ultimately used to perform the device-internal encryption.
    Type: Grant
    Filed: October 15, 2020
    Date of Patent: October 3, 2023
    Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC
    Inventor: Kirill Motil
  • Publication number: 20230281311
    Abstract: There is provided a system and a computer-implemented method of detecting malware in real time in a live environment. The method comprises: monitoring one or more operations of at least one program concurrently running in the live environment, building at least one stateful model in accordance with the one or more operations, analyzing the at least one stateful model to identify one or more behaviors, and determining the presence of malware based on the identified one or more behaviors.
    Type: Application
    Filed: March 7, 2023
    Publication date: September 7, 2023
    Inventors: Tomer Weingarten, Almog Cohen, Udi Shamir, Kirill Motil
  • Patent number: 11625485
    Abstract: There is provided a system and a computer-implemented method of detecting malware in real time in a live environment. The method comprises: monitoring one or more operations of at least one program concurrently running in the live environment, building at least one stateful model in accordance with the one or more operations, analyzing the at least one stateful model to identify one or more behaviors, and determining the presence of malware based on the identified one or more behaviors.
    Type: Grant
    Filed: April 15, 2020
    Date of Patent: April 11, 2023
    Assignee: Sentinel Labs Israel Ltd.
    Inventors: Tomer Weingarten, Almog Cohen, Udi Shamir, Kirill Motil
  • Publication number: 20220121755
    Abstract: Enhancing security achieved via encryption that is performed within an encryption device by combining entropy that is generated within the encryption device with additional entropy, that is generated external to the encryption device, into the generation of an encryption key. Prior to an encryption device utilizing a deterministic algorithm to generate the encryption key, multiple random numbers may be obtained from different entropy sources—at least one of which is internal to the encryption device and at least one of which is external to the encryption device. The encryption device combines the multiple random numbers into a combined entropy input that cannot be determined from either one of the random numbers alone. This combined entropy input is then utilized to generate the encryption key that is ultimately used to perform the device-internal encryption.
    Type: Application
    Filed: October 15, 2020
    Publication date: April 21, 2022
    Inventor: Kirill MOTIL
  • Publication number: 20200311271
    Abstract: There is provided a system and a computer-implemented method of detecting malware in real time in a live environment. The method comprises: monitoring one or more operations of at least one program concurrently running in the live environment, building at least one stateful model in accordance with the one or more operations, analyzing the at least one stateful model to identify one or more behaviors, and determining the presence of malware based on the identified one or more behaviors.
    Type: Application
    Filed: April 15, 2020
    Publication date: October 1, 2020
    Inventors: Tomer WEINGARTEN, Almog COHEN, Udi SHAMIR, Kirill MOTIL
  • Publication number: 20200285736
    Abstract: A system includes calling to a first function, determination, in response to the call, of whether to execute a first version of the first function or a second version of the first function, execution of the first version of the first function if it is determined to execute the first version of the first function, and execution of the second version of the second function if it is determined to execute the second version of the first function, wherein the second version of the first function comprises a security-related features and the first version of the first function does not comprise the security-related feature.
    Type: Application
    Filed: March 4, 2019
    Publication date: September 10, 2020
    Inventor: Kirill MOTIL
  • Patent number: 10664596
    Abstract: There is provided a system and a computer-implemented method of detecting malware in real time in a live environment. The method comprises: monitoring one or more operations of at least one program concurrently running in the live environment, building at least one stateful model in accordance with the one or more operations, analyzing the at least one stateful model to identify one or more behaviors, and determining the presence of malware based on the identified one or more behaviors.
    Type: Grant
    Filed: June 15, 2017
    Date of Patent: May 26, 2020
    Assignee: Sentinel Labs Israel Ltd.
    Inventors: Tomer Weingarten, Almog Cohen, Udi Shamir, Kirill Motil
  • Publication number: 20170286676
    Abstract: There is provided a system and a computer-implemented method of detecting malware in real time in a live environment. The method comprises: monitoring one or more operations of at least one program concurrently running in the live environment, building at least one stateful model in accordance with the one or more operations, analyzing the at least one stateful model to identify one or more behaviors, and determining the presence of malware based on the identified one or more behaviors.
    Type: Application
    Filed: June 15, 2017
    Publication date: October 5, 2017
    Inventors: Tomer WEINGARTEN, Almog COHEN, Udi SHAMIR, Kirill MOTIL
  • Patent number: 9710648
    Abstract: There is provided a system and a computer-implemented method of detecting malware in real time in a live environment. The method comprises: monitoring one or more operations of at least one program concurrently running in the live environment, building at least one stateful model in accordance with the one or more operations, analyzing the at least one stateful model to identify one or more behaviors, and determining the presence of malware based on the identified one or more behaviors.
    Type: Grant
    Filed: August 11, 2014
    Date of Patent: July 18, 2017
    Assignee: SENTINEL LABS ISRAEL LTD.
    Inventors: Tomer Weingarten, Almog Cohen, Udi Shamir, Kirill Motil
  • Publication number: 20160042179
    Abstract: There is provided a system and a computer-implemented method of detecting malware in real time in a live environment. The method comprises: monitoring one or more operations of at least one program concurrently running in the live environment, building at least one stateful model in accordance with the one or more operations, analyzing the at least one stateful model to identify one or more behaviors, and determining the presence of malware based on the identified one or more behaviors.
    Type: Application
    Filed: August 11, 2014
    Publication date: February 11, 2016
    Inventors: Tomer WEINGARTEN, Almog COHEN, Udi SHAMIR, Kirill MOTIL
  • Patent number: 8713666
    Abstract: Disclosed are methods, devices, and media for enforcing network access control, the method including the steps of: extracting a packet signature from a packet (or packet fragment) received from a network; storing the packet signature and the packet in a buffer; computing a buffer signature using a per-endpoint secret key; determining whether the packet signature and the buffer signature are identical; and upon determining the packet signature and the buffer signature are identical, transmitting the packet to a protocol stack. Preferably, the step of extracting includes extracting the packet signature from a field (e.g. identification field) of a header of the packet. Preferably, the method further includes the step of: upon determining the packet signature and the buffer signature are not identical, discarding the packet. Methods for receiving a packet from a protocol stack, and transmitting the packet to a network are disclosed as well.
    Type: Grant
    Filed: March 27, 2008
    Date of Patent: April 29, 2014
    Assignee: Check Point Software Technologies, Ltd.
    Inventors: Kirill Motil, Almog Cohen, Yaron Sheffer
  • Publication number: 20090249466
    Abstract: Disclosed are methods, devices, and media for enforcing network access control, the method including the steps of: extracting a packet signature from a packet (or packet fragment) received from a network; storing the packet signature and the packet in a buffer; computing a buffer signature using a per-endpoint secret key; determining whether the packet signature and the buffer signature are identical; and upon determining the packet signature and the buffer signature are identical, transmitting the packet to a protocol stack. Preferably, the step of extracting includes extracting the packet signature from a field (e.g. identification field) of a header of the packet. Preferably, the method further includes the step of: upon determining the packet signature and the buffer signature are not identical, discarding the packet. Methods for receiving a packet from a protocol stack, and transmitting the packet to a network are disclosed as well.
    Type: Application
    Filed: March 27, 2008
    Publication date: October 1, 2009
    Applicant: Check Point Software Technologies Ltd.
    Inventors: Kirill MOTIL, Almog Cohen, Yaron Sheffer